The present disclosure relates to security and smart home systems, components thereof, and associated methods.
Various types of security systems and smart home systems are known. Improvements are needed.
In one aspect, a security system for a premises comprises a data communications network including a wireless local area network at the premises and a wide area network extending beyond the premises. The security system includes a host-carried security monitor carried by a host object at the premises for monitoring security data associated with the host object. The host-carried security monitor includes a plurality of security data sensors. The plurality of security data sensors include at least a motion sensor, a position sensor, and at least one of a temperature sensor or a humidity sensor. The motion sensor is configured to sense motion of the host-carried monitor and thus motion of the host object. The position sensor is configured to sense a position of the host-carried monitor relative to a reference. The host-carried security monitor includes a wireless communication port connecting the host-carried security monitor to the wireless local area network. The host-carried security monitor includes a security monitor controller and a security monitor storage medium. The security monitor storage medium stores instructions executable by the security monitor controller that, when executed by the security monitor controller, process security sensor data from at least one of the security data sensors to determine a security event and transmit a security event signal on the data communications network. The security system includes a security device at the premises and associated with the host-carried security monitor. The security device includes at least one of an image sensor configured to capture image data, a motion sensor configured to detect motion in a field of view of the motion sensor, or a switch configured to selectively close to provide electrical power to an electronic device operatively connected thereto. The security device includes a wireless communication port connecting the security device to the wireless local area network. The security device includes a security device controller and a security device tangible storage medium. The security system includes a server located remotely with respect to the premises and operatively connected to the wide area network. The server is in communication with the host-carried security monitor and the security device via the data communications network. The server includes a security system processor and a security system tangible storage medium. The security system tangible storage medium stores instructions executable by the security system processor that, when executed by the security system processor, determine an action instruction based on the security event signal received on the data communications network from the host-carried monitor and transmit said action instruction to the security device. The security device controller is responsive to the action instruction from the server to cause the security device to perform a security action.
In another aspect, a security system for a premises comprises a data communications network including a wireless local area network at the premises and a wide area network extending beyond the premises. A security data monitor at the premises monitors security data at the premises. The security data monitor includes at least one of a motion sensor, a position sensor, a temperature sensor, or a humidity sensor. The position sensor is configured to sense a position of the security data monitor relative to a reference. The security data monitor includes a wireless communication port connecting the security data monitor to the wireless local area network. The security data monitor includes a security data monitor controller and a security data monitor storage medium. The security data monitor storage medium stores instructions executable by the security data monitor controller that, when executed by the security data monitor controller, process sensor data from said at least one of the motion sensor, position sensor, temperature sensor, or humidity sensor, to determine a security event and transmit a security event signal on the data communications network. The security system includes a security device at the premises and associated with the security data monitor. The security device includes at least one of an image sensor configured to capture image data, a motion sensor configured to detect motion in a field of view of the motion sensor, or a switch configured to selectively close an electrical circuit to provide electrical power to an electronic device operatively connected thereto. The security device includes a wireless communication port connecting the security device to the wireless local area network. The security device includes a security device controller and a security device tangible storage medium. The security system includes a server located remotely with respect to the premises and operatively connected to the wide area network. The server being in communication with the host-carried security monitor and the security device via the data communications network. The server including a security system processor and a security system tangible storage medium. The security system tangible storage medium stores instructions executable by the security system processor that, when executed by the security system processor, determine an action instruction based on the security event signal received from the security data monitor via the data communications network, and transmit said action instruction to at least one of the security data monitor or security device. The tangible storage medium of said at least one of the security data monitor and security device stores instructions that, when executed by the respective security data monitor controller or security device controller, execute an action responsive to the action instruction from the server.
In yet another aspect, an electrical power switching control comprises a housing and electrical connectors supported by the housing. The electrical connectors are configured to connect the electrical power switch to a power grid. The electrical power switching control includes a switch configured to selectively close to close a circuit of the power grid to provide electrical power to an electrical device operatively connected thereto. The electrical power switching control includes an actuator supported by the housing and operatively connected to the switch. The switch is responsive to user input via the actuator to selectively close the switch to close the circuit. The electrical power switching control comprises a motion sensor supported by the housing. The motion sensor is configured to sense motion in a field of view of the motion sensor. A wireless communication port is supported by the housing. The wireless communication port is configured to connect to a wireless data communications network. The electrical power switching control includes an electrical power switching control controller and an electrical power switching control tangible storage medium. The electrical power switching tangible storage medium stores instructions executable by the electrical power switching controller that, when executed by the electrical power switch controller, process data from the motion sensor to determine a security event and transmit a security event signal on the data communications network.
Other objects and features of the present disclosure will be in part apparent and in part pointed out herein.
Corresponding reference characters indicate corresponding parts throughout the drawings.
Referring to the drawings,
The smart home and security monitoring system 10 is shown schematically in
The system includes smart security monitoring apparatus 10A and smart home apparatus 10B. The security monitoring apparatus 10A includes a plurality of security monitors 30A-30D, 32A-32E, 33A-33B (e.g., detectors, data collectors, etc.) configured to monitor various security parameters. As will become apparent, each of the monitors 30A-30D, 32A-32E, 33A-33B has one or more sensors configured to collect data for use in monitoring security, and at least one port for communicatively coupling the monitor to a network. The smart home apparatus 10B includes a plurality of smart home components 34A-34C configured to facilitate use of the home 12 and objects therein. The smart home apparatus 10B can be used in cooperation or coordination with the security monitoring apparatus 10A. In some embodiments, smart home apparatus 10B can double as security monitoring apparatus (security devices), and vice versa. The security monitoring apparatus 10A and smart home apparatus 10B may be referred to as devices (e.g., smart devices). As will be explained in further detail below, the system 10 also includes at least one smart communication terminal 36A, 36B (e.g., smart phone, tablet, and/or computer) configured to permit the user to interact with the security monitoring apparatus 10A and the smart home apparatus 10B.
The system 10 includes a data communication network 40 communicatively coupling the smart home apparatus 10B, the security monitoring apparatus 10A, the communication terminals 36A, 36B, and at least one remote computer 38 (broadly, “the cloud” or “remote server”). In the illustrated embodiment, the network 40 includes a local area network 40A (LAN) in the form of the wireless Wi-Fi network hosted by the router 28. The network 40 also includes a wide area network 40B (WAN) in the form of the Internet connected to the LAN 40A via the modem 26. It will be appreciated that communication terminals (e.g., 36A) located in the range of the LAN 40A (e.g., inside the building 12 or outside but proximate to the building) could be communicatively coupled to the smart home apparatus 10B and security monitoring apparatus 10A via the LAN 40A. Communication terminals (e.g., 36B) out of range of the LAN 40A can be communicatively coupled to the components on the LAN via the Internet 40B and the LAN. The data communications network 40 can also include a cellular network 40C (WAN) including one or more cellular towers for communicatively coupling components of the system 10. If a LAN or the Internet is not available at a site where the smart home apparatus 10B, security monitoring apparatus 10A, and/or smart communication terminal 36A, 36B is/are located, the cellular network 40C can be used to communicatively couple to the data communications network 40 and thus to the other components on the network. For example, if a system is to be deployed in a rural location, the Internet may not be available, but a cellular network 40C could be used for communicatively coupling one or more smart home and/or security monitoring apparatus 10B, 10A to one or more communication terminals and/or a remote server, as explained below. Referring to
As will become apparent, the smart devices perform some actions locally or onboard the devices. For example, see the process outlined in
In the illustrated embodiment, the monitors include a plurality of host-carried security monitors 30A-30D, a plurality of cameras 32A-32E, and a plurality of electrical power switches 33A, 33B (e.g., for turning on/off lights or selectively energizing electrical wall outlets). The host-carried security monitors 30A-30D are configured to monitor security data associated with a host which carries the monitor. For example, the monitor 30A-30D could be attached (e.g., mounted, secured, fastened) to the host, in which case the monitor could be referred to as a host-attached monitor. In some instances, a host-attached monitor 30A-30D could be used as a retrofit security solution on a host not originally constructed to include such a monitor. In some embodiments, the monitor 30A-30D could be formed as part of or integrated with the host. A host could be any object for which a user would like to monitor security. In the illustrated embodiment, a first host-carried security monitor 30A is carried by the exterior door 14, a second host-carried security monitor 30B is carried by the interior door 16, and a third host-carried security monitor 30C is carried by the vehicle 20. The first, second, and third host-carried monitors 30A-30C could be formed separately from their hosts and attached thereto such that the monitors are host-attached monitors. A fourth host-carried monitor 30D is carried by the object 22. As explained above, the object 22 could be a valuable, a container, a closure (e.g., door), etc. The fourth host-carried monitor 30D could be integrated with the object 22 as original equipment or be formed separately and attached to the object as a retrofit security solution. Hereafter, the object 22 will be referred to as a door of a vault (e.g., gun vault) and described in that context. The vault could be a room of the house or a stand-alone cabinet-type vault.
An example embodiment of a host-carried monitor 30A is shown in
The monitor 30A includes a power source 52, such as a battery (e.g., plurality of batteries) and/or electrical power port (e.g., micro USB port) configured to receive a power cable. The power port can be used as a primary power source, and the battery could be used as a backup power source. Alternatively, the battery may be used as a sole power source.
The monitor 30A includes a host-carried monitor controller 54 (e.g., microprocessor or processor) and a tangible storage medium 56 storing processor-executable instructions for execution by the controller 54. The controller 54 and tangible storage medium 56 (as with other controllers and tangible storage mediums described herein) could be embodied as single board computer including a circuit board, microprocessor(s), memory, input/output, and other devices, or other suitable constructions. For example, the tangible storage medium 56 can store instructions to connect the monitor 30A to the data communications network 40 when network availability is detected. The monitor 30A includes at least one communications port 58 configured to communicatively couple the monitor to the data communications network 40. For example, the port 58 could comprise a Wi-Fi transceiver for transmitting and receiving wireless data signals on the Wi-Fi network. The communications port 58 could comprise other types of wireless ports (e.g., Bluetooth, ZigBee, NFC, etc.) or wired ports (e.g., Ethernet, serial, etc.). Optionally, a cellular port 60 (transceiver) is also provided for communicatively coupling the monitor 30A to the cellular network 40C. The monitor 30A further includes a humidity sensor 62 and temperature sensor 64 (broadly, “environmental sensors”) for sensing environmental temperature and humidity conditions proximate the host. The monitor 30A includes a position sensor 66 for sensing a position of the monitor 30A and thus the position of the host carrying the monitor. For example, the position sensor 66 could be a Hall effect sensor, configured to sense a location of the sensor with respect to a magnet or reference 68 (
The monitor 30A includes a user interface 72 comprising a user input 74 and a user output 76. In the illustrated embodiment, the user input 74 comprises a button 74A (broadly, “actuator”) on the front of the monitor 30A. In the illustrated embodiment, the button forms substantially all of the front face of the monitor. For example, the button 74A could be used to “arm” or “disarm” the monitor 30A to selectively put the monitor in an active state of monitoring. The user output 76 includes an indicator 76A such as an LED (e.g., illuminated Lockdown logo) to indicate status information to the user. For example, the indicator 76A could indicate whether the monitor 30A is armed or disarmed (e.g., red or green, respectively), and/or the indicator could indicate charge level of the battery, network connection status, etc. The user output 76 could also include an audio or visual alarm (e.g., speaker or light) configured to indicate an alarm state based on sensed data, such as motion, change of position, etc. For example, a speaker could “chirp” whenever the host door is opened and/or closed, and the speaker could emit an alarm sound when the monitor is armed and preset alarm conditions are detected (e.g., motion, door open, temperature or humidity out of range, etc.).
The cameras 32A-32E can be located anywhere a user would like to monitor (e.g., interior or exterior location). In the embodiment illustrated in
An example embodiment of a camera 32A is shown in
The electrical power switches 33A-33B (broadly, “electrical power switching control”) can be located anywhere a conventional electrical power switch might be located, such as in a house or other building. The electrical power switches can have a configuration somewhat similar to a common electrical power switch and be connectable to an electrical power grid of the house, building, or other structure. For example, the electrical power switches may selectively supply electrical power to electrical devices, such as lights, fans, electrical power outlets, dehumidifiers, etc., in circuit with the electrical power switches on the electrical power grid of the structure. In the embodiment illustrated in
An example embodiment of an electrical power switch 33A (broadly, “electrical power switching control”) is shown in
Each switch 33A, 33B has a field of view (e.g., field of view of motion sensor 95 or image sensor 93) generally in the shape of a cone extending away from the switch. In the illustrated embodiment, the switches 33A, 33B are located to monitor objects also monitored by associated host-carried monitors 30A-30D. For example, a first switch 33A is located in the home interior to monitor the exterior door 14. A second switch 33B is located to monitor the vault door 22. In the illustrated embodiment, the field of view of each switch 33A-33B includes hosts carrying host-carried monitors 30A, 30D near the switch. Other arrangements can be used without departing from the scope of the present disclosure. For example, one or more switches could be used without an associated host-carried monitor, or vice versa.
The smart home components include a plurality of smart electrical outlets 34A-34C configured to selectively supply electrical power to electrical devices connected thereto. The smart electrical outlets 34A-34C can be located anywhere a user would like to have smart capabilities for an electrical device at an electrical power outlet. The smart electrical outlets 34A-34C can be used as a retrofit solution for adding smart capabilities to electrical devices. For example, a smart electrical outlet 34A-34C can provide the capability to turn on/off the electrical device connected thereto, based on programmed settings, from a user interface on a communication terminal 36A, 36B, and/or in coordination with operations of security monitoring apparatus. In the embodiment of
An example embodiment of a smart electrical power outlet 34A is shown in
As mentioned above, the system includes at least one smart communication terminal 36A, 36B configured to permit the user to interact with the smart home apparatus 10B and security monitoring apparatus 10A. The smart communication terminal 36A, 36B could be a smart telephone, a tablet, and/or a computer (e.g., laptop or desktop computer). In the system shown in
An example embodiment of a communication terminal 36A is shown in
In the dashboard view of
The user can use the user interface 152 and app on the communication terminal 36A, 36B to program settings of the system 10 to use smart home and/or security monitoring capabilities of the system. The communication terminal 36A, 36B is responsive to user input (e.g., user actuation of the touch screen 158) to transmit signals to the at least one remote computer 38 (the cloud or server) to change instructions and/or settings for operating the smart home and/or security apparatus. For example, referring to the view of the user interface shown in
The remote server 38 includes at least one processor 38A (broadly, “system controller”) and at least one tangible storage medium 38B storing instructions executable by the processor. The tangible storage medium 38B stores a database 38C (an example of which is shown in
In general, security monitoring apparatus 10A (e.g., host-carried monitor 30A-30D, electrical power switch 33A-33B) can communicate sensor data on the data communications network 40 to the at least one remote computer 38 (the server), which logs the data in the server 38C, and may send responsive control instructions to components of the system 10. Responsive to the sensor data, and depending on instructions stored in the tangible storage medium 38B of the at least one remote computer 38 (e.g., previously set using the user interface of a communication terminal), notifications may be sent to one or more communication terminals 36A, 36B. For example, communication terminals 36A, 36B may receive notification signals from the at least one remote computer 38 via the data communications network 40 to display a notification to the user associated with the sensor data. Notification signals may be sent via email, SMS (text message), or via the app (to be displayed as a notification on screen). Example notifications include “high humidity,” “high temperature,” “low temperature,” “door open,” “motion sensed,” “tampering sensed,” “low battery,” etc. Also, responsive to the sensor data, and depending on instructions stored in the tangible storage medium 38B of the at least one remote computer 38, control signals (action instructions) may be sent to other components of the system. For example, control instructions may cause a camera 32A-32D associated with the respective host-carried monitor 30A-30D (e.g., having in its field of view the host carrying the host-carrying monitor) to start recording video (broadly, “capture image data”), and/or cause a smart electrical outlet 34A-34C associated with the host-carried monitor to supply power or cease supplying power to an electrical device (e.g., dehumidifier, light, coffee maker, etc.) connected thereto. As another example, control instructions may cause a camera 32A-32D associated with the respective electrical power switch 33A, 33B to start recording video, and/or cause the electrical power switch 33A, 33B to supply power or cease supplying power. Moreover, responsive to sensor data, the at least one remote computer 38 may change settings or instructions stored in the cloud for controlling operation of one or more of the smart home and/or security monitoring apparatus 10B, 10A. For example, when the front door 14 is opened and closed (i.e., the user leaves the home) the at least one remote computer 38 could change the mode or status of the security monitoring apparatus 10A to “armed” (e.g., LOCKED DOWN), and send control signals to the respective security monitoring apparatus to operate as programmed or preset in an armed mode. Various events and examples of associated reactions are outlined in
Each camera 32A-32E can communicate sensor data (e.g., motion sensor data or image sensor data) on the data communications network 40 to the at least one remote computer 38 (the cloud), which logs the data in the server 38C. While armed, the cameras 32A-32E may collect image sensor data continuously, when motion is sensed by the camera, or when instructed to by the at least one remote computer 38 (e.g., responsive to sensor data from another component of the system and/or instructions from a communication terminal). Responsive to the image sensor data, depending on the instructions stored in the tangible storage medium 38B of the at least one remote computer 38 (e.g., previously set using the user interface of a communication terminal), notifications may be sent to one or more communication terminals 36A, 36B. For example, communication terminals 36A, 36B may receive notification signals from the at least one remote computer 38 via the data communications network 40 to display a notification to the user (e.g., via email, text message, or the app) that motion has been detected and/or sensor image data has been collected. The user could then open the application on the communication terminal 36A, 36B and view the logged motion data and/or image sensor data (e.g., photos or video). Moreover, on the communication terminal 36A, 36B via the app, the user could see real time image sensor data (e.g., video feed) from the respective camera 32A-32E and/or other cameras.
Each smart electrical outlet 34A-34C can be controlled by the at least one remote computer 38 in response to sensor data received from security monitoring apparatus 10A and/or smart home apparatus 10B. For example, responsive to motion sensor data, image sensor data, environmental sensor data, or other sensor data (or security event signals representative of same) from one or more of the security apparatus 10A (e.g., host-carried monitors 30A-30D or cameras 32A-32E), and based on settings or instructions stored on the tangible storage medium 38B (e.g., previously set using the user interface of a communication terminal 36A, 36B), a control signal or action instruction could be sent to one or more of the smart electrical outlets 34A-34C to supply electrical power to an electrical device connected thereto. For example, a light 24A, dehumidifier 24B, coffee maker 24C, etc. connected to a smart electrical outlet may be turned on/off. Moreover, each smart electrical outlet 34A-34C could be controlled via a communication terminal 36A, 36B to turn on/off electrical power in an ad hoc fashion (e.g., in addition to or overriding the programmed settings or instructions stored for that smart electrical outlet in the cloud). Usage data for the smart electrical outlet 34A-34C can be logged in the cloud 38 and viewable on the communication terminals 36A, 36B.
In view of the above, it will be appreciated that a user can program various instructions or settings for the individual components as desired for a particular application, which may include operating in coordination or cooperation with other components of the system 10. For example, the system 10 as illustrated in
Referring to
Referring to
The monitor 230D includes a power source 252, including an internal battery and/or electrical power port(s) configured to receive a power cable. In one example, the monitor includes a battery that serves as a backup power source, and includes electrical power ports on the front and rear of the door frame which may be used as a primary power source. For example, a power cord plugged into an electrical power outlet can be connected to a power port of the door assembly, or a power cord connected to terminals of a battery (e.g., 12 volt battery) can be plugged into a power port of the door assembly. When a source of power is connected to one of the power ports, the internal backup battery is charged and maintained in a charged state in case it is needed upon loss of the primary power source. Besides the internal battery, a battery could also be connected to one of the electrical power ports to serve as an additional backup power source.
The monitor 230D includes a monitor controller 254 (e.g., microprocessor or processor) and a tangible storage medium 256 storing processor-executable instructions for execution by the controller 254. For example, the tangible storage medium 256 can store instructions to connect the monitor 230D to the data communications network 40 when network availability is detected. The monitor 230D includes at least one communications port 258 configured to communicatively couple the monitor to the data communications network 40. For example, the port 258 could comprise a Wi-Fi transceiver for transmitting and receiving wireless data signals on the Wi-Fi network. The communications port 258 could comprise other types of wireless ports (e.g., Bluetooth, ZigBee, NFC, etc.) or wired ports (e.g., Ethernet, serial, etc.). Optionally, a cellular port 260 is also provided for communicatively coupling the monitor 230D to the cellular network 40C. The monitor 230D further includes a humidity sensor 262 and temperature sensor 264 (broadly, “environmental sensors”) for sensing environmental temperature and humidity conditions proximate the door 222. The monitor 230D includes a position sensor 266 (e.g., built into the door 222) for sensing a position of the monitor 230D and thus the position of the door. For example, the position sensor 266 could be a Hall effect sensor, configured to sense a location of the sensor with respect to a magnet or reference 268 (
The user interface 272 of the monitor 230D comprises a user input 274 and a user output 276. In the illustrated embodiment, the user input 274 comprises a plurality of buttons 274A (broadly, “actuators”) on the front of the monitor 230D. In the illustrated embodiment, the buttons comprise number buttons (e.g., 0 through 9) for entering a code to unlock the door 222. The buttons 274A could also be used to “arm” or “disarm” the monitor 230D to selectively put the monitor in an active state of monitoring. The user output 276 includes a plurality of indicators 276A-276E (e.g., LEDs or display sections). First, second, and third indicators 276A-276C can indicate things such as armed/disarmed, Wi-Fi connection, low battery, alarm state, or service needed. The indicator 276D indicates the current temperature sensed by the temperature sensor 264. The indicator 276E indicates the current humidity sensed by the humidity sensor 262. Other indicators can be provided. The user output 76 could also include an audio or visual alarm (e.g., speaker or light) configured to indicate an alarm state based on sensed data, such as motion, change of position, etc. For example, a speaker could “chirp” whenever the host door is opened and/or closed, and the speaker could emit an alarm sound when the monitor is armed and preset alarm conditions are detected (e.g., motion, door open, temperature or humidity out of range, etc.). Moreover, sensed data (e.g., locked/unlocked) can be recorded by the remote computer 38, sent to the user's communication terminal (e.g., text, email, other notification), and cause the remote computer 38 to control components of the system in various ways as explained above. The user can view real time and historical data associated with the monitor 230D on their communication terminal.
Embodiments of the present disclosure may comprise a special purpose computer including a variety of computer hardware, as described in greater detail below.
Embodiments within the scope of the present disclosure also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable media can be any available media that can be accessed by a special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage, or other magnetic storage devices, or any other medium that can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and that can be accessed by a general purpose or special purpose computer. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of computer-readable media. Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
The following discussion is intended to provide a brief, general description of a suitable computing environment in which aspects of the disclosure may be implemented. Although not required, aspects of the disclosure will be described in the general context of computer-executable instructions, such as program modules, being executed by computers in network environments. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represent examples of corresponding acts for implementing the functions described in such steps.
Those skilled in the art will appreciate that aspects of the disclosure may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Aspects of the disclosure may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
An exemplary system for implementing aspects of the disclosure includes a general purpose computing device in the form of a conventional computer, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. The system bus may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. The system memory includes read only memory (ROM) and random access memory (RAM). A basic input/output system (BIOS), containing the basic routines that help transfer information between elements within the computer, such as during start-up, may be stored in ROM. Further, the computer may include any device (e.g., computer, laptop, tablet, PDA, cell phone, mobile phone, a smart television, and the like) that is capable of receiving or transmitting an IP address wirelessly to or from the internet.
The computer may also include a magnetic hard disk drive for reading from and writing to a magnetic hard disk, a magnetic disk drive for reading from or writing to a removable magnetic disk, and an optical disk drive for reading from or writing to removable optical disk such as a CD-ROM or other optical media. The magnetic hard disk drive, magnetic disk drive, and optical disk drive are connected to the system bus by a hard disk drive interface, a magnetic disk drive-interface, and an optical drive interface, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer-executable instructions, data structures, program modules, and other data for the computer. Although the exemplary environment described herein employs a magnetic hard disk, a removable magnetic disk, and a removable optical disk, other types of computer readable media for storing data can be used, including magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, RAMs, ROMs, solid state drives (SSDs), and the like.
The computer typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by the computer and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media include both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media are non-transitory and include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, SSDs, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired non-transitory information, which can accessed by the computer. Alternatively, communication media typically embody computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
Program code means comprising one or more program modules may be stored on the hard disk, magnetic disk, optical disk, ROM, and/or RAM, including an operating system, one or more application programs, other program modules, and program data. A user may enter commands and information into the computer through a keyboard, pointing device, or other input device, such as a microphone, joy stick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit through a serial port interface coupled to the system bus. Alternatively, the input devices may be connected by other interfaces, such as a parallel port, a game port, or a universal serial bus (USB). A monitor or another display device is also connected to the system bus via an interface, such as video adapter 48. In addition to the monitor, personal computers typically include other peripheral output devices (not shown), such as speakers and printers.
One or more aspects of the disclosure may be embodied in computer-executable instructions (i.e., software), routines, or functions stored in system memory or non-volatile memory as application programs, program modules, and/or program data. The software may alternatively be stored remotely, such as on a remote computer with remote application programs. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The computer executable instructions may be stored on one or more tangible, non-transitory computer readable media (e.g., hard disk, optical disk, removable storage media, solid state memory, RAM, etc.) and executed by one or more processors or other devices. As will be appreciated by one of skill in the art, the functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, application specific integrated circuits, field programmable gate arrays (FPGA), and the like.
The computer may operate in a networked environment using logical connections to one or more remote computers. The remote computers may each be another personal computer, a tablet, a PDA, a server, a router, a network PC, a peer device, or other common network node, and typically include many or all of the elements described above relative to the computer. The logical connections include a local area network (LAN) and a wide area network (WAN) that are presented here by way of example and not limitation. Such networking environments are commonplace in office-wide or enterprise-wide computer networks, intranets and the Internet.
When used in a LAN networking environment, the computer is connected to the local network through a network interface or adapter. When used in a WAN networking environment, the computer may include a modem, a wireless link, or other means for establishing communications over the wide area network, such as the Internet. The modem, which may be internal or external, is connected to the system bus via the serial port interface. In a networked environment, program modules depicted relative to the computer, or portions thereof, may be stored in the remote memory storage device. It will be appreciated that the network connections shown are exemplary and other means of establishing communications over wide area network may be used.
Preferably, computer-executable instructions are stored in a memory, such as the hard disk drive, and executed by the computer. Advantageously, the computer processor has the capability to perform all operations (e.g., execute computer-executable instructions) in real-time.
The order of execution or performance of the operations in embodiments of the disclosure illustrated and described herein is not essential, unless otherwise specified. That is, the operations may be performed in any order, unless otherwise specified, and embodiments of the disclosure may include additional or fewer operations than those disclosed herein. For example, it is contemplated that executing or performing a particular operation before, contemporaneously with, or after another operation is within the scope of aspects of the disclosure.
Embodiments of the disclosure may be implemented with computer-executable instructions. The computer-executable instructions may be organized into one or more computer-executable components or modules. Aspects of the disclosure may be implemented with any number and organization of such components or modules. For example, aspects of the disclosure are not limited to the specific computer-executable instructions or the specific components or modules illustrated in the figures and described herein. Other embodiments of the disclosure may include different computer-executable instructions or components having more or less functionality than illustrated and described herein.
It will be appreciated that the embodiments disclosed herein are by way of example and not limitation, and that deviations from the disclosed embodiments and features can be used without departing from the scope of the invention defined in the claims.
The present application claims priority to U.S. Provisional patent application Serial No. 62/941,298, filed Nov. 27, 2019, and Ser. No. 63/060,277, filed Aug. 3, 2020, each of which is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
4337462 | Lemelson | Jun 1982 | A |
6535110 | Arora et al. | Mar 2003 | B1 |
7113091 | Script et al. | Sep 2006 | B2 |
7394381 | Hanson et al. | Jul 2008 | B2 |
7554320 | Kagan | Jun 2009 | B2 |
7554445 | Script et al. | Jun 2009 | B2 |
7936271 | Karr et al. | May 2011 | B2 |
8013744 | Tsai et al. | Sep 2011 | B2 |
8050206 | Siann et al. | Nov 2011 | B2 |
8138626 | Jonsson et al. | Mar 2012 | B2 |
8217789 | Script | Jul 2012 | B2 |
8255090 | Frader-Thompson et al. | Aug 2012 | B2 |
8334906 | Lipton et al. | Dec 2012 | B2 |
8503539 | Fran | Aug 2013 | B2 |
8548607 | Belz et al. | Oct 2013 | B1 |
8578001 | Young et al. | Nov 2013 | B2 |
8587648 | Olsson et al. | Nov 2013 | B2 |
8610305 | Sarid et al. | Dec 2013 | B2 |
8634476 | Tran | Jan 2014 | B2 |
8718718 | Leung | May 2014 | B2 |
8768141 | Chan | Jul 2014 | B2 |
8822924 | Valentino et al. | Sep 2014 | B2 |
8849596 | Ting et al. | Sep 2014 | B2 |
8872390 | Buchheim et al. | Oct 2014 | B2 |
8902315 | Fisher et al. | Dec 2014 | B2 |
8996188 | Frader-Thompson et al. | Mar 2015 | B2 |
9013283 | Tackaberry | Apr 2015 | B1 |
9080782 | Sheikh | Jul 2015 | B1 |
9113051 | Scalisi | Aug 2015 | B1 |
9117251 | Schmidt et al. | Aug 2015 | B2 |
9179058 | Zeira et al. | Nov 2015 | B1 |
9179105 | Zeira et al. | Nov 2015 | B1 |
9207659 | Sami | Dec 2015 | B1 |
9219361 | Wine et al. | Dec 2015 | B1 |
9224096 | Oppenheimer | Dec 2015 | B2 |
9231351 | Chung et al. | Jan 2016 | B2 |
9270116 | Adams | Feb 2016 | B2 |
9277105 | Olsson et al. | Mar 2016 | B2 |
9328857 | Conte et al. | May 2016 | B2 |
9329650 | Paul et al. | May 2016 | B2 |
9360682 | Edwards | Jun 2016 | B1 |
9408268 | Recker et al. | Aug 2016 | B2 |
9438865 | Renkis | Sep 2016 | B2 |
9439045 | Kingsmill et al. | Sep 2016 | B2 |
9443366 | Rayner | Sep 2016 | B2 |
9456131 | Tran | Sep 2016 | B2 |
9460596 | Moses | Oct 2016 | B1 |
9489745 | Heitz, III et al. | Nov 2016 | B1 |
9526153 | Noori et al. | Dec 2016 | B2 |
9576166 | Burch, V et al. | Feb 2017 | B2 |
9576466 | Sager et al. | Feb 2017 | B2 |
9578234 | Tran | Feb 2017 | B2 |
9588534 | Chapel et al. | Mar 2017 | B2 |
9589436 | Herman et al. | Mar 2017 | B2 |
9591267 | Lipton et al. | Mar 2017 | B2 |
9596098 | Djakovic et al. | Mar 2017 | B1 |
9626849 | Dixon et al. | Apr 2017 | B2 |
9648277 | Edwards | May 2017 | B2 |
9672705 | Modi et al. | Jun 2017 | B2 |
9690272 | Chin et al. | Jun 2017 | B2 |
9697709 | King et al. | Jul 2017 | B2 |
9699281 | Fisher et al. | Jul 2017 | B2 |
9749595 | Lo et al. | Aug 2017 | B2 |
9755459 | Wiggins | Sep 2017 | B2 |
9767249 | Belz et al. | Sep 2017 | B1 |
9769420 | Moses | Sep 2017 | B1 |
9819226 | Yang et al. | Nov 2017 | B2 |
9819713 | Siminoff et al. | Nov 2017 | B2 |
9830795 | Kay | Nov 2017 | B2 |
9836945 | Kramer et al. | Dec 2017 | B2 |
9852388 | Swieter et al. | Dec 2017 | B1 |
9860352 | Fisher et al. | Jan 2018 | B2 |
9876357 | Paul et al. | Jan 2018 | B2 |
9883085 | Piednoir | Jan 2018 | B2 |
9913352 | Noori et al. | Mar 2018 | B2 |
9915991 | Zhang et al. | Mar 2018 | B2 |
9916755 | Ratti | Mar 2018 | B1 |
9942525 | Duffy et al. | Apr 2018 | B2 |
9954381 | AbuEideh | Apr 2018 | B2 |
10009519 | Olsson et al. | Jun 2018 | B2 |
10017963 | Johnson et al. | Jul 2018 | B2 |
10031911 | Sharma et al. | Jul 2018 | B2 |
10032354 | Kay | Jul 2018 | B2 |
10034359 | Recker et al. | Jul 2018 | B2 |
10037662 | King et al. | Jul 2018 | B2 |
10061288 | Jablokov et al. | Aug 2018 | B2 |
10062533 | Qureshi et al. | Aug 2018 | B2 |
10069332 | Cook | Sep 2018 | B2 |
10072942 | Wootton et al. | Sep 2018 | B2 |
10083599 | Sager et al. | Sep 2018 | B2 |
10117309 | Fu et al. | Oct 2018 | B1 |
10121028 | Sengstaken, Jr. | Nov 2018 | B2 |
10135628 | Imes et al. | Nov 2018 | B2 |
10194279 | Kingsmill et al. | Jan 2019 | B2 |
10194296 | Tetreault et al. | Jan 2019 | B2 |
10209727 | Chapel et al. | Feb 2019 | B2 |
10211999 | Pelton et al. | Feb 2019 | B2 |
10230880 | Chien | Mar 2019 | B2 |
10264170 | Chien | Apr 2019 | B2 |
10277785 | Kraz et al. | Apr 2019 | B2 |
10290198 | Kay | May 2019 | B2 |
10290447 | Qureshi et al. | May 2019 | B2 |
10291065 | Chan et al. | May 2019 | B2 |
10296794 | Ratti | May 2019 | B2 |
10304319 | Sager et al. | May 2019 | B2 |
10311689 | Meganathan et al. | Jun 2019 | B1 |
10326247 | Kohen | Jun 2019 | B2 |
10332384 | Schryer et al. | Jun 2019 | B1 |
10339773 | Kennedy et al. | Jul 2019 | B2 |
10349149 | Gelonese et al. | Jul 2019 | B2 |
10366588 | Slavin et al. | Jul 2019 | B2 |
10383072 | Do et al. | Aug 2019 | B2 |
10389546 | Djakovic et al. | Aug 2019 | B2 |
10389982 | Fu et al. | Aug 2019 | B1 |
10389983 | Fu et al. | Aug 2019 | B1 |
10394227 | Michalscheck et al. | Aug 2019 | B2 |
10419540 | Arora et al. | Sep 2019 | B2 |
10424189 | Daoura et al. | Sep 2019 | B2 |
10425241 | Kim et al. | Sep 2019 | B2 |
10436615 | Agarwal et al. | Oct 2019 | B2 |
10447037 | Hall et al. | Oct 2019 | B2 |
10448211 | Shen et al. | Oct 2019 | B1 |
20030020611 | Script et al. | Jan 2003 | A1 |
20080073431 | Davis | May 2008 | A1 |
20140266669 | Fadell | Sep 2014 | A1 |
20150066227 | Chapel et al. | Mar 2015 | A1 |
20150070190 | Wai Fong et al. | Mar 2015 | A1 |
20150097949 | Ure et al. | Apr 2015 | A1 |
20150097961 | Ure et al. | Apr 2015 | A1 |
20150194040 | Fiedler et al. | Jul 2015 | A1 |
20160125714 | Kates et al. | May 2016 | A1 |
20160209899 | Brantner et al. | Jul 2016 | A1 |
20160224043 | Liu et al. | Aug 2016 | A1 |
20160323118 | DiPoala | Nov 2016 | A1 |
20170067201 | Jeon et al. | Mar 2017 | A1 |
20170272697 | Moses | Sep 2017 | A1 |
20170308109 | Chapel et al. | Oct 2017 | A1 |
20170365143 | King et al. | Dec 2017 | A1 |
20180048750 | Hardi | Feb 2018 | A1 |
20180062674 | Boghrat et al. | Mar 2018 | A1 |
20180158312 | Tannenbaum | Jun 2018 | A1 |
20180198984 | Palma et al. | Jul 2018 | A1 |
20180322751 | Sacre et al. | Nov 2018 | A1 |
20180323645 | Wilberforce | Nov 2018 | A1 |
20180343402 | Roth et al. | Nov 2018 | A1 |
20180343403 | Mehdi et al. | Nov 2018 | A1 |
20180364689 | O'Brien | Dec 2018 | A1 |
20190004486 | Hall et al. | Jan 2019 | A1 |
20190006064 | Hall et al. | Jan 2019 | A1 |
20190006833 | Hall et al. | Jan 2019 | A1 |
20190027875 | Parks | Jan 2019 | A1 |
20190027963 | Parks | Jan 2019 | A1 |
20190088096 | King et al. | Mar 2019 | A1 |
20190149969 | Tetreault et al. | May 2019 | A1 |
20190162705 | Langenberg et al. | May 2019 | A1 |
20190174099 | Hodge et al. | Jun 2019 | A1 |
20190180163 | Awheda et al. | Jun 2019 | A1 |
20190181690 | Haartsen et al. | Jun 2019 | A1 |
20190197858 | Moses | Jun 2019 | A1 |
20190199907 | Daulton | Jun 2019 | A1 |
20190226915 | Zhang et al. | Jul 2019 | A1 |
20190259260 | Amini et al. | Aug 2019 | A1 |
20190312396 | Kohen | Oct 2019 | A1 |
20190313227 | Berlin et al. | Oct 2019 | A1 |
20190378399 | Hoofe, IV | Dec 2019 | A1 |
Entry |
---|
Liberty Safelert Setup Guide, downloaded from www.Manualslib.com, copyright date 2015, 2 pages. |
MyCleverHouse.com, Smart Home Devices That Complement Every House, 6 Reasons Why Liberty Safelert is Inferior to Nest Cam for Gun Safe, Jan. 5, 2017, 12 pages. |
Brilliant Introduces Smart Home Control for Everyone, edn.com/brilliant-introduces-smart-home-control-for-everyone/, Feb. 8, 2017, 4 pages. |
Brilliant Smart Home Control Demo (on YouTube) dated Feb. 26, 2017, 1 page. |
Broussard, Mitchel, ‘Brilliant Control’ Lauches to Replace Regular Light Switches With Smart Home Controls, HomeKit Coming Later, Sep. 6, 2018, 8 pages. |
Rossignol, Joe, ‘Brilliant’ Aims to Replace Your Home's Light Switches With Touchscreens, Feb. 8, 2017, 7 pages. |
Number | Date | Country | |
---|---|---|---|
20210160461 A1 | May 2021 | US |
Number | Date | Country | |
---|---|---|---|
63060277 | Aug 2020 | US | |
62941298 | Nov 2019 | US |