Abstract:
Apparatus is provided including an environmental sensor that detects security threats within a secure area, a shock detector that detects vibration of the environmental sensor and a processor that receives an signal from the environmental detector, processes the signal and provides a threat detected signal in response to the signal from the environmental detector wherein the processor also processes a signal from the shock detector, detects vibration and blocks the threat detected signal during the detected vibration.
Abstract:
Apparatus in one example comprises first and second fence posts that cooperate to represent a subportion of a perimeter to be secured. The first fence post comprises a first motion sensor and a first laser sensor. The second fence post comprises a second motion sensor and a second laser sensor. Upon physical movement in a region outside the subportion of the perimeter, one or more of the first and second motion sensors serve to automatically perform a detection of the physical movement in the region outside the subportion of the perimeter. Upon the detection of the physical movement in the region outside the subportion of the perimeter the one or more of the first and second motion sensors serve to automatically cause the first and second laser sensors to monitor for physical movement at the subportion of the perimeter.
Abstract:
Apparatus in one example comprises first and second fence posts that cooperate to represent a subportion of a perimeter to be secured. The first fence post comprises a first motion sensor and a first laser sensor. The second fence post comprises a second motion sensor and a second laser sensor. Upon physical movement in a region outside the subportion of the perimeter, one or more of the first and second motion sensors serve to automatically perform a detection of the physical movement in the region outside the subportion of the perimeter. Upon the detection of the physical movement in the region outside the subportion of the perimeter the one or more of the first and second motion sensors serve to automatically cause the first and second laser sensors to monitor for physical movement at the subportion of the perimeter.
Abstract:
A security system includes a data storage device in which data or other information to be protected is stored. The data storage device, control logic, and other components are contained in a sealed first inner housing. The data storage device stores the data to be protected. The first inner housing is contained within a sealed second inner housing by a plurality of support structures which create an interstitial volume surrounding the first inner enclosure. Both inner housings are contained within an outer housing. A vacuum is created in the interstitial volume between the two inner housings. Both inner housings are sealed thereby precluding air from entering the interstitial volume and defeating the vacuum. One or more pressure sensors monitor the vacuum pressure. If an attempt is made to access the first inner housing, by drilling through the second inner housing or otherwise defeating the second inner housing's seal, the pressure of the interstitial volume will change. Logic coupled to the pressure sensor detects the change in pressure, determines that a security breach has occurred or is occurring and initiates a response to secure the data from theft or tampering. The security response includes erasing the protected data or destroying the data storage device itself prevent access to the data.
Abstract:
An ultrasonic wave input/output device configured to detect a person approaching a vehicle or a building and to effect informing to the approaching person includes at least two oscillation sections including a first oscillation section configured to output an ultrasonic wave having a first frequency and to obtain a reflected wave corresponding to the outputted ultrasonic wave and a second oscillation section configured to output an ultrasonic wave having a second frequency different from the first frequency and to obtain a reflected wave corresponding to the outputted ultrasonic wave having the second frequency, cases accommodating the first and second oscillation sections individually therein, and a single housing that houses the respective cases with a cushioning member therebetween.
Abstract:
The present invention provides means for initiating a distress signal by knocking over an object, such as a table, decorative piece, furniture, etc., that includes a built-in or embedded safety device. When the safety device senses substantial movement (i.e., toppling) of the object, the safety device transmits a distress signal to third-party responders, and also can initiate various events in the environment surrounding the object to deter, delay, or disrupt a perpetrator.
Abstract:
The present invention provides means for initiating a distress signal by knocking over an object, such as a table, decorative piece, furniture, etc., that includes a built-in or embedded safety device. When the safety device senses substantial movement (i.e., toppling) of the object, the safety device transmits a distress signal to third-party responders, and also can initiate various events in the environment surrounding the object to deter, delay, or disrupt a perpetrator.
Abstract:
An intrusion detector employs a signal processor capable of not only recognizing the vibrational signature of a single intrusion event, but of recognizing a sequential pattern of the vibrations of a plurality of such events. A plurality of channels, each having sensor arrays at the inputs thereof, are connected to respective inputs of a common signal processor. An output is produced from the signal processor when the signal supplied thereto falls within prescribed limits. This output enables a respective channel to activate a tone code generator to produce an output having a group of frequencies corresponding to the particular channel. The modulated RF signal is then transmitted to a remote readout station. The signal processor recognizes the vibrations of each intrusion event and initiates a timer in response to the first of such events. Each subsequent event reinitiates the timing period of the timer until the full time period thereof has elapsed without the receipt of a subsequent pulse. A counter counts the number of such events, and if a predetermined count is achieved before an output is supplied by the timer, an alarm or similar indicator is actuated.
Abstract:
A method of detecting a particular abnormal sound in an environment with background noise is provided. The method includes acquiring a sound from a microphone, separating abnormal sounds from the input sound based on non-negative matrix factorization (NMF), extracting Mel-frequency cepstral coefficient (MFCC) parameters according to the separated abnormal sounds, calculating hidden Markov model (HMM) likelihoods according to the separated abnormal sounds, and comparing the likelihoods of the separated abnormal sounds with a reference value to determine whether or not an abnormal sound has occurred. According to the method, based on NMF, a sound to be detected is compared with ambient noise in a one-to-one basis and classified so that the sound may be stably detected even in an actual environment with multiple noises.
Abstract:
This invention permits (or rejects) access to a secure location by authenticating precision up to 106 i.e. 10 to the power 6 or 1,000,000. Such precision allows highly secure and controlled access thereby paving a new field of finer control and security than the conventional security techniques based on software or hardware. Objective of this invention is to provide an additional high-robust-security wall over existing locks/vaults/security systems. Such new high-robust-security wall will allow existing owners, companies to have a hacker-proof and secure mechanism without upgrading or replacing their existing security systems in place. Another benefit of this objective is to launch new industrial sectors as below: 1. Sector (R&D Firms): Manufacture, Test and Create new alloys based on resonance frequencies needed to identify a unique key. 2. Sector (Manufactures): Mass produce such keys and metal plates for each metal once such frequencies are identified. 3. Sector (Maintenance & Support): Highly specialized Maintenance and Support services for customers utilizing this security mechanism. For example, Support services such as, customer might need help for delivering such keys securely, replace existing keys in event of malfunction of the old key, Support key and metal plate manufacturers by regularly providing updates on new alloys designed by R&D firms. 4. Sector (Private networks): Private networks connecting R&D firms and Manufacturers, and another private network connecting Manufacturers and Maintenance & Support, and another network connecting Maintenance & Support services and existing customers.