SYSTEMS AND METHODS FOR AVERTING CRIME WITH LOOK-AHEAD ANALYTICS

    公开(公告)号:US20230085515A1

    公开(公告)日:2023-03-16

    申请号:US17991472

    申请日:2022-11-21

    Abstract: Systems and methods for operating a security system. The methods comprise: monitoring an area for a presence of an individual or vehicle using wireless signals of a first type that are received by a first radio of the security system; operating the first radio as a wireless sensor for generating sensor data; determining whether the individual or vehicle is exhibiting an unusual behavior using the sensor data and pre-programmed or machine learned patterns of unusual behavior; changing an operating frequency of the first radio when a determination is made that the individual or vehicle is exhibiting unusual behavior; and communicating a wireless signal of a second type from the first radio when the individual or vehicle is exhibiting unusual behavior, where the second type is different than the first type.

    Electronic anti-tamper device
    2.
    发明授权

    公开(公告)号:US11379624B2

    公开(公告)日:2022-07-05

    申请号:US16496392

    申请日:2018-03-06

    Applicant: BLUESKYTEC LTD

    Abstract: This invention relates to an anti-tamper assembly for a circuit board comprising one or more electronic components, the assembly comprising: a container having side walls, a first, closed end and a second, opposing, open end, the container being configured to be mounted on said circuit board at said open end, over at least one of said electrical components, to form, in use, a sealed cavity around said at least one of said electrical components; a source of radioactive particles mounted within said container; an image sensor for capturing image frames within said sealed cavity, in use, wherein said image sensor comprises a detector region defining an array of pixels; and a processor for receiving said captured image frames, monitoring said image frames for changes in the statistical distribution of active pixels and, in the event that statistical distribution of active pixels indicates the presence of a feature in an image frame, generating a tamper alert.

    Path crossing detection based on wireless signals travel time

    公开(公告)号:US11129042B2

    公开(公告)日:2021-09-21

    申请号:US16571215

    申请日:2019-09-16

    Abstract: Presented herein are systems and methods for detecting a boundary line crossing based on Round Trip Time (RTT) measured for wireless signals transmitted between and initiator wireless transceiver and a responder wireless transceiver deployed to form a straight boundary line. The initiator wireless transceiver transmits wireless probe signal(s) to the responder wireless transceiver, receives a wireless response signal transmitted by the responder wireless transceiver in response to the wireless probe signal(s), calculates an RTT combining a travel time of the wireless probe signal(s) and the travel time of the wireless response signal(s), compares the RTT to a reference RTT computed for a wireless probe signal and a corresponding wireless response signal transmitted in a clear straight transmission path while the boundary line is clear of obstacles and determines whether an object is blocking the straight transmission path based on a deviation of the RTT from the reference RTT.

    Systems and Methods for RFID-Based Access Management of Electronic Devices
    7.
    发明申请
    Systems and Methods for RFID-Based Access Management of Electronic Devices 有权
    电子设备基于RFID的访问管理的系统和方法

    公开(公告)号:US20080273684A1

    公开(公告)日:2008-11-06

    申请号:US11870157

    申请日:2007-10-10

    Abstract: Disclosed are systems and methods for preventing unauthorized persons from using an electronic device within a facility. In such an embodiment, the system may include a plurality of RFID tags each having unique identification information associated with a wearer of one of the RFID tags. This system may also include an RFID reader associated with the electronic device and having an RFID coverage zone for detecting RFID tags within the coverage zone. A device management system may be connected to the reader and configured to determine whether wearers in the coverage zone are authorized to use the electronic device based at least in part on detected RFID tags' unique identification information. In such an embodiment, the device management system is configured to activate the electronic device if it determines only authorized wearers are detected in the coverage zone, and to deactivate the electronic device if it determines an unauthorized wearer is detected in the coverage zone.

    Abstract translation: 公开了用于防止未经授权的人在设施内使用电子设备的系统和方法。 在这样的实施例中,系统可以包括多个RFID标签,每个RFID标签具有与RFID标签之一的佩戴者相关联的唯一识别信息。 该系统还可以包括与电子设备相关联的RFID读取器,并具有用于检测覆盖区域内的RFID标签的RFID覆盖区域。 设备管理系统可以连接到读取器并且被配置为至少部分地基于检测到的RFID标签的唯一标识信息来确定覆盖区域中的佩戴者是否被授权使用电子设备。 在这样的实施例中,设备管理系统被配置为如果它确定仅在覆盖区域中检测到授权的佩戴者,则激活电子设备,并且如果在确定在覆盖区域中检测到未授权的佩戴者的情况下停用该电子设备。

    EXPANDABLE, MODULAR COMMUNICATIONS APPARATUS WITH WIRELESS INTERCHANGEABLE DEVICE AUTHENTICATION
    8.
    发明申请
    EXPANDABLE, MODULAR COMMUNICATIONS APPARATUS WITH WIRELESS INTERCHANGEABLE DEVICE AUTHENTICATION 失效
    可扩展的模块化通信设备,无线可交换设备认证

    公开(公告)号:US20080198018A1

    公开(公告)日:2008-08-21

    申请号:US12110251

    申请日:2008-04-25

    Inventor: Joel S. Hartley

    Abstract: Communications systems and methods can include wide area network communication capabilities provided by a communications module or device and additional functionality provided by one or more interchangeable devices that interface with the communications module. One or more of the interchangeable devices can communicate with the communications module or device via a short range wireless signal, such as for example that of an RFID, WiFi, or Zigbee system. Authentication of the communication device in combination with the one or more interchangeable devices can be included to provide device compatibility and security verification.

    Abstract translation: 通信系统和方法可以包括由通信模块或设备提供的广域网通信能力以及由与通信模块接口的一个或多个可互换设备提供的附加功能。 一个或多个可互换设备可以经由短距离无线信号(例如RFID,WiFi或Zigbee系统)与通信模块或设备进行通信。 可以包括通信设备与一个或多个可互换设备的认证,以提供设备兼容性和安全性验证。

    PERMANENTLY DESTRUCTIBLE RESONANT CIRCUIT WITH NON-SELF-HEALING CAPACITOR
    9.
    发明申请
    PERMANENTLY DESTRUCTIBLE RESONANT CIRCUIT WITH NON-SELF-HEALING CAPACITOR 审中-公开
    具有非自愈式电容器的永久可分解谐振电路

    公开(公告)号:US20080174434A1

    公开(公告)日:2008-07-24

    申请号:US12015790

    申请日:2008-01-17

    CPC classification number: G08B13/2437 G08B13/2414 G08B13/2417

    Abstract: A resonant circuit for use with a radio-wave detection system for the prevention of shoplifting or the like which has a coil and capacitor circuit whereby the circuit is permanently destroyed when the tag is exposed to a radio signal that causes a voltage across the capacitor that exceeds the breakdown voltage of the capacitor. The capacitor comprises a dielectric that does not exhibit self-healing. Such dielectrics include ceramics, metal oxides and minerals.

    Abstract translation: 一种用于防止商店盗窃等的无线电波检测系统的谐振电路,其具有线圈和电容器电路,由此当标签暴露于导致电容器两端的电压的无线电信号时,电路被永久地破坏, 超过电容器的击穿电压。 电容器包括不显示自愈的电介质。 这种电介质包括陶瓷,金属氧化物和矿物质。

    Intruder detector system
    10.
    发明授权
    Intruder detector system 失效
    入侵检测系统

    公开(公告)号:US5910767A

    公开(公告)日:1999-06-08

    申请号:US893451

    申请日:1997-07-11

    Applicant: Yaacov Frucht

    Inventor: Yaacov Frucht

    Abstract: A light beam, preferably from a laser, is reflected from a target, which is a potential intruder. The time period required for the beam to return to a light detector, as well as the intensity of the reflected light, is recorded. The system includes a computer and software for analyzing the measurements of distance and intensity of reflected light. The algorithm for detecting the presence of an intruder is based on changes in the measured distance and/or intensity of reflected light from initial measurements made during a "learning" period. The system tracks targets using data collected in consecutive searches of the area to be protected. Preferably, an alarm is sounded and/or a video camera is slaved to the system.

    Abstract translation: 优选来自激光的光束从作为潜在入侵者的靶反射。 记录光束返回光检测器所需的时间以及反射光的强度。 该系统包括用于分析反射光的距离和强度的测量的计算机和软件。 用于检测入侵者的存在的算法是基于在“学习”期间进行的初始测量的测量的距离和/或反射光强度的变化。 系统使用在要保护的区域的连续搜索中收集的数据来跟踪目标。 优选地,发出报警和/或摄像机从属于系统。

Patent Agency Ranking