Automatic security system mode selection

    公开(公告)号:US10223904B2

    公开(公告)日:2019-03-05

    申请号:US15911852

    申请日:2018-03-05

    Applicant: Google LLC

    Abstract: Systems and techniques are provided for automatic security system mode selection. A set of signals may be received from sensors distributed in an environment with a security system. The security system may be in a first mode. An occupancy model may be received. An occupancy estimate may be generated for the environment based on the set of signals from the sensors and the occupancy model. Mode rules may be received. The mode rules associate occupancy estimates with modes of the security system. A second mode for the security system may be determined based on the occupancy estimate and mode rules. The second mode may be different from the first mode. The mode of the security system may be automatically changed from the first mode to the second mode.

    SECURITY SYSTEM RE-ARMING
    3.
    发明申请

    公开(公告)号:US20180137744A1

    公开(公告)日:2018-05-17

    申请号:US15849536

    申请日:2017-12-20

    Applicant: Google LLC

    CPC classification number: G08B29/18 G08B25/008

    Abstract: Systems and techniques are provided for security system re-arming. Input invoking restricted credentials may be received. The security system of an environment may be changed from a first mode to a second mode based on the restricted credentials. The restricted credentials used to change the security system to the second mode may be determined to be near expiration based on an expiration condition of the restricted credentials. A notification may be sent to a person associated with the restricted credentials including a reminder to use the restricted credentials to change the security system to the first mode before the restricted credentials expire.

    Alarm arming with open entry point

    公开(公告)号:US10290191B2

    公开(公告)日:2019-05-14

    申请号:US15948777

    申请日:2018-04-09

    Applicant: GOOGLE LLC

    Abstract: A magnet and magnetometer may be integrated into a smart home environment and allow it to be placed into an away mode of operation despite an entry point being semi-open. The disclosed implementations can detect a magnetic field strength and determine, based on the detected field strength, an approximate distance that a moveable partition is open. In some configurations, the presence of a second magnetic source can be detected. A notice may be generated based on one or more signals received from the magnetometer. The notice may be sent to a controller, a remote system, a remote device, and/or a client device as disclosed herein.

    DETECTION OF ANOMALY RELATED TO INFORMATION ABOUT LOCATION OF MOBILE COMPUTING DEVICE

    公开(公告)号:US20180367954A1

    公开(公告)日:2018-12-20

    申请号:US16114294

    申请日:2018-08-28

    Applicant: Google LLC

    Abstract: In a method for detection of an anomaly related to information about a location of a mobile computing device, the anomaly related to the information about the location of the mobile computing device can be detected by a processor of the mobile computing device. A communication about the anomaly can be provided via a user interface of the mobile computing device. The anomaly can be caused by a bug in an operating system of the mobile computing device. Notifications about the anomaly can be provided to a user of the mobile computing device or other mobile computing devices registered to a shared account.

    Security system re-arming
    10.
    发明授权

    公开(公告)号:US10140846B2

    公开(公告)日:2018-11-27

    申请号:US15849536

    申请日:2017-12-20

    Applicant: Google LLC

    Abstract: Systems and techniques are provided for security system re-arming. Input invoking restricted credentials may be received. The security system of an environment may be changed from a first mode to a second mode based on the restricted credentials. The restricted credentials used to change the security system to the second mode may be determined to be near expiration based on an expiration condition of the restricted credentials. A notification may be sent to a person associated with the restricted credentials including a reminder to use the restricted credentials to change the security system to the first mode before the restricted credentials expire.

Patent Agency Ranking