Abstract:
Methods and systems are described for using a video camera. According to at least one embodiment, a camera assembly for recording video footage includes a lens connector with a lens attached to a first end and a camera body connector on a second end. Further, the lens connector has a length that separates the video lens a distance from a camera body when the lens connector is attached to camera body and also housing at least one cable capable of transmitting a video signal recorded by the lens from the lens to the camera body. Also, the camera body has a power module and a communication module to communicate with a remote control unit.
Abstract:
A system is described herein including a control panel configured to communicate with at least one mobile wireless device, including sending image data to the at least one mobile wireless device using electronic messaging protocols. The system also includes at least one automation component wirelessly connected to the control panel through short range wireless communication protocols. The at least one automation component includes at least one sensor configured to detect a presence of a person at an entry to the physical structure, at least one camera inconspicuously integrated within an entry component at the entry, and at least one short range wireless transceiver coupled to the at least one sensor and the at least one camera and configured to communicate image and sensor data to the control panel and to receive control information from the control panel.
Abstract:
A method for adjusting devices upon detecting occupant is asleep in a security/automation system is described. In one embodiment, the method may include monitoring sensor data from one or more sensors, detecting an occupant sleeping, based at least in part on the monitored sensor data, and upon detecting the occupant sleeping, modifying one or more settings associated with one or more devices of the home automation system. In some cases, the method may include modifying at least one of an audio setting associated with the home automation system, a thermostat setting associated with the home automation system, a sensor setting associated with the home automation system, an appliance setting associated with the home automation system, and a security setting associated with the home automation system, or any combination thereof.
Abstract:
A method for security and/or automation systems is described. In one embodiment, the method includes integrating, via a processor of a first computing device, a secure delivery option in relation to a checkout interface of a point of sale (POS) system. In some cases, the method includes receiving, via the processor, an input to enable the secure delivery option in relation to an order being placed via the checkout interface, generating, via the processor, an access code for the order based at least in part on enabling the secure delivery option, and enabling, via the processor, access to a premises via the access code generated for the order.
Abstract:
Techniques are described for security and automation system. One method includes receiving, from an exterior camera located outside a structure, data associated with an occurrence of a security event associated with the structure, activating a light of the camera based at least in part on determining the received data is associated with the security event, and initiating an action at the first location based at least in part on determining that the received data is associated with the security event.
Abstract:
Methods, systems, and devices related to memory, including read or write performance of a phase change memory, are described. A plurality of memory cells of a memory array may be read. A total number of read errors resulting from the read operation of the plurality of memory cells may be determined, and reference read currents may be adjusted if the total number of read errors exceeds an error threshold. In some examples, adjusting reference read currents includes reading a reference memory cell, determining a current shift for the reference memory cell, and adjusting read currents for other memory cells of the memory array by a current delta based at least in part on the current shift.
Abstract:
Techniques are described for enhanced interactions for a security automation system using a doorbell camera. One method includes detecting, by the doorbell camera, an object located within a pre-determined distance from the doorbell camera; identifying, by the doorbell camera, a suggested security action for the security and automation system to perform based at least in part on the detecting; transmitting the suggested action to the security and automation system based at least in part on the identifying; and transmitting, in response to identifying the suggested security action, a message to a user associated with the security automation system regarding the suggested security action.
Abstract:
Methods, apparatuses, and techniques for security and/or automation systems are described. In one embodiment, the method may include receiving a call initiation instruction at a video monitoring component of a home automation system. The method may further include analyzing the call initiation instruction, and communicating a call request from the video monitoring component of the home automation system to a first remote user based at least in part on the received call initiation instruction.
Abstract:
A method for security and/or automation systems is described. In one embodiment, the method may include detecting a first sound event at a home entry point using one or more sensors. The method may further include receiving input to associate at least one home automation system operation with the first sound event, and may further include storing the first sound event. The method may further include initiating the at least one home automation system operation associated with the first sound event.
Abstract:
Apparatuses, techniques, and methods for a security and/or automation system are described. In some cases, these may include a first user recording a message and the message being broadcast or conveyed to a second user based on the second user's identity and/or location and/or a relevant time of recording or broadcasting, among other things. The methods may include receiving a first communication from a first user, storing the first communication in memory, identifying a second user at a first location, retrieving the first communication from memory, the retrieving based at least in part on the identification of the second user, and conveying the first communication to the second user at the first location.