-
公开(公告)号:US10140846B2
公开(公告)日:2018-11-27
申请号:US15849536
申请日:2017-12-20
Applicant: Google LLC
Inventor: Laura Rabb , David Louis Warner , Jeffrey Alan Boyd , Jeffery Theodore Lee , Mark Rajan Malhotra , Kenneth Louis Herman , James Eric Mason
Abstract: Systems and techniques are provided for security system re-arming. Input invoking restricted credentials may be received. The security system of an environment may be changed from a first mode to a second mode based on the restricted credentials. The restricted credentials used to change the security system to the second mode may be determined to be near expiration based on an expiration condition of the restricted credentials. A notification may be sent to a person associated with the restricted credentials including a reminder to use the restricted credentials to change the security system to the first mode before the restricted credentials expire.
-
公开(公告)号:US20180204444A1
公开(公告)日:2018-07-19
申请号:US15918305
申请日:2018-03-12
Applicant: Google LLC
Inventor: Mark Rajan Malhotra , Sophie Le Guen , Jeffrey Alan Boyd , Jeffery Theodore Lee , Todd Hester
CPC classification number: G08B25/008 , G08B21/18 , G08B25/009
Abstract: Systems and techniques are provided for learned overrides for home security. A sensor of a security system may be armed. A trip signal may be received indicating a tripping of the sensor. It may be determined that the trip signal can be automatically overridden based on matching an identity of the sensor and a state of the security system with a pattern in a model. The pattern may represent a state of the security system in which automatically overriding the trip signal from the sensor is permitted. The trip signal from the sensor may be automatically overridden without input from a user.
-
公开(公告)号:US09911319B2
公开(公告)日:2018-03-06
申请号:US15331475
申请日:2016-10-21
Applicant: Google LLC
Inventor: Mark Rajan Malhotra , Jeffrey Alan Boyd , Sophie Le Guen , Jeffery Theodore Lee , Prashant Reddy , Patrick Lister , Jesse Boettcher , Josh Buffum
CPC classification number: G08B29/185 , G08B19/00 , G08B21/0423 , G08B25/008
Abstract: Systems and techniques are provided for automatic security system mode selection. A set of signals may be received from sensors distributed in an environment with a security system. The security system may be in a first mode. An occupancy model may be received. An occupancy estimate may be generated for the environment based on the set of signals from the sensors and the occupancy model. Mode rules may be received. The mode rules associate occupancy estimates with modes of the security system. A second mode for the security system may be determined based on the occupancy estimate and mode rules. The second mode may be different from the first mode. The mode of the security system may be automatically changed from the first mode to the second mode.
-
公开(公告)号:US10223896B2
公开(公告)日:2019-03-05
申请号:US15918305
申请日:2018-03-12
Applicant: Google LLC
Inventor: Mark Rajan Malhotra , Sophie Le Guen , Jeffrey Alan Boyd , Jeffery Theodore Lee , Todd Hester
Abstract: Systems and techniques are provided for learned overrides for home security. A sensor of a security system may be armed. A trip signal may be received indicating a tripping of the sensor. It may be determined that the trip signal can be automatically overridden based on matching an identity of the sensor and a state of the security system with a pattern in a model. The pattern may represent a state of the security system in which automatically overriding the trip signal from the sensor is permitted. The trip signal from the sensor may be automatically overridden without input from a user.
-
公开(公告)号:US10223904B2
公开(公告)日:2019-03-05
申请号:US15911852
申请日:2018-03-05
Applicant: Google LLC
Inventor: Mark Rajan Malhotra , Jeffrey Alan Boyd , Sophie Le Guen , Jeffery Theodore Lee , Prashant Reddy , Patrick Lister , Jesse Boettcher , Josh Buffum
Abstract: Systems and techniques are provided for automatic security system mode selection. A set of signals may be received from sensors distributed in an environment with a security system. The security system may be in a first mode. An occupancy model may be received. An occupancy estimate may be generated for the environment based on the set of signals from the sensors and the occupancy model. Mode rules may be received. The mode rules associate occupancy estimates with modes of the security system. A second mode for the security system may be determined based on the occupancy estimate and mode rules. The second mode may be different from the first mode. The mode of the security system may be automatically changed from the first mode to the second mode.
-
公开(公告)号:US20180137744A1
公开(公告)日:2018-05-17
申请号:US15849536
申请日:2017-12-20
Applicant: Google LLC
Inventor: Laura Rabb , David Louis Warner , Jeffrey Alan Boyd , Jeffery Theodore Lee , Mark Rajan Malhotra , Kenneth Louis Herman , James Eric Mason
CPC classification number: G08B29/18 , G08B25/008
Abstract: Systems and techniques are provided for security system re-arming. Input invoking restricted credentials may be received. The security system of an environment may be changed from a first mode to a second mode based on the restricted credentials. The restricted credentials used to change the security system to the second mode may be determined to be near expiration based on an expiration condition of the restricted credentials. A notification may be sent to a person associated with the restricted credentials including a reminder to use the restricted credentials to change the security system to the first mode before the restricted credentials expire.
-
-
-
-
-