System, Method, and Apparatus for Triggering an Alarm
First Claim
Patent Images
1. A method comprising:
- receiving an instruction to alarm a security gate device; and
in response to at least receiving the instruction to alarm the security gate device, tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm.
3 Assignments
0 Petitions
Accused Products
Abstract
According to some example embodiments, systems, apparatus, methods and computer program products are provided for triggering an alarm. In this regard, one example apparatus includes means for receiving an instruction to alarm a security gate device, and means for tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm in response to at least receiving the instruction to alarm the security gate device.
14 Citations
39 Claims
-
1. A method comprising:
-
receiving an instruction to alarm a security gate device; and in response to at least receiving the instruction to alarm the security gate device, tuning a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising a processor, the processor configured to:
-
receive an instruction to alarm a security gate device; and in response to at least receiving the instruction to alarm the security gate device, tune a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable memory comprising executable instructions configured to direct a processor to:
-
receive an instruction to alarm a security gate device; and in response to at least receiving the instruction to alarm the security gate device, tune a security resonator at a location such that a field generated by the security gate device interacts with the security resonator to cause the security gate device to trigger an alarm. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method comprising:
-
receiving a ping signal; determining that the ping signal originated from a gate node, wherein the gate node controls a tunable security resonator that is positioned within a field generated by a security gate device; and directing a transmitter to transmit a status signal to a network indicating that a monitoring device is within a field generated by the gate node. - View Dependent Claims (23, 24, 25, 26, 27)
-
-
28. An apparatus comprising a processor, the processor configured to perform:
-
receiving a ping signal; determining that the ping signal originated from a gate node, wherein the gate node controls a tunable security resonator that is positioned within a field generated by a security gate device; and directing a transmitter to transmit a status signal to a network indicating that a monitoring device is within a field generated by the gate node. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. A non-transitory computer readable memory comprising executable instructions configured to direct a processor to perform:
-
receiving a ping signal; determining that the ping signal originated from a gate node, wherein the gate node controls a tunable security resonator that is positioned within a field generated by a security gate device; and directing a transmitter to transmit a status signal to a network indicating that a monitoring device is within a field generated by the gate node. - View Dependent Claims (35, 36, 37, 38, 39)
-
Specification