Patent classifications
H04M11/02
DOORBELL COMMUNITIES
Doorbells can send data to each other to enable a first doorbell user to warn a second doorbell user regarding a suspicious visitor. A first user can indicate a first trait of a visitor via a first remote computing device. The first user can create a user group to enable the members of the user group to use their doorbells to take pictures of suspicious visitors and to send the pictures of the suspicious visitors to other members of the user group.
Volume control over shared trunk lines in intercom systems
Systems and methods for volume control over intercom trunk lines. One example method includes receiving, from a first keypanel coupled to a first intercom, a call request identifying a remote keypanel coupled to a second intercom. The method includes transmitting a trunk request based on the call request and receiving a trunk setup message. The method includes activating a first crosspoint to provide a two-way audio connection between the first and second intercom devices. The method includes applying a trunk gain value to the first crosspoint based on the remote keypanel and transmitting, with an audio gain based on the trunk gain value, an audio stream received from the first keypanel. The method includes receiving, from the second intercom, a gain adjustment value associated with the first keypanel and the remote keypanel and applying an adjusted trunk gain value to the first crosspoint based on the gain adjustment value.
Volume control over shared trunk lines in intercom systems
Systems and methods for volume control over intercom trunk lines. One example method includes receiving, from a first keypanel coupled to a first intercom, a call request identifying a remote keypanel coupled to a second intercom. The method includes transmitting a trunk request based on the call request and receiving a trunk setup message. The method includes activating a first crosspoint to provide a two-way audio connection between the first and second intercom devices. The method includes applying a trunk gain value to the first crosspoint based on the remote keypanel and transmitting, with an audio gain based on the trunk gain value, an audio stream received from the first keypanel. The method includes receiving, from the second intercom, a gain adjustment value associated with the first keypanel and the remote keypanel and applying an adjusted trunk gain value to the first crosspoint based on the gain adjustment value.
VOLUME CONTROL OVER SHARED TRUNK LINES IN INTERCOM SYSTEMS
Systems and methods for volume control over intercom trunk lines. One example method includes receiving, from a first keypanel coupled to a first intercom, a call request identifying a remote keypanel coupled to a second intercom. The method includes transmitting a trunk request based on the call request and receiving a trunk setup message. The method includes activating a first crosspoint to provide a two-way audio connection between the first and second intercom devices. The method includes applying a trunk gain value to the first crosspoint based on the remote keypanel and transmitting, with an audio gain based on the trunk gain value, an audio stream received from the first keypanel. The method includes receiving, from the second intercom, a gain adjustment value associated with the first keypanel and the remote keypanel and applying an adjusted trunk gain value to the first crosspoint based on the gain adjustment value.
VOLUME CONTROL OVER SHARED TRUNK LINES IN INTERCOM SYSTEMS
Systems and methods for volume control over intercom trunk lines. One example method includes receiving, from a first keypanel coupled to a first intercom, a call request identifying a remote keypanel coupled to a second intercom. The method includes transmitting a trunk request based on the call request and receiving a trunk setup message. The method includes activating a first crosspoint to provide a two-way audio connection between the first and second intercom devices. The method includes applying a trunk gain value to the first crosspoint based on the remote keypanel and transmitting, with an audio gain based on the trunk gain value, an audio stream received from the first keypanel. The method includes receiving, from the second intercom, a gain adjustment value associated with the first keypanel and the remote keypanel and applying an adjusted trunk gain value to the first crosspoint based on the gain adjustment value.
INVISIBLE INTERCOM AND ACCESS SYSTEM AND METHOD
An invisible intercom and access system and method. The invisible intercom and access system may include a visitor device configured to make a phone call to a specific phone number; one or more authorized point of contact (APoC) device configured to receive the phone call and having an input configured to receive a code that produces tones; one or more third party device configured to control access to one or more access point of a property or building; and an invisible intercom and access apparatus configured to receive the phone call from the visitor device and connect the phone call to the one or more APoC device, recognize the tones of the code input at the one or more APoC device, and control or send a control signal to the one or more third party device. The invisible intercom and access method may include receiving via an invisible intercom and access apparatus a phone call from a visitor device using a specific phone number provided to a visitor at one or more access point of a building or property; connecting via the invisible intercom and access apparatus the phone call to one or more APoC device; recognizing via the invisible intercom and access apparatus tones of a code input by the one or more APoC device; and controlling the one or more third party device in response to the recognizing of the tones.
Systems and Methods of Detecting and Responding to a Visitor to a Smart Home Environment
A method of detecting and responding to a visitor to a smart home environment via an electronic greeting system of the smart home environment, including determining that a visitor is approaching an entryway of the smart home environment; initiating a facial recognition operation while the visitor is approaching the entryway; initiating an observation window in response to the determination that a visitor is approaching the entryway; obtaining context information from one or more sensors of the smart home environment during the observation window; and at the end of the time window, initiating a response to the detected approach of the visitor based on the context information and/or an outcome of the facial recognition operation.
Systems and Methods of Detecting and Responding to a Visitor to a Smart Home Environment
A method of detecting and responding to a visitor to a smart home environment via an electronic greeting system of the smart home environment, including determining that a visitor is approaching an entryway of the smart home environment; initiating a facial recognition operation while the visitor is approaching the entryway; initiating an observation window in response to the determination that a visitor is approaching the entryway; obtaining context information from one or more sensors of the smart home environment during the observation window; and at the end of the time window, initiating a response to the detected approach of the visitor based on the context information and/or an outcome of the facial recognition operation.
SMART ELECTRONIC CHIME AND MECHANICAL CHIME DEHUM BOARD
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a smart dehum circuit that powers a chime which outputs audio in response to detection of a trigger event by a video doorbell. The circuit includes a detector circuit configured to generate a power signal in response to determining that an output voltage signal of a first circuit exceeds a threshold voltage. The circuit also includes a microcontroller coupled to the detector circuit. The microcontroller is configured to generate a chime power signal based on the power signal of the detector circuit. The chime power signal is generated to power the chime in response to detection of the trigger event by the video doorbell.
METHOD FOR ADAPTING AN ELECTRICAL CIRCUIT WITH A CONTROLLING DEVICE
The invention concerns a controlling device (10) having terminals for connection to an electrical circuit (11) comprising: a first user device (12) energized by a first voltage power supply and configured to switch between at least an on-state and an off-state, a second user device (13) configured to be connected in series with the first device (12) and energized by a second voltage or current power supply, the controlling device (10) being configured to be connected in parallel of the first user device (12) and to: absorb a leakage current flowing through the electrical circuit (11) below a first predetermined threshold, and control the voltage or current between the terminals of the controlling device (10), so as to ensure that the second user device (13) is supplied with the second voltage or current.