Homes are becoming more wired and connected with the proliferation of computing devices (such as desktops, tablets, entertainment systems, and portable communication devices) and smart appliances (such as smart light bulbs, thermostats, and the like). In some instances, users are able to use a computing device to control a smart appliance. To provide one example, a user may use an application on his tablet computing device to control settings of a thermostat in the user's home. While secondary devices are becoming more prevalent, ways to interact with these secondary devices continue to evolve.
The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The use of the same reference numbers in different figures indicates similar or identical components or features.
Techniques for controlling secondary devices (or “smart appliances”) are described herein. For instance, one or more secondary devices may reside within an environment, along with one or more electronic devices that communicatively couple with the secondary devices and are configured to control the secondary devices. To do so, the electronic devices may be configured to send control signals to the secondary devices for causing the secondary devices to perform certain operations. For instance, a user in the environment may provide, to one of the electronic devices, a request that one of the secondary devices perform a certain operation. The device, may then send the request to perform the operation directly or indirectly to the secondary device, as described below. Upon receiving a command to perform the operation, the secondary device may perform the operation.
The secondary devices may comprise lights, televisions, audio systems, door locks, garage door openers, washing machines, dryers, dishwashers, coffee makers, refrigerators, doors, automated window shades, tablets, telephones, or the like. That is, the secondary devices may comprise any type of “home-automation” device configured to communicate wired or wirelessly with a controlling electronic device. The controlling electronic devices, meanwhile, may comprise voice-controlled devices, imaging devices, tablet computing devices, televisions, mobile phones, or the like. In some instances, servers that are remote from the environment of the secondary devices may also be configured to control one or more secondary devices within the environment.
Traditional home-automation systems utilize a single hub for controlling secondary devices within a home. The techniques described herein, meanwhile, utilize multiple hubs within the environment and/or located remotely from the environment. For instance, an environment may include multiple electronic devices, each configured to control one or more secondary devices within the environment. In addition, a remote service may be configured to control one or more secondary devices within the environment. As such, each controlling device stores and executes an instance of a control engine, rather than relying on a single instance of a control engine located at a single controlling hub.
Utilizing multiple “hubs” has many benefits. First, because different electronic devices are able to communicate via different wired or wireless protocols, utilizing multiple electronic devices as hubs may expand the number of secondary devices that the home-automation system is collectively able to control. For instance, secondary devices may communicate via an array of wireless protocols, such as via Bluetooth®, ZigBee®, Z-Wave®, TCP/IP, Thread®, HomeKit®, and the like. However, not all electronic devices may be configured to communicate via each of these protocols. As such, by utilizing multiple electronic devices as home-automation hubs, the collective capabilities of all of the electronic devices may be increased, thus increasing the amount of secondary devices within an environment that the home-automation system is able to control.
In addition, by distributing instances of a control engine across multiple electronic devices (or “home-automation hubs”), the resulting system includes redundancy. Therefore, if one electronic device hosting an instance of the control engine goes down, one or more other hubs may still allow the home-automation system to continue functioning.
Next, by providing instances of a control engine on electronic devices located within the local environment of the secondary devices being controlled, the described techniques may reduce latency and increase efficacy of the system. That is, traditional home-automation systems may require user requests to modify state of secondary devices be sent to and processed “in the cloud” (i.e., remote from the environment), while the techniques described herein allow local instances of a control engine to handle these requests. Therefore, the system continues to function even if a network connection between the environment and a remote service is lost (e.g., a user's home or office Internet is down). In addition, the system is able to execute a user's command without the need to interact with a remote service over a network, thus reducing the latency associated with the request. Further, and as described below, the system may route user requests amongst multiple local electronic devices, thus again reducing latency associated with making calls to the remote service.
While the system may include local instance(s) of a control engine as discussed immediately above, in some instances the system may also include an instance of the control engine executing at a remote service. Therefore, the system still allows for control of secondary devices outside of the environment, via communication with the remote service over the network. For instance, a user may utilize an application on his mobile device configured to communicate with the remote service, which in turn communicates with secondary devices in the environment. As such, the user may be able to check the state of secondary devices in his home or office (e.g., “did I leave the lights on?”) and may also be able to control states of the secondary devices (e.g., may be able to turn off the lights from his mobile device).
As introduced above, multiple electronic devices within an environment may store and execute an instance of a control engine that is configured to control secondary devices within the environment. Within this architecture, each controlling electronic device may be responsible for controlling one or more secondary devices within the environment. For instance, a first electronic device may be responsible for controlling the downstairs lights and the downstairs television, a second electronic device may be responsible for controlling door locks in the environment, while a third electronic device may be responsible for controlling the upstairs lights and the thermostat within the environment.
A user may issue a request to change a state (i.e., perform an operation) of a secondary device within the environment in a number of ways. For instance, the user may issue this request via a voice command, a gesture, a graphical user interface (GUI) or the like. When an electronic device within the environment receives the request, the electronic device may initially identify the operation being requested and the secondary device being referenced. For instance, if a user issues a request to turn on a particular light, the electronic device (or another entity) may identify the light that the user is referencing and may identify the requested operation (turn on). After doing so, the electronic device may determine which electronic device within the environment is responsible for controlling the particular light. That is, each instance of the control engine may maintain an up-to-date listing of which electronic devices are responsible for (or “own”) each secondary device within the environment. After identifying the responsible electronic device, the electronic device that received the initial request may route this request to the responsible electronic device.
Upon the responsible electronic device receiving the request, it may also identify the requested operation and the referenced secondary device. After identifying this information, the electronic device may issue a command to the secondary device to change its state in accordance with the request. To do so, in some instances the electronic device may execute, locally, a secondary-device driver associated with the secondary device. In other instances, meanwhile, the electronic device may work with the remote service, which executes, remotely, the secondary-device driver for generating a command to perform the operation (i.e., changing state). In either instance, upon receiving the command to change its state, the secondary device may execute the command and correspondingly change state. For instance, in the example discussed above, the particular light may turn on, in accordance with the user's request. The secondary device may also send an indication back to the controlling electronic device indicating that the secondary device has successfully turned on.
In response to receiving an indication of this success, the responsible electronic device may broadcast this information out to each other instance of the control engine. That is, the electronic device may send this information to other devices within the environment responsible for controlling one or more secondary devices, as well as to the remote service executing the instance of the control engine. As discussed in further detail below, each instance may maintain a current state of each secondary device within the environment. Therefore, in response to receiving this information, each instance may update the state associated with the particular light.
In other instances, meanwhile, electronic devices may subscribe to receive information regarding particular secondary devices. For instance, if the environment includes five devices in addition to the responsible device from the example above, two (for instance) may subscribe to receive state-update information regarding state changes of the particular light. Upon the responsible device receiving an indication from the light that it has successfully turned on, the responsible device may update its stored information regarding the state of the light (from OFF to ON) and may identify the devices that have subscribed to receiving state-update information about the light. The responsible device may then send this updated state information to the subscribing devices, while refraining from sending this information to other devices that have not subscribed to receive information regarding the particular light.
In still other instances, devices (or control engines stored on the devices) may subscribe to individual controlling devices (or “hubs”) rather than the individual secondary devices. That is, a first device may subscribe to receive all updated state information from a second device, regardless of the secondary device to which the state information pertains. As such, whenever the second device successfully changes state of a secondary device that it is responsible for, it may send an indication of this updated state to the first device.
As introduced above and described in further detail below, each of the electronic devices 104 may store and execute an instance of a control engine for communicating with and controlling one or more of the secondary devices 102. In addition, a remote service 110 may store and execute an instance of the control engine, and may interact with and control the secondary devices 102 over a network 112. The network 112 may represent an array or wired networks, wireless networks (e.g., WiFi), or combinations thereof. The remote service 110 may generally refer to a network-accessible platform—or “cloud-based service”—implemented as a computing infrastructure of processors, storage, software, data access, and so forth that is maintained and accessible via the network 112, such as the Internet. Cloud-based services may not require end-user knowledge of the physical location and configuration of the system that delivers the services. Common expressions associated with cloud-based services, such as the remote service 110, include “on-demand computing”, “software as a service (SaaS)”, “platform computing”, “network accessible platform”, and so forth.
When a secondary device 102 is introduced in the environment, or when a secondary device is disconnected from one of the electronic devices 104 that is responsible for controlling the secondary device, one or more instances of the control engines executing on the electronic devices 104 may detect the presence of the secondary device via one or more wireless protocols. For instance, when the user 108 installs a “smart light bulb” or “smart door lock” within the environment, this secondary device may broadcast its presence, which may be detected by one or more of the electronic devices 104. In response to detecting a new secondary device, the instance of the control engine operating on the respective electronic device 104 may store an indication that it is now responsible for controlling this secondary device (i.e., that it is now the “owner” of the secondary device) and may broadcast this information to each other hub (i.e., each of the electronic devices 104 and remote service 112 executing a control-engine instance). In response, each control-engine instance may store an indication indicating that the electronic device that broadcast the message is now responsible for the identified secondary device. In other instances, the control-engine instance that assumed control of the secondary device may only send an indication that it is responsible for the secondary device to those devices that have subscribed. In still other instances, the control-engine instance that assumed control of the secondary device may only send an indication that it is responsible for the secondary device when queried by other devices.
In some instances, more than one of the electronic devices 104 may attempt to claim ownership of a secondary device. In these instances, a conflict-resolution process may be employed. For example, each control engine instance may be programmed such that an electronic device having a smallest device identification number may be deemed the owner of a secondary device if two or more electronic devices 104 attempt to claim ownership of a single secondary device. Of course, while one example conflict-resolution process is described, it is to be appreciated that multiple other processes may be employed.
After an electronic device 104 has claimed responsibility for controlling a particular secondary device, that secondary device may now be controlled within the environment 100 through the electronic devices 104 and/or the remote service. For instance,
Thereafter, envision that the user 108 issues, to the voice-controlled device 104(1), a voice command 106(1) to turn on the light 102(1). In response, the voice-controlled device 104(1) may generate an audio signal including this voice command and either perform speech recognition on the audio signal to identify the command or send this audio signal to another entity, such as the remote service 110, for performing speech-recognition thereon and identifying the voice command.
After the voice-controlled device 104(1) identifies the voice command, the device 104(1) may identify the requested operation and the referenced secondary device (the light 102(1)). After doing so, the voice-controlled device 104(1) may determine, from its memory maintaining the owners of each of the secondary devices 102 within the environment 100, that the television 104(3) is responsible for controlling the light 102(1). As such, the voice-controlled device 104(1) may pass this request to the television 102(1). In response, the television 102(1) may issue a command or work with the remote service to issue a command for causing the light 102(1) to turn on. Upon receiving such a command, the light 102(1) may turn on, complying with the user's initial request 106(1). In some instances, such as where the remote service 110 performs the speech-recognition on the audio signal to identify the voice command, the remote service 110 may pass the request to the television 104(3) rather than the voice-controlled device 104(1) passing this request.
While the above example describes the user 108 issuing the voice command 106(1) to ultimately control the light 102(1), this request may take other forms.
Within the environment 100 of
In this example, the first electronic device 104(1) includes protocol stacks and protocol adapters 202(1), 202(2), and 202(3), while the second electronic device 104(2) includes protocol stacks and protocol adapters 202(1) and 202(4), and the third electronic device 104(N) includes protocol stacks and protocol adaptors 202(3), 202(4), and 202(5). As illustrated, the first electronic device 104(1) may be configured to communicate with a first secondary device 102(1) via the protocol and protocol adapter 202(1) and with a second secondary device 102(2) via the protocol and protocol adapter 202(3). That is, the first electronic device 104(1) may be responsible for controlling the secondary devices 102(1) and 102(2), and may communicate with these secondary devices via the protocols supported by the protocols stacks/protocol adapters 202(1) and 202(3), respectively.
The second electronic device 104(2), meanwhile, may be responsible for controlling a third secondary device 102(3) and may communicate with this secondary device 102(3) via the protocol stack and adapter 202(4). The third electronic device 104(N) may be responsible for controlling a fourth secondary device 102(4) via the protocol stack and adapter 202(3) and a fifth secondary device 102(5) via the protocol stack and adapter 202(5). Finally, the control engine 222 executing on the remote service 110 may be responsible for controlling (i.e., may be the owner of) a sixth secondary device 102(6).
The state database 206, meanwhile, may maintain a current state of each of the secondary devices. State may include binary states (e.g., whether a light is on or off, whether a lock or locked or unlocked, whether a garage door is open or closed) and non-binary states (e.g., a current brightness level of a television, a current color of a smart light bulb, a time at which a coffee maker is set to turn on, etc.). When a control engine of an electronic device 104 or the remote service 110 successfully changes the state of a secondary device, that device 104 or remote service 110 may broadcast out this information in addition to updating its own state database. In response to receiving this information, each respective device 104 and remote service 110 may update its corresponding state database 206.
The rules databases 208, meanwhile, may store one or more rules. Rules may comprise one or more conditions that, when met, result in the execution of one or more operations on one or more secondary devices. In some instances, a user may utilize voice commands, gestures, or GUIs to create one or more rules. For instance, a user may create a rule to turn on his upstairs lights and start the coffee maker at 7:00 am. In another example, the user may create a rule that certain operations should occur when the user leaves his house and when he returns. For instance, the user may set a rule that the garage door should close and the front door should lock when the user is not home, and that the garage door should open and the front door unlock when the user returns home. In this example, when one of the electronic devices 104 senses that the user has left or returned home, that device may execute the rule by, for example, identifying which control engine owns the secondary devices associated with the rule and may issue one or more requests to these control engines to perform the operations dictated by the rule. In one example, the user may be determined to be away from home (thus triggering execution of a rule) when a mobile device of the user is not sensed by any of the devices 104. Conversely, the user may be determined to be arriving home (thus triggering execution of another rule) when one of the devices 104 detects the presence of the mobile device after an absence.
The rules builder 218, meanwhile, may include functionality for allowing users to build one or more rules, such as the rules described immediately above. In addition, the rules builder 218 may include functionality for executing rules, also as described above and as described in further detail below with reference to
The metrics 220, meanwhile, may store any type of information regarding how users interact with the secondary devices 102. For instance, these metrics 220 may include how often a user requests to turn on a secondary device, a typical time of day the user does so, the user's preferred settings of a particular secondary device, and the like. In some instances, the rules builder 218 utilizes the metrics for suggesting rules to the user. For instance, if the user often requests turn on his upstairs lights at 7 am (as indicated by the metrics 220), the rules builder 218 may suggest that the user create a rule for automatically turning on the upstairs lights at 7 am.
The credentials store 222 may store, as permitted by users, one or more sets of user credentials for the provisioning of new secondary devices. For instance, the credentials store 222 may store information needed for secondary device to connect to a user's home WiFi network, such as the network name and password. Therefore, when the user purchases a new secondary device that communicates via WiFi, the remote service 110 may reference the credentials store 222 to obtain the network name and password of the user's WiFi network and may provide this information to the new secondary device, which may use this information to connect to the network. The credentials store 222 may store additional credentials, such as information for connecting to a Bluetooth® device, a Zigbee® device, or the like.
Using the architecture of
The accessory registry 304, meanwhile, includes functionality to allow the control engines of the devices to claim ownership of a secondary device, as described above. In addition, the registry 304 may store the owners databases 210 that maintains the current listing of which of the electronic devices 104 or the remote service 110 currently owns which of the secondary devices 102. The accessory registry 304 may also store indications of the respective capabilities of each secondary device. The outreach component 306, meanwhile, stores the state database 206 and comprises functionality for sending state updates to other electronic devices 104. When a particular device updates state of a secondary device, the outreach component may broadcast out a message indicating this state update to each other device 104, or to the devices that have subscribed with the outreach component 306 to receive the state updates associated with the particular secondary device or the particular device that issued the command to update the state. The outreach component 306 may also send an indication to other devices when the corresponding electronic device claims ownership of a secondary device. As described above, the outreach component 306 may broadcast this information to one or more of the devices, to devices that subscribe to the device, or may refrain from sending the information until queried by another device.
In addition, the illustrated control engine includes an application server 308, one or more accessory drivers 310, and driver services 312. The application server 308 provides an interface for users to access the respective control engine (e.g., from their client computing devices) for purposes of configuring rules, determining secondary-device states, and the like. In addition, the control engine may store the accessory drivers 310 for certain secondary devices, such as the secondary devices that the respective control engine is responsible for. In other instances, meanwhile, the control engine may utilize secondary-device drivers that are stored remotely, as described above. Finally, the driver services 312 may provide needed services to the secondary-device drivers, such as storage, I/O processing for driver commands, and the like. Finally, the control engine may include one or more protocol stacks and protocol adapters, as discussed above with reference to
At “1”, the user 108 issues a natural-language command to “turn on the downstairs light”. That is, the user 108 issues a voice command to change a state of the light 102(1) from off to on. At “2”, in this example the voice-controlled device 104(1) generates an audio signal that includes the request and determines the contents of the voice command. In some instances, this may include performing speech-recognition at the device 104(1), while in other instances this may include sending the audio signal to the remote service 110 and receiving results of the speech-recognition at the device 104(1).
At “3”, the voice-controlled device 104(1) identifies the owner of the referenced secondary device (the light 102(1)) and passes the request to turn on the light to the controlling device. In this example, the voice-controlled device 104(1) determines that the television 104(3) is responsible for controlling the light 102(1) and, therefore, passes the request to the television 104(3). While not illustrated, in some instances where the remote service 110 performs the speech-recognition on the audio signal generated by the voice-controlled device 104(1), the remote service 110 may pass the request to the television 104(3).
At “4”, the television 104(3) receives the request and causes a command to be sent to the secondary device to cause the light 102(1) to turn on, in accordance with the user's request. In some instances, this may include the television executing a secondary-device driver associated with the light to generate a command that, when executed by the light 102(1), causes the light to turn on. In other instances, the television 104(3) may work with the remote service 110 or another entity that executes the secondary-device driver and passes the generated command to the light 102(1). In each instance, at “5” the light 102(1) receives the request to turn on and, in response, executes the requests and turns on. In addition, the light 102(1) may send a notification indicating that it has successfully changed its state to “on” back to the television 104(3).
At “6”, the television 104(3) receives the indication from the light 102(1) that it has turned on and broadcasts this information out to each other controlling device 104 and/or the remote service 110. At “7”, in this example at least the voice-controlled device 104(1) receives the message from the television 104(3) and updates its local database to indicate the updated state of the light 102(1).
At 502, a first electronic device detects a presence of a secondary device. For instance, upon a secondary device being installed in an environment or upon a secondary device losing its connection with another electronic device, the first electronic device may detect the presence of the secondary device and determine that the secondary device is not currently owned. At 504, the first electronic device determines whether it and the secondary device communicate via a common wireless protocol. For instance, if the first electronic device is able to communicate via TCP/IP and Bluetooth®, the first electronic device may determine if the detected secondary device is also able to communicate via one or both of these protocols. If not, then the process 500 ends at 506 and another electronic device within the environment may later claim ownership of the secondary device.
If, however, the first electronic device determines that it and the secondary device are able to communicate via a common protocol, then at 508 the first electronic device may effectively claim ownership of the secondary device by storing an indication that the first electronic device is responsible for controlling the secondary device and, at 510, may broadcast an indication of such. For instance, the first electronic device may send such an indication over a wired and/or wireless network and/or via one or more short-range wireless protocols. As a block 512 represents, if another device within the environment has also claimed ownership of the secondary device, then a conflict resolution process may occur such that only one of the devices retains ownership of the secondary device.
At 514, the first electronic device may receive a request to change a state of a secondary device within the environment, which may be a secondary device that the first electronic device controls or a secondary device that the first electronic device does not control. At 516, the first electronic device determines whether it is response for controlling the secondary device for which it received a request. If not, then at 518 the first electronic device identifies the responsible electronic device and sends the request along to that device. At 520, the first electronic device may receive an indication from the other device that it has updated the state of the secondary device (after having successfully interacted with the secondary device to change the state). In response to receiving this indication, at 522 the first electronic device stores an indication of the updated state of the secondary device.
If, however, the first electronic device determines at 516 that it is responsible for the secondary device for which it received a request, then at 524 the first electronic device sends a request to the secondary device to change its state in accordance with the request received at the first electronic device. Here, the first electronic device may send this request to the secondary device via one or more wireless protocols that the first electronic device and the secondary device are both configured to communicate with.
At 602, the remote service receives, from a first electronic device, a message indicating that the first electronic device is responsible for controlling a first secondary device. In some instances, the remote service receives the message in response to querying the first electronic device. At 604, the remote service stores an indication that the first electronic device is responsible for controlling the first secondary device. At 606, the remote service receives, from a second electronic device, a message indication that the second electronic device is responsible for controlling a second secondary device. In some instances, the remote service receives this second message in response to querying the second electronic device. At 608, the remote service stores an indication that the second electronic device is responsible for controlling the second secondary device.
At 610, the remote service receives a message from the first electronic device indicating an updated state of the first secondary device. In response, at 612 the remote service stores an indication of the updated state. At 614, meanwhile, the remote service receives a request to change a state of a particular secondary device in the environment, which may or may not be owned by the remote service. At 616, the remote service determines whether it is responsible for controlling secondary device associated with the request. If not, then at 618 the remote service sends the request to the electronic device responsible for controlling the secondary device. If, however, the remote service determines that it is responsible for controlling the secondary device, then at 620 the remote service sends a request to the secondary device to update its state. Again, if the secondary device does so successfully, then it may send an indication of this success back to the remote service, which may not only update its own local state, but may also broadcast out this message to other instances of the control engine.
The voice-controlled device 104 may also be implemented in other form factors, such as a mobile device (e.g., a smart phone or personal digital assistant). The mobile device may include a touch-sensitive display screen and various buttons for providing input as well as additional functionality such as the ability to send and receive telephone calls. Alternative implementations of the voice-controlled device 104 may also include configuration as a personal computer. The personal computer may include a keyboard, a mouse, a display screen, and any other hardware or functionality that is typically found on a desktop, notebook, netbook, or other personal computing devices. These devices, however, are merely examples and not intended to be limiting, as the techniques described in this disclosure may be used in essentially any device that has an ability to recognize speech input or other types of natural language input.
In the illustrated implementation, the voice-controlled device 104 includes one or more processors 702 and computer-readable media 704. In some implementations, the processors(s) 702 may include a central processing unit (CPU), a graphics processing unit (GPU), both CPU and GPU, a microprocessor, a digital signal processor or other processing units or components known in the art. Alternatively, or in addition, the functionally described herein can be performed, at least in part, by one or more hardware logic components. For example, and without limitation, illustrative types of hardware logic components that can be used include field-programmable gate arrays (FPGAs), application-specific integrated circuits (ASICs), application-specific standard products (ASSPs), system-on-a-chip systems (SOCs), complex programmable logic devices (CPLDs), etc. Additionally, each of the processor(s) 702 may possess its own local memory, which also may store program modules, program data, and/or one or more operating systems.
The computer-readable media 704 may include volatile and nonvolatile memory, removable and non-removable media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules, or other data. Such memory includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, RAID storage systems, or any other medium which can be used to store the desired information and which can be accessed by a computing device. The computer-readable media 704 may be implemented as computer-readable storage media (“CRSM”), which may be any available physical media accessible by the processor(s) 702 to execute instructions stored on the memory 704. In one basic implementation, CRSM may include random access memory (“RAM”) and Flash memory. In other implementations, CRSM may include, but is not limited to, read-only memory (“ROM”), electrically erasable programmable read-only memory (“EEPROM”), or any other tangible medium which can be used to store the desired information and which can be accessed by the processor(s) 702.
Several modules such as instruction, datastores, and so forth may be stored within the computer-readable media 704 and configured to execute on the processor(s) 702. A few example functional modules are shown as applications stored in the computer-readable media 704 and executed on the processor(s) 702, although the same functionality may alternatively be implemented in hardware, firmware, or as a system on a chip (SOC).
An operating system module 706 may be configured to manage hardware and services within and coupled to the device 104 for the benefit of other modules. In addition, in some instances the device 104 may include some or all of one or more secondary-device drivers 708. In other instances, meanwhile, the device 104 may be free from the drivers 708 for interacting with secondary devices. The device 104 may further including, in some instances, a speech-recognition module 710 that employs any number of conventional speech processing techniques such as use of speech recognition, natural language understanding, and extensive lexicons to interpret voice input. In some instances, the speech-recognition module 710 may simply be programmed to identify the user uttering a predefined word or phrase (i.e., a “wake word”), after which the device 104 may begin uploading audio signals to the remote service 112 for more robust speech-recognition processing. In other examples, the device 104 itself may, for example, identify voice commands from users and may provide indications of these commands to the remote service 112.
The voice-controlled device 104 may also include a plurality of applications 712 stored in the computer-readable media 704 or otherwise accessible to the device 104. In this implementation, the applications 712 are a music player 714, a movie player 716, a timer 718, and a personal shopper 720. However, the voice-controlled device 104 may include any number or type of applications and is not limited to the specific examples shown here. The music player 714 may be configured to play songs or other audio files. The movie player 716 may be configured to play movies or other audio visual media. The timer 718 may be configured to provide the functions of a simple timing device and clock. The personal shopper 720 may be configured to assist a user in purchasing items from web-based merchants.
Generally, the voice-controlled device 104 has input devices 722 and output devices 724. The input devices 722 may include a keyboard, keypad, mouse, touch screen, joystick, control buttons, etc. In some implementations, one or more microphones 726 may function as input devices 722 to receive audio input, such as user voice input. The output devices 724 may include a display, a light element (e.g., LED), a vibrator to create haptic sensations, or the like. In some implementations, one or more speakers 728 may function as output devices 724 to output audio sounds.
A user 108 may interact with the voice-controlled device 104 by speaking to it, and the one or more microphone(s) 726 captures the user's speech. The voice-controlled device 104 can communicate back to the user by emitting audible statements through the speaker 728. In this manner, the user 108 can interact with the voice-controlled device 104 solely through speech, without use of a keyboard or display.
The voice-controlled device 104 may further include a wireless unit 730 coupled to an antenna 732 to facilitate a wireless connection to a network. The wireless unit 730 may implement one or more of various wireless technologies, such as Wi-Fi, Bluetooth, RF, and so on. A USB port 734 may further be provided as part of the device 104 to facilitate a wired connection to a network, or a plug-in network device that communicates with other wireless networks. In addition to the USB port 734, or as an alternative thereto, other forms of wired connections may be employed, such as a broadband connection.
Accordingly, when implemented as the primarily-voice-operated device 104(1), there may be no input devices, such as navigation buttons, keypads, joysticks, keyboards, touch screens, and the like other than the microphone(s) 726. Further, there may be no output such as a display for text or graphical output. The speaker(s) 728 may be the main output device. In one implementation, the voice-controlled device 104(1) may include non-input control mechanisms, such as basic volume control button(s) for increasing/decreasing volume, as well as power and reset buttons. There may also be a simple light element (e.g., LED) to indicate a state such as, for example, when power is on.
Accordingly, the device 104(1) may be implemented as an aesthetically appealing device with smooth and rounded surfaces, with one or more apertures for passage of sound waves. The device 104(1) may merely have a power cord and optionally a wired interface (e.g., broadband, USB, etc.). As a result, the device 104(1) may be generally produced at a low cost. Once plugged in, the device may automatically self-configure, or with slight aid of the user, and be ready to use. In other implementations, other I/O components may be added to this basic model, such as specialty buttons, a keypad, display, and the like.
Although the subject matter has been described in language specific to structural features, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features described. Rather, the specific features are disclosed as illustrative forms of implementing the claims.
This application is a continuation of and claims priority to U.S. application Ser. No. 14/788,327, filed on Jun. 30, 2015 and entitled “Interoperability of Secondary-Device Hubs,” the entirety of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5086385 | Launey et al. | Feb 1992 | A |
5307295 | Taylor et al. | Apr 1994 | A |
6052750 | Lea | Apr 2000 | A |
6653933 | Raschke et al. | Nov 2003 | B2 |
6654720 | Graham et al. | Nov 2003 | B1 |
6725281 | Zintel et al. | Apr 2004 | B1 |
6812881 | Mullaly et al. | Nov 2004 | B1 |
6845451 | Anand et al. | Jan 2005 | B1 |
6930788 | Iwamoto et al. | Aug 2005 | B1 |
7139716 | Gaziz | Nov 2006 | B1 |
7418392 | Mozer et al. | Aug 2008 | B1 |
8078290 | Nelson | Dec 2011 | B2 |
8116754 | Kim et al. | Feb 2012 | B2 |
8176503 | Ford et al. | May 2012 | B2 |
8340975 | Rosenberger | Dec 2012 | B1 |
8490006 | Reeser et al. | Jul 2013 | B1 |
8516087 | Wilson et al. | Aug 2013 | B2 |
8850346 | Keenan, Jr. et al. | Sep 2014 | B2 |
9071603 | Frederick et al. | Jun 2015 | B1 |
9087514 | Jonsson | Jul 2015 | B2 |
9241257 | Kim et al. | Jan 2016 | B1 |
9443527 | Watanabe et al. | Sep 2016 | B1 |
9554061 | Proctor, Jr. et al. | Jan 2017 | B1 |
9680646 | Nadathur et al. | Jun 2017 | B2 |
9875647 | Tannenbaum et al. | Jan 2018 | B1 |
10453461 | Mutagi et al. | Oct 2019 | B1 |
20010041982 | Kawasaki et al. | Nov 2001 | A1 |
20020129353 | Williams et al. | Sep 2002 | A1 |
20030012168 | Elson et al. | Jan 2003 | A1 |
20030040812 | Gonzales et al. | Feb 2003 | A1 |
20030103088 | Dresti et al. | Jun 2003 | A1 |
20040070491 | Huang et al. | Apr 2004 | A1 |
20040267385 | Lingemann | Dec 2004 | A1 |
20050071879 | Haldavnekar et al. | Mar 2005 | A1 |
20050096753 | Arling | May 2005 | A1 |
20050108369 | Sather et al. | May 2005 | A1 |
20050131551 | Ruutu et al. | Jun 2005 | A1 |
20060077174 | Chung et al. | Apr 2006 | A1 |
20060080408 | Istvan et al. | Apr 2006 | A1 |
20060123053 | Scannell, Jr. | Jun 2006 | A1 |
20060248557 | Stark et al. | Nov 2006 | A1 |
20070260713 | Moorer et al. | Nov 2007 | A1 |
20070287542 | Miyazaki | Dec 2007 | A1 |
20080037485 | Osinga et al. | Feb 2008 | A1 |
20080064395 | Siblleau | Mar 2008 | A1 |
20080313299 | Ebbe et al. | Dec 2008 | A1 |
20090046715 | McCoy | Feb 2009 | A1 |
20090076827 | Bulitta et al. | Mar 2009 | A1 |
20090204410 | Mozer et al. | Aug 2009 | A1 |
20090316671 | Rolf et al. | Dec 2009 | A1 |
20100104255 | Yun et al. | Apr 2010 | A1 |
20100185445 | Comerford et al. | Jul 2010 | A1 |
20100289643 | Trundle et al. | Nov 2010 | A1 |
20110044438 | Wang et al. | Feb 2011 | A1 |
20110087726 | Shim et al. | Apr 2011 | A1 |
20110190913 | Van De Sluis et al. | Aug 2011 | A1 |
20110205965 | Sprigg et al. | Aug 2011 | A1 |
20110211584 | Mahmoud | Sep 2011 | A1 |
20120253824 | Alcantara Talavera | Oct 2012 | A1 |
20130010207 | Valik et al. | Jan 2013 | A1 |
20130038800 | Yoo | Feb 2013 | A1 |
20130052946 | Chatterjee et al. | Feb 2013 | A1 |
20130086245 | Lu et al. | Apr 2013 | A1 |
20130156198 | Kim et al. | Jun 2013 | A1 |
20130162160 | Ganton et al. | Jun 2013 | A1 |
20130183944 | Mozer et al. | Jul 2013 | A1 |
20130188097 | Smith | Jul 2013 | A1 |
20130218572 | Cho et al. | Aug 2013 | A1 |
20140005809 | Frei et al. | Jan 2014 | A1 |
20140032651 | Singh et al. | Jan 2014 | A1 |
20140062297 | Bora et al. | Mar 2014 | A1 |
20140074653 | Wang et al. | Mar 2014 | A1 |
20140082151 | Chen et al. | Mar 2014 | A1 |
20140098247 | Rao et al. | Apr 2014 | A1 |
20140163751 | Davis et al. | Jun 2014 | A1 |
20140167929 | Shim et al. | Jun 2014 | A1 |
20140176309 | Wang et al. | Jun 2014 | A1 |
20140188463 | Noh | Jul 2014 | A1 |
20140191855 | Kim et al. | Jul 2014 | A1 |
20140244267 | Levi | Aug 2014 | A1 |
20140249825 | Proud | Sep 2014 | A1 |
20140309789 | Ricci | Oct 2014 | A1 |
20140343946 | Torok et al. | Nov 2014 | A1 |
20140349269 | Canoy et al. | Nov 2014 | A1 |
20140358553 | Helmke et al. | Dec 2014 | A1 |
20140376747 | Mullet et al. | Dec 2014 | A1 |
20150005900 | Steele et al. | Jan 2015 | A1 |
20150006742 | Beals et al. | Jan 2015 | A1 |
20150019714 | Shaashua et al. | Jan 2015 | A1 |
20150020191 | Vida et al. | Jan 2015 | A1 |
20150053779 | Adamek et al. | Feb 2015 | A1 |
20150058955 | Ganapathy et al. | Feb 2015 | A1 |
20150066516 | Nishikawa et al. | Mar 2015 | A1 |
20150097663 | Sloo et al. | Apr 2015 | A1 |
20150140990 | Kim et al. | May 2015 | A1 |
20150142704 | London | May 2015 | A1 |
20150154976 | Mutagi | Jun 2015 | A1 |
20150161370 | North et al. | Jun 2015 | A1 |
20150162006 | Kummer | Jun 2015 | A1 |
20150163412 | Holley et al. | Jun 2015 | A1 |
20150168538 | Bradley et al. | Jun 2015 | A1 |
20150170665 | Gundeti et al. | Jun 2015 | A1 |
20150195099 | Imes et al. | Jul 2015 | A1 |
20150204561 | Sadwick et al. | Jul 2015 | A1 |
20150222517 | McLaughlin et al. | Aug 2015 | A1 |
20150236899 | Sengupta et al. | Aug 2015 | A1 |
20150242381 | Oh et al. | Aug 2015 | A1 |
20150263886 | Wang et al. | Sep 2015 | A1 |
20150264322 | Ang | Sep 2015 | A1 |
20150294086 | Kare et al. | Oct 2015 | A1 |
20150312113 | Forutanpour et al. | Oct 2015 | A1 |
20150324706 | Warren | Nov 2015 | A1 |
20150334554 | Song et al. | Nov 2015 | A1 |
20150347114 | Yoon | Dec 2015 | A1 |
20150347683 | Ansari et al. | Dec 2015 | A1 |
20150348551 | Gruber et al. | Dec 2015 | A1 |
20150350031 | Burks et al. | Dec 2015 | A1 |
20150351145 | Burks et al. | Dec 2015 | A1 |
20150365217 | Scholten et al. | Dec 2015 | A1 |
20150366035 | Baek et al. | Dec 2015 | A1 |
20150373149 | Lyons | Dec 2015 | A1 |
20160042748 | Jain et al. | Feb 2016 | A1 |
20160043962 | Kim et al. | Feb 2016 | A1 |
20160044032 | Kim et al. | Feb 2016 | A1 |
20160098284 | Herberg et al. | Apr 2016 | A1 |
20160098997 | Ding | Apr 2016 | A1 |
20160099815 | Park | Apr 2016 | A1 |
20160134737 | Pulletikurty | May 2016 | A1 |
20160139575 | Funes | May 2016 | A1 |
20160195856 | Spero | Jul 2016 | A1 |
20160259308 | Fadell | Sep 2016 | A1 |
20160269524 | Stottlemyer | Sep 2016 | A1 |
20160344815 | Hyun et al. | Nov 2016 | A1 |
20160358443 | True | Dec 2016 | A1 |
20160359629 | Nadathur et al. | Dec 2016 | A1 |
20160366481 | Lim et al. | Dec 2016 | A1 |
20170004828 | Lee et al. | Jan 2017 | A1 |
20170055126 | O'Keeffe | Feb 2017 | A1 |
20200159491 | Mutagi et al. | May 2020 | A1 |
20200348124 | Froment et al. | Nov 2020 | A1 |
20210326103 | Mutagi et al. | Oct 2021 | A1 |
Number | Date | Country |
---|---|---|
100998897 | Dec 2010 | KR |
Entry |
---|
Office Action for U.S. Appl. No. 16/042,389, dated Feb. 14, 2020, Mutagi, “Grouping Devices for Voice Control”, 28 Pages. |
Bendersky, “Finite State Machines and Regular Expressions”, retrieved on Mar. 18, 2016 at <<https://www.gameclev.net/articles/programming/general-and-gameplay-programrning/finite-state-machines-and-regular-expressions-r3176>>, GameDev, Jun. 4, 2013. |
Bendersky, “Finite State Machines and Regular Expressions”, Retreived from <<http://www.gamedev.net/page/resources/_/technical/general-programming/finite-state-machines-and-regular-expressionsr3176>>, GameDev.net, Jun. 2013, 31 pages. |
Krishna et al., “Zigbee Based Voice Control System for Smart Home”, IJCTA, Jan-Feb. 2012, vol. 3, pp#163-pp#168. |
Non Final Office Action dated Jan. 11, 2019 for U.S. Appl. No. 14/750,266 “Determining Relative Positions of User Devices” Fremont, 34 pages. |
Office Action for U.S. Appl. No. 14/752,321, dated Jan. 25, 2019, Mutagi et al, “Creating Scenes from Voice-Controllable Devices”, 51 pages. |
Office action for U.S. Appl. No. 14/752,321, dated Oct. 4, 2016, Mutagi et al., “Creating Scenes from Voice-Controllable Devices”, 39 pages. |
Office Action for U.S. Appl. No. 14/752,134, dated Nov. 2, 2017, Mutagi, “Remote Execution of Secondary-Device Drivers”, 37 pages. |
Office action for U.S. Appl. No. 14/752,257, dated Nov. 28, 2016, Mutagi et al., “Mapping Device Capabilities to a Predefined Set”, 32 pages. |
Office Action for U.S. Appl. No. 14/750,266, dated Nov. 30, 2017, Mutagi, “Remote Execution of Secondary-Device Drivers”, 29 pages. |
Office action for U.S. Appl. No. 14/752,198, dated Dec. 2, 2016, Mutagi et al., “Grouping Devices for Voice Control”, 33 pages. |
Final Office Action dated Dec. 14, 2018 for U.S. Appl. No. 14/752,134 “Remote Execution of Secondary-Device Drivers” Mutagi, 50 pages. |
Office action for U.S. Appl. No. 14/752,198, dated Dec. 26, 2017, Mutagi et al., “Grouping Devices for Voice Control”, 20 pages. |
Office action for U.S. Appl. No. 14/752,321, dated Dec. 26, 2017, Rohan Mutagi, “Creating Scenes from Voice-Controllable Devices”, 47 pages. |
Office action for U.S. Appl. No. 14/752,198, dated Mar. 10, 2016, Mutagi et al., “Grouping Devices for Voice Control”, 17 pages. |
Office action for U.S. Appl. No. 14/752,257, dated Mar. 14, 2016, Mutagi et al., “Mapping Device Capabilities to a Predefined Set”, 19 pages. |
Office action for U.S. Appl. No. 14/752,321, dated Mar. 23, 2016, Mutagi et al., “Creating Scenes from Voice-Controllable Devices”, 21 pages. |
Office action for U.S. Appl. No. 14/752,134, dated Mar. 24, 2016, Mutagi et al., “Remote Execution of Secondary-Device Drivers”, 17 pages. |
Office Action for U.S. Appl. No. 14/788,327, dated Apr. 10, 2018, Raeber et al., “interoperability of Secondary-Device Hubs”, 15 pages. |
Office Action for U.S. Appl. No. 14/752,134, dated Apr. 19, 2018, Mutagi, “Remote Execution of Secondary-Device Drivers”, 48 pages,. |
Office action for U.S. Appl. No. 14/752,321, dated May 25, 2017, Rohan Mutagi, “Creating Scenes from Voice-Controllable Devices”, 45 pages. |
Office action for U.S. Appl. No. 14/752,134, dated May 3, 2017, Mutagi et al., “Remote Execution of Secondary-Device Drivers”, 28 pages. |
Office Action for U.S. Appl. No. 14/752,321, dated Jun. 15, 2018, Mutagi, “Creating Scenes from Voice-Controllable Devices”, 51 pages. |
Office Action for U.S. Appl. No. 14/750,266, dated Jun. 28, 2018, Froment, “Determining Relative Positions of User Devices”, 32 pages. |
Office action for U.S. Appl. No. 14/752,198, dated Jun. 30, 2017, Mutagi et al., “Grouping Devices for Voice Control”, 43 pages. |
Office Action for U.S. Appl. No. 14/752,257, dated Aug. 11, 2017, Rohan, “Mapping Device Capabilities to a Predefined Set”, 51 pages. |
Office Action for U.S. Appl. No. 16/042,389, dated Aug. 19, 2019, Mutagi, “Grouping Devices for Voice Control”, 24 pages. |
Office Action for U.S. Appl. No. 14/788,327, dated Sep. 12, 2018, Raeber et al., “Interoperability of Secondary-Device Hubs”, 13 pages. |
Office action for U.S. Appl. No. 14/752,134, dated Sep. 22, 2016, Mutagi et al., “Remote Execution of Secondary-Device Drivers”, 24 pages. |
Ranger, “What is Apple iBeacon? Here's what you need to know”, ZDNet, retreived at <<http://www.zdnet.com/article/what-is-apple-ibeacon-heres-what-you-need-to-know/>>, Jun. 10, 2014, 4 pages. |
Office Action for U.S. Appl. No. 16/042,389, dated Jul. 6, 2020, Mutagi, “Grouping Devices for Voice Control”, 28 Pages. |
Office Action for U.S. Appl. No. 16/657,938, dated Nov. 3, 2021, Mutagi, “Remote Execution of Secondary-Device Drivers”, 29 pages. |
Office Action for U.S. Appl. No. 16/424,285, dated Aug. 20, 2021, Mutagi, “Creating Scenes From Voice-Controllable Devices”, 32 pages. |
Number | Date | Country | |
---|---|---|---|
Parent | 14788327 | Jun 2015 | US |
Child | 16523481 | US |