-
公开(公告)号:US10657742B1
公开(公告)日:2020-05-19
申请号:US16450214
申请日:2019-06-24
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner
Abstract: A method includes receiving, by a monitoring system that is configured to monitor a property and from a visitor to the property, a personally identifying code and a biometric identifier, determining that the personally identifying code corresponds to a stored personally identifying code, receiving, by the monitoring system, location information that corresponds to locations of the visitor during a time period before visiting the property, comparing the biometric identifier to a stored biometric identifier, based on determining that the personally identifying code corresponds to a stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determining a confidence score that reflects a likelihood that the visitor is authorized to access the property, based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, selecting, from among multiple monitoring system actions, a monitoring system action, and performing the monitoring system action.
-
公开(公告)号:US10218855B2
公开(公告)日:2019-02-26
申请号:US15811141
申请日:2017-11-13
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner
Abstract: Techniques are described for enabling a service administrator to respond to a detected doorbell press at a property when an authorized user is unavailable to respond. In some implementations, a determination that a doorbell press has been detected at a property is made. Video data collected by a doorbell device of the property is obtained in response to determining that the doorbell press has been detected at the property. Sensor data collected by one or more sensors of a monitoring system located within the property is obtained in response to determining that the doorbell press has been detected at the property. A present security risk for the property is determined based at least on the obtained sensor data and the obtained video data. A communication session between the doorbell device and a server system associated with the monitoring system of the property is established in response to determining the present security risk for the property.
-
公开(公告)号:US20180139332A1
公开(公告)日:2018-05-17
申请号:US15811141
申请日:2017-11-13
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner
IPC: H04M11/04 , G08B13/196 , H04L29/08
CPC classification number: H04M11/045 , G06K9/00228 , G08B13/19645 , G08B13/19684 , G08B21/0476 , H04L29/08099 , H04L67/12 , H04L67/141 , H04L67/22 , H04M11/025 , H04N7/186
Abstract: Techniques are described for enabling a service administrator to respond to a detected doorbell press at a property when an authorized user is unavailable to respond. In some implementations, a determination that a doorbell press has been detected at a property is made. Video data collected by a doorbell device of the property is obtained in response to determining that the doorbell press has been detected at the property. Sensor data collected by one or more sensors of a monitoring system located within the property is obtained in response to determining that the doorbell press has been detected at the property. A present security risk for the property is determined based at least on the obtained sensor data and the obtained video data. A communication session between the doorbell device and a server system associated with the monitoring system of the property is established in response to determining the present security risk for the property.
-
公开(公告)号:US20240273950A1
公开(公告)日:2024-08-15
申请号:US18630234
申请日:2024-04-09
Applicant: Alarm.com Incorporated
Inventor: Stephen Scott Trundle , Daniel Todd Kerzner , Allison Beach , Babak Rezvani , Donald Gerard Madden
CPC classification number: G06V40/40 , G06V10/40 , G06V10/751 , G06V40/10
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for visual authentication. In some implementations, a method may include obtaining images of a person at a property; detecting a discontinuity in an appearance of the person in the images of the person at the property; determining that the discontinuity does not correspond to a known occlusion; and providing an indication of a potential spoofing attack.
-
公开(公告)号:US20240242581A1
公开(公告)日:2024-07-18
申请号:US18415085
申请日:2024-01-17
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner , Allison Beach , Benjamin Asher Berg , Donald Gerard Madden
IPC: G08B13/196 , G08B3/10
CPC classification number: G08B13/19606 , G08B3/1033
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for generating verbal message. One of the methods includes: receiving sensor data indicating attributes of a person at a physical property; determining, using the sensor data, that a likelihood that a conversation should be initiated with the person satisfies a first likelihood threshold; determining, using first data from the sensor data, a deterrence strategy with a second likelihood threshold of causing the person to leave the physical property; generating, using second data from the sensor data and the deterrence strategy, a verbal message that is a) for the person and b) has the second likelihood threshold; and providing, to a presentation device, a command to cause the presentation device to present the verbal message.
-
公开(公告)号:US11983963B2
公开(公告)日:2024-05-14
申请号:US17383942
申请日:2021-07-23
Applicant: Alarm.com Incorporated
Inventor: Stephen Scott Trundle , Daniel Todd Kerzner , Allison Beach , Babak Rezvani , Donald Gerard Madden
CPC classification number: G06V40/40 , G06V10/40 , G06V10/751 , G06V40/10
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for visual authentication. In some implementations, a method may include obtaining images of a person at a property; detecting a discontinuity in an appearance of the person in the images of the person at the property; determining that the discontinuity does not correspond to a known occlusion; and providing an indication of a potential spoofing attack.
-
公开(公告)号:US11978256B2
公开(公告)日:2024-05-07
申请号:US17205071
申请日:2021-03-18
Applicant: Alarm.com Incorporated
Inventor: Donald Madden , Achyut Boggaram , Gang Qian , Daniel Todd Kerzner
CPC classification number: G06V20/52 , G06F18/251 , G06V40/10 , G06V40/161 , G06V40/167 , G06V40/20 , G08B13/19602
Abstract: A monitoring system is configured to monitor a property. The monitoring system includes a camera, a sensor, and a monitor control unit. The monitor control unit is configured to receive image data and sensor data. The monitor control unit is configured to determine that the image data includes a representation of a person. The monitor control unit is configured to determine an orientation of a representation of a head of the person. The monitor control unit is configured to determine that the representation of the head of the person likely includes a representation of a face of the person. The monitor control unit is configured to determine that the face of the person is likely concealed. The monitor control unit is configured to determine a malicious intent score that reflects a likelihood that the person has a malicious intent. The monitor control unit is configured to perform an action.
-
公开(公告)号:US11860637B2
公开(公告)日:2024-01-02
申请号:US17174810
申请日:2021-02-12
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner , Donald Gerard Madden , Babak Rezvani , Ahmad Seyfi , Glenn Tournier
CPC classification number: G05D1/0225 , G05D1/0027 , G05D1/0088 , G05D1/0223 , G05D2201/0207
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for a mobile docking station. In some implementations, a method for a mobile docking station includes receiving a service request from a first user; determining assignment details based on the service request; determining a plurality of devices to send to a location based on the assignment details; deploying the plurality of devices to the location; receiving data from a first device of the plurality of devices; based on the data, scheduling a pickup of the first device; and deploying a second device for the pickup of the first device.
-
公开(公告)号:US11790742B2
公开(公告)日:2023-10-17
申请号:US17569033
申请日:2022-01-05
Applicant: Alarm.com Incorporated
Inventor: Michael Li , Daniel Todd Kerzner , Allison Beach , Abraham Joseph Kinney , Donald Madden , Jeffrey A. Bedell
IPC: G06V20/00 , G08B13/196 , G06Q10/0833 , G08B25/08 , G06V20/52 , G06V20/40 , G06V40/20 , G06V30/224
CPC classification number: G08B13/19645 , G06Q10/0833 , G06V20/41 , G06V20/52 , G06V40/20 , G08B13/19613 , G08B25/08 , G06V20/44 , G06V30/224
Abstract: Systems and techniques are described for supervising and monitoring the delivery of a package to a property. In some implementations, shipment data indicating a package to be delivered at the property and identification information for a first person is obtained. A request for a second person to access the property and deliver the package that includes identification information for the second person is received. Identification information for the first person is compared to the identification information for the second person. Access to the property is provided to the second person. Sensor data generated by one or more sensors that are located throughout the property and while providing access to the property is obtained and analyzed. A determination of whether the second person delivered the package to the property is made based on analyzing the sensor data. Data indicating the determination is provided for output.
-
公开(公告)号:US11637716B1
公开(公告)日:2023-04-25
申请号:US17001029
申请日:2020-08-24
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner , Stephen Scott Trundle
Abstract: Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a robotic device to manipulate a manual control of a device. In one aspect, the system includes a robotic device, a first device that is located at a property and that has a manual control, and a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include determining an operating state of the first device, determining the state of the monitoring system, determining whether one or more of the manual controls associated with the first device should be manipulated to alter the operating state of the first device, and transmitting one or more instruction to the robotic device that instruct the robotic device to manipulate one or more manual controls that are associated the first device.
-
-
-
-
-
-
-
-
-