The present disclosure generally relates to managing a connected property. More particularly, the present disclosure relates to assessing data from smart devices to identify property intrusion events, and facilitating actions to mitigate the property intrusion events.
With the proliferation of the “internet of things,” more household devices and items are gaining communication and network connectivity capabilities. The new capabilities are enabling easier data detection and more accurate information and metrics. However, the ability to detect certain conditions associated with devices and items may be limited. Additionally, the channels to control and maintain devices and items as a response to certain conditions may also be limited.
The present embodiments may, inter alia, access certain device data to detect certain conditions within a property, and determine actions or commands to perform to address the conditions. Further, the present embodiments may effectively and efficiently communicate relevant information associated with the conditions and enable users to facilitate the actions or commands. One particular functionality relates to analyzing device data to detect property intrusion events, and then performing actions to mitigate the property intrusion events and/or notifying individuals of the property intrusion events.
Generally, the present embodiments may relate to (1) home control and/or automation, as well as (2) loss prevention, reduction, and/or mitigation through proactively identifying attempted property intrusion events, notifying an individual of property intrusion events, and/or facilitating commands or actions to mitigate the property intrusion events. The foregoing functionality may also be used by an insurance provider to generate, update, or adjust insurance policies, premiums, rates, discounts, points, and/or rewards, and/or make recommendations to an insured individual.
According to one embodiment, a computer-implemented method of detecting property intrusion within a property may be provided. The property may be populated with a hardware controller in communication with a plurality of sensors disposed within the property. The computer-implemented method may include (1) receiving, by the hardware controller, sensor data from at least one sensor of the plurality of sensors, and/or (2) accessing baseline sensor data corresponding to a set of default intrusion attempts. The computer-implemented method may further include (3) comparing, by one or more processors, the received sensor data to the baseline sensor data including: determining a level of similarity between the received sensor data and the baseline sensor data, and/or determining that the level of similarity meets a threshold value. Additionally, the computer-implemented method may include (4) responsive to the comparing, generating a notification that indicates a property intrusion event indicated in the received sensor data, and/or (5) communicating the notification to an electronic device of an individual associated with the property to facilitate remotely issuing commands or otherwise mitigating damage associated with, or caused by, the property intrusion event. The method may include additional, less, or alternate actions, including those discussed elsewhere herein.
According to another embodiment, a hardware controller for detecting property intrusion within a property may be provided. The hardware controller may be in communication with a set of devices populated within the property. The hardware controller may include a communication module adapted to interface with the set of devices populated within the property, a memory adapted to store non-transitory computer executable instructions, and/or a processor adapted to interface with the communication module. The processor may configured to execute the non-transitory computer executable instructions to cause the processor to receive, via the communication module, sensor data from at least one device of the set of devices, and/or access baseline sensor data corresponding to a set of default intrusion attempts. The processor may further be configured to compare the received sensor data to the baseline sensor data including: determine a level of similarity between the received sensor data and the baseline sensor data, and/or determine that the level of similarity meets a threshold value. Additionally, the processor may be configured to, responsive to the comparing, generate a notification that indicates a property intrusion event indicated in the received sensor data, and transmit, via the communication module, the notification to an electronic device of an individual associated with the property. The electronic device may allow the individual to select various commands to facilitate mitigation of damage caused by the property intrusion event. The hardware controller and/or processor may be configured to include additional, less, or alternate functionality, including that discussed elsewhere herein.
Advantages will become more apparent to those skilled in the art from the following description of the preferred embodiments which have been shown and described by way of illustration. As will be realized, the present embodiments may be capable of other and different embodiments, and their details are capable of modification in various respects. Accordingly, the drawings and description are to be regarded as illustrative in nature and not as restrictive.
The Figures described below depict various aspects of the system and methods disclosed herein. It should be understood that each Figure depicts an embodiment of a particular aspect of the disclosed system and methods, and that each of the figures is intended to accord with a possible embodiment thereof. Further, wherever possible, the following description refers to the reference numerals included in the following figures, in which features depicted in multiple figures are designated with consistent reference numerals.
There are shown in the drawings arrangements which are presently discussed, it being understood, however, that the present embodiments are not limited to the precise arrangements and instrumentalities shown, wherein:
The Figures depict preferred embodiments for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the systems and methods illustrated herein may be employed without departing from the principles of the invention described herein.
The present embodiments may relate to, inter alia, assessing and managing operation of devices or personal property within a home or other type of property, such as household furniture, appliances, electronics, vehicles (e.g., cars, boats, motorcycles), and/or other personal belongings (e.g., clothing, jewelry, antiques). Generally, a home or property may have a “smart” central controller that may be wirelessly connected, or connected via hard-wire, with various household related items, devices, and/or sensors. The central controller may be associated with any type of property, such as homes, office buildings, restaurants, farms, and/or other types of properties.
The central controller, and/or one or more remote processors or servers associated with an insurance provider or other entity, may be in wireless or wired communication with various “smart” items or devices, such as smart appliances (e.g., clothes washer, dryer, dish washer, refrigerator, etc.); smart heating devices (e.g., furnace, space heater, etc.); smart cooling devices (e.g., air conditioning units, fans, ceiling fans, etc.); smart plumbing fixtures (e.g., toilets, showers, water heaters, piping, interior and yard sprinklers, etc.); smart cooking devices (e.g., stoves, ovens, grills, microwaves, etc.); smart wiring, lighting, and lamps; smart personal vehicles; smart thermostats; smart windows, doors, or garage doors; smart window blinds or shutters; and/or other smart devices and/or sensors capable of wireless or wired communication. Each smart device (or sensor associated therewith), as well as the central controller and/or insurance provider remote processor(s), may be equipped with a processor, memory unit, software applications, wireless transceivers, local power supply, various types of sensors, and/or other components.
The central controller, and/or insurance provider remote processor(s), may collect or retrieve various data from the devices or personal property, analyze the data, and/or identify various actions to facilitate based upon the analysis. In particular, the central controller and/or insurance provider remote processor(s) may receive operation data from the smart devices, where the operation data may include various sensor data associated with the smart devices. The central controller and/or insurance provider remote processor(s) may compare the operation data to baseline sensor data, where the baseline sensor data may correspond to “default” property intrusion attempts or otherwise sensor data that may be consistent with one or more different types of property intrusion attempts. The comparison may indicate a level of similarity between the received sensor data and the baseline sensor data.
Based upon the comparison, the central controller and/or insurance provider remote processor(s) may determine that the property may be experiencing a property intrusion, identify a command or action to perform to mitigate the property intrusion, and/or facilitate performance of the command or action. The central controller and/or insurance provider remote processor(s) may communicate with a user device (or mobile device) of an individual associated with the property (e.g., an occupant or owner of the property) to notify the individual of the property intrusion. The individual may use the user device to select various commands or actions to take to facilitate mitigation of the property intrusion.
The systems and methods discussed herein address a challenge that is particular to property management. In particular, the challenge relates to a difficulty in identifying the occurrence of a property intrusion event associated with a property, as well as a difficulty in mitigating the property intrusion event. This is particularly apparent when the property is unoccupied. Conventional security systems may only activate when a certain condition is triggered. However, these conventional security systems may not account for many of seemingly limitless ways of gaining unlawful access to a property. In contrast, the present systems and methods leverage sensor data from connected devices to detect and identify certain types of property intrusion events, and/or dynamically identify commands or actions to facilitate to mitigate the property intrusion events. Therefore, because the systems and methods employ the collection and analysis of sensors data associated with connected devices within the property, the systems and methods are necessarily rooted in computer technology in order to overcome the noted shortcomings that specifically arise in the realm of property management.
Similarly, the systems and methods provide improvements in a technical field, namely, home automation and security. Instead of the systems and methods merely being performed by hardware components using basic functions, the systems and methods employ complex steps that go beyond the mere concept of simply retrieving and combining data using a computer. In particular, the hardware components receive data from connected devices, analyze the data in combination with baseline or default data to identify an occurrence of a property intrusion event, determine a command or action to take to mitigate the property intrusion event, facilitate performance of the command or action, and/or notify an individual of a property intrusion event. Additionally, because a central controller in a property retrieves and analyzes sensor data from a plurality of connected devices in the property, the central controller and the connected devices are part of a “thin client” environment that improves data persistence and information processing. This combination of elements further impose meaningful limits in that the operations are applied to improve home automation and security by detecting property intrusion events, and/or facilitating mitigating actions in a meaningful and effective way.
According to implementations, the systems and methods may support a dynamic, real-time or near-real-time analysis of any received data. In particular, the central controller and/or insurance provider may retrieve and/or receive real-time sensor data from the sensors, analyze the sensor data and any baseline data in real time, and dynamically assessing any property intrusion event. Additionally, the central controller and/or insurance provider may dynamically generate notifications in real-time and communicate the notifications to individuals in real-time. Accordingly, the real-time capability of the systems and methods enable individuals the assurance of real-time property monitoring.
Generally, the systems and methods offer numerous benefits to property security, as well as to individuals associated with the property. In particular, the systems and methods may automatically detect property intrusion events that the individuals may not realize are occurring, and may automatically facilitate preventative or corrective actions to address the events. As a result, security associated with the property may improve. Further, the systems and methods improve loss prevention and mitigate actual loss. As a further benefit, individuals associated with the property may be able to remotely request certain actions to be performed to mitigate the property intrusion events.
The systems and methods may further offer a benefit to insurance providers and customers thereof. Particularly, the present embodiments may facilitate (a) providing and updating insurance policies; (b) the handling or adjusting of home insurance claims; (c) the disbursement of monies related to insurance claims; (d) modifying insurance coverage amounts; (e) updating and improving damage estimate models, and/or (f) other insurance-related activities. The systems and methods may further offer a benefit to customers by offering improved insurance claim processing. Further, the insurance providers may stand out as a cost-effective insurance provider, thereby retaining existing customers and attracting new customers. It should be appreciated that further benefits to the systems and methods are envisioned.
The method may also include adjusting an insurance policy, premium, or discount (such as a homeowners, renters, auto, home, health, or life insurance policy, premium, or discount) based upon the functionality discussed herein, and/or an insured having a home and/or mobile device with such functionality.
I. Exemplary Environment and Components for Assessing Device Operation and Functionalities Relating Thereto
As illustrated in
In some cases, the plurality of devices 110 may be purchased from a manufacturer with the “smart” functionally incorporated therein. In other cases, the plurality of devices 110 may have been purchased as “dumb” devices and subsequently modified to add the “smart” functionality to the device. For instance, a homeowner may purchase an alarm system that installs sensors on or near a door to detect when a door has been opened and/or unlocked.
In some embodiments, the plurality of devices 110 may monitor their own status or condition via the sensors to detect any issues or problems. In response to detecting issues or problems, the plurality of devices 110 may be able to indicate the issues or problems via display components, such as LED lights, display screens, or other visual indicators. In further embodiments, the controller 120 may be configured to monitor, via sensor data, whether the plurality of devices 110 and/or parts thereof have been installed correctly, whether replacement parts are new and/or otherwise in good condition, and/or other conditions associated with the plurality of devices 110 and/or parts thereof.
The plurality of devices 110 may be configured to communicate with a controller 120 via the local communication network 115. The local communication network 115 may facilitate any type of data communication between devices and controllers located on or proximate to the property 105 via any standard or technology (e.g., LAN, WLAN, any IEEE 802 standard including Ethernet, and/or others). The local communication network 115 may further support various short-range communication protocols, such as Bluetooth®, Bluetooth® Low Energy, near field communication (NFC), radio-frequency identification (RFID), and/or other types of short-range protocols.
According to aspects, the plurality of devices 110 may transmit, to the controller 120 via the local communication network 115 (and/or to the insurance provider 130 remote processing server 135 via the network 125), operational data gathered from sensors associated with the plurality of devices 110. The operational data may be audio data, image or video data, motion data, status data, usage amounts, and/or other data or information. For instance, the operational data may indicate that a window has been shattered; the presence of a person, fire, or water in a room; the sound made near a smart device; and/or other information pertinent to an operation state or status of the plurality of devices 110. For further instance, the operational data may include motion data that may indicate whether any individuals are within the property 105 and/or located on the exterior of the property 105 (i.e., whether the property 105 is occupied or unoccupied). Additionally, the operational data may include device usage data. The operational data may include a timestamp representing the time that the operational data was recorded.
In some cases, the plurality of devices 110 may transmit, to the controller 120 (and/or insurance provider 130 remote processing server 135), various data and information associated with the plurality of devices 110. In particular, the data and information may include location data within the property, as well as various costs and prices associated with the plurality of devices 110. For instance, a washing machine may include a component such as a data tag that stores a location of the washing machine within the property 105, a retail price of the washing machine, and/or replacement costs of various parts of (or the entirety of) the washing machine. The various data and information may be programmable and updatable by an individual or automatically by the controller 120.
The controller 120 may be coupled to a database 112 that stores various operational data and information associated with the plurality of devices 110. Although
In some embodiments, the database 112 may organize the operational data according to which individual device 110 the data may be associated and/or the room or subsection of the property in which the data was recorded. Further, the database 112 may maintain an inventory list that includes the plurality of devices 110, as well as various data and information associated with the plurality of devices 110 (e.g., locations, replacement costs, etc.).
In one embodiment, the database 112 may maintain various operation states of the plurality of devices 110. In particular, the operation states may specify various settings of the plurality of devices 110 such that when the respective device is configured at the setting(s), the respective device will operate in the corresponding operation state. For instance, an operation state for a smart thermostat may be “heat conservation” whereby the corresponding setting is 64 degrees (as opposed to a more “normal” 70 degree setting). It should be appreciated that each operation state may specify settings for more than one of the devices 110.
The controller 120 (and/or the plurality of devices 112) may be configured to communicate with other components and entities, such as an insurance provider 130 and various third party source(s) 138 via the network(s) 125. According to some embodiments, the network(s) 125 may facilitate any data communication between the controller 120 located on the property 105 and entities or individuals remote to the property 105 via any standard or technology (e.g., GSM, CDMA, TDMA, WCDMA, LTE, EDGE, OFDM, GPRS, EV-DO, UWB, IEEE 802 including Ethernet, WiMAX, Wi-Fi, and/or others). In some cases, both the local network 115 and the network 125(s) may utilize the same technology.
Generally, the insurance provider 130 may be any individual, group of individuals, company, corporation, or other type of entity that may issue insurance policies for customers, such as a home insurance policy associated with the property 105. According to the present embodiments, the insurance provider 130 may include one or more processing server(s) 135 configured to facilitate the functionalities as discussed herein. Although
Further, although the present disclosure describes the systems and methods as being facilitated in part by the insurance provider 130, it should be appreciated that other non-insurance related entities may implement the systems and methods. For instance, a general contractor may aggregate the insurance-risk data across many properties to determine which appliances or products provide the best protection against specific causes of loss, and/or deploy the appliances or products based upon where causes of loss are most likely to occur. Accordingly, it may not be necessary for the property 105 to have an associated insurance policy for the property owners to enjoy the benefits of the systems and methods.
The third-party source(s) 138 may represent any entity or component that is configured to obtain, detect, and/or determine data or information that may be relevant to the devices 110 of the property 105. In some embodiments, the third-party source(s) 138 may be a manufacturer, supplier, servicer, or retailer of the any of the devices 110, as well as for replacement devices for the devices 110. For instance, if one of the devices 110 is a refrigerator, the third-party source 138 may be refrigerator manufacturer that sells refrigerators of the same or different types or models as the refrigerator device 110. The third-party source(s) 138 may store data associated with a replacement device (e.g., cost, retail location, general information, availability, or the like). Further, the third-party source(s) 138 may store baseline data associated with various types of property intrusion attempts. The third-party source(s) 138 may be configured to communicate various data or information to the controller 120 and/or to the insurance provider 130 via the network(s) 125, whereby the controller 120 and/or the insurance provider 130 may examine the data or information to facilitate various functionalities.
The controller 120, the insurance provider 130 and/or the processing server 135, and the third-party source(s) 138 may also be in communication, via the network(s) 125, with an electronic device 145 associated with an individual 140. In some embodiments, the individual 140 may have an insurance policy (e.g., a home insurance policy) for the property 105 or a portion of the property 105, or may otherwise be associated with the property 105 (e.g., the individual 140 may live in the property 105). The electronic device 145 may be a mobile device, such as a smartphone, a desktop computer, a laptop, a tablet, a phablet, a smart watch, smart glasses, wearable electronics, pager, personal digital assistant, or any other electronic device, including computing devices configured for wireless radio frequency (RF) communication and data transmission. In some implementations, the controller 120 (and/or insurance provider 130 remote processing server 135) may communicate, to the individual 140 via the electronic device 145, an indication of the operation of the plurality of devices 110, such as the commands transmitted to the plurality of devices 110. Further, the controller 120 (and/or insurance provider 130 remote processing server 135) may enable the individual 140 to remotely control various of the plurality of devices 110 via the electronic device 145.
According to some other implementations, the controller 120 (and/or insurance provider 130 remote processing server 135) may analyze sensor data from any of the plurality of devices 110 to detect property intrusion attempts associated with the property 105. The controller 120 (and/or insurance provider 130 remote processing server 135) may generate notifications or alerts associated with the detected property intrusion attempts, and/or communicate the notifications or alerts to the electronic device 145 via the network 125. Further, the controller 120 (and/or insurance provider 130 remote processing server 135) may detect any damage to the plurality of devices 110 and/or to other portions of the property 105, and may generate a proposed insurance claim that indicates the damage and transmit, via the network 125, the proposed insurance claim related to the electronic device 145. The proposed insurance claim may contain pre-populated fields that indicate various information and data, such as causes of loss (e.g., water, wind, fire, intrusion, etc.); damaged devices; costs associated with the damaged devices; time, date, and/or location of the insurance-related event; and/or other information included in an insurance claim.
The controller 120 (and/or insurance provider 130 remote processing server 135) may also transmit any modifications to insurance policies based upon detected data from the plurality of devices 110. In response, the homeowner 140 may accept the proposed insurance claim or make modifications to the proposed insurance claim, and/or otherwise accept/reject any modifications to the insurance policy. The electronic device may transmit, via the network 125, the accepted or modified insurance claim back to the controller 120 (and/or insurance provider 130 remote processing server 135).
The controller 120 may facilitate any processing of the insurance claim with the processing server 135 of the insurance provider 130. Additionally or alternatively, the processing server 135 may facilitate the proposed insurance claim communications and processing directly with the customer 140. In some implementations, the insurance provider 130 remote processing server 135 may provide the same functionality as that described herein with respect to the controller 120.
II. Exemplary Communication Flow for Assessing Device Sensor Data and Facilitating Corrective/Preventative Actions
Referring to
The smart devices 210 and the controller 220 may be located within a property 205 (such as the property 105 as discussed with respect to
The signal diagram 200 may begin when the controller 220 optionally requests (250) the smart devices 210 for sensor data. In some implementations, the controller 220 may periodically request the smart devices 210 for sensor data, or the controller 220 may request the smart devices 210 for sensor data in response to various triggers (e.g., at a certain time of the day or in response to receiving particular sensor data from a particular smart device 210). The controller 220 may also request sensor data from one or more specific smart devices 210. The smart device(s) 210 may provide (252) sensor data to the controller 220. For example, the sensor data may be audio data, imaging data (e.g., images and/or videos), and/or motion/movement sensor data. It should be appreciated that other types of sensor data and combinations of sensor data are envisioned. The smart device(s) 210 may provide the sensor data automatically as the data is detected, in response to receiving a request from the controller 220, or in response to various triggers (e.g., detected motion data at 3:00 AM).
The controller 220 may analyze the sensor data to identify (254) an event or occurrence and a type of event/occurrence that is indicated in the sensor data. In particular, the event may be an intrusion attempt by an individual or group of individuals, and the type of event may correspond to how the intrusion is being attempted or performed. For example, the individual(s) may attempt to break down/enter through a door or break/enter through a window, or may survey the property for a point of entry. It should be appreciated that other types of intrusion attempts are envisioned, and the sensor data may indicate the attempt at different progress points (e.g., initial surveying or completed entry). In some implementations, the controller 220 may account for a status or condition of the property (e.g., occupied or unoccupied) when the sensor data is detected/received. Accordingly, the controller 220 may analyze various combinations of sensor data from various combinations of the smart devices 210 to identify the event and the type of event.
The controller 220 may access (256) baseline data that corresponds to the type of event indicated in the sensor data. The controller 220 may locally store the baseline data in memory. The baseline data may indicate various “default” intrusion attempts, which may include sensor data associated with actual intrusion attempts, or generated data associated with staged/simulated intrusion attempts. For example, if the sensor data is audio data that corresponds to a front door being broken down, the controller 220 may access baseline data associated with an actual instance of door being broken down or staged/simulated audio data that simulates a door being broken down. For further example, if the sensor data is motion sensor data that corresponds to surveying for an entry point, the controller 220 may access general baseline motion sensor data consistent with surveying of a property for an entry point (which may be data of an actual surveying of a property, or data that is generated to mimic or enact a surveying of a property). In an optional implementation, such as if the controller 220 does not locally store the baseline data, the controller 220 may retrieve (258) the baseline data from the processing server 235.
The controller 220 may compare (260) the received sensor data to the baseline data. In some implementations, the controller 220 may determine a level of similarity between the received sensor data and the baseline data. In comparing the received sensor data to the baseline data, the controller 220 may compare a relevant portion of the received sensor data to a relevant portion of the baseline data. For example, if the received sensor data is audio data, the controller 220 may compare a portion of the audio data that corresponds to a window breaking to baseline data of a window breaking. In determining the level of similarity, the controller 220 may calculate a similarity percentage (e.g., 75% similar) or other parameter that may indicate similarity using various calculations, algorithms, data models, techniques, and/or the like.
The controller 220 may also determine (262) if an intrusion event is being attempted or performed based upon the comparison. In one implementation, if the level of similarity between the received sensor data and the baseline data meets or exceeds a threshold value, then the controller 220 may deem that there is an intrusion event being attempted or performed. Similarly, if the level of similarity between the received sensor data and the baseline data does not meet or exceed a threshold value, then the controller 220 may deem that there is not an intrusion event being attempted or performed. For example, if the received sensor data is audio data that indicates one loud “thud” sound, and the baseline data indicates that multiple “thud” sounds are consistent with an intrusion attempt, then the controller 220 may deem that the received sensor data (one “thud” sound) is not consistent with an intrusion attempt.
It should be appreciated that the threshold value may be a percentage on a scale from 0% to 100%, or other numeric parameter on a scale, and/or may be a default value or manually set by a user or administrator (such as the individual associated with the property). Generally, the lower (or higher) the threshold, the more (or less) “sensitive” the intrusion detection. Accordingly, the lower (or higher) the threshold, the greater (or lesser) chance there is of the controller 220 detecting a “false alarm.” It should be appreciated that the controller 220 may use various techniques, calculations, algorithms, models, and the like to analyze the received sensor data and compare the received sensor data to the baseline data.
If the controller 220 determines that there is not an intrusion event (i.e., the level of similarity does not meet or exceed the threshold; “NO”), then processing may end or proceed to any other functionality. In contrast, if the controller 220 determines that there is an intrusion event (i.e., the level of similarity does meet or exceed the threshold; “YES”), then the controller 220 may generate (264) a notification that indicates the intrusion event and that may include any information related to the intrusion event. In particular, the notification may include the type of intrusion event (e.g., an alarm disarmament, breaking/entering through a window), a time of the detected intrusion event, current sensor data indicating the intrusion event, and/or any other information that is relevant to the intrusion event.
The controller 220 may also determine (265) a mitigating action or command to perform to mitigate the intrusion event. In particular, the controller 220 may make the determination based upon the type of intrusion event and/or the sensor data associated therewith. The controller 220 may also identify an appropriate smart device 210 that may be used to perform or facilitate the mitigating action. For example, if the controller 220 determines that an intrusion is being attempted via the garage of the property 205, the controller 220 may determine that the mitigating action is to turn on all of the lights within the garage, whereby the lights within the garage are the identified smart devices 210. For further example, if the controller 220 determines that a window has been broken, the controller 220 may determine to activate the alarm and notify the proper law enforcement.
The controller 220 may communicate (266) the notification generated in (264) to the user device 245. In some implementations, the notification may include a selectable option that enables the user of the user device 245 to facilitate an action within the property 205, such as the mitigating action determined in (265). The action may be any action that is controller 220 is capable of facilitating, and it may be associated with operation of one or more of the smart devices 210. Further, the action may be associated with the detected intrusion event. For example, if the intrusion event is an input of an incorrect door lock code, then the option may enable the user to select to activate the alarm. Accordingly, the user may select the option and the user device 245 may send (268) a request to the controller 220 to facilitate the mitigating action with an appropriate smart device 210. In some implementations, the user device 245 may perform the mitigating action without interfacing with the controller 220, such as notifying law enforcement of the identified intrusion attempt.
After determining the mitigating action and/or receiving the request to perform the mitigating action, the controller 220 may send (270) a command to perform a mitigating action to the appropriate smart device 210. After receipt of the command, the appropriate smart device 210 may perform (272) the mitigating action in an attempt to stop or slow the intrusion attempt, or otherwise mitigate any effect of the intrusion attempt. It should be appreciated that the controller 220 may automatically send the command to perform the mitigating action and/or may send the command to perform the mitigating action in response to receiving the request from the user device 245.
Although not depicted in
Although
III. Exemplary Method for Detecting Intrusion Events and Facilitating Mitigating Actions
Referring to
The method 300 may begin when the controller receives (block 305) sensor data from at least one sensor disposed within the property. In some embodiments, the sensor may include any type of audio sensor (e.g., a microphone), imaging sensor (e.g., digital camera, video camera, etc.), motion sensor, or any other sensor referenced herein. At block 310, the controller may examine the received sensor data to identify a type of property intrusion event included in the received sensor data. In some implementations, there may be different types of intrusion events that may have different types of associated sensor data.
For example, an intruder's attempt to break into a house may be detected using audio data that indicates broken glass or a loud banging against a door. For a further example, another attempt to break into a house may be detected using motion sense data during a specific time period, such as in the middle of the night.
After the controller identifies the type of intrusion event, the controller may access (block 315) baseline sensor data corresponding to a set of default intrusion attempts. In particular, the controller may access baseline sensor data that corresponds to the type of intrusion event identified in block 310. For example, if the sensor data includes audio data indicating a potential intrusion attempt, the controller may access baseline audio data including sample audio of actual or simulated intrusion attempts of various types. The controller may determine (block 320) a level of similarity between the received sensor data and the baseline sensor data. It should be appreciated that the controller may use any type of technique, calculation, data model, or algorithm to determine the level of similarity. In some implementations, the level of similarly may include a quantitative indicator, for example a number from 1-100, with the greater the number indicating the greater similarity between the received sensor data and the baseline sensor data.
The controller may determine (block 325) whether the level of similarity meets or exceeds a threshold value. It should be appreciated that different threshold values are envisioned. For example, if the level of similarity determined in block 315 is quantified as 90 and the threshold value is 85, then the level of similarity exceeds the threshold value. If the level of similarity does not exceed the threshold value (“NO”), processing may end or proceed to other functionality. If the level of similarity does exceed the threshold value (“YES”), then the controller may generate (block 330) a notification that indicates the property intrusion event. In some implementations, the notification may include various information associated with the property intrusion event, such as an area of the property corresponding to the property intrusion event, as well as other information such as a timestamp, the type of sensor data detected, and/or other information. In some implementations, the controller may identify an action to perform to mitigate the property intrusion event.
The controller may communicate (block 335) the notification to an electronic device of an individual associated with the property, such as via an external network and/or wireless communication and data transmission. In some implementations, the controller may store an identification of the electronic device. For example, the electronic device may be a smartphone or other mobile device belonging to the owner and/or occupant of the property. In some scenarios, the controller may communicate the notification to the insurance provider. The notification may enable the individual to request that an action to mitigate the property intrusion attempt be performed.
In some optional implementations, the controller may facilitate performing the identified action to mitigate the property intrusion event. In particular, the controller may activate (block 340) an alarm within the property. The alarm may alert any occupants of the property of the intrusion event. The controller may also optionally communicate (block 345) the notification to a law enforcement entity, such as a police station, or to a security service. Further, the controller may optionally activate (block 350) a set of lights within the property. In some implementations, the set of lights may be specific to an area of the property where the intrusion event is detected. It should be appreciated that the controller may identify and/or perform other actions to mitigate any detected property intrusion event.
IV. Exemplary Controller
The controller 420 may include a processor 422, as well as a memory 478. The memory 478 may store an operating system 479 capable of facilitating the functionalities as discussed herein, as well as a set of applications 475 (i.e., machine readable instructions). For instance, one of the set of applications 475 may be an intrusion detection application 484 configured to analyze sensor data, detect property intrusion events, and facilitate actions to mitigate the property intrusion events. The set of applications 475 may also include one or more other applications 484, such as an insurance processing application.
The processor 422 may interface with the memory 478 to execute the operating system 479 and the set of applications 475. According to some embodiments, the memory 478 may also include a data record storage 480 that stores various data, such as baseline data corresponding to a set of default intrusion attempts. The intrusion detection application 484 may interface with the data record storage 480 to retrieve relevant baseline data that the intrusion detection application 484 may use to identify property intrusion events. The memory 478 may include one or more forms of volatile and/or non-volatile, fixed and/or removable memory, such as read-only memory (ROM), electronic programmable read-only memory (EPROM), random access memory (RAM), erasable electronic programmable read-only memory (EEPROM), and/or other hard drives, flash memory, MicroSD cards, and others.
The controller 420 may further include a communication module 477 configured to communicate data via one or more networks 425. According to some embodiments, the communication module 477 may include one or more transceivers (e.g., WWAN, WLAN, and/or WPAN transceivers) functioning in accordance with IEEE standards, 3GPP standards, or other standards, and/or configured to receive and transmit data via one or more external ports 476. Further, the communication module 477 may include a short-range network component (e.g., an RFID reader) configured for short-range network communications. For instance, the communication module 477 may receive, via the network 425, sensor data from a plurality of devices populated within a property.
The controller 420 may further include a user interface 481 configured to present information to a user and/or receive inputs from the user. As shown in
In general, a computer program product in accordance with an embodiment may include a computer usable storage medium (e.g., standard random access memory (RAM), an optical disc, a universal serial bus (USB) drive, or the like) having computer-readable program code embodied therein, wherein the computer-readable program code may be adapted to be executed by the processor 422 (e.g., working in connection with the operating system 479) to facilitate the functions as described herein. In this regard, the program code may be implemented in any desired language, and may be implemented as machine code, assembly code, byte code, interpretable source code or the like (e.g., via C, C++, Java, Actionscript, Objective-C, Javascript, CSS, XML). In some embodiments, the computer program product may be part of a cloud network of resources.
V. Exemplary Server
The processing server 535 may include a processor 522, as well as a memory 578. The memory 578 may store an operating system 579 capable of facilitating the functionalities as discussed herein, as well as a set of applications 575 (i.e., machine readable instructions). For instance, one of the set of applications 575 may be a policy processing application 584 configured to manage customer insurance policies. It should be appreciated that other applications 590 are envisioned, such as an intrusion detection application configured to assess sensor data and identify property intrusion events, and/or respond to those events identified.
The processor 522 may interface with the memory 578 to execute the operating system 579 and the set of applications 575. According to some embodiments, the memory 578 may also include a data record storage 580 that stores various information associated with customer insurance policies as well as baseline data corresponding to a set of default intrusion attempts. The policy processing application 584 may interface with the data record storage 580 to retrieve relevant information that the policy processing application 584 may use to manage insurance policies, generate notifications, and/or perform other functionalities, such as identify property intrusion events. Further, the device replacement application may interface with the data record storage 580 to retrieve device information. The memory 578 may include one or more forms of volatile and/or non-volatile, fixed and/or removable memory, such as read-only memory (ROM), electronic programmable read-only memory (EPROM), random access memory (RAM), erasable electronic programmable read-only memory (EEPROM), and/or other hard drives, flash memory, MicroSD cards, and others.
The processing server 535 may further include a communication module 577 configured to communicate data via one or more networks 525. According to some embodiments, the communication module 577 may include one or more transceivers (e.g., WWAN, WLAN, and/or WPAN transceivers) functioning in accordance with IEEE standards, 3GPP standards, or other standards, and/or configured to receive and transmit data via one or more external ports 576. For instance, the communication module 577 may transmit, via the network 525, baseline data corresponding to a set of default intrusion attempts.
The processing server 525 may further include a user interface 581 configured to present information to a user and/or receive inputs from the user. As shown in
In general, a computer program product in accordance with an embodiment may include a computer usable storage medium (e.g., standard random access memory (RAM), an optical disc, a universal serial bus (USB) drive, or the like) having computer-readable program code embodied therein, wherein the computer-readable program code may be adapted to be executed by the processor 522 (e.g., working in connection with the operating system 579) to facilitate the functions as described herein. In this regard, the program code may be implemented in any desired language, and may be implemented as machine code, assembly code, byte code, interpretable source code or the like (e.g., via C, C++, Java, Actionscript, Objective-C, Javascript, CSS, XML). In some embodiments, the computer program product may be part of a cloud network of resources.
VI. Exemplary User Interfaces for Alerting of Property Intrusion Events
VII. Exemplary Method of Detecting Property Intrusion
In one aspect, a computer-implemented method of detecting property intrusion within a property may be provided. The property may be populated with a hardware controller in communication with a plurality of sensors disposed within the property. The method may include (1) receiving, by the hardware controller, sensor data from at least one sensor of the plurality of sensors; (2) accessing baseline sensor data corresponding to a set of default intrusion attempts; (3) comparing, by one or more processors, the received sensor data to the baseline sensor data including: (i) determining a level of similarity between the received sensor data and the baseline sensor data, and (ii) determining that the level of similarity meets a threshold value; (4) responsive to the comparing, generating a notification that indicates a property intrusion event indicated in the received sensor data; and/or (5) communicating the notification to an electronic device of an individual associated with the property to facilitate mitigating damage to the property resulting from the property intrusion event and/or otherwise taking corrective action(s). The method may include additional, less, or alternate actions, including those discussed elsewhere herein.
For instance, to determine the level of similarity between the received sensor data and the baseline sensor data, the computer-implemented method may include (1) analyzing the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) accessing at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) comparing the received sensor data to the at least the portion of the baseline sensor data.
In one implementation, the computer-implemented method may further include: responsive to the comparing, activating an alarm within the property. In another implementation, the computer-implemented method may further include: responsive to the comparing, communicating the notification to a law enforcement entity or security service.
In a further implementation, the computer-implemented method may further include: (1) identifying an area of the property corresponding to the received sensor data; and/or (2) responsive to the comparing, activating a set of lights or audible alarms associated with the area of the property.
In some scenarios, to receive the sensor data from the at least one sensor, the computer-implemented method may include receiving audio data from a microphone disposed within the property. In other scenarios, to receive the sensor data from the at least one sensor, the computer-implemented method may include receiving motion sensor data from a motion sensor disposed within the property. In further scenarios, to receive the sensor data from the at least one sensor, the computer-implemented method may include receiving digital image data from an image sensor disposed within the property.
To access the baseline sensor data, in some embodiments, the computer-implemented method may include: (1) analyzing the received sensor data to identify a type of the property intrusion event indicated in the received sensor data; (2) sending a request to a back-end server to access at least a portion of the baseline sensor data corresponding to the type of the property intrusion event; and/or (3) receiving, from the back-end server, the at least the portion of the baseline sensor data.
To determine the level of similarity between the received sensor data and the baseline sensor data, in some embodiments, the computer-implemented method may include: calculating a similarity percentage between the received sensor data and the baseline sensor data.
VIII. Exemplary Hardware Controller
A hardware controller for detecting property intrusion within a property may be provided. The hardware controller may be in communication with a set of devices populated within the property. The hardware controller may include a communication module adapted to interface with the set of devices populated within the property, a memory adapted to store non-transitory computer executable instructions, and/or a processor adapted to interface with the communication module. The processor may be configured to execute the non-transitory computer executable instructions to cause the processor to (1) receive, via the communication module, sensor data from at least one device of the set of devices, (2) access baseline sensor data corresponding to a set of default intrusion attempts, (3) compare the received sensor data to the baseline sensor data including: (i) determine a level of similarity between the received sensor data and the baseline sensor data, and/or (ii) determine that the level of similarity meets a threshold value, (4) responsive to the comparing, generate a notification that indicates a property intrusion event indicated in the received sensor data, and/or (5) transmit, via the communication module, the notification to an electronic device of an individual associated with the property to facilitate taking corrective actions in response to the intrusion event and/or otherwise mitigating damage caused by the intrusion event. The hardware controller and/or processor may include additional, less, or alternate functionality, including that discussed elsewhere herein.
For instance, in one scenario, to determine the level of similarity between the received sensor data and the baseline sensor data, the processor may be configured to (1) analyze the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) access, from the memory, at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) compare the received sensor data to the at least the portion of the baseline sensor data.
In one implementation, the processor may be further configured to: responsive to the comparing, activate a visible, audible, or other type of alarm within the property. In another implementation, the processor may be further configured to: responsive to the comparing, transmit the notification to a law enforcement entity or security service via the communication module.
In a further implementation, the processor may be further configured to: (1) identify an area of the property corresponding to the received sensor data, and/or (2) responsive to the comparing, activate a set of lights associated with the area of the property.
In a scenario, to receive the sensor data from the at least one device, the processor may be configured to: receive, via the communication module, audio data from a microphone disposed within the property. In another scenario, to receive the sensor data from the at least one device, the processor may be configured to: receive, via the communication module, motion sensor data from a motion sensor disposed within the property. In a further scenario, to receive the sensor data from the at least one device, the processor may be configured to: receive, via the communication module, digital image data from an image sensor disposed within the property.
In one implementation, to access the baseline sensor data, the processor may be configured to: (1) analyze the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) send a request to a back-end server to access at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) receive, from the back-end server, the at least the portion of the baseline sensor data.
In another implementation, to determine the level of similarity between the received sensor data and the baseline sensor data, the processor may be configured to: calculate a similarity percentage between the received sensor data and the baseline sensor data.
IX. Exemplary Detection of Intrusion Events
In some aspects, one or more of smart devices may be configured to gather audio and/or visual data that may indicate an intrusion attempt on a property. These devices may gather the audio and/or visual data and send the data to the home controller, and/or the insurance provider remote processing server, whereby the controller, and/or the insurance provider remote processing server, respectively, may analyze the data and determine whether there is a likelihood of an intrusion event.
In some embodiments, the controller, and/or the insurance provider remote processing server, may analyze the data by comparing the data to baseline data that may correspond to certain indications of an intrusion event. For instance, the baseline data may include sample audio of someone attempting to kick down a door. If the sensed audio data is similar to the sample audio, the controller, and/or the insurance provider remote processing server, may determine that someone is attempting to kick down a door to the property. The controller, and/or the insurance provider remote processing server, may generate any necessary notification(s) of the event and communicate the notification(s) to the individual, and/or take other corrective actions—sound alarms, notify police or neighbors, turn on lights, etc.
The methods of smart home control and/or automation detailed elsewhere herein may also include actions directed to home security and/or monitoring. For example, the wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may indicate or relate to neighborhood security. Based upon the analysis by the smart home controller or remote processor of the wired or wireless communication or data transmission, and/or data received, the smart home controller or remote processor may identify suspicious behavior and/or unexpected persons in the vicinity of the insured home or a yard of the insured home (such as via facial recognition techniques).
The wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may indicate or relate to sound. Based upon the analysis by the smart home controller or remote processor of the wired or wireless communication or data transmission, and/or data received, the smart home controller or remote processor may determine a suspicious and/or unexpected sound within, or in the vicinity of, the insured home (e.g., window breaking, door being forced open, person screaming, dog barking, etc.), and/or generate and transmit a notification or wireless communication to the insured and/or authorities of a potential home security issue.
The wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may be generated or collected by a smart pet collar and/or a smart device located on a smart or other pet collar (e.g., dog or cat collar). The data may be generated or collected by the smart pet collar as a dog or cat (or other pet or animal) moves about the insured home or a yard of the insured home.
The wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may be generated or collected by one or more UAVs (unmanned aerial vehicles or small drones) that fly around the exterior of and/or within the interior of the insured home. The smart home controller or remote processor may control or direct the movement or deployment of the one or more UAVs to automatically gather data about conditions of the insured home when the insured home is unoccupied or has been unoccupied for a given period of time such that damage caused by insurance-related events, or potential insurance-related events, to insured homes that have been left unoccupied for extended periods is mitigated or prevented.
The data received may be gathered or collected by smart home controllers, cameras mounted about a home, one or more mobile devices, and/or one or more automated smart devices (e.g., robots, drones) having cameras or sensors and that automatically move about an insured home.
Also, data may be collected by one or more smart devices, which may include smart sensors, smart visual or audio recording equipment, smart cameras, security systems, smart drones, smart robots, and/or smart pet collars. The mobile device may include a smart phone, laptop, tablet, phablet, netbook, notebook, smart glasses, wearable electronic device, smart watch, smart contact lenses, pager, personal digital assistant (PDA), smart pet collar, or other computing device. The smart devices or mobile device may include one or more processors and transceivers, and may be configured for wired or wireless communication (including two-way radio frequency (RF) communication), such as with a smart home controller or an insurance provider remote processor or server. The smart home controller or insurance provider remote processor or server may generate, update, or adjust an insurance policy, premium, rate, or discount based upon the insurance-related event or wired or wireless communication, data transmission, or data received, such as generating, updating, or adjusting an insurance policy covering or associated with the insured, insured home, or items within the insured home or belonging to the insured.
X. Additional Considerations
As used herein, the term “smart” may refer to devices, sensors, or appliances located within or proximate to a property, and with the ability to communicate information about the status of the device, sensor, or appliance and/or receive instructions that control the operation of the device, sensor, or appliance. In one instance, a smart thermostat may be able to remotely communicate the current temperature of the home and receive instructions to adjust the temperature to a new level. In another instance, a smart water tank may be able to remotely communicate the water level contained therein and receive instructions to restrict the flow of water leaving the tank. In contrast, “dumb” devices, sensors, or appliances located within or proximate to a property require manual control (as compared to automatic or semi-automatic or processor control associated with smart devices). Referring again to the thermostat embodiment, to adjust the temperature on a “dumb” thermostat, a person would have to manually interact with the thermostat. As such, a person is unable to use a communication network to remotely adjust a “dumb” device, sensor, or appliance.
A “smart device” as used herein may refer to any of a smart device, sensor, appliance, and/or other smart equipment that may be located (or disposed) within or proximate to a property. In some embodiments in which an appliance and a sensor external to the particular appliance are associated with each other, “smart device” may refer to both the external sensors and the appliance collectively. Some exemplary devices that may be “smart devices” are, without limitation, valves, piping, clothes washers/dryers, dish washers, refrigerators, sprinkler systems, toilets, showers, sinks, soil monitors, doors, locks, windows, shutters, ovens, grills, fire places, furnaces, lighting, sump pumps, security cameras, and alarm systems. Similarly, an individual associated with the property shall be referred to as the “homeowner,” “property owner,” or “policyholder,” but it is also envisioned that the individual is a family member of the homeowner, a person renting/subletting the property, a person living or working on the property, a neighbor of the property, or any other individual that may have an interest in preventing or mitigating damage to the property.
Further, any reference to “home” or “property” is meant to be exemplary and not limiting. The systems and methods described herein may be applied to any property, such as offices, farms, lots, parks, and/or other types of properties or buildings. Accordingly, “homeowner” may be used interchangeably with “property owner.”
With the foregoing, an insurance customer may opt-in to a rewards, insurance discount, or other type of program. After the insurance customer provides their affirmative consent, an insurance provider remote server may collect data from the customer's mobile device, smart home controller, or other smart devices—such as with the customer's permission. The data collected may be related to insured assets before (and/or after) an insurance-related event, including those events discussed elsewhere herein. In return, risk averse insureds, home owners, or home or apartment occupants may receive discounts or insurance cost savings related to home, renters, personal articles, auto, and other types of insurance from the insurance provider.
In one aspect, smart or interconnected home data, and/or other data, including the types of data discussed elsewhere herein, may be collected or received by an insurance provider remote server, such as via direct or indirect wireless communication or data transmission from a smart home controller, mobile device, or other customer computing device, after a customer affirmatively consents or otherwise opts-in to an insurance discount, reward, or other program. The insurance provider may then analyze the data received with the customer's permission to provide benefits to the customer. As a result, risk averse customers may receive insurance discounts or other insurance cost savings based upon data that reflects low risk behavior and/or technology that mitigates or prevents risk to (i) insured assets, such as homes, personal belongings, or vehicles, and/or (ii) home or apartment occupants.
Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the invention is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possible embodiment, as describing every possible embodiment would be impractical, if not impossible. One could implement numerous alternate embodiments, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
Throughout this specification, plural instances may implement components, operations, or structures described as a single instance. Although individual operations of one or more methods are illustrated and described as separate operations, one or more of the individual operations may be performed concurrently, and nothing requires that the operations be performed in the order illustrated. Structures and functionality presented as separate components in exemplary configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements fall within the scope of the subject matter herein.
Additionally, certain embodiments are described herein as including logic or a number of routines, subroutines, applications, or instructions. These may constitute either software (e.g., code embodied on a non-transitory, machine-readable medium) or hardware. In hardware, the routines, etc., are tangible units capable of performing certain operations and may be configured or arranged in a certain manner. In exemplary embodiments, one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware modules of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware module that operates to perform certain operations as described herein.
In various embodiments, a hardware module may be implemented mechanically or electronically. For instance, a hardware module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. A hardware module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
Accordingly, the term “hardware module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. Considering embodiments in which hardware modules are temporarily configured (e.g., programmed), each of the hardware modules need not be configured or instantiated at any one instance in time. For instance, where the hardware modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different hardware modules at different times. Software may accordingly configure a processor, for instance, to constitute a particular hardware module at one instance of time and to constitute a different hardware module at a different instance of time.
Hardware modules may provide information to, and receive information from, other hardware modules. Accordingly, the described hardware modules may be regarded as being communicatively coupled. Where multiple of such hardware modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) that connect the hardware modules. In embodiments in which multiple hardware modules are configured or instantiated at different times, communications between such hardware modules may be achieved, for instance, through the storage and retrieval of information in memory structures to which the multiple hardware modules have access. For instance, one hardware module may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware modules may also initiate communications with input or output devices, and may operate on a resource (e.g., a collection of information).
The various operations of exemplary methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some exemplary embodiments, comprise processor-implemented modules.
Similarly, the methods or routines described herein may be at least partially processor-implemented. For instance, at least some of the operations of a method may be performed by one or more processors or processor-implemented hardware modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some exemplary embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment, or as a server farm), while in other embodiments the processors may be distributed across a number of locations.
The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some exemplary embodiments, the one or more processors or processor-implemented modules may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other exemplary embodiments, the one or more processors or processor-implemented modules may be distributed across a number of geographic locations.
Unless specifically stated otherwise, discussions herein using words such as “processing,” “computing,” “calculating,” “determining,” “presenting,” “displaying,” or the like may refer to actions or processes of a machine (e.g., a computer) that manipulates or transforms data represented as physical (e.g., electronic, magnetic, or optical) quantities within one or more memories (e.g., volatile memory, non-volatile memory, or a combination thereof), registers, or other machine components that receive, store, transmit, or display information.
As used herein any reference to “one embodiment” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
The terms “insurer,” “insuring party,” and “insurance provider” are used interchangeably herein to generally refer to a party or entity (e.g., a business or other organizational entity) that provides insurance products, e.g., by offering and issuing insurance policies. Typically, but not necessarily, an insurance provider may be an insurance company.
Although the embodiments discussed herein relate to home or personal property insurance policies, it should be appreciated that an insurance provider may offer or provide one or more different types of insurance policies. Other types of insurance policies may include, for instance, condominium owner insurance, renter's insurance, life insurance (e.g., whole-life, universal, variable, term), health insurance, disability insurance, long-term care insurance, annuities, business insurance (e.g., property, liability, commercial auto, workers compensation, professional and specialty liability, inland marine and mobile property, surety and fidelity bonds), automobile insurance, boat insurance, insurance for catastrophic events such as flood, fire, volcano damage and the like, motorcycle insurance, farm and ranch insurance, personal liability insurance, personal umbrella insurance, community organization insurance (e.g., for associations, religious organizations, cooperatives), personal articles, and/or other types of insurance products. In embodiments as described herein, the insurance providers process claims related to insurance policies that cover one or more properties (e.g., homes, automobiles, personal property), although processing other insurance policies is also envisioned.
The terms “insured,” “insured party,” “policyholder,” “customer,” “claimant,” and “potential claimant” are used interchangeably herein to refer to a person, party, or entity (e.g., a business or other organizational entity) that is covered by the insurance policy, e.g., whose insured article or entity (e.g., property, life, health, auto, home, business) is covered by the policy. A “guarantor,” as used herein, generally refers to a person, party or entity that is responsible for payment of the insurance premiums. The guarantor may or may not be the same party as the insured, such as in situations when a guarantor has power of attorney for the insured. An “annuitant,” as referred to herein, generally refers to a person, party or entity that is entitled to receive benefits from an annuity insurance product offered by the insuring party. The annuitant may or may not be the same party as the guarantor.
As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For instance, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For instance, a condition A or B is satisfied by any one of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).
In addition, use of the “a” or “an” are employed to describe elements and components of the embodiments herein. This is done merely for convenience and to give a general sense of the description. This description, and the claims that follow, should be read to include one or at least one and the singular also includes the plural unless it is obvious that it is meant otherwise.
The patent claims at the end of this patent application are not intended to be construed under 35 U.S.C. § 112(f) unless traditional means-plus-function language is expressly recited, such as “means for” or “step for” language being explicitly recited in the claim(s).
This detailed description is to be construed as examples and does not describe every possible embodiment, as describing every possible embodiment would be impractical, if not impossible. One could implement numerous alternate embodiments, using either current technology or technology developed after the filing date of this application.
This application is continuation of, and claims the benefit of, U.S. patent application Ser. No. 16/445,399, filed Jun. 19, 2019 and entitled “Systems and Methods for Analyzing Sensor Data to Detect Property Intrusion Events,” which is a continuation of, and claims the benefit of, U.S. patent application Ser. No. 14/873,823, filed Oct. 2, 2015 and entitled “Systems and Methods for Analyzing Sensor Data to Detect Property Intrusion Events,” which claims benefit of the filing date of U.S. Provisional Patent Application Nos. 62/060,962 (filed Oct. 7, 2014, and entitled “SYSTEMS AND METHODS FOR MANAGING DEVICES WITHIN A CONNECTED PROPERTY AND INSURANCE POLICIES ASSOCIATED THEREWITH”); 62/105,407 (filed Jan. 20, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING DEVICES WITHIN A CONNECTED PROPERTY AND INSURANCE POLICIES ASSOCIATED THEREWITH”); 62/187,624 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR FACILITATING DEVICE REPLACEMENT WITHIN A CONNECTED PROPERTY”); 62/187,645 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING BUILDING CODE COMPLIANCE FOR A PROPERTY”); 62/187,651 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR AUTOMATICALLY GENERATING AN ESCAPE ROUTE”); 62/187,642 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR ANALYZING SENSOR DATA TO DETECT PROPERTY INTRUSION EVENTS”); 62/187,666 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR IMPROVED ASSISTED OR INDEPENDENT LIVING ENVIRONMENTS”); 62/189,329 (filed Jul. 7, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING WARRANTY INFORMATION ASSOCIATED WITH DEVICES POPULATED WITHIN A PROPERTY”); 62/193,317 (filed Jul. 16, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING SMART DEVICES BASED UPON ELECTRICAL USAGE DATA”); 62/197,343 (filed Jul. 27, 2015, and entitled “SYSTEMS AND METHODS FOR CONTROLLING SMART DEVICES BASED UPON IMAGE DATA FROM IMAGE SENSORS”); 62/198,813 (filed Jul. 30, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING SERVICE LOG INFORMATION”); 62/200,375 (filed Aug. 3, 2015, and entitled “SYSTEMS AND METHODS FOR AUTOMATICALLY RESPONDING TO A FIRE”); 62/201,671 (filed Aug. 6, 2015, and entitled “SYSTEMS AND METHODS FOR AUTOMATICALLY MITIGATING RISK OF DAMAGE FROM BROKEN CIRCUITS”); 62/220,383 (filed Sep. 18, 2015, and entitled “METHODS AND SYSTEMS FOR RESPONDING TO A BROKEN CIRCUIT”)—which are all hereby incorporated by reference in their entireties.
Number | Name | Date | Kind |
---|---|---|---|
3648326 | Gaysowski | Mar 1972 | A |
3740739 | Griffin, III et al. | Jun 1973 | A |
3771823 | Schnarr | Nov 1973 | A |
3817161 | Koplon | Jun 1974 | A |
3875612 | Poitras | Apr 1975 | A |
3934306 | Farris | Jan 1976 | A |
4066072 | Cummins | Jan 1978 | A |
4418712 | Braley | Dec 1983 | A |
4688026 | Scribner et al. | Aug 1987 | A |
5005125 | Farrar et al. | Apr 1991 | A |
5038268 | Krause et al. | Aug 1991 | A |
5099751 | Newman et al. | Mar 1992 | A |
5128859 | Carbone et al. | Jul 1992 | A |
5267587 | Brown | Dec 1993 | A |
5554433 | Perrone, Jr. et al. | Sep 1996 | A |
5576952 | Stutman et al. | Nov 1996 | A |
5684710 | Ehlers et al. | Nov 1997 | A |
5903426 | Ehling | May 1999 | A |
5979607 | Allen | Nov 1999 | A |
6023762 | Dean et al. | Feb 2000 | A |
6084367 | Landert | Jul 2000 | A |
6155324 | Elliott et al. | Dec 2000 | A |
6222455 | Kaiser | Apr 2001 | B1 |
6237618 | Kushner | May 2001 | B1 |
6286682 | d'Arbelles | Sep 2001 | B1 |
6317047 | Stein et al. | Nov 2001 | B1 |
6526807 | Doumit et al. | Mar 2003 | B1 |
6553336 | Johnson et al. | Apr 2003 | B1 |
6812848 | Candela | Nov 2004 | B2 |
6934692 | Duncan | Aug 2005 | B1 |
6977585 | Falk et al. | Dec 2005 | B2 |
6998960 | Buschmann et al. | Feb 2006 | B2 |
7030767 | Candela | Apr 2006 | B2 |
7161483 | Chung | Jan 2007 | B2 |
7194416 | Provost et al. | Mar 2007 | B1 |
7259656 | Wright | Aug 2007 | B1 |
7309216 | Spadola, Jr. et al. | Dec 2007 | B1 |
7348882 | Adamczyk et al. | Mar 2008 | B2 |
7356516 | Richey et al. | Apr 2008 | B2 |
7395219 | Strech | Jul 2008 | B2 |
7598856 | Nick et al. | Oct 2009 | B1 |
7657441 | Richey et al. | Feb 2010 | B2 |
7683793 | Li et al. | Mar 2010 | B2 |
7715036 | Silverbrook et al. | May 2010 | B2 |
7809587 | Dorai et al. | Oct 2010 | B2 |
7813822 | Hoffberg | Oct 2010 | B1 |
7882514 | Nielsen et al. | Feb 2011 | B2 |
8010992 | Chang et al. | Aug 2011 | B1 |
8031079 | Kates | Oct 2011 | B2 |
8041636 | Hunter et al. | Oct 2011 | B1 |
8106769 | Maroney et al. | Jan 2012 | B1 |
8108271 | Duncan et al. | Jan 2012 | B1 |
8219558 | Trandal et al. | Jul 2012 | B1 |
8229861 | Trandal et al. | Jul 2012 | B1 |
8280633 | Eldering et al. | Oct 2012 | B1 |
8289160 | Billman | Oct 2012 | B1 |
8316237 | Felsher et al. | Nov 2012 | B1 |
8400299 | Maroney et al. | Mar 2013 | B1 |
8510196 | Brandmaier et al. | Aug 2013 | B1 |
8527306 | Reeser et al. | Sep 2013 | B1 |
8533144 | Reeser et al. | Sep 2013 | B1 |
8595034 | Bauer et al. | Nov 2013 | B2 |
8595790 | Chang et al. | Nov 2013 | B2 |
8596293 | Mous et al. | Dec 2013 | B2 |
8605209 | Becker | Dec 2013 | B2 |
8620841 | Filson et al. | Dec 2013 | B1 |
8621097 | Venkatakrishnan et al. | Dec 2013 | B2 |
8650048 | Hopkins, III et al. | Feb 2014 | B1 |
8694501 | Trandal et al. | Apr 2014 | B1 |
8712893 | Brandmaier et al. | Apr 2014 | B1 |
8719134 | Huls et al. | May 2014 | B1 |
8730039 | Billman | May 2014 | B1 |
8731975 | English et al. | May 2014 | B2 |
8749381 | Maroney et al. | Jun 2014 | B1 |
8786425 | Hutz | Jul 2014 | B1 |
8798289 | Every et al. | Aug 2014 | B1 |
9009783 | Bartholomay et al. | Apr 2015 | B2 |
9049168 | Jacob et al. | Jun 2015 | B2 |
9257023 | Lee et al. | Feb 2016 | B2 |
9280252 | Brandmaier et al. | Mar 2016 | B1 |
9297150 | Klicpera | Mar 2016 | B2 |
9368009 | Lee et al. | Jun 2016 | B2 |
9424606 | Wilson, II et al. | Aug 2016 | B2 |
9429925 | Wait | Aug 2016 | B2 |
9652976 | Bruck et al. | May 2017 | B2 |
9654434 | Sone et al. | May 2017 | B2 |
9665892 | Reeser et al. | May 2017 | B1 |
9666060 | Reeser et al. | May 2017 | B2 |
9710858 | Devereaux et al. | Jul 2017 | B1 |
9721399 | Ishikawa | Aug 2017 | B2 |
9727921 | Cook et al. | Aug 2017 | B2 |
9824397 | Patel et al. | Nov 2017 | B1 |
9882985 | Esam et al. | Jan 2018 | B1 |
9892463 | Hakimi-Boushehri et al. | Feb 2018 | B1 |
9898912 | Jordan, II et al. | Feb 2018 | B1 |
9947051 | Allen et al. | Apr 2018 | B1 |
9947202 | Moon et al. | Apr 2018 | B1 |
10005793 | Mazitschek et al. | Jun 2018 | B2 |
10042341 | Jacob | Aug 2018 | B1 |
10055793 | Call et al. | Aug 2018 | B1 |
10102585 | Bryant et al. | Oct 2018 | B1 |
10169771 | Devereaux et al. | Jan 2019 | B1 |
10181160 | Hakimi-Boushehri et al. | Jan 2019 | B1 |
10249158 | Jordan, II et al. | Apr 2019 | B1 |
10282787 | Hakimi-Boushehri et al. | May 2019 | B1 |
10282788 | Jordan, II et al. | May 2019 | B1 |
10346811 | Jordan, II et al. | Jul 2019 | B1 |
10353359 | Jordan, II et al. | Jul 2019 | B1 |
10356303 | Jordan, II et al. | Jul 2019 | B1 |
10388135 | Jordan, II et al. | Aug 2019 | B1 |
10514669 | Call et al. | Dec 2019 | B1 |
10522009 | Jordan, II et al. | Dec 2019 | B1 |
10552911 | Allen et al. | Feb 2020 | B1 |
10607295 | Hakimi-Boushehri et al. | Mar 2020 | B1 |
10679292 | Call et al. | Jun 2020 | B1 |
10685402 | Bryant et al. | Jun 2020 | B1 |
10741033 | Jordan, II et al. | Aug 2020 | B1 |
20010025349 | Sharood et al. | Sep 2001 | A1 |
20020040306 | Sugiyama et al. | Apr 2002 | A1 |
20020147006 | Coon et al. | Oct 2002 | A1 |
20020184643 | Fichet | Dec 2002 | A1 |
20030025599 | Monroe | Feb 2003 | A1 |
20030048191 | Denton | Mar 2003 | A1 |
20030192600 | Ford | Oct 2003 | A1 |
20030234725 | Lemelson et al. | Dec 2003 | A1 |
20040054789 | Breh et al. | Mar 2004 | A1 |
20040153346 | Grundel et al. | Aug 2004 | A1 |
20040153382 | Boccuzzi et al. | Aug 2004 | A1 |
20040177032 | Bradley et al. | Sep 2004 | A1 |
20040185844 | Neuman | Sep 2004 | A1 |
20040211228 | Nishio et al. | Oct 2004 | A1 |
20040214566 | Suzuki et al. | Oct 2004 | A1 |
20050030175 | Wolfe | Feb 2005 | A1 |
20050080520 | Kline et al. | Apr 2005 | A1 |
20050111696 | Baer | May 2005 | A1 |
20050139420 | Spoltore et al. | Jun 2005 | A1 |
20050143956 | Long et al. | Jun 2005 | A1 |
20050241003 | Sweeney et al. | Oct 2005 | A1 |
20050251427 | Dorai et al. | Nov 2005 | A1 |
20050275527 | Kates | Dec 2005 | A1 |
20060033625 | Johnson et al. | Feb 2006 | A1 |
20060058612 | Dave et al. | Mar 2006 | A1 |
20060100912 | Kumar et al. | May 2006 | A1 |
20060154642 | Scannell | Jul 2006 | A1 |
20060158339 | Brundula | Jul 2006 | A1 |
20060184379 | Tan et al. | Aug 2006 | A1 |
20070001904 | Mendelson | Jan 2007 | A1 |
20070096938 | Lopez et al. | May 2007 | A1 |
20070262857 | Jackson | Nov 2007 | A1 |
20070276626 | Bruffey | Nov 2007 | A1 |
20070289635 | Ghazarian et al. | Dec 2007 | A1 |
20080018474 | Bergman et al. | Jan 2008 | A1 |
20080019392 | Lee | Jan 2008 | A1 |
20080056722 | Hendrix et al. | Mar 2008 | A1 |
20080059351 | Richey et al. | Mar 2008 | A1 |
20080065427 | Helitzer et al. | Mar 2008 | A1 |
20080101160 | Besson | May 2008 | A1 |
20080184272 | Brownewell | Jul 2008 | A1 |
20080285797 | Hammadou | Nov 2008 | A1 |
20080301216 | Han | Dec 2008 | A1 |
20090001891 | Patterson | Jan 2009 | A1 |
20090024420 | Winkler | Jan 2009 | A1 |
20090044595 | Vokey | Feb 2009 | A1 |
20090094129 | Rhodes et al. | Apr 2009 | A1 |
20090174364 | Onishi et al. | Jul 2009 | A1 |
20090195349 | Frader-Thompson et al. | Aug 2009 | A1 |
20090243852 | Haupt et al. | Oct 2009 | A1 |
20090259581 | Horowitz et al. | Oct 2009 | A1 |
20090265193 | Collins et al. | Oct 2009 | A1 |
20100025349 | Khoshnevis | Feb 2010 | A1 |
20100073840 | Hennessey, Jr. | Mar 2010 | A1 |
20100131416 | Means | May 2010 | A1 |
20100188023 | Anderson et al. | Jul 2010 | A1 |
20100188206 | Kates | Jul 2010 | A1 |
20100235285 | Hoffberg | Sep 2010 | A1 |
20100241465 | Amigo et al. | Sep 2010 | A1 |
20100289643 | Trundle et al. | Nov 2010 | A1 |
20100299217 | Hui | Nov 2010 | A1 |
20110003577 | Rogalski et al. | Jan 2011 | A1 |
20110029145 | Dong | Feb 2011 | A1 |
20110040785 | Steenberg et al. | Feb 2011 | A1 |
20110077875 | Tran et al. | Mar 2011 | A1 |
20110112660 | Bergmann et al. | May 2011 | A1 |
20110136463 | Ebdon et al. | Jun 2011 | A1 |
20110161117 | Busque et al. | Jun 2011 | A1 |
20110161119 | Collins | Jun 2011 | A1 |
20110166714 | Stachnik | Jul 2011 | A1 |
20110195687 | Das et al. | Aug 2011 | A1 |
20110203383 | Phelps | Aug 2011 | A1 |
20110251807 | Rada et al. | Oct 2011 | A1 |
20110270453 | Kalogridis et al. | Nov 2011 | A1 |
20120016695 | Bernard et al. | Jan 2012 | A1 |
20120046973 | Eshleman et al. | Feb 2012 | A1 |
20120079092 | Woxblom et al. | Mar 2012 | A1 |
20120101855 | Collins et al. | Apr 2012 | A1 |
20120116071 | Rao et al. | May 2012 | A1 |
20120116820 | English et al. | May 2012 | A1 |
20120166115 | Apostolakis | Jun 2012 | A1 |
20120188081 | Van Katwijk | Jul 2012 | A1 |
20120191498 | Singh et al. | Jul 2012 | A1 |
20120232935 | Voccola | Sep 2012 | A1 |
20120249121 | Pamulaparthy et al. | Oct 2012 | A1 |
20120265586 | Mammone | Oct 2012 | A1 |
20120290333 | Birchall | Nov 2012 | A1 |
20120290497 | Magara et al. | Nov 2012 | A1 |
20120296580 | Barkay | Nov 2012 | A1 |
20120311620 | Conklin et al. | Dec 2012 | A1 |
20130022234 | U S | Jan 2013 | A1 |
20130049950 | Wohlert | Feb 2013 | A1 |
20130073321 | Hofmann et al. | Mar 2013 | A1 |
20130085688 | Miller et al. | Apr 2013 | A1 |
20130096960 | English et al. | Apr 2013 | A1 |
20130107706 | Raleigh | May 2013 | A1 |
20130120137 | Lehmann | May 2013 | A1 |
20130144486 | Ricci | Jun 2013 | A1 |
20130145693 | Li | Jun 2013 | A1 |
20130159021 | Felsher | Jun 2013 | A1 |
20130166325 | Ganapathy et al. | Jun 2013 | A1 |
20130169817 | Jones et al. | Jul 2013 | A1 |
20130226624 | Blessman et al. | Aug 2013 | A1 |
20130234840 | Trundle et al. | Sep 2013 | A1 |
20130257626 | Masli et al. | Oct 2013 | A1 |
20130263611 | Kearney et al. | Oct 2013 | A1 |
20130290013 | Forrester | Oct 2013 | A1 |
20130290033 | Reeser et al. | Oct 2013 | A1 |
20140032433 | Eick et al. | Jan 2014 | A1 |
20140122133 | Weisberg et al. | May 2014 | A1 |
20140136242 | Weekes et al. | May 2014 | A1 |
20140149127 | Storti | May 2014 | A1 |
20140180723 | Cote et al. | Jun 2014 | A1 |
20140201315 | Jacob et al. | Jul 2014 | A1 |
20140201844 | Buck | Jul 2014 | A1 |
20140216071 | Broadbent | Aug 2014 | A1 |
20140222329 | Frey | Aug 2014 | A1 |
20140222469 | Stahl et al. | Aug 2014 | A1 |
20140229205 | Gibson | Aug 2014 | A1 |
20140238511 | Klicpera | Aug 2014 | A1 |
20140244997 | Goel et al. | Aug 2014 | A1 |
20140257862 | Billman et al. | Sep 2014 | A1 |
20140257871 | Christensen et al. | Sep 2014 | A1 |
20140257876 | English et al. | Sep 2014 | A1 |
20140266717 | Warren et al. | Sep 2014 | A1 |
20140278571 | Mullen et al. | Sep 2014 | A1 |
20140303801 | Ahn et al. | Oct 2014 | A1 |
20140310162 | Collins | Oct 2014 | A1 |
20140313044 | Thompson et al. | Oct 2014 | A1 |
20140317741 | Be'ery et al. | Oct 2014 | A1 |
20140318200 | Ellis et al. | Oct 2014 | A1 |
20140320295 | Kates | Oct 2014 | A1 |
20140340216 | Puskarich | Nov 2014 | A1 |
20140358592 | Wedig et al. | Dec 2014 | A1 |
20140379156 | Kamel et al. | Dec 2014 | A1 |
20150020299 | Hsu | Jan 2015 | A1 |
20150032480 | Blackhurst et al. | Jan 2015 | A1 |
20150061859 | Matsuoka et al. | Mar 2015 | A1 |
20150116107 | Fadell et al. | Apr 2015 | A1 |
20150116112 | Flinsenberg et al. | Apr 2015 | A1 |
20150124087 | Jones, Jr. et al. | May 2015 | A1 |
20150135596 | Cooper | May 2015 | A1 |
20150154712 | Cook | Jun 2015 | A1 |
20150160623 | Holley | Jun 2015 | A1 |
20150160636 | McCarthy et al. | Jun 2015 | A1 |
20150163412 | Holley et al. | Jun 2015 | A1 |
20150168976 | Loucks et al. | Jun 2015 | A1 |
20150170288 | Harton et al. | Jun 2015 | A1 |
20150206249 | Fini | Jul 2015 | A1 |
20150254940 | Graef et al. | Sep 2015 | A1 |
20150287310 | Deliuliis et al. | Oct 2015 | A1 |
20150305690 | Tan et al. | Oct 2015 | A1 |
20150332407 | Wilson, II et al. | Nov 2015 | A1 |
20150364028 | Child et al. | Dec 2015 | A1 |
20160005130 | Devereaux et al. | Jan 2016 | A1 |
20160006723 | Wilson | Jan 2016 | A1 |
20160018226 | Plocher et al. | Jan 2016 | A1 |
20160042463 | Gillespie | Feb 2016 | A1 |
20160078744 | Gieck | Mar 2016 | A1 |
20160104250 | Allen et al. | Apr 2016 | A1 |
20160119424 | Kane et al. | Apr 2016 | A1 |
20160161940 | Max | Jun 2016 | A1 |
20160188829 | Southerland et al. | Jun 2016 | A1 |
20160269882 | Balthasar et al. | Sep 2016 | A1 |
20160269883 | Eswaran | Sep 2016 | A1 |
20160323771 | Raleigh | Nov 2016 | A1 |
20160337829 | Fletcher et al. | Nov 2016 | A1 |
20160343084 | Blessman et al. | Nov 2016 | A1 |
20170116676 | Blessman et al. | Apr 2017 | A1 |
20170147722 | Greenwood | May 2017 | A1 |
20170304659 | Chen et al. | Oct 2017 | A1 |
20180000346 | Cronin | Jan 2018 | A1 |
20180160988 | Miller et al. | Jun 2018 | A1 |
Number | Date | Country |
---|---|---|
202865924 | Apr 2013 | CN |
WO-2013076721 | May 2013 | WO |
WO-2014207558 | Dec 2014 | WO |
Entry |
---|
Knutsen, Confusion about causation in insurance: solutions for catastrophic losses, Ala. L. Rev., 5:957-1023 (2010). |
System for Loss Prevention, Ip.com, published Nov. 8, 2008. |
Number | Date | Country | |
---|---|---|---|
62220383 | Sep 2015 | US | |
62201671 | Aug 2015 | US | |
62200375 | Aug 2015 | US | |
62198813 | Jul 2015 | US | |
62197343 | Jul 2015 | US | |
62193317 | Jul 2015 | US | |
62189329 | Jul 2015 | US | |
62187651 | Jul 2015 | US | |
62187624 | Jul 2015 | US | |
62187642 | Jul 2015 | US | |
62187666 | Jul 2015 | US | |
62187645 | Jul 2015 | US | |
62105407 | Jan 2015 | US | |
62060962 | Oct 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16445399 | Jun 2019 | US |
Child | 16700783 | US | |
Parent | 14873823 | Oct 2015 | US |
Child | 16445399 | US |