Abstract:
The current application is directed to intelligent controllers that continuously, periodically, or intermittently monitor progress towards one or more control goals under one or more constraints in order to achieve control that satisfies potentially conflicting goals. An intelligent controller may alter aspects of control, dynamically, while the control is being carried out, in order to ensure that goals are obtained and a balance is achieved between potentially conflicting goals. The intelligent controller uses various types of information to determine an initial control strategy as well as to dynamically adjust the control strategy as the control is being carried out.
Abstract:
A method includes detecting, with a passive infrared sensor (PIR), a level of infrared radiation in a field of view (FOV) of the PIR, generating a signal based on detected levels over a period of time, the signal having values that exhibit a change in the detected levels, extracting a local feature from a sample of the signal, wherein the local feature indicates a probability that a human in the FOV caused the change in the detected levels, extracting a global feature from the sample of the signal, wherein the global feature indicates a probability that an environmental radiation source caused the change in the detected levels, determining a score based on the local feature and the global feature, and determining that a human motion has been detected in the FOV based on the score.
Abstract:
A home management system comprises a controller configured to determine that a status of a particular mobile device registered with the home management controller is of concern; transmit to the particular mobile device a request notification to enable the registered mobile device to determine a device location in the background; receive a location notification from the particular mobile device in response to the request notification; and based on the received location notification, determine the status of the particular mobile device.
Abstract:
A magnet and magnetometer may be integrated into a smart home environment and allow it to be placed into an away mode of operation despite an entry point being semi-open. The disclosed implementations can detect a magnetic field strength and determine, based on the detected field strength, an approximate distance that a moveable partition is open. In some configurations, the presence of a second magnetic source can be detected. A notice may be generated based on one or more signals received from the magnetometer. The notice may be sent to a controller, a remote system, a remote device, and/or a client device as disclosed herein.
Abstract:
Systems and methods of adjusting a pre-alarm time are provided, including detecting, by a sensor, an entry into a building by a person and generating detection data according to the detected entry. A processor communicatively coupled to the sensor adjusts a pre-alarm time according to the detection data. An alarm is output, by an alarm device communicatively coupled to at least the processor, according to the detection data and the adjusted pre-alarm time.
Abstract:
A method of controlling a security system of a premises includes detecting one or more exceptions when the system is set to an alarm mode, determining whether any of the one or more exceptions is a terminal exception, automatically executing an arming procedure according to the alarm mode when all of the exceptions are determined to be non-terminal exceptions, preventing execution of the arming procedure when any of the exceptions are determined to be a terminal exception, and, while in the alarm mode, preventing a sensor associated with a security exception from triggering an alarm when the security exception is fully corrected, and triggering an alarm when a condition that is causing the security exception is adjusted without resulting in full correction of the security exception.
Abstract:
Systems and techniques are provided for sensor bypass. Activation may be received at a bypass input of an entry point sensor of a security system while the entry point sensor is in an armed mode. The entry point sensor may detect that the entry point monitored by the entry point sensor is closed. The entry point sensor may enter into a bypass mode. Detection by the entry point sensor of an opening of the entry point while the entry point sensor is in the bypass mode may not result in the generation of an alarm by the security system.
Abstract:
A path light that utilizes an ambient light sensor to determine the lighting conditions may experience feedback from its light source if it determines that the lighting conditions are appropriate to illuminate the path light's light source. The path light, as disclosed herein, may compute an offset value to ascertain the amount of feedback from the light source. Upon learning the offset value, the path light may subtract the offset value from a detected amount of light to determine whether the lighting conditions of its surroundings still meet a threshold level of darkness for the path light to illuminate.
Abstract:
Systems and techniques are provided for sensor bypass. Activation may be received at a bypass input of an entry point sensor of a security system while the entry point sensor is in an armed mode. The entry point sensor may detect that the entry point monitored by the entry point sensor is closed. The entry point sensor may enter into a bypass mode. Detection by the entry point sensor of an opening of the entry point while the entry point sensor is in the bypass mode may not result in the generation of an alarm by the security system.
Abstract:
Systems and methods of security are provided, including at least one of a plurality of sensors to detect a location of at least one user, and generate detection data according to the detected location of the at least one user. A processor may be communicatively coupled to the at least one of the plurality of sensors to receive the detection data and to determine whether the at least one user is occupying a building according to the detection data. An alarm device, communicatively coupled to the processor, can be armed or disarmed by the processor according to the determination as to whether the at least one user is occupying the building.