摘要:
Techniques are described for using sensor data derived from a monitoring system to drive personalized content. Sensor data captured by a monitoring system may be used to determine attributes of users of the monitoring system and/or attributes of a property monitored by the monitoring system. The determined attributes may be used to select content to present to users of the monitoring system. Content presentation may be made through the monitoring system and may be triggered based on events detected by the monitoring system.
摘要:
Image surveillance and reporting technology, in which an event that is indicative of potential physical activity within an area corresponding to a location of a camera unit is detected. In response to detection of the event, the camera unit is controlled to capture one or more images of the area corresponding to the location of the camera unit. The one or more images captured by the camera unit are analyzed to determine whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit. The one or more images are handled based on the determination of whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit.
摘要:
Video monitoring and alarm verification technology, in which a first connection is established between a first device and a camera located in a monitored property associated with a user of the first device and image data captured by the camera is received over the first connection and at the first device. A determination is made to establish a second connection with a second device that enables sharing of the received image data with the second device and, in response to the determination, the second connection is established between the first device and the second device. The received image data is shared with the second device over the second connection and the second device is restricted from directly accessing image data captured by the camera located in the monitored property.
摘要:
Video monitoring and alarm verification technology, in which a first connection is established between a first device and a camera located in a monitored property associated with a user of the first device and image data captured by the camera is received over the first connection and at the first device. A determination is made to establish a second connection with a second device that enables sharing of the received image data with the second device and, in response to the determination, the second connection is established between the first device and the second device. The received image data is shared with the second device over the second connection and the second device is restricted from directly accessing image data captured by the camera located in the monitored property.
摘要:
Techniques are described for providing remote device (e.g., thermostat, lighting, appliance, etc.) control and/or energy monitoring. A system monitors sensor data captured by one or more sensors that sense attributes relevant to user presence at one or more monitored properties and status of one or more energy consuming devices associated with the one or more monitored properties. The system analyzes the monitored sensor data and the monitored device status with respect to a set of one or more rules and performs an operation related to controlling the one or more energy consuming devices based on the analysis of the monitored sensor data and the monitored device status with respect to the set of one or more rules.
摘要:
Image surveillance and reporting technology, in which an event that is indicative of potential physical activity within an area corresponding to a location of a camera unit is detected. In response to detection of the event, the camera unit is controlled to capture one or more images of the area corresponding to the location of the camera unit. The one or more images captured by the camera unit are analyzed to determine whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit. The one or more images are handled based on the determination of whether the one or more images include image data that is indicative of relevant physical activity within the area corresponding to the location of the camera unit.
摘要:
Techniques are described for handling an event where a control panel or an alarm signaling device is tampered with or destroyed by a disablement tactic, e.g., a “crash and smash intrusion.”
摘要:
Techniques are described for providing remote device (e.g., thermostat, lighting, appliance, etc.) control and/or energy monitoring. A system monitors sensor data captured by one or more sensors that sense attributes relevant to user presence at one or more monitored properties and status of one or more energy consuming devices associated with the one or more monitored properties. The system analyzes the monitored sensor data and the monitored device status with respect to a set of one or more rules and performs an operation related to controlling the one or more energy consuming devices based on the analysis of the monitored sensor data and the monitored device status with respect to the set of one or more rules.
摘要:
Techniques are described for providing control of a security system. A user is authorized in the security system and user identification inputs, provided through an input unit of a personal mobile device of the authorized user of the security system, are accessed. One or more signatures of the authorized user are defined and stored in a signature map. Subsequently, user identification input is received from an unauthenticated user using the personal mobile device. The user identification input received from the unauthenticated user is compared to one or more defined signatures in the signature map. The unauthenticated user is determined to be the authorized user if the received user identification input matches one of the defined signatures. The unauthenticated user is allowed to control the security system based on the determination that the unauthenticated user is the authorized user.
摘要:
Techniques are described for providing control of a monitoring system (e.g., a home alarm or security system) using one or more mobile devices. In some implementations, a native mobile device application enables use of a mobile device as a security/automation system keypad and controller for a home security system. In these implementations, the mobile device, using the native mobile device application, checks real time status of system and sensors, arms/disarms system, turns lights on/off, looks in on live video of security cameras, reviews history of system events, reviews saved video clips, monitors/changes thermostat settings, and performs other features of a traditional security keypad in a home security system.