Abstract:
A security system including a wireless alarm sensor that detects a threat within a secured geographic area, a cloud application that monitors the alarm sensor and reports threats detected by the alarm sensor within the secured area to a human user of the secured area and a wireless publically accessible communication system defined by a plurality of relatively low power communication devices and a local base station, the alarm sensor detects a nearby one of the plurality of low power communication devices and wirelessly connects to the cloud application through the nearby one low power communication device and local base station.
Abstract:
A door access control system associates a unique passive identifier with each one of a plurality of doors for which controlled access is desired. Each of the identifiers can be attached to a location adjacent to each respective door. A smart phone with a predetermined scanning application can scan or read a respective identifier of a door for which access is desired. A representation of the door identifier along with an identifier of the smart phone can be transmitted to an access control unit. A data base of the access control unit can be interrogated to determine if that smart phone identifier is authorized to open the designated door. If authorized, then an access command can be transmitted to a local access control module that can release a locking mechanism for the respective door.
Abstract:
Systems and methods of augmented reality alarm system installation are provided. Methods can include capturing an image of a first piece of information displayed on a first user interface, identifying and retrieving a second piece of information associated with the first piece of information, and displaying the second piece of information on a second user interface.
Abstract:
A monitoring, control and guidance system can be equipped with portable, hands-free interfaces. Personnel in a region being monitored can wear or carry such interfaces so as to be able to interact with monitoring system control elements scattered throughout the region. A user can be guided from point-to-point in the region as needed. Alternately, the user can request a map of some or all of the region as well as conditions therein. That map can then be presented on the user's interface unit.
Abstract:
Systems and methods for increasing robustness of a system with a remote server are provided. Some methods can include a first system remotely controlling a second system, detecting a failure in the first system or in a communication link between the first system and the second system, and temporarily removing control of the second system from the first system.
Abstract:
A door access control system associates a unique passive identifier with each one of a plurality of doors for which controlled access is desired. Each of the identifiers can be attached to a location adjacent to each respective door. A smartphone with a predetermined scanning app can scan, or read a respective identifier of a door for which access is desired. A representation of the door identifier along with an identifier of the smart phone can be transmitter to an access control unit. A data base of the access control unit can be interrogated to determine if that smartphone identifier is authorized to open the designated door. If authorized, an access command can be transmitted to a local access control module which can release a locking mechanism for the respective door.
Abstract:
Systems and methods of power-safe control panel installation are provided. Some systems can include a control panel that includes a programmable processor and executable control software stored on a non-transitory computer readable medium, wherein the programmable processor and the executable control software can transmit a signal to selectively remove power from at least one portion of the control panel.
Abstract:
Systems and methods of power-safe control panel installation are provided. Some systems can include a control panel that includes a programmable processor and executable control software stored on a non-transitory computer readable medium, wherein the programmable processor and the executable control software can transmit a signal to selectively remove power from at least one portion of the control panel.
Abstract:
A monitoring system is continuously coupled to and in communication with a selected network. The system monitors characteristics of the network, and also characteristics of assets of the network. Removal of assets can be detected and alarm indicating messages generated locally at the monitoring system, or at a wireless communication device.
Abstract:
Systems and methods for increasing robustness of a system with a remote server are provided. Some methods can include a first system remotely controlling a second system, detecting a failure in the first system or in a communication link between the first system and the second system, and temporarily removing control of the second system from the first system.