DOORBELL COMMUNICATION SYSTEMS AND METHODS
Doorbells can be configured to wirelessly communicate with a remotely located computing device. Some embodiments of the doorbell can be configured to enter a network connection mode. The network connection mode can include detecting a first wireless network having a name and a password. The network connection mode can also include using the remotely located computing device to scan a barcode such as a Quick Response Code.
This application claims the benefit of and is a continuation-in-part of U.S. Nonprovisional patent application Ser. No. 14/589,830; filed Jan. 5, 2015; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. The entire contents of patent application Ser. No. 14/589,830 are incorporated by reference herein.
This application claims the benefit of and is a continuation-in-part of U.S. Nonprovisional patent application Ser. No. 14/502,601; filed Sep. 30, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. The entire contents of patent application Ser. No. 14/502,601 are incorporated by reference herein.
This application claims the benefit of and is a continuation-in-part of U.S. Nonprovisional patent application Ser. No. 14/492,809; filed Sep. 22, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; which claims the benefit of and is a continuation-in-part of U.S. Nonprovisional patent application Ser. No. 14/275,811; filed May 12, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S. Pat. No. 8,872,915); which claims the benefit of and is a continuation-in-part of U.S. Nonprovisional patent application Ser. No. 14/142,839; filed Dec. 28, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S. Pat. No. 8,842,180); which claims the benefit of and is a continuation-in-part of U.S. Nonprovisional patent application Ser. No. 14/099,888; filed Dec. 6, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S. Pat. No. 8,823,795); which claims the benefit of and is a continuation of U.S. Nonprovisional patent application Ser. No. 14/098,772; filed Dec. 6, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S. Pat. No. 8,780,201); which claims the benefit of U.S. Provisional Patent Application No. 61/872,439; filed Aug. 30, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; and also claims the benefit of U.S. Provisional Patent Application No. 61/859,070; filed Jul. 26, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. The entire contents of patent application Ser. No. 14/492,809; U.S. Pat. No. 8,872,915; U.S. Pat. No. 8,842,180; U.S. Pat. No. 8,823,795; U.S. Pat. No. 8,780,201; Patent Application No. 61/872,439; and Patent Application No. 61/859,070 are incorporated by reference herein.
The entire contents of the following application are incorporated herein by reference: International Application No. PCT/US14/53506; filed Aug. 29, 2014 with the U.S. Patent and Trademark Office; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS.
The entire contents of the following application are incorporated herein by reference: International Application No. PCT/US14/47622; filed Jul. 22, 2014 with the U.S. Patent and Trademark Office; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS.
BACKGROUND1. Field
Various embodiments disclosed herein relate to doorbells. Certain embodiments relate to communication between a person near a doorbell and a person in another location.
2. Description of Related Art
Homes, offices, and other buildings sometimes include communication and surveillance systems to enable friendly visitors to summon occupants of the buildings and to deter unwanted visitors. Communication and surveillance systems can include video cameras and doorbells.
Doorbells can enable a person located outside of an entry point, such as a door, to alert a person inside of an entry point that someone outside would like to talk to someone inside. Doorbells sometimes include a button located near a door, such as a front door, side door, or back door of a home, office, dwelling, warehouse, building, or structure. Doorbells are sometimes used near a gate or some other entrance to a partially enclosed area. Pushing the doorbell sometimes causes a chime or other alerting sound to be emitted. In some cases, this alerting sound can typically be heard within a short distance from the entry point or sound source. For example, a homeowner located remotely from her home likely would not be able to hear the alerting sound, and thus, would not be aware that someone is ringing her doorbell. Thus, there is a need for devices and methods to alert remotely located individuals that someone seeks the attention of the homeowner, tenant, building guardian, or steward.
SUMMARYDoorbells can be used to wirelessly communicate with a remotely located computing device to enable a visitor to communicate remotely with a user of the remotely located computing device. The remotely located computing device can be a cellular telephone, a smartphone, a tablet, a laptop computer, a desktop computer, and/or a computer configured to use software. The remotely located computing device can be placed very close to the doorbell to configure the doorbell, but then can communicate with the doorbell from remote locations (e.g., from another portion of the building to which the doorbell is attached, from across a city, from across a country, from across the globe). In some embodiments, the remotely located computing device is communicatively coupled to the doorbell via a wire to enable the remotely located computing device to help configure the doorbell. In several embodiments, the remotely located computing device creates a wireless network to help configure the doorbell while the doorbell is within a communication range of the wireless network. Once the doorbell is configured, the wireless network created by the remotely located computing device may no longer be necessary because the doorbell can communicate with the remotely located computing device via another wireless network, which can include the Internet and cellular networks.
Some embodiments include using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. Embodiments can include obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button. The doorbell can be configurable to enable a visitor to sound a chime. Several embodiments include detecting a first indication of the visitor; using the doorbell to send a wireless notification to the remotely located computing device regarding the visitor; and entering a network connection mode prior to sending the wireless notification. The first indication (and other indications) can be detected using the doorbell (e.g., via a sensor of the doorbell, via data sent to the doorbell).
In several embodiments, the network connection mode comprises using the doorbell to detect a first wireless network. Using the doorbell to detect the first wireless network can include the doorbell sensing the first wireless network (e.g., by searching for wireless networks that are within range of the doorbell). The doorbell can also detect the first wireless network via data sent to the doorbell (e.g., from the remotely located computing device). In some embodiments, the doorbell detects the first wireless network when the doorbell connects to the first wireless network. Thus, the term “detect” is used herein in a very broad sense and can include direct detection and indirect detection (e.g., via another computer).
The first wireless network can comprise a first name and a first password. The network connection mode can comprise the remotely located computing device creating a second wireless network. In some embodiments, the network connection mode comprises the remotely located computing device transmitting the first password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network. The doorbell can directly communicate with the remotely located computing device via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network. In some embodiments, the doorbell indirectly communicates with the remotely located computing device via a server, the Internet, a cellular communication network, and/or a wireless router that is not physically coupled to the doorbell or to the remotely located computing device.
Some embodiments include using the doorbell to detect a proximity indication of the remotely located computing device; determining if the proximity indication meets a predetermined proximity threshold such that the proximity indication indicates that the remotely located computing device is sufficiently close to the doorbell; and connecting the doorbell to the second wireless network in response to the proximity indication meeting the predetermined proximity threshold. The proximity threshold can be a certain value or characteristic. In several embodiments, a proximity indication can meet a predetermined proximity threshold if the remotely located computing device is within a predetermined distance of the doorbell. The distance can be 100 feet, 50 feet, 20 feet, 10 feet, and/or 5 feet.
In several embodiments, a proximity indication can meet a predetermined proximity threshold if a measurement of signal quality is above a certain value (or below a certain value). In several embodiments, a proximity indication can meet a predetermined proximity threshold if a signal to noise ratio is above a certain threshold. In some embodiments, determining if the proximity indication meets a predetermined proximity threshold requires that the proximity indication indicates that the remotely located computing device is sufficiently close to the doorbell (e.g., is sufficiently close to enable the remotely located computing device to communication with the doorbell via the second wireless network).
Various embodiment use diverse proximity indications including measurements of signal quality, signal strength, upload speed, and/or download speed. The upload speed and the download speed can be measured between the doorbell and the remotely located computing device. Determining if the proximity indication meets the predetermined proximity threshold can comprise a signal to noise analysis of the second wireless network.
Some embodiments include using the remotely located computing device to run software configured to transmit the first password from the remotely located computing device to the doorbell; using the software to transmit data to the doorbell that enables the doorbell to realize that the remotely located computing device is configured to communicate with the doorbell; and accepting the first password from the remotely located computing device in response to the doorbell receiving the data from the remotely located computing device.
Several embodiments include using the doorbell to detect the second wireless network while the second wireless network does not require a password to connect to the second wireless network (e.g., the second wireless network can be configured to enable the doorbell to connect to the second wireless network without using a password). Embodiments can also include connecting the doorbell to the second wireless network prior to connecting the doorbell to the first wireless network in response to the second wireless network being configured to enable the doorbell to connect to the second wireless network without using a password.
In some embodiments, the doorbell can search for wireless networks. Then, the doorbell can automatically connect to a wireless network that does not require a password. Then, the doorbell can detect whether the wireless network transmits data that comprises a password to another wireless network. Then, the doorbell can use the password to connect to the other wireless network (e.g., in response to searching for a wireless network that allows communication access based on the password).
Embodiments can include prompting a user of the remotely located computing device to enter the first password of the first wireless network into the remotely located computing device (e.g., by typing the password into an “app” running on a smart phone or by speaking the password into the smart phone). Then, embodiments can transmit the first password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network. Then, embodiments can include using the first password to enable indirect communication between the doorbell and the remotely located computing device via the first wireless network. This indirect communication can occur via an intermediary device such as any suitable computer or wireless router that is not attached to the doorbell or to the remotely located computing device. The direct communication does not require an intermediary device that is not attached to the doorbell or to the remotely located computing device because the second wireless network can transmit data directly from the remotely located computing device to the doorbell.
In several embodiments, the system is configured to select a wireless network for indirect communication between the doorbell and the remotely located computing device due to the remotely located computing device being configured to connect to the wireless network (e.g., the remotely located computing device previously connected to the wireless network).
In some embodiments, the network connection mode comprises connecting the doorbell to the first wireless network to which the remotely located computing device is connected such that the doorbell can send an alert regarding a presence of the visitor to the remotely located computing device via the first wireless network.
Embodiments can also include using the doorbell to detect multiple wireless networks. The multiple wireless networks can comprise the first wireless network. Embodiments can further comprise the doorbell selecting the first wireless network from the multiple wireless networks in response to the remotely located computing device being configured to connect to the first wireless network (to enable the doorbell to connect to the first wireless network to which the remotely located computing device is connected).
The doorbell can be used to detect that the remotely located computing device is connected to the first wireless network. Then, embodiments can include selecting the first wireless network from the multiple wireless networks in response to the doorbell detecting that the remotely located computing device is connected to the first wireless network. The doorbell can detect that the remotely located computing device is connected to the first wireless network based on data sent from the remotely located computing device to the doorbell via the second wireless network.
Several embodiments include using the doorbell to detect multiple wireless networks, and then selecting the first wireless network from the multiple wireless networks in response to the remotely located computing device being configured to connect to the first wireless network. The remotely located computing device can be configured to connect to the first wireless network such that the remotely located computing device has the first password of the first wireless network and such that the remotely located computing device is arranged to connect to the first wireless network when the remotely located computing device is located with a wireless range of the first wireless network. If the computing device is outside the wireless range, then the computing device cannot connect to the first wireless network. The doorbell can automatically connect to the first wireless network in response to detecting that the remotely located computing device is connected to the first wireless network and in response to receiving the first password from the remotely located computing device.
In some embodiments, a doorbell system comprises the doorbell and a remotely located computer that is connected to the Internet. Embodiments can also include connecting the doorbell to the first wireless network using the first password of the first wireless network transmitted from the remotely located computing device to the doorbell via the second wireless network (that was created by the remotely located computing device). Then, at least a portion of the doorbell system can prevent the doorbell from connecting to a third wireless network in response to the doorbell previously being configured to connect to the first wireless network. Then, the remotely located computer can enable the doorbell to connect to the third wireless network. Preventing connecting to a new wireless network after connecting with a previous wireless network can discourage theft by making a stolen doorbell unusable (e.g., without intervention from the doorbell manufacturer or customer service representative).
The doorbell system can prevent the doorbell from connecting to the third wireless network by placing the doorbell in a connection lock mode that prevents the doorbell from connecting to a new wireless network. The remotely located computer can enable the doorbell to enter a connection unlock mode that is configured such that the doorbell can connect to the new wireless network.
When the doorbell is stolen, the connection lock mode can be configured to prevent the doorbell from connecting to the new wireless network without intervention by the remotely located computer. The remotely located computer can be configured to enable the doorbell to enter the connection unlock mode in response to input from a remotely located administrator (e.g., a customer service representative, a user of the remotely located computing device that enabled the doorbell to connect to the first wireless network).
Some embodiments include entering the network connection mode in response to pressing the button for at least a predetermined amount of time. The button can be configured to sound the chime or can be another button on the doorbell. The predetermined amount of time can be at least four seconds (to enable the doorbell to distinguish between visitors who are trying to “ring” the chime and users who are trying to make the doorbell enter the network connection mode).
Several embodiments include entering the network connection mode in response to the doorbell detecting electricity from an external power source (e.g., a building's electrical system).
The doorbell can comprise a battery. Embodiments can include coupling the doorbell to an external power source, then using the external power source to charge the battery, and then entering the network connection mode in response to at least partially charging the battery.
Several embodiments include at least some of the following items: connecting the remotely located computing device to the first wireless network; and then the remotely located computing device creating the second wireless network; and then connecting the doorbell to the second wireless network; and then using the second wireless network to connect the doorbell to the first wireless network; and connecting the doorbell to the first wireless network in response to the remotely located computing device having been connected to the first wireless network; and then sending the wireless notification to the remotely located computing device via the first wireless network.
Several embodiments include performing the following items after the remotely located computing device is connected to the first wireless network and before the doorbell is connected to the first wireless network: prompting a user of the remotely located computing device to enter the first password into the remotely located computing device while the remotely located computing device already has the first password (such that the computing device can use the first password to access the first wireless network); at least temporarily recording information entered by the user in response to prompting the user to enter the first password; and sending the information from the remotely located computing device to the doorbell via the second wireless network. The information can include the first password (e.g., an encrypted form of the first password).
Some embodiments include detecting a first indication and a second indication of the visitor. The first indication and the second indication can be detected using the doorbell. Embodiments can include sending the wireless notification to the remotely located computing device regarding the presence of the visitor in response to detecting both the first indication and the second indication.
In several embodiments, detecting the first indication comprises detecting a signal indicative of the visitor above a first threshold, and detecting the second indication comprises detecting the signal indicative of the visitor above a second threshold. The second threshold can be greater than the first threshold. The doorbell can comprises a first sensor (as described in other embodiments). The signal indicative of the visitor can be sensed by the first sensor of the doorbell.
In some embodiments, the doorbell comprises a first sensor and a second sensor. The first indication can be detected using the first sensor. The second indication can be detected using the second sensor. The first sensor can be a different type of sensor than the second sensor.
In several embodiments, while the remotely located computing device and the doorbell are located within a connection range of a third wireless network, the embodiments can include using the remotely located computing device to automatically select the first wireless network rather than the third wireless network for future doorbell wireless communication in response to the remotely located computing device being connected to the first wireless network.
Then, some embodiments include connecting the doorbell to the first wireless network due at least in part to selecting the first wireless network for the future doorbell wireless communication. The future doorbell wireless communication can include the doorbell indirectly communicating with the remotely located computing device via the first wireless network to send the wireless notification regarding the visitor.
The embodiments described above can be combined with any of the embodiments described below.
Methods can include using a doorbell that is configurable to wirelessly communicate with a remotely located computing device, such as a cellular telephone, laptop, or tablet. Some embodiments include obtaining a doorbell that comprises a speaker, a microphone, a camera, and a button. The button can be configurable to enable a visitor to sound a chime (e.g., a speaker or another sound emission device located inside of a building). Several embodiments include shipping the doorbell in a shipping mode that consumes power. In the shipping mode, the doorbell can detect whether the doorbell is electrically coupled to an external power source (e.g., the electricity of a building to which the doorbell is attached). Methods can then include entering a network connection mode in response to detecting electricity from the external power source. The shipping mode can consume less power than the network connection mode. The network connection mode can comprise detecting a wireless network (e.g., a wireless network emitted by a router). Several methods include detecting a first indication of the visitor using the doorbell.
Methods for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device can include obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button. The button can be configured to enable a visitor to sound a chime. Some methods include shipping the doorbell in a shipping mode that consumes power. During the shipping mode, the doorbell can be configured to detect whether the doorbell is electrically coupled to an external power source. Methods can include entering a setup mode in response to detecting electricity from the external power source. The shipping mode can consume less power than the setup mode. The setup mode can increase electrical activities of the doorbell relative to the shipping mode. Some embodiments include increasing the electrical activities of the communication module, circuit board, battery, microphone, speaker, and/or camera. Some embodiments include detecting a first indication of the visitor. The first indication can be detected using the doorbell.
The remotely located computing device can be a cellular telephone having a display screen. Methods can comprise sending an image of the visitor from the doorbell to the cellular telephone and displaying the image of the visitor on the display screen of the cellular telephone.
Some embodiments comprise detecting a second indication of the visitor, wherein the second indication is detected using the doorbell. Several methods comprise sending a wireless notification to the remotely located computing device regarding a presence of the visitor in response to detecting both the first indication and the second indication.
In some embodiments, detecting the first indication comprises detecting a signal indicative of the visitor above a first threshold and detecting the second indication comprises detecting the signal indicative of the visitor above a second threshold. In some embodiments, the second threshold is greater than the first threshold. The doorbell can comprise a first sensor. The signal indicative of the visitor can be sensed by the first sensor of the doorbell.
In several embodiments, the first sensor of the doorbell comprises a motion sensor and the signal is related to motion. The camera, the speaker, and/or the microphone can be disabled during the setup mode.
The first sensor of the doorbell can comprise a proximity sensor. The signal can be related to proximity of the visitor.
The first sensor of the doorbell can comprise a microphone. The signal can be related to sound. In some embodiments, detecting the second indication comprises detecting a knocking sound.
In several embodiments, a doorbell comprises a first sensor and a second sensor. The first indication can be detected using the first sensor and the second indication can be detected using the second sensor. The first sensor can be a different type of sensor than the second sensor.
In some embodiments, the first sensor of the doorbell comprises a motion sensor. The second sensor can comprise the microphone. Methods can comprise using the microphone to detect a knocking sound to verify the presence of the visitor detected by the motion sensor.
In several embodiments, the first sensor of the doorbell can comprise an infrared detector and the second sensor can comprise the camera.
In some embodiments, the doorbell comprises a battery. The setup mode can comprise automatically charging the battery in response to detecting the electricity from the external power source.
In some embodiments, the setup mode comprises automatically replenishing at least a portion of electrical energy consumed from the battery by the doorbell during the shipping mode. Methods can comprise precluding wireless communication by the doorbell until after replenishing the portion of the electrical energy and then entering a network connection mode in response to pressing the button for at least eight seconds. Pressing the button for at least eight seconds can help the doorbell distinguish between when the user just wants to sound the chime and when the user wants the doorbell to enter the network connection mode. The network connection mode can comprise detecting a wireless network.
In several embodiments, the doorbell comprises a battery and the setup mode comprises using the electricity from the external power source to charge the battery before enabling communication between the doorbell and the remotely located computing device.
In some embodiments, the setup mode comprises a network connection mode, and the method comprises entering the network connection mode in response to pressing the button for at least eight seconds. The network connection mode can comprise detecting a wireless network and inputting a doorbell identification code into the remotely located computing device. In some embodiments, inputting the doorbell identification code includes typing letters, numbers, words, and/or symbols on the remotely located computing device. Inputting the doorbell identification code can include speaking letters, numbers, words, and/or symbols such that the remotely located computing device hears the information and captures the information.
The doorbell identification code can be associated with the doorbell such that the code is correlated with at least one doorbell. The code can be used as an electronic key to unlock access to the doorbell. The network connection mode can comprise using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell. For example, the code can prevent an unauthorized computing device from hacking into the doorbell and receiving visitor alerts from the doorbell.
In several embodiments, the network connection mode comprises enabling communication from the remotely located computing device to the doorbell in response to pressing the button for at least eight seconds and inputting the doorbell identification code into the remotely located computing device. Pressing the button for at least eight seconds can help the doorbell distinguish between when the user just wants to sound the chime and when the user wants to enable communication from the remotely located computing device to the doorbell.
In some embodiments, the remotely located computing device is connected to the wireless network such that the remotely located computing device is configured to transmit data via the wireless network. The wireless network can comprise a name and a password. The name can identify the wireless network to entities searching for wireless networks. The password can enable an electronic device to connect to the wireless network. The wireless network can enable electronic devices to connect to the Internet.
The communication from the remotely located computing device to the doorbell can comprise the name and the password of the wireless network to which the remotely located computing device is connected. The network connection mode can comprise connecting the doorbell to the wireless network to which the remotely located computing device is connected such that the doorbell can send an alert regarding a presence of the visitor to the remotely located computing device via the wireless network.
Some embodiments include using the doorbell to detect multiple wireless networks. The wireless network to which the remotely located computing device is connected can be one of the multiple wireless networks. Methods can comprise automatically selecting the wireless network to which the remotely located computing device is connected. For example, the system can choose which wireless network to connect the doorbell without asking a person which wireless network the system should choose.
In some embodiments, a setup mode comprises a network connection mode. Methods can comprise entering the network connection mode in response to pressing the button for at least eight seconds. The network connection mode can comprise detecting a first wireless network having a name and a password. The network connection mode can comprise inputting a doorbell identification code into the remotely located computing device. The doorbell identification code can be associated with the doorbell. The network connection mode can comprise using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell. The network connection mode can comprise the remotely located computing device creating a second wireless network (e.g., that emanates from the remotely located computing device). The network connection mode can comprise transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network. Methods can comprise the remotely located computing device directly communicating with the doorbell via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network. For example, the wireless communication from the remotely located computing device can travel through the air directly to the doorbell. The wireless communication from the remotely located computing device can travel indirectly to the doorbell via a third electronic device such as a server.
A remotely located computing device can be located near a doorbell. For example, during setup some users will hold a cellular phone within a couple of feet from the doorbell to input a doorbell identification code into the cellular phone to verify that the phone is authorized to communicate with the doorbell and to help the doorbell connect to a wireless network. The phone is located remotely from the doorbell because it is not physically attached to the doorbell.
Several methods include using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. Methods can include shipping the doorbell in a shipping mode that consumes power. During some shipping mode embodiments, the doorbell is configured to detect whether the doorbell is electrically coupled to an external power source. Several embodiments include entering a standby mode in response to detecting electricity from the external power source. The shipping mode can consume less power than the standby mode. The speaker and the microphone can be disabled during the standby mode.
Some embodiments include exiting the standby mode and entering an alert mode in response to detecting a first indication of the visitor. The first indication can be detected using the doorbell. Several embodiments include sending a wireless notification to the remotely located computing device regarding a presence of the visitor in response to entering the alert mode.
Some embodiments comprise detecting multiple wireless networks and automatically selecting a first wireless network for communicating between the doorbell and the remotely located computing device. Prior to the automatic selection, the remotely located computing device can be connected to the first wireless network. Methods can further comprise authorizing the doorbell to communicate with the remotely located computing device by pressing the button for at least eight seconds and inputting a doorbell identification code into the remotely located computing device. The doorbell identification code can be associated with the doorbell. The first wireless network can comprise a name and a password. Methods can further comprise wirelessly communicating the name and the password from the remotely located computing device to the doorbell.
Several methods include entering a network connection mode prior to sending the wireless notification. The network connection mode can comprise detecting a first wireless network having a name and a password. The network connection mode can comprise inputting a doorbell identification code into the remotely located computing device. The doorbell identification code can be associated with the doorbell. The network connection mode can further comprise using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell. The network connection mode can comprise the remotely located computing device creating a second wireless network. The network connection mode can comprise transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network. Methods can comprise the doorbell directly communicating with the remotely located computing device via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
In some embodiments, devices enable a person to communicate with a remotely located individual and/or remotely answer a door. For example, a person might ring a doorbell of a building when no one is inside the building. A communication system can notify a remotely located person regarding the doorbell ring via a computing device such as a computer, laptop, or phone. The computing device can then allow the remotely located person to hear, see, and/or communicate with the person who rang the doorbell. In some embodiments, communication systems include a doorbell, a microphone, a speaker, a camera, and/or a wireless communication system. In several embodiments, ringing a doorbell is unnecessary because communication is triggered by a person approaching a sensor such as a motion sensor or proximity sensor. In some embodiments, ringing a doorbell is unnecessary because communication is triggered by a person making a sound, such as a knocking sound, stepping sound, and/or rustling noises.
Some embodiments include a doorbell system configured to electrically couple to an electrical system of a building. The building can have an area in which electrical wires protrude toward an outer portion of the building. The electrical wires are electrically coupled to the electrical system. The doorbell system can include a wireless communication assembly capable of communicating with a wireless network to enable the doorbell system to communicate with a remotely located computing device. The doorbell system can also include a doorbell, a camera, a microphone, and a speaker. The doorbell system can be configured to send images recorded by the camera and sounds recorded by the microphone to the remotely located computing device. The doorbell system can also include a housing coupled to the doorbell, the camera, the microphone, and the speaker. The doorbell system can also include a mounting bracket with an open section configured to fit around the area in which electrical wires protrude toward an outer portion of the building. The mounting bracket can be configured to couple to the housing. The mounting bracket can also be configured to enable the electrical wires to pass through the open section and electrically couple with at least a portion of the doorbell system.
Some embodiments include a method for using a doorbell, wherein the doorbell can be configurable to wirelessly communicate with a remotely located computing device. Methods can include obtaining the doorbell that can comprise a speaker, a microphone, and a camera, wherein the doorbell can be configurable for mounting near an entryway. As used herein, “configurable” can be “capable.”
Several methods can comprise entering a shipping mode and then entering a sleep mode in response to detecting electricity from an external power source, wherein the shipping mode consumes less power than the sleep mode. The shipping mode can consume at least 50% less power or at least 90% less power than a sleep mode.
Methods can include entering a sleep mode, wherein the sleep mode can consume less power (e.g., at least 20% less power, at least 40% less power, at least 65% less power) than a standby mode.
Wireless communication can disabled during the sleep mode such that the doorbell does not wirelessly communicate with the remotely located computing device (e.g., a smartphone or a computer that is not physically coupled to the doorbell). In some embodiments, the doorbell can temporarily exit sleep mode to wirelessly communicate (e.g., with a server or computer) before returning to sleep mode. In some embodiments, the camera of the doorbell can disabled during the sleep mode such that the doorbell does not record and/or sense images during sleep mode.
Several embodiments include entering the standby mode in response to detecting a first indication of a visitor. The first indication can be detected using the doorbell. The standby mode can consume less power (e.g., at least 20% less power, at least 40% less power, at least 65% less power) than an alert mode. Standby mode can increases an activity of at least one component relative to the sleep mode. In some embodiments, standby mode increases the electrical activity, processing activity, or sensing activity of a wireless communication system, a sensor (e.g., a motion sensor, a proximity sensor, a sound sensor, a button), a camera, a microphone, a speaker, or a computer processor. For example, a camera can be inactive during sleep mode but can be active during standby mode.
Some methods include entering the alert mode in response to detecting a second indication of the visitor. The second indication can be detected using the doorbell. The doorbell can record an image using the camera during the alert mode. As used herein, “record” is used in a very broad sense and does not necessarily mean that the image is stored in a memory of the doorbell. For example, a doorbell could “record an image” by sending data related to an image that is displayed on a remotely located computing device. Recording an image can include taking an image, capturing an image, or sensing an image.
In several embodiments, detecting the first indication can comprise detecting a signal indicative of the visitor above a first threshold. For example, detecting a very faint motion signal might be insufficient to detect the first indication that a visitor might be present, but detecting a stronger motion signal could be sufficient to detect the first indication. Detecting the second indication can comprise detecting the signal indicative of the visitor above a second threshold. The second threshold can be greater than the first threshold.
The doorbell can comprise a first sensor. The signal indicative of the visitor can be sensed by the first sensor of the doorbell. The first sensor of the doorbell can comprise a motion sensor, and the signal can be related to motion. The camera can be disabled (e.g., turned off, prevented from recording) during the sleep mode. The first sensor of the doorbell can comprise a proximity sensor, and the signal can be related to proximity of the visitor.
The first sensor of the doorbell can comprise a microphone, and the signal can be related to sound. The sound can be a knocking sound. The speaker can comprise a flat speaker located in a sound chamber configured to amplify an emitted sound.
In several embodiments, the doorbell can comprise a first sensor and a second sensor. The first indication can be detected using the first sensor, and the second indication can be detected using the second sensor. The first sensor can be a different type of sensor than the second sensor. For example, the first sensor can be one type of motion sensor while the second sensor is another type of motion sensor.
In some embodiments, the first sensor of the doorbell can comprise a motion sensor that is at least partially covered by a cover. Some methods comprise detecting motion through the cover while obscuring the motion sensor from the visitor and/or while not emitting a visible light from the doorbell. In some cases, this approach can enable the doorbell to record a visitor's actions without the visitor becoming aware the actions are being recorded and/or transmitted. The second sensor can comprise a microphone.
In several embodiments, the first sensor of the doorbell comprises a microphone. In some embodiments, the first sensor of the doorbell comprises an infrared detector and/or the second sensor comprises the camera. The first sensor of the doorbell can comprise a proximity sensor.
Some method embodiments include using a doorbell that is configurable to communicate wirelessly with a remotely located computing device. Several embodiments can include obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the button is configurable to enable a visitor to sound a chime. For example, once the doorbell is installed properly in an entryway, pressing the button can cause a chime (e.g., a speaker) to emit a sound inside of a building. Some embodiments can include entering a sleep mode, wherein the sleep mode can consume less power than an alert mode. Wireless communication can be off (e.g., disabled, inactive) during the sleep mode. Several embodiments can include entering the alert mode in response to detecting a first indication of the visitor, wherein the first indication can be detected using the doorbell. The doorbell can record an image using the camera during the alert mode.
Some embodiments can include sending a wireless notification to the remotely located computing device regarding a presence of the visitor in response to the visitor being present for more than a first threshold amount of time. Several methods comprise sending the notification to the remotely located computing device before the visitor presses the button of the doorbell or activates a switch of the doorbell configured to trigger a chime such that the chime emits a sound. The first threshold amount of time can be at least three seconds, at least eight seconds, less than 20 seconds, and/or less than 40 seconds. The camera can be off during sleep mode (although some embodiments include temporarily exiting sleep mode to turn the camera on).
Several embodiments include preventing (e.g., blocking) a redundant notification regarding the visitor (e.g., to avoid unnecessarily bothering a user). Some methods include preventing a redundant notification regarding the visitor until after a second threshold amount of time. The second threshold amount of time can be at least 20 seconds, at least 30 seconds, at least 60 seconds, at least five minutes, less than 70 seconds, and/or less than 12 minutes.
Some embodiments include a method for using a doorbell system. Several methods include obtaining a doorbell that comprises a speaker, a microphone, and/or a camera. The doorbell can be configurable for mounting near an entryway and/or in an entryway. Several methods include assigning a first priority to a first remote computing device and assigning a second priority to a second remote computing device, wherein the first priority is superior to the second priority.
As used herein, “superior” is used in a very broad sense to mean that the first priority includes rights and/or privileges not included in the second priority. In some embodiments, a superior priority means that a first remote computing device receives a notification (e.g., a doorbell communication request) before a second remote computing device. In some embodiments, a superior priority does not result in a first remote computing device receiving a notification before a second remote computing device, but means that the device with the superior priority has other rights such as the ability to block a device with an inferior priority from receiving notifications or the ability to restrict how and when a device with an inferior priority receives notifications.
Several embodiments include using the doorbell to detect a visitor. Some embodiments comprise generating a doorbell communication request regarding the visitor. The doorbell communication request can include a picture and/or video of the visitor. The doorbell communication request can include other visitor information such as the visitor's name, company, classification, number of previous visits to the doorbell, credit score, and/or criminal history.
Some embodiments comprise sending the doorbell communication request to the first remote computing device due to the first priority (e.g., in response to the first priority). Methods can include determining whether to send the doorbell communication request to the second remote computing device due to the second priority (e.g., in response to the second priority) and/or sending the doorbell communication request to the second remote computing device.
Some methods comprise entering an autonomous answering mode. The autonomous answering mode can comprise emitting a pre-recorded voice message from the speaker of the doorbell. For example, a user of a remote computing device can record a message such as, “thanks for visiting my house,” or “what brings you to my home?” The speaker of the doorbell can later emit the pre-recorded message for the visitor to hear. Some methods include automatically replacing the pre-recorded voice message with a non-word sound (e.g., a beeping sound, a buzzing sound, a ringing sound) after a time such that the autonomous answering mode comprises emitting the non-word sound rather than the pre-recorded voice message. The time can be at least one hour, at least five hours, and/or at least 24 hours.
Several methods comprise emitting (e.g., displaying, notifying, ringing) the doorbell communication request from (e.g., using) the first remote computing device for at least seven seconds, at least 10 seconds, and/or at least 15 seconds before emitting the doorbell communication request from the second remote computing device. Then, some methods comprise simultaneously emitting the doorbell communication request from both the first remote computing device and the second remote computing device.
In some methods, assigning the first priority comprises assigning administrative rights (e.g., setup control, notification control, profile control). Several methods comprise simultaneously sending the doorbell communication request to the first remote computing device and the second remote computing device. Some methods comprise providing control of the doorbell communication request to the first remote computing device such that the first remote computing device can terminate communication with the second remote computing device.
In some cases, determining whether to send the doorbell communication request to the second remote computing device comprises determining whether a threshold amount of time has passed without the first remote computing device accepting the doorbell communication request. The threshold amount of time can be at least five seconds, at least eight seconds, at least 15 seconds, at least 30 seconds, and/or less than 90 seconds.
Several embodiments comprise a method for using a doorbell system. Methods can include obtaining a doorbell that comprises a speaker, a microphone, and/or a camera. The doorbell can be configurable for mounting near an entryway. Several embodiments include assigning a first priority to a first remote computing device and assigning a second priority to a second remote computing device, wherein the first priority is superior to the second priority. Some embodiments include using the doorbell to detect a visitor and generating a doorbell communication request regarding the visitor. Several embodiments comprise sending the doorbell communication request to the first remote computing device due to (e.g., as a result of) the first priority and/or determining whether to send the doorbell communication request to the second remote computing device.
Some embodiments comprise blocking the doorbell communication request from being sent to, accepted by, and/or displayed by the second remote computing device due to (e.g., as a result of) a profile associated with the second remote computing device. The profile can include restrictions that can prohibit the second remote computing device from receiving, accepting, and/or displaying the doorbell communication request in some circumstances. Methods can comprise blocking the doorbell communication request from being displayed by the second remote computing device.
The profile can include restrictions regarding a time of day, an identity of the visitor, and/or a location of the second remote computing device. In some embodiments, if a second remote computing device is located in a certain area (e.g., inside of the building to which the doorbell is coupled) then the second remote computing device will not receive, accept, and/or display doorbell communication requests.
As used herein, a “doorbell communication request” is a type of notification related to a visitor and can be sent to a user of a computing device, which can be located remotely from the doorbell.
Several methods for using a doorbell comprise obtaining a doorbell that comprises a speaker, a microphone, and a camera. The doorbell can be configurable for mounting near an entryway. Embodiments can comprise assigning a first priority to a first remote computing device and assigning a second priority to a second remote computing device. Several embodiments include using the doorbell to detect a visitor (e.g., via a sensor of the doorbell). Some methods include generating a doorbell communication request regarding the visitor. Several methods include sending the doorbell communication request to the first remote computing device and/or to the second remote computing device. Several methods include sending the doorbell communication request to a third remote computing device, a fourth remote computing device, and/or a fifth remote computing device. The order in which the doorbell communication request is sent to multiple computing devices can vary.
Some embodiments comprise terminating the doorbell communication request to the second remote computing device in response to the first remote computing device accepting the doorbell communication request. For example, once the first remote computing device accepts the doorbell communication request, the method can include blocking the second remote computing device from also accepting the doorbell communication request. In some embodiments, both the first remote computing device and the second remote computing device can accept the doorbell communication request such that multiple users can simultaneously communicate with a visitor via multiple remote computing devices. As used herein, “accepting” a doorbell communication request can include answering a doorbell communication request and/or initiating two-way audio communication between a doorbell and a remote computing device (e.g., to enable a visitor and a user to talk to each other).
Several embodiments comprise using the first remote computing device to display an image of the visitor and then using the first remote computing device to instruct the doorbell to emit a pre-recorded voice message from the speaker. For example, a user can select a button on a graphical user interface that causes the doorbell to emit the voice message from the speaker of the doorbell. Then, some embodiments comprise initiating two-way audio communication between the first remote computing device and the doorbell (e.g., after the visitor has responded to the pre-recorded voice message).
Several embodiments comprise initiating two-way audio communication between the first remote computing device and the second remote computing device in response to the doorbell communication request and before initiating two-way audio communication between the doorbell and at least one of the first remote computing device and the second remote computing device. For example, a user of the first remote computing device might want to talk with a user of the second remote computing device before starting two-way audio communication with the visitor.
Some embodiments comprise emitting a notification sound (e.g., a ringing sound) from a sound output device (e.g., a chime, a speaker) located inside of a building in response to the doorbell detecting the visitor. Then, some embodiments comprise enabling the visitor to choose whether to send the doorbell communication request to the first remote computing device. For example, the doorbell can instruct the visitor to press a button to talk with the owner of the home. Then, several embodiments comprise sending the doorbell communication request to the first remote computing device in response to the visitor choosing to send the doorbell communication request to the first remote computing device.
Several embodiments comprise determining whether the visitor is still present after sending the doorbell communication request and terminating the doorbell communication request in response to determining the visitor is not present prior to at least one of the first remote computing device and the second remote computing device accepting the doorbell communication request. In some cases, this approach can reduce occurrences of a doorbell communication request unnecessarily bothering users when a visitor is no longer present and/or when the doorbell falsely detected a visitor.
Some embodiments comprise blocking (e.g., preventing) the first remote computing device from displaying the doorbell communication request. The blocking can be response to a location of the first remote computing device.
Several embodiments comprise creating (e.g., forming, generating) a profile of user preferences related to doorbell notifications. The profile can comprise a first time when the first remote computing device will not notify a user regarding the doorbell communication request. The profile can comprise a second time when a chime (e.g., an audio speaker) located inside of a building will not emit a sound. The profile can comprise a list of computing devices capable of receiving (e.g., authorized to receive) the doorbell communication request.
Several embodiments include methods for using a doorbell system. Methods can include obtaining a doorbell that comprises a speaker, a microphone, a camera, and an outer housing. Several embodiments include connecting the doorbell electrically to an electrical power supply of a building and connecting the doorbell electrically to a sound output device located inside of the building. Some methods include receiving a first alternating current into the doorbell from the power supply of the building. Several methods include converting at least a first portion of the first alternating current into a first direct current. This conversion can occur within the outer housing of the doorbell. The doorbell can use the first direct current to provide a first electrical energy to the camera. Several embodiments include draining the first direct current to the sound output device located inside of the building.
As used herein, “connecting” electrically is used in a very broad sense to mean that a first item is coupled to a second item by at least one conductor. For example, a doorbell can be electrically connected to an electrical power supply by a conductor such as a wire (even if no electricity is flowing through the wire).
The first direct current can provide a first electrical power that is less than a triggering threshold of the sound output device such that the sound output device does not emit a notification sound in response to the first electrical power. Several methods comprise using the doorbell to supply a second electrical power to the sound output device, wherein the second electrical power is greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electrical power. The second electrical power can comprise a second alternating current.
In some embodiments, the power supply comprises a transformer having a maximum available electrical power. The second electrical power can be at least eighty percent, at least ninety percent, or at least ninety-five percent of the maximum available electrical power. The maximum available electrical power is the maximum amount of electrical power that the transformer can emit as it is currently configured in the building. A given transformer might have a greater maximum available electrical power in a first building than in a second building.
Some embodiments comprise using the first direct current to provide a second electrical energy to a printed circuit board of the doorbell while draining the first direct current to the sound output device. Methods can include using the printed circuit board to provide a third electrical energy to the microphone and the speaker.
In several embodiments, the doorbell comprises a rectifier configured to convert the first portion of the first alternating current into the first direct current. Doorbells can comprise a battery. Some methods comprise using the first direct current to charge the battery of the doorbell while draining the first direct current to the sound output device.
Some embodiments comprise converting at least the first portion of the first alternating current into the first direct current while using the doorbell to supply a second alternating current to the sound output device. The second alternating current can supply a second electrical power to the sound output device. The second electrical power can be greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electrical power.
In several embodiments, the doorbell comprises a battery and a printed circuit board. Some methods comprise using the battery to supply a third electrical power to the printed circuit board while using the doorbell to supply a second alternating current to the sound output device. The second alternating current can supply a second electrical power to the sound output device. The second electrical power can be greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electrical power.
In some embodiments, the power supply comprises a transformer with a maximum available electrical power. The first electrical power can be less than fifteen percent, less than ten percent, and/or less than five percent of the maximum available electrical power.
The sound output device can comprise a chime. In some cases, the sound output device comprises a speaker located inside of a building.
Some embodiments include methods for replacing a first doorbell with a second doorbell. The first doorbell can comprise a switch configured to close a circuit between a transformer and a sound output device to enable the sound output device to emit a notification sound (e.g., a “ding-dong” sound). Several embodiments include detaching the first doorbell from a first wire that is electrically connected to the transformer and/or detaching the first doorbell from a second wire that is electrically connected to the sound output device.
As used herein, “electrically connected” is used in a very broad sense to mean that a first item is coupled to a second item by at least one conductor. Two items can be electrically connected even if no electricity is flowing through the conductor that couples the items. For example, the first wire can be electrically connected to the transformer even if no power is connected or flowing to the transformer (e.g., to prevent electrical shocks to a person detaching the first doorbell and replacing the first doorbell with the second doorbell).
Several embodiments include obtaining a second doorbell, which can comprise a speaker, a microphone, a camera, and an outer housing. The speaker, the microphone, and the camera can be coupled to the outer housing and/or located at least partially inside of the outer housing. The second doorbell can be electrically connected to the first wire that is electrically connected to the transformer. The second doorbell can be electrically connected to the second wire that is electrically connected to the sound output device. As used herein, “wire” is used in a broad sense to mean a long conductive member such as a cable or wire capable of conducting electricity.
Several embodiments include receiving a first alternating current into the second doorbell from at least one of the first wire and the second wire. Methods can include converting at least a first portion of the first alternating current into a first direct current. This conversion can occur within the outer housing of the second doorbell. Some embodiments include using the first direct current to provide a first electrical energy to at least a second portion of the second doorbell. Several methods comprise draining the first direct current via at least one of the first wire and the second wire.
In some embodiments, the draining provides a first electrical power that is less than a triggering threshold of the sound output device such that the sound output device does not emit a notification sound in response to the first electrical power. Several embodiments comprise converting at least the first portion of the first alternating current into the first direct current while using the doorbell to supply a second alternating current to the sound output device. The second alternating current can supply a second electrical power to the sound output device. The second electrical power can be equal to or greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electrical power.
In several embodiments, the second doorbell receives the first alternating current via the first wire. The second doorbell can drain the first direct current via the second wire. In some embodiments, the second doorbell receives the first alternating current via the second wire, and the second doorbell drains the first direct current via the first wire.
In some embodiments, the second portion of the second doorbell comprises a printed circuit board connected electrically to the speaker, the microphone, and/or the camera. The printed circuit board can be located inside of the outer housing. Methods can comprise using the first direct current to provide a second electrical energy to the speaker, the microphone, and/or the camera via the printed circuit board.
Several methods of using a doorbell system include obtaining a doorbell that comprises a speaker, a microphone, a camera, and/or an outer housing. The speaker, the microphone, and/or the camera can be coupled to the outer housing of the doorbell. Some methods include receiving a first alternating current into the doorbell from an external power supply and converting at least a first portion of the first alternating current into a first direct current. This conversion can occur within the outer housing of the doorbell. Some methods include using the first direct current to provide a first electrical energy to at least a second portion of the doorbell and draining the first direct current to a chime (or other type of sound output device).
The first direct current can provide a first electrical power that is less than a triggering threshold of the chime such that the chime does not emit a notification sound in response to the first electrical power. Several embodiments comprise using the doorbell to supply a second alternating current to the chime. The second alternating current can supply a second electrical power to the chime. The second electrical power can be equal to or greater than the triggering threshold of the chime such that the chime emits the notification sound in response to the second electrical power.
Methods for using a doorbell system can include obtaining a doorbell that comprises a speaker, a microphone, a camera, and an outer housing; and connecting the doorbell electrically to an electrical power supply of a building. The electrical power supply can be provided by a utility company. In some embodiments, the electrical power supply is a transformer that is electrically connected to a building's electricity that is provided by a utility company.
In some embodiments, the doorbell can be connected electrically to a sound output device (e.g., a digital chime, a mechanical chime, a speaker) that is located remotely relative to the doorbell. For example, the doorbell can be coupled to an outside wall of a building and the sound output device can be coupled to an inside wall of the building. The building can couple the sound output device to the doorbell while the sound output device is located remotely relative to the doorbell. The doorbell can be connected communicatively to a remote computing device to enable the doorbell to communicate (e.g., wirelessly) with the remote computing device.
Methods can include receiving a first current into the doorbell from the power supply of the building and using the first current to provide at least a first portion of a first electrical energy to the camera and to the microphone. Providing the first current can enable the camera and microphone to have electricity to operate.
Some methods include using the doorbell to close an electrical circuit that comprises the sound output device such that the first current flows through the sound output device and the first current provides a first electricity that is less than a triggering threshold of the sound output device such that the sound output device does not emit a notification sound in response to the first electricity.
Some embodiments comprise using the doorbell to detect a presence of a visitor while closing the electrical circuit such that first current provides the first electricity that is less than the triggering threshold. Then, in response to detecting the presence of the visitor, methods can include using the doorbell to close the electrical circuit to supply a second electricity to the sound output device. The second electricity can be greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electricity. Embodiments can also include sending a wireless notification to the remote computing device regarding the presence of the visitor (e.g., in response to the second electricity or in response to simply detecting the visitor).
In several embodiments, the electrical circuit comprises the doorbell, the sound output device, and a transformer. The transformer can electrically couple the electrical circuit to the power supply of the building such that the transformer is configured to provide electrical power from the power supply to the electrical circuit. The transformer can comprise an electrical output having a direct current. Receiving the first current into the doorbell from the power supply of the building can comprise receiving the direct current from the transformer.
Electrically connecting a doorbell to an electrical power supply can include indirectly electrically connecting the doorbell to the power supply. A wire can be electrically connected when the wire is connected such that it could conduct electricity if there was a complete circuit. A doorbell can be electrically connected to a wire if the doorbell is conductively coupled to the wire (even if a complete circuit is not present to enable an electrical current).
In several embodiments, the electrical circuit comprises the doorbell, the sound output device, and a transformer. The transformer can electrically couple the electrical circuit to the power supply of the building such that the transformer is configured to provide electrical power from the power supply to the electrical circuit. The transformer can comprise an electrical output having an alternating current. Receiving the first current into the doorbell from the power supply of the building can comprise receiving the alternating current from the transformer. Method can further comprise converting at least a second portion of the alternating current into a direct current. The converting can occur within the outer housing of the doorbell.
In some embodiments, the power supply provides the second electricity to the electrical circuit. The doorbell can be configured to control whether the doorbell system provides the first electricity or the second electricity to the sound output device.
Several embodiments include initiating a transmission of the wireless notification to the remote computing device regarding the presence of the visitor while using the doorbell to supply the second electricity to the sound output device. Then, after initiating the transmission of the wireless notification to the remote computing device, methods can include terminating the supply of the second electricity to the sound output device and using the doorbell to close the electrical circuit to provide a third electricity to the sound output device. The third electricity can be less than the triggering threshold of the sound output device such that the sound output device does not emit the notification sound in response to the third electricity.
Some embodiments comprise using the doorbell to supply the third electricity to the sound output device while continuing to transmit the wireless notification to the remote computing device.
Several embodiments comprise terminating the supply of the second electricity to the sound output device and using the doorbell to close the electrical circuit to provide a third electricity to the sound output device. The third electricity can be less than the triggering threshold of the sound output device such that the sound output device does not emit the notification sound in response to the third electricity. Embodiments can include initiating a transmission of the wireless notification from the doorbell to the remote computing after terminating the supply of the second electricity to the sound output device.
Some embodiments include using the doorbell to detect the presence of the visitor while closing the electrical circuit comprises using a motion sensor to detect the presence of the visitor. Methods can also include using the first current to provide at least a second portion of the first electrical energy to the motion sensor. The second portion of the first electrical energy can be greater than an operational threshold of the motion sensor such that the second portion of first electrical energy is capable of providing sufficient electrical power for the doorbell to operate the motion sensor while the first current provides the first electricity that is less than the triggering threshold of the sound output device. An operational threshold is an electrical threshold that represents the minimum electricity necessary to operate an item. The motion sensor can be replaced with a proximity sensor configured to detect whether a visitor is located near the doorbell. The proximity sensor can be a laser or infrared proximity sensor. The proximity sensor can also be the doorbell button (that rings the chime).
In several embodiments, using the doorbell to detect the presence of the visitor while closing the electrical circuit comprises using image analysis to detect the presence of the visitor. Methods can further comprise using the first current to provide at least a second portion of the first electrical energy to an image analysis system. The second portion of the first electrical energy can be greater than an operational threshold of the image analysis system such that the second portion of first electrical energy is capable of providing sufficient electrical power for the doorbell to operate the image analysis system while the first current provides the first electricity that is less than the triggering threshold of the sound output device.
In some embodiments, the first current is configured such that the first portion of the first electrical energy is greater than an operational threshold of the camera while the first current is configured such that the first current provides the first electricity that is less than the triggering threshold of the sound output device.
In several embodiments, the first current is configured such that the first portion of the first electrical energy is less than an operational threshold of the camera while the first current is configured such that the first current provides the first electricity that is less than the triggering threshold of the sound output device, the method further comprising using the first portion of the first electrical energy to charge a battery located inside of the outer housing of the doorbell, and then discharging at least an electrical portion of the battery to provide a second electrical energy that is greater than the operational threshold to the camera.
In some embodiments, the doorbell comprises a wireless communication system configured to enable sending the wireless notification from the doorbell to the remote computing device. Embodiments can include using the first current to provide at least a second portion of the first electrical energy to the wireless communication system, wherein the first current is configured such that the second portion of the first electrical energy is less than an operational threshold of the wireless communication system while the first current is configured such that the first current provides the first electricity that is less than the triggering threshold of the sound output device. Methods can also include using the second portion of the first electrical energy to charge a battery located inside of the outer housing of the doorbell, and then discharging at least an electrical portion of the battery to provide a second electrical energy that is greater than the operational threshold to the wireless communication system. Then, embodiments can include using the wireless communication system to send the wireless notification to the remote computing device using the second electrical energy.
Several embodiments include methods for replacing a first doorbell with a second doorbell. The first doorbell can comprise a switch configured to close an electrical circuit having a transformer and a sound output device to enable the sound output device to emit a notification sound. Methods can include detaching the first doorbell from a first wire that is electrically connected to the transformer; detaching the first doorbell from a second wire that is electrically connected to the sound output device; and obtaining the second doorbell. The second doorbell can comprise a speaker, a microphone, a camera, and an outer housing. The speaker, the microphone, and the camera can be coupled to the outer housing.
Some embodiments include connecting the second doorbell electrically to the first wire that is electrically connected to the transformer, and connecting the second doorbell electrically to the second wire that is electrically connected to the sound output device. The second doorbell can be located remotely relative to the sound output device. For example, the second doorbell can be located on an outside wall of a building while the sound output device is located inside of the building.
Several embodiments include connecting the second doorbell communicatively to a remote computing device such that the second doorbell is configured to communicate with the remote computing device. Embodiments can include receiving a first current into the second doorbell from at least one of the first wire and the second wire; using the first current to provide a first electrical energy to at least a first portion of the second doorbell; and draining the first current to at least one of the first wire and the second wire.
Some embodiments include entering a first mode in response to connecting the second doorbell electrically to the first wire that is electrically connected to the transformer, and in response to connecting the second doorbell electrically to the second wire that is electrically connected to the sound output device. During the first mode, methods can comprise using the second doorbell to close the electrical circuit that includes the transformer and the sound output device such that the first current flows through the sound output device and the first current provides a first electricity that is less than a triggering threshold of the sound output device such that the sound output device does not emit a notification sound in response to the first electricity.
Several embodiments include entering a second mode in response to using the doorbell to detect a presence of a visitor. During the second mode, the methods can comprise using the doorbell to close the electrical circuit to supply a second electricity to the sound output device. The second electricity can be greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electricity. The second mode can also include sending a wireless notification to the remote computing device regarding the presence of the visitor.
In several embodiments, methods comprise obtaining the doorbell that comprises a speaker, a microphone, and a camera, wherein the doorbell is configurable for mounting near an entryway; entering a sleep mode, wherein the sleep mode consumes less power than a standby mode and wherein wireless communication, the camera, and the microphone are disabled during the sleep mode; exiting the sleep mode and entering the standby mode in response to detecting a first indication of a visitor, wherein the first indication is detected using the doorbell, the standby mode consumes less power than an alert mode, and the standby mode increases electrical activities of the camera and the microphone relative to the sleep mode; and entering the alert mode in response to detecting a second indication of the visitor, wherein the second indication is detected using the doorbell, and the doorbell records an image using the camera during the alert mode and the wireless communication is enabled during the alert mode to send an alert to the remotely located computing device, wherein detecting the first indication comprises detecting a signal indicative of the visitor above a first threshold and detecting the second indication comprises detecting the signal indicative of the visitor above a second threshold, wherein the second threshold is greater than the first threshold, and wherein the doorbell comprises a first sensor, and the signal indicative of the visitor is sensed by the first sensor of the doorbell, wherein the first sensor of the doorbell comprises a proximity sensor and the signal is related to proximity of the visitor, and wherein the method further comprises shipping the doorbell in a shipping mode that consumes power, wherein during the shipping mode the doorbell is configured to detect whether the doorbell is electrically coupled to an external power source, and then entering the sleep mode in response to detecting electricity from the external power source, wherein the shipping mode consumes less power than the sleep mode.
In another aspect, the disclosure describes methods for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. The method comprising obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the button is configurable to enable a visitor to sound a chime; shipping the doorbell in a shipping mode that consumes power, wherein during the shipping mode the doorbell is configured to detect whether the doorbell is electrically coupled to an external power source, and then entering a sleep mode in response to detecting electricity from the external power source, wherein the shipping mode consumes less power than the sleep mode; entering the sleep mode, wherein the sleep mode consumes less power than an alert mode and wherein wireless communication is off during the sleep mode; and entering the alert mode in response to detecting a first indication of the visitor, wherein the first indication is detected using the doorbell, and the doorbell records an image using the camera during the alert mode.
In yet another aspect, the disclosure describes a method for using a doorbell system capable of allowing and blocking a doorbell communication request. The method comprises obtaining a doorbell that comprises a speaker, a microphone, and a camera, wherein the doorbell is configurable for mounting near an entryway; assigning a first priority to a first remote computing device and assigning a second priority to a second remote computing device, wherein the first priority is superior to the second priority; using the doorbell to detect a visitor; generating the doorbell communication request regarding the visitor; sending the doorbell communication request to the first remote computing device due to the first priority; detecting a location of the second remote computing device; and blocking the second remote computing device from displaying the doorbell communication request, wherein the doorbell system blocks displaying the doorbell communication request in response to the location of the second remote computing device.
In another aspect, the disclosure describes a method for using a doorbell system. The method comprises obtaining a doorbell that comprises a speaker, a microphone, and a camera, wherein the doorbell is configurable for mounting near an entryway; assigning a first priority to a first remote computing device and assigning a second priority to a second remote computing device, wherein the first priority is superior to the second priority; using the doorbell to detect a visitor; generating a doorbell communication request regarding the visitor; sending the doorbell communication request to the first remote computing device due to the first priority; blocking the doorbell communication request from being accepted by the second remote computing device due to a profile associated with the second remote computing device, wherein the profile comprises restrictions that prohibit the second remote computing device from accepting the doorbell communication request; detecting a location of the second remote computing device; and blocking the second remote computing device from displaying the doorbell communication request, wherein the doorbell system blocks displaying the doorbell communication request in response to the location of the second remote computing device.
In yet another aspect, the disclosure describes a method for using a doorbell system configured to block or allow a doorbell communication request. The method comprises obtaining a doorbell that comprises a speaker, a microphone, and a camera, wherein the doorbell is configurable for mounting near an entryway; using the doorbell to detect a visitor; generating the doorbell communication request regarding the visitor; detecting a location of the first remote computing device; and blocking the first remote computing device from displaying the doorbell communication request, wherein the doorbell system blocks displaying the doorbell communication request in response to the location of the first remote computing device.
In another aspect, the disclosure describes a method for using a doorbell system. The method comprises obtaining a doorbell that comprises a speaker, a microphone, a camera, and an outer housing; connecting the doorbell electrically to an electrical power supply of a building; connecting the doorbell electrically to a sound output device located inside of the building; connecting the doorbell communicatively to a remote computing device; receiving a first alternating current into the doorbell from the power supply of the building; converting at least a first portion of the first alternating current into a first direct current, wherein the converting occurs within the outer housing of the doorbell; using the first direct current to provide a first electrical energy to the camera; draining the first direct current to the sound output device located inside of the building, wherein the first direct current provides a first electrical power that is less than a triggering threshold of the sound output device such that the sound output device does not emit a notification sound in response to the first electrical power, while draining the first direct current to the sound output device such that first direct current provides the first electrical power that is less than the triggering threshold, detecting the presence of a visitor that is located outside of the building to which the doorbell is attached; then after the detecting step, using the doorbell to supply a second electrical power to the sound output device, wherein the second electrical power is greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electrical power; while using the doorbell to supply the second electrical power to the sound output device, initiating a transmission of a notification to the remote computing device to notify a user of the visitor's presence; then after transmitting the notification to the remote computing device, using the doorbell to supply the first electrical power to the sound output device such that the sound output device does not emit a notification sound in response to the first electrical power; and while using the doorbell to supply the first electrical power to the sound output device, continuing to transmit the notification to the remote computing device to notify the user of the visitor's presence.
In yet another aspect, the disclosure describes a method for replacing a first doorbell with a second doorbell, wherein the first doorbell comprises a switch configured to close a circuit between a transformer and a sound output device to enable the sound output device to emit a notification sound. The method comprises detaching the first doorbell from a first wire that is electrically connected to the transformer; detaching the first doorbell from a second wire that is electrically connected to the sound output device; obtaining the second doorbell, wherein the second doorbell comprises a speaker, a microphone, a camera, and an outer housing, wherein the speaker, the microphone, and the camera are coupled to the outer housing; connecting the second doorbell electrically to the first wire that is electrically connected to the transformer; connecting the second doorbell electrically to the second wire that is electrically connected to the sound output device; connecting the second doorbell communicatively to a remote computing device; receiving a first alternating current into the second doorbell from at least one of the first wire and the second wire; converting at least a first portion of the first alternating current into a first direct current, wherein the converting occurs within the outer housing of the second doorbell; using the first direct current to provide a first electrical energy to at least a second portion of the second doorbell; draining the first direct current to at least one of the first wire and the second wire; arranging and configuring the second doorbell to detect the presence of a visitor located outside of the building to which the doorbell is attached; and arranging and configuring the second doorbell to simultaneously transmit a first notification to a remote computing device to notify a user of the visitor's presence, wherein during the transmission of the first notification the doorbell supplies the sound output device with a first electrical power that is less than a triggering threshold of the sound output device such that the sound output device does not emit a notification sound in response to the first electrical power; and transmit a second notification to the sound output device located inside of the building to notify a user of the visitor's presence, wherein the second notification comprises supplying the sound output device with a second electrical power that is greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electrical power.
In another aspect, the disclosure describes a method for using a doorbell system. The method comprises obtaining a doorbell that comprises a speaker, a microphone, a camera, and an outer housing, wherein the speaker, the microphone, and the camera are coupled to the outer housing of the doorbell; connecting the doorbell electrically to an electrical power supply of a building; connecting the doorbell electrically to a sound output device located inside of the building; connecting the doorbell communicatively to a remote computing device; receiving a first alternating current into the doorbell from the power supply of the building; converting at least a first portion of the first alternating current into a first direct current, wherein the converting occurs within the outer housing of the doorbell; using the first direct current to provide a first electrical energy to the camera; draining the first direct current to the sound output device located inside of the building, wherein the first direct current provides a first electrical power that is less than a triggering threshold of the sound output device such that the sound output device does not emit a notification sound in response to the first electrical power; detecting the presence of a visitor that is located outside of the building to which the doorbell is attached; and in response to detecting the presence of the visitor, transmitting a first notification to the remote computing device to alert a first user of the visitor's presence, wherein during the transmission of the first notification the doorbell supplies the sound output device with the first electrical power; and transmitting a second notification to the sound output device located inside of the building to alert a second user of the visitor's presence, wherein the second notification comprises supplying the sound output device with a second electrical power that is greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electrical power.
In yet another aspect, the disclosure describes a method for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. The method comprises obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime; entering a setup mode, wherein the setup mode comprises a network connection mode, and the method comprises entering the network connection mode in response to pressing the button for at least a predetermined amount of time, and the network connection mode comprises detecting a first wireless network and inputting a doorbell identification code into the remotely located computing device, wherein the doorbell identification code is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, wherein the network connection mode comprises enabling communication from the remotely located computing device to the doorbell in response to pressing the button for at least the predetermined amount of time and inputting the doorbell identification code into the remotely located computing device, wherein the remotely located computing device is connected to the first wireless network such that the remotely located computing device is configured to transmit data via the first wireless network, wherein the first wireless network comprises a name and a password, and wherein the communication from the remotely located computing device to the doorbell comprises the name and the password of the first wireless network to which the remotely located computing device is connected; and detecting a first indication of the visitor, wherein the first indication is detected using the doorbell. In some embodiments, the predetermined amount of time is eight seconds.
In another aspect, the disclosure describes a method for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. The method comprises obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime; shipping the doorbell in a shipping mode that consumes electrical energy from the doorbell, wherein during the shipping mode the doorbell is configured to detect whether the doorbell is electrically coupled to an external power source, and then entering a standby mode in response to detecting electricity from the external power source, wherein the shipping mode consumes less electrical power than the standby mode and wherein the speaker and the microphone are disabled during the standby mode; exiting the standby mode and entering an alert mode in response to detecting a first indication of the visitor, wherein the first indication is detected using the doorbell; sending a wireless notification to the remotely located computing device regarding a presence of the visitor in response to entering the alert mode; and entering a network connection mode prior to sending the wireless notification, wherein the network connection mode comprises detecting a first wireless network having a name and a password, and the network connection mode comprises inputting a doorbell identification code into the remotely located computing device, wherein the doorbell identification code is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, wherein the network connection mode comprises the remotely located computing device creating a second wireless network, and the network connection mode comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network, wherein the method comprises the doorbell directly communicating with the remotely located computing device via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
In yet another aspect, the disclosure describes a method for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. The method comprises obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime; sending a wireless notification to the remotely located computing device regarding a presence of the visitor in response to the doorbell detecting the visitor; and entering a network connection mode prior to sending the wireless notification, wherein the network connection mode comprises detecting a first wireless network having a name and a password, and the network connection mode comprises inputting a doorbell identification code into the remotely located computing device, wherein the doorbell identification code is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, wherein the network connection mode comprises the remotely located computing device creating a second wireless network, and the network connection mode comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network, wherein the method comprises the doorbell directly communicating with the remotely located computing device via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
In another aspect, the disclosure describes a doorbell system. The doorbell system comprises an electronic doorbell comprising a camera and a button, wherein the camera is configurable to visually detect a visitor and the button is configurable to enable the visitor to sound an electronic chime; an electronic switch assembly electrically coupled to the electronic doorbell and a transformer; and an electronic chime electrically coupled to the electronic switch assembly, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell, wherein the electronic switch assembly defines a first state and a second state, wherein the first state occurs in response to a first electricity that is less than a first threshold, and the second state occurs in response to a second electricity that is greater than the first threshold, wherein in the first state the electronic switch assembly blocks the first electricity from passing through the electronic chime so the electronic chime does not emit a sound notification, and in the second state the electronic switch assembly allows the second electricity to pass through the electronic chime such that the electronic chime emits the sound notification.
The disclosure also describes another aspect of a doorbell system. The doorbell system comprises an electronic doorbell comprising a camera and a button, wherein the camera is configurable to visually detect a visitor and the button is configurable to enable the visitor to sound an electronic chime; a printed circuit board electrically coupled to the electronic doorbell and a transformer; and an electronic chime electrically coupled to the printed circuit board and mechanically coupled to the printed circuit board, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell, wherein the printed circuit board is configured to block a first electricity that is less than a first threshold from entering the electronic chime, wherein the first electricity does not cause the electronic chime to emit the notification sound, and wherein the printed circuit board is configured to allow the first electricity to pass through the printed circuit board.
In another aspect, the disclosure describes a method for using a doorbell system, wherein the doorbell system comprises an electronic doorbell, an electronic chime, and a remote computing device. The method comprises obtaining the electronic doorbell that comprises a camera and a button, wherein the button is configurable to enable a visitor to sound an electronic chime, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell; electrically coupling an electronic switch assembly to the electronic chime; electrically coupling the electronic doorbell to the electronic switch assembly; configuring the electronic switch assembly so that a first electricity that is less than a first threshold passes through the electronic switch assembly without entering the electronic chime, wherein the first electricity does not cause the electronic chime to emit the notification sound, wherein the electronic switch assembly blocks the first electricity from passing through the electronic chime in response to the first electricity being less than the first threshold; and configuring the electronic switch assembly so that the electronic switch assembly causes a second electricity that is greater than the first threshold to pass through the electronic chime to cause the electronic chime to emit the notification sound, wherein the electronic switch assembly causes the second electricity to pass through the electronic chime in response to the second electricity being greater than the first threshold.
In yet another aspect, the disclosure describes a method for using a doorbell system, wherein the doorbell system comprises an electronic doorbell, an electronic chime, and a remote computing device. The method comprises obtaining the electronic doorbell that comprises a camera and a button, wherein the button is configurable to enable a visitor to sound an electronic chime, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell; mechanically coupling a printed circuit board to the electronic chime and electrically coupling the printed circuit board to the electronic chime; electrically coupling the electronic doorbell to the printed circuit board; configuring the printed circuit board so that the printed circuit board allows a first electricity to pass through the printed circuit board in response to the first electricity being less than a first threshold; and configuring the printed circuit board so that the printed circuit board blocks the first electricity from entering the electronic chime in response to the first electricity being less than the first threshold, wherein the first electricity does not cause the electronic chime to emit the notification sound.
In another aspect, the disclosure describes a method for using a doorbell system, wherein the doorbell system comprises an electronic doorbell, an electronic chime, and a remote computing device. The method comprises obtaining the electronic doorbell that comprises a camera and a button, wherein the button is configurable to enable a visitor to sound an electronic chime, wherein the electronic chime comprises a speaker configurable to emit a notification sound in response to the visitor pressing the button of the electronic doorbell; mechanically coupling a printed circuit board to the electronic chime and electrically coupling the printed circuit board to the electronic chime; electrically coupling the electronic doorbell to the printed circuit board; and configuring the electronic switch assembly so that the electronic switch assembly causes a second electricity that is greater than the first threshold to pass through the electronic chime to cause the electronic chime to emit the notification sound, wherein the electronic switch assembly causes the second electricity to pass through the electronic chime in response to the second electricity being greater than the first threshold.
In yet another aspect, the disclosure describes a method for using a doorbell system to detect a first visitor, wherein the doorbell system comprises a doorbell and a remote computing device. The method comprises obtaining the doorbell that comprises a camera and a button, wherein the button is configurable to enable the first visitor to sound a chime; configuring the camera of the doorbell such that the camera comprises a field of view; using the camera of the doorbell to take a first image; sending the first image from the doorbell to the remote computing device, wherein the remote computing device comprises an electronic display; displaying the first image on the electronic display of the remote computing device; and prompting a user of the remote computing device to select a first detection zone within the first image, wherein the first detection zone comprises a portion of the first image.
In another aspect, the disclosure describes a method for using a doorbell system to detect a first visitor, wherein the doorbell system comprises a doorbell and a remote computing device. The method comprises obtaining the doorbell that comprises a camera and a button, wherein the button is configurable to enable the first visitor to sound a chime; configuring the camera of the doorbell such that the camera comprises a field of view; using the camera of the doorbell to take a first image to calibrate the doorbell system; sending the first image from the doorbell to the remote computing device, wherein the remote computing device comprises an electronic display; displaying the first image on the electronic display of the remote computing device; prompting a user of the remote computing device to select a first detection zone within the first image, wherein the first detection zone comprises a portion of the first image; configuring the doorbell system to ignore a second visitor located within the field of view but located outside of the first detection zone, wherein ignoring the second visitor comprises not sending a first picture of the second visitor to the remote computing device; and configuring the doorbell system to send a second picture of a third visitor to the remote computing device in response to determining that the third visitor is located inside of the first detection zone as defined based on the first image.
In yet another aspect, the disclosure describes a method for using a doorbell system to detect a first visitor, wherein the doorbell system comprises a doorbell and a remote computing device. The method comprises obtaining the doorbell that comprises a camera and a button, wherein the button is configurable to enable the first visitor to sound a chime; configuring the camera of the doorbell such that the camera comprises a field of view; using the camera of the doorbell to take a first image to calibrate the doorbell system by establishing a baseline of an entryway; sending the first image from the doorbell to the remote computing device, wherein the remote computing device comprises an electronic display; displaying the first image on the electronic display of the remote computing device; selecting a first detection zone within the first image, wherein the first detection zone comprises a portion of the first image, and wherein the first detection zone comprises a two-dimensional representation of an area in which the doorbell system is configured to respond to motion detection; configuring the doorbell system to ignore a second visitor located within the field of view but located outside of the first detection zone, wherein ignoring the second visitor comprises not sending a first picture of the second visitor to the remote computing device; and configuring the doorbell system to send a second picture of a third visitor to the remote computing device in response to determining that the third visitor is located inside of the first detection zone.
A button of the doorbell can be configurable to enable a visitor to sound a chime (e.g., a speaker or another sound output device located inside a building). Some chimes are digital and others are mechanical.
Several embodiments include using a doorbell system to detect a first visitor. The doorbell system can comprise a doorbell and a remote computing device such as a smartphone, laptop, tablet, or desktop computer. Some embodiments include obtaining the doorbell that comprises a camera, a speaker, a microphone, and a button, wherein the button is configurable to enable the first visitor to sound a chime. Methods can include configuring the camera of the doorbell such that the camera comprises a field of view, and using the camera of the doorbell to take a first image. The doorbell system can send the first image from the doorbell to the remote computing device, which can comprise an electronic display (e.g., a computer screen). Some methods include displaying the first image on the electronic display of the remote computing device and prompting a user of the remote computing device to select a first detection zone within the first image. The first detection zone can comprise a portion of the first image.
Some embodiments include using the camera of the doorbell to take a second image, analyzing the second image to detect a first indication of the first visitor, and determining that the first indication of the first visitor in the second image is located outside of the first detection zone. The doorbell system can then decide not to send an alert to the remote computing device in response to determining that the first indication of the first visitor in the second image is located outside of the first detection zone. The alert can be configured to notify the remote computing device regarding a presence of the first visitor.
Analyzing the second image can include determining if there are signs of seeing the visitor in the second image. In some embodiments, the system looks for indications of motion in the image. In several embodiments, the system compares a baseline image (e.g., the first image) to the second image in order to determine if there are areas in the second image that include an object (e.g., a visitor) that was not present in the first image. Thus, some embodiments use computer vision to identify the presence of a visitor within the detection zone.
Several embodiments include using the camera of the doorbell to take a third image, and analyzing the third image to detect a second indication of the first visitor. Methods can include determining that the second indication of the first visitor in the third image is located inside of the first detection zone, and then sending the alert to the remote computing device in response to determining that the second indication of the first visitor in the third image is located inside of the first detection zone. In some embodiments, the alert is not sent unless other conditions are met.
Some embodiments include displaying a grid pattern on the first image on the electronic display of the remote computing device such that the first image is divided into at least ten sections by lines that cross each other. The lines can include horizontal and vertical lines that intersect at 90 degree angles. The lines can be straight, curved, and/or wavy. The sections can be equal in size and shape. The sections can be irregular and can vary in size. Methods can include preventing the sending of the alert to the remote computing device until after detecting an indication of a visitor in at least two, four, and/or eight of the sections. Methods can include preventing the sending of the alert to the remote computing device until after detecting an indication of a visitor in at least twenty percent and/or forty percent of the sections.
Several methods include selecting the first detection zone within the first image by the user touching at least a first subset of the sections on the electronic display of the remote computing device. Touching the first subset causes the first subset to be included in the first detection zone. The electronic display can be a touchscreen of a computer such as a smartphone or tablet. The user of the remote computing device can swipe the touchscreen to select a detection zone. Touching or clicking on each section is not necessary in some embodiments.
Some methods include causing a second subset of the sections to be included in the first detection zone in response to the first subset comprising an outer perimeter that surrounds the second subset. For example, the user can swipe the touchscreen to form a closed shape. All sections at least partially located within the closed shape can be included in the first detection zone.
Some embodiments include two, three, four, and/or many detection zones, which can be independent, interdependent, separate, and/or overlapping. Detecting a visitor in a first detection zone can lead to immediately notifying the user of the remote computing device. Detecting a visitor in a second detection zone can include additional safeguards against false-positives.
Several embodiments include selecting the first detection zone by displaying the first image on the electronic display and then recording which areas of the first image the user indicates to include in the first detection zone by touching the electronic display. Some methods include calculating a percentage of the first detection zone that includes the second indication of the first visitor. The percentage can be a percentage of the area of the detection zone or can be a percentage of the sections. Methods can include sending the alert to the remote computing device in response to determining that the percentage of the detection zone exceeds a first threshold. The first threshold can be 10 percent or 30 percent.
Some methods include sending a picture of a visitor to the remote computing device, and then waiting to open audio and/or video communication between the visitor and the user of the remote computing device until after determining a percentage of the first detection zone that includes an indication of the third visitor and calculating a time in which the indication of the third visitor has been in the first detection zone. Embodiments can include opening the audio communication between the third visitor and the user of the remote computing device in response to the percentage of the detection zone and the time. The percentage can be at least 10 percent and/or at least 25 percent. The time can be at least one second and/or at least four seconds.
Indications of the visitor can be motion indications. Motion indications can be identified by comparing a baseline image to another image. The baseline image can be taken when a visitor is not present. Other indications of the visitor can include presence indications (e.g., indications that at least a portion of the visitor is present in the section being analyzed).
Some embodiments include selecting the first detection zone by displaying the first image on the electronic display and then recording which areas of the first image the user indicates to include in the first detection zone by touching the electronic display. The remote computing device can prompt the user to select areas and/or sections to include in a detection zone. In some embodiments, the remote computing device does not display a grid on the calibration image, but the remote computing device prompts the user to select a portion of the image as the detection zone and/or prompts the user to select a portion of the image to exclude from the detection zone.
Several embodiments include calculating a percentage of the first detection zone that includes the second indication of the first visitor and/or calculating a time in which the second indication of the first visitor has been in the first detection zone. Methods can include sending the alert to the remote computing device in response to the percentage of the detection zone and the time.
The images used in several methods do not necessarily include the entire field of view of the camera of the doorbell. In some embodiments, the field of view comprises a portion, and the first image, the second image, and the third image consist of the portion of the field of view. Methods can further comprise selecting the portion of the field of view. In some embodiments, the images include the entire field of view of the camera.
The portion of the field of view can be consistent between the calibration image and subsequent images to help the system accurately analyze the images. In some methods, the first image, the second image, and the third image consist of at least a portion of the field of view, wherein the method further comprises analyzing the portion of the field of view.
Although doorbells can be used anywhere, in some embodiments, the camera of the doorbell is configured to record a portion of an entryway, wherein the first image, the second image, and the third image show the portion of the entryway.
In some embodiments, the doorbell and the remote computing device are not physically coupled. Methods can include wirelessly sending the first image from the doorbell to the remotely located computing device. Some embodiments include sending the first image directly from the doorbell to the remote computing device without an intermediary server. This direct transmission can be via wires or can be wireless. Several embodiments include intermediary servers that enable the doorbell to communicate with the remote computing device via the Internet.
Methods for using a doorbell system to detect a first visitor can include obtaining the doorbell that comprises a camera and a button. The camera can be configured such that the camera has a field of view. Several embodiments include using the camera of the doorbell to take a first image to calibrate the doorbell system and sending the first image from the doorbell to the remote computing device. Some methods include displaying the first image on the electronic display of the remote computing device. Several embodiments include prompting a user of the remote computing device to select a first detection zone within the first image. The first detection zone can comprise at least a portion of the first image. Methods can include configuring the doorbell system to ignore a second visitor located within the field of view but located outside of the first detection zone. Ignoring the second visitor can include failing to send a notification regarding the second visitor to the remote computing device (e.g., even if the doorbell otherwise responds to the second visitor, for example, by flashing an LED light).
The system can ignore a visitor by not sending an alert regarding the visitor to the remote computing device. In some embodiments, the system does not send an alert to the remote computing device in response to the presence of the visitor outside the detection zone but inside the field of view of the camera and/or inside the image. Even when the system ignores a visitor, the system can record the visitor for future reference by the user. The user can then request to see visitors who were inside the field of view but not shown via alerts (because they were ignored due to being located outside the detection zone). Thus, the system can ignore the visitor in response to the presence of the visitor outside the detection zone, but the system can later provide information regarding the visitor to the user in response to a user's request. Sending an alert can include sending a push notification to a smartphone.
Several methods include configuring the doorbell system to send a picture of a third visitor to the remote computing device in response to determining that the third visitor is located inside of the first detection zone as defined based on the first image. The first detection zone can be a two-dimensional zone rather than a three-dimensional area of the physical world. Thus, the detection zone can be decoupled from proximity.
Some method embodiments include enabling audio and/or video communication between a visitor and the user of the remote computing device in response to detecting at least one indication of the visitor in at least two of the sections and/or in at least ten of the sections. In some embodiments, the sections with the detected indications must be adjacent to each other.
Some embodiments include selecting the first detection zone within the first image by prompting the user of the remote computing device to indicate a first area by touching the first area on the electronic display of the remote computing device; recording the first area; and excluding the first area from the first detection zone. Methods can include ignoring a visitor in response to the visitor being located in the first area. The user can select areas for exclusion from the detection zone and can select areas for inclusion in the detection zone.
Doorbells can comprise a motion sensor. Some embodiments include an infrared motion sensor. Methods can comprise ignoring the second visitor in response to disabling the motion sensor during a predetermined time period. The predetermined time period can be during certain hours of the day or night. The time period can be when the user is home or away from home (e.g., where the doorbell is mechanically coupled to the home). As used herein, “home” can include any type of stationary structure configured to shelter people (e.g., an office building).
Several embodiments include using a doorbell system to detect at least one visitor. Methods can include configuring the camera of the doorbell such that the camera comprises a field of view and using the camera of the doorbell to take a first image to calibrate the doorbell system by establishing a baseline of an entryway. The baseline can be used to define a state without any visitors. Methods can include sending the first image from the doorbell to the remote computing device and displaying the first image on an electronic display of the remote computing device.
Some methods include prompting a user of the remote computing device to select a first detection zone within the first image. The first detection zone can comprise a portion of the first image. The first detection zone can include a two-dimensional representation of an area in which the doorbell system is configured to respond to motion detection. Several embodiments include displaying a grid pattern on the first image on the electronic display of the remote computing device such that the first image is divided into at least six sections by lines that cross each other. The system can be configured to identify the first detection zone within the first image by the user choosing at least a first subset of the sections on the electronic display of the remote computing device. Choosing the first subset can cause the first subset to be included in the first detection zone.
Several methods include configuring the doorbell system to ignore a second visitor located within the field of view but located outside of the first detection zone. Some embodiments include configuring the doorbell system to send a picture of a third visitor to the remote computing device in response to at least some of the following factors: (1) determining that the third visitor is located inside of the first detection zone as defined based on the first image, (2) determining that at least a predetermined percentage (e.g., thirty percent) of the first detection zone includes motion or visitors indicators, and (3) determining that the first detection zone has included the indicators for at least a predetermined amount of time (e.g., three seconds).
Some methods include automatically excluding an area from a detection zone. Automatic exclusion can occur without the user excluding a specific area (even if the user configures settings that later lead to automatic exclusions). In some embodiments, indications indicative of motorized vehicles (e.g., cars, trucks, vans) are automatically excluded from a detection zone. These automatic calibration innovations can take many forms. Several methods include automatically excluding an area from a detection zone in response to detecting an object (e.g., a motorized vehicle) moving through the first detection zone at more than twenty-five miles per hour. Some methods include automatically excluding an area in response to detecting an infrared signal indicative of a motorized vehicle.
Some embodiments include automatically excluding an area from the first detection zone in response to at least some of the following items: (1) detecting an indication of a visitor in a detection zone; (2) enabling audio communication between the doorbell and the remote computing device in response to detecting the indication of the visitor; and (3) using the doorbell to detect an absence of sound indicative of speaking. The area that is excluded can be the area in which the indication was detected.
The disclosure includes methods for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. Methods can include obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime. Methods can also include sending a wireless notification from the doorbell to the remotely located computing device regarding a presence of the visitor. As well, methods can include entering a network connection mode prior to sending the wireless notification, wherein the network connection mode comprises using the remotely located computing device to scan a barcode.
In some embodiments, the network connection mode comprises detecting a first wireless network having a name and a password, wherein the barcode represents a doorbell identification code that is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, wherein the network connection mode comprises creating a second wireless network, and the network connection mode comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network, wherein the method comprises the doorbell directly communicating with the remotely located computing device via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
In some embodiments, the barcode comprises a Quick Response Code. In some embodiments, the second wireless network is created by the doorbell. In some embodiments, the second wireless network is created by the remotely located computing device.
Some methods include communicatively coupling the remotely located computing device to a WiFi router and the doorbell via the first wireless network.
Some methods include detecting multiple wireless networks and automatically selecting the first wireless network for communicating between the doorbell and the remotely located computing device, wherein prior to the automatic selection the remotely located computing device is connected to the first wireless network; and receiving authorization to use the remotely located computing device to communicate with the doorbell in response to pressing the button for a predetermined amount of time. In some embodiments the predetermined amount of time is at least twenty seconds.
Several embodiments include obtaining the doorbell that comprises a speaker, a microphone, a camera, and/or a button (e.g., wherein the doorbell is configurable to enable a visitor to sound a chime); receiving a wireless notification from the doorbell with the remotely located computing device regarding a presence of the visitor; and/or entering a network connection mode prior to receiving the wireless notification. The network connection mode can comprise using the remotely located computing device to scan a barcode.
In some embodiments, the network connection mode comprises detecting a first wireless network having a name and a password. Scanning the barcode can comprise using the remotely located computing device to take a picture of the barcode, and then using the remotely located computing device to analyze the barcode to extract a doorbell identification code from the barcode. Embodiments can comprise transmitting the doorbell identification code from the remotely located computing device to a remote computer, and receiving authorization from the remote computer for the remotely located computing device to configure the doorbell. In some embodiments, receiving authorization from the remote computer for the remotely located computing device to configure the doorbell can then occur in response to the remote computer receiving the doorbell identification code from the remotely located computing device. Configuring the doorbell can comprise transmitting the password of the first wireless network from the remotely located computing device to the doorbell.
The disclosure also includes methods for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. Methods can include obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime. Methods can also include sending a wireless notification from the doorbell to the remotely located computing device regarding a presence of the visitor. As well, methods can include entering a network connection mode prior to sending the wireless notification, wherein the network connection mode comprises using the remotely located computing device to scan a Quick Response Code.
In some embodiments, the network connection mode comprises detecting a first wireless network having a name and a password, wherein the Quick Response Code represents a doorbell identification code that is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell.
Methods can include scanning the Quick Response Code via a camera on the remotely located computing device, wherein the doorbell is obtained from a package, and wherein the Quick Response Code is located along one of a surface of the package and along a surface of the doorbell.
In some embodiments the network connection mode comprises communicatively coupling the remotely located computing device with the doorbell, and the network connection mode further comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell to enable the doorbell to communicate with the remotely located computing device via the first wireless network, wherein the method comprises the doorbell directly communicating with the remotely located computing device prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
In some embodiments communicatively coupling the remotely located computing device with the doorbell comprises communicatively coupling the remotely located computing device with the doorbell via a cable.
Some methods include receiving authorization to use the remotely located computing device to communicate with the doorbell in response to pressing the button for a predetermined amount of time.
Methods can include scanning the Quick Response Code via a camera on the remotely located computing device, wherein the doorbell is obtained from a package, and wherein the Quick Response Code is located along a surface of the package. As well, methods can include scanning the Quick Response Code via a camera on the remotely located computing device, wherein the Quick Response Code is located along a surface of the doorbell. In some embodiments, the doorbell identification code comprises at least 24 characters.
Furthermore, the disclosure includes methods for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. Methods include obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime. Methods can also include sending a wireless notification from the doorbell to the remotely located computing device regarding a presence of the visitor. As well, methods can include entering a network connection mode prior to sending the wireless notification, wherein the network connection mode comprises detecting a first wireless network having a name and a password.
In some embodiments, the network connection mode further includes after detecting the first wireless network, then using the remotely located computing device to scan a barcode, wherein the barcode represents a doorbell identification code that is associated with the doorbell; after using the remotely located computing device to scan the barcode, then using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell; after using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, then communicatively coupling the remotely located computing device with the doorbell; after communicatively coupling the remotely located computing device with the doorbell, then transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell to enable the doorbell to communicate with the remotely located computing device via the first wireless network; and communicating directly with the remotely located computing device prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
Methods can further include, after communicating with the remotely located computing device, detecting multiple wireless networks and automatically selecting the first wireless network for communicating between the doorbell and the remotely located computing device, wherein prior to the automatic selection the remotely located computing device is connected to the first wireless network.
In some embodiments detecting the first wireless network having the name and the password occurs in response to pressing the button for a predetermined amount of time, the method further comprising, after pressing the button for a predetermined amount of time, then receiving authorization to use the remotely located computing device to communicate with the doorbell.
In some embodiments the remotely located computing device is communicatively coupled with the doorbell via a second wireless network that is created by the doorbell. As well, in some embodiments the remotely located computing device is communicatively coupled with the doorbell via a second wireless network that is created by the remotely located computing device.
In some embodiments the network connection mode comprises detecting a first wireless network having a name and a password, wherein the barcode represents a doorbell identification code that is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, and the network connection mode comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell to enable the doorbell to communicate with the remotely located computing device via the first wireless network.
The embodiments described above include many optional features and aspects. Features and aspects of the embodiments can be combined.
These and other features, aspects, and advantages are described below with reference to the drawings, which are intended to illustrate, but not to limit, the invention. In the drawings, like reference characters denote corresponding features consistently throughout similar embodiments.
Although certain embodiments and examples are disclosed below, inventive subject matter extends beyond the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof. Thus, the scope of the claims appended hereto is not limited by any of the particular embodiments described below. For example, in any method or process disclosed herein, the acts or operations of the method or process may be performed in any suitable sequence and are not necessarily limited to any particular disclosed sequence. Various operations may be described as multiple discrete operations in turn, in a manner that may be helpful in understanding certain embodiments; however, the order of description should not be construed to imply that these operations are order dependent. Additionally, the structures, systems, and/or devices described herein may be embodied as integrated components or as separate components.
For purposes of comparing various embodiments, certain aspects and advantages of these embodiments are described. Not necessarily all such aspects or advantages are achieved by any particular embodiment. Thus, for example, various embodiments may be carried out in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other aspects or advantages as may also be taught or suggested herein.
The following patent is incorporated herein by reference: U.S. Pat. No. 7,583,191, entitled SECURITY SYSTEM AND METHOD FOR USE OF SAME, and filed Nov. 14, 2006.
INTRODUCTIONCommunication systems can provide a secure and convenient way for a remotely located individual to communicate with a person who is approaching a sensor, such as a proximity sensor or motion sensor, or with a person who rings a doorbell, which can be located in a doorway, near an entrance, or within 15 feet of a door. Some communication systems allow an individual to hear, see, and talk with visitors who approach at least a portion of the communication system and/or press a button such as a doorbell's button. For example, communication systems can use a computing device to enable a remotely located person to see, hear, and/or talk with visitors. Computing devices can include computers, laptops, tablets, mobile devices, smartphones, cellular phones, and wireless devices (e.g., cars with wireless communication). Example computing devices include iPhone, iPad, iMac, MacBook Air, and MacBook Pro made by Apple Inc. Communication between a remotely located person and a visitor can occur via the Internet, cellular networks, telecommunication networks, and wireless networks.
While the figures show the camera assembly 208 as structurally integral to the security system 202, it should be appreciated that the camera assembly 208 can be structurally separate or remotely located from the security system 202. In this regard, the security system 202 can be implemented with or without a camera assembly 208 and the security system 202 can thereby be further communicatively coupled to another camera assembly that is remotely located to the security system 202. In this regard, the security system 202 can be communicatively coupled to other security systems 202 or other remote camera assemblies 208.
The security system 202 (e.g., a doorbell) can include an outer housing 224, which can be water resistant and/or waterproof. The outer housing can be made from metal or plastic, such as molded plastic with a hardness of 60 Shore D. In some embodiments, the outer housing 224 is made from brushed nickel or aluminum.
Rubber seals can be used to make the outer housing 224 water resistant or waterproof. The security system 202 can be electrically coupled to a power source, such as wires electrically connected to a building's electrical power system. In some embodiments, the security system 202 includes a battery for backup and/or primary power.
Wireless communication 230 can enable the security system 202 (e.g., a doorbell) to communicate with the computing device 204. Some embodiments enable communication via cellular and WiFi networks. Some embodiments enable communication via the Internet. Several embodiments enable wired communication between the security system 202 and the computing device 204. The wireless communication 230 can include the following communication means: radio, WiFi (e.g., wireless local area network), cellular, Internet, Bluetooth, telecommunication, electromagnetic, infrared, light, sonic, and microwave. Other communication means are used by some embodiments. In some embodiments, such as embodiments that include telecommunication or cellular communication means, the security system 202 can initiate voice calls or send text messages to a computing device 204.
SoftwareSome embodiments include computer software (e.g., application software), which can be a mobile application designed to run on smartphones, tablet computers, and other mobile devices. Software of this nature is sometimes referred to as “app” software. Some embodiments include software designed to run on desktop computers and laptop computers.
The computing device 204 can run software with a graphical user interface. The user interface can include icons or buttons. In some embodiments, the software is configured for use with a touch-screen computing device such as a smartphone or tablet.
The user interface 240 can include a connectivity indicator 248. In some embodiments, the connectivity indicator can indicate whether the computing device is in communication with a security system, the internet, and/or a cellular network. The connectivity indicator 248 can alert the user if the computing device 204 has lost its connection with the security system 202; the security system 202 has been damaged; the security system 202 has been stolen; the security system 202 has been removed from its mounting location; the security system 202 lost electrical power; and/or if the computing device 204 cannot communicate with the security system 202. In some embodiments, the connectivity indicator 248 alerts the user of the computing device 204 by flashing, emitting a sound, displaying a message, and/or displaying a symbol.
In some embodiments, if the security system 202 loses power, loses connectivity to the computing device 204, loses connectivity to the Internet, and/or loses connectivity to a remote server, a remote server 206 sends an alert (e.g., phone call, text message, image on the user interface 240) regarding the power and/or connectivity issue. In several embodiments, the remote server 206 can manage communication between the security system 202 and the computing device. In some embodiments, information from the security system 202 is stored by the remote server 206. In several embodiments, information from the security system 202 is stored by the remote server 206 until the information can be sent to the computing device 204, uploaded to the computing device 204, and/or displayed to the remotely located person via the computing device 204. The remote server 206 can be a computing device that stores information from the security system 202 and/or from the computing device 204. In some embodiments, the remote server 206 is located in a data center.
In some embodiments, the server 206 is a remote computer. The remote computer can be located remotely relative to the computing device 204. A company that makes security systems 202 can control the remote computer in order to authorize remote computing devices 204 to configure security systems 202 (e.g., doorbells, camera assemblies). Configuring security systems 202 can include helping security systems 202 connect to wireless networks.
In some embodiments, the computing device 204 and/or the remote server 206 attempts to communicate with the security system 202. If the computing device 204 and/or the remote server 206 is unable to communicate with the security system 202, the computing device 204 and/or the remote server 206 alerts the remotely located person via the software, phone, text, a displayed message, and/or a website. In some embodiments, the computing device 204 and/or the remote server 206 attempts to communicate with the security system 202 periodically; at least every five hours and/or less than every 10 minutes; at least every 24 hours and/or less than every 60 minutes; or at least every hour and/or less than every second.
In some embodiments, the server 206 can initiate communication to the computer device 204 and/or to the security system 202. In several embodiments, the server 206 can initiate, control, and/or block communication between the computing device 204 and the security system 202.
In several embodiments, a user can log into an “app,” website, and/or software on a computing device (e.g., mobile computing device, smartphone, tablet, desktop computer) to adjust the security system settings discussed herein.
In some embodiments, a computing device can enable a user to watch live video and/or hear live audio from a security system due to the user's request rather than due to actions of a visitor. Some embodiments include a computing device initiating a live video feed (or a video feed that is less than five minutes old).
In some embodiments, the user interface 240 displays an image 252 such as a still image or a video of an area near and/or in front of the security system 202. The image 252 can be taken by the camera assembly 208 and stored by the security system 202, server 206, and/or computing device 204. The user interface 240 can include a recording button 256 to enable a user to record images, videos, and/or sound from the camera assembly 208, microphone of the security system 202, and/or microphone of the computing device 204.
In several embodiments, the user interface 240 includes a picture button 260 to allow the user to take still pictures and/or videos of the area near and/or in front of the security system 202. The user interface 240 can also include a sound adjustment button 264 and a mute button 268. The user interface 240 can include camera manipulation buttons such as zoom, pan, and light adjustment buttons. In some embodiments, the camera assembly 208 automatically adjusts between Day Mode and Night Mode. Some embodiments include an infrared camera and/or infrared lights to illuminate an area near the security system 202 to enable the camera assembly 208 to provide sufficient visibility (even at night).
In some embodiments, buttons include diverse means of selecting various options, features, and functions. Buttons can be selected by mouse clicks, keyboard commands, and touching a touch screen. Many embodiments include buttons that can be selected without touch screens.
In some embodiments, the user interface 240 includes a quality selection button, which can allow a user to select the quality and/or amount of the data transmitted from the security system 202 to the computing device 204 and/or from the computing device 204 to the security system 202. For example, if the data transmission capability of the wireless communication is insufficient to transmit high-resolution video from the security system 202 to the computing device 204, the user might select a lower resolution video setting. In some cases, the user might select a still image rather than video or a single still image every period of time where the period of time can be more than 0.1 seconds and/or less than 60 seconds; more than 0.5 seconds and/or less than 30 seconds; or more than 1 second and/or less than 15 seconds. In some cases, the security system 202 might only send a single still image to the computing device 204.
Some embodiments include facial recognition such that the camera assembly 208 waits until the camera assembly 208 has a good view of the person located near the security system 202 and then captures an image of the person's face. Facial recognition can be used to establish a visitor's identity.
Several embodiments can establish a visitor's identity by detecting a signal from a device associated with the visitor. Examples of such a signal include Bluetooth, WiFi, RFID, NFC, and/or cellular telephone transmissions.
In some embodiments, video can be sent to and/or received from the computing device 204 using video chat protocols such as FaceTime (by Apple Inc.) or Skype (by Microsoft Corporation). In some embodiments, these videos are played by videoconferencing apps on the computing device 204 instead of being played by the user interface 240.
The user interface 240 can include a termination button 276 to end communication between the security system 202 and the computing device 204. In some embodiments, the termination button 276 ends the ability of the person located near the security system 202 (i.e., the visitor) to hear and/or see the user of the computing device 204, but does not end the ability of the user of the computing device 204 to hear and/or see the person located near the security system 202.
In some embodiments, a button 276 is both an answer button (to accept a communication request from a visitor) and is a termination button (to end communication between the security system 202 and the computing device 204). The button 276 can include the word “Answer” when the system is attempting to establish two-way communication between the visitor and the user. Selecting the button 276 when the system is attempting to establish two-way communication between the visitor and the user can start two-way communication. The button 276 can include the words “End Call” during two-way communication between the visitor and the user. Selecting the button 276 during two-way communication between the visitor and the user can terminate two-way communication. In some embodiments, terminating two-way communication still enables the user to see and hear the visitor. In some embodiments, terminating two-way communication causes the computing device 204 to stop showing video from the security system and to stop emitting sounds recorded by the security system.
In some embodiments, the user interface 240 opens as soon as the security system detects a visitor (e.g., senses indications of a visitor). Once the user interface 240 opens, the user can see and/or hear the visitor even before “answering” or otherwise accepting two-way communication, in several embodiments.
Some method embodiments include detecting a visitor with a security system. The methods can include causing the user interface to display on a remote computing device 204 due to the detection of the visitor (e.g., with or without user interaction). The methods can include displaying video from the security system and/or audio from the security system before the user accepts two-way communication with the visitor. The methods can include displaying video from the security system and/or audio from the security system before the user accepts the visitor's communication request. The methods can include the computing device simultaneously asking the user if the user wants to accept (e.g., answer) the communication request and displaying audio and/or video of the visitor. For example, in some embodiments, the user can see and hear the visitor via the security system before opening a means of two-way communication with the visitor.
In some embodiments, the software includes means to start the video feed on demand. For example, a user of the computing device might wonder what is happening near the security system 202. The user can open the software application on the computing device 204 and instruct the application to show live video and/or audio from the security device 202 even if no event near the security system 202 has triggered the communication.
In several embodiments, the security device 202 can be configured to record when the security device 202 detects movement and/or the presence of a person. The user of the computing device 204 can later review all video and/or audio records when the security device 202 detected movement and/or the presence of a person.
Some embodiments include a media roll or other means to record a certain amount of data and then record over some of the data, such as the oldest data or low-priority data. For example, some systems record over data that is older than seven days, 14 days, or one month. Some security systems can be configured to continuously record video and/or audio to a media roll, which can be viewed on a remotely located computing device.
In several embodiments, the system (e.g., software, computing device 204, security system 202 in
Referring now to
The user interface 240 can include a button to silence the doorbell sound and to place the security system 202 in Silent Mode. In some embodiments of Silent Mode, pressing the doorbell button 212 will not send a signal to a chime located inside the building for the chime to emit a sound. In some embodiments, the chime is a speaker (such as a speaker made by Bose Corporation) located inside of the building, which can be a home, office, warehouse, or other structure.
In some embodiments, a security system 202 and/or a computing device 204 communicates with a baby monitor. If the baby monitor detects indicators that a baby is sleeping (e.g., the presence of a baby that is not moving, as sensed by an IR motion detector) the communication system can disable the doorbell sound to avoid disturbing the baby's sleep. Some embodiments work the same way except that the baby is replaced by a person, such as an adult.
Several embodiments include a motion detector 218. The motion detector 218 can sense whether a visitor is located near an entryway.
Several embodiments include sending a notification to the user regarding the presence of the visitor even if the visitor has not pressed the doorbell button 212 to “ring” the doorbell (e.g., to sound a chime inside of the building). In several embodiments, if motion is detected by the doorbell for five seconds and the doorbell button 212 has not been pressed (e.g., within the last five seconds, within the last 30 seconds, within the last 60 seconds), then the doorbell automatically sends a notification to the user regarding the presence of the visitor. The notification can be sent to a remotely located computing device 204 and/or via a chime 302 (shown in
In several embodiments, if the doorbell button 212 has been pressed (e.g., within the last 5 seconds, within the last 30 seconds, within the last 60 seconds), then motion alerts are canceled for three minutes. For example, methods can include blocking notifications based on motion detection for three minutes (or for at least 60 seconds, at least three minutes, and/or less than ten minutes) from the time the doorbell button 212 has been pressed.
In some embodiments, the user interface 240 has a button to make the doorbell ring (e.g., make the chime emit a sound inside of the building). The user can ring the doorbell by pressing a button on the computing device 204.
Some embodiments include administrative privileges. These privileges can include administrative abilities and the ability to alter settings. The administrative privileges can be password protected. The administrator can add and remove notification recipients and/or computing devices 204. For example, a user who sets up the communication system 200 by initially pairing a computing device 204 with a security system 202 can be given administrative privileges and the highest priority (as explained herein). This administrative user can give permissions and priorities to other users and computing devices 204 (e.g., as explained in the context of
Several embodiments include a mode to address overly frequent notifications. This mode is called Peaceful Mode. For example, on Halloween, the security system 202 may sense doorbell button 212 presses, motion, proximity, and/or sound more frequently than the user wants to be notified. Some embodiments include a maximum notification setting (e.g., the maximum number of notifications that will be communicated to the user per unit of time). If the maximum number of notifications is exceeded, then the system can enter Peaceful Mode. In several embodiments, the maximum number of notifications is three notifications per hour; four notifications per hour; five notifications per hour; seven notifications per hour; ten notifications per hour; four notifications per day; seven notifications per day; seven notifications per 24 hours; or fifteen notifications per 24 hours. In some embodiments, the user can set the maximum number of notifications and/or the time period over which the notifications are counted towards a maximum number. In some embodiments, the user can set the maximum number of notifications via the software, a website configured to communicate with the server 206, and/or a user interface 240. In some embodiments of Peaceful Mode, the system stops alerting the user via the computing device 204. For example, a visitor pressing the doorbell button 212 could cause a sound (e.g., a chime) to be emitted inside or near the building but would not cause the computing device 204 to notify the user.
In some embodiments of Peaceful Mode, the system stops alerting the user via the chime located inside of the building. For example, a visitor pressing the doorbell button 212 could cause the computing device 204 to notify the user, but would not cause a sound (e.g., a chime) to be emitted inside or near the building.
In some embodiments of Peaceful Mode, the system stops alerting the user via the chime located inside of the building and via the computing device 204. For example, a visitor pressing the doorbell button 212 would not cause a sound (e.g., a chime) to be emitted inside or near the building and would not cause the computing device 204 to notify the user.
In some embodiments of Peaceful Mode, the system does not automatically stop alerting the user via the computing device and does not automatically stop alerting the user via the chime, but instead, once the maximum number of notifications is exceeded, the software, computing device 240, and/or user interface 240 asks the user if the user wants to enter Peaceful Mode, turn off notifications via the computing device 240, and/or turn off notifications via the sounds emitted inside and/or near the building (e.g., chimes). In several embodiments, the software, computing device 240, and/or user interface 240 asks the user how long the user wants to turn off notifications via the computing device 240, and/or turn off notifications via the sounds emitted inside and/or near the building. In some embodiments, notifications are turned off for at least 15 minutes and/or less than 4 hours; at least 5 minutes and/or less than one hour; or at least 30 minutes and/or less than 24 hours.
In some embodiments of Peaceful Mode, Peaceful Mode does not turn off notifications, but instead reduces the volume, frequency, and/or intensity of notifications. In some embodiments of Peaceful Mode, the chime volume can be reduced by at least 30 percent, at least 50 percent, or at least 70 percent. In some embodiments of Peaceful Mode, the alerts to the computing device 204 switch to Non-auditory Mode such that the computing device 204 does not ring or send auditory alerts, but instead sends alerts such as vibrations (with little or no sound) and/or visual alerts (e.g., messages on the user interface 240).
Referring now to
In some embodiments, an image and/or video of each visitor is automatically stored in a visitor log retrievable by the user. The image and/or video of each visitor can be automatically triggered by the security system detecting a visitor.
Data sent between a security system and a computing device can be secured via encryption, transport layer security, secure sockets layer, and/or cryptographic protocols. Data regarding a security system that is sent from one computing device to another computing device can be secured via encryption, transport layer security, secure sockets layer, and/or cryptographic protocols.
Many security system embodiments and method embodiments are configured to work with any computing device (e.g., a cellular phone, tablet, laptop, desktop computer). Software applications can be configured to work with particular operating systems. In some cases, making software applications compatible with all operating systems and computing devices can be challenging. Some embodiments open a website (e.g., on the display screen 242 shown in
A simple software application can be used to launch the website in response to the user accepting a push notification. Many diverse computing devices are capable of opening websites, which can enable a website-based system to be compatible with a broad range of computing devices.
Website-based systems can be used for pool monitoring and elderly monitoring applications. For example, a security system 202 can be used to monitor a pool 5030 (shown in
Referring now to
Server 206 control can prevent unwanted communication between the computing device 204 and the security system 202. For example, if the computing device 204 is stolen from a user, the user can contact a server administrator to block communication between the security system 202 and the computing device 204. The user can provide an authentication means, such as a password or user information, so the server administrator knows the user is in fact authorized to make changes. In some embodiments, the server 206 can update any of the settings and options described herein. In some embodiments, the user can update any of the settings and options described herein via a website. The server 206 can be used to register users and update settings of the computing device 204, the security system 202, and/or the communication system 200.
In some embodiments, data captured by the security system and/or the computing device 204 (such as videos, pictures, and audio) is stored by another remote device such as the server 206. Cloud storage, enterprise storage, and/or networked enterprise storage can be used to store video, pictures, and/or audio from the communication system 200 or from any part of the communication system 200. The user can download and/or stream stored data and/or storage video, pictures, and/or audio. For example, a user can record visitors for a year and then later can review conversations with visitors from the last year. In some embodiments, remote storage, the server 206, the computing device 204, and/or the security system 202 can store information and statistics regarding visitors and usage.
In some embodiments, this information can be transferred, forwarded, and/or sent to other computing devices and/or servers. A user can record a communication (e.g., video and audio) with a visitor and then can forward the communication to another person. The forwarded information can include additional information from the user such as a recorded message and/or a text message. For example, if one user talks with a visitor via a security system 202, the user can forward the conversation to the person that the visitor was seeking.
High-Level System OverviewA wireless network 308 can allow devices to wirelessly access the internet. The security system 202 can access the internet via the wireless network 308. The wireless network 308 can transmit data from the security system 202 to the internet, which can transmit the data to remotely located computing devices 204. The internet and wireless networks can transmit data from remotely located computing devices 204 to the security system 202. In some embodiments, a security system 202 connects to a home's WiFi.
As illustrated in
In some embodiments, the security system 202 can communicate (e.g., wirelessly 230) with a television 306, which can be a smart television. The television 306 can display any of the items shown in
Although some security system embodiments include using electricity from electrical wires 304 of a building 300, many security system embodiments communicate with computing devices 204 via a wireless network 308 that allows security systems 202 to connect to a regional and sometimes global communications network. In some embodiments, the security system 202 communicates via a wireless network 308 with a router that enables communication with the Internet, which can enable communication via diverse means including telecommunication networks. In this way, a security system 202 can communicate with computing devices 204 that are desktop computers, automobiles, laptop computers, tablet computers, cellular phones, mobile devices, and smart phones.
In some embodiments, a security system (e.g., a doorbell) needs to know which wireless network to join and needs to know the wireless network's password. A computing device, such as a smartphone, can provide this information to the security system.
The following method is used in some embodiments. (Some embodiments include orders that are different from the following order.) First, the computing device (e.g., a smartphone) creates an ad hoc wireless network. Second, the user opens software (such as an app) on the computing device. When the security system is in Setup Mode, the security system can automatically join the computing device's ad hoc network. Third, the user can utilize the software to select the wireless network that the security system should join and to provide the password of the wireless network (e.g., of the router) to the security system.
Diverse methods can be used to connect a security system (e.g., a doorbell) to a wireless network (such as a wireless network of a home). Several embodiments include transmitting an identifier (e.g., a name) to a security system, wherein the identifier enables the security system to identify the wireless network to which the security system should connect. Several embodiments include transmitting a password of the wireless network to the security system, wherein the password enables the security system to connect to the network. In some embodiments, a computing device (e.g., a smartphone) transmits the identifier and password.
In several embodiments, methods of connecting a security system (e.g., a doorbell) to a wireless network (e.g., a wireless network of a home or building) can include placing the security system in Setup Mode. Some security systems automatically go into Setup Mode upon first use, first receiving electrical power, first receiving electrical power after a reset button is pushed, first receiving electrical power after being reset, and/or when a reset button is pushed.
In some embodiments, a Setup Mode comprises a Network Connection Mode. Methods can comprise entering the Network Connection Mode in response to pressing the button for at least eight seconds. The Network Connection Mode can comprise detecting a first wireless network having a name and a password. The Network Connection Mode can comprise inputting a doorbell identification code into the remotely located computing device. The doorbell identification code can be associated with the doorbell. The Network Connection Mode can comprise using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell. The Network Connection Mode can comprise the remotely located computing device creating a second wireless network (e.g., that emanates from the remotely located computing device). The Network Connection Mode can comprise transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network. Methods can comprise the remotely located computing device directly communicating with the doorbell via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network. For example, the wireless communication from the remotely located computing device can travel through the air directly to the doorbell. The wireless communication from the remotely located computing device can travel indirectly to the doorbell via a third electronic device such as a server.
In some embodiments, a security system creates its own wireless network (e.g., WiFi network) with a recognizable network name (e.g., a service set identifier). Software can provide setup instructions to the user via a computing device, in some cases, upon detecting a new wireless network with the recognizable network name. The instructions can inform the user how to temporarily join the security system's wireless network with the computing device. The user can select and/or transmit the name and password of a target wireless network to the security system from the computing device. The security system can join the target wireless network (e.g., the wireless network of the building to which the security system is attached) and can terminate its own wireless network.
In some cases, the computing device can capture the name and password of the target network before joining the network of the security system. In some cases, the user enters the name and password of the target network into the computing device to enable the computing device to provide the name and password of the target network to the security system.
In some cases, the computing device recognizes the name of the network of the security system, automatically joins the network of the security system, and transmits the name and password of the target network to the security system. In some cases, these steps are preceded by launching software (on the computing device) configured to perform these steps and/or capable of performing these steps.
Methods can include the security system trying to joint an ad hoc network (or other wireless network) with a fixed network name or a network name based on an identifier of the security system (e.g., the serial number of the security system, the model number of the security system). The computing device can provide instructions to the user to temporarily setup the network (e.g., the ad hoc network) via the computing device. The network can have the fixed network name or the name based on the identifier. The security system can recognize the name and join the network. The computing device can use the network to transmit the name and password of a target network (e.g., the wireless network of the building to which the security system will be coupled) to the security system. The security system can use the name and password of the target network to join the target network.
In some embodiments, the computing device displays an image (e.g., a quick response code) that contains or communicates the name and password of the target network. The security system can use its camera and onboard software to scan and decode the image (to determine the name and password of the target network). The security system can use the name and password of the target network to join the target network.
The computing device can generate and display pulses of light (e.g., by flashing black and white images on the screen of the computing device). The security system can use its camera and software to analyze and decode the pulses of light. The pulses of light can contain the name and/or password of the wireless network. The security system can use the name and password of the target network to join the target network.
In some embodiments, only the password of the target network is given to the security system. The security system can use the password to test each detected wireless network until it identifies a wireless network to which it can connect using the password.
The computing device can generate and emit an audio signal that corresponds to the name and/or password of the target network. The security system can use its microphone and software to analyze and decode the audio signal to receive the name and/or password of the target network. The security system can use the name and password of the target network to join the target network.
In some embodiments, the computing device transmits the name and password of the target network to the security system via Morse code (e.g., using the doorbell button, using light pulses, using sound pulses).
In some embodiments, the security system can pair with the computing device via Bluetooth. The computing device can transmit the name and password of the target network to the security system (e.g., via Bluetooth). The security system can use the name and password of the target network to join the target network.
In several embodiments, the computing device transmits the name and/or password of the target network via infrared (“IR”) communication (e.g., IR light) to the security system. The computing device can emit the IR communication via IR LEDs or IR display emissions. An infrared emission device (e.g., with an IR LED) can be electrically coupled to the computing device to enable the computing device to send IR communications. The security system can detect the IR communication via IR sensors. The security system can use the name and password of the target network to join the target network.
The remotely located computing device 204 can be placed very close to the doorbell (e.g., security system 202) to configure the doorbell 202, but then can communicate with the doorbell 202 from remote locations (e.g., from another portion of the building to which the doorbell is attached, from across a city, from across a country, from across the globe). In some embodiments, the remotely located computing device 204 is communicatively coupled to the doorbell 202 via a wire to enable the remotely located computing device 204 to help configure the doorbell. In several embodiments, the remotely located computing device 204 creates a wireless network 5556 to help configure the doorbell 202 while the doorbell 202 is within a communication range of the wireless network 5556. Once the doorbell 202 is configured, the wireless network 5556 created by the remotely located computing device 204 may no longer be necessary because the doorbell 202 can communicate with the remotely located computing device 204 via another wireless network 5560, which can include the Internet and cellular networks.
Some embodiments include using a doorbell 202 that is configurable to wirelessly communicate with a remotely located computing device 204. Embodiments can include obtaining the doorbell 202 that comprises a speaker, a microphone, a camera, and a button. The doorbell 202 can be configurable to enable a visitor to sound a chime. Several embodiments include detecting a first indication of the visitor; using the doorbell 202 to send a wireless notification to the remotely located computing device 204 regarding the visitor; and entering a network connection mode prior to sending the wireless notification. The first indication (and other indications) can be detected using the doorbell (e.g., via a sensor of the doorbell, via data sent to the doorbell).
In several embodiments, the network connection mode comprises using the doorbell 202 to detect a first wireless network 5560. Using the doorbell 202 to detect the first wireless network 5556 can include the doorbell 202 sensing the first wireless network (e.g., by searching for wireless networks that are within range of the doorbell). The doorbell 202 can also detect the first wireless network 5560 via data sent to the doorbell 202 (e.g., from the remotely located computing device 204). In some embodiments, the doorbell 202 detects the first wireless network 5556 when the doorbell 202 connects to the first wireless network 5560. Thus, the term “detect” is used herein in a very broad sense and can include direct detection and indirect detection (e.g., via another computer).
The first wireless network 5560 can comprise a first name and a first password. The network connection mode can comprise the remotely located computing device 204 creating a second wireless network 5556. In some embodiments, the network connection mode comprises the remotely located computing device 204 transmitting the first password of the first wireless network 5560 directly from the remotely located computing device 204 to the doorbell 202 via the second wireless network 5556 to enable the doorbell 202 to communicate with the remotely located computing device 204 via the first wireless network 5560. The doorbell 202 can directly communicate with the remotely located computing device 204 via the second wireless network 5556 prior to the doorbell 202 indirectly communicating with the remotely located computing device 204 via the first wireless network 5560. In some embodiments, the doorbell 202 indirectly communicates with the remotely located computing device 204 via a server, the Internet, a cellular communication network, and/or a wireless router 5550 that is not physically coupled to the doorbell or to the remotely located computing device.
Some embodiments include using the doorbell 202 to detect a proximity indication of the remotely located computing device 204; determining if the proximity indication meets a predetermined proximity threshold such that the proximity indication indicates that the remotely located computing device 204 is sufficiently close to the doorbell 202; and connecting the doorbell 202 to the second wireless network 5556 in response to the proximity indication meeting the predetermined proximity threshold. The proximity threshold can be a certain value or characteristic. In several embodiments, a proximity indication can meet a predetermined proximity threshold if the remotely located computing device 204 is within a predetermined distance of the doorbell 202. The distance can be 100 feet, 50 feet, 20 feet, 10 feet, and/or 5 feet.
Referring now to
Referring now to
In some embodiments, multiple computing devices are notified in series regarding a communication request. For example, the communication request might initially go to a first remote computing device, but if the communication request is not answered within a certain period of time, the communication request might go to a second remote computing device. If the communication request is not answered, the communication request might go to a third remote computing device.
In some cases, the users 336 utilize the communication system 310 to communicate with visitors who are in close proximity to the users 336. For example, a user 336 located inside her home can communicate with a visitor located just outside the home via the communication system 310.
Referring now to
In several embodiments, the computing device 204 can behave differently in Close Mode than in Away Mode. In some embodiments, the computing device 204 will not notify the user of visitors if the computing device 204 is in Close Mode. In several embodiments, Close Mode silences alerts, which can include precluding and/or eliminating the alerts. Instead, the user might have to listen for typical indications of a visitor such as the ring of a traditional doorbell. Once the computing device 204 enters Away Mode, the computing device 204 can notify the user of the visitor. In some embodiments, the computing device 204 notifies the user regarding the visitor if the computing device 204 is in Close Mode or Away Mode.
In several embodiments, the building's 300 doorbell chime is silenced when the computing device 204 is configured to alert the user. In some embodiments, the building's 300 doorbell chime emits sound and the computing device 204 is configured to alert the user.
In several embodiments, the user can decline a communication request by selecting via the user interface 240 a pre-recorded message to be played by the security system 202. The pre-recorded message can include audio and/or video content. Some embodiments can provide the user with options for playing a pre-recorded message on demand, and/or automatically playing a pre-recorded message under user-specified conditions. Examples of conditions that can be specified include time of day, user location, facial recognition or non-recognition of visitors, and/or number of recent visitors. In some embodiments, a pre-recorded message can interrupt two-way communications, which can resume after delivery of the message. In some embodiments, a pre-recorded message can be delivered without interrupting two-way communications.
In some embodiments, the security system 202 includes a memory 492 (shown in
In several embodiments, the security system 202 can ask a visitor to record a message and/or can record pictures (e.g., video, still pictures) when the security system 202 cannot communicate via the wireless network 308. The security system 202 can include a Network Enabled Mode and a Network Disabled Mode. In the Network Enabled Mode, the security system 202 can communicate via the wireless network 308 with a remote server and/or computing device 204. In the Network Disabled Mode, the security system 202 cannot communicate via the wireless network 308 with a remote server and/or computing device 204.
In the Network Enabled Mode, the security system 202 can send video and/or audio from the visitor to the user instantaneously; nearly instantaneously; immediately; within 15 seconds of capturing the video and/or audio; and/or within 60 seconds of capturing the video and/or audio. In the Network Enabled Mode, the security system 202 can preferentially send data (e.g., video, audio, traits, identification) regarding the visitor to the computing device 204 rather than storing the data in the memory of the security system 202. In the Network Disabled Mode, the security system 202 can act as a typical doorbell by, for example, causing a chime inside the building 300 to emit a sound. In some embodiments of the Network Disabled Mode, the security system 202 emits a visible error signal (e.g., flashing light, red light); records images and audio to the security system's memory; asks the visitor to leave a message for the user; and/or alerts the user regarding the lack of wireless communication.
In some embodiments, the security system 202 can maintain a visitor log, which can capture information such as the date, time, audio, video, and/or images of the visitor. The user interface 240 can display this information in a “guest book” format; as a timeline or calendar; as a series of images, videos, and/or audio files; or as a log file.
Several embodiments include the ability to automatically record every visitor who comes to the door (e.g., even if the visitors do not “ring” the doorbell). Each visitor can be logged and “time stamped.” Visitor information can be stored in the cloud (e.g., a 15 second video of each visit can be stored remotely). The stored visitor information can also include recorded conversations and whether the visitor notification was “answered” by the user. Some methods include charging a periodic (e.g., monthly) subscription fee for storing and retrieving visitor history information. The visitor history information can include statistical analyzes and other high-level visitor metrics (e.g., average visits per month, average age of visitors, average visit duration, percentage of notifications that were answered, percentage of welcome visitors, percentage of solicitors).
The user can accept or decline a communication request from a visitor. In some embodiments, the user can push a button (e.g., 276) on the user interface 240 (shown in
A visitor can initiate a communication request by ringing the doorbell of the security system 202, triggering a motion sensor of the security system 202, triggering a proximity sensor of the security system 202, and/or triggering an audio alarm of the security system 202. In some embodiments, the audio alarm includes the microphone of the security system 202. The security system 202 can determine if sounds sensed by the microphone are from a knocking sound, a stepping sound, and/or from a human in close proximity to the security system 202. The security system 202 can detect important sounds such as knocking, talking, and footsteps by recording the sounds and then computing features that can be used for classification. Each sound class (e.g., knocking) has features that enable the security system 202 to accurately identify the sound as knocking, talking, stepping, or extraneous noise. Features can be analyzed using a decision tree to classify each sound. For example, in some embodiments, a visitor can trigger an audio alarm (and thus, initiate a communication request) by knocking on a door located within hearing range of a microphone of the security system 202. In several embodiments, a visitor can trigger an audio alarm (and thus, initiate a communication request) by stepping and/or talking within hearing range of a microphone of the security system 202.
HardwareA doorbell identification code 222 can be associated with the security system 202 (e.g., a doorbell) such that the code 222 is correlated with the doorbell. The code 222 can be used as an electronic key to unlock access to the doorbell. A Network Connection Mode can comprise using the doorbell identification code 222 to verify whether a computing device 204 (shown in
In some embodiments, a sensor 226 is hidden under the cover 404 (e.g., a light filter). The sensor 226 can be a motion sensor. In several embodiments, the sensor 226 is a proximity sensor. A light 1042 (e.g., a laser system), shown in
In some embodiments, the camera assembly 208 is not configured to rotate and is not spherical. In several embodiments, the fisheye lens 210 can provide a sufficient field of view without moving the camera assembly 208. The fisheye lens 210 can be oriented directly outward from the outer housing 224 (e.g., perpendicular to an outward face of the outer housing 224) as shown in
The fisheye lens 536 can be a wide-angle lens configured to create a wider field of view than would result from a flat lens. The fisheye lens 536 can include a convex outer surface. The fisheye lens 536 can include a focal length of 2 millimeters to 16 millimeters. The fisheye lens 536 can include a horizontal field of view and/or a vertical field of view of at least 90 degrees, at least 100 degrees, at least 130 degrees, at least 160 degrees, and/or less than 190 degrees. In some embodiments, the fisheye lens 536 can include a horizontal field of view and/or a vertical field of view of at least 180 degrees. In several embodiments, the horizontal field of view is at least 30 degrees greater than the vertical field of view.
The PCB 450 can include a microphone 540, which can be mounted on a lower section of the PCB 450. In some embodiments, the PCB 450 includes an upper half that comprises the camera assembly 534, and the PCB 450 includes a lower half that comprises the microphone 540.
In some embodiments, the cover 404 (e.g., a light filter) is translucent to allow infrared (“IR”) light from IR light emitting diodes 458 (“LED”) to exit the security system 202 to illuminate visitors to enable nighttime video. In several embodiments, the cover 404 appears opaque or semi-opaque, but allows IR light to pass. In some embodiments, the cover 404 has a visible light transmission of at least 10% and/or less than 90%; at least 25% and/or less than 80%, or at least 35% and/or less than 75%. In some embodiments, the cover 404 has an IR light transmission of at least 30% and a visible light transmission of less than 90%; an IR light transmission of at least 40% and a visible light transmission of less than 80%; or an IR light transmission of at least 50% and a visible light transmission of less than 50%. In some embodiments, the cover 404 allows IR light to exit the security system but does not allow people to view into the security system in normal lighting conditions (i.e., 50 foot-candles).
Light sources, such as IR LEDs 458, can be located in an interior portion of a security system. The light sources can be oriented to within 30 degrees of the viewing orientation of the camera assembly 208 such that the light sources are configured to illuminate the camera's field of view and/or objects located in front of the camera assembly 208. The translucent or semi-translucent cover 404 can be located between the light sources and objects in front of the camera assembly 208. The cover 404 can be configured to obscure visibility into the interior portion of the security system 202. The cover 404 can be configured to enable light from the light sources to illuminate the camera's field of view and/or objects located in front of the camera assembly 208.
In some embodiments, a security system includes an outer housing and the outer housing includes a translucent or semi-translucent cover 404 configured to allow light from light sources to travel from an interior portion of the security system to an area in front of the security system (e.g., to an area outside of the security system). Light sources can be located beneath the cover 404 and can be oriented to emit light through the cover 404. In some embodiments, the cover 404 couples a camera assembly with the outer housing.
In some embodiments, a tube 454 leads from the orientation feature 400 (e.g., a hole in the outer surface of the camera assembly dome) to a microphone 452, 456 located inside of the security system 202 (e.g., on a printed circuit board). The microphone 456 can be located outside of the camera assembly on a printed circuit board. The microphone 452 can be located inside of the camera assembly (e.g., inside of the spherical assembly that houses at least a portion of the camera). The tube 454 can be configured to conduct sound and/or direct sound to a microphone 452, 456 located inside of the security system 202. The tube 454; microphones 452,456; and the orientation feature 400 are not included and/or indicated in some figures in the interest of clarity.
The lens 408 can allow light, such as IR light, to enter the security system 202 to enable an IR detector 470 to sense and/or detect the IR light. Several embodiments include the IR detector 470. The IR detector 470 can be used to determine if a visitor is near the security system 202 due to the unique IR signature and/or characteristics of people compared to non-living objects. The IR detector 470 can be a thermal or photonic IR detector. The system (e.g., 200 in
In several embodiments, the IR detector 470 is a light detector, which can be used to distinguish day (i.e., light hours) from night (i.e., dark hours). In some embodiments, day versus night is distinguished based on time rather than light. The communication system 200 can have a Day Mode and a Night Mode, wherein Night Mode reduces, alters, or precludes alerts to the user.
Pressing the doorbell button 212 can activate a switch 474, which can cause a chime inside the building to emit a sound and/or can initiate a communication request to the user. In some embodiments, pressing the doorbell button 212 can trigger the system to record a fingerprint of the visitor. The lens 408 can be large enough to enable the security system 202 to take a picture (e.g., an IR image) of the visitor's finger. In some embodiments, the fingerprint is compared against a database of fingerprints to identify the visitor and/or to classify the visitor. Visitors in a welcome class (e.g., family, a person with permission to enter) can cause a door to open (e.g., the security system can unlock the door). In some embodiments, the button 212 is a fingerprint reader that can optically scan fingerprints when visitors touch a glass imaging window.
The mounting bracket 420 can have protrusions 518 that can extend radially outward from the mounting bracket 420. The protrusions 518 can be configured to fit inside the grooves 514 as shown in the dashed box of
Referring now to
In some embodiments, the outer housing 224 includes protrusions that extend radially inward and the bracket 420 includes grooves and/or indentations that extend radially inward to capture the protrusions of the outer housing 224. In some embodiments, the outer housing 224 snaps onto the bracket 420. In several embodiments, the outer housing 224 is coupled to the bracket by threads (e.g., screws with threads, threads along the outer perimeter of the bracket).
Referring now to
Step 600 can include removing a first doorbell from a wall (e.g., the wall of a building). The first doorbell can be a traditional doorbell without a camera. Step 604 can include decoupling electrical wires (e.g., 304 in
Step 624 can include using the electrical wires to provide electrical power to a speaker, microphone, and/or camera located at least partially inside of the second doorbell. Step 628 can include using a first computing device (e.g., mobile computing device, smartphone, laptop, desktop, tablet) to connect the second doorbell to a wireless network. Step 632 can include using a motion sensor, proximity sensor, audio sensor, and/or button located at least partially inside of the second doorbell to detect at least one visitor. The visitor can be a person who approaches the second doorbell and/or rings the second doorbell.
Step 636 can include sending information regarding the visitor (e.g., the presence of the visitor, doorbell ring, video, audio) to a second computing device (e.g., a remotely located computing device), which can be the first computing device. Step 640 can include opening a means for two-way communication between the visitor and a user of the second computing device. The means for two-way communication can enable the user to talk with the visitor and/or see the visitor via a wireless network, a cellular network, and/or the Internet.
Modes of OperationSome embodiments include a Shipping Mode, which can be an ultra-low power mode (e.g., can use even less power than a Sleep Mode). Wireless communication (e.g., WiFi communication, communication module 504 in
Step 700 can include entering a Sleep Mode. In some embodiments, Sleep Mode has lower power consumption than Standby Mode and/or Alert Mode. In several embodiments, Sleep Mode turns off, powers down, and/or reduces the activity of one or more components and/or assemblies. In some embodiments, the camera is off, not recording, and/or in Low Power Mode while the system is in Sleep Mode. In some embodiments, the speaker is off, not recording, and/or in Low Power Mode while the system is in Sleep Mode. In several embodiments, the microphone is off, not recording, and/or in Low Power Mode while the system is in Sleep Mode.
Step 704 can include detecting motion, proximity, and/or noise. Step 708 can include exiting the Sleep Mode and entering a Standby Mode. Step 712 can include detecting motion, proximity, noise, and/or button contact. Step 716 can include entering an Alert Mode.
In some embodiments, thresholds necessary to exit the Sleep Mode and enter a Standby Mode are less than thresholds necessary to exit the Standby Mode and enter an Alert Mode. In several embodiments, greater motion, closer proximity, and/or louder noise are necessary to enter an Alert Mode than are necessary to exit the Sleep Mode and enter a Standby Mode. In some embodiments, button contact is necessary to enter an Alert Mode. In some embodiments, a system will exit the Sleep Mode and enter a Standby Mode upon detecting motion, detecting motion within 10 feet, or detecting motion within 20 feet. In some embodiments, a system will exit the Sleep Mode and enter a Standby Mode upon detecting sound, upon detecting sound louder than 10 decibels, upon detecting sound louder than 25 decibels, upon detecting sound louder than 50 decibels, upon detecting sound louder than 80 decibels, or upon detecting sound louder than 90 decibels. In several embodiments, Standby Mode turns on, powers up, and/or increases the activity (e.g., electrical activity, detection activity, detecting) of one or more components and/or assemblies (relative to Sleep Mode). In some embodiments, the camera is on, recording, and/or in an Intermediate Power Mode while the system is in Standby Mode. In some embodiments of Standby Mode, the camera is configured to quickly start recording, but is not recording. In several embodiments of Standby Mode, the microphone is on, in Detection Mode, and/or detecting sounds to help the system determine if it should change to Alert Mode.
In several embodiments, the system takes a picture when the system enters Standby Mode. In some embodiments, the system takes a picture each time a visitor is detected even if the visitor does not ring the doorbell.
In some embodiments of Alert Mode, the system has determined that a visitor is present and/or attempting to contact a person in the building (e.g., the visitor is ringing a doorbell, waiting by the doorbell, knocking on a door). Some embodiments go into Alert Mode even if the visitor is not trying to contact a person in the building (e.g., the visitor could be a person trying to break into the building). The system can be configured to enter Alert Mode if the system detects a visitor within 20 feet, within 10 feet, or within five feet. The system can be configured to enter Alert Mode if the system detects a sound greater than 50 decibels, 80 decibels, and/or 90 decibels. The system can be configured to enter Alert Mode if a visitor presses a doorbell button and/or triggers a proximity sensor.
The system can be configured to block or allow a communication request (as shown in Steps 720 and 724). The user might want to block communication requests because she is busy or asleep. The user can configure the system to autonomously and/or automatically block communication requests (e.g., a visitor ringing the doorbell would not initiate a communication request to the user). In several embodiments, the system that blocks or allows a communication request can be the doorbell (e.g., 202 in
If the communication request is allowed, the system can send the communication request via Simultaneous Mode as illustrated in Step 728. Simultaneous Mode can include sending the communication request simultaneously to at least two computing devices (e.g., computing devices 204 in
Step 732 can include assigning priorities to remote computing devices. In some embodiments, a computing device with a higher priority will receive a communication request before a computing device with a lower priority. In several embodiments, a computing device and/or user with higher priority will have privileges that are not available to a computing device and/or user with a lower priority. These privileges can include administrative abilities and the ability to alter settings.
Step 736 can include sending the communication request to a first remote computing device with the first highest priority. Step 740 can include determining whether to send the communication request to a second computing device with the second highest priority. Step 744 can include sending the communication request to the second remote computing device with the second highest priority.
Step 748 can include determining whether to enter an Autonomous Answer Mode. Autonomous Answer Mode can include methods of the security system, server, and/or remote computing device interacting with the visitor without user action. For example, if a user does not respond to a communication request, the system can play a recorded message, provide pre-recorded instructions from the user to the visitor, and/or request the visitor to leave a message for the user (e.g., an audio message, a video message).
A notification regarding the presence of a visitor can be sent (e.g., simultaneously) to multiple remote computing devices that have been authorized to communicate with a security system 202 (shown in
In some embodiments, the Autonomous Answer Mode includes sending the communication request to an answering service such as a call center. An operator at the answering service can speak with the visitor, provide instructions to the visitor, and/or take a message from the visitor.
In several embodiments, the user can select a pre-recorded message for the security system to play for the visitor. The security system can play the pre-recorded message for the visitor by emitting the audio message from the speaker. Once the visitor has responded to the pre-recorded message, the user can initiate two-way communication with the visitor. In one embodiment, the pre-recorded message asks the visitor to identify herself and/or to describe her reason for being at the building. The user can listen to the visitor's response before opening two-way communication with the visitor and/or letting the visitor know that the user is listening to the visitor and/or watching the visitor.
Methods can include using a doorbell that is configurable to wirelessly communicate with a remotely located computing device, such as a cellular telephone, laptop, or tablet. Some embodiments include obtaining a doorbell that comprises a speaker, a microphone, a camera, and a button. The button can be configurable to enable a visitor to sound a chime (e.g., a speaker or another sound emission device located inside of a building). Several embodiments include shipping the doorbell in a Shipping Mode that consumes power. In the Shipping Mode, the doorbell can detect whether the doorbell is electrically coupled to an external power source (e.g., the electricity of a building to which the doorbell is attached). Methods can then include entering a Network Connection Mode in response to detecting electricity from the external power source. The Shipping Mode can consume less power than the Network Connection Mode. The Network Connection Mode can comprise detecting a wireless network (e.g., a wireless network emitted by a router). Several methods include detecting a first indication of the visitor using the doorbell.
Methods for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device can include obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button. The button can be configured to enable a visitor to sound a chime. Some methods include shipping the doorbell in a Shipping Mode that consumes power. During the Shipping Mode, the doorbell can be configured to detect whether the doorbell is electrically coupled to an external power source. Methods can include entering a Setup Mode in response to detecting electricity from the external power source. The Shipping Mode can consume less power than the Setup Mode. The Setup Mode can increase electrical activities of the doorbell relative to the Shipping Mode. Some embodiments include increasing the electrical activities of the communication module, circuit board, battery, microphone, speaker, and/or camera. Some embodiments include detecting a first indication of the visitor. The first indication can be detected using the doorbell.
The remotely located computing device can be a cellular telephone having a display screen. Methods can comprise sending an image of the visitor from the doorbell to the cellular telephone and displaying the image of the visitor on the display screen of the cellular telephone.
Some embodiments comprise detecting a second indication of the visitor, wherein the second indication is detected using the doorbell. Several methods comprise sending a wireless notification to the remotely located computing device regarding a presence of the visitor in response to detecting both the first indication and the second indication.
In some embodiments, detecting the first indication comprises detecting a signal indicative of the visitor above a first threshold and detecting the second indication comprises detecting the signal indicative of the visitor above a second threshold. In some embodiments, the second threshold is greater than the first threshold. The doorbell can comprise a first sensor. The signal indicative of the visitor can be sensed by the first sensor of the doorbell.
In several embodiments, the first sensor of the doorbell comprises a motion sensor and the signal is related to motion. The camera, the speaker, and/or the microphone can be disabled during the Setup Mode.
The first sensor of the doorbell can comprise a proximity sensor. The signal can be related to proximity of the visitor.
The first sensor of the doorbell can comprise a microphone. The signal can be related to sound. In some embodiments, detecting the second indication comprises detecting a knocking sound.
In several embodiments, a doorbell comprises a first sensor and a second sensor. The first indication can be detected using the first sensor and the second indication can be detected using the second sensor. The first sensor can be a different type of sensor than the second sensor.
In some embodiments, the first sensor of the doorbell comprises a motion sensor. The second sensor can comprise the microphone. Methods can comprise using the microphone to detect a knocking sound to verify the presence of the visitor detected by the motion sensor.
In several embodiments, the first sensor of the doorbell can comprise an infrared detector and the second sensor can comprise the camera.
In some embodiments, the doorbell comprises a battery. The Setup Mode can comprise automatically charging the battery in response to detecting the electricity from the external power source.
In some embodiments, the Setup Mode comprises automatically replenishing at least a portion of electrical energy consumed from the battery by the doorbell during the Shipping Mode. Methods can comprise precluding wireless communication by the doorbell until after replenishing the portion of the electrical energy and then entering a Network Connection Mode in response to pressing the button for at least eight seconds. Pressing the button for at least eight seconds can help the doorbell distinguish between when the user just wants to sound the chime and when the user wants the doorbell to enter the Network Connection Mode. The Network Connection Mode can comprise detecting a wireless network.
In several embodiments, the doorbell comprises a battery and the Setup Mode comprises using the electricity from the external power source to charge the battery before enabling communication between the doorbell and the remotely located computing device.
In some embodiments, the Setup Mode comprises a Network Connection Mode, and the method comprises entering the Network Connection Mode in response to pressing the button for at least eight seconds. The Network Connection Mode can comprise detecting a wireless network and inputting a doorbell identification code into the remotely located computing device. In some embodiments, inputting the doorbell identification code includes typing letters, numbers, words, and/or symbols on the remotely located computing device. Inputting the doorbell identification code can include speaking letters, numbers, words, and/or symbols such that the remotely located computing device hears the information and captures the information.
The doorbell identification code can be associated with the doorbell such that the code is correlated with at least one doorbell. The code can be used as an electronic key to unlock access to the doorbell. The Network Connection Mode can comprise using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell. For example, the code can prevent an unauthorized computing device from hacking into the doorbell and receiving visitor alerts from the doorbell.
In several embodiments, the Network Connection Mode comprises enabling communication from the remotely located computing device to the doorbell in response to pressing the button for at least eight seconds and inputting the doorbell identification code into the remotely located computing device. Pressing the button for at least eight seconds can help the doorbell distinguish between when the user just wants to sound the chime and when the user wants to enable communication from the remotely located computing device to the doorbell.
In some embodiments, the remotely located computing device is connected to the wireless network such that the remotely located computing device is configured to transmit data via the wireless network. The wireless network can comprise a name and a password. The name can identify the wireless network to entities searching for wireless networks. The password can enable an electronic device to connect to the wireless network. The wireless network can enable electronic devices to connect to the Internet.
The communication from the remotely located computing device to the doorbell can comprise the name and the password of the wireless network to which the remotely located computing device is connected. The Network Connection Mode can comprise connecting the doorbell to the wireless network to which the remotely located computing device is connected such that the doorbell can send an alert regarding a presence of the visitor to the remotely located computing device via the wireless network.
Some embodiments include using the doorbell to detect multiple wireless networks. The wireless network to which the remotely located computing device is connected can be one of the multiple wireless networks. Methods can comprise automatically selecting the wireless network to which the remotely located computing device is connected. For example, the system can choose which wireless network to connect the doorbell without asking a person which wireless network the system should choose.
In some embodiments, a Setup Mode comprises a Network Connection Mode. Methods can comprise entering the Network Connection Mode in response to pressing the button for at least eight seconds. The Network Connection Mode can comprise detecting a first wireless network having a name and a password. The Network Connection Mode can comprise inputting a doorbell identification code into the remotely located computing device. The doorbell identification code can be associated with the doorbell. The Network Connection Mode can comprise using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell. The Network Connection Mode can comprise the remotely located computing device creating a second wireless network (e.g., that emanates from the remotely located computing device). The Network Connection Mode can comprise transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network. Methods can comprise the remotely located computing device directly communicating with the doorbell via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network. For example, the wireless communication from the remotely located computing device can travel through the air directly to the doorbell. The wireless communication from the remotely located computing device can travel indirectly to the doorbell via a third electronic device such as a server.
A remotely located computing device can be located near a doorbell. For example, during setup some users will hold a cellular phone within a couple of feet from the doorbell to input a doorbell identification code into the cellular phone to verify that the phone is authorized to communicate with the doorbell and to help the doorbell connect to a wireless network. The phone is located remotely from the doorbell because it is not physically attached to the doorbell.
Several methods include using a doorbell that is configurable to wirelessly communicate with a remotely located computing device. Methods can include shipping the doorbell in a Shipping Mode that consumes power. During some Shipping Mode embodiments, the doorbell is configured to detect whether the doorbell is electrically coupled to an external power source. Several embodiments include entering a Standby Mode in response to detecting electricity from the external power source. The Shipping Mode can consume less power than the Standby Mode. The speaker and the microphone can be disabled during the Standby Mode.
Some embodiments include exiting the Standby Mode and entering an Alert Mode in response to detecting a first indication of the visitor. The first indication can be detected using the doorbell. Several embodiments include sending a wireless notification to the remotely located computing device regarding a presence of the visitor in response to entering the Alert Mode.
Some embodiments comprise detecting multiple wireless networks and automatically selecting a first wireless network for communicating between the doorbell and the remotely located computing device. Prior to the automatic selection, the remotely located computing device can be connected to the first wireless network. Methods can further comprise authorizing the doorbell to communicate with the remotely located computing device by pressing the button for at least eight seconds and inputting a doorbell identification code into the remotely located computing device. The doorbell identification code can be associated with the doorbell. The first wireless network can comprise a name and a password. Methods can further comprise wirelessly communicating the name and the password from the remotely located computing device to the doorbell.
Several methods include entering a Network Connection Mode prior to sending the wireless notification. The Network Connection Mode can comprise detecting a first wireless network having a name and a password. The Network Connection Mode can comprise inputting a doorbell identification code into the remotely located computing device. The doorbell identification code can be associated with the doorbell. The Network Connection Mode can further comprise using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell. The Network Connection Mode can comprise the remotely located computing device creating a second wireless network. The Network Connection Mode can comprise transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network. Methods can comprise the doorbell directly communicating with the remotely located computing device via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
The doorbell identification code 222 can be any number of characters, such as 9 characters or at least 24 characters in length. Therefore, entering the doorbell's identification code 222 via typing can be cumbersome and prone to user error. Each security system 202 (or any other type of smart device) can come with a barcode 1035 (e.g., a matrix barcode such as a Quick Response Code).
The barcode 1035 can be packaged with the security system 202. For example, the barcode 1035 can be located on a box or inside of a box that contains the security system 202 such that a person who buys the security system 202 will have access to the barcode 1035 when she is ready to install the security system 202.
The barcode 1035 can be on a sticker on the security system 202 (e.g., on the backside of the security system 278, as shown in
The remote computing device 204 can be configured to receive the barcode 1035. In some embodiments the remote computing device 204 can prompt a user to retrieve the barcode 1035 through various display screens, as shown in
Upon scanning or taking a picture of the barcode 1035, the activation code 222, which can be embedded within the barcode 1035, can be received by the remote computing device 204 and can thereby be displayed on the display screen as shown in
In some embodiments the remote computing device 204 must be authorized before the security system 202 can communicate with the remote computing device 204. In some embodiments, this authorization is initiated by pressing the button 212 of the security system 202 for a predetermined amount of time. The predetermined amount of time may be one second, two seconds, three seconds, eight seconds, at least twenty seconds, and the like. Generally, it should be appreciated that the predetermined amount of time may be any amount of time.
In some embodiments, the barcode or other image configured to be scanned has limited data transmission ability. For example, some barcodes only communicate a number. In some embodiments, the remote computing device contacts a remote computer (e.g., a server) and provides information from the barcode to the remote computer. Then, the remote computer can use the information from the barcode to authorize providing more detailed information to the remote computing device. In some embodiments, the remote computer uses a database to find information associated with the information from the barcode. In several embodiments, the remote computer can pass the more detailed information to the remote computing device in response to the remote computing device providing data from the barcode or other image located on the security system (e.g., a doorbell).
In several embodiments, the barcode or other image on the security system can replace the doorbell identification code 222. For example the barcode or other image can be used to determine that the remote computing device is authorized to setup and/or control features, functions, and/or communications of the security system.
In some embodiments, the barcode communicates the doorbell identification code 222 to the remote computing device. The remote computing device can use its camera to take a picture of the barcode. The remote computing device can then analyze the picture to “read” the barcode.
In some cases, barcodes include information helpful to connect security systems and/or remote computing devices to Wi-Fi networks. For example, network passwords and names can be embedded in images (e.g., barcodes).
Network CongestionIn some cases, communication networks might be unable to transmit data at sufficient rates between a security system 202 and a remote computing device 204. Network congestion can occur when a link or node is carrying too much data, which can result in the deterioration of the quality of communication services. Several embodiments include methods to address network congestion and low data transmission rates.
Several embodiments include prioritizing audio data over image data (e.g., video data), which is included in
Some embodiments include making the priority information for a picture (e.g., a still image) of the visitor higher than the priority information for a video of the visitor. Some embodiments include making the priority information for audio of the visitor higher than the priority information for the picture of the visitor and/or higher than the priority information for the video of the visitor. Some embodiments include making the priority information for audio of the user (e.g., the user of the computing device 204 in
Step 808 can include reducing the resolution of images transmitted to a computing device. Step 812 can include reducing the number of frames per second transmitted to the computing device. Step 816 can include switching from a Video Mode to a Snapshot Mode. The Snapshot Mode includes sending at least one still image (not more than every 0.3 seconds). Step 820 can include switching from a Picture Mode (e.g., the Video Mode, the Snapshot Mode) to an Audio Mode. In the Audio Mode, no videos or pictures are sent to the computing device (e.g., 204 in
Referring now to
In several embodiments, the image 252 is a portion of the image captured by the camera assembly 208. The image captured by the camera assembly 208 is the camera's field of view (“FOV”) 840 (as shown in
Referring now to
In some embodiments, the user can select characteristics of the portion of the camera's FOV 840 that is shown on the computing device 204. These characteristics can include a Face Mode, wherein the displayed portion 848a,b includes less than 90% of the FOV 840 but at least 40% of the displayed portion 848a,b shows the visitor's head, at least 30% of the displayed portion 848a,b shows the visitor's head, or at least 15% of the displayed portion 848a,b shows the visitor's head. These characteristics can include a Body Mode wherein the image 252 includes less than the entire FOV 840 or less than 80% of the FOV 840 but includes at least 80% of the body of the visitor, at least 50% of the body of the visitor, or at least 30% of the body of the visitor. These characteristics can include a Group Mode wherein the image 252 includes less than the entire FOV 840 or less than 80% of the FOV 840 but includes at least a portion of each of two visitors (if present), at least a portion of each of three visitors (if present), at least at portion of the majority of each of the visitors, at least 30% of all of the visitors, or at least the heads of all of the visitors. Once the user sets Face Mode, Body Mode, or Group Mode, the system automatically shows the portion of the FOV 840 described above in the image 252 without the user having to manually zoom.
Communication systems can include additional devices, can work in conjunction with additional devices, and/or can communicate with additional devices. In some embodiments, the additional devices (e.g., chimes as described previously) are part of the communication system. In some embodiments, the additional devices are not part of the communication system.
Referring now to
Some embodiments include a speaker 914 located inside of the building. The user's voice can be emitted from the speaker 914 located inside of the building to make the visitor believe the user is speaking from inside the building (even when the user is located far away from the building and speaking into a remote computing device such as a smartphone). The security system 202 can transmit the user's audio information to the speaker 914 located inside of the building via wireless communication means such as Bluetooth.
In some embodiments, the security system 202 wirelessly communicates with a chime 910 located inside of the building. In some embodiments, the security system sends information or signals to a chime 910 via wires.
In several embodiments, the security system 202 wirelessly communicates with a garage door opener 926, which can be located inside of the building and configured to open a garage door of the building. The user can instruct the garage door to open via a user interface on a remote computing device 204a. The remote computing device 204a can communicate with the security system 202, which can wirelessly communicate the command to the garage door and/or garage door opener 926.
In several embodiments, the security system 202 communicates with a door lock 930 (e.g., a deadbolt). The user can instruct the door lock 930 to open via a user interface on a remote computing device 204a. The remote computing device 204a can communicate with the security system 202, which can communicate the command to the door lock 930. In some embodiments, the user can “buzz” someone into an apartment complex via an app on a computing device such as a smartphone.
In several embodiments, the security system 202 communicates with a gate opener 934 (e.g., an electric or robotic gate opener configured to unlock and/or open a gate, such as a gate to an apartment complex or a gate that blocks an entrance to a driveway).
As illustrated in
In some embodiments, the first remote computing device 204a can communicate information regarding the security system 202 with the second remote computing device 204b. The information regarding the security system 202 communicated between remote computing devices can be any of the information described herein.
In several embodiments, the first remote computing device 204a forwards information from the security system 202 to a third remote computing device 204c and/or to an alert device 938. The alert device 938 can be any device configured to alert a user or person. In some embodiments, the alert device 938 is a watch that vibrates or displays a message to a user. In some embodiments, the alert device 938 is an alarm system.
In some embodiments, the software and/or user interface of a first computing device 204a allows the user to forward the communication request to a second computing device 204b and/or to a third computing device 204c. For example, a user might see that the visitor is a friend of the user's child. The user can then forward the communication request to the child's computing device with or without answering the communication request. In some embodiments, once a communication request is forwarded to another computing device, the security system plays a pre-recorded message, which can be a message that instructs the visitor to standby, wait, and/or have patience while the communication request is forwarded to another user.
Some embodiments include one security system 202 that can communicate with many computing devices. For example, one security system 202 can be placed at the entrance of an apartment complex that includes 100 individual homes. The security system 202 can be configured to properly route a communication request to the appropriate user. Some multi-home buildings include a call box near a central entryway. The security system 202 can listen to the sounds (e.g., tones) a visitor types in the call box to identify the home (and thus, the user) the visitor seeks. The security system 202 can listen to the user name the visitor requests (e.g., states) to identify the user the visitor seeks. The security system 202 can use a microphone and/or sound recognition software listen and recognize sounds. In some embodiments, the security system 202 identifies that a visitor is making a communication request by listening for a sound (e.g., a buzz of an intercom system). The security system 202 can then respond appropriately.
The security system 950 can enable two-way audio. A microphone inside the security system 950 can detect a visitor's sounds and a speaker in a computing device can deliver the visitor's sounds to the user. A microphone in the computing device can detect a user's sounds and a speaker in the security system 950 can deliver the user's sounds. The security system 950 can enable two-way video. A video camera of the security system 950 can detect images of the visitor and a screen of the computing device can display the images of the visitor. A video camera of the computing device can detect images of the user and a screen 970 of the security system 950 can display the images of the user. The screen 970 can be a light emitting diode display, a liquid crystal display, a plasma display, or any other display that can show images.
Some security system embodiments allow users and/or visitors to enter information (e.g., a password) with the buttons 962 to cause certain actions and/or enable certain features (e.g., unlock a door, open a garage, open a gate, turn an alarm system off, turn an alarm system on, call a particular person, enter a network password, enter a network name, enter any of the modes described herein, exit any of the modes described herein).
Select System EmbodimentsThe processor 2502 described herein can be hardware circuitry or at least one computer system. As used used herein “microprocessor” and “processor” can refer to circuitry, hardware circuitry, a computer, a computer system, and/or one or more computer systems. As used herein, “module” can refer to a portion of a security system, a portion of a computer, hardware circuitry, and/or software.
In some implementations, the memory 2504 may include different types of memory, such as static random access memory (“SRAM”), dynamic random access memory (“DRAM”) or read only memory (“ROM”). Turning to the contents of the memory 2504 in more detail, the memory 2504 may include an operating system 2508 and at least one application program or service for implementing the features disclosed herein including at least a functionality module 2510. The functionality module 2510 can refer to software and/or a computer. The memory 2504 may further include additional storage 2512 that is capable of storing recorded data.
The remote computing devices 2608 may be any type of computing device such as, but not limited to, a mobile phone, a smart phone, a personal digital assistant (“PDA”), a laptop computer, a desktop computer, a server computer, a thin-client device, a tablet PC, etc. The remote computing device 2608 may include at least one device processor 2610 capable of processing data recorded by the security system 202. Data may be stored in the remote computing device's 2608 device memory 2612 or it may be streamed over the network 2606. Where the data is streamed over the network 2606, it may be displayed using a browser application 2614. The device processor 2610 described herein can be hardware circuitry.
In some embodiments, the networks 2606 may include any one or a combination of many different types of networks, such as cable networks, the Internet, wireless networks, cellular networks, and other private and/or public networks. While the illustrated embodiment represents the users accessing the browser application 2614 over the networks 2606, the described techniques may equally apply in instances where the users interact with a service provider computer 2604 via the remote computing device 2608 over a landline phone, via a kiosk, or in any other manner. It is also noted that the described techniques may apply in other client/server arrangements (e.g., set-top boxes, etc.), as well as in non-client/server arrangements (e.g., locally stored applications, peer-to-peer systems, etc.).
As described briefly above, the browser application 2614 may allow the users to interact with a service provider computer 2604, such as to store, access, and/or manage data, develop and/or deploy computer applications, and/or host web content. The at least one service provider computer 2604, perhaps arranged in a cluster of servers or as a server farm, may host the browser application 2614. These servers may be configured to host a website (or combination of websites) viewable via the remote computing device 2608 or a web browser accessible by a user. Other server architectures may also be used to host the browser application 2614. The browser application 2614 may be capable of handling requests from many users and serving, in response, various user interfaces that can be rendered at the remote computing device 2608 such as, but not limited to, a web site. The browser application 2614 can be any type of website that supports user interaction, including social networking sites, electronic retailers, informational sites, blog sites, search engine sites, news and entertainment sites, and so forth. As discussed above, the described techniques can similarly be implemented outside of the browser application 2614, such as with other applications running on the remote computing device.
The service provider computers 2604 may be any type of computing device such as, but not limited to, a mobile phone, a smart phone, a personal digital assistant (“PDA”), a laptop computer, a desktop computer, a server computer, a thin-client device, a tablet PC, etc. The service provider computers 2604 may be the server 206 depicted in
In one illustrative configuration, the service provider computers 2604 may include at least one memory 2616 and at least one processing unit (or processor(s)) 2618. The processor(s) 2618 may be implemented as appropriate in hardware, computer-executable instructions, firmware or combinations thereof. Computer-executable instructions or firmware implementations of the processor(s) 2618 may include computer-executable or machine-executable instructions written in any suitable programming language to perform the various functions described. The processor 2618 described herein can be hardware circuitry.
The memory 2616 may store program instructions that are loadable and executable on the processor(s) 2618, as well as data generated during the execution of these programs. Depending on the configuration and type of service provider computers 2604, the memory 2616 may be volatile, such as random access memory (“RAM”), and/or non-volatile, such as read-only memory (“ROM”) or flash memory. The service provider computers 2604 may also include additional storage 2620, such as either removable storage or non-removable storage including, but not limited to, magnetic storage, optical disks, and/or tape storage. The disk drives and their associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data for the computing devices. In some implementations, the memory 2616 may include multiple different types of memory, such as static random access memory (“SRAM”), dynamic random access memory (“DRAM”) or ROM. Turning to the contents of the memory 2616 in more detail, the memory 2616 may include an operating system 2622 and at least one application program or service for implementing the features disclosed herein including at least one operating module 2624. The memory 2616 may further include a database 2626 with information related to contacts or people. The database 2626 may also be a third-party database. One illustrative example of this element is a social networking website database or a criminal database. The operating module 2624 can be a computer, hardware circuitry, and/or software.
The memory 2616 and the additional storage 2620, both removable and non-removable, are examples of computer-readable storage media. For example, computer-readable storage media may include volatile or non-volatile, removable or non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. As used herein, modules may refer to programming modules executed by computing systems (e.g., processors) that are part of the remote computing device 2608 or the service provider computers 2604. The service provider computers 2604 may also contain communications connection(s) 2628 that allow the service provider computers 2604 to communicate with a stored database, another computing device or server, user terminals, and/or other devices on the networks 2606. The service provider computers 2604 may also include input/output (“I/O”) device(s) and/or ports 2630, such as for enabling connection with a keyboard, a mouse, a pen, a voice input device, a touch input device, a display, speakers, a printer, etc.
Turning to the contents of the memory 2616 in more detail, the memory 2616 may include an operating system 2622, a database containing contact data 2626 and the at least one application program or service for implementing the features disclosed herein including an operating module 2626.
Some or all aspects of the operating module 2624 may be implemented on a remote computing device 2608, such as in a mobile application. There are many methods of implementing the following features. For example, the following features could be implemented by installing a mobile application on a remote computing device 2608 or by accessing a service provider 2604 via a web browser application 2614 on a remote computing device 2608. The operating module 2624 may be configured to process data received from at least one remote computing device 2608 and/or the security system 202. The operating module 2624 may also be configured to convey messages between the remote computing device 2608 and the security system 202. Additionally, the operating module 2624 may provide a user of the remote computing device 2608 with the ability to control settings or functions of the security system 202.
In some embodiments, the operating module 2624 may have facial recognition functionality capable of identifying a potential visitor. There are multiple methods of implementing such a system. For example, some social networking sites, such as Facebook.com, have facial recognition functionality. It is envisioned that the operating module 2624 may communicate with such a site to receive a visitor's identity. Alternatively, the service provider 2604 may provide the functionality itself based on contacts stored in a database 2626. Facial recognition may also be used to determine if a human is present. For example, if a motion detector on the security system 202 detects movement, the operating module 2624 may use facial recognition to determine whether a person is present before notifying a remote computing device 2608.
The operating module 2624 may be configured to communicate and interact with the functionality module 2510 of the security system 202, as well as the remote computing device 2608. This communication and interaction can be achieved in a variety of ways. It is envisioned that the operating module 2624 will be able to provide a user of the remote computing device 2608 with the ability to perform several types of functions in conjunction with the security system 202.
Temperature RegulationReferring now to
While protecting the security system 202 from cold weather can be important in some embodiments, protecting visitors from excessive heat can also be important in some embodiments. Excessive heat could burn visitors as they “ring” the doorbell (e.g., press the doorbell button 212 shown in
The security system 202 can include a thermometer 512 to enable the system to determine the temperature inside a portion of the security system 202 and/or outside of the security system 202. In some embodiments, a remote computing device, a server, a service provider, and/or the security system 202 is the portion of the system that determines the temperature based on data from the thermometer 512.
In some embodiments, heating elements 508 generate heat by passing electric current through a conductive path with high resistance. This process can convert electricity to heat. The conductive path with relatively high resistance can be straight, coiled, or oriented in a curved path. Heating elements can use wire, ribbon, or strips made from 80% nickel and 20% chromium. Some heating elements use iron-chromium-aluminum alloys or copper-nickel alloys. Some heating elements use a conductive path made from ceramic such as molybdenum disilicide, molybdenum silicide, or molybdenum disilicide doped with aluminum. Some heating elements use a conductive path made from PCT ceramic with a positive thermal coefficient of resistance. Some heating elements use screen printed metal and/or ceramic tracks deposited on ceramic insulated metal plates.
In some embodiments, the heating element 508 produces heat when a temperature inside of the security system 202 falls below a first threshold. In some embodiments, the first threshold that causes the heating element 508 to produce heat is less than 50 degrees Fahrenheit (“F.”) and/or greater than negative 20 degrees F.; less than 35 degrees F. and/or greater than negative 10 degrees F.; less than 32 degrees F. and/or greater than 0 degrees F.; or less than 10 degrees F. In some embodiments, the heating element 508 stops producing heat when the temperature inside of the security system 202 rises above a second threshold. In several embodiments, the second threshold that causes the heating element 508 to stop producing heat is less than 50 degrees F. and/or greater than negative 20 degrees F.; less than 35 degrees F. and/or greater than negative 10 degrees F.; less than 32 degrees F. and/or greater than 0 degrees F.; or less than 10 degrees F.
In some embodiments, the first threshold is equal to the second threshold, although in several embodiments, the first threshold is not equal to the second threshold. In some embodiments, the second threshold is at least 5 degrees F., at least 10 degrees F., or at least 15 degrees F. greater than the first threshold. In an example embodiment, the heating element 508 starts generating heat when the temperature inside of the security system 202 falls below 35 degrees F. and the heating element 508 continues to generate heat until the temperature inside of the security system 202 rises above 45 degrees F.
Referring now to
Thus, some embodiments including collecting data indicative of temperature using the IR detector 470 and/or the thermometer 512; analyzing the data to determine whether to start generating heat (e.g., when a temperature falls below a threshold); generating heat inside a portion of a security system (e.g., doorbell) by running electrical current through a heating element; collecting data indicative of temperature using the IR detector 470 and/or thermometer 512; analyzing the data to determine whether to stop generating heat; and/or stopping the flow of electrical current to a heating element (e.g., when a temperature rises above a threshold).
Some heating embodiments include power management methods. In some embodiments, the first and second thresholds are lower when the security system 202 is relying on internal power (e.g., from a battery 462) than when the security system 202 is relying on external power (e.g., from a building's electrical system). In some embodiments, the first threshold and/or the second threshold are at least 10 degrees F. lower, at least 20 degrees F. lower, or at least 30 degrees F. lower when the security system 202 is relying on internal power than when the security system 202 is relying on external power. In some embodiments, the security system 202 is configured to provide heat via the heating element 508 when the security system 202 has access to external power and when a temperature (inside or outside of the security system 202) falls below a threshold. In some embodiments, the security system 202 is configured to not provide heat via the heating element 508 when the security system does not have access to external power (e.g., to conserve battery power).
Silent ModesVarious embodiments include many different means of alerting users and visitors. In some embodiments, certain means of alerting users and/or visitors are silenced based on settings selected by a user (e.g., an administrator, the user of the primary computing device). Referring now to
In some embodiments of Silent Mode, pressing the doorbell button 212 will not send a signal (e.g., from the security system 202) to a chime located inside the building. As a result, the chime will not emit a sound. In some embodiments, the chime is a speaker (such as a speaker made by Bose Corporation) located inside of the building, which can be a home, office, warehouse, or other structure. For example, a visitor pressing the doorbell button 212 could cause the computing device 204 to notify the user, but would not cause a sound (e.g., a chime) to be emitted inside and/or near the building. In several embodiments, the security system 202 is configured to emit a sound even when the chime (e.g., speaker) located inside of the building is silenced. This configuration can notify the visitor that the security system 202 has detected the communication request of the visitor without disturbing people inside of the building.
In several embodiments, the security system 202 is silenced such that pressing the doorbell button 212 will not cause the security system 202 to emit a sound from the security system 202 (e.g., the speaker 488 in
In some embodiments, the remote computing devices 204 are silenced such that they do not emit a sound to notify users of the remote computing devices 204. In several embodiments, the remote computing devices 204 provide no real-time audio alert, no real-time alert, or no real-time notification to users but store information (e.g., pictures of the visitor, videos of the visitor, sound from the visitors) for later review by the users of the remote computing devices 204. As used herein, “real-time alert” refers to an alert provided to a user while the visitor is located by the security system 202.
A user interface can enable users to select the types of alerts provided by the computing devices 204. Example types of alerts include sounds, images, and haptic notifications (e.g., vibrations).
Emergency ResponsesIn some embodiments, the operating module 2624 and/or the remote computing device 2608 may be configured to provide emergency responses, behaviors, and functions. The user of a remote computing device 2608 may be provided with the ability to dial an emergency number while still in communication with the security system 202 and/or without exiting the application software used to control the security system 202. For example, a user of the remote computing device 2608 may use the security system 202 to identify a threatening individual at the entryway to his residence. The user may then be provided with the ability to dial 911 without disconnecting communication with the security system 202, which can allow the user to continue to observe the threatening individual (e.g., a potentially harmful or destructive visitor).
Several embodiments reduce the likelihood of inadvertently selecting the emergency button 2816. In one embodiment, the emergency button 2816 must be continuously selected (e.g., pressed or contacted) for more than a threshold amount of time (e.g., at least 2 seconds, at least 3 seconds, at least 5 seconds) before the system will trigger an emergency response (e.g., notify emergency personnel or another emergency contact person). In another embodiment, the user must select the emergency button 2816 and then confirm the emergency selection and/or the presence of an emergency (e.g., by pressing a confirmation button) before the system will trigger an emergency response (e.g., notify emergency personnel or another emergency contact person). In some embodiments, the system will notify the user that the system will call emergency response personnel (e.g., will call 911) unless the user cancels the request (e.g., within a particular timeframe such as within 5 seconds or within 10 seconds). The emergency response can be that the system calls 911, provides location information to emergency response personnel, and/or provides circumstantial information to emergency response personnel (e.g., the nature of the emergency, the identity of the user).
In several embodiments, when a user indicates there is an emergency (e.g., by pressing the emergency button 2816), the security system takes a picture or a video (e.g., of the visitor). The picture or video taken in response to the user indicating there is an emergency can be stored on a server 206, on a computing device 204 (e.g., the computing device that the user utilizes to indicate there is an emergency or another computing device), and/or on the security system 202 (shown in
The user can indicate there is an emergency by any of the means described herein including by pressing a button and/or by making a noise indicative of an emergency (e.g., screaming). Referring now to
Some embodiments include detecting the presence of a visitor; sending an image or video of the visitor to a remote computing device; displaying the image or video of the visitor on a display of the remote computing device; detecting an emergency indicator (e.g., detecting a user indicating there is an emergency via the remote computing device); taking a picture (or recording a video) of the visitor in response to the emergency indicator; saving the picture or video of the visitor that was taken in response to the emergency indicator; and/or sending the picture or video taken in response to the emergency indicator to a third party (e.g., the police, a central monitoring company, monitoring personnel, security personnel, a remote server, a person located remotely from the user and the visitor).
In some embodiments, the system enables the user to allow the visitor to hear the emergency response personnel (e.g., the 911 operator) to scare the visitor away (e.g., the call to the emergency personnel is emitted through a speaker of the security system). As soon as the user presses the emergency button 2816, the security system 202 can emit a sound, which can be an alert sound such as a siren sound.
In several embodiments, the user can hear the visitor and can hear a contact person of the emergency response personnel (e.g., the 911 operator). In some embodiments, the user can hear a contact person of the emergency response personnel and can see the visitor, but the visitor cannot hear the contact person of the emergency response personnel.
In some embodiments, the software application of the communication system provides information regarding the emergency to the emergency personnel. For example, the communication system can communicate at least some of the following information to the emergency personnel: the address of the security system, the name of the user, information regarding the unwanted visitor, a video of the visitor, a picture of the visitor, audio of the visitor, and audio of the user.
In some embodiments, the operating module 2624 and/or the remote computing device 2608 may be configured to contact emergency personnel if the remote computing device 2608 is shaken, if several keys or buttons are pressed, or if the remote computing device 2608 detects noises indicative of potential panic or harm (e.g., screams). In several embodiments, the communication system will enter a Potential Emergency Mode if the communication system determines there is a potential emergency. The communication system can determine there is a potential emergency by the security system 202 and/or the computing device 2608 detecting screams, loud noises, breaking glass, and/or tampering with the security system 202 (e.g., removed from building). In some embodiments, the computing device 2608 will call emergency response personnel (e.g., the police) if the user does not intervene within a predetermined time period. The predetermined time period can be at least 3 seconds and/or less than 60 seconds or at least 10 seconds and/or less than 120 seconds. The user can intervene by instructing the computing device 2608 not to call emergency response personnel (e.g., by selecting a button on a user interface to preclude the call).
In some embodiments, the operating module 2624 and/or the security system 202 may be configured to contact emergency personnel automatically. For example, a user may have a restraining order or a no-contact order against a particular visitor. The operating module 2624 may be configured to identify a potential visitor as the particular individual (such as through facial recognition or fingerprint matching) and send an alert to law enforcement. In some embodiments, the operating module 2624 may send a notification to at least one remote computing device 2608 with the option to notify law enforcement.
In some embodiments, the operating module 2624 and/or the security system 202 may be configured to contact law enforcement if someone other than a resident attempts to use the entryway. For example, the security system 202 may be configured to detect that an entry attempt has been made, such as a deadbolt has been released and/or that a door has been opened. In this embodiment, the operating module 2624 may be configured to send a notification to law enforcement and/or a remote computing device 2608 if the individual is not identified as being granted access. In some embodiments, a user may be able to indicate to the operating module 2624 that he is away from the business or residence. In this embodiment, the operating module 2624 may be configured to contact law enforcement if the security system 202 detects that an entry attempt has been made, such as a deadbolt has been released or that a door has been opened.
In some embodiments, the operating module 2624 and/or the security system 202 may be configured to check potential visitors against a criminal database. The operating module 2624 may send a notification to a remote computing device 2608 and/or emergency personnel. The user of the remote computing device 2608 may additionally be given information related to the criminal history of the potential visitor. For example, the operating module 2624 may identify a potential visitor as a registered sex offender. In some embodiments, the operating module 2624 may be configured to contact law enforcement if the potential visitor has a criminal background. For example, a user may configure the operating module 2624 to contact law enforcement when the home is unoccupied and a potential visitor has a history of burglary.
In several embodiments, the communication system 200 uses facial recognition to identify a visitor. The communication system 200 can then find information regarding the visitor. The communication system 200 can then send information regarding the visitor to the computing device 204 (e.g., while the computing device 204 is displaying a picture or video of the visitor). The information regarding the visitor can include name, age, occupation, number of previous visits to the security system, criminal background, social media profile (e.g., Facebook profile, LinkedIn profile), and/or purpose of the visit. In some embodiments, the computing device 204 displays a category or classification that applies to the visitor. Example categories and classifications include friend, family, acquaintance, sales person, worker, service provider, and unknown.
Custom MessagesIn some embodiments, the operating module 2624 may be configured to provide personal messaging. The security system 202 may be provided with pre-recorded messages that can be chosen by a user. In some embodiments, the user may be able to record a message. Where the user is able to record a message, the user may be able to record the message on the security system 202 directly, or the user may be able to use a remote computing device 2608 to record a message. Messages recorded on the security system 202 and/or the remote computing device 2608 may be stored on the security system 202, on the remote computing device 2608, and/or at the service provider 2604.
In some embodiments, the security system 202 and/or the operating module 2624 may be configured to play a specific message for a specific visiting individual, and/or it may be configured to play a specific message when a potential visitor is identified as a specific person or is included in a list of specific people.
In some embodiments, the security system 202 and/or the operating module 2624 may be configured to play a specific message if the potential visitor is not included in a list. For example, where a potential visitor is not included in a list of the resident's contacts, the security system 202 and/or operating module 2624 may be configured to indicate that the resident does not accept solicitors and/or request the visitor to provide identifying information or describe the purpose of the visit.
In some embodiments, the security system 202 and/or the operating module 2624 may be configured to play a specific message if the potential visitor has a criminal background. For example, a user may configure the security system 202 and/or the operating module 2624 to play a specific message where a potential visitor is a registered sex offender.
In some embodiments, the security system 202 may be configured to receive messages. In these embodiments, a visitor may be able to leave a message for one or more occupants. For example, where a user has chosen not to answer the door (or where the security system is set to block communication requests) the visitor may be prompted to leave a message, which may be delivered to at least one remote computing device 2608.
Security System ControlIn some embodiments, the operating module 2624 may be configured to provide system control functionality. In these embodiments, the user may be capable of controlling settings, features, and/or functionality of the security system 202 through a remote computing device 2608. The operating module 2624 may be configured to provide a user with the ability to activate or deactivate any or all of the modes of operation mentioned herein. The operating module 2624 can be configured to enable the user to see available security systems and connected computing devices.
In some embodiments, the operating module 2624 may be configured to provide security system control functionality through a secure login. In some embodiments, the remote computing device 2608 may be specific to one or more security systems 202. In some embodiments, a user may be given the ability to change settings for all associated security system(s) 202. For example, where a user has one security system 202 for his home and one security system 202 for his office building, he may be provided with the ability to control both security systems 202 from a single device. Where a user login is needed, the user may be provided with control over multiple security systems 202 within the same login session.
In some embodiments, a user may be able to use a mobile device to pan a camera located on the security system 202 in order to change the FOV. The user may be able to select (or silence) the doorbell speaker sound (the sound heard outside by the visitor). The user may be able to select (or silence) the inside chime (the sound heard inside the building). The user may be able to change notification settings, indicate which remote computing devices 2608 will receive notifications, or turn off notifications entirely.
In some embodiments, a user of a remote computing device 2608 may be able to turn on/off the LED light(s) on the security system 202. For example, a user interface 3700 can include a button 3704 (shown in
In some embodiments, the operating module 2624 may be configured to provide a user with the ability to change settings of the security system 202 via a remote computing device. The operating module 2624 may be configured to provide a user with the ability to set security settings as previously discussed. For example, the user may be able to indicate that he is “away” from his home and that all attempts to enter his home should result in a notification to law enforcement. The operating module 2624 may be configured to provide a user with the ability to indicate which messages should be played in accordance with the personal messaging functionality previously discussed.
In process 2700, the security system 202 may detect a triggering event at 2702. A triggering event is any event that indicates that a potential visitor may be present. Some non-limiting examples of a triggering event may be the ringing of a doorbell on the security system 202, activation of a motion sensor, or detection of a sound. In order to prevent excessive notifications, it may be necessary to determine whether a person is actually present at 2704. This may be done by comparing the triggering event against a threshold (such as only identifying that a visitor is present when a motion is within a given distance or a sound is over a given decibel level) or by using a specified technique. For example, the service provider 2604 may determine through facial recognition and/or computer vision that a person is present. If no visitor is detected, then the security system 202 may continue to monitor for a triggering event at 2706.
U.S. patent application Ser. No. 14/463,548, filed Aug. 19, 2014, describes various image analysis systems and methods. U.S. patent application Ser. No. 14/463,548 is incorporated by reference herein.
If a visitor is detected at 2704, then the service provider 2604 may, at 2706, send a notification to one or more remote computing devices 2608, or mobile devices, based on current settings. At 2708, the process 2700 will determine whether a user of a particular remote computing device 2608 has responded to the notification. If there has been no response, then the process, at 2710, may send a notification to a second device. If a user has responded, then communication may be allowed between the user of the remote computing device 2608 and the potential visitor at 2712. The user may be granted some or all of the functional features previously discussed in this disclosure during the communication at 2714 (or at any other time). Some of this functionality is further described in the following figures.
A record button 2806 provides a user with the capability to take video recordings of the FOV. A picture button 2808 provides a user with the capability to take still pictures of the FOV. The videos and pictures may be stored on the security system 202, the remote computing device 2608, and/or the service provider 2604. Where a user wishes to watch a previously recorded video, the user may be given the ability to select the playback speed.
A speed button 2810 enables the user to select video settings related to the displayed video 2804 or image. For example, a user experiencing a slow data transmission rate may choose a lower speed, lower resolution, or still images. In some embodiments, the user can select to view still images or videos images of the FOV. In some embodiments, the user can adjust the resolution of the displayed video or images.
A mute button 2812 can allow a user to prevent a visitor from hearing the user. In some embodiments, the mute button 2812 prevents the user from hearing the visitor (e.g., if the sound recorded by the security system is bothering the user). A sound button 2814 allows the user to adjust the speaker volume to help the visitor hear better (e.g., adjust the sound level of the speaker 488 shown in
An emergency button 2816 can allow for a quick notification of emergency personnel without the need to disconnect communication between the security system 202 and the remote computing device 2608. The “end call” button 2818 allows for disconnection of communication between the security system 202 and the remote computing device 2608.
Several embodiments include “on-demand” service. For example, a user can initiate communicate via a doorbell and/or can initiate live video from the doorbell by pressing a button (e.g., on demand 2820) on a user interface. Pressing the on-demand button again can terminate the communication and/or the live video.
In several embodiments, detection of a visitor (e.g., by the doorbell) results in a static image of the visitor being sent to the remote computing device of at least one user. Once the user selects to accept the communication request from the doorbell (e.g., from the visitor), the system can show a video (rather than a static image) of the visitor on the remote computing device. If the communication request is sent to multiple users' computing devices, each computing device can display the static image of the visitor. Once one of the users “answers” the communication request (e.g., selects to communicate with the visitor), the computing device of the user who “answers” the communication request can display a video of the visitor. In some embodiments, detection of a visitor results in a video (rather than a static image) of the visitor being sent to at least one remote computing device to enable users to “answer” the communication request.
In some embodiments, a user interface is configured to enable a user to select what sound a visitor hears from the security system (e.g., when the visitor “rings” the doorbell). Selecting a first button 3304 can configure the security system to emit a traditional chime sound when a visitor presses a doorbell button. Selecting a second button 3308 can configure the security system to emit a dial tone sound or ringing sound when a visitor presses a doorbell button. Selecting a third button 3312 can configure the security system to emit a custom sound when a visitor presses a doorbell button (e.g., a sound recorded as described in the context of
In some embodiments, the user can use the remote computing device to select a sound emitted by the chime located inside of the building or silence the chime located inside of the building. Several embodiments include many different sounds that the inside chime can emit when someone rings the doorbell.
Each security system 3600, 3604, 3608 can include a status indicator 3612, 3616, 3620 to indicate the strength of the wireless connection that each security system 3600, 3604, 3608 is using to communicate with the computing device. The third status indicator 3620 indicates that the third security system 3608 is not connected to a network and cannot communicate with the computing device. The third status indicator 3620 can have a different visual appearance than the first status indicator 3612 and the second status indicator 3616 to indicate that the third security system 3608 is not connected to a wireless network and cannot communicate with the computing device. The different visual appearance can include a different color, a different icon, and/or a flashing icon. Selecting a security system button in
A status indicator 3712 can indicate whether the security system is connected to a wireless network. A sensor mode indicator 3716 can indicate how the security system will respond to the triggering of various sensors (see
Methods to address network congestion (e.g., in the context of
As described previously, some embodiments include delivering still images rather than videos. Some embodiments include delivering still images at less than 50 frames per second (“FPS”) and/or greater than 25 FPS; less than 25 FPS and/or greater than 5 FPS; less than 10 FPS and/or greater than 0.2 FPS; or less than 5 FPS and/or greater than 0.1 FPS.
Some embodiments include delivering a single still image of the visitor taken when the visitor presses the doorbell button. Some embodiments include delivering more than one still image, but include delivering an image of the visitor pressing the doorbell button to help the user determine if the user wants to answer the communication request. To avoid the visitor's hand being in the way, and thus blocking a clear view of the visitor's face, some embodiments include delivering an image of the visitor taken at least 1 second and/or less than 25 seconds after the visitor presses the doorbell button; at least 2 seconds and/or less than 10 seconds after the visitor presses the doorbell button; or at least 1 second and/or less than 5 seconds after the visitor presses the doorbell button.
Some embodiments include delivering a video taken of the visitor to the user. In several embodiments, the video can have a resolution of less than or equal to 640 pixels wide by less than or equal to 480 pixels high. In several embodiments, the video can have a resolution of less than or equal to 320 pixels wide by less than or equal to 240 pixels high. In some embodiments, the delivered video is at least 30 pixels in width and/or less than 400 pixels in width; at least 80 pixels in width and/or less than 250 pixels in width; or at least 100 pixels in width and/or less than 200 pixels in width. Some embodiments include very high-resolution video (e.g., 2560×2048).
In several embodiments, video of a user is delivered to a screen 970 of a security system 950 (shown in
Referring now to
In some embodiments, the user interface illustrated in
In some embodiments, user interfaces are configured to enable use with touch screens, such as the screen of a smartphone or tablet. User interfaces can also be used with non-touch screens (e.g., via mouse and/or keyboard input).
Referring now to
The camera assembly 208 can be otherwise contained within a housing (e.g., the cover 404 shown in
In some embodiments, two motor assemblies 3900a, 3900b are oriented at an angle 3912 relative to each other. The angle can be approximately 90 degrees; at least 45 degrees and/or less than 135 degrees; at least 70 degrees and/or less than 110 degrees; or at least 80 degrees and/or less than 100 degrees. A first motor assembly 3900a can be configured to rotate the camera assembly 208 in a first direction and a second motor assembly can be configured to rotate the camera assembly 208 in a second direction. The second direction can be oriented approximately 90 degrees relative to the first direction; at least 45 degrees and/or less than 135 degrees relative to the first direction; at least 70 degrees and/or less than 110 degrees relative to the first direction; or at least 80 degrees and/or less than 100 degrees relative to the first direction.
Any of the embodiments described herein can also include an identity scanner, which can be configured to identify the visitor. In some embodiments, the identify scanner can classify the visitor. Classifications can include unwanted visitor, wanted visitor, family member, owner, employee, and authorized service provider. Some methods include using the identity scanner to determine if the visitor is authorized to enter the building or if the visitor is unauthorized to enter the building. If the visitor is authorized to enter the building, then the security system (e.g., 202 in
The finger scanner 4004 can use any suitable algorithm including minutia and pattern algorithms. The finger scanner 4004 can analyze fingerprint patterns including arch patterns, loop patterns, and whorl patterns. The finger scanner 4004 can include any suitable fingerprint sensor including optical, ultrasonic, passive capacitance, and active capacitance sensors. The finger scanner 4004 can be integrated into the outer housing 224 of the security system 202a, which can be mounted within 7 feet of a door or entryway of a building, such as a house. In some embodiments, the security system 202a can be configured to be mounted in an entryway. Some methods include mounting a security system in an entryway of a building.
The finger scanner 4004 can be integrated into the doorbell button 212a. Pressing the doorbell button 212a can enable the finger scanner 4004 to analyze the fingerprint of the visitor. The doorbell button 212a can be used to “ring” the doorbell and house at least a portion of the finger scanner 4004.
The security system 202a and/or a remote computer can determine if the visitor is on a pre-authorized list of individuals. The security system 202a and/or a remote computer can determine if the visitor is on a list of unauthorized or screened individuals. The system can block the communication request of screened individuals and/or can call emergency response personnel in reaction to determining the identity of a screened visitor.
In some embodiments, the security system can be configured to collect fingerprint samples, the system can be configured to record the fingerprint samples, and the remote computing device can be configured to assign fingerprint samples to a list of individuals, classifications of individuals, and/or information regarding individuals. Referring now to
Referring now to
Block 4032 can include implementing a recognized visitor protocol, which can be different than the unrecognized visitor protocol. If the visitor is include on a list of individuals authorized to automatically enter the building, then the security system can enable the visitor to enter the building (e.g., unlock a door) without further approval by the user (e.g., by automatically unlocking a door as shown in Block 4036). As shown in Block 4040, if the visitor is recognized, but not included on a list of individuals authorized to automatically enter the building, then the communication system can wait for the user to provide authorization via a remote computing device for the visitor to enter the building (e.g., unlock the door).
As mentioned previously in the context of
Referring now to
Block 4098 can include implementing an unrecognized visitor protocol. Unrecognized visitor protocols can be customized by the user. Unrecognized visitor protocols can include disabling a chime, speaker, or audio output device located inside of the building during certain hours of the day (e.g., between 11:00 PM and 6:00 AM). Unrecognized visitor protocols can include directing the communication request to a particular user (e.g., an adult user rather than to a child user or a user under a certain age threshold). Unrecognized visitor protocols can include emitting a chime or sound inside of the building but not notifying a remote computing device (e.g., 204 in
Block 4102 can include implementing a recognized visitor protocol, which can be different than the unrecognized visitor protocol. If the visitor is include on a list of individuals authorized to automatically enter the building, then the security system can enable the visitor to enter the building (e.g., unlock a door) without further approval by the user (e.g., by automatically unlocking a door as shown in Block 4106). As shown in Block 4110, if the visitor is recognized, but not included on a list of individuals authorized to automatically enter the building, then the communication system can wait for the user to provide authorization via a remote computing device for the visitor to enter the building (e.g., unlock the door).
Locking SystemVarious mounting bracket embodiments are described herein (e.g., 420 in
As described herein, various embodiments include the ability to detect whether a visitor is present even if the visitor does not press a doorbell button. For example, some embodiments include infrared detection of visitors, motion detection of visitors, noise detection of visitors, and/or visual recognition of visitors. If a visitor is present for more than a threshold amount of time, the system (e.g., 200 in
In some embodiments, the system can be configured to only notify a user (e.g., via a chime and/or via a remote computing device) once per detected visitor and/or once per detection episode. This approach can prevent unnecessarily redundant notifications. In several embodiments, the system will send a notification to the user when a visitor is detected (or after a threshold amount of time) but then will not send a second notification regarding the same visitor unless a second triggering event occurs. Example triggering events can include the passage of a second threshold amount of time, a second knocking episode, and/or pressing the doorbell button.
Power ManagementDifferent parts of the world often use different types of electrical power. In addition, different houses sometimes have different wiring configurations and system installers might use different installation techniques. Several embodiments include special features that enable compatibility with any voltage, current, and wiring configuration. Some embodiments can function properly regardless of current direction or type.
Referring now to
In some embodiments, the security system 202 uses a first amount of power to “ring” the chime inside of the building and a second amount of power when in Standby Mode, wherein the first amount of power is at least twice as large as the second amount of power.
The building 300 can include a building power supply 5000, which can receive electrical power from a public utility. A transformer 5004 can be electrically coupled to the building power supply 5000 by a first wire 5004 and a second wire 5006. As used herein, “wire” can include electrical conductors such as metal cables and wires. The transformer 5004 can step down the electrical power (e.g., 120 volts AC, 240 volts AC) from the building power supply 5000 to a lower voltage (e.g., at least 10 volts and/or less than 20 volts, at least 7 volts and/or less than 25 volts).
A third wire 5010 can electrically couple the transformer 5004 to a sound output device 5014, which can be a chime, a speaker, a bell, or another device suitable to emit a sound inside of the building 300. A fourth wire 5018 can electrically couple the transformer 5004 to the security system 202 (e.g., the doorbell). A fifth wire 5022 can electrically couple the security system 202 to the sound output device 5014. As a result of this configuration, the security system 202 can control the flow of electricity to the sound output device 5014. In many embodiments, the sound output device 5014 is configured such that it cannot emit sound without a trigger power above a triggering threshold. The trigger power comes from the building power supply 5000 and flows into the transformer 5004 (via wires 5004, 5006). Thus, the transformer 5004 can supply the trigger power to a first circuit that comprises the fourth wire 5018, at least a portion of the security system 202, the fifth wire 5022, the sound output device 5014, and the third wire 5010. The fourth wire 5018 and the fifth wire 5022 can protrude from a hole 5012 in the outside of the building 300.
In some doorbell electrical power configurations, pressing a mechanical doorbell button (not shown) creates a closed electrical loop to energize a chime. In other words, the mechanical doorbell button can be a switch that is normally in an open position and is in a closed position when a person presses the button.
Some doorbell systems include a sound output device 5014 that includes a plunger configured to strike two flat metal bar resonators. The plunger can be operated by solenoids. Pressing the mechanical doorbell button can cause the solenoid to force the plunger to hit a first resonator. If a spring is included, then the spring can cause the plunger to hit a second resonator (e.g., when the mechanical doorbell button is released). The plunger hitting a resonator can cause a sound (e.g., a “ding” sound) to be emitted from the sound output device 5014.
Some sound output devices include a first solenoid and a second solenoid. The first solenoid can be configured to hit both a first metal bar and a second metal bar (e.g., to make a “ding-dong” sound). The second solenoid can be configured to hit the first metal bar, but not the second metal bar (e.g., to make a “ding” sound). In some cases, a first doorbell (e.g., a front doorbell) activates the first solenoid (e.g., to make a “ding-dong” sound) and a second doorbell (e.g., a back doorbell) activates the second solenoid (e.g., to make a “ding” sound). This approach can enable a user to distinguish between the front doorbell's sound and the back doorbell's sound (as emitted from a sound output device).
While pressing a mechanical doorbell button can close an electrical circuit to energize a chime and thereby cause a chime to emit a sound to notify a person inside of a building, the security system 202 can be configured (in some embodiments) such that pressing the doorbell button 212 does not mechanically close an electrical circuit to cause a chime to emit a sound. In several embodiments, the doorbell button 212 is not a switch that electrically couples the fourth wire 5018 to the fifth wire 5022. Instead, the fourth wire 5018 and the fifth wire 5022 can be electrically coupled to a printed circuit board (“PCB”) 516 (shown in
In some embodiments, the doorbell button 212 is a press sensor (rather than the doorbell button 212 being physically coupled to a mechanical switch that can electrically close a circuit between the transformer 5004 and the sound output device 5014). The sensor can detect when a visitor presses the doorbell button 212. This “press detection” is used by software of the security system 202 or of the communication system 200 (shown in
Referring now to
In several embodiments, electrical power for the sound output device 5014 and/or electrical power for the PCB 516 is routed through the security system 202 and/or through the PCB 516. Electrical power from the fourth wire 5018 can be routed through the security system 202 and/or through the PCB 516 prior to reaching the fifth wire 5022. Electrical power from the fifth wire 5022 can be routed through the security system 202 and/or through the PCB 516 prior to reaching the fourth wire 5018. Thus, electrical power for the sound output device 5014 (e.g., chime) does not need to bypass the security system 202.
In some embodiments, the security system 202 includes a Non-energizing Mode in which the security system 202 provides DC power to at least portions of the PCB 516 while draining power to the sound output device 5014, wherein the power to the sound output device is below a triggering threshold. The triggering threshold is the amount of electrical power (e.g., volts, current) necessary to cause the sound output device 5014 to emit a notification sound (e.g., a sound configured to notify a person inside of the building 300 that someone is at the door). In several embodiments, the security system 202 includes an Energizing Mode in which the security system 202 provides AC power to the sound output device above the triggering threshold. In some embodiments of the Energizing Mode, the security system 202 provides DC power to at least portions of the PCB 516.
In some embodiments of the Non-energizing Mode, the security system 202 provides less than 30%, less than 20%, less than 10%, at least 3%, at least 1%, and/or at least 0.1% of the power from the transformer 5004 to the sound output device 5014. In some embodiments of Energizing Mode, the security system 202 provides at least 70%, at least 80%, at least 90%, or at least 95% of the power from the transformer 5004 to the sound output device 5014. In several embodiments, the security system 202 charges the battery 462 during Non-energizing Mode and does not charge the battery 462 during Energizing Mode.
In some embodiments, the security system 202 includes a rectifier 524 to convert AC to DC. The rectifier 524 can comprise vacuum tube diodes, mercury-arc valves, copper and selenium oxide rectifiers, semiconductor diodes, silicone-controlled rectifiers, and/or silicone-based semiconductor switches.
Methods for using a doorbell system can include obtaining a doorbell (e.g., security system 202) that comprises a speaker, a microphone, a camera, and an outer housing; and connecting the doorbell electrically to an electrical power supply 5000 of a building 300. The electrical power supply can be provided by a utility company. In some embodiments, the electrical power supply is a transformer 5004 that is electrically connected to a building's electricity that is provided by a utility company.
In some embodiments, the doorbell can be connected electrically to a sound output device 5014 (e.g., a digital chime, a mechanical chime, a speaker) that is located remotely relative to the doorbell. For example, the doorbell can be coupled to an outside wall of a building and the sound output device can be coupled to an inside wall of the building. The building can couple the sound output device to the doorbell while the sound output device is located remotely relative to the doorbell. The doorbell can be connected communicatively to a remote computing device to enable the doorbell to communicate (e.g., wirelessly) with the remote computing device.
Methods can include receiving a first current into the doorbell (e.g., through the fourth wire 5018) from the power supply 5000 of the building 300 and using the first current to provide at least a first portion of a first electrical energy to the camera 208 and to the microphone 452 (shown in
Some methods include using the doorbell to close an electrical circuit 5026 that comprises the sound output device 5014 such that the first current flows through the sound output device 5014 and the first current provides a first electricity that is less than a triggering threshold of the sound output device 5014 such that the sound output device 5014 does not emit a notification sound in response to the first electricity.
Some embodiments comprise using the doorbell (e.g., security system 202) to detect a presence of a visitor while closing the electrical circuit 5026 such that first current provides the first electricity that is less than the triggering threshold. Then, in response to detecting the presence of the visitor, methods can include using the doorbell to close the electrical circuit 5026 to supply a second electricity to the sound output device 5014. The second electricity can be greater than the triggering threshold of the sound output device 5014 such that the sound output device emits the notification sound in response to the second electricity. Embodiments can also include sending a wireless notification to the remote computing device 204 (shown in
In several embodiments, the electrical circuit 5026 comprises the doorbell (e.g., 202), the sound output device 5014, and a transformer 5004 (which can have an alternating current or direct current output). The transformer 5004 can electrically couple the electrical circuit 5026 to the power supply 5000 of the building 300 such that the transformer 5004 is configured to provide electrical power from the power supply 5000 to the electrical circuit 5026. The transformer 5004 can comprise an electrical output having a direct current. Receiving the first current into the doorbell (e.g., 202) from the power supply 5000 of the building 300 can comprise receiving the direct current from the transformer 5004.
Electrically connecting a doorbell to an electrical power supply can include indirectly electrically connecting the doorbell to the power supply (e.g., using the transformer 5004 to electrically couple the doorbell 202 to the power supply 5000). A wire can be electrically connected when the wire is connected such that it could conduct electricity if there was a complete circuit. A doorbell can be electrically connected to a wire if the doorbell is conductively coupled to the wire (even if a complete circuit is not present to enable an electrical current).
In several embodiments, the electrical circuit comprises the doorbell, the sound output device, and a transformer. The transformer can electrically couple the electrical circuit to the power supply of the building such that the transformer is configured to provide electrical power from the power supply to the electrical circuit. The transformer can comprise an electrical output having an alternating current. Receiving the first current into the doorbell from the power supply of the building can comprise receiving the alternating current from the transformer. Method can further comprise converting at least a second portion of the alternating current into a direct current. The converting can occur within the outer housing of the doorbell.
In some embodiments, the power supply 5000 provides the second electricity to the electrical circuit. The doorbell can be configured to control whether the doorbell system provides the first electricity or the second electricity to the sound output device.
Several embodiments include initiating a transmission of the wireless notification (e.g., 230 in
Some embodiments comprise using the doorbell to supply the third electricity to the sound output device while continuing to transmit the wireless notification to the remote computing device.
Several embodiments comprise terminating the supply of the second electricity to the sound output device and using the doorbell to close the electrical circuit to provide a third electricity to the sound output device. The third electricity can be less than the triggering threshold of the sound output device such that the sound output device does not emit the notification sound in response to the third electricity. Embodiments can include initiating a transmission of the wireless notification from the doorbell to the remote computing after terminating the supply of the second electricity to the sound output device.
Some embodiments include using the doorbell to detect the presence of the visitor while closing the electrical circuit comprises using a motion sensor (e.g., motion detector 218 shown in
In several embodiments, using the doorbell to detect the presence of the visitor while closing the electrical circuit comprises using image analysis to detect the presence of the visitor. Methods can further comprise using the first current to provide at least a second portion of the first electrical energy to an image analysis system 520 (shown in
U.S. patent application Ser. No. 14/463,548, filed Aug. 19, 2014, describes various image analysis systems and methods. U.S. patent application Ser. No. 14/463,548 is incorporated by reference herein.
In some embodiments, the first current is configured such that the first portion of the first electrical energy is greater than an operational threshold of the camera while the first current is configured such that the first current provides the first electricity that is less than the triggering threshold of the sound output device.
In several embodiments, the first current is configured such that the first portion of the first electrical energy is less than an operational threshold of the camera while the first current is configured such that the first current provides the first electricity that is less than the triggering threshold of the sound output device, the method further comprising using the first portion of the first electrical energy to charge a battery located inside of the outer housing of the doorbell, and then discharging at least an electrical portion of the battery to provide a second electrical energy that is greater than the operational threshold to the camera.
In some embodiments, the doorbell comprises a wireless communication system configured to enable sending the wireless notification from the doorbell to the remote computing device. Embodiments can include using the first current to provide at least a second portion of the first electrical energy to the wireless communication system, wherein the first current is configured such that the second portion of the first electrical energy is less than an operational threshold of the wireless communication system while the first current is configured such that the first current provides the first electricity that is less than the triggering threshold of the sound output device. Methods can also include using the second portion of the first electrical energy to charge a battery located inside of the outer housing of the doorbell, and then discharging at least an electrical portion of the battery to provide a second electrical energy that is greater than the operational threshold to the wireless communication system. Then, embodiments can include using the wireless communication system to send the wireless notification to the remote computing device using the second electrical energy.
Several embodiments include methods for replacing a first doorbell with a second doorbell. The first doorbell 5028 comprises a switch configured to close an electrical circuit 5026 having a transformer 5004 and a sound output device 5014 to enable the sound output device 5014 to emit a notification sound. Methods can include detaching the first doorbell from a first wire that is electrically connected to the transformer; detaching the first doorbell from a second wire that is electrically connected to the sound output device; and obtaining the second doorbell. The second doorbell can comprise a speaker, a microphone, a camera, and an outer housing. The speaker, the microphone, and the camera can be coupled to the outer housing.
Some embodiments include connecting the second doorbell electrically to the first wire that is electrically connected to the transformer, and connecting the second doorbell electrically to the second wire that is electrically connected to the sound output device. The second doorbell can be located remotely relative to the sound output device. For example, the second doorbell can be located on an outside wall of a building while the sound output device is located inside of the building.
Several embodiments include connecting the second doorbell communicatively to a remote computing device such that the second doorbell is configured to communicate with the remote computing device. Embodiments can include receiving a first current into the second doorbell from at least one of the first wire and the second wire; using the first current to provide a first electrical energy to at least a first portion of the second doorbell; and draining the first current to at least one of the first wire and the second wire.
Some embodiments include entering a first mode in response to connecting the second doorbell electrically to the first wire that is electrically connected to the transformer, and in response to connecting the second doorbell electrically to the second wire that is electrically connected to the sound output device. During the first mode, methods can comprise using the second doorbell to close the electrical circuit that includes the transformer and the sound output device such that the first current flows through the sound output device and the first current provides a first electricity that is less than a triggering threshold of the sound output device such that the sound output device does not emit a notification sound in response to the first electricity.
Several embodiments include entering a second mode in response to using the doorbell to detect a presence of a visitor. During the second mode, the methods can comprise using the doorbell to close the electrical circuit to supply a second electricity to the sound output device. The second electricity can be greater than the triggering threshold of the sound output device such that the sound output device emits the notification sound in response to the second electricity. The second mode can also include sending a wireless notification to the remote computing device regarding the presence of the visitor.
In some embodiments, the security system 202 is connected electrically to a transformer 5004 (e.g., via a third wire 5020 and a fourth wire 5024) and/or is electrically connected to a building power supply 5000 (e.g., via a first wire 5004 and a second wire 5006). In several embodiments, the security system 202 can wirelessly communicate with the sound output device 5014 (e.g., a solenoid-based chime, a digital chime, a speaker) via any suitable means of wireless communication 230. Wireless communication 230 between the security system 202 (e.g., a doorbell) and the speaker 5016 can enable the system to emit notification sounds from the external speaker 5016, which can be located inside of the building 300 (although the speaker 5016 is external relative to the security system 202).
Inside UsesSeveral embodiments can be used even in areas that are not entryways or near doors. For example, security systems (e.g., 202 in
A first wire 5004 and a second wire 5006 can electrically connect (e.g., couple) the security system 202 to a building power supply 5000 (e.g., an electrical outlet or an electrical panel). In some embodiments, the security system 202 is battery operated such that attaching the security system 202 to an external power supply (e.g., the building power supply 5000) is unnecessary. In several embodiments, the power supply 5000 provides more than 6 volts, less than 36 volts, less than 140 volts, and/or less than 260 volts. In some embodiments, electrical power from a building must be changed (e.g., different voltage, different current) prior to providing the electrical power to the security system 202 (e.g., a doorbell).
Communication ControlReferring now to
In some embodiments, the computing device 204 has superior communication rights relative to the security system 202. As a result, if the speaker 488 is emitting sound, then the microphone 488 can be disabled. In several embodiment, the microphone 488 is disabled (e.g., prevented from capturing sound or being used to transmit sound to the computing device 204) a first period of time before the speaker 488 emits sound, while the speaker 488 emits sound, and/or a second period of time after the speaker 488 emits sound. The first period and/or the second period can be at least one nanosecond, at least one millisecond, at least 50 milliseconds, and/or less than one second.
Referring now to
Drowning is the second-leading cause of injury-related death for children under 14 years old. Traditional pool monitoring devices rely on detecting when a person enters the water. People can drown in less than two minutes. As a result, sending a notification to a remote computing device when a person enters the water can leave insufficient time for the user of the remote computing device to save the drowning person. Various embodiments described herein address at least some of these shortcomings of traditional pool monitoring devices.
The security system 202 can take a picture 208 with the camera assembly 208 in response to detecting motion (e.g., via the motion detector 218). The security system 202 (or another portion of the communication system 200 illustrated in
The camera assembly 208 can be configured to visually identify people through machine vision and/or image recognition. For example, the camera assembly 208 can take an image of the person located near the pool 5030. Software run by any portion of the system can then analyze select features of the person from the image. The software can use scaling to estimate the height of the person (e.g., based on previous calibration procedures and information).
In some embodiments, if the motion was caused by an adult and/or by a person taller than the height threshold, then the system will not send a notification (e.g., alarm) to the remote computing device and/or will not emit an alert sound from the speaker 488 (shown in
Although the security system 202 can be configured to detect if a person falls into the pool 5030, the security system 202 can also be configured to detect whether a person is located within a zone 5034 that includes at least a portion of the pool 5030. In some embodiments, the zone 5034 includes all of the pool 5030 and/or an area around the perimeter of the pool 5030. The zone 5034 can define a danger zone. Once the security system 202 detects that a person is located in the zone 5034, the security system can enter a Standby Mode in which the security system 202 conducts at least one analysis to determine if the person might be in danger (e.g., if the person is shorter than the height threshold or if the person is authorized to be in the zone 5034 and/or in the pool 5030).
In some embodiments, the security system 202 will send a notification to a remote computing device and/or emit an alert sound from the speaker unless the detected person is wearing a device that indicates the person is authorized to be in the zone 5034 and/or in the pool 5030. The authorization device 5038 can be a bracelet or other object worn by the person. The authorization device 5038 can include a radio-frequency identification (“RFID”) or Bluetooth communication device configured to provide data to the security system 202 (e.g., data regarding the authorization of the device to be located in the zone 5034 and/or pool 5030).
Several methods include using the security system 202 to detect whether a person is located in the zone 5034. Methods can include determining whether the person is authorized to be in the zone 5034. In some embodiments, methods include sending a notification to a remote computing device and/or emitting an alert sound from the speaker 488 (shown in
In some embodiments, the communication system 200 (shown in
In several embodiments, the advertisements 258 are selected based on at least one feature or characteristic of the visitor. For example, if the visitor is a vacuum salesperson, then the advertisement 258 can be related to vacuums. In some embodiments, the advertisements 258 offer to provide additional information regarding the visitor (e.g., background check information, identity information, visit history information, relationships to acquaintances of the user).
StatisticsSeveral embodiments include tracking, recording, and/or providing information regarding visitors and/or visits. This information can include statistics and other forms of data. Referring now to
Several embodiments include aggregating, combining, and/or comparing information regarding visitors and/or visits from at least two security systems 202 (and/or from at least two buildings). This aggregated and/or combined data can be analyzed by a third party (e.g., not a user of one of the security systems 202) to identify visit trends and/or to track individual visitors. For example, this data can be used to determine which neighborhoods receive the most visitors and/or visits. This data can also be used to track a particular visitor as the visitor moves from one building to another building or neighborhood. Aggregated and/or combined data regarding visitors can be searched and/or analyzed to determine if a particular individual has visited a particular area, neighborhood, or building.
Some embodiments include creating a log that records the date and time of opening and closing of a door. Referring now to
In some embodiments, security systems 202 (e.g., doorbells) are disabled if they are stolen. This approach can deter theft once potential thieves know stolen systems will not function properly (e.g., once disabled).
In several methods, the owner (e.g., a user) of a stolen security system 202 can contact a remote administrator (e.g., the manufacturer of the stolen security system). Based on the request of the owner, the remote administrator can disable the stolen security system 202 remotely (e.g., without physically touching the security system 202). The remote administrator can use wireless communication 230 and/or a server 206 to disable the stolen security system 202.
In some embodiments, the remote administrator, the owner, and/or the user can detect the location of the stolen security system 202. The remote administrator can tell the owner the location of the stolen security system 202. For example, if a person connects the stolen security system 202 to a communication network (e.g., the Internet), the administrator can locate the stolen security system 202.
In several embodiments, once a security system 202 is connected to a wireless network, the security system 202 cannot connect to another wireless network without being “unlocked.” Thus, if the security system 202 is stolen, the security system 202 could be nearly worthless because the thief likely will not be able to connect the security system to another wireless network (e.g., the wireless network at the thief's home). In this context, “unlocked” means that the security system 202 is capable of connecting to another wireless network and capable of sending notification requests to a remote computing device 204 via the other network. Thus, in some embodiments, once a security system 202 is connected to a first wireless network, the security system 202 cannot be connected to another wireless network without being unlocked (e.g., from the first wireless network). Once the security system 202 is unlocked, then it can be connected to a second wireless network.
A remote administrator and/or the owner can unlock the security system 202 by, for example, entering a password and/or logging into a website configured for unlocking security systems 202.
Delivery IdentificationIn some embodiments, once the security system 202 scans a barcode to enable identifying the package 1038, methods include sending a notification to a person associated with the package (such as the person to whom the package is addressed). The notification can include an email to the person, a text message, and/or an automated phone call. The notification can communicate that the package has arrived. The notification can also communicate the contents of the package. As used herein, “package” is used in a broad sense and can include letters and boxes delivered to a building.
Laser IdentificationReferring now to
Many types of computing devices can be used to receive notifications regarding the presence of a visitor and to communication with a visitor. For example, a car and glasses can be configured to receive alerts regarding the presence of a visitor.
In some embodiments, the display screen 242a is part of a television, which can be configured to receive alerts regarding the presence of visitors. The television can be configured to receive push notifications from a security system 202 (shown in
Some embodiments include answering visitor alerts via glasses 1058. A user can control and interact with the glasses 1058 via voice commands. The glasses 1058 can include a speaker to allow the user to hear the visitor.
User InterfacesThe graphical user interface shown in
A fisheye lens 210 can be configured to provide a 180-degree side-to-side view of the room in which the power outlet 228 is located. In some embodiments, the fisheye lens 210 provides a 360-degree view.
The security system 202b can include an outer housing 224b and a backside 278b. The backside 278b can face towards a power outlet 228 while the camera assembly 208 faces away from the power outlet 228.
The security system 202c illustrated in
All of the embodiments described in the context of other security systems (e.g., security system 202) described herein and/or described in applications and/or patents incorporated by reference can be applied to the security systems 202b, 202c shown in
This application claims the benefit of U.S. Provisional Patent Application No. 62/016,863; filed Jun. 25, 2014; and entitled WALL PLUG CAMERAS. The entire contents of Patent Application No. 62/016,863 are incorporated by reference herein.
InterpretationNone of the steps described herein is essential or indispensable. Any of the steps can be adjusted or modified. Other or additional steps can be used. Any portion of any of the steps, processes, structures, and/or devices disclosed or illustrated in one embodiment, flowchart, or example in this specification can be combined or used with or instead of any other portion of any of the steps, processes, structures, and/or devices disclosed or illustrated in a different embodiment, flowchart, or example. The embodiments and examples provided herein are not intended to be discrete and separate from each other.
The section headings and subheadings provided herein are nonlimiting. The section headings and subheadings do not represent or limit the full scope of the embodiments described in the sections to which the headings and subheadings pertain. For example, a section titled “Topic 1” may include embodiments that do not pertain to Topic 1 and embodiments described in other sections may apply to and be combined with embodiments described within the “Topic 1” section.
Some of the devices, systems, embodiments, and processes use computers. Each of the routines, processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code modules executed by one or more computers, computer processors, or machines configured to execute computer instructions. The code modules may be stored on any type of non-transitory computer-readable storage medium or tangible computer storage device, such as hard drives, solid state memory, flash memory, optical disc, and/or the like. The processes and algorithms may be implemented partially or wholly in application-specific circuitry. The results of the disclosed processes and process steps may be stored, persistently or otherwise, in any type of non-transitory computer storage such as, e.g., volatile or non-volatile storage.
The various features and processes described above may be used independently of one another, or may be combined in various ways. All possible combinations and subcombinations are intended to fall within the scope of this disclosure. In addition, certain method, event, state, or process blocks may be omitted in some implementations. The methods, steps, and processes described herein are also not limited to any particular sequence, and the blocks, steps, or states relating thereto can be performed in other sequences that are appropriate. For example, described tasks or events may be performed in an order other than the order specifically disclosed. Multiple steps may be combined in a single block or state. The example tasks or events may be performed in serial, in parallel, or in some other manner. Tasks or events may be added to or removed from the disclosed example embodiments. The example systems and components described herein may be configured differently than described. For example, elements may be added to, removed from, or rearranged compared to the disclosed example embodiments.
Conditional language used herein, such as, among others, “can,” “could,” “might,” “may,” “e.g.,” and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without author input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment. The terms “comprising,” “including,” “having,” and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations and so forth. Also, the term “or” is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term “or” means one, some, or all of the elements in the list. Conjunctive language such as the phrase “at least one of X, Y, and Z,” unless specifically stated otherwise, is otherwise understood with the context as used in general to convey that an item, term, etc. may be either X, Y, or Z. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y, and at least one of Z to each be present.
The term “and/or” means that “and” applies to some embodiments and “or” applies to some embodiments. Thus, A, B, and/or C can be replaced with A, B, and C written in one sentence and A, B, or C written in another sentence. A, B, and/or C means that some embodiments can include A and B, some embodiments can include A and C, some embodiments can include B and C, some embodiments can only include A, some embodiments can include only B, some embodiments can include only C, and some embodiments include A, B, and C. The term “and/or” is used to avoid unnecessary redundancy.
While certain example embodiments have been described, these embodiments have been presented by way of example only, and are not intended to limit the scope of the inventions disclosed herein. Thus, nothing in the foregoing description is intended to imply that any particular feature, characteristic, step, module, or block is necessary or indispensable. Indeed, the novel methods and systems described herein may be embodied in a variety of other forms; furthermore, various omissions, substitutions, and changes in the form of the methods and systems described herein may be made without departing from the spirit of the inventions disclosed herein.
Claims
1. A method for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device, the method comprising:
- obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime;
- receiving a wireless notification from the doorbell with the remotely located computing device regarding a presence of the visitor; and
- entering a network connection mode prior to receiving the wireless notification, wherein the network connection mode comprises using the remotely located computing device to scan a barcode.
2. The method of claim 1, wherein the network connection mode comprises detecting a first wireless network having a name and a password, wherein the barcode represents a doorbell identification code that is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, wherein the network connection mode comprises creating a second wireless network by at least one of the doorbell and the remotely located computing device, and the network connection mode comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network, wherein the method comprises the doorbell directly communicating with the remotely located computing device via the second wireless network prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
3. The method of claim 2, wherein the barcode comprises a Quick Response Code.
4. The method of claim 2, wherein the second wireless network is created by the doorbell.
5. The method of claim 2, wherein the second wireless network is created by the remotely located computing device.
6. The method of claim 2, further comprising communicatively coupling the remotely located computing device to a WiFi router and the doorbell via the first wireless network.
7. The method of claim 2, further comprising:
- detecting multiple wireless networks and automatically selecting the first wireless network for communicating between the doorbell and the remotely located computing device, wherein prior to the automatic selection the remotely located computing device is connected to the first wireless network; and
- receiving authorization to use the remotely located computing device to communicate with the doorbell in response to pressing the button for a predetermined amount of time.
8. The method of claim 7, wherein the predetermined amount of time is at least twenty seconds.
9. The method of claim 1, wherein the network connection mode comprises detecting a first wireless network having a name and a password, wherein scanning the barcode comprises using the remotely located computing device to take a picture of the barcode and then using the remotely located computing device to analyze the barcode to extract a doorbell identification code from the barcode, the method further comprising transmitting the doorbell identification code from the remotely located computing device to a remote computer, and then in response to the remote computer receiving the doorbell identification code from the remotely located computing device, receiving authorization from the remote computer for the remotely located computing device to configure the doorbell, wherein configuring the doorbell comprises transmitting the password of the first wireless network from the remotely located computing device to the doorbell.
10. The method of claim 9, wherein the barcode comprises a Quick Response Code.
11. The method of claim 9, wherein the barcode is packaged with the doorbell, the method further comprising receiving a package that comprises the doorbell and the barcode.
12. The method of claim 9, wherein the network connection mode comprises the doorbell creating a second wireless network, and the network connection mode comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network, wherein the method comprises using the remotely located computing device to directly communicate with the doorbell via the second wireless network prior to using the remotely located computing device to indirectly communicate with the doorbell via the first wireless network.
13. The method of claim 9, wherein the network connection mode comprises using the remotely located computing device to create a second wireless network, and the network connection mode comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell via the second wireless network to enable the doorbell to communicate with the remotely located computing device via the first wireless network, wherein the method comprises using the remotely located computing device to directly communicate with the doorbell via the second wireless network prior to using the remotely located computing device to indirectly communicate with the doorbell via the first wireless network.
14. The method of claim 1, wherein the network connection mode comprises detecting a first wireless network having a name and a password, wherein the barcode represents a doorbell identification code that is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, and the network connection mode comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell to enable the doorbell to communicate with the remotely located computing device via the first wireless network.
15. A method for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device, the method comprising:
- obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime;
- receiving a wireless notification from the doorbell with the remotely located computing device regarding a presence of the visitor; and
- entering a network connection mode prior to receiving the wireless notification, wherein the network connection mode comprises using the remotely located computing device to scan a Quick Response Code.
16. The method of claim 15, wherein the network connection mode comprises detecting a first wireless network having a name and a password, wherein the Quick Response Code represents a doorbell identification code that is associated with the doorbell, and wherein the network connection mode further comprises using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell.
17. The method of claim 16, wherein the network connection mode comprises communicatively coupling the remotely located computing device with the doorbell, and the network connection mode further comprises transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell to enable the doorbell to communicate with the remotely located computing device via the first wireless network, wherein the method comprises using the remotely located computing device to directly communicate with the doorbell via the second wireless network prior to using the remotely located computing device to indirectly communicate with the doorbell via the first wireless network.
18. The method of claim 16, wherein communicatively coupling the remotely located computing device with the doorbell comprises communicatively coupling the remotely located computing device with the doorbell via a cable.
19. The method of claim 16, further comprising receiving authorization to use the remotely located computing device to communicate with the doorbell in response to pressing the button for a predetermined amount of time.
20. The method of claim 15, wherein the Quick Response Code is packaged with the doorbell, the method further comprising receiving a package that comprises the doorbell and the Quick Response Code.
21. The method of claim 15, wherein the doorbell identification code comprises at least 24 characters, wherein the camera is a first camera, and wherein the remotely located computing device comprises a second camera, the method further comprising scanning the Quick Response Code via the second camera, wherein the doorbell is obtained from a package, and wherein the Quick Response Code is located along one of a surface of the package and a surface of the doorbell.
22. A method for using a doorbell that is configurable to wirelessly communicate with a remotely located computing device, the method comprising:
- obtaining the doorbell that comprises a speaker, a microphone, a camera, and a button, wherein the doorbell is configurable to enable a visitor to sound a chime;
- receiving a wireless notification from the doorbell with the remotely located computing device regarding a presence of the visitor;
- entering a network connection mode prior to receiving the wireless notification, wherein the network connection mode comprises detecting a first wireless network having a name and a password; and
- scanning a barcode, wherein the barcode represents a doorbell identification code that is associated with the doorbell.
23. The method of claim 22, wherein the network connection mode further comprises:
- after detecting the first wireless network, then using the remotely located computing device to scan the barcode;
- after using the remotely located computing device to scan the barcode, then using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell;
- after using the doorbell identification code to verify whether the remotely located computing device is authorized to communicate with the doorbell, then communicatively coupling the remotely located computing device with the doorbell;
- after communicatively coupling the remotely located computing device with the doorbell, then transmitting the name and the password of the first wireless network directly from the remotely located computing device to the doorbell to enable the doorbell to communicate with the remotely located computing device via the first wireless network; and
- the doorbell communicating directly with the remotely located computing device prior to the doorbell indirectly communicating with the remotely located computing device via the first wireless network.
24. The method of claim 23, further comprising, after communicating with the remotely located computing device, detecting multiple wireless networks and automatically selecting the first wireless network for communicating between the doorbell and the remotely located computing device, wherein prior to the automatic selection the remotely located computing device is connected to the first wireless network.
25. The method of claim 24, wherein detecting the first wireless network having the name and the password occurs in response to pressing the button for a predetermined amount of time, the method further comprising, after pressing the button for a predetermined amount of time, then receiving authorization to use the remotely located computing device to communicate with the doorbell.
26. The method of claim 25, wherein the barcode comprises a Quick Response Code, and wherein the remotely located computing device is communicatively coupled with the doorbell via a second wireless network that is created by one of the doorbell and the remotely located computing device.
Type: Application
Filed: Feb 3, 2015
Publication Date: May 28, 2015
Inventor: Joseph Frank Scalisi (Yorba Linda, CA)
Application Number: 14/612,376
International Classification: G08B 25/10 (20060101); G08B 13/196 (20060101); H04M 1/02 (20060101); H04M 11/02 (20060101); H04N 7/18 (20060101); G08B 3/10 (20060101);