ELECTRONIC SECURITY SYSTEMS CONSISTING

Brand Owner (click to sort) Address Description
D MAGAL MAGAL SECURITY SYSTEMS LTD. P.O. Box 70 Industrial Zone Yehud 56100 Israel Electronic security systems consisting of electric fences, electric detection fences, monitoring cameras, intrusion detection sensors and electronic controls for such sensors; perimeter intrusion detection and alarm systems; anti-intrusion alarms; alarm control units; and access control and alarm monitoring systems consisting of computers, computer software and display monitors;Color is not claimed as a feature of the mark.;
SECUREMASTER Safeguards Technology 75 Atlantic Street Hackensack NJ 07601 electronic security systems consisting of electric fences, electric detection fences, monitoring cameras, intrusion detection sensors and electronic controls for such sensors; perimeter intrusion detection and alarm systems; anti-intrusion alarms; alarm control units; alarm monitoring systems consisting of computers, computer software and display monitors; and access control systems consisting of computers, computer software and display monitors excluding garage door operators, commercial operators, lighting fixtures, and gate operators;primarily metal mechanical security systems and parts therefore, namely, fences, crash barriers, vehicle gates, pedestrian gates, security turnstiles, and locking mechanisms;installation services for security systems for property requiring heightened security;SECURE MASTER;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A number of different security systems, such as in home or business locations, periodically transmit status data to a remote facility such as a central monitoring station so that it is continuously informed of the security systems' status. The status may relate to an alarm status, armed status, or trouble code status. A user interface at the remote facility provides a spreadsheet format that allows a user to quickly ascertain the status of the security systems, and to send commands to the security systems. The security systems may be controlled individually or in groups, such as to add or delete authorizations. The user interface can filter or sort the information, or obtain further details. Other information, such as video and audio data from a security system, can also be provided to the remote facility for use in the user interface. Information can be recorded for subsequent playback.