Abstract:
An electronic device may include a processor and a network interface that may include a first radio and a second radio. The processor may be configured to perform wireless communication jamming attack detection by occasionally performing clear channel verification utilizing the network interface to determine whether a threshold number of devices' channels are incapacitated in a wireless network within a threshold amount of time and/or by sending a heartbeat signal from the first radio and determining whether the second radio received the heartbeat signal.
Abstract:
A method for using a first device to pair a second device to a user account may include receiving first wireless communications using a first wireless protocol, where the first device has previously been paired with the user account. The method may also include receiving a transmission that instructs the first device to establish second wireless communications with the second device, and then establishing the second wireless communications between the first device and the second device using a second wireless protocol. The method may additionally include receiving, using the first wireless protocol, information allowing the second device to use the first wireless protocol, and sending the information to the second device using the second wireless protocol, where a new pairing between the second device and the user account is established using the first wireless protocol.
Abstract:
According to one embodiment, a multi-sensing hazard detector for detecting potential dangers may include a back plate and a front casing that is coupled with the back plate to define a housing. A circuit board and a plurality of components may be positioned within the housing. The circuit board may be communicatively coupled with the components. The components may include, among other components, an alarm device, an occupancy sensor, and a smoke chamber. The alarm device may be activatable upon the detection of a potential hazard to warn an occupant of a potential danger, the occupancy sensor may be configured to detect the presence and/or movement of objects external to the hazard detector, and the smoke chamber may be configured to detect the presence of smoke to cause a triggering of the alarm device. The housing may comprise a volume of less than 1024 cubic centimeters.
Abstract:
Embodiments provided herein relate to: suggesting, automatically implementing, or both suggesting and automatically implementing, one or more household policies to be implemented within a household environment. The household policies include one or more input criteria that is derivable from at least one smart device within the household environment, the one or more input criteria relating to a characteristic of the household environment, a characteristic of one or more occupants of the household, or both. The household policies also include one or more outputs to be provided based upon the one or more input criteria.
Abstract:
A thermostat user interface for a network-connected thermostat is described. The thermostat includes a frustum-shaped shell body having a circular cross-section and a sidewall extending between first and second ends, the second end being user-facing when the thermostat is wall-mounted; a circular rotatable ring being user rotatable for adjusting a setting of the thermostat; and a circular cover including a clear circular center portion surrounded by a painted outer portion. The clear circular center portion permits a corresponding circular portion of a non-circular dot-matrix color display element to be visible through the circular cover and the painted outer portion masks a remaining portion of the non-circular dot-matrix color display element so as to create a circular graphical user interface.
Abstract:
include using an application on a mobile device to establish first wireless communications with a first hazard detector that was previously paired with the user account. The method may also include transmitting, to the first hazard detector and using the first wireless protocol, a transmission that instructs the first hazard detector to establish second wireless communications with a second hazard detector, where the second wireless communications use a second wireless protocol. The method may additionally include transmitting network credentials to the first hazard detector using the first wireless protocol, where the credentials are then sent from the first hazard detector to the second hazard detector using the second wireless protocol, such that the second hazard detector can pair with the user account using the first wireless protocol.
Abstract:
HVAC schedules may be programmed for a thermostat using a combination of pre-existing schedules or templates and automated schedule learning. For example, a pre-existing schedule may be initiated on the thermostat and the automated schedule learning may be used to update the pre-existing schedule based on users' interactions with the thermostat. The preexisting HVAC schedules may be stored on a device or received from a social networking service or another online service that includes shared HVAC schedules.
Abstract:
A thermostat stand for a thermostat device may include a base and a mounting fixture configured to receive a thermostat device. The thermostat stand may additionally include an opening configured to allow one or more wires to pass through the opening to connect to the thermostat device, the one or more wires originating from either a power supply or from the boiler control device. The thermostat stand may further include a reflective horizontal surface positioned such that motion detection of energy-emitting objects is enhanced by virtue of reflections of energy emissions off of the reflective horizontal surface into the occupancy sensor.
Abstract:
A method for establishing a pairing between a smart-home device and an online account may include instantiating an application on a computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the smart-home device. The smart-home device may broadcast a first communication protocol, and the application may join the first mutation protocol. The application can be authenticated by the smart-home device using the second code, and the application can receive an identity of a second communication protocol from a user. The application can then transmit the identity of the second communication protocol to the smart-home device. The smart-home device can use the second mutation protocol to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.