Systems and techniques are described for dynamically configuring and/or adjusting intervals for exchanging supervision signals between a control panel and an associated server system of a monitoring system located in a property. In some implementations, sensor data generated by one or more sensors of a monitoring system is obtained. A status of the property is determined based on the sensor data. A pinging frequency of the monitoring system is adjusted based on the status of the property. The pinging frequency specifies a frequency of communications between the server system and the control unit. The control unit is then configured to communicate with the server system according to the adjusted pinging frequency.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for performing security-related actions for a property. One of the methods includes accessing data from a responder data stream that encodes speech for an event at a property; detecting the speech for the event at the property, the detecting comprising parsing the data from the responder data stream; determining one or more actions to perform using the detected speech for the event at the property; and performing, for the property, the one or more actions.
Methods and systems, including computer programs encoded on a computer storage-medium, are disclosed for implementing intelligent detection of wellness events using mobile device sensors and cloud-based learning systems. A system obtains sensor data generated by sensors integrated in a mobile device of a user. A machine-learning (ML) engine of the system generates a predictive model that identifies behavioral trends of the user. The model is generated using a neural network trained to identify patterns representing user trends in the sensor data. Based on communications with the device, the model is used to generate activity profiles of the user from the behavioral trends. The model is used to detect abnormal events involving the user when a parameter value of the activity profile exceeds a threshold. Notifications directed to assisting the user with alleviating the abnormal event are generated after detecting the abnormal events.
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
G06N 3/04 - Architecture, e.g. interconnection topology
G08B 5/22 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for optimizing energy storage energy flow schedules. One of the methods includes predicting a quantity of energy storage devices from a plurality of energy storage devices that will likely consume energy during a time period; for at least some devices from a plurality of energy storage devices, predicting a state of charge for the respective device; using the predicted quantity and the predicted states of charge, predicting an amount of energy that will be needed by devices from the plurality of energy storage devices during the time period; generating, using the predicted amount of energy, an energy flow schedule for one or more devices from the plurality of energy storage devices; and providing, to at least some of the one or more devices, instructions to cause the respective device to execute a respective energy flow schedule.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for security monitoring using nonvisible signals. One of the methods includes obtaining, from an imaging device, a set of images of one or more physical locations surrounding or including an area of a property; detecting a human depicted in the set of images; determining whether the set of images includes an indication of a non-visible energy signal emitted by a wearable device worn by the human; and determining that the human has permission to access the area of the property in response to determining that the set of images includes the indication of the non-visible energy signal emitted by the wearable device worn by the human.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for security monitoring using nonvisible signals. One of the methods includes obtaining, from an imaging device, a set of images of one or more physical locations surrounding or including an area of a property; detecting a human depicted in the set of images; determining whether the set of images includes an indication of a non-visible energy signal emitted by a wearable device worn by the human; and determining that the human has permission to access the area of the property in response to determining that the set of images includes the indication of the non-visible energy signal emitted by the wearable device worn by the human.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for visual authentication. In some implementations, a method may include obtaining images of a person at a property; detecting a discontinuity in an appearance of the person in the images of the person at the property; determining that the discontinuity does not correspond to a known occlusion; and providing an indication of a potential spoofing attack.
G06V 40/40 - Spoof detection, e.g. liveness detection
G06V 10/40 - Extraction of image or video features
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for transmitting, during a medical emergency of a person, medical data of the person to a first responder or another responding individual. One of the methods includes detecting, by a first device of a person in a medical emergency, a second device that is within a threshold distance of the first device; and in response to detecting the second device and based on the medical emergency, transmitting, to the second device, medical data for the person.
G16H 40/20 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the management or administration of healthcare resources or facilities, e.g. managing hospital staff or surgery rooms
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
Methods, systems, and apparatus for door knock access control are disclosed. A monitoring system for monitoring a property includes: a proximity sensor located at a door of the property; a microphone that is configured to detect sound within an area near the door and generate audio data that represents the detected sound; and a monitor control unit configured to perform operations including: receiving, from the proximity sensor, proximity data indicating an object positioned within a set proximity to the door; based on receiving the proximity data, activating the microphone; receiving, from the microphone, the audio data; determining that a similarity between the audio data and stored audio data representing a knocking pattern satisfies similarity criteria; and in response to determining that the similarity between the audio data and the stored audio data satisfies similarity criteria, performing a monitoring system action.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for temperature control. In some implementations, a method includes obtaining first temperature data associated with a first climate control component of a first dwelling of a property; obtaining second temperature data associated with a second climate control component of a second dwelling of the property; determining a leak effect between the first dwelling and the second dwelling using the first temperature data and the second temperature data; determining an instruction to adjust operation of the first climate control component using the leak effect; and providing the instruction to the first climate control component.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting packages delivering in the camera's blindspot. One of the methods includes detecting, using one or more images captured by a camera at a property, movement in an area of interest i) at the property, ii) that is included in a field of view of the camera and iii) was generated using historical data for packages delivered to the property; determining, using the detected movement in the area of interest, that a package was likely delivered; and in response to determining that the package was likely delivered, performing one or more automated actions for the package.
G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
G06T 7/246 - Analysis of motion using feature-based methods, e.g. the tracking of corners or segments
G06V 20/40 - ScenesScene-specific elements in video content
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for improving visual inertial odometry (VIO). One of the methods includes identifying two or more parameters of a robot; generating, using the two or more parameters, a multi-dimensional space; generating two or more configurations for the robot by sampling the multi-dimensional space; determining, for each of the two or more configurations, a visual inertial odometry (VIO) trajectory; generating, for each of the trajectories using the corresponding trajectory and a ground truth trajectory, (i) error data representing a difference of the corresponding trajectory from the ground truth trajectory and (ii) processing data representing processing metrics from the determination of the corresponding trajectory; selecting, using (i) the error data and (ii) the processing data, a configuration of the two or more configurations; and providing, to the robot, the selected configuration for navigating an area.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for performing privacy-aware surveillance with a security camera drone. The drone obtains image data using an imaging device and processes the image data to detect an object external to the drone. In response to processing the image data, the drone determines multiple viewing angles indicated in the image data with respect to the object. Based on the image data and the multiple viewing angles, a first section of the area for surveillance and a second, different section of the area to be excluded from surveillance are identified. The drone determines an adjustment to at least one of the multiple viewing angles to cause the second section to be excluded from surveillance. Based on the adjustment, the drone controls the imaging device to exclude the second section from surveillance imagery obtained by the drone.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for controlling access to a premises. One of the methods includes detecting a person within a threshold distance of a door; determining that there is a threshold likelihood that the person may access the door; providing instructions that indicate one or more criteria for access to the door; determining that a threshold quantity of the one or more criteria are satisfied; and in response to determining that the threshold quantity of the one or more criteria are satisfied, providing access to the door.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Wearable medical personal emergency response systems (mPERS) used to provide alerts for location awareness and fall detection; Recorded software that provides real-time alerts to emergency operators and designated contacts for location and fall detection sold as a component of wearable medical personal emergency response systems (mPERS) Providing online non-downloadable software that provides real time alerts to emergency operators and designated contacts for location and fall detection Emergency response medical alarm monitoring services provided via global cellular networks using 2-way audio for individuals through the use of wearable monitoring devices with automated medical alert and location tracking capabilities
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for managing sensor communications in a monitored environment. One of the methods includes receiving, by a server and from a device that is accepted to connect with a first network using acceptance data that includes a first key indicating the device is associated with the first network, a request a) to join a second network different from the first network b) that identifies the first key; determining, by the server and using the identification of the first key in the request, that the device that transmitted the request is associated with the first network; and providing, by the server, an notification i) to a user associated with the first network ii) indicating that the device has moved outside the first network.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for training using an automated system. One of the methods includes determining, using first sensor data obtained by a sensor at a property, that a candidate target object satisfies a similarity threshold for each of two or more predetermined objects; in response to determining that the candidate target object satisfies the similarity threshold, accessing second sensor data of the candidate target object; determining, using at least the second sensor data, that the candidate target object is a target object from the two or more predetermined objects; in response to determining that the candidate target object is the target object, selecting, from a plurality of automated actions each for a corresponding one of the two or more predetermined objects, an automated action; and performing the automated action.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for camera image analysis. One of the methods includes: capturing, by a camera, a video sequence that depicts a property; while continuing to capture the video sequence: detecting, by the camera, a representation of an entity in the video sequence; and in response to detecting the representation of the entity in the video sequence, sending, to a video analysis system, a snapshot a) from the video sequence and b) that includes the representation of the entity; and after a threshold period of time from detection of the representation of the entity, sending, to the video analysis system, at least a portion of the video sequence.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersectionsConnectivity analysis, e.g. of connected components
Techniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
A computer implemented method includes receiving one or more user set preferences for detecting a hub alarm condition and one or more actions to perform in response to detecting a hub alarm condition, receiving, from the output of the security panel, data indicating that a traditional alarm condition occurred, based on receiving data indicating a traditional alarm condition occurred at the monitored property, receiving sensor data from at least one wireless sensor in a vicinity of a hardwired sensor associated with the traditional alarm condition, determining, based on the sensor data received from at least one wireless sensor in a vicinity of the hardwired sensor associated the traditional alarm condition, that the sensor data satisfies a condition, and in response to determining that the sensor data satisfies a condition, performing an action.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
23.
SMART ELECTRONIC CHIME AND MECHANICAL CHIME DEHUM BOARD
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a smart dehum circuit that powers a chime which outputs audio in response to detection of a trigger event by a video doorbell. The circuit includes a detector circuit configured to generate a power signal in response to determining that an output voltage signal of a first circuit exceeds a threshold voltage. The circuit also includes a microcontroller coupled to the detector circuit. The microcontroller is configured to generate a chime power signal based on the power signal of the detector circuit. The chime power signal is generated to power the chime in response to detection of the trigger event by the video doorbell.
H04M 11/02 - Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
Virtual sensor technology, in which a camera is controlled to capture at least one configuration image of an area monitored by a monitoring system and input is received that defines one or more characteristics of the at least one configuration image that enable sensing of an event in the area. Based on the received input, configuration data used in sensing the event is generated and stored. After storage of the configuration data, the camera is controlled to capture one or more images of the area, the one or more images are analyzed based on the configuration data, and occurrence of the event is detected based on the analysis of the one or more images. Based on detecting occurrence of the event, a transmitting device is controlled to send, to a controller of the monitoring system, a signal that indicates the detection of the occurrence of the event.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 20/40 - ScenesScene-specific elements in video content
G08B 13/08 - Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 17/12 - Actuation by presence of radiation or particles, e.g. of infrared radiation or of ions
Techniques are described for handling duress input. For example, techniques are described for handling duress input provided to a mobile application that controls a monitoring system located at a fixed property.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 15/00 - Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/14 - Central alarm receiver or annunciator arrangements
28.
Monitoring System Control Technology Using Multiple Sensors, Cameras, Lighting Devices, and a Thermostat
Techniques are described for providing control of a monitoring system (e.g., a home alarm or security system) using one or more mobile devices. In some implementations, a native mobile device application enables use of a mobile device as a security/automation system keypad and controller for a home security system. In these implementations, the mobile device, using the native mobile device application, checks real time status of system and sensors, arms/disarms system, turns lights on/off, looks in on live video of security cameras, reviews history of system events, reviews saved video clips, monitors/changes thermostat settings, and performs other features of a traditional security keypad in a home security system.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/08 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 25/14 - Central alarm receiver or annunciator arrangements
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Image surveillance and reporting technology, in which an event that is indicative of potential physical activity within an area corresponding to a location of a camera unit is detected. In response to detection of the event, the camera unit is controlled to capture one or more images of the area corresponding to the location of the camera unit. The one or more images captured by the camera unit are analyzed to determine whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit. The one or more images are handled based on the determination of whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/14 - Central alarm receiver or annunciator arrangements
Controller technology, in which data specifying a user preference relating to an environmental parameter for a property is received. Based on data collected by a monitoring system, a location of one or more users within the property is identified. Environmental condition data for the property is accessed, the environmental condition data including environmental condition data for the location of the users within the property and other unoccupied locations within the property. The environmental condition data for the property is analyzed with respect to the preference relating to the environmental parameter for the property. Based on the analysis of the environmental condition data for the property with respect to the preference relating to the environmental parameter for the property, a setting for at least one component of an HVAC system is determined. The at least one component of the HVAC system is controlled according to the determined setting.
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
F24F 110/00 - Control inputs relating to air properties
A computer-implemented method including receiving, by a monitoring system that is configured to monitor a property and from a touchless doorbell device that includes a camera and a motion sensor, an image, analyzing, by the monitoring system, the image, based on analyzing the image, determining that the image likely includes a representation of a person, and based on determining that the image likely includes a representation of a person, performing a monitoring system action.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G08B 13/19 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
G08B 25/08 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Image surveillance and reporting technology, in which an event that is indicative of potential physical activity within an area corresponding to a location of a camera unit is detected. In response to detection of the event, the camera unit is controlled to capture one or more images of the area corresponding to the location of the camera unit. The one or more images captured by the camera unit are analyzed to determine whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit. The one or more images are handled based on the determination of whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/14 - Central alarm receiver or annunciator arrangements
Fall detection and reporting technology, in which output from at least one sensor configured to sense, in a room of a building, activity associated with a patient falling is monitored and a determination is made to capture one or more images of the room based on the monitoring. An image of the room is captured with a camera positioned to include the patient within a field of view of the camera and the captured image of the room is analyzed to detect a state of the patient at a time of capturing the image. A potential fall event for the patient is determined based on the detected state of the patient and a message indicating the potential fall event for the patient is sent based on the determination of the potential fall event for the patient. Techniques are also described for fall detection and reporting using an on-body sensing device.
G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods
G08B 21/02 - Alarms for ensuring the safety of persons
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
G16Z 99/00 - Subject matter not provided for in other main groups of this subclass
Monitoring system alert technology, in which monitoring system data is accessed from a monitoring system that is located in a property of a user and the monitoring system data is analyzed against one or more rules that define alerts provided for the monitoring system. Based on the analysis, a determination is made that an alert for the monitoring system is needed and conditions for providing the alert are accessed. Location of a mobile device of a user associated with the monitoring system and timing related to providing the alert are monitored. The monitored location of the mobile device and the monitored timing are analyzed with respect to the accessed conditions. Based on the analysis, a determination is made that the accessed conditions for providing the alert are met and the alert is output at the mobile device.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G06Q 10/20 - Administration of product repair or maintenance
G07C 9/00 - Individual registration on entry or exit
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 21/24 - Reminder alarms, e.g. anti-loss alarms
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 29/02 - Monitoring continuously signalling or alarm systems
Method, systems, and apparatus, including computer programs encoded on computer storage media, for detecting interference with sound sensing devices. One of the methods includes receiving, from a sound sensing device at a property, an audio signal captured by the sound sensing device; obtaining, from one or more other devices at the property, data; determining whether an audio event likely occurred at the property using the obtained data; in response to determining that an audio event likely occurred at the property, determining, using the audio signal captured by the sound sensing device and event data for the audio event, whether a configuration of the sound sensing device is likely modified; and in response to determining that the configuration of the sound sensing device is likely modified, performing one or more actions for the modification of the configuration of the sound sensing device at the property.
An electronic monitoring system is described that receives data from a particular monitoring system, receives data from multiple other monitoring systems, analyzes data received from the particular monitoring system irrespective of data received from the multiple other monitoring systems, based on the analysis, determines whether one or more events occur at the particular environment, and in response to determining that a particular event occurs at the particular environment, evaluates the particular event against a set of rules, selects, based on the evaluation results, a particular subset of the multiple other monitoring systems to serve as a cooperative monitoring network, assesses data received from the particular subset of the multiple other monitoring systems, based on the assessment, tracks, in connection with the particular event, events detected by the particular subset of the multiple other monitoring systems, and handles the particular event based on the tracked events.
H04L 41/0686 - Additional information in the notification, e.g. enhancement of specific meta-data
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 25/14 - Central alarm receiver or annunciator arrangements
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
G08B 29/18 - Prevention or correction of operating errors
H04K 3/00 - Jamming of communicationCounter-measures
H04L 41/0681 - Configuration of triggering conditions
H04W 4/02 - Services making use of location information
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
A method is described that determines that a replacement node device has been connected to a mesh network, the replacement node device corresponding to an original node that has been removed from the mesh network. In response to determining that the replacement node device has been connected to the mesh network, network topology data is accessed that specifies one or more data routing configurations that are each associated with a node device included in the mesh network. From among the one or more data routing configurations specified by the network topology data, a particular data routing configuration is identified that is associated with the original node device that has been removed from the mesh network. Data that specifies the particular data routing configuration that is associated with the original node device that has been removed from the mesh network is provided to the replacement node device.
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
H04L 41/12 - Discovery or management of network topologies
Systems and techniques are described for cataloging objects in a property using a drone. In some implementations, a system monitors a property that includes a drone configured to survey the property. A control unit accesses data identifying items and provides instructions to the drone to locate the items. The control unit receives data identifying a location of a portion of the items, image data associated with each identified items, and data indicating remaining items not located. In response, the data identifying the remaining items and data indicating that the drone did not locate the remaining portion of the items are transmitted to a client device. The control unit receives data indicating a location within the property of a first group of the remaining portion of the items and data indicating that a second group of the remaining portion of the items are not located within the property.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a power sequencing technique implemented using circuitry for powering a chime that outputs audio in response to a trigger event. An integrated circuit of a video doorbell receives a first power signal from a source and generates a half-wave pulse for a power sharing sequence of the circuit, based on the first power signal. The generated half-wave pulse is interrupted and the circuit generates a second power signal that causes the chime to initiate outputting the audio. The second power signal corresponds to the first power signal and is generated in response to interrupting the half-wave pulse. The circuit resumes generating the half-wave pulse to power the chime using the power sharing sequence after causing the chime to initiate outputting the audio using the second power signal.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a power sequencing technique.
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
G10K 1/062 - Devices in which sound is produced by striking a resonating body, e.g. bells, chimes or gongs the resonating device having the shape of a bell, plate, rod, or tube electrically operated
H04M 11/02 - Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
G10K 1/06 - Devices in which sound is produced by striking a resonating body, e.g. bells, chimes or gongs the resonating device having the shape of a bell, plate, rod, or tube
G10K 1/063 - Devices in which sound is produced by striking a resonating body, e.g. bells, chimes or gongs the resonating device having the shape of a bell, plate, rod, or tube electrically operated the sounding member being a bell
G10K 1/064 - Operating or striking mechanisms therefor
41.
SIMULTANEOUS PLAYBACK OF CONTINUOUS VIDEO RECORDINGS FROM MULTIPLE RECORDING DEVICES
Methods and systems, including computer programs encoded on a computer storage medium, are disclosed for simultaneous playback of continuous video recordings from multiple recording devices. A system obtains respective video data generated by multiple recording devices. Each video data includes multiple image frames. For each recording device: based on a time value, the system identifies events captured in the video data generated by the recording device. Based on an input variable corresponding to the events, the system: i) identifies an event stream that coincides with occurrence of a particular event captured in the video data; ii) determines a control value for segmenting image frames of the event stream; and iii) based on the control value, generates a video segment in response to isolating image frames of the event stream coinciding with the particular event. A graphical interface is generated that concurrently outputs each video segment for each recording device.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing a thermostat-based demand response event. In one aspect, a method includes accessing, for sites, historical readings of HVAC activity, indoor temperature, and outdoor temperature and building a model for each of the sites using the historical readings of HVAC activity, indoor temperature, and outdoor temperature. The method also includes using a simulation engine to achieve a target load shed and load reduction shape for a thermostat-based demand response event, and performing the thermostat-based demand response event based on results of the simulation engine.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for monitoring an HVAC system. One of the methods includes receiving pressure data from one or more sensors monitoring a supply air duct of an HVAC system at a property that indicates a pressure in the HVAC system; determining, using the pressure data, that the pressure satisfies a pressure threshold for the HVAC system; and in response to determining that the pressure satisfies the pressure threshold, adjusting an actuator-controlled damper between the supply air duct and a return air duct or adjusting a fan speed of the HVAC system.
F24F 11/49 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring ensuring correct operation, e.g. by trial operation or configuration checks
F24F 11/52 - Indication arrangements, e.g. displays
F24F 11/64 - Electronic processing using pre-stored data
F24F 11/65 - Electronic processing for selecting an operating mode
F24F 11/72 - Control systems characterised by their outputsConstructional details thereof for controlling the supply of treated air, e.g. its pressure
F24F 11/79 - Control systems characterised by their outputsConstructional details thereof for controlling the supply of treated air, e.g. its pressure for controlling the direction of the supplied air
F24F 11/80 - Control systems characterised by their outputsConstructional details thereof for controlling the temperature of the supplied air
F24F 11/81 - Control systems characterised by their outputsConstructional details thereof for controlling the temperature of the supplied air by controlling the air supply to heat-exchangers or bypass channels
F24F 13/00 - Details common to, or for air-conditioning, air-humidification, ventilation or use of air currents for screening
Systems and techniques are described for monitoring energy use habits of consumers. In some implementations, a method includes obtaining temperature data from a monitored property. An energy model of the monitored property is generated based on the obtained temperature data. The current temperature data is obtained from the monitored property. The current temperature data is provided to the generated energy model to generate a duty-cycle for turning an HVAC system of the monitored property off an on during the on-peak hours. The HVAC system of the monitored property is instructed to cycle off and on during the on-peak hours based on the generated duty-cycle.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for an emergency management system. One of the methods includes receiving, for each of a plurality of properties in a geographic region and during an emergency in a first subregion of the geographic region having a first property, sensor data from sensors located at the respective property. The plurality of properties includes the first property and a second property. A risk score is generated for a second geographic region that indicates a likelihood that properties will be impacted by the emergency. In response, the method determines whether the risk score satisfies a score threshold, the method proceeds by determines a safe zone that indicates a physical location at which a risk of injury is reduced and presents a pathway on a map displayed on a user device to the safe zone.
Video monitoring and alarm verification technology, in which a first connection is established between a first device and a camera located in a monitored property associated with a user of the first device and image data captured by the camera is received over the first connection and at the first device. A determination is made to establish a second connection with a second device that enables sharing of the received image data with the second device and, in response to the determination, the second connection is established between the first device and the second device. The received image data is shared with the second device over the second connection and the second device is restricted from directly accessing image data captured by the camera located in the monitored property.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
In some implementations, a system is capable of generating and distributing access credentials to users that access a rental property for a limited time period. Users can be provided with access to the rental property through an application or webpage portal without creating a new user account or user login for the application. For example, a user can be granted access to control electronic devices associated with a monitoring system of a rental property without creating a new user account with the monitoring system. Techniques described herein enable such users to more easily access, for example, rental property information that is associated with a monitoring system of the rental property. In this manner, access credentials can be distributed to users through any suitable means, e.g., through email or SMS, and used to temporarily authenticate users.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing thermal modeling. In one aspect, a method includes receiving monitoring data comprising temperature data measured inside a site, mode data, and state data, receiving weather data descriptive of weather at the site, and aligning the received temperature data, mode data, and state data with the received weather data. The method also includes determining an internal heat gain representing an amount of heat generated at the site irrespective of the heating or cooling system, determining at least one of a thermal product for the site or a thermal potential for the heating or cooling system, generating, based on the internal gain and the thermal product or the thermal potential, a thermal model for the site, and providing, as output, the generated thermal model.
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
G05B 17/02 - Systems involving the use of models or simulators of said systems electric
F24F 11/46 - Improving electric energy efficiency or saving
F24F 11/52 - Indication arrangements, e.g. displays
F24F 11/58 - Remote control using Internet communication
Methods and systems including computer programs encoded on a computer storage medium, for receiving, for a multi-tenant dwelling unit (MDU), a map of the MDU, where the map includes locations corresponding to multiple sensors at the MDU and defines multiple sub-areas of the MDU, receiving sensor data from one or more sensors of the plurality of sensors, where the sensor data is indicative of a fire event at the MDU, determining, from the sensor data, one or more sub-areas of the multiple sub-areas included in the fire event, generating, based on the sensor data, a targeted fire event response for the one or more sub-areas of the multiple sub-areas of the MDU, and providing, to the one or more sub-areas of the multiple sub-areas, the targeted fire event response.
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 17/10 - Actuation by presence of smoke or gases
G08B 17/12 - Actuation by presence of radiation or particles, e.g. of infrared radiation or of ions
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 29/18 - Prevention or correction of operating errors
G08B 31/00 - Predictive alarm systems characterised by extrapolation or other computation using updated historic data
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for enhanced property access with video analytics. In some implementations, images of a first area captured by a camera are obtained. A number of persons in the first area is determined from the images. Data indicating one or more unique identifications is received. A number of persons who are authorized to access a second area are determined. Access is provided to the second area.
G07C 9/15 - Movable barriers with registering means with arrangements to prevent the passage of more than one individual at a time
G06T 7/70 - Determining position or orientation of objects or cameras
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G07C 9/24 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a handwritten signature
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing load reduction optimization. In one aspect, a method includes accessing load reduction parameters for a load reduction event, accessing energy consumption models for multiple systems involved in the load reduction event, and performing, based on the load reduction parameters and the energy consumption models, a plurality of simulations of load reduction events that simulate variations in control parameters used to control the multiple systems. The method also includes optimizing, against a load reduction curve, the load reduction event by iteratively modifying the control parameters used in the plurality of simulations of load reduction events, and outputting the optimal load reduction event with optimized control parameters.
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
F24F 11/46 - Improving electric energy efficiency or saving
F24F 11/58 - Remote control using Internet communication
F24F 11/64 - Electronic processing using pre-stored data
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing temporary use of on-line non-downloadable software featuring a simulator tool and offered to service providers for the calculation of the cumulative value of their customer account portfolio based on expected remaining lifetime
53.
DRONE WIRELESS COMMUNICATION DIAGNOSIS AND CORRECTION
Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to identify a wireless network problem and initiate performance of one or more operations or actions that address the wireless network problem, the drone comprising a processor and a storage device, the storage device storing instructions that, when executed by the processor, cause the processor to perform operations comprising receiving, by the drone, an instruction to analyze a wireless network of a property, responsive to the instruction to analyze the wireless network, traveling, by the drone, to one or more zones of the property, determining, by the drone and based on an analysis of one or more characteristics of the wireless network, that a wireless network problem exists, and based on the determination that the wireless network problem exists, performing, by the drone, one or more operations directed to addressing the wireless network problem.
H04W 24/04 - Arrangements for maintaining operational condition
B64U 101/21 - UAVs specially adapted for particular uses or applications for use as communications relays, e.g. high altitude platforms for providing Internet access
A monitoring system is disclosed. The monitoring system includes a monitoring server that is configured to receive a personally identifying code from a visitor to a property monitored by the monitoring system. The monitoring system includes one or more sensors that transmit sensor data to the monitoring server and that are configured to capture a biometric identifier from the visitor to the property monitored by the monitoring system. The monitoring system is configured to compare the received personally identifying code to a stored personally identifying code. The monitoring system is configured to compare the received biometric identifier to a stored biometric identifier. The monitoring system is configured to determine a likelihood that the visitor is the known person. The monitoring system is configured to determine that the likelihood that the visitor is the known person does not satisfy a threshold. The monitoring system is configured to generate an alarm condition.
Landing pads for a drone. One of the landing pads can include a landing area with a first surface configured to receive a second surface of a landing gear of a drone; a docking area i) with a first end adjacent to the landing area and a second opposite end and ii) a docking surface configured to contact the second surface of the landing gear of the drone; a fixed member i) with a third surface adjacent to the second end of the docking area and ii) configured to contact an end of the landing gear of the drone; a moveable member configured to i) move the landing gear across the first surface of the landing area onto the docking surface and ii) secure the landing gear of the drone in place between the docking surface of the docking area and the third surface of the fixed member.
Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to pre-surveil a portion of a property. In one aspect, a system may include a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include obtaining data that is indicative of one or more acts of an occupant of the property, applying the obtained data that is indicative of one or more acts of the occupant of the property to a pre-surveillance rule, determining that the pre-surveillance rule is satisfied, determining a drone navigation path that is associated with the pre-surveillance rule, transmitting, to a drone, an instruction to perform pre-surveillance of the portion of the one or more properties using the drone navigation path.
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
B64U 10/14 - Flying platforms with four distinct rotor axes, e.g. quadcopters
B64U 80/25 - Transport or storage specially adapted for UAVs with arrangements for servicing the UAV for recharging batteriesTransport or storage specially adapted for UAVs with arrangements for servicing the UAV for refuelling
B64U 101/31 - UAVs specially adapted for particular uses or applications for imaging, photography or videography for surveillance
G06V 10/147 - Details of sensors, e.g. sensor lenses
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for selecting a video quality. One of the methods includes: determining, for a repeating time range of a video with a first video quality, a frequency with which one or more portions of the video were accessed, each portion for a corresponding one of one or more past instances of the repeating time range; selecting, for the repeating time range and using the frequency with which the portion of the video for the repeating time range was accessed, a second video quality from two or more video qualities that includes the first video quality; and storing, in memory, one or more additional portions of the video i) captured by a camera during future instances of the repeating time range ii) at the second video quality.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
Techniques are described for configuring a monitoring system to assist users during a detected emergency condition at a property. In some implementations, sensor data from one or more sensors that are located at the property are obtained by a monitoring system that is configured to monitor the property. A determination that there is an emergency condition at the property is made by the monitoring system based on the sensor data, determining. A location of a person inside the property is determined by the monitoring system based on the sensor data. A first path to the person and a second path to guide the person away from the emergency condition are determined by the monitoring system. The first path to the person and the second path to guide the person away from the emergency condition are navigated by a computing device of the monitoring system.
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
Various embodiments described herein provide for analysis of a video using a scanning technique. According to some embodiments, a video is analyzed by scanning a region of interest in a series of frames of the video, and generating a composite image based on the pixels captured by the scanning operation.
G06V 10/22 - Image preprocessing by selection of a specific region containing or referencing a patternLocating or processing of specific regions to guide the detection or recognition
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for lighting adaptive navigation. In some implementations, a method includes receiving map data associated with a property; obtaining sensor data; based on the map data and the sensor data, determining a lighting scenario; and based on the lighting scenario, configuring the robotic device.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for multi-person authentication and access control. One of the methods includes determining, by a system and using sensor data i) captured by one or more sensors and ii) that is different data than input data captured by one or more input devices, whether a number of people, who performed corresponding input actions, satisfies an access criteria a) for accessing a critical function and b) that requires two or more predetermined input actions; and performing, by the system, an action for the critical function in response to determining whether the number of people, who performed corresponding input actions, satisfies the access criteria a) for accessing the critical function and b) that requires the two or more predetermined input actions.
Methods, systems, and apparatus, including computer programs encoded on a storage device, are disclosed. A system performs operations including receiving sensor data from a sensor of a property monitored by a monitoring system, and based on the sensor data, determining a first event and a second event that have occurred at the property. The operations include determining that the monitoring system is not able to communicate with an outside network, and classifying the first event as a high priority event and the second event as a low priority event. The operations include determining that a mobile device is able to receive data from the monitoring system; and providing, to the mobile device, data indicating the first event and an instruction to transmit the data indicating the first event to a server upon the mobile device being able to communicate with the outside network.
09 - Scientific and electric apparatus and instruments
Goods & Services
Security deterrent devices for personal security and home security triggered by an alarm monitoring system or remote panic button, which emits a non-toxic fog that hinders or eliminates the line of sight or visibility of intruders
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for mesh network connection quality testing. In some implementations, a method for mesh network connection quality testing includes transmitting, by a control unit of a monitoring system that is configured to monitor a property, test data to a first connected component of the monitoring system; in response to transmitting the test data, receiving, by the control unit, response data from the first connected component of the monitoring system; based on the response data, determining, by the control unit, a link quality indicator that reflects a strength of a connection between the control unit and the first connected component; and based on the link quality indicator, adjusting, by the control unit, one or more settings of the connection between the control unit and the first connected component.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for receiving a request to deploy an aerial drone to assist an emergency vehicle from a first location to a second location; determining a route to be traversed by the emergency vehicle from the first location to the second location based on the request; and deploying the aerial drone to traverse the route in advance of the emergency vehicle.
Methods, systems, and apparatus, including computer programs encoded on a storage device, for triggering an alarm during a sensor jamming attack. In one aspect, a monitoring system sensor unit is disclosed that includes a sensor, a communication unit configured to communicate with a monitoring system using a range of frequencies, and a jamming detection unit. The jamming detection unit may include a processor and a computer storage media storing instructions that, when executed by the processor, cause the processor to perform operations. The operations include detecting a sensor jamming event, selecting a different form of communication other than the range of radio frequencies for the communication unit to communicate with the monitoring system, and providing, to the communication unit, an instruction to communicate with the monitoring system using the form of communication, wherein the communication unit may communicate, to the monitoring system using the form of communication, the sensor data.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
A circuit is described for powering a chime that outputs audio in response to detection of an entity by a video doorbell. The circuit includes a power source for generating a first signal. A first switch is coupled to the power source. The first switch is configured to provide, in response to the first signal, a first direct-current (DC) voltage signal during a first operating mode where the video doorbell receives an input that triggers actuation of the chime in response to detection of the entity. A second switch is coupled to the power source and the first switch. The second switch is configured to provide, in response to the first signal, a second DC voltage signal during a second operating mode where the chime outputs the audio in response to the input that triggers actuation of the chime in response to detection of the entity.
H02M 1/14 - Arrangements for reducing ripples from DC input or output
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
H02M 7/219 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only in a bridge configuration
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for visual authentication. In some implementations, a method may include obtaining images of a person at a property; detecting a discontinuity in an appearance of the person in the images of the person at the property; determining that the discontinuity does not correspond to a known occlusion; and providing an indication of a potential spoofing attack.
G06V 40/40 - Spoof detection, e.g. liveness detection
G06V 10/40 - Extraction of image or video features
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
A monitoring system is configured to monitor a property. The monitoring system includes a camera, a sensor, and a monitor control unit. The monitor control unit is configured to receive image data and sensor data. The monitor control unit is configured to determine that the image data includes a representation of a person. The monitor control unit is configured to determine an orientation of a representation of a head of the person. The monitor control unit is configured to determine that the representation of the head of the person likely includes a representation of a face of the person. The monitor control unit is configured to determine that the face of the person is likely concealed. The monitor control unit is configured to determine a malicious intent score that reflects a likelihood that the person has a malicious intent. The monitor control unit is configured to perform an action.
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating verbal message. One of the methods includes: receiving sensor data indicating attributes of a person at a physical property; determining, using the sensor data, that a likelihood that a conversation should be initiated with the person satisfies a first likelihood threshold; determining, using first data from the sensor data, a deterrence strategy with a second likelihood threshold of causing the person to leave the physical property; generating, using second data from the sensor data and the deterrence strategy, a verbal message that is a) for the person and b) has the second likelihood threshold; and providing, to a presentation device, a command to cause the presentation device to present the verbal message.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
Health and wellness management technology, in which events that relate to activity within the monitored property are sensed based on output from sensors located at a monitored property. Behaviors are detected based on the sensed events that relate to activity within the monitored property and, in accordance with the detected behaviors, one or more models are created based on a likelihood of similarly expressed events happening at similar times with similar characteristics. Additional behaviors detected after creation of the one or more models are evaluated against the one or more models to determine whether the additional behaviors are consistent with the one or more models. At least one action is performed based on the determination of whether the additional behaviors are consistent with the one or more models.
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
G06F 17/18 - Complex mathematical operations for evaluating statistical data
G16H 50/50 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for simulation or modelling of medical disorders
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating verbal message. One of the methods includes: receiving sensor data indicating attributes of a person at a physical property; determining, using the sensor data, that a likelihood that a conversation should be initiated with the person satisfies a first likelihood threshold; determining, using first data from the sensor data, a deterrence strategy with a second likelihood threshold of causing the person to leave the physical property; generating, using second data from the sensor data and the deterrence strategy, a verbal message that is a) for the person and b) has the second likelihood threshold; and providing, to a presentation device, a command to cause the presentation device to present the verbal message.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for implementing a smart firearm safety device. The safety device attaches to a firearm having a trigger and a slot for receiving a magazine. The safety device includes a locking mechanism that attaches to the trigger to preclude depressing a trigger of the firearm and a sensor that determines an orientation of the firearm or a relative motion of the firearm to indicate detected movement of the firearm. The safety device also includes a radio device that receives parameter signals from the sensor indicating movement of the firearm. The radio device communicates with a component of a property monitoring system to receive a command to engage the locking mechanism to preclude depressing the trigger of the firearm based on parameter signals indicating a particular type of detected movement of the firearm.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Anti-intrusion alarms; Alarm monitoring systems; Home and office automation systems comprising wireless and wired controllers, control devices, and downloadable software for safety, lighting and shades, HVAC, security, video surveillance, energy management, doors and gates, electrical power, appliances, motion detection, leak and flood detection, and smoke and carbon monoxide monitoring and control applications; Security control panels and motion detectors; Video cameras; Camera hardware systems for IP (Internet protocol) video surveillance; Motion sensors and monitoring equipment, namely, video monitors and video cameras for monitoring the interior and exterior of homes, retail stores, offices and other structures for security and surveillance; Electronic magnetic sensors for doors and gates; Computer hardware for the monitoring and management of electronic and magnetic door and gate sensors; Thermostats; Climate control systems consisting of digital thermostats, air conditioning, heating, ventilation and drying control devices; Downloadable software in the nature of a mobile application for use connecting, operating, integrating, controlling, and managing networked consumer electronic devices; Downloadable software in the nature of a mobile application for monitoring, operating, and automating home, office and environmental control systems Software-as-a-service (SAAS) services featuring computer software for use with connecting, operating, integrating, controlling, and managing networked consumer electronic devices; Software-as-a-service (SAAS) services featuring computer software for monitoring, operating, and automating home, office and environmental control systems Electronic monitoring services, namely, monitoring of home and office security systems and automation systems for protecting residential and commercial properties; security services for residential and commercial properties, namely, security monitoring services for protecting physical properties provided via remote monitoring systems; providing a website featuring information about physical safety, home security, and crime prevention
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for or regaining connectivity between devices. One of the methods includes: determining, using network radio data from a network radio for a device that was connected to another device using the network radio, that the device is disconnected from the other device; in response to determining that the device is disconnected from the other device using the network radio, determining configuration data i) for the device ii) that indicates changes to data on the device to cause the device to increase a likelihood of regaining connectivity with the other device using the network radio; and using the configuration data to cause the device to change the data on the device to increase the likelihood of regaining connectivity with the other device using the network radio.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for or regaining connectivity between devices. One of the methods includes: determining, using network radio data from a network radio for a device that was connected to another device using the network radio, that the device is disconnected from the other device; in response to determining that the device is disconnected from the other device using the network radio, determining configuration data i) for the device ii) that indicates changes to data on the device to cause the device to increase a likelihood of regaining connectivity with the other device using the network radio; and using the configuration data to cause the device to change the data on the device to increase the likelihood of regaining connectivity with the other device using the network radio.
Techniques are described for providing remote device (e.g., thermostat, lighting, appliance, etc.) control and/or energy monitoring. A system monitors sensor data captured by one or more sensors that sense attributes relevant to user presence at one or more monitored properties and status of one or more energy consuming devices associated with the one or more monitored properties. The system analyzes the monitored sensor data and the monitored device status with respect to a set of one or more rules and performs an operation related to controlling the one or more energy consuming devices based on the analysis of the monitored sensor data and the monitored device status with respect to the set of one or more rules.
A monitoring system is configured to monitor a property. The system includes a sensor that is configured to generate sensor data that reflects an attribute of the property. The system further includes an HVAC system that is configured to generate and provide conditioned air to the property and that is configured to generate HVAC system data that reflects an attribute of the HVAC system. The system includes a monitor control unit that is configured to determine that the HVAC system is likely malfunctioning. The control unit is configured to receive the sensor data. The control unit is configured to determine that the HVAC system is likely operating correctly. The control unit is configured to determine a cause of the HVAC system transitioning from likely malfunctioning to likely operating correctly. The control unit is configured to update a model that is configured to identify causes of HVAC system malfunctions.
An aberration engine that collects data sensed by a monitoring system that monitors a property of a user and aggregates the collected data over a period of a time. The aberration engine detects, within the aggregated data, patterns of recurring events and, based on detecting the patterns of recurring events within the aggregated data, takes action related to the monitoring system based on the detected patterns of recurring events within the aggregated data.
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 31/00 - Predictive alarm systems characterised by extrapolation or other computation using updated historic data
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
Rental property management technology, in which reservation data is accessed on a rental property management server, and a request from a mobile device for an upcoming reservation at a property is detected. In response to detecting the request, the rental property management server confirms the upcoming reservation based on the accessed reservation data. In response to confirming the upcoming reservation, the reservation management server generates a unique access code. The rental property management server transmits the unique access code to the mobile device and to a monitoring system on the property. The rental property management server also transmits data to the monitoring system indicating that the unique access code grants access to the property.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for implementing an unmanned aerial vehicle or drone with ducted fans. The drone includes a housing having a first surface and multiple ducts that each extend from the first surface to a second surface of the housing. The first surface is substantially flat. A respective fan assembly is installed in each of the ducts. The drone includes an internal cavity at a location intermediate two respective ducts and circuitry positioned in the internal cavity. The circuitry is operable to generate control signals used to operate the respective fan assemblies.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for performing privacy-aware surveillance with a security camera drone. The drone obtains image data using an imaging device and processes the image data to detect an object external to the drone. In response to processing the image data, the drone determines multiple viewing angles indicated in the image data with respect to the object. Based on the image data and the multiple viewing angles, a first section of the area for surveillance and a second, different section of the area to be excluded from surveillance are identified. The drone determines an adjustment to at least one of the multiple viewing angles to cause the second section to be excluded from surveillance. Based on the adjustment, the drone controls the imaging device to exclude the second section from surveillance imagery obtained by the drone.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for sensor timing correlation. One of the methods includes obtaining (i) first sensor data from a first sensor and (ii) second sensor data from a second sensor; detecting a representation of an object in both the first sensor data and the second sensor data; determining a predicted physical distance between a first representation of the object in the first sensor data and a second representation of the object in the second sensor data; determining a timing offset between the different sensors using the predicted physical distance between the first representation of the object and the second representation of the object; and adjusting, using the timing offset, subsequent data from the first sensor or the second sensor.
Techniques are described for presenting events detected by a monitoring system. A system receives a selection of a particular time period, identifies security events detected by a monitoring system during the selected time period, and classifies a subset of the identified security events as abnormal events. The system further generates a density of the identified security events over the selected time period, generates a density of the subset of the identified security events classified as abnormal events, and identifies monitoring system data associated with the selected time period. The system additionally generates a graphical representation of the density of the identified security events, the density of the subset of the identified security events classified as abnormal events, and the identified monitoring system data, and provides the graphical representation for display.
G06T 11/20 - Drawing from basic elements, e.g. lines or circles
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 5/22 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G06F 3/048 - Interaction techniques based on graphical user interfaces [GUI]
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one aspect, a system includes a virtual reality headset, a plurality of cameras, a plurality of sensors that includes a first sensor, a control unit, wherein the control unit includes a network interface, a processor, a storage device that includes instructions to perform operations that comprise receiving data from the first sensor that is indicative of an alarm event, determining a location of the first sensor, identifying a set of one or more cameras from the plurality of cameras that are associated with the first sensor, selecting a particular camera from the identified set of one or more cameras; and transmitting one or more instructions to the particular camera that command the particular camera to stream a live video feed to a user interface of the virtual reality headset.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G02B 27/00 - Optical systems or apparatus not provided for by any of the groups ,
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06T 19/00 - Manipulating 3D models or images for computer graphics
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
Methods, systems, and apparatus, including computer programs encoded on a non-transitory computer storage medium, for receiving user-defined routes, each user-defined route including a tripwire of multiple tripwires and a direction, where each user-defined route includes an action of multiple actions executed by a sub-system of a home monitoring system, detecting a first signal at a first tripwire including a first direction, determining a set of user-defined routes including the first tripwire and the first direction, detecting a second signal at a second tripwire including a second direction, determining a particular user-defined route of the set of user-defined routes including the first tripwire and the first direction and the second tripwire and the second direction, determining an action executed by a sub-system of the home monitoring system for the particular user-defined route traversed by a user, and triggering execution of the action based on the second signal at the second tripwire.
A smart bar lock that includes a pole with a length that corresponds to a length of an area that a sliding portion of a sliding door slides along, a motorized hinge coupled to an end of the pole, where the motorized hinge is configured to rotate to the pole by the end of the pole, and a processor. The processor is configured to perform operations of determining to lock the sliding door, moving the pole from a vertical position into a horizontal position with the motorized hinge, determining to unlock the sliding door while leaving the sliding door closed, and moving the pole into the vertical position with the motorized hinge.
B60J 5/06 - Doors arranged at the vehicle sides slidableDoors arranged at the vehicle sides foldable
E04H 12/18 - TowersMasts or polesChimney stacksWater-towersMethods of erecting such structures movable or with movable sections, e.g. rotatable or telescopic
E05B 65/08 - Locks for special use for sliding wings
E05C 19/00 - Other devices specially designed for securing wings
G07C 9/00 - Individual registration on entry or exit
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for property communication and access control. In some implementations, a corresponding method includes receiving a data sequence input from a property related to an event at the property; comparing the data sequence input to one or more sequence templates to determine a matching sequence template; based on the matching sequence template, determining one or more relevant actions to be performed; performing the one or more relevant actions using the data sequence input; and providing feedback related to the event or the one or more relevant actions.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing load reduction optimization. In one aspect, a method includes accessing load reduction parameters for a load reduction event, accessing energy consumption models for multiple systems involved in the load reduction event, and performing, based on the load reduction parameters and the energy consumption models, a plurality of simulations of load reduction events that simulate variations in control parameters used to control the multiple systems. The method also includes optimizing, against a load reduction curve, the load reduction event by iteratively modifying the control parameters used in the plurality of simulations of load reduction events, and outputting the optimal load reduction event with optimized control parameters.
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
F24F 11/64 - Electronic processing using pre-stored data
F24F 11/58 - Remote control using Internet communication
A monitoring system that is configured to monitor a property is disclosed. The monitoring system includes a sensor that is configured to generate sensor data that reflects an attribute of the property; a solar panel that is configured to generate and output power; and a monitor control unit. The monitor control unit is configured to: monitor the power outputted by the solar panel; determine that the power outputted by the solar panel has deviated from an expected power range; based on determining that the power outputted by the solar panel has deviated from the expected power range, access the sensor data; based on the power outputted by the solar panel and the sensor data, determine a likely cause of the deviation from the expected power range; and determine an action to perform to remediate the likely cause of the deviation from the expected power range.
H02S 50/00 - Monitoring or testing of PV systems, e.g. load balancing or fault identification
F24S 50/20 - Arrangements for controlling solar heat collectors for tracking
G01R 31/00 - Arrangements for testing electric propertiesArrangements for locating electric faultsArrangements for electrical testing characterised by what is being tested not provided for elsewhere
G01S 3/786 - Systems for determining direction or deviation from predetermined direction using adjustment of orientation of directivity characteristics of a detector or detector system to give a desired condition of signal derived from that detector or detector system the desired condition being maintained automatically
Methods, systems, and apparatus for monitoring humidity at a property are disclosed. A monitoring system performs operations including: obtaining, from multiple humidity sensors within the property, humidity data; obtaining occupancy data that indicates whether people are within the property; determining, based on the humidity data and the occupancy data, that humidity in a first area of the property changed more relative to a change in humidity in a second area of the property during a time period when no person was present in the first area and no person was present in the second area; and in response to determining that humidity in the first area changed more relative to a change in humidity in a second area of the property during the time period, providing an indication of a water leak in the first area of the property to a user.
G01M 3/16 - Investigating fluid tightness of structures by using fluid or vacuum by detecting the presence of fluid at the leakage point using electric detection means
F24H 9/20 - Arrangement or mounting of control or safety devices
G01P 13/00 - Indicating or recording presence or absence of movementIndicating or recording of direction of movement
G01S 19/01 - Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
H04Q 9/00 - Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
Systems and techniques are described for an integrated security environment to monitor activities at a commercial facility and a residential facility. In some implementations, a monitoring system monitors a property that includes one or more sensors located at the property and generate sensor data. A monitor control unit receives and analyzes the sensor data. Based on analyzing the sensor data, the monitor control unit determines that an event has likely occurred at the property and generates data indicating that the event has likely occurred at the property. A monitoring server receives the data indicating the event has likely occurred at the property. Based on the data that the event has likely occurred at the property, transmitting, to an additional monitoring system that is configured to monitor an additional property, instructions for the additional monitoring system to perform an action.
Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 19/00 - Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G07C 9/00 - Individual registration on entry or exit
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for adjusting an indoor humidity at a property. One of the methods includes determining an estimated outdoor temperature in an area around a property; determining, using the estimated outdoor temperature, a target indoor humidity for the property; accessing data about the property; predicting, using the data about the property, whether an indoor humidity of the property will likely change within a threshold time period; determining, using the target indoor humidity and the prediction whether the indoor humidity of the property will likely change within the threshold time period, whether to adjust the indoor humidity of the property; and in response to determining to adjust the indoor humidity of the property, controlling, using the target indoor humidity, humidity equipment at the property to cause an indoor humidity at the property to move toward the target indoor humidity.
Methods, systems, and apparatus for periodic water leak detection are disclosed. A method includes obtaining, using a water meter, water meter data representing the occurrence of water usage events at a property; determining, based on the water meter data, a periodicity of water usage events; determining that the periodicity of water usage events satisfies water leak criteria; and based on determining that the periodicity of water usage events satisfies water leak criteria, determining that a water leak exists at the property. Determining the periodicity of water usage events can include determining an average time between a start of sequential water usage events; and determining that the periodicity of water usage events satisfies water leak criteria can include determining that the average time between the start of sequential water usage events is less than a threshold time between the start of sequential water usage events.
G01M 3/26 - Investigating fluid tightness of structures by using fluid or vacuum by measuring rate of loss or gain of fluid, e.g. by pressure-responsive devices, by flow detectors
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for adjusting an indoor humidity at a property. One of the methods includes determining an estimated outdoor temperature in an area around a property; determining, using the estimated outdoor temperature, a target indoor humidity for the property; accessing data about the property; predicting, using the data about the property, whether an indoor humidity of the property will likely change within a threshold time period; determining, using the target indoor humidity and the prediction whether the indoor humidity of the property will likely change within the threshold time period, whether to adjust the indoor humidity of the property; and in response to determining to adjust the indoor humidity of the property, controlling, using the target indoor humidity, humidity equipment at the property to cause an indoor humidity at the property to move toward the target indoor humidity.
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
A robotic rover that is configured to monitor a property is disclosed. In one aspect, the rover includes a sensor that is configured to generate sensor data. The rover further includes a processor that is configured to analyze the sensor data. The processor is further configured to determine that an unwanted animal is located at the property. The processor is further configured to generate an instruction to navigate the drone towards the unwanted animal. The rover further includes a motor that is configured to navigate the drone towards the unwanted animal in response to the instruction to navigate the drone towards the unwanted animal. The processor is further configured to generate an instruction to activate a device that is configured to encourage the unwanted animal to leave the property.
Methods, systems, and apparatus, including computer programs encoded on a storage device, for a monitoring system that is configured to monitor a property. The monitoring system may include a sensor that is configured to generate sensor data that reflects an attribute of the property, a microphone that is connected to a pipe and that is configured to detect audio data associated with the pipe, and a monitor control unit. The monitor control unit is configured to receive the sensor data and the audio data, provide the sensor data and the audio data as inputs to a model that is trained to determine that a device connected to the pipe is being used, receive, from the model, data indicating that the device connected to the pipe is being used, and based on determining that the device connected to the pipe is being used, perform a monitoring system action.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for performing privacy-aware surveillance with a security camera drone. The drone obtains image data using an imaging device and processes the image data to detect an object external to the drone. In response to processing the image data, the drone determines multiple viewing angles indicated in the image data with respect to the object. Based on the image data and the multiple viewing angles, a first section of the area for surveillance and a second, different section of the area to be excluded from surveillance are identified. The drone determines an adjustment to at least one of the multiple viewing angles to cause the second section to be excluded from surveillance. Based on the adjustment, the drone controls the imaging device to exclude the second section from surveillance imagery obtained by the drone.