The present invention relates generally to security systems. More particularly, the present invention relates to systems and methods for building and using a false alarm predicting model to determine whether to alert a user and/or relevant authorities about an alarm signal from a security system.
Known security systems utilize a cloud server to process alarm signals and distribute the alarm signals to a central monitoring station for review and transmission of alert signals to users and/or relevant authorities when needed. However, known security systems often produce a high number of false alarms that consume bandwidth when transmitted and must be screened by live technicians at the central monitoring station, thereby greatly increasing costs associated with operating the central monitoring station.
For example, when the cloud server receives an alarm signal from a security system, the cloud server identifies the central monitoring station associated with the security system and transmits an unfiltered version of the alarm signal to the central monitoring station. Then, the central monitoring station processes the alarm signal by placing the alarm signal in a queue and retrieving associated customer information. When an operator becomes available, the central monitoring station removes the alarm signal and the associated customer information from the queue and presents the alarm signal and the associated customer information to the operator for review. In an attempt to identify any false alarms, the operator may contact a user of the security system via a primary phone number and/or a backup phone number to solicit user input indicative of whether the alarm signal is a valid alarm. Then, the operator will contact the relevant authorities when he or she confirms that the alarm signal likely corresponds to the valid alarm or fails to confirm that the alarm signal corresponds to a false alarm.
Unfortunately, the above-described systems and methods consume more bandwidth than is necessary for valid alarms and a lot of time that the operator could otherwise spend addressing the alarm signals known to be valid. Therefore, there is a need and an opportunity for improved systems and methods.
While this invention is susceptible of an embodiment in many different forms, specific embodiments thereof will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles of the invention. It is not intended to limit the invention to the specific illustrated embodiments.
Embodiments disclosed herein can include systems and methods that use artificial intelligence and machine learning to determine what security actions to execute and when to execute those security actions responsive to an alarm signal from a security system by fusing security system sensor data, situational awareness/contextual data, user preference data, and the like. For example, systems and methods disclosed herein can determine whether to push a security notification to a mobile application of a user, call or refrain from calling the user via a primary phone number and/or a backup phone number, and/or call or dispatch relevant authorities to a secured area.
In accordance with disclosed embodiments, systems and methods disclosed herein can build and use a false alarm predicting model to process alarm signals from the security system to (1) maximize a likelihood that false alarms are identified before otherwise being transmitted to the user and/or the relevant authorities and (2) enable use of an automated dispatcher module to directly report the alarm signals to the user and/or the relevant authorities. For example, a learning module can use the false alarm predicting model to process an alarm signal from the security system and, responsive thereto, generate a status signal. The automated dispatcher module can process the status signal to automatically determine whether to alert the user and/or the relevant authorities about the alarm signal.
In some embodiments, the false alarm predicting model can be managed by the learning module. For example, in some embodiments, the learning module can receive the alarm signal from the security system and additional information associated with the alarm signal, use the false alarm predicting model to process a combination of the alarm signal and the additional information to determine whether the combination represents a false alarm or a valid alarm, and transmit the status signal indicative of whether the combination represents the false alarm or the valid alarm to the automated dispatcher module. Then, the automated dispatcher module can use the status signal to automatically determine whether to alert the user and/or the relevant authorities about the alarm signal.
In some embodiments, all or parts of the automated dispatcher module can be co-located with the learning module on a cloud server and/or a control panel of the security system as either a single integrated processing module or multiple distinct processing modules. However, in some embodiments, all or parts of the automated dispatcher module and the learning module can be located on separate components that are in communication with each other. For example, all or parts of the learning module can be located on the control panel, and all or parts of the automated dispatcher module can be located on the cloud server. Similarly, all or parts of the learning module can be located on the cloud server, and all or parts of the automated dispatcher module can be located on the control panel, or all or parts of the learning module can be located on the cloud server, and all or parts of the automated dispatcher module can be located on another server that is separate and distinct from the cloud server and the control panel.
In any embodiment, each of the automated dispatcher module and the learning module can include a respective transceiver device and a respective memory device, each of which can be in communication with respective control circuitry, one or more respective programmable processors, and respective executable control software as would be understood by one of ordinary skill in the art. In some embodiments, the respective executable control software of each of the automated dispatcher module and the learning module can be stored on a transitory or non-transitory computer readable medium, including, but not limited to local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like, and some or all of the respective control circuitry, the respective programmable processors, and the respective executable control software of each of the automated dispatcher module and the learning module can execute and control at least some of the methods described herein.
In accordance with disclosed embodiments, the security system can protect a geographic area, and in some embodiments, the additional information can include weather data from a time associated with the alarm signal, movement data associated with the geographic area during the time associated with the alarm signal, a location of users of the security system during the time associated with the alarm signal, and/or incident reports relevant to the geographic area.
In some embodiments, the learning module can transmit an identification of the security system to the automated dispatcher module with the status signal, and responsive to receiving the status signal, the automated dispatcher module can identify and execute a customized response protocol associated with the security system. Then, the automated dispatcher module can determine whether a response to executing the customized response protocol is indicative of the false alarm or the valid alarm to automatically determine whether to alert authorities about the alarm signal. For example, in some embodiments, the customized response protocol can include identifying one or more devices associated with the security system, such as a mobile device of the user, and transmitting a notification signal indicative of the alarm signal to those devices. In such embodiments, the response to executing the customized response protocol can include receiving user input indicating that the alarm signal is the false alarm or the valid alarm or failing to receive any user input. In such embodiments, the automated dispatcher module can treat failing to receive any user input as indicative of the alarm signal being the valid alarm.
In some embodiments, the learning module can build the false alarm predicting model by parsing historical data from a historical time period. For example, in some embodiments, the learning module can parse a plurality of alarm signals from the historical time period, a plurality of additional information from the historical time period, feedback signals indicative of a plurality of false alarms from the historical time period, and feedback signals indicative of a plurality of valid alarms from the historical time period to build the false alarm predicting model.
In some embodiments, the false alarm predicting model can include a global model used to assess a validity of alarms from a plurality of security systems that protect a plurality of geographic areas. In such embodiments, the plurality of alarm signals from the historical time period can originate from the plurality of security systems. With the global model, in some embodiments, the plurality of additional information from the historical time period can include the weather data from the time associated with one of the plurality of alarm signals from the historical time period, the movement data associated with one of the plurality of geographic areas during the time associated with the one of the plurality of alarm signals from the historical time period, the location of the users of one of the plurality of security systems during the time associated with the one of the plurality of alarm signals from the historical time period, and/or the incident reports relevant to one of the plurality of geographic areas.
Additionally or alternatively, in some embodiments, the false alarm predicting model can include a local model used to assess the validity of alarms from a single security system that protects a single geographic area. In such embodiments, the plurality of alarm signals from the historical time period can originate from the single security system. With the local model, in some embodiments, the plurality of additional information from the historical time period can include the weather data from the time associated with one of the plurality of alarm signals from the historical time period, the movement data associated with the single geographic area during the time associated with the one of the plurality of alarm signals from the historical time period, the location of the users of the single security system during the time associated with the one of the plurality of alarm signals from the historical time period, and/or the incident reports relevant to the single geographic area. However, with the local model, in some embodiments, the plurality of alarm signals from the historical time period can originate from the plurality of security systems as described in connection with the global model to initially build the local model, and in these embodiments, the local model can be updated based on events related to only the single security system.
In some embodiments, the user can define specific parameters that are used to build the local model. For example, in some embodiments, the user can define a length of the historical time period from which the plurality of alarm signals are used to build the false alarm predicting model. Additionally or alternatively, in some embodiments, the user can specify other customized parameters that limit which of the plurality of alarm signals from the historical time period are used to build the false alarm predicting model. For example, the other customized parameters can include a defined geographic area, a type of the plurality of alarm signals, or other parameters that can limit which of the plurality of alarm signals from the historical time period are used to build the false alarm predicting model. In embodiments in which the other customized parameters include the defined geographic area, the plurality of alarm signals from the historical time period used to build the false alarm predicting model can include only those of the plurality of alarm signals that occurred within the defined geographic area. Similarly, in embodiments in which the other customized parameters include the type of the plurality of alarm signals, the plurality of alarm signals from the historical time period used to build the false alarm predicting model can include only those of the plurality of alarm signals that match the type, for example, a window alarm signal or a door alarm signal.
Additionally or alternatively, in some embodiments, the learning module can build the false alarm predicting model by recognizing patterns in the historical data. For example, in some embodiments, the learning module can identify first patterns of the plurality of alarm signals from the historical time period and the plurality of additional information from the historical time period that result in the feedback signals indicative of the plurality of false alarms from the historical time period. Similarly, the learning module can recognize second patterns of the plurality of alarm signals from the historical time period and the plurality of additional information from the historical time period that result in the feedback signals indicative of the plurality of valid alarms from the historical time period. Then, in operation, the learning module can compare the combination of the alarm signal and the additional information to the first patterns and the second patterns to determine whether the combination represents the false alarm or the valid alarm.
Furthermore, in some embodiments, the learning module can update the false alarm predicting model for increased accuracy at future times. For example, in some embodiments, the learning module can receive feedback signals indicating whether the combination of the alarm signal and the additional information represents the false alarm or the valid alarm and can use those feedback signals to update the false alarm predicting model for the increased accuracy at the future times.
In some embodiments, any of the feedback signals described herein can include user input explicitly identifying the alarm signal or the plurality of alarm signals from the historical time period as the valid alarm or the false alarm. Additionally or alternatively, in some embodiments, any of the feedback signals described herein can include information related to actions executed in response to the alarm signal or the plurality of alarm signals from the historical time period that are indicative of the valid alarm or the false alarm.
For example, in some embodiments, the information related to the actions executed that are indicative of the false alarm can include a dispatcher of a central monitoring station refraining from notifying the authorities about the alarm signal or the plurality of alarm signals from the historical time period or a report from the authorities identifying the false alarm after surveying the geographic area associated with the security system from which the alarm signal or the plurality of alarm signals from the historical time period originated. For example, the report from the authorities identifying the false alarm can include a description of the authorities walking around the geographic area and identifying nothing unusual or identifying a window or a door being open because of weather, not any presence of an intruder. Similarly, in some embodiments, the information related to the actions executed that are indicative of the valid alarm can include the dispatcher of the central monitoring station notifying the authorities about the alarm signal or the plurality of alarm signals from the historical time period or a report from the authorities identifying the valid alarm after surveying the geographic area associated with the security system from which the alarm signal or the plurality of alarm signals from the historical time period originated.
The learning module can receive the information related to the actions executed that are indicative of the false alarm or the valid alarm in a variety of ways. For example, in some embodiments, the learning module can automatically receive and parse the information related to the actions executed that are indicative of the false alarm or the valid alarm directly or via another module. Additionally or alternatively, in some embodiments, the learning module can manually receive the information related to the actions executed that are indicative of the false alarm or the valid alarm from an operator of the central monitoring station, from the user, or the relevant authorities.
In some embodiments, the learning module can identify a score to determine whether the combination of the alarm signal and the additional information represents the false alarm or the valid alarm. For example, the score can be indicative of a likelihood or a probability that the combination represents the false alarm or the valid alarm. In some embodiments, the score can be based on an amount by which the alarm signal and the additional information match the plurality of alarm signals from the historical time period and the plurality of additional information from the historical time period, and in some embodiments, the alarm signal and/or the additional information can be automatically or manually assigned different weights for such a matching comparison. Furthermore, the learning module can transmit the score to the automated dispatcher module, for example, with the status signal. Then, the automated dispatcher module can compare the score to a threshold value to automatically determine whether to alert the user and/or the relevant authorities about the alarm signal. When such a comparison and/or the score indicates that the automated dispatcher module should alert the user and/or the relevant authorities, the automated dispatcher module can automatically alert the user and/or the relevant authorities about the alarm signal without human intervention.
In some embodiments, the score can include a simple numerical value that can be deciphered by a human user as indicating that the combination of the alarm signal and the additional information represents the false alarm or the valid alarm. However, in some embodiments, the score can include a range of values with a calculated distribution (e.g. Gaussian) that indicates whether the combination of the alarm signal and the additional information represents the false alarm or the valid alarm. In such embodiments, the automated dispatcher module can include a cumulative distribution function that indicates when the automated dispatcher module should alert the user and/or the authorities, and in some embodiments, a sensitivity of the automated dispatcher module to the score can be automatically or manually adjusted based on the user preference data, such as days of the week or when the user is out of town.
Additionally or alternatively, in some embodiments, the learning module can make a binary determination as to whether the combination of the alarm signal and the additional information represents the false alarm or the valid alarm and transmit the binary determination to the automated dispatcher module with the status signal. In such embodiments, when the binary determination indicates that the combination represents the valid alarm, the automated dispatcher module can automatically alert the user and/or the relevant authorities about the alarm signal without human intervention.
Various embodiments for how the automated dispatcher module can alert the user and/or the relevant authorities are contemplated. For example, in some embodiments, the automated dispatcher module can insert the notification signal indicative of the alarm signal and demographic data associated with the alarm signal directly into a dispatch system for the relevant authorities. In some embodiments, some or all of the demographic data can be retrieved from a database of the cloud server using an identifier of the security system that sent the alarm signal to the cloud server. Additionally or alternatively, in some embodiments, some or all of the demographic data can be received from the security system with the alarm signal.
Additionally or alternatively, in some embodiments, the automated dispatcher module can call the user and/or the relevant authorities using voice emulation systems to report the alarm signal. Additionally or alternatively, in some embodiments, the automated dispatcher module can transmit an instruction signal to the mobile device of the user with instructions to contact the relevant authorities.
In some embodiments, the learning module can also transmit the status signal to a central monitoring station for processing thereof. For example, in some embodiments, the status signal can include the score that is indicative of the likelihood or the probability that the combination of the alarm signal and the additional information represents the false alarm or the valid alarm, and the central monitoring station can use the score to process and prioritize the alarm signal. For example, in some embodiments, when the score is indicative of a high likelihood of the alarm signal being the false alarm, the central monitoring station can deprioritize the alarm signal by, for example, placing the alarm signal at an end of a queue behind other alarm signals more likely to be valid. Additionally or alternatively, in some embodiments, a sensitivity of the central monitoring station to the score can be automatically or manually adjusted based on a price or level of service that the central monitoring station provides to the user.
Additionally or alternatively, in some embodiments, the learning module can transmit the alarm signal to the central monitoring station for processing thereof only when the status signal is indicative of a high likelihood of the alarm signal being the valid alarm. For example, in embodiments in which the learning module identifies the score that is indicative of the likelihood or the probability that the combination represents the false alarm or the valid alarm, the learning module can transmit the alarm signal to the central monitoring station when the score meets or exceeds the threshold value. However, in embodiments in which the learning module outputs the binary determination as to whether the combination of the alarm signal and the additional information represents the false alarm or the valid alarm, the learning module can transmit the alarm signal to the central monitoring station when the binary determination indicates that the alarm signal is the valid alarm.
In some embodiments, each of the learning module 24 and the automated dispatcher module 26 can include a respective transceiver device and a respective memory device in communication with respective control circuitry, one or more respective programmable processors, and respective executable control software as would be understood by one of ordinary skill in the art. In some embodiments, the respective executable control software of each of the learning module 24 and the automated dispatcher module 26 can be stored on a transitory or non-transitory computer readable medium, including, but not limited to local computer memory, RAM, optical storage media, magnetic storage media, flash memory, and the like, and some or all of the respective control circuitry, the respective programmable processors, and the respective executable control software of each of the learning module 24 and the automated dispatcher module 26 can execute and control at least some of the methods described herein.
As seen in
After receiving the status signal, the method 100 can include the automated dispatcher module 26 determining whether the status signal indicates that the automated dispatcher module 26 should alert the user and/or relevant authorities about the alarm signal, as in 108. When the status signal fails to indicate that the automated dispatcher module 26 should alert the user and/or the relevant authorities, the method 100 can include taking no further action, as in 110. However, when the status signal indicates that the automated dispatcher module 26 should alert the user and/or the relevant authorities, the method 100 can include the automated dispatcher module 26 initiating an appropriate action as in 112, for example, by alerting the relevant authorities by inserting a notification signal indicative of the alarm signal and demographic data associated with the alarm signal directly into the dispatch system 34.
Although a few embodiments have been described in detail above, other modifications are possible. For example, the logic flows described above do not require the particular order described or sequential order to achieve desirable results. Other steps may be provided, steps may be eliminated from the described flows, and other components may be added to or removed from the described systems. Other embodiments may be within the scope of the invention.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope of the invention. It is to be understood that no limitation with respect to the specific system or method described herein is intended or should be inferred. It is, of course, intended to cover all such modifications as fall within the spirit and scope of the invention.
This application is a continuation of and claims the benefit of the filing date of U.S. application Ser. No. 16/543,786 filed Aug. 19, 2019.
Number | Name | Date | Kind |
---|---|---|---|
4191953 | Woode | Mar 1980 | A |
4527151 | Byrne | Jul 1985 | A |
4551711 | Akiyama et al. | Nov 1985 | A |
5026990 | Marman et al. | Jun 1991 | A |
5276427 | Peterson | Jan 1994 | A |
5287111 | Shpater | Feb 1994 | A |
5331308 | Buccola et al. | Jul 1994 | A |
5758324 | Hailman et al. | May 1998 | A |
5781108 | Jacob et al. | Jul 1998 | A |
5966090 | Mcewan | Oct 1999 | A |
5986357 | Myron et al. | Nov 1999 | A |
6353385 | Molini et al. | Mar 2002 | B1 |
6377174 | Siegwart et al. | Apr 2002 | B1 |
6624750 | Marman et al. | Sep 2003 | B1 |
6778092 | Braune | Aug 2004 | B2 |
6943685 | Seo | Sep 2005 | B2 |
6946959 | Wang | Sep 2005 | B2 |
6992577 | Tsuji et al. | Jan 2006 | B2 |
7042349 | Bergman et al. | May 2006 | B2 |
7079030 | Tsuji | Jul 2006 | B2 |
7084761 | Izumi et al. | Aug 2006 | B2 |
7274387 | Gupta et al. | Sep 2007 | B2 |
7327253 | Whitten et al. | Feb 2008 | B2 |
7463182 | Morinaga et al. | Dec 2008 | B1 |
7617327 | Allam et al. | Nov 2009 | B1 |
7636039 | Babich | Dec 2009 | B2 |
7679509 | Royer | Mar 2010 | B2 |
7796033 | Green et al. | Sep 2010 | B2 |
7873868 | Heideman et al. | Jan 2011 | B1 |
8102261 | Wu | Jan 2012 | B2 |
8179256 | Crisp et al. | May 2012 | B2 |
8432448 | Hassapis et al. | Apr 2013 | B2 |
8509815 | Shojayi et al. | Aug 2013 | B1 |
8519883 | Drake et al. | Aug 2013 | B2 |
8565125 | Blum et al. | Oct 2013 | B2 |
8626210 | Hicks, III | Jan 2014 | B2 |
9013294 | Trundle | Apr 2015 | B1 |
9125144 | Orbach et al. | Sep 2015 | B1 |
9189751 | Matsuoka et al. | Nov 2015 | B2 |
9224285 | Trundle | Dec 2015 | B1 |
9237315 | Naylor et al. | Jan 2016 | B2 |
9384656 | Patterson | Jul 2016 | B2 |
9498885 | Scott et al. | Nov 2016 | B2 |
9633547 | Farrand | Apr 2017 | B2 |
9655217 | Recker et al. | May 2017 | B2 |
9786158 | Beaver et al. | Oct 2017 | B2 |
9940797 | Lamb et al. | Apr 2018 | B2 |
10147307 | Patterson et al. | Dec 2018 | B2 |
10176706 | Beaver et al. | Jan 2019 | B2 |
10380521 | Kapuschat et al. | Aug 2019 | B2 |
10930122 | Zakaria | Feb 2021 | B1 |
20020175815 | Baldwin | Nov 2002 | A1 |
20030030557 | Progovac et al. | Feb 2003 | A1 |
20040113778 | Script et al. | Jun 2004 | A1 |
20040119778 | Naito | Jun 2004 | A1 |
20050030179 | Script et al. | Feb 2005 | A1 |
20050128067 | Zakrewski | Jun 2005 | A1 |
20050203647 | Landry et al. | Sep 2005 | A1 |
20050207105 | Davies | Sep 2005 | A1 |
20060073822 | Orton et al. | Apr 2006 | A1 |
20060103520 | Clark | May 2006 | A1 |
20060125621 | Babich | Jun 2006 | A1 |
20060139164 | Tsuji | Jun 2006 | A1 |
20060266944 | Chi et al. | Nov 2006 | A1 |
20070018106 | Zhevelev et al. | Jan 2007 | A1 |
20070115164 | Wu et al. | May 2007 | A1 |
20070176765 | Babich et al. | Aug 2007 | A1 |
20070210909 | Addy | Sep 2007 | A1 |
20070252720 | Hughes et al. | Nov 2007 | A1 |
20070253461 | Billington et al. | Nov 2007 | A1 |
20080084292 | Dipoala | Apr 2008 | A1 |
20080100498 | Fullerton et al. | May 2008 | A1 |
20080184059 | Chen | Jul 2008 | A1 |
20080204190 | Cohn et al. | Aug 2008 | A1 |
20080218339 | Royer | Sep 2008 | A1 |
20080218340 | Royer | Sep 2008 | A1 |
20080310254 | Piel et al. | Dec 2008 | A1 |
20080316025 | Cobbinah et al. | Dec 2008 | A1 |
20080316309 | Roper | Dec 2008 | A1 |
20090051529 | Tsuji | Feb 2009 | A1 |
20090079563 | Tsuji | Mar 2009 | A1 |
20090167538 | Merritt et al. | Jul 2009 | A1 |
20090240974 | Baba et al. | Sep 2009 | A1 |
20090273463 | Morwood et al. | Nov 2009 | A1 |
20090322527 | Crisp et al. | Dec 2009 | A1 |
20100013636 | Wu | Jan 2010 | A1 |
20100045471 | Meyers | Feb 2010 | A1 |
20100201527 | Jensen et al. | Aug 2010 | A1 |
20100201787 | Zehavi | Aug 2010 | A1 |
20100242084 | Keeni | Sep 2010 | A1 |
20100271198 | Boling et al. | Oct 2010 | A1 |
20100277300 | Cohn et al. | Nov 2010 | A1 |
20100313064 | Boctor et al. | Dec 2010 | A1 |
20100328056 | Merkel et al. | Dec 2010 | A1 |
20110046698 | Kivi et al. | Feb 2011 | A1 |
20110047253 | Bhat | Feb 2011 | A1 |
20110065414 | Frenette et al. | Mar 2011 | A1 |
20110102171 | Raji et al. | May 2011 | A1 |
20110143774 | Mcnamara et al. | Jun 2011 | A1 |
20110169628 | Elliot et al. | Jul 2011 | A1 |
20110254681 | Perkinson et al. | Oct 2011 | A1 |
20110261680 | Boudreaux et al. | Oct 2011 | A1 |
20120013739 | Peterson et al. | Jan 2012 | A1 |
20120047494 | Unrein et al. | Feb 2012 | A1 |
20120139718 | Foisy et al. | Jun 2012 | A1 |
20120154138 | Cohn et al. | Jun 2012 | A1 |
20120161976 | Xie et al. | Jun 2012 | A1 |
20120188072 | Dawes et al. | Jul 2012 | A1 |
20120188081 | Van Katwijk | Jul 2012 | A1 |
20120319842 | Amis | Dec 2012 | A1 |
20130113397 | Salter et al. | May 2013 | A1 |
20130179625 | Stanton et al. | Jul 2013 | A1 |
20130189946 | Swanson | Jul 2013 | A1 |
20130240739 | Shpater | Sep 2013 | A1 |
20130246850 | Getter et al. | Sep 2013 | A1 |
20130249688 | Nguyen et al. | Sep 2013 | A1 |
20130285799 | Probin et al. | Oct 2013 | A1 |
20130300566 | Kumfer et al. | Nov 2013 | A1 |
20140266699 | Poder et al. | Sep 2014 | A1 |
20140359101 | Dawes et al. | Dec 2014 | A1 |
20150061859 | Matsuoka et al. | Mar 2015 | A1 |
20150070205 | Chang et al. | Mar 2015 | A1 |
20150212205 | Shpater | Jul 2015 | A1 |
20150309167 | Shikatani et al. | Oct 2015 | A1 |
20150369618 | Barnard et al. | Dec 2015 | A1 |
20160226892 | Sen et al. | Aug 2016 | A1 |
20160240056 | Chen | Aug 2016 | A1 |
20170103648 | Bodurka | Apr 2017 | A1 |
20170108885 | Meganathan et al. | Apr 2017 | A1 |
20170206771 | Hermann | Jul 2017 | A1 |
20180159593 | Bogdan et al. | Jun 2018 | A1 |
20190086266 | Lin et al. | Mar 2019 | A1 |
20200250945 | Liiv et al. | Aug 2020 | A1 |
Number | Date | Country |
---|---|---|
2351138 | Dec 2002 | CA |
1501043 | Jun 2004 | CN |
1612542 | May 2005 | CN |
101446965 | Jun 2009 | CN |
202011004996 | Mar 2012 | DE |
2260563 | Oct 2011 | EP |
3355289 | Aug 2018 | EP |
1006935 | Jan 1989 | ES |
2078413 | Jan 1982 | GB |
2000338231 | Dec 2000 | JP |
2003317178 | Nov 2003 | JP |
2011028574 | Feb 2011 | JP |
20060073055 | Jun 2006 | KR |
WO 2016109838 | Jul 2016 | WO |
Entry |
---|
Stanley, “SU 100 Motion Sensor”, dated 2000, 2 pgs. |
“How Terminal Services Works,” Technet.microsoft.com, Updated Mar. 28, 2003, downloaded from http://technet.microsoft.com/en-us/library/cc755399(d-printer,v=ws.1 0).aspx on Nov. 5, 2014, 10 pgs. |
Rytec Corporation “Motion Detector—Installation and Operating Instructions”, Revision: Jan. 21, 2003, 10 pgs. |
Mark Kretschmar, Lion Precision Sensors, “Capacitive Sensor Operation Part 1: The Basics”, May 1, 2009, 6 pgs. |
Mark Kretschmar, Lion Precision Sensors, “Capacitive Sensor Operation Part 2: System Optimization”, Jun. 1, 2009, 5 pgs. |
Thomas Perme et al., “Capacitive Touch Using Only an ADC (“CVD”) AN1298”, Microchip Technology Inc., DS01298A, Mar. 26, 2009, 4 pgs. |
Atmel, “Proximity Design Guide, Application Note QTAN0087”, 10760A-AT42, Nov. 2011, 12 pgs. |
Atmel, “QTouch 12-channel Touch Sensor IC, AT42QT2120 [Preliminary]”, 9634AX-AT42, Nov. 2011, 42 pgs. |
“Atmel Delivers QTouch Capacitive Touch Controller”, downloaded from http://sensorsmag.com/electronics-computers/news/atmel-delivers-qtouch-capacitive-touch-control . . . on Nov. 16, 2011, 2 pgs. |
Cypress Semiconductor Corporation, “Cypress Perform, PSoC Programmable System-on-Chip”, Document No. 001-67345, Rev. *A, Revised May 13, 2011, 47 pgs. |
Cypress Semiconductor, “Cypress Perform, CY3235-ProxDet, CapSense Proximity Detection Demonstration Kit Guide”, Doc. #: 001-67986 Rev. *B, Oct. 14, 2011, 34 pgs. |
NXP Semiconductors, “PCA8886—Dual channel capacitive proximity switch with auto-calibration and large voltage operating range”, Rev. 1—Nov. 23, 2011, 26 pgs. |
United States Nuclear Regulatory Commission, Office of Nuclear Security and Incident Response, “Intrusion Detection Systems and Subsystems”, Technical Information for NRG Licensees, Published Mar. 2011, 208 pgs. |
Semtech Launches Smart Proximity Sensor, downloaded from http://sensorsmag.com/electronice-computers/consumer/news/semtech-launches-smart-proximity-sensor-10190?print=1, dated Jun. 25, 2012, 3 pgs. |
Honeywell Intrusion and Communications—AlarmNet Services, http://www.security.honeywell.com/hsc/solutions/alarmnet/index.html, downloaded on Mar. 11, 2013, 2 pgs. |
Honeywell Security and Communications UK, C081 DCM, downloaded from http://www.security.honeywell.com1uk/intruder/products/co/gxacc/ac/213273.html on Mar. 11, 2013, 1 pg. |
Honeywell Intrusion and Communications—iGSMV, downloaded from http://www.security. honeywell .com/hsc/prod ucts/alarm/re/gsm/304824.html on Mar. 11, 2013, 3 pgs. |
Honeywell Intrusion and Communications—7845GSM, downloaded from http://www.security.honeywell.com/canada/products/alann/re/gsm/103665.html on Mar. 11, 2013, 2 pgs. |
Essential Video Analytics 6.30, Bosch Security Systems 2017, V3, Feb. 16, 2017, 3 pgs. |
T.K. Hareendran, HB100 Microwave Motion Sensor—An Introduction, Electro Schematics, downloaded from http://electroschematics.com/11926/hb100-microwave-mot . . . on Aug. 14, 2017, 5 pgs. |
Honeywell Galaxy Dimension, Integrated Intrusion and door control panel range, dated Oct. 2012, 3 pgs. |
Partial Search Report for European Patent Application No. 20178346.1 dated Nov. 11, 2020, 14 pgs. |
Number | Date | Country | |
---|---|---|---|
20210056836 A1 | Feb 2021 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16543786 | Aug 2019 | US |
Child | 16942709 | US |