Patents by Inventor Paul B. Rasband
Paul B. Rasband has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160360358Abstract: Systems (100) and methods (200) for operating a sensor system.Type: ApplicationFiled: August 18, 2016Publication date: December 8, 2016Inventors: Paul B. Rasband, Jorge F. Alicot
-
Publication number: 20160343244Abstract: Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which the presence of an alarm condition is detected. In addition sensor devices analyze sensor data received from other sensor devices that are in a peer to peer relationship with the corresponding sensor device to validate whether the indicated alarm condition is a valid alarm or a false alarm.Type: ApplicationFiled: July 5, 2016Publication date: November 24, 2016Applicant: Tyco Fire & Security GmbHInventors: Hap Patterson, Joseph E. Hauhn, Paul B. Rasband, Anthony Mucci, Stewart E. Hall
-
Patent number: 9477841Abstract: Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a unique identifier from a network node (108) to be installed at a customer facility (102) via a first short range communication link (110); communicating a signal comprising the unique identifier from the mobile communication device to a remote server (118) via a first long range communication link (112); verifying by the remote server that a correct type of network node is being installed at a first location within the customer facility according to a respective work order; and communicating security information, useful for configuring security functions of the network node, from the remote server to the network node via the mobile communication device, without presenting the security information to a user of the mobile communication device or storing the security information in the mobile communication device.Type: GrantFiled: March 28, 2014Date of Patent: October 25, 2016Assignee: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Mohammad Mohiuddin, Stewart E. Hall
-
Patent number: 9426616Abstract: Systems and methods for operating a sensor system. The methods comprise: performing first operations by a Wireless Sensor Network to (a) configure operations of WSN end nodes and (b) control Bluetooth Low Energy (“BLE”) link activity within a BLE network; and performing second operations by the BLE network to (a) find people or objects within a specified area and (b) provide services to users of mobile communication devices which are BLE enabled and reside within the specified area.Type: GrantFiled: February 10, 2015Date of Patent: August 23, 2016Assignee: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Jorge F. Alicot
-
Publication number: 20160234634Abstract: Systems (100) and methods (200) for operating a sensor system.Type: ApplicationFiled: February 10, 2015Publication date: August 11, 2016Applicant: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Jorge F. Alicot
-
Patent number: 9384656Abstract: Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which the presence of an alarm condition is detected. In addition sensor devices analyze sensor data received from other sensor devices that are in a peer to peer relationship with the corresponding sensor device to validate whether the indicated alarm condition is a valid alarm or a false alarm.Type: GrantFiled: March 10, 2014Date of Patent: July 5, 2016Assignee: Tyco Fire & Security GmbHInventors: Hap Patterson, Joseph E. Hauhn, Paul B. Rasband, Anthony Mucci, Stewart E. Hall
-
Patent number: 9316720Abstract: A networked system for managing a physical intrusion detection/alarm includes an upper tier of server devices, comprising: processor devices and memory in communication with the processor devices, a middle tier of gateway devices that are in communication with upper tier servers, and a lower level tier of devices that comprise fully functional nodes and constrained nodes. The networked has a device configured to receive sensory inputs from credentials or badges and determine virtual groups of individuals associated with received credential data and apply rules to grouping information to track and detect individuals within virtual groups.Type: GrantFiled: August 20, 2014Date of Patent: April 19, 2016Assignee: Tyco Fire & Security GmbHInventor: Paul B. Rasband
-
Patent number: 9280389Abstract: A device, such as a constrained device that includes a processing device and memory, schedules user-defined independently executable functions to execute from a single stack common to all user-defined independently executable functions according to availability and priority of the user-defined independently executable functions relative to other user-defined independently executable functions and preempts currently running user-defined independently executable function by placing the particular user-defined independently executable function on a single stack that has register values for the currently running user-defined independently executable function.Type: GrantFiled: December 30, 2014Date of Patent: March 8, 2016Assignee: Tyco Fire & Security GmbHInventors: Vincent J. Lipsio, Jr., Paul B. Rasband
-
Patent number: 9204320Abstract: Systems (100) and methods (200) for dynamically managing Functional Configurations (“FCs”) of network nodes (104, 134-138). The methods involve performing operations by a First End Node (“FEN”) in accordance with a first FC. FEN (104) has a first Software Module (“SM”) stored thereon specifying the first FC. The first SM (122) comprises a total set of codes/functions which determine how a network node is to behave. The first EN detects a trigger event for triggering a transition from the first FC to a second FC. In response to the trigger event, the FEN automatically and dynamically obtains, from a remote network node (134, 136, 138 or 144), a second SM (150 or 126) that is different than the first SM. The first SM (stored on FEN) is then replaced with the second SM. The FEN executes the second SM such that it operates in accordance with the second FC.Type: GrantFiled: January 14, 2015Date of Patent: December 1, 2015Assignee: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Stewart E. Hall
-
Publication number: 20150327081Abstract: Systems (100) and methods (200) for dynamically managing Functional Configurations (“FCs”) of network nodes (104, 134-138). The methods involve performing operations by a First End Node (“FEN”) in accordance with a first FC. FEN (104) has a first Software Module (“SM”) stored thereon specifying the first FC. The first SM (122) comprises a total set of codes/functions which determine how a network node is to behave. The first EN detects a trigger event for triggering a transition from the first FC to a second FC. In response to the trigger event, the FEN automatically and dynamically obtains, from a remote network node (134, 136, 138 or 144), a second SM (124 or 126) that is different than the first SM. The first SM (stored on FEN) is then replaced with the second SM. The FEN executes the second SM such that it operates in accordance with the second FC.Type: ApplicationFiled: January 14, 2015Publication date: November 12, 2015Applicant: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Stewart E. Hall
-
Publication number: 20150287303Abstract: A networked system for managing a physical intrusion detection/alarm includes an upper tier of server devices, comprising: processor devices and memory in communication with the processor devices, a middle tier of gateway devices that are in communication with upper tier servers, and a lower level tier of devices that comprise fully functional nodes and constrained nodes. The networked has a device configured to receive sensory inputs from credentials or badges and determine virtual groups of individuals associated with received credential data and apply rules to grouping information to track and detect individuals within virtual groups.Type: ApplicationFiled: August 20, 2014Publication date: October 8, 2015Applicant: Tyco Fire & Security GmbHInventor: Paul B. Rasband
-
Publication number: 20150287307Abstract: A networked system for managing a physical intrusion detection/alarm includes an upper tier of server devices, comprising: processor devices and memory in communication with the processor devices, a middle tier of gateway devices that are in communication with upper tier servers, and a lower level tier of devices that comprise fully functional nodes with at least some of the functional nodes including an application layer that execute routines to provide node functions, and a device to manage the lower tier of devices, the device instantiating a program manager that executes a state machine to control the application layer in each of the at least some of the functional nodes.Type: ApplicationFiled: August 20, 2014Publication date: October 8, 2015Applicant: Tyco Fire & Security GmbHInventor: Paul B. Rasband
-
Publication number: 20150286934Abstract: A networked system for managing a physical intrusion detection/alarm includes an upper tier of server devices, comprising: processor devices and memory in communication with the processor devices, a middle tier of gateway devices that are in communication with upper tier servers, and a lower level tier of devices that comprise fully functional nodes with at least some of the functional nodes including an application layer that execute routines to provide node functions, and a device to manage the lower tier of devices, the device instantiating a program manager that executes a state machine to control the application layer in each of the at least some of the functional nodes.Type: ApplicationFiled: August 20, 2014Publication date: October 8, 2015Applicant: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Craig Trivelpiece, Stewart E. Hall, Robert F. Brewin, Gustavo Leon
-
Publication number: 20150281280Abstract: Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a unique identifier from a network node (108) to be installed at a customer facility (102) via a first short range communication link (110); communicating a signal comprising the unique identifier from the mobile communication device to a remote server (118) via a first long range communication link (112); verifying by the remote server that a correct type of network node is being installed at a first location within the customer facility according to a respective work order; and communicating security information, useful for configuring security functions of the network node, from the remote server to the network node via the mobile communication device, without presenting the security information to a user of the mobile communication device or storing the security information in the mobile communication device.Type: ApplicationFiled: March 28, 2014Publication date: October 1, 2015Inventors: Paul B. Rasband, Mohammad Mohiuddin, Stewart E. Hall
-
Publication number: 20150262158Abstract: Method for managing mobile point of sale (mPOS) operations using a wireless network to detect location data includes capturing video data of one or more customers within a retail store premises. The video data is analyzed to determine one or more customer behavior indicators potentially indicating a need for mPOS services. The location data is used to correlate the customer behavior indicators with the one or more customers. The method also involves determining a probability that at least one of the customers will be requesting mPOS services within a predetermined interval of time.Type: ApplicationFiled: November 18, 2014Publication date: September 17, 2015Applicant: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Manjuprakash R. Rao, Sreenath K. Ramanna, Surajit Borah, Stewart E. Hall
-
Publication number: 20150254972Abstract: Embodiments of intrusion detection systems are described and which include an intrusion detection panel that receives binary and metadata sensor data from which the presence of an alarm condition is detected. In addition sensor devices analyze sensor data received from other sensor devices that are in a peer to peer relationship with the corresponding sensor device to validate whether the indicated alarm condition is a valid alarm or a false alarm.Type: ApplicationFiled: March 10, 2014Publication date: September 10, 2015Applicant: TYCO FIRE & SECURITY GMBHInventors: Hap Patterson, Joseph E. Hauhn, Paul B. Rasband, Anthorny Mucci, Stewart E. Hall
-
Publication number: 20150249928Abstract: A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.Type: ApplicationFiled: August 20, 2014Publication date: September 3, 2015Applicant: TYCO FIRE & SECURITY GMBHInventors: Jorge Alicot, Paul B. Rasband
-
Publication number: 20150249588Abstract: Described is a system that includes a queue cluster including first network devices that cooperate to communicate with end nodes of a network and to store information from the end nodes in memory, a processing cluster comprising second network devices that cooperate to perform one or more tasks on the information from the queue cluster, and a database cluster including third network devices that cooperate to provide storage for use by the processing cluster, with the queue cluster, the processing cluster, and the database cluster being part of a local network that is connectable to an external network, the local network including a wireless mesh network and for the one or more tasks, a network device among the second network devices is selected as a leader responsible for task execution.Type: ApplicationFiled: August 20, 2014Publication date: September 3, 2015Applicant: Tyco Fire & Security GmbHInventors: Gustavo Leon, Stewart E. Hall, Craig Trivelpiece, Paul B. Rasband
-
Publication number: 20150248299Abstract: A networked system for managing a physical intrusion detection/alarm includes an upper tier of server devices, comprising: processor devices and memory in communication with the processor devices, a middle tier of gateway devices that are in communication with upper tier servers, and a lower level tier of devices that comprise fully functional nodes with at least some of the functional nodes including an application layer that execute routines to provide node functions, and a device to manage the lower tier of devices, the device instantiating a program manager that executes a state machine to control the application layer in each of the at least some of the functional nodes.Type: ApplicationFiled: January 23, 2015Publication date: September 3, 2015Applicant: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Vincent J. Lipsio, JR.
-
Publication number: 20150249548Abstract: Disclosed is a gateway between a first sub-network and a second sub-network, the first sub-network being isolated from the second sub-network, the gateway being configured to send, to a first node of the first sub-network, information for use in establishing a bridge to a second node of the second sub-network; and a device comprising the first node, the first node being configured to use the information to establish a bridge to the second node, the bridge for enabling communication between the first node and the second node that does not pass through the gateway.Type: ApplicationFiled: August 20, 2014Publication date: September 3, 2015Applicant: Tyco Fire & Security GmbHInventors: Paul B. Rasband, Robert F. Brewin