The present embodiments relate to security systems, including security systems that include sensors, automation devices, and/or audio/video (AN) recording and communication devices. In particular, the present embodiments relate to improvements in the functionality of security systems that strengthen the ability of such systems to reduce crime and enhance public safety.
Home safety is a concern for many homeowners and renters. Those seeking to protect or monitor their homes often wish to be informed of breaches to the security of their homes and also have video and audio communications with visitors/trespassers, for example, those visiting/trespassing near an external door or entryway. Security systems that include sensors, automation devices, and/or A/V recording and communication devices, such as doorbells, provide this functionality, and can also aid in crime detection and prevention. For example, sensor information, audio, and/or video captured by a security system, such as by an A/V recording and communication doorbell of a security system, can be uploaded to the cloud and recorded on a remote server. Subsequent review of the sensor information and/or the A/V footage can aid law enforcement in capturing perpetrators of home burglaries and other crimes. Further, the presence of a security system including one or more an A/V recording and communication devices on the exterior of a home, such as a doorbell unit at the entrance of a home, acts as a powerful deterrent against would-be burglars.
The various embodiments of the arming security systems based on communications among a network of security systems now will be discussed in detail with an emphasis on highlighting the advantageous features. These embodiments depict the novel and non-obvious arming security systems based on communications among a network of security systems shown in the accompanying drawings, which are for illustrative purposes only. These drawings include the following figures, in which like numerals indicate like parts:
The various embodiments of the present arming security systems based on communications among a network of security systems have several features, no single one of which is solely responsible for their desirable attributes. Without limiting the scope of the present embodiments as expressed by the claims that follow, their more prominent features now will be discussed. After considering this discussion, and particularly after reading the section entitled “Detailed Description,” one will understand how the features of the present embodiments provide the advantages described herein.
One aspect of the present embodiments includes the realization that, historically, security systems have been designed and intended to protect only the property at which the security systems are installed. A typical security system is self-contained, and provides a warning to the property owner only when an intrusion is detected at that same property, and only when the security system is armed. However, potential threats to the property may occur before an intruder crosses the property boundary where the security system is installed, such as when an intrusion occurs at a nearby property. The present embodiments solve this problem by leveraging the functionality of security systems to link together security systems at multiple properties, where each property is protected by a security system and/or an A/V recording and communication device. When an intrusion is detected by a security system and/or an A/V recording and communication device at one of the properties in the network of properties, warnings may be provided to users associated with the other properties in the network that include security systems. Such warnings may provide the users with opportunity to take corrective action, such as by arming their own alarm systems, before the potential threat at the nearby property becomes an actual threat at that user's property. As a result, the safety of that user's property is increased, as well as the safety of the other properties in the network, thereby contributing to public safety.
The following detailed description describes the present embodiments with reference to the drawings. In the drawings, reference numbers label elements of the present embodiments. These reference numbers are reproduced below in connection with the discussion of the corresponding drawing features.
With reference to
With further reference to
The network 112 may be any wireless network or any wired network, or a combination thereof, configured to operatively couple the above-mentioned modules, devices, and systems as shown in
According to one or more aspects of the present embodiments, when a person (may be referred to interchangeably as “visitor”) arrives at the A/V recording and communication device 100, the A/V recording and communication device 100 detects the visitor's presence and begins capturing video images within a field of view of the camera 102. The A/V recording and communication device 100 may also capture audio through the microphone 104. The A/V recording and communication device 100 may detect the visitor's presence by detecting motion using the camera 102 and/or a motion sensor, and/or by detecting that the visitor has depressed the front button on the A/V recording and communication device 100 (in embodiments in which the A/V recording and communication device 100 comprises a doorbell).
In response to the detection of the visitor, the A/V recording and communication device 100 sends an alert to the user's client device 114 (
The video images captured by the camera 102 of the A/V recording and communication device 100 (and the audio captured by the microphone 104) may be uploaded to the cloud and recorded on the remote storage device 116 (
With further reference to
The backend API 120 illustrated
The backend API 120 illustrated in
At block B202, a communication module of the A/V recording and communication device 100 sends a connection request, via the user's network 110 and the network 112, to a device in the network 112. For example, the network device to which the request is sent may be a server such as the server 118. The server 118 may comprise a computer program and/or a machine that waits for requests from other machines or software (clients) and responds to them. A server typically processes data. One purpose of a server is to share data and/or hardware and/or software resources among clients. This architecture is called the client-server model. The clients may run on the same computer or may connect to the server over a network. Examples of computing servers include database servers, file servers, mail servers, print servers, web servers, game servers, and application servers. The term server may be construed broadly to include any computerized process that shares a resource to one or more client processes.
In response to the request, at block B204 the network device may connect the A/V recording and communication device 100 to the user's client device 114 through the user's network 110 and the network 112. At block B206, the A/V recording and communication device 100 may record available audio and/or video data using the camera 102, the microphone 104, and/or any other sensor available. At block B208, the audio and/or video data is transmitted (streamed) from the A/V recording and communication device 100 to the user's client device 114 via the user's network 110 and the network 112. At block B210, the user may receive a notification on his or her client device 114 with a prompt to either accept or deny the call.
At block B212, the process determines whether the user has accepted or denied the call. If the user denies the notification, then the process advances to block B214, where the audio and/or video data is recorded and stored at a cloud server. The session then ends at block B216 and the connection between the A/V recording and communication device 100 and the user's client device 114 is terminated. If, however, the user accepts the notification, then at block B218 the user communicates with the visitor through the user's client device 114 while audio and/or video data captured by the camera 102, the microphone 104, and/or other sensors is streamed to the user's client device 114. At the end of the call, the user may terminate the connection between the user's client device 114 and the A/V recording and communication device 100 and the session ends at block B216. In some embodiments, the audio and/or video data may be recorded and stored at a cloud server (block B214) even if the user accepts the notification and communicates with the visitor through the user's client device 114.
With further reference to
With further reference to
With further reference to
The transfer of digital audio between the user and a visitor may be compressed and decompressed using the audio CODEC 153, which is operatively coupled to the processor 160. When the visitor speaks, audio from the visitor is compressed by the audio CODEC 153, digital audio data is sent through the communication module 146 to the network 112 via the user's network 110, routed by the server 118 and delivered to the user's client device 114. When the user speaks, after being transferred through the network 112, the user's network 110, and the communication module 146, the digital audio data is decompressed by the audio CODEC 153 and emitted to the visitor through the speaker 152, which is driven by the speaker driver 151.
With further reference to
With reference to
With further reference to
The lower portion 216 of the shield 192 may comprise a material that is substantially transparent to infrared (IR) light, but partially or mostly opaque with respect to light in the visible spectrum. The lower portion 216 of the shield 192, therefore, does not interfere with transmission of IR light from the IR light source, which is located behind the lower portion 216. As described in detail below, the IR light source and the IR cut filter, which are both operatively connected to the processor, facilitate “night vision” functionality of the camera 154.
Several advantages flow from the ability of the present embodiments to be connected to the existing household AC power supply. For example, the camera of the present A/V recording and communication doorbell can be powered on continuously. In a typical battery-powered A/V recording and communication doorbell, the camera is powered on only part of the time so that the battery does not drain too rapidly. The present embodiments, by contrast, do not rely on a battery as a primary (or sole) power supply, and are thus able to keep the camera powered on continuously. Because the camera is able to be powered on continuously, it can always be recording, and recorded footage can be continuously stored in a rolling buffer or sliding window. In some embodiments, about 10-15 seconds of recorded footage can be continuously stored in the rolling buffer or sliding window. Also, because the camera is able to be powered on continuously, it can be used for motion detection, thus eliminating any need for a separate motion detection device, such as a passive infrared sensor (PIR). Eliminating the PIR simplifies the design of the A/V recording and communication doorbell and enables the doorbell to be made more compact, although in some alternative embodiments the doorbell may include one or more PIRs and/or other motion detectors, heat source detectors, etc. Also, because the camera is able to be powered on continuously, it can be used as a light detector for use in controlling the current state of the IR cut filter and turning the IR LED on and off. Using the camera as a light detector eliminates any need for a separate light detector, thereby further simplifying the design of the A/V recording and communication doorbell and enabling the doorbell to be made even more compact, although in some alternative embodiments the doorbell may include a separate light detector.
The doorbell 330 includes a faceplate 335 mounted to a back plate (not shown). The faceplate 335 protects the internal contents of the doorbell 330 and serves as an exterior front surface of the doorbell 330. The faceplate 335 may include a button 333 and a light pipe 336. The light pipe 336 may comprise any suitable material, including, without limitation, transparent plastic, that is capable of allowing light produced within the doorbell 330 to pass through. The light may be produced by one or more light-emitting components, such as light-emitting diodes (LED's), contained within the doorbell 330, as further described below. The button 333 may make contact with a button actuator (not shown) located within the doorbell 330 when the button 333 is pressed by a visitor. When pressed, the button 333 may trigger one or more functions of the doorbell 330, as further described below.
With further reference to
The doorbell 330 further comprises passive infrared (PIR) sensors 344-1, 344-2, 344-3 (
With further reference to
With further reference to
The speakers 357 and the microphone 358 may be coupled to the camera processor 370 through an audio CODEC 361. For example, the transfer of digital audio from the user's client device 114 and the speakers 357 and the microphone 358 may be compressed and decompressed using the audio CODEC 361, coupled to the camera processor 370. Once compressed by audio CODEC 361, digital audio data may be sent through the communication module 364 to the network 112, routed by one or more servers 118, and delivered to the user's client device 114 (
With further reference to
With further reference to
With further reference to
With further reference to
Some of the present embodiments may comprise computer vision for one or more aspects, such as object and/or facial recognition. Computer vision includes methods for acquiring, processing, analyzing, and understanding images and, in general, high-dimensional data from the real world in order to produce numerical or symbolic information, e.g., in the form of decisions. Computer vision seeks to duplicate the abilities of human vision by electronically perceiving and understanding an image. Understanding in this context means the transformation of visual images (the input of the retina) into descriptions of the world that can interface with other thought processes and elicit appropriate action. This image understanding can be seen as the disentangling of symbolic information from image data using models constructed with the aid of geometry, physics, statistics, and learning theory. Computer vision has also been described as the enterprise of automating and integrating a wide range of processes and representations for vision perception. As a scientific discipline, computer vision is concerned with the theory behind artificial systems that extract information from images. The image data can take many forms, such as video sequences, views from multiple cameras, or multi-dimensional data from a scanner. As a technological discipline, computer vision seeks to apply its theories and models for the construction of computer vision systems.
One aspect of computer vision comprises determining whether or not the image data contains some specific object, feature, or activity. Different varieties of computer vision recognition include: Object Recognition (also called object classification)—One or several pre-specified or learned objects or object classes can be recognized, usually together with their 2D positions in the image or 3D poses in the scene. Identification—An individual instance of an object is recognized. Examples include identification of a specific person's face or fingerprint, identification of handwritten digits, or identification of a specific vehicle. Detection—The image data are scanned for a specific condition. Examples include detection of possible abnormal cells or tissues in medical images or detection of a vehicle in an automatic road toll system. Detection based on relatively simple and fast computations is sometimes used for finding smaller regions of interesting image data that can be further analyzed by more computationally demanding techniques to produce a correct interpretation.
Several specialized tasks based on computer vision recognition exist, such as: Optical Character Recognition (OCR)—Identifying characters in images of printed or handwritten text, usually with a view to encoding the text in a format more amenable to editing or indexing (e.g., ASCII). 2D Code Reading—Reading of 2D codes such as data matrix and QR codes. Facial Recognition. Shape Recognition Technology (SRT)—Differentiating human beings (e.g., head and shoulder patterns) from objects.
Typical functions and components (e.g., hardware) found in many computer vision systems are described in the following paragraphs. The present embodiments may include at least some of these aspects. For example, with reference to
Image acquisition—A digital image is produced by one or several image sensors, which, besides various types of light-sensitive cameras, may include range sensors, tomography devices, radar, ultra-sonic cameras, etc. Depending on the type of sensor, the resulting image data may be a 2D image, a 3D volume, or an image sequence. The pixel values may correspond to light intensity in one or several spectral bands (gray images or color images), but can also be related to various physical measures, such as depth, absorption or reflectance of sonic or electromagnetic waves, or nuclear magnetic resonance.
Pre-processing—Before a computer vision method can be applied to image data in order to extract some specific piece of information, it is usually beneficial to process the data in order to assure that it satisfies certain assumptions implied by the method. Examples of pre-processing include, but are not limited to re-sampling in order to assure that the image coordinate system is correct, noise reduction in order to assure that sensor noise does not introduce false information, contrast enhancement to assure that relevant information can be detected, and scale space representation to enhance image structures at locally appropriate scales.
Feature extraction—Image features at various levels of complexity are extracted from the image data. Typical examples of such features are: Lines, edges, and ridges; Localized interest points such as corners, blobs, or points; More complex features may be related to texture, shape, or motion.
Detection/segmentation—At some point in the processing a decision may be made about which image points or regions of the image are relevant for further processing. Examples are: Selection of a specific set of interest points; Segmentation of one or multiple image regions that contain a specific object of interest; Segmentation of the image into nested scene architecture comprising foreground, object groups, single objects, or salient object parts (also referred to as spatial-taxon scene hierarchy).
High-level processing—At this step, the input may be a small set of data, for example a set of points or an image region that is assumed to contain a specific object. The remaining processing may comprise, for example: Verification that the data satisfy model-based and application-specific assumptions; Estimation of application-specific parameters, such as object pose or object size; Image recognition—classifying a detected object into different categories; Image registration—comparing and combining two different views of the same object.
Decision making—Making the final decision required for the application, for example match/no-match in recognition applications.
One or more of the present embodiments may include a vision processing unit (not shown separately, but may be a component of the computer vision module 163). A vision processing unit is an emerging class of microprocessor; it is a specific type of AI (artificial intelligence) accelerator designed to accelerate machine vision tasks. Vision processing units are distinct from video processing units (which are specialized for video encoding and decoding) in their suitability for running machine vision algorithms such as convolutional neural networks, SIFT, etc. Vision processing units may include direct interfaces to take data from cameras (bypassing any off-chip buffers), and may have a greater emphasis on on-chip dataflow between many parallel execution units with scratchpad memory, like a manycore DSP (digital signal processor). But, like video processing units, vision processing units may have a focus on low precision fixed-point arithmetic for image processing.
Some of the present embodiments may use facial recognition hardware and/or software, as a part of the computer vision system. Various types of facial recognition exist, some or all of which may be used in the present embodiments.
Some face recognition algorithms identify facial features by extracting landmarks, or features, from an image of the subject's face. For example, an algorithm may analyze the relative position, size, and/or shape of the eyes, nose, cheekbones, and jaw. These features are then used to search for other images with matching features. Other algorithms normalize a gallery of face images and then compress the face data, only saving the data in the image that is useful for face recognition. A probe image is then compared with the face data. One of the earliest successful systems is based on template matching techniques applied to a set of salient facial features, providing a sort of compressed face representation.
Recognition algorithms can be divided into two main approaches, geometric, which looks at distinguishing features, or photometric, which is a statistical approach that distills an image into values and compares the values with templates to eliminate variances.
Popular recognition algorithms include principal component analysis using eigenfaces, linear discriminant analysis, elastic bunch graph matching using the Fisherface algorithm, the hidden Markov model, the multilinear subspace learning using tensor representation, and the neuronal motivated dynamic link matching.
Further, a newly emerging trend, claimed to achieve improved accuracy, is three-dimensional face recognition. This technique uses 3D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin.
One advantage of 3D face recognition is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles, including a profile view. Three-dimensional data points from a face vastly improve the precision of face recognition. 3D research is enhanced by the development of sophisticated sensors that do a better job of capturing 3D face imagery. The sensors work by projecting structured light onto the face. Up to a dozen or more of these image sensors can be placed on the same CMOS chip—each sensor captures a different part of the spectrum.
Another variation is to capture a 3D picture by using three tracking cameras that point at different angles; one camera pointing at the front of the subject, a second one to the side, and a third one at an angle. All these cameras work together to track a subject's face in real time and be able to face detect and recognize.
Another emerging trend uses the visual details of the skin, as captured in standard digital or scanned images. This technique, called skin texture analysis, turns the unique lines, patterns, and spots apparent in a person's skin into a mathematical space.
Another form of taking input data for face recognition is by using thermal cameras, which may only detect the shape of the head and ignore the subject accessories such as glasses, hats, or make up.
Further examples of automatic identification and data capture (AIDC) and/or computer vision that can be used in the present embodiments to verify the identity and/or authorization of a person include, without limitation, biometrics. Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in various forms of identification and access control. Biometric identifiers are the distinctive, measurable characteristics used to label and describe individuals. Biometric identifiers can be physiological characteristics and/or behavioral characteristics. Physiological characteristics may be related to the shape of the body. Examples include, but are not limited to, fingerprints, palm veins, facial recognition, three-dimensional facial recognition, skin texture analysis, DNA, palm prints, hand geometry, iris recognition, retina recognition, and odor/scent recognition. Behavioral characteristics may be related to the pattern of behavior of a person, including, but not limited to, typing rhythm, gait, and voice recognition.
The present embodiments may use any one, or any combination of more than one, of the foregoing biometrics to identify and/or authenticate a person who is either suspicious or who is authorized to take certain actions with respect to a property or expensive item of collateral. For example, the computer vision module 163, and/or the camera 154 and/or the processor 160 may receive information about the person using any one, or any combination of more than one, of the foregoing biometrics.
One aspect of the present embodiments includes the realization that, historically, security systems have been designed and intended to protect only the property at which the security systems are installed. A typical security system is self-contained, and provides a warning to the property owner only when an intrusion is detected at that same property, and only when the security system is armed. However, potential threats to the property may occur before an intruder crosses the property boundary where the security system is installed, such as when an intrusion occurs at a nearby property. The present embodiments solve this problem by leveraging the functionality of security systems to link together security systems at multiple properties, where each property is protected by a security system and/or an A/V recording and communication device. When an intrusion is detected by a security system and/or an A/V recording and communication device at one of the properties in the network of properties, warnings may be provided to users associated with the other properties in the network that include security systems. Such warnings may provide the users with opportunity to take corrective action, such as by arming their own alarm systems, before the potential threat at the nearby property becomes an actual threat at that user's property. As a result, the safety of that user's property is increased, as well as the safety of the other properties in the network, thereby contributing to public safety.
For example, in some of the present embodiments, a method for a security network may include, in response to a security event detected by a first security system, receiving security event data from the first security system; analyzing the security event data to determine a security event procedure for a second security system based on the security event data; when the security event procedure for the second security system includes an automatic arming action; transmitting the automatic arming action to the second security system; when the security event procedure for the second security system includes an arming action request: generating and transmitting, to a client device associated with the second security system, the arming action request; in response to transmitting the arming action request, receiving from the client device, an arming action; and transmitting, to the second security system, the arming action.
The user's network 408, 409 may include any or all of the components and/or functionality of the user's network 110 described herein. The system 400 may also include one or more client devices 404, 406, which in various embodiments may be configured to be in network communication and/or associated with the first A/V recording and communication device 402. The system 400 may further include one or more client devices 405, 407, which in various embodiments may be configured to be in network communication and/or associated with the second A/V recording and communication device 403. The client devices 404, 406, 405, 407 may comprise, for example, a mobile phone such as a smartphone, or a computing device such as a tablet computer, a laptop computer, a desktop computer, etc. The client devices 404, 406, 405, 407 may include any or all of the components and/or functionality of the client device 114 and/or the client device 800 described herein. In some embodiments, the client devices 404, 406 may not be associated with the first A/V recording and communication device 402 and the client devices 405, 407 may not be associated with the second A/V recording and communication device 403. In other words, the user/owner of the client device(s) 404, 406, 405, 407 may not also use/own an A/V recording and communication device.
The system 400 may further include a first smart-home hub device 411 (which may alternatively be referred to herein as the first hub device 411) connected to the user's network 408. The first smart-home hub device 411 (also known as a home automation hub, gateway device, etc.), may comprise any device that facilitates communication with and control of the sensors 414, automation devices 416, and/or the one or more first A/V recording and communication devices 402. For example, the first smart-home hub device 411 may be a component of a home automation system installed at a first property. The system 400 may further include a second smart-home hub device 412 (which may alternatively be referred to herein as the second hub device 412) connected to the user's network 409. The second smart-home hub device 412 (also known as a home automation hub, a gateway device, etc.), may comprise any device that facilitates communication with and control of the sensors 418, automation devices 420, and/or the one or more second A/V recording and communication devices 403. For example, the second smart-home hub device 412 may be a component of a home automation system installed at a second property.
Though not shown in
Home automation, or smart home, is building automation for the home. It involves the control and automation of various devices and/or systems, such as lighting, heating (such as smart thermostats), ventilation, air conditioning (HVAC), blinds/shades, and security, as well as home appliances, such as washers/dryers, ovens, or refrigerators/freezers. Wi-Fi is often used for remote monitoring and control. Smart home devices (e.g., the first and the second hub devices 411, 412, the sensors 414, 418, the automation devices 416, 420, the first and the second A/V recording and communication devices 402, 403, etc.), when remotely monitored and controlled via the network (Internet/PSTN) 410, may be considered to be components of the Internet of Things. Smart home systems may include switches and/or sensors (e.g., the sensors 416, 418) connected to a central hub such as the first smart-home hub device 411 or the second smart-home hub device 412, sometimes called a gateway, from which the system may be controlled with a user interface. The user interface may include any or all of a wall-mounted terminal, software installed on the client devices 404, 405, 406, 407 (e.g., a mobile application), a tablet computer or a web interface, often but not always via Internet cloud services. The home automation system may use one or more communication protocols, including either or both of wired and wireless protocols, including but not limited to Wi-Fi, X10, Ethernet, RS-485, 6LoWPAN, Bluetooth LE (BTLE), ZigBee, and Z-Wave.
The one or more sensors 414, 418 may include, for example, at least one of a door sensor, a window sensor, a contact sensor, a tilt sensor, a temperature sensor, a carbon monoxide sensor, a smoke detector, a light sensor, a glass break sensor, a motion sensor, a thermostat, and/or other sensors that may provide the user/owner of the first security system 422 of a security event at his or her property.
The one or more automation devices 416, 420 may include, for example, at least one of an outdoor lighting system, an indoor lighting system, and indoor/outdoor lighting system, a temperature control system (e.g., a thermostat), a shade/blind control system, a locking control system (e.g., door lock, window lock, etc.), and/or other automation devices.
As described herein, in some of the present embodiments, some or all of the user's network 408, the client device 404, 406, the first A/V recording and communication device 402, the first smart-home hub device 411, the sensors 414, and the automation devices 416 may be referred to as a first security system 422, which may be installed at a first property or premises. In addition, in some of the present embodiments, some or all of the user's network 409, the client device 405, 407, the second A/V recording and communication device 403, the second smart-home hub device 412, the sensors 418, and the automation devices 420 may be referred to as a second security system 424, which may be installed at a second property or premises. The first security system 422 and the second security system 424 may be part of a network of security systems. Although only the first security system 422 and the second security system 424 are included in the illustration of the system 400, this illustration is not intended to be limiting. In some embodiments, any number of security systems (one or more) may be incorporated into the network of security systems. For example, in an embodiment where the network of security systems includes each of the security systems in a given neighborhood, many of the homes in the neighborhood may have a security system, and as a result, the network of security systems may include the security systems from each of the homes that are part of the network of security systems (e.g., each of the homes that have security systems in the neighborhood that have “opted in” to the network of security systems). In addition, each of the security systems in the network of security systems may have their own security event procedures 499 that may be implemented in response to security events from any other security system in the network of security systems (
With further reference to
In various embodiments, the device application 443 may also configure the processor 440 to generate and transmit an output signal 447 that may include the image data 448, the audio data 444, the text data 445, and/or the motion data 446. In some of the present embodiments, the output signal 447 may be transmitted to the backend server(s) 430 using the communication module 438, and the backend server(s) 430 may transmit (or forward) the output signal 447 to the client device 404, 406, 405, 407. In other embodiments, the output signal 447 may be transmitted directly to the client device 404, 406.
In further reference to
The image data 448 may include still images, live video, and/or pre-recorded video. The image data 448 may be recorded by the camera 434 in a field of view of the camera 434. The processor 440 may be configured to transmit the image data 448 (e.g., as live streaming video) to the client devices 404, 406, the first hub device 411, and/or the backend server 430. The image data 460 may take on various forms and formats as appropriate to the requirements of a specific application in accordance with the present embodiments. As described herein, the term “record” may also be referred to as “capture” as appropriate to the requirements of a specific application in accordance with the present embodiments.
In further reference to
In some of the present embodiments, such as those where the first A/V recording and communication device 402 is similar to that of the A/V recording and communication doorbell 130 of
With further reference to
In various embodiments, the device application 457 may also configure the processor 454 to generate and transmit an output signal 461 that may include the image data 462, the audio data 458, the text data 459, and/or the motion data 460. In some of the present embodiments, the output signal 461 may be transmitted to the backend server(s) 430 using the communication module 452, and the backend server(s) 430 may transmit (or forward) the output signal 461 to the client device 404, 405, 406, 407. In other embodiments, the output signal 461 may be transmitted directly to the client device 405, 407.
In further reference to
The image data 462 may include still images, live video, and/or pre-recorded video. The image data 462 may be recorded by the camera 463 in a field of view of the camera 463. The processor 454 may be configured to transmit the image data 462 (e.g., as live streaming video) to the client devices 405, 407, the second hub device 412, and/or the backend server 430. The image data 462 may take on various forms and formats as appropriate to the requirements of a specific application in accordance with the present embodiments. As described herein, the term “record” may also be referred to as “capture” as appropriate to the requirements of a specific application in accordance with the present embodiments.
In further reference to
In some of the present embodiments, such as those where the second A/V recording and communication device 403 is similar to that of the A/V recording and communication doorbell 130 of
With further reference to
The smart-home hub application 472 may further configure the processor 469 to generate the user alert 481. The user alert 481 may include the security event data 473 described herein. The user alert 481 may also, in some embodiments, include information from the user alert 479 received from the first A/V recording and communication device 402.
In addition, the smart-home hub application 472 may configure the processor 469 to receive the image data 448, the audio data 444, the text data 445, the motion data 446, and/or the user alert 479 from the first A/V recording and communication device 402 using the communication module 467. In various embodiments, the smart-home hub application 472 may also configure the processor 469 to generate and transmit an output signal 478 that may include the image data 448, 475, the audio data 444, 476, the text data 445, 477, the motion data 446, the sensor data 474, the user alert 479, 481, and/or the arming action 479. In some of the present embodiments, the output signal 478 may be transmitted to the backend server(s) 430 using the communication module 467, and the backend server 430 may transmit the output signal 478 to the client device 404, 406 and/or the client device 405, 407 (e.g., in embodiments where the client device 405, 407 are associated with a security system in the network of security systems). In other embodiments, the output signal 478 may be transmitted directly to the client device 404, 406.
In some of the present embodiments, some or all of the sensor data 474, the image data 448, 475, the motion data 446, the audio data 444, 476, and the text data 445, 477 may be included in the security event data 473. The security event data 473 may comprise all of the data generated in response to a security event. For example, if a person breaks into a home, the security event data 473 may include the sensor data 474 generated by the door or window sensors that were breached, the image data 448 generated by the first A/V recording and communication device 402 at the time of the security event, the motion data 466 generated by the motion sensors of the sensor 414 and/or the motion sensor 435 of the first A/V recording and communication device 402, the audio data 476 recorded by the first hub device 411, and/or the text data 477 describing the security event based on the sensor data 474, the image data 448, the motion data 446, and/or the audio data 476.
In some of the present embodiments, the smart-home hub application 472 may configure the processor 469 to generate the arming action 479. In some embodiments, generating the arming action 479 may include arming/disarming the first security system 422 controlled by the first hub device 411. For example, the arming action 479 may include a disarmed, an armed stay, armed away, armed vacation, or other armed mode for the first security system 422. In some of the present embodiments, the first hub device 411 may generate the arming action 479 in response to receiving the arming action 479 over the user's network 408 and/or the network (Internet/PSTN) 410 (e.g., from the backend server 430 and/or the client device 404, 406). In some embodiments, the smart-home hub application 472 may configure to the processor 469 to transmit information representative of the arming action 479 to the backend server 430 and/or the client device 404, 406. For example, the information representative of the arming action 479 may include the arming status of the first security system 422 (e.g., armed away, armed stay, disarmed, etc.). The smart-home hub application 472 may also configure the processor 469 to monitor the sensors 414, the automation devices 416, and/or the first A/V recording and communication device(s) 402 according to the arming action 479.
The arming actions 479, as described herein, may include an armed stay, an armed away, an armed vacation, a disarmed mode, and/or other modes, such as a custom mode of the user. In the armed stay mode, the sensors 414 inside the property (e.g., motion sensors) may be disarmed while the sensors 414 and/or the first A/V recording and communication devices 402 outside and along the perimeter of the property (e.g., door sensors, window sensors, security cameras, etc.) may be armed. In addition, during the armed stay mode, at least one of the automation devices 416 (e.g., an outdoor lighting automation system) may be activated between certain hours, such as 6:00 p.m. and 4:00 a.m. In an armed away mode, the sensors 414 inside the property (e.g., the motion sensors), the sensors 414 outside and along the perimeter of the property (e.g., door sensors, window sensors, etc.), and/or the first A/V recording and communication devices 402 (e.g., security cameras, floodlight cameras, etc.) may be armed. In addition, during an armed away mode, one or more of the automation devices 416 (e.g., interior and/or exterior lighting automation systems) may be activated according to an activation schedule (e.g., interior lights on from 5:00 p.m. to 9:00 p.m., exterior lights on from 6:00 p.m. to 8:00 p.m., blinds/shades opened from 12:00 p.m. to 5:00 p.m. and closed from 5:00 p.m. to 4:00 a.m., etc.) in order to provide an indication that somebody is home, even when they are not. In an armed vacation mode, the sensors 414, the automation devices 416, and/or the first A/V recording and communication devices 402 may be armed and disarmed similar to the armed away mode, however, any alerts and security events may also be sent to neighbors and/or law enforcement. In a disarmed mode, all of the sensors 414 and/or the automation devices 416 may be deactivated (other than the automation devices 416 in use by the users separate from an arming mode of the first security system 422). However, in a disarmed mode, the one or more first A/V recording and communication devices 402 (e.g., security cameras, floodlight cameras, video doorbells, etc.) may be in an active state for detecting motion and/or recording activity in the field of view of the one or more first A/V recording and communication devices 402. In a custom mode, the user/owner of the first security system 422 may configure each of the sensors 414, the automation devices 416, and/or the first A/V recording and communication devices 402. For example, in a custom mode, “Summer,” the user/owner may arm each of the door sensors but disable the window sensors (e.g., where windows may be left open for air flow). In addition, the user/owner may activate each of the first A/V recording and communication devices 402 in the back yard to record between 8:00 am and 5:00 p.m. (e.g., because the kids may regularly play in the back yard during the Summer months).
In further reference to
With further reference to
In some of the present embodiments, the first hub device 411 may analyze the sensor data 474, the image data 448, 475, the motion data 446, and/or the audio data 444, 476 to determine occupancy data for the first property. For example, the sensor data 474 may include motion data from motion sensors of the sensors 414 interior to the property and/or data indicative of a light switch interior to the home being turned on/off within the last 10 seconds, 20 seconds, etc. from a lighting automation system of the automation devices 416, the image data 448, 475 may include the presence of person(s) (e.g., based on an analysis using computer vision), the motion data 446 may include an indication of the presence of persons interior to the home (e.g., in embodiments where one of the first A/V recording and communication devices 402 is indoors), and/or the audio data 444, 476 may include voices, which may provide an indication of the presence of person(s). As a result, the first hub device 411 may analyze the sensor data 474, the image data 448, 475, the motion data 446, and/or the audio data 444, 476 to determine the occupancy data. In some of the present embodiments, the occupancy data may be a binary determination, such as occupied and not occupied. In addition, in some embodiments, the occupancy data may also include an estimate of how many people and/or animals are present and/or the location of the people and/or animals at the property (e.g., upstairs, downstairs, in the living room, etc.).
Some non-limiting examples of sensor triggers include, for example, if the sensor 414 is a door or window sensor, the door or window opening or closing. When the door or window is closed, and then is opened, this may be a sensor trigger that results in the door or window sensor generating sensor data 474 representative of the sensor trigger, for example. If the sensor 414 is a smoke detector or other sensor type that activates based on threshold amounts, for example, the sensor trigger may be the threshold amount being reached. For example, the smoke detector may only activate when the smoke levels reach a certain threshold, and when this threshold is reached, the sensor trigger may be said to have occurred, and sensor data 474 may be generated in response. If the sensor 414 is a thermometer, for example, a threshold temperature being reached may be the sensor trigger. In another example, if the sensor 414 is a motion sensor, the sensor trigger may be a threshold amount of detected motion.
In alternative embodiments, the sensor data 474 (including data representative of the sensor trigger) may be received by the first A/V recording and communication device 402 rather than, or in addition to, the first hub device 411. For example, some environments may not have a smart-home hub device. In these environments, the first A/V recording and communication device 402 may perform at least some of the functions of the first hub device 411 described herein, including receiving, processing, and/or transmitting the sensor data 474. For example, the sensors 414 and/or the automation devices 416 may be in communication with the first A/V recording and communication device 402, rather than, or in addition to, the first hub device 411.
The smart-home hub application 490 may further configure the processor 487 to generate the user alert 497. The user alert 497 may include the security event data 491 described herein. The user alert 497 may also, in some embodiments, include the information from the user alert 480 received from the second A/V recording and communication device 403.
In addition, the smart-home hub application 490 may configure the processor 487 to receive the image data 462, the audio data 458, the text data 459, the motion data 460, and/or the user alert 480 from the second A/V recording and communication device 403 using the communication module 485. In various embodiments, the smart-home hub application 490 may also configure the processor 487 to generate and transmit an output signal 496 that may include the image data 462, 493, the audio data 458, 494, the text data 459, 495, the motion data 460, the sensor data 492, the user alert 480, 497, and/or the arming action 498. In some of the present embodiments, the output signal 496 may be transmitted to the backend server(s) 430 using the communication module 485, and the backend server 430 may transmit the output signal 496 to the client device 405, 407 and/or the client device 404, 406 (e.g., in embodiments where the client device 404, 406 are associated with a security system in the network of security systems). In other embodiments, the output signal 496 may be transmitted directly to the client device 405, 407.
In some of the present embodiments, some or all of the sensor data 492, the image data 462, 493, the motion data 460, the audio data 458, 494, and the text data 459, 495 may be included in the security event data 491. The security event data 491 may comprise all of the data generated in response to a security event. For example, if a person breaks into a home, the security event data 491 may include the sensor data 492 generated by the door or window sensors that were breached, the image data 493 generated by the second A/V recording and communication device 403 at the time of the security event, the motion data 460 generated by the motion sensors of the sensor 418 and/or the motion sensor 449 of the second A/V recording and communication device 403, the audio data 494 recorded by the second hub device 412, and/or the text data 495 describing the security event based on the sensor data 492, the image data 462, the motion data 460, and/or the audio data 494.
In some of the present embodiments, the smart-home hub application 490 may configure the processor 487 to generate the arming action 498. In some embodiments, generating the arming action 498 may include arming/disarming the first security system 422 controlled by the second hub device 412. For example, the arming action 498 may include a disarmed, an armed stay, armed away, armed vacation, or other mode for the first security system 422. In some of the present embodiments, the second hub device 412 may generate the arming action 498 in response to receiving the arming action 498 over the user's network 409 and/or the network (Internet/PSTN) 410 (e.g., from the backend server 430 and/or the client device 405, 407). In some embodiments, the smart-home hub application 490 may configure to the processor 487 to transmit information representative of the arming action 498 to the backend server 430 and/or the client device 405, 407. For example, the information representative of the arming action 498 may include the arming status of the first security system 422 (e.g., armed away, armed stay, disarmed, etc.). The smart-home hub application 490 may also configure the processor 487 to monitor the sensors 418, the automation devices 420, and/or the second A/V recording and communication device(s) 403 according to the arming action 498.
The arming actions 498, as described herein, may include an armed stay, an armed away, an armed vacation, a disarmed mode, and/or other modes, such as custom mode of the user. In the armed stay mode, the sensors 418 inside the property (e.g., motion sensors) may be disarmed while the sensors 418 and/or the second A/V recording and communication devices 403 outside and along the perimeter of the property (e.g., door sensors, window sensors, security cameras, etc.) may be armed. In addition, during the armed stay mode, at least one of the automation devices 420 (e.g., an outdoor lighting automation system) may be activated between certain hours, such as 6:00 p.m. and 4:00 a.m. In an armed away mode, the sensors 418 inside the property (e.g., the motion sensors), the sensors 418 outside and along the perimeter of the property (e.g., door sensors, window sensors), and/or the second A/V recording and communication devices 403 (e.g., security cameras, video doorbells, spotlight cameras, etc.) may be armed. In addition, during an armed away mode, one or more of the automation devices 420 (e.g., interior and/or exterior lighting automation systems) may be activated according to an activation schedule (e.g., interior lights on from 5:00 p.m. to 9:00 p.m., exterior lights on from 6:00 p.m. to 8:00 p.m., blinds/shades opened from 12:00 p.m. to 5:00 p.m. and closed from 5:00 p.m. to 4:00 a.m., etc.) in order to provide an indication that somebody is home, even when they are not. In an armed vacation mode, the sensors 418, the automation devices 420, and/or the second A/V recording and communication devices 403 may be armed and disarmed similar to the armed away mode, however, any alerts and security events may also be sent to neighbors and/or law enforcement. In a disarmed mode, all of the sensors 418 and/or the automation devices 420 may be deactivated (except for the automation device 420 in use by the user separate from the arming mode of the second security system 424). However, in a disarmed mode, the one or more second A/V recording and communication devices 403 (e.g., security cameras, floodlight cameras, video doorbells, etc.) may be in an active state for detecting motion and/or recording activity in the field of view of the one or more second A/V recording and communication devices 403. In a custom mode, the user/owner of the second security system 422 may configure each of the sensors 418, the automation devices 420, and/or the second A/V recording and communication devices 403. For example, in a custom mode, “Keep Cool at Home,” the user/owner may arm each of the door sensors and the window sensors. In addition, the user/owner may deactivate each of the motion sensors of the sensors 418 inside of the house (e.g., because the user/owner may be inside the home). In addition, the thermostat of the automation devices 420 may be set to 72 degrees (e.g., to keep cool in the heat) and the blinds/shades automation system of the automation devices 420 may be set to a closed state (e.g., to keep direct sunlight out of the house).
In further reference to
With further reference to
Some non-limiting examples of sensor triggers include, for example, if the sensor 418 is a door or window sensor, the door or window opening or closing. When the door or window is closed, and then is opened, this may be a sensor trigger that results in the door or window sensor generating sensor data 492 representative of the sensor trigger, for example. If the sensor 418 is a smoke detector or other sensor type that activates based on threshold amounts, for example, the sensor trigger may be the threshold amount being reached. For example, the smoke detector may only activate when the smoke levels reach a certain threshold, and when this threshold is reached, the sensor trigger may be said to have occurred, and sensor data 492 may be generated in response. If the sensor 418 is a thermometer, for example, a threshold temperature being reached may be the sensor trigger. In another example, if the sensor 418 is a motion sensor, the sensor trigger may be a threshold amount of detected motion.
In some of the present embodiments, the second hub device 412 may analyze the sensor data 492, the image data 462, 493, the motion data 462, and/or the audio data 458, 494 to determine occupancy data for the second property. For example, the sensor data 492 may include motion data from motion sensors of the sensors 418 interior to the property and/or data indicative of a light switch interior to the home being turned on/off within the last 10 seconds, 20 seconds, etc. from a lighting automation system of the automation devices 420, the image data 462, 493 may include the presence of person(s) (e.g., based on an analysis using computer vision), the motion data 462 may include an indication of the presence of persons interior to the home (e.g., in embodiments where one of the second A/V recording and communication devices 403 is indoors), and/or the audio data 458, 494 may include voices, which may provide an indication of the presence of person(s). As a result, the second hub device 412 may analyze the sensor data 492, the image data 462, 493, the motion data 462, and/or the audio data 458, 494 to determine the occupancy data. In some of the present embodiments, the occupancy data may be a binary determination, such as occupied and not occupied. In addition, in some embodiments, the occupancy data may also include an estimate of how many people and/or animals are present and/or the location of the people and/or animals at the property (e.g., upstairs, downstairs, in the living room, etc.).
In alternative embodiments, the sensor data 492 (including data representative of the sensor trigger) may be received by the second A/V recording and communication device 403 rather than, or in addition to, the second hub device 412. For example, some environments may not have a smart-home hub device. In these environments, the second A/V recording and communication device 403 may perform at least some of the functions of the second hub device 412 described herein, including receiving, processing, and/or transmitting the sensor data 492. For example, the sensors 418 and/or the automation devices 420 may be in communication with the second A/V recording and communication device 403, rather than, or in addition to, the second hub device 412.
In various embodiments, and as described below, in response to a security event detected by the first security system 422 (e.g., by the first hub device 411), the processor 502 of the backend server 430 may receive the security event data 473 from the first security system 422; analyze the security event data 473 to determine a security event procedure 499 for the second security system 424 (e.g., the security system controlled by the second hub device 412) based on the security event data 473; when the security event procedure 499 for the second security system 424 includes an automatic arming action (e.g., the arming action 479 that does not require input from a user of the client device 405, 407): transmit the automatic arming action to the second security system 424; when the security event procedure 499 for the second security system 424 includes an arming action request (e.g., the arming action 498 is determined in response to an input from the user of the client device 405, 407): generate and transmit, to the client device 405, 407 associated with the second security system 424 (e.g., the security system controlled by the second hub device 412), the arming action request; in response to transmitting the arming action request, receive from the client device 405, 407, the arming action 498; and transmit, to the second security system 424 (e.g., the second hub device 412), the arming action 498.
In further reference to
For example, the security system controlled by the first hub device 411 may be part of a network of security systems, and in response to a security event being detected by the first hub device 411, the source identifying data 510 may be used to determine which other smart-home hub devices (e.g., the second hub device 412) are included in the network of security systems that should be notified. This determination may be made based on proximity, in some embodiments. In such embodiments, the location data of the security systems may be used to determine which other smart-home hub devices to notify of the security event. In other embodiments, the determination of which other security systems to notify may be made based on a determination of which security systems have opted-in to the network. For example, a user/owner of a security system may opt-in to receive notifications of security events and/or set a security event procedure 499 for any security events that are detected by any of the security systems in the network(s) of security systems that the security system of the user/owner is included.
In some embodiments, the server application 508 may further configure the processor 502 to generate and transmit a report signal (not shown) to a third-party client device (not shown), which may be associated with a law enforcement agency, for example. The report signal sent to the law enforcement agency may include information indicating an approximate location of where the security event data 473, 491 was captured, which may assist the law enforcement agency with apprehending the criminal perpetrator from the security event data 473, 491.
With further reference to
In addition, the security event procedures 499 may differ for each of the security systems based on the threat level of the security event, the proximity of the security system experiencing the security event to the security system the security event procedure 499 relates to (e.g., the threat level of the security event detected by the first hub device 411 and/or the proximity of the first hub device 411 to the second hub device 412), and/or the clock data (e.g., the time of day). With reference to
In another example, the proximity of the security systems may be used. For example, with respect to
In some of the present embodiments, in addition to, or in lieu of, the threat level and/or the proximity, clock data may be used by the security systems. For example, with respect to
In some of the present embodiments, the server application 508 may configure the processor 502 of the backend server 430 to determine the occupancy data of the properties where the security systems are located. For example, similar to that described above with respect to the first hub device 411 and the second hub device 412, the backend server 430 may analyze the security event data 473, 491 to determine the occupancy data. In some embodiments, the backend server 430 may query the first hub device 411 and/or the second hub device 412 periodically to determine the occupancy data.
In some of the present embodiments, the security event may be verified by the backend server 430 prior to executing the security event procedures 499 for other security systems in the network of security systems. In some embodiments, the security events may be verified if a user of the security system where the security event was detected performs an action(s) in response to receiving a notification (e.g., user alert) of the security event. For example, if the user of the client device 404, 406 in response to receiving the user alert 479, 481 from the first security system 422 activates an alarm, alerts law enforcement, contacts a security monitoring service, changes the arming action of the first security system 422 (e.g., by executing the arming action 479), and/or performs another action, the security event may be determined to be verified. In any embodiment, the security event may be verified by the security monitoring service, such as where the first security system 422 is configured to transmit the security event data 473 to the security monitoring service. In such embodiments, the security monitoring service may review the security event data 473 and verify the security event (e.g., by alerting law enforcement, sounding an alarm, notifying the user/owner of the first security system 422, providing a verification input, and/or another action). In embodiments where the source (e.g., person, animal, object (e.g., a gun)) of the security event is captured in the image data (e.g., the image data 448, 475 of the first security system), the image data may be analyzed using facial recognition, facial detection, object detection, object recognition, or other biometric analysis, as described above, to determine if the person, animal, and/or object is a threat. To determine if the person, animal, and/or object is a threat, the person, animal, and/or object may be compared to a database of suspicious person (e.g., a police database), a database of dangerous animals, and/or a database of suspicious objects (e.g., guns and other weapons), respectively, for example. The determination of a threat may provide verification of the security event.
Now referring to
With further reference to
In the illustrated embodiment of
Now referring to
The process 1500, at block B602, displays, by the processor on a display, the user alert. For example, the processor 534 of the client device 405 may display the user alert 479 and/or the user alert 481 on the display 525 of the client device 405. The user alert 479, 481, as described above, may include any of the security event data 473 generated by the first hub device 411 and/or the first A/V recording and communication device 402 including the sensor data 474, the image data 448, 475 (e.g., video data captured by the camera 434 of the first A/V recording and communication device 402 at the time of the security event), the motion data 446, the audio data 444, 476, and/or the text data 445, 477. For example, the user alert 479, 481 may include a description of the type of security alert detected by the first security system 422 (e.g., the first hub device 411 and/or the first A/V recording and communication device 402). In addition, the user alert 479, 481 may include an arming action request (e.g., a request for the arming action 498). The arming action request may include a list of the arming actions 498 available to the user of the client device 405 (e.g., arm away, arm stay, arm vacation, disarm, etc.).
In addition, in some of the present embodiments, the arming action request may include occupancy data of the second property where the second hub device 412 is located. In such an example, the sensor data 492 from the sensors 418 (e.g., the motion data from motion sensors), the motion data 460 from the second A/V recording and communication device 403, and/or the audio data 458, 494 may be used (e.g., by the second hub device 412 and/or the backend server 430) to determine the occupancy data of the second property where the second security system 424 (e.g., the second hub device 412) is installed. In some of the present embodiments, the user alert 479, 481 may also include the arming status of the second security system 424 (e.g., armed away, armed stay, disarmed, etc.). In embodiments where the user alert 479, 481 includes the occupancy data and/or the arming status of the second security system 424, the arming action request may include at least one recommended arming action based on the occupancy data of the second property where the second security system 424 is located and/or the arming status of the second security system 424. For example, if, based on the occupancy data, it is determined that a person is present within the property, the arming action 498 recommendation may include an armed stay mode (or another mode configured for the presence of persons within the property). In another example, if, based on the arming status, it is determined that the second security system 424 is in armed vacation mode, the arming action 498 recommendation may include switching to an armed away mode (which, in some embodiments, may be a more secure setting).
In addition, in some embodiments, the arming action request may include additional arming actions 498 such as activating or adjusting the settings of one or more of the automation devices 420 installed at the second property (e.g., turning on the indoor and/or outdoor lights of a lighting automation system) and/or activating one or more of the A/V recording and communication devices installed at the second property (e.g., activating the second A/V recording and communication device 403 to record the image data 462, activating other security cameras to record image data, and/or turning on floodlights and/or spotlights of A/V recording and communication devices that include floodlights and/or spotlights).
In some of the present embodiments, the user alert 479, 481 displayed on the client device 405 may include the video and/or images recorded by the first A/V recording and communication device 402 during the security event. In other embodiments, the user alert 479, 481 may include live streaming video of the first A/V recording and communication device 402 and/or other A/V recording and communication devices that are part of the first security system 422. Viewing the video and/or images may help the user of the client device 405 determine if the security event is a threat and/or what actions the user of the client device 405 should take. In other embodiments, the image data 462, 493 from the second security system 424 may be streamed to the client device 405 along with the user alert 479, 481. This way, the user of the client device 405 may view his or her property where the second security system 424 is located to determine if his or her property is safe and secure.
With further reference to
The process 1500, at block B606, transmits, by the processor using the communication module, the arming action to the second security system. For example, the processor 534 of the client device 405 using the communication module 530 may transmit the arming action 498 to the second hub device 412 (and/or the second A/V recording and communication device 403) for arming the second security system 424. The arming action 498 may be transmitted to the backend server 430, and the backend server 430 may transmit (or forward) the arming action to the second hub device 412 (and/or the second A/V recording and communication device 403). In other embodiments, the arming action 498 may be transmitted directly to the second hub device 412 and/or the second A/V recording and communication device 403.
Now referring to
For example, the security event data 473 included in the user alert 479, 481 may include the sensor data 474 generated by the sensors 414 and/or the automation devices 418, the image data 448, 475 generated by the first A/V recording and communication device 402 and/or the first hub device 411, the motion data 446 generated by the first A/V recording and communication device 402 and/or a motion sensor of the sensors 414, the audio data 444, 476 generated by the first A/V recording and communication device 402 and/or the first hub device 411, and/or the text data 445, 477 generated by the A/V recording and communication device, the first hub device 411, the backend server 430, and/or a user of the client device 404, 406 associated with the first security system 422. The user alert 479, 481 may display on the display 525 of the client device 405 as a notification, such as a push-notification, for interaction by the user of the client device 405. For example, the user alert 479, 481 may display as the text data 445, 477 describing the security event based on the security event data 473 (e.g., “potential break in at 742 Evergreen Terrace” or “suspicious activity detected at 742 Evergreen Terrace”). For example, in some of the present embodiments, the backend server 430 may receive the security event data 473 from the first A/V recording and communication device 402 and/or the first hub device 411 and analyze the security event data 473 to determine the information to include in the user alert 479, 481 for transmitting to the client device 405. The analysis may be based on the security event procedures 499 for the second security system 424 (e.g., the second hub device 412 and/or the second A/V recording and communication device 403) associated with the client device 405.
The process 1600, at block B610, receives, by the processor using the communication module, occupancy data. For example, the processor 534 of the client device 405, using the communication module 534, may receive the occupancy data pertaining to the second security system 424. In some embodiments, the client device 405 may receive the occupancy data in response to querying the backend server 430 and/or the second hub device 412. In other embodiments, the occupancy data may be retrieved by the backend server 430 and transmitted to the client device 405 in response to the security event (e.g., as part of the security event procedures 499). For example, in such an embodiment, the backend server 430 may receive and/or determine the occupancy data periodically (e.g., without limitation, every 10 seconds, every 30 seconds, every minute, during each check-in by the second hub device 412, etc.). In any embodiment, the occupancy data may be based on the sensor data 492, the audio data 448, 494, the image data 462, 493, and/or the motion data 460. For example, if the sensors 418 include at least one motion sensor interior to the property where the second hub device 412 (and thus the second security system 424) is located, the sensor data 492 may include detected motion by the motion sensors which may be indicative of the property being occupied. In another example, the audio data 458, 494 may be analyzed to determine if voices are heard, which may be indicative of the property being occupied. As another example, the motion data 460 of the second A/V recording and communication device 403 (and/or other A/V recording and communication devices) may be analyzed and, dependent on the location of the second A/V recording and communication device 403 (e.g., inside or outside), the motion data 460 may be indicative of the property being occupied (as mentioned above, in some embodiments, the motion data 460 may be based on the image data 462 generated by the second A/V recording and communication device 403). For another example, the image data 493 generated by the second hub device 412 (e.g., when the second hub device 412 is located interior to the property), may be analyzed to determine if the property is occupied. In some of the present embodiments, as described above, the occupancy data may be a binary determination, such as occupied and not occupied. In addition, in some embodiments, the occupancy data may also include an estimate of how many people and/or animals are present and/or the location of the people and/or animals at the property (e.g., upstairs, downstairs, in the living room, etc.).
In some of the present embodiments, the occupancy data may be used by the backend server 430 and/or the client device 405 to determine the arming actions 498 to recommend (e.g., the arming action recommendation) for the second security system 424. For example, as described above, if the occupancy data is indicative of a person(s) being present within the property, the arming actions 498 recommended may include an armed stay mode. For example, the armed stay mode may include the door and window sensors of the sensors 418 being activated and/or the interior motion sensors of the sensors 418 being disabled (e.g., the motion data generated by the motion sensors interior to the property may be ignored). By analyzing the occupancy data to make the arming action recommendations, the arming actions 498 presented to the user of the client device 405 may be more useful (e.g., may avoid unnecessary alarms, such as where an armed away mode is selected while person(s) are present within the home), and also may enable the user to make decisions more quickly (e.g., because the user may not be required to analyze a long list of potential arming actions 498), thereby securing his or her property sooner.
The process 1600, at block B612, displays, by the processor on a display, an arming action recommendation. For example, the processor 534 of the client device 405 may display the arming action(s) 498 that is recommended on the display 525. The arming action 498 may be recommended based on the security event procedures 499, the arming status of the second security system 424, and/or the occupancy data, as described above. For example, in response to the security event being detected by the first security system 422, the backend server 430 may analyze the security event procedures 499, the arming status, and/or the occupancy data of the second security system 424 to determine the arming action recommendation. In response to receiving the arming action recommendation, the client device 405 may display the arming actions 498 that are recommended on the display 525 (e.g., as illustrated in
In some of the present embodiments, the backend server 430 may analyze security event data 473 in view of the security event procedures 499 to determine the arming action recommendation and may transmit the arming action recommendation to the client device 405. In such embodiments, the client device 405 may analyze the occupancy data to determine which of the arming actions 498 received from the backend server 430 should be displayed as the arming action recommendation on the display 525. In any of the embodiments, as illustrated in
The process 1600, at block B614, receives, by the processor, an input including a selection of an arming action for a second security system based on the arming action recommendation. For example, the processor 534 of the client device 405 may receive a selection of the arming action 498 for the second security system 424 based on the arming action recommendation displayed on the display 525. In some of the present embodiments, because the arming action recommendation may be based on the security event procedures 499 (which may be configured by the user of the second security system 424), the arming status, and/or the occupancy data, the user of the client device 405 may be more likely to select the arming action 498 based on the arming action recommendation (which may include one or more arming actions 498).
The process 1600, at block B616, transmits, by the processor using the communication module, to a second hub device of the second security system, the arming action. For example, the processor 534 of the client device 405, using the communication module 530, may transmit the arming action 498 selected by the user of the client device 405 to the second hub device 412 of the second security system 424 (in some embodiments, via the backend server 430). In response to receiving the arming action 498 (e.g., by the second hub device 412 and/or the second A/V recording and communication device 403), the sensors 418, the automation devices 420, and/or the second A/V recording and communication device(s) 403 of the second security system 424 may be armed according to the arming action 498 (e.g., according to the configuration of the second security system 424 for the arming action 498).
The process 1600 of
With reference to
In response to the burglar 740 breaking into the first home 728, the first hub device 411 and/or the first A/V recording and communication device 402 may transmit the user alert 479, 498 including the security event data 473 representative of the security event triggered by the burglar 740 to the client device 405. In some of the present embodiments, the backend server 430 may receive the user alert 479, 481 and analyze the security event data 473 and/or the security event procedures 499 to determine which other security systems (e.g., the second security system 424) should be notified of the security event. For example, the backend server 430 may determine the network(s) of security systems in which the first security system 422 is included, and which of those security systems in the determined network should receive the user alerts 479, 481 (e.g., the user of the second security system 424 may desire to receive notification of security events from the first security system 422 but the user of the first security system 422 may not desire to receive notification from the second security system 424). In addition, in some of the present embodiments, as described above, the backend server 430 may determine a threat level of the security event based on the analysis of the security event data 473, and based on the threat level, may determine which network(s) of security systems to notify. For example, because the burglar 740 may have the weapon 742 (e.g., as determined using object recognition, or other computer vision, as described above), the threat level may be high. As a result, the third proximity region 754 may be determined to be the network of security systems that should be notified, which may include the second security system 424 located at the second home 720. By contrast, if the burglar 740 was only loitering on the property (e.g., no perimeter breach was detected and/or no weapon 742 was detected), the threat level may be low, and the determination may be that only the security systems in the first proximity region 750 should be notified, which may not include the second security system 424.
In some of the present embodiments, the backend server 430 may also analyze the image data, motion data, sensor data, etc. of other security systems in the network of security systems. For example, the backend server 430 may determine other security systems and/or A/V recording and communication devices installed at homes in close proximity to the first security system 422 (e.g., using location data), such as the A/V recording and communication device 725 installed at the third home 730. For example, the backend server 430 may analyze the image data generated by the A/V recording and communication device 725 to determine if suspicious activity is detected. In an example where the third home 730 also includes a smart-home hub device, the image data, motion data, sensor data, etc. may be analyzed to determine if there is any indication of suspicious activity. In embodiments where it is determined that other security systems and/or A/V recording and communication devices include an indication of suspicious activity, this indication may also be transmitted to the client device 405. For example, the user alert 479, 481 may recite, “Potential break in at 742 Evergreen Terrace at 10:30 a.m. and suspicious person detected at 744 Evergreen Terrace at 10:20 a.m.” In such an example, computer vision, as described above, may be used to determine if the suspicious person is the same person that broke into the home at 742 Evergreen Terrace, for example. By providing the user of the client device 405 with the information from surrounding homes, the user of the client device 405 may be more likely to view the threat as requiring action because the information may provide an indication that the potential threat may be moving from house to house.
In response to the determination that the user of the second security system 424 should be notified of the security event, the client device 405 may receive the user alert 479, 481 (at block B608). In addition to the user alert 479, 481, the client device 405 may receive the occupancy data of the second home 720 from the second security system 424 (e.g., from the backend server 430 and/or the second hub device 412) (at block B610).
In response to receiving the user alert 479, 481, and/or the occupancy data, the client device 405 may display the arming action(s) 498 available to the user of the client device 405 for arming the second security system 424 (at block B612). The arming action(s) 498 may include recommended arming actions generated by the backend server 430 and received by the backend server 430, for example. As described above, the arming action recommendation may be based on the occupancy data, the arming status, the security event data 473, and/or the security event procedures 499 for the second security system 424. In some of the present embodiments, as described herein, the arming actions 498 may include, in addition to an option to arm the security system (e.g., to an armed stay mode, an armed away mode, etc., using the arming action activation button 762, for example), the option to activate the automation devices 420 and/or the second A/V recording and communication device(s) 403 (e.g., using the additional activation button 764 in
In some of the present embodiments, the display of the arming actions 498 may also include security event information 768 representative of the security event and/or the second security system 424 associated with the client device 405. The security event information 768 may be based on the security event data 473, the occupancy data, and/or the arming status of the second security system 424 (e.g., based on the most recent arming action 498 implemented by the second security system 424). For example, the security event information 768 may include a description of the security event 770, which may be based on the text data 445, 477. In addition, the security event information 768 may include an arming status indicator 772 indicative of the arming status of the second security system 424. In some embodiments, the security event information 768 may include an occupancy indicator 774, which may be based on the occupancy data. The security event information 768 may aid the user of the client device 405 in determining the proper arming action 498 to activate for the second security system 424.
In response to displaying the arming action recommendation and/or the security event information 768, the user may select, and the client device 405 may receive, the arming action (which may be the arming action 498 from the arming action recommendation) for the second security system 424 (at block B614). In response to receiving the selection, the client device 405 may transmit (in some embodiments via the backend server 430) the arming action 498 to the second hub device 412 and/or the second A/V recording and communication device 403 for arming the second security system 424 (at block B616).
In the scenario of
Now referring to
The process 1700, at block B620, analyzes the security event data to determine a security event procedure for a second security system based on the security event data. For example, the processor 502 of the backend server 430 may analyze the security event data 473 to determine the security event procedure for the second security system 424 based on the security event data 473 (and/or the occupancy data of the property where the second security system 424 is located). For example, as described herein, the backend server 430 may determine the security systems that should be notified in response to security events (e.g., based on proximity, based on inclusion in a network of security systems, etc.) and/or in response to certain types of security events (e.g., based on threat level) detected by the first security system 422. In addition, the backend server 430 may analyze the security event procedures 499 (e.g., the type of notification, the arming action protocol, etc.) for each of the security systems that should be notified, because different security systems may have different security event procedures 499 (e.g., based on the types of sensors, automation devices, and/or A/V recording and communication devices, user preferences, type of security event (e.g., threat level), location of the security event (e.g., proximity), clock data, etc.).
In some of the present embodiments, the security event procedure 499 for some of the security systems may include an automatic arming action. The process 1700, at block B622, determines that the security event procedure is an automatic arming action. When it is determined that the security event procedure 499 is an automatic arming action, the process 1700, at block B624, transmits the automatic arming action to the second security system. For example, the backend server 430 may transmit the arming action 498 to the second security system 424 (e.g., to the second hub device 412 and/or the second A/V recording and communication device 403). In some of the present embodiments, because the arming action 498 may be transmitted automatically, input from the user/owner of the second security system 424 may not be required. However, in some embodiments, in addition to transmitting the arming action 498 to the second security system 424, the backend server 430 may transmit a notification (e.g., the user alert 479, 481) to the client device 405 associated with the second security system 412 with an indication that the arming action 498 was transmitted to the second security system 424 and allow the user to update/change/add to the arming action 498 (e.g., by activating one or more of the automation devices 420 and/or the second A/V recording and communication device 403 that were not included in the arming action 498).
In some of the present embodiments, the security event procedure 499 for some of the security systems may include an arming action request. The process 1700, at block B626, determines that the security event procedure is an arming action request. When it is determined that the security event procedure 499 is an arming action request, the process 1700, at block B628, generates and transmits, to a client device associated with the second security system, the arming action request. For example, the processor 502 of the backend server 430 may generate and transmit, using the network interface 520, the arming action request to the client device 405 associated with the second security system 424.
The process 1700, at block B630, receives from the client device, an arming action. For example, in response to transmitting the arming action request to the client device 405, the processor 502 of the backend server 430, using the network interface 520, may receive the arming action 498 for the second security system 424 from the client device 405.
The process 1700, at block B632, transmits, to the second security system, the arming action. For example, after receiving the arming action 498, the processor 502 of the backend server 430, using the network interface 520, may transmit the arming action 498 to the second hub device 412 and/or the second A/V recording and communication device 403 of the second security system 422.
Now referring to
The process 1800, at block B636, analyzes the security event data from the first security system to determine whether the second security system should be notified of the security event. For example, the processor 502 of the backend server 430 may analyze the security event data 473 generated by the first security system 422 to determine whether the second security system 424 should be notified of the security event. For example, as described herein, the security event data 473 may be analyzed to determine each of the security systems that should be notified of the security event. This determination may be made, as described above, by determining the network(s) of security systems in which the first security system 422 is included (e.g., based on the proximity of other security systems to the first security system, based on “opt-in” information, etc.) and/or by determining the threat level of the security event.
The process 1800, at block B638, determines whether the second security system should be notified. If the answer is no, the process 1800 may end. If the determination is yes, the process 1800 may continue to block B640.
The process 1800, at block B640, retrieves occupancy data and an arming status from the second security system. For example, the processor 502 may retrieve the occupancy data of the second property where the second security system 424 is located and the arming status of the second security system 424 (e.g., based on the most recent arming action 498 implemented by the second security system 424). In some of the present embodiments, the occupancy data and/or the arming status may be retrieved from the memory (e.g., the non-volatile memory 506) of the backend server 430. In such embodiments, the backend server 430 may be configured to determine and/or store the occupancy data and/or the arming status of the second security system 424. The occupancy data and/or the arming status may be determined and/or stored periodically, such as every 5 seconds, every 10 seconds, every 30 seconds, every minute, or at each check-in from the second security system 424 (e.g., each check-in from the second hub device 412). In other embodiments, the backend server 430 may query the second security system 424 for the occupancy data and/or the arming status in response to the security event detected by the first security system 422.
The process 1800, at block B642, determines a security event procedure for the second security system based on the security event data, the occupancy data, and the arming status. For example, the processor 502 of the backend server 430 may determine the security event procedure 499 for the second security system 424 based on the security event data 473, the occupancy data, and/or the arming status. For example, the security event data 473 may be used to determine if the security event is a verifiable security event, such as by analyzing the image data 448, 475 to determine if a suspicious person is present (e.g., using computer vision), by analyzing the sensor data 474 to determine if the perimeter has been breached (e.g., by analyzing the sensor data 474 from the door sensors, the window sensors, and/or the lock sensors), etc. In some of the present embodiments, the security event may be verified based on the actions of the user of the client device 404, 406 associated with the first security system 422 in response to the security event. For example, if the user activated the first A/V recording and communication device 402, activated a lighting automation system, sounded an alarm, alerted law enforcement, etc. in response to the security event (e.g., in response to receiving the user alert 479, 481), the security event may be determined to be verified and the verification may be stored on the backend server 430. In another example, if the security event caused a notification to be sent to a security monitoring service that monitors the first security system 422, the security monitoring service may verify the security event, and the verification may be stored on the backend server 430. In addition, the security event data 473 may be analyzed to determine a threat level, as described above. In some of the present embodiments, the verification of the security event and/or the threat level may be used to determine the security event procedure 499. For example, the security event procedure 499 for the second security system 424 may require notification only when a security event is verified and/or only in response to a threshold threat level, as described above.
In addition, the security event procedure 499 may be determined based on the occupancy data of the property where the second security system 424 is located. For example, the security event procedure 499 may include transmitting an arming action request (at block B648), where the arming action request may include a recommended arming action. As such, the recommended arming action may be based on the occupancy data, as described above.
In some embodiments, the security event procedure 499 may be based on the arming status. For example, if the second security system 424 is already armed (e.g., armed stay, armed away), the security event procedure 499 may not require any additional action or may only require a notification to be sent to the client device 405 associated with the second security system 424. In addition, as described above, the security event procedure 499 may include transmitting an arming action request (at block B648), where the arming action request may include a recommended arming action. As such, the recommended arming action may be based on the arming status. For example, if the system is already armed, such as armed stay, the recommended arming action may only include additional arming actions, such as activating floodlights, closing blinds/shades, and/or recording using the second A/V recording and communication device 403.
In some of the present embodiments, the security event procedure 499 for some of the security systems may include an automatic arming action. The process 1800, at block B644, determines that the security event procedure is an automatic arming action. When it is determined that the security event procedure 499 is an automatic arming action, the process 1800, at block B646, transmits the automatic arming action to the second security system. For example, the backend server 430 may transmit the arming action 498 to the second security system 424 (e.g., to the second hub device 412 and/or the second A/V recording and communication device 403). In some of the present embodiments, because the arming action 498 may be transmitted automatically, input from the user/owner of the second security system 424 may not be required. However, in some embodiments, in addition to transmitting the arming action 498 to the second security system 424, the backend server 430 may transmit a notification (e.g., the user alert 479, 481) to the client device 405 associated with the second security system 412 with an indication that the arming action 498 was transmitted to the second security system 424 and allow the user to update/change/add to the arming action 498 (e.g., by activating one or more of the automation devices 420 and/or the second A/V recording and communication device 403 that were not included in the arming action 498).
In some of the present embodiments, the security event procedure 499 for some of the security systems may include an arming action request. The process 1800, at block B648, determines that the security event procedure is an arming action request. When it is determined that the security event procedure 499 is an arming action request, the process 1800, at block B650, generates and transmits, to a client device associated with the second security system, the arming action request. For example, the processor 502 of the backend server 430 may generate and transmit, using the network interface 520, the arming action request to the client device 405 associated with the second security system 424.
The process 1800, at block B652, receives from the client device, an arming action. For example, in response to transmitting the arming action request to the client device 405, the processor 502 of the backend server 430, using the network interface 520, may receive the arming action 498 for the second security system 424 from the client device 405.
The process 1800, at block B654, transmits, to the second security system, the arming action. For example, after receiving the arming action 498, the processor 502 of the backend server 430, using the network interface 520, may transmit the arming action 498 to the second hub device 412 and/or the second A/V recording and communication device 403.
The process 1800 of
With reference to
In response to, and during the presence of the burglar 740 at the first home 728, the first security system 422 may generate the security event data 473. The first security system 422 may transmit the security event data 473 to the backend server 430 and the backend server 430 may receive the security event data 473 (at block B634). In some embodiments, the security event data 473 may also be transmitted by the first hub device 411 to a security monitoring service over the network (Internet/PSTN) 410 (in some embodiments, via the backend server 430).
The backend server 430 may analyze the security event data 473 to determine if the second security system 424 at the second home 720 should be notified (at block B636). For example, the backend server 430 may determine if the first security system 422 and the second security system 424 are included in the same network of security systems 422. As described above, in some of the present embodiments, the network of security systems may be based on location data (e.g., proximity). For example, it may be determined that each of the security systems within the third proximity region 754 should be notified of security events detected by the first security system 422. In some of the present embodiments, the network of security systems may be based on, in addition to or in lieu of the location data, opt-in determinations of security systems (e.g., the users/owners of the security systems opting into the network of security systems). For example, the user/owner of the second security system 424 may be able to opt into the network of security systems that may include all of the security systems in the neighborhood, town, and/or city. In such an example, the second security system 424 may not be configured to receive notifications in response to all security events detected by security systems in the network of security systems, but may include an additional layer of filtering, such as proximity and/or clock data, as described above, threat level, as also described above, verification of the security event, as also described above, and/or property type (e.g., only receive notification in response to security events at homes and not at businesses).
Once a determination is made that the second security system 424 should be notified of the security event, the backend server 430 may retrieve the occupancy data and the arming status of the second security system 424 (at block B640). The backend server 430 may then determine the security event procedure 499 for the second security system 424 based on the security event data 473, the occupancy data, and/or the arming status (at block B642). If it is determined that the security event procedure 499 for the second security system 424 is an automatic arming action, the backend server 430 may determine, based on the security event data, the occupancy data, and/or the arming status, the arming action 498 (e.g., the arming action recommendation) (at block B644). For example, the security event data 473 may indicate that the burglar 740 has broken into the first home 728 and may have a weapon 742. As a result, the arming action 498 may include arming the second security system 424 to an armed stay or armed away mode (e.g., based on the occupancy data), and also may include closing the blinds/shades using a blinds/shades automation system, activating an outdoor lighting automation system, activating the second A/V recording and communication device 403 to record the image data 462, and/or sounding an alarm of the second security system 424 (e.g., using a separate speaker, using the speaker 484 of the second hub device 412, and/or using the speaker 451 of the second A/V recording and communication device 403). In some of the present embodiments, the arming status may be used to determine which of the sensors 418, the automation devices 420, and the second A/V recording and communication devices 403 need to be activated and/or have their status changed based on the arming action 498. For example, if the outdoor lighting automation system is activated already, the arming action 498 may not include any update to the outdoor lighting automation system. If the second security system 424 is in an armed vacation mode, the arming action 498 may update the second security system 424 to be in an armed away mode, which may be more secure than the armed vacation mode.
In some of the present embodiments, as described above, the backend server may also use the clock data to determine the security event procedure 499 for the second security system 424. For example, the security event procedure 499 may be an automatic arming action during a first portion of the day (e.g., 11:00 p.m. to 4:00 a.m.), and/or during a certain day of the week (e.g., Saturdays), while the security event procedure 499 may be an arming action request during other portions of the day (e.g., 9:00 a.m. to 4:00 p.m.), and/or during certain days of week (e.g., Mondays, Tuesdays, and Wednesdays). For example, as described herein, the user of the security system 424 may be able to configure the security event procedures 499. In such examples, the user may set schedules (e.g., hourly schedules, daily schedules, weekly schedules, and so on) as part of the security event procedures 499, such that the backend server 430 may first determine the time and/or day using the clock data, and then use the time and/or day when analyzing the security event procedure 499 to determine the arming action 498 for the second security system 424. As described above, in some of the present embodiments, the clock data may be used along with the proximity information and/or the threat level. For example, the based on the proximity and the time of day, the arming action 498 may include different types of alerts. In such an example, if the security event is detected by a security system within two-hundred-fifty yards of the second security system 424, during daytime hours, the second security system 424 may sound an audible alert and transmit an audible notification to the client device 405. If the security event is detected by a security system within two-hundred-fifty yards of the second security system 424, during evening hours, the second security system 424 may sound a silent alert, automatically arm, and the client device 405 may receive a vibration notification. In another example, if the threat level of the security event is high, and the security event occurs during daytime hours, the second security system 424 may sound an audible alert and transmit an audible notification to the client device 405. If the threat level of the security event is high, and the security event occurs during evening hours, the second security system 424 may sound a silent alert, automatically arm, and the client device 405 may receive a vibration notification.
Once the arming action 498 is determined, the backend server 430 may transmit the arming action 498 to the second security system 424 (at block B646).
If it is determined (at block B648) that the security event procedure 499 is to generate and transmit an arming action request, the backend server 430 may generate and transmit the arming action request to the client device 405 associated with the second security system 424. The arming action request, in some of the present embodiments, may include an arming action recommendation, as described herein. The arming action recommendation may be based on the security event data 473, the occupancy data, and/or the arming status, as described above. In response to transmitting the arming action request, the backend server 430 may receive the arming action 498 from the client device 405 (e.g., after a user of the client device 405 selects the arming action 498) (at block B652). After receiving the arming action 498, the backend server 430 may transmit the arming action 498 to the second security system 424 (e.g., to the second hub device 412 and/or the second A/V recording and communication device 403).
Many of the descriptions above of the embodiments of the present processes (e.g.,
In addition, many of the descriptions above of the embodiments of the present processes (e.g.,
As a result of the processes described herein, property owners may be made aware of threats to the security of their homes and/or businesses before the threat enters their property. In addition, the property owners may be able to proactively secure their property using their home security systems to prevent the threat from extending onto their property. Ultimately, the safety and security of individual properties, neighborhoods, towns, and cities may be increased thereby contributing to public safety as a whole.
As discussed above, the present disclosure provides numerous examples of methods and systems including A/V recording and communication doorbells, but the present embodiments are equally applicable for A/V recording and communication devices other than doorbells. For example, the present embodiments may include one or more A/V recording and communication security cameras instead of, or in addition to, one or more A/V recording and communication doorbells. An example A/V recording and communication security camera may include substantially all of the structure and functionality of the doorbell 130 (
With reference to
The memory 804 may include both operating memory, such as random-access memory (RAM), as well as data storage, such as read-only memory (ROM), hard drives, flash memory, or any other suitable memory/storage element. The memory 804 may include removable memory elements, such as a CompactFlash card, a MultiMediaCard (MMC), and/or a Secure Digital (SD) card. In some embodiments, the memory 804 may comprise a combination of magnetic, optical, and/or semiconductor memory, and may include, for example, RAM, ROM, flash drive, and/or a hard disk or drive. The processor 802 and the memory 804 each may be, for example, located entirely within a single device, or may be connected to each other by a communication medium, such as a USB port, a serial port cable, a coaxial cable, an Ethernet-type cable, a telephone line, a radio frequency transceiver, or other similar wireless or wired medium or combination of the foregoing. For example, the processor 802 may be connected to the memory 804 via the dataport 810.
The user interface 806 may include any user interface or presentation elements suitable for a smartphone and/or a portable computing device, such as a keypad, a display screen, a touchscreen, a microphone, and a speaker. The communication module 808 is configured to handle communication links between the client device 800 and other, external devices or receivers, and to route incoming/outgoing data appropriately. For example, inbound data from the dataport 810 may be routed through the communication module 808 before being directed to the processor 802, and outbound data from the processor 802 may be routed through the communication module 808 before being directed to the dataport 810. The communication module 808 may include one or more transceiver modules capable of transmitting and receiving data, and using, for example, one or more protocols and/or technologies, such as GSM, UMTS (3GSM), IS-95 (CDMA one), IS-2000 (CDMA 2000), LTE, FDMA, TDMA, W-CDMA, CDMA, OFDMA, Wi-Fi, WiMAX, or any other protocol and/or technology.
The dataport 810 may be any type of connector used for physically interfacing with a smartphone and/or a portable computing device, such as a mini-USB port or an IPHONE®/IPOD® 30-pin connector or LIGHTNING® connector. In other embodiments, the dataport 810 may include multiple communication channels for simultaneous communication with, for example, other processors, servers, and/or client terminals.
The memory 804 may store instructions for communicating with other systems, such as a computer. The memory 804 may store, for example, a program (e.g., computer program code) adapted to direct the processor 802 in accordance with the present embodiments. The instructions also may include program elements, such as an operating system. While execution of sequences of instructions in the program causes the processor 802 to perform the process steps described herein, hard-wired circuitry may be used in place of, or in combination with, software/firmware instructions for implementation of the processes of the present embodiments. Thus, the present embodiments are not limited to any specific combination of hardware and software.
The computer system 900 may include at least one processor 910, memory 920, at least one storage device 930, and input/output (I/O) devices 940. Some or all of the components 910, 920, 930, 940 may be interconnected via a system bus 950. The processor 910 may be single- or multi-threaded and may have one or more cores. The processor 910 may execute instructions, such as those stored in the memory 920 and/or in the storage device 930. Information may be received and output using one or more I/O devices 940.
The memory 920 may store information, and may be a computer-readable medium, such as volatile or non-volatile memory. The storage device(s) 930 may provide storage for the system 900, and may be a computer-readable medium. In various aspects, the storage device(s) 930 may be a flash memory device, a hard disk device, an optical disk device, a tape device, or any other type of storage device.
The I/O devices 940 may provide input/output operations for the system 900. The I/O devices 940 may include a keyboard, a pointing device, and/or a microphone. The I/O devices 940 may further include a display unit for displaying graphical user interfaces, a speaker, and/or a printer. External data may be stored in one or more accessible external databases 960.
The features of the present embodiments described herein may be implemented in digital electronic circuitry, and/or in computer hardware, firmware, software, and/or in combinations thereof. Features of the present embodiments may be implemented in a computer program product tangibly embodied in an information carrier, such as a machine-readable storage device, and/or in a propagated signal, for execution by a programmable processor. Embodiments of the present method steps may be performed by a programmable processor executing a program of instructions to perform functions of the described implementations by operating on input data and generating output.
The features of the present embodiments described herein may be implemented in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and/or instructions from, and to transmit data and/or instructions to, a data storage system, at least one input device, and at least one output device. A computer program may include a set of instructions that may be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result. A computer program may be written in any form of programming language, including compiled or interpreted languages, and it may be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.
Suitable processors for the execution of a program of instructions may include, for example, both general and special purpose processors, and/or the sole processor or one of multiple processors of any kind of computer. Generally, a processor may receive instructions and/or data from a read only memory (ROM), or a random-access memory (RAM), or both. Such a computer may include a processor for executing instructions and one or more memories for storing instructions and/or data.
Generally, a computer may also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files. Such devices include magnetic disks, such as internal hard disks and/or removable disks, magneto-optical disks, and/or optical disks. Storage devices suitable for tangibly embodying computer program instructions and/or data may include all forms of non-volatile memory, including for example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices, magnetic disks such as internal hard disks and removable disks, magneto-optical disks, and CD-ROM and DVD-ROM disks. The processor and the memory may be supplemented by, or incorporated in, one or more ASICs (application-specific integrated circuits).
To provide for interaction with a user, the features of the present embodiments may be implemented on a computer having a display device, such as an LCD (liquid crystal display) monitor, for displaying information to the user. The computer may further include a keyboard, a pointing device, such as a mouse or a trackball, and/or a touchscreen by which the user may provide input to the computer.
The features of the present embodiments may be implemented in a computer system that includes a back-end component, such as a data server, and/or that includes a middleware component, such as an application server or an Internet server, and/or that includes a front-end component, such as a client computer having a graphical user interface (GUI) and/or an Internet browser, or any combination of these. The components of the system may be connected by any form or medium of digital data communication, such as a communication network. Examples of communication networks may include, for example, a LAN (local area network), a WAN (wide area network), and/or the computers and networks forming the Internet.
The computer system may include clients and servers. A client and server may be remote from each other and interact through a network, such as those described herein. The relationship of client and server may arise by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
The above description presents the best mode contemplated for carrying out the present embodiments, and of the manner and process of practicing them, in such full, clear, concise, and exact terms as to enable any person skilled in the art to which they pertain to practice these embodiments. The present embodiments are, however, susceptible to modifications and alternate constructions from those discussed above that are fully equivalent. Consequently, the present invention is not limited to the particular embodiments disclosed. On the contrary, the present invention covers all modifications and alternate constructions coming within the spirit and scope of the present disclosure. For example, the steps in the processes described herein need not be performed in the same order as they have been presented, and may be performed in any order(s). Further, steps that have been presented as being performed separately may in alternative embodiments be performed concurrently. Likewise, steps that have been presented as being performed concurrently may in alternative embodiments be performed separately.
This application claims priority to provisional application Ser. No. 62/544,240, filed on Aug. 11, 2017, the entire contents of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
4764953 | Chern et al. | Aug 1988 | A |
5428388 | von Bauer et al. | Jun 1995 | A |
5760848 | Cho | Jun 1998 | A |
6072402 | Kniffin et al. | Jun 2000 | A |
6192257 | Ray | Feb 2001 | B1 |
6271752 | Vaios | Aug 2001 | B1 |
6429893 | Xin | Aug 2002 | B1 |
6456322 | Marinacci | Sep 2002 | B1 |
6476858 | Ramirez Diaz et al. | Nov 2002 | B1 |
6633231 | Okamoto et al. | Oct 2003 | B1 |
6658091 | Naidoo et al. | Dec 2003 | B1 |
6753774 | Pan et al. | Jun 2004 | B2 |
6970183 | Monroe | Nov 2005 | B1 |
7062291 | Ryley et al. | Jun 2006 | B2 |
7065196 | Lee | Jun 2006 | B2 |
7085361 | Thomas | Aug 2006 | B2 |
7109860 | Wang | Sep 2006 | B2 |
7113090 | Saylor | Sep 2006 | B1 |
7193644 | Carter | Mar 2007 | B2 |
7304572 | Sheynman et al. | Dec 2007 | B2 |
7382249 | Fancella | Jun 2008 | B2 |
7450638 | Iwamura | Nov 2008 | B2 |
7643056 | Silsby | Jan 2010 | B2 |
7683924 | Oh et al. | Mar 2010 | B2 |
7683929 | Elazar et al. | Mar 2010 | B2 |
7738917 | Ryley et al. | Jun 2010 | B2 |
8139098 | Carter | Mar 2012 | B2 |
8144183 | Carter | Mar 2012 | B2 |
8154581 | Carter | Apr 2012 | B2 |
8619136 | Howarter et al. | Dec 2013 | B2 |
8872915 | Scalisi et al. | May 2014 | B1 |
8780201 | Scalisi et al. | Jul 2014 | B1 |
8823795 | Scalisi et al. | Sep 2014 | B1 |
8842180 | Kasmir et al. | Sep 2014 | B1 |
8937659 | Scalisi et al. | Jan 2015 | B1 |
8941736 | Scalisi | Jan 2015 | B1 |
8947530 | Scalisi | Feb 2015 | B1 |
8953040 | Scalisi et al. | Feb 2015 | B1 |
9013575 | Scalisi | Apr 2015 | B2 |
9049352 | Scalisi et al. | Jun 2015 | B2 |
9053622 | Scalisi | Jun 2015 | B2 |
9058738 | Scalisi | Jun 2015 | B1 |
9060103 | Scalisi | Jun 2015 | B2 |
9060104 | Scalisi | Jun 2015 | B2 |
9065987 | Scalisi | Jun 2015 | B2 |
9094584 | Scalisi et al. | Jul 2015 | B2 |
9113051 | Scalisi | Aug 2015 | B1 |
9113052 | Scalisi et al. | Aug 2015 | B1 |
9118819 | Scalisi et al. | Aug 2015 | B1 |
9142214 | Scalisi | Sep 2015 | B2 |
9160987 | Kasmir et al. | Oct 2015 | B1 |
9165444 | Scalisi | Oct 2015 | B2 |
9172920 | Kasmir et al. | Oct 2015 | B1 |
9172921 | Scalisi et al. | Oct 2015 | B1 |
9172922 | Kasmir et al. | Oct 2015 | B1 |
9179107 | Scalisi | Nov 2015 | B1 |
9179108 | Scalisi | Nov 2015 | B1 |
9179109 | Kasmir et al. | Nov 2015 | B1 |
9196133 | Scalisi et al. | Nov 2015 | B2 |
9197867 | Scalisi et al. | Nov 2015 | B1 |
9230424 | Scalisi et al. | Jan 2016 | B1 |
9237318 | Kasmir et al. | Jan 2016 | B2 |
9247219 | Kasmir et al. | Jan 2016 | B2 |
9253455 | Harrison et al. | Feb 2016 | B1 |
9342936 | Scalisi | May 2016 | B2 |
9508239 | Harrison et al. | Nov 2016 | B1 |
9736284 | Scalisi et al. | Aug 2017 | B2 |
9743049 | Scalisi et al. | Aug 2017 | B2 |
9769435 | Scalisi et al. | Sep 2017 | B2 |
9786133 | Harrison et al. | Oct 2017 | B2 |
9799183 | Harrison et al. | Oct 2017 | B2 |
20020094111 | Puchek et al. | Jul 2002 | A1 |
20020147982 | Naidoo et al. | Oct 2002 | A1 |
20030043047 | Braun | Mar 2003 | A1 |
20040085205 | Yeh | May 2004 | A1 |
20040085450 | Stuart | May 2004 | A1 |
20040086093 | Schranz | May 2004 | A1 |
20040095254 | Maruszczak | May 2004 | A1 |
20040135686 | Parker | Jul 2004 | A1 |
20050111660 | Hosoda | May 2005 | A1 |
20060010199 | Brailean et al. | Jan 2006 | A1 |
20060022816 | Yukawa | Feb 2006 | A1 |
20060139449 | Cheng et al. | Jun 2006 | A1 |
20060156361 | Wang et al. | Jul 2006 | A1 |
20070008081 | Tylicki et al. | Jan 2007 | A1 |
20100225455 | Claiborne et al. | Sep 2010 | A1 |
20130057695 | Huisking | Mar 2013 | A1 |
20140267716 | Child et al. | Sep 2014 | A1 |
20150163463 | Hwang et al. | Jun 2015 | A1 |
20170213447 | Horrocks | Jul 2017 | A1 |
Number | Date | Country |
---|---|---|
2585521 | Nov 2003 | CN |
2792061 | Jun 2006 | CN |
0944883 | Jun 1998 | EP |
1480462 | Nov 2004 | EP |
2286283 | Aug 1995 | GB |
2354394 | Mar 2001 | GB |
2357387 | Jun 2001 | GB |
2400958 | Oct 2004 | GB |
2001-103463 | Apr 2001 | JP |
2002-033839 | Jan 2002 | JP |
2002-125059 | Apr 2002 | JP |
2002-342863 | Nov 2002 | JP |
2002-344640 | Nov 2002 | JP |
2002-354137 | Dec 2002 | JP |
2002-368890 | Dec 2002 | JP |
2003-283696 | Oct 2003 | JP |
2004-128835 | Apr 2004 | JP |
2005-341040 | Dec 2005 | JP |
2006-147650 | Jun 2006 | JP |
2006-262342 | Sep 2006 | JP |
2009-008925 | Jan 2009 | JP |
199839894 | Sep 1998 | WO |
200113638 | Feb 2001 | WO |
200193220 | Dec 2001 | WO |
2002085019 | Oct 2002 | WO |
2003028375 | Apr 2003 | WO |
2003096696 | Nov 2003 | WO |
2006038760 | Apr 2006 | WO |
2006067782 | Jun 2006 | WO |
2007125143 | Aug 2007 | WO |
Number | Date | Country | |
---|---|---|---|
62544240 | Aug 2017 | US |