G08B19/00

DIGITAL VIDEO ALARM ANALYTICS COMPUTER SYSTEM
20220335816 · 2022-10-20 ·

A digital video alarm analytics computer system includes a digital video analytics server including a digital video analytics computer having non-transitory memory storing machine instructions that are executed by the digital video analytics computer. The machine instructions when executed by the computer implement the following functions: receiving a digital video clip associated with a region of interest; motion analyzing the digital video clip to detect a motion location of a motion within the region of interest; object analyzing the digital video clip to detect an object, an object type of the object and an object location of the object within the digital video clip in response to detecting the motion location within the region of interest; and transmitting an alarm event signal to an alarm server in response to determining the object type is associated with an alarm analytics tag and the object location intersecting the region of interest.

DIGITAL VIDEO ALARM LOITERING MONITORING COMPUTER SYSTEM
20220335806 · 2022-10-20 ·

A digital video alarm loitering monitoring system. The system includes a digital video analytics server including a digital video analytics computer having non-transitory memory configured to store machine instructions that are to be executed by the computer. The machine instructions when executed by the computer implement the following functions: obtaining a digital video snapshot from a digital video stream in response to detecting a loitering event indicator based on a potential loitering object; object analyzing the digital video snapshot to detect a detected object, a detected object type and a detected object location within the digital video snapshot; determining an active monitoring loitering object in response to the potential loitering object and the detected object; and repeating the obtaining, object analyzing and determining functions to determine a loitering condition.

DIGITAL VIDEO ALARM SITUATIONAL MONITORING COMPUTER SYSTEM
20220335813 · 2022-10-20 ·

A digital video alarm situational monitoring computer system includes an alarm monitoring computer having non-transitory memory configured to store machine instructions that are to be executed by the computer. The machine instructions when executed by the computer implement the following functions: receiving a first digital video clip associated with a first digital video alarm event and a second digital video associated with a second digital video alarm event; displaying a first icon of the first digital video alarm event and a second icon of the second digital video alarm event on a graphical user interface; and simultaneously playing the first digital video clip and the second digital video clip on the graphical user interface.

Management of a security system at a premises

A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.

DOORBELL COMMUNICATION SYSTEMS AND METHODS
20220319285 · 2022-10-06 ·

A method of operating a doorbell system can include receiving, by a remote computing device, a notification of an emergency event and in response to the receiving, illuminating at least one light of a doorbell to indicate an occurrence of the emergency event. The method can further include, in response to receiving the notification, initiating a communication with an emergency dispatcher and/or an emergency contact. The at least one light can illuminate in a variety of colors and illumination patterns corresponding to the type of emergency event.

Gunshot detection system with master slave timing architecture

A gunshot detection system synchronizes timing information across gunshot sensor units and/or a control panel. The gunshot sensor units exchange timing information with each other and/or with the control panel, which is then used by the gunshot sensor units to generate the event data for detected gunshot events. In one embodiment, the gunshot sensor units are configured as master and slave nodes. The master node periodically distributes a master time reference to the slave nodes, and the slave nodes calibrate local times based on the master time reference. The slave nodes can detect whether the current master node has become non-functional (e.g. based on a time elapsed since the most recently sent master time reference) and configure a new master node based on exchanging predetermined priority information for the slave nodes.

Gunshot detection system with master slave timing architecture

A gunshot detection system synchronizes timing information across gunshot sensor units and/or a control panel. The gunshot sensor units exchange timing information with each other and/or with the control panel, which is then used by the gunshot sensor units to generate the event data for detected gunshot events. In one embodiment, the gunshot sensor units are configured as master and slave nodes. The master node periodically distributes a master time reference to the slave nodes, and the slave nodes calibrate local times based on the master time reference. The slave nodes can detect whether the current master node has become non-functional (e.g. based on a time elapsed since the most recently sent master time reference) and configure a new master node based on exchanging predetermined priority information for the slave nodes.

Doorbell communities

Doorbells can send data to each other to enable a first doorbell user to warn a second doorbell user regarding a suspicious visitor. A first user can indicate a first trait of a visitor via a first remote computing device. The first user can create a user group to enable the members of the user group to use their doorbells to take pictures of suspicious visitors and to send the pictures of the suspicious visitors to other members of the user group.

Doorbell communication systems and methods

The disclosure includes a doorbell having a visitor detection system that can comprise at least one of a camera, a microphone, and a motion detector. The method for using the doorbell can comprise recording, via the camera, video data that represents a video. The method can also comprise recording, via the microphone, audio data that represents audio. The method of using the doorbell can comprise transmitting at least a portion of the video data and at least a portion of the audio data, to a remote computing device that is communicatively coupled to the doorbell. The method can also comprise transmitting the video data and the audio data to a remote server that is communicatively coupled to the doorbell.

Doorbell communication systems and methods

The disclosure includes a doorbell having a visitor detection system that can comprise at least one of a camera, a microphone, and a motion detector. The method for using the doorbell can comprise recording, via the camera, video data that represents a video. The method can also comprise recording, via the microphone, audio data that represents audio. The method of using the doorbell can comprise transmitting at least a portion of the video data and at least a portion of the audio data, to a remote computing device that is communicatively coupled to the doorbell. The method can also comprise transmitting the video data and the audio data to a remote server that is communicatively coupled to the doorbell.