摘要:
Methods and systems are described for selecting a level of autonomy. According to at least one embodiment, a method for selecting a level of autonomy includes determining a first likely condition of a first user of a task and/or building system, selecting a first autonomy level from multiple levels based at least in part on the first likely condition, and making a first decision in the task and/or the building system based on the first autonomy level.
摘要:
A method for providing wireless access to one or more wireless devices using an automation system control panel is described. In one embodiment, a communication link is established between an automation system control panel and one or more automation components. Settings are applied to configure the automation system control panel for use as a wireless access point providing two-way communication with one or more electronic devices. Applying settings includes receiving input directly at a graphical user interface of the automation system control panel, the graphical user interface further providing access to control the one or more automation components. The automation system control panel is wirelessly connected to one or more electronic devices via a wireless access point interface using the settings applied at the graphical user interface.
摘要:
Methods and systems are described for controlling parameters in a building. According to at least one embodiment, a method for controlling parameters in a building includes using a first sensor type to determine whether the building is occupied and using a second sensor type to determine how reliable the first sensor type determines occupancy.
摘要:
Systems and methods for visitor detection using security and/or automation systems include detecting an event at a doorway, capturing an image at the doorway associated with the event, capturing a video at the doorway associated with the event, delivering the image with a notice of the event to a recipient for viewing, and automatically uploading the video for viewing upon capturing the video. The video is available for selective viewing by the recipient upon being uploaded.
摘要:
Methods and systems are described for controlling access to a home based on user occupancy. According to at least one embodiment, an apparatus for controlling access to a home based on user occupancy includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to determine a location of a user of a home automation system relative to a barrier of a home being monitored by the home automation system. The instructions are executable to determine whether to permit a change in a locking mechanism of the barrier based in part on the determined location of the user, and maintain a current state of the home automation system.
摘要:
A computer-implemented method for progressive profiling in a home automation system is described. Data related to a premises and an occupant of the premises may be analyzed and one or more observations may be made based on the analysis of the data. Upon detecting one or more conditions associated with the one or more observations made, an offer to perform one or more actions may be communicated to the occupant.
摘要:
A computer-implemented method for enabling secure delivery of a package to a designated delivery area of a premises is described. In one embodiment, information regarding a delivery of a package to a premises may be received, a delivery person arriving at the premises may be detected, and instructions may be provided to the delivery person regarding how to deliver the package to the designated delivery area within the premises.
摘要:
Methods and systems are described for controlling parameters in a building. According to at least one embodiment, a method for controlling parameters in a building includes using a first sensor type to determine whether the building is occupied and using a second sensor type to determine how reliable the first sensor type determines occupancy.
摘要:
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. Peripheral devices may implement an anti-takeover mechanism limiting the number of available device command classes when certain handshake and verification requirements are not met. Anti-takeover peripheral devices with protection enabled may be relocated within a controller network, or in certain cases, from one controller network to another controller network when certain conditions are met. That same device may be hobbled when removed from a controller network and may remain hobbled when connected to another network that fails to meet certain conditions. Unprotection and unhobbling of a device may occur through an algorithmic mechanism using values stored on the peripheral device and the controller device for one or more of anti-takeover code generation, anti-takeover code comparison, network identification value comparison, and manufacturer identification value comparison.
摘要:
A computer-implemented method for integration of a set top box and an automation system is described. In one configuration, subscriber program content is provided. An aspect of a premises is monitored via one or more sensors. A monitor channel may be provided to display the monitored aspect of the premises. The monitor channel may be displayed in a channel guide among channels of the subscriber program content.