Patent classifications
G08B15/00
Doorbell communication systems and methods
The disclosure includes a doorbell having a visitor detection system that can comprise at least one of a camera, a microphone, and a motion detector. The method for using the doorbell can comprise recording, via the camera, video data that represents a video. The method can also comprise recording, via the microphone, audio data that represents audio. The method of using the doorbell can comprise transmitting at least a portion of the video data and at least a portion of the audio data, to a remote computing device that is communicatively coupled to the doorbell. The method can also comprise transmitting the video data and the audio data to a remote server that is communicatively coupled to the doorbell.
System and method for deterring theft of package, and device therefor
A system, method, and a package tracking device for tracking the movement of a package to prevent theft of the package are described. According to an embodiment, a package tracking device adapted to be attached with a package is described. The package tracking device having a unique device identification number allows a user, through an application interface running of a wireless communication device, to associate a geographical boundary (geo-fencing) with the delivery address of the package. The package tracking device operates in a passive tracking mode when the package is within the defined geographical boundary, generates a first signal when the package is moved from a drop location, generates a second signal when the package is moved out from the geofencing associated with the delivery address and operates in active tracking mode when the package is moved out from the geofencing associated with the delivery address.
DOORBELL COMMUNICATION SYSTEMS AND METHODS
Doorbell systems can include a speaker and a visitor detection system that includes at least one of a button, a camera, and a motion detector. Doorbell systems can be configured to detect an identity of a visitor via facial recognition, initiate a communication session with a remote computing device, and send the identity to the remote computing device via the first communication session.
System and apparatus for biometric identification of a unique user and authorization of the unique user
A verification device provides an approach to identification and authorization by requiring an authorized biometric presence before permitting the input of a sequence of signals. Furthermore, the device may be configured to recognize incorrect inputs, and to respond by transmitting an alert code while providing limited functionality to convince an unauthorized user that access has been granted until a location of the device has been determined.
System and apparatus for biometric identification of a unique user and authorization of the unique user
A verification device provides an approach to identification and authorization by requiring an authorized biometric presence before permitting the input of a sequence of signals. Furthermore, the device may be configured to recognize incorrect inputs, and to respond by transmitting an alert code while providing limited functionality to convince an unauthorized user that access has been granted until a location of the device has been determined.
Home Security System
A home security system includes a home security system that may be positioned in a home. Thus, the home security system may detect an intruder. The home security system selectively generates an alarm sequence. An alarm unit is provided and the alarm unit may be positioned in the home. The alarm unit is electrically coupled to the home security system and the alarm unit includes an array of speakers. Each of the speakers is positioned adjacent to an associated one of the motion sensors. Each of the speakers selectively emits an audible alarm when the home security system generates the alarm sequence. Each of the speakers selectively emits the audible alarm when the associated motion sensor detects motion. Thus, each of the speakers creates the illusion of the audible alarm following the intruder through the home.
PERSONAL PROTECTION DEVICE
A personal protection device, including a central casing including a battery, a toggle button connected to the battery, and a sealed housing including a coil switchably connected to the battery and a liquid, such that pressing the toggle button connects the battery to the coil to heat the liquid to convert the liquid to a gas until an audible shock wave is generated.
SYSTEM AND METHOD FOR PROVIDING AN EARLY WARNING TO A VICTIM OF DOMESTIC VIOLENCE OR STALKING
An alert system has a first device configured to be secured to a first person, a second device associated with a second person, and a computing system. The computing system is configured to determine when the first device has breached a first geofence associated with the second device and, upon determining the first device has breached the first geofence, alert the first device, the second device, and a third device. The first device is configured to, upon receiving an alert indicating the first geofence has been breached, emit an alert signal on the first device. The second device is configured to, upon receiving an alert indicating the first geofence has been breached, emit an alert signal on the second device.
Video analytics system
A security system can use video analytics and/or other input parameters to identify a theft event. Optionally, the security system can take remedial action in response. For example, the security system can use video analytics to determine that a person has reached into a shelf multiple times at a rate above a threshold, which can indicate that a thief is quickly removing items from the shelf. The security system can also use video analytics to determine that a person has reached into a shelf via a sweeping action, which can indicate that a thief is gathering and removing a large quantity of items from the shelf in one motion. In response, the security system can alert security personnel, cause a speaker to output an audible message in the target area, flag portions of the video relating to the theft event, activate or ready other sensors or systems, and/or the like.
Shading system with artificial intelligence application programming interface
A modular umbrella system, comprises one or more shading elements and a support assembly, coupled to the one or more shading elements, to provide support for the one or more shading elements. The modular umbrella system further comprises a base assembly, coupled to the support assembly, to provide contact with a surface. The base assembly comprises one or more microphones to capture audio commands, one or more processors, one or more memory modules and one or more communication transceivers. Computer-readable instructions stored in the one or more memory modules are executed by a processor to convert the captured audio commands into audio files and communicate the captured audio commands to an external computing device utilizing the one or more communication transceivers. The computer-readable instructions are part of an artificial intelligence application programming interface that communicates with an external artificial intelligence computing device to process the communicated audio file.