Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Intrusion detection

Subclass of:

340 - Communications: electrical

340500000 - CONDITION RESPONSIVE INDICATING SYSTEM

340540000 - Specific condition

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
340552000 Disturbance of electromagnetic waves 57
340545100 Door or window movement 50
340565000 Responsive to intruder energy 21
340542000 Lock 20
340561000 Disturbance of electric field 14
340551000 Disturbance of magnetic field 11
340550000 Partition penetration 10
340544000 Disturbance of fluid pressure 1
20090295578Portable security system and method thereof - A portable security system for detecting and annunciating intrusion into enclosed confines includes a hollow enclosure and a frame which is engageable with the hollow enclosure for concealing it from direct view. A controller is mounted within the hollow enclosure and is operably coupled to a source capable of supplying electrical power. A pressure sensor is mounted within the hollow enclosure in electric communication with the controller and is operable to generate an intrusion signal upon detecting an intrusion condition into such enclosed confines, whereby the controller, when being armed, is responsive to receipt of the generated intrusion signal to generate an annunciation signal annunciating the intrusion condition.12-03-2009
Entries
DocumentTitleDate
20080284592Home health monitoring system - The present invention relates to a system and method of modifying and utilizing a standard home security system augmenting it into a viable state-of-the-art home health monitoring system. More specifically, this invention relates to an apparatus and method of adding a program and some motion sensors thus using the methods (with slight modification) of an existing home security system in such a way that there is a minimum of intrusion and cost compared to other methods.11-20-2008
20100156636INTRUDER IDENTIFYING METHOD, INTRUDER IDENTIFYING DEVICE AND INTRUDER IDENTIFYING SENSOR DEVICE - In an intruder identifying method and device, an intruder identifying sensor device identifies an intruder as a detection target to be originally detected by determining whether a variation style for a predetermined time of intruder intrusion state information based on the reception signal of the electric wave receiving unit during a time period from the time when the intruder identifying sensor device detects an intruder till the time when the intruder identifying sensor device does not detect the intruder is a predetermined variation style.06-24-2010
20130027203Delayed Entry Alert & Detection Switch - An intrusion detection device including microcontroller, a light emitting diode (01-31-2013
20090195382VIDEO SENSOR AND ALARM SYSTEM AND METHOD WITH OBJECT AND EVENT CLASSIFICATION - A method and system detects an intrusion into a protected area. Image data is captured and processed to create a reduced image dataset having a lower dimensionality than the captured image data. The reduced image dataset is transmitted to a centralized alarm processing device where the reduced image dataset is evaluated to determine an alarm condition.08-06-2009
20100164720APPARATUS AND METHOD FOR LOCATION-BASED ACCESS CONTROL IN WIRELESS NETWORKS - A method includes receiving wireless signals from a device at a wireless access point associated with a wireless network. The method also includes estimating a location of the device and determining whether the estimated location is within a specified area. In addition, the method includes allowing the device to communicate over the wireless network in response to determining that the estimated location is within the specified area. Estimating the device's location could include estimating a direction of the device with respect to the wireless access point and/or estimating a distance of the device from the wireless access point. Estimating the direction of the device could include using a direction of arrival of at least one wireless message received at the wireless access point from the device. Estimating the distance of the device could include transmitting multiple messages to the device at different power levels and receiving one or more responses from the device.07-01-2010
20090243850MICROWAVE RECEIVER AND MICROWAVE SENSOR SYSTEM - A microwave receiving apparatus according to an embodiment of the invention includes a local transmitter which supplies a local signal having a frequency according to a supplied voltage, a mixer which combines a received microwave signal with the local signal to supply an intermediate frequency signal, a filter which passes the intermediate frequency signal, a phase shifter which shifts a phase of the intermediate frequency signal passed through the filter by a predetermined angle, and a phase detection unit which supplies a voltage to the local oscillator according to a phase difference between the intermediate frequency signal passed through the filter and output of the phase shifter.10-01-2009
20110193700Apparatus And Method For Operating Devices Based Upon Vehicle Detection - A movable barrier operator controls access to a secured area which houses vehicles. The movable barrier operator is operable to move a movable barrier from an open to a closed position. A sensor controls the operation of a service-providing device through the controller of a movable barrier operator or by direct communication to a controller for the service-providing device. The sensing device senses whether a vehicle is present in the secured area. The sensor is operatively connected to the moveable barrier operator and is used to control the operation of at least one service-providing device without necessarily effecting movement of a barrier by the movable barrier operator. Operation of the service-providing device is effected upon sensing whether a vehicle is present in the secured area to effect an operation of the service-providing device.08-11-2011
20100052902RELIABLE SECURITY SYSTEM BY TRIANGULATION - The present invention is a security system and a method for reliably detecting an intruder without false alarms. The security system includes at least three motion detectors and processor circuitry adapted to collect a plurality of location samples and analyze them to determine if a target has transitioned from a first region to a second region, and when the target has transitioned from a first region to a second region, initiating a predetermined action. Each location sample is determined by: detecting motion from a target with each of the three motion detectors, determining the distance to the target for each of the three motion detectors, and triangulating the three determined distances to produce a two-dimensional location. The security system determines if a target has transitioned from a first region to a second protected region by comparing the plurality of location samples to perimeter location data stored in memory. Different modes of operation cause the security system to take different actions before and after the transition, such as generating an alarm or a warning signal. The security system may also include a display to show the location of one or more targets, which may be the intruder or the occupants of the premises.03-04-2010
20090121869ACCESS MONITORING AND CONTROL SYSTEM AND METHOD - An access monitoring and control system is provided. The access monitoring and control system includes a sensing device configured to collect data points regarding at least one of movement of a person through an access portal and a state of the access portal and a processing unit configured to receive the data points from the sensing device and to form activity clusters from the data points based upon similar patterns of inactive or active behaviors.05-14-2009
20100073164METHOD FOR DETERMINING SENSOR COVERAGE, A DESIGN TOOL AND A BORDER PROTECTION SYSTEM USING THE METHOD - A method is disclosed for determining sensor performance of a border element of homogeneous terrain, weather and vegetation properties. The border element includes a number of areas of interest, as well as a plurality of sensors. The method includes determining coordinates of the border element and areas, and determining performance data for each sensor. The coordinates and performance data is used as input parameters to a Line-Of-Sight tool for determining a coverage factor of each sensor. The coverage factor is modified for time per time unit in which function of each sensor is impaired by conditions such as bad weather, light or mobility. Then, the modified coverage factors for each sensor are summed to obtain a total sensor performance for the border element.03-25-2010
20130033379SECURITY MONITORING SYSTEM - In one embodiment, a monitoring system is provided. The system includes one or more monitoring devices configured to generate respective video signals, and a control circuit. The control circuit is configured to allow a user remote access to the video signals in response to a request for remote access by the user via the WAN interface and the control circuit operating in an alarm state. The control circuit is configured to deny the user access to the video signals in response to a request for remote access by the user via the WAN interface and the control circuit operating in a non-alarm state.02-07-2013
20100045461Security system with activity pattern recognition - A security system and method of operation thereof stores information related to a plurality of detected events and determines an activity pattern based on the stored information. The system and method then determines a type of alarm, if any, to issue in response to a detected trigger event based at least in part on the determined activity pattern.02-25-2010
20100045460Security system and method with automatic language selection - A security system and method of operation thereof are provided in which users of the security system are each assigned a preferred language. A user interface of the security system communicates information to particular users in their assigned preferred languages.02-25-2010
20130038448Access Control System - An access control system is disclosed comprising a credential reader arranged to gather at least one credential from a person desiring to pass through an access point associated with the access control system, the system being arranged to use the at least one credential to provide an indication about the identity of the person. The system also comprises at least one access control device controlling access through a respective access point such that a person is allowed or denied access dependent on whether the person is positively identified, and a data storage device that stores data indicative of a current security level applicable for each access point associated with the system, the security level defining the criteria required to provide a positive identification of the person. Stored security level data can be modified to change the criteria required for positively identifying a person.02-14-2013
20090045952Operating & controlling a security system by mobile phone - An operating and controlling system is disclosed to monitor and protect various premises. The premises may include residential, commercial, automobile, boat, airplane or any other property that is to be protected by a security system. A Hand Held Mobile Phone (HHMP) manages and controls the security system through a two way wireless multimedia communication between the security device located at the premises and the HHMP remotely located worldwide.02-19-2009
20110006895Expendable Tamper Evident Security Seal - An expendable tamper evident seal system for monitoring a mechanism to which physical access is required in order to open or close an access-way, comprising: an embedding material moldable into a shape conforming to the mechanism and adapted to be applied to the mechanism; circuit components randomly embedded in the embedding material so as to be arranged in positions and orientations corresponding to the shape, whereby physical access to the mechanism that alters the shape of the embedding material correspondingly alters the positions and orientations of the circuit components in the material; and an electronic interrogation device (EID) including components that induce in the circuit components an electromagnetic spectral response indicative of the position of the EID relative to the positions and orientations of the circuit components in the material, and measure the spectral response.01-13-2011
20130057403METHOD AND DEVICE FOR DETECTING AND REPORTING ACTIVITY - A device and methods are provided for monitoring and reporting activity including providing an alert based on detected activity. In one embodiment, a method includes is monitoring activity relative to a device based on activity detected by the device, determining a baseline activity level for the device, and detecting a change in the baseline activity level. The method may further include transmitting an electronic message via a network connection based on the change in baseline line activity, the electronic message providing an alert based on the change in baseline activity level. The device and methods may advantageously allow for providing alerts based on inactivity.03-07-2013
20090212943System and method for intrusion detection - Present day intrusion detection systems frequently cause false alarms by mistaking occupants as intruders, and it is desirable to reduce such false alarms. This invention comprises a processor that employs various software algorithms. The processor receives signals over temporal periods and software algorithms statistically discern various activities, thereby reducing false alarms and detection failures. The software algorithms are adaptive to the level of detected activity such that a rate of false alarms may be predetermined. As such, the processor and software algorithms comprise an artificial intelligence system. This artificial intelligence system may be employed in intruder and vehicle alarm systems composed of a multiplicity of detectors and within such detectors. A second aspect of this invention is an improved infrasound detection method that may be employed in such artificial intelligence.08-27-2009
20090091444MOVEMENT CONTROLLED LUMINAIRE AND LUMINAIRE ARRANGEMENT - A luminaire includes at least one main illuminant and at least one auxiliary illuminant. The main illuminant is provided for a continuous operation. The auxiliary illuminant is controlled by a motion sensor, which activates it when movement is detected. Preferably, the motion sensor is embedded in the luminaire. Furthermore, it is preferred that the at least one auxiliary illuminant is designed as a LED-luminaire.04-09-2009
20090243852Remote Location Monitoring - A remote location monitoring system, for example, a home monitoring or weather monitoring system may include one or more sensors and/or receivers at a remote location such as a residence or business to be monitored. The sensors and receivers may communicate with a central server via a gateway device, and may be controlled by users locally or remotely via the server. Users may register to receive remote notifications of weather events and other home monitoring events. Users may also access remotely sensors and receivers to configure alerts, notifications, and automatic responses for the devices and integrated appliances at the remote location.10-01-2009
20110063109DEVICE FOR MONITORING A SPACE BY SERIES-CONNECTED NORMALLY-OPEN CONTACTS, IN PARTICULAR COVER INTERLOCK SWITCHES IN A SECURITY ENCLOSURE - A device for monitoring a space by changing a sequence of a serial interconnection of closing contacts, in particular of cover switches in a security housing, having a series circuit variation apparatus, a security cover, at least two closing contacts, and a protective circuit, wherein said at least two closing contacts each have an open, electrically nonconductive state and a closed, electrically conductive state, wherein said security cover is set up to put each of said at least two closing contacts in a closed, electrically conductive state, wherein said protective circuit is set up to detect an opening of at least one of said at least two closing contacts, wherein said series circuit variation apparatus serially interconnects said at least two closing contacts, wherein the sequence of the serial interconnection of said at least two closing contacts can be changed by said series circuit variation apparatus.03-17-2011
20130063265Systems and Methods for Remote Building Security and Automation - A system and method for remotely monitoring and controlling building security are provided. A controller is communicatively coupled to security devices of a building and can communicate an activity event detected by one of the security devices to a remote user device. The controller can then establish a communication session between the remote device and a security device via the controller, thereby allowing the user to communicate with any visitors. Video from a security device can be transmitted by the controller to the user device or an alternative user-device. Access instructions can be provided by the user, in response to which the controller can deactivate various building security measures. Security measures can be reactivated by the controller automatically or in response to a user command. Additionally, the controller can monitor visitor compliance with the deactivated security measures and activate alarms or notify security agencies if necessary.03-14-2013
20090237246DRIVEWAY ALERT SYSTEM WITH CAR ID - A security/notification or alert system and method including a specified secure area and an electronic identification device coupled to a trespassing or visiting entity. The electronic identification device transmits a particular identification when the trespassing/visiting entity enters the specified area. A sensor device detects entry of the trespassing/visiting entity into the specified area and transmits an alert signal to a control device when the trespassing/visiting entity is detected. The control device communicates that the trespassing/visiting entity has entered the specified area, and also identifies the entity and communicates the particular identification of the trespassing/visiting entity.09-24-2009
20100085186Tamperproof Non-Contact Switch - A non-defeatable magnetically actuatable switch device is shown and described for restricting access to industrial controls. The non-contact switch device employs one or more non-contact access switches, and an access key removably disposed in close proximity to each access switch. Removal or installation of an access key alters the electrical state of a corresponding access switch. A connected control unit determines a mode of operation, or grants permissions, based on the combination of access keys that are present or absent from the device. A lockable or sealable cover is provided over the access keys to limit unauthorized access. A tamper detection switch is also provided for the sole purpose of identifying foreign magnetic sources in the vicinity of the access switches to ensure that the device is non-defeatable. Furthermore, all access and tamper detection switches are magnetically actuatable and thus provide a completely contact-free means of securing and restricting access to sensitive controls and parameters.04-08-2010
20120105229SYSTEM AND METHOD FOR INTRUDER DETECTION - A beam-interrupt detection based system can provide functionalities such as counting of intruders crossing a given beam. A plurality of such beams at different heights can also allow distinguishing different-sized intruders. A recording can be triggered by detection of intruder movement, thereby improving the efficiency of recording and reviewing information indicative of presence and movement of intruders in a monitored area. Non-intruders can be distinguished from intruders by querying an RFID tag carried by non-intruders.05-03-2012
20090009326Portable Motion-Detecting Alarm with Remote Notification - A Disturbance-Sensing System comprises a fixed unit comprising a small and self-powered unit for associating with an object being protected, and for sensing an alarm event such as movement of the object being protected, and for remotely notifying the an owner or person responsible for the object being protected that the alarm event is occurring; and a mobile unit which may be carried by an owner of or person responsible for the object being protected, for receiving the notification of the alarm event. The fixed unit may be attached to or otherwise disposed in, on or in proximity to the object being protected. The mobile unit may comprise a user's cell phone. Various means for attaching the fixed unit to an object being protected are disclosed.01-08-2009
20090174552DIGITAL OCCUPANCY SENSOR LIGHT CONTROL - A method of sensing motion in a predetermined area is provided. The method may include using a digital output motion sensor to produce a digital output signal indicative of the presence of motion in the predetermined area. The method may further include transmitting the digital output signal along a signal path independent of analog amplification and filtering. The method may also include using a microprocessor coupled to the signal path to receive the digital output signal and to process the digital output signal.07-09-2009
20110140892SYSTEM AND METHOD FOR DETECTING MULTI-LEVEL INTRUSION EVENTS AND COMPUTER PROGRAM PRODUCT THEREOF - A system and a method for detecting multi-level intrusion events are provided. The system includes an area recognition module and an area classification module. The area recognition module performs a geometric topology operation to recognize a plurality of areas in a ground plane that has a plurality of boundaries and a plurality of gates, and each of the areas is constituted of at least one of the boundaries and at least one of the gates. The area classification module defines a plurality of security levels and classifies each of the areas recognized by the area recognition module as one of the security levels. Accordingly, the system is able to automatically recognize the areas in the ground plane, set the security levels of the areas, and generate the corresponding detection areas and tripwires according to the security levels of the areas.06-16-2011
20110291832PRESENCE DETECTION SYSTEM AND METHOD - A presence detection system for detecting objects which move through an entrance of a space. The system is based on the idea to create a signature of a moving object which can be used to determine whether the object is a human being.12-01-2011
20120098661DETECTOR AND OPTICAL SYSTEM - Embodiments of the present invention relate to a detector comprising first and second lenses for use with respective first and second sensing means; each lens comprising a plurality of Fresnel facets having respective fields of view adapted such that the fields of view of the first lens are alternately arranged with the fields of view of the second lens such that the fields of view of the first lens are adjacent only to, but do not overlap with, the fields of view of the second lense in a single direction04-26-2012
20110291833INTERCOM EXCHANGE - An intercom exchange is connected to multiple terminals, and includes multiple communication paths, a digital switch circuit for switching connections between the terminals and the communication paths, and a CPU that controls the DSPs and the switch circuit. The CPU performs control for preferentially allocating a communication path to the first terminal, and the allocated DSP determines whether a sound from the first terminal that has been received as input via the switch circuit is an abnormal sound. Upon determining that the sound is an abnormal sound, the allocated DSP notifies the CPU, and upon receiving the notification, the CPU determines an alert destination based on the notification and performs alert processing for sending an alert to the alert destination.12-01-2011
20110291831TIME BASED VISUAL REVIEW OF MULTI-POLAR INCIDENTS - A system and method for time based review of multi-polar incidents is provided. The method includes selecting at least one past alarm incident, and populating a floor plan map with representations of the past alarm incident and a set of alarms that were active during the past alarm incident.12-01-2011
20100265066Actively Protecting an Area - An active protection system and a method of protecting an area from trespassers. The system comprises a sensing unit arranged to detect the presence and the location of the trespasser, a targeting unit and a discharging unit arranged to discharge a charge onto the trespasser detected by the sensing unit according to data from the targeting unit. The charge is selected to neutralize or mark the trespasser.10-21-2010
20090167529Electronic fence using wireless mesh network - The current problem in protecting a secure area which can be a border between countries, Federal facility, Army deployment or even a house is that we are relying for the most part on a fence, cameras, electric fence, which takes a longer time to install. It is very expensive and cannot locate the point of entry. Sometime it is too late to react if someone cuts the fence and enters the secure area. My patent is to provide a very fast solution, early detection, identify the location of entry and all wireless systems which will allow implementing this idea in any location even in enemy fields where you wish to protect troops, army facilities and more.07-02-2009
20090153325VIRTUAL RECEPTIONIST METHOD AND SYSTEM - A method of reception includes detecting that an object has entered a first region of a space at a first time. A time period is measured around the first time. A determination is made whether any object has entered a second region of the space within the time period. Thereafter, a determination is made that the object needs attention when no object is detected entering the second region within the time period.06-18-2009
20090309722TAMPER-INDICATING MONETARY PACKAGE - A monetary package capable of detecting and communicating tampering is described. The monetary package may comprise a container having a volume configured to hold monetary items such as currency, checks, and negotiable instruments, a sensor configured to detect an opening of the container, a device coupled to the sensor and configured to store data responsive to the sensor detecting the opening of the container, and a transmitter configured to wirelessly send the stored data12-17-2009
20090295577Area Monitoring Sensor - Provided is an area monitoring sensor capable of recording sensing information of an intruder that has triggered to output an operation disable signal, and displaying the information as needed. The area monitoring sensor includes: an intruder sensing unit that emits detection light in different emitting directions and senses an intruder within a previously set monitor area based on reflection of the detection light; a signal output unit that outputs an operation disable signal based on a result of the sensing by the intruder sensing unit; a sensing history recording unit that stores a position of the intruder that has been sensed by the intruder sensing unit as sensing history; and a sensing history display unit that displays the sensing history in the sensing history recording unit based on an input signal from the operation input unit.12-03-2009
20090207020MULTITHREAT SAFETY AND SECURITY SYSTEM AND SPECIFICATION METHOD THEREOF - The invention relates to a safety and security system designed to protect a designated area. The system comprises sensors of various types (radars, infrared detectors for instance) and sources of intelligence. Correlation is run between instant-track data and non-instant-track data before the level of threat of the tracks is analysed. Reliability of this analysis is thus greatly enhanced. Also a method is provided to develop systems of this type which provides an integrated specification and design method which covers technical and human factors.08-20-2009
20110169637Control System, Security System, and Method of Monitoring a Location - A control system for a security system having a plurality of sensors includes a sensor communication device configured to communicatively couple to the plurality of sensors and to receive a plurality of sensor notifications from the plurality of sensors. Each sensor notification of the plurality of sensor notifications includes at least one of a detection type, a detection location, and a detection duration. The control system also includes a processor configured to receive the plurality of sensor notifications from the sensor communication device, associate a plurality of detection states with the plurality of sensor notifications such that at least one detection state of the plurality of detection states is entered upon receiving at least one combination of sensor notifications of the plurality of sensor notifications, and associate at least one detection response with each detection state of the plurality of detection states.07-14-2011
20080211668METHOD AND SYSTEM TO DETECT HUMANS OR ANIMALS WITHIN CONFINED SPACES WITH A LOW RATE OF FALSE ALARMS - The present disclosure describes a detection system and methods for detecting a presence of a person or animal within a confined space with a low false alarm rate. The detection system may include a chemical detector to determine whether respiratory gas concentrations within the confined space exceed a predetermined concentration threshold. The detection system may further include an accelerometer-controlled, range-controlled radar unit to detect movement within the confined space during times in which acceleration of the confined space is less than a predetermined acceleration threshold. In this manner, a measured respiratory gas concentration that initially indicates a presence of a person or animal within the confined space may be confirmed by motion detection.09-04-2008
20090273472APPARATUS, SYSTEM, AND METHOD FOR SAFELY AND SECURELY STORING MATERIALS - An apparatus, system, and method are disclosed for safely and securely storing materials. A plurality of smart tiles sense traffic and generate traffic data. A network transmits the traffic data from the smart tiles. A computer determines a plurality of normal traffic patterns from the traffic data. In addition, the computer detects an abnormal traffic pattern from the traffic data. The computer activates a security response in response to the abnormal traffic pattern.11-05-2009
20120268273SECURITY SYSTEMS AND METHODS FOR CONTINUOUSLY MONITORING THE WEIGHT OF A CONTAINER - Various embodiments disclosed herein are directed to weight monitoring systems for recovering, processing, monitoring, and managing various commodities or products stored in a container.10-25-2012
20100127866CONTROLLING AN ALARM STATE BASED ON THE PRESENCE OR ABSENCE OF A CAREGIVER IN A PATIENT'S ROOM - Systems and methods for controlling an alarm state, such as volume, based on the presence or absence of a caregiver in a patient's room. More specifically, a local sound producing device provides an audible alarm within a room when a caregiver is in the room, while a remote sound producing device provides an audible alarm external of the room when the caregiver is not in the room. Accordingly, volume levels of the sound producing devices depend on the sensed presence or absence of the caregiver within the room. For example, when the caregiver leaves the room, the local sound producing device is deactivated and/or the remote sound producing device is activated, thereby allowing the patient to enjoy a more relaxed environment within the room, yet still continue to be monitored. Conversely, when the caregiver enters the room, the local sound producing device is activated and/or the remote sound producing device is deactivated, thereby allowing the caregiver to monitor the patient when within the room, yet allow decreased monitoring external of the room.05-27-2010
20090189763Security film - A tamper indication device has a film attached and connected within the circuit that generates a signal in response to a tamper event. The signal is received by a micro-controller which generates an output signal to a display or data collection device and transceiver. More particularly, the tamper indication device has a printed circuit in a specialized pattern to make entry without breaking the circuit near impossible. When the circuit is broken a signal is counted by the micro controller which generates an output signal for delivery to a display or other data collection device. The output signal can be transmitted by RF device such as a passive or active RFID Tag, or by an IR communications device or by any other communication variant.07-30-2009
20100102962OCCUPANCY SENSING WITH SELECTIVE EMISSION - An occupancy sensing system includes a driver to emit energy in a space, and a sensor to detect energy reflected within the space. An electrical load for the space is controlled in response to an occupancy condition determined in response to the detected energy. The driver may be selectively de-energized. In some embodiments, the driver may be de-energized during all or a portion of an unoccupied period. In other embodiments, the driver may be de-energized during all or a portion of an occupied period. In some further embodiments, the driver may be de-energized in response to detecting other sources of the type of energy emitted by the driver.04-29-2010
20080238667Clothing and Accessories that Operate Radio Frequency Identification Enabled Security Devices - A wearable radio frequency identification (RFID) device is disclosed that includes a wearable housing and an RFID chip within the wearable housing. The RFID chip is configured to communicate with one or more RFID enabled security devices to activate and/or deactivate one or more security systems. The wearable RFID device may take on many different wearable forms, for example, a watch, a ring or a label with an RFID chip inside.10-02-2008
20080238668SYSTEM AND METHOD FOR SECURITY MONITORING BETWEEN TRUSTED NEIGHBORS - A system and method for security monitoring by a trusted neighbor is disclosed. In one embodiment, the system allows a security monitor in a first building to communicate with a building automation network in a second building to enable monitoring of a security sensor in the second building.10-02-2008
20110012734Portable Boundary Sensor System and Method - A method and system that creates a boundary with an alert and deterring function when the boundary is crossed. The system employs a base unit and one or more portable IR motion sensors which are capable of discriminating between objects of differing physical characteristics, and notifies the user when the parameters for sufficient obstruction have been met. Both sensors and base unit have audio and visual deterring capabilities to frighten away unwanted intruders. The method and system can be utilized in camping situations to deter dangerous wildlife and can be configured to notify users when children exit from an area. The system can be used to create a contiguous perimeter, or any boundary arrangement desired.01-20-2011
20100201517DEVICE AND METHOD FOR PROTECTION AGAINST INTRUSION INTO THE LANDING GEAR HOUSING OF AIRCRAFT - The invention relates to a device for protection against intrusions into the landing gear housings of an aircraft, including at least one sensor, for at least one housing, covering at least one housing entry area and connected to a calculator (08-12-2010
20080278320Method and system for reduction of electronic article surveillance system false alarms - A method and system for generating alarms in a security system that include establishing a detection region, detecting a first event where the first event is one of (a) detecting a tag in the detection region and (b) detecting a person in the detection region, starting a timer upon detecting the first event, detecting a second event where the second event is the other one of (a) detecting a tag in the detection region and (b) detecting a person in the detection region and enabling an alarm output when the second event is detected prior to expiration of the timer. The method and system for generating alarms in a security system can further include setting a first event flag upon detecting the first event where the first event flag corresponds to the first event and setting a second event flag upon detecting the second event where the second event flag corresponds to the second event.11-13-2008
20080284594Optoelectronic sensor arrangement and process for monitoring a surveillance area - The invention relates to an optoelectronic sensor arrangement (11-20-2008
20080291017Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices - Wireless devices, such as field devices or repeater/relay nodes, detect the presence of anomalies in data packets that suggest intrusion. Upon detection of an anomaly, a wireless device sends a notification to a sentinel device, which determines if intrusion may be occurring. If so, the sentinel device downloads a spy routine to at least one of the wireless devices, which enables further investigation into and/or isolation of the intrusion. Since the spy routine is downloaded to the wireless devices, the spy routine can be used in conjunction with memory-constrained wireless devices. Memory-constrained wireless devices may lack adequate memory for storing both a main application executed during normal operation and the spy routine. The spy routine could overwrite one or more modules of the main application. Once executed, the spy routine could itself be overwritten by the one or more modules, allowing the wireless device to return to normal operation.11-27-2008
20080291018METHOD, COMPUTER PROGRAM ELEMENT AND A SYSTEM FOR PROCESSING ALARMS TRIGGERED BY A MONITORING SYSTEM - A method and system is designed for processing alarms, that have been triggered by a monitoring system such as an intrusion detection system, a firewall, or a network management system, comprising the steps of entering the triggered alarms into an alarm log, evaluating similarity between alarms, grouping similar alarms into alarm clusters, summarizing alarm clusters by means of generalized alarms, counting the covered alarms for each generalized alarm and forwarding generalized alarms for further processing if the number of alarms covered satisfies a predetermined criterion. In the event of high rates of alarm messages, possibly containing many false alarms, a system administrator will therefore not be confronted with a flood of messages with little significance. Instead, only generalized alarms, more meaningful and smaller in number, are presented. The method can further comprise copying the alarm log to a cluster log and for each generalized alarm in the cluster log counting the number of covered alarms that are identical to the generalized alarm or more specific than the generalized alarm, and, if the number of covered alarms exceeds a predetermined minimum number, then terminating the loop. A heuristic is used to select an attribute of the alarms of the cluster log and for each alarm thereof the selected attribute is replaced by a more general attribute. A taxonomy on the attributes can be used to define the similarity between the alarms. The forwarded generalized alarm can furthermore be investigated in order to identify a root cause.11-27-2008
20080303662TRAFFIC AND POPULATION COUNTING DEVICE SYSTEM AND METHOD - A traffic and population counting device system and method is provided. The traffic and population counting device may be executable by a computing device and may include an entry selector configured to be selected to indicate that a shopper has entered a shopping zone and to keep a running count of a number of shoppers who enter the shopping zone. An exit selector may be configured to be selected to indicate that a shopper has exited a shopping zone and to keep a running count of a number of shoppers who exit the shopping zone. Further, a display may be configured to display a running population count of shoppers within the shopping zone. The running population count may be determined by a running difference between the running count of the number of shoppers who enter the shopping zone and the running count of the number of shoppers who exit the shopping zone.12-11-2008
20100127865SECURITY SYSTEM INCLUDING AUDIO ALARM DETECTION - A building security arrangement includes a sensor for emitting an audible alarm signal. A security system installed in the building detects the audible alarm signal and transmits an electrical alarm signal over a public switched telephone network in response to the detection of the audible alarm signal. A central monitoring station receives the electrical alarm signal over the public switched telephone network and notifies an alarm authority in response to receiving the electrical alarm signal.05-27-2010
20100265065RFID SYSTEM AND RFID TAG READING METHOD - Tag data stored in a specific RFID tag is stored in a specific-data storing unit. Tag data is read from an RFID tag present in a communication area by an RFID reader through radio communication according to detection of a specific object by a sensor for detecting the object. When tag data same as the tag data stored in the specific-data storing unit is not included in the tag data read by the RFID reader, the read tag data is transmitted to a host apparatus.10-21-2010
20090091445System and Method for Providing Visual and Physiological Cues in a Security Matching System - A system and method for displaying a security alert. First and second user monitors are configured to communicate with an interrogator to establish the presence of the user monitors in a defined space. An information server is configured to determine a degree to which the users of the first and second user monitors are permitted to exchange information according to security matching criteria applied to user profiles. Security alert signals are sent to first and second match indicators. The first match indicator is visible to the user of the second user monitor so as to be informative to the user of the second user monitor of a degree to which the users of the first and second user monitors are permitted to exchange information according to the security matching criteria. The second match indicator is visible to the user of the first user monitor so as to be informative to the user of the first user monitor of a degree to which the users of the first and second user monitors are permitted to exchange information according to the security matching criteria.04-09-2009
20100271205Intruder Deterrent Lighting - A zoned interactive control area (10-28-2010
20090128328Automatic monitoring system with a security system - The invention is related to a security system of an automatic monitoring system that is used to guard the automatic monitoring system from theft. The security system uses a sensing device to detect the movement or vibration of the monitoring system and produces a sense signal that will be processed by an information processing device to produce and send out a warning signal to guard the automatic monitoring system against theft and track the position after being moved.05-21-2009
20090128327Systems and Methods of Detection Using Fire Modeling - A system for adjusting parameters of ambient condition detectors in a regional monitoring system is coupled to or includes fire modeling processing. Based on outputs from the processing, selected parameters of respective detectors can be adjusted to shorten detector time to alarm. As a fire condition develops, different detectors can be adjusted dynamically and in real-time.05-21-2009
20090184821Smart display device for independent living care - A wireless contextual prompting device provides contextual (context-aware) prompting in the home for applications such as Activities of Daily Living (ADL) monitoring, medication adherence, journaling, social messaging and coaching. The device combines the advantages of a small, wireless, battery-operated sensor that may be easily mounted at critical places in a person's daily routine with a low-power, high-contrast display panel that may be palm sized. The context may be displayed on the display screen as images, icons and/or text such that it is easy to interpret warnings by the young, elderly, or the language-challenged.07-23-2009
20110227731MARINE OPTIC FIBER SECURITY FENCE - A fence for establishing a secure marine perimeter includes a floating platform, at least two uprights extending to a predetermined height, at least one anchor, at least one anchor line, an optic fiber net extending from a first predetermined point above the surface of the body of water to a second predetermined point below the surface of the body of water, the optic fiber net including at least one optic fiber with an input end and an output end, a light transmitter connected to the input end introducing an input optic signal into the optic fiber, a light receiver connected to the output end receiving an output optic signal from the optic fiber, and a processor comparing the output optic signal with the input optic signal and generating an alarm if a difference between the input optic signal and the output optic signal exceeds a predetermined alarm threshold.09-22-2011
20110140891Electrode for an Occupant Sensing System Having Fault Detection and Method of Operating the Same - An electrode formed of electrically conductive material and configured for use in an occupant sensing system. The electrode includes an antenna portion and a diagnostic portion. The antenna portion is configured to provide an electrical impedance indicative of an occupant presence. The diagnostic loop portion is configured to provide an electrical conductivity indicative of a condition of the electrode.06-16-2011
20110227732ACCESSORY ACTUATOR - An accessory actuator device includes a housing member with an opening. The housing member comprises a detachable front cover, back cover and mounting plate. The actuator activates when a sensor located in the opening senses movement. The sensor then communicates a signal to an accessory activating unit, which in turn activates an indicator unit to output an audio or visual component in the form of a greeting, song and/or flashing lights.09-22-2011
20090212947INTRUDER DETERRENT SYSTEM - A system and a method for operating an intruder deterrent system by which a smoke screen is generated in response to an intruder being detected, a smoke screen generator operatively linked to the intruder detecting. To achieve an intruder deterrent system that can operate for a longer period after interruption in the power supply, latent heat is stored in a heat storage, and smoke can be generated by transferring the latent heat from the heat storage to a liquid, which liquid is evaporated. The use of the heat storage has led to the unexpected result that the smoke generator can operate independently of power to the heating elements for a very long period.08-27-2009
20090102648Motion detector - The invention discloses a motion detector that includes a casing, a sensor and a signal deflector. The casing has a lens array around an external periphery of the casing and an installation space inside the casing for installing the sensor and the signal deflector. The sensor includes a sensing unit and a signal processing unit electrically connected with each other. The signal deflector is installed between the sensor and the lens array, and the signal deflector includes a plurality of elliptic concave lenses for reflecting lights incident from different directions to the sensing unit by the focusing characteristics of the elliptic concave lenses, so as to broaden the scope of applications.04-23-2009
20090212946System and Method for Detecting an Invalid Camera in Video Surveillance - A system having a camera (08-27-2009
20100265064CONSTANT OPTICAL OUTPUT ILLUMINATION SYSTEM - The present invention is an illuminator for CCTV surveillance and security applications that maintains constant optical output from an array of LEDs by employing output compensation, feedback and enhancement. This constant optical output illuminator system enables reliable long-duration low-light imaging and data capture for surveillance and security applications, via an array of LEDs, LED power supply circuitry, and output feedback and compensation circuitry in which a photodetector circuit provides a voltage signal proportional to an amount of light falling on a photosensor and the voltage signal is fed to a drive control circuit for electrical current to the LEDs to achieve a desired optical output as measured by a photosensor voltage setpoint across the photodetector circuit.10-21-2010
20090243851FSOC/Radio Intrusion Detection System - Certain exemplary embodiments provide a method comprising sensing an intruder within a predetermined vicinity of a Free Space Optical Communication (FSOC) system; and reducing an emitted power of the FSOC system. Certain exemplary embodiments provide a system comprising a Free Space Optical Communication (FSOC) subsystem; a sensor adapted to detect an intruder within a predetermined vicinity of the FSOC subsystem; and a switch adapted to reduce an emitted power of the FSOC subsystem, said switch coupled to said sensor.10-01-2009
20090315712SURVEILLANCE METHOD AND SYSTEM USING OBJECT BASED RULE CHECKING - Surveillance method and system for monitoring a location. One ore more sensors, e.g. camera's, are used to acquire sensor data from the location. The sensor data is processed in order to obtain an extracted object list, including object attributes. A number of virtual objects, such as a virtual fence, are defined, and a rule set is applied. The rule set defines possible responses depending on the list of extracted objects and the virtual objects. Rule sets may be adapted, and amended responses may be assessed immediately.12-24-2009
20100156637Method for detecting an intruder's path - A Sophisticated algorithm for processing sensors data in a four dimensional space including location and time, includes a method for detecting an intruder's path in a location and time space, comprising: a. Measuring signals from a plurality of sensors distributed in a protected location; b. storing the measured sensors data, together with a time stamp for each measurement; c. transmitting the sensors data to a processing center; d. processing the sensors data using the location and time relationships to detect movement of a source of the signals; and e. issuing an alarm if and when a movement of the source is detected. A method for detecting unauthorized access to oil, gas or other pipes, by monitoring the protective cathodic voltage and detecting changes in the voltage which are indicative of a technical failure or a deliberate attack on the pipe.06-24-2010
20100176944LIFT APPARATUS - A lift apparatus configured to move a passenger platform of the lift apparatus between a first position and an elevated second position. A stairway of the example lift apparatus may be used as a stairway when the passenger platform is arranged in the first position. As the passenger platform is raised to the elevated second position, hinged steps of the stairway are transformed into a horizontal surface.07-15-2010
20100259382Interactive Hospitality System - A hospitality system has at least one database for storing guest preferences regarding environment variables, for storing a national and/or regional origin or personal attributes of the guest. According to embodiments, advanced evacuation systems and entertainment systems are provided which fit the guest's preferences and origin.10-14-2010
20100188217Refrigeration Case Motion Detector - Disclosed is a triple-sensor motion detector for illuminating the approach to a display case or other object. The triple-sensor motion detector provides a field of detection that spans the front width of the case, yet does not include the areas along the sides of the case. The detector reduces inadvertent triggering of the illumination by persons approaching the side of the case or approaching another case on the other side of an aisle.07-29-2010
20100182147REMOTE STORAGE OF DATA IN PHASE-CHANGE MEMORY - A security circuit comprising including a sensor located remotely from a central alarm handler and configured to sense an attack, and a phase-change memory cell coupled to and located remotely with the sensor, and configured to store an alarm event when the attack is sensed.07-22-2010
20100245087System and Method for Adjusting a Security Level and Signaling Alarms in Controlled Areas - An access control system responds to both a user's access data and information as to the presence of one or more individuals in a region. A determination can be automatically made that an authorized individual, or an unauthorized individual, or, an intruder has been detected. The security level can be adjusted in response to the class of the individual seeking access.09-30-2010
20090072971PERIMETER SECURITY SYSTEM - A method of operating a perimeter security system comprises monitoring a perimeter for a plurality of events, receiving an event signal for an event of the plurality of events wherein the event signal comprises an acceleration, processing the first event signal to determine if the event is a threat, transferring a confirmation request to confirm that the event is a threat in response to determining that the event is a threat, receiving a confirmation response in response to the confirmation request confirming that the event is a threat, and generating and transmitting a message identifying the event in response to confirming the threat.03-19-2009
20090072972INTELLIGENT OBSERVATION AND IDENTIFICATION DATABASE SYSTEM - An intelligent video/audio observation and identification database system may define a security zone or group of zones. The system may identify vehicles and individuals entering or exiting the zone through image recognition of the vehicle or individual as compared to prerecorded information stored in a database. The system may alert security personnel as to warrants or other information discovered pertaining to the recognized vehicle or individual resulting from a database search. The system may compare images of a suspect vehicle, such as an undercarriage image, to standard vehicle images stored in the database and alert security personnel as to potential vehicle overloading or foreign objects detected, such as potential bombs. The system may track individuals or vehicles within a zone or between zones. The system may further learn the standard times and locations of vehicles or individuals tracked by the system and alert security personnel upon deviation from standard activity.03-19-2009
20090153326Method for locating intruder - Method includes receiving plurality of measured signal strengths, computing estimated intruder signal strength associated with each of plurality of potential intruder locations, and selecting estimated intruder location. Receiving plurality of measured signal strengths includes receiving plurality of measured signal strengths each associated with sensor included in plurality of sensors distributed in monitored area that includes plurality of potential intruder locations. Selecting estimated intruder location includes selecting as estimated intruder location, first potential intruder location associated with estimated intruder signal strength greater than or equal to estimated intruder signal strength associated with another potential intruder location adjacent to first potential intruder location. Computer-readable medium containing code that executes method.06-18-2009
20090115607Tamper detection system - A system and method for detecting radiation from a source in a container is disclosed. A continuous optical fiber path is disposed in a medium which is part of or associated with a container and which encloses the volumetric space of the container. The optical fiber path provides a volumetric mass of optical fiber which is reactive to radiation from a radiation source in the container to cause an irreversible change in the light carrying capacity or other characteristic of the optical fiber. A light source is coupled to one end of the optical fiber path for introducing light having a predetermined characteristic. A light detector is coupled to the other end of the optical path for receiving light from the optical path. A circuit is coupled to the light detector and is operative to detect a total loss of light or a change in the predetermined characteristic of the light and to provide an indication thereof. A continuous wire path can be provided in an alternative embodiment, and which may include e-textiles. In another aspect of the invention, alarm signals from a number of individual detectors can be multiplexed into a gate circuit, such as an OR gate, the output of which provides an alarm signal in response to any one or more of the input signals from the individual detectors.05-07-2009
20080284593Method and system for power management of electronic article surveillance systems - A method, system and apparatus for managing power use in security systems, which include establishing a detection region, triggering a person detection event, the person detection event based on the detection of a person in the detection region, starting a timer upon triggering the person detection event, and transmitting a tag interrogation signal until the expiration of the timer. The method, system and apparatus can further include determining a relative direction of movement of the person.11-20-2008
20110128150SYSTEM AND METHOD FOR ELECTRONIC SURVEILLANCE - A system and method for surveillance of a scene comprising the steps of: capturing a scene via at least two image streams; processing the first of the two image streams to detect an act, event or object; and, wherein when an act, event or object is detected, storing portions of the second image stream corresponding to the act, event or object independently of the first image stream.06-02-2011
20100134285METHOD OF SENSOR DATA FUSION FOR PHYSICAL SECURITY SYSTEMS - A method of sensor data fusion in a physical security system of a monitored area is provided. The method comprises receiving data inputs from one or more sensors in the physical security system, with the monitored area being overlaid with a grid defining a plurality of locations. The method further comprise selecting one or more potential paths of one or more potential intruders through the monitored area using an iterative process, which takes into consideration a sequence of sensor inputs and assumed limitations on the mobility of the one or more potential intruders. A confidence metric is then produced for each selected potential path.06-03-2010
20110115628High-security self-adhesive stickers - The invention comprises two different versions of a self-adhesive label, or “sticker,” that may be manufactured in various dimensions and may be utilized to seal and protect the confidentiality of documents and other papers contained in file folders or other such storage media:05-19-2011
20110074579METHOD FOR USING RECORDING RULES AND PREVIOUS VALUE SELECTION RULES FOR PRESENCE INFORMATION IN A COMMUNICATIONS SYSTEM - In a communications system, a presence server maintains and distributes presence information in accordance with recording rules and previous value selection rules. The presence server: associates a recording rule with each presence information element in a subset of a plurality of presence information elements for a presentity; maintains a set of previous values according to the recording rule associated with the presence information element, for each presence information element in the subset; receives an initial subscribe request from a watcher for one or more presence information elements in the subset; and in response to the initial subscribe request, notifies the watcher of a number of the previous values maintained for each presence information elements in the subscribe request, wherein the number of the previous values that is sent is determined by a previous value selection rule associated with each presence information element.03-31-2011
20110074578FACILITIES MANAGEMENT FOR AN AUTOMATED INTERACTIVE CUSTOMER INTERFACE FOR AN AUTOMOTIVE FACILITY - A system for managing exterior lighting levels and for communicating with intruders and potential customers after hours at an automotive sales and/or service facility. The system has sensors for monitoring the premises for human activity after hours. Lighting levels may be raised and lowered responsively to sensed intrusions. A speaker may warn intruders of consequences, and identify and assist customers who wish to conduct after hours activities at an automated interactive interface device. The interactive interface device may accept manually input data to initiate purchase and service transactions, and may establish live connection to remote security service personnel.03-31-2011
20110084836Alarm System Interaction with a Movable Barrier Operator Method and Apparatus - A secure communication link (04-14-2011
20090212944INTEGRATED MULTI-SPECTRUM INTRUSION THREAT DETECTION DEVICE AND METHOD FOR OPERATION - A security apparatus comprising a plurality of sensing elements, each adapted to detect intrusion into protected premises, each sensing element outputs a sensing signal representing a detected event, a signal processing section for examining each sensing signal and outputting a signature for each sensing signal, a computing section for translating each signature into a normalized threat value, ranging from “0” to “1”, modifying each normalized threat values by multiplying a weighting coefficient corresponding to a type of sensing element, storing for a temporary period of time, each modified normalized threat value, and an alarm generating section for adding each of the stored modified normalized threat values, outputting an aggregate threat value and generating an alarm enable signal based upon an analysis of the aggregate threat value.08-27-2009
20100164719Method and Apparatus for a Cooperative Alarm Network - Devices and methods using wireless or wired network communications to form cooperative alarm networks centered on themselves. Intrusion detection alarms broadcast signals notifying other intrusion detection alarms of its status. When an alarm system experiences a security event, such as an attempted break-in, it notifies its network of its security event and other alarm systems within a cooperative network commence security measures, such as honking horns and flashing headlights. The cooperative response of the networked alarm systems increases decibel level and, in turn, the likelihood of a deterrent intervention, such as the perpetrator being apprehended, as well as increases the deterrence capability of the alarm systems.07-01-2010
20110241881SYSTEMS AND METHODS FOR OPTICAL SECURE ALARMED PROTECTIVE FIBER DISTRIBUTION SYSTEMS AND MANAGEMENT - A fiber optic network has alarmed fiber optic lines in the cables connecting a secured junction box to plural user lock boxes. An outgoing alarm line and return alarm line in each cable connect the junction box to each user box. The outgoing alarm line is looped to the return alarm line inside the user lock box. The return alarm line is looped to the outgoing alarm line of a different cable inside the junction box to interconnect a plurality of alarm lines passing through a plurality of user boxes. A detector detects an alarm signal in the connected alarm lines to trigger an intrusion alarm.10-06-2011
20100039259SYSTEM AND METHOD FOR BOARDING AREA SECURITY - A security method that includes defining rules specifying permitted movements of passengers in a transportation terminal. Passengers entering the terminal may be issued a boarding pass having a Radio Frequency Identification (RFID) tag attached thereto. The location of the RFID tag may be measured and responsive to the measured location of the RFID tag, a violation of at least one of the rules by the passenger may be detected. An action with respect to the detected violation may be taken. The rules may define a region that is forbidden for access, a region in which the passengers are expected to be in motion, a region in which the passengers are expected not to be stationary for more than a given time period, etc.02-18-2010
20100039258INITIATIVE WARNING SYSTEM - An initiative warning system comprises a protective area for accommodating objects and defining an area network, a plurality of sensors respectively installed on the objects, a detecting mainframe connected with the area network, and a terminal communicated with the detecting mainframe through the area network. Wherein, the arrangement of the area network promotes the connection between the detecting main frame and substitutes the conventional wiring allocation, so as to streamline installations of the detecting mainframe and the sensors. Additionally, the sensors can regularly transmit oscillating signals to the detecting mainframe for a further recognition and comparison. Thus, a controlling signal would be timely sent to trigger a warning command showing on the terminal through the area network when the compatible signals between the sensors and the detecting mainframe are not detected by the detecting mainframe, thereby preferably attaining an active warning effect.02-18-2010
20090033489Terminal - A terminal, such as an automated teller machine, comprises: a customer identification device; a sensor for detecting presence of a customer at the terminal; and a controller coupled to the customer identification device and the sensor. The controller is programmed to (i) track the customer's location, (ii) create a session on identification of a customer, and (iii) close the created session when a customer absence criterion is fulfilled. The functions of the customer identification device and the sensor may be performed by a single unit. The customer absence criterion may comprise a time period during which the customer is not detected at the terminal.02-05-2009
20090033490System and Method of Dynamically Weighted Analysis for Intrusion Decision-Making - An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based, anomaly-based, scan-based, and danger theory. The intrusion detection mechanism also allows a limitless number of intrusion analysis approaches to be added on the fly. Using an intrusion detection skin, the mechanism allows various weights to be assigned to specific intrusion analysis approaches. The mechanism may adjust these weights dynamically. The score ration can be tailored to determine if an intrusion occurred and adjusted dynamically. Also, multiple security policies for any type of computing element may be enforced.02-05-2009
20100060451GIFT BAG WITH MOVEMENT SENSOR AND ALARM - A gift bag having an audio message playback device is activate by a motion detector to play an audio message upon detection of movement of the gift bag or in the vicinity of the gift bag. The gift bag includes a plurality of side walls and a bottom to define an interior for receiving a gift. The audio message, played upon the detection of movement of or in the vicinity of the gift bag, may include siren noises, music and/or spoken messages.03-11-2010
20100052904ABNORMALITY DETECTING DEVICE - The abnormality detecting device of this invention comprises a movement detecting unit detecting a presence of a movement of a body based on a video signal in a monitored area, a body detecting unit detecting a predetermined body existence based on the video signal, a brightness level detecting unit detecting a brightness level of the video signal, a determining unit determining whether the detected brightness level is within a predetermined range, a first abnormality detecting unit, in case the brightness level is determined within the predetermined range, detecting the abnormal state occurrence when the movement of the body is detected and the predetermined body is detected, and a second abnormality detecting unit, in case the brightness level is determined to be outside the predetermined range, detecting the abnormal state occurrence when a movement of a body is detected, and detecting the abnormal state occurrence when the predetermined body is detected.03-04-2010
20100052903Voice recorder based position registration - A system and method for monitoring a location having at least one sensor for sensing a change in at least one condition using voice tags to announce alarms. The system includes a registration process where a voice recorder and a digital conversion unit form digital voice tags from recorded speech representing the type and location of sensors. The voice tag is sent as part of an alarm message or pre-stored in a control panel for later retrieval such that the type and location of an alarm is reproduced vocally at the time of the alarm. The registration process may be completed with a registration module which may be a keypad or the voice recorder may be included in the sensors. Additional features include sensor location change notification to ensure the stored voice tag represents the current location of the sensor.03-04-2010
20110148634PREDICTIVE GEOFENCE CROSSING - A predictive geofence system predicts a geofence crossing for a distance-horizon and/or a time-horizon. The predictive geofence system includes a predictive geofence platform that predicts future positions of objects, and generates an alert if the predicted future positions of the objects result in a geofence crossing or the predicted future positions cross a geofence in less than a set time.06-23-2011
20110074580System, Method, and Apparatus for Triggering an Alarm - According to some example embodiments, systems, apparatus, methods and computer program products are provided for triggering an alarm. In this regard, one example apparatus includes means for receiving an instruction to alarm a security gate device, and means for tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm in response to at least receiving the instruction to alarm the security gate device.03-31-2011
20090027195Augmented security system - A system for augmenting security sensor accuracy and reduction of false alarm signals. The system includes the security sensor system along with an external sensor system for measuring the effect of environmental conditions on the security sensors and further includes a sensor data augmentation component to adjust the sensitivity of the security sensors according to measured environmental conditions. Weather sensors and video sensors are two preferred external sensor systems.01-29-2009
20090027196SYSTEM AND METHOD FOR PREMISES MONITORING AND CONTROL USING SELF-LEARNING DETECTION DEVICES - The present invention is directed to systems and methods in which monitors track their respective parameters. Based on the learned activity, the monitors control operational aspects of the premises. The monitors thus learn and remember how the premises is used. When a possible trouble condition is detected, the system compares a detected parameter against parameters expected at that day and time in order to determine the action to be taken. In one embodiment the system learns and remembers the cyclical repetition and frequency of parameters, for example, of someone with a cane or limp, or a small person with a short gait as compared to a tall person with a longer stride.01-29-2009
20110187530Portable Security Container - A process and security container that enable local protection and remote transportation of items found with the environment of a contemporary office, while generating a log of users who have gained access to the container. e container may be constructed with one or more sidewalls bearing a removable lid. The container may have a closed interior while the lid is in complete engagement with the sidewalls, and have an open interior able to removably receive items within the interior while the lid is dislodged from its complete engagement. A port is exposed through one of said sidewalls to receive data signals and a control stage with a non-volatile a memory, is mounted within the container and operationally coupled to a host computer to provide communication with the interior of the container via the port. A microprocessor based host computer sited externally to the container, has a keyboard initiating formation of the data signals and a monitor driven by the host computer to visually display video images. The host computer is operationally coupled to the port to participate in the communication by generating the data signals. The controller may generate a control signal and allow access to the interior of the container in response to occurrence of a coincidence between a data key received From the host computer among the data signals via the port and a data sequence obtained by the control stage in dependence upon information stored within the memory.08-04-2011
20080266086Fluidized bed technology for security enhancement - An improved system and methods for increasing security at sensitive locations from unwanted third parties through the use of fluidized granular solids.10-30-2008
20080252450A Method and a Device for Detecting Intrusion Into or Tampering with Contents of an Enclosure - A method and a device for detecting intrusion into or tampering with contents of an enclosure. According to the method at least one gas proof seal-barrier is provided in association with the enclosure and a first environment is produced within said gas proof seal-barrier. Said first environment is different regarding at least one characteristic feature from a second environment surrounding said gas proof seal-barrier. At least one detector is arranged within said gas proof seal-barrier for detecting a predetermined change of the characteristic feature of the said first environment. Said detector is transferred irrevocably from a first state to a second state when there is a predetermined change of the characteristic feature, and the state of the detector is supplied to a position outside said gas proof seal-barrier.10-16-2008
20120146791Lifestyle Multimedia Security System - A method is disclosed for remote monitoring of a premises, comprising the steps of operatively coupling a geographically remote client to a security system server which is capable of authenticating a user of the remote client, operatively coupling the remote client to a security gateway which is capable of managing the monitoring of the premises, activating a signal at the premises for notifying an occupant at the premises that remote monitoring is occurring, and transferring information between the security gateway and the remote client. The transfer of information between the security gateway and the remote client is controlled by the user of the remote client. The security gateway may be operably coupled to at least one camera at the premises and to at least one audio station at the premises.06-14-2012
20100283608Intrusion Warning and Reporting Network - A system for detection of intrusions and reporting those intrusions, including a plurality of sensors, the plurality of sensors providing a corresponding plurality of detection outputs to a remote controller, the remote controller operative to receive at least one of the plurality of detection outputs and to provide a high speed output indication of intrusion presence.11-11-2010
20100283609PERSONAL SAFETY SYSTEM, METHOD, AND APPARATUS - A personal safety system, method, and apparatus provides image, audio, and data capture and transport system (IADCTS) features wherein an electronic device placed on a user can capture data associated with a potential perpetrator of a crime against the user. The electronic device sends the captured data (such as images or audio) to a secure and remote storage location. The capturing and sending of the data cannot be reversed or canceled by the user or potential perpetrator. The potential perpetrator is notified that the potential perpetrator's data has been captured by the electronic device, thereby discouraging the potential perpetrator from further proceeding with the crime.11-11-2010
20100283607GLASS-BREAK SHOCK SENSOR WITH VALIDATION - An intrusion detector and method for detecting both the breaking of a glass in a window or a door and motion within a protected area. The detector comprises a single sensing section for detecting mechanical impact in a form of an acoustic signal on the window or glass and for detecting motion in a form of a motion induced signal within a protected area, a lens for focusing the motion induced signal, a first filter for filtering out a portion of the motion induced signal which is not in a preset frequency band, a second filter for attenuation a portion of the acoustic signal outside a second preset frequency band, a microprocessor for determining if the detected acoustic signal is consistent with that required to break glass and if the detected motion induced signal is indicative of motion with the protected area, and an alarm generating section for generating an alarm based upon the determination of the microprocessor.11-11-2010
20090212945INTRUSION DETECTION SYSTEMS FOR DETECTING INTRUSION CONDITIONS WITH RESPECT TO ELECTRONIC COMPONENT ENCLOSURES - Intrusion detection systems for detecting intrusion conditions with respect to electronic component enclosures are disclosed herein. An intrusion detection system in accordance with the subject matter disclosed herein may include a conductive component that at least partially surrounds a space. The conductive component may cover at least a portion of an electronic component to be protected. Further, the system may include a first conductive trace positioned to contact the conductive component. A second conductive trace may include a portion positioned in the space at least partially surrounded by the conductive component. The system may also include a detection circuit for determining whether at least one of the first conductive trace and the conductive component are not conductively connected and for determining that the second conductive trace is conductively connected to the first conductive trace. Further, the detection circuit may detect an intrusion condition in response to determining at least one of the first conductive trace and the conductive component are not conductively connected.08-27-2009
20100085187SECURITY SYSTEM INCLUDING GENETIC SAMPLING DEVICE - A security system includes a sensor for sensing a presence of an intruder within a protected space. A genetic sample-gathering mechanism takes a genetic sample from the intruder in response to a signal from the sensor.04-08-2010
20080218338SYSTEM AND METHOD FOR PREMISES MONITORING USING WEIGHT DETECTION - The present invention is directed to systems and methods which monitor weights applied within a protected premises and, based on detected weight pressure patterns, serve to control operational aspects of the premises. In one embodiment, the pressure monitoring system is used in conjunction with a security system to resolve ambiguities in detected breach conditions. In one embodiment the pressure monitoring system learns and remembers how the premises is used. When a possible trouble condition is detected the system compares a detected pressure against known normal, known abnormal, and unexpected pressures to determine the action to be taken at that time.09-11-2008
20110181413AUTOMATED VAULT MAPPING AND SECURITY SYSTEM - A system and method to enhance vault security and management. An identity of a user is electronically validated. A floor plan of the vault and associated location of an authorized resource is retrieved in access computer. The user is then signaled a location of the resource within the vault.07-28-2011
20110181414ACCESS CONTROL SYSTEM BASED UPON BEHAVIORAL PATTERNS - A method and apparatus for detecting behavioral changes in a security system is provided. The method includes the steps of providing a secured area having a plurality of security zones where access to each is controlled by an access controller, detecting entrances to at least some of the plurality of security zones by an authorized person through respective access controllers of the plurality of zones over a predetermined previous time period, forming a probability model of entry into each of the plurality of security zones from the detected entrances over the previous time period, detecting access requests for the authorized user from the access controllers during a current time period, and generating a security alert upon determining that an access request of the current access requests exceeds a probability threshold value associated with the probability model.07-28-2011
20100141442HOME NETWORK, AREA NETWORK USING THE SAME, PROGRAM FOR COMPUTER TO EXECUTE OPERATION IN HOME NETWORK, AND COMPUTER-READABLE RECORDING MEDIUM STORING THE PROGRAM - Slaves are respectively provided corresponding to electric devices, measure, in real time, power usage states and disposed positions of the electric devices to transmit to a master. The master detects operational states of electric devices on operation based on power usage states received from the slaves, and detects a positional relation between electric devices on operation based on disposed positions of the electric devices. Then, the master estimates the number of residents in the house by determining achievability of operational states of electric devices based on the detected operational states and positional relation of electric devices.06-10-2010
20110148633USING TRAJECTORY FOR AUTHENTICATION - An authentication system authenticates a device based on a detected trajectory of that device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior.06-23-2011
20110050418SECURITY SYSTEM - A security system comprising: a controller; and a plurality of dispensing devices, wherein the controller is configured to receive signals from a plurality of remote detectors and transmit signals to the plurality of dispensing devices, the controller being adapted to determine which of the plurality of detectors has transmitted a signal and transmit a signal to a selected one or more dispensing devices to dispense a fluid based on said determination, wherein each dispensing device is configured to receive signals from the controller and dispense fluid when a signal is received.03-03-2011
20100123579VIRTUAL WATCH - Embodiments of the disclosed invention include a system and a method for monitoring a location. For example, the disclosed embodiments may be utilized to monitor a border, such as, but not limited to, the border between the United States and Mexico. In addition, the disclosed embodiments may be utilized to monitor any location including, but not limited to, residential locations, businesses, warehouses, and mass transportation facilities. In one embodiment, a web portal is provided in which the general public may view streaming video and/or still images associated with cameras placed along the monitored location. A user viewing one or more selected cameras is provided with an option to report suspicious activities seen on the one or more selected cameras. The report is sent to one or more local law enforcement agencies associated with the location of the camera.05-20-2010
20120001756SYSTEM, METHOD, AND APPARATUS FOR TRIGGERING AN ALARM - According to some example embodiments, systems, apparatus, methods and computer program products are provided for triggering an alarm. In this regard, one example apparatus includes means for receiving an instruction to alarm a security gate device, and means for tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm in response to at least receiving the instruction to alarm the security gate device.01-05-2012
20110095887CONTAINER SECURITY DEVICES, SYSTEMS, AND METHOD - A dosimeter is disclosed for use in container including outer walls defining an interior volume, the dosimeter including: a radon detection element adapted to detect a radon level for the interior volume; a neutron detection element adapted detect a neutron level for the interior volume. The dosimeter is adapted to measure the radon level and neutron level for a period of time, compare the measured radon level to a first threshold, compare the measured neutron level to a second threshold, and determine information indicative of the presence or absence of fissile material within the interior volume based on the comparisons.04-28-2011
20120013464SECURITY SYSTEM FOR A MEDICAL EMERGENCY CRASH CART - A utility cart includes a sensor or plurality of sensors to determine the state of a cart and secure cart contents. A sensor may be used to determine whether the contents of the cart have been accessed. When the sensor determines that the cart has been accessed, an alarm sequence that sounds an alarm or activates a visual indicator will be initiated. The alarm sequence may be terminated by a kill switch or by using an input device to deactivate the alarm. After the cart is used, the cart is re-stocked and the alarm controller is re-armed to return the cart's alarm system to an access sensing state.01-19-2012
20120013465SYSTEM FOR MONITORING CAREGIVERS AND EQUIPMENT AT A PATIENT LOCATION - A hospital monitoring system for monitoring hospital personnel, a plurality of patient locations for patients, and associated devices is configured to control the associated devices based on the presence of hospital personnel or alarms.01-19-2012
20110090083Systems and methods of searching based on trademarks - A system and method of searching the world wide web for relevant web sites by a user. The system provides a means for indexing relationship information, such as owners of trademarks, in the search engine and retrieval thereof. The user can select particular relationship elements to rank at the top of the web list, and/or the search engine can automatically retrieve one or more categories of relationship information. New classes of META tags are defined in one embodiment for supporting the invention while third party data can be utilized, or in conjunction with META tag information.04-21-2011
20110043362DEVICE FOR ENTRY DETECTION AND RECOGNITION OF TRANSPONDER BADGES, SURVEILLANCE SYSTEM COMPRISING IT, AND PROCESS FOR SURVEILLANCE IMPLEMENTED BY SAID SYSTEM - Device for detection of entry in a protected space (02-24-2011
20090267764"Catch One" system - The system will consist of components/materials that are readily available in the marketplace and will not require any development and subsequent approval of new technologies or materials. The system components (deadbolt mechanisms, pushbutton stations, and central connection/control panel) will be hardwired to ensure that the system's operation will not be hindered or disabled by any external signal source that could unintentionally or deliberately interfere with the operating frequency of a wireless control system. The system will be powered via a 120VAC, 60 Hz circuit provided by a dedicated circuit within a power panel located in the bank's electrical/mechanical room. Details of system operation are provided in the attached System Narrative and sketches labeled FIG. 10-29-2009
20120154150SECURITY SYSTEM - A security system comprises a plurality of alarm points distributed at a plurality of positions in a building; signal processing module for receiving alarm signals from at least an alarm point when alarm occurs at the at least an alarm point, transmitting the alarm signals to a server; a database for storing several sets of user information, map data, several sets of alarm point information; the server for receiving user requests from a plurality of clients, responding to the user requests according to the user information, the data map and the alarm point information, and then reverting responses to clients; the clients for sending the user request to the server and receiving and output responses. The present security system is of the advantage that it could be fully computerized and could satisfy the requirements of usage at the same time at several different sites by a plurality of different users.06-21-2012
20090135010ALARM SYSTEM AUDIO INTERFACE TAMPER AND STATE DETECTION - An alarm system comprises: an audio interface comprising: a microphone; a state sensor for sensing a state at the audio interface; a signal generator for generating an inaudible state signal indicative of the state; a multiplexer for combining an audio signal from the microphone and the state signal; a control panel for monitoring sensed conditions at the audio interface; a conductor interconnecting the audio interface to the control panel carrying audio signal and the state signal as combined from the audio interface to the control panel.05-28-2009
20090135011CONTROL APPARATUS OF SHOWCASE - An object is to provide a control apparatus of a showcase in which appropriate illumination having a high presentation effect can be realized by an LED illumination apparatus having a high durability against turning ON/OFF and capable of securing a predetermined illumination intensity even under an environment at a low temperature. The control apparatus controls a plurality of showcases so that display chambers where commodities are displayed are illuminated with LED illumination apparatuses, and includes a person detecting sensor provided in a showcase disposed in such a position that the approaching of any person can first be detected among the plurality of arranged showcases, so that the approaching of the person is detected. When the person detecting sensor detects the approaching of the person, the illumination intensities of all the LED illumination apparatuses of the plurality of showcases are increased.05-28-2009
20120025983SECURE DATA ENTRY DEVICE - A secure data entry device including a housing, tamper sensitive circuitry located within the housing and tampering alarm indication circuitry arranged to provide an alarm indication in response to attempted access to the tamper sensitive circuitry, the tampering alarm indication circuitry including at least one conductor, a signal generator operative to transmit a signal along the at least one conductor and a signal analyzer operative to receive the signal transmitted along the at least one conductor and to sense tampering with the at least one conductor, the signal analyzer being operative to sense the tampering by sensing changes in at least one of a rise time and a fall time of the signal.02-02-2012
20100033326MULTIPLE SENSOR LIGHTING SYSTEM - A circuit for operating a plurality of electrical devices such as lamps for outdoor illumination includes a plurality of motion sensor circuits for detecting motion relative thereto and a plurality of outputs conditioned upon motion detection. Additionally, a photocell sensor circuit for detecting a low ambient illumination level has an output command conditioned upon the detection of a predetermined illumination level that is electrically coupled to the control circuit for illumination of lamps at low ambient lighting levels. The present invention enables the activation of lamps by a plurality of motion sensors having differing fields of view.02-11-2010
20090237247REMOTE AREA MONITORING SYSTEM - A Remote Area Monitoring System (RAMS) for detecting movement in a disallowed direction through a passageway (P). The RAMS monitors two volumetric spaces that are established by the system, both of which spaces are defined with respect to depth, width, and height. Both a warning zone and an alarm zone are defined for each space. The warning zone protects against inadvertent incursion into the protected spaces; while the alarm zone protects against intentional intrusions thereinto by movement in the disallowed direction. The RAMS automatically monitors both zones and does not require human vigilance to detect and warn of an incursion or intrusion. Human traffic, in both directions through the zones, is monitored; as well as the movement of objects. Movement of humans is detected using a sensor (09-24-2009
20110090084Systems And Methods For Repeating Area Denial - Systems and methods inhibit locomotion of a human or animal target in a denial zone. Acquiring the target includes forming a prediction of at least two locations of impact on the target and testing the prediction according to criteria that may include whether the locations are within a boundary corresponding to the target and whether the locations are separated by a minimum physical and/or electrical distance. The two locations may serve for conducting a current through the target for impeding locomotion by the target. The current may be repeated in response to determining that locomotion was not sufficiently impeded. Determination may depend on analysis of video of the target.04-21-2011
20110102178INTRUSION DETECTION SYSTEM AND ITS SENSORS - An intrusion detection system, that comprises a multi sensors array deployable along a physical barrier means and linkable to it in a manner that enables sensing various phenomena (one or more), typically take place when an attempted intrusion act occurs through the physical barrier means, and generation of an indication when such a phenomenon is sensed, characterized by that, that at least in one of the sensors there is installed a processing component that belongs and is specifically allocated to the sensor and enables local analyzing of the sensed phenomena within said sensor.05-05-2011
20120119907WARNING STANCHION - A warning stanchion that has a vertical support structure, a belt receptacle affixed to the vertical support structure, a tilt sensor, and a warning signal generator in communication with the belt receptacle and the tilt sensor. Typically, a plurality of the warning stanchions are used to created a warning barrier around an object so that the warning signal generates a signal when the warning barrier is breached. The warning signal generator may emit a visual warning, an audio warning, or a frequency signal.05-17-2012
20100289642IDENTIFICATION, STORAGE AND DISPLAY OF LAND DATA ON A WEBSITE - Disclosed is a land website that provides a personalized database on which data can be stored, retrieved, customized and communicated (e.g., by e-mail) relating to a particular piece of property. The database can be accessible via a password and a security code over the Internet and may be encrypted for transmission. Land websites can be established that contain image data, map libraries, virtual tours, legal descriptions, title information, e-documents, actual pictures of property and various other information. Information stored on the land website may be obtained by searching the Internet. The land website provides a unique way of packaging information relating to a piece of land in a single, accessible location. A boundary applet tool is provided on the land website portal that allows a user to simply and easily draw boundaries and/or create boundaries automatically around the property of interest and then submit an order for more detailed information about the property of interest. Properties of interest can be easily accessed by a global coordinate system or by searching on map data that is provided on a wide range of scales. Further, boundaries may be monitored for items changing or moving on the property and/or items entering or leaving the property.11-18-2010
20100289641SYSTEM AND METHOD FOR INTRUDER DETECTION - Systems and methods for detecting presence and movement of intruders. Various embodiments of an intruder detection system can be based on, for example, a beam-interrupt detector or a thermal imaging device. The beam-interrupt detection based system can provide functionalities such as counting of intruders crossing a given beam. A plurality of such beams at different heights can also allow distinguishing different-sized intruders. The thermal imaging based detection system can provide functionalities such as tracking movement of intruders. A recording can be triggered by detection of intruder movement, thereby improving the efficiency of recording and reviewing information indicative of presence and movement of intruders in a monitored area. In one embodiment, non-intruders can be distinguished from intruders by querying an RFID tag carried by non-intruders. In one embodiment, non-intruders can be distinguished from intruders by facial recognition.11-18-2010
20100207762SYSTEM AND METHOD FOR PREDICTING ABNORMAL BEHAVIOR - A system and method for predictive abnormal behavior detection is disclosed. The system receives surveillance data such as video data and can create and update a plurality of prediction models. The system may also receive video data relating to a moving object and may generate a prediction of the future locations of the moving object based on the generated prediction models. The predicted motion may be scored by a scoring engine to determine if the predicted motion is unsafe or otherwise undesirable.08-19-2010
20100207761METHOD AND PROTOCOL FOR REAL TIME SECURITY SYSTEM - A security system comprises one or more sensor devices configured to detect conditions at one or more sites; one or more checkpoints at each of said one or more sites configured to receive signals from the one or more sensor devices; and a central headquarters processor configured to receive signals indicative of the conditions detected at said one or more sites from the one or more checkpoints. The central headquarters processor is configured to process the signals to determine if an event has occurred.08-19-2010
20110181412ENERGY MANAGEMENT AND SECURITY IN MULTI-UNIT FACILITIES - Methods, systems, and devices for managing energy consumption in multi-room facilities are provided. In particular, intelligent mechanisms for determining a room occupancy state and then for managing energy settings of that room are provided. Some logic for implementing these mechanisms may be provided in an in-room device, such as a motion detector, thermostat, door, lock, television, set top box, etc.07-28-2011
20120133511METHOD AND APPARATUS FOR DETECTING CONTROL PANEL ATTACKS IN A SECURITY SYSTEM - A method and apparatus for detecting intruders. The method includes the steps of a control panel of a security system detecting an intrusion of a secured area, the control panel entering a delay period before reporting the intrusion in order to allow entry of a disarm code through a control panel disposed on a structural surface proximate an entrance to the secured area, a sensor monitoring the control panel for movement and the control panel reporting the intrusion before expiration of the delay period upon detecting movement.05-31-2012
20120313782DISTRIBUTED SENSORS FOR INTRUSION DETECTION - An array of paired V-band sensors is provided to act as a virtual fence to detect human intrusion. Each sensor includes a rotating circuit board that includes an antenna array. The sensor pivots the circuit board with regard to a weight base to align with an opposing sensor. By alternatively transmitting and receiving with regard to the opposing sensor, a V-band bistatic radar system is enabled that detects human intrusion between the opposing sensors.12-13-2012
20120299728Occupancy Sensor with Stored Occupancy Schedule - An occupancy sensor detects expected and unexpected occupancies in a monitored area with an expected occupancy schedule. The occupancy sensor includes a real time clock, a memory, a sensor element, a processor, indicator lights and a network interface. The occupancy sensor transmits an occupancy correction signal to a network if the actual occupancy of the monitored area does not match the expected occupancy state of the monitored area.11-29-2012
20100026487SECURITY SYSTEM CONTROL PANEL - A security system is operable in a stay mode in which protected premises perimeter sensors or detectors are armed wherein a delay is provided between detection of breach of the perimeter and generating an alarm. The security system is able to authenticate a user during the delay and to restore the stay mode without generating the alarm and without disarming the protected premises perimeter sensors or detectors.02-04-2010
20120249328Cross Monitoring Method and System Based on Voiceprint Recognition and Location Tracking - The invention discloses a cross monitoring method and system based on voiceprint recognition and location tracking, belonging to the field of monitoring systems. The invention collects personal information and voice samples of a monitored individual and constructs a voiceprint model thereof, and collects location information thereof and voiceprint information through a positioning communication device and/or wireless communication network service, which are compared with the stored information in a repository; output a complete report reflecting the human body movement trace and actual non-compliance with the restrictions for a supervisory staff or other person of authority to inspect and evaluate the performance of the monitored individual. The supervisory staff can request and evaluate the statistical analysis report concerning the activity performance of the monitored individual, observe the movement trace and the state thereof, and/or adjust the monitoring scheme thereof according to the performance. The invention realizes the remote location tracking of the monitored individual, also realizes non-contact biological identity recognition of the monitored individual and satisfies the need of remote and non-contact monitoring of the monitored individual. The invention can be widely applied to the non-contact electronic monitoring and identity recognition field.10-04-2012
20090322527SERVER BASED DISTRIBUTED SECURITY SYSTEM - A security system including one or more sensors for detecting a predetermined security event. One or more communications modules include a transmitting device for communicating with the sensor and transmitting an alert signal of the security event. A remotely located computer system controls the communications between the transmitting device of the communication module for receiving a signal from and transmitting to the communications module. After receiving the alert signal, the computer system communicates an alarm signal.12-31-2009
20120188081SECURITY SYSTEM AND METHOD TO SECURE AN AREA - A security system to secure an area, the system having a sensor system to determine a location of a moving object within said area, the sensor system including a radar system; a control device connected to said sensor system; an illumination device to provide a light beam said light beam being directable to different locations in said area; and an actuator controlled by said control device to direct said light beam to a desired location, wherein said control device is configured to direct the light beam to a location where the presence of a living body is determined by said sensor system.07-26-2012
20110115627See ya alarm system - A stand-alone motion sensing, lighting and alarming system for indoor use includes a box with mounting brackets and face plate, a motion sensor and alarm for receiving motion sensor and audible alarm electronics therein, a light holder pivotally mounted to the unit box, for receiving light therein. The unit box also includes an eight-foot cord and a grounded plug to establish electrical and mechanical connections with a source of 115 V.A.C. electrical power, a double pole single throw toggle switch for powering alarm, a double pole singe throw light switch for powering unit, and adjusters for the photocell and light/alarm duration.05-19-2011
20110121971ILLUMINATED WALL-MOUNTABLE OBJECT CONTROLLED BY PIR SENSOR - An ornamental wall-mounted or freestanding décor object, such as a cross or crucifix, which utilizes LEDs or some other form of lighting technology to illuminate itself in a decorative and aesthetic fashion when a PIR (Passive Infrared) motion sensor detects motion in the vicinity of the object.05-26-2011
20120319843INTRUSION DETECTION SYSTEM AND INTRUSION DETECTION APPARATUS - For one setting operator being able to readily adjust a threshold by oneself, by means of reporting units that issue a report to indicate the amount of variation in a received electric wave when an intruding object has intruded between a transmitting leaking transmission path and a receiving leaking transmission path, and a remote controller that generates a signal which changes a threshold in the table through the receiving leaking transmission path, the threshold is adjusted properly for each of the blocks with the remote controller based on the report issued from the reporting unit to indicate the amount of variation in the received electric wave caused by a trial intrusion between the two transmission paths by a threshold setting operator.12-20-2012
20120326868AUTHORIZATION SYSTEM AND A METHOD OF AUTHORIZATION - An access control system for a secure facility includes an authorization system having an interface, in the form of an interrogator, for receiving the request signal indicative of a user seeking authorization for a predetermined action, such as gaining access through a door. In one example, an authorization system may include an interface for receiving a request signal indicative of a party seeking authorization for a predetermined action. A first processor, that is responsive to the request signal, determines if the authorization is to be granted. If so, the first processor may generate an authorization signal that includes information that is securely coded, and which is indicative of the determination. An operating device, physically spaced from the first processor, may receive the authorization signal, and may decode the securely coded information and subsequently initiating the action, if appropriate.12-27-2012
20120326867System and method for sensing a gate tampering - A system and method for detecting a tampering of a moveable gate barrier. A singular or a plurality of vibration sensors are strategically positioned on the gate and a gate operator to detect tampering while the gate is closed. If the sensor outputs exceed preset thresholds of duration and/or magnitude, an alarm is activated to alert personnel to an attempted breach of the gate barrier.12-27-2012
20120319844PERIMETER SECURITY SYSTEM - A security system for detecting physical intrusion in a monitored area including a plurality of radio units arranged in a network around the monitored area to determine received signal strength and pass variations thereof through the radio units to a base station.12-20-2012
20120126978ALARM SYSTEM HAVING AN INDICATOR LIGHT THAT IS EXTERNAL TO AN ENCLOSED SPACE FOR INDICATING THE SPECIFIC LOCATION OF AN INTRUSION INTO THE ENCLOSED SPACE AND A METHOD FOR INSTALLING THE ALARM SYSTEM - An alarm system for indicating the specific location of an intrusion into an enclosed space, as well as a method for installing the alarm system, are disclosed. The intrusion causes illumination of an indicator light outside the enclosed space and within the outer perimeter zone of the enclosed space, thereby indicating the specific location of the intrusion. At least one interior sensor located within the enclosed space generates a specific intrusion location signal in response to movement therein. A control system responsive to the specific intrusion location signal causes the indicator light to emit light that is visible from outside the outer perimeter zone of the enclosed space. The emitted light can indicate the specific location of an intrusion by directing light towards the specific intrusion location, and/or by surrounding the specific intrusion location, and/or by activating a light display that produces readable output of the specific intrusion location.05-24-2012
20120126977ALARM SYSTEM HAVING AN INDICATOR LIGHT THAT IS EXTERNAL TO AN ENCLOSED SPACE FOR INDICATING AN INTRUSION INTO THE ENCLOSED SPACE AND A METHOD FOR INSTALLING THE ALARM SYSTEM - An alarm system having an indicator light that is external to an enclosed space for indicating intrusion into the enclosed space, and a method for installing the alarm system, are disclosed. The alarm system detects an intrusion into the enclosed space, the intrusion thereby causing an indicator light outside the enclosed space to illuminate, thereby indicating that intrusion has occurred. The enclosed space can be an entire building, or a particular section or room of a building. At least one interior sensor is located within the enclosed space, and is configured to generate an intrusion signal in response to movement therein, while the indicator light is located outside the enclosed space, and within an outer perimeter zone of the enclosed space. Upon receiving the intrusion signal, the indicator light emits light that is visible from outside the outer perimeter zone of the enclosed space.05-24-2012
20120081226BURGLARPROOF SECURITY SYSTEM AND INSTALLING METHOD THEREOF - A burglarproof security system includes a substrate, a conducting wire layer, a sensing control unit, an alarm device and a power supply. The conducting wire layer is disposed on the substrate, and includes plural conducting wires. The plural conducting wires collectively define either a resistive sensing circuit or a capacitive sensing circuit. The sensing control unit is electrically connected with the plural conducting wires of the conducting wire layer for controlling and selectively switching the plural conducting wires to define either the resistive sensing circuit or the capacitive sensing circuit, and detecting the resistive sensing circuit or the capacitive sensing circuit, thereby generating a detecting signal. When the detecting signal from the sensing control unit is received by the alarm device, the alarm device generates a warning signal. The power supply is electrically connected with the sensing control unit and the alarm device for providing electric power.04-05-2012
20100231386SOLAR-POWERED SENSING - A solar cell generates electricity, a housing for the solar cell and/or sensor is configured to suit an environment in which the housing is to be deployed so that a person who is in the environment and in eye contact with the housing is unaware that the housing is associated with a solar cell and/or sensor. A port couples the generated electricity to a device that senses human activity in the vicinity of the apparatus.09-16-2010
20100231387RFID SYSTEM USING CIRCULAR POLARIZED ANTENNA - The present disclosure relates to an RFID (Radio frequency identification) system using circular polarized antennas, wherein a reader emits electromagnetic wave through reader antennas to recognize a tag and to read out customer information if a customer proximity is detected, where the reader antennas are installed at a kiosk body and at a rear proximity position of a floor surface on which a customer using the kiosk stands, and the reader antennas installed at the rear proximity position of the floor surface emits circular polarizing wave toward the kiosk, whereby the tag can be accurately recognized regardless of position of the tag of the customer.09-16-2010
20120092163INTRUDER DETECTION AND INTERDICTION SYSTEM AND METHODS FOR USING THE SAME - Intruder detection and interdiction system and method for using the same. An intruder detection system comprises sensor devices, countermeasure devices, and a control unit connected to the sensor and countermeasure devices. Sensor devices include voice recognition components. The system may detect intruders with the sensor devices, query for identification by a verbal response to be checked by the voice recognition components and activate countermeasure devices if there is no response or if the response is not an authorized voice. In further embodiments, the control unit may be connected to a network or a phone line. Further embodiments comprise a transportable alert device connected to the control unit.04-19-2012
20120092162INFECTIOUS DISEASE WARNING SYSTEM - A system comprising a portable unit which can be temporarily placed outside a patient room comprising a processor, memory, a speaker or voice generator, and programming to allow an authorized user to select (A) a disease or medical condition which corresponds to preprogrammed simulated voice warnings, for example “wash hands,” “wear gown,” “wear gloves,” “wear mask,” “dispose of gown,” “use hand sanitizer,” “wash hands with soap and water after removing protective clothing,” and combinations of said voice warnings; or (B) one or more of said preprogrammed voice warnings; a room entry detector programmed to activate the simulated voice warnings, the system configured so that when entry to the room is detected, one or a combination of the simulated voice warnings is emitted by the system.04-19-2012
20110156904SYSTEM AND METHOD FOR EXTENSION OF ENTRY DELAY IN A SECURITY SYSTEM - A system and method are provided for extending the expiration of an entry delay period for disarming a security system based on the entry of a keypress that matches a valid access code before expiration of a preprogrammed entry delay period. The security system includes a plurality of detection devices to detect any number of conditions, a user interface such as a keypad, and a control panel communicating with each of the detection devices and the user interface. The system extends the entry delay period based on the input of each keypress using the user interface that matches a symbol of a valid access code.06-30-2011
20130021156Electronic Security System for Monitoring Mechanical Keys and Other Items - A security system with a security container and an electronic lock circuit is used to securely store mechanical keys or other valuable items. Items to be protected are placed in a secured location in the security container. A detector of the security system detects whether the items are indeed in the secured location, such as by means of receiving signals from a transponder attached to the items. The security container is locked only if the items are detected to be in the secured location. Audit trail records for the locking and unlocking events of the security container may be transmitted to a device remote to the security container for analysis. A monitoring device with a location identification device, such as a GPS sensor, may be attached to items to be monitored for tracking locations and activities of the items.01-24-2013
20100090829METHOD FOR MONITORING AUTHORIZED AND UNAUTHORIZED PERSONS WITHIN A SECURITY PERIMETER AROUND AN APPARATUS - The invention relates to the automatic detection of the presence of non-authorized persons in the vicinity of an apparatus of the aircraft type. To this end, the invention comprises equipping persons with radio transmitters for identifying them as authorized personnel. The aircraft are also fitted, such as at the existing PODs, with a transceiver device of a radio identification system of the RFID type for recognition of the persons wearing the radio transmitters. Only the persons who are not authorized in the vicinity of the aircraft initiate an alarm procedure.04-15-2010
20080224863Method for Monitoring a Room and an Apparatus For Carrying Out the Method - A method for monitoring a room (R) is specified, in which acoustic properties ({circle around (S)}, W) of the room (R) are determined, changes (δ) in the acoustic properties ({circle around (S)}, W) of the room (R) are detected, the changes (δ) are compared with prescribed criteria (Δ{circle around (S)}, ΔW)and an action (α) is triggered if the prescribed criteria (Δ{circle around (S)}, ΔW) have been satisfied. This makes it possible to monitor a room with the aid of an active noise reduction system. If there is no need to monitor a room, the system can be used for active noise reduction.09-18-2008
20080224862Selectively enabled threat based information system - A method for selectively monitoring a privacy sensitive area includes assigning the privacy sensitive area a privacy threshold value, receiving a threat level, and activating surveillance equipment associated with said privacy sensitive area when said threat level exceeds said privacy threshold value.09-18-2008
20130113624Multi-Tiered Predator Protection Device - A device for protecting property from predators without a physical barrier or obstacle to entry. The device includes a plurality of warning elements and at least one motion sensor. The sensor is configured to initiate a systematic escalating sequence of activation of warning elements responsive to detection of a predator within a predetermined range. A preferred embodiment has a first protection stage including activation of a first warning light element in a flash pattern, and activation of motion sensors. A second protection stage, including bright illumination by a second light element, is initiated by the motion sensors in response to detection of a predator. Motion sensors either initiate a third protection stage, including emission of a sound by a third warning sound element in response to continued detection of the predator or deactivates the second tier warning lights and returns the device to the first protection stage.05-09-2013
20130113625SYSTEM AND METHOD FOR BEYOND PERIMETER DETECTION AND EARLY WARNING - A system for beyond perimeter detection and early warning may comprise multiple sensors positioned in a first field, a number of reflectors positioned in a second field outside a first perimeter defined by the first field, and one or more transceivers. Each transceiver may comprise a transmitter to transmit radio frequency (RF) signals, a first and a second receiver to receive signals from some of a set of the of the multiple sensors and reflected signals from some/all of the reflectors in response to the transmitted RF signals. The transceiver may also include a monitor module to detect a perturbed signal resulting from the received sensor signals and reflected signals, and an alarm module to generate an early warning alarm signal based on the detection of the perturbed signal to indicate that an intruder has crossed a second perimeter defined by the second field.05-09-2013
20130099925Intelligent Observation And Identification Database System - An intelligent video/audio observation and identification database system may define a security zone or group of zones. The system may identify vehicles and individuals entering or exiting the zone through image recognition of the vehicle or individual as compared to prerecorded information stored in a database. The system may alert security personnel as to warrants or other information discovered pertaining to the recognized vehicle or individual resulting from a database search. The system may compare images of a suspect vehicle, such as an undercarriage image, to standard vehicle images stored in the database and alert security personnel as to potential vehicle overloading or foreign objects detected, such as potential bombs. The system may track individuals or vehicles within a zone or between zones. The system may further learn the standard times and locations of vehicles or individuals tracked by the system and alert security personnel upon deviation from standard activity.04-25-2013
20130141239Method of Using Spring GPS Data to Supplement Location Data in a Surveillance System - A building security system includes a security sensor for sensing a security breach associated with a building. An electronic location-detecting device senses fixed geographic coordinates of the building. An electronic processor responds to a security breach sensed by the security sensor by transmitting an alarm signal to a central monitoring station. The alarm signal includes the fixed geographic coordinates of the building sensed by the location-detecting device.06-06-2013
20130141238SYSTEM AND METHOD FOR MONITORING RESTRICTED AREAS BELOW BUCKET TRUCKS, LINEWORKERS ON POWER DISTRIBUTION POLES OR OTHER ELEVATED LOADS - A method and system (06-06-2013
20080198009Security Lighting System and Method, and Control Unit Therefore - The present invention provides a security lighting system and method, that are intended to dispel and/or affect unwanted humans or animals (08-21-2008
20110227733Animal Detection System And Method - A system for detecting an animal proximate a roadway is disclosed. In one embodiment of the invention, there is at least one warning station, a plurality of sensor stations, and a processor. Each of the plurality of sensor stations may have a first sensor and a second sensor. The processor may be configured to detect an animal using information provided by the first sensor and the second sensor, and to cause transmission of a warning signal to the at least one warning station when the animal is detected.09-22-2011
20100295679CONTAINER DEFENSE SYSTEM - A method for scanning and securing a container including a plurality of at least partially composite panels defining an interior volume is disclosed. The method includes: storing unique identification information in an identification element within container; sealing the container; monitoring the container for intrusion; without breaching the seal of the container, remotely identifying the container based on the unique identity information without breaching the seal of the container; without breaching the seal of the container; scanning the identified container to determine the presence or absence of a nuclear weapon in the interior volume; and if the scan determines no nuclear weapon is present remotely storing certificate information associated with the identity of the container in a remote monitor unit.11-25-2010
20100315232FIBER BRAGG GRATING PERIMETER SECURITY SYSTEM - A security system lays out a sensing optical fiber tautly at the perimeter of an area to be secured. The sensing optical fiber has at least one sensing Fiber Bragg Grating (FBG) which is stretched when the sensing optical fiber is stretched by an intruder. The center wavelength of reflection of the stretched sensing FBG shifts towards longer wavelengths. The shifted center wavelength of reflection is detected using a reference FBG with a longer center wavelength of reflection. The sensing optical fiber has a loose buffer coating for isolating the sensing optical fiber and the sensing FBG from nuisance disturbances and noise such as vibrations caused by wind. Trip wires may be attached to the sensing optical fiber for enhancing intruder detection. A cut of the sensing optical fiber may be detected by monitoring the optical power exiting the far end of the sensing optical fiber.12-16-2010
20130187776SECURE DATA ENTRY DEVICE - A secure data entry device including a housing, tamper sensitive circuitry located within the housing and tampering alarm indication circuitry arranged to provide an alarm indication in response to attempted access to the tamper sensitive circuitry, the tampering alarm indication circuitry including at least one conductor, a signal generator operative to transmit a signal along the at least one conductor and a signal analyzer operative to receive the signal transmitted along the at least one conductor and to sense tampering with the at least one conductor, the signal analyzer being operative to sense the tampering by sensing changes in at least one of a rise time and a fall time of the signal.07-25-2013
20110316700DEVICE FOR DETECTING ENTRY AND/OR EXIT MONITORING DEVICE, AND METHOD FOR DETECTING ENTRY AND/OR EXIT - A reliability extracting section (12-29-2011
20080303661COMPACT AND SELF-CONTAINED SECURITY SYSTEM - A system to monitor and detect an intruder within a structure is disclosed. The system comprises a self-contained security insert configured to be mounted to and substantially contained within an electrical junction box. The security insert is capable of being coupled to a primary power source within the structure and operating as a stand-alone security device. The self-contained security insert includes an occupancy sensor configured to detect the intruder, a modem block coupled to the occupancy sensor and configured to transmit one or more intrusion codes to other electrical devices within the structure, a primary lighting control circuit configured to activate an externally mounted lighting device upon detection of the intruder, and a battery backup device contained within the insert and configured to provide power to the insert upon interruption of the primary power source.12-11-2008

Patent applications in class Intrusion detection

Patent applications in all subclasses Intrusion detection