Patent classifications
G08B27/003
Systems and methods for presenting security questions via connected security system
The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.
SYSTEMS AND METHODS FOR IDENTIFYING AND RESPONDING TO A POTENTIAL THREAT
Systems and methods for identifying and responding to a potential threat at a location monitored by a smart home system are provided. Such systems and methods can include a central system receiving a notification of a suspicious incident detected at the location and current data related to the suspicious incident from the smart home system, the central station analyzing the current data to confirm or reject the suspicious incident, when the central system confirms the suspicious incident, the central station determining whether the current data is indicative of a potential threat, and when the central station determines that the current data is indicative of the potential threat, the central station storing the current data for future use and initiating a security action to alleviate the potential threat.
SYSTEM AND METHOD OF LOCATING INSTALLED DEVICES
A graphically based tool and method for generating programming for a fire monitoring system. The locations of existing devices, such as detectors, in a building being monitored, can be visually presented in the context of the building. New devices can be installed, or the location of existing devices changed since all devices report their locations in the building to the tool. Device location information can be combined with building information to create a multi-dimensional representation of parts of the building being monitored.
Handling security services visitor at a smart-home
This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.
Systems and methods for identifying and responding to a potential threat
Systems and methods for identifying and responding to a potential threat at a location monitored by a smart home system are provided. Such systems and methods can include a central system receiving a notification of a suspicious incident detected at the location and current data related to the suspicious incident from the smart home system, the central station analyzing the current data to confirm or reject the suspicious incident, when the central system confirms the suspicious incident, the central station determining whether the current data is indicative of a potential threat, and when the central station determines that the current data is indicative of the potential threat, the central station storing the current data for future use and initiating a security action to alleviate the potential threat.
INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
Provided is an information processing system, an information processing apparatus, an information processing method, and a program which are capable of achieving all of crime prevention, disaster prevention, and activation of local community by appropriately conveying an indoor state to the outside while distancing from physical contact. The information processing system includes a detecting unit that detects a feeling of one or more persons located indoors on the basis of sensor data obtained by sensing an indoor state; and a control unit that performs control such that a captured image obtained by imaging the indoor state is output to an outdoor display apparatus in a case in which a value of a feeling of at least any one person among the detected feelings satisfies a predetermined condition.
System and method for reporting the existence of sensors belonging to multiple organizations
A system and method for reporting the existence of sensors belonging to multiple organizations that are proximally located to a requested location. The report includes a first list of sensors that are unauthorized and discoverable and a second list of sensors that are authorized.
Audio/video device with viewer
An audio/video (A/V) device may include or accommodate a viewer through a barrier. For example, an A/V device may include a first component for installation on an exterior surface of a door, a second component for installation on an interior surface of the door, a viewer that extends through an opening in the door, and a flexible connector that electrically couples the first component and the second component. The A/V device may enable use of an existing hole in the door as part of a door viewer, while also providing the functionality of an A/V device. For example, the A/V device may be configured to receive an input using a button on the first component, generate image data using a camera on the first component, and send the image data to a network device.
Portable alarm system
A portable alarm system has a base unit including a processor electrically connected to a wireless transceiver configured to communicate wireless signals to an external location. The base unit is further configured to receive wireless alarm signals from at least a first sensor and a second sensor, both of the first and second sensors being physically separated from the base unit. The processor is configured to be selectively programmed by a user to cause the base unit to communicate with a remote monitoring station in response to receiving an alarm signal from the first sensor, but not in response to receiving an alarm signal from the second sensor. Instead, when an alarm signal is received from the second sensor, the processor causes a different action, other than communicating with the monitoring station, to occur. Such action can include, for example, sending a wireless communication to a mobile electronic device.
Arming security systems based on communications among a network of security systems
Arming security systems based on communications among a network of security systems in accordance with various embodiments of the present disclosure are provided. In one embodiment, a method for a client device associated with a first security system of a security network is provided, the security network including the first security system installed at a first address and a second security system installed at a second address, the client device including a processor, a communication module, and a display, the method comprising: in response to a security event detected by the second security system at the second address, receiving a user alert; in response to receiving the user alert, displaying the user alert; receiving an input including an arming action for the first security system; and in response to receiving the input, transmitting the arming action to the first security system.