-
公开(公告)号:US20220092298A1
公开(公告)日:2022-03-24
申请号:US17472884
申请日:2021-09-13
Applicant: ALARM.COM INCORPORATED
Inventor: Donald Gerard Madden , Daniel Todd Kerzner , Allison Beach , Benjamin Asher Berg
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for automatically cleaning a portion of an environment. One of the methods includes detecting movement of a person within a physical environment; determining that one or more threshold criteria for cleaning at least a portion of the physical environment are satisfied; detecting one or more areas of the physical environment with cleanliness levels that satisfy a threshold cleanliness level; determining that the portion of the physical environment for which the threshold criteria are satisfied likely was insufficiently cleaned; and in response to determining that the portion of the physical environment for which the threshold criteria are satisfied likely was insufficiently cleaned, sending an instruction to a device in the physical environment to cause the device to present a notification that identifies the portion of the physical environment that likely was insufficiently cleaned.
-
42.
公开(公告)号:US20220070414A1
公开(公告)日:2022-03-03
申请号:US17522530
申请日:2021-11-09
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner , Donald Madden
Abstract: A monitoring system that is configured to monitor a property is disclosed. The monitoring system includes a sensor that is configured to generate sensor data that reflects an attribute of a property. The monitoring system further includes a drone that generates image data, location data, and orientation data. The monitoring system further includes a monitor control unit. The monitor control unit is configured to receive the sensor data, the location data, and the orientation data. The monitor control unit is configured to determine that an event has occurred at the property and a location of the event within the property. The monitor control unit is configured to generate a graphical overlay based on the event, the location data, and the orientation data. The monitor control unit is configured to generate a graphical interface. The monitor control unit is configured to output the graphical interface.
-
公开(公告)号:US20220027648A1
公开(公告)日:2022-01-27
申请号:US17383942
申请日:2021-07-23
Applicant: Alarm.com Incorporated
Inventor: Stephen Scott Trundle , Daniel Todd Kerzner , Allison Beach , Babak Rezvani , Donald Gerard Madden
Abstract: Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for visual authentication. In some implementations, a method may include obtaining images of a person at a property; detecting a discontinuity in an appearance of the person in the images of the person at the property; determining that the discontinuity does not correspond to a known occlusion; and providing an indication of a potential spoofing attack.
-
公开(公告)号:US20210385106A1
公开(公告)日:2021-12-09
申请号:US17406367
申请日:2021-08-19
Applicant: Alarm.com Incorporated
Inventor: Abraham Joseph Kinney , Daniel Todd Kerzner , Jeffrey A. Bedell , David James Hutz
Abstract: Techniques are described for using information from a knob sensor of an appliance in a property monitoring system. In some implementations, a monitoring system may be configured to receive sensor information from a knob, receive monitoring device information from a monitoring device and, based on the sensor information from the knob, identify a knob event. The monitoring system may integrate the knob event with the monitoring device information and analyze the integrated knob event and monitoring device information against one or more rules related to usage of the appliance in view of the state of the property. Based on analyzing the integrated knob event and monitoring device information, the monitoring system may determine whether to perform an action, such as notifying a user or activating an appliance.
-
公开(公告)号:US20210248887A1
公开(公告)日:2021-08-12
申请号:US17235298
申请日:2021-04-20
Applicant: Alarm.com Incorporated
Inventor: Donald Madden , Daniel Todd Kerzner , Stephanie Sun Kinney
IPC: G08B13/196 , G06K9/62
Abstract: Methods, systems, apparatus, and computer programs, for tracking objects are disclosed. In one aspect, a method is disclosed that includes actions of obtaining an image, determining that a user of a first monitoring system has opted-in for object tracking by a second monitoring system that is remote from the first monitoring system, and based on a determination that the user of the first monitoring system has opted-in for object tracking: determining whether the obtained image satisfies a predetermined level of similarity to a stored tracking object image model stored on a first device of the first monitoring system, and based on a determination that the obtained image satisfies a predetermined level of similarity to the stored tracking object image model, generating a tracking update notification, and transmitting the tracking update notification to the second monitoring system that is remote from the first monitoring system.
-
公开(公告)号:US20210201005A1
公开(公告)日:2021-07-01
申请号:US17205071
申请日:2021-03-18
Applicant: Alarm.com Incorporated
Inventor: Donald Madden , Achyut Boggaram , Gang Qian , Daniel Todd Kerzner
IPC: G06K9/00 , G06K9/62 , G08B13/196
Abstract: A monitoring system is configured to monitor a property. The monitoring system includes a camera, a sensor, and a monitor control unit. The monitor control unit is configured to receive image data and sensor data. The monitor control unit is configured to determine that the image data includes a representation of a person. The monitor control unit is configured to determine an orientation of a representation of a head of the person. The monitor control unit is configured to determine that the representation of the head of the person likely includes a representation of a face of the person. The monitor control unit is configured to determine that the face of the person is likely concealed. The monitor control unit is configured to determine a malicious intent score that reflects a likelihood that the person has a malicious intent. The monitor control unit is configured to perform an action.
-
公开(公告)号:US10963681B2
公开(公告)日:2021-03-30
申请号:US16261879
申请日:2019-01-30
Applicant: Alarm.com Incorporated
Inventor: Donald Madden , Achyut Boggaram , Gang Qian , Daniel Todd Kerzner
IPC: G06K9/00 , G06K9/62 , G08B13/196
Abstract: A monitoring system is configured to monitor a property. The monitoring system includes a camera, a sensor, and a monitor control unit. The monitor control unit is configured to receive image data and sensor data. The monitor control unit is configured to determine that the image data includes a representation of a person. The monitor control unit is configured to determine an orientation of a representation of a head of the person. The monitor control unit is configured to determine that the representation of the head of the person likely includes a representation of a face of the person. The monitor control unit is configured to determine that the face of the person is likely concealed. The monitor control unit is configured to determine a malicious intent score that reflects a likelihood that the person has a malicious intent. The monitor control unit is configured to perform an action.
-
公开(公告)号:US10756919B1
公开(公告)日:2020-08-25
申请号:US15824695
申请日:2017-11-28
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner , Stephen Scott Trundle
Abstract: Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a robotic device to manipulate a manual control of a device. In one aspect, the system includes a robotic device, a first device that is located at a property and that has a manual control, and a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include determining an operating state of the first device, determining the state of the monitoring system, determining whether one or more of the manual controls associated with the first device should be manipulated to alter the operating state of the first device, and transmitting one or more instruction to the robotic device that instruct the robotic device to manipulate one or more manual controls that are associated the first device.
-
公开(公告)号:US20200228665A1
公开(公告)日:2020-07-16
申请号:US16715497
申请日:2019-12-16
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner
Abstract: Techniques are described for enabling a service administrator to respond to a detected doorbell press at a property when an authorized user is unavailable to respond. In some implementations, a determination that a doorbell press has been detected at a property is made. Video data collected by a doorbell device of the property is obtained in response to determining that the doorbell press has been detected at the property. Sensor data collected by one or more sensors of a monitoring system located within the property is obtained in response to determining that the doorbell press has been detected at the property. A present security risk for the property is determined based at least on the obtained sensor data and the obtained video data. A communication session between the doorbell device and a server system associated with the monitoring system of the property is established in response to determining the present security risk for the property.
-
公开(公告)号:US10360744B1
公开(公告)日:2019-07-23
申请号:US15814297
申请日:2017-11-15
Applicant: Alarm.com Incorporated
Inventor: Daniel Todd Kerzner
Abstract: A method includes receiving, by a monitoring system that is configured to monitor a property and from a visitor to the property, a personally identifying code and a biometric identifier, determining that the personally identifying code corresponds to a stored personally identifying code, receiving, by the monitoring system, location information that corresponds to locations of the visitor during a time period before visiting the property, comparing the biometric identifier to a stored biometric identifier, based on determining that the personally identifying code corresponds to a stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determining a confidence score that reflects a likelihood that the visitor is authorized to access the property, based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, selecting, from among multiple monitoring system actions, a monitoring system action, and performing the monitoring system action.
-
-
-
-
-
-
-
-
-