Abstract:
Systems and methods for providing spoken messages that reflect event status of one or more hazard detection systems within a smart-home environment are described herein. The messages can inform occupants in concise manner that does not overload cognitive recognition of those occupants. For example, the messages may be prioritized to limit the amount of information that is spoken and intelligently condense information in as concise a manner as possible. This may be accomplished by using one or more speaking paradigms to compile audible messages to be played back through a speaker of the hazard detection system.
Abstract:
A method performed at a computer system includes: receiving current location data for a user; receiving door lock activation data for a door of a dwelling of the user; receiving current occupancy data for the dwelling; determining a configuration of a controller for the dwelling, based at least in part on the received current location data for the user, the received door lock activation data for the door, and the received current occupancy data for the dwelling; if the door was locked from inside the dwelling and the user is present in the dwelling, setting or sending instructions to set a configuration of the controller to a first configuration; and, if the door was locked from outside the dwelling and the user is not present in the dwelling, setting or sending instructions to set the configuration of the controller to a second configuration, distinct from the first configuration.
Abstract:
This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.
Abstract:
Embodiments provided herein relate to controlling a household via one or more household policies. In one embodiment, a method includes: receiving, at a processor, a household policy for a household, the household policy related to attaining an end goal; determining, via interpretation of the household policy by the processor, an end goal state of the household policy; incrementally modifying a control trigger threshold of a conditionally controlled smart device over time until the end goal state is reached; wherein the control trigger threshold indicates when the conditionally controlled smart device should be controlled to implement a particular function.
Abstract:
This disclosure relates to systems and methods for verifying that a device is using its Wi-Fi circuitry in compliance with the regulations governing the location in which the device is located. Embodiments discussed herein can verify the location using location verification tools that evaluate locally ascertainable factors that contribute to a probability determination of the device's location. Locally ascertainable factors include information that be gleaned from the surroundings of the device. The surroundings or environment in which the device resides may provide clues as to whether the device is located in a particular regulatory domain.
Abstract:
Various embodiments involving a smart-home device are presented. It may be determined that the power supply interface has ceased receiving power from the structure's wired electrical system. In response to determining that a power supply interface of the smart-home device has ceased receiving power from a structure's wired electrical system, a power loss indication may be stored that comprises a timestamp. A network connection may be determined to be available. A notification may be transmitted of information from the stored power loss indication to a remote server via the available network connection.
Abstract:
A thermostat may include a proximity sensor and a temperature sensor on a sensor mount assembly with a first alignment feature. A lens assembly may have a first area, a second area, and a second alignment feature, where the second area includes a Fresnel lens, and the first area is thinner than the second area. The thermostat may also include a frame member with third and fourth alignment features configured for respective matable alignment with the first and second alignment features and configured such that the proximity sensor and the temperature sensor are maintained in generally close, non-touching proximity to the lens assembly, the first area of the lens assembly being aligned with the proximity sensor, and the second area of the lens assembly being aligned with the temperature sensor.
Abstract:
This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.
Abstract:
A particular smart hazard detector may itself function as a guide during a process of installation of the same at an installation location. Additionally, the installation location of the particular smart hazard detector may play a central role in how various settings of the smart hazard detector are defined and adjusted over time.
Abstract:
A method for establishing a pairing between a hazard detector and an online account may include instantiating an application on a mobile computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the hazard detector. The hazard detector may broadcast a Wi-Fi access point, and the application may join the Wi-Fi access point. The application can be authenticated by the hazard detector using the second code, and the application can receive an identity of a home Wi-Fi network from a user. The application can then transmit the identity of the home Wi-Fi network to the hazard detector. The hazard detector can use the home Wi-Fi network to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.