Patent classifications
G08B25/008
Method and system for automatically detecting use of an alarm system
A system and method for automatically detecting if a home alarm system is being used and/or actively monitored are disclosed. The system and method use data gathered from one or more sensors, including audio information from microphones. The audio information is analyzed using a machine learning system to determine if the alarm system is being regularly used and monitored. The system and method can also automatically update a policy holder's insurance policy to reflect whether or not an alarm system is being used.
Reducing false alarms in security system
A security system includes a security system controller and a plurality of security sensors that are operably coupled with the security system controller. The security system includes a plurality of configuration settings that define when particular alarms are to be issued by the security system based at least in part on events that are detected by the security sensors. The security system controller receives each of the events detected by the security sensors. The security system controller stores event data that includes an event type, a time value indicating when the event occurred, and an identifier of the security sensor that detected the event. The security system controller analyzes the stored event data to identify and output one or more changes to one or more of the plurality of configuration settings in order to reduce false alarms issued by a security system.
AUTOMATED BULK LOCATION-BASED ACTIONS
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for automating bulk location-based actions in response to disaster events. A system obtains data defining zones related to different geographic locations and configures a set of preferences for each zone. One of the preferences is a command for responding to an event. The system detects a disaster event and determines that a location affected by the event is related to a zone defined at the system. The system obtains sensor data generated by a sensor in the zone that is connected to a monitoring system for the zone. The system generates an alert based on the sensor data and the command and provides the alert to a client device of an entity that manages properties in the zone. The alert provides an assessment of how the disaster event affects items at properties in the zone.
Security Device with Activation Backing
A security device includes a plunger switch with a plunger that moves to extend through an aperture in the housing and a removable protective backing coupled to an adhesive pad that initially maintains the plunger in the depressed position and the security device in an inventory state. In the inventory state, processing circuitry of the security device is configured to take no action in response to a deactivator sensor detecting a deactivator sign. The processing circuitry being configured to control operation of a sounder based on a current state of the processing circuitry and signaling from the plunger switch.
SMART SECURITY BARRIER SENSOR
A system, method and apparatus for monitoring a barrier. The barrier sensor refrains from transmitting an alarm signal to a receiver when the barrier sensor determines that the barrier has been placed into an open position and that a human being is inside the premises in proximity to the human detection device. Further, the barrier sensor transmits an alarm signal to a receiver when the barrier sensor determines that the barrier has been moved from the open position and that a human being is not inside the premises in proximity to the barrier.
Premises management configuration and control
Disclosed are methods, systems, and devices for management of a premises. The premises may comprise one or more devices, such as a gateway device, a control device, or a premises device. A computing device, such as a server external to the premises, may receive data indicative of the premises device. The computing device may determine to update a configuration of one or more devices at the premises, such as the gateway device or the control device. Configuration data may be sent to the gateway device to update the configuration.
Systems, methods, and devices for activity monitoring via a home assistant
The various implementations described herein include methods, devices, and systems for monitoring activity in a home environment. In one aspect, a method performed at a voice-assistant device includes: while operating in an assistant mode, receiving an occupant command to operate in a monitoring mode; in response to the command, transitioning to operating in the monitoring mode; while operating in the monitoring mode, detecting a sound; obtaining a determination as to whether the sound meets one or more monitoring criteria; and in accordance with a determination that the sound meets the one or more monitoring criteria, generating an alert or notification.
Security monitoring and control
Systems, methods, and software for monitoring and controlling a security system for a structure are provided herein. An exemplary method may include receiving sensor data from at least one first peripheral, the sensor data associated with at least one of activity inside and activity outside of a structure; determining a critical event based in part on the sensor data; creating an alert based in part on the critical event; getting user preferences associated with at least one of a user and a base unit; determining a response based in part on the alert and user preferences; and activating at least one of a second peripheral and a service based in part on the response.
REDUCING FALSE ALARMS IN SECURITY SYSTEM
A security system includes a security system controller and a plurality of security sensors that are operably coupled with the security system controller. The security system includes a plurality of configuration settings that define when particular alarms are to be issued by the security system based at least in part on events that are detected by the security sensors. The security system controller receives each of the events detected by the security sensors. The security system controller stores event data that includes an event type, a time value indicating when the event occurred, and an identifier of the security sensor that detected the event. The security system controller analyzes the stored event data to identify and output one or more changes to one or more of the plurality of configuration settings in order to reduce false alarms issued by a security system.
SYSTEMS, METHODS, AND DEVICES FOR ACTIVITY MONITORING VIA A HOME ASSISTANT
The various implementations described herein include methods, devices, and systems for monitoring activity in a home environment. In one aspect, a method performed at a voice-assistant device includes: transitioning to operating in a second mode from a first mode; while operating in the second mode, detecting a sound; obtaining a determination as to whether the sound meets one or more monitoring criteria; and in accordance with a determination that the sound meets the one or more monitoring criteria, generating an alert or notification.