-
公开(公告)号:US20230169807A1
公开(公告)日:2023-06-01
申请号:US17538210
申请日:2021-11-30
Applicant: MOTOROLA SOLUTIONS, INC.
Inventor: Francesca SCHULER , Jody A. STOWELL , Kiesha GRANT
CPC classification number: G07C9/00309 , G06N20/00
Abstract: A device, system, and method for electronic access control to reunify persons is provided. A device determines, using electronic data, a modality of an incident associated with a premises. The device determines: one or more routes associated with the premises and the modality; and electronic reunification data associated with the modality, the electronic reunification data defining one or more first persons and one or more second persons that are to meet in association with the incident and in accordance with the one or more routes. The device controls access points at the premises, along the one or more routes, to one or more of unlock, lock, open, or close. The device transmits one or more notifications to one or more communication devices, indicative of the electronic reunification data.
-
2.
公开(公告)号:US20200159968A1
公开(公告)日:2020-05-21
申请号:US16198104
申请日:2018-11-21
Applicant: MOTOROLA SOLUTIONS, INC.
Inventor: Tal PASTERNAK , David J. LEY , Kiesha GRANT , Alexander MASSOVER , Pavel LIVSHITS , Lisajane M. ROMER
Abstract: A process for triggering and propagating a covert mode status change using configuration protocol data includes, while a computing device is in a non-covert mode, maintaining one or more externally-perceivable output devices according to non-covert-configuration data of a non-covert profile; in response to detecting a trigger: changing the computing device to a covert mode; selecting a covert profile; controlling the externally-perceivable output devices according to covert-configuration data of the covert profile; and transmitting an instruction message to each of one or more second computing devices, the instruction message comprising: a status change message to place each of the one or more second computing devices in a respective covert mode; and covert-configuration protocol data mapped to the covert-configuration data of the covert profile, such that respective externally-perceivable output devices, at the one or more second computing devices, are controlled according to the covert-configuration protocol data.
-