Abstract:
Systems and methods of providing a security system which presents operational status information to a user are disclosed. A sensor can detect a security event and receive identifying information from an electronic device. A controller device is communicatively coupled to the sensor to receive the security event, to determine whether the identifying information detected with the sensor is from the electronic device of an authorized user, and to provide an operational status message to the electronic device via a communications link when it is determined to be authorized. The electronic device provides identifying information to the sensor, receives the operational status message via the communications link, and displays the operational status message.
Abstract:
Methods, apparatus, and computer readable media are described for tailoring instructions for configuring a smart device based on feedback received from the smart device and/or based on feedback received from a device that is separate from the smart device. Some implementations additionally or alternatively relate to utilization of data corresponding to previous installations of similar smart devices to tailor provided instructions in order to mitigate the reoccurrence of past issues during configuration of smart devices. Some implementations additionally or alternatively relate to proactively suggesting and/or providing, to a user, guidance related to a smart device in response to determining the smart device is to be configured by the user and/or in response to determining a complete configuration of the smart device has not occurred.
Abstract:
A home security system may infer a mode of operation based on indications it receives regarding a user's behavior. The disclosed implementations provide for a vacation mode of operation that defines a response for a security event that differs from the response that would be provided by the home security system for the same security event if it operated in another mode such as an away mode.
Abstract:
A home security system may infer a mode of operation based on indications it receives regarding a user's behavior. The disclosed implementations provide for a vacation mode of operation that defines a response for a security event that differs from the response that would be provided by the home security system for the same security event if it operated in another mode such as an away mode.
Abstract:
In a method for detection of an anomaly related to information about a location of a mobile computing device, the anomaly related to the information about the location of the mobile computing device can be detected by a processor of the mobile computing device. A communication about the anomaly can be provided via a user interface of the mobile computing device. The anomaly can be caused by a bug in an operating system of the mobile computing device. Notifications about the anomaly can be provided to a user of the mobile computing device or other mobile computing devices registered to a shared account.
Abstract:
A controller is provided for coordinated control of various subsystems, such as a heating, ventilation, and air conditioning (HVAC) subsystem, a camera subsystem, and a security subsystem, in a structure such as a home, by allowing automatic as well as manual changes to be made to the subsystems within their respective constraints. The controller may change the states or settings of the subsystems automatically upon occurrences of certain conditions, or allow the user to change them by switching a structure mode for the subsystems between a home mode and an away mode. A change in the structure mode may effect changes to some or all of the states or settings for some or all of the subsystems.
Abstract:
Methods, apparatus, and computer readable media are described for tailoring instructions for configuring a smart device based on feedback received from the smart device and/or based on feedback received from a device that is separate from the smart device. Some implementations additionally or alternatively relate to utilization of data corresponding to previous installations of similar smart devices to tailor provided instructions in order to mitigate the reoccurrence of past issues during configuration of smart devices. Some implementations additionally or alternatively relate to proactively suggesting and/or providing, to a user, guidance related to a smart device in response to determining the smart device is to be configured by the user and/or in response to determining a complete configuration of the smart device has not occurred.