SECURITY SYSTEM TRIGGERED BY HEART RATE DETECTION
First Claim
Patent Images
1. A security system for a facility, said security system comprising:
- a central monitoring station that controls one or more security measures for the facility; and
,a heart rate monitor that detects a heart rate of an individual, said heart rate monitor being in wireless communication with the central monitoring station;
wherein the central monitoring station selectively implements one or more of the security measures in response to a determination that an abnormal heart rate has been detected.
9 Assignments
0 Petitions
Accused Products
Abstract
A security system is provided for a facility (10). The security system includes: a central monitoring station (20) that controls one or more security measures for the facility (10); and, a heart rate monitor (30) that detects a heart rate of an individual (50), the heart rate monitor (30) being in wireless communication with the central monitoring station (20). Suitably, the central monitoring station (20) selectively implements one or more of the security measures in response to a determination that an abnormal heart rate has been detected.
-
Citations
18 Claims
-
1. A security system for a facility, said security system comprising:
-
a central monitoring station that controls one or more security measures for the facility; and
,a heart rate monitor that detects a heart rate of an individual, said heart rate monitor being in wireless communication with the central monitoring station; wherein the central monitoring station selectively implements one or more of the security measures in response to a determination that an abnormal heart rate has been detected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for controlling a security system for a facility, said method comprising:
-
(a) detecting a heart rate of an individual; (b) determining if the detected heart rate is abnormal; (c) generating a signal when it is determined that the detected heart rate is abnormal; (d) wirelessly transmitting the generated signal; (e) receiving the transmitted signal; and
,(f) selectively implementing one or more of security measures in response to the received the signal. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification