A system may include a camera having one or more processors and a memory including instructions which, when executed by the one or more processors, cause the one or more processors to execute a first deterrence action, determine a response to the first deterrence action, receive a second deterrence action generated using a large language model, and execute the second deterrence action.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06V 10/774 - Generating sets of training patternsBootstrap methods, e.g. bagging or boosting
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
2.
GENERATING OVERLAYED SOUNDS TO DETER PERPETRATION OF AN EVENT
Presented herein are system and methods for generating overlayed sounds to deter perpetration of an event A system can include an image capture device and one or more processors coupled with memory. The system can detect an entity within an area. The system can determine that the entity corresponds to one or more criteria. The system can identify a first sound corresponding to the one or more criteria and a state of the area. The system can play, by a speaker device, the first sound to deter the entity from perpetrating an event within the area. The system can identify a second sound corresponding to the one or more criteria, the state of the area, and the first sound. The system can play, by the speaker device, the second sound to deter the entity from perpetrating the event.
G08B 15/00 - Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
3.
Determining Actions of a System Based on Approaching Entity
Presented herein are system and methods for determining actions of a system based on an approaching entity. A system can include an image capture device, output devices, and one or more processors coupled with memory. The system can detect an entity within an area. The system can determine that the entity corresponds to one or more criteria. The system can identify one or more actions corresponding to the one or more criteria and a state of the area. The system can actuate one or more of the output devices to perform the one or more actions based on the entity.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
Methods, systems, and devices for smart sensing using a security and automation system are described. One method may include receiving, from a sensor, sensor data associated with an event and one or more occupants at a structure, determining a characteristic of the event based on the received sensor data, determining a type of the event based on the characteristic, and identifying an identity of an occupant based at least in part on the characteristic and the type of the event.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
Methods, systems, and devices for lighting control are described. An apparatus may include a panel for controlling one or more devices associated with a home. A panel may include a recess shaped to encapsulate a switch disposed on a wall of the home. A panel may include user interface hardware configured to receive input from a user. A panel may include a processor, a memory in electronic communication with the processor storing instructions executable by the processor. An instruction may include transmitting one or more communications to the one or more devices to cause the one or more devices to perform a first action based on input received by the user interface hardware. An instruction may include transmitting one or more communications to the home automation hub to cause one or more other devices to perform a second action based on the input received by the user interface hardware.
Methods, systems, and devices for a security and automation system are described. A security and automation device, for example, such as a control panel may be configured to support a continuous active mode for the security and automation system. The continuous active mode may be a mode in which the security and automation system is continuously providing various types of security and automation features, such as monitoring, sensing, communication, notification, among other examples. The continuous active mode may also support active switching between multiple states (e.g., an ‘armed away’ state, an ‘armed stay’ state, and a ‘standby’ state) of the security and automation systems. Thus, irrespective of the different states the security and automation system may be continuously active (e.g., always ON).
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08C 17/02 - Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
Techniques are described for a video survey. One method includes providing a video survey to a customer or a potential customer of a service, sale, product, or system. The video survey may be provided before, during, or after a provided service. In some cases, the customer or the potential customer may provide one or more responses to one or more requests included in the video survey. The video survey may record the one or more responses to the one or more requests. In some examples, the provided responses may be a video response, an audio response, a tactile response, or any combination thereof. The video survey may proceed or conclude based on the response being a positive response or a negative response.
Methods, systems, and devices for property manager are described. A device may transmit a request to access information from a control panel of a property associated with a smart home automation community. The request may include credentials specific to a property management personnel. In response to the transmitted request, the device may retrieve the information from the control panel of the property based in part on an authentication of the credentials. The authentication of the credentials may include receiving, from an additional device of an occupant of the property, an acknowledgement message to the request. Once the information is retrieved from the control panel, the device may generate an account associated with the control panel of the property based in part on the information, where the account grants a level of access to the property management personnel.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
Methods, systems, and devices for lighting control are described. An apparatus may include a processor, memory, a power component, a set of control buttons, and one or more radio components for lighting control. The apparatus may be a light control device associated with a home or automation system. The light control device may be a light switch cover with a cover plate that encapsulate a light switch. The light switch cover may have a radio, a battery, and control circuitry for lighting control.
Methods, systems, and devices that support techniques for a smart monitoring system are described. A system may monitor a physical environment using a camera-enabled device operating in a first mode of a set of modes. The system may determine one or more parameters based on the monitoring. The parameters may include an identity of an entity, a behavior of the entity, or a setting of the security and automation system, or any combination thereof. The system may perform an operation based on the one or more parameters. The techniques described herein may deter an intruder from an intended action (e.g., theft, property damage, etc.) and/or provide lighting to a user of the security and automation system, among other benefits.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
On-line retail store services featuring solar panels, batteries, and the installation thereof; Online retail services through direct solicitation by salespersons directed to end-users featuring installation, maintenance, and repair of solar installations for generating power; Retail services by direct solicitation by sales agents in the field of solar energy systems and alternative energy products
On-line retail store services featuring solar panels, batteries, and the installation thereof; Online retail services through direct solicitation by salespersons directed to end-users featuring installation, maintenance, and repair of solar installations for generating power; Retail services by direct solicitation by sales agents in the field of solar energy systems and alternative energy products
A control panel is used to control and/or monitor an automation system. The control panel may be removed from a mounted location to repair or replace the control panel. Replacement may be performed by a different provider of automation systems, potentially without prior notice to the current provider of the automation system. To alert the provider of the replacement, the control panel may use an anti-tamper switch to detect removal from the mounted location. A signal may be sent to a remote service system indicating the removal. If the control panel also loses AC power, or if the control panel loses all power, the remote service system may assume that the control panel is being replaced. In response, the remote service center may request that a customer service representative contact the customer to potentially retain the customer, recover equipment, or resolve any concerns about the automation system equipment.
Methods and systems are described for determining occupancy with user provided information. According to at least one embodiment, a method for determining occupancy with user provided information includes using at least one sensor to detect occupancy in a building over time, determining a predictive schedule based on the occupancy detected with the at least one sensor, and requesting information relevant to the predictive schedule from a user.
In some instances, a person may need monitoring. The monitoring may be based on age, or on other factors such as abilities and functionality. The monitoring may enable a supervising person to remotely receive updates regarding the subject person. The supervising person may enter in various biometric parameters to monitor. The supervising person may alternatively and/or additionally set other factors to monitor such as time of day, location, activity level, and the like. The monitoring may provide peace of mind to a supervising person to ensure the subject person is safe. In some embodiments, the supervising person may set various alarm thresholds. The alarm thresholds may trigger an alert to the supervising person. In alternative embodiments, if the subject person is a grown person without a supervising person in the same vicinity, a security and/or automation system may act as the supervising adult.
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G16H 40/63 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for local operation
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A control panel may prevent access to one or more aspects of the control panel based at least in part on one or more security parameters. The security parameters may include a default locked status and a takeover locked status. The default locked status may prevent a user or other personnel from accessing the software, code, or other intellectual property on the control panel while still allowing the user to interface with the security and/or automation system. The takeover locked status may prevent any access or use of the control panel. To protect the automation system and the automation system provider, it may be desired to use a unique identifier to unlock at least one or more aspects of the control panel. The unique identifier may be loaded onto an external storage device which the control panel may automatically recognize.
Methods, systems, and devices for smart sensing using a security and automation system are described. One method may include monitoring a parameter of a resource associated with a structure, predicting a future change in condition associated with the parameter based on the monitoring, and performing a function using the security and automation system based on the predicting. In some examples, the resource may include a service or a product.
Sales report generation and display on a graphical user interface (GUI) of a mobile software application executing on a wireless mobile computer device
A computer-implemented method for facilitating effective sales via a graphical user interface (GUI). The method may include the act of providing a database that includes sales information for potential sales targets. In an embodiment, the method further includes querying the database to identify each of a plurality of potential sales targets within a pre-determined sales region. A step includes generating a first graphical user interface (“GUI”) at an electronic display of a mobile device, where the GUI includes an image of a map of the pre-determined sales region and visual icons depicted on the map at positions corresponding with the geographic location of each of the plurality of potential sales targets within the sales region. Further, providing a selectable report icon in the first GUI and, upon selection of the selectable report icon on the first GUI, querying the database to retrieve at least some of the sales information associated with a plurality of the potential sales targets in the sales region and displaying, in a second GUI, a visualization of the retrieved sales information.
G01C 21/00 - NavigationNavigational instruments not provided for in groups
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/047 - Optimisation of routes or paths, e.g. travelling salesman problem
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
G06Q 30/0202 - Market predictions or forecasting for commercial activities
G06Q 30/06 - Buying, selling or leasing transactions
22.
Gathering and display of sales data for an identified residence via a graphical user interface (GUI) of a mobile software application executing on a wireless mobile computer device
A computer-implemented method for facilitating the identification of sales targets. The method may include displaying in a graphical user interface (“GUI”) an image of a map of a sales region on an electronic display of a mobile device. In some embodiments, the sales region image map is based on a geographic location of the mobile device. The method may also include displaying in the GUI a plurality of selectable icons that are depicted on the map, where each icon corresponds to a geographic location of a potential sales target within the sales region. The method may further include, in response to a selection of a particular one of the plurality of selectable icons, displaying in a location of the screen a first GUI window that includes sales information associated with the potential sales target associated with the selected icon.
G06Q 30/02 - MarketingPrice estimation or determinationFundraising
G06Q 30/06 - Buying, selling or leasing transactions
G01C 21/00 - NavigationNavigational instruments not provided for in groups
G06F 3/04842 - Selection of displayed objects or displayed text elements
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
23.
Sales route planning using an interactive electronic map displayed on a graphical user interface (GUI) of a mobile software application executing on a wireless mobile computer device
Navigating a neighborhood using an interactive electronic map displayed on a graphical user interface (GUI) of a mobile software application executing on a wireless mobile computer device. In some embodiments, a method may include displaying in a graphical user interface (“GUI”) an image of a map of a sales region on an electronic display of the mobile device, including a plurality of potential sales targets; providing a database comprising sales information for at least some of the plurality of potential sales targets; processing the sales information to generate predictive data for at least some of the potential sales targets, the predictive data indicating a relative sales potential for at least some of the potential sales targets; and displaying in the GUI a plurality of icons depicted on the map and each corresponding to a geographic location of a potential sales target within the sales region, wherein a first subset of the plurality of icons each have at least one characteristic distinguishing it from a second subset of the plurality of icons and wherein the characteristic indicates a relatively higher sales potential for potential sales targets in the first subset than those in the second subset and based on the predictive data.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06F 3/04842 - Selection of displayed objects or displayed text elements
24.
Home automation system supporting dual-authentication
Techniques are described for a security and automation system. One method includes detecting a presence of a person proximate a residence, receiving a first authentication factor from a device associated with the person, receiving a second authentication factor associated with the person, and initiating a change of state of a locking mechanism associated with a barrier of the residence based on the first authentication factor and the second authentication factor.
G07C 9/00 - Individual registration on entry or exit
G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G10L 17/08 - Use of distortion metrics or a particular distance between probe pattern and reference templates
G07C 9/10 - Movable barriers with registering means
36 - Financial, insurance and real estate services
Goods & Services
Insurance administration; Insurance agencies; Insurance agencies in the field of home, car, and personal property insurance; Insurance brokerage; Insurance information; Insurance services, namely, underwriting, issuance and administration of home and automobile insurance; Consultancy services relating to insurance; Development of insurance policies for others; Issuance of home, automobile, motorcycle, flood, and earthquake insurance
36 - Financial, insurance and real estate services
Goods & Services
Insurance administration; Insurance agencies; Insurance agencies in the field of home, car, and personal property insurance; Insurance brokerage; Insurance information; Insurance services, namely, underwriting, issuance and administration of home and automobile insurance; Consultancy services relating to insurance; Development of insurance policies for others; Issuance of home, automobile, motorcycle, flood, and earthquake insurance
A method for security and/or automation systems is described. In one embodiment, the method may include receiving image data associated with an area via an image sensor, receiving sound data associated with an object via an audio sensor, analyzing the image data in relation to the sound data, detecting an object's presence based at least in part on the analyzing, and identifying at least one characteristic relating to the object based at least in part on the detecting.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
Techniques are described herein for establishing two wireless networks at a premises, a dedicated network configured to be used by devices of an automation and security system of the premises and a user network configured to be used by devices associated with users. The dedicated network may be more rigorously secured than the user network. The dedicated network may be secured in such a way that computing devices associated with users are not permitted to access the dedicated network. In this manner, the dedicated network may be prevented from becoming compromised. In some examples, a contention management entity may mediate network traffic scheduling between the dedicated network and the user network. The dedicated network may be configured to give deference to traffic being communicated across the user network to maintain a quality of service for end users of the user network.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
The present systems and methods relate to approaches for distributing software (such as firmware updates) in a security system that includes a control unit. The control unit may be configured to communicatively connect to a plurality of electronic devices, including sensors for the security system. The control unit may also communicatively connect to a remote server. The control unit receives firmware for target electronic devices from the remote server, determines which electronic devices are target electronic devices for which the firmware is intended, and sends the firmware to the target electronic devices.
Techniques are described for security and automation system. One method includes receiving, from an exterior camera located outside a structure, data associated with an occurrence of a security event associated with the structure, activating a light of the camera based at least in part on determining the received data is associated with the security event, and initiating an action at the first location based at least in part on determining that the received data is associated with the security event.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 21/436 - Interfacing a local distribution network, e.g. communicating with another STB or inside the home
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04N 21/422 - Input-only peripherals, e.g. global positioning system [GPS]
Methods and systems are described for back-end failure redundancy in security and automation systems. According to at least one embodiment, an apparatus for back-end failure redundancy includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory. The instructions are executable by a processor to detect an alarm event, and attempt to establish a connection between a control panel and a backend system. If no connection between control panel and backend system is made, the instructions may initiate a two-way cellular call between the control panel and a central station, and deliver a caller ID from the control panel to the central station via the two-way cellular call.
Methods, systems, and devices for a smart monitoring system are described. A system may include a camera-enabled device configured to monitor a physical environment using the camera-enabled device. The system may detect a trigger in the physical environment based on the monitoring, where the trigger includes an object, a person, an event, or any combination thereof. The system may select, based on the detecting, a direction of a set of directions to emit light via a light emitting source. The system may activate the light emitting source based on the selecting. The system may emit, via the light emitting source, the light in the direction based on the activating and the detected trigger. The techniques described herein may deter an intruder from an intended action (e.g., theft, property damage, etc.) and/or provide lighting to a user of the security and automation system, among other benefits.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H05B 47/125 - Controlling the light source in response to determined parameters by determining the presence or movement of objects or living beings by using cameras
The systems and methods described herein relate to heating ventilation and air conditioning (HVAC) systems and water heating systems in relation to a building and residential automation system. Some embodiments of the systems and methods described herein relate to HVAC systems and water systems in relation to an integration of building or residential automation systems. Specifically, the disclosure relates to maintaining a desirable water temperature for a desirable time period. By reducing unnecessary heating of water, the systems disclosed herein may result in fewer wasted resources and a lower utility bill. In one embodiment, a method for security and/or automation systems may be disclosed. The method may comprise monitoring a status of a water heater and monitoring an occupancy status of a residence. The status of the water heater may adjust, automatically, based at least in part on the monitoring.
The present disclosure relates to a method for security and/or automation systems. In some embodiments, the method may include receiving a reservation request for a reservation at a building from a guest. The method may further include approving the reservation request. The method may further include automatically communicating a temporary guest code to the guest based at least in part on the approving, the temporary guest code granting access to the building and access to operate at least one component of the security and/or automation system.
Systems and methods for communicating between components of a security and/or automation system include establishing a two-way call between a control panel and a central station of the security and/or automation system using a Voice over Internet Protocol (VoIP) channel connection, and after establishing the two-way call, communicating data between the central station and the control panel via a central station of the security and/or automation system via a second connection different from the VoIP channel connection, the data being related to control of the control panel.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04M 11/00 - Telephonic communication systems specially adapted for combination with other electrical systems
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04M 7/00 - Arrangements for interconnection between switching centres
G08B 25/08 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
H04M 1/27 - Devices whereby a plurality of signals may be stored simultaneously
H04W 84/04 - Large scale networksDeep hierarchical networks
36.
Navigating a neighborhood using an interactive electronic map displayed on a graphical user interface (GUI) of a mobile software application executing on a wireless mobile computer device
Navigating a neighborhood using an interactive electronic map displayed on a graphical user interface (GUI) of a mobile software application executing on a wireless mobile computer device. In some embodiments, a method may include receiving the interactive electronic map, automatically displaying the interactive electronic map with a neighborhood, a first selectable icon overlaying a first building, and a second selectable icon overlaying a second building, receiving a selection of the first selectable icon overlaying the first building, automatically displaying a name of the first current occupant, receiving a selection of the name of the first current occupant, and automatically displaying one or more additional current characteristics of the first current occupant.
G01C 21/00 - NavigationNavigational instruments not provided for in groups
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
A method for correlating energy usage data and water usage data to a waste scoring system is described. In one embodiment, the method includes receiving energy usage data and water usage data from a plurality of users, identifying at least one user group from the plurality of users based on predetermined parameters, and calculating average energy usage and average water usage for each of the user groups. The energy usage data and water usage data received for an individual user may then be compared to the calculated average energy usage and calculated average water usage for at least one of the user groups, and a general waste score may be calculated for the individual user. In some cases, a plurality of sub-waste scores may be calculated indicating factors of energy usage and factors of water usage for the individual user.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
Methods, systems, and devices are described for controlling a sprinkler system, including an apparatus for sprinkler system control that includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory. The instructions are executable by the processor to receive operation instructions for the sprinkler system from a source that is separate from a control panel of the sprinkler system, and operate valves of the sprinkler system independent of instructions from the control panel.
Systems, apparatuses, and methods relating to security and/or automation systems are described. In one embodiment, a method may include receiving linking information from a first device by a second device, linking the second device with the first device via a first connection, the linking based at least in part on the linking information, storing at least a portion of the linking information, and transmitting the stored linking information from the second device to one or more other devices via a second connection.
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
A method for monitoring vehicle usage is described. In one embodiment, the method includes detecting a vehicle event and detecting a query from a mobile device. The query includes a Wi-Fi probe request or Bluetooth inquiry. The method includes identifying a mobile device identifier from the query and associating the mobile device identifier with the vehicle event.
G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
B60W 40/08 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit related to drivers or passengers
A door to door sales management tool utilizes a mobile device configured to request data from a database regarding a neighborhood within proximity of that sale. The mobile device sends results back to the database, wherein the results are flagged as verified. A simplified prequalification system is shown where a salesperson may select a house on a map to run a prequalification on the residents expected occupants of the selected house.
A method for security and/or automation systems is described. In one embodiment, the method may include detecting a proximity of a user at a home automation device. The method may further include projecting an external display of home automation system information from the home automation device onto a surface. In some embodiments, the external display may be projected based, at least in part, on the detected proximity of the user at the home automation device.
Security and/or automation systems, collectively referred to as automation systems, may allow a parent to leave their child at home and feel comfortable. The automation system may receive a notification that the parents are leaving. The parents may set a child alone state or a babysitter state. The system may use settings determined by the parents to track child parameters. Restricted areas may include a parents liquor cabinet, a parents bedroom, an office, and the like. The automation system may additionally track the comings and goings of a child to determine if the child is out past a curfew, when the child left, when the child arrived at home, and the like. Additionally, the parent away state may implement a lock down on any firearms or other potential hazards in a home.
G08B 13/24 - Electrical actuation by interference with electromagnetic field distribution
G08B 5/36 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission using visible light sources
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
A method for improving privacy of security cameras is described. In one embodiment, predetermined events are monitored via a security camera. The security camera may include an optical barrier. At least one of the predetermined events is detected via the security camera. Based on detecting at least one of the predetermined events, the optical barrier is repositioned, via the security camera, in relation to a camera lens of the security camera.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and apparatuses for occupancy identification for guiding delivery personnel are described. One method for a security or home automation system may include receiving an indication regarding a delivery of a package to a structure associated with the security or home automation system, determining an occupancy of the structure based on the received indication, identifying an identity of an occupant within the structure based on the determined occupancy, and transmitting delivery instructions, to a delivery person associated with the delivery of the package, regarding how to deliver the package based on the identity of the occupant or the determined occupancy.
A computer-implemented method for implementing an integrated device includes operating a component of a security and/or automation system, wherein the component is housed with an electronic device that is connected to electrical wiring of a building, communicating between the component and a control panel of the security and/or automation system, and providing power to the component and the electronic device through the electrical wiring.
A method for adjusting devices upon detecting occupant is asleep in a security/automation system is described. In one embodiment, the method may include monitoring sensor data from one or more sensors, detecting an occupant sleeping, based at least in part on the monitored sensor data, and upon detecting the occupant sleeping, modifying one or more settings associated with one or more devices of the home automation system. In some cases, the method may include modifying at least one of an audio setting associated with the home automation system, a thermostat setting associated with the home automation system, a sensor setting associated with the home automation system, an appliance setting associated with the home automation system, and a security setting associated with the home automation system, or any combination thereof.
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
Techniques are described for a security and automation system. One method includes receiving sensor data associated with at least one sensor of the security and automation system; analyzing the received sensor data; and initiating a function of the security and automation system based on the analyzing.
G07C 9/00 - Individual registration on entry or exit
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06K 9/62 - Methods or arrangements for recognition using electronic means
G06K 9/78 - Combination of image acquisition and recognition functions
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06Q 10/08 - Logistics, e.g. warehousing, loading or distributionInventory or stock management
G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
The present disclosure relates to approaches for detecting and monitoring for earthquakes using a control unit of a security system. A security system may include a plurality of sensors that detect alarm conditions and send alarm condition messages to a control unit for the security system. The control unit may be communicatively coupled to the sensors and configured to receive the alarm condition messages from the sensors. The security system may also include an earthquake sensor that senses earthquake conditions and sends an earthquake condition message to the control unit if it detects the earthquake condition. The control unit may include an alarm module. The control unit causes the alarm module to generate an alarm in response to receiving the earthquake condition message from the earthquake sensor.
Methods, systems, and devices for wireless communication are described. In one example, a method for mobile vehicle integration with a home automation system is described, the method including detecting, at the home automation system, an event associated with a mobile vehicle integrated with the home automation system. The method also includes performing, by the home automation system, an action related to the detected event.
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
B60R 25/104 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device characterised by the type of theft warning signal, e.g. visual or audible signals with special characteristics
B60R 25/33 - Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
B60R 25/04 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on the propulsion system, e.g. engine or drive motor
B60R 25/20 - Means to switch the anti-theft system on or off
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
B60R 25/10 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
51.
Automatic custom rule generation for home automation system
Methods ad systems are described for generating custom rules for device operation in a home environment. A method includes monitoring an activity in home environment via one or more sensors, generating a recommended action associated with the at least one device based on the monitored activity, receiving user input regarding the recommended action, determining a trend based on the received user input, and adjusting performance of the at least one device based on the determined trend.
Methods and systems are described for operating a wall mounted thermostat. An example computer-implemented method includes receiving an indication of a physical touch to an exposed portion of a housing of the thermostat, wherein the housing is movable when touched. The method also includes determining a thermostat command associated with where the housing is touched and movement of the housing in response to the touch, and operating the thermostat according to the determined thermostat command.
A computer-implemented method for premises security is described. In one embodiment, a person passing through a perimeter of a predefined area is detected via a boundary sensor. Upon detecting the person passing through the perimeter of the predefined area, a camera is activated to capture an image of the person, the camera being positioned in relation to the predefined area. A notification is sent to a user determined to be nearest to the predefined area. The notification may include the image of the person. A proximity of a person in relation to a vehicle is detected via a proximity sensor. Upon determining the proximity of the person satisfies a predetermined threshold, a notification is sent to a user. Upon determining the proximity of the person satisfies the predetermined threshold, a camera positioned in relation to the vehicle is activated.
B60R 25/102 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 13/183 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems by interruption of a radiation beam or barrier
G08B 13/14 - Mechanical actuation by lifting or attempted removal of hand-portable articles
G08B 13/04 - Mechanical actuation by breaking of glass
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
09 - Scientific and electric apparatus and instruments
Goods & Services
Computer network hubs; electronic communication devices, namely, computer network hubs, tablet computers, mobile phones, and electronic control panels; electronic communication devices in the nature of computer network hubs, tablet computers, mobile phones, and electronic control panels for use with a network of smart automated devices; electronic communication devices in the nature of computer network hubs, tablet computers, mobile phones, and electronic control panels and downloadable and recorded computer software for use in maintaining and transmitting data between electronic devices on a network, sold as a unit; electronic devices in the nature of computer network hubs, tablet computers, mobile phones, and electronic control panels and downloadable and recorded computer software for controlling home systems, namely, lighting, thermostat, garage door, security systems, alarm systems, sensors and locks, sold as a unit; electronic devices in the nature of computer network hubs, tablet computers, mobile phones, and electronic control panels and downloadable and recorded computer software for viewing home security footage, sold as a unit; electronic devices in the nature of computer network hubs, tablet computers, mobile phones, and electronic control panels and downloadable and recorded computer software for emergency notification system, sold as a unit; electronic devices in the nature of computer network hubs, tablet computers, mobile phones, and electronic control panels and downloadable and recorded computer software for real-time two-way communication, sold as a unit
The present invention is directed to monitoring or control of power production. A power production monitoring system may include a power production monitoring panel that is also configured to operate a premises control system. The power production monitoring system may include a gateway unit that receives signals from a power production source and sends signals to a power production monitoring panel.
H02J 3/14 - Circuit arrangements for ac mains or ac distribution networks for adjusting voltage in ac networks by changing a characteristic of the network load by switching loads on to, or off from, network, e.g. progressively balanced loading
H02J 3/38 - Arrangements for parallelly feeding a single network by two or more generators, converters or transformers
G08B 25/08 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
A method for real-time temperature management is described. In one embodiment, the method includes configuring a setting to trigger a thermal sensor to capture a thermal image of an area inside a premises and capturing, via the thermal sensor, a first thermal image of the area of the premises. In some embodiments, upon detecting the trigger, the method includes capturing, via the thermal sensor, a second thermal image of the area of the premises and identifying a thermal exchange in the area of the premises by comparing the first thermal image with the second thermal image.
F24F 11/523 - Indication arrangements, e.g. displays for displaying temperature data
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
F24F 11/64 - Electronic processing using pre-stored data
F24F 11/52 - Indication arrangements, e.g. displays
G05B 19/042 - Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
G05B 15/02 - Systems controlled by a computer electric
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
Methods and systems are described for determining operation of an openable barrier into a building. A method for determining a state of a barrier includes identifying, based at least in part on a barrier sensor, a first position of the barrier. In one embodiment, the barrier sensor may be positioned at a first side of the barrier, and a magnet may be positioned adjacent to the barrier sensor at the first side of the barrier. The magnet may be positioned at an angle with respect to the barrier sensor. The method may further include determining, based at least in part on the barrier sensor and the magnet, when the barrier changes position from the first position to a second position; and wirelessly transmitting data concerning the change in position of the barrier.
The present disclosure relates to systems and methods for monitoring baby physical characteristics. In some embodiments, the method may include projecting light from a video monitoring system toward a monitored user, and detecting a heart rate of the monitored user at the video monitoring system based at least in part on detecting the projected light. The method may further include comparing the detected heart rate with a predetermined heart rate threshold, and initiating an alert based at least in part on the comparing.
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
G06F 19/00 - Digital computing or data processing equipment or methods, specially adapted for specific applications (specially adapted for specific functions G06F 17/00;data processing systems or methods specially adapted for administrative, commercial, financial, managerial, supervisory or forecasting purposes G06Q;healthcare informatics G16H)
Systems, apparatuses, and methods relating to security system and automation monitoring are described. In one embodiment a method may include receiving motion detection data via an electrical signal, analyzing the motion detection data based at least in part on a first parameter, identifying a movement of an object based at least in part on the analyzing, and adjusting one or more light emitting diodes based at least in part on the identifying.
A computer-implemented method for progressive profiling in a home automation system is described. Data related to a premises and an occupant of the premises may be analyzed and one or more observations may be made based on the analysis of the data. Upon detecting one or more conditions associated with the one or more observations made, an offer to perform one or more actions may be communicated to the occupant.
A method for energy management is described. In one embodiment, an aspect of a dwelling is monitored. The monitored aspect of the dwelling is compared to an energy policy to determine a deviation of the monitored aspect of the dwelling from a setting of the energy policy. A notification is sent to an occupant, the notification comprising the deviation of the monitored aspect of the dwelling from the setting of the energy policy.
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Home automation systems comprising wireless and wired controllers, controlled computer hardware devices, and downloadable software for automating lighting, HVAC, security, safety and home monitoring and control applications; home security systems comprising entry door touch pads, doorbell video cameras and screens, video recording devices, glass break detector, motion detector, security alarms, smoke detector, door and window motion sensors, and garage door controllers; electronic and wireless control panels for security and home automation systems; energy management systems comprising electronic devices in the nature of energy meters for tracking and monitoring energy usage and controls for limiting energy usage for small appliances; climate control systems comprising digital thermostats; lighting systems comprising lighting controls for limiting energy usage of lights; building control systems comprising remote controlled electronic and wireless controllers for managing energy usage for heating, cooling, lights and small appliance; fire and burglar alarms for residential and commercial buildings; gas alarms, namely, carbon monoxide detectors; emergency alarms, namely, emergency evacuation devices in the nature of fire alarm control panels and smoke detectors; trouble alarms for residential and commercial buildings, namely, sound alarms, motion detectors for perimeters, doors and windows, personal security alarms in the nature of panic buttons incorporated into a pendant for safety alert purposes and sensors for water flooding; lighting systems, namely, lighting controls; energy management systems, namely, electric controls for monitoring and adjusting energy usage; video cameras; video systems consisting of video cameras, video monitors, video recorders and video transmission apparatus; automation lock systems comprising electronic controls for monitoring and controlling electronic locking mechanisms; home and office HVAC automation systems comprising wireless and wired controllers, controlled computer hardware devices, downloadable software for automating HVAC systems, and electronic control devices for monitoring and controlling home and office heating and cooling operations; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking automated lighting systems; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, tracking and monitoring automated HVAC systems; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business security systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business fire and burglar alarm systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business trouble alarm systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking video systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking automated lock systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business energy management systems Retail services by direct solicitation by sales agents in the field of burglar, trouble, security and fire alarm systems, building control, automation systems, HVAC automation and monitoring systems, energy management systems, lighting system controls, door locking systems, namely, those which are controlled and monitored through an alarm system panel or remotely through wireless communication, closed circuit television systems (CCTV) and video cameras; Marketing and promoting the sale of goods and services of others by direct solicitation by sales agents; direct marketing services for others; Providing door to door shopping services in the field of burglar, trouble, security and /or fire alarms, building control, security and automation systems, HVAC automation and monitoring systems, energy management systems, lighting system controls, door locking systems, namely, those which are controlled and monitored through an alarm system panel or remotely through wireless communication, closed circuit television systems (CCTV) and video cameras Installation and maintenance of building control and electromechanical security and automated computer hardware systems, namely, HVAC systems, energy management systems, burglar, trouble, security and fire alarms, lighting systems, door locking systems that are controlled through an alarm system panel, closed circuit television systems (CCTV) and video cameras Consulting services in the field of home automation; monitoring of building control and automation systems, namely, monitoring HVAC systems and monitoring of energy management systems to ensure proper functioning; installation and maintenance of building control and electromechanical security and automated computer software systems, namely, HVAC systems, energy management systems, burglar, trouble, security and fire alarms, lighting systems, door locking systems that are controlled through an alarm system panel, closed circuit television systems (CCTV) and video cameras; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking automated lighting systems; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, tracking and monitoring automated HVAC systems; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business security systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business fire and burglar alarm systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business trouble alarm systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking video systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking automated lock systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business energy management systems Consulting services in the field of home security; monitoring security alarm systems; emergency response services in the nature of monitoring burglar, trouble, fire and security alarm systems; monitoring of door locking alarm systems for security purposes, namely, providing intrusion and trouble alerts through wireless communication in the nature of monitoring of alert devices by a remote monitoring center for the dispatch of emergency public health and security services and notification to third parties; live monitoring for security purposes, namely, providing closed circuit television systems (CCTV) and video monitoring of facilities, viewable through a communications network, the aforementioned for physical security purposes
09 - Scientific and electric apparatus and instruments
25 - Clothing; footwear; headgear
35 - Advertising and business services
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Home automation systems comprising wireless and wired controllers, controlled computer hardware devices, and downloadable software for automating lighting, HVAC, security, safety and home monitoring and control applications; home security systems comprising entry door touch pads, doorbell video cameras and screens, video recording devices, glass break detector, motion detector, security alarms, smoke detector, door and window motion sensors, and garage door controllers; electronic and wireless control panels for security and home automation systems; energy management systems comprising electronic devices in the nature of energy meters for tracking and monitoring energy usage and controls for limiting energy usage for small appliances; climate control systems comprising digital thermostats; lighting systems comprising lighting controls for limiting energy usage of lights; building control systems comprising remote controlled electronic and wireless controllers for managing energy usage for heating, cooling, lights and small appliance; fire and burglar alarms for residential and commercial buildings; gas alarms, namely, carbon monoxide detectors; emergency alarms, namely, emergency evacuation devices in the nature of fire alarm control panels and smoke detectors; trouble alarms for residential and commercial buildings, namely, sound alarms, motion detectors for perimeters, doors and windows, personal security alarms in the nature of panic buttons incorporated into a pendant for safety alert purposes and sensors for water flooding; lighting systems, namely, lighting controls; energy management systems, namely, electric controls for monitoring and adjusting energy usage; video cameras; video systems consisting of video cameras, video monitors, video recorders and video transmission apparatus; automation lock systems comprising electronic controls for monitoring and controlling electronic locking mechanisms; home and office HVAC automation systems comprising wireless and wired controllers, controlled computer hardware devices, downloadable software for automating HVAC systems, and electronic control devices for monitoring and controlling home and office heating and cooling operations; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking automated lighting systems; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, tracking and monitoring automated HVAC systems; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business security systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business fire and burglar alarm systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business trouble alarm systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking video systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking automated lock systems and devices; downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business energy management systems Clothing, namely, shirts, t-shirts, jackets, hats, sweatshirts, long sleeve shirts, uniforms Retail services by direct solicitation by sales agents in the field of burglar, trouble, security and fire alarm systems, building control, automation systems, HVAC automation and monitoring systems, energy management systems, lighting system controls, door locking systems, namely, those which are controlled and monitored through an alarm system panel or remotely through wireless communication, closed circuit television systems (CCTV) and video cameras; Marketing and promoting the sale of goods and services of others by direct solicitation by sales agents; direct marketing services for others; Providing door to door shopping services in the field of burglar, trouble, security and /or fire alarms, building control, security and automation systems, HVAC automation and monitoring systems, energy management systems, lighting system controls, door locking systems, namely, those which are controlled and monitored through an alarm system panel or remotely through wireless communication, closed circuit television systems (CCTV) and video cameras Installation and maintenance of building control and electromechanical security and automated computer hardware systems, namely, HVAC systems, energy management systems, burglar, trouble, security and/or fire alarms, lighting systems, door locking systems that are controlled through an alarm system panel, closed circuit television systems (CCTV) and video cameras Consulting services in the field of home automation; monitoring of building control and automation systems, namely, monitoring HVAC systems and monitoring of energy management systems to ensure proper functioning; installation and maintenance of building control and electromechanical security and automated computer software systems, namely, HVAC systems, energy management systems, burglar, trouble, security and fire alarms, lighting systems, door locking systems that are controlled through an alarm system panel, closed circuit television systems (CCTV) and video cameras; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking automated lighting systems; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, tracking and monitoring automated HVAC systems; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business security systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business fire and burglar alarm systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business trouble alarm systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking video systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking automated lock systems and devices; providing temporary use of on-line non-downloadable computer application software for mobile phones, mobile tablet computers and handheld wireless devices, namely, software for use in controlling, monitoring and tracking home and business energy management systems Consulting services in the field of home security; monitoring security alarm systems; emergency response services in the nature of monitoring burglar, trouble, fire and security alarm systems; monitoring of door locking alarm systems for security purposes, namely, providing intrusion and trouble alerts through wireless communication in the nature of monitoring of alert devices by a remote monitoring center for the dispatch of emergency public health and security services and notification to third parties; live monitoring for security purposes, namely, providing closed circuit television systems (CCTV) and video monitoring of facilities, viewable through a communications network, the aforementioned for physical security purposes
Techniques are described for generating power from airflow powered smart vents associated with security and automation systems. One method includes monitoring a rate of airflow through an air vent in a centralized heating and cooling system, generating, at a sensor at the air vent, power based at least in part on the rate of airflow through the air vent, storing the generated power in the sensor at the air vent, providing the stored power to one or more motors associated with the sensor at the air vent, and utilizing the stored power to perform communication between the sensor at the air vent and a control panel of the home automation system, wherein the control panel is located at a location different from a location of the sensor.
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
G05B 19/042 - Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
A system includes a base station having a local storage device and a local processor, and providing a cell in a network for one or more clients communicatively connected to the base station. A content distribution module of the system is configured to store a local copy of a digital content item. A remote copy of the digital content item is stored on a remote computing device. A content request module of the system is configured to receive a request for the digital content item. A content serving module of the system is configured to identify at least one secondary source other than the remote computing device and the base station that stores a secondary copy of the digital content item, determine which of the local, remote and secondary copies of the digital content item may be delivered in a least amount of time, and deliver that copy.
H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
H04W 28/14 - Flow control using intermediate storage
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
H04L 67/52 - Network services specially adapted for the location of the user terminal
H04N 21/414 - Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
Apparatuses, techniques, and methods for a security and/or automation system are described. In some cases, methods may include receiving, from a first device at a first location, a request to access data associated with a time period from a second device at a second location, the data comprising at least one of audio data, visual data, or a combination thereof, receiving, from the first device, a category associated with the request, identifying a first set of data associated with the time period, the identified first set of data based at least in part on the request and the category, and automatically transmitting the first set of data to the first device based at least in part on the category.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
G06F 16/9537 - Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
G06F 16/78 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
H04W 4/02 - Services making use of location information
H04W 4/21 - Services signallingAuxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
G06F 16/487 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
G06F 16/735 - Filtering based on additional data, e.g. user or group profiles
G08B 15/00 - Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
A method for security and/or automation systems is described. In one embodiment, the method may include streaming a first view of a camera in a video stream, embedding a second view of the camera in the video stream, and transmitting the video stream to at least one of a first display device and a second display device.
H04N 21/00 - Selective content distribution, e.g. interactive television or video on demand [VOD]
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
H04N 21/482 - End-user interface for program selection
H04N 21/63 - Control signaling between client, server and network componentsNetwork processes for video distribution between server and clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB'sCommunication protocolsAddressing
G06F 16/68 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
G06F 16/78 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
A method for HVAC workload and cost logic is described. In one embodiment, the method includes detecting a thermostat of an HVAC system being set to a target temperature and upon detecting the thermostat being set to the target temperature, detecting a current indoor condition and a current outdoor condition. In some embodiments, the method includes calculating an estimated runtime of an HVAC heating or cooling cycle for the target temperature. The estimated runtime is based on the target temperature, the current indoor and outdoor conditions, and on a result of querying a correlation database. The correlation database includes data points for a plurality of previous HVAC heating and cooling cycles.
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
F24F 140/00 - Control inputs relating to system states
A method for security and/or automation systems is described. In one embodiment, the method may include receiving occupancy data, identifying characteristics of the occupancy data, determining an occupant's location relative to the premises at a predetermined time, and generating a notification based at least in part on the determining.
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 25/08 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
G08B 21/22 - Status alarms responsive to presence or absence of persons
Methods and systems are described for robot transportation of objects into or out of a home automation system. One example may include determining, by a mobile robotic device, that an object is available to cross a boundary of the home automation system. The method may include deactivating at least a portion of the home automation system. The method also include retrieving, by the mobile robotic device, the object and transporting, by the mobile robotic device, the object across the boundary. The method further includes leaving, by the mobile robotic device, the object at a drop-off location. The method may also include reactivating at least the portion of the home automation system.
In some embodiments, the security and/or automation system, collectively referred to herein as automation system, may include a system for remotely monitoring a residence while respecting the privacy of occupants of the residence and the need for safety and security concerns. When a user is actively monitoring a residence, the system may provide a notification to occupants that remote monitoring is active. The remote monitoring may comprise video feed viewing of the residence, review of still images, audio review, and the like. The remote monitoring may allow review of multiple areas or rooms of a residence, the outside of a residence, and the like. The notifications may alert an occupant when a user is remotely viewing an audio feed, a video feed, images, or the like. However, the user may be disable the notifications if so desired.
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
In some embodiments, security and/or automation systems, collectively referred to as automation systems, may facilitate communications between a remote user and an occupant of a residence. The automation system may receive one or more communications from a user and deliver the communication to the specified recipient when the recipient occupies the residence. The automation system may determine the recipient is proximate the residence and may notify the recipient of the pending communication. The recipient may use the control panel or another device associated with the security and/or automation system to receive the message.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
According to at least one embodiment, a computer-implemented method to implement at least one automation rule is described. The at least one automation rule may be generated, wherein the at least one automation rule may control at least one aspect of an automation system. The execution origination point may be selected for the at least one automation rule based at least in part on the one or more implementation parameters. The one or more implementation parameters may comprise at least one of the speed of the automation rule execution, the scalability of the automation rule, the flexibility of the automation rule conditions, or the ease of automation rule modification.
G05B 15/02 - Systems controlled by a computer electric
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
G05B 19/418 - Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
Methods and systems for operating a security and/or automation system using one or more powered faceplates are disclosed. The methods may include identifying an active communication connection with a first powered faceplate, receiving a first set of automation data, receiving a second set of automation data, analyzing the first set of automation data and the second set of automation data, and initiating an operation relating to at least one of a first powered faceplate, one or more other powered faceplates, an automation sensor, an automation system component, a user device, or a combination thereof based at least in part on the analyzing.
A method for geo-location services is described. In one embodiment, the method includes tracking incidents that occur within a predetermined geographic area in relation to a subscription service, upon receiving a request for a list of incidents in relation to the predetermined geographic area, generating a notification comprising the requested list of incidents, and sending the notification to one or more subscribers within the predetermined geographic area.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
G01C 21/36 - Input/output arrangements for on-board computers
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
G08B 5/22 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
H04W 4/02 - Services making use of location information
G01C 21/20 - Instruments for performing navigational calculations
A method for security and/or automation systems is described. In one embodiment, the method includes identifying image data from a signal, analyzing the image data based at least in part on a first parameter, identifying a presence of an object based at least in part on the analyzing, and detecting an object event based at least in part on the identifying.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Techniques are described for selecting an alarm state based at least in part on determining a security event related to security and automation systems. One method includes receiving, from a sensor, a first indication of a security event at the first location, determining a first threat level based on the security event, and activating a first alarm state based at least in part on the first threat level.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 19/00 - Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
Methods, apparatuses, and techniques for security and/or automation systems are described. In one embodiment, the method including identifying a presence of a first person at a first location, capturing a first video related to the first person at the first location, and initiating an adjustment of a display of the first video based at least in part on identifying the presence of the first person.
Methods and systems are described for setting up a security and/or automation system. According to at least one embodiment, a method for setting up the security or automation system includes receiving a communication from a mobile device associated with installing a system peripheral device at a control unit and executing an installation task based on the communication.
Methods, apparatuses, and techniques for security and/or automation systems are described. In one embodiment, the method may include receiving a call initiation instruction at a video monitoring component of a home automation system. The method may further include analyzing the call initiation instruction, and communicating a call request from the video monitoring component of the home automation system to a first remote user based at least in part on the received call initiation instruction.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Telecommunications consultation services relating to wireless networks, wireless routers and wireless access point (WAP) devices; rental of telecommunication and wireless telecommunications equipment; provision of information, advice and assistance relating to all the aforementioned services, namely, providing information and advisory services in the field of telecommunications, telecommunications consultation services and telecommunications equipment rental Computer hardware, namely, routers, wireless network extenders and wireless access point (WAP) devices; wireless routers; wireless router nodes; downloadable computer firmware and downloadable computer software for controlling the operation of internet devices; dowloadable computer firmware and downloadable computer software for controlling the operation of wireless networks and wireless access point (WAP) devices; downloadable computer software for connecting, managing, securing and operating local and wide area networks; Software, namely, downloadable communication application software for establishing and managing Internet connections among multiple wireless devices, in particular, access points, routers, and wireless networks Telecommunications technology consultancy and information in the field of routers, wireless networks and wireless access point (WAP) devices
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Telecommunications consultation services relating to wireless networks, wireless routers and wireless access point (WAP) devices; rental of telecommunication and wireless telecommunications equipment; provision of information, advice and assistance relating to all the aforementioned services, namely, providing information and advisory services in the field of telecommunications, telecommunications consultation services and telecommunications equipment rental Computer hardware, namely, routers, wireless network extenders and wireless access point (WAP) devices; wireless routers; wireless router nodes; downloadable computer firmware and downloadable computer software for controlling the operation of internet devices; downloadable computer firmware and software for controlling the operation of wireless networks and wireless access point (WAP) devices; downloadable computer software for connecting, managing, securing and operating local and wide area networks; Software, namely, downloadable communication application software for establishing and managing Internet connections among multiple wireless devices, in particular, access points, routers, and wireless networks Telecommunications technology consultancy and information in the field of routers, wireless networks and wireless access point (WAP) devices
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Installation and maintenance of building control and electromechanical security and automated systems, namely, HVAC systems, energy management systems, burglar, trouble, security and/or fire alarms, lighting systems, door locking systems that are controlled through an alarm system panel, CCTV and video cameras Consulting services in the field of home automation; monitoring of building control and automation systems, namely, monitoring HVAC systems and monitoring of energy management systems to ensure proper functioning Consulting services in the field of home security; monitoring security systems; monitoring burglar, trouble, fire and security alarm systems; monitoring of door locking systems for security purposes, namely, providing intrusion and trouble alerts through wireless communication; live monitoring for security purposes, namely, providing CCTV and video monitoring of facilities, viewable through a communications network
A device may require one or more updates to its software. However, the device may be inaccessible due to a variety of circumstances. Troubleshooting the device may be difficult. Therefore, the device may be configured to automatically run a script after it has been validated to perform one or more functions on the control panel. In one embodiment, a method to automate a script on a device is described. The method may include searching an attached external storage device for a script, identifying a script based at least in part on the searching, validating the authenticity of the identified script, and executing, automatically, the validated script.
G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
Methods and systems are described for determining operation of an openable barrier and direction of movement of a person through an opening controlled by the barrier. A method includes detecting with a hinge sensor a closed position for the barrier, the hinge sensor being mounted to a hinge of the barrier, determining with the hinge sensor when the barrier changes position from the closed position to an open position, detecting with at least one motion sensor motion of an object in proximity to the opening, and determining a direction of movement of the object through the opening based on whether the motion is detected before or after detecting the change in position of the barrier.
A method for heating ventilation and air conditioning (HVAC) systems is described. In one embodiment, the method includes measuring a temperature of a first room of a building via a first thermometer placed in the first room and measuring a temperature of a second room of the building via a second thermometer placed in the second room and receiving the temperature of the first room via a first data communication device communicatively coupled to a first HVAC register in the first room and receiving the temperature of the second room via a second data communication device communicatively coupled to a second HVAC register in the second room. In some cases, the first data communication device is configured to communicate data between the first thermometer and a central automation controller and the second data communication device is configured to communicate data between the second thermometer and the central automation controller.
G05D 23/19 - Control of temperature characterised by the use of electric means
G05B 19/042 - Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
F24F 11/83 - Control systems characterised by their outputsConstructional details thereof for controlling the temperature of the supplied air by controlling the supply of heat-exchange fluids to heat-exchangers
G05B 15/02 - Systems controlled by a computer electric
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/54 - Control or safety arrangements characterised by user interfaces or communication using one central controller connected to several sub-controllers
Methods and systems are described for monitoring medication use with a home automation system. An example medication monitoring system includes a medication storage device, a proximity device, and a dispenser module. The medication storage device is configured to hold a plurality of medications. The proximity device is configured to detect an activity of a user relative to the medication storage device. The dispense module is configured to detect a pattern of the activity based on data received from the proximity device, and generate a notice. The notice may be generated if the pattern is broken. The notice may include a summary report on usage of the medication storage device. The notice may include an alarm if the medication storage device is, for example, tampered with or moved.
Methods and systems are described for tracking location using a home automation system. One method includes receiving sensor data indicating presence of a wearable tracking device in a predetermined area of a property monitored by the home automation system, confirming an identity of the tracking device, and generating a notice indicating a location of the tracking device.
A computer-implemented method for monitoring activity at a location, provides receiving a first data signal and a second data signal, wherein the first and second data signals are related to activities detected at a location, and reproducing the first and second data signals in a chronology that indicates relative timing of receipt of the first and second data signals via a user interface. This may accelerate review and inspection of multiple data signals recorded over time, including data signals of various types. The coincidence of patterns in the data signals may be detected and brought to the user's attention for closer review, such as via transmission of a message or transmission of a segment of recorded data.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06F 3/0483 - Interaction with page-structured environments, e.g. book metaphor
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G06F 3/0488 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
A method for security and/or automation systems is described. In one embodiment, the method includes receiving social media data via a signal, analyzing the social media data based at least in part on a first parameter, identifying occupancy information based at least in part on the analyzing, and assessing a structure occupancy based at least in part on the identifying.
G08B 21/22 - Status alarms responsive to presence or absence of persons
G06N 7/00 - Computing arrangements based on specific mathematical models
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
G08B 19/00 - Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
93.
Detecting destruction of an automation system component
A control panel is used to monitor events within a security system or other automation system. In the event an intruder enters a physical location, the intruder may attempt to damage the control panel to disrupt its operation. One or more sensors of the control panel may detect disruption in the operation of the control panel. Example sensors may detect an impact force, sudden acceleration, removal from a mounted location, or disruption of communication with an input/output element, such as a display device. When an event is detected at the control panel itself, the control panel can send a signal to a remote service provider, and the remote service provider can follow-up with the customer. The control panel and/or remote service provider may also determine when the control panel loses partial or complete power loss to identify the disruption as a potential crash-and-smash entry.
Methods and systems for security and/or automation systems are described. In some embodiments, the methods may include identifying an area of a premises associated with an occupant, identifying a wake up time associated with the occupant, identifying a location associated with the occupant, and initiating one or more automated actions based at least in part on the wake up time and the area.
G08B 19/00 - Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
G08B 25/14 - Central alarm receiver or annunciator arrangements
A method for security and/or automation systems is described. In some embodiments, the method may include detecting departure data relating to at least one of an occupant and a premises, identifying a likelihood of an absence in relation to the premises based at least in part on the departure data, and sending a confirmation request based at least in part on the identifying for the occupant associated with the premises to confirm the absence. In some cases, the absence may include the premises being unoccupied for at least a portion of a predetermined time period. The predetermined time period may include at least one night.
Methods and systems are described for back-end failure redundancy in security and automation systems. According to at least one embodiment, an apparatus for back-end failure redundancy includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory. The instructions are executable by a processor to detect an alarm event, and attempt to establish a connection between a control panel and a backend system. If no connection between control panel and backend system is made, the instructions may initiate a two-way cellular call between the control panel and a central station, and deliver a caller ID from the control panel to the central station via the two-way cellular call.
Methods, apparatuses, and techniques for security and/or automation systems are described. In one embodiment, the method may include receiving a call initiation instruction at a video monitoring component of a home automation system. The method may further include analyzing the call initiation instruction, and communicating a call request from the video monitoring component of the home automation system to a first remote user based at least in part on the received call initiation instruction.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/08 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
98.
Dedicated wireless network for security and automation system
Techniques are described herein for establishing two wireless networks at a premises, a dedicated network configured to be used by devices of an automation and security system of the premises and a user network configured to be used by devices associated with users. The dedicated network may be more rigorously secured than the user network. The dedicated network may be secured in such a way that computing devices associated with users are not permitted to access the dedicated network. In this manner, the dedicated network may be prevented from becoming compromised. In some examples, a contention management entity may mediate network traffic scheduling between the dedicated network and the user network. The dedicated network may be configured to give deference to traffic being communicated across the user network to maintain a quality of service for end users of the user network.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
According to at least one embodiment, a computer-implemented method to manage incoming communications is described. An incoming call may be received on a landline. One or more devices may be located within a predetermined area based at least in part on the receipt of the incoming call. The incoming call may be forwarded to the one or more devices based at least in part on the locating.
A method for security and/or automation systems is described. In one embodiment, the method includes detecting a sound using a microphone, generating an audio signature of the detected sound, comparing the audio signature of the detected sound to an audio signature of a characterized sound, and determining whether a recognizable event occurs based on the comparison. In some embodiments, the microphone is attached to a pipe at the premises.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
G10L 25/90 - Pitch determination of speech signals