Verified access to a monitored property

    公开(公告)号:US10657742B1

    公开(公告)日:2020-05-19

    申请号:US16450214

    申请日:2019-06-24

    Abstract: A method includes receiving, by a monitoring system that is configured to monitor a property and from a visitor to the property, a personally identifying code and a biometric identifier, determining that the personally identifying code corresponds to a stored personally identifying code, receiving, by the monitoring system, location information that corresponds to locations of the visitor during a time period before visiting the property, comparing the biometric identifier to a stored biometric identifier, based on determining that the personally identifying code corresponds to a stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determining a confidence score that reflects a likelihood that the visitor is authorized to access the property, based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, selecting, from among multiple monitoring system actions, a monitoring system action, and performing the monitoring system action.

    Doorbell call center
    12.
    发明授权

    公开(公告)号:US10218855B2

    公开(公告)日:2019-02-26

    申请号:US15811141

    申请日:2017-11-13

    Abstract: Techniques are described for enabling a service administrator to respond to a detected doorbell press at a property when an authorized user is unavailable to respond. In some implementations, a determination that a doorbell press has been detected at a property is made. Video data collected by a doorbell device of the property is obtained in response to determining that the doorbell press has been detected at the property. Sensor data collected by one or more sensors of a monitoring system located within the property is obtained in response to determining that the doorbell press has been detected at the property. A present security risk for the property is determined based at least on the obtained sensor data and the obtained video data. A communication session between the doorbell device and a server system associated with the monitoring system of the property is established in response to determining the present security risk for the property.

    DOORBELL CALL CENTER
    13.
    发明申请

    公开(公告)号:US20180139332A1

    公开(公告)日:2018-05-17

    申请号:US15811141

    申请日:2017-11-13

    Abstract: Techniques are described for enabling a service administrator to respond to a detected doorbell press at a property when an authorized user is unavailable to respond. In some implementations, a determination that a doorbell press has been detected at a property is made. Video data collected by a doorbell device of the property is obtained in response to determining that the doorbell press has been detected at the property. Sensor data collected by one or more sensors of a monitoring system located within the property is obtained in response to determining that the doorbell press has been detected at the property. A present security risk for the property is determined based at least on the obtained sensor data and the obtained video data. A communication session between the doorbell device and a server system associated with the monitoring system of the property is established in response to determining the present security risk for the property.

    DYNAMIC RESPONSE CONTROL SYSTEM
    15.
    发明公开

    公开(公告)号:US20240242581A1

    公开(公告)日:2024-07-18

    申请号:US18415085

    申请日:2024-01-17

    CPC classification number: G08B13/19606 G08B3/1033

    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating verbal message. One of the methods includes: receiving sensor data indicating attributes of a person at a physical property; determining, using the sensor data, that a likelihood that a conversation should be initiated with the person satisfies a first likelihood threshold; determining, using first data from the sensor data, a deterrence strategy with a second likelihood threshold of causing the person to leave the physical property; generating, using second data from the sensor data and the deterrence strategy, a verbal message that is a) for the person and b) has the second likelihood threshold; and providing, to a presentation device, a command to cause the presentation device to present the verbal message.

    Face concealment detection
    17.
    发明授权

    公开(公告)号:US11978256B2

    公开(公告)日:2024-05-07

    申请号:US17205071

    申请日:2021-03-18

    Abstract: A monitoring system is configured to monitor a property. The monitoring system includes a camera, a sensor, and a monitor control unit. The monitor control unit is configured to receive image data and sensor data. The monitor control unit is configured to determine that the image data includes a representation of a person. The monitor control unit is configured to determine an orientation of a representation of a head of the person. The monitor control unit is configured to determine that the representation of the head of the person likely includes a representation of a face of the person. The monitor control unit is configured to determine that the face of the person is likely concealed. The monitor control unit is configured to determine a malicious intent score that reflects a likelihood that the person has a malicious intent. The monitor control unit is configured to perform an action.

    Connected automation controls using robotic devices

    公开(公告)号:US11637716B1

    公开(公告)日:2023-04-25

    申请号:US17001029

    申请日:2020-08-24

    Abstract: Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a robotic device to manipulate a manual control of a device. In one aspect, the system includes a robotic device, a first device that is located at a property and that has a manual control, and a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include determining an operating state of the first device, determining the state of the monitoring system, determining whether one or more of the manual controls associated with the first device should be manipulated to alter the operating state of the first device, and transmitting one or more instruction to the robotic device that instruct the robotic device to manipulate one or more manual controls that are associated the first device.

Patent Agency Ranking