Security monitoring and control
    42.
    发明授权

    公开(公告)号:US11495117B2

    公开(公告)日:2022-11-08

    申请号:US16997769

    申请日:2020-08-19

    申请人: Ooma, Inc.

    摘要: Systems, methods, and software for monitoring and controlling a security system for a structure are provided herein. An exemplary method may include receiving sensor data from at least one first peripheral, the sensor data associated with at least one of activity inside and activity outside of a structure; determining a critical event based in part on the sensor data; creating an alert based in part on the critical event; getting user preferences associated with at least one of a user and a base unit; determining a response based in part on the alert and user preferences; and activating at least one of a second peripheral and a service based in part on the response.

    SYSTEMS AND METHODS FOR SERVICE ADDRESS PROVISIONING APPLIANCE DEVICES

    公开(公告)号:US20220172597A1

    公开(公告)日:2022-06-02

    申请号:US17673173

    申请日:2022-02-16

    申请人: Ooma, Inc.

    IPC分类号: G08B21/18 G08B25/00 G08B21/04

    摘要: Systems, methods, and software for provisioning consumer appliance devices and security systems are provided herein. An exemplary method may include provisioning a consumer application device associated with various interactions of a user with the appliance device to generate an signal, such as a panic signal, causing various forms of security systems to escalate the signal to obtain help. Another exemplary method involves allowing the device, when placing the panic signal, to involve back end systems related to the security system to provision access to an emergency service provider (i.e., 911 provider) “just in time,” eliminating the need for costly pre-provisioning.

    Network jamming detection and remediation

    公开(公告)号:US11250687B2

    公开(公告)日:2022-02-15

    申请号:US16855948

    申请日:2020-04-22

    申请人: Ooma, Inc.

    摘要: Methods and systems for remediation of jammed networks are provided. Exemplary methods include determining by a base unit of a jammed network and if outside connectivity available. The connectivity can include wired and wireless broadband networks. If connectivity is available, at least one external service is notified. Further, a user device can be notified. A local alert can be generated in the form of a phone call or test message. Also, a local action can be taken. Information associated with the jammed network is stored for later delivery if connectivity is not available where the base unit is located in a residence. Further, an alert can be issued in response to the detected network jamming, the alert being at least one of: sounding an audible alarm, showing a visual alarm indication, communicating with law enforcement, and communicating with an alarm monitoring station.

    Activity based video recording
    45.
    发明授权

    公开(公告)号:US10929650B2

    公开(公告)日:2021-02-23

    申请号:US16182483

    申请日:2018-11-06

    申请人: Ooma, Inc.

    摘要: Methods and systems for activity based video recording are provided. Exemplary methods include: receiving an amplified signal to improve sensitivity, the amplified signal being produced by a circuit using an analog differential signal, the analog differential signal being received from a microphone; converting the amplified signal to a digital signal; detecting the digital signal; activating a video camera to record video for a predetermined amount of time using the detecting; storing the recorded video; placing the video camera into power saving mode.

    SECURING ACCESS TO USER DATA STORED IN A CLOUD COMPUTING ENVIRONMENT

    公开(公告)号:US20210004491A1

    公开(公告)日:2021-01-07

    申请号:US16503013

    申请日:2019-07-03

    申请人: Ooma, Inc.

    摘要: Systems and methods for securing access to user data stored in a networked location are described herein. A first user device may generate data that a user may desire to keep private. The generated data may be transmitted to, and stored at, a networked location, which then makes it vulnerable to malicious attack or exposure to unintended recipients. To protect the user data stored at the networked location, a recursive data file signature is generated for each stored data file. In order to access the stored data file, the user needs to provide the data file signature. In addition, every time the user data is accessed by the user, the data file signature is changed. In this way, the exposed data file signature will no longer be valid if an unauthorized entity tries to access the user data.