G08B25/14

Thermal event detection and notification system
09799186 · 2017-10-24 · ·

A thermal event detection and notification system detects a thermal event, a control unit receives information from, the information being indicative of the detected thermal event. The control unit determines, based on the information received, a location of said thermal event.

USER INTERFACE IN A PREMISES NETWORK
20220057917 · 2022-02-24 ·

Methods and systems are described for displaying a user interface associated with a premises management system. The user interface may display a plurality of interfaces, such as an interface for controlling the premises management system. The user interface may support other interfaces for displaying content and controlling devices at a premises. The user interface may display different interfaces using a schedule. The schedule may be determined by a timeline user interface based on user input.

USER INTERFACE IN A PREMISES NETWORK
20220057917 · 2022-02-24 ·

Methods and systems are described for displaying a user interface associated with a premises management system. The user interface may display a plurality of interfaces, such as an interface for controlling the premises management system. The user interface may support other interfaces for displaying content and controlling devices at a premises. The user interface may display different interfaces using a schedule. The schedule may be determined by a timeline user interface based on user input.

Systems and methods for a smart door chime system

A system includes a plurality of sensing devices disposed at a premises, the sensing devices being configured to generate data based on activity detected at one or more openings in the premises and to transmit the data, a plurality of speakers dispersed at the premises, a memory configured to store output profiles corresponding to a plurality of respective events and to store a plurality of respective sounds, and a processor configured to identify an event based on the transmitted data and to execute a stored output profile assigned to the event, the execution including automatically playing a stored sound through one or more of the speakers in accordance with the selected output profile.

Systems and methods for presenting security questions via connected security system
11257356 · 2022-02-22 · ·

The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.

Systems and methods for presenting security questions via connected security system
11257356 · 2022-02-22 · ·

The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.

Security system
09792806 · 2017-10-17 · ·

A computing device may communicate with a mobile node via a wireless link, and may determine if the mobile node is within range or out of range. In response to that determination, the computing device may cause various actions to occur, such as opening a door, unlocking a door, arming/disarming a monitoring system, activating a light, or other actions.

Security system
09792806 · 2017-10-17 · ·

A computing device may communicate with a mobile node via a wireless link, and may determine if the mobile node is within range or out of range. In response to that determination, the computing device may cause various actions to occur, such as opening a door, unlocking a door, arming/disarming a monitoring system, activating a light, or other actions.

Systems, methods, and devices for managing coexistence of multiple transceiver devices by optimizing component layout
09794522 · 2017-10-17 · ·

A camera assembly includes an enclosed housing having a rear surface, a front surface, and a periphery. The camera assembly also includes a lens module located within the housing and configured to receive light via the front surface, and a circuit board comprising communication circuitry located within the housing and configured to wireless communicate over a plurality of different communication protocols. The camera assembly further includes a first antenna arranged at a location on the circuit board, the first antenna configured for communication over a first one of the communication protocols, and a second antenna arranged at a location on the inner surface of the periphery, the second antenna configured for communication over a second one of the communication protocols.

Applying geographical limitations to control actions of a security system
09824514 · 2017-11-21 · ·

Apparatus for applying geographical limitations to control actions of a security system is described. The apparatus receive location data from a user device, determines whether location data has the user device within a predetermined distance range from the security system and cause a message to be sent to the security system to perform the control action specified in the request when the processor determines that the user device is within the predetermined distance range.