Patent classifications
G08B13/1965
ACCESS MANAGEMENT SYSTEM
An access management system includes a mobile device with a processor and a memory and a software platform including at least a processor and a memory. The software platform is configured to analyze data obtained from the mobile device and other devices connected to the software platform. Specifically, the software platform is operable to determine if an access key received, read, or captured by a mobile device matches an access key for an authorized account, object, device, or space for the mobile device, and to provide access to the mobile device if the access key received, read, or captured by the mobile device matches the authorized access key.
SYSTEMS AND METHODS FOR GEOFENCE SECURITY
Systems and methods for geofence information delivery are disclosed. A multiplicity of devices constructed and configured in network communication in a region of interest via a peer-to-peer network. The multiplicity of devices store cached geofence information for the region of interest. The multiplicity of devices on the peer-to-peer network are operable to convert between an IP address and a geographic location. Each of the multiplicity of devices is operable to query peer devices on the peer-to-peer network for geofences associated with an IP address or a geographic location. At least one peer device is operable to deliver one or more geofences associated with the IP address to the querying device via zero-configuration networking or web service.
DRONE DETERRENCE SYSTEM, METHOD, AND ASSEMBLY
A drone deterrence system includes a housing configured to be secured to a structure. A motion detector is disposed on or within the housing, and is configured to detect motion within a predetermined range. A tracker is disposed on or within the housing, and is configured to track motion of a drone within the predetermined range. A control unit is in communication with the motion detector and the tracker, and is configured to take action to deter the drone from remaining in the predetermined range.
ASSET MANAGEMENT MONITORING
Techniques are described for an autonomous asset management system that integrates autonomous devices, such as drone devices and other robotic devices, with a home security system of a property to enable management, monitoring, and/or tracking of various assets located within the property. In some implementations, an indication of an asset associated with a property is obtained by an autonomous device. Sensor data collected by one or more sensors of the property is obtained by the autonomous device based on the indication of the asset. A present status of the asset is determined by the autonomous device based on the sensor data. A determination that the present status of the asset does not correspond to an expected status of the asset is made by the autonomous device. In response, the autonomous device navigates to the particular location of the property.
Mobile distributed security response
The invention concerns a video feed monitoring app configured to be implemented with an interface and a processor. The interface may be configured to receive requests from an operator and present visual content to a display. The processor may be configured to process the requests and update the display. The video feed monitoring app may be configured to receive video streams from smart security devices, receive a priority signal, select a subset of the video streams in response to the priority signal and a user preference and arrange the subset of the video streams on the display. The priority signal may be generated externally based on events detected. The subset of the video streams may be updated based on the priority signal. Updating the subset of the video streams may comprise displaying the video streams that comprise events and removing the video streams that do not comprise events.
UNMANNED AERIAL VEHICLE BASED SECURITY SYSTEM
A method includes defining a flight plan of an unmanned aerial vehicle from a rest location thereof to a destination location within a memory of the unmanned aerial vehicle, and capturing, through one or more sensor(s) communicatively coupled to the unmanned aerial vehicle and a server through a computer network, data related to an environment of a specific location covered by the one or more sensor(s). The method also includes detecting, through a processor associated with the one or more sensor(s) and/or the server, a security breach and/or a security threat at the specific location based on analyzing the captured data, and automatically activating, through the one or more sensor(s) or the server, the flight plan on the unmanned aerial vehicle in response to the detection of the security breach and/or the security threat to dispatch the unmanned aerial vehicle to perform additional surveillance of the specific location.
Autonomous home security devices
An aerial vehicle is programmed or configured to respond to reports of events or conditions within spaces of a facility. The aerial vehicle travels to a location of a reported event or condition and captures data using onboard sensors. The aerial vehicle independently determines whether the reported event or condition is occurring, or is otherwise properly addressed by resources that are available at the location, using images or other data captured by the onboard sensors. Alternatively, the aerial vehicle transmits a request for additional resources to be provided at the location, where necessary. A map of the location generated based on images or other data captured by the onboard sensors may be utilized for any purpose, such as to make one or more recommendations of products that are appropriate for use at the facility.
METHOD FOR ALLOWING DRONE ACTIVITY TO MODIFY EVENT DETECTION BY A MONITORING SYSTEM
Methods, systems, and apparatus, including computer programs encoded on a storage device, for enabling drone activity in a property monitored by a property monitoring system without triggering a false alarm. In one aspect, the method includes actions of obtaining a location of the drone, identifying a first sensor installed at the property that is within a predetermined distance of the drone, detecting first sensor data generated by the first sensor that is within a predetermined distance of the drone, wherein the first sensor data includes data that is indicative of an event, determining whether a second sensor that is mounted to the drone is generating second sensor data that corroborates the event indicated by the first sensor data, and disregarding, by the property monitoring system, the first sensor data in determining whether to trigger an alarm.
ENHANCED AUDIOVISUAL ANALYTICS
A monitoring system that is configured to monitor a property includes a camera that is configured to capture video data of the property. The monitoring system further includes a microphone that is configured to capture audio data of the property. The monitoring system further includes a monitor control unit that is configured to access and analyze the video data. The monitor control unit is further configured to determine that an alarm condition does not exist at the property. The monitor control unit is further configured to access and analyze the audio data. The monitor control unit is further configured to override the determination that an alarm condition does not exist at the property. The monitor control unit is further configured to, based on overriding the determination that an alarm condition does not exist at the property, perform a monitoring system action.
SYSTEMS AND METHODS FOR GEOFENCE SECURITY
Systems and methods for geofence information delivery are disclosed. A multiplicity of devices constructed and configured in network communication in a region of interest via a peer-to-peer network. The multiplicity of devices store cached geofence information for the region of interest. The multiplicity of devices on the peer-to-peer network are operable to convert between an IP address and a geographic location. Each of the multiplicity of devices is operable to query peer devices on the peer-to-peer network for geofences associated with an IP address or a geographic location. At least one peer device is operable to deliver one or more geofences associated with the IP address to the querying device via zero-configuration networking or web service.