H04N7/186

DOORBELL COMMUNICATION SYSTEMS AND METHODS
20230163993 · 2023-05-25 ·

The disclosure includes a method for using a doorbell system to detect a presence of a visitor. The doorbell system can comprise a doorbell having a speaker, a microphone, a camera, and a button. The method can include detecting, by the doorbell system, the presence of the visitor while the visitor is located outside a building to which the doorbell is attached. The building can include a door having a lock that is configured to fasten the door to inhibit unauthorized entry into the building. In response to detecting the presence of the visitor, the method can include the step of actuating, by the doorbell system, a first appliance associated with the building.

SYSTEM AND METHOD FOR SHARING HEALTH DATA
20230061616 · 2023-03-02 · ·

Disclosed are systems and methods for sharing health information. For example, the system includes a sensor unit adjacent a building entrance, a first computing device of a visitor to the building entrance, and a second computing device associated with an occupant of the building. The system can include device connected to a smart-home network. One method includes detecting the first computing device adjacent the entrance, requesting health data from the first computing device, the first computing device checking for authorization to share the health data with a user associated of the second computing device; the first computing device sending health data to the second computing device, a second computing device receiving the health data pertaining to the user of the first computing device, and the second computing device notifying the user of the second computing device based on the received health data.

Remote access authentication and authorization

Features are disclosed for accurately authenticating a delivery agent for unattended delivery of an item. The systems and methods described confirm the location of the delivery agent and proximity to the delivery location using short range wireless communications between a monitoring device at the delivery location and a communication device associated with the delivery agent. Access may also be conditioned on user specified “do not disturb” rules indicating when remote access is authorized. The authentication may be dynamically assessed such as based on a type of item being delivered.

CAMERA BLINDSPOT ANALYSIS

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for detecting packages delivering in the camera's blindspot. One of the methods includes detecting, using one or more images captured by a camera at a property, movement in an area of interest i) at the property, ii) that is included in a field of view of the camera and iii) was generated using historical data for packages delivered to the property; determining, using the detected movement in the area of interest, that a package was likely delivered; and in response to determining that the package was likely delivered, performing one or more automated actions for the package.

Tamperproof camera
11606490 · 2023-03-14 · ·

A tamperproof video camera includes a video lens, an antenna; a wireless, transceiver, a processor, a battery compartment comprising a door, and an electronic lock. The processor receives signals through the wireless transceiver to lock or unlock the battery compartment's door. In response, the processor sends signals to the electronic lock to lock or unlock the battery compartment's door. The electronic lock is configured to lock or unlock the battery compartment's door in response to receiving the signals from the processor.

SYSTEMS FOR MOUNTING AN INTERCOM DEVICE
20220337789 · 2022-10-20 ·

Devices and methods for mounting intercom devices are described herein. The devices include a housing for receiving electrical components therein. The housing includes a back panel, side panels extending from the back panel, and a front panel coupled to the side panels. The front panel includes a perimeter, which, coupled to the side panels, forms a recess within the housing. The recess is configured to receive the intercom device such that the intercom device is flush with the front panel when the intercom device is fully inserted into the housing. The devices enable the intercom device to be mounted to mounting surfaces including corners of adjacent walls, framed structures, and openings inside the surface. This configuration alleviates complex or expensive installation and vandalism issues associated with intercom devices.

Access management system
11625966 · 2023-04-11 · ·

An access management system includes a mobile device with a processor and a memory and a software platform including at least a processor and a memory. The software platform is configured to analyze data obtained from the mobile device and other devices connected to the software platform. Specifically, the software platform is operable to determine if an access key received, read, or captured by a mobile device matches an access key for an authorized account, object, device, or space for the mobile device, and to provide access to the mobile device if the access key received, read, or captured by the mobile device matches the authorized access key.

Activating security system alarms based on data generated by audio/video recording and communication devices
11627289 · 2023-04-11 · ·

Activating security system alarms based on data generated by audio/video (A/V) recording and communication devices in accordance with various embodiments of the present disclosure are provided. In one embodiment, an network device communicatively coupled to a security system in an armed mode is provided, the network device comprising: one or more processors; a communication module; and a non-transitory machine-readable memory storing a program comprising sets of instructions for: receiving sensor data indicative of an entry/exit event at an entry point; determining, based on at least one of motion data and image data generated by an A/V recording and communication device having a field of view, whether a person was present in the field of view of the A/V recording and communication device prior to the entry/exit event; determining whether the person is authorized; and upon determining that the person is not authorized, activating an alarm action of the security system.

DOORBELL COMMUNICATION SYSTEMS AND METHODS
20220319285 · 2022-10-06 ·

A method of operating a doorbell system can include receiving, by a remote computing device, a notification of an emergency event and in response to the receiving, illuminating at least one light of a doorbell to indicate an occurrence of the emergency event. The method can further include, in response to receiving the notification, initiating a communication with an emergency dispatcher and/or an emergency contact. The at least one light can illuminate in a variety of colors and illumination patterns corresponding to the type of emergency event.

Automatic Door Opening Systems and Methodolgies
20220319261 · 2022-10-06 ·

The Intelligent Door Opening system consists of several devices that work together to identify approaching individuals, verify that they should be allowed access, which can be conducted by several different means. Once they have been approved the system will then grant them access by opening the door and then closing said door when the individual has entered the building. The Intelligent Door Opening system will also comprise several devices to add additional security to the primaries home, examples being a deadbolt that stops hackers from being able to control the other devices, a camera, and a secure locking system. The intelligent Door Opening system will add all the convenience of an automatic door as seen at a mall, but with the security to ensure that only people that are allowed access will be allowed to enter.