-
71.
公开(公告)号:US20190180603A1
公开(公告)日:2019-06-13
申请号:US16207262
申请日:2018-12-03
Applicant: Alarm.com Incorporated
Inventor: Abraham Joseph Kinney , Daniel Todd Kerzner , David James Hutz
IPC: G08B29/02 , G07C9/00 , G08B25/00 , G08B19/00 , G08B13/196 , G06K9/00 , G06F3/16 , G10L17/22 , G10L15/22
Abstract: Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.
-
72.
公开(公告)号:US10147306B2
公开(公告)日:2018-12-04
申请号:US15821474
申请日:2017-11-22
Applicant: Alarm.com Incorporated
Inventor: Abraham Joseph Kinney , Daniel Todd Kerzner , David James Hutz
Abstract: Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.
-
公开(公告)号:US20180137727A1
公开(公告)日:2018-05-17
申请号:US15811235
申请日:2017-11-13
Applicant: Alarm.com Incorporated
Inventor: Adam T. Barth , Zackary Watson , Daniel Todd Kerzner
IPC: G08B13/196 , G08B25/14 , G08B25/00
CPC classification number: G08B13/19658 , G08B13/2494 , G08B25/008 , G08B25/009 , G08B25/01 , G08B25/14
Abstract: Techniques are described for replacing a keypad of an existing security system within a property with a communication-enabled keypad device with dual functioning capabilities as a communicator device and a keypad device. In some implementations, data is received from a security panel of a property. A keypad bus protocol of the security panel is determined based on the data received from the security panel. Sensor data is received from one or more sensors located within the property. A monitoring system command that is not specified within a keypad bus of the security panel is determined based on based on the obtained sensor data. The monitoring system command is converted to a panel command using the keypad bus protocol. The panel command is transmitted on the keypad bus of the security panel.
-
公开(公告)号:US20240370017A1
公开(公告)日:2024-11-07
申请号:US18772652
申请日:2024-07-15
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner , Stephen Scott Trundle
IPC: G05D1/00 , B64U10/14 , B64U80/25 , B64U101/31 , G06V10/147 , G06V20/13 , G06V20/52 , G08B13/196 , G08B25/00 , G08G5/00
Abstract: Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to pre-surveil a portion of a property. In one aspect, a system may include a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include obtaining data that is indicative of one or more acts of an occupant of the property, applying the obtained data that is indicative of one or more acts of the occupant of the property to a pre-surveillance rule, determining that the pre-surveillance rule is satisfied, determining a drone navigation path that is associated with the pre-surveillance rule, transmitting, to a drone, an instruction to perform pre-surveillance of the portion of the one or more properties using the drone navigation path.
-
公开(公告)号:US12072706B2
公开(公告)日:2024-08-27
申请号:US17940145
申请日:2022-09-08
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner , Stephen Scott Trundle
IPC: G08B13/00 , B64C39/02 , G05D1/00 , G06V10/147 , G06V20/13 , G06V20/52 , G08B13/196 , G08B25/00 , G08G5/00 , B64U101/30
CPC classification number: G05D1/0094 , B64C39/02 , G06V10/147 , G06V20/13 , G06V20/52 , G08B13/1965 , G08B25/00 , G08G5/0013 , G08G5/0034 , G08G5/0069 , B64U2101/30 , B64U2201/10
Abstract: Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to pre-surveil a portion of a property. In one aspect, a system may include a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include obtaining data that is indicative of one or more acts of an occupant of the property, applying the obtained data that is indicative of one or more acts of the occupant of the property to a pre-surveillance rule, determining that the pre-surveillance rule is satisfied, determining a drone navigation path that is associated with the pre-surveillance rule, transmitting, to a drone, an instruction to perform pre-surveillance of the portion of the one or more properties using the drone navigation path.
-
公开(公告)号:US11798399B2
公开(公告)日:2023-10-24
申请号:US17239933
申请日:2021-04-26
Applicant: Alarm.com Incorporated
Inventor: Abraham Joseph Kinney , Daniel Todd Kerzner , David James Hutz
IPC: G08B29/02 , G06F3/16 , G08B13/196 , G08B19/00 , G08B25/00 , G07C9/00 , G06V20/52 , G06V40/10 , G10L15/22 , G10L17/22
CPC classification number: G08B29/02 , G06F3/167 , G06V20/52 , G06V40/10 , G07C9/00 , G07C9/00571 , G08B13/1965 , G08B13/19695 , G08B19/00 , G08B25/008 , G10L15/22 , G10L17/22 , G07C9/00904 , G08B13/19656 , G10L2015/223
Abstract: Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.
-
公开(公告)号:US20230251672A1
公开(公告)日:2023-08-10
申请号:US18102873
申请日:2023-01-30
Applicant: Alarm.com Incorporated
Inventor: Donald Gerard Madden , Glenn Tournier , Daniel Todd Kerzner
CPC classification number: G05D1/101 , G05B13/0265 , G05D1/0016 , G05D1/0033 , B64U10/14 , B64U2101/31
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for assistive robotic manipulation of building controls. In some implementations, a method includes obtaining sensor data from a property at a first time; obtaining sensor data from the property at a second time; determining whether the sensor data from the first time and the second time satisfy a criteria; in response to determining the criteria is satisfied, generating a mapping between an interface and a device; and providing the mapping to a robot for activating the device.
-
公开(公告)号:US20230169837A1
公开(公告)日:2023-06-01
申请号:US18104401
申请日:2023-02-01
Applicant: Alarm.com Incorporated
Inventor: Donald Madden , Daniel Todd Kerzner , Stephanie Sun Kinney
IPC: G08B13/196 , G06F18/22
CPC classification number: G08B13/19608 , G08B13/19645 , G08B13/19684 , G08B13/19686 , G06F18/22
Abstract: Methods, systems, apparatus, and computer programs, for tracking objects are disclosed. In one aspect, a method is disclosed that includes actions of obtaining an image, determining that a user of a first monitoring system has opted-in for object tracking by a second monitoring system that is remote from the first monitoring system, and based on a determination that the user of the first monitoring system has opted-in for object tracking: determining whether the obtained image satisfies a predetermined level of similarity to a stored tracking object image model stored on a first device of the first monitoring system, and based on a determination that the obtained image satisfies a predetermined level of similarity to the stored tracking object image model, generating a tracking update notification, and transmitting the tracking update notification to the second monitoring system that is remote from the first monitoring system.
-
公开(公告)号:US11657666B2
公开(公告)日:2023-05-23
申请号:US17545094
申请日:2021-12-08
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner
CPC classification number: G07C9/37 , G07C9/00563 , G07C9/21 , G08B13/196 , H04N7/181 , H04N7/185 , G06V40/172 , G06V40/197
Abstract: A method includes receiving, by a monitoring system that is configured to monitor a property and from a visitor to the property, a personally identifying code and a biometric identifier, determining that the personally identifying code corresponds to a stored personally identifying code, receiving, by the monitoring system, location information that corresponds to locations of the visitor during a time period before visiting the property, comparing the biometric identifier to a stored biometric identifier, based on determining that the personally identifying code corresponds to a stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determining a confidence score that reflects a likelihood that the visitor is authorized to access the property, based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, selecting, from among multiple monitoring system actions, a monitoring system action, and performing the monitoring system action.
-
公开(公告)号:US11631309B2
公开(公告)日:2023-04-18
申请号:US17576656
申请日:2022-01-14
Applicant: Alarm.com Incorporated
Inventor: Adam T. Barth , Zackary Watson , Daniel Todd Kerzner
IPC: G08B13/196 , G08B25/00 , G08B25/14 , G08B13/24 , G08B25/01
Abstract: Techniques are described for replacing a keypad of an existing security system within a property with a communication-enabled keypad device with dual functioning capabilities as a communicator device and a keypad device. In some implementations, data is received from a security panel of a property. A keypad bus protocol of the security panel is determined based on the data received from the security panel. Sensor data is received from one or more sensors located within the property. A monitoring system command that is not specified within a keypad bus of the security panel is determined based on based on the obtained sensor data. The monitoring system command is converted to a panel command using the keypad bus protocol. The panel command is transmitted on the keypad bus of the security panel.
-
-
-
-
-
-
-
-
-