According to some embodiments, a system is provided. The system includes a computing system that is configured to receive an alarm signal from a premises monitoring system that is configured to monitor a premises, receive alarm event data associated with an alarm event, store the alarm event data associated with the alarm event in at least one data store of the computing system, enforce an access control policy on the alarm event data stored in the at least one data store, the access control policy restricting access to the alarm event data based on time and a plurality of roles of a plurality of users of the computing system, perform at least one analytics operation on the alarm event data associated with the alarm event, and update a value of a current alarm score based on an output of the at least one analytics operation.
According to some embodiments, a system is provided. The system comprises a computing system that is configured to receive an alarm signal from a premises monitoring system that is configured to monitor a premises, receive alarm event data associated with an alarm event, store the alarm event data associated with the alarm event in at least one data store of the computing system, enforce an access control policy on the alarm event data stored in the at least one data store, the access control policy restricting access to the alarm event data based on time and a plurality of roles of a plurality of users of the computing system, perform at least one analytics operation on the alarm event data associated with the alarm event, and update a value of a current alarm score based on an output of the at least one analytics operation.
09 - Scientific and electric apparatus and instruments
Goods & Services
Luminous signs; Electronic signs; Anti-intrusion alarms; Fire alarms; Smoke alarms; Electric control devices for for lighting fixtures; Alarm monitoring systems
7.
CELLULAR AND LOCAL AREA NETWORK (LAN) CONVERTERS FOR PREMISES MONITORING SYSTEMS
A cellular converter in communication with at least one premises device of a premises monitoring system and at least one client device is provided. The cellular converter is configured to route cellular communications between a cellular communication network and the at least one premises device and between the cellular communication network and the at least one client device, monitor first cellular bandwidth utilization by at least one premises device of a premises monitoring system, monitor second cellular bandwidth utilization by at least one client device, and maintain at least a minimum cellular data bandwidth for the at least one premises device based on the monitoring of the first cellular bandwidth utilization and the monitoring of the second cellular bandwidth utilization.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
H04W 4/029 - Location-based management or tracking services
H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
H04W 72/23 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
A system is provided. The system includes a computing environment. The computing environment is configured to receive a recognized person message indicating a recognized person has been detected proximate an access location of the premises, receive a connection message, where the connection message indicating a wireless connection has been established between a premises monitoring system and a mobile device corresponding to the recognized person, and in response to at least receiving the recognized person message and the connection message: cause the premises monitoring system to disarm and cause an electronic door lock securing the access location of the premises to unlock.
G07C 9/00 - Individual registration on entry or exit
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
9.
MULTI-FACTOR AUTHENTICATION FOR PREMISES MONITORING SYSTEMS
A system is provided. The system includes a computing environment. The computing environment is configured to receive a recognized person message indicating a recognized person has been detected proximate an access location of the premises, receive a connection message, where the connection message indicating a wireless connection has been established between a premises monitoring system and a mobile device corresponding to the recognized person, and in response to at least receiving the recognized person message and the connection message: cause the premises monitoring system to disarm and cause an electronic door lock securing the access location of the premises to unlock.
A mobile device is described. The mobile device includes at least one processor and at least one memory. The mobile device, using a first communication protocol of a first communication link, receives from an end device a device specific key (DSK) associated with the end device. The mobile device transmits the DSK to a controller. In addition, using the first communication protocol of the first communication link, the mobile device transmits a trigger message that triggers the end device to transmit a priming message. The priming message triggers the controller to add the end device to a network usable for communication between the controller and the end device using an additional communication protocol that is different from the first communication protocol.
A mobile device is described. The mobile device includes at least one processor and at least one memory. The mobile device, using a first communication protocol of a first communication link, receives from an end device a device specific key (DSK) associated with the end device. The mobile device transmits the DSK to a controller. In addition, using the first communication protocol of the first communication link, the mobile device transmits a trigger message that triggers the end device to transmit a priming message. The priming message triggers the controller to add the end device to a network usable for communication between the controller and the end device using an additional communication protocol that is different from the first communication protocol.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Methods and apparatuses are described herein. In an example embodiment, a leak detector is provided. The leak detector includes a first fitting configured to couple to an outlet of a pipe system and a fluid pressure sensor configured to generate a plurality of fluid pressure measurements corresponding to fluid pressure in the pipe system. The leak detector is configured to generate fluid pressure data based on the plurality of fluid pressure measurements, the fluid pressure data including data representing at least a steady state pressure and a dynamic state pressure; determine, based on at least the fluid pressure data, that a current fluid pressure of the pipe system satisfies at least one leak condition; detect a leak based on the at least one leak condition being satisfied; and cause an alert to be generated based on the leak being detected.
G01M 3/28 - Investigating fluid tightness of structures by using fluid or vacuum by measuring rate of loss or gain of fluid, e.g. by pressure-responsive devices, by flow detectors for pipes, cables, or tubesInvestigating fluid tightness of structures by using fluid or vacuum by measuring rate of loss or gain of fluid, e.g. by pressure-responsive devices, by flow detectors for pipe joints or sealsInvestigating fluid tightness of structures by using fluid or vacuum by measuring rate of loss or gain of fluid, e.g. by pressure-responsive devices, by flow detectors for valves
13.
DETERMINING AREAS OF INTEREST IN VIDEO BASED AT LEAST ON A USER'S INTERACTIONS WITH THE VIDEO
According to one or more embodiments, an interaction device is provided. The interaction device includes processing circuitry configured to render for display a first premises security video comprising a plurality of frames, determine a user interaction with a playback of the first premises security video, determine a plurality of logical weights associated with the plurality of frames based at least on the user interaction, train a machine learning model based at least on the plurality of logical weights, and perform a premises security system action based at least on the trained machine learning model.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
14.
ANALYTICS FOR DETECTION OF FLUID LEAKS BY PREMISES MONITORING SYSTEMS
A system configured to communicate with a plurality of premises monitoring systems. The system includes at least one processor configured to, for each premises monitoring system of a first subset of the premises monitoring systems, receive premises data comprising flood sensor data indicating that a potential water leak, receive user confirmation data confirming that a water leak event occurred at the premises, identify at least one camera associated with the premises monitoring system that captured video of at least a portion of the water leak event, and collect the video captured by the at least one camera. A machine learning (ML) model is trained using the video collected from each premises monitoring system of the first subset of the premises monitoring systems. The ML model is deployed to at least a second subset of the plurality of premises monitoring systems for detecting a water leak.
According to some embodiments, a system is provided. The system comprises a computing system that is configured to receive an alarm signal from a premises monitoring system that is configured to monitor a premises, receive alarm event data associated with an alarm event, store the alarm event data associated with the alarm event in at least one data store of the computing system, enforce an access control policy on the alarm event data stored in the at least one data store, the access control policy restricting access to the alarm event data based on time and a plurality of roles of a plurality of users of the computing system, perform at least one analytics operation on the alarm event data associated with the alarm event, and update a value of a current alarm score based on an output of the at least one analytics operation.
A system is described. The system includes a remote monitoring platform configured to provide computing functionality for alarm monitoring. The remote monitoring platform includes processing circuitry configured to receive, from a backend system configured to provide computing functionality for a rideshare service, a request to initiate a communication session with a user of the rideshare service, obtain a language preference parameter specified for a mobile application for the rideshare service installed in a mobile device of the user, and obtain language capability information for a plurality of agents associated with the remote monitoring platform. The processing circuitry is further configured to assign an agent of the plurality of agents to the communication session based on the language preference parameter and the language capability information, cause the communication session to be established between the agent and the user.
According to some embodiments, a device is provided. The device comprises at least one semiconductor structure, comprising: a base portion and an elongated portion extending from the base portion, the elongated portion comprising a non-conducting material, and a plurality of P-type-N-type (P-N) junction branches positioned at different sections of the elongated portion. Each P-N junction branch comprises a photoactive diode having a photoactive area, and a conductor. Each P-N junction branch has a width, where the widths of the plurality of P-N junction branches decrease with increasing distance from the base portion, and where the semiconductor structure is configured to absorb photons over a range of wavelengths to which each P-N junction branch is photoactive.
H01L 31/068 - SEMICONDUCTOR DEVICES NOT COVERED BY CLASS - Details thereof adapted as photovoltaic [PV] conversion devices characterised by at least one potential-jump barrier or surface barrier the potential barriers being only of the PN homojunction type, e.g. bulk silicon PN homojunction solar cells or thin film polycrystalline silicon PN homojunction solar cells
A control device for a premises security system is provided. The control device includes processing circuitry configured to receive a plurality of video streams associated with the plurality of image capture devices, stitch together at least a portion of the plurality of video streams to generate a three-dimensional (3D) view, determine an alarm event associated with the premises security system, and overlay at least one virtual object onto the 3D view, where the at least one virtual object indicates the alarm event and data associated with the alarm event.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06T 19/00 - Manipulating 3D models or images for computer graphics
19.
GESTURE BASED INTERFACE FOR A PREMISES SECURITY SYSTEM
A control device in a premises security system configured to communicate with a premises device that includes a radar sensor for sensing hand gestures is provided. The control device receives signaling from the premises device indicative of a hand gesture, performs a first correlation of the hand gesture to a predetermined premises security system command, performs a second correlation of a verbal security password, a speaker voice recognition, a presence of the user's phone near the control device, a presence of a registered wearable near the control device, a camera viewing a registered home occupant inside the premises, or biometrics to the predetermined premises security system command, and performs a first action based on the first correlation and second correlation, such as arming or disarming the premises security system.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A system is provided. The system comprises a pull line that is magnetically removably attachable to an elongated body and electrically conductive. The an elongated body comprises an electroluminescent source disposed along the elongated body and configured to emit photons when electrical power is applied between a core conductor and at least one of a first outer conductor and the second outer conductor. The elongated body comprises a first portion comprising at least one electrical power source in electrical communication with the core conductor and the first outer conductor. The second portion comprises a plurality of magnets where a first magnet and the second magnet are removably attachable, by magnetic coupling, to the pull line to activate portions of the electroluminescent source that are proximate the first and the second outer conductors.
H02G 1/08 - Methods or apparatus specially adapted for installing, maintaining, repairing, or dismantling electric cables or lines for laying cables, e.g. laying apparatus on vehicle through tubing or conduit, e.g. rod or draw wire for pushing or pulling
21.
MONITORING FOR POWER AND/OR INTERNET OUTAGES USING DATA ASSOCIATED WITH PREMISES MONITORING SYSTEMS
According to some embodiments, a computing environment is provided and is configured to communicate with a plurality of monitoring control devices, where each of the plurality of monitoring control devices is associated with a respective one of a plurality of premises monitoring systems for monitoring a respective premises. The computing environment is configured to receive a plurality of status reports, correlate each of the plurality of status reports with a respective physical address of a plurality of physical addresses corresponding to the plurality of premises monitoring systems, determine that a power outage and/or internet outage has occurred in a geographical area covering at least a subset of the plurality of addresses based at least on the plurality of status reports received from the monitoring control devices, and initiate at least one action based at least on determining that the power outage and the internet outage has occurred.
An apparatus and method are disclosed. In an embodiment, an audio analysis device is provided. The audio analysis device is configured to receive administrator criteria that specifies an alarm event handling response, obtain an audio file associated with a monitored security environment. detect an audio anomaly in the audio file, and in response to detecting the audio anomaly, generate an audio segment based on the audio anomaly, the audio segment comprising the audio anomaly. The audio analysis device is further configured to generate metadata comprising a characteristic associated with the audio segment, determine that the administrator criteria specifies providing the audio segment and the metadata in an agent portal, and in response to the administrator criteria, encode the audio segment and the metadata for rendering in the agent portal.
A server system is described. The server system includes at least one processor and at least one memory storing a plurality of instructions that, when executed by the at least one processor, causes the at least one processor to receive a plurality of machine learning (ML) models and ML model data from the plurality of mobile computing devices, where the ML model data includes metadata, and the ML model data excludes media. At least one group of the plurality of ML models is selected based on the metadata, each ML model of the at least one group tested, and a plurality of metrics is determined based on the ML models that were tested. Further, a set of ML models of the ML models that were tested is selected, and at least two ML models of the set of ML models are combined based on at least one parameter.
A system is provided. The system includes at least one computing device configured to receive first authentication data based on video of a person captured by a premises device located at a premises, receive second authentication data based on audio of the person speaking a verbal passcode captured by the premises device, and authenticate the person based on the first authentication data and the second authentication data. The at least one computing device is configured to determine that the person is permitted access to the premises according to an access policy, and in response to authenticating the person and determining that the person is permitted access to the premises, cause a lock securing an access point of the premises to unlock.
G07C 9/00 - Individual registration on entry or exit
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/33 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
25.
CHAT ENVIRONMENTS WITH VIRTUAL AGENTS FOR PREMISES MONITORING SYSTEMS
A system comprising at least one computing device is provided. The at least one computing device is configured to monitor a chat environment associated with a plurality of users corresponding to a premises having a premises monitoring system, determine that a chat message in the chat environment invokes a chatbot associated with the premises monitoring system, and in response to determining that the chat message invokes the chatbot, determine that the chat message comprises an access command for the premises monitoring system. The at least one computing device is further configured to store access data based on the access command to facilitate the premises monitoring system implementing the access command.
A system is provided. The system includes at least one computing device. The at least one computing device receives a recognized person message indicating a recognized person associated with a premises is proximate an access location of the premises, where the recognized person message corresponds to a first authentication indication for authenticating the recognized person. The at least one computing device further, in response to receiving the recognized person message, transmits a command to capture an audible passcode from the recognized person. The at least one computing device further receives a passcode message based on the audible passcode, authenticates the recognized person based on the recognized person message and the passcode message, and in response to authenticating the recognized person causes the premises monitoring system to disarm and causes an electronic door lock associated with the premises to unlock.
G07C 9/00 - Individual registration on entry or exit
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
G07C 9/33 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
27.
CHAT ENVIRONMENTS WITH VIRTUAL AGENTS FOR PREMISES MONITORING SYSTEMS
A system comprising at least one computing device is provided. The at least one computing device is configured to monitor a chat environment associated with a plurality of users corresponding to a premises having a premises monitoring system, determine that a chat message in the chat environment invokes a chatbot associated with the premises monitoring system, and in response to determining that the chat message invokes the chatbot, determine that the chat message comprises an access command for the premises monitoring system. The at least one computing device is further configured to store access data based on the access command to facilitate the premises monitoring system implementing the access command.
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
28.
TIME-CONTROLLED ACCESS OF THIRD-PARTY CONTENT ASSOCIATED WITH MONITORING OF PREMISES
According to some embodiments a system is provided. The system comprises a remote monitoring computing system that is configured to receive an alarm signal from a premises monitoring system that is configured to monitor a premises where the alarm signal is associated with an alarm event at the premises, in response to the alarm signal, obtain, from a content storage computing system, metadata corresponding to video provided by a camera at the premises, in response to the metadata, store the video in a data store of the remote monitoring computing system, and enforce an access control policy on the video in the data store where the access control policy restricts access to the video in the data store based on time and a plurality of roles of a plurality of users of the remote monitoring computing system.
A system is provided. The system includes at least one computing device. The at least one computing device receives a recognized person message indicating a recognized person associated with a premises is proximate an access location of the premises, where the recognized person message corresponds to a first authentication indication for authenticating the recognized person. The at least one computing device further, in response to receiving the recognized person message, transmits a command to capture an audible passcode from the recognized person. The at least one computing device further receives a passcode message based on the audible passcode, authenticates the recognized person based on the recognized person message and the passcode message, and in response to authenticating the recognized person causes the premises monitoring system to disarm and causes an electronic door lock associated with the premises to unlock.
A system is provided. The system includes at least one computing device configured to receive first authentication data based on video of a person captured by a premises device located at a premises, receive second authentication data based on audio of the person speaking a verbal passcode captured by the premises device, and authenticate the person based on the first authentication data and the second authentication data. The at least one computing device is configured to determine that the person is permitted access to the premises according to an access policy, and in response to authenticating the person and determining that the person is permitted access to the premises, cause a lock securing an access point of the premises to unlock.
G07C 9/00 - Individual registration on entry or exit
G07C 9/23 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
A method in a premises device is provided, where the premises device is configured with a plurality of analytics models and located in a premises environment. The method includes generating a dataset comprising surveillance data associated with a premises environment in which the premises device operates, determining metadata associated with the dataset, determining, for each analytics model of the plurality of analytics models, a corresponding predicted performance score based at least in part on the metadata, selecting a highest-scoring analytics model of the plurality of analytics models based at least in part on the corresponding predicted performance score, and analyzing the dataset using the highest-scoring analytics model to generate a prediction.
According to some embodiments, a premise device for monitoring in a premises monitoring system is provided. The premises device comprises at least one switching element that is switchable between a first position and second position, an electromechanical switch that is triggerable to a closed position by a magnetic field, an alignment indicator configured to indicate the electromechanical switch is aligned for monitoring, a sensor, and a power element. In response to the at least one switching element being in the first position, the at least one switching element is configured to: electrically connect the alignment indicator and power element to the electromechanical switch, electrically disconnect the sensor from the electromechanical switch; and in response to the electromechanical switch being triggered to the closed position by the magnetic field, the alignment indicator is configured to emit visual, audio and/or haptic feedback based on alignment of the electromechanical switch for monitoring.
A system for testing a sensor and a hub is provided. The system includes a testing control device and a sensor testing device. The testing control device is configured to select a testing profile based at least in part on the sensor, and transmit a testing initiation signal based at least in part on the testing profile. The sensor testing device is configured to perform testing of the sensor and the hub in response to the testing initiation signal, the testing including rotating the sensor along at least one axis based at least in part on the testing profile, and transmit test data to the testing control device based at least in part on the testing of the sensor and the hub. The testing control device is configured to receive the test data from the sensor testing device.
The present invention is a software as a service platform providing a system and method enabling interactive services between the end-users, emergency responders, and central monitoring stations. In one embodiment, the system provides an electronic notification of an alarm event to an end-user by way of a secure hyperlink to a web portal. The web portal provides a method enabling the end-user to interact with the central monitoring station and/or the emergency responders as well as view live and historical data from the alarm event including video. The system is configured to acquire historical video and data from the actual alarm triggering event from a variety of disparate sources including devices associated with life safety systems and lifestyle systems. The present invention, by enabling interactive services between the end-users, emergency responders, and central monitoring stations, provides better information and a better understanding of the alarm triggering event.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
36.
UNMANNED AERIAL VEHICLES (UAV)-ASSISTED IDENTIFICATION OF PERSON IN DURESS
A premises monitoring system is provided. The system includes a control device configured to communicate an unmanned aerial vehicle (UAV). The control device receives, from the UAV, a video depicting a person detected at the premises, the video having a duration, the duration having a pre-configured time period before a detection of the person and a pre-configured time period after the detection of the person. The control device determines, based on the video, a physical orientation of the person. The control device initiates an action based on the physical orientation of the person.
According to some embodiments, a system for managing customer premises equipment is provided. The system comprises a plurality of server groups, where each server group of the plurality of server groups is associated with a respective one of a plurality of hash values. The system comprises a load balancer that is configured to receive first signaling from a customer premises equipment associated with a first customer, the first signaling indicating a first hash value of the plurality of hash values, determine a first server group of the plurality of server groups to service the customer premises equipment based on the first hash value, select a first server of a plurality of servers in the first server group to service the first message, and route the first signaling to the first server to service the first signaling.
According to some embodiments, a premises security system for monitoring a premises is provided and includes at least one computing device configured to receive a notification indicating at least one of a plurality of neighbor premises devices associated with a neighbor premises security system will be shared with the premises security system according to a schedule. The at least one computing device is further configured to: during a non-alarm state of the premises security system, access at least one of a plurality of neighbor premises devices according to the schedule and receive neighbor premises data comprising at least one of: media captured by the at least one of the plurality of neighbor premises devices or a notification associated with the at least one of the plurality of neighbor premises devices; and perform at least one action based on the neighbor premises data.
According to some embodiments, a premises security system for monitoring a premises is provided and includes at least one computing device configured to receive a notification indicating at least one of a plurality of neighbor premises devices associated with a neighbor premises security system will be shared with the premises security system according to a schedule. The at least one computing device is further configured to: during a non-alarm state of the premises security system, access at least one of a plurality of neighbor premises devices according to the schedule and receive neighbor premises data comprising at least one of: media captured by the at least one of the plurality of neighbor premises devices or a notification associated with the at least one of the plurality of neighbor premises devices; and perform at least one action based on the neighbor premises data.
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
40.
Time-controlled access of third-party content associated with monitoring of premises
According to some embodiments a system is provided. The system comprises a remote monitoring computing system that is configured to receive an alarm signal from a premises monitoring system that is configured to monitor a premises where the alarm signal is associated with an alarm event at the premises, in response to the alarm signal, obtain, from a content storage computing system, metadata corresponding to video provided by a camera at the premises, in response to the metadata, store the video in a data store of the remote monitoring computing system, and enforce an access control policy on the video in the data store where the access control policy restricts access to the video in the data store based on time and a plurality of roles of a plurality of users of the remote monitoring computing system.
A cellular conversion apparatus, system and method is disclosed and described. A cellular conversion apparatus comprises circuitry for communicating with a first local cellular device and circuitry for communicating with a second wide-area cellular system, where the first local cellular device and the second wide-area cellular system use different communication protocols.
A system comprising an audio compression device is provided. The audio compression device receives a plurality of pulse code modulated (PCM) samples, performs a quantization of the plurality of the PCM samples, and determines a plurality of time windows for the plurality of quantized PCM samples. The audio compression device further determines a first number of delta bits and a first sample count for a first time window of a plurality of time windows, where the first time window includes a first group of time-domain consecutive samples according to the first sample count. The audio compression device encodes the sample into the first number of delta bits based on a difference from a previous sample to generate a first stream of delta bits, and encodes the first sample count and the first number of delta bits in a corresponding first header for the first time window.
G10L 19/00 - Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocodersCoding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
G10L 19/022 - Blocking, i.e. grouping of samples in timeChoice of analysis windowsOverlap factoring
G10L 19/032 - Quantisation or dequantisation of spectral components
43.
VIDEO AND AUDIO ANALYTICS FOR EVENT-DRIVEN VOICE-DOWN DETERRENTS
A control device in a premises security system for a premises is provided. The control device is configured to receive video surveillance data associated with an area of the premises, identify, using at least one machine learning model, a triggering event based at least in part on the video surveillance data, identify, using the at least one machine learning model, and based at least in part on the video surveillance data, a person associated with the triggering event, identify, using the at least one machine learning model, at least one characteristic of the person associated with the triggering event, generate an audio message comprising content based at least in part on the at least one characteristic of the person associated with the triggering event, and cause playback of the audio message in the area of the premises.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/70 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning
G06V 20/40 - ScenesScene-specific elements in video content
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A method implemented in an audio synthesis device for synthesizing an audio signal is provided. The method includes determining a first plurality of harmonics based on a sinusoidal oscillator, at least two of the first plurality of harmonics being calculated in parallel, scaling the first plurality of harmonics according to a scaling parameter, determining a first sum of the first plurality of scaled harmonics to generate a first sample of the plurality of samples, determining a second plurality of harmonics based on the sinusoidal oscillator, at least two of the second plurality of harmonics being calculated in parallel, scaling the second plurality of harmonics according to the scaling parameter, determining a second sum of the second plurality of scaled harmonics to generate a second sample of the plurality of samples, and causing playback, on the speaker, of at least the first sample and the second sample.
A premises monitoring system is provided. The premises monitoring system includes a control device. The control device receives sensor data from at least one premises device located at the premises determines. The control device, based on the sensor data, a location of an occupant at the premises, an existence of an emergency condition at the premises, and a location of the emergency condition at the premises. The control device determines, based on the location of the emergency condition and the location of the occupant, an egress path, the egress path comprising a plurality of waypoints in a sequence from the location of the occupant to an egress point. The control device, in response to the occupant reaching one of the plurality of waypoints, causes generation of a guidance indication at a subsequent waypoint of the plurality of waypoints in the sequence.
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
G08B 5/36 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission using visible light sources
47.
TRAINING OF MACHINE LEARNING MODELS FOR VIDEO ANALYTICS
A management node is described. A method implemented in a management node is described. The method comprises receiving a video segment and selecting a plurality of subsegments of the video segment based on a selection criteria. The selection criteria comprise rules based on at least one of a selection characteristic, a subsegment characteristic, a video segment characteristic, or a system characteristic. The method further includes training a machine learning (ML) model using the plurality of subsegments selected based on the selection criteria.
A management node is described. A method implemented in a management node configured for training and testing one or more machine learning (ML) models. The method comprises training a first ML model using a plurality of image modalities as training data. The plurality of image modalities comprises a first image modality and a second image modality different from the first image modality. The first image modality has a first image modality parameter and the second image modality has a second image modality parameter. The method further includes modifying one or both of the first image modality parameter and the second image modality parameter, training a second ML model using the plurality of image modalities and the modified one or both of the first image modality parameter and the second image modality parameter, and testing the first ML model and the second ML model based on an accuracy threshold.
A server system is described. The server system includes at least one processor and at least one memory storing a plurality of instructions that, when executed by the at least one processor, causes the at least one processor to receive a plurality of machine learning (ML) models and ML model data from the plurality of mobile computing devices, where the ML model data includes metadata, and the ML model data excludes media. At least one group of the plurality of ML models is selected based on the metadata, each ML model of the at least one group tested, and a plurality of metrics is determined based on the ML models that were tested. Further, a set of ML models of the ML models that were tested is selected, and at least two ML models of the set of ML models are combined based on at least one parameter.
A system configured to communicate with a plurality of premises monitoring systems. The system includes at least one processor configured to, for each premises monitoring system of a first subset of the premises monitoring systems, receive premises data comprising flood sensor data indicating that a potential water leak, receive user confirmation data confirming that a water leak event occurred at the premises, identify at least one camera associated with the premises monitoring system that captured video of at least a portion of the water leak event, and collect the video captured by the at least one camera. A machine learning (ML) model is trained using the video collected from each premises monitoring system of the first subset of the premises monitoring systems. The ML model is deployed to at least a second subset of the plurality of premises monitoring systems for detecting a water leak.
A computing system is described. The computing system is configured to receive, from a portal device of a premises monitoring system, a first request for a list of compatible pipelines for a premises analytics device of the premises monitoring system, identify a plurality of pipelines that are compatible with the premises analytics device based on a parameter, and transmit the list of compatible pipelines to the portal device. The computing system is further configured to receive, from the portal device, a second request to deploy a user selected pipeline of the plurality of pipelines referenced in the list of compatible pipelines, transmit a command, to a third-party system, to obtain a pipeline deployment based on the user selected pipeline, and receive, from the third-party system, the pipeline deployment based on the user selected pipeline. The pipeline deployment is transmitted to the premises analytics device.
Methods and apparatuses are described herein. In an example embodiment, a glass-break detector is provided. Glass-break detector includes a speaker and a microphone in sound communication with the glass and is configured to perform an echo signature procedure to generate a baseline echo signature. The echo signature procedure includes: causing the speaker to transmit an ultrasonic signal onto the surface of the glass, causing the microphone to measure sound wave amplitudes on the surface of the glass, and generating an echo signature based on the sound wave amplitudes. Glass-break detector is configured to repeat the echo signature procedure to generate a test echo signature and detect a break in the glass based at least on the baseline echo signature and the test echo signature.
A system comprising a robot and a robot base station is described. The processor of the robot base station is configured to receive information about a potential water leak and cause transmission of a first command to cause the robot to traverse an area associated with the potential water leak. The processor of the robot is configured to receive the first command from the robot base station, cause the robot to traverse the area associated with the potential water leak, and determine, using at least a sensor, that a liquid corresponding to the potential water leak is present in the area. Further, the processor of the robot is further configured to determine information about the liquid and cause transmission of a first indication to the robot base station, where the first indication indicates that the liquid is present in the area and the information about the liquid.
According to some embodiments, a system is provided. The system comprises a computing system that is configured to receive an alarm signal from a premises monitoring system that is configured to monitor a premises, receive alarm event data associated with an alarm event, store the alarm event data associated with the alarm event in at least one data store of the computing system, enforce an access control policy on the alarm event data stored in the at least one data store, the access control policy restricting access to the alarm event data based on time and a plurality of roles of a plurality of users of the computing system, perform at least one analytics operation on the alarm event data associated with the alarm event, and update a value of a current alarm score based on an output of the at least one analytics operation.
An integrated monitoring panel for an elevator hoistway fire detection system is provided. The system includes a power supply, fault indicators for power and smoke detection, and alarm indicators for smoke and linear heat detection. The panel is configured to receive a terminus of a linear heat detection cable and a terminus of a smoke alarm detection piping. The panel includes a smoke detection test port that may receive simulated smoke and is connected to another terminus of the smoke alarm detection piping. A linear heat detection test switch triggers a test mode and interacts with the linear heat detection cable. During the test mode, the system circulates simulated smoke, analyzes air quality and electrical conditions, and activates corresponding alarm indicators. The performance of these functionalities helps determine whether the system meets operational criteria.
A user device for a premises security system comprising a plurality of premises devices is provided. The user device is configured with a machine learning model for detecting object types. The user device is configured to receive at least one media file from a media file database associated with the user device, identify at least one dominant object in the at least one media file, receive a feedback indication associated with the at least one dominant object, and train the machine learning model based at least in part on the feedback indication and the at least one media file.
A premises device associated with a premises security system includes a three-dimensional (3D) depth sensor and a camera and processing circuitry in communication with the camera and the 3D depth sensor. The processing circuitry in the premises device generates a two-dimensional (2D) template of a face based on an image captured by the camera. The 2D template indicates a facial characteristic associated with the person's face. A 3D mapping of the facial characteristic is generated using data from the 3D depth sensor. At least one of an emotional state or facial gesture is determined based on the 3D mapping. The premises security system performs a security action based on the at least one of the determined emotional state or facial gesture.
A user device for a premises security system comprising a plurality of premises devices is provided. The user device is configured with a machine learning model for detecting object types. The user device is configured to receive at least one media file from a media file database associated with the user device, identify at least one dominant object in the at least one media file, receive a feedback indication associated with the at least one dominant object, and train the machine learning model based at least in part on the feedback indication and the at least one media file.
G08B 29/18 - Prevention or correction of operating errors
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/14 - Central alarm receiver or annunciator arrangements
60.
Multi-function sensor type for premises security systems
According to some embodiments, a premises security system that is configured to monitor a premises is provided. The premises security system includes a multi-function premises device including a multi-axis accelerometer for monitoring the premises according to at least one of a plurality of sensor types where the multi-function premises device is configured to generate device data including accelerometer data associated with the multi-axis accelerometer. The premise security system includes a security control device configured to receive the device data, analyze the device data based on one of the plurality of sensor types, and initiate a premises security system action based on the analysis.
According to one or more embodiments, an assessment device for a premises security system that is configured to monitor a premises is provided. The assessment device includes processing circuitry configured to monitor a metric associated with a mesh network or a power level associated with the premises security system, determine that the metric fails to meet a system health criteria, in response to determining that the metric fails to meet the system health criteria, perform at least one assessment of the premises security system, and determine at least one action to implement to cause the metric to meet the system health criteria where the at least one action is based on the at least one assessment of the premises security system.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
A device is provided. The device includes processing circuitry configured to detect an audio signal associated with an alarm event, generate a spectrogram using a plurality of input samples of the audio signal where the spectrogram includes a plurality of spectral bins, select one of the plurality of spectral bins associated with a predefined frequency range, perform edge detection on the selected one of the plurality of spectral bins, perform pattern detection based on the edge detection, determine the audio signal corresponds to an audio alarm signal based on the pattern detection, and trigger an action in response to determining that the audio signal corresponds to an audio alarm signal.
A user interface device associated with a premises security system that is configured to monitor a premises using a plurality of premises devices is provided. The user interface device includes processing circuitry configured to receive a request to stream video from a premises device of the plurality of premises devices, select one of a plurality of media servers to use to stream the video from the premises device, initiate a streaming channel to the selected media server to initiate the video streaming process with the selected media server, and receive, from the selected media server, the video stream associated with the premises device for playback.
H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
64.
Systems and methods for scanning user interface (ui) screens for accessibility compliance
Test devices, apparatuses, methods, and systems are disclosed. A test device for testing accessibility of a user interface is described. The test device comprises processing circuitry configured to generate a data structure based on a plurality of user interface files. The data structure comprises a plurality of data structure nodes, and each user interface file comprises a plurality of file elements associated with the accessibility of the user interface. Each data structure node of the plurality of data structure nodes corresponds to one or more file elements of the plurality of file elements. An accessibility test of the user interface is performed based on the data structure.
A detector is provided. The detector includes a sensor configured to detect airborne particulates at a premises and processing circuitry. The processing circuitry is configured to determine a characteristic associated with the detected airborne particulates, compare the characteristic associated with the detected airborne particles to data associated with predefined characteristics of burned materials, detect, based at least on the comparison, presence of a fire; and determine, if the presence of the fire is detected, a characteristic of the fire based on the characteristic associated with the detected airborne particles and the comparison.
A management device for a premises security system that is configured to monitor a premises is provided. The management device includes an ultra-wideband (UWB) transceiver configured to provide a coverage area, and processing circuitry. The processing circuitry is in communication with the UWB transceiver and configured to detect a UWB device within the coverage area, determine a distance of the UWB device from the management device based on signaling received from the UWB transceiver, determine a movement vector of the UWB device based on the signaling received from the UWB transceiver, and initiate a premises security system action based on the distance and the movement vector.
A control device in a premises security system is provided. The control device receives a voice command or a touch-based input to initiate an enrollment of a premises device in a premises security system and synthesizes a plurality of audio clips for playback on a speaker. Each audio clip requests respective premises device information. In response to playback of the audio clips, the control device receives a plurality of voice responses, maps each of the plurality of voice responses to a plurality of respective attributes of a premises device, determines a premises device configuration or a premises security system configuration based at least in part on the plurality of respective attributes, and enrolls the premises device in the premises security system based at least in part on the premises device configuration or the premises security system configuration.
An apparatus and method are described. In at least one embodiment, a premises security system includes processing circuitry configured to: detect a change to a quantity of a plurality of premises devices located at the premises where the change includes one of an addition or a removal of a first premises device of the plurality of premises devices, and in response to detecting the change to the quantity of the plurality premises devices, update a configuration including a plurality of zone numbers assigned to the plurality of premises devices by at least making at least one modification to at least one of the plurality of zone numbers.
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
G06K 7/14 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
A premises device associated with a premises security system includes a three-dimensional (3D) depth sensor and a camera and processing circuitry in communication with the camera and the 3D depth sensor. The processing circuitry in the premises device generates a two-dimensional (2D) template of a face based on an image captured by the camera. The 2D template indicates a facial characteristic associated with the person's face. A 3D mapping of the facial characteristic is generated using data from the 3D depth sensor. At least one of an emotional state or facial gesture is determined based on the 3D mapping. The premises security system performs a security action based on the at least one of the determined emotional state or facial gesture.
A management device for a premises security system that is configured to monitor a premises is provided. The management device includes an ultra-wideband (UWB) transceiver configured to provide a coverage area, and processing circuitry. The processing circuitry is in communication with the UWB transceiver and configured to detect a UWB device within the coverage area, determine a distance of the UWB device from the management device based on signaling received from the UWB transceiver, determine a movement vector of the UWB device based on the signaling received from the UWB transceiver, and initiate a premises security system action based on the distance and the movement vector.
A method implemented by a security control device of a premises security system that is configured to monitor a premises includes communicating, via the premises security system, with a component of a vehicle and controlling an ability of the vehicle to be driven. The ability of the vehicle to be driven may be based on a state of the premises security system. Sensor information received from a premises device of the security system that indicates the presence of an occupant within the premises may be used to control the ability of the vehicle to be driven. In addition, the premises security system may communicate with the vehicle's key fob and control the ability of the vehicle to be driven using the key fob and its detected location. The ability of the vehicle to be driven can also be managed in accordance with a predefined time schedule.
B60R 25/24 - Means to switch the anti-theft system on or off using electronic identifiers containing a code not memorised by the user
B60R 25/04 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
B60R 25/31 - Detection related to theft or to other events relevant to anti-theft systems of human presence inside or outside the vehicle
72.
DUAL AUTHENTICATION METHOD FOR CONTROLLING A PREMISES SECURITY SYSTEM
A control device in a premises security system for authorizing a user, configured to receive a video of the user, the video being recorded during an authorization process, perform facial recognition on the video to identify the user, determine at least one facial expression of the user captured on the video, receive a fingerprint scan associated with a first finger of the user, authenticate the user based at least in part on the facial recognition, the at least one facial expression, and the fingerprint scan, and perform at least one premises security action based at least in part on the authentication.
A system is provided. The system includes a premises sensor configured to detect a premises condition, a premises security control device configured to obtain data from the premises sensor representing the premises condition, the premises security control device is further configured to communicate with a remote monitoring center, a user interface device is configured to communicate with the premises monitoring control device. The user interface device includes a plastic housing, a liquid crystal display (LCD) removably secured to the plastic housing, a fingerprint sensor mounted in a fixed position relative to the plastic housing and the LCD, and processing circuitry configured to: receive fingerprint data from the fingerprint sensor, determine that the fingerprint data meets an authentication criterion, and in response to determining that the fingerprint data meets the authentication criterion, trigger a premises security system action.
In some embodiments, an authentication device is provided. The authentication device configured to determine that the wearable device is authorized to participate in the premises security system, cause transmission of a first security token that is usable to validate that the wearable device is authorized to participate in the premises security system, in response to the status update, request the first security token from the wearable device, validate that the wearable device is authorized to participate in the premises security system based at least in part on the first security token received from the wearable device and in response to validating that the wearable device is authorized to participate in the premises security system, cause transmission of a second security token to the wearable device where the second security token is usable to trigger a premises security system action.
G07C 9/22 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
G07C 9/00 - Individual registration on entry or exit
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
According to some embodiments, a control device for a premises security system that is configured to monitor a premises using a plurality of premises devices is provided. The control device is configured to obtain a plurality of acoustic samples for the premises, detect a sound anomaly in at least one of the plurality of acoustic samples, obtain a verification that the sound anomaly is expected, generate an acoustic model for the premises based at least on the plurality of acoustic samples and the verification that the sound anomaly is expected, receive data representing a detected sound during monitoring of the premises, compare the detected sound with the acoustic model for the premises to determine that the detected sound is unexpected, and initiate a premises security system alert based at least on the detected sound being unexpected.
Conversion node apparatuses, methods, and systems are disclosed. According to various embodiments, a conversion node is configured to communicate with a premises security system. The premises security system includes a subscriber identity module (SIM) associated with a first subscriber profile. The conversion node includes an embedded subscriber identity module (eSIM) associated with a second subscriber profile. The method includes provisioning a first communication link with the premises security system, receiving the first subscriber profile via the first communication link, modifying the second subscriber profile associated with in the eSIM based at least on the received first subscriber profile, provisioning a second communication link with a cellular network based on the modified second subscriber profile, and communicating, via the provisioned second communication link, data associated with the premises security system to the cellular network.
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Downloadable software for managing user permissions for security alarm and home automation systems; downloadable software for granting individuals access to dwellings via security alarm and home automation systems; downloadable software for granting individuals access to security alarm and home automation systems; downloadable software for monitoring activity at dwellings via security alarm and home automation systems; downloadable software for accessing video of authenticated individuals who have been granted access to dwellings via security alarm and home automation systems. (1) Telecommunication services, namely, providing the ability to manage user permissions for security alarm and home automation systems via the internet; telecommunication services, namely, providing the ability to grant individuals access to dwellings via the internet; telecommunication services, namely, providing the ability to grant individuals access to security alarm and home automation systems via the internet; telecommunication services, namely, providing the ability to monitor activity at dwellings through security alarm and home automation systems via the internet; telecommunication services, namely, providing video of authenticated individuals who have been granted access to dwellings via security alarm and home automation systems; telecommunication services, namely, providing electronic message alerts via the internet notifying individuals of security alarm and home automation system activity at a dwelling.
(2) Providing temporary use of online non-downloadable computer software for managing user permissions for security alarm and home automation systems; providing information concerning user permissions for security alarm and home automation systems.
(3) Alarm response and verification services; remotely controlling physical access to dwellings; authenticating individuals for the purpose of granting physical access to dwellings.
78.
Premises security system with wireless energy harvesting
A method, system and device(s) are disclosed. According to some embodiments, a premises security system is provided. The premises security system includes a premises device including a sensor for detecting a premises security event, an energy storage element in electrical communication with the sensor, a radio frequency (RF) antenna configured to receive RF energy from an RF source, and energy harvesting circuitry in electrical communication with the RF antenna and the energy storage element, and processing circuitry configured to cause transmission of sensor data indicating the premises security event to a security control device, and where the security control device is configured to receive the sensor data, and perform an action based at least on the sensor data.
A cryptocurrency management device configurable to communicate with a security system base station is described. The cryptocurrency management device comprises processing circuitry configured to receive a personal identification number (PIN) from the security system base station; provide access to a cryptocurrency wallet based on the PIN; and perform a cryptocurrency transaction associated with the cryptocurrency wallet subsequent to providing access to the cryptocurrency wallet.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A computing system is described. The computing system is configured to receive, from a portal device of a premises monitoring system, a first request for a list of compatible pipelines for a premises analytics device of the premises monitoring system, identify a plurality of pipelines that are compatible with the premises analytics device based on a parameter, and transmit the list of compatible pipelines to the portal device. The computing system is further configured to receive, from the portal device, a second request to deploy a user selected pipeline of the plurality of pipelines referenced in the list of compatible pipelines, transmit a command, to a third-party system, to obtain a pipeline deployment based on the user selected pipeline, and receive, from the third-party system, the pipeline deployment based on the user selected pipeline. The pipeline deployment is transmitted to the premises analytics device.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Downloadable software for enabling users to managing user permissions for security alarm and home automation systems; downloadable software for granting individuals access to their dwellings via their security alarm and home automation systems; downloadable software for granting individuals access to security alarm and home automation systems; downloadable software for enabling users to monitoring activity of individuals granted access to at their dwellings via their security alarm and home automation systems; downloadable software for enabling users to accessing video of authenticated individuals who have been granted access to their dwellings via their security alarm and home automation systems.system Providing temporary use of online non-downloadable computer software for individuals who have been granted access to a managing user permissions for via an security alarm and home automation systems; providing user authentication information concerning user permissions for security alarm and home automation systems; providing user authentication services using biometric hardware and software technology for granting individuals secure entry and exit door access to dwellings Alarm response and verification services; security services for buildings, namely, remotely controlling physical access to dwellings; for authenticateding individuals for the purpose of granting physical access to dwellings
82.
Modular wireless transmitters for premises monitoring systems
An apparatus and method are described. In at least one embodiment, a premises monitoring system for monitoring a premises is provided. The premises monitoring system comprises a premises device and a power device comprising a rectifier in electrical communication with the premises device. The premises device comprises a video capture element configured to capture video and processing circuitry configured to, in response to a modular wireless transmitter not being removably connected to the premises device, cause transmission of the captured video to the power device via the at least one wired connection. When the modular wireless transmitter is removably connected to the power device, the power device is configured to cause, in response to receiving the captured video, transmission of the captured video via the modular wireless transmitter.
A method implemented by a security sensor device is provided. The security sensor device receives a user input, performs a biometric authentication of a user associated with the user input, modifies a state of the security sensor device based at least in part on the biometric authentication and the user input, detects a sensor trigger when the security sensor device is in the modified state, determines a sensor indication based at least in part on the sensor trigger, the state of the security sensor device subsequent to being modified, and the user input, and transmits the sensor indication to a premises security control device. The sensor indication is configured to cause the premises security control device to perform at least one premises security action.
A system for testing a sensor and a hub is provided. The system includes a testing control device and a sensor testing device. The testing control device is configured to select a testing profile based at least in part on the sensor, and transmit a testing initiation signal based at least in part on the testing profile. The sensor testing device is configured to perform testing of the sensor and the hub in response to the testing initiation signal, the testing including rotating the sensor along at least one axis based at least in part on the testing profile, and transmit test data to the testing control device based at least in part on the testing of the sensor and the hub. The testing control device is configured to receive the test data from the sensor testing device.
A server system is described. The server system includes at least one processor and at least one memory storing a plurality of instructions that, when executed by the at least one processor, causes the at least one processor to receive a plurality of machine learning (ML) models and ML model data from the plurality of mobile computing devices, where the ML model data includes metadata, and the ML model data excludes media. At least one group of the plurality of ML models is selected based on the metadata, each ML model of the at least one group tested, and a plurality of metrics is determined based on the ML models that were tested. Further, a set of ML models of the ML models that were tested is selected, and at least two ML models of the set of ML models are combined based on at least one parameter.
According to one or more embodiments, a playback device is provided. The device includes processing circuitry configured to receive a video stream including a plurality of video packets, where each of the plurality of video packets is associated with a respective video timestamp value. The playback device is further configured to store at least one of the plurality of video packets in a jitter buffer, and to adjust each of the respective video timestamp values by a respective delay value, where each of the respective delay values is either a dynamic delay value based on a first condition being satisfied or a fixed delay value based on a second condition being satisfied. The playback device is further configured to play the video stream according to the adjusted video timestamp values for reduced initial delay at the jitter buffer.
H04N 21/8547 - Content authoring involving timestamps for synchronizing content
H04N 21/233 - Processing of audio elementary streams
H04N 21/238 - Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidthProcessing of multiplex streams
H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
87.
On-premises communication bridges for premises security systems
A method implemented by an on-site secondary control device in communication with an on-site primary control device for a premises security system is provided. The on-site primary control device is configured to trigger an alarm event signal associated with the premises security system, and the on-site secondary control device is physically separated from the on-site primary control device. An alarm event signal is received at the on-site secondary control device from the on-site primary control device indicating that a premises device has been triggered. The alarm event signal is temporarily stored. In response to determining that a criterion associated with the premises system is met, the alarm event signal is transmitted by the on-site secondary control device to the remote monitoring center.
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
A system comprising an audio compression device is provided. The audio compression device receives a plurality of pulse code modulated (PCM) samples, performs a quantization of the plurality of the PCM samples, and determines a plurality of time windows for the plurality of quantized PCM samples. The audio compression device further determines a first number of delta bits and a first sample count for a first time window of a plurality of time windows, where the first time window includes a first group of time-domain consecutive samples according to the first sample count. The audio compression device encodes the sample into the first number of delta bits based on a difference from a previous sample to generate a first stream of delta bits, and encodes the first sample count and the first number of delta bits in a corresponding first header for the first time window.
G10L 19/00 - Speech or audio signal analysis-synthesis techniques for redundancy reduction, e.g. in vocodersCoding or decoding of speech or audio signals, using source filter models or psychoacoustic analysis
G10L 19/022 - Blocking, i.e. grouping of samples in timeChoice of analysis windowsOverlap factoring
G10L 19/032 - Quantisation or dequantisation of spectral components
89.
Systems and methods for data flow between mobile applications and customer premises equipment, using a consistent server hash
According to some embodiments, a system for managing customer premises equipment is provided. The system comprises a plurality of server groups, where each server group of the plurality of server groups is associated with a respective one of a plurality of hash values. The system comprises a load balancer that is configured to receive first signaling from a customer premises equipment associated with a first customer, the first signaling indicating a first hash value of the plurality of hash values, determine a first server group of the plurality of server groups to service the customer premises equipment based on the first hash value, select a first server of a plurality of servers in the first server group to service the first message, and route the first signaling to the first server to service the first signaling.
According to some embodiments a system is provided. The system comprises a remote monitoring computing system that is configured to receive an alarm signal from a premises monitoring system that is configured to monitor a premises where the alarm signal is associated with an alarm event at the premises, in response to the alarm signal, obtain, from a content storage computing system, metadata corresponding to video provided by a camera at the premises, in response to the metadata, store the video in a data store of the remote monitoring computing system, and enforce an access control policy on the video in the data store where the access control policy restricts access to the video in the data store based on time and a plurality of roles of a plurality of users of the remote monitoring computing system.
A management device for a premises security system that is configured to monitor a premises is provided. The management device includes an ultra-wideband (UWB) transceiver configured to provide a coverage area, and processing circuitry. The processing circuitry is in communication with the UWB transceiver and configured to detect a UWB device within the coverage area, determine a distance of the UWB device from the management device based on signaling received from the UWB transceiver, determine a movement vector of the UWB device based on the signaling received from the UWB transceiver, and initiate a premises security system action based on the distance and the movement vector.
According to one or more embodiments, an interaction device is provided. The interaction device includes processing circuitry configured to render for display a first premises security video comprising a plurality of frames, determine a user interaction with a playback of the first premises security video, determine a plurality of logical weights associated with the plurality of frames based at least on the user interaction, train a machine learning model based at least on the plurality of logical weights, and perform a premises security system action based at least on the trained machine learning model.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
93.
Video rights management for an in-cabin monitoring system
Roles and rights management systems are provided. The systems are configured for receiving an in-vehicle video recording of a rideshare vehicle, where the in-vehicle video recording includes a video recording segment associated with a plurality of rideshare users, determining that the plurality of rideshare users are permitted to vote on an action associated with the video recording segment, receiving, from at least one of the plurality of rideshare users, at least one vote associated with the video recording segment, and initiating the action in response to the at least one vote.
A primary lock device is provided which is configured to wirelessly communicate with a premises security system hub device and at least one secondary lock device in a premises security system. The primary lock device receives a lock configuration, receives a user input, authenticates the user input, and engages or disengages a locking mechanism based at least in part on the lock configuration and a result of authenticating the user input. The primary lock device determines a lock indication based at least in part on the lock configuration and a result of authenticating the user input, and transmits the lock indication to at least one secondary lock device for engaging or disengaging at least one respective lock mechanism of the at least one secondary lock device.
G07C 9/00 - Individual registration on entry or exit
G07C 9/38 - Individual registration on entry or exit not involving the use of a pass with central registration
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
A device for verification of a user, the device being in communication with a security base station of a premises security system. The device comprises processing circuitry, which is configured to receive, from the security base station, security system data associated with user activity at a premises monitored by the premises security system; generate at least one verification question associated with the user activity; and based on a user response to the at least one verification question, one of grant and deny access to the user to a user account.
According to some embodiments, a premise device for monitoring in a premises monitoring system is provided. The premises device comprises at least one switching element that is switchable between a first position and second position, an electromechanical switch that is triggerable to a closed position by a magnetic field, an alignment indicator configured to indicate the electromechanical switch is aligned for monitoring, a sensor, and a power element. In response to the at least one switching element being in the first position, the at least one switching element is configured to: electrically connect the alignment indicator and power element to the electromechanical switch, electrically disconnect the sensor from the electromechanical switch; and in response to the electromechanical switch being triggered to the closed position by the magnetic field, the alignment indicator is configured to emit visual, audio and/or haptic feedback based on alignment of the electromechanical switch for monitoring.
An apparatus and method are described. In at least one embodiment, a premises monitoring system for monitoring a premises is provided. The premises monitoring system comprises a premises device and a power device comprising a rectifier in electrical communication with the premises device. The premises device comprises a video capture element configured to capture video and processing circuitry configured to, in response to a modular wireless transmitter not being removably connected to the premises device, cause transmission of the captured video to the power device via the at least one wired connection. When the modular wireless transmitter is removably connected to the power device, the power device is configured to cause, in response to receiving the captured video, transmission of the captured video via the modular wireless transmitter.
A premises control unit in communication with at least one battery operated sensor of a premises security system is provided. The premises control unit includes processing circuitry configured to configure at least one parameter for the at least one battery operated sensor where the configuration of the at least one parameter is based at least on data collected by the premises security system, and the at least one parameter includes at least sleep cycles for the at least one battery operated sensor.
A method, node, wireless device and installation device are disclosed. In one or more embodiments, a node configured to operate a security virtual local area network (VLAN) and a customer VLAN independent from the security VLAN is provided. The security VLAN is configured to operate using a first network partition different from a second network partition used by the customer VLAN. The node includes processing circuitry configured to receive information from a first device requesting access to the node, determine whether to add a first device to the security VLAN based at least on the received information from the first device meeting a predefined criterion, and configure the first device to access one of the security VLAN and customer VLAN based at least on the determination.