Abstract:
An automation system may include a smart doorman. The system may observe one or more guests to a residence, predict a user profile associated with the guest, and invite an administrator of the automation system to create the suggested profile of the guest. The system may store one or more biometric identifiers with a visitation pattern to determine if the guest requires a profile. In one embodiment, a method for security and/or automation systems may be described. The method may include detecting the presence of one or more guests at an entrance to a residence and comparing the presence of a guest to one or more profile parameters. A guest profile associated with the guest may be predicted based at least in part on the comparing.
Abstract:
A method for detecting occupancy of a building is described. In one embodiment, the method includes using a microphone to monitor for sounds at a building, detecting a sound via the microphone, and determining whether the sound is made by a human or made by an animal. In some cases, the microphone is a glass break sensor microphone.
Abstract:
A method for crowdsourcing automation rules is described. In one embodiment, the method includes creating, via a user interface, a new building automation rule and sending the new building automation rule to an online rule exchange. The online rule exchange is configured to publish the new building automation rule. Accordingly, the method also includes receiving, at the online rule exchange, the new building automation rule created via the user interface and publishing the new building automation rule on the online rule exchange.
Abstract:
Methods and systems are described for determining operation of an openable barrier into a building. A method for determining operation of an openable barrier into a building includes confirming that the barrier is closed, wherein the barrier has an exterior side and an interior side. The method also includes determining whether the barrier is operated from the exterior side or the interior side, and controlling a feature of a home automation system based at least in part on the determined operation of the barrier.
Abstract:
Methods and systems are described for controlling an automation and security system. According to at least one embodiment, an apparatus for data storage in an automation and security system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory. The instructions are executable by a processor to receive data at a first device, store a copy of the data on the first device, fragment the data into a plurality of data fragments, transmit the plurality of data fragments to a plurality of remote devices, and store some of the plurality of data fragments on each of the plurality of remote devices.
Abstract:
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. In some embodiments, peripheral devices may implement an anti-takeover mechanism encrypting messages and transmitting unencrypted decryption keys for a limited period of time. Anti-takeover peripheral devices may transition from a plain operational mode, to a decryption key transmission mode, to a secure mode based on pre-defined triggering events, commands, or timers. Random decryption key values may be generated by peripheral devices and transmitted to listening devices for later storage and retrieval by the listening device. Decryption keys may be stored in remote data stores for later retrieval by anti-takeover aware controller devices.
Abstract:
A method for geo-location services is described. In one embodiment, the method includes storing in a database an appointment with one or more attendees and monitoring, via a sensor, a location of an attendee in relation to a time and location of the appointment. In some embodiments, the method includes determining a route for the attendee to take to the location of the appointment based on the current location of the attendee.
Abstract:
A method for geo-location services is described. A location of a user is monitored, via a sensor, in relation to a predetermined location. Upon detecting a predetermined condition of the user, a determination is made of which contact on a contact list is nearest to the predetermined location. A notification is sent to the contact determined to be nearest to the predetermined location.
Abstract:
A computer-implemented method for integration of a set top box and an automation system is described. In one configuration, subscriber program content is provided. An aspect of a premises is monitored via one or more sensors. A monitor channel may be provided to display the monitored aspect of the premises. The monitor channel may be displayed in a channel guide among channels of the subscriber program content.
Abstract:
The present disclosure relates to approaches for detecting and monitoring for earthquakes using a control unit of a security system. A security system may include a plurality of sensors that detect alarm conditions and send alarm condition messages to a control unit for the security system. The control unit may be communicatively coupled to the sensors and configured to receive the alarm condition messages from the sensors. The security system may also include an earthquake sensor that senses earthquake conditions and sends an earthquake condition message to the control unit if it detects the earthquake condition. The control unit may include an alarm module. The control unit causes the alarm module to generate an alarm in response to receiving the earthquake condition message from the earthquake sensor.