摘要:
Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which the presence of an alarm condition is detected. In addition sensor devices analyze sensor data received from other sensor devices that are in a peer to peer relationship with the corresponding sensor device to validate whether the indicated alarm condition is a valid alarm or a false alarm.
摘要:
Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which the presence of an alarm condition is detected. In addition sensor devices analyze sensor data received from other sensor devices that are in a peer to peer relationship with the corresponding sensor device to validate whether the indicated alarm condition is a valid alarm or a false alarm.
摘要:
Apparatus for applying geographical limitations to control actions of a security system is described. The apparatus receive location data from a user device, determines whether location data has the user device within a predetermined distance range from the security system and cause a message to be sent to the security system to perform the control action specified in the request when the processor determines that the user device is within the predetermined distance range.