Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Tyco Integrated Security Llc patents


Recent patent applications related to Tyco Integrated Security Llc. Tyco Integrated Security Llc is listed as an Agent/Assignee. Note: Tyco Integrated Security Llc may have other listings under different names/spellings. We're not affiliated with Tyco Integrated Security Llc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "T" | Tyco Integrated Security Llc-related inventors


Architecture for access management

Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message causing the user device to render a graphical user interface that has fields for entering an email address and a password to register the user device with a security server, with the graphical user interface rendering on the display a public key stored in a user digital wallet and a user digital wallet identification and sending in response to the message, a user's public key that is stored in the user's wallet and which is embedded in a code.. ... Tyco Integrated Security Llc

Architecture for access management

Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. ... Tyco Integrated Security Llc

Architecture for access management

Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities.. ... Tyco Integrated Security Llc

Architecture for access management

Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. ... Tyco Integrated Security Llc

Architecture for access management

Described are techniques for security access and control. The techniques use a system that includes a card reader system including a processor and memory. ... Tyco Integrated Security Llc

Architecture for access management

Disclosed are techniques that use user devices and a server system to process employee generated requests to allow guest access registration. A server system receives a request for guest registration and the server system sends in response to the request a message to a guest user device with the message including a request for user credentials. ... Tyco Integrated Security Llc

Method and system for mobile duress alarm

During a potential security event, a mobile application enters an alarm state and records audio, video and location event data and forwards the event data to a monitoring center, which stores the event data and takes appropriate action such as notifying local law enforcement. The alarm state is triggered manually, by the use of wireless sensors, or by arming the mobile application and then determining if it has been disarmed within a predetermined period of time.. ... Tyco Integrated Security Llc

Predicting service for intrusion and alarm systems based on signal activity patterns

A work order prediction system is described. The work order prediction system analyzes retrieved sensor signal activity records to compare counts of signal activity in defined signal groupings to corresponding predetermined thresholds of sensor signal activity and generates a report based on the comparison when sensor signal activity exceeds the determined threshold values. ... Tyco Integrated Security Llc

Device enabled identity authentication

Described is a flexible and customizable physical access control system that allows for a smart device to execute an authentication application that users subscribe to for various physical locations with pre-determined rule sets that correspond to registration information of the physical location's qualifications and rules sets. A user's smart device is used as a credential for large number of locations so long as that location is in the subscriber network.. ... Tyco Integrated Security Llc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Tyco Integrated Security Llc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Tyco Integrated Security Llc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###