摘要:
A cable lock device includes a housing, a tampering subsystem, and a cable having a first end and a second end. The first end is attached to the housing and is electrically connected to the tampering subsystem and the second end is selectively attached to the housing. In addition, a switch is disposed within the housing and is electrically connected to the tampering subsystem. The switch is movable between an open state and a closed state to indicate when the second end is attached to the housing. The tampering subsystem includes control circuitry that monitors the position of the switch and the status of the cable to detect removal of the second end from the housing and/or severance of the cable. The control circuitry relays status information of the cable lock device to a control unit via a transmitter to alert a property owner of a security breach.
摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
An asset monitoring and security system includes at least one asset and at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link. A data store maintains lists of the assets, users authorized to use the assets, and privileges associated with the assets for each of the authorized users. A control unit is adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated.
摘要:
An asset monitoring and security system includes at least one asset and at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link. A data store maintains lists of the assets, users authorized to use the assets, and privileges associated with the assets for each of the authorized users. A control unit is adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated.
摘要:
An intrusion sensing device includes an intrusion detection sensor enclosed within a housing and operable to detect an intrusion into a container. A mounting detection mechanism contacts the surface of the container when the housing is mounted thereto and is operable to detect when the housing is not in contact with the surface of the container. An access detection mechanism is operably connected to an access panel of the housing and operable to detect removal of the access panel from the housing. A control module is operable in a setup mode and an active mode. The control module is adapted to receive an alarm message from the intrusion detection sensor and operable to initiate an alarm event during the setup mode which varies from an alarm event initiated during the active mode. A wireless transmitter is operable to transmit an alarm indication signal to a remote monitoring system.
摘要:
An intrusion sensing device includes an intrusion detection sensor enclosed within a housing and operable to detect an intrusion into a container. A mounting detection mechanism contacts the surface of the container when the housing is mounted thereto and is operable to detect when the housing is not in contact with the surface of the container. An access detection mechanism is operably connected to an access panel of the housing and operable to detect removal of the access panel from the housing. A control module is operable in a setup mode and an active mode. The control module is adapted to receive an alarm message from the intrusion detection sensor and operable to initiate an alarm event during the setup mode which varies from an alarm event initiated during the active mode. A wireless transmitter is operable to transmit an alarm indication signal to a remote monitoring system.
摘要:
A cable lock device includes a housing, a tampering subsystem, and a cable having a first end and a second end. The first end is attached to the housing and is electrically connected to the tampering subsystem and the second end is selectively attached to the housing. In addition, a switch is disposed within the housing and is electrically connected to the tampering subsystem. The switch is movable between an open state and a closed state to indicate when the second end is attached to the housing. The tampering subsystem includes control circuitry that monitors the position of the switch and the status of the cable to detect removal of the second end from the housing and/or severance of the cable. The control circuitry relays status information of the cable lock device to a control unit via a transmitter to alert a property owner of a security breach.
摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
An asset monitoring and security system includes at least one asset and at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link. A data store maintains lists of the assets, users authorized to use the assets, and privileges associated with the assets for each of the authorized users. A control unit is adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated.