Abstract:
Methods and systems are described for storing video content collected by a home automation system. According to at least one embodiment, an apparatus for accessing video content collected by a home automation system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to receive at a remote device live video content from a camera of the home automation system, and initiate real-time, two-way audio communication between the remote device and a user of the home automation system via the camera.
Abstract:
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. Peripheral devices may implement an anti-takeover mechanism limiting the number of available device command classes when certain handshake and verification requirements are not met. Anti-takeover peripheral devices with protection enabled may be relocated within a controller network, or in certain cases, from one controller network to another controller network when certain conditions are met. That same device may be hobbled when removed from a controller network and may remain hobbled when connected to another network that fails to meet certain conditions. Unprotection and unhobbling of a device may occur through an algorithmic mechanism using values stored on the peripheral device and the controller device for one or more of anti-takeover code generation, anti-takeover code comparison, network identification value comparison, and manufacturer identification value comparison.
Abstract:
System and methods for storing data include detecting presence of one or more computing devices within a defined geographic area, automatically copying media stored on the one or more computing devices, storing the copied media on a backup storage device, and grouping the stored copied media by at least one of time period, location, event and a source of the copied media.
Abstract:
Techniques are described herein for establishing two wireless networks at a premises, a dedicated network configured to be used by devices of an automation and security system of the premises and a user network configured to be used by devices associated with users. The dedicated network may be more rigorously secured than the user network. The dedicated network may be secured in such a way that computing devices associated with users are not permitted to access the dedicated network. In this manner, the dedicated network may be prevented from becoming compromised. In some examples, a contention management entity may mediate network traffic scheduling between the dedicated network and the user network. The dedicated network may be configured to give deference to traffic being communicated across the user network to maintain a quality of service for end users of the user network.
Abstract:
A method for security and/or automation systems is described. In one example, the method may include receiving scheduling data associated with a schedule for each of two or more users at a home automation system. The method may further include comparing the received scheduling data for each of the two or more users, and deriving an alert based, at least in part, on the comparing. The method may further include communicating the alert to at least one of the two or more users.
Abstract:
A computer-implemented method for premises security is described. In one embodiment, a person passing through a perimeter of a predefined area is detected via a boundary sensor. Upon detecting the person passing through the perimeter of the predefined area, a camera is activated to capture an image of the person, the camera being positioned in relation to the predefined area. A notification is sent to a user determined to be nearest to the predefined area. The notification may include the image of the person. A proximity of a person in relation to a vehicle is detected via a proximity sensor. Upon determining the proximity of the person satisfies a predetermined threshold, a notification is sent to a user. Upon determining the proximity of the person satisfies the predetermined threshold, a camera positioned in relation to the vehicle is activated.
Abstract:
Methods and systems are described for storing and accessing video content collected by a home automation system. According to at least one embodiment, an apparatus for accessing video content collected by a home automation system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to receive metadata about a recorded event from a cloud storage, request video content of the recorded event based on the metadata, and receive at least some of the video content from a controller of the home automation system.
Abstract:
In some embodiments, security and/or automation systems, collectively referred to as automation systems, may facilitate communications between a remote user and an occupant of a residence. The automation system may receive one or more communications from a user and deliver the communication to the specified recipient when the recipient occupies the residence. The automation system may determine the recipient is proximate the residence and may notify the recipient of the pending communication. The recipient may use the control panel or another device associated with the security and/or automation system to receive the message.
Abstract:
A method for detecting occupancy of a building is described. In one embodiment, the method includes using a microphone to monitor for sounds at a building, detecting a sound via the microphone, and determining whether the sound is made by a human or made by an animal. In some cases, the microphone is a glass break sensor microphone.
Abstract:
In some embodiments, security and/or automation systems, collectively referred to as automation systems, may offer a user the peace of mind of having an automation system active while the user is present in a residence. False alarms may become costly to both the user of the automation system and to emergency responders using resources to respond to the false alarms. The automation system may provide the benefit of an armed automation system without the risk of frequent false alarms. An automation system may provide additional or alternative security to a residence when a person is detected in the home with a reduction in the false alarms that may be present in a strict alarm state. This may provide security to a person in the home during the day and provide unique daytime features.