Patent classifications
G08B25/009
Mobile device as a security system component
In one implementation, a method for using a mobile computing device as a security system component includes receiving, from a mobile device and by a security system gateway, mobile device sensor information associated with sensor data captured by the mobile device at a premises monitored by the security system gateway; identifying, based on the received sensor information, a mobile device sensor information rule; identifying an action to perform in the mobile device sensor information rule; and automatically performing the identified action, by the security system gateway, in response to receiving the sensor information from the mobile device.
AUTOMATED BULK LOCATION-BASED ACTIONS
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for automating bulk location-based actions in response to disaster events. A system obtains data defining zones related to different geographic locations and configures a set of preferences for each zone. One of the preferences is a command for responding to an event. The system detects a disaster event and determines that a location affected by the event is related to a zone defined at the system. The system obtains sensor data generated by a sensor in the zone that is connected to a monitoring system for the zone. The system generates an alert based on the sensor data and the command and provides the alert to a client device of an entity that manages properties in the zone. The alert provides an assessment of how the disaster event affects items at properties in the zone.
DOORBELL COMMUNICATION SYSTEMS AND METHODS
Doorbells often include a button to enable visitors to ring a chime to summon building occupants. In some embodiments, doorbells include a camera to take pictures of visitors. In several embodiments, doorbells include covers that are light filters. These light filters can cover infrared light sources such as infrared light emitting diodes. The light filters can pass infrared light while blocking visible light. In several embodiments, a front portion of a camera assembly fits through a hole in a light filter. Light filters can help secure camera assemblies and can form a portion of a doorbell's outer housing.
DOORBELL COMMUNICATION SYSTEMS AND METHODS
Doorbell systems can include a doorbell and a remote communication device. In some embodiments, the remote communication device can be communicatively coupled to a wireless network of a building, to the doorbell, and to a remote computing device. In several embodiments, the remote communication device facilitates communication with at least one of the doorbell, the remote computing device, and a remote sensor.
Autonomous robot
A robot in a location interacts with a user. The robot includes a camera, an image recognition processor, a microphone and a loudspeaker, a voice assistant, and a wireless transceiver. The robot moves around and creates a model of the location, and recognizes changes. It recognizes objects of interest, beings, and situations. The robot monitors the user and recognizes body language and gesture commands, as well as voice commands. The robot communicates with the user, the TV, and other devices. It may include environment sensors and health status sensors. It acts as a user companion by answering queries, executing commands, and issuing reminders. It may monitor to determine if the user is well. The robot may monitor objects of interest, their placement and their status. When necessary, it communicates with the user.
Pest Control System Having Event Monitoring
Pest control systems and methods are described. The systems comprise a portable electronic device which is configured to identify one or more of multiple PCDs within a range of a portable electric device which have been activated, and to provide an indication to a user corresponding to at least one of the identified activated PCDs.
Text-walking violation citation system and method
A method is provided. A notice is received from a mobile device indicating that typing within a texting application has occurred substantially simultaneously as walking has been detected. The notice includes a timestamp of when the typing and the detection of walking occurred. A position of the mobile device is triangulated for the timestamp, and a determination is made as to whether the typing and the detection of walking occurred within a predetermined target area using at least a portion of data calculated from the step of triangulating.
Defense and denial method
The presently disclosed method and system includes a network of computer devices, sensors, and actuators operating in concert with application software to actively detect, identify, and localize threats and generate real-time countermeasures designed to delay and/or mitigate damage that may be caused by the threats. Application software, in the form of automated reasoning and logic control, initiates preparatory and countermeasure sequences automatically, which may be used by users or automatically executed by the system to at least delay an attack to a physical asset/area by adversaries with use of non-lethal actuators. Learned scenarios are generated and continuously adapted via feedback loops and decision rules to provide preparatory and countermeasure sequences that maximize results with minimal expenditure of assets.
MOBILE DEVICE AS A SECURITY SYSTEM COMPONENT
In one implementation, a method for using a mobile computing device as a security system component includes receiving, from a mobile device and by a security system gateway, mobile device sensor information associated with sensor data captured by the mobile device at a premises monitored by the security system gateway; identifying, based on the received sensor information, a mobile device sensor information rule; identifying an action to perform in the mobile device sensor information rule; and automatically performing the identified action, by the security system gateway, in response to receiving the sensor information from the mobile device.
Doorbell communication systems and methods
The disclosure includes a method for using a doorbell system to detect a presence of a visitor. The doorbell system can comprise a doorbell having a speaker, a microphone, a camera, and a button. The method can include detecting, by the doorbell system, the presence of the visitor while the visitor is located outside a building to which the doorbell is attached. The building can include a door having a lock that is configured to fasten the door to inhibit unauthorized entry into the building. In response to detecting the presence of the visitor, the method can include the step of actuating, by the doorbell system, a first appliance associated with the building.