H04M11/025

VIRTUAL INTERCOM SYSTEM
20220165108 · 2022-05-26 ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a virtual intercom. In some implementations, a request from a visitor device to communicate with an occupant of a particular unit of the facility is received. A location of the visitor device is received. Based on the received location, it is determined that the visitor device is within a predetermined bounded area. An occupant profile is identified based on the received request. Information associated with the occupant profile is obtained. Based on the obtained information, it is determined the occupant has registered a profile. Based on the obtained information, a communication path to an occupant device is identified. The request from the visitor device is sent, using the communication path, to an occupant device belonging to the occupant. A response from the occupant device is received. Based on the response, an action is performed.

Smart electronic chime and mechanical chime dehum board
11743392 · 2023-08-29 · ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a smart dehum circuit that powers a chime which outputs audio in response to detection of a trigger event by a video doorbell. The circuit includes a detector circuit configured to generate a power signal in response to determining that an output voltage signal of a first circuit exceeds a threshold voltage. The circuit also includes a microcontroller coupled to the detector circuit. The microcontroller is configured to generate a chime power signal based on the power signal of the detector circuit. The chime power signal is generated to power the chime in response to detection of the trigger event by the video doorbell.

SMART LOCK SYSTEMS AND METHODS
20220157102 · 2022-05-19 · ·

A door lock system can comprise a door lock movable between a locked state and an unlocked state. The door lock system can detect a first indication suggestive of a presence of a mobile computing device of a visitor. The door lock system can also detect a second indication suggestive of an identity of the visitor. Further, the door lock system can validate that the first indication and the second indication are associated with a known identity of the visitor.

REMOTE ACCESS CONTROL
20220148357 · 2022-05-12 ·

A system that allows a user to access a secured area by confirming location of the user near the secured area and receipt of an access word by the system. A user in possession of a mobile device may be detected at the entrance to a secured location. The system can select a question asking for a passcode corresponding to certain access to the secured location. The question can be spoken to a user through a loudspeaker at the secured location. The user's spoken response can be processed by the system, for example using keyword spotting, to determine if the proper access word is included. If it is, the system can grant access to the secured area.

Emergency kit
11330095 · 2022-05-10 ·

An emergency kit (10A), including an apparatus (38A) including: a long-range communication device including a unique identity module (30A), for receiving (24) a status of the apparatus (38A) from another long-range communication device (26B); and a visual/vocal/transmitting device (16A), for being turned on once the status is active, thereby the apparatus (38A) indicates a first location of an emergency event setting the active status.

NETWORK SERVER AND METHOD FOR CONTROLLING USER TERMINAL ASSOCIATED WITH DOORBELL INCLUDING CAMERA
20220139088 · 2022-05-05 · ·

A method for controlling a user terminal associated with a doorbell including a camera according to an embodiment of the present invention includes: storing, in a database, feature data units collected using the doorbell; generating one among a plurality of types of commands according to whether an object detected from an image of a visitor captured by the doorbell matches one of the feature data units; and displaying first and second graphic interfaces, which are different from each other, on the user terminal in responses to first and second commands, respectively, among the commands.

DOORBELL COMMUNITIES

Doorbells can send data to each other to enable a first doorbell user to warn a second doorbell user regarding a suspicious visitor. A first user can indicate a first trait of a visitor via a first remote computing device. The first user can create a user group to enable the members of the user group to use their doorbells to take pictures of suspicious visitors and to send the pictures of the suspicious visitors to other members of the user group.

DOORBELL COMMUNITIES
20230245536 · 2023-08-03 ·

Doorbells can send data to each other to enable a first doorbell user to warn a second doorbell user regarding a suspicious visitor. A first user can indicate a first trait of a visitor via a first remote computing device. The first user can create a user group to enable the members of the user group to use their doorbells to take pictures of suspicious visitors and to send the pictures of the suspicious visitors to other members of the user group.

INVISIBLE INTERCOM AND ACCESS SYSTEM AND METHOD
20220124203 · 2022-04-21 ·

An invisible intercom and access system and method. The invisible intercom and access system may include a visitor device configured to make a phone call to a specific phone number; one or more authorized point of contact (APoC) device configured to receive the phone call and having an input configured to receive a code that produces tones; one or more third party device configured to control access to one or more access point of a property or building; and an invisible intercom and access apparatus configured to receive the phone call from the visitor device and connect the phone call to the one or more APoC device, recognize the tones of the code input at the one or more APoC device, and control or send a control signal to the one or more third party device. The invisible intercom and access method may include receiving via an invisible intercom and access apparatus a phone call from a visitor device using a specific phone number provided to a visitor at one or more access point of a building or property; connecting via the invisible intercom and access apparatus the phone call to one or more APoC device; recognizing via the invisible intercom and access apparatus tones of a code input by the one or more APoC device; and controlling the one or more third party device in response to the recognizing of the tones.

Systems and Methods of Detecting and Responding to a Visitor to a Smart Home Environment

A method of detecting and responding to a visitor to a smart home environment via an electronic greeting system of the smart home environment, including determining that a visitor is approaching an entryway of the smart home environment; initiating a facial recognition operation while the visitor is approaching the entryway; initiating an observation window in response to the determination that a visitor is approaching the entryway; obtaining context information from one or more sensors of the smart home environment during the observation window; and at the end of the time window, initiating a response to the detected approach of the visitor based on the context information and/or an outcome of the facial recognition operation.