Abstract:
An alarm system receiver that is capable of receiving signals transmitted from wireless intrusion detectors at more than one frequency and automatically switching from receiving at one frequency to receiving at a different frequency based on the detection of an interference signal. The alarm system receiver senses a first signal, filters the sensed first signal at a first frequency, demodulates the filtered first signal at the first frequency, and determines if a first interference signal is present in the demodulated first signal for a predetermined time. If the first interference signal is not present in the demodulated first signal, it processes the demodulated first signal as an alarm system signal. If the first interference signal is present in the demodulated signal, the alarm system receiver senses a second signal, filters the sensed second signal at a second frequency, demodulates the filtered second signal at the second frequency, and processes the demodulated second signal as an alarm signal. The alarm system receiver consists of an antenna, more than one filter, more than one local oscillator for providing oscillator signals at the predetermined frequencies, a demodulator for inputting one of the oscillator signals and a corresponding one of the filtered signals to provide a demodulated signal, and an interference detection circuit for inputting the demodulated signal, determining if an interference signal is present in the demodulated signal, and providing an interference detection signal.
Abstract:
A method of managing data communications in a wireless security system. A message is transmitted from a fixed location security device and received by at least two transceivers. Each transceiver analyzes the received message to generate RSSI data. A digital message including the RSSI data is sent from each transceiver via a wired connection to a control panel, which analyzes the RSSI data from each transceiver to determine which transceiver generated the highest RSSI. The control panel then designates data exchange responsibility to the transceiver with the highest RSSI. That transceiver will have responsibility for acknowledging messages from that security device and send data to that security device from the control panel. A transceiver will be allocated to a portable security device if it is the first to receive the wireless message rather than on RSSI data.
Abstract:
A method of attaching a housing (such as a security system device housing) to a wall. A housing is provided with at least one mounting portion that has a mounting hole surrounded by a substantially thin lip. The housing is held by the installer in the exact desired position on the wall. The installer the inserts a wall anchor through the mounting portion and into the wall, typically with a screwdriver. The wall anchor has a cylindrical body with a flanged end and an insertion end, with the body having an exterior thread disposed thereon and the insertion end having a generally flat pointed extension of the body. The flanged end of the anchor has a recess suitable for insertion of the screwdriver. The installer inserts the anchor by pushing the extension through the mounting hole of the mounting portion and into the wall with the screwdriver engaged in the recess such that the extension is substantially within the wall. The installer then turns the wall anchor with the screwdriver tip inserted within the recess such that the exterior thread engages the drywall and draws the wall anchor into the wall until the flanged end overlaps the lip of the mounting portion and presses the lip against the surface of the wall. By making the lip tapered to mate with the taper of the flanged end of the anchor, the head of the anchor may be flush with the surface of the housing, although this is not required.
Abstract:
A method of transmitting data across an electronic data communication system comprising a plurality of terminals that can send and receive data in the form of electromagnetic waves to and from at least one of the terminals, which method comprises the steps of: (a) identifying at least one control terminal, at least one target terminal and at least two relaying terminals from the plurality of terminals; and (b) using the control terminal to instruct the at least two relaying terminals to receive and relay data intended for the at least one target terminal, so that the at least one target terminal can receive data directly from at least one terminal and from the at least two relaying terminals, thereby increasing capacity of the system.
Abstract:
A drone traffic management system comprising a computer comprising memory means for storing origin coordinates indicating an origin location of a drone, destination coordinates indicating a destination of the drone, and traffic management factors located between the origin location of the drone and the destination of the drone; and processing means for controlling the flight of a drone. This is accomplished by calculating a flight path for the drone to fly automatically from the origin location to the destination location without manual intervention, sending the flight path to the drone, receiving location data of the drone as it travels from the origin location to the destination, re-calculating the flight path of the drone as a function of the traffic management factors and the location data of the drone, and sending the re-calculated flight path to the drone.
Abstract:
A wireless beacon message management system and method of operating the system with a mobile device. At least one wireless beacon is strategically located in a premises, such as a building or other geocentrically defined area. Each wireless beacon has means for transmitting a wireless beacon signal, wherein the wireless beacon signal includes a beacon data message that has a beacon identification that identifies the beacon transmitting the signal, and optionally the content being delivered. A mobile device such as a smartphone, tablet or the like receives the wireless beacon signal and analyzes it to extract the beacon identification and optional beacon content. The mobile device may then apply one or more software filters to the beacon data message that enables the mobile device to initiate an action based on the filtered beacon data message.
Abstract:
A two-piece casket containment system is provided that consist of an upper cover and lower base, both of which are made from a pliable, lightweight waterproof material, and both of which may be cinched around the casket through use of a drawstring assembly.
Abstract:
A method of providing rewards to a user by storing, in a portable computing device, user profile data which may be accessed by a merchant terminal. A merchant terminal interacts with the portable computing device by accessing the user profile data from the portable computing device, and providing the user with a reward in accordance with the user profile data accessed by the merchant terminal, wherein the merchant terminal provides a relatively greater reward to the user when relatively more user profile data is accessed by the merchant terminal and a relatively lesser reward to the user when relatively less data is accessed by the merchant terminal.
Abstract:
A system and method for operating a reward points accumulation and redemption program wherein a user earns rewards from a plurality of independent reward issuing entities, with each tracking the user's earned rewards. A trading server accumulates some or all of the user's earned rewards from the reward servers and credits the accumulated points rewards into a single reward exchange account associated with the user. The user may then select an item for purchase with the accumulated rewards. The item is provided to the user in exchange for a subset or all of the rewards. Reward points may also be redeemed in exchange for services, such as the playing of a video game or Internet access.