A humidifier device includes one or more sensors configured to sense one or more air properties of air within a duct operably coupled to the humidifier device. The humidifier also includes control circuitry configured to receive an indication of the one or more air properties of the air, determine a water absorption capability of the air based at least in part on the one or more air properties of the air, and determine an amount of moisture to be outputted by the humidifier device to the duct based at least in part on the water absorption capability of the air. The humidifier also includes an atomizer configured to output the determined amount of moisture to the duct.
F24F 11/70 - Control systems characterised by their outputs; Constructional details thereof
F24F 3/14 - Air-conditioning systems in which conditioned primary air is supplied from one or more central stations to distributing units in the rooms or spaces where it may receive secondary treatment; Apparatus specially designed for such systems characterised by the treatment of the air otherwise than by heating and cooling by dehumidification
F24F 6/12 - Air-humidification by forming water dispersions in the air
R213769-CA/1264-268CA01 ABSTRACT A humidifier including a humidifier housing with an adjustable backplane configured to fit to a variety of humidifier pad sizes. Different sizes of humidifier pads are available, and the choice of humidifier pad may depend on the capacity of the HVAC system. The backplane of this disclosure may be adjusted by moving to one position to accommodate a larger humidifier pad or to a second position for a smaller humidifier pad. The backplane of the humidifier housing is configured to mount over an opening of an air duct of an HVAC system such that air is directed along an air path defined by the humidifier housing, through the humidifier pad positioned in front of the air duct and into the air stream of the HVAC system. Water flows through inlet tubing to a water distributor, which may direct the water to the top of the humidifier pad. 19 Date Recue/Date Received 2020-12-08
Systems and methods for adjusting a focal length of a mirror are provided. Some systems can include an adjustment device having an slot, a mirror that is rotatable about an axis, and a drive coupled to the mirror and configured to engage the slot, wherein movement of the adjustment device can cause the drive to move within the slot upwards or downwards in accordance with a slope of the slot, thereby rotating the mirror about the axis.
G02B 7/198 - Mountings, adjusting means, or light-tight connections, for optical elements for mirrors for mirrors with means for adjusting the mirror relative to its support
A ceiling mount intrusion detector is provided that includes a sensor, a mirror for directing collected energy towards the sensor, and a mechanism for adjusting the mirror to account for a plurality of different mount heights. In some embodiments, the mechanism can adjust the mirror by moving the mirror up or down without rotating the mirror.
G08B 13/193 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems using focusing means
G08B 13/191 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems using pyroelectric sensor means
5.
SYSTEMS AND METHODS FOR COOPERATIVE NETWORK MANAGEMENT
Systems and methods are provided that include a control panel of a security system receiving results from a scan of first operating channels of a first wireless protocol conducted a plurality of wireless security sensors, determining which of second operating channels of a second wireless protocol include wireless communication, determining that a first of the first operating channels of the first wireless protocol fails to overlap with the second operating channels of the second wireless protocol that include the wireless communication, determining whether the results from the scan indicate that the first of the first operating channels of the first wireless protocol includes interference at any of the plurality of wireless security sensors, and migrating the wireless communication with the plurality of wireless security sensors to the first of the first operating channels of the first wireless protocol.
Systems and methods are provided that include an access point receiving a request from a device to join a first network defined by a first protocol, the access point allocating a slot of a superframe to the device, and the access point allocating remaining slots of the superframe to communication by the access point on a second network defined by a second protocol. Additionally or alternatively, some methods can include the access point enabling a first transceiver communicating via the first protocol and either, when the first transceiver receives first data from the device via the first protocol within a predetermined time of a beginning of the slot, receiving second data from the device via the first protocol for a remainder of the slot or, when the first transceiver module fails to receive the first data, the access point enabling a second transceiver for the remainder of the slot.
Systems and methods for activating audio playback are provided. Some systems and methods may include a portable user device moving throughout a region and determining a current location of the portable user device within the region and a control panel activating an audio playback mode for a varying group of a plurality of speakers based on the current location of the portable user device within the region.
Systems and methods for updating a partition state of individual sensors or devices in a system are provided. Such systems and methods may include an access point broadcasting a beacon signal including a partition state change indicator portion and a partition state update portion, the sensors or devices periodically waking up to receive the partition state change indicator portion, and responsive to predetermined content of the partition state change indicator portion, one or more of the sensors or devices remaining awake to receive an updated partition state identified in the partition state update portion.
H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Systems and methods for automatic speech recognition are provided. Some methods can include a sensor detecting a relative location of a user within one of a plurality of voice pickup areas of a multi-directional microphone array and the multi-directional microphone array activating a direction setting of the multi-directional microphone array based on the relative location of the user within the one of the plurality of voice pickup areas.
H04R 1/40 - Arrangements for obtaining desired frequency or directional characteristics for obtaining desired directional characteristic only by combining a number of identical transducers
Systems and methods for disarming a security system using a two-dimensional scannable access code are provided. Such systems and methods can include a control panel the security that generates a valid two-dimensional scannable access code, stores identifying information for the valid two-dimensional scannable access code in a memory device of the security system, and shares the valid two-dimensional scannable access code with a user of the security system. In some embodiments, when the security system is in an armed state, the security system can scan a presented two-dimensional scannable access code, decode associated information from the presented two-dimensional scannable access code, compare the associated information to the identifying information, and when the associated information matches the identifying information, transition the security system from the armed state to a disarmed state to allow the user to access an area protected by the security system.
Systems and methods for relating configuration data to IP cameras are provided. Some methods can include a video streaming server device receiving a message identifying an IP address of an IP camera from a DHCP server device, the video streaming server device using the IP address to connect to the camera, the video streaming server device receiving a video data stream from the camera, the video streaming server device extracting a MAC address of the camera from a connection with the IP camera, the video streaming server device transmitting the video data stream, the IP address, and the MAC address to a mobile device, a manager server device receiving configuration information for the IP camera, the IP address, and the MAC address from the mobile device, and the manager server device relating and binding the configuration information with the IP address and the MAC address.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
12.
HVAC CONTROL SYSTEM WITH USER INTERFACE PROVIDED BY A MOBILE WIRELESS DEVICE
ABSTRACT For a Heating, Ventilation, and/or Air Conditioning system with a remote user interface, an HVAC controller may wirelessly communicate with a mobile wireless device that provides a user interface for interacting with the HVAC controller. In some cases, the communication module wirelessly receives a sensed parameter from a remote wireless sensor in a living space of the building and receives a wired input from a return air sensor. A controller may be operatively coupled to the communication module and may control the HVAC system based at least in part on the sensed parameter from the remote wireless sensor when the sensed parameter from the remote wireless sensor is available. To operate when the sensed parameter from the remote wireless sensor is not available, the controller may control the HVAC system based at least in part on the retum air parameter. CA 3051267 2020-03-20
A wireless device may be used to communicate with and control one or more components of an HVAC system from a remote location. The wireless device may be configured to display building control information on the display of the wireless device, wherein the building control information that is displayed may be adapted based, at least in part, on an identified pattern of user actions with the wireless device. The identified pattern may be at least partially based on user actions with associated geo-locations, times, and/or other conditions. The information that is to be displayed on the display of the wireless device may be determined based, at least in part, on a current time, a current geo-location of the wireless device, or other current condition in view of the identified pattern in user actions.
A communications bus line isolator is provided. In some embodiments, a first side of the communications bus isolator can be coupled to a first device via first communications bus cabling, a second side of the communications bus isolator can be coupled to a second device via second communications bus cabling, and, when the communications bus isolator detects a fault on or tampering or interference with the second communications bus cabling or the second device, the communications bus isolator can isolate the first communications bus cabling from the second communications bus cabling. In some embodiments, when the first device detects a continuous fault on or continuous tampering or interference with the second communications bus cabling or the second device, the first device can transmit a signal to the communications bus isolator, instructing the communications bus isolator to actively disable receivers on the second side of the communications bus isolator.
Systems and methods that address the gap, security, and robustness limitations of known door and window contact systems and methods without increasing the overall cost thereof are provided. Some systems can include an accelerometer and a magnetometer for mounting in or on a first portion of a window or door unit, and a microcontroller unit in communication with each of the accelerometer and the magnetometer. The accelerometer can measure acceleration or vibration relative to a second portion of the window or door unit and transmit the measured acceleration or vibration to the microcontroller unit, the magnetometer can measure magnetic field relative to a sensor magnet mounted on or embedded in the second portion of the window or door unit and transmit the measured magnetic field to the microcontroller unit, and the microcontroller unit can use the measured acceleration or vibration and the measured magnetic field to make a security determination.
A wall mountable connector to provide mechanical and electrical connections for a thermostat. The wall mountable connector may include a field wire receiving cavity, with a first column of wiring terminals and a second column of wiring terminals, with each of the wiring terminals configured to receive a field wire. Each of a first column of pin terminals may be electrically coupled with each of the first column of wiring terminals and each of a second column of pin terminals may be electrically coupled with each of the second column of wiring terminals. In some cases, the first column of pin terminals may be spaced a distance of 3 to 20 millimeters from a first side edge of the housing, and the second column of pin terminals may be spaced a distance of 3 to 20 millimeters from an opposing second side edge of the housing.
A wall mountable connector for securing a thermostat to a wall is disclosed. The wall mountable connector provides electrical connections between the wall mountable connector and a plurality of field wires that are operably coupled with HVAC equipment. The wall mountable connector also providing electrical connections between the wall mountable connector and the thermostat. The wall mountable connector includes a door that is movable between an open position in which the electrical connections with the field wires are accessible and a closed position in which the electrical connections with the field wires are not accessible and/or visible to the user.
A wall mountable connector may be secured to a wall in order to provide mechanical and electrical connections to a thermostat. In some cases, the wall mountable connector and the thermostat may, in combination, be configured to permit the thermostat to attach to the wall mountable connector only when the thermostat is in a particular orientation relative to the wall mountable connector. In some cases, the wall mountable connector includes a plurality of pin terminals that are configured to accommodate a plurality of pins extending from the thermostat. The interaction between the pins and the pin terminals may provide a lock and key arrangement between the wall mountable connector and the thermostat.
A system incorporating a camera sensor situated in a room having walls with windows and sun blinds. The sun blinds may control outdoor light to the room. Indoor light sources may provide artificial light in the room. A controller may receive signals from the camera sensor. The controller may estimate a presence of occupants and provide control signals to the sun blinds and light sources. A room temperature sensor and an HVAC system may be connected to the controller. A preset temperature, which may depend on occupancy, in the room or zone may be achieved with various kinds of heating or cooling. At the same time, outdoor light and indoor artificial light may be controlled to obtain a preset intensity of lighting in the room, which may depend on occupancy, in a manner to achieve a minimum cost of energy used by the HVAC and the light sources.
E06B 9/56 - Operating, guiding or securing devices or arrangements for roll-type closures; Spring drums; Tape drums; Counterweighting arrangements therefor
E06B 9/24 - Screens or other constructions affording protection against light, especially against sunshine; Similar screens for privacy or appearance
E06B 9/32 - Operating, guiding, or securing devices therefor
20.
WIFI ACCESS BASED ACTION/SCENES EXECUTION IN HOME AUTOMATION SECURITY PANELS
An apparatus including a security system that protects a secure geographic area of a home, a WiFi access point within the home coupled to the security system, a portable wireless device that detects the WiFi access point and matches an identifier of the WiFi access point with a reference identifier and the portable wireless device automatically downloading one or more instructions to the security system through the WiFi access point..
A system and process of adjusting units coupled to a control element which includes, installing the unit at a selected location. A parameter can be entered from a displaced user operable device. The unit can be directed to carry out a selected function. Performance can be evaluated whether an additional parameter alteration is required based on a predetermined criterion.
A communications network available to implement at least M2M communications between a transmitting and a receiving unit. The units can communicate via the Internet, as a primary network. They can also communicate via a cellular-type network. At least some of the units include respective subscriber information to provide access and services via the network. Groups of units can share a common data plan with other related units. Subscriber information can be included in respective SIM cards. At least one of the SIM cards can provide voice and/or data service via the common data plan.
Described herein are methods and systems, including computer program products, for optimizing and controlling a building's energy consumption and comfort. A computing device receives measurements from a plurality of sensors, at least some of which are located inside the building, where the measurements include temperature readings and comfort characteristics. The computing device generates a set of thermal response coefficients based on energy characteristics of the building, the measurements from the sensors, and weather data associated with the building's location. The computing device predicts an energy response of the building based on the set of thermal response coefficients and forecasted weather. The computing device selects minimal energy requirements of the building based on an energy consumption cost associated with the building and determines energy control points based on the energy response and the minimal energy requirements. The computing device transmits the energy control points to comfort devices in the building.
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
24.
SYSTEM AND METHOD FOR TAKE-OVER PROTECTION FOR A SECURITY SYSTEM
A secure communications and monitoring system includes a control unit and a plurality of modules distributed in a region to be monitored. The control unit has an assigned identifier. When a module is installed in the system, the control unit transmits the identifier to the module which stores it. Before a module communicates with the control unit, the identifier is requested from the control unit. The identifier received from the control unit is compared to the stored identifier. The module will only communicate with the control unit where the identifier received at the module corresponds to the identifier stored at the module.
G08B 29/00 - Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
G08B 13/10 - Mechanical actuation by pressure on floors, floor coverings, stair treads, counters, or tills
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 29/18 - Prevention or correction of operating errors
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
25.
MULTIPLE HEATSINK COOLING SYSTEM FOR A LINE VOLTAGE THERMOSTAT
A line voltage thermostat having a multiple heatsink switch. A total switch may have a semiconductor switch mounted on each heatsink of the multiple heatsink switch. The semiconductor switches of the respective heatsinks may be connected in parallel to represent the total switch. Each of the two or more heatsinks, having a semiconductor switch for switching, and in total conveying the same power as one equivalent switch with one total heatsink, may have higher maximum operating temperatures and higher thermal resistances than twice the thermal resistance of the one total heatsink. The two or more heatsinks may be situated within a housing of the line voltage thermostat, and be easier to distribute in the housing to achieve an efficient layout of a display and control buttons for the thermostat.
A power supply unit for use with thermostats or other like devices. The power supply unit may keep electromagnetic interference emissions and harmonics at a minimum. A unit may have enough power for triggering a switch at about a cross over point of a waveform of input power to the unit. Power for triggering may come from a storage source. Power for the storage source may be provided with power stealing which require switching transistors which can generate emissions. In-line thermostats using MOSFETS power steal may do the power steal during an ON state (triac, relay or silicon controlled rectifier activated). Gate signals to the transistors may be especially shaped to keep emissions from transistor switching at a minimum. All that may be needed, during an OFF state as a bypass, is a high voltage controllable switch. The need may be achieved using high voltage MOSFETS.
A circuit that may control current to a load without generating a large amount of electromagnetic interference on main lines of an AC power supply for the load and circuit. Control may be effected with silicon controlled rectifiers (SCRs). For instance, the circuit may implement passive triggering using a capacitor between the anode and the gate of an SCR. By using a sufficiently large capacitor, gate current may be applied during a zero crossing of a waveform of the AC power supply in a passive manner without a need to store energy prior to the zero crossing. The circuit may synchronize SCR triggering with a voltage variation in a clean manner, that is, without generating electromagnetic interference. The circuit may be used with an in- line thermostat. However, the circuit may be used in other ways.
H03K 17/72 - Bipolar semiconductor devices with more than two PN junctions, e.g. thyristors, programmable unijunction transistors, or with more than three electrodes, e.g. silicon controlled switches, or with more than one electrode connected to the same conducti
G05D 23/19 - Control of temperature characterised by the use of electric means
H02H 9/04 - Emergency protective circuit arrangements for limiting excess current or voltage without disconnection responsive to excess voltage
A power supply unit for use with thermostats or other like devices. The power supply unit may keep electromagnetic interference emissions and harmonics at a minimum. A unit may have enough power for triggering a switch at about a cross over point of a waveform of input power to the unit. Power for triggering may come from a storage source. Power for the storage source may be provided with power stealing which require switching transistors which can generate emissions. In-line thermostats using MOSFETS power steal may do the power steal during an ON state (triac, relay or silicon controlled rectifier activated). Gate signals to the transistors may be especially shaped to keep emissions from transistor switching at a minimum. All that may be needed, during an OFF state as a bypass, is a high voltage controllable switch. The need may be achieved using high voltage MOSFETS.
A multi-mode thermostat includes, a sensor of ambient temperature and control circuits coupled to the sensor, wherein the control circuits are responsive to signals from the sensor to maintain a predetermined regional temperature. First electrically actuated backup circuits, responsive to a sensed operational power level, to alter a status signal transmission rate by the control circuits. Second electrically actuated backup circuits, responsive to a lower sensed operational power level to provide a backup, lower regional temperature electromechanically.
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
F24D 19/10 - Arrangement or mounting of control or safety devices
G05D 23/08 - Control of temperature without auxiliary power with sensing element expanding and contracting in response to changes of temperature with bimetallic element
G08C 17/02 - Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
31.
SYSTEM AND METHOD TO ACCESS/RESTRICT A SECURITY SYSTEM FOR TEMPORARY USERS USING A MOBILE APPLICATION
An apparatus that includes a mobile wireless device of an authorized person receiving an identifier of another person who is to be granted temporary access into a secured geographic area of the authorized person by a security system of the authorized person, a processor of the mobile device or the security system generating a temporary access code with specific features that is to be used by the other person for gaining entry into the secured area and the mobile device of the authorized person transferring the temporary password to a mobile wireless device of the other person.
A regional monitoring system can establish and store patterns of signals from sensors, or patterns of signals coupled to actuators. Incoming patterns can be compared to pre-stored patterns, and in the presence of disparities therebetween, a message can be sent wirelessly to a displaced individual associated with the region indicative of the disparity. The individual can override a pre-established action associated with one of the pre-stored patterns. Monitoring systems can include security monitoring systems, fire safety monitoring systems or HVAC-type systems.
A system including a security system that protects a secured area, a wireless portable device that arms and disarms the security system through a wireless interface, the wireless portable device having a camera, a microphone and a global positioning system (GPS) and a processor of the wireless portable device that detects disarming of the security system by a user under duress through the wireless portable device and captures information of an environment of the wireless portable device from the GPS and one or more of the camera and microphone and sends the captured information to a central monitoring station of the security system through the wireless interface.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
H04N 21/80 - Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
G10L 17/24 - the user being prompted to utter a password or a predefined phrase
G10L 17/26 - Recognition of special voice characteristics, e.g. for use in lie detectors; Recognition of animal voices
G08C 17/02 - Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
G10L 15/20 - Speech recognition techniques specially adapted for robustness in adverse environments, e.g. in noise or of stress induced speech
A system including at least one security system sensor, at least one home automation device and a security system processor that monitors the security system sensor and generates an alarm upon activation of the at least one security system sensor, the security system processor also monitors the at least one home automation device and generates an alarm upon detecting the manual activation of the at least one home automation device.
A payout device is provided comprising a carton, an elongated rotatable member and a support assembly. The carton has a plurality of panels enclosing an interior compartment. At least one of the plurality of panels has an opening providing an egress for elongated flexible material stored within the interior compartment. The elongated member is rotatably supported in a substantially horizontal direction within the carton by the support assembly. The support assembly has a slot with a generally teardrop shape. The teardrop shape has a larger diameter end and a smaller diameter end such that a portion of the rotatable member is slidable therebetween. The larger diameter end is sized to allow the rotatable member to rotate, and the smaller diameter end has a size smaller than the circumference of the rotatable member. The slot is positioned on the carton with the larger diameter end being elevated and closer to the opening than the smaller diameter end.
B65D 85/04 - Containers, packaging elements or packages, specially adapted for particular articles or materials for annular articles for coils of wire, rope or hose
B65D 83/00 - Containers or packages with special means for dispensing contents
36.
SELF-CONTAINED, BUOYANT, AND WATER-TIGHT WIRELESS FLOOD DETECTOR
A floatable flood detector has a watertight housing which carries internally a wireless transmitter and a fluid sensor. In the presence of sensed fluid, an alarm message can be transmitted by the transmitter to a displaced monitoring unit. The sensor has a portion exposed to the fluid of interest, outside of the housing. The antenna is carried, at least at a fluid level, relative to the floating housing.
Systems and methods with automatic radius cross notification for a GPS tracker are provided. Some methods can include receiving user input requesting a dynamic creation of a geo-fence, and, responsive thereto, creating the geo-fence. Some methods can include determining when a GPS tracker device has been stationary for a predetermined period of time, and responsive thereto, dynamically creating a geo-fence.
A power supply unit for use with thermostats or other like devices requiring power. A power supply unit may be designed to keep electromagnetic interference emissions at a minimum, particularly at a level that does not violate governmental regulations. A unit may be designed so that there is enough power for a triggering a switch at about a cross over point of a waveform of input power to the unit. Power for triggering may come from a storage source rather than line power to reduce emissions on the power line. Power for the storage source may be provided with power stealing. Power stealing may require switching transistors which can generate emissions. Gate signals to the transistors may be especially shaped to keep emissions from transistor switching at a minimum.
G05D 23/19 - Control of temperature characterised by the use of electric means
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H03K 17/687 - Electronic switching or gating, i.e. not by contact-making and -breaking characterised by the use of specified components by the use, as active elements, of semiconductor devices the devices being field-effect transistors
H03K 17/725 - Bipolar semiconductor devices with more than two PN junctions, e.g. thyristors, programmable unijunction transistors, or with more than three electrodes, e.g. silicon controlled switches, or with more than one electrode connected to the same conducti for ac voltages or currents
A power supply unit for use with thermostats or other like devices requiring power. A power supply unit may be designed to keep electromagnetic interference emissions at a minimum, particularly at a level that does not violate governmental regulations. A unit may be designed so that there is enough power for a triggering a switch at about a cross over point of a waveform of input power to the unit. Power for triggering may come from a storage source rather than line power to reduce emissions on the power line. Power for the storage source may be provided with power stealing. Power stealing may require switching transistors which can generate emissions. Gate signals to the transistors may be especially shaped to keep emissions from transistor switching at a minimum.
G05D 23/19 - Control of temperature characterised by the use of electric means
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H03K 17/687 - Electronic switching or gating, i.e. not by contact-making and -breaking characterised by the use of specified components by the use, as active elements, of semiconductor devices the devices being field-effect transistors
H03K 17/725 - Bipolar semiconductor devices with more than two PN junctions, e.g. thyristors, programmable unijunction transistors, or with more than three electrodes, e.g. silicon controlled switches, or with more than one electrode connected to the same conducti for ac voltages or currents
An alarm or intrusion monitoring system includes a plurality of detectors which communicate with a displaced control element. Various of the detectors include local storage circuitry wherein detected conditions or events are recorded along with a time indicator. Recorded events and respective times of occurrence can be downloaded to the control element for evaluation. Detected conditions or events can include system conditions, such as faults or detector off-line indicators, as well as various intrusion or environmental-type incidents such as smoke, gas, temperature or fire.
A system includes a GPS device that tracks a current location of a user relative to a home of the user and a cloud application that tracks the current location of the user via the GPS device. A current conditions message includes a current temperature inside of the home and a set of heating and/or cooling coefficients indicating a rate at which the HVAC unit is able to raise or lower the current temperature inside of the home to a desired temperature. The cloud application calculates a threshold value based on the current conditions message and a time period required for the user to travel from the current location to the home. Responsive to detecting that the time period is less than the threshold value, the cloud application automatically sends an activating signal to the HVAC unit to activate the HVAC unit.
A group of unsupervised detectors or control units, in wireless communication with a user, can be upgraded for the user with the addition of hardware and/or downloadable software to provide communications and information to a supervisory station. Supervisory station services can be implemented locally or via cloud based computer services. A displaced dealer can be contacted using codes carried by the detectors or control units for installation or activation of additional services.
G08C 17/02 - Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
H04W 4/00 - Services specially adapted for wireless communication networks; Facilities therefor
H04W 84/02 - Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
A method and apparatus wherein the method includes the steps of generating a globally unique identifier (GUID) for a security system appliance, saving a public key and private key of the security system appliance in a memory of the security system appliance, a manufacturer of the security system appliance generating a signed version of the GUID and the public key, saving the signed version of the GUID and public key in the memory of the security system appliance, the security system appliance sending a registration message including the signed version of the GUID and public key to a security system server and the security system server authenticating the security system appliance using the signed version of the GUID and public key of the security system appliance and a public key of the manufacturer.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
G08B 19/00 - Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
44.
SECURITY SYSTEM WITH INTEGRATED HEATING, VENTILATION AND AIR CONDITION CONTROL
A monitoring security system can be coupled to a thermostatic HVAC control module, either wired or wirelessly. In at least some embodiments, the thermostatic module can be communicated with via an interactive interface of the security system. Information as to the operation of the security system and the module can be presented on a common display of the security system, and commands, which are directed to the module, can be entered via the security system.
A method and apparatus where the apparatus performs the steps of detecting a moving object within a secured area, determining a size of the moving object, determining that the size exceeds a predetermined threshold value associated with an animal, determining an aspect ratio of the moving object, determining that the aspect ratio meets a predetermined aspect threshold value associated with an animal or crawling human, but not an upright human, retrieving an indicator from memory that establishes whether an animal is present or not present within the secured area and setting an alarm upon detecting that the moving object exceeds the predetermined size threshold, that the determined aspect ratio meets the aspect ratio of an animal or crawling human and that the indicator establishes that there is no animal present in the secured area.
G08B 13/194 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs
G08B 29/18 - Prevention or correction of operating errors
An apparatus including a camera housing having an aperture, a camera having an imaging axis disposed in the housing with a lens disposed adjacent the aperture providing a field of view extending outwards through the aperture, around the imaging axis of the camera, at least one light source that illuminates the field of view of the camera, the light source is in an annular space between the lens and periphery of the aperture, at least one flap that supports the at least one light source, the flap extends around the annular space, the flap is pivotally attached to the camera and periphery of the aperture and an actuator that moves the camera along the imaging axis.
G03B 15/03 - Combinations of cameras with lighting apparatus; Flash units
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
47.
SYSTEM AND METHOD OF POST EVENT/ALARM ANALYSIS IN CCTV AND INTEGRATED SECURITY SYSTEMS
A method and apparatus are provided. The method includes the steps of detecting a plurality of events within a secured area detected by respective sensors that have been activated within a predetermined time period of one another and wherein at least one of the plurality of events is an alarm event, ordering the events based upon a reporting time of each event and displaying a map showing the activated sensors within the secured area along with the potential route of an intruder traveling among the locations of the activated sensors in accordance with the reporting time of each event.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
48.
SYSTEM AND METHOD OF USER CODE SYNCHRONIZATION WITH Z-WAVE DOOR LOCKS
Systems and methods of user code synchronization with Z-wave door locks are provided. Methods can include determining an occurrence of a predetermined event, upon the occurrence of the predetermined event, identifying a set of a plurality of user codes stored in a control panel to be synchronized, and wirelessly transmitting the set of the plurality of user codes to be synchronized from the control panel to at least one door lock using a Z-wave communications protocol.
Systems and methods of device maintenance reporting via a wireless protocol are provided. Systems can include a central station and a plurality of remote systems such that the central station is in wireless bidirectional communication with each of the plurality of remote systems. When the central station receives a maintenance signal from a first of the plurality of remote systems, the central station can poll each of the plurality of remote systems located within a predetermined distance of a location of the first of the plurality of remote systems. The central station can also determine whether a maintenance need exists for each of the plurality of remote systems located within the predetermined distance.
50.
SYSTEM AND METHOD FOR REAL TIME ANTI-SMASH PROTECTION
An apparatus to provide real time anti-smash protection for monitoring systems includes a displaced server which communicates with a plurality of monitoring systems. Methods of operating the server provide assurance that alarm indicating messages are forwarded to a monitoring station for evaluation by an operator even where a local monitoring system has been damaged or compromised.
An electric heating system controlled with a remote thermostat. The system may incorporate wireless technology and a line voltage equipment interface sub-system. The sub-system may have a line voltage relay and an antenna. The relay may be mounted within an electric heater enclosure. The antenna may be mounted directly on the enclosure. The antenna may receive temperature control signals from a transmitter of the thermostat. The signals may be processed to control a connection of the heater to power with a relay receiving the processed control signals. The control of power to the heater may maintain a temperature approximately equal to a thermostat temperature setting. The antenna and relay electronics may provide a backup control of the heater in the event of, for example, a loss of signals from the thermostat. The backup control may prevent the temperature proximate to equipment interface sub-system from approaching a freezing point.
G05D 23/19 - Control of temperature characterised by the use of electric means
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
G08C 17/02 - Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
H05B 1/00 - ELECTRIC HEATING; ELECTRIC LIGHT SOURCES NOT OTHERWISE PROVIDED FOR; CIRCUIT ARRANGEMENTS FOR ELECTRIC LIGHT SOURCES, IN GENERAL - Details of electric heating devices
52.
OPTIMIZING AND CONTROLLING THE ENERGY CONSUMPTION OF A BUILDING
Described herein are methods and systems, including computer program products, for optimizing and controlling the energy consumption of a building. A first computing device generates a set of thermal response coefficients for the building based on energy characteristics of the building and weather data associated with the location of the building. The first computing device predicts an energy response of the building based on the set of thermal response coefficients and forecasted weather associated with the location of the building. The first computing device selects minimal energy requirements of the building based on an energy consumption cost associated with the building. The first computing device determines one or more temperature set points for the building based on the energy response and the minimal energy requirements. The first computing device transmits the one or more temperature set points to a thermostat of the building.
A humidifier for an HVAC system includes a replaceable humidifier pad, and a housing for holding the replaceable humidifier pad in an operating position during operation of the humidifier. The back side of the housing may define an air flow aperture that is in fluid communication with the replaceable humidifier pad when the replaceable humidifier pad is in its operating position. In some instances, the right side of the housing may define a first aperture that is sufficient in size to remove the replaceable humidifier pad from the housing, and to install a new replaceable humidifier pad. Likewise, the left side of the housing may define a second aperture that is sufficient in size to remove the replaceable humidifier pad from the housing, and to install a new replaceable humidifier pad. The humidifier may also include a first cover member for covering the first aperture when the replaceable humidifier pad is in its operating position, and a second cover member for covering the second aperture when the replaceable humidifier pad is in its operating position. In some cases, an aperture and cover may also be provided on the front and/or top sides of the housing so that the replaceable humidifier pad may be replaced from the front and/or top sides of the housing.
A humidifier for adding humidity to an air stream of an HVAC system includes a housing configured to be mounted to a surface of an HVAC duct. A back side of the housing may be positioned adjacent to an opening in the surface of the HVAC duct, and the housing may be configured to hold a humidifier pad in an operating position. The housing may define a first air flow path from a first side of the humidifier pad to the opening in the surface of the HVAC duct when the housing is mounted to the surface of the HVAC duct. The housing may further define a second air flow path from a second side of the humidifier pad to a bypass aperture. At least part of the second air flow path may be defined by a bypass duct member. The bypass duct member may be field-reconfigurable between at least a first position resulting in the bypass aperture being located at a first location, and a second position resulting in the bypass aperture being located at a second location. In some cases, the first and second locations are on the left and right sides, respectively, of the humidifier housing.
A humidifier for adding humidity to an air stream of an HVAC system during a call for humidity includes an air intake configured to fluidically interface with an HVAC duct, a humidifier pad, a valve for controlling delivery of water from a water source to the humidifier pad, and a controller for controlling the valve. The controller may be configured to cause the valve to deliver a variable amount of water over a particular call for humidity. For example, and in some instances, the controller may cause the valve to deliver water to the humidifier pad for substantially less than all of the time for a particular call for humidity.
F24F 6/04 - Air-humidification by evaporation of water in the air using stationary unheated wet elements
F24F 11/70 - Control systems characterised by their outputs; Constructional details thereof
F24F 3/14 - Air-conditioning systems in which conditioned primary air is supplied from one or more central stations to distributing units in the rooms or spaces where it may receive secondary treatment; Apparatus specially designed for such systems characterised by the treatment of the air otherwise than by heating and cooling by dehumidification
An improved humidifier system for adding humidity to an air stream of an HVAC system. The humidifier system includes an air path that is configured to accept air from a first HVAC duct and return air to a second HVAC duct. A damper is disposed in the air path to selectively substantially block the flow of air in the air path, or to substantially not block the flow of air in the air path. In some cases, the damper may be a motorized damper, and the humidifier system may include a controller that is configured to cause the motorized damper to not substantially block the flow of air in the air path during a call for humidifier operation, and to substantially block the flow of air in the air path after the call for humidifier operation ends. Alternatively, the damper may be manually actuated, and an HVAC controller may be configured to notify when the damper should be moved (e.g. between seasons).
An improved humidifier system for adding humidity to an air stream of an HVAC system. The humidifier system includes an air path that is configured to accept air from a first HVAC duct and return air to a second HVAC duct. A damper is disposed in the air path to selectively substantially block the flow of air in the air path, or to substantially not block the flow of air in the air path. In some cases, the damper may be a motorized damper, and the humidifier system may include a controller that is configured to cause the motorized damper to not substantially block the flow of air in the air path during a call for humidifier operation, and to substantially block the flow of air in the air path after the call for humidifier operation ends. Alternatively, the damper may be manually actuated, and an HVAC controller may be configured to notify when the damper should be moved (e.g. between seasons).
A power stealing circuit for stealing power to operate a control device is disclosed. In one illustrative embodiment, power may be periodically or intermittently diverted from a power source to a power stealing block. When power is diverted to the power stealing block, the power stealing block may steal power from the power source and store the stolen power on a storage device. The storage device may then provide operating power to a control device. In some embodiments, the power stealing block may include a first path for charging the storage device when a switch is ON, and a second path for charging the storage device when the switch is off. The switch may be switched OFF when, for example, when the voltage provided by the rectifier is greater than a threshold voltage, the voltage detected on the storage device is greater than a threshold value, and/or when a control signal from a controller disables the switch.
A mechanism for indicating ambient temperature (Ta) of an enclosure (14) from temperatures determined within the enclosure (14). The temperatures may be obtained from two or more sensors (12, 13, 18) at each of two or more locations within the enclosure (14). The enclosure (14) may include an apparatus (27) inside such as electronics of which power consumption may be determined. Data including temperatures (T1, T2) of two locations within the enclosure (14) at various electronics power consumption levels may be entered into a 2-D plot. An approximation of the 2-D plot may be effected with an appropriate equation to be solved for ambient temperature (Ta). The data of the 2-D plot plus temperatures (T3) of a third location and air flow levels in the enclosure (14) may be entered into a 3-D plot. An approximation of the 3-D plot may be effected with an appropriate equation to be solved for ambient temperature (Ta).
G01K 15/00 - Testing or calibrating of thermometers
G01K 1/00 - MEASURING TEMPERATURE; MEASURING QUANTITY OF HEAT; THERMALLY-SENSITIVE ELEMENTS NOT OTHERWISE PROVIDED FOR - Details of thermometers not specially adapted for particular types of thermometer
G01K 7/00 - Measuring temperature based on the use of electric or magnetic elements directly sensitive to heat
A mechanism for indicating ambient temperature (Ta) of an enclosure (14) from temperatures determined within the enclosure (14). The temperatures may be obtained from two or more sensors (12, 13, 18) at each of two or more locations within the enclosure (14). The enclosure (14) may include an apparatus (27) inside such as electronics of which power consumption may be detemined. Data including temperatures (T1, T2) of two locations within the enclosure (14) at various electronics power consumption levels may be entered into a 2-D plot. An approximation of the 2-D plot may be effected with an appropriate equation to be solved for ambient temperature (Ta). The data of the 2-D plot plus temperatures (T3) of a third location and air flow levels in the enclosure (14) may be entered into a 3-D plot. An approximation of the 3-D plot may be effected with an appropriate equation to be solved for ambient temperature (Ta).
A twist locking connector for a steam humidifier. The steam humidifier includes a tank for heating water to generate steam and a steam tube receiver structure in fluid communication with the tank. The steam tube receiver structure has an opening configured to receive a steam tube, where the opening has a plurality of ramp structures about the opening on a side facing the tank. The steam humidifier also includes a steam tube for transmitting steam from the tank to a duct, the steam tube having a plurality of locking tabs adjacent to an end and a flange adjacent to, but separated by a distance from, the locking tabs. The steam tube is assembled to the steam tube receiver by inserting the steam tube through the opening in the steam tube receiver structure and rotating the steam tube to cause the locking tabs to engage with the ramp structures.
F24F 13/00 - AIR-CONDITIONING; AIR-HUMIDIFICATION; VENTILATION; USE OF AIR CURRENTS FOR SCREENING - Details common to, or for air-conditioning, air-humidification, ventilation or use of air currents for screening
F24F 3/14 - Air-conditioning systems in which conditioned primary air is supplied from one or more central stations to distributing units in the rooms or spaces where it may receive secondary treatment; Apparatus specially designed for such systems characterised by the treatment of the air otherwise than by heating and cooling by dehumidification
F24F 6/18 - Air-humidification by injection of steam into the air
A method for monitoring an alarm zone within a perimeter, border and/or building includes capturing video image data of an alarm event detected in the alarm zone, and automatically establishing a cell phone session with an end-user to verify a true or false nature of the detected alarm. The end-user may use the cell phone display to review the video during the cell phone session, and may use the cell phone's key for the verifying. The novel monitoring method with end-user alarm event verification avoids false alarms being raised where the nature of the detected alarm event is false, and the verifying occurs before a false alarm is raised/communicated.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
63.
A BIOMETRIC VERIFICATION AND DURESS DETECTION SYSTEM AND METHOD
A multi-stage verification system including a first and second identification device to verify the identity of the user and to determine if the user is under duress. When a user approaches an entrance to a building, a first identifier is detected by the first identification device, the identifier is compared to a pre-stored identifier. If there is a match, the user inputs at least one biometric input into the second identification device. The biometric input is compares with pre-stored information in two different databases, a biometric template database and a duress indicator database. If there is a match with the duress indicator database, a silent alarm signal is transmitted to a central monitoring station and the security system is disarmed. If there is a match with the biometric template database, the security system is controlled in the intended manner.
An intrusion detection device and method in an IP connected security system is disclosed. An intrusion detection device is coupled to primary and secondary communication devices of a secunty system so that when a Internet attack is detected, communication between the security system and a central monitoring station occurs over the secondary communication device rather than the primary communication device. The invention preserves communication between the security system and the central monitoring station even when a denial of service type attack is occurring so that physical premise security is uncompromised.
G08B 25/08 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
G08B 29/16 - Security signalling or alarm systems, e.g. redundant systems
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
65.
CENTRAL MONITORING STATION WITH METHOD TO PROCESS CALL BASED ON CALL SOURCE IDENTIFICATION INFORMATION
A system and a method for processing an incoming telephone call to an alarm system central monitoring station using call source identification data such as caller ID. The alarm system central monitoring station can use the caller ID information transmitted by the telephone company to make decisions as to how to process a call prior to the central monitoring station receiver answering the call. The central monitoring station will process the call by checking if the caller ID information matches caller ID information stored in memory and it will check status information associated with the caller ID information to determine if the call should be disconnected, transferred, or connected. In order to accomplish this the central monitoring station comprises receiving circuits for detecting an incoming telephone call on the telephone line and reading caller ID information associated with the call, switching circuits coupled to the receiving circuitry for transferring the call if necessary, memory for storing status information comprising the caller ID information, and processing circuitry for determining if caller ID information has been stored in the memory, and if it has, then accessing the status information and processing the call as a function of the status information. The central monitoring station may process the call by 1)transferring the call to an invalid alarm call station, 2)connecting the call to a central monitoring station receiver, a second central monitoring station receiver, or a second line of a central monitoring station receiver, or 3)disconnecting the call.
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
H04M 1/57 - Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
H04M 3/50 - Centralised arrangements for answering calls; Centralised arrangements for recording messages for absent or busy subscribers
66.
A SYSTEM AND METHOD FOR CAPTURING AND REROUTING AN INDIVIDUAL LOCAL SECURITY SYSTEM
A method and system used by a central monitoring station (200) to monitor and control a local installed security system (100). The method includes programming into a receiver (210) and identifier for a local security system (100) to be captured and controlled. Programming a control instruction for the local installed system (100) into a receiver (210). Transmitting the control instruction to a local security system (100). The method and apparatus allows a central monitoring station (200) to obtain control of an installed security system (100) even in the case where ownership of the security system (100) has changed hands and the identification number has changed. The apparatus includes a plurality of receivers and transmitters (210) for transmitting information between the central monitoring station (200) and a plurality of installed security systems (100), an automation computer (220) for processing received messages form the installed security systems (100), and a configuration computer (230) that configures and controls the installed local security systems (100).
G08B 29/00 - Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation