Building security monitoring systems typically provide for an alarm when a sensor associated with the system is tripped while the system is armed. The security system will then attempt to notify one or more users of the security system to verify if the alarm was false or true. Often times such alarms are false, which can be a waste of time and resources of authorities. Existing systems do not compare the reason why the alarm was triggered to predefined criteria to determine whether an alarm is false before notifying the users and dispatching authorities. Existing systems also do not provide users of the security system information relating to why the alarm was triggered for the users to determine whether it was false or true. Existing systems also do not provide the users with efficient methods to terminate the alarm as false if needed, and do not provide users efficient access of confidential information required to terminate the false alarm. These and other shortcomings are addressed by the present disclosure.
In light of the foregoing background, the following presents a simplified summary of the present disclosure in order to provide a basic understanding of some aspects described herein. This summary is not an extensive overview, and is not intended to identify key or critical elements or to delineate the scope of the claims. The following summary merely presents various described aspects in a simplified form as a prelude to the more detailed description provided below.
One or more aspects of the disclosure provide for a method that may include detecting an alarm event at a premises monitored by a security system, determining whether the alarm event is a deviation from predefined criteria, and transmitting an alert notification to users of the security system if the alarm event is a deviation from the predefined criteria. In some embodiments, the predefined criteria may relate to the location or type of one or more sensors of the security system, the location of the users of the systems, the time of day, activities within the premises, and/or behavioral patterns of the users learned by the security system.
One or more aspects of the disclosure also provide a method that may include determining the location of one or more users of the security system in relation to the premises, and transmitting information in an alert notification relating to the location of the one or more users.
One or more aspects of the disclosure also provide a method that may include detecting an alarm event at a premises monitored by one or more sensors of a security system, selecting information relating to data recorded by one or more sensors of the security system, and transmitting an alert notification to one or more users of the security system containing the selected information.
One or more aspects of the disclosure also provide a method that may include engaging a software application on a wireless device, determining a state of alert of a security system associated with the software application, selecting, based on the state of alert of the security system, an interactive graphic to display on the wireless device, and displaying the selected interactive graphic on the wireless device.
One or more aspects of the disclosure also provide a method that may include detecting an alarm event at a premises monitored by a security system, and transmitting an alert notification to a primary user of the security system that contains a link to confidential information required to terminate the alarm event.
One or more aspects of the disclosure also provide a method that may include detecting an alarm event at a premises monitored by a security system, determining the location of the alarm event, determining the state of alertness of the location that the alarm event occurred, and transmitting, based on the location of the alarm event and the state of alert of the location where the alarm event, an alert notification to one or more users of the security system.
The summary here is not an exhaustive listing of the novel features described herein, and are not limiting of the claims. These and other features are described in greater detail below.
Some features herein are illustrated by way of example, and not by way of limitation, in the accompanying drawings. In the drawings, like numerals reference similar elements between the drawings.
In the following description of various illustrative embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown, by way of illustration, various embodiments in which aspects of the disclosure may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made, without departing from the scope of the present disclosure.
There may be one or more links 101 originating from the local office 103, and it may be split a number of times to distribute the signal to various premises 102 in the vicinity (which may be many miles) of the local office 103. The links 101 may include components not illustrated, such as splitters, filters, antennas, amplifiers, etc. to help convey the signal clearly, but in general each split introduces a bit of signal degradation. Portions of the links 101 may also be implemented with fiber-optic cable, while other portions may be implemented with coaxial cable, other lines, or wireless communication paths.
The local office 103 may include a termination system (TS) 104, such as a cable modem termination system (CMTS) in an example of an HFC-type network, which may be a computing device configured to manage communications between devices on the network of links 101 and backend devices such as servers 105-107 (to be discussed further below). In the example of an HFC-type network, the TS may be as specified in a standard, such as the Data Over Cable Service Interface Specification (DOCSIS) standard, published by Cable Television Laboratories, Inc. (a.k.a. CableLabs), or it may be a similar or modified device instead. The TS may be configured to place data on one or more downstream frequencies to be received by modems at the various premises 102, and to receive upstream communications from those modems on one or more upstream frequencies. The local office 103 may also include one or more network interfaces 108, which can permit the local office 103 to communicate with various other external networks 109. These networks 109 may include, for example, Internet Protocol (IP) networks Internet devices, telephone networks, cellular telephone networks, fiber optic networks, local wireless networks (e.g., WiMAX), satellite networks, and any other desired network, and the interface 108 may include the corresponding circuitry needed to communicate on the network 109, and to other devices on the network such as a cellular telephone network and its corresponding cell phones.
As noted above, the local office 103 may include a variety of servers 105-107 that may be configured to perform various functions. For example, the local office 103 may include a push notification server 105. The push notification server 105 may generate push notifications to deliver data and/or commands to the various premises 102 in the network (or more specifically, to the devices in the premises 102 that are configured to detect such notifications, including for example, security system 319 and/or various wired and/or wireless devices). The local office 103 may also include a content server 106. The content server 106 may be one or more computing devices that are configured to provide content to users in the homes. This content may be, for example, video on demand movies, television programs, songs, services, information, text listings, security services, etc. In some embodiments, the content server 106 may include software to validate (or initiate the validation of) user identities and entitlements (e.g., for example, to execution of various functions in the security system, locate and retrieve (or initiate the locating and retrieval of) requested content including security footage, encrypt the content, and initiate delivery (e.g., streaming, transmitting via a series of content fragments) of the content to the requesting user and/or device.
The local office 103 may also include one or more application servers 107. An application server 107 may be a computing device configured to offer any desired service (e.g., security system services and applications), and may run various languages and operating systems (e.g., servlets and JSP pages running on Tomcat/My SQL, OSX, BSD, Ubuntu, Red Hat Linux, HTML5, JavaScript, AJAX and COMET). For example, an application server may be responsible for collecting television program listings information and generating a data download for electronic program guide listings. Another application server may be responsible for monitoring user viewing habits and collecting that information for use in selecting advertisements. Another application server may be responsible for formatting and inserting advertisements in a video stream and/or content item being transmitted to the premises 102. Another application server may perform various security system functions including storing remotely security camera footage, storing past event history, storing security system criteria, and storing credentials to enable remote operation, control, alarm shutoff, and other security system related functions.
An example premises 102a may include an interface 110 (such as a modem, or another receiver and/or transmitter device suitable for a particular network (e.g., a wireless or wired network)), which may include transmitters and receivers used to communicate on the links 101 and with the local office 103. The interface 110 may be, for example, a coaxial cable modem (for coaxial cable lines 101), a fiber interface node (for fiber optic lines 101), a wireless transceiver, and/or any other desired modem device. The interface 110 may be connected to, or be a part of, a gateway interface device 111. The gateway interface device 111 may be a computing device that communicates with the interface 110 to allow one or more other devices in the home and/or remote from the home to communicate with the local office 103 and other devices beyond the local office. The gateway 111 may be a set-top box (STB), digital video recorder (DVR), computer server, security system, or any other desired computing device. The gateway 111 may also include (not shown) local network interfaces to provide communication signals to other devices in the home (e.g., user devices), such as televisions 112, additional STBs 113, personal computers 114, laptop computers 115, wireless devices 116 (wireless laptops, tablets and netbooks, mobile phones, mobile televisions, personal digital assistants (PDA), etc.), telephones 117, window security sensors 118, home security system 319, tablet computers 120, personal activity sensors 121, video cameras 122, motion detectors 123, microphones 124, and/or any other desired computers, sensors, such as ambient light sensors, passive infrared sensors, humidity sensors, temperature sensors, carbon dioxide sensors, carbon monoxide sensors, and others. Examples of the local network interfaces may include Multimedia Over Coax Alliance (MoCA) interfaces, Ethernet interfaces, universal serial bus (USB) interfaces, wireless interfaces (e.g., IEEE 802.11), Bluetooth interfaces, ZigBee interfaces and others.
The
One or more aspects of the disclosure may be embodied in computer-usable data and/or computer-executable instructions, such as in one or more program modules, executed by one or more computers (such as computing device 200) or other devices to perform any of the functions described herein. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other data processing device. The computer executable instructions may be stored on one or more computer readable media such as a hard disk, optical disk, removable storage media, solid state memory, RAM, etc. The functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like. Example data structures may be used to illustrate one or more aspects described herein, but these are merely illustrative examples.
In one arrangement, security system 319 and/or alarm panel 308 may be implemented in computing device 200, for example, with many functions disclosed herein implemented by security system application 201a.
In another arrangement, security system 319 and/or alarm panel 308 may be implemented as part of gateway 111 (
One or more cameras 310 or sensors may be located so as to monitor an access location of the premises 300, such as a door 304 or a window 305, or other traffic areas of premises 300. According to various techniques disclosed herein, images, sounds, and other data captured by a camera 310 or other sensors of may be transmitted by the security system 319, for example, as an email, text message, or through a software application to, for example, a remote or local user or device, for analysis and/or a predetermined and/or dynamically determined action.
One or more lights 311 may be located so as to illuminate an access location of the premises 300, such as a door 304 or a window 305, or other traffic areas of premises 300. According to various techniques disclosed herein, the alarm system 319 may control the light 311 to provide illumination as part of providing an alarm triggered by the security sensors.
From the example diagram of
Referring to
Additionally, or alternatively, the local office 302 may transfer an alert signal via one or more networks such as the WAN 313 (e.g., the Internet) to a monitoring entity 317 and/or a web portal server 318. The monitoring entity 317 may be the same entity as the local office 302 or a third party entity. Regardless, the monitoring entity 317 may be responsible for monitoring the premises 300. This may include responding to alert signals received when the security system detects an alarm event. For example, the monitoring entity 317 may immediately contact the appropriate authorities to dispatch them to the premises 300. Or, when an alert signal is transferred to the monitoring entity 317, this may prompt a representative or automated system of the monitoring entity 317 to contact (e.g., via a call, e-mail, text, and/or application) the premises or another designated entity (e.g., via a telephone number and/or other contact designation) to confirm the correctness of the alarm event and/or desired response to the alarm event. Also, the monitoring entity 317 may be send alert notifications to one more designated wired and/or wireless devices e.g., 315, 116, 120 in the form of a communication such as an email, text message, phone call and/or through a software application.
Meanwhile, the web portal server 318 may be a computing device capable of providing a web portal through which users may view, on any connected display device, information regarding the security of the premises 300. Users may log-on and/or gain access to the web portal provided by, for example, the web portal server 318 and view an alarm event and/or information related to an alarm event, such as what sensor was triggered and when it was triggered and/or associated dated related to the alarm event. Also through for example, the web portal, a user may be able to view video of the premises 300 captured by the camera 310 and/or may be able to check the status of the security system, to see if it is armed. Where the web portal server 318 is coupled to a suitable network such as WAN 313 (e.g., the Internet), the web portal for the premises 300 may be accessed using any device that can connect to the network, such as a smartphone, tablet, laptop, etc. The web portal may also be used to customize settings, such as schedules, to indicate when and how the security system should operate. For instance, using the web portal, a user may be able to indicate certain times during which the security system should automatically arm/and or disarm itself. The web portal may be coupled to the user's calendar either at work and/or on his or her phone and provide additional inputs to the arming and/or disarming of the security system. Additionally, the security system and/or web portal may use these inputs to determine that a user is outside of the premises and has not set his security system.
In some embodiments, the web portal may permit a user to view multiple premises 300. That is, a single interface may allow a user to view status information, video, security settings, etc. for a plurality of premises 300. In some cases, such information may be viewed simultaneously on the web portal. Having a single interface may be desirable to users who have multiple security systems at various remote locations, such as users who own multiple homes or businesses.
In some embodiments, the local office 302, monitoring authority 317, and/or security system 319 may communicate with multiple users of the security network. For example, the security network may consist of one or more primary users and one or more secondary users, such as family users or other individuals likely to be in the premises 300 on a regular basis. The primary user may designate what family users or other individuals to include in the security network. Other individuals may include members of the primary users' social network, such as neighbors and friends, etc. The primary user and the secondary users, if given authorization, may communicate with the local office 302, the monitoring entity 317 and/or the security system 319, for example, via a software application in their designated cellular devices 315.
In some embodiments, the security system 319 may be configured to confirm the location and identify of the users of the security network or other individuals in premises 300 to carry out the embodiments discussed herein. The security system 319 may employ several known techniques for doing so. For example, the security system 319 may determine the location of each user in the security network based on GPS location of each member's cellular devices 315, using Bluetooth or WiFi-based location, or other known methodologies. The security system 319 may also verify the identity of each user in the security network within premises 300 using several known person recognition techniques, including for example, known key code, voice recognition, facial or pattern recognition, and body-mass recognition, fingerprint recognition, retina scanner recognition, based on data collected from cameras, microphones, infrared sensors, biometric sensors, and/or any other desired sensors (e.g., using a cell phone/tablet microphone, camera, fingerprint scanner). Further, the biometric information may also be used to verify that the user is not under duress when he and/or she clears the alarm event. For example, the surrounding area may be scanned and/or the biometrics (including biometrics from a wearable device) may be configured to detect distress in the user attempting to deactivate the alarm notification.
In some embodiments, when an alarm event is detected, local office 302, monitoring authority 317, and/or security system 319 may transmit information regarding the alarm event to one or more users to help them better understand the scenario that triggered the alarm. For example, information about an alarm event may be transmitted to one or more mobile devices 315, 116, 120 and/or via the web portal server 318, identifying the sensor(s) that were tripped, when they were tripped, their location, recording video and/or audio showing the event that occurred, the locations of other individuals in the home or business premise, etc. The user and/or a predefined user configurable response application may be able to use such information regarding the alarm event to determine whether the alarm is a false alarm or whether authorities should be notified and dispatched.
In some embodiments, local office 302, monitoring authority 317, and/or security system 319 may transmit information giving one or more users the option to clear the alarm event as a false alarm. For example, information may be transmitting to the user's cellular devices 315 or via web portal server 318 enabling the user to disarm the notification and providing access to a confidential passphrase and/or other biometric identification discussed herein, which may be input when the local office 302 and/or monitoring entity 317 makes contact to verify the user, the fact that the user is not under distress, and the user's decision to disarm the notification.
In some embodiments, alert notifications to users of the security network may be tailored depending on their location in relation to premises 300. For example, if an alarm event is detected, and the security system 319 determines that one or more of the users of the security network is within 5 miles of the premises 300, then alert notifications may be sent to such users directing them to stay away from the premises 300 until the alarm event has been cleared. In another example, if an alarm event is detected, then the system may determine the location of the users of the security network so the alert notification sent to the primary user may contain information about the locations of other users of the security network. The notification to the primary user may (either optionally at the primary user's discretion and/or in response to configuration parameters) may send one and/or selected other users of the security network notifications depending on the nature of the alarm event. For example, if the notification sent to the primary user indicates an intruder in the premises 300, then the system may be configured to and/or the primary user may choose to send alert notifications to all and/or selected users of the security network near the premises 300 stay away until the alarm event has been cleared. Additionally, or alternatively, if the alarm is active and one or more users of the security network are shown to be in the premises 300, the primary user may determine that a user in the security network inadvertently triggered the alarm, in which case (e.g., after review of internal security footage and/or communication with the individual in the premises, the primary user may clear the event as a false alarm, as described in embodiments above. Also, the primary user may have the option to send the confidential passphrase, described in embodiments above, to one or more devices (e.g., devices 315, 120, 116) of one or more of the individuals determined to be in the premises 300 so they can use the passphrase in the event local office 302 or monitoring entity 317 calls to verify the decision to disarm the notification. This pass phrase may be a static or semi-static pass phrase and/or a pseudo random pass phrase generated by the security system 319 and/or the monitoring entity 317. The primary user may send the confidential passphrase to the devices (e.g., 315, 120, 116) of other users of the security network via SMS message, email, software application, or other known method. In some embodiments, before the primary can send the confidential passphrase to other users of the security network, the primary user may be required to authenticate himself or herself to the local office 302 and/or monitoring entity 317, such as by entry a confidential passcode as depicted in
In some embodiments, in the event the primary user chooses to provide other users of the security network with the confidential passphrase, an added level of security may be implemented whereby the other user(s) receiving the passphrase may have to verify that he or she is correctly in the premises 300 before the local office 302 or monitoring entity 317 permits the other user(s) to receive the passphrase. Such verification could be done several ways, including but not limited to, the system may listen for the audio signature of the siren within the premises 300, the cellular devices 315 may actively engage a Quick Response code or infrared beacon within the premises 300, the local office 302 or monitoring entity 317 could verify the other user's image on one of the internal cameras within the premises 300, or the local office 302 or monitoring entity 317 could ask the other user(s) a series of specific question only known to someone that is inside the premises 300.
In other embodiments, the security system 319 may use predetermined criteria to determine when an alarm should be triggered in order to reduce the amount of false alert notifications. In other words, an alarm event in security system 319 may be triggered only when there is a deviation from a predefined set of criteria. In some embodiments, the primary user may set certain criteria for what is considered an alarm event and when notifications should be sent. Predetermined criteria could include, for example, the location of users of the security network in relation to the premise 300, the time of day, the location of sensors within the premises 300, images on a camera, internal and/or external sensors, etc. The predetermined criteria can apply to one or more sensors within premises 300, and may include a combination of sensor data. For example, security system 319 may be configured to trigger an alarm event only if no users of the security network are within premises 300. In another example, the security system 319 may be configured to trigger an alarm event only if the body mass of a suspected intruder is larger than a predetermined value (e.g., larger than a pet that resided in the premises 300). For example, the user may be able to enter their pet's approximate weight and/or a picture showing the pet. The security system could then verify the triggering event was triggered by a pet via an analysis of infrared detector data and/or camera feed data. In another example, the security system 319 may be configured so that no alarm events are triggered when a user in the security network comes within a predetermined distance of the premises 300 during a specific time of day (e.g., returning from work).
In some embodiments, the local office 302, monitoring authority 317, and/or security system 319 may be configured to cancel an alarm event, send an alarm notification to one or more users, or notify and dispatch authorities after determining a confidence level that a triggering event is likely a real alarm and likely not a false alarm. For example, local office 302, monitoring authority 317, and/or security system 319 may be configured to determine a confidence level by analyzing information relating to the triggering event and comparing the information to predefined criteria. Information about the triggering event may include, for example, information relating to the sensor(s) that were tripped, when they were tripped, their location, recording video and/or audio showing the event that occurred, the locations of other individuals in the home or business premise, etc. If the local office 302, monitoring authority 317, and/or security system 319 determines that the confidence level is greater than 50%, for example, then an alarm notification may be sent to one or more users, and/or authorities may be notified and dispatched. If the local office 302, monitoring authority 317, and/or security system 319 determines that the confidence level is lower than 50%, for example, then the local office 302, monitoring authority 317, and/or security system 319 may terminate the alarm event, and/or send a notification informing them of the triggering event and the confidence level that the triggering event is likely false. In accordance with embodiments discussed herein, the local office 302, monitoring authority 317, and/or security system 319 may also provide one or more users information about the triggering event so that they may independently confirm whether or not the triggering event is false alarm.
The security system 319 may also be configured to group or characterize sensors of the premises 300 into different zones depending on their location within premises 300. The security system 319 may then be configured to set the zones to a different state of alert. In other words, users of the security system 319 may have the ability to set or change the state of alertness of each zone within the security system 319. For example, if no user in the security network is likely to be in the lower level of the premises 300 at night, then the state of the lower level may be set to trigger an alarm event upon any activity within the lower level. Similarly, if most of the users of the security network remain in the upper level of premises 300 at night, then the upper level may be set to trigger an alarm event only if an alarm is initiated manually or triggered from a perimeter sensor such as an outdoor, window, and/or door sensor. With this example, if an inside sensor on the upper level of premises 300 is tripped before a lower level sensor and no windows were opened or broken on the lower level, then the security system 319 may not trigger an alarm event since the probability of an intruder is extremely low.
In some embodiments, the security system 319 may be configured to learn the behavior of activities of the users of the security network and or other residents of premises 300, such as children and pets, in order to adjust alarm settings or modes and to determine when an alarm should be triggered. The security system 319 may be configured to learn by software stored, for example, on the RAM 203 or other appropriate memory or storage device in the computer device 200. The learning process may include, for example, monitoring the activities of users of the security network and other individuals within the premises 300 based on the time of the date and day of the week, any calendar entries, etc. For instance, one or more users of the security network may regularly enter the premises 300 at particular time of day (e.g., arriving home from work, and/or maid arrival). The security system 319 may keep track of the users' interaction with the alarm system and perform steps for the users, without the users' request. Continuing the example, if the security system 319 determines that a specific user in the security network routinely opens a garage door at 5 pm, then the security system 319 may automatically disarm the alarm at that time when that specific member arrives at the premises 300. This may or may not require facial and/or biometric identification and may be user selectable. In a similar example, if the security system 319 determines that all users of the security network routinely leave the premises 300 at 7 am, then the security system 319 may automatically arm the alarm at that time when the users leave the premises 300. Further, the security system could check internal sensors to ensure no other individuals are home at the time via internal sensors.
In some embodiments, when engaged by the user, the software application on wireless device 315 presents an initial screen or graphic on wireless device 315 relating to the security system 319. The security system 319 and software application may be configured so that initial screen presented on a user device (e.g., 315, 120, 116) is dependent on the state of the security system 319. In other words, when a user engages the software application on a user device (e.g., 315, 120, 116) the security system 319 may determine the current state of the security system 319, e.g., whether the system is armed, disarmed, in a secure state, in an unsecure states, etc. The software application on the wireless device 315 may then present a screen and/or associated graphic/video to the user depending on which state of the security system 319 is in at that time. For example, if an alarm is active, the software application on the user device (e.g., 315, 120, 116) may present the user a screen that allows the user to disarm/cancel a false alarm and/or choose the option to review the activities within the home, as depicted in
At step 502, an alarm event at a premises monitored by a security system may be detected.
At step 504, information relating to the alarm event may be recorded. For example, the security system 319 may record information identifying the sensor(s) that were tripped, their location, recording video and/or audio or other sensor data showing the event that occurred, etc.
At step 506, the security system 319 may determine whether the alarm event is a deviation from predefined criteria. Predefined criteria may include, for example, the time of day, the location of sensors within the premises 300, images on a camera, internal and/or external sensors, etc.
At step 508, the location of one or more users of the security system in relation to the premises may be determined. Methods for determining the location of or more users of the security system include, for example, using the GPS location of each user's cellular device 315, using Bluetooth or WiFi-based location, or other known methodologies.
At step 510, information relating to the alarm event may be selected. The selected information may relate, for example, to the location of one or more users of the security system, sensor data relating to the alarm event, other information relating to how the alarm event occurred, etc.
At step 512, an alert notification may be transmitted to one or more users of the security system. The alert notification may be sent, for example, if the security system 319 determines that the alarm event is a deviation from predetermined criteria. The alert notification may include information about the alarm event, such as, the location of one or more users of the security system, sensor data relating to the alarm event, information selected in step 510 relating to the alarm event, confidential information required for one or more users to terminate the alarm event, or the like.
At step 602, a software application on a device may be engaged.
At step 604, the state of alert of a security system associated with the software application may be determined.
At step 606, an interactive graphic may be selected based on the state of alert of the security system.
At step 608, the selected interactive graphic may be displayed on the device.
At step 702, an alarm event at a premises monitored by a security system may be detected.
At step 704, an alert notification containing confidential information related to termination of the alarm may be transmitted to a primary user of the security system. The confidential information may relate, for example, to a confidential passphrase.
At step 706, the primary user may be required to provide a confidential password before the primary user can access the confidential information required to terminate the alarm event.
At step 708, the confidential information may be transmitted from the primary user to a secondary user of the security system.
At step 710, the secondary user may be required to verify he or she is in the premises before the confidential information can be transmitted from the primary user to the secondary user.
At step 802, an alarm event at a premises monitored by a security system may be detected.
At step 804, the location of the alarm event may be determined.
At step 806, the state of alertness of the location that the alarm event occurred may be determined.
At step 808, based on the location of the alarm event and the state of alert of the location where the alarm event, an alert notification to one or more users of the security system may be transmitted.
At step 902, an alarm event at a premises monitored by a security system may be detected.
At step 904, a confidence level may be determined relating to whether or not the alarm event is a false alarm.
At step 906, an alert notification may be sent to one or more users of the security system if the confidence level is above a predetermined level.
At step 908, the alarm event may be terminated if the confidence level is below a predetermined level, and a notification may be sent to one or more users providing information about the alarm event and/or the confidence level.
The descriptions above are merely example embodiments of various concepts. They may be rearranged/divided/combined as desired, and one or more components or steps may be added or removed without departing from the spirit of the present disclosure. The scope of this patent should only be determined by the claims that follow.