Security system re-arming
    1.
    发明授权

    公开(公告)号:US10140846B2

    公开(公告)日:2018-11-27

    申请号:US15849536

    申请日:2017-12-20

    Applicant: Google LLC

    Abstract: Systems and techniques are provided for security system re-arming. Input invoking restricted credentials may be received. The security system of an environment may be changed from a first mode to a second mode based on the restricted credentials. The restricted credentials used to change the security system to the second mode may be determined to be near expiration based on an expiration condition of the restricted credentials. A notification may be sent to a person associated with the restricted credentials including a reminder to use the restricted credentials to change the security system to the first mode before the restricted credentials expire.

    OPERATING A SECURITY SYSTEM
    2.
    发明申请

    公开(公告)号:US20180204444A1

    公开(公告)日:2018-07-19

    申请号:US15918305

    申请日:2018-03-12

    Applicant: Google LLC

    CPC classification number: G08B25/008 G08B21/18 G08B25/009

    Abstract: Systems and techniques are provided for learned overrides for home security. A sensor of a security system may be armed. A trip signal may be received indicating a tripping of the sensor. It may be determined that the trip signal can be automatically overridden based on matching an identity of the sensor and a state of the security system with a pattern in a model. The pattern may represent a state of the security system in which automatically overriding the trip signal from the sensor is permitted. The trip signal from the sensor may be automatically overridden without input from a user.

    Operating a security system
    4.
    发明授权

    公开(公告)号:US10223896B2

    公开(公告)日:2019-03-05

    申请号:US15918305

    申请日:2018-03-12

    Applicant: Google LLC

    Abstract: Systems and techniques are provided for learned overrides for home security. A sensor of a security system may be armed. A trip signal may be received indicating a tripping of the sensor. It may be determined that the trip signal can be automatically overridden based on matching an identity of the sensor and a state of the security system with a pattern in a model. The pattern may represent a state of the security system in which automatically overriding the trip signal from the sensor is permitted. The trip signal from the sensor may be automatically overridden without input from a user.

    Automatic security system mode selection

    公开(公告)号:US10223904B2

    公开(公告)日:2019-03-05

    申请号:US15911852

    申请日:2018-03-05

    Applicant: Google LLC

    Abstract: Systems and techniques are provided for automatic security system mode selection. A set of signals may be received from sensors distributed in an environment with a security system. The security system may be in a first mode. An occupancy model may be received. An occupancy estimate may be generated for the environment based on the set of signals from the sensors and the occupancy model. Mode rules may be received. The mode rules associate occupancy estimates with modes of the security system. A second mode for the security system may be determined based on the occupancy estimate and mode rules. The second mode may be different from the first mode. The mode of the security system may be automatically changed from the first mode to the second mode.

    SECURITY SYSTEM RE-ARMING
    6.
    发明申请

    公开(公告)号:US20180137744A1

    公开(公告)日:2018-05-17

    申请号:US15849536

    申请日:2017-12-20

    Applicant: Google LLC

    CPC classification number: G08B29/18 G08B25/008

    Abstract: Systems and techniques are provided for security system re-arming. Input invoking restricted credentials may be received. The security system of an environment may be changed from a first mode to a second mode based on the restricted credentials. The restricted credentials used to change the security system to the second mode may be determined to be near expiration based on an expiration condition of the restricted credentials. A notification may be sent to a person associated with the restricted credentials including a reminder to use the restricted credentials to change the security system to the first mode before the restricted credentials expire.

Patent Agency Ranking