Identification graph theory
Abstract:
Apparatuses, techniques, and methods for a security and/or automation system are described. In some cases, these may include detecting a presence of a person at a location; determine a first identification datum associated with the person; calculating a first probability of identification based at least in part on the first identification datum; determining an identity of the person based at least in part on the first probability; and initiating an action based at least in part on the determined identity.
Public/Granted literature
Information query
Patent Agency Ranking
0/0