System and method of anomaly detection
A security system and event technology, applied in the field of physical security systems, can solve problems such as card loss or theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0010] While embodiments may take many different forms, with the understanding that this disclosure should be considered as illustrative of its principles and the best mode for carrying out the same, the particulars of which are illustrated in the accompanying drawings and will be described in detail herein. Example. It is not intended to be limited to the specific embodiments described.
[0011] figure 1 is a block diagram of a security system shown generally in accordance with the illustrated embodiments. Included within the security system may be a plurality of sensors 12, 14 for detecting security threats within one or more protected areas 16 of the security system. In this regard, the protected area may be divided into a plurality of different security zones 38 with different security levels.
[0012] Under one illustrated embodiment, the sensor may include one or more limit switches mounted to an access (eg, door, window, etc.) that provides entry into or egress from ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com