Fall detection and reporting technology, in which output from at least one sensor configured to sense, in a room of a building, activity associated with a patient falling is monitored and a determination is made to capture one or more images of the room based on the monitoring. An image of the room is captured with a camera positioned to include the patient within a field of view of the camera and the captured image of the room is analyzed to detect a state of the patient at a time of capturing the image. A potential fall event for the patient is determined based on the detected state of the patient and a message indicating the potential fall event for the patient is sent based on the determination of the potential fall event for the patient. Techniques are also described for fall detection and reporting using an on-body sensing device.
G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods
G08B 21/02 - Alarms for ensuring the safety of persons
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
G16Z 99/00 - Subject matter not provided for in other main groups of this subclass
Monitoring system alert technology, in which monitoring system data is accessed from a monitoring system that is located in a property of a user and the monitoring system data is analyzed against one or more rules that define alerts provided for the monitoring system. Based on the analysis, a determination is made that an alert for the monitoring system is needed and conditions for providing the alert are accessed. Location of a mobile device of a user associated with the monitoring system and timing related to providing the alert are monitored. The monitored location of the mobile device and the monitored timing are analyzed with respect to the accessed conditions. Based on the analysis, a determination is made that the accessed conditions for providing the alert are met and the alert is output at the mobile device.
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G06Q 10/20 - Administration of product repair or maintenance
G07C 9/00 - Individual registration on entry or exit
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 21/24 - Reminder alarms, e.g. anti-loss alarms
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 29/02 - Monitoring continuously signalling or alarm systems
Method, systems, and apparatus, including computer programs encoded on computer storage media, for detecting interference with sound sensing devices. One of the methods includes receiving, from a sound sensing device at a property, an audio signal captured by the sound sensing device; obtaining, from one or more other devices at the property, data; determining whether an audio event likely occurred at the property using the obtained data; in response to determining that an audio event likely occurred at the property, determining, using the audio signal captured by the sound sensing device and event data for the audio event, whether a configuration of the sound sensing device is likely modified; and in response to determining that the configuration of the sound sensing device is likely modified, performing one or more actions for the modification of the configuration of the sound sensing device at the property.
An electronic monitoring system is described that receives data from a particular monitoring system, receives data from multiple other monitoring systems, analyzes data received from the particular monitoring system irrespective of data received from the multiple other monitoring systems, based on the analysis, determines whether one or more events occur at the particular environment, and in response to determining that a particular event occurs at the particular environment, evaluates the particular event against a set of rules, selects, based on the evaluation results, a particular subset of the multiple other monitoring systems to serve as a cooperative monitoring network, assesses data received from the particular subset of the multiple other monitoring systems, based on the assessment, tracks, in connection with the particular event, events detected by the particular subset of the multiple other monitoring systems, and handles the particular event based on the tracked events.
H04L 41/0686 - Additional information in the notification, e.g. enhancement of specific meta-data
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 25/14 - Central alarm receiver or annunciator arrangements
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
G08B 29/18 - Prevention or correction of operating errors
H04K 3/00 - Jamming of communicationCounter-measures
H04L 41/0681 - Configuration of triggering conditions
H04W 4/02 - Services making use of location information
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
A method is described that determines that a replacement node device has been connected to a mesh network, the replacement node device corresponding to an original node that has been removed from the mesh network. In response to determining that the replacement node device has been connected to the mesh network, network topology data is accessed that specifies one or more data routing configurations that are each associated with a node device included in the mesh network. From among the one or more data routing configurations specified by the network topology data, a particular data routing configuration is identified that is associated with the original node device that has been removed from the mesh network. Data that specifies the particular data routing configuration that is associated with the original node device that has been removed from the mesh network is provided to the replacement node device.
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
H04L 41/12 - Discovery or management of network topologies
Systems and techniques are described for cataloging objects in a property using a drone. In some implementations, a system monitors a property that includes a drone configured to survey the property. A control unit accesses data identifying items and provides instructions to the drone to locate the items. The control unit receives data identifying a location of a portion of the items, image data associated with each identified items, and data indicating remaining items not located. In response, the data identifying the remaining items and data indicating that the drone did not locate the remaining portion of the items are transmitted to a client device. The control unit receives data indicating a location within the property of a first group of the remaining portion of the items and data indicating that a second group of the remaining portion of the items are not located within the property.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a power sequencing technique implemented using circuitry for powering a chime that outputs audio in response to a trigger event. An integrated circuit of a video doorbell receives a first power signal from a source and generates a half-wave pulse for a power sharing sequence of the circuit, based on the first power signal. The generated half-wave pulse is interrupted and the circuit generates a second power signal that causes the chime to initiate outputting the audio. The second power signal corresponds to the first power signal and is generated in response to interrupting the half-wave pulse. The circuit resumes generating the half-wave pulse to power the chime using the power sharing sequence after causing the chime to initiate outputting the audio using the second power signal.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a power sequencing technique.
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
G10K 1/062 - Devices in which sound is produced by striking a resonating body, e.g. bells, chimes or gongs the resonating device having the shape of a bell, plate, rod, or tube electrically operated
H04M 11/02 - Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
G10K 1/06 - Devices in which sound is produced by striking a resonating body, e.g. bells, chimes or gongs the resonating device having the shape of a bell, plate, rod, or tube
G10K 1/063 - Devices in which sound is produced by striking a resonating body, e.g. bells, chimes or gongs the resonating device having the shape of a bell, plate, rod, or tube electrically operated the sounding member being a bell
G10K 1/064 - Operating or striking mechanisms therefor
9.
SIMULTANEOUS PLAYBACK OF CONTINUOUS VIDEO RECORDINGS FROM MULTIPLE RECORDING DEVICES
Methods and systems, including computer programs encoded on a computer storage medium, are disclosed for simultaneous playback of continuous video recordings from multiple recording devices. A system obtains respective video data generated by multiple recording devices. Each video data includes multiple image frames. For each recording device: based on a time value, the system identifies events captured in the video data generated by the recording device. Based on an input variable corresponding to the events, the system: i) identifies an event stream that coincides with occurrence of a particular event captured in the video data; ii) determines a control value for segmenting image frames of the event stream; and iii) based on the control value, generates a video segment in response to isolating image frames of the event stream coinciding with the particular event. A graphical interface is generated that concurrently outputs each video segment for each recording device.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing a thermostat-based demand response event. In one aspect, a method includes accessing, for sites, historical readings of HVAC activity, indoor temperature, and outdoor temperature and building a model for each of the sites using the historical readings of HVAC activity, indoor temperature, and outdoor temperature. The method also includes using a simulation engine to achieve a target load shed and load reduction shape for a thermostat-based demand response event, and performing the thermostat-based demand response event based on results of the simulation engine.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for monitoring an HVAC system. One of the methods includes receiving pressure data from one or more sensors monitoring a supply air duct of an HVAC system at a property that indicates a pressure in the HVAC system; determining, using the pressure data, that the pressure satisfies a pressure threshold for the HVAC system; and in response to determining that the pressure satisfies the pressure threshold, adjusting an actuator-controlled damper between the supply air duct and a return air duct or adjusting a fan speed of the HVAC system.
F24F 11/49 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring ensuring correct operation, e.g. by trial operation or configuration checks
F24F 11/52 - Indication arrangements, e.g. displays
F24F 11/64 - Electronic processing using pre-stored data
F24F 11/65 - Electronic processing for selecting an operating mode
F24F 11/72 - Control systems characterised by their outputsConstructional details thereof for controlling the supply of treated air, e.g. its pressure
F24F 11/79 - Control systems characterised by their outputsConstructional details thereof for controlling the supply of treated air, e.g. its pressure for controlling the direction of the supplied air
F24F 11/80 - Control systems characterised by their outputsConstructional details thereof for controlling the temperature of the supplied air
F24F 11/81 - Control systems characterised by their outputsConstructional details thereof for controlling the temperature of the supplied air by controlling the air supply to heat-exchangers or bypass channels
F24F 13/00 - Details common to, or for air-conditioning, air-humidification, ventilation or use of air currents for screening
Systems and techniques are described for monitoring energy use habits of consumers. In some implementations, a method includes obtaining temperature data from a monitored property. An energy model of the monitored property is generated based on the obtained temperature data. The current temperature data is obtained from the monitored property. The current temperature data is provided to the generated energy model to generate a duty-cycle for turning an HVAC system of the monitored property off an on during the on-peak hours. The HVAC system of the monitored property is instructed to cycle off and on during the on-peak hours based on the generated duty-cycle.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for an emergency management system. One of the methods includes receiving, for each of a plurality of properties in a geographic region and during an emergency in a first subregion of the geographic region having a first property, sensor data from sensors located at the respective property. The plurality of properties includes the first property and a second property. A risk score is generated for a second geographic region that indicates a likelihood that properties will be impacted by the emergency. In response, the method determines whether the risk score satisfies a score threshold, the method proceeds by determines a safe zone that indicates a physical location at which a risk of injury is reduced and presents a pathway on a map displayed on a user device to the safe zone.
Video monitoring and alarm verification technology, in which a first connection is established between a first device and a camera located in a monitored property associated with a user of the first device and image data captured by the camera is received over the first connection and at the first device. A determination is made to establish a second connection with a second device that enables sharing of the received image data with the second device and, in response to the determination, the second connection is established between the first device and the second device. The received image data is shared with the second device over the second connection and the second device is restricted from directly accessing image data captured by the camera located in the monitored property.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
In some implementations, a system is capable of generating and distributing access credentials to users that access a rental property for a limited time period. Users can be provided with access to the rental property through an application or webpage portal without creating a new user account or user login for the application. For example, a user can be granted access to control electronic devices associated with a monitoring system of a rental property without creating a new user account with the monitoring system. Techniques described herein enable such users to more easily access, for example, rental property information that is associated with a monitoring system of the rental property. In this manner, access credentials can be distributed to users through any suitable means, e.g., through email or SMS, and used to temporarily authenticate users.
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing thermal modeling. In one aspect, a method includes receiving monitoring data comprising temperature data measured inside a site, mode data, and state data, receiving weather data descriptive of weather at the site, and aligning the received temperature data, mode data, and state data with the received weather data. The method also includes determining an internal heat gain representing an amount of heat generated at the site irrespective of the heating or cooling system, determining at least one of a thermal product for the site or a thermal potential for the heating or cooling system, generating, based on the internal gain and the thermal product or the thermal potential, a thermal model for the site, and providing, as output, the generated thermal model.
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
G05B 17/02 - Systems involving the use of models or simulators of said systems electric
F24F 11/46 - Improving electric energy efficiency or saving
F24F 11/52 - Indication arrangements, e.g. displays
F24F 11/58 - Remote control using Internet communication
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for enhanced property access with video analytics. In some implementations, images of a first area captured by a camera are obtained. A number of persons in the first area is determined from the images. Data indicating one or more unique identifications is received. A number of persons who are authorized to access a second area are determined. Access is provided to the second area.
G07C 9/15 - Movable barriers with registering means with arrangements to prevent the passage of more than one individual at a time
G06T 7/70 - Determining position or orientation of objects or cameras
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G07C 9/24 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a handwritten signature
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing load reduction optimization. In one aspect, a method includes accessing load reduction parameters for a load reduction event, accessing energy consumption models for multiple systems involved in the load reduction event, and performing, based on the load reduction parameters and the energy consumption models, a plurality of simulations of load reduction events that simulate variations in control parameters used to control the multiple systems. The method also includes optimizing, against a load reduction curve, the load reduction event by iteratively modifying the control parameters used in the plurality of simulations of load reduction events, and outputting the optimal load reduction event with optimized control parameters.
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
F24F 11/46 - Improving electric energy efficiency or saving
F24F 11/58 - Remote control using Internet communication
F24F 11/64 - Electronic processing using pre-stored data
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing temporary use of an on-line non-downloadable software simulator tool to service providers for the calculation of the cumulative value of their customer account portfolio based on expected remaining lifetime
20.
DRONE WIRELESS COMMUNICATION DIAGNOSIS AND CORRECTION
Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to identify a wireless network problem and initiate performance of one or more operations or actions that address the wireless network problem, the drone comprising a processor and a storage device, the storage device storing instructions that, when executed by the processor, cause the processor to perform operations comprising receiving, by the drone, an instruction to analyze a wireless network of a property, responsive to the instruction to analyze the wireless network, traveling, by the drone, to one or more zones of the property, determining, by the drone and based on an analysis of one or more characteristics of the wireless network, that a wireless network problem exists, and based on the determination that the wireless network problem exists, performing, by the drone, one or more operations directed to addressing the wireless network problem.
H04W 24/04 - Arrangements for maintaining operational condition
B64U 101/21 - UAVs specially adapted for particular uses or applications for use as communications relays, e.g. high altitude platforms for providing Internet access
A monitoring system is disclosed. The monitoring system includes a monitoring server that is configured to receive a personally identifying code from a visitor to a property monitored by the monitoring system. The monitoring system includes one or more sensors that transmit sensor data to the monitoring server and that are configured to capture a biometric identifier from the visitor to the property monitored by the monitoring system. The monitoring system is configured to compare the received personally identifying code to a stored personally identifying code. The monitoring system is configured to compare the received biometric identifier to a stored biometric identifier. The monitoring system is configured to determine a likelihood that the visitor is the known person. The monitoring system is configured to determine that the likelihood that the visitor is the known person does not satisfy a threshold. The monitoring system is configured to generate an alarm condition.
Landing pads for a drone. One of the landing pads can include a landing area with a first surface configured to receive a second surface of a landing gear of a drone; a docking area i) with a first end adjacent to the landing area and a second opposite end and ii) a docking surface configured to contact the second surface of the landing gear of the drone; a fixed member i) with a third surface adjacent to the second end of the docking area and ii) configured to contact an end of the landing gear of the drone; a moveable member configured to i) move the landing gear across the first surface of the landing area onto the docking surface and ii) secure the landing gear of the drone in place between the docking surface of the docking area and the third surface of the fixed member.
Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to pre-surveil a portion of a property. In one aspect, a system may include a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include obtaining data that is indicative of one or more acts of an occupant of the property, applying the obtained data that is indicative of one or more acts of the occupant of the property to a pre-surveillance rule, determining that the pre-surveillance rule is satisfied, determining a drone navigation path that is associated with the pre-surveillance rule, transmitting, to a drone, an instruction to perform pre-surveillance of the portion of the one or more properties using the drone navigation path.
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
B64U 10/14 - Flying platforms with four distinct rotor axes, e.g. quadcopters
B64U 80/25 - Transport or storage specially adapted for UAVs with arrangements for servicing the UAV for recharging batteriesTransport or storage specially adapted for UAVs with arrangements for servicing the UAV for refuelling
B64U 101/31 - UAVs specially adapted for particular uses or applications for imaging, photography or videography for surveillance
G06V 10/147 - Details of sensors, e.g. sensor lenses
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for selecting a video quality. One of the methods includes: determining, for a repeating time range of a video with a first video quality, a frequency with which one or more portions of the video were accessed, each portion for a corresponding one of one or more past instances of the repeating time range; selecting, for the repeating time range and using the frequency with which the portion of the video for the repeating time range was accessed, a second video quality from two or more video qualities that includes the first video quality; and storing, in memory, one or more additional portions of the video i) captured by a camera during future instances of the repeating time range ii) at the second video quality.
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
H04N 21/845 - Structuring of content, e.g. decomposing content into time segments
Techniques are described for configuring a monitoring system to assist users during a detected emergency condition at a property. In some implementations, sensor data from one or more sensors that are located at the property are obtained by a monitoring system that is configured to monitor the property. A determination that there is an emergency condition at the property is made by the monitoring system based on the sensor data, determining. A location of a person inside the property is determined by the monitoring system based on the sensor data. A first path to the person and a second path to guide the person away from the emergency condition are determined by the monitoring system. The first path to the person and the second path to guide the person away from the emergency condition are navigated by a computing device of the monitoring system.
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
Various embodiments described herein provide for analysis of a video using a scanning technique. According to some embodiments, a video is analyzed by scanning a region of interest in a series of frames of the video, and generating a composite image based on the pixels captured by the scanning operation.
G06V 10/22 - Image preprocessing by selection of a specific region containing or referencing a patternLocating or processing of specific regions to guide the detection or recognition
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for lighting adaptive navigation. In some implementations, a method includes receiving map data associated with a property; obtaining sensor data; based on the map data and the sensor data, determining a lighting scenario; and based on the lighting scenario, configuring the robotic device.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for multi-person authentication and access control. One of the methods includes determining, by a system and using sensor data i) captured by one or more sensors and ii) that is different data than input data captured by one or more input devices, whether a number of people, who performed corresponding input actions, satisfies an access criteria a) for accessing a critical function and b) that requires two or more predetermined input actions; and performing, by the system, an action for the critical function in response to determining whether the number of people, who performed corresponding input actions, satisfies the access criteria a) for accessing the critical function and b) that requires the two or more predetermined input actions.
Methods, systems, and apparatus, including computer programs encoded on a storage device, are disclosed. A system performs operations including receiving sensor data from a sensor of a property monitored by a monitoring system, and based on the sensor data, determining a first event and a second event that have occurred at the property. The operations include determining that the monitoring system is not able to communicate with an outside network, and classifying the first event as a high priority event and the second event as a low priority event. The operations include determining that a mobile device is able to receive data from the monitoring system; and providing, to the mobile device, data indicating the first event and an instruction to transmit the data indicating the first event to a server upon the mobile device being able to communicate with the outside network.
09 - Scientific and electric apparatus and instruments
Goods & Services
Security deterrent devices for personal security and home security triggered by an alarm monitoring system or remote panic button, which emits a non-toxic fog that hinders or eliminates the line of sight or visibility of intruders
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for mesh network connection quality testing. In some implementations, a method for mesh network connection quality testing includes transmitting, by a control unit of a monitoring system that is configured to monitor a property, test data to a first connected component of the monitoring system; in response to transmitting the test data, receiving, by the control unit, response data from the first connected component of the monitoring system; based on the response data, determining, by the control unit, a link quality indicator that reflects a strength of a connection between the control unit and the first connected component; and based on the link quality indicator, adjusting, by the control unit, one or more settings of the connection between the control unit and the first connected component.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for receiving a request to deploy an aerial drone to assist an emergency vehicle from a first location to a second location; determining a route to be traversed by the emergency vehicle from the first location to the second location based on the request; and deploying the aerial drone to traverse the route in advance of the emergency vehicle.
Methods, systems, and apparatus, including computer programs encoded on a storage device, for triggering an alarm during a sensor jamming attack. In one aspect, a monitoring system sensor unit is disclosed that includes a sensor, a communication unit configured to communicate with a monitoring system using a range of frequencies, and a jamming detection unit. The jamming detection unit may include a processor and a computer storage media storing instructions that, when executed by the processor, cause the processor to perform operations. The operations include detecting a sensor jamming event, selecting a different form of communication other than the range of radio frequencies for the communication unit to communicate with the monitoring system, and providing, to the communication unit, an instruction to communicate with the monitoring system using the form of communication, wherein the communication unit may communicate, to the monitoring system using the form of communication, the sensor data.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
A circuit is described for powering a chime that outputs audio in response to detection of an entity by a video doorbell. The circuit includes a power source for generating a first signal. A first switch is coupled to the power source. The first switch is configured to provide, in response to the first signal, a first direct-current (DC) voltage signal during a first operating mode where the video doorbell receives an input that triggers actuation of the chime in response to detection of the entity. A second switch is coupled to the power source and the first switch. The second switch is configured to provide, in response to the first signal, a second DC voltage signal during a second operating mode where the chime outputs the audio in response to the input that triggers actuation of the chime in response to detection of the entity.
H02M 1/14 - Arrangements for reducing ripples from DC input or output
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
H02M 7/219 - Conversion of AC power input into DC power output without possibility of reversal by static converters using discharge tubes with control electrode or semiconductor devices with control electrode using devices of a triode or transistor type requiring continuous application of a control signal using semiconductor devices only in a bridge configuration
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for visual authentication. In some implementations, a method may include obtaining images of a person at a property; detecting a discontinuity in an appearance of the person in the images of the person at the property; determining that the discontinuity does not correspond to a known occlusion; and providing an indication of a potential spoofing attack.
G06V 40/40 - Spoof detection, e.g. liveness detection
G06V 10/40 - Extraction of image or video features
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
A monitoring system is configured to monitor a property. The monitoring system includes a camera, a sensor, and a monitor control unit. The monitor control unit is configured to receive image data and sensor data. The monitor control unit is configured to determine that the image data includes a representation of a person. The monitor control unit is configured to determine an orientation of a representation of a head of the person. The monitor control unit is configured to determine that the representation of the head of the person likely includes a representation of a face of the person. The monitor control unit is configured to determine that the face of the person is likely concealed. The monitor control unit is configured to determine a malicious intent score that reflects a likelihood that the person has a malicious intent. The monitor control unit is configured to perform an action.
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions
G06V 40/20 - Movements or behaviour, e.g. gesture recognition
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating verbal message. One of the methods includes: receiving sensor data indicating attributes of a person at a physical property; determining, using the sensor data, that a likelihood that a conversation should be initiated with the person satisfies a first likelihood threshold; determining, using first data from the sensor data, a deterrence strategy with a second likelihood threshold of causing the person to leave the physical property; generating, using second data from the sensor data and the deterrence strategy, a verbal message that is a) for the person and b) has the second likelihood threshold; and providing, to a presentation device, a command to cause the presentation device to present the verbal message.
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
Health and wellness management technology, in which events that relate to activity within the monitored property are sensed based on output from sensors located at a monitored property. Behaviors are detected based on the sensed events that relate to activity within the monitored property and, in accordance with the detected behaviors, one or more models are created based on a likelihood of similarly expressed events happening at similar times with similar characteristics. Additional behaviors detected after creation of the one or more models are evaluated against the one or more models to determine whether the additional behaviors are consistent with the one or more models. At least one action is performed based on the determination of whether the additional behaviors are consistent with the one or more models.
G16H 50/20 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for computer-aided diagnosis, e.g. based on medical expert systems
G06F 17/18 - Complex mathematical operations for evaluating statistical data
G16H 50/50 - ICT specially adapted for medical diagnosis, medical simulation or medical data miningICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for simulation or modelling of medical disorders
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating verbal message. One of the methods includes: receiving sensor data indicating attributes of a person at a physical property; determining, using the sensor data, that a likelihood that a conversation should be initiated with the person satisfies a first likelihood threshold; determining, using first data from the sensor data, a deterrence strategy with a second likelihood threshold of causing the person to leave the physical property; generating, using second data from the sensor data and the deterrence strategy, a verbal message that is a) for the person and b) has the second likelihood threshold; and providing, to a presentation device, a command to cause the presentation device to present the verbal message.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for implementing a smart firearm safety device. The safety device attaches to a firearm having a trigger and a slot for receiving a magazine. The safety device includes a locking mechanism that attaches to the trigger to preclude depressing a trigger of the firearm and a sensor that determines an orientation of the firearm or a relative motion of the firearm to indicate detected movement of the firearm. The safety device also includes a radio device that receives parameter signals from the sensor indicating movement of the firearm. The radio device communicates with a component of a property monitoring system to receive a command to engage the locking mechanism to preclude depressing the trigger of the firearm based on parameter signals indicating a particular type of detected movement of the firearm.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Anti-intrusion alarms; Alarm monitoring systems; Home and office automation systems comprising wireless and wired controllers, control devices, and downloadable software for safety, lighting and shades, HVAC, security, video surveillance, energy management, doors and gates, electrical power, appliances, motion detection, leak and flood detection, and smoke and carbon monoxide monitoring and control applications; Security control panels and motion detectors; Video cameras; Camera hardware systems for IP (Internet protocol) video surveillance; Motion sensors and monitoring equipment, namely, video monitors and video cameras for monitoring the interior and exterior of homes, retail stores, offices and other structures for security and surveillance; Electronic magnetic sensors for doors and gates; Computer hardware for the monitoring and management of electronic and magnetic door and gate sensors; Thermostats; Climate control systems consisting of digital thermostats, air conditioning, heating, ventilation and drying control devices; Downloadable software in the nature of a mobile application for use connecting, operating, integrating, controlling, and managing networked consumer electronic devices; Downloadable software in the nature of a mobile application for monitoring, operating, and automating home, office and environmental control systems Software-as-a-service (SAAS) services featuring computer software for use with connecting, operating, integrating, controlling, and managing networked consumer electronic devices; Software-as-a-service (SAAS) services featuring computer software for monitoring, operating, and automating home, office and environmental control systems Electronic monitoring services, namely, monitoring of home and office security systems and automation systems for protecting residential and commercial properties; security services for residential and commercial properties, namely, security monitoring services for protecting physical properties provided via remote monitoring systems; providing a website featuring information about physical safety, home security, and crime prevention
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for or regaining connectivity between devices. One of the methods includes: determining, using network radio data from a network radio for a device that was connected to another device using the network radio, that the device is disconnected from the other device; in response to determining that the device is disconnected from the other device using the network radio, determining configuration data i) for the device ii) that indicates changes to data on the device to cause the device to increase a likelihood of regaining connectivity with the other device using the network radio; and using the configuration data to cause the device to change the data on the device to increase the likelihood of regaining connectivity with the other device using the network radio.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for or regaining connectivity between devices. One of the methods includes: determining, using network radio data from a network radio for a device that was connected to another device using the network radio, that the device is disconnected from the other device; in response to determining that the device is disconnected from the other device using the network radio, determining configuration data i) for the device ii) that indicates changes to data on the device to cause the device to increase a likelihood of regaining connectivity with the other device using the network radio; and using the configuration data to cause the device to change the data on the device to increase the likelihood of regaining connectivity with the other device using the network radio.
Techniques are described for providing remote device (e.g., thermostat, lighting, appliance, etc.) control and/or energy monitoring. A system monitors sensor data captured by one or more sensors that sense attributes relevant to user presence at one or more monitored properties and status of one or more energy consuming devices associated with the one or more monitored properties. The system analyzes the monitored sensor data and the monitored device status with respect to a set of one or more rules and performs an operation related to controlling the one or more energy consuming devices based on the analysis of the monitored sensor data and the monitored device status with respect to the set of one or more rules.
A monitoring system is configured to monitor a property. The system includes a sensor that is configured to generate sensor data that reflects an attribute of the property. The system further includes an HVAC system that is configured to generate and provide conditioned air to the property and that is configured to generate HVAC system data that reflects an attribute of the HVAC system. The system includes a monitor control unit that is configured to determine that the HVAC system is likely malfunctioning. The control unit is configured to receive the sensor data. The control unit is configured to determine that the HVAC system is likely operating correctly. The control unit is configured to determine a cause of the HVAC system transitioning from likely malfunctioning to likely operating correctly. The control unit is configured to update a model that is configured to identify causes of HVAC system malfunctions.
An aberration engine that collects data sensed by a monitoring system that monitors a property of a user and aggregates the collected data over a period of a time. The aberration engine detects, within the aggregated data, patterns of recurring events and, based on detecting the patterns of recurring events within the aggregated data, takes action related to the monitoring system based on the detected patterns of recurring events within the aggregated data.
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 31/00 - Predictive alarm systems characterised by extrapolation or other computation using updated historic data
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
Rental property management technology, in which reservation data is accessed on a rental property management server, and a request from a mobile device for an upcoming reservation at a property is detected. In response to detecting the request, the rental property management server confirms the upcoming reservation based on the accessed reservation data. In response to confirming the upcoming reservation, the reservation management server generates a unique access code. The rental property management server transmits the unique access code to the mobile device and to a monitoring system on the property. The rental property management server also transmits data to the monitoring system indicating that the unique access code grants access to the property.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for implementing an unmanned aerial vehicle or drone with ducted fans. The drone includes a housing having a first surface and multiple ducts that each extend from the first surface to a second surface of the housing. The first surface is substantially flat. A respective fan assembly is installed in each of the ducts. The drone includes an internal cavity at a location intermediate two respective ducts and circuitry positioned in the internal cavity. The circuitry is operable to generate control signals used to operate the respective fan assemblies.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for performing privacy-aware surveillance with a security camera drone. The drone obtains image data using an imaging device and processes the image data to detect an object external to the drone. In response to processing the image data, the drone determines multiple viewing angles indicated in the image data with respect to the object. Based on the image data and the multiple viewing angles, a first section of the area for surveillance and a second, different section of the area to be excluded from surveillance are identified. The drone determines an adjustment to at least one of the multiple viewing angles to cause the second section to be excluded from surveillance. Based on the adjustment, the drone controls the imaging device to exclude the second section from surveillance imagery obtained by the drone.
Techniques are described for presenting events detected by a monitoring system. A system receives a selection of a particular time period, identifies security events detected by a monitoring system during the selected time period, and classifies a subset of the identified security events as abnormal events. The system further generates a density of the identified security events over the selected time period, generates a density of the subset of the identified security events classified as abnormal events, and identifies monitoring system data associated with the selected time period. The system additionally generates a graphical representation of the density of the identified security events, the density of the subset of the identified security events classified as abnormal events, and the identified monitoring system data, and provides the graphical representation for display.
G06T 11/20 - Drawing from basic elements, e.g. lines or circles
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G08B 5/22 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for sensor timing correlation. One of the methods includes obtaining (i) first sensor data from a first sensor and (ii) second sensor data from a second sensor; detecting a representation of an object in both the first sensor data and the second sensor data; determining a predicted physical distance between a first representation of the object in the first sensor data and a second representation of the object in the second sensor data; determining a timing offset between the different sensors using the predicted physical distance between the first representation of the object and the second representation of the object; and adjusting, using the timing offset, subsequent data from the first sensor or the second sensor.
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one aspect, a system includes a virtual reality headset, a plurality of cameras, a plurality of sensors that includes a first sensor, a control unit, wherein the control unit includes a network interface, a processor, a storage device that includes instructions to perform operations that comprise receiving data from the first sensor that is indicative of an alarm event, determining a location of the first sensor, identifying a set of one or more cameras from the plurality of cameras that are associated with the first sensor, selecting a particular camera from the identified set of one or more cameras; and transmitting one or more instructions to the particular camera that command the particular camera to stream a live video feed to a user interface of the virtual reality headset.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G02B 27/00 - Optical systems or apparatus not provided for by any of the groups ,
Methods, systems, and apparatus, including computer programs encoded on a non-transitory computer storage medium, for receiving user-defined routes, each user-defined route including a tripwire of multiple tripwires and a direction, where each user-defined route includes an action of multiple actions executed by a sub-system of a home monitoring system, detecting a first signal at a first tripwire including a first direction, determining a set of user-defined routes including the first tripwire and the first direction, detecting a second signal at a second tripwire including a second direction, determining a particular user-defined route of the set of user-defined routes including the first tripwire and the first direction and the second tripwire and the second direction, determining an action executed by a sub-system of the home monitoring system for the particular user-defined route traversed by a user, and triggering execution of the action based on the second signal at the second tripwire.
A smart bar lock that includes a pole with a length that corresponds to a length of an area that a sliding portion of a sliding door slides along, a motorized hinge coupled to an end of the pole, where the motorized hinge is configured to rotate to the pole by the end of the pole, and a processor. The processor is configured to perform operations of determining to lock the sliding door, moving the pole from a vertical position into a horizontal position with the motorized hinge, determining to unlock the sliding door while leaving the sliding door closed, and moving the pole into the vertical position with the motorized hinge.
B60J 5/06 - Doors arranged at the vehicle sides slidableDoors arranged at the vehicle sides foldable
E04H 12/18 - TowersMasts or polesChimney stacksWater-towersMethods of erecting such structures movable or with movable sections, e.g. rotatable or telescopic
E05B 65/08 - Locks for special use for sliding wings
E05C 19/00 - Other devices specially designed for securing wings
G07C 9/00 - Individual registration on entry or exit
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for property communication and access control. In some implementations, a corresponding method includes receiving a data sequence input from a property related to an event at the property; comparing the data sequence input to one or more sequence templates to determine a matching sequence template; based on the matching sequence template, determining one or more relevant actions to be performed; performing the one or more relevant actions using the data sequence input; and providing feedback related to the event or the one or more relevant actions.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing load reduction optimization. In one aspect, a method includes accessing load reduction parameters for a load reduction event, accessing energy consumption models for multiple systems involved in the load reduction event, and performing, based on the load reduction parameters and the energy consumption models, a plurality of simulations of load reduction events that simulate variations in control parameters used to control the multiple systems. The method also includes optimizing, against a load reduction curve, the load reduction event by iteratively modifying the control parameters used in the plurality of simulations of load reduction events, and outputting the optimal load reduction event with optimized control parameters.
H02J 3/00 - Circuit arrangements for ac mains or ac distribution networks
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
F24F 11/64 - Electronic processing using pre-stored data
F24F 11/58 - Remote control using Internet communication
A monitoring system that is configured to monitor a property is disclosed. The monitoring system includes a sensor that is configured to generate sensor data that reflects an attribute of the property; a solar panel that is configured to generate and output power; and a monitor control unit. The monitor control unit is configured to: monitor the power outputted by the solar panel; determine that the power outputted by the solar panel has deviated from an expected power range; based on determining that the power outputted by the solar panel has deviated from the expected power range, access the sensor data; based on the power outputted by the solar panel and the sensor data, determine a likely cause of the deviation from the expected power range; and determine an action to perform to remediate the likely cause of the deviation from the expected power range.
H02S 50/00 - Monitoring or testing of PV systems, e.g. load balancing or fault identification
F24S 50/20 - Arrangements for controlling solar heat collectors for tracking
G01S 3/786 - Systems for determining direction or deviation from predetermined direction using adjustment of orientation of directivity characteristics of a detector or detector system to give a desired condition of signal derived from that detector or detector system the desired condition being maintained automatically
G01R 31/00 - Arrangements for testing electric propertiesArrangements for locating electric faultsArrangements for electrical testing characterised by what is being tested not provided for elsewhere
Methods, systems, and apparatus for monitoring humidity at a property are disclosed. A monitoring system performs operations including: obtaining, from multiple humidity sensors within the property, humidity data; obtaining occupancy data that indicates whether people are within the property; determining, based on the humidity data and the occupancy data, that humidity in a first area of the property changed more relative to a change in humidity in a second area of the property during a time period when no person was present in the first area and no person was present in the second area; and in response to determining that humidity in the first area changed more relative to a change in humidity in a second area of the property during the time period, providing an indication of a water leak in the first area of the property to a user.
G01M 3/16 - Investigating fluid tightness of structures by using fluid or vacuum by detecting the presence of fluid at the leakage point using electric detection means
G01S 19/01 - Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
G01P 13/00 - Indicating or recording presence or absence of movementIndicating or recording of direction of movement
H04Q 9/00 - Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
F24H 9/20 - Arrangement or mounting of control or safety devices
60.
INTEGRATED SECURITY FOR MULTIPLE ACCESS CONTROL SYSTEMS
Systems and techniques are described for an integrated security environment to monitor activities at a commercial facility and a residential facility. In some implementations, a monitoring system monitors a property that includes one or more sensors located at the property and generate sensor data. A monitor control unit receives and analyzes the sensor data. Based on analyzing the sensor data, the monitor control unit determines that an event has likely occurred at the property and generates data indicating that the event has likely occurred at the property. A monitoring server receives the data indicating the event has likely occurred at the property. Based on the data that the event has likely occurred at the property, transmitting, to an additional monitoring system that is configured to monitor an additional property, instructions for the additional monitoring system to perform an action.
Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 19/00 - Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G07C 9/00 - Individual registration on entry or exit
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06V 40/10 - Human or animal bodies, e.g. vehicle occupants or pedestriansBody parts, e.g. hands
G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for adjusting an indoor humidity at a property. One of the methods includes determining an estimated outdoor temperature in an area around a property; determining, using the estimated outdoor temperature, a target indoor humidity for the property; accessing data about the property; predicting, using the data about the property, whether an indoor humidity of the property will likely change within a threshold time period; determining, using the target indoor humidity and the prediction whether the indoor humidity of the property will likely change within the threshold time period, whether to adjust the indoor humidity of the property; and in response to determining to adjust the indoor humidity of the property, controlling, using the target indoor humidity, humidity equipment at the property to cause an indoor humidity at the property to move toward the target indoor humidity.
Methods, systems, and apparatus for periodic water leak detection are disclosed. A method includes obtaining, using a water meter, water meter data representing the occurrence of water usage events at a property; determining, based on the water meter data, a periodicity of water usage events; determining that the periodicity of water usage events satisfies water leak criteria; and based on determining that the periodicity of water usage events satisfies water leak criteria, determining that a water leak exists at the property. Determining the periodicity of water usage events can include determining an average time between a start of sequential water usage events; and determining that the periodicity of water usage events satisfies water leak criteria can include determining that the average time between the start of sequential water usage events is less than a threshold time between the start of sequential water usage events.
G01M 3/26 - Investigating fluid tightness of structures by using fluid or vacuum by measuring rate of loss or gain of fluid, e.g. by pressure-responsive devices, by flow detectors
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for adjusting an indoor humidity at a property. One of the methods includes determining an estimated outdoor temperature in an area around a property; determining, using the estimated outdoor temperature, a target indoor humidity for the property; accessing data about the property; predicting, using the data about the property, whether an indoor humidity of the property will likely change within a threshold time period; determining, using the target indoor humidity and the prediction whether the indoor humidity of the property will likely change within the threshold time period, whether to adjust the indoor humidity of the property; and in response to determining to adjust the indoor humidity of the property, controlling, using the target indoor humidity, humidity equipment at the property to cause an indoor humidity at the property to move toward the target indoor humidity.
F24F 11/30 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring
G05B 13/04 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric involving the use of models or simulators
A robotic rover that is configured to monitor a property is disclosed. In one aspect, the rover includes a sensor that is configured to generate sensor data. The rover further includes a processor that is configured to analyze the sensor data. The processor is further configured to determine that an unwanted animal is located at the property. The processor is further configured to generate an instruction to navigate the drone towards the unwanted animal. The rover further includes a motor that is configured to navigate the drone towards the unwanted animal in response to the instruction to navigate the drone towards the unwanted animal. The processor is further configured to generate an instruction to activate a device that is configured to encourage the unwanted animal to leave the property.
Methods, systems, and apparatus, including computer programs encoded on a storage device, for a monitoring system that is configured to monitor a property. The monitoring system may include a sensor that is configured to generate sensor data that reflects an attribute of the property, a microphone that is connected to a pipe and that is configured to detect audio data associated with the pipe, and a monitor control unit. The monitor control unit is configured to receive the sensor data and the audio data, provide the sensor data and the audio data as inputs to a model that is trained to determine that a device connected to the pipe is being used, receive, from the model, data indicating that the device connected to the pipe is being used, and based on determining that the device connected to the pipe is being used, perform a monitoring system action.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are described for performing privacy-aware surveillance with a security camera drone. The drone obtains image data using an imaging device and processes the image data to detect an object external to the drone. In response to processing the image data, the drone determines multiple viewing angles indicated in the image data with respect to the object. Based on the image data and the multiple viewing angles, a first section of the area for surveillance and a second, different section of the area to be excluded from surveillance are identified. The drone determines an adjustment to at least one of the multiple viewing angles to cause the second section to be excluded from surveillance. Based on the adjustment, the drone controls the imaging device to exclude the second section from surveillance imagery obtained by the drone.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, are disclosed for implementing a smart dehum circuit that powers a chime which outputs audio in response to detection of a trigger event by a video doorbell. The circuit includes a detector circuit configured to generate a power signal in response to determining that an output voltage signal of a first circuit exceeds a threshold voltage. The circuit also includes a microcontroller coupled to the detector circuit. The microcontroller is configured to generate a chime power signal based on the power signal of the detector circuit. The chime power signal is generated to power the chime in response to detection of the trigger event by the video doorbell.
H04M 11/02 - Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
G08B 3/10 - Audible signalling systemsAudible personal calling systems using electric transmissionAudible signalling systemsAudible personal calling systems using electromagnetic transmission
Methods, systems, and apparatus, including computer programs encoded on a storage device, for monitoring a vehicle are disclosed. A vehicle monitoring system for monitoring a vehicle includes one or more processors and one or more computer storage media storing instructions that are operable, when executed by the one or more processors, to cause the one or more processors to perform operations. The operations include: receiving, from a vehicle occupancy monitor and by the vehicle monitoring system, vehicle occupancy data that indicates presence of a vehicle occupant; receiving, by the vehicle monitoring system and from a sensor, sensor data that indicates an attribute of the vehicle; analyzing, by the vehicle monitoring system, the vehicle occupancy data and the sensor data; and based on analyzing the vehicle occupancy data and the sensor data, performing a vehicle monitoring system action.
B60R 21/015 - Electrical circuits for triggering safety arrangements in case of vehicle accidents or impending vehicle accidents including means for detecting the presence or position of passengers, passenger seats or child seats, e.g. for disabling triggering
B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided forArrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
B60N 2/00 - Seats specially adapted for vehiclesArrangement or mounting of seats in vehicles
G08B 21/02 - Alarms for ensuring the safety of persons
B60W 40/08 - Estimation or calculation of driving parameters for road vehicle drive control systems not related to the control of a particular sub-unit related to drivers or passengers
G06V 20/59 - Context or environment of the image inside of a vehicle, e.g. relating to seat occupancy, driver state or inner lighting conditions
70.
Extending learning of artificial intelligent systems
Methods, systems, and apparatus for extended training data sets for neural network-based IT solutions. In one aspect, a method includes collecting, support data generated during multiple support events including a corpus of articles referenced during the support event. Within the corpus of articles, restricted and unrestricted articles referenced in the support data and restricted and unrestricted articles not referenced in the support data are identified. Embedded vectors are generated for each article that is referenced in the support data from the article and a subset of the support data that references the article, and for each article that is not referenced by the support data, an embedded vector from only the article. A dimensionality of the embedded vectors is reduced and a neural network is trained using the embedded vectors to select a particular article of the corpus of articles responsive to a new support event.
Methods, systems, and apparatus, including computer programs encoded on a storage device, for identifying one or more water dispensing appliances that are currently using water. In one aspect, the method includes actions of obtaining a dispensing appliance signature, obtaining water consumption data that is based on first sensor data from a first sensor that is installed at the property, identifying a particular water dispensing appliance from among multiple different water dispensing appliances located at the property based on an analysis of (i) the water dispensing appliance signature and (ii) the water consumption data, and responsive to identifying the particular water dispensing appliance located at the property based on an analysis of (i) the water dispensing appliance signature and (ii) the water consumption data, generating output data based on the one or more particular water dispensing appliances that were identified.
Video monitoring and alarm verification technology, in which a first connection is established between a first device and a camera located in a monitored property associated with a user of the first device and image data captured by the camera is received over the first connection and at the first device. A determination is made to establish a second connection with a second device that enables sharing of the received image data with the second device and, in response to the determination, the second connection is established between the first device and the second device. The received image data is shared with the second device over the second connection and the second device is restricted from directly accessing image data captured by the camera located in the monitored property.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Alarm system technology, in which an alarm event is detected at a property monitored by an alarm system when the alarm system was set in an armed state. Based on detection of the alarm event, an alarm probability score that indicates a likelihood of the alarm event being an emergency situation is determined and the alarm event is handled based on the determined alarm probability score.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for integrating a monitoring system with one or more air quality sensors. The method includes receiving data indicating a level of volatile organic compounds within an area, determining an increase in the level of volatile organic compounds within the area, receiving video data that shows the area, detecting, from the video data, a new item of furniture within the area, sending a notification that indicates an increase in the level of volatile organic compounds is likely caused by the new item of furniture.
G01N 33/00 - Investigating or analysing materials by specific methods not covered by groups
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a security system with dynamic insurance integration. In some implementations, a security token is generated in response to a user requesting a risk assessment. The security token is provided to a third-party server. A request from the third-party server for monitoring data collected by a security system associated with the user is received. Monitoring data is provided to the third-party server. An indication of the risk assessment from the third-party server is received.
Systems and techniques are described for monitoring energy use habits of consumers. In some implementations, a method includes obtaining temperature data from a monitored property. An energy model of the monitored property is generated based on the obtained temperature data. The current temperature data is obtained from the monitored property. The current temperature data is provided to the generated energy model to generate a duty-cycle for turning an HVAC system of the monitored property off an on during the on-peak hours. The HVAC system of the monitored property is instructed to cycle off and on during the on-peak hours based on the generated duty-cycle.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for monitoring air quality with multiple sensing devices. The methods, systems, and apparatus include actions of: obtaining first sensor data from a sensor that is not an air quality sensor, determining that the first sensor data satisfy a first air quality criterion, in response to determining that the first sensor data satisfy the first air quality criterion, obtaining second sensor data from an air quality sensor, determining that the second sensor data satisfy a second air quality criterion, and based on a determination that the second sensor data satisfy the second air quality criterion, activating an air quality device.
Techniques are described for configuring a monitoring system to assist users during a detected emergency condition at a property. In some implementations, sensor data from one or more sensors that are located at the property are obtained by a monitoring system that is configured to monitor the property. A determination that there is an emergency condition at the property is made by the monitoring system based on the sensor data, determining. A location of a person inside the property is determined by the monitoring system based on the sensor data. A first path to the person and a second path to guide the person away from the emergency condition are determined by the monitoring system. The first path to the person and the second path to guide the person away from the emergency condition are navigated by a computing device of the monitoring system.
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
B64U 101/00 - UAVs specially adapted for particular uses or applications
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for surveillance with security camera drone. In some implementations, a determination is made to begin surveillance of an in-house service with a drone. A duration of the in-house service is determined. A location to land the drone during the in-house service is determined based on the duration of the in-house service. Landing of the drone is initiated at the determined location.
Techniques are described for tracking intruders of a monitored property by the unique identifying characteristics or “digital fingerprints” of electronic devices carried by the intruders. A system detects an alarm event at a monitored property based on output from at least one sensor located at the monitored property. In response to detecting the alarm event at the monitored property, the system initiates a process to gather electronic identifiers for mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system determines electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event. The system stores in electronic storage, information indicating the determined electronic identifiers for the mobile electronic devices located within the monitored property at a time corresponding to the detected alarm event.
A method is described that determines that a replacement node device has been connected to a mesh network, the replacement node device corresponding to an original node that has been removed from the mesh network. In response to determining that the replacement node device has been connected to the mesh network, network topology data is accessed that specifies one or more data routing configurations that are each associated with a node device included in the mesh network. From among the one or more data routing configurations specified by the network topology data, a particular data routing configuration is identified that is associated with the original node device that has been removed from the mesh network. Data that specifies the particular data routing configuration that is associated with the original node device that has been removed from the mesh network is provided to the replacement node device.
H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
H04L 41/084 - Configuration by using pre-existing information, e.g. using templates or copying from other elements
H04L 41/12 - Discovery or management of network topologies
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for monitoring and operations of a wireless HVAC system. In some implementations, a method includes determining that a thermostat associated with the property is presently unavailable to send or receive a wireless communication; obtaining temperature data collected by one or more sensors located at the property; identifying one or more models for temperature monitoring at the property; determining an operation to be performed by an HVAC system based on the temperature data and the one or more models; and providing data indicating the operation to the HVAC system.
A computer implemented method includes receiving one or more user set preferences for detecting a hub alarm condition and one or more actions to perform in response to detecting a hub alarm condition, receiving, from the output of the security panel, data indicating that a traditional alarm condition occurred, based on receiving data indicating a traditional alarm condition occurred at the monitored property, receiving sensor data from at least one wireless sensor in a vicinity of a hardwired sensor associated with the traditional alarm condition, determining, based on the sensor data received from at least one wireless sensor in a vicinity of the hardwired sensor associated the traditional alarm condition, that the sensor data satisfies a condition, and in response to determining that the sensor data satisfies a condition, performing an action.
G08B 21/00 - Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Systems and techniques are described for pet monitoring during unattended delivery. In some implementations, a monitoring system monitors a property includes sensors located throughout the property and generates sensor data. A monitor control unit receives a first indication that a resident of the property will be receiving a delivery during a delivery time. Based on the sensor data and during the delivery time, the monitor control unit determines that a pet, that resides at the property, has been restrained. The monitor control unit provides, to a delivery person, a second indication that the pet at the property has been restrained.
G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinationsPosition-fixing by co-ordinating two or more distance determinations
G01S 19/14 - Receivers specially adapted for specific applications
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Systems and techniques are described for monitoring screen activity of a computing device and performing designated system actions based on the monitored activity. In some implementations, activity data indicating usage of a computing device by a user within a property over a particular time period is obtained. Sensor data collected by a monitoring system that monitors the property over the particular time period is then obtained. An activity monitoring rule that specifies (i) one or more conditions associated with usage of the computing device by the user, and (ii) an action to perform in response to satisfaction of the one or more conditions is identified. A determination that the activity data and the sensor data satisfy the one or more conditions specified by the activity monitoring rule is made. The action specified by the activity monitoring rule is then performed in response to the determination.
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for surveillance with security camera drone. In some implementations, a determination is made to begin surveillance of an in-house service with a drone. A duration of the in-house service is determined. A location to land the drone during the in-house service is determined based on the duration of the in-house service. Landing of the drone is initiated at the determined location.
B64U 101/10 - UAVs specially adapted for particular uses or applications for generating power to be supplied to a remote station, e.g. UAVs with solar panels
B64U 101/00 - UAVs specially adapted for particular uses or applications
B64U 101/30 - UAVs specially adapted for particular uses or applications for imaging, photography or videography
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for monitoring an HVAC system. One of the methods includes receiving pressure data from one or more sensors monitoring a supply air duct of an HVAC system at a property that indicates a pressure in the HVAC system; determining, using the pressure data, that the pressure satisfies a pressure threshold for the HVAC system; and in response to determining that the pressure satisfies the pressure threshold, adjusting an actuator-controlled damper between the supply air duct and a return air duct or adjusting a fan speed of the HVAC system.
F24F 13/10 - Air-flow control members, e.g. louvres, grilles, flaps or guide plates movable, e.g. dampers
F24F 11/49 - Control or safety arrangements for purposes related to the operation of the system, e.g. for safety or monitoring ensuring correct operation, e.g. by trial operation or configuration checks
F24F 11/64 - Electronic processing using pre-stored data
F24F 11/65 - Electronic processing for selecting an operating mode
F24F 11/72 - Control systems characterised by their outputsConstructional details thereof for controlling the supply of treated air, e.g. its pressure
F24F 11/81 - Control systems characterised by their outputsConstructional details thereof for controlling the temperature of the supplied air by controlling the air supply to heat-exchangers or bypass channels
F24F 11/79 - Control systems characterised by their outputsConstructional details thereof for controlling the supply of treated air, e.g. its pressure for controlling the direction of the supplied air
F24F 11/80 - Control systems characterised by their outputsConstructional details thereof for controlling the temperature of the supplied air
G05B 19/042 - Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
F24F 11/52 - Indication arrangements, e.g. displays
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for earbud integration with property monitoring. In some implementations, data indicating sleep buds are in use by a user is received. Sensor data indicating an event at the property where the user is located is received. Alert preferences are obtained. A sleep bud alert is generated for the user based on the alert preferences, the event, and the data. The sleep bud alert is transmitted.
G08B 19/00 - Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for enhanced property access with video analytics. In some implementations, images of a first area captured by a camera are obtained. A number of persons in the first area is determined from the images. Data indicating one or more unique identifications is received. A number of persons who are authorized to access a second area are determined. Access is provided to the second area.
G07C 9/15 - Movable barriers with registering means with arrangements to prevent the passage of more than one individual at a time
G06T 7/70 - Determining position or orientation of objects or cameras
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G07C 9/24 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a handwritten signature
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Anti-intrusion alarms; alarm monitoring systems; home and
office automation systems comprising wireless and wired
controllers, control devices, and downloadable software for
lighting, HVAC, security, safety and other home and office
monitoring and control applications; security control panels
and motion detectors; video cameras; camera hardware systems
for IP (Internet protocol) video surveillance; motion
sensors and monitoring equipment, namely, video monitors and
video cameras for monitoring the interior and exterior of
homes, retail stores, offices and other structures for
security and surveillance; electronic magnetic sensors for
doors and gates; computer hardware for the monitoring and
management of electronic and magnetic door and gate sensors;
thermostats; climate control systems consisting of digital
thermostats, air conditioning, heating, ventilation and
drying control devices; downloadable software in the nature
of a mobile application for use connecting, operating,
integrating, controlling, and managing networked consumer
electronic devices; downloadable software in the nature of a
mobile application for monitoring, operating, and automating
home, office and environmental control systems. Electronic transmission of signals in the nature of
messages, video and user defined data related to the
monitoring and management of home and business electronic
systems, home and business security systems and home and
business automation systems by means of wireless services,
wireline services and through a global computer network. Software-as-a-service (SAAS) services featuring computer
software for use connecting, operating, integrating,
controlling, and managing networked consumer electronic
devices; software-as-a-service (SAAS) services featuring
computer software for monitoring, operating, and automating
home, office and environmental control systems. Electronic monitoring and security services for residential
and commercial properties; providing information about
safety, home security and crime prevention via a website.
91.
Demand response technology utilizing a simulation engine to perform thermostat-based demand response simulations
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for performing a thermostat-based demand response event. In one aspect, a method includes accessing, for sites, historical readings of HVAC activity, indoor temperature, and outdoor temperature and building a model for each of the sites using the historical readings of HVAC activity, indoor temperature, and outdoor temperature. The method also includes using a simulation engine to achieve a target load shed and load reduction shape for a thermostat-based demand response event, and performing the thermostat-based demand response event based on results of the simulation engine.
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for assistive robotic manipulation of building controls. In some implementations, a method includes obtaining sensor data from a property at a first time; obtaining sensor data from the property at a second time; determining whether the sensor data from the first time and the second time satisfy a criteria; in response to determining the criteria is satisfied, generating a mapping between an interface and a device; and providing the mapping to a robot for activating the device.
G05D 1/10 - Simultaneous control of position or course in three dimensions
G05B 13/02 - Adaptive control systems, i.e. systems automatically adjusting themselves to have a performance which is optimum according to some preassigned criterion electric
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
B64U 10/14 - Flying platforms with four distinct rotor axes, e.g. quadcopters
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for an ultrasonic sensor. One of the systems includes a first ultrasonic assembly that includes a first waveguide formed by a first monolithic body, and a first ultrasonic transducer mounted to the first waveguide, wherein the first monolithic body includes a first mounting surface adapted to couple to the first ultrasonic transducer and a first coupling surface adapted to couple to an outer surface of a pipe; and a second ultrasonic assembly that includes a second waveguide formed by a second monolithic body, and a second ultrasonic transducer mounted to the second waveguide, wherein the second monolithic body includes a second mounting surface adapted to couple to the second ultrasonic transducer and a second coupling surface adapted to couple to the outer surface of the pipe.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for fall detection using data for a person's shadow. One of the methods includes obtaining, from a camera, an image of a portion of a property; determining whether a shadow is likely depicted in the image; in response to determining that a shadow is likely depicted in the image, determining whether the shadow in the image likely represents a potentially falling person; and in response to determining that the shadow in the image likely represents a potentially falling person, performing one or more actions for the potentially falling person.
Techniques are described for moving asset location tracking and monitoring system technology. A system monitors for events related to a monitoring system that monitors a fixed property and the system detects an event related to the monitoring system based on the monitoring. The system performs an operation that leverages geographic location tracking of at least one mobile asset associated with the fixed property based on the detected event.
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for integrating a monitoring system with one or more air quality sensors. The method includes receiving data indicating a level of volatile organic compounds within an area, determining an increase in the level of volatile organic compounds within the area, receiving video data that shows the area, detecting, from the video data, a new item of furniture within the area, sending a notification that indicates an increase in the level of volatile organic compounds is likely caused by the new item of furniture.
G01N 33/00 - Investigating or analysing materials by specific methods not covered by groups
F24F 11/62 - Control or safety arrangements characterised by the type of control or by internal processing, e.g. using fuzzy logic, adaptive control or estimation of values
A monitoring system that is configured to monitor a property is disclosed. The monitoring system includes a sensor that is configured to generate sensor data that reflects an environmental condition of the property and an electrical monitoring device coupled to an electrical cord that provides power to an electrical device located at the property. The electrical monitoring device is configured to generate electrical data that reflects electricity that flows through the electrical cord. The monitoring system includes a monitor control unit that is configured to: receive, from the sensor, the sensor data; receive, from the electrical monitoring device, the electrical data; and analyze the sensor data and the electrical data. The monitor control unit is configured to: based on analyzing the sensor data and the electrical data, determine a status of the electrical device; and based on the status of the electrical device, perform a monitoring system action.
H04Q 9/00 - Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom
G01R 21/133 - Arrangements for measuring electric power or power factor by using digital technique
G01V 11/00 - Prospecting or detecting by methods combining techniques covered by two or more of main groups
G01R 15/20 - Adaptations providing voltage or current isolation, e.g. for high-voltage or high-current networks using galvano-magnetic devices, e.g. Hall-effect devices
G01R 15/18 - Adaptations providing voltage or current isolation, e.g. for high-voltage or high-current networks using inductive devices, e.g. transformers
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for an ultrasonic sensor. One of the systems includes a first ultrasonic assembly that includes a first waveguide formed by a first monolithic body, and a first ultrasonic transducer mounted to the first waveguide, wherein the first monolithic body includes a first mounting surface adapted to couple to the first ultrasonic transducer and a first coupling surface adapted to couple to an outer surface of a pipe; and a second ultrasonic assembly that includes a second waveguide fomied by a second monolithic body, and a second ultrasonic transducer mounted to the second waveguide, wherein the second monolithic body includes a second mounting surface adapted to couple to the second ultrasonic transducer and a second coupling surface adapted to couple to the outer surface of the pipe.
An electronic monitoring system is described that receives data from a particular monitoring system, receives data from multiple other monitoring systems, analyzes data received from the particular monitoring system irrespective of data received from the multiple other monitoring systems, based on the analysis determines whether one or more events occur at the particular environment, and in response to determining that a particular event occurs at the particular environment, evaluates the particular event against a set of rules, selects, based on the evaluation results, a particular subset of the multiple other monitoring systems to serve as a cooperative monitoring network, assesses data received from the particular subset of the multiple other monitoring systems, based on the assessment, tracks, in connection with the particular event, events detected by the particular subset of the multiple other monitoring systems, and handles the particular event based on the tracked events.
G08B 29/00 - Checking or monitoring of signalling or alarm systemsPrevention or correction of operating errors, e.g. preventing unauthorised operation
G08B 21/02 - Alarms for ensuring the safety of persons
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
G08B 25/01 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
G08B 25/14 - Central alarm receiver or annunciator arrangements
G08B 27/00 - Alarm systems in which the alarm condition is signalled from a central station to a plurality of substations
H04K 3/00 - Jamming of communicationCounter-measures
H04L 41/0681 - Configuration of triggering conditions
H04L 41/0686 - Additional information in the notification, e.g. enhancement of specific meta-data
H04W 4/02 - Services making use of location information
H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information
G08B 7/06 - Signalling systems according to more than one of groups Personal calling systems according to more than one of groups using electric transmission
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelengthActuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
G08B 29/18 - Prevention or correction of operating errors
An access management and reporting system includes a keysafe that is located outside of a building and a communication system that is located within the building. The communication system is configured to perform, over a short-range wireless communication protocol, two-way communication with a communication module of the keysafe. The system also includes a server that is located remote from the building and the keysafe. The server is configured to perform, over a long-range communication protocol, two-way communication with the communication system located within the building, is configured to manage access to the keysafe, and is configured to handle reporting related to access of the keysafe.