Abstract:
A communications network available to implement at least M2M communications between a transmitting and a receiving unit. The units can communicate via the Internet, as a primary network. They can also communicate via a cellular-type network. At least some of the units include respective subscriber information to provide access and services via the network. Groups of units can share a common data plan with other related units. Subscriber information can be included in respective SIM cards. At least one of the SIM cards can provide voice and/or data service via the common data plan.
Abstract:
A regional monitoring system includes speech recognition circuitry having smart filtering capability to interpret speech input from a user to provide interactions between the user and the system. Received voice commands can be filtered using key words to interpret security commands which can then be executed. The system can provide audible feedback using one or more of prerecorded voice data files or synthesized speech.
Abstract:
A regional monitoring system can establish and store patterns of signals from sensors, or patterns of signals coupled to actuators. Incoming patterns can be compared to pre-stored patterns, and in the presence of disparities therebetween, a message can be sent wirelessly to a displaced individual associated with the region indicative of the disparity. The individual can override a pre-established action associated with one of the pre-stored patterns. Monitoring systems can include security monitoring systems, fire safety monitoring systems or HVAC-type systems.
Abstract:
An apparatus and method are provided that include biometric identification intrusion and access control. The apparatus features a monitoring system, a visual input device, and an audible input device. The visual and audible input devices are coupled to control circuits of the monitoring system, which can implement an authentication process responsive to both visual and audile inputs.
Abstract:
Systems and methods of using secondary measurements to make a system-based determination are provided. Some methods can include a transceiver device receiving a first signal from at least one system-based device, the transceiver device receiving a second signal from at least one non-system device, and control circuits coupled to the transceiver device making a system-based determination responsive to both the first signal and the second signal.
Abstract:
A network based product enables browser based computers, smart phones or tablets to connect to and access the product. A local router can be automatically configured by the product. The product can be automatically registered with a DDNS server and a user account opened. Authentication can be carried out between the product and the server.
Abstract:
An authentication and authorization apparatus combines a unique identifier for a communications device with pre-stored voice recognition information. Incoming audio, associated with the unique identifier is processed using the pre-stored vice recognition information to authenticate the speaker. In response to successful authentication, a requested function or action embedded in the audio can be recognized and, if authorized, implemented.
Abstract:
An authentication and authorization apparatus combines a unique identifier for a communications device with pre-stored voice recognition information. Incoming audio, associated with the unique identifier is processed using the pre-stored vice recognition information to authenticate the speaker. In response to successful authentication, a requested function or action embedded in the audio can be recognized and, if authorized, implemented.
Abstract:
A network based product enables browser based computers, smart phones or tablets to connect to and access the product. A local router can be automatically configured by the product. The product can be automatically registered with a DDNS server and a user account opened. Authentication can be carried out between the product and the server.
Abstract:
A regional monitoring system can establish and store patterns of signals from sensors or patterns of signals coupled to actuators. Incoming patterns can be compared to pre-stored patterns, and in the presence of a disparity therebetween, a message can be sent wirelessly to a displaced individual associated with the region indicative of the disparity. The individual can override a pre-established action associated with one of the pre-stored patterns. Monitoring systems can include security monitoring systems, fire safety monitoring systems or HVAC-type systems.