Techniques are described for reducing false alarms related to security and automation systems. One method includes receiving a request to activate a security function associated with a automation system, initiating a first security duration after a predetermined time associated with the received request, detecting an occurrence of an event associated with the automation system during the first security duration, initiating a second security duration based on the detecting, and broadcasting a message requesting authentication credentials at a location of the automation system during the second security duration.
Methods, systems, and devices for security and/or automation systems are described. In some embodiments, the methods may include detecting an input at a doorbell, and communicating the detected input to a doorbell signal generating component associated with the doorbell based at least in part on the detecting. The methods may further include generating a first alert at the doorbell signal generating component associated with the doorbell. In some embodiments, the methods may further include communicating the detected input to one or more alert components associated with the security and/or automation system based at least in part on the detecting, and generating a second alert at the one or more alert components associated with the security and/or automation system.
A method for security and/or automation systems is described. In one embodiment, the method may include detecting a first sound event at a home entry point using one or more sensors. The method may further include receiving input to associate at least one home automation system operation with the first sound event, and may further include storing the first sound event. The method may further include initiating the at least one home automation system operation associated with the first sound event.
A method for security and/or automation systems, comprising determining a presence of a first occupant in a first room at a predefined location, the first room communicatively coupled to a first electronic device capable of receiving input; receiving a request for communication with the first occupant by a remote computer system; sending a response to the request for communication with the first occupant; and establishing a communications link between the first electronic device and the remote computer system.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
System and methods for storing data include detecting presence of one or more computing devices within a defined geographic area, automatically copying media stored on the one or more computing devices, storing the copied media on a backup storage device, and grouping the stored copied media by at least one of time period, location, event and a source of the copied media.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
In some embodiments, security and/or automation systems, collectively referred to as automation systems, may offer a user the peace of mind of having an automation system active while the user is present in a residence. False alarms may become costly to both the user of the automation system and to emergency responders using resources to respond to the false alarms. The automation system may provide the benefit of an armed automation system without the risk of frequent false alarms. An automation system may provide additional or alternative security to a residence when a person is detected in the home with a reduction in the false alarms that may be present in a strict alarm state. This may provide security to a person in the home during the day and provide unique daytime features.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
Methods and systems are described for determining operation of an openable barrier and direction of movement of a person through an opening controlled by the barrier. A method includes detecting with a hinge sensor a closed position for the barrier, the hinge sensor being mounted to a hinge of the barrier, determining with the hinge sensor when the barrier changes position from the closed position to an open position, detecting with at least one motion sensor motion of an object in proximity to the opening, and determining a direction of movement of the object through the opening based on whether the motion is detected before or after detecting the change in position of the barrier.
A method for a home automation system is described. In one embodiment, the method may include receiving input regarding a list of predetermined activities. The method may further include receiving monitored activity data of at least one authorized user. The method may further include comparing the received monitored activity data with the received input regarding the list of predetermined activities, and operating at least one aspect of the home automation system based, at least in part, on the comparing.
Systems and methods for visitor detection using security and/or automation systems include detecting an event at a doorway, capturing an image at the doorway associated with the event, capturing a video at the doorway associated with the event, delivering the image with a notice of the event to a recipient for viewing, and automatically uploading the video for viewing upon capturing the video. The video is available for selective viewing by the recipient upon being uploaded.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 21/2743 - Video hosting of uploaded data from client
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
In some embodiments, systems, methods, and techniques relating to security and/or automation systems, collectively referred to as automation systems, may include determining a presence of a first device proximate at least one entry to a location, obtaining information related to an identification of an entity associated with the at least one device, authenticating the first device, the authenticating based at least in part on obtaining information related to the identification, and taking an action based at least in part on determining the authenticity.
A method for security and/or automation systems is described. In one embodiment, the method includes identifying image data from a signal, analyzing the image data based at least in part on a first parameter, identifying a presence of an object based at least in part on the analyzing, and detecting an object event based at least in part on the identifying.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G01N 21/84 - Systems specially adapted for particular applications
Methods and systems are described for communicating action instructions between a home automation system and a mobile robotic device. In some embodiments, the action instructions may be communicated by receiving, at the home automation system, input data, and processing the input data to obtain action instructions. In some embodiments, the action instructions may be communicated to the mobile robotic device, and the mobile robotic device may execute the received action instructions.
Methods and systems are described for controlling settings of an automation system, such as a home and/or business automation system. According to at least one embodiment, an apparatus for controlling settings of an automation system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to receive instructions about an intended action by a user of the home automation system, continuously detect behavior of the user with the home automation system, determine whether the intended action has occurred based on the detected behavior, and adaptively update one or more settings of the home automation system when the intended action is determined to have occurred.
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
According to at least one embodiment, a computer-implemented method to illuminate a room is described. At least one person entering the room may be identified. The room may be illuminated based at least in part on the identifying. An occupancy count for the room may be maintained based at least in part on the illuminating, wherein the occupancy count comprises a number of one or more people present in the room. The room may be darkened based at least in part on the occupancy count for the room reaching a pre-determined count.
Methods and systems are described managing module for locating a target storage device among a plurality of storage devices connected via a network. A computer implemented method includes sending registration information to a central directory, wherein the registration information includes at least an address of one of the plurality of storage devices, and the central directory stores the registration information in a registry. The method also includes sending a request to the central directory for an address for another one of the plurality of storage devices, receiving the address from the central directory if the address is in the registry, and conducting a successive lookup of a closest known address until the address is located if the address is not in the registry.
G06F 16/13 - File access structures, e.g. distributed indices
H04L 45/7453 - Address table lookup; Address filtering using hashing
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
16.
SYSTEMS AND METHODS FOR MONITORING GLOBALLY DISTRIBUTED REMOTE STORAGE DEVICES
Methods and systems are described for remotely monitoring a plurality of distributed remote storage devices. An example computer implemented method includes locally collecting monitoring data for one of the plurality of distributed remote storage devices, and periodically sending at least one of an aggregate of the locally recorded monitoring data and a summary of the locally recorded monitoring data to a remote location. The remote location includes at least one of another one of the plurality of distributed remote storage devices, at least one central server, and a set of the plurality of distributed remote storage devices.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Systems, apparatuses, and methods relating to mesh network communications are described. In one embodiment a method may include receiving at least one information packet at a node, identifying one or more output communication links, assessing at least one characteristic of at least one of the one or more identified output communication links, and transmitting one or more information packets from a node via at least one of one or more identified output communication links based at least in part on at least one characteristic.
Methods and systems are described for determining operation of an openable barrier into a building. A method for determining an open state of a barrier includes confirming a first position for the barrier, the barrier having at least one hinge and a hinge sensor mounted to the at least one hinge, determining with the hinge sensor when the barrier changes position from the first position to a second position, and wirelessly transmitting data concerning the change in barrier position.
Methods and systems are described for storing and accessing video content collected by a home automation system. According to at least one embodiment, an apparatus for accessing video content collected by a home automation system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to receive metadata about a recorded event from a cloud storage, request video content of the recorded event based on the metadata, and receive at least some of the video content from a controller of the home automation system.
H04N 21/236 - Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator ] into a video stream, multiplexing software data into a video stream; Remultiplexing of multiplex streams; Insertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rate; Assembling of a packetised elementary stream
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/436 - Interfacing a local distribution network, e.g. communicating with another STB or inside the home
Methods and systems are described for storing video content collected by a home automation system. According to at least one embodiment, an apparatus for accessing video content collected by a home automation system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to receive at a remote device live video content from a camera of the home automation system, and initiate real-time, two-way audio communication between the remote device and a user of the home automation system via the camera.
H04N 21/236 - Assembling of a multiplex stream, e.g. transport stream, by combining a video stream with other content or additional data, e.g. inserting a URL [Uniform Resource Locator ] into a video stream, multiplexing software data into a video stream; Remultiplexing of multiplex streams; Insertion of stuffing bits into the multiplex stream, e.g. to obtain a constant bit-rate; Assembling of a packetised elementary stream
H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
H04N 21/433 - Content storage operation, e.g. storage operation in response to a pause request or caching operations
H04N 21/436 - Interfacing a local distribution network, e.g. communicating with another STB or inside the home
Methods and systems are described for controlling an automation and security system. According to at least one embodiment, an apparatus for data storage in an automation and security system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory. The instructions are executable by a processor to receive data at a first device, store a copy of the data on the first device, fragment the data into a plurality of data fragments, transmit the plurality of data fragments to a plurality of remote devices, and store some of the plurality of data fragments on each of the plurality of remote devices.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
H04W 48/18 - Selecting a network or a communication service
22.
SIMULTANEOUS CHANNEL SWITCHING WITHIN A MESH NETWORK
A computer-implemented method for channel switching in a mesh network is described. In one embodiment, a beacon is sent. The beacon includes a channel change request in both proprietary and standard formats. The channel change request includes an instruction to change to a particular channel and a geo-timing synchronization function identifying when the change to the particular channel should occur. The geo-timing synchronization function is used to determine that the time has arrived to change to the particular channel. The particular channel is changed to synchronously with all other access points in the mesh network.
A computer-implemented method for progressive profiling in a home automation system is described. Data related to a premises and an occupant of the premises may be analyzed and one or more observations may be made based on the analysis of the data. Upon detecting one or more conditions associated with the one or more observations made, an offer to perform one or more actions may be communicated to the occupant.
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. Peripheral devices may implement an anti-takeover mechanism limiting the number of available device command classes when certain handshake and verification requirements are not met. Anti-takeover peripheral devices with protection enabled may be relocated within a controller network, or in certain cases, from one controller network to another controller network when certain conditions are met. That same device may be hobbled when removed from a controller network and may remain hobbled when connected to another network that fails to meet certain conditions. Unprotection and unhobbling of a device may occur through an algorithmic mechanism using values stored on the peripheral device and the controller device for one or more of anti-takeover code generation, anti-takeover code comparison, network identification value comparison, and manufacturer identification value comparison.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A computer-implemented method for integration of a set top box and an automation system is described. In one configuration, subscriber program content is provided. An aspect of a premises is monitored via one or more sensors. A monitor channel may be provided to display the monitored aspect of the premises. The monitor channel may be displayed in a channel guide among channels of the subscriber program content.
A computer-implemented method for channel switching in a mesh network is described. In one embodiment, a beacon is sent. The beacon includes a channel change request in both proprietary and standard formats. The channel change request includes an instruction to change to a particular channel and a timing synchronization function identifying when the change to the particular channel should occur. The timing synchronization function is used to determine that the time has arrived to change to the particular channel. The particular channel is changed to synchronously with all other access points in a mesh network.
The present disclosure relates to a management of multicast traffic within a wireless mesh network. In some embodiments, a wireless mesh network includes a plurality of mesh nodes and a central server in communication with at least one of the mesh nodes of the plurality of mesh nodes. In some embodiments, the central server is configured to generate one or more rules for at least one of the mesh nodes to enable a change in a pre-routing parameter in a packet header. In some embodiments, the central server includes a rules-based engine configured to generate and convey one or more traffic shaping rules in response to sensing traffic conditions.
A system is described herein including a control panel configured to communicate with at least one mobile wireless device, including sending image data to the at least one mobile wireless device using electronic messaging protocols. The system also includes at least one automation component wirelessly connected to the control panel through short range wireless communication protocols. The at least one automation component includes at least one sensor configured to detect a presence of a person at an entry to the physical structure, at least one camera inconspicuously integrated within an entry component at the entry, and at least one short range wireless transceiver coupled to the at least one sensor and the at least one camera and configured to communicate image and sensor data to the control panel and to receive control information from the control panel.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
29.
METHODS FOR PROVIDING NOTIFICATIONS FOR FOLLOW-UP ACTIONS IN RESPONSE TO EVENTS DETECTED BY AN AUTOMATION SYSTEM, AND SYSTEMS AND DEVICES RELATED THERETO
An automation system may include a control panel monitoring one more automation system components. When an event is detected at an automation system component, the control panel may automatically access a local or remote data source and identify procedures to be implemented in response to the event. The procedures may include follow-up actions and procedures specific to a particular dealer of the automation system. Dealer-specific procedures may then be displayed or otherwise communicated by the control panel to alert the user of what actions to take or to expect.
G08B 19/00 - Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
G08B 25/14 - Central alarm receiver or annunciator arrangements
30.
BANDWIDTH ESTIMATION BASED ON LOCATION IN A WIRELESS NETWORK
Methods, systems, and devices are described that are directed to estimating the bandwidth at a particular location in a wireless mesh network. In some embodiments, a performance determination apparatus includes a signal receiver module, a location module, a signal analysis module, a report module, and a placement module. In some embodiments, the signal analysis module collects received signal strength indicator (RSSI) on one or more receive chains of the receiver and analyzes various aspects of signal quality. In some embodiments, the signal analysis module estimates the bandwidth available at the location, estimates the latency at the location, or both. In some embodiments, the report module represents the quality of the signal graphically by overlaying a representation of the signal quality on a map of the area. In some embodiments, the placement module recommends where to place customer premises equipment (CPE) in order to maximize signal quality.