US20240013640A1 - Systems and methods for analyzing sensor data to detect property intrusion events - Google Patents

Systems and methods for analyzing sensor data to detect property intrusion events Download PDF

Info

Publication number
US20240013640A1
US20240013640A1 US17/167,963 US202117167963A US2024013640A1 US 20240013640 A1 US20240013640 A1 US 20240013640A1 US 202117167963 A US202117167963 A US 202117167963A US 2024013640 A1 US2024013640 A1 US 2024013640A1
Authority
US
United States
Prior art keywords
property
baseline
audio data
data
sensor data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US17/167,963
Inventor
II Jackie O. Jordan
John Donovan
David Turrentine
Torri Wollenschlager
Bryan R. Nussbaum
Deanna Stockweather
Jeffrey W. Stoiber
Kerstin Markwardt
Gail L. Carlson
Kyle C. Schiebel
Troy Winslow
Joseph P. Harr
Ellakate Wagner
Michael Harris, Jr.
Jennylind Sun
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Farm Mutual Automobile Insurance Co
Original Assignee
State Farm Mutual Automobile Insurance Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Farm Mutual Automobile Insurance Co filed Critical State Farm Mutual Automobile Insurance Co
Priority to US17/167,963 priority Critical patent/US20240013640A1/en
Assigned to STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY reassignment STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DONOVAN, JOHN, CARLSON, GAIL L., JORDAN, JACKIE O., II, NUSSBAUM, BRYAN R., WAGNER, ELLAKATE, SUN, JENNYLIND, TURRENTINE, DAVID, WINSLOW, TROY, MARKWARDT, KERSTIN, WOLLENSCHLAGER, TORRI, HARR, JOSEPH P., HARRIS, MICHAEL, JR., SCHIEBEL, KYLE C., STOCKWEATHER, DEANNA, STOIBER, JEFFREY W.
Publication of US20240013640A1 publication Critical patent/US20240013640A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01CMEASURING DISTANCES, LEVELS OR BEARINGS; SURVEYING; NAVIGATION; GYROSCOPIC INSTRUMENTS; PHOTOGRAMMETRY OR VIDEOGRAMMETRY
    • G01C21/00Navigation; Navigational instruments not provided for in groups G01C1/00 - G01C19/00
    • G01C21/20Instruments for performing navigational calculations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/20Administration of product repair or maintenance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • G06Q50/163Property management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B1/00Systems for signalling characterised solely by the form of transmission of the signal
    • G08B1/02Systems for signalling characterised solely by the form of transmission of the signal using only mechanical transmission
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B17/00Fire alarms; Alarms responsive to explosion
    • G08B17/10Actuation by presence of smoke or gases, e.g. automatic alarm devices for analysing flowing fluid materials by the use of optical means
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0407Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons based on behaviour analysis
    • G08B21/043Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons based on behaviour analysis detecting an emergency event, e.g. a fall
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0446Sensor means for detecting worn on the body to detect changes of posture, e.g. a fall, inclination, acceleration, gait
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0461Sensor means for detecting integrated or attached to an item closely associated with the person but not worn by the person, e.g. chair, walking stick, bed sensor
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/185Electrical failure alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • G08B7/062Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources indicating emergency exits
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • G08B7/066Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources guiding along a path, e.g. evacuation path lighting strip
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2816Controlling appliance services of a home automation network by calling their functionalities
    • H04L12/2818Controlling appliance services of a home automation network by calling their functionalities from a device located outside both the home and the home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network
    • H04L12/2825Reporting to a device located outside the home and the home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/283Processing of data at an internetworking point of a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices
    • H04N23/661Transmitting camera control signals through networks, e.g. control via the Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/024Guidance services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0453Sensor means for detecting worn on the body to detect health condition by physiological monitoring, e.g. electrocardiogram, temperature, breathing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/90Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]

Definitions

  • the present disclosure generally relates to managing a connected property. More particularly, the present disclosure relates to assessing data from smart devices to identify property intrusion events, and facilitating actions to mitigate the property intrusion events.
  • the present embodiments may, inter alia, access certain device data to detect certain conditions within a property, and determine actions or commands to perform to address the conditions. Further, the present embodiments may effectively and efficiently communicate relevant information associated with the conditions and enable users to facilitate the actions or commands.
  • One particular functionality relates to analyzing device data to detect property intrusion events, and then performing actions to mitigate the property intrusion events and/or notifying individuals of the property intrusion events.
  • the present embodiments may relate to (1) home control and/or automation, as well as (2) loss prevention, reduction, and/or mitigation through proactively identifying attempted property intrusion events, notifying an individual of property intrusion events, and/or facilitating commands or actions to mitigate the property intrusion events.
  • the foregoing functionality may also be used by an insurance provider to generate, update, or adjust insurance policies, premiums, rates, discounts, points, and/or rewards, and/or make recommendations to an insured individual.
  • a computer-implemented method of detecting property intrusion within a property may be provided.
  • the property may be populated with a hardware controller in communication with a plurality of sensors disposed within the property.
  • the computer-implemented method may include (1) receiving, by the hardware controller, sensor data from at least one sensor of the plurality of sensors, and/or (2) accessing baseline sensor data corresponding to a set of default intrusion attempts.
  • the computer-implemented method may further include (3) comparing, by one or more processors, the received sensor data to the baseline sensor data including: determining a level of similarity between the received sensor data and the baseline sensor data, and/or determining that the level of similarity meets a threshold value.
  • the computer-implemented method may include (4) responsive to the comparing, generating a notification that indicates a property intrusion event indicated in the received sensor data, and/or (5) communicating the notification to an electronic device of an individual associated with the property to facilitate remotely issuing commands or otherwise mitigating damage associated with, or caused by, the property intrusion event.
  • the method may include additional, less, or alternate actions, including those discussed elsewhere herein.
  • a hardware controller for detecting property intrusion within a property may be provided.
  • the hardware controller may be in communication with a set of devices populated within the property.
  • the hardware controller may include a communication module adapted to interface with the set of devices populated within the property, a memory adapted to store non-transitory computer executable instructions, and/or a processor adapted to interface with the communication module.
  • the processor may configured to execute the non-transitory computer executable instructions to cause the processor to receive, via the communication module, sensor data from at least one device of the set of devices, and/or access baseline sensor data corresponding to a set of default intrusion attempts.
  • the processor may further be configured to compare the received sensor data to the baseline sensor data including: determine a level of similarity between the received sensor data and the baseline sensor data, and/or determine that the level of similarity meets a threshold value. Additionally, the processor may be configured to, responsive to the comparing, generate a notification that indicates a property intrusion event indicated in the received sensor data, and transmit, via the communication module, the notification to an electronic device of an individual associated with the property. The electronic device may allow the individual to select various commands to facilitate mitigation of damage caused by the property intrusion event.
  • the hardware controller and/or processor may be configured to include additional, less, or alternate functionality, including that discussed elsewhere herein.
  • FIG. 1 depicts an exemplary environment including components and entities associated with managing device operation and facilitating insurance policy processing, in accordance with some embodiments.
  • FIG. 2 is an exemplary signal diagram associated with assessing device data to identify property intrusion events and facilitating various actions to mitigate the property intrusion events, in accordance with some embodiments.
  • FIG. 3 is a flow diagram of an exemplary computer-implemented method of assessing device data to identify property intrusion events and facilitating various actions to mitigate the property intrusion events, in accordance with some embodiments.
  • FIG. 4 is a block diagram of an exemplary controller in accordance with some embodiments.
  • FIG. 5 is a block diagram of an exemplary processing server in accordance with some embodiments.
  • FIGS. 6 A and 6 B depict exemplary interfaces associated with notifying of property intrusion events and facilitating various actions to mitigate the property intrusion events, in accordance with some embodiments.
  • the present embodiments may relate to, inter alia, assessing and managing operation of devices or personal property within a home or other type of property, such as household furniture, appliances, electronics, vehicles (e.g., cars, boats, motorcycles), and/or other personal belongings (e.g., clothing, jewelry, antiques).
  • a home or property may have a “smart” central controller that may be wirelessly connected, or connected via hard-wire, with various household related items, devices, and/or sensors.
  • the central controller may be associated with any type of property, such as homes, office buildings, restaurants, farms, and/or other types of properties.
  • the central controller, and/or one or more remote processors or servers associated with an insurance provider or other entity may be in wireless or wired communication with various “smart” items or devices, such as smart appliances (e.g., clothes washer, dryer, dish washer, refrigerator, etc.); smart heating devices (e.g., furnace, space heater, etc.); smart cooling devices (e.g., air conditioning units, fans, ceiling fans, etc.); smart plumbing fixtures (e.g., toilets, showers, water heaters, piping, interior and yard sprinklers, etc.); smart cooking devices (e.g., stoves, ovens, grills, microwaves, etc.); smart wiring, lighting, and lamps; smart personal vehicles; smart thermostats; smart windows, doors, or garage doors; smart window blinds or shutters; and/or other smart devices and/or sensors capable of wireless or wired communication.
  • Each smart device (or sensor associated therewith), as well as the central controller and/or insurance provider remote processor(s) may be equipped with a processor, memory unit, software applications, wireless trans
  • the central controller, and/or insurance provider remote processor(s) may collect or retrieve various data from the devices or personal property, analyze the data, and/or identify various actions to facilitate based upon the analysis.
  • the central controller and/or insurance provider remote processor(s) may receive operation data from the smart devices, where the operation data may include various sensor data associated with the smart devices.
  • the central controller and/or insurance provider remote processor(s) may compare the operation data to baseline sensor data, where the baseline sensor data may correspond to “default” property intrusion attempts or otherwise sensor data that may be consistent with one or more different types of property intrusion attempts. The comparison may indicate a level of similarity between the received sensor data and the baseline sensor data.
  • the central controller and/or insurance provider remote processor(s) may determine that the property may be experiencing a property intrusion, identify a command or action to perform to mitigate the property intrusion, and/or facilitate performance of the command or action.
  • the central controller and/or insurance provider remote processor(s) may communicate with a user device (or mobile device) of an individual associated with the property (e.g., an occupant or owner of the property) to notify the individual of the property intrusion.
  • the individual may use the user device to select various commands or actions to take to facilitate mitigation of the property intrusion.
  • the systems and methods discussed herein address a challenge that is particular to property management.
  • the challenge relates to a difficulty in identifying the occurrence of a property intrusion event associated with a property, as well as a difficulty in mitigating the property intrusion event. This is particularly apparent when the property is unoccupied.
  • Conventional security systems may only activate when a certain condition is triggered. However, these conventional security systems may not account for many of seemingly limitless ways of gaining unlawful access to a property.
  • the present systems and methods leverage sensor data from connected devices to detect and identify certain types of property intrusion events, and/or dynamically identify commands or actions to facilitate to mitigate the property intrusion events. Therefore, because the systems and methods employ the collection and analysis of sensors data associated with connected devices within the property, the systems and methods are necessarily rooted in computer technology in order to overcome the noted shortcomings that specifically arise in the realm of property management.
  • the systems and methods provide improvements in a technical field, namely, home automation and security.
  • the systems and methods employ complex steps that go beyond the mere concept of simply retrieving and combining data using a computer.
  • the hardware components receive data from connected devices, analyze the data in combination with baseline or default data to identify an occurrence of a property intrusion event, determine a command or action to take to mitigate the property intrusion event, facilitate performance of the command or action, and/or notify an individual of a property intrusion event.
  • a central controller in a property retrieves and analyzes sensor data from a plurality of connected devices in the property
  • the central controller and the connected devices are part of a “thin client” environment that improves data persistence and information processing. This combination of elements further impose meaningful limits in that the operations are applied to improve home automation and security by detecting property intrusion events, and/or facilitating mitigating actions in a meaningful and effective way.
  • the systems and methods may support a dynamic, real-time or near-real-time analysis of any received data.
  • the central controller and/or insurance provider may retrieve and/or receive real-time sensor data from the sensors, analyze the sensor data and any baseline data in real time, and dynamically assessing any property intrusion event.
  • the central controller and/or insurance provider may dynamically generate notifications in real-time and communicate the notifications to individuals in real-time. Accordingly, the real-time capability of the systems and methods enable individuals the assurance of real-time property monitoring.
  • the systems and methods offer numerous benefits to property security, as well as to individuals associated with the property.
  • the systems and methods may automatically detect property intrusion events that the individuals may not realize are occurring, and may automatically facilitate preventative or corrective actions to address the events.
  • security associated with the property may improve.
  • the systems and methods improve loss prevention and mitigate actual loss.
  • individuals associated with the property may be able to remotely request certain actions to be performed to mitigate the property intrusion events.
  • the systems and methods may further offer a benefit to insurance providers and customers thereof.
  • the present embodiments may facilitate (a) providing and updating insurance policies; (b) the handling or adjusting of home insurance claims; (c) the disbursement of monies related to insurance claims; (d) modifying insurance coverage amounts; (e) updating and improving damage estimate models, and/or (f) other insurance-related activities.
  • the systems and methods may further offer a benefit to customers by offering improved insurance claim processing.
  • the insurance providers may stand out as a cost-effective insurance provider, thereby retaining existing customers and attracting new customers. It should be appreciated that further benefits to the systems and methods are envisioned.
  • the method may also include adjusting an insurance policy, premium, or discount (such as a homeowners, renters, auto, home, health, or life insurance policy, premium, or discount) based upon the functionality discussed herein, and/or an insured having a home and/or mobile device with such functionality.
  • an insurance policy, premium, or discount such as a homeowners, renters, auto, home, health, or life insurance policy, premium, or discount
  • FIG. 1 depicts an exemplary environment 100 including components and entities for managing devices associated with a property and processing insurance policies associated therewith. Although FIG. 1 depicts certain entities, components, and devices, it should be appreciated that additional, fewer, or alternate entities and components are envisioned.
  • the environment 100 may include a property 105 that contains a controller 120 and a plurality of devices 110 (or smart devices) that may be each connected to a local communication network 115 .
  • Each of the plurality of devices 110 may be a “smart” device that may be configured with one or more sensors capable of sensing and communicating operating data associated with the corresponding device 110 .
  • the plurality of devices 110 may include a smart alarm system 110 a , a smart stove 110 b , and/or a smart washing machine 110 c .
  • Each of the plurality of devices 110 may be located within or proximate to the property 105 (generally, “on premises”).
  • FIG. 1 depicts only one property 105 , it should be appreciated that multiple properties are envisioned, each with its own controller and devices. Further, it should be appreciated that additional, fewer, or alternate devices may be present in the property 105 .
  • the plurality of devices 110 may be purchased from a manufacturer with the “smart” functionally incorporated therein. In other cases, the plurality of devices 110 may have been purchased as “dumb” devices and subsequently modified to add the “smart” functionality to the device. For instance, a homeowner may purchase an alarm system that installs sensors on or near a door to detect when a door has been opened and/or unlocked.
  • the plurality of devices 110 may monitor their own status or condition via the sensors to detect any issues or problems. In response to detecting issues or problems, the plurality of devices 110 may be able to indicate the issues or problems via display components, such as LED lights, display screens, or other visual indicators. In further embodiments, the controller 120 may be configured to monitor, via sensor data, whether the plurality of devices 110 and/or parts thereof have been installed correctly, whether replacement parts are new and/or otherwise in good condition, and/or other conditions associated with the plurality of devices 110 and/or parts thereof.
  • the plurality of devices 110 may be configured to communicate with a controller 120 via the local communication network 115 .
  • the local communication network 115 may facilitate any type of data communication between devices and controllers located on or proximate to the property 105 via any standard or technology (e.g., LAN, WLAN, any IEEE 802 standard including Ethernet, and/or others).
  • the local communication network 115 may further support various short-range communication protocols, such as Bluetooth®, Bluetooth® Low Energy, near field communication (NFC), radio-frequency identification (RFID), and/or other types of short-range protocols.
  • the plurality of devices 110 may transmit, to the controller 120 via the local communication network 115 (and/or to the insurance provider 130 remote processing server 135 via the network 125 ), operational data gathered from sensors associated with the plurality of devices 110 .
  • the operational data may be audio data, image or video data, motion data, status data, usage amounts, and/or other data or information.
  • the operational data may indicate that a window has been shattered; the presence of a person, fire, or water in a room; the sound made near a smart device; and/or other information pertinent to an operation state or status of the plurality of devices 110 .
  • the operational data may include motion data that may indicate whether any individuals are within the property 105 and/or located on the exterior of the property 105 (i.e., whether the property 105 is occupied or unoccupied). Additionally, the operational data may include device usage data. The operational data may include a timestamp representing the time that the operational data was recorded.
  • the plurality of devices 110 may transmit, to the controller 120 (and/or insurance provider 130 remote processing server 135 ), various data and information associated with the plurality of devices 110 .
  • the data and information may include location data within the property, as well as various costs and prices associated with the plurality of devices 110 .
  • a washing machine may include a component such as a data tag that stores a location of the washing machine within the property 105 , a retail price of the washing machine, and/or replacement costs of various parts of (or the entirety of) the washing machine.
  • the various data and information may be programmable and updatable by an individual or automatically by the controller 120 .
  • the controller 120 may be coupled to a database 112 that stores various operational data and information associated with the plurality of devices 110 .
  • FIG. 1 depicts the database 112 as coupled to the controller 120 , it is envisioned that the database 112 may be maintained in the “cloud” such that any element of the environment 100 capable of communicating over either the local network 115 or one or more other networks 125 may directly interact with the database 112 .
  • the database 112 may organize the operational data according to which individual device 110 the data may be associated and/or the room or subsection of the property in which the data was recorded. Further, the database 112 may maintain an inventory list that includes the plurality of devices 110 , as well as various data and information associated with the plurality of devices 110 (e.g., locations, replacement costs, etc.).
  • the database 112 may maintain various operation states of the plurality of devices 110 .
  • the operation states may specify various settings of the plurality of devices 110 such that when the respective device is configured at the setting(s), the respective device will operate in the corresponding operation state.
  • an operation state for a smart thermostat may be “heat conservation” whereby the corresponding setting is 64 degrees (as opposed to a more “normal” 70 degree setting). It should be appreciated that each operation state may specify settings for more than one of the devices 110 .
  • the controller 120 (and/or the plurality of devices 112 ) may be configured to communicate with other components and entities, such as an insurance provider 130 and various third party source(s) 138 via the network(s) 125 .
  • the network(s) 125 may facilitate any data communication between the controller 120 located on the property 105 and entities or individuals remote to the property 105 via any standard or technology (e.g., GSM, CDMA, TDMA, WCDMA, LTE, EDGE, OFDM, GPRS, EV-DO, UWB, IEEE 802 including Ethernet, WiMAX, Wi-Fi, and/or others).
  • GSM Global System for Mobile communications
  • CDMA Code Division Multiple Access
  • TDMA Wideband Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • EDGE OFDM
  • OFDM GPRS
  • EV-DO Universal Mobile communications
  • UWB Universal Mobile communications
  • IEEE 802 including Ethernet, WiMAX, Wi-Fi, and/or others.
  • the insurance provider 130 may be any individual, group of individuals, company, corporation, or other type of entity that may issue insurance policies for customers, such as a home insurance policy associated with the property 105 .
  • the insurance provider 130 may include one or more processing server(s) 135 configured to facilitate the functionalities as discussed herein.
  • FIG. 1 depicts the processing server 135 as a part of the insurance provider 130 , it should be appreciated that the processing server 135 may be separate from (and connected to or accessible by) the insurance provider 130 .
  • the present disclosure describes the systems and methods as being facilitated in part by the insurance provider 130 , it should be appreciated that other non-insurance related entities may implement the systems and methods.
  • a general contractor may aggregate the insurance-risk data across many properties to determine which appliances or products provide the best protection against specific causes of loss, and/or deploy the appliances or products based upon where causes of loss are most likely to occur. Accordingly, it may not be necessary for the property 105 to have an associated insurance policy for the property owners to enjoy the benefits of the systems and methods.
  • the third-party source(s) 138 may represent any entity or component that is configured to obtain, detect, and/or determine data or information that may be relevant to the devices 110 of the property 105 .
  • the third-party source(s) 138 may be a manufacturer, supplier, servicer, or retailer of the any of the devices 110 , as well as for replacement devices for the devices 110 .
  • the third-party source 138 may be refrigerator manufacturer that sells refrigerators of the same or different types or models as the refrigerator device 110 .
  • the third-party source(s) 138 may store data associated with a replacement device (e.g., cost, retail location, general information, availability, or the like).
  • the third-party source(s) 138 may store baseline data associated with various types of property intrusion attempts.
  • the third-party source(s) 138 may be configured to communicate various data or information to the controller 120 and/or to the insurance provider 130 via the network(s) 125 , whereby the controller 120 and/or the insurance provider 130 may examine the data or information to facilitate various functionalities.
  • the controller 120 , the insurance provider 130 and/or the processing server 135 , and the third-party source(s) 138 may also be in communication, via the network(s) 125 , with an electronic device 145 associated with an individual 140 .
  • the individual 140 may have an insurance policy (e.g., a home insurance policy) for the property 105 or a portion of the property 105 , or may otherwise be associated with the property 105 (e.g., the individual 140 may live in the property 105 ).
  • an insurance policy e.g., a home insurance policy
  • the electronic device 145 may be a mobile device, such as a smartphone, a desktop computer, a laptop, a tablet, a phablet, a smart watch, smart glasses, wearable electronics, pager, personal digital assistant, or any other electronic device, including computing devices configured for wireless radio frequency (RF) communication and data transmission.
  • the controller 120 and/or insurance provider 130 remote processing server 135
  • the controller 120 (and/or insurance provider 130 remote processing server 135 ) may enable the individual 140 to remotely control various of the plurality of devices 110 via the electronic device 145 .
  • the controller 120 may analyze sensor data from any of the plurality of devices 110 to detect property intrusion attempts associated with the property 105 .
  • the controller 120 and/or insurance provider 130 remote processing server 135 ) may generate notifications or alerts associated with the detected property intrusion attempts, and/or communicate the notifications or alerts to the electronic device 145 via the network 125 .
  • the controller 120 and/or insurance provider 130 remote processing server 135 ) may detect any damage to the plurality of devices 110 and/or to other portions of the property 105 , and may generate a proposed insurance claim that indicates the damage and transmit, via the network 125 , the proposed insurance claim related to the electronic device 145 .
  • the proposed insurance claim may contain pre-populated fields that indicate various information and data, such as causes of loss (e.g., water, wind, fire, intrusion, etc.); damaged devices; costs associated with the damaged devices; time, date, and/or location of the insurance-related event; and/or other information included in an insurance claim.
  • causes of loss e.g., water, wind, fire, intrusion, etc.
  • damaged devices e.g., water, wind, fire, intrusion, etc.
  • costs associated with the damaged devices e.g., time, date, and/or location of the insurance-related event; and/or other information included in an insurance claim.
  • the controller 120 (and/or insurance provider 130 remote processing server 135 ) may also transmit any modifications to insurance policies based upon detected data from the plurality of devices 110 .
  • the homeowner 140 may accept the proposed insurance claim or make modifications to the proposed insurance claim, and/or otherwise accept/reject any modifications to the insurance policy.
  • the electronic device may transmit, via the network 125 , the accepted or modified insurance claim back to the controller 120 (and/or insurance provider 130 remote processing server 135 ).
  • the controller 120 may facilitate any processing of the insurance claim with the processing server 135 of the insurance provider 130 . Additionally or alternatively, the processing server 135 may facilitate the proposed insurance claim communications and processing directly with the customer 140 . In some implementations, the insurance provider 130 remote processing server 135 may provide the same functionality as that described herein with respect to the controller 120 .
  • FIG. 2 illustrated is an exemplary signal diagram 200 associated with collecting smart device data and facilitating various functionalities relating thereto.
  • FIG. 2 may include a set of smart devices 210 (such as the smart devices 110 (or one of the plurality of devices) as discussed with respect to FIG. 1 ), a controller 220 (such as the controller 120 as discussed with respect to FIG. 1 ), a processing server 235 (such as the processing server 135 as discussed with respect to FIG. 1 ), and/or a user device 245 (such as the user device 145 as discussed with respect to FIG. 1 ).
  • a set of smart devices 210 such as the smart devices 110 (or one of the plurality of devices) as discussed with respect to FIG. 1
  • a controller 220 such as the controller 120 as discussed with respect to FIG. 1
  • a processing server 235 such as the processing server 135 as discussed with respect to FIG. 1
  • a user device 245 such as the user device 145 as discussed with respect to FIG. 1 ).
  • the smart devices 210 and the controller 220 may be located within a property 205 (such as the property 105 as discussed with respect to FIG. 1 ).
  • the user device 245 may belong to an individual associated with the property 205 , such as a resident of the property 205 and/or an individual having an insurance policy for the property 205 .
  • the signal diagram 200 may begin when the controller 220 optionally requests ( 250 ) the smart devices 210 for sensor data.
  • the controller 220 may periodically request the smart devices 210 for sensor data, or the controller 220 may request the smart devices 210 for sensor data in response to various triggers (e.g., at a certain time of the day or in response to receiving particular sensor data from a particular smart device 210 ).
  • the controller 220 may also request sensor data from one or more specific smart devices 210 .
  • the smart device(s) 210 may provide ( 252 ) sensor data to the controller 220 .
  • the sensor data may be audio data, imaging data (e.g., images and/or videos), and/or motion/movement sensor data.
  • the smart device(s) 210 may provide the sensor data automatically as the data is detected, in response to receiving a request from the controller 220 , or in response to various triggers (e.g., detected motion data at 3:00 AM).
  • the controller 220 may analyze the sensor data to identify ( 254 ) an event or occurrence and a type of event/occurrence that is indicated in the sensor data.
  • the event may be an intrusion attempt by an individual or group of individuals, and the type of event may correspond to how the intrusion is being attempted or performed.
  • the individual(s) may attempt to break down/enter through a door or break/enter through a window, or may survey the property for a point of entry. It should be appreciated that other types of intrusion attempts are envisioned, and the sensor data may indicate the attempt at different progress points (e.g., initial surveying or completed entry).
  • the controller 220 may account for a status or condition of the property (e.g., occupied or unoccupied) when the sensor data is detected/received. Accordingly, the controller 220 may analyze various combinations of sensor data from various combinations of the smart devices 210 to identify the event and the type of event.
  • a status or condition of the property e.g., occupied or unoccupied
  • the controller 220 may access ( 256 ) baseline data that corresponds to the type of event indicated in the sensor data.
  • the controller 220 may locally store the baseline data in memory.
  • the baseline data may indicate various “default” intrusion attempts, which may include sensor data associated with actual intrusion attempts, or generated data associated with staged/simulated intrusion attempts. For example, if the sensor data is audio data that corresponds to a front door being broken down, the controller 220 may access baseline data associated with an actual instance of door being broken down or staged/simulated audio data that simulates a door being broken down.
  • the controller 220 may access general baseline motion sensor data consistent with surveying of a property for an entry point (which may be data of an actual surveying of a property, or data that is generated to mimic or enact a surveying of a property). In an optional implementation, such as if the controller 220 does not locally store the baseline data, the controller 220 may retrieve ( 258 ) the baseline data from the processing server 235 .
  • the controller 220 may compare ( 260 ) the received sensor data to the baseline data. In some implementations, the controller 220 may determine a level of similarity between the received sensor data and the baseline data. In comparing the received sensor data to the baseline data, the controller 220 may compare a relevant portion of the received sensor data to a relevant portion of the baseline data. For example, if the received sensor data is audio data, the controller 220 may compare a portion of the audio data that corresponds to a window breaking to baseline data of a window breaking. In determining the level of similarity, the controller 220 may calculate a similarity percentage (e.g., 75% similar) or other parameter that may indicate similarity using various calculations, algorithms, data models, techniques, and/or the like.
  • a similarity percentage e.g., 75% similar
  • the controller 220 may also determine ( 262 ) if an intrusion event is being attempted or performed based upon the comparison. In one implementation, if the level of similarity between the received sensor data and the baseline data meets or exceeds a threshold value, then the controller 220 may deem that there is an intrusion event being attempted or performed. Similarly, if the level of similarity between the received sensor data and the baseline data does not meet or exceed a threshold value, then the controller 220 may deem that there is not an intrusion event being attempted or performed.
  • the controller 220 may deem that the received sensor data (one “thud” sound) is not consistent with an intrusion attempt.
  • the threshold value may be a percentage on a scale from 0% to 100%, or other numeric parameter on a scale, and/or may be a default value or manually set by a user or administrator (such as the individual associated with the property).
  • the lower (or higher) the threshold the more (or less) “sensitive” the intrusion detection. Accordingly, the lower (or higher) the threshold, the greater (or lesser) chance there is of the controller 220 detecting a “false alarm.”
  • the controller 220 may use various techniques, calculations, algorithms, models, and the like to analyze the received sensor data and compare the received sensor data to the baseline data.
  • controller 220 determines that there is not an intrusion event (i.e., the level of similarity does not meet or exceed the threshold; “NO”), then processing may end or proceed to any other functionality. In contrast, if the controller 220 determines that there is an intrusion event (i.e., the level of similarity does meet or exceed the threshold; “YES”), then the controller 220 may generate ( 264 ) a notification that indicates the intrusion event and that may include any information related to the intrusion event.
  • the notification may include the type of intrusion event (e.g., an alarm disarmament, breaking/entering through a window), a time of the detected intrusion event, current sensor data indicating the intrusion event, and/or any other information that is relevant to the intrusion event.
  • the type of intrusion event e.g., an alarm disarmament, breaking/entering through a window
  • a time of the detected intrusion event e.g., breaking/entering through a window
  • current sensor data indicating the intrusion event e.g., current sensor data indicating the intrusion event
  • the controller 220 may also determine ( 265 ) a mitigating action or command to perform to mitigate the intrusion event. In particular, the controller 220 may make the determination based upon the type of intrusion event and/or the sensor data associated therewith. The controller 220 may also identify an appropriate smart device 210 that may be used to perform or facilitate the mitigating action. For example, if the controller 220 determines that an intrusion is being attempted via the garage of the property 205 , the controller 220 may determine that the mitigating action is to turn on all of the lights within the garage, whereby the lights within the garage are the identified smart devices 210 . For further example, if the controller 220 determines that a window has been broken, the controller 220 may determine to activate the alarm and notify the proper law enforcement.
  • the controller 220 may communicate ( 266 ) the notification generated in ( 264 ) to the user device 245 .
  • the notification may include a selectable option that enables the user of the user device 245 to facilitate an action within the property 205 , such as the mitigating action determined in ( 265 ).
  • the action may be any action that is controller 220 is capable of facilitating, and it may be associated with operation of one or more of the smart devices 210 . Further, the action may be associated with the detected intrusion event. For example, if the intrusion event is an input of an incorrect door lock code, then the option may enable the user to select to activate the alarm.
  • the user may select the option and the user device 245 may send ( 268 ) a request to the controller 220 to facilitate the mitigating action with an appropriate smart device 210 .
  • the user device 245 may perform the mitigating action without interfacing with the controller 220 , such as notifying law enforcement of the identified intrusion attempt.
  • the controller 220 may send ( 270 ) a command to perform a mitigating action to the appropriate smart device 210 .
  • the appropriate smart device 210 may perform ( 272 ) the mitigating action in an attempt to stop or slow the intrusion attempt, or otherwise mitigate any effect of the intrusion attempt. It should be appreciated that the controller 220 may automatically send the command to perform the mitigating action and/or may send the command to perform the mitigating action in response to receiving the request from the user device 245 .
  • the controller 220 , the user device 245 , and/or the processing server 235 may perform any insurance processing that may result from the detected or analyzed sensor data.
  • the sensor data may indicate damage to the property 205 itself or damage to any of the smart devices 210 , which may necessitate an insurance claim associated with an insurance policy for the property 205 .
  • the controller 220 may provide any relevant data to the processing server 235 , which may process a proposed insurance claim and communicate the proposed insurance claim directly to the user device 245 .
  • the customer may use the user device 245 to request any insurance processing that may result from any detected data or events associated with the property 205 .
  • FIG. 2 depicts the controller 220 performing various steps and determinations
  • the processing server 235 may perform the same or similar steps or determinations.
  • the processing server 235 may receive the sensor data, compare the sensor data to baseline data, generate a notification, communicate a notification, determine a mitigating action, and/or facilitate the mitigating action.
  • FIG. 3 depicted is a block diagram of an exemplary computer-implemented method 300 of processing sensor data to detect an attempted property intrusion within a property.
  • the method 300 may be facilitated by an electronic device within the property, such as the controller 120 as discussed with respect to FIG. 1 , that may be in direct or indirect communication with an insurance provider (such as the insurance provider 130 as discussed with respect to FIG. 1 or a remote processor or server thereof).
  • an insurance provider such as the insurance provider 130 as discussed with respect to FIG. 1 or a remote processor or server thereof.
  • the method 300 may begin when the controller receives (block 305 ) sensor data from at least one sensor disposed within the property.
  • the sensor may include any type of audio sensor (e.g., a microphone), imaging sensor (e.g., digital camera, video camera, etc.), motion sensor, or any other sensor referenced herein.
  • the controller may examine the received sensor data to identify a type of property intrusion event included in the received sensor data. In some implementations, there may be different types of intrusion events that may have different types of associated sensor data.
  • an intruder's attempt to break into a house may be detected using audio data that indicates broken glass or a loud banging against a door.
  • another attempt to break into a house may be detected using motion sense data during a specific time period, such as in the middle of the night.
  • the controller may access (block 315 ) baseline sensor data corresponding to a set of default intrusion attempts.
  • the controller may access baseline sensor data that corresponds to the type of intrusion event identified in block 310 .
  • the controller may access baseline audio data including sample audio of actual or simulated intrusion attempts of various types.
  • the controller may determine (block 320 ) a level of similarity between the received sensor data and the baseline sensor data. It should be appreciated that the controller may use any type of technique, calculation, data model, or algorithm to determine the level of similarity.
  • the level of similarly may include a quantitative indicator, for example a number from 1-100, with the greater the number indicating the greater similarity between the received sensor data and the baseline sensor data.
  • the controller may determine (block 325 ) whether the level of similarity meets or exceeds a threshold value. It should be appreciated that different threshold values are envisioned. For example, if the level of similarity determined in block 315 is quantified as 90 and the threshold value is 85, then the level of similarity exceeds the threshold value. If the level of similarity does not exceed the threshold value (“NO”), processing may end or proceed to other functionality. If the level of similarity does exceed the threshold value (“YES”), then the controller may generate (block 330 ) a notification that indicates the property intrusion event.
  • the notification may include various information associated with the property intrusion event, such as an area of the property corresponding to the property intrusion event, as well as other information such as a timestamp, the type of sensor data detected, and/or other information.
  • the controller may identify an action to perform to mitigate the property intrusion event.
  • the controller may communicate (block 335 ) the notification to an electronic device of an individual associated with the property, such as via an external network and/or wireless communication and data transmission.
  • the controller may store an identification of the electronic device.
  • the electronic device may be a smartphone or other mobile device belonging to the owner and/or occupant of the property.
  • the controller may communicate the notification to the insurance provider. The notification may enable the individual to request that an action to mitigate the property intrusion attempt be performed.
  • the controller may facilitate performing the identified action to mitigate the property intrusion event.
  • the controller may activate (block 340 ) an alarm within the property.
  • the alarm may alert any occupants of the property of the intrusion event.
  • the controller may also optionally communicate (block 345 ) the notification to a law enforcement entity, such as a police station, or to a security service.
  • the controller may optionally activate (block 350 ) a set of lights within the property.
  • the set of lights may be specific to an area of the property where the intrusion event is detected. It should be appreciated that the controller may identify and/or perform other actions to mitigate any detected property intrusion event.
  • FIG. 4 illustrates a diagram of an exemplary controller 420 (such as the controller 120 discussed with respect to FIG. 1 ) in which the functionalities as discussed herein may be implemented. It should be appreciated that the controller 420 may be associated with a property, as discussed herein.
  • the controller 420 may include a processor 422 , as well as a memory 478 .
  • the memory 478 may store an operating system 479 capable of facilitating the functionalities as discussed herein, as well as a set of applications 475 (i.e., machine readable instructions).
  • one of the set of applications 475 may be an intrusion detection application 484 configured to analyze sensor data, detect property intrusion events, and facilitate actions to mitigate the property intrusion events.
  • the set of applications 475 may also include one or more other applications 484 , such as an insurance processing application.
  • the processor 422 may interface with the memory 478 to execute the operating system 479 and the set of applications 475 .
  • the memory 478 may also include a data record storage 480 that stores various data, such as baseline data corresponding to a set of default intrusion attempts.
  • the intrusion detection application 484 may interface with the data record storage 480 to retrieve relevant baseline data that the intrusion detection application 484 may use to identify property intrusion events.
  • the memory 478 may include one or more forms of volatile and/or non-volatile, fixed and/or removable memory, such as read-only memory (ROM), electronic programmable read-only memory (EPROM), random access memory (RAM), erasable electronic programmable read-only memory (EEPROM), and/or other hard drives, flash memory, MicroSD cards, and others.
  • ROM read-only memory
  • EPROM electronic programmable read-only memory
  • RAM random access memory
  • EEPROM erasable electronic programmable read-only memory
  • other hard drives flash memory, MicroSD cards, and others.
  • the controller 420 may further include a communication module 477 configured to communicate data via one or more networks 425 .
  • the communication module 477 may include one or more transceivers (e.g., WWAN, WLAN, and/or WPAN transceivers) functioning in accordance with IEEE standards, 3GPP standards, or other standards, and/or configured to receive and transmit data via one or more external ports 476 .
  • the communication module 477 may include a short-range network component (e.g., an RFID reader) configured for short-range network communications. For instance, the communication module 477 may receive, via the network 425 , sensor data from a plurality of devices populated within a property.
  • the controller 420 may further include a user interface 481 configured to present information to a user and/or receive inputs from the user.
  • the user interface 481 may include a display screen 482 and I/O components 483 (e.g., ports, capacitive or resistive touch sensitive input panels, keys, buttons, lights, LEDs, speakers, microphones).
  • the user may access the controller 420 via the user interface 481 to assess sensor data, process insurance policies, and/or perform other functions.
  • the controller 420 may be configured to perform insurance-related functions, such as generating proposed insurance claims and facilitating insurance claim processing.
  • the controller 420 may perform the functionalities as discussed herein as part of a “cloud” network or may otherwise communicate with other hardware or software components within the cloud to send, retrieve, and/or otherwise analyze data.
  • a computer program product in accordance with an embodiment may include a computer usable storage medium (e.g., standard random access memory (RAM), an optical disc, a universal serial bus (USB) drive, or the like) having computer-readable program code embodied therein, wherein the computer-readable program code may be adapted to be executed by the processor 422 (e.g., working in connection with the operating system 479 ) to facilitate the functions as described herein.
  • the program code may be implemented in any desired language, and may be implemented as machine code, assembly code, byte code, interpretable source code or the like (e.g., via C, C++, Java, Actionscript, Objective-C, Javascript, CSS, XML).
  • the computer program product may be part of a cloud network of resources.
  • FIG. 5 illustrates a diagram of an exemplary processing server 535 (such as the processing server 135 discussed with respect to FIG. 1 ) in which the functionalities as discussed herein may be implemented. It should be appreciated that the processing server 535 may be associated with an insurance provider, as discussed herein. In one embodiment, the processing server may be configured with the same functionality as that of the controllers 120 , 220 of FIGS. 1 and 2 , respectively.
  • the processing server 535 may include a processor 522 , as well as a memory 578 .
  • the memory 578 may store an operating system 579 capable of facilitating the functionalities as discussed herein, as well as a set of applications 575 (i.e., machine readable instructions).
  • one of the set of applications 575 may be a policy processing application 584 configured to manage customer insurance policies.
  • other applications 590 are envisioned, such as an intrusion detection application configured to assess sensor data and identify property intrusion events, and/or respond to those events identified.
  • the processor 522 may interface with the memory 578 to execute the operating system 579 and the set of applications 575 .
  • the memory 578 may also include a data record storage 580 that stores various information associated with customer insurance policies as well as baseline data corresponding to a set of default intrusion attempts.
  • the policy processing application 584 may interface with the data record storage 580 to retrieve relevant information that the policy processing application 584 may use to manage insurance policies, generate notifications, and/or perform other functionalities, such as identify property intrusion events.
  • the device replacement application may interface with the data record storage 580 to retrieve device information.
  • the memory 578 may include one or more forms of volatile and/or non-volatile, fixed and/or removable memory, such as read-only memory (ROM), electronic programmable read-only memory (EPROM), random access memory (RAM), erasable electronic programmable read-only memory (EEPROM), and/or other hard drives, flash memory, MicroSD cards, and others.
  • ROM read-only memory
  • EPROM electronic programmable read-only memory
  • RAM random access memory
  • EEPROM erasable electronic programmable read-only memory
  • other hard drives flash memory, MicroSD cards, and others.
  • the processing server 535 may further include a communication module 577 configured to communicate data via one or more networks 525 .
  • the communication module 577 may include one or more transceivers (e.g., WWAN, WLAN, and/or WPAN transceivers) functioning in accordance with IEEE standards, 3GPP standards, or other standards, and/or configured to receive and transmit data via one or more external ports 576 .
  • the communication module 577 may transmit, via the network 525 , baseline data corresponding to a set of default intrusion attempts.
  • the processing server 525 may further include a user interface 581 configured to present information to a user and/or receive inputs from the user.
  • the user interface 581 may include a display screen 582 and I/O components 583 (e.g., ports, capacitive or resistive touch sensitive input panels, keys, buttons, lights, LEDs, speakers, microphones).
  • the user may access the processing server 535 via the user interface 581 to process insurance policies and/or perform other functions.
  • the processing server 535 may perform the functionalities as discussed herein as part of a “cloud” network or may otherwise communicate with other hardware or software components within the cloud to send, retrieve, and/or otherwise analyze data.
  • a computer program product in accordance with an embodiment may include a computer usable storage medium (e.g., standard random access memory (RAM), an optical disc, a universal serial bus (USB) drive, or the like) having computer-readable program code embodied therein, wherein the computer-readable program code may be adapted to be executed by the processor 522 (e.g., working in connection with the operating system 579 ) to facilitate the functions as described herein.
  • the program code may be implemented in any desired language, and may be implemented as machine code, assembly code, byte code, interpretable source code or the like (e.g., via C, C++, Java, Actionscript, Objective-C, Javascript, CSS, XML).
  • the computer program product may be part of a cloud network of resources.
  • FIGS. 6 A and 6 B illustrate exemplary interfaces associated with example commands, displays, and actions for smart devices.
  • An electronic device e.g., a mobile device, such as a smartphone
  • a dedicated application associated with an insurance provider (or with a controller) and that is configured to operate on the electronic device may display the interfaces.
  • the interfaces are merely examples and that alternative or additional content is envisioned.
  • FIG. 6 A illustrates an interface 650 including details related to a detected property intrusion event.
  • the interface 650 may include an alert that details the property intrusion attempt, namely that the controller detected noises on a property of an individual that were consistent with a break-in attempt.
  • the interface 650 may further indicate any mitigating actions that the controller has performed in response to detecting the property intrusion event.
  • the interface 650 indicates that the on-site alarm of the property was activated and that proper authorities (e.g., police) were notified.
  • the interface 650 includes an “OK” selection 652 that enables the user to select to dismiss the interface 650 .
  • FIG. 6 B illustrates an additional interface 655 including details related to another detected property intrusion event.
  • the interface 655 may include an alert that details the property intrusion attempt, namely that the controller detected movement outside a property and also that the front door to the property is unlocked.
  • the interface 655 may further identify an action that may be performed to mitigate the property intrusion event, namely to lock the front door.
  • the interface 655 enables the user to select whether perform the action via a “NO” selection 656 and a “YES” selection 657 . If the user selects the “NO” selection 656 , the electronic device may dismiss the interface 655 . If the user selects the “YES” selection 657 , the electronic device may transmit a request to the controller to facilitate performing the action.
  • a computer-implemented method of detecting property intrusion within a property may be provided.
  • the property may be populated with a hardware controller in communication with a plurality of sensors disposed within the property.
  • the method may include (1) receiving, by the hardware controller, sensor data from at least one sensor of the plurality of sensors; (2) accessing baseline sensor data corresponding to a set of default intrusion attempts; (3) comparing, by one or more processors, the received sensor data to the baseline sensor data including: (i) determining a level of similarity between the received sensor data and the baseline sensor data, and (ii) determining that the level of similarity meets a threshold value; (4) responsive to the comparing, generating a notification that indicates a property intrusion event indicated in the received sensor data; and/or (5) communicating the notification to an electronic device of an individual associated with the property to facilitate mitigating damage to the property resulting from the property intrusion event and/or otherwise taking corrective action(s).
  • the method may include additional, less, or alternate actions, including those discussed elsewhere herein
  • the computer-implemented method may include (1) analyzing the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) accessing at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) comparing the received sensor data to the at least the portion of the baseline sensor data.
  • the computer-implemented method may further include: responsive to the comparing, activating an alarm within the property. In another implementation, the computer-implemented method may further include: responsive to the comparing, communicating the notification to a law enforcement entity or security service.
  • the computer-implemented method may further include: (1) identifying an area of the property corresponding to the received sensor data; and/or (2) responsive to the comparing, activating a set of lights or audible alarms associated with the area of the property.
  • the computer-implemented method may include receiving audio data from a microphone disposed within the property. In other scenarios, to receive the sensor data from the at least one sensor, the computer-implemented method may include receiving motion sensor data from a motion sensor disposed within the property. In further scenarios, to receive the sensor data from the at least one sensor, the computer-implemented method may include receiving digital image data from an image sensor disposed within the property.
  • the computer-implemented method may include: (1) analyzing the received sensor data to identify a type of the property intrusion event indicated in the received sensor data; (2) sending a request to a back-end server to access at least a portion of the baseline sensor data corresponding to the type of the property intrusion event; and/or (3) receiving, from the back-end server, the at least the portion of the baseline sensor data.
  • the computer-implemented method may include: calculating a similarity percentage between the received sensor data and the baseline sensor data.
  • a hardware controller for detecting property intrusion within a property may be provided.
  • the hardware controller may be in communication with a set of devices populated within the property.
  • the hardware controller may include a communication module adapted to interface with the set of devices populated within the property, a memory adapted to store non-transitory computer executable instructions, and/or a processor adapted to interface with the communication module.
  • the processor may be configured to execute the non-transitory computer executable instructions to cause the processor to (1) receive, via the communication module, sensor data from at least one device of the set of devices, (2) access baseline sensor data corresponding to a set of default intrusion attempts, (3) compare the received sensor data to the baseline sensor data including: (i) determine a level of similarity between the received sensor data and the baseline sensor data, and/or (ii) determine that the level of similarity meets a threshold value, (4) responsive to the comparing, generate a notification that indicates a property intrusion event indicated in the received sensor data, and/or (5) transmit, via the communication module, the notification to an electronic device of an individual associated with the property to facilitate taking corrective actions in response to the intrusion event and/or otherwise mitigating damage caused by the intrusion event.
  • the hardware controller and/or processor may include additional, less, or alternate functionality, including that discussed elsewhere herein.
  • the processor may be configured to (1) analyze the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) access, from the memory, at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) compare the received sensor data to the at least the portion of the baseline sensor data.
  • the processor may be further configured to: responsive to the comparing, activate a visible, audible, or other type of alarm within the property. In another implementation, the processor may be further configured to: responsive to the comparing, transmit the notification to a law enforcement entity or security service via the communication module.
  • the processor may be further configured to: (1) identify an area of the property corresponding to the received sensor data, and/or (2) responsive to the comparing, activate a set of lights associated with the area of the property.
  • the processor may be configured to: receive, via the communication module, audio data from a microphone disposed within the property.
  • the processor may be configured to: receive, via the communication module, motion sensor data from a motion sensor disposed within the property.
  • the processor may be configured to: receive, via the communication module, digital image data from an image sensor disposed within the property.
  • the processor may be configured to: (1) analyze the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) send a request to a back-end server to access at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) receive, from the back-end server, the at least the portion of the baseline sensor data.
  • the processor may be configured to: calculate a similarity percentage between the received sensor data and the baseline sensor data.
  • one or more of smart devices may be configured to gather audio and/or visual data that may indicate an intrusion attempt on a property. These devices may gather the audio and/or visual data and send the data to the home controller, and/or the insurance provider remote processing server, whereby the controller, and/or the insurance provider remote processing server, respectively, may analyze the data and determine whether there is a likelihood of an intrusion event.
  • the controller, and/or the insurance provider remote processing server may analyze the data by comparing the data to baseline data that may correspond to certain indications of an intrusion event.
  • the baseline data may include sample audio of someone attempting to kick down a door. If the sensed audio data is similar to the sample audio, the controller, and/or the insurance provider remote processing server, may determine that someone is attempting to kick down a door to the property.
  • the controller, and/or the insurance provider remote processing server may generate any necessary notification(s) of the event and communicate the notification(s) to the individual, and/or take other corrective actions—sound alarms, notify police or neighbors, turn on lights, etc.
  • the methods of smart home control and/or automation detailed elsewhere herein may also include actions directed to home security and/or monitoring.
  • the wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may indicate or relate to neighborhood security.
  • the smart home controller or remote processor may identify suspicious behavior and/or unexpected persons in the vicinity of the insured home or a yard of the insured home (such as via facial recognition techniques).
  • the wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may indicate or relate to sound. Based upon the analysis by the smart home controller or remote processor of the wired or wireless communication or data transmission, and/or data received, the smart home controller or remote processor may determine a suspicious and/or unexpected sound within, or in the vicinity of, the insured home (e.g., window breaking, door being forced open, person screaming, dog barking, etc.), and/or generate and transmit a notification or wireless communication to the insured and/or authorities of a potential home security issue.
  • a suspicious and/or unexpected sound within, or in the vicinity of, the insured home (e.g., window breaking, door being forced open, person screaming, dog barking, etc.), and/or generate and transmit a notification or wireless communication to the insured and/or authorities of a potential home security issue.
  • the wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may be generated or collected by a smart pet collar and/or a smart device located on a smart or other pet collar (e.g., dog or cat collar).
  • the data may be generated or collected by the smart pet collar as a dog or cat (or other pet or animal) moves about the insured home or a yard of the insured home.
  • the wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may be generated or collected by one or more UAVs (unmanned aerial vehicles or small drones) that fly around the exterior of and/or within the interior of the insured home.
  • the smart home controller or remote processor may control or direct the movement or deployment of the one or more UAVs to automatically gather data about conditions of the insured home when the insured home is unoccupied or has been unoccupied for a given period of time such that damage caused by insurance-related events, or potential insurance-related events, to insured homes that have been left unoccupied for extended periods is mitigated or prevented.
  • the data received may be gathered or collected by smart home controllers, cameras mounted about a home, one or more mobile devices, and/or one or more automated smart devices (e.g., robots, drones) having cameras or sensors and that automatically move about an insured home.
  • smart home controllers cameras mounted about a home
  • mobile devices e.g., a smart home controller
  • automated smart devices e.g., robots, drones
  • data may be collected by one or more smart devices, which may include smart sensors, smart visual or audio recording equipment, smart cameras, security systems, smart drones, smart robots, and/or smart pet collars.
  • the mobile device may include a smart phone, laptop, tablet, phablet, netbook, notebook, smart glasses, wearable electronic device, smart watch, smart contact lenses, pager, personal digital assistant (PDA), smart pet collar, or other computing device.
  • the smart devices or mobile device may include one or more processors and transceivers, and may be configured for wired or wireless communication (including two-way radio frequency (RF) communication), such as with a smart home controller or an insurance provider remote processor or server.
  • RF radio frequency
  • the smart home controller or insurance provider remote processor or server may generate, update, or adjust an insurance policy, premium, rate, or discount based upon the insurance-related event or wired or wireless communication, data transmission, or data received, such as generating, updating, or adjusting an insurance policy covering or associated with the insured, insured home, or items within the insured home or belonging to the insured.
  • the term “smart” may refer to devices, sensors, or appliances located within or proximate to a property, and with the ability to communicate information about the status of the device, sensor, or appliance and/or receive instructions that control the operation of the device, sensor, or appliance.
  • a smart thermostat may be able to remotely communicate the current temperature of the home and receive instructions to adjust the temperature to a new level.
  • a smart water tank may be able to remotely communicate the water level contained therein and receive instructions to restrict the flow of water leaving the tank.
  • “dumb” devices, sensors, or appliances located within or proximate to a property require manual control (as compared to automatic or semi-automatic or processor control associated with smart devices).
  • a person would have to manually interact with the thermostat. As such, a person is unable to use a communication network to remotely adjust a “dumb” device, sensor, or appliance.
  • a “smart device” as used herein may refer to any of a smart device, sensor, appliance, and/or other smart equipment that may be located (or disposed) within or proximate to a property. In some embodiments in which an appliance and a sensor external to the particular appliance are associated with each other, “smart device” may refer to both the external sensors and the appliance collectively.
  • Some exemplary devices that may be “smart devices” are, without limitation, valves, piping, clothes washers/dryers, dish washers, refrigerators, sprinkler systems, toilets, showers, sinks, soil monitors, doors, locks, windows, shutters, ovens, grills, fire places, furnaces, lighting, sump pumps, security cameras, and alarm systems.
  • an individual associated with the property shall be referred to as the “homeowner,” “property owner,” or “policyholder,” but it is also envisioned that the individual is a family member of the homeowner, a person renting/subletting the property, a person living or working on the property, a neighbor of the property, or any other individual that may have an interest in preventing or mitigating damage to the property.
  • any reference to “home” or “property” is meant to be exemplary and not limiting.
  • the systems and methods described herein may be applied to any property, such as offices, farms, lots, parks, and/or other types of properties or buildings. Accordingly, “homeowner” may be used interchangeably with “property owner.”
  • an insurance customer may opt-in to a rewards, insurance discount, or other type of program.
  • an insurance provider remote server may collect data from the customer's mobile device, smart home controller, or other smart devices—such as with the customer's permission.
  • the data collected may be related to insured assets before (and/or after) an insurance-related event, including those events discussed elsewhere herein.
  • risk averse insureds, home owners, or home or apartment occupants may receive discounts or insurance cost savings related to home, renters, personal articles, auto, and other types of insurance from the insurance provider.
  • smart or interconnected home data, and/or other data may be collected or received by an insurance provider remote server, such as via direct or indirect wireless communication or data transmission from a smart home controller, mobile device, or other customer computing device, after a customer affirmatively consents or otherwise opts-in to an insurance discount, reward, or other program.
  • the insurance provider may then analyze the data received with the customer's permission to provide benefits to the customer.
  • risk averse customers may receive insurance discounts or other insurance cost savings based upon data that reflects low risk behavior and/or technology that mitigates or prevents risk to (i) insured assets, such as homes, personal belongings, or vehicles, and/or (ii) home or apartment occupants.
  • routines, subroutines, applications, or instructions may constitute either software (e.g., code embodied on a non-transitory, machine-readable medium) or hardware.
  • routines, etc. are tangible units capable of performing certain operations and may be configured or arranged in a certain manner.
  • one or more computer systems e.g., a standalone, client or server computer system
  • one or more hardware modules of a computer system e.g., a processor or a group of processors
  • software e.g., an application or application portion
  • a hardware module may be implemented mechanically or electronically.
  • a hardware module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations.
  • a hardware module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
  • the term “hardware module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein.
  • hardware modules are temporarily configured (e.g., programmed)
  • each of the hardware modules need not be configured or instantiated at any one instance in time.
  • the hardware modules comprise a general-purpose processor configured using software
  • the general-purpose processor may be configured as respective different hardware modules at different times.
  • Software may accordingly configure a processor, for instance, to constitute a particular hardware module at one instance of time and to constitute a different hardware module at a different instance of time.
  • Hardware modules may provide information to, and receive information from, other hardware modules. Accordingly, the described hardware modules may be regarded as being communicatively coupled. Where multiple of such hardware modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) that connect the hardware modules. In embodiments in which multiple hardware modules are configured or instantiated at different times, communications between such hardware modules may be achieved, for instance, through the storage and retrieval of information in memory structures to which the multiple hardware modules have access. For instance, one hardware module may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware modules may also initiate communications with input or output devices, and may operate on a resource (e.g., a collection of information).
  • a resource e.g., a collection of information
  • processors may be temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions.
  • the modules referred to herein may, in some exemplary embodiments, comprise processor-implemented modules.
  • the methods or routines described herein may be at least partially processor-implemented. For instance, at least some of the operations of a method may be performed by one or more processors or processor-implemented hardware modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some exemplary embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment, or as a server farm), while in other embodiments the processors may be distributed across a number of locations.
  • the performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines.
  • the one or more processors or processor-implemented modules may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other exemplary embodiments, the one or more processors or processor-implemented modules may be distributed across a number of geographic locations.
  • any reference to “one embodiment” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment.
  • the appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
  • an insurance provider is used interchangeably herein to generally refer to a party or entity (e.g., a business or other organizational entity) that provides insurance products, e.g., by offering and issuing insurance policies.
  • an insurance provider may be an insurance company.
  • an insurance provider may offer or provide one or more different types of insurance policies.
  • Other types of insurance policies may include, for instance, condominium owner insurance, renter's insurance, life insurance (e.g., whole-life, universal, variable, term), health insurance, disability insurance, long-term care insurance, annuities, business insurance (e.g., property, liability, commercial auto, workers compensation, professional and specialty liability, inland marine and mobile property, surety and fidelity bonds), automobile insurance, boat insurance, insurance for catastrophic events such as flood, fire, volcano damage and the like, motorcycle insurance, farm and ranch insurance, personal liability insurance, personal umbrella insurance, community organization insurance (e.g., for associations, religious organizations, cooperatives), personal articles, and/or other types of insurance products.
  • the insurance providers process claims related to insurance policies that cover one or more properties (e.g., homes, automobiles, personal property), although processing other insurance policies is also envisioned.
  • insured generally refers to a person, party or entity that is responsible for payment of the insurance premiums.
  • the guarantor may or may not be the same party as the insured, such as in situations when a guarantor has power of attorney for the insured.
  • an “annuitant,” as referred to herein, generally refers to a person, party or entity that is entitled to receive benefits from an annuity insurance product offered by the insuring party.
  • the annuitant may or may not be the same party as the guarantor.
  • the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For instance, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For instance, a condition A or B is satisfied by any one of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).

Abstract

The present embodiments relate to identifying property intrusion events based upon sensor data received from smart devices populated about a home. A smart home controller may compare the sensor data to baseline sensor data to dynamically identify an intrusion event that may be occurring. The controller may generate a notification and determine an action to perform to facilitate damage or risk mitigation. Accordingly, an individual associated with the home may be notified of the event, and then select to perform the action, such as via their mobile device. In some implementations, the controller may automatically perform the action. As a result, in response to computer identification of an intrusion event, corrective action may be taken or prompted, or otherwise any damage caused by the intrusion event may be mitigated, reducing insurance claims or claim amounts associated with intrusion events. Insurance discounts may be provided based upon the risk mitigation functionality.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of, and claims the benefit of, U.S. patent application Ser. No. 16/700,783, filed Dec. 2, 2019 and entitled “Systems and Methods for Analyzing Sensor Data to Detect Property Intrusion Events,” which is a continuation of, and claims the benefit of, U.S. patent application Ser. No. 16/445,399 (now U.S. Pat. No. 10,741,033), filed Jun. 19, 2019 and entitled “Systems and Methods for Analyzing Sensor Data to Detect Property Intrusion Events,” which is a continuation of, and claims the benefit of, U.S. patent application Ser. No. 14/873,823 (now U.S. Pat. No. 10,388,135), filed Oct. 2, 2015 and entitled “Systems and Methods for Analyzing Sensor Data to Detect Property Intrusion Events,” which claims benefit of the filing date of U.S. Provisional Patent Application Nos. 62/060,962 (filed Oct. 7, 2014, and entitled “SYSTEMS AND METHODS FOR MANAGING DEVICES WITHIN A CONNECTED PROPERTY AND INSURANCE POLICIES ASSOCIATED THEREWITH”); 62/105,407 (filed Jan. 20, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING DEVICES WITHIN A CONNECTED PROPERTY AND INSURANCE POLICIES ASSOCIATED THEREWITH”); 62/187,624 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR FACILITATING DEVICE REPLACEMENT WITHIN A CONNECTED PROPERTY”); 62/187,645 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING BUILDING CODE COMPLIANCE FOR A PROPERTY”); 62/187,651 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR AUTOMATICALLY GENERATING AN ESCAPE ROUTE”); 62/187,642 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR ANALYZING SENSOR DATA TO DETECT PROPERTY INTRUSION EVENTS”); 62/187,666 (filed Jul. 1, 2015, and entitled “SYSTEMS AND METHODS FOR IMPROVED ASSISTED OR INDEPENDENT LIVING ENVIRONMENTS”); 62/189,329 (filed Jul. 7, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING WARRANTY INFORMATION ASSOCIATED WITH DEVICES POPULATED WITHIN A PROPERTY”); 62/193,317 (filed Jul. 16, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING SMART DEVICES BASED UPON ELECTRICAL USAGE DATA”); 62/197,343 (filed Jul. 27, 2015, and entitled “SYSTEMS AND METHODS FOR CONTROLLING SMART DEVICES BASED UPON IMAGE DATA FROM IMAGE SENSORS”); 62/198,813 (filed Jul. 30, 2015, and entitled “SYSTEMS AND METHODS FOR MANAGING SERVICE LOG INFORMATION”); 62/200,375 (filed Aug. 3, 2015, and entitled “SYSTEMS AND METHODS FOR AUTOMATICALLY RESPONDING TO A FIRE”); 62/201,671 (filed Aug. 6, 2015, and entitled “SYSTEMS AND METHODS FOR AUTOMATICALLY MITIGATING RISK OF DAMAGE FROM BROKEN CIRCUITS”); 62/220,383 (filed Sep. 18, 2015, and entitled “METHODS AND SYSTEMS FOR RESPONDING TO A BROKEN CIRCUIT”)— which are all hereby incorporated by reference in their entireties.
  • FIELD OF THE DISCLOSURE
  • The present disclosure generally relates to managing a connected property. More particularly, the present disclosure relates to assessing data from smart devices to identify property intrusion events, and facilitating actions to mitigate the property intrusion events.
  • BACKGROUND
  • With the proliferation of the “internet of things,” more household devices and items are gaining communication and network connectivity capabilities. The new capabilities are enabling easier data detection and more accurate information and metrics. However, the ability to detect certain conditions associated with devices and items may be limited. Additionally, the channels to control and maintain devices and items as a response to certain conditions may also be limited.
  • SUMMARY
  • The present embodiments may, inter alia, access certain device data to detect certain conditions within a property, and determine actions or commands to perform to address the conditions. Further, the present embodiments may effectively and efficiently communicate relevant information associated with the conditions and enable users to facilitate the actions or commands. One particular functionality relates to analyzing device data to detect property intrusion events, and then performing actions to mitigate the property intrusion events and/or notifying individuals of the property intrusion events.
  • Generally, the present embodiments may relate to (1) home control and/or automation, as well as (2) loss prevention, reduction, and/or mitigation through proactively identifying attempted property intrusion events, notifying an individual of property intrusion events, and/or facilitating commands or actions to mitigate the property intrusion events. The foregoing functionality may also be used by an insurance provider to generate, update, or adjust insurance policies, premiums, rates, discounts, points, and/or rewards, and/or make recommendations to an insured individual.
  • According to one embodiment, a computer-implemented method of detecting property intrusion within a property may be provided. The property may be populated with a hardware controller in communication with a plurality of sensors disposed within the property. The computer-implemented method may include (1) receiving, by the hardware controller, sensor data from at least one sensor of the plurality of sensors, and/or (2) accessing baseline sensor data corresponding to a set of default intrusion attempts. The computer-implemented method may further include (3) comparing, by one or more processors, the received sensor data to the baseline sensor data including: determining a level of similarity between the received sensor data and the baseline sensor data, and/or determining that the level of similarity meets a threshold value. Additionally, the computer-implemented method may include (4) responsive to the comparing, generating a notification that indicates a property intrusion event indicated in the received sensor data, and/or (5) communicating the notification to an electronic device of an individual associated with the property to facilitate remotely issuing commands or otherwise mitigating damage associated with, or caused by, the property intrusion event. The method may include additional, less, or alternate actions, including those discussed elsewhere herein.
  • According to another embodiment, a hardware controller for detecting property intrusion within a property may be provided. The hardware controller may be in communication with a set of devices populated within the property. The hardware controller may include a communication module adapted to interface with the set of devices populated within the property, a memory adapted to store non-transitory computer executable instructions, and/or a processor adapted to interface with the communication module. The processor may configured to execute the non-transitory computer executable instructions to cause the processor to receive, via the communication module, sensor data from at least one device of the set of devices, and/or access baseline sensor data corresponding to a set of default intrusion attempts. The processor may further be configured to compare the received sensor data to the baseline sensor data including: determine a level of similarity between the received sensor data and the baseline sensor data, and/or determine that the level of similarity meets a threshold value. Additionally, the processor may be configured to, responsive to the comparing, generate a notification that indicates a property intrusion event indicated in the received sensor data, and transmit, via the communication module, the notification to an electronic device of an individual associated with the property. The electronic device may allow the individual to select various commands to facilitate mitigation of damage caused by the property intrusion event. The hardware controller and/or processor may be configured to include additional, less, or alternate functionality, including that discussed elsewhere herein.
  • Advantages will become more apparent to those skilled in the art from the following description of the preferred embodiments which have been shown and described by way of illustration. As will be realized, the present embodiments may be capable of other and different embodiments, and their details are capable of modification in various respects. Accordingly, the drawings and description are to be regarded as illustrative in nature and not as restrictive.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The Figures described below depict various aspects of the system and methods disclosed herein. It should be understood that each Figure depicts an embodiment of a particular aspect of the disclosed system and methods, and that each of the figures is intended to accord with a possible embodiment thereof. Further, wherever possible, the following description refers to the reference numerals included in the following figures, in which features depicted in multiple figures are designated with consistent reference numerals.
  • There are shown in the drawings arrangements which are presently discussed, it being understood, however, that the present embodiments are not limited to the precise arrangements and instrumentalities shown, wherein:
  • FIG. 1 depicts an exemplary environment including components and entities associated with managing device operation and facilitating insurance policy processing, in accordance with some embodiments.
  • FIG. 2 is an exemplary signal diagram associated with assessing device data to identify property intrusion events and facilitating various actions to mitigate the property intrusion events, in accordance with some embodiments.
  • FIG. 3 is a flow diagram of an exemplary computer-implemented method of assessing device data to identify property intrusion events and facilitating various actions to mitigate the property intrusion events, in accordance with some embodiments.
  • FIG. 4 is a block diagram of an exemplary controller in accordance with some embodiments.
  • FIG. 5 is a block diagram of an exemplary processing server in accordance with some embodiments.
  • FIGS. 6A and 6B depict exemplary interfaces associated with notifying of property intrusion events and facilitating various actions to mitigate the property intrusion events, in accordance with some embodiments.
  • The Figures depict preferred embodiments for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the systems and methods illustrated herein may be employed without departing from the principles of the invention described herein.
  • DETAILED DESCRIPTION
  • The present embodiments may relate to, inter alia, assessing and managing operation of devices or personal property within a home or other type of property, such as household furniture, appliances, electronics, vehicles (e.g., cars, boats, motorcycles), and/or other personal belongings (e.g., clothing, jewelry, antiques). Generally, a home or property may have a “smart” central controller that may be wirelessly connected, or connected via hard-wire, with various household related items, devices, and/or sensors. The central controller may be associated with any type of property, such as homes, office buildings, restaurants, farms, and/or other types of properties.
  • The central controller, and/or one or more remote processors or servers associated with an insurance provider or other entity, may be in wireless or wired communication with various “smart” items or devices, such as smart appliances (e.g., clothes washer, dryer, dish washer, refrigerator, etc.); smart heating devices (e.g., furnace, space heater, etc.); smart cooling devices (e.g., air conditioning units, fans, ceiling fans, etc.); smart plumbing fixtures (e.g., toilets, showers, water heaters, piping, interior and yard sprinklers, etc.); smart cooking devices (e.g., stoves, ovens, grills, microwaves, etc.); smart wiring, lighting, and lamps; smart personal vehicles; smart thermostats; smart windows, doors, or garage doors; smart window blinds or shutters; and/or other smart devices and/or sensors capable of wireless or wired communication. Each smart device (or sensor associated therewith), as well as the central controller and/or insurance provider remote processor(s), may be equipped with a processor, memory unit, software applications, wireless transceivers, local power supply, various types of sensors, and/or other components.
  • The central controller, and/or insurance provider remote processor(s), may collect or retrieve various data from the devices or personal property, analyze the data, and/or identify various actions to facilitate based upon the analysis. In particular, the central controller and/or insurance provider remote processor(s) may receive operation data from the smart devices, where the operation data may include various sensor data associated with the smart devices. The central controller and/or insurance provider remote processor(s) may compare the operation data to baseline sensor data, where the baseline sensor data may correspond to “default” property intrusion attempts or otherwise sensor data that may be consistent with one or more different types of property intrusion attempts. The comparison may indicate a level of similarity between the received sensor data and the baseline sensor data.
  • Based upon the comparison, the central controller and/or insurance provider remote processor(s) may determine that the property may be experiencing a property intrusion, identify a command or action to perform to mitigate the property intrusion, and/or facilitate performance of the command or action. The central controller and/or insurance provider remote processor(s) may communicate with a user device (or mobile device) of an individual associated with the property (e.g., an occupant or owner of the property) to notify the individual of the property intrusion. The individual may use the user device to select various commands or actions to take to facilitate mitigation of the property intrusion.
  • The systems and methods discussed herein address a challenge that is particular to property management. In particular, the challenge relates to a difficulty in identifying the occurrence of a property intrusion event associated with a property, as well as a difficulty in mitigating the property intrusion event. This is particularly apparent when the property is unoccupied. Conventional security systems may only activate when a certain condition is triggered. However, these conventional security systems may not account for many of seemingly limitless ways of gaining unlawful access to a property. In contrast, the present systems and methods leverage sensor data from connected devices to detect and identify certain types of property intrusion events, and/or dynamically identify commands or actions to facilitate to mitigate the property intrusion events. Therefore, because the systems and methods employ the collection and analysis of sensors data associated with connected devices within the property, the systems and methods are necessarily rooted in computer technology in order to overcome the noted shortcomings that specifically arise in the realm of property management.
  • Similarly, the systems and methods provide improvements in a technical field, namely, home automation and security. Instead of the systems and methods merely being performed by hardware components using basic functions, the systems and methods employ complex steps that go beyond the mere concept of simply retrieving and combining data using a computer. In particular, the hardware components receive data from connected devices, analyze the data in combination with baseline or default data to identify an occurrence of a property intrusion event, determine a command or action to take to mitigate the property intrusion event, facilitate performance of the command or action, and/or notify an individual of a property intrusion event. Additionally, because a central controller in a property retrieves and analyzes sensor data from a plurality of connected devices in the property, the central controller and the connected devices are part of a “thin client” environment that improves data persistence and information processing. This combination of elements further impose meaningful limits in that the operations are applied to improve home automation and security by detecting property intrusion events, and/or facilitating mitigating actions in a meaningful and effective way.
  • According to implementations, the systems and methods may support a dynamic, real-time or near-real-time analysis of any received data. In particular, the central controller and/or insurance provider may retrieve and/or receive real-time sensor data from the sensors, analyze the sensor data and any baseline data in real time, and dynamically assessing any property intrusion event. Additionally, the central controller and/or insurance provider may dynamically generate notifications in real-time and communicate the notifications to individuals in real-time. Accordingly, the real-time capability of the systems and methods enable individuals the assurance of real-time property monitoring.
  • Generally, the systems and methods offer numerous benefits to property security, as well as to individuals associated with the property. In particular, the systems and methods may automatically detect property intrusion events that the individuals may not realize are occurring, and may automatically facilitate preventative or corrective actions to address the events. As a result, security associated with the property may improve. Further, the systems and methods improve loss prevention and mitigate actual loss. As a further benefit, individuals associated with the property may be able to remotely request certain actions to be performed to mitigate the property intrusion events.
  • The systems and methods may further offer a benefit to insurance providers and customers thereof. Particularly, the present embodiments may facilitate (a) providing and updating insurance policies; (b) the handling or adjusting of home insurance claims; (c) the disbursement of monies related to insurance claims; (d) modifying insurance coverage amounts; (e) updating and improving damage estimate models, and/or (f) other insurance-related activities. The systems and methods may further offer a benefit to customers by offering improved insurance claim processing. Further, the insurance providers may stand out as a cost-effective insurance provider, thereby retaining existing customers and attracting new customers. It should be appreciated that further benefits to the systems and methods are envisioned.
  • The method may also include adjusting an insurance policy, premium, or discount (such as a homeowners, renters, auto, home, health, or life insurance policy, premium, or discount) based upon the functionality discussed herein, and/or an insured having a home and/or mobile device with such functionality.
  • I. EXEMPLARY ENVIRONMENT AND COMPONENTS FOR ASSESSING DEVICE OPERATION AND FUNCTIONALITIES RELATING THERETO
  • FIG. 1 depicts an exemplary environment 100 including components and entities for managing devices associated with a property and processing insurance policies associated therewith. Although FIG. 1 depicts certain entities, components, and devices, it should be appreciated that additional, fewer, or alternate entities and components are envisioned.
  • As illustrated in FIG. 1 , the environment 100 may include a property 105 that contains a controller 120 and a plurality of devices 110 (or smart devices) that may be each connected to a local communication network 115. Each of the plurality of devices 110 may be a “smart” device that may be configured with one or more sensors capable of sensing and communicating operating data associated with the corresponding device 110. As shown in FIG. 1 , the plurality of devices 110 may include a smart alarm system 110 a, a smart stove 110 b, and/or a smart washing machine 110 c. Each of the plurality of devices 110 may be located within or proximate to the property 105 (generally, “on premises”). Although FIG. 1 depicts only one property 105, it should be appreciated that multiple properties are envisioned, each with its own controller and devices. Further, it should be appreciated that additional, fewer, or alternate devices may be present in the property 105.
  • In some cases, the plurality of devices 110 may be purchased from a manufacturer with the “smart” functionally incorporated therein. In other cases, the plurality of devices 110 may have been purchased as “dumb” devices and subsequently modified to add the “smart” functionality to the device. For instance, a homeowner may purchase an alarm system that installs sensors on or near a door to detect when a door has been opened and/or unlocked.
  • In some embodiments, the plurality of devices 110 may monitor their own status or condition via the sensors to detect any issues or problems. In response to detecting issues or problems, the plurality of devices 110 may be able to indicate the issues or problems via display components, such as LED lights, display screens, or other visual indicators. In further embodiments, the controller 120 may be configured to monitor, via sensor data, whether the plurality of devices 110 and/or parts thereof have been installed correctly, whether replacement parts are new and/or otherwise in good condition, and/or other conditions associated with the plurality of devices 110 and/or parts thereof.
  • The plurality of devices 110 may be configured to communicate with a controller 120 via the local communication network 115. The local communication network 115 may facilitate any type of data communication between devices and controllers located on or proximate to the property 105 via any standard or technology (e.g., LAN, WLAN, any IEEE 802 standard including Ethernet, and/or others). The local communication network 115 may further support various short-range communication protocols, such as Bluetooth®, Bluetooth® Low Energy, near field communication (NFC), radio-frequency identification (RFID), and/or other types of short-range protocols.
  • According to aspects, the plurality of devices 110 may transmit, to the controller 120 via the local communication network 115 (and/or to the insurance provider 130 remote processing server 135 via the network 125), operational data gathered from sensors associated with the plurality of devices 110. The operational data may be audio data, image or video data, motion data, status data, usage amounts, and/or other data or information. For instance, the operational data may indicate that a window has been shattered; the presence of a person, fire, or water in a room; the sound made near a smart device; and/or other information pertinent to an operation state or status of the plurality of devices 110. For further instance, the operational data may include motion data that may indicate whether any individuals are within the property 105 and/or located on the exterior of the property 105 (i.e., whether the property 105 is occupied or unoccupied). Additionally, the operational data may include device usage data. The operational data may include a timestamp representing the time that the operational data was recorded.
  • In some cases, the plurality of devices 110 may transmit, to the controller 120 (and/or insurance provider 130 remote processing server 135), various data and information associated with the plurality of devices 110. In particular, the data and information may include location data within the property, as well as various costs and prices associated with the plurality of devices 110. For instance, a washing machine may include a component such as a data tag that stores a location of the washing machine within the property 105, a retail price of the washing machine, and/or replacement costs of various parts of (or the entirety of) the washing machine. The various data and information may be programmable and updatable by an individual or automatically by the controller 120.
  • The controller 120 may be coupled to a database 112 that stores various operational data and information associated with the plurality of devices 110. Although FIG. 1 depicts the database 112 as coupled to the controller 120, it is envisioned that the database 112 may be maintained in the “cloud” such that any element of the environment 100 capable of communicating over either the local network 115 or one or more other networks 125 may directly interact with the database 112.
  • In some embodiments, the database 112 may organize the operational data according to which individual device 110 the data may be associated and/or the room or subsection of the property in which the data was recorded. Further, the database 112 may maintain an inventory list that includes the plurality of devices 110, as well as various data and information associated with the plurality of devices 110 (e.g., locations, replacement costs, etc.).
  • In one embodiment, the database 112 may maintain various operation states of the plurality of devices 110. In particular, the operation states may specify various settings of the plurality of devices 110 such that when the respective device is configured at the setting(s), the respective device will operate in the corresponding operation state. For instance, an operation state for a smart thermostat may be “heat conservation” whereby the corresponding setting is 64 degrees (as opposed to a more “normal” 70 degree setting). It should be appreciated that each operation state may specify settings for more than one of the devices 110.
  • The controller 120 (and/or the plurality of devices 112) may be configured to communicate with other components and entities, such as an insurance provider 130 and various third party source(s) 138 via the network(s) 125. According to some embodiments, the network(s) 125 may facilitate any data communication between the controller 120 located on the property 105 and entities or individuals remote to the property 105 via any standard or technology (e.g., GSM, CDMA, TDMA, WCDMA, LTE, EDGE, OFDM, GPRS, EV-DO, UWB, IEEE 802 including Ethernet, WiMAX, Wi-Fi, and/or others). In some cases, both the local network 115 and the network 125(s) may utilize the same technology.
  • Generally, the insurance provider 130 may be any individual, group of individuals, company, corporation, or other type of entity that may issue insurance policies for customers, such as a home insurance policy associated with the property 105. According to the present embodiments, the insurance provider 130 may include one or more processing server(s) 135 configured to facilitate the functionalities as discussed herein. Although FIG. 1 depicts the processing server 135 as a part of the insurance provider 130, it should be appreciated that the processing server 135 may be separate from (and connected to or accessible by) the insurance provider 130.
  • Further, although the present disclosure describes the systems and methods as being facilitated in part by the insurance provider 130, it should be appreciated that other non-insurance related entities may implement the systems and methods. For instance, a general contractor may aggregate the insurance-risk data across many properties to determine which appliances or products provide the best protection against specific causes of loss, and/or deploy the appliances or products based upon where causes of loss are most likely to occur. Accordingly, it may not be necessary for the property 105 to have an associated insurance policy for the property owners to enjoy the benefits of the systems and methods.
  • The third-party source(s) 138 may represent any entity or component that is configured to obtain, detect, and/or determine data or information that may be relevant to the devices 110 of the property 105. In some embodiments, the third-party source(s) 138 may be a manufacturer, supplier, servicer, or retailer of the any of the devices 110, as well as for replacement devices for the devices 110. For instance, if one of the devices 110 is a refrigerator, the third-party source 138 may be refrigerator manufacturer that sells refrigerators of the same or different types or models as the refrigerator device 110. The third-party source(s) 138 may store data associated with a replacement device (e.g., cost, retail location, general information, availability, or the like). Further, the third-party source(s) 138 may store baseline data associated with various types of property intrusion attempts. The third-party source(s) 138 may be configured to communicate various data or information to the controller 120 and/or to the insurance provider 130 via the network(s) 125, whereby the controller 120 and/or the insurance provider 130 may examine the data or information to facilitate various functionalities.
  • The controller 120, the insurance provider 130 and/or the processing server 135, and the third-party source(s) 138 may also be in communication, via the network(s) 125, with an electronic device 145 associated with an individual 140. In some embodiments, the individual 140 may have an insurance policy (e.g., a home insurance policy) for the property 105 or a portion of the property 105, or may otherwise be associated with the property 105 (e.g., the individual 140 may live in the property 105). The electronic device 145 may be a mobile device, such as a smartphone, a desktop computer, a laptop, a tablet, a phablet, a smart watch, smart glasses, wearable electronics, pager, personal digital assistant, or any other electronic device, including computing devices configured for wireless radio frequency (RF) communication and data transmission. In some implementations, the controller 120 (and/or insurance provider 130 remote processing server 135) may communicate, to the individual 140 via the electronic device 145, an indication of the operation of the plurality of devices 110, such as the commands transmitted to the plurality of devices 110. Further, the controller 120 (and/or insurance provider 130 remote processing server 135) may enable the individual 140 to remotely control various of the plurality of devices 110 via the electronic device 145.
  • According to some other implementations, the controller 120 (and/or insurance provider 130 remote processing server 135) may analyze sensor data from any of the plurality of devices 110 to detect property intrusion attempts associated with the property 105. The controller 120 (and/or insurance provider 130 remote processing server 135) may generate notifications or alerts associated with the detected property intrusion attempts, and/or communicate the notifications or alerts to the electronic device 145 via the network 125. Further, the controller 120 (and/or insurance provider 130 remote processing server 135) may detect any damage to the plurality of devices 110 and/or to other portions of the property 105, and may generate a proposed insurance claim that indicates the damage and transmit, via the network 125, the proposed insurance claim related to the electronic device 145. The proposed insurance claim may contain pre-populated fields that indicate various information and data, such as causes of loss (e.g., water, wind, fire, intrusion, etc.); damaged devices; costs associated with the damaged devices; time, date, and/or location of the insurance-related event; and/or other information included in an insurance claim.
  • The controller 120 (and/or insurance provider 130 remote processing server 135) may also transmit any modifications to insurance policies based upon detected data from the plurality of devices 110. In response, the homeowner 140 may accept the proposed insurance claim or make modifications to the proposed insurance claim, and/or otherwise accept/reject any modifications to the insurance policy. The electronic device may transmit, via the network 125, the accepted or modified insurance claim back to the controller 120 (and/or insurance provider 130 remote processing server 135).
  • The controller 120 may facilitate any processing of the insurance claim with the processing server 135 of the insurance provider 130. Additionally or alternatively, the processing server 135 may facilitate the proposed insurance claim communications and processing directly with the customer 140. In some implementations, the insurance provider 130 remote processing server 135 may provide the same functionality as that described herein with respect to the controller 120.
  • II. EXEMPLARY COMMUNICATION FLOW FOR ASSESSING DEVICE SENSOR DATA AND FACILITATING CORRECTIVE/PREVENTATIVE ACTIONS
  • Referring to FIG. 2 , illustrated is an exemplary signal diagram 200 associated with collecting smart device data and facilitating various functionalities relating thereto. FIG. 2 may include a set of smart devices 210 (such as the smart devices 110 (or one of the plurality of devices) as discussed with respect to FIG. 1 ), a controller 220 (such as the controller 120 as discussed with respect to FIG. 1 ), a processing server 235 (such as the processing server 135 as discussed with respect to FIG. 1 ), and/or a user device 245 (such as the user device 145 as discussed with respect to FIG. 1 ).
  • The smart devices 210 and the controller 220 may be located within a property 205 (such as the property 105 as discussed with respect to FIG. 1 ). According to some embodiments, the user device 245 may belong to an individual associated with the property 205, such as a resident of the property 205 and/or an individual having an insurance policy for the property 205.
  • The signal diagram 200 may begin when the controller 220 optionally requests (250) the smart devices 210 for sensor data. In some implementations, the controller 220 may periodically request the smart devices 210 for sensor data, or the controller 220 may request the smart devices 210 for sensor data in response to various triggers (e.g., at a certain time of the day or in response to receiving particular sensor data from a particular smart device 210). The controller 220 may also request sensor data from one or more specific smart devices 210. The smart device(s) 210 may provide (252) sensor data to the controller 220. For example, the sensor data may be audio data, imaging data (e.g., images and/or videos), and/or motion/movement sensor data. It should be appreciated that other types of sensor data and combinations of sensor data are envisioned. The smart device(s) 210 may provide the sensor data automatically as the data is detected, in response to receiving a request from the controller 220, or in response to various triggers (e.g., detected motion data at 3:00 AM).
  • The controller 220 may analyze the sensor data to identify (254) an event or occurrence and a type of event/occurrence that is indicated in the sensor data. In particular, the event may be an intrusion attempt by an individual or group of individuals, and the type of event may correspond to how the intrusion is being attempted or performed. For example, the individual(s) may attempt to break down/enter through a door or break/enter through a window, or may survey the property for a point of entry. It should be appreciated that other types of intrusion attempts are envisioned, and the sensor data may indicate the attempt at different progress points (e.g., initial surveying or completed entry). In some implementations, the controller 220 may account for a status or condition of the property (e.g., occupied or unoccupied) when the sensor data is detected/received. Accordingly, the controller 220 may analyze various combinations of sensor data from various combinations of the smart devices 210 to identify the event and the type of event.
  • The controller 220 may access (256) baseline data that corresponds to the type of event indicated in the sensor data. The controller 220 may locally store the baseline data in memory. The baseline data may indicate various “default” intrusion attempts, which may include sensor data associated with actual intrusion attempts, or generated data associated with staged/simulated intrusion attempts. For example, if the sensor data is audio data that corresponds to a front door being broken down, the controller 220 may access baseline data associated with an actual instance of door being broken down or staged/simulated audio data that simulates a door being broken down. For further example, if the sensor data is motion sensor data that corresponds to surveying for an entry point, the controller 220 may access general baseline motion sensor data consistent with surveying of a property for an entry point (which may be data of an actual surveying of a property, or data that is generated to mimic or enact a surveying of a property). In an optional implementation, such as if the controller 220 does not locally store the baseline data, the controller 220 may retrieve (258) the baseline data from the processing server 235.
  • The controller 220 may compare (260) the received sensor data to the baseline data. In some implementations, the controller 220 may determine a level of similarity between the received sensor data and the baseline data. In comparing the received sensor data to the baseline data, the controller 220 may compare a relevant portion of the received sensor data to a relevant portion of the baseline data. For example, if the received sensor data is audio data, the controller 220 may compare a portion of the audio data that corresponds to a window breaking to baseline data of a window breaking. In determining the level of similarity, the controller 220 may calculate a similarity percentage (e.g., 75% similar) or other parameter that may indicate similarity using various calculations, algorithms, data models, techniques, and/or the like.
  • The controller 220 may also determine (262) if an intrusion event is being attempted or performed based upon the comparison. In one implementation, if the level of similarity between the received sensor data and the baseline data meets or exceeds a threshold value, then the controller 220 may deem that there is an intrusion event being attempted or performed. Similarly, if the level of similarity between the received sensor data and the baseline data does not meet or exceed a threshold value, then the controller 220 may deem that there is not an intrusion event being attempted or performed. For example, if the received sensor data is audio data that indicates one loud “thud” sound, and the baseline data indicates that multiple “thud” sounds are consistent with an intrusion attempt, then the controller 220 may deem that the received sensor data (one “thud” sound) is not consistent with an intrusion attempt.
  • It should be appreciated that the threshold value may be a percentage on a scale from 0% to 100%, or other numeric parameter on a scale, and/or may be a default value or manually set by a user or administrator (such as the individual associated with the property). Generally, the lower (or higher) the threshold, the more (or less) “sensitive” the intrusion detection. Accordingly, the lower (or higher) the threshold, the greater (or lesser) chance there is of the controller 220 detecting a “false alarm.” It should be appreciated that the controller 220 may use various techniques, calculations, algorithms, models, and the like to analyze the received sensor data and compare the received sensor data to the baseline data.
  • If the controller 220 determines that there is not an intrusion event (i.e., the level of similarity does not meet or exceed the threshold; “NO”), then processing may end or proceed to any other functionality. In contrast, if the controller 220 determines that there is an intrusion event (i.e., the level of similarity does meet or exceed the threshold; “YES”), then the controller 220 may generate (264) a notification that indicates the intrusion event and that may include any information related to the intrusion event. In particular, the notification may include the type of intrusion event (e.g., an alarm disarmament, breaking/entering through a window), a time of the detected intrusion event, current sensor data indicating the intrusion event, and/or any other information that is relevant to the intrusion event.
  • The controller 220 may also determine (265) a mitigating action or command to perform to mitigate the intrusion event. In particular, the controller 220 may make the determination based upon the type of intrusion event and/or the sensor data associated therewith. The controller 220 may also identify an appropriate smart device 210 that may be used to perform or facilitate the mitigating action. For example, if the controller 220 determines that an intrusion is being attempted via the garage of the property 205, the controller 220 may determine that the mitigating action is to turn on all of the lights within the garage, whereby the lights within the garage are the identified smart devices 210. For further example, if the controller 220 determines that a window has been broken, the controller 220 may determine to activate the alarm and notify the proper law enforcement.
  • The controller 220 may communicate (266) the notification generated in (264) to the user device 245. In some implementations, the notification may include a selectable option that enables the user of the user device 245 to facilitate an action within the property 205, such as the mitigating action determined in (265). The action may be any action that is controller 220 is capable of facilitating, and it may be associated with operation of one or more of the smart devices 210. Further, the action may be associated with the detected intrusion event. For example, if the intrusion event is an input of an incorrect door lock code, then the option may enable the user to select to activate the alarm. Accordingly, the user may select the option and the user device 245 may send (268) a request to the controller 220 to facilitate the mitigating action with an appropriate smart device 210. In some implementations, the user device 245 may perform the mitigating action without interfacing with the controller 220, such as notifying law enforcement of the identified intrusion attempt.
  • After determining the mitigating action and/or receiving the request to perform the mitigating action, the controller 220 may send (270) a command to perform a mitigating action to the appropriate smart device 210. After receipt of the command, the appropriate smart device 210 may perform (272) the mitigating action in an attempt to stop or slow the intrusion attempt, or otherwise mitigate any effect of the intrusion attempt. It should be appreciated that the controller 220 may automatically send the command to perform the mitigating action and/or may send the command to perform the mitigating action in response to receiving the request from the user device 245.
  • Although not depicted in FIG. 2 , it should be appreciated that the controller 220, the user device 245, and/or the processing server 235 may perform any insurance processing that may result from the detected or analyzed sensor data. In particular, the sensor data may indicate damage to the property 205 itself or damage to any of the smart devices 210, which may necessitate an insurance claim associated with an insurance policy for the property 205. Accordingly, the controller 220 may provide any relevant data to the processing server 235, which may process a proposed insurance claim and communicate the proposed insurance claim directly to the user device 245. In this regard, the customer may use the user device 245 to request any insurance processing that may result from any detected data or events associated with the property 205.
  • Although FIG. 2 depicts the controller 220 performing various steps and determinations, it should be appreciated that the processing server 235 may perform the same or similar steps or determinations. For example, the processing server 235 may receive the sensor data, compare the sensor data to baseline data, generate a notification, communicate a notification, determine a mitigating action, and/or facilitate the mitigating action.
  • III. EXEMPLARY METHOD FOR DETECTING INTRUSION EVENTS AND FACILITATING MITIGATING ACTIONS
  • Referring to FIG. 3 , depicted is a block diagram of an exemplary computer-implemented method 300 of processing sensor data to detect an attempted property intrusion within a property. The method 300 may be facilitated by an electronic device within the property, such as the controller 120 as discussed with respect to FIG. 1 , that may be in direct or indirect communication with an insurance provider (such as the insurance provider 130 as discussed with respect to FIG. 1 or a remote processor or server thereof).
  • The method 300 may begin when the controller receives (block 305) sensor data from at least one sensor disposed within the property. In some embodiments, the sensor may include any type of audio sensor (e.g., a microphone), imaging sensor (e.g., digital camera, video camera, etc.), motion sensor, or any other sensor referenced herein. At block 310, the controller may examine the received sensor data to identify a type of property intrusion event included in the received sensor data. In some implementations, there may be different types of intrusion events that may have different types of associated sensor data.
  • For example, an intruder's attempt to break into a house may be detected using audio data that indicates broken glass or a loud banging against a door. For a further example, another attempt to break into a house may be detected using motion sense data during a specific time period, such as in the middle of the night.
  • After the controller identifies the type of intrusion event, the controller may access (block 315) baseline sensor data corresponding to a set of default intrusion attempts. In particular, the controller may access baseline sensor data that corresponds to the type of intrusion event identified in block 310. For example, if the sensor data includes audio data indicating a potential intrusion attempt, the controller may access baseline audio data including sample audio of actual or simulated intrusion attempts of various types. The controller may determine (block 320) a level of similarity between the received sensor data and the baseline sensor data. It should be appreciated that the controller may use any type of technique, calculation, data model, or algorithm to determine the level of similarity. In some implementations, the level of similarly may include a quantitative indicator, for example a number from 1-100, with the greater the number indicating the greater similarity between the received sensor data and the baseline sensor data.
  • The controller may determine (block 325) whether the level of similarity meets or exceeds a threshold value. It should be appreciated that different threshold values are envisioned. For example, if the level of similarity determined in block 315 is quantified as 90 and the threshold value is 85, then the level of similarity exceeds the threshold value. If the level of similarity does not exceed the threshold value (“NO”), processing may end or proceed to other functionality. If the level of similarity does exceed the threshold value (“YES”), then the controller may generate (block 330) a notification that indicates the property intrusion event. In some implementations, the notification may include various information associated with the property intrusion event, such as an area of the property corresponding to the property intrusion event, as well as other information such as a timestamp, the type of sensor data detected, and/or other information. In some implementations, the controller may identify an action to perform to mitigate the property intrusion event.
  • The controller may communicate (block 335) the notification to an electronic device of an individual associated with the property, such as via an external network and/or wireless communication and data transmission. In some implementations, the controller may store an identification of the electronic device. For example, the electronic device may be a smartphone or other mobile device belonging to the owner and/or occupant of the property. In some scenarios, the controller may communicate the notification to the insurance provider. The notification may enable the individual to request that an action to mitigate the property intrusion attempt be performed.
  • In some optional implementations, the controller may facilitate performing the identified action to mitigate the property intrusion event. In particular, the controller may activate (block 340) an alarm within the property. The alarm may alert any occupants of the property of the intrusion event. The controller may also optionally communicate (block 345) the notification to a law enforcement entity, such as a police station, or to a security service. Further, the controller may optionally activate (block 350) a set of lights within the property. In some implementations, the set of lights may be specific to an area of the property where the intrusion event is detected. It should be appreciated that the controller may identify and/or perform other actions to mitigate any detected property intrusion event.
  • IV. EXEMPLARY CONTROLLER
  • FIG. 4 illustrates a diagram of an exemplary controller 420 (such as the controller 120 discussed with respect to FIG. 1 ) in which the functionalities as discussed herein may be implemented. It should be appreciated that the controller 420 may be associated with a property, as discussed herein.
  • The controller 420 may include a processor 422, as well as a memory 478. The memory 478 may store an operating system 479 capable of facilitating the functionalities as discussed herein, as well as a set of applications 475 (i.e., machine readable instructions). For instance, one of the set of applications 475 may be an intrusion detection application 484 configured to analyze sensor data, detect property intrusion events, and facilitate actions to mitigate the property intrusion events. The set of applications 475 may also include one or more other applications 484, such as an insurance processing application.
  • The processor 422 may interface with the memory 478 to execute the operating system 479 and the set of applications 475. According to some embodiments, the memory 478 may also include a data record storage 480 that stores various data, such as baseline data corresponding to a set of default intrusion attempts. The intrusion detection application 484 may interface with the data record storage 480 to retrieve relevant baseline data that the intrusion detection application 484 may use to identify property intrusion events. The memory 478 may include one or more forms of volatile and/or non-volatile, fixed and/or removable memory, such as read-only memory (ROM), electronic programmable read-only memory (EPROM), random access memory (RAM), erasable electronic programmable read-only memory (EEPROM), and/or other hard drives, flash memory, MicroSD cards, and others.
  • The controller 420 may further include a communication module 477 configured to communicate data via one or more networks 425. According to some embodiments, the communication module 477 may include one or more transceivers (e.g., WWAN, WLAN, and/or WPAN transceivers) functioning in accordance with IEEE standards, 3GPP standards, or other standards, and/or configured to receive and transmit data via one or more external ports 476. Further, the communication module 477 may include a short-range network component (e.g., an RFID reader) configured for short-range network communications. For instance, the communication module 477 may receive, via the network 425, sensor data from a plurality of devices populated within a property.
  • The controller 420 may further include a user interface 481 configured to present information to a user and/or receive inputs from the user. As shown in FIG. 4 , the user interface 481 may include a display screen 482 and I/O components 483 (e.g., ports, capacitive or resistive touch sensitive input panels, keys, buttons, lights, LEDs, speakers, microphones). According to some embodiments, the user may access the controller 420 via the user interface 481 to assess sensor data, process insurance policies, and/or perform other functions. The controller 420 may be configured to perform insurance-related functions, such as generating proposed insurance claims and facilitating insurance claim processing. In some embodiments, the controller 420 may perform the functionalities as discussed herein as part of a “cloud” network or may otherwise communicate with other hardware or software components within the cloud to send, retrieve, and/or otherwise analyze data.
  • In general, a computer program product in accordance with an embodiment may include a computer usable storage medium (e.g., standard random access memory (RAM), an optical disc, a universal serial bus (USB) drive, or the like) having computer-readable program code embodied therein, wherein the computer-readable program code may be adapted to be executed by the processor 422 (e.g., working in connection with the operating system 479) to facilitate the functions as described herein. In this regard, the program code may be implemented in any desired language, and may be implemented as machine code, assembly code, byte code, interpretable source code or the like (e.g., via C, C++, Java, Actionscript, Objective-C, Javascript, CSS, XML). In some embodiments, the computer program product may be part of a cloud network of resources.
  • V. EXEMPLARY SERVER
  • FIG. 5 illustrates a diagram of an exemplary processing server 535 (such as the processing server 135 discussed with respect to FIG. 1 ) in which the functionalities as discussed herein may be implemented. It should be appreciated that the processing server 535 may be associated with an insurance provider, as discussed herein. In one embodiment, the processing server may be configured with the same functionality as that of the controllers 120, 220 of FIGS. 1 and 2 , respectively.
  • The processing server 535 may include a processor 522, as well as a memory 578. The memory 578 may store an operating system 579 capable of facilitating the functionalities as discussed herein, as well as a set of applications 575 (i.e., machine readable instructions). For instance, one of the set of applications 575 may be a policy processing application 584 configured to manage customer insurance policies. It should be appreciated that other applications 590 are envisioned, such as an intrusion detection application configured to assess sensor data and identify property intrusion events, and/or respond to those events identified.
  • The processor 522 may interface with the memory 578 to execute the operating system 579 and the set of applications 575. According to some embodiments, the memory 578 may also include a data record storage 580 that stores various information associated with customer insurance policies as well as baseline data corresponding to a set of default intrusion attempts. The policy processing application 584 may interface with the data record storage 580 to retrieve relevant information that the policy processing application 584 may use to manage insurance policies, generate notifications, and/or perform other functionalities, such as identify property intrusion events. Further, the device replacement application may interface with the data record storage 580 to retrieve device information. The memory 578 may include one or more forms of volatile and/or non-volatile, fixed and/or removable memory, such as read-only memory (ROM), electronic programmable read-only memory (EPROM), random access memory (RAM), erasable electronic programmable read-only memory (EEPROM), and/or other hard drives, flash memory, MicroSD cards, and others.
  • The processing server 535 may further include a communication module 577 configured to communicate data via one or more networks 525. According to some embodiments, the communication module 577 may include one or more transceivers (e.g., WWAN, WLAN, and/or WPAN transceivers) functioning in accordance with IEEE standards, 3GPP standards, or other standards, and/or configured to receive and transmit data via one or more external ports 576. For instance, the communication module 577 may transmit, via the network 525, baseline data corresponding to a set of default intrusion attempts.
  • The processing server 525 may further include a user interface 581 configured to present information to a user and/or receive inputs from the user. As shown in FIG. 5 , the user interface 581 may include a display screen 582 and I/O components 583 (e.g., ports, capacitive or resistive touch sensitive input panels, keys, buttons, lights, LEDs, speakers, microphones). According to some embodiments, the user may access the processing server 535 via the user interface 581 to process insurance policies and/or perform other functions. In some embodiments, the processing server 535 may perform the functionalities as discussed herein as part of a “cloud” network or may otherwise communicate with other hardware or software components within the cloud to send, retrieve, and/or otherwise analyze data.
  • In general, a computer program product in accordance with an embodiment may include a computer usable storage medium (e.g., standard random access memory (RAM), an optical disc, a universal serial bus (USB) drive, or the like) having computer-readable program code embodied therein, wherein the computer-readable program code may be adapted to be executed by the processor 522 (e.g., working in connection with the operating system 579) to facilitate the functions as described herein. In this regard, the program code may be implemented in any desired language, and may be implemented as machine code, assembly code, byte code, interpretable source code or the like (e.g., via C, C++, Java, Actionscript, Objective-C, Javascript, CSS, XML). In some embodiments, the computer program product may be part of a cloud network of resources.
  • VI. EXEMPLARY USER INTERFACES FOR ALERTING OF PROPERTY INTRUSION EVENTS
  • FIGS. 6A and 6B illustrate exemplary interfaces associated with example commands, displays, and actions for smart devices. An electronic device (e.g., a mobile device, such as a smartphone) may be configured to display the interfaces and/or receive selections and inputs via the interfaces. For example, a dedicated application associated with an insurance provider (or with a controller) and that is configured to operate on the electronic device may display the interfaces. It should be appreciated that the interfaces are merely examples and that alternative or additional content is envisioned.
  • FIG. 6A illustrates an interface 650 including details related to a detected property intrusion event. In particular, the interface 650 may include an alert that details the property intrusion attempt, namely that the controller detected noises on a property of an individual that were consistent with a break-in attempt. The interface 650 may further indicate any mitigating actions that the controller has performed in response to detecting the property intrusion event. As shown in FIG. 6A, the interface 650 indicates that the on-site alarm of the property was activated and that proper authorities (e.g., police) were notified. The interface 650 includes an “OK” selection 652 that enables the user to select to dismiss the interface 650.
  • FIG. 6B illustrates an additional interface 655 including details related to another detected property intrusion event. In particular, the interface 655 may include an alert that details the property intrusion attempt, namely that the controller detected movement outside a property and also that the front door to the property is unlocked. The interface 655 may further identify an action that may be performed to mitigate the property intrusion event, namely to lock the front door. The interface 655 enables the user to select whether perform the action via a “NO” selection 656 and a “YES” selection 657. If the user selects the “NO” selection 656, the electronic device may dismiss the interface 655. If the user selects the “YES” selection 657, the electronic device may transmit a request to the controller to facilitate performing the action.
  • VII. EXEMPLARY METHOD OF DETECTING PROPERTY INTRUSION
  • In one aspect, a computer-implemented method of detecting property intrusion within a property may be provided. The property may be populated with a hardware controller in communication with a plurality of sensors disposed within the property. The method may include (1) receiving, by the hardware controller, sensor data from at least one sensor of the plurality of sensors; (2) accessing baseline sensor data corresponding to a set of default intrusion attempts; (3) comparing, by one or more processors, the received sensor data to the baseline sensor data including: (i) determining a level of similarity between the received sensor data and the baseline sensor data, and (ii) determining that the level of similarity meets a threshold value; (4) responsive to the comparing, generating a notification that indicates a property intrusion event indicated in the received sensor data; and/or (5) communicating the notification to an electronic device of an individual associated with the property to facilitate mitigating damage to the property resulting from the property intrusion event and/or otherwise taking corrective action(s). The method may include additional, less, or alternate actions, including those discussed elsewhere herein.
  • For instance, to determine the level of similarity between the received sensor data and the baseline sensor data, the computer-implemented method may include (1) analyzing the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) accessing at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) comparing the received sensor data to the at least the portion of the baseline sensor data.
  • In one implementation, the computer-implemented method may further include: responsive to the comparing, activating an alarm within the property. In another implementation, the computer-implemented method may further include: responsive to the comparing, communicating the notification to a law enforcement entity or security service.
  • In a further implementation, the computer-implemented method may further include: (1) identifying an area of the property corresponding to the received sensor data; and/or (2) responsive to the comparing, activating a set of lights or audible alarms associated with the area of the property.
  • In some scenarios, to receive the sensor data from the at least one sensor, the computer-implemented method may include receiving audio data from a microphone disposed within the property. In other scenarios, to receive the sensor data from the at least one sensor, the computer-implemented method may include receiving motion sensor data from a motion sensor disposed within the property. In further scenarios, to receive the sensor data from the at least one sensor, the computer-implemented method may include receiving digital image data from an image sensor disposed within the property.
  • To access the baseline sensor data, in some embodiments, the computer-implemented method may include: (1) analyzing the received sensor data to identify a type of the property intrusion event indicated in the received sensor data; (2) sending a request to a back-end server to access at least a portion of the baseline sensor data corresponding to the type of the property intrusion event; and/or (3) receiving, from the back-end server, the at least the portion of the baseline sensor data.
  • To determine the level of similarity between the received sensor data and the baseline sensor data, in some embodiments, the computer-implemented method may include: calculating a similarity percentage between the received sensor data and the baseline sensor data.
  • VIII. EXEMPLARY HARDWARE CONTROLLER
  • A hardware controller for detecting property intrusion within a property may be provided. The hardware controller may be in communication with a set of devices populated within the property. The hardware controller may include a communication module adapted to interface with the set of devices populated within the property, a memory adapted to store non-transitory computer executable instructions, and/or a processor adapted to interface with the communication module. The processor may be configured to execute the non-transitory computer executable instructions to cause the processor to (1) receive, via the communication module, sensor data from at least one device of the set of devices, (2) access baseline sensor data corresponding to a set of default intrusion attempts, (3) compare the received sensor data to the baseline sensor data including: (i) determine a level of similarity between the received sensor data and the baseline sensor data, and/or (ii) determine that the level of similarity meets a threshold value, (4) responsive to the comparing, generate a notification that indicates a property intrusion event indicated in the received sensor data, and/or (5) transmit, via the communication module, the notification to an electronic device of an individual associated with the property to facilitate taking corrective actions in response to the intrusion event and/or otherwise mitigating damage caused by the intrusion event. The hardware controller and/or processor may include additional, less, or alternate functionality, including that discussed elsewhere herein.
  • For instance, in one scenario, to determine the level of similarity between the received sensor data and the baseline sensor data, the processor may be configured to (1) analyze the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) access, from the memory, at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) compare the received sensor data to the at least the portion of the baseline sensor data.
  • In one implementation, the processor may be further configured to: responsive to the comparing, activate a visible, audible, or other type of alarm within the property. In another implementation, the processor may be further configured to: responsive to the comparing, transmit the notification to a law enforcement entity or security service via the communication module.
  • In a further implementation, the processor may be further configured to: (1) identify an area of the property corresponding to the received sensor data, and/or (2) responsive to the comparing, activate a set of lights associated with the area of the property.
  • In a scenario, to receive the sensor data from the at least one device, the processor may be configured to: receive, via the communication module, audio data from a microphone disposed within the property. In another scenario, to receive the sensor data from the at least one device, the processor may be configured to: receive, via the communication module, motion sensor data from a motion sensor disposed within the property. In a further scenario, to receive the sensor data from the at least one device, the processor may be configured to: receive, via the communication module, digital image data from an image sensor disposed within the property.
  • In one implementation, to access the baseline sensor data, the processor may be configured to: (1) analyze the received sensor data to identify a type of the property intrusion event indicated in the received sensor data, (2) send a request to a back-end server to access at least a portion of the baseline sensor data corresponding to the type of the property intrusion event, and/or (3) receive, from the back-end server, the at least the portion of the baseline sensor data.
  • In another implementation, to determine the level of similarity between the received sensor data and the baseline sensor data, the processor may be configured to: calculate a similarity percentage between the received sensor data and the baseline sensor data.
  • IX. EXEMPLARY DETECTION OF INTRUSION EVENTS
  • In some aspects, one or more of smart devices may be configured to gather audio and/or visual data that may indicate an intrusion attempt on a property. These devices may gather the audio and/or visual data and send the data to the home controller, and/or the insurance provider remote processing server, whereby the controller, and/or the insurance provider remote processing server, respectively, may analyze the data and determine whether there is a likelihood of an intrusion event.
  • In some embodiments, the controller, and/or the insurance provider remote processing server, may analyze the data by comparing the data to baseline data that may correspond to certain indications of an intrusion event. For instance, the baseline data may include sample audio of someone attempting to kick down a door. If the sensed audio data is similar to the sample audio, the controller, and/or the insurance provider remote processing server, may determine that someone is attempting to kick down a door to the property. The controller, and/or the insurance provider remote processing server, may generate any necessary notification(s) of the event and communicate the notification(s) to the individual, and/or take other corrective actions—sound alarms, notify police or neighbors, turn on lights, etc.
  • The methods of smart home control and/or automation detailed elsewhere herein may also include actions directed to home security and/or monitoring. For example, the wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may indicate or relate to neighborhood security. Based upon the analysis by the smart home controller or remote processor of the wired or wireless communication or data transmission, and/or data received, the smart home controller or remote processor may identify suspicious behavior and/or unexpected persons in the vicinity of the insured home or a yard of the insured home (such as via facial recognition techniques).
  • The wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may indicate or relate to sound. Based upon the analysis by the smart home controller or remote processor of the wired or wireless communication or data transmission, and/or data received, the smart home controller or remote processor may determine a suspicious and/or unexpected sound within, or in the vicinity of, the insured home (e.g., window breaking, door being forced open, person screaming, dog barking, etc.), and/or generate and transmit a notification or wireless communication to the insured and/or authorities of a potential home security issue.
  • The wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may be generated or collected by a smart pet collar and/or a smart device located on a smart or other pet collar (e.g., dog or cat collar). The data may be generated or collected by the smart pet collar as a dog or cat (or other pet or animal) moves about the insured home or a yard of the insured home.
  • The wired or wireless communication or data transmission, and/or data, received and/or analyzed by the smart home controller or remote processor may be generated or collected by one or more UAVs (unmanned aerial vehicles or small drones) that fly around the exterior of and/or within the interior of the insured home. The smart home controller or remote processor may control or direct the movement or deployment of the one or more UAVs to automatically gather data about conditions of the insured home when the insured home is unoccupied or has been unoccupied for a given period of time such that damage caused by insurance-related events, or potential insurance-related events, to insured homes that have been left unoccupied for extended periods is mitigated or prevented.
  • The data received may be gathered or collected by smart home controllers, cameras mounted about a home, one or more mobile devices, and/or one or more automated smart devices (e.g., robots, drones) having cameras or sensors and that automatically move about an insured home.
  • Also, data may be collected by one or more smart devices, which may include smart sensors, smart visual or audio recording equipment, smart cameras, security systems, smart drones, smart robots, and/or smart pet collars. The mobile device may include a smart phone, laptop, tablet, phablet, netbook, notebook, smart glasses, wearable electronic device, smart watch, smart contact lenses, pager, personal digital assistant (PDA), smart pet collar, or other computing device. The smart devices or mobile device may include one or more processors and transceivers, and may be configured for wired or wireless communication (including two-way radio frequency (RF) communication), such as with a smart home controller or an insurance provider remote processor or server. The smart home controller or insurance provider remote processor or server may generate, update, or adjust an insurance policy, premium, rate, or discount based upon the insurance-related event or wired or wireless communication, data transmission, or data received, such as generating, updating, or adjusting an insurance policy covering or associated with the insured, insured home, or items within the insured home or belonging to the insured.
  • X. ADDITIONAL CONSIDERATIONS
  • As used herein, the term “smart” may refer to devices, sensors, or appliances located within or proximate to a property, and with the ability to communicate information about the status of the device, sensor, or appliance and/or receive instructions that control the operation of the device, sensor, or appliance. In one instance, a smart thermostat may be able to remotely communicate the current temperature of the home and receive instructions to adjust the temperature to a new level. In another instance, a smart water tank may be able to remotely communicate the water level contained therein and receive instructions to restrict the flow of water leaving the tank. In contrast, “dumb” devices, sensors, or appliances located within or proximate to a property require manual control (as compared to automatic or semi-automatic or processor control associated with smart devices). Referring again to the thermostat embodiment, to adjust the temperature on a “dumb” thermostat, a person would have to manually interact with the thermostat. As such, a person is unable to use a communication network to remotely adjust a “dumb” device, sensor, or appliance.
  • A “smart device” as used herein may refer to any of a smart device, sensor, appliance, and/or other smart equipment that may be located (or disposed) within or proximate to a property. In some embodiments in which an appliance and a sensor external to the particular appliance are associated with each other, “smart device” may refer to both the external sensors and the appliance collectively. Some exemplary devices that may be “smart devices” are, without limitation, valves, piping, clothes washers/dryers, dish washers, refrigerators, sprinkler systems, toilets, showers, sinks, soil monitors, doors, locks, windows, shutters, ovens, grills, fire places, furnaces, lighting, sump pumps, security cameras, and alarm systems. Similarly, an individual associated with the property shall be referred to as the “homeowner,” “property owner,” or “policyholder,” but it is also envisioned that the individual is a family member of the homeowner, a person renting/subletting the property, a person living or working on the property, a neighbor of the property, or any other individual that may have an interest in preventing or mitigating damage to the property.
  • Further, any reference to “home” or “property” is meant to be exemplary and not limiting. The systems and methods described herein may be applied to any property, such as offices, farms, lots, parks, and/or other types of properties or buildings. Accordingly, “homeowner” may be used interchangeably with “property owner.”
  • With the foregoing, an insurance customer may opt-in to a rewards, insurance discount, or other type of program. After the insurance customer provides their affirmative consent, an insurance provider remote server may collect data from the customer's mobile device, smart home controller, or other smart devices—such as with the customer's permission. The data collected may be related to insured assets before (and/or after) an insurance-related event, including those events discussed elsewhere herein. In return, risk averse insureds, home owners, or home or apartment occupants may receive discounts or insurance cost savings related to home, renters, personal articles, auto, and other types of insurance from the insurance provider.
  • In one aspect, smart or interconnected home data, and/or other data, including the types of data discussed elsewhere herein, may be collected or received by an insurance provider remote server, such as via direct or indirect wireless communication or data transmission from a smart home controller, mobile device, or other customer computing device, after a customer affirmatively consents or otherwise opts-in to an insurance discount, reward, or other program. The insurance provider may then analyze the data received with the customer's permission to provide benefits to the customer. As a result, risk averse customers may receive insurance discounts or other insurance cost savings based upon data that reflects low risk behavior and/or technology that mitigates or prevents risk to (i) insured assets, such as homes, personal belongings, or vehicles, and/or (ii) home or apartment occupants.
  • Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the invention is defined by the words of the claims set forth at the end of this patent. The detailed description is to be construed as exemplary only and does not describe every possible embodiment, as describing every possible embodiment would be impractical, if not impossible. One could implement numerous alternate embodiments, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
  • Throughout this specification, plural instances may implement components, operations, or structures described as a single instance. Although individual operations of one or more methods are illustrated and described as separate operations, one or more of the individual operations may be performed concurrently, and nothing requires that the operations be performed in the order illustrated. Structures and functionality presented as separate components in exemplary configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements fall within the scope of the subject matter herein.
  • Additionally, certain embodiments are described herein as including logic or a number of routines, subroutines, applications, or instructions. These may constitute either software (e.g., code embodied on a non-transitory, machine-readable medium) or hardware. In hardware, the routines, etc., are tangible units capable of performing certain operations and may be configured or arranged in a certain manner. In exemplary embodiments, one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware modules of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware module that operates to perform certain operations as described herein.
  • In various embodiments, a hardware module may be implemented mechanically or electronically. For instance, a hardware module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. A hardware module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
  • Accordingly, the term “hardware module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. Considering embodiments in which hardware modules are temporarily configured (e.g., programmed), each of the hardware modules need not be configured or instantiated at any one instance in time. For instance, where the hardware modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different hardware modules at different times. Software may accordingly configure a processor, for instance, to constitute a particular hardware module at one instance of time and to constitute a different hardware module at a different instance of time.
  • Hardware modules may provide information to, and receive information from, other hardware modules. Accordingly, the described hardware modules may be regarded as being communicatively coupled. Where multiple of such hardware modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) that connect the hardware modules. In embodiments in which multiple hardware modules are configured or instantiated at different times, communications between such hardware modules may be achieved, for instance, through the storage and retrieval of information in memory structures to which the multiple hardware modules have access. For instance, one hardware module may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware modules may also initiate communications with input or output devices, and may operate on a resource (e.g., a collection of information).
  • The various operations of exemplary methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some exemplary embodiments, comprise processor-implemented modules.
  • Similarly, the methods or routines described herein may be at least partially processor-implemented. For instance, at least some of the operations of a method may be performed by one or more processors or processor-implemented hardware modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some exemplary embodiments, the processor or processors may be located in a single location (e.g., within a home environment, an office environment, or as a server farm), while in other embodiments the processors may be distributed across a number of locations.
  • The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some exemplary embodiments, the one or more processors or processor-implemented modules may be located in a single geographic location (e.g., within a home environment, an office environment, or a server farm). In other exemplary embodiments, the one or more processors or processor-implemented modules may be distributed across a number of geographic locations.
  • Unless specifically stated otherwise, discussions herein using words such as “processing,” “computing,” “calculating,” “determining,” “presenting,” “displaying,” or the like may refer to actions or processes of a machine (e.g., a computer) that manipulates or transforms data represented as physical (e.g., electronic, magnetic, or optical) quantities within one or more memories (e.g., volatile memory, non-volatile memory, or a combination thereof), registers, or other machine components that receive, store, transmit, or display information.
  • As used herein any reference to “one embodiment” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
  • The terms “insurer,” “insuring party,” and “insurance provider” are used interchangeably herein to generally refer to a party or entity (e.g., a business or other organizational entity) that provides insurance products, e.g., by offering and issuing insurance policies. Typically, but not necessarily, an insurance provider may be an insurance company.
  • Although the embodiments discussed herein relate to home or personal property insurance policies, it should be appreciated that an insurance provider may offer or provide one or more different types of insurance policies. Other types of insurance policies may include, for instance, condominium owner insurance, renter's insurance, life insurance (e.g., whole-life, universal, variable, term), health insurance, disability insurance, long-term care insurance, annuities, business insurance (e.g., property, liability, commercial auto, workers compensation, professional and specialty liability, inland marine and mobile property, surety and fidelity bonds), automobile insurance, boat insurance, insurance for catastrophic events such as flood, fire, volcano damage and the like, motorcycle insurance, farm and ranch insurance, personal liability insurance, personal umbrella insurance, community organization insurance (e.g., for associations, religious organizations, cooperatives), personal articles, and/or other types of insurance products. In embodiments as described herein, the insurance providers process claims related to insurance policies that cover one or more properties (e.g., homes, automobiles, personal property), although processing other insurance policies is also envisioned.
  • The terms “insured,” “insured party,” “policyholder,” “customer,” “claimant,” and “potential claimant” are used interchangeably herein to refer to a person, party, or entity (e.g., a business or other organizational entity) that is covered by the insurance policy, e.g., whose insured article or entity (e.g., property, life, health, auto, home, business) is covered by the policy. A “guarantor,” as used herein, generally refers to a person, party or entity that is responsible for payment of the insurance premiums. The guarantor may or may not be the same party as the insured, such as in situations when a guarantor has power of attorney for the insured. An “annuitant,” as referred to herein, generally refers to a person, party or entity that is entitled to receive benefits from an annuity insurance product offered by the insuring party. The annuitant may or may not be the same party as the guarantor.
  • As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For instance, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For instance, a condition A or B is satisfied by any one of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).
  • In addition, use of the “a” or “an” are employed to describe elements and components of the embodiments herein. This is done merely for convenience and to give a general sense of the description. This description, and the claims that follow, should be read to include one or at least one and the singular also includes the plural unless it is obvious that it is meant otherwise.
  • The patent claims at the end of this patent application are not intended to be construed under 35 U.S.C. § 112(f) unless traditional means-plus-function language is expressly recited, such as “means for” or “step for” language being explicitly recited in the claim(s).
  • This detailed description is to be construed as examples and does not describe every possible embodiment, as describing every possible embodiment would be impractical, if not impossible. One could implement numerous alternate embodiments, using either current technology or technology developed after the filing date of this application.

Claims (20)

1. A computer-implemented method of detecting property intrusion within a property, the property populated with a hardware controller in communication with a plurality of sensors disposed within the property, the method comprising:
receiving, by the hardware controller, sensor data from at least one sensor of the plurality of sensors, wherein the sensor data (i) indicates a location of the at least one sensor within the property, (ii) comprises audio data indicating an actual amount of distinct sounds, and (iii) comprises motion sensor data indicating whether any individual is located within the property and whether any individual is located exterior to the property;
analyzing the received audio data to identify a property intrusion event;
analyzing the received motion sensor data to determine, based on whether any individual is located within the property and whether any individual is located exterior to the property, whether the property is occupied;
determining, based on the received audio data and on whether the property is occupied, that a type of the property intrusion event corresponds to an individual attempting to break down or enter a door of the property;
accessing, by the hardware controller, baseline audio data corresponding to the type of the property intrusion event, wherein the baseline audio data indicates a baseline amount of distinct sounds consistent with an intrusion attempt;
determining that the received audio data is consistent with the baseline audio data by determining that the actual amount of distinct sounds is consistent with the baseline amount of distinct sounds;
determining a mitigating action to perform to mitigate the property intrusion event, wherein the determined mitigating action is to activate a set of light associated with an area of the property corresponding to the received audio data; and
communicating, to an electronic device of an individual associated with the property, a notification (i) indicating the property intrusion event, and (ii) enabling the individual associated with the property to activate the set of lights associated with the area of the property corresponding to the received audio data.
2. The computer-implemented method of claim 1, wherein accessing the baseline audio data corresponding to the type of the property intrusion event comprises:
accessing baseline audio data associated with an actual instance of a baseline door being broken down.
3. The computer-implemented method of claim 1, wherein accessing the baseline audio data corresponding to the type of the property intrusion event comprises:
accessing baseline audio data associated with a staged instance of a baseline door being broken down.
4. The computer-implemented method of claim 1, wherein determining that the received audio data is consistent with the baseline audio data is further by:
calculating a similarity percentage between the received audio data and the baseline audio data; and
determining that the similarity percentage at least meets a threshold percentage.
5. The computer-implemented method of claim 1, further comprising:
responsive to determining that the received audio data is consistent with the baseline audio data, activating an alarm within the property.
6. The computer-implemented method of claim 1, further comprising:
responsive to determining that the received audio data is consistent with the baseline audio data, communicating the notification to a law enforcement entity.
7. The computer-implemented method of claim 1, further comprising:
activating the set of lights associated with the area of the property.
8. (canceled)
9. The computer-implemented method of claim 1, wherein receiving the sensor data from the at least one sensor comprises:
receiving the sensor data further comprising digital image data.
10. The computer-implemented method of claim 1, wherein accessing the baseline sensor data comprises:
sending a request to a back-end server to access the baseline sensor data; and
receiving, from the back-end server, the baseline sensor data.
11. A hardware controller for detecting property intrusion within a property, the hardware controller in communication with a set of sensors populated within the property, comprising:
a communication module interfacing with the set of sensors populated within the property;
a memory storing non-transitory computer executable instructions; and
a processor interfacing with the communication module and the memory, wherein the processor is configured to execute the non-transitory computer executable instructions to cause the processor to:
receive, via the communication module, sensor data from at least one sensor of the set of sensors, wherein the sensor data (i) indicates a location of the at least one sensor within the property, (ii) comprises audio data indicating an actual amount of distinct sounds, and (iii) comprises motion sensor data indicating whether any individual is located within the property and whether any individual is located exterior to the property,
analyze the received audio data to identify a property intrusion event,
analyze the received motion sensor data to determine, based on whether any individual is located within the property and whether any individual is located exterior to the property, whether the property is occupied,
determine, based on the received audio data and on whether the property is occupied, that a type of the property intrusion event corresponds to an individual attempting to break down or enter a door of the property,
access baseline audio data corresponding to the type of the property intrusion event, wherein the baseline audio data indicates a baseline amount of distinct sounds consistent with an intrusion attempt,
determine that the received audio data is consistent with the baseline audio data by determining that the actual amount of distinct sounds is consistent with the baseline amount of distinct sounds,
determine a mitigating action to perform to mitigate the property intrusion event, wherein the determined mitigating action is to activate a set of light associated with an area of the property corresponding to the received audio data, and
communicate, to an electronic device of an individual associated with the property, a notification (i) indicating the property intrusion event, and (ii) enabling the individual associated with the property to activate the set of lights associated with the area of the property corresponding to the received audio data.
12. The hardware controller of claim 11, wherein the baseline audio data is associated with an actual instance of a baseline door being broken down.
13. The hardware controller of claim 11, wherein the baseline audio data is associated with a staged instance of a baseline door being broken down.
14. The hardware controller of claim 11, wherein to determine that the received audio data is consistent with the baseline audio data is further by:
calculating a similarity percentage between the received audio data and the baseline audio data, and
determining that the similarity percentage at least meets a threshold percentage.
15. The hardware controller of claim 11, wherein the processor is further configured to:
responsive to determining that the received audio data is consistent with the baseline audio data, activate an alarm within the property.
16. The hardware controller of claim 11, wherein the processor is further configured to:
responsive to determining that the received audio data is consistent with the baseline audio data, communicate the notification to a law enforcement entity.
17. The hardware controller of claim 11, wherein the processor is further configured to:
activate the set of lights associated with the area of the property.
18. (canceled)
19. The hardware controller of claim 11, wherein the sensor data further comprises digital image data.
20. The hardware controller of claim 11, wherein accessing the baseline sensor data comprises:
sending a request to a back-end server to access the baseline sensor data; and
receiving, from the back-end server, the baseline sensor data.
US17/167,963 2014-10-07 2021-02-04 Systems and methods for analyzing sensor data to detect property intrusion events Abandoned US20240013640A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/167,963 US20240013640A1 (en) 2014-10-07 2021-02-04 Systems and methods for analyzing sensor data to detect property intrusion events

Applications Claiming Priority (18)

Application Number Priority Date Filing Date Title
US201462060962P 2014-10-07 2014-10-07
US201562105407P 2015-01-20 2015-01-20
US201562187651P 2015-07-01 2015-07-01
US201562187645P 2015-07-01 2015-07-01
US201562187642P 2015-07-01 2015-07-01
US201562187666P 2015-07-01 2015-07-01
US201562187624P 2015-07-01 2015-07-01
US201562189329P 2015-07-07 2015-07-07
US201562193317P 2015-07-16 2015-07-16
US201562197343P 2015-07-27 2015-07-27
US201562198813P 2015-07-30 2015-07-30
US201562200375P 2015-08-03 2015-08-03
US201562201671P 2015-08-06 2015-08-06
US201562220383P 2015-09-18 2015-09-18
US14/873,823 US10388135B1 (en) 2014-10-07 2015-10-02 Systems and methods for analyzing sensor data to detect property intrusion events
US16/445,399 US10741033B1 (en) 2014-10-07 2019-06-19 System and methods for analyzing sensor data to detect property intrusion events
US16/700,783 US11004320B1 (en) 2014-10-07 2019-12-02 Systems and methods for analyzing sensor data to detect property intrusion events
US17/167,963 US20240013640A1 (en) 2014-10-07 2021-02-04 Systems and methods for analyzing sensor data to detect property intrusion events

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/700,783 Continuation US11004320B1 (en) 2014-10-07 2019-12-02 Systems and methods for analyzing sensor data to detect property intrusion events

Publications (1)

Publication Number Publication Date
US20240013640A1 true US20240013640A1 (en) 2024-01-11

Family

ID=61189017

Family Applications (31)

Application Number Title Priority Date Filing Date
US14/873,865 Active 2038-09-21 US10573146B1 (en) 2014-10-07 2015-10-02 Systems and methods for improved assisted or independent living environments
US14/873,968 Active 2038-01-12 US10282788B1 (en) 2014-10-07 2015-10-02 Systems and methods for managing service log information
US14/873,914 Active 2036-10-31 US10353359B1 (en) 2014-10-07 2015-10-02 Systems and methods for managing smart devices based upon electrical usage data
US14/873,864 Active US9898912B1 (en) 2014-10-07 2015-10-02 Systems and methods for automatically generating an escape route
US14/873,817 Active 2038-09-08 US10515372B1 (en) 2014-10-07 2015-10-02 Systems and methods for managing building code compliance for a property
US14/873,783 Active 2036-11-29 US10356303B1 (en) 2014-10-07 2015-10-02 Systems and methods for controlling smart devices based upon image data from image sensors
US14/873,823 Active US10388135B1 (en) 2014-10-07 2015-10-02 Systems and methods for analyzing sensor data to detect property intrusion events
US14/873,771 Active 2038-01-12 US10346811B1 (en) 2014-10-07 2015-10-02 Systems and methods for responding to a broken circuit
US14/873,904 Abandoned US20210142648A1 (en) 2014-10-07 2015-10-02 Systems and methods for automatically mitigating risk of damage from broken circuits
US14/873,942 Active 2036-09-21 US10249158B1 (en) 2014-10-07 2015-10-02 Systems and methods for automatically responding to a fire
US15/895,149 Active US10282961B1 (en) 2014-10-07 2018-02-13 Systems and methods for automatically generating an escape route
US16/266,423 Active US10522009B1 (en) 2014-10-07 2019-02-04 Systems and methods for automatically responding to a fire
US16/282,789 Active US10573149B1 (en) 2014-10-07 2019-02-22 Systems and methods for automatically generating an escape route
US16/393,131 Active US11049078B1 (en) 2014-10-07 2019-04-24 Systems and methods for responding to a broken circuit
US16/393,336 Abandoned US20210297579A1 (en) 2014-10-07 2019-04-24 Systems and Methods for Controlling Smart Devices Based Upon Image Data From Image Sensors
US16/393,312 Active US10795329B1 (en) 2014-10-07 2019-04-24 Systems and methods for managing smart devices based upon electrical usage data
US16/445,399 Active US10741033B1 (en) 2014-10-07 2019-06-19 System and methods for analyzing sensor data to detect property intrusion events
US16/674,140 Active 2036-08-03 US11551235B1 (en) 2014-10-07 2019-11-05 Systems and methods for managing building code compliance for a property
US16/692,536 Active US10943447B1 (en) 2014-10-07 2019-11-22 Systems and methods for automatically responding to a fire
US16/700,783 Active US11004320B1 (en) 2014-10-07 2019-12-02 Systems and methods for analyzing sensor data to detect property intrusion events
US16/738,328 Active 2036-03-03 US11423754B1 (en) 2014-10-07 2020-01-09 Systems and methods for improved assisted or independent living environments
US16/740,010 Active US11043098B1 (en) 2014-10-07 2020-01-10 Systems and methods for automatically generating an escape route
US16/899,380 Pending US20200302549A1 (en) 2014-10-07 2020-06-11 Systems and methods for managing warranty information
US17/009,914 Active US11656585B1 (en) 2014-10-07 2020-09-02 Systems and methods for managing smart devices based upon electrical usage data
US17/167,963 Abandoned US20240013640A1 (en) 2014-10-07 2021-02-04 Systems and methods for analyzing sensor data to detect property intrusion events
US17/170,659 Active US11334040B2 (en) 2014-10-07 2021-02-08 Systems and methods for automatically responding to a fire
US17/701,316 Pending US20220215732A1 (en) 2014-10-07 2022-03-22 Systems and methods for improved assisted or independent living environments
US17/706,302 Pending US20220215733A1 (en) 2014-10-07 2022-03-28 Systems and methods for improved assisted or independent living environments
US17/857,880 Pending US20220334544A1 (en) 2014-10-07 2022-07-05 Systems and methods for improved assisted or independent living environments
US18/094,731 Active US11815864B2 (en) 2014-10-07 2023-01-09 Systems and methods for managing building code compliance for a property
US18/134,756 Pending US20230251610A1 (en) 2014-10-07 2023-04-14 Systems and Methods for Managing Smart Devices Based Upon Electrical Usage Data

Family Applications Before (24)

Application Number Title Priority Date Filing Date
US14/873,865 Active 2038-09-21 US10573146B1 (en) 2014-10-07 2015-10-02 Systems and methods for improved assisted or independent living environments
US14/873,968 Active 2038-01-12 US10282788B1 (en) 2014-10-07 2015-10-02 Systems and methods for managing service log information
US14/873,914 Active 2036-10-31 US10353359B1 (en) 2014-10-07 2015-10-02 Systems and methods for managing smart devices based upon electrical usage data
US14/873,864 Active US9898912B1 (en) 2014-10-07 2015-10-02 Systems and methods for automatically generating an escape route
US14/873,817 Active 2038-09-08 US10515372B1 (en) 2014-10-07 2015-10-02 Systems and methods for managing building code compliance for a property
US14/873,783 Active 2036-11-29 US10356303B1 (en) 2014-10-07 2015-10-02 Systems and methods for controlling smart devices based upon image data from image sensors
US14/873,823 Active US10388135B1 (en) 2014-10-07 2015-10-02 Systems and methods for analyzing sensor data to detect property intrusion events
US14/873,771 Active 2038-01-12 US10346811B1 (en) 2014-10-07 2015-10-02 Systems and methods for responding to a broken circuit
US14/873,904 Abandoned US20210142648A1 (en) 2014-10-07 2015-10-02 Systems and methods for automatically mitigating risk of damage from broken circuits
US14/873,942 Active 2036-09-21 US10249158B1 (en) 2014-10-07 2015-10-02 Systems and methods for automatically responding to a fire
US15/895,149 Active US10282961B1 (en) 2014-10-07 2018-02-13 Systems and methods for automatically generating an escape route
US16/266,423 Active US10522009B1 (en) 2014-10-07 2019-02-04 Systems and methods for automatically responding to a fire
US16/282,789 Active US10573149B1 (en) 2014-10-07 2019-02-22 Systems and methods for automatically generating an escape route
US16/393,131 Active US11049078B1 (en) 2014-10-07 2019-04-24 Systems and methods for responding to a broken circuit
US16/393,336 Abandoned US20210297579A1 (en) 2014-10-07 2019-04-24 Systems and Methods for Controlling Smart Devices Based Upon Image Data From Image Sensors
US16/393,312 Active US10795329B1 (en) 2014-10-07 2019-04-24 Systems and methods for managing smart devices based upon electrical usage data
US16/445,399 Active US10741033B1 (en) 2014-10-07 2019-06-19 System and methods for analyzing sensor data to detect property intrusion events
US16/674,140 Active 2036-08-03 US11551235B1 (en) 2014-10-07 2019-11-05 Systems and methods for managing building code compliance for a property
US16/692,536 Active US10943447B1 (en) 2014-10-07 2019-11-22 Systems and methods for automatically responding to a fire
US16/700,783 Active US11004320B1 (en) 2014-10-07 2019-12-02 Systems and methods for analyzing sensor data to detect property intrusion events
US16/738,328 Active 2036-03-03 US11423754B1 (en) 2014-10-07 2020-01-09 Systems and methods for improved assisted or independent living environments
US16/740,010 Active US11043098B1 (en) 2014-10-07 2020-01-10 Systems and methods for automatically generating an escape route
US16/899,380 Pending US20200302549A1 (en) 2014-10-07 2020-06-11 Systems and methods for managing warranty information
US17/009,914 Active US11656585B1 (en) 2014-10-07 2020-09-02 Systems and methods for managing smart devices based upon electrical usage data

Family Applications After (6)

Application Number Title Priority Date Filing Date
US17/170,659 Active US11334040B2 (en) 2014-10-07 2021-02-08 Systems and methods for automatically responding to a fire
US17/701,316 Pending US20220215732A1 (en) 2014-10-07 2022-03-22 Systems and methods for improved assisted or independent living environments
US17/706,302 Pending US20220215733A1 (en) 2014-10-07 2022-03-28 Systems and methods for improved assisted or independent living environments
US17/857,880 Pending US20220334544A1 (en) 2014-10-07 2022-07-05 Systems and methods for improved assisted or independent living environments
US18/094,731 Active US11815864B2 (en) 2014-10-07 2023-01-09 Systems and methods for managing building code compliance for a property
US18/134,756 Pending US20230251610A1 (en) 2014-10-07 2023-04-14 Systems and Methods for Managing Smart Devices Based Upon Electrical Usage Data

Country Status (1)

Country Link
US (31) US10573146B1 (en)

Families Citing this family (130)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11592723B2 (en) 2009-12-22 2023-02-28 View, Inc. Automated commissioning of controllers in a window network
US11630366B2 (en) 2009-12-22 2023-04-18 View, Inc. Window antennas for emitting radio frequency signals
US11205926B2 (en) 2009-12-22 2021-12-21 View, Inc. Window antennas for emitting radio frequency signals
US20130271813A1 (en) 2012-04-17 2013-10-17 View, Inc. Controller for optically-switchable windows
US11342791B2 (en) 2009-12-22 2022-05-24 View, Inc. Wirelessly powered and powering electrochromic windows
US10303035B2 (en) 2009-12-22 2019-05-28 View, Inc. Self-contained EC IGU
US11732527B2 (en) 2009-12-22 2023-08-22 View, Inc. Wirelessly powered and powering electrochromic windows
US11054792B2 (en) 2012-04-13 2021-07-06 View, Inc. Monitoring sites containing switchable optical devices and controllers
US10989977B2 (en) 2011-03-16 2021-04-27 View, Inc. Onboard controller for multistate windows
US11300848B2 (en) 2015-10-06 2022-04-12 View, Inc. Controllers for optically-switchable devices
RU2636811C2 (en) 2012-04-13 2017-12-01 Вью, Инк. Applications for controlling optically switchable devices
US10964320B2 (en) 2012-04-13 2021-03-30 View, Inc. Controlling optically-switchable devices
US11764990B2 (en) 2013-07-26 2023-09-19 Skybell Technologies Ip, Llc Doorbell communications systems and methods
US11909549B2 (en) 2013-07-26 2024-02-20 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US10552911B1 (en) * 2014-01-10 2020-02-04 United Services Automobile Association (Usaa) Determining status of building modifications using informatics sensor data
US11150616B2 (en) 2014-03-05 2021-10-19 View, Inc. Site monitoring system
US11868103B2 (en) 2014-03-05 2024-01-09 View, Inc. Site monitoring system
US10859983B2 (en) 2014-03-05 2020-12-08 View, Inc. Monitoring sites containing switchable optical devices and controllers
US9892463B1 (en) 2014-04-25 2018-02-13 State Farm Mutual Automobile Insurance Company System and methods for community-based cause of loss determination
US10481459B2 (en) 2014-06-30 2019-11-19 View, Inc. Control methods and systems for networks of optically switchable windows during reduced power availability
US11743071B2 (en) 2018-05-02 2023-08-29 View, Inc. Sensing and communications unit for optically switchable window systems
US10573146B1 (en) 2014-10-07 2020-02-25 State Farm Mutual Automobile Insurance Company Systems and methods for improved assisted or independent living environments
KR20230003584A (en) 2014-11-25 2023-01-06 뷰, 인크. Window antennas
US11114742B2 (en) 2014-11-25 2021-09-07 View, Inc. Window antennas
KR20220154237A (en) 2014-12-08 2022-11-21 뷰, 인크. Multiple interacting systems at a site
US11740948B2 (en) 2014-12-08 2023-08-29 View, Inc. Multiple interacting systems at a site
US11575537B2 (en) * 2015-03-27 2023-02-07 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US20230163993A1 (en) * 2015-03-27 2023-05-25 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US11641452B2 (en) 2015-05-08 2023-05-02 Skybell Technologies Ip, Llc Doorbell communication systems and methods
US10565566B1 (en) 2015-09-10 2020-02-18 State Farm Mutual Automobile Insurance Company Systems and methods for ordering a replacement component or repair service
US11384596B2 (en) 2015-09-18 2022-07-12 View, Inc. Trunk line window controllers
US11436911B2 (en) 2015-09-30 2022-09-06 Johnson Controls Tyco IP Holdings LLP Sensor based system and method for premises safety and operational profiling based on drift analysis
US11151654B2 (en) * 2015-09-30 2021-10-19 Johnson Controls Tyco IP Holdings LLP System and method for determining risk profile, adjusting insurance premiums and automatically collecting premiums based on sensor data
US9767680B1 (en) * 2015-09-30 2017-09-19 Alarm.Com Incorporated Abberation detection technology
US10902524B2 (en) 2015-09-30 2021-01-26 Sensormatic Electronics, LLC Sensor based system and method for augmenting underwriting of insurance policies
US11941114B1 (en) * 2018-01-31 2024-03-26 Vivint, Inc. Deterrence techniques for security and automation systems
US11740091B2 (en) * 2015-11-05 2023-08-29 Cecelumen, Llc Methods and apparatus for distributing and/or receiving locally relevant information in emergencies
US10415980B1 (en) 2015-11-05 2019-09-17 Cecelumen, Llc Methods and apparatus for communicating and/or storing information to enhance experiences relating to visits to sites such as theme parks, zoos and/or other places of interest
US10721147B2 (en) 2015-11-05 2020-07-21 Cecelumen, Llc Methods and apparatus for associating content with one or more wireless signals and/or controlling access to content associated with such signals
EP3374832B1 (en) * 2015-11-09 2019-10-16 Otis Elevator Company Self-diagnostic electrical circuit
US10915829B1 (en) * 2015-12-09 2021-02-09 One Concern, Inc. Data model update for structural-damage predictor after an earthquake
US10482746B1 (en) 2016-01-06 2019-11-19 State Farm Mutual Automobile Insurance Company Sensor data to identify catastrophe areas
KR102329984B1 (en) * 2016-01-08 2021-11-24 삼성전자주식회사 Method and apparatus for controlling device in communication system
CA3013921A1 (en) * 2016-02-08 2017-08-17 Security Services Northwest, Inc. Location based security alert system
JP6084717B1 (en) * 2016-02-09 2017-02-22 株式会社クマガワ Evacuation guidance system
US10137984B1 (en) * 2016-02-23 2018-11-27 State Farm Mutual Automobile Insurance Company Systems and methods for operating drones in response to an incident
WO2017177361A1 (en) * 2016-04-11 2017-10-19 Telefonaktiebolaget Lm Ericsson (Publ) Flight path control based on cell broadcast messages
US10552914B2 (en) 2016-05-05 2020-02-04 Sensormatic Electronics, LLC Method and apparatus for evaluating risk based on sensor monitoring
US10225369B2 (en) * 2016-06-02 2019-03-05 At&T Intellectual Property I, L.P. Method and apparatus for providing a recommended action for a venue via a network
US10810676B2 (en) 2016-06-06 2020-10-20 Sensormatic Electronics, LLC Method and apparatus for increasing the density of data surrounding an event
US10091303B1 (en) * 2016-06-12 2018-10-02 Apple Inc. Using in-home location awareness
AU2017285025A1 (en) * 2016-06-13 2018-12-13 Intergraph Corporation Systems and methods for expediting repairs of utility equipment using electronic dialogs with people
EP3500891A4 (en) 2016-08-22 2020-03-25 View, Inc. Electromagnetic-shielding electrochromic windows
US11451043B1 (en) 2016-10-27 2022-09-20 State Farm Mutual Automobile Insurance Company Systems and methods for utilizing electricity monitoring devices to mitigate or prevent structural damage
KR102539580B1 (en) * 2016-12-01 2023-06-05 삼성전자주식회사 Method for sharing information on conditional action and an electronic device thereof
CN106683301A (en) * 2017-01-03 2017-05-17 京东方科技集团股份有限公司 Escape route generation method, device and system
WO2018170229A1 (en) * 2017-03-15 2018-09-20 Carrier Corporation System and method for indicating building fire danger ratings
US11892738B2 (en) 2017-04-26 2024-02-06 View, Inc. Tandem vision window and media display
US11493819B2 (en) 2017-04-26 2022-11-08 View, Inc. Displays for tintable windows
TW201907213A (en) 2017-04-26 2019-02-16 美商唯景公司 Colored window system computing platform
US11747696B2 (en) 2017-04-26 2023-09-05 View, Inc. Tandem vision window and media display
US11747698B2 (en) 2017-04-26 2023-09-05 View, Inc. Tandem vision window and media display
US10325471B1 (en) 2017-04-28 2019-06-18 BlueOwl, LLC Systems and methods for detecting a medical emergency event
NL2019123B1 (en) * 2017-06-26 2019-01-07 Epesi Creative New Media B V Method and system of presence detection
US10540871B2 (en) * 2017-07-05 2020-01-21 Oneevent Technologies, Inc. Evacuation system
US11108584B2 (en) * 2017-08-10 2021-08-31 The Adt Security Corporation User scene and schedule creation based on time of the year
US11627289B1 (en) * 2017-09-19 2023-04-11 Amazon Technologies, Inc. Activating security system alarms based on data generated by audio/video recording and communication devices
US11783422B1 (en) 2017-09-27 2023-10-10 State Farm Mutual Automobile Insurance Company Implementing machine learning for life and health insurance claims handling
US20190146441A1 (en) * 2017-11-16 2019-05-16 Associated Materials, Llc Methods and systems for home automation using an internet of things platform
US10810860B1 (en) * 2018-01-03 2020-10-20 Objectvideo Labs, Llc Intelligent vent hood
US11488077B1 (en) * 2018-01-31 2022-11-01 Vivint, Inc. Smart sensing techniques
US10825318B1 (en) 2018-04-09 2020-11-03 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US11585672B1 (en) * 2018-04-11 2023-02-21 Palantir Technologies Inc. Three-dimensional representations of routes
US11481837B1 (en) * 2018-04-12 2022-10-25 Wells Fargo Bank, N.A. Authentication circle management
US11386412B1 (en) 2018-04-12 2022-07-12 Wells Fargo Bank, N.A. Authentication circle management
US10943308B1 (en) 2018-05-03 2021-03-09 Wells Fargo Bank, N.A. Systems and methods for pervasive advisor for major expenditures
US10904076B2 (en) * 2018-05-30 2021-01-26 International Business Machines Corporation Directing functioning of an object based on its association to another object in an environment
US10834986B2 (en) 2018-07-12 2020-11-17 Sarah Nicole Ciccaglione Smart safety helmet with heads-up display
US11049162B2 (en) * 2018-08-30 2021-06-29 International Business Machines Corporation Method, medium, and system for automated hardware device replacement
WO2020096983A1 (en) * 2018-11-05 2020-05-14 EIG Technology, Inc. Event notification using a virtual insurance assistant
US11323846B2 (en) * 2018-11-29 2022-05-03 Motorola Solutions, Inc. Device, system and method for evacuation task management
US20200175843A1 (en) * 2018-12-03 2020-06-04 At& T Intellectual Property I, L.P. Methods and systems for first responder access to localized presence and identification information
JP6667878B1 (en) * 2018-12-14 2020-03-18 株式会社ポケモン Costume effect support device, costume effect support system, and costume effect support method
US10945190B2 (en) 2019-01-04 2021-03-09 Apple Inc. Predictive routing based on microlocation
CN110099103A (en) * 2019-04-12 2019-08-06 上海路正轨道交通设备有限公司 Auxiliary security guard system and method in a kind of work business system job
US10895392B2 (en) * 2019-04-23 2021-01-19 Resource Management Data System, LLC Systems and methods for heating and cooling a facility
US10841780B1 (en) * 2019-05-15 2020-11-17 Ronald S. Ogaz System and method of automatically evaluating and communicating an emergency situation
US20220254243A1 (en) * 2019-06-28 2022-08-11 Tecnoform S.P.A. System for the monitoring of the status of furnishing components, in particular for the interior furnishing of recreational vehicles or the like
US20220358822A1 (en) * 2019-07-01 2022-11-10 Sekisui House, Ltd. Emergency responding method, safety confirmation system, management device, space section, and method for controlling management device
US11894129B1 (en) 2019-07-03 2024-02-06 State Farm Mutual Automobile Insurance Company Senior living care coordination platforms
CN112311476A (en) * 2019-07-25 2021-02-02 上海长智系统集成有限公司 Escape evacuation method, escape evacuation device, escape evacuation storage medium and escape evacuation system based on sound wave communication
US11080990B2 (en) 2019-08-05 2021-08-03 Factory Mutual Insurance Company Portable 360-degree video-based fire and smoke detector and wireless alerting system
US11367527B1 (en) 2019-08-19 2022-06-21 State Farm Mutual Automobile Insurance Company Senior living engagement and care support platforms
US20210056559A1 (en) * 2019-08-24 2021-02-25 Eli Altaras Digital device warranty method and devices
CN110517388A (en) * 2019-08-30 2019-11-29 北京青岳科技有限公司 A kind of entrance guard controlling method and system with security audit
US11393055B2 (en) 2019-09-09 2022-07-19 Alarm.Com Incorporated Visitor-tailored property configuration
US11176799B2 (en) * 2019-09-10 2021-11-16 Jonathan Thompson Global positioning system equipped with hazard detector and a system for providing hazard alerts thereby
US20220229484A1 (en) * 2019-09-17 2022-07-21 Hewlett-Packard Development Company, L.P. Power management setting configuration
US11270401B2 (en) * 2019-09-18 2022-03-08 International Business Machines Corporation Generating a customized egress blueprint
US11640587B2 (en) * 2019-09-30 2023-05-02 Mitchell International, Inc. Vehicle repair workflow automation with OEM repair procedure verification
EP3800621A1 (en) * 2019-10-02 2021-04-07 Université de Marne La Vallee Method and device for guiding by connected object in a building
US11537703B2 (en) * 2019-10-11 2022-12-27 Moon River Investments, Llc GFI tripped circuit detection and wireless notification systems and methods
CN110718039A (en) * 2019-10-18 2020-01-21 Oppo广东移动通信有限公司 Fire alarm method, fire alarm device, household equipment and control terminal
EP3836101A1 (en) * 2019-12-11 2021-06-16 Carrier Corporation A method and a system for determining safe evacuation paths
US11734767B1 (en) 2020-02-28 2023-08-22 State Farm Mutual Automobile Insurance Company Systems and methods for light detection and ranging (lidar) based generation of a homeowners insurance quote
US11217085B2 (en) * 2020-03-02 2022-01-04 Tetra Ventures LLC Real time intervention platform for at-risk conduct
CN111431562B (en) * 2020-03-05 2022-01-11 许昌北邮万联网络技术有限公司 Fire-fighting information transmission system, method and device
JP2021140471A (en) * 2020-03-05 2021-09-16 パナソニックIpマネジメント株式会社 Information processing system and information processing method
TW202206925A (en) 2020-03-26 2022-02-16 美商視野公司 Access and messaging in a multi client network
US11830150B1 (en) 2020-04-27 2023-11-28 State Farm Mutual Automobile Insurance Company Systems and methods for visualization of utility lines
US11631493B2 (en) 2020-05-27 2023-04-18 View Operating Corporation Systems and methods for managing building wellness
US11659374B1 (en) * 2020-06-01 2023-05-23 United Services Automobile Association (Usaa) Fire warning network and emergency guidance system
CN111739238A (en) * 2020-06-08 2020-10-02 珠海格力电器股份有限公司 Dynamically-adjusted escape route generation method, system and device and fire detector
CN112489390B (en) * 2020-07-13 2022-05-10 北京宏远汇通网络科技有限公司 Security node collaborative alarm method based on intelligent security
US11488255B1 (en) 2020-08-03 2022-11-01 State Farm Mutual Automobile Insurance Company Apparatuses, systems and methods for mitigating property loss based on an event driven probable roof loss confidence score
CN112073901A (en) * 2020-08-17 2020-12-11 珠海格力电器股份有限公司 Safety early warning method, system, device, equipment and storage medium
US11935651B2 (en) 2021-01-19 2024-03-19 State Farm Mutual Automobile Insurance Company Alert systems for senior living engagement and care support platforms
US11445340B2 (en) * 2021-01-21 2022-09-13 Flying Cloud Technologies, Inc. Anomalous subject and device identification based on rolling baseline
US11635080B1 (en) 2021-02-12 2023-04-25 State Farm Mutual Automobile Insurance Company Determining and utilizing a desired frequency for a mechanical shaker for a sump pump system
US11475174B2 (en) 2021-03-09 2022-10-18 Togal.Ai Inc. Methods and apparatus for artificial intelligence conversion of a two-dimensional reference into an actionable interface
US11797733B2 (en) * 2021-03-09 2023-10-24 Togal.Ai Inc Artificial intelligence determination of building metrics for code compliance
US11481704B2 (en) 2021-03-09 2022-10-25 Togal.Ai Inc. Methods and apparatus for artificial intelligence conversion of change orders into an actionable interface
EP4063789A1 (en) * 2021-03-26 2022-09-28 Universite Gustave Eiffel Method and device for guiding by connected object in a building by location of each positioning terminal
US20230029280A1 (en) * 2021-07-23 2023-01-26 Dell Products, L.P. System and method for providing a warranty assigned to a logical device group
DE102021119788A1 (en) 2021-07-29 2023-02-02 Bayerische Motoren Werke Aktiengesellschaft Method and device for routing through a road network
USD1014553S1 (en) 2021-12-17 2024-02-13 Christal Bramble-Hill Display screen or portion thereof with a graphical user interface for a house appliance monitoring app
US20230342867A1 (en) * 2022-04-20 2023-10-26 State Farm Mutual Automobile Insurance Company Systems and Methods for Generating a Home Score for a User
US11537964B1 (en) 2022-06-03 2022-12-27 Cecilian Partners, Inc. Anti-monotony system and method associated with new home construction in a master-planned community
US11876371B1 (en) 2023-01-23 2024-01-16 Mark Schwarzbach Electric power circuit testing device, system, and method
US11822767B1 (en) * 2023-03-13 2023-11-21 The Prudential Insurance Company Of America Display tool

Family Cites Families (554)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US1042341A (en) 1912-05-07 1912-10-22 David Harrington Flash-lamp.
US1446000A (en) 1920-11-18 1923-02-20 Davis Cleland Armament for aircraft
US3648326A (en) * 1969-11-21 1972-03-14 Rixson Inc Electromechanical door holder-closer
US3740739A (en) * 1971-11-30 1973-06-19 Dresser Ind Well monitoring and warning system
US3771823A (en) * 1972-02-24 1973-11-13 Schlage Lock Co Electrically controlled hold-open device
US3875612A (en) * 1972-10-05 1975-04-08 Kidde & Co Walter Door control device
US3817161A (en) 1972-10-26 1974-06-18 N Koplon Smoke protection system
US3934306A (en) * 1975-01-06 1976-01-27 Federal Sign And Signal Corporation Door closure device
US4066072A (en) * 1976-02-12 1978-01-03 Cummins Betty L Comfort cushion for infants
US4418712A (en) 1980-01-16 1983-12-06 Braley Charles A Overflow control system
US4688026A (en) 1984-05-15 1987-08-18 Scribner James R Method of collecting and using data associated with tagged objects
US5005125A (en) 1986-02-28 1991-04-02 Sensormatic Electronics Corporation Surveillance, pricing and inventory system
US5099751A (en) 1989-05-02 1992-03-31 Gpac, Inc. Control system for doors of a negative air pressure enclosure
US5038268A (en) 1989-05-12 1991-08-06 Aquametrics, Inc. Irrigation system controller apparatus
CA2025201C (en) 1990-09-12 1992-09-01 Dominic Carbone Electronic accident estimating system
US6850252B1 (en) 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US5267587A (en) 1992-04-07 1993-12-07 Brown Geoffrey P Utilities shutoff system
US5576952A (en) * 1993-03-09 1996-11-19 Metriplex, Inc. Medical alert distribution system with selective filtering of medical information
US5572438A (en) 1995-01-05 1996-11-05 Teco Energy Management Services Engery management and building automation system
US5553609A (en) 1995-02-09 1996-09-10 Visiting Nurse Service, Inc. Intelligent remote visual monitoring system for home health care service
US5554433A (en) * 1995-02-10 1996-09-10 The Bilco Company Fire rated floor door and control system
US5884289A (en) * 1995-06-16 1999-03-16 Card Alert Services, Inc. Debit card fraud detection and control system
US8090598B2 (en) 1996-01-29 2012-01-03 Progressive Casualty Insurance Company Monitoring system for determining and communicating a cost of insurance
DE19613178A1 (en) * 1996-04-02 1997-10-09 Heinrich Landert Method for operating a door system and a door system operating according to the method
US5903426A (en) 1996-10-18 1999-05-11 Balluff, Inc. Overvoltage protection apparatus for a data interface
US6324516B1 (en) 1997-06-11 2001-11-27 Matthew P. Shults System and apparatus for utilization review of medical claims
US6466921B1 (en) * 1997-06-13 2002-10-15 Pitney Bowes Inc. Virtual postage meter with secure digital signature device
US6023762A (en) 1997-07-09 2000-02-08 Northern Telecom Limited Multi-view personalized communications agent
US6026166A (en) * 1997-10-20 2000-02-15 Cryptoworx Corporation Digitally certifying a user identity and a computer system in combination
US5967975A (en) 1997-11-13 1999-10-19 Ridgeway; Donald G. Home health parameter monitoring system
US6535855B1 (en) 1997-12-09 2003-03-18 The Chase Manhattan Bank Push banking system and method
US5935251A (en) 1997-12-22 1999-08-10 Hewlett Packard Company Method and apparatus expedited log-on to an application program
US5979607A (en) * 1998-03-31 1999-11-09 Allen; Thomas H. Multiple level building with an elevator system operable as a means of emergency egress and evacuation during a fire incident
US8882666B1 (en) 1998-05-08 2014-11-11 Ideal Life Inc. Personal health monitoring and/or communication system
MXPA00011835A (en) * 1998-06-03 2002-10-17 Scott Lab Inc Apparatus and method for providing a conscious patient relief from pain and anxiety associated with medical or surgical procedures.
US6526807B1 (en) 1998-06-18 2003-03-04 Joseph Doumit Early warning water leak detection system
US20030025599A1 (en) 2001-05-11 2003-02-06 Monroe David A. Method and apparatus for collecting, sending, archiving and retrieving motion video and still images and notification of detected events
US6363366B1 (en) * 1998-08-31 2002-03-26 David L. Henty Produce identification and pricing system for checkouts
US6286682B1 (en) * 1998-10-05 2001-09-11 Mywil, Inc. Medical alert message kit
US6341265B1 (en) 1998-12-03 2002-01-22 P5 E.Health Services, Inc. Provider claim editing and settlement system
US6104831A (en) 1998-12-10 2000-08-15 Esco Electronics Corporation Method for rejection of flickering lights in an imaging system
JP4085500B2 (en) * 1999-01-29 2008-05-14 株式会社エクォス・リサーチ Vehicle status grasping device, agent device, and vehicle control device
US6155324A (en) 1999-03-29 2000-12-05 The Cookson Company Apparatus and method for operating a door
AUPQ439299A0 (en) 1999-12-01 1999-12-23 Silverbrook Research Pty Ltd Interface system
WO2000072463A2 (en) 1999-05-26 2000-11-30 Johnson Controls Interiors Technology Corp. Wireless communications system and method
US7467094B2 (en) 1999-06-23 2008-12-16 Visicu, Inc. System and method for accounting and billing patients in a hospital environment
WO2001001366A2 (en) 1999-06-25 2001-01-04 Telemonitor, Inc. Smart remote monitoring system and method
US6554183B1 (en) * 1999-06-30 2003-04-29 Ge Capital Fleet Services Automated systems and methods for authorization and settlement of fleet maintenance and repair transactions
US6934692B1 (en) * 1999-07-06 2005-08-23 Dana B. Duncan On-line interactive system and method for transacting business
DE29921419U1 (en) 1999-12-06 2000-03-02 Shen Ein Yiao Measuring device for physiological activities in combination with a cell phone
EP1109400A1 (en) * 1999-12-16 2001-06-20 CANAL+ Société Anonyme Transmission of a command to a receiver or to a decoder
US7156809B2 (en) 1999-12-17 2007-01-02 Q-Tec Systems Llc Method and apparatus for health and disease management combining patient data monitoring with wireless internet connectivity
US6934862B2 (en) 2000-01-07 2005-08-23 Robertshaw Controls Company Appliance retrofit monitoring device with a memory storing an electronic signature
US6317047B1 (en) * 2000-04-28 2001-11-13 Michael Stein Firefighter's safety device
US6222455B1 (en) 2000-06-14 2001-04-24 Richard A. Kaiser Multi-functional smoke detector and signal device
US6847892B2 (en) 2001-10-29 2005-01-25 Digital Angel Corporation System for localizing and sensing objects and providing alerts
US6954758B1 (en) * 2000-06-30 2005-10-11 Ncr Corporation Building predictive models within interactive business analysis processes
US6237618B1 (en) 2000-07-06 2001-05-29 Nicholas D. Kushner System and method for controlling the unwanted flow of water through a water supply line
US8380630B2 (en) * 2000-07-06 2013-02-19 David Paul Felsher Information record infrastructure, system and method
US20020046047A1 (en) 2000-07-07 2002-04-18 Budd Jeffrey R. Patient care management system and method
US6826536B1 (en) 2000-07-22 2004-11-30 Bert Forman Health care billing monitor system for detecting health care provider fraud
US20050030175A1 (en) 2003-08-07 2005-02-10 Wolfe Daniel G. Security apparatus, system, and method
JP2002108865A (en) 2000-09-29 2002-04-12 Hitachi Kokusai Electric Inc Data retrieving system
US8682952B2 (en) 2000-11-09 2014-03-25 Intel-Ge Care Innovations Llc System for maximizing the effectiveness of care giving
AU2002345527A1 (en) 2001-03-09 2003-05-06 Jacob A. Shipon System and method for audio-visual one-on-one real time supervision
US6611206B2 (en) 2001-03-15 2003-08-26 Koninklijke Philips Electronics N.V. Automatic system for monitoring independent person requiring occasional assistance
JP2002279091A (en) * 2001-03-16 2002-09-27 Hitachi Ltd Maintenance service system of home electric appliance
US7181017B1 (en) 2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications
US20020147006A1 (en) 2001-04-09 2002-10-10 Coon Bradley S. Proximity-based control of building functions
US20030048191A1 (en) 2001-04-20 2003-03-13 Denton Juangi Michael Denton's sumpump alarm company
US10298735B2 (en) 2001-04-24 2019-05-21 Northwater Intellectual Property Fund L.P. 2 Method and apparatus for dynamic configuration of a multiprocessor health data system
US7340401B1 (en) 2001-06-18 2008-03-04 Koenig Martin D Method of product procurement and cash flow including a manufacturer, a transaction facilitator, and third party payor
US6886139B2 (en) 2001-10-01 2005-04-26 Yadong Liu Method and apparatus for managing infant care
US7259656B1 (en) * 2001-11-13 2007-08-21 Ch2M Hill Industrial Design & Construction, Inc. System and method for displaying safe exit routes during an emergency condition
JP2003157357A (en) 2001-11-21 2003-05-30 Matsushita Electric Ind Co Ltd Use charge calculation method for home electrical equipment and home electrical equipment
US7395219B2 (en) * 2001-12-08 2008-07-01 Kenneth Ray Strech Insurance on demand transaction management system
US7308356B2 (en) 2002-01-30 2007-12-11 Comverse, Inc. Wireless personalized self-service network
US6691724B2 (en) 2002-04-11 2004-02-17 Michael Brent Ford Method and system for controlling a household water supply
US7356516B2 (en) * 2002-06-13 2008-04-08 Visa U.S.A. Inc. Method and system for facilitating electronic dispute resolution
US6873256B2 (en) 2002-06-21 2005-03-29 Dorothy Lemelson Intelligent building alarm
US8639650B1 (en) 2003-06-25 2014-01-28 Susan Pierpoint Gill Profile-responsive system for information exchange in human- and device-adaptive query-response networks for task and crowd management, distributed collaboration and data integration
JP4003591B2 (en) 2002-07-11 2007-11-07 ソニー株式会社 Monitoring system, monitoring method and program
US6812848B2 (en) 2002-08-12 2004-11-02 Flo-Guard Water Leak Mitigation Systems, Llc Water leak mitigation system
US7030767B2 (en) 2002-08-12 2006-04-18 Flo-Guard Water Leak Mitigation Systems, L.L.C. Water leak mitigation system
US20040054789A1 (en) 2002-09-12 2004-03-18 International Business Machines Corporation Pervasive home network portal
DE10246033B4 (en) * 2002-10-02 2006-02-23 Novar Gmbh flight control system
EP1573598A4 (en) 2002-12-16 2006-07-26 Questerra Corp Real-time insurance policy underwriting and risk management
US20040153382A1 (en) * 2003-01-31 2004-08-05 Richard Boccuzzi System and method for determining discrepancies in a communications system
US8655683B2 (en) 2003-02-04 2014-02-18 Allstate Insurance Company Remote contents estimating system and method
HK1052830A2 (en) 2003-02-26 2003-09-05 Intexact Technologies Ltd An integrated programmable system for controlling the operation of electrical and/or electronic appliances of a premises
US7774268B2 (en) 2003-03-03 2010-08-10 The Tb Group, Inc. System, method, and apparatus for identifying and authenticating the presence of high value assets at remote locations
FR2852723B1 (en) 2003-03-18 2006-05-19 METHOD FOR REMOTE COMMUNICATION BETWEEN AN ORDER TRANSMITTER AND ORDER RECEIVER
US20040220538A1 (en) 2003-04-22 2004-11-04 Panopoulos Peter John Hygienic diaper, sensor pad, and or sensing belt with alert, readout, transmission, paging, software & patient information database recording means for treating & caring for wetness, feces, & disease
JP4084694B2 (en) 2003-04-22 2008-04-30 シャープ株式会社 Washing machine
US7071821B2 (en) 2003-05-14 2006-07-04 Bellsouth Intellectual Property Corporation Method and system for alerting a person to a situation
US20040249250A1 (en) 2003-06-04 2004-12-09 Mcgee Michael D. System and apparatus for monitoring and prompting medical self-care events and communicating medical self-care status
AU2004258523B2 (en) * 2003-07-07 2009-12-10 Irdeto B.V. Reprogrammable security for controlling piracy and enabling interactive content
US7339493B2 (en) 2003-07-10 2008-03-04 University Of Florida Research Foundation, Inc. Multimedia controller
US9311676B2 (en) 2003-09-04 2016-04-12 Hartford Fire Insurance Company Systems and methods for analyzing sensor data
US20050080520A1 (en) 2003-09-22 2005-04-14 Robert Kline Waste recovery and material handling process to replace the traditional trash transfer station and landfil by extracting reusable material and energy from joined refuse streams to include; office waste, dry waste, wet garbage and the special hazardous material handling of biological, chemical, and nuclear waste
BRPI0415352B1 (en) 2003-10-17 2017-05-23 Hydralift Amclyde Inc computer based system and method for administering replaceable components for equipment having a plurality of components, and method used for monitoring the condition of remote equipment having at least one wear component
US7376244B2 (en) 2003-11-24 2008-05-20 Micron Technology, Inc. Imaging surveillance system and method for event detection in low illumination
US20050137465A1 (en) 2003-12-23 2005-06-23 General Electric Company System and method for remote monitoring in home activity of persons living independently
US8185191B1 (en) * 2003-12-29 2012-05-22 Michael Evan Shapiro Pulse monitoring and warning system for infants
US20050139420A1 (en) 2003-12-31 2005-06-30 Spoltore Michael T. Fire ladder with wireless deployment
US7309216B1 (en) 2004-01-23 2007-12-18 Spadola Jr Joseph Pump control and management system
US7091865B2 (en) 2004-02-04 2006-08-15 General Electric Company System and method for determining periods of interest in home of persons living independently
US20060154642A1 (en) 2004-02-20 2006-07-13 Scannell Robert F Jr Medication & health, environmental, and security monitoring, alert, intervention, information and network system with associated and supporting apparatuses
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US9609003B1 (en) 2007-06-12 2017-03-28 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US7242305B2 (en) 2004-04-09 2007-07-10 General Electric Company Device and method for monitoring movement within a home
US7154399B2 (en) 2004-04-09 2006-12-26 General Electric Company System and method for determining whether a resident is at home or away
WO2005104765A2 (en) * 2004-04-27 2005-11-10 Tour Andover Controls A cellular telephone based electronic access control system
US7809587B2 (en) 2004-05-07 2010-10-05 International Business Machines Corporation Rapid business support of insured property using image analysis
US8856383B2 (en) 2004-05-20 2014-10-07 Presto Services, Inc. Systems and methods for controlling information and use of communications devices through a central server
US7623028B2 (en) * 2004-05-27 2009-11-24 Lawrence Kates System and method for high-sensitivity sensor
US7218237B2 (en) 2004-05-27 2007-05-15 Lawrence Kates Method and apparatus for detecting water leaks
US7042352B2 (en) 2004-05-27 2006-05-09 Lawrence Kates Wireless repeater for sensor system
EP1759364A1 (en) 2004-06-08 2007-03-07 Kieran Patterson Emergency lighting
US20080184272A1 (en) 2004-06-16 2008-07-31 Brownewell Michael L Documentation system for loss control
US7562121B2 (en) 2004-08-04 2009-07-14 Kimberco, Inc. Computer-automated system and method of assessing the orientation, awareness and responses of a person with reduced capacity
US20060033625A1 (en) 2004-08-11 2006-02-16 General Electric Company Digital assurance method and system to extend in-home living
US20060058612A1 (en) * 2004-08-18 2006-03-16 Ashok Dave Medical alert communication systems and methods
US7502498B2 (en) 2004-09-10 2009-03-10 Available For Licensing Patient monitoring apparatus
US7590589B2 (en) * 2004-09-10 2009-09-15 Hoffberg Steven M Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference
KR20070065358A (en) 2004-09-13 2007-06-22 익셉트, 인코포레이티드 Purchasing alert methods and apparatus
US7411510B1 (en) 2004-10-14 2008-08-12 Nixon Kenneth R Internet-based informal care delivery system
TW200642408A (en) * 2004-12-07 2006-12-01 Farsheed Atef System and method for identity verification and management
US7515063B2 (en) 2004-12-07 2009-04-07 Steven Nigel Dario Brundula Automatic garage door closing device
US20090259581A1 (en) 2004-12-21 2009-10-15 Horowitz Kenneth A Financial activity relating to natural peril events
US8029710B2 (en) 2006-11-03 2011-10-04 University Of Southern California Gantry robotics system and related material transport for contour crafting
US20060184379A1 (en) 2005-02-14 2006-08-17 Accenture Global Services Gmbh Embedded warranty management
US20060205564A1 (en) 2005-03-04 2006-09-14 Peterson Eric K Method and apparatus for mobile health and wellness management incorporating real-time coaching and feedback, community and rewards
FI117526B3 (en) 2005-03-17 2016-07-05 Innohome Oy Accessory that controls and monitors the operation of home appliances and entertainment equipment
US8836580B2 (en) * 2005-05-09 2014-09-16 Ehud Mendelson RF proximity tags providing indoor and outdoor navigation and method of use
US20060001545A1 (en) * 2005-05-04 2006-01-05 Mr. Brian Wolf Non-Intrusive Fall Protection Device, System and Method
US10643217B2 (en) 2005-05-26 2020-05-05 Efunds Corporation Debit-based identity theft monitoring and prevention
US20070289635A1 (en) 2005-06-22 2007-12-20 Ghazarian John D Secure wireless leak detection system
WO2007022250A2 (en) * 2005-08-16 2007-02-22 Nielsen Media Research, Inc. Display device on/off detection methods and apparatus
US8150720B2 (en) * 2005-08-29 2012-04-03 Emerson Retail Services, Inc. Dispatch management model
US8566121B2 (en) 2005-08-29 2013-10-22 Narayanan Ramasubramanian Personalized medical adherence management system
GB0519848D0 (en) 2005-09-29 2005-11-09 Jewellery Store The Dmcc A method of trading
US7733224B2 (en) 2006-06-30 2010-06-08 Bao Tran Mesh network personal emergency response appliance
US8019622B2 (en) 2005-10-24 2011-09-13 CellTrak Technologies, Inc. Home health point-of-care and administration system
US20070096938A1 (en) 2005-10-31 2007-05-03 Emmanuel Enrique Lopez System and method for adaptation of wireless remote controls
US20070146150A1 (en) * 2005-12-22 2007-06-28 Gerry Calabrese Carbon monoxide poisoning avoidance system
US8825043B2 (en) 2006-01-04 2014-09-02 Vtech Telecommunications Limited Cordless phone system with integrated alarm and remote monitoring capability
US7598856B1 (en) * 2006-01-31 2009-10-06 Firesite Llc Navigation aid for low-visibility environments
US20070186165A1 (en) 2006-02-07 2007-08-09 Pudding Ltd. Method And Apparatus For Electronically Providing Advertisements
US20070276626A1 (en) 2006-03-16 2007-11-29 Bruffey Timothy N System and apparatus for remote monitoring of conditions in locations undergoing water damage restoration
US8041636B1 (en) 2006-04-14 2011-10-18 Intuit Inc. Method and apparatus for dynamically determining insurance coverage
WO2007121570A1 (en) 2006-04-20 2007-11-01 Iq Life, Inc. Interactive patient monitoring system using speech recognition
US7956735B2 (en) 2006-05-15 2011-06-07 Cernium Corporation Automated, remotely-verified alarm system with intrusion and video surveillance and digital video recording
US7683793B2 (en) * 2006-06-06 2010-03-23 Honeywell International Inc. Time-dependent classification and signaling of evacuation route safety
EP1884787A1 (en) * 2006-07-10 2008-02-06 S. THIIM ApS A current sensor for measuring electric current in a conductor and a short circuit indicator system comprising such a sensor
US7551080B2 (en) * 2006-07-17 2009-06-23 Sensormatic Electronics Corporation Control for embedded and door-mounted antennas
US8108271B1 (en) 2006-07-18 2012-01-31 Intuit Inc. Method and apparatus for lower of cost or market value monitoring and notification
KR100772412B1 (en) 2006-07-18 2007-11-01 삼성전자주식회사 Apparatus and method of controlling home control network
US20080240379A1 (en) 2006-08-03 2008-10-02 Pudding Ltd. Automatic retrieval and presentation of information relevant to the context of a user's conversation
US9030315B2 (en) 2006-08-29 2015-05-12 Siemens Industry, Inc. Binding methods and devices in a building automation system
KR101667534B1 (en) * 2006-09-22 2016-10-19 씨아이피엘에이 엘티디. Rifaximin
US8229767B2 (en) 2006-10-18 2012-07-24 Hartford Fire Insurance Company System and method for salvage calculation, fraud prevention and insurance adjustment
US8050665B1 (en) 2006-10-20 2011-11-01 Avaya Inc. Alert reminder trigger by motion-detector
US20080101160A1 (en) * 2006-11-01 2008-05-01 Rodney Besson Med Alert Watch
CA2567275A1 (en) 2006-11-06 2008-05-06 Saskatchewan Telecommunications Health monitoring system and method
US20080115543A1 (en) 2006-11-17 2008-05-22 Electronics And Telecommunications Research Institute Door management system for field service and delivery personnel
US7586418B2 (en) 2006-11-17 2009-09-08 General Electric Company Multifunctional personal emergency response system
US7945497B2 (en) 2006-12-22 2011-05-17 Hartford Fire Insurance Company System and method for utilizing interrelated computerized predictive models
US8253574B2 (en) * 2006-12-29 2012-08-28 Honeywell International Inc. Systems and methods to predict fire and smoke propagation
US8358214B2 (en) * 2007-02-02 2013-01-22 Hartford Fire Insurance Company Systems and methods for sensor-enhanced health evaluation
US20080235629A1 (en) 2007-03-23 2008-09-25 Mozes Incorporated Display of multi-sided user object information in networked computing environment
US20090012373A1 (en) 2007-04-06 2009-01-08 Laurea Ammattikorkeakoulu Oy System and Method for Providing Health Care Services
US7961946B2 (en) 2007-05-15 2011-06-14 Digisensory Technologies Pty Ltd Method and system for background estimation in localization and tracking of objects in a smart video camera
US8831299B2 (en) 2007-05-22 2014-09-09 Intellectual Ventures Fund 83 Llc Capturing data for individual physiological monitoring
US20080294462A1 (en) 2007-05-23 2008-11-27 Laura Nuhaan System, Method, And Apparatus Of Facilitating Web-Based Interactions Between An Elderly And Caregivers
KR101113237B1 (en) * 2007-05-30 2012-02-20 삼성전자주식회사 Method and apparatus for providing remote device with service of Universal Plug and Play network
US8165938B2 (en) * 2007-06-04 2012-04-24 Visa U.S.A. Inc. Prepaid card fraud and risk management
GB0711770D0 (en) * 2007-06-18 2007-07-25 Domia Ltd Off site monitoring/control of electrical equipment
US8046243B2 (en) * 2007-07-17 2011-10-25 Sap Ag Automatic insurance adjustments using real world awareness
US7652481B2 (en) 2007-08-17 2010-01-26 Detec Systems Llc Method and apparatus to detect and locate roof leaks
CN100544150C (en) 2007-08-22 2009-09-23 董右云 Intelligentized electric energy management system assembled device
GB0718911D0 (en) * 2007-09-28 2007-11-07 Chilvers Graham Power isolator
US8154398B2 (en) * 2007-10-23 2012-04-10 La Crosse Technology Remote location monitoring
US9297150B2 (en) 2007-10-24 2016-03-29 Michael Edward Klicpera Water use monitoring apparatus and water damage prevention system
WO2009061936A1 (en) 2007-11-06 2009-05-14 Three H Corporation Method and system for safety monitoring
US9779403B2 (en) 2007-12-07 2017-10-03 Jpmorgan Chase Bank, N.A. Mobile fraud prevention system and method
US8188709B2 (en) * 2008-01-09 2012-05-29 Seiko Epson Corporation Power transmission control device, power transmitting device, non-contact power transmitting system, and electronic instrument
JP4905377B2 (en) 2008-01-31 2012-03-28 ブラザー工業株式会社 Information processing device
TW200933538A (en) 2008-01-31 2009-08-01 Univ Nat Chiao Tung Nursing system
US8255090B2 (en) 2008-02-01 2012-08-28 Energyhub System and method for home energy monitor and control
US8773827B2 (en) * 2008-02-19 2014-07-08 Simply Automated Incorporated Intelligent circuit breaker apparatus and methods
JP4453764B2 (en) * 2008-02-22 2010-04-21 トヨタ自動車株式会社 Vehicle diagnostic device, vehicle diagnostic system, and diagnostic method
US20090240170A1 (en) * 2008-03-20 2009-09-24 Wright State University Systems and methods for determining pre-fall conditions based on the angular orientation of a patient
US11864051B2 (en) 2008-04-01 2024-01-02 Blancco Technology Group IP Oy Systems and methods for monitoring and managing use of mobile electronic devices
CN102077230A (en) 2008-04-17 2011-05-25 旅行者保险公司 A method of and system for determining and processing object structure condition information
US8219558B1 (en) 2008-04-25 2012-07-10 David Scott Trandal Methods and systems for inventory management
US8409104B2 (en) 2008-05-02 2013-04-02 Conopco Inc. Heart age assessment
CA2722785C (en) 2008-05-07 2015-03-17 Power House Dynamics, Inc. System and method to monitor and manage performance of appliances
US20090281393A1 (en) 2008-05-08 2009-11-12 Putnam Technical Group, Inc. Method and apparatus for administering and monitoring patient treatment
US20130100268A1 (en) 2008-05-27 2013-04-25 University Health Network Emergency detection and response system and method
GB2460301A (en) 2008-05-30 2009-12-02 Pulsar Process Measurement Ltd Sump monitoring method and apparatus
EP2128515A1 (en) 2008-05-30 2009-12-02 Koninklijke Philips Electronics N.V. A water appliance having a flow control unit and a filter assembly
US8346225B2 (en) * 2009-01-28 2013-01-01 Headwater Partners I, Llc Quality of service for device assisted services
US8229861B1 (en) 2008-06-11 2012-07-24 Trandal David S Methods and systems for online warranty management
US8976937B2 (en) 2008-06-27 2015-03-10 Adt Us Holding, Inc. Method and apparatus for communication between a security system and a monitoring center
US20090326981A1 (en) 2008-06-27 2009-12-31 Microsoft Corporation Universal health data collector and advisor for people
US9001989B2 (en) 2008-08-04 2015-04-07 Centurylink Intellectual Property Llc System and method for a smart dialer
US8798289B1 (en) * 2008-08-05 2014-08-05 Audience, Inc. Adaptive power saving for an audio device
US8346594B2 (en) 2008-09-09 2013-01-01 At&T Intellectual Property I Comprehensive information market exchange
US8482884B2 (en) * 2008-09-25 2013-07-09 William J. Hennessey, JR. Emergency utility interruption system
DE102008042391A1 (en) * 2008-09-26 2010-04-01 Robert Bosch Gmbh Fire safety device, method for fire safety and computer program
US8725601B2 (en) * 2008-11-21 2014-05-13 Pscu Financial Services Method and apparatus for consumer driven protection for payment card transactions
US20100131416A1 (en) * 2008-11-25 2010-05-27 Daryl Anne Means Building Pin Identification System
GB0822237D0 (en) 2008-12-05 2009-01-14 Howell Steven Remote health and security monitoring
IES20090930A2 (en) 2008-12-10 2010-08-04 Moqom Ltd Electronic transaction fraud prevention
US8083367B2 (en) * 2008-12-12 2011-12-27 Anderson Jerry T Emergency exit route illumination system and methods
US8140418B1 (en) 2009-01-09 2012-03-20 Apple Inc. Cardholder-not-present authorization
US9020769B2 (en) 2009-01-26 2015-04-28 Geneva Cleantech Inc. Automatic detection of appliances
US7958201B2 (en) 2009-01-29 2011-06-07 Ted Lindsay Method, system and apparatus for encouraging frequent and purposeful electronic communications from caregivers to individuals with impaired memory
US8280633B1 (en) 2009-02-10 2012-10-02 Strategic Design Federation W, Inc. Weather risk estimation system and method
US20100299217A1 (en) 2009-02-16 2010-11-25 Richard Hui Warranty management system
US8441356B1 (en) 2009-02-16 2013-05-14 Handhold Adaptive, LLC Methods for remote assistance of disabled persons
CA2752875A1 (en) 2009-02-20 2010-08-26 Moqom Limited Merchant alert system and method for fraud prevention
US9747417B2 (en) 2013-11-14 2017-08-29 Mores, Inc. Method and apparatus for enhanced personal care
CN101858948B (en) * 2009-04-10 2015-01-28 阿海珐输配电英国有限公司 Method and system for carrying out transient and intermittent earth fault detection and direction determination in three-phase medium-voltage distribution system
CA2760770A1 (en) * 2009-05-04 2010-11-11 Visa International Service Association Demographic analysis using time-based consumer transaction histories
CA2762163C (en) 2009-05-18 2017-12-12 Alarm.Com Incorporated Remote device control and energy monitoring
US8289160B1 (en) 2009-05-29 2012-10-16 United Services Automobile Association (Usaa) Systems and methods for recording and using information about conditions present in a house or other location
BRPI1010658B1 (en) * 2009-06-02 2021-01-26 Schneider Electric USA, Inc. computer-implemented method for integrating multiple management domains
WO2010150260A1 (en) 2009-06-24 2010-12-29 The Medical Research, Infrastructure, And Health Services Fund Of The Tel Aviv Medical Center Automated near-fall detector
US8106769B1 (en) 2009-06-26 2012-01-31 United Services Automobile Association (Usaa) Systems and methods for automated house damage detection and reporting
US20110021140A1 (en) 2009-07-22 2011-01-27 Boston Life Labs Method and apparatus for providing home healthcare services using a sensor network
NL1037342C2 (en) 2009-10-02 2011-04-05 Inventor Invest Holding B V SECURITY SYSTEM AND METHOD FOR PROTECTING AN AREA.
US8605209B2 (en) 2009-11-24 2013-12-10 Gregory Towle Becker Hurricane damage recording camera system
US8401514B2 (en) * 2009-12-03 2013-03-19 Osocad Remote Limited Liability Company System and method for controlling an emergency event in a region of interest
US20110161119A1 (en) * 2009-12-24 2011-06-30 The Travelers Companies, Inc. Risk assessment and control, insurance premium determinations, and other applications using busyness
US20120079092A1 (en) 2009-12-28 2012-03-29 Telefonaktiebolaget L M Ericsson (Publ) Management of data flows between user equipment nodes and clusters of networked resource nodes
US9558520B2 (en) 2009-12-31 2017-01-31 Hartford Fire Insurance Company System and method for geocoded insurance processing using mobile devices
US20110166714A1 (en) 2010-01-04 2011-07-07 Stachnik Michael S Systems and methods for monitoring and controlling water flow of premises
US20110173122A1 (en) 2010-01-09 2011-07-14 Tara Chand Singhal Systems and methods of bank security in online commerce
US20110195687A1 (en) * 2010-02-10 2011-08-11 Qualcomm Incorporated Method and apparatus for communication of emergency response instructions
US20110203383A1 (en) 2010-02-11 2011-08-25 Phelps Matthew B Method to determine percentage of damage to structure from single or multiple forces
US20110202194A1 (en) 2010-02-15 2011-08-18 General Electric Company Sub-metering hardware for measuring energy data of an energy consuming device
WO2011103344A1 (en) 2010-02-17 2011-08-25 Carematix, Inc. Systems and methods for predicting patient health problems and providing timely intervention
JP2011170724A (en) * 2010-02-22 2011-09-01 Hitachi Ltd Failure diagnosis system, failure diagnosis apparatus and failure diagnosis program
US20110224501A1 (en) 2010-03-12 2011-09-15 Scotte Hudsmith In-home health monitoring apparatus and system
WO2011119976A2 (en) 2010-03-26 2011-09-29 Visa International Service Association System and method for early detection of fraudulent transactions
US20110246123A1 (en) 2010-03-30 2011-10-06 Welch Allyn, Inc. Personal status monitoring
WO2011133628A1 (en) 2010-04-21 2011-10-27 Raymond Koverzin Remotely managed assistive device
US8650048B1 (en) 2010-04-28 2014-02-11 United Services Automobile Association (Usaa) Method and system for insuring real property in wildfire prone areas
GB2479908B (en) * 2010-04-28 2013-07-10 Toshiba Res Europ Ltd Apparatus and method for privacy-driven moderation of metering data
US20120101855A1 (en) * 2010-05-17 2012-04-26 The Travelers Indemnity Company Monitoring client-selected vehicle parameters in accordance with client preferences
WO2011162587A2 (en) 2010-06-26 2011-12-29 엘지전자 주식회사 Network system
US8572677B2 (en) 2010-07-14 2013-10-29 William G. Bartholomay Devices, systems, and methods for enabling reconfiguration of services supported by a network of devices
US8010992B1 (en) 2010-07-14 2011-08-30 Domanicom Corp. Devices, systems, and methods for providing increased security when multiplexing one or more services at a customer premises
US8220296B2 (en) * 2010-07-15 2012-07-17 Fenix Manufacturing Locking assembly hasp
US9460471B2 (en) 2010-07-16 2016-10-04 Hartford Fire Insurance Company System and method for an automated validation system
US11152118B2 (en) 2010-07-20 2021-10-19 Interfaced Solutions, Inc. Electronic medical record interactive interface system
US20130143519A1 (en) * 2010-07-29 2013-06-06 J&M I.P. Holding Company, Llc Fall-Responsive Emergency Device, System, and Method
AU2010358067A1 (en) * 2010-07-29 2013-02-14 J & M I.P. Holding Company, Llc Fall-responsive emergency device, system, and method
DE102010034072A1 (en) * 2010-08-12 2012-02-16 Crosscan Gmbh Personnel control system for the evacuation of a building or a building section
US20120046973A1 (en) * 2010-08-23 2012-02-23 Bank Of America Corporation Unemployment Insurance Marketing System
US20120265586A1 (en) * 2010-09-16 2012-10-18 Rutgers, The State University Of New Jersey System and method to measure and control power consumption in a residential or commercial building via a wall socket to ensure optimum energy usage therein
US20120095846A1 (en) 2010-10-13 2012-04-19 Derek John Leverant Systems and methods for providing social networking, wherein a user can create multiple profiles within a single account
US8359211B2 (en) 2010-11-09 2013-01-22 Hartford Fire Insurance Company System and method for active insurance underwriting using intelligent IP-addressable devices
US10255491B2 (en) 2010-11-19 2019-04-09 Nikon Corporation Guidance system, detection device, and position assessment device
US20120143754A1 (en) * 2010-12-03 2012-06-07 Narendra Patel Enhanced credit card security apparatus and method
US20120166115A1 (en) 2010-12-23 2012-06-28 Nexgrid, Llc Platform, system and method for energy profiling
US9165334B2 (en) 2010-12-28 2015-10-20 Pet Check Technology Llc Pet and people care management system
US8615414B2 (en) * 2011-03-08 2013-12-24 T.R.U.S.T. Technology Solutions Llc Apparatus and method for optimizing insurance policies
US8587290B2 (en) * 2011-03-29 2013-11-19 General Electric Company Method, system and device of phase identification using a smart meter
US8675920B2 (en) 2011-04-04 2014-03-18 Alarm.Com Incorporated Fall detection and reporting technology
US9424606B2 (en) 2011-04-28 2016-08-23 Allstate Insurance Company Enhanced claims settlement
US20120296580A1 (en) 2011-05-16 2012-11-22 Dov Barkay Method and system for identifying leaks in liquid pipe construction
US20130030974A1 (en) 2011-05-27 2013-01-31 Brendan Casey Device and method for automatically allocating and transferring funds in an account
US8924994B2 (en) * 2011-05-31 2014-12-30 The Nielsen Company (Us), Llc Power management for audience measurement meters
US8965327B2 (en) 2011-06-09 2015-02-24 Alan H. Davis Interactive multi-channel communication system
US20120323382A1 (en) 2011-06-15 2012-12-20 Expanergy, Llc Systems and methods to assess and optimize energy usage for a facility
US20120323609A1 (en) 2011-06-16 2012-12-20 Enservio, Inc. Systems and methods for predicting the value of personal property
US8868616B1 (en) 2011-07-07 2014-10-21 Integrity Tracking, Llc Event data monitoring systems and methods
US9082072B1 (en) * 2011-07-14 2015-07-14 Donald K. Wedding, Jr. Method for applying usage based data
US20120054124A1 (en) * 2011-07-21 2012-03-01 Sunil Rodrigues Building energy efficiency diagnostic and monitoring system
US8929588B2 (en) 2011-07-22 2015-01-06 Honeywell International Inc. Object tracking
CA2843272C (en) 2011-07-29 2020-06-02 Adt Us Holdings, Inc. Security system and method
WO2013026047A2 (en) * 2011-08-17 2013-02-21 Trans Union Llc Systems and methods for generating vehicle insurance premium quotes based on a vehicle history
US8618927B2 (en) 2011-08-24 2013-12-31 At&T Intellectual Property I, L.P. Methods, systems, and products for notifications in security systems
CA2846501A1 (en) 2011-08-31 2013-03-07 Martin CARTY Health management system
US8786425B1 (en) 2011-09-09 2014-07-22 Alarm.Com Incorporated Aberration engine
US20130073306A1 (en) 2011-09-16 2013-03-21 Jordan Shlain Healthcare pre-visit and follow-up system
WO2013072925A2 (en) 2011-09-19 2013-05-23 Tata Consultancy Services Limited A computing platform for development and deployment of sensor data based applications and services
US20130073299A1 (en) 2011-09-20 2013-03-21 The Warman Group, LLC Caregiving social network
JP5318172B2 (en) * 2011-09-30 2013-10-16 株式会社東芝 Electronic equipment and programs
EP2575113A1 (en) 2011-09-30 2013-04-03 General Electric Company Method and device for fall detection and a system comprising such device
US20130085688A1 (en) 2011-09-30 2013-04-04 Craig Miller Water flow sensor and monitoring system comprising a water flow sensor
US9644974B2 (en) 2011-10-19 2017-05-09 Honeywell International Inc. Model-based generation of information and evacuation messages
WO2013059822A1 (en) * 2011-10-22 2013-04-25 Coon Jonathan Systems and methods for automatically filling-in information
US9536052B2 (en) 2011-10-28 2017-01-03 Parkland Center For Clinical Innovation Clinical predictive and monitoring system and method
WO2013074868A1 (en) 2011-11-16 2013-05-23 Flextronics Ap, Llc Complete vehicle ecosystem
IL216497A (en) 2011-11-21 2016-07-31 Yona Senesh Apparatus and method for distributing a liquid through a network of conduits
US20140257862A1 (en) 2011-11-29 2014-09-11 Wildfire Defense Systems, Inc. Mobile application for risk management
US8670998B2 (en) 2011-12-02 2014-03-11 Mckesson Specialty Arizona Inc. Notification services for patients
US20130169817A1 (en) * 2011-12-07 2013-07-04 Nettalon Security Systems, Inc. Method and system for enabling smart building rescue
MX345362B (en) * 2011-12-09 2017-01-27 Sargent Mfg Co Fire actuated release mechanism to separate electronic door lock from fire door.
US20130145693A1 (en) * 2011-12-12 2013-06-13 Shenzhen Guangan Fire-Fighting & Decoration Engineering Co., LTD Self-Illuminating Fire Door
US9092554B2 (en) 2011-12-13 2015-07-28 Intel-Ge Care Innovations Llc Alzheimers support system
US20130166325A1 (en) * 2011-12-23 2013-06-27 Mohan Ganapathy Apparatuses, systems and methods for insurance quoting
US20140108031A1 (en) 2011-12-29 2014-04-17 Daniel Ferrara System and method for increasing medication adherence rates
US9208661B2 (en) 2012-01-06 2015-12-08 Panasonic Corporation Of North America Context dependent application/event activation for people with various cognitive ability levels
US8803690B2 (en) 2012-01-06 2014-08-12 Panasonic Corporation Of North America Context dependent application/event activation for people with various cognitive ability levels
US20150094830A1 (en) 2012-01-18 2015-04-02 Rest Devices, Inc. Network-based Care System
US8719134B1 (en) 2012-02-01 2014-05-06 Allstate Insurance Company Insurance rating plan
US9038892B2 (en) * 2012-02-14 2015-05-26 Diebold Self-Service Systems Division Of Diebold, Incorporated Banking apparatus controlled responsive to data bearing records
US20140032433A1 (en) 2012-02-15 2014-01-30 Monitormyproperty Llc Method and system for monitoring property
WO2013126866A1 (en) 2012-02-24 2013-08-29 B3, Llc Systems and methods for comprehensive insurance loss management and loss minimization
US9349234B2 (en) 2012-03-14 2016-05-24 Autoconnect Holdings Llc Vehicle to vehicle social and business communications
US8847781B2 (en) 2012-03-28 2014-09-30 Sony Corporation Building management system with privacy-guarded assistance mechanism and method of operation thereof
US10684753B2 (en) * 2012-03-28 2020-06-16 The Travelers Indemnity Company Systems and methods for geospatial value subject analysis and management
US20130262155A1 (en) 2012-04-03 2013-10-03 Thomas J. HinKamp System and method for collection and distibution of medical information
AU2013243453B2 (en) 2012-04-04 2017-11-16 Cardiocom, Llc Health-monitoring system with multiple health monitoring devices, interactive voice recognition, and mobile interfaces for data collection and transmission
US8991198B2 (en) * 2012-04-10 2015-03-31 International Business Machines Corporation Cooling system control and servicing based on time-based variation of an operational variable
US20130290013A1 (en) * 2012-04-25 2013-10-31 Virginia Mason Medical Center Medical alert system
US20130290033A1 (en) 2012-04-25 2013-10-31 State Farm Mutual Automobile Insurance Company Systems and methods for electronic receipt based contents inventory and casualty claim processing
US9408561B2 (en) 2012-04-27 2016-08-09 The Curators Of The University Of Missouri Activity analysis, fall detection and risk assessment systems and methods
US9597016B2 (en) 2012-04-27 2017-03-21 The Curators Of The University Of Missouri Activity analysis, fall detection and risk assessment systems and methods
RU2638272C2 (en) * 2012-05-02 2017-12-12 Конинклейке Филипс Н.В. Device and method for directing calling of medical care to selected employee
US20130304514A1 (en) 2012-05-08 2013-11-14 Elwha Llc Systems and methods for insurance based on monitored characteristics of an autonomous drive mode selection system
WO2013172871A1 (en) 2012-05-16 2013-11-21 Early Bird Alert, Inc. An interactive communications system for the coordination and management of patient- centered health care services
GB201208653D0 (en) * 2012-05-16 2012-06-27 Coopers Fire Ltd Smoke or fire barrier
US10387960B2 (en) 2012-05-24 2019-08-20 State Farm Mutual Automobile Insurance Company System and method for real-time accident documentation and claim submission
US9098993B2 (en) * 2012-08-02 2015-08-04 Drs Medical Devices, Llc Patient monitoring system for bathroom
US8712893B1 (en) 2012-08-16 2014-04-29 Allstate Insurance Company Enhanced claims damage estimation using aggregate display
US8510196B1 (en) 2012-08-16 2013-08-13 Allstate Insurance Company Feedback loop in mobile damage assessment and claims processing
US8620841B1 (en) * 2012-08-31 2013-12-31 Nest Labs, Inc. Dynamic distributed-sensor thermostat network for forecasting external events
US8490006B1 (en) 2012-09-04 2013-07-16 State Farm Mutual Automobile Insurance Company Scene creation for building automation systems
US8929853B2 (en) 2012-09-05 2015-01-06 Apple Inc. Mobile emergency attack and failsafe detection
US10223750B1 (en) 2012-09-10 2019-03-05 Allstate Insurance Company Optimized inventory analysis for insurance purposes
US9960929B2 (en) 2012-09-21 2018-05-01 Google Llc Environmental sensing with a doorbell at a smart-home
US10332059B2 (en) 2013-03-14 2019-06-25 Google Llc Security scoring in a smart-sensored home
US9208676B2 (en) 2013-03-14 2015-12-08 Google Inc. Devices, methods, and associated information processing for security in a smart-sensored home
US9881474B2 (en) 2012-09-21 2018-01-30 Google Llc Initially detecting a visitor at a smart-home
US9654434B2 (en) 2012-10-01 2017-05-16 Sharp Kabushiki Kaisha Message originating server, message orginating method, terminal, electric appliance control system, and electric appliance
US10005793B2 (en) 2012-10-01 2018-06-26 The General Hospital Corporation Bodipy dyes for biological imaging
US9107034B2 (en) * 2012-10-04 2015-08-11 Honeywell International Inc. Emergency broadcasting systems and methods
CN202865924U (en) 2012-10-15 2013-04-10 吉林大学 Intelligent monitoring equipment for household water based on single-point perception
US20140118140A1 (en) * 2012-10-25 2014-05-01 David Amis Methods and systems for requesting the aid of security volunteers using a security network
US20140122133A1 (en) 2012-10-31 2014-05-01 Bodyshopbids, Inc. Method of virtually settling insurance claims
US8533144B1 (en) 2012-11-12 2013-09-10 State Farm Mutual Automobile Insurance Company Automation and security application store suggestions based on usage data
US20140136242A1 (en) 2012-11-12 2014-05-15 State Farm Mutual Automobile Insurance Company Home sensor data gathering for insurance rating purposes
US8527306B1 (en) 2012-11-12 2013-09-03 State Farm Mutual Automobile Insurance Company Automation and security application store suggestions based on claims data
US20140139539A1 (en) * 2012-11-16 2014-05-22 Cisco Technology, Inc. Emergency digital signage
US8924241B2 (en) 2012-11-19 2014-12-30 Hartford Fire Insurance Company System and method to determine an insurance policy benefit associated with an asset
EP2923346A4 (en) * 2012-11-22 2016-11-16 Geob Internat Sdn Bhd A medical monitoring system
US9755770B2 (en) * 2012-11-27 2017-09-05 Myminfo Pty Ltd. Method, device and system of encoding a digital interactive response action in an analog broadcasting message
CA2894838C (en) 2012-12-11 2021-02-23 Adt Us Holdings, Inc. Security panel communication system
KR20140076265A (en) * 2012-12-12 2014-06-20 엘지전자 주식회사 Media device and control method thereof
US10354520B2 (en) * 2012-12-17 2019-07-16 Itron, Inc. Power line communication over disconnected service lines
US20140180723A1 (en) 2012-12-21 2014-06-26 The Travelers Indemnity Company Systems and methods for surface segment data
US9185202B2 (en) 2012-12-31 2015-11-10 Cerner Innovation, Inc. Alert management utilizing mobile devices
US8890680B2 (en) 2013-01-11 2014-11-18 State Farm Mutual Automobile Insurance Company Alternative billing modes for security and automation applications
US9049168B2 (en) 2013-01-11 2015-06-02 State Farm Mutual Automobile Insurance Company Home sensor data gathering for neighbor notification purposes
US8973149B2 (en) 2013-01-14 2015-03-03 Lookout, Inc. Detection of and privacy preserving response to observation of display screen
JP2014142889A (en) 2013-01-25 2014-08-07 Mamoru Taniguchi Elderly people or the like nursing care system by cloud type groupware
US20140222298A1 (en) 2013-02-03 2014-08-07 Michael H. Gurin Systems For a Shared Vehicle
CN105209840B (en) * 2013-02-05 2018-01-12 真实制造有限公司 Refrigeration plant is controlled using portable electron device
DE102013201873B4 (en) 2013-02-05 2017-09-21 Siemens Schweiz Ag Dynamic emergency assistance
US20150002293A1 (en) 2013-06-26 2015-01-01 Michael Nepo System and method for disseminating information and implementing medical interventions to facilitate the safe emergence of users from crises
US20140222469A1 (en) 2013-02-06 2014-08-07 Kemper Corporate Services, Inc. System and method for automated intelligent insurance re-quoting
US20140229205A1 (en) * 2013-02-11 2014-08-14 G Wizicon Technologies, Inc. Global insurance compliance management system
US20140244997A1 (en) 2013-02-25 2014-08-28 Qualcomm Incorporated Emergency mode for iot devices
WO2014127429A1 (en) 2013-02-25 2014-08-28 Lockstep Technologies Decoupling identity from devices in the internet of things
US20140257850A1 (en) 2013-03-05 2014-09-11 Clinton Colin Graham Walker Automated interactive health care application for patient care
US9280252B1 (en) 2013-03-08 2016-03-08 Allstate Insurance Company Configuring an application task list of an application based on previous selections of application tasks
US8799036B1 (en) * 2013-03-10 2014-08-05 State Farm Mutual Automobile Insurance Company Systems and methods for analyzing vehicle operation data to facilitate insurance policy processing
US9047703B2 (en) * 2013-03-13 2015-06-02 Honda Motor Co., Ltd. Augmented reality heads up display (HUD) for left turn safety cues
WO2014152339A1 (en) * 2013-03-14 2014-09-25 Robert Bosch Gmbh Time and environment aware graphical displays for driver information and driver assistance systems
WO2014160259A1 (en) 2013-03-14 2014-10-02 Richard Palmeri Conducting and guiding individuals safely
US20160371620A1 (en) 2013-03-14 2016-12-22 Humana Inc. Computerized method and system for scheduling tasks for an in-home caregiver
US20160054563A9 (en) * 2013-03-14 2016-02-25 Honda Motor Co., Ltd. 3-dimensional (3-d) navigation
US9579457B2 (en) * 2013-03-15 2017-02-28 Flint Hills Scientific, L.L.C. Method, apparatus and system for automatic treatment of pain
CN105190720A (en) 2013-03-15 2015-12-23 Adt美国控股股份有限公司 Security system access profiles
US20140276238A1 (en) 2013-03-15 2014-09-18 Ivan Osorio Method, system and apparatus for fall detection
CA2906170C (en) 2013-03-15 2021-05-04 Adt Us Holdings, Inc. Security system using visual floor plan
US8972100B2 (en) 2013-03-15 2015-03-03 State Farm Mutual Automobile Insurance Company System and method for facilitating transportation of a vehicle involved in a crash
US9830579B2 (en) 2013-03-15 2017-11-28 Vivint, Inc. Methods for providing notifications for follow-up actions in response to events detected by an automation system, and systems and devices related thereto
US8910298B2 (en) * 2013-03-15 2014-12-09 Leeo, Inc. Environmental monitoring device
WO2014169232A1 (en) * 2013-04-11 2014-10-16 Intrepid Networks, Llc Distributed emergency response network based on situational awareness
US9892295B2 (en) 2013-04-12 2018-02-13 Neology, Inc. Systems and methods for connecting people with product information
CN104380349A (en) 2013-04-15 2015-02-25 弗莱克斯电子有限责任公司 Vehicle intruder alert detection and indication
US9251687B2 (en) * 2013-04-19 2016-02-02 Jonathan Thompson Global positioning system equipped hazard detector and a system for providing hazard alerts thereby
US9027137B2 (en) * 2013-04-22 2015-05-05 Imperva, Inc. Automatic generation of different attribute values for detecting a same type of web application layer attack
US9476935B2 (en) * 2013-05-10 2016-10-25 Alarm.Com Incorporated Monitoring and fault detection of electrical appliances for ambient intelligence
US9857414B1 (en) * 2013-05-10 2018-01-02 Alarm.Com Incorporated Monitoring and fault detection of electrical appliances for ambient intelligence
WO2014186808A2 (en) * 2013-05-17 2014-11-20 Barry Thornton Security and first-responder emergency lighting system
US9123221B2 (en) 2013-05-20 2015-09-01 Apple Inc. Wireless device networks with smoke detection capabilities
US20140358592A1 (en) * 2013-05-31 2014-12-04 OneEvent Technologies, LLC Sensors for usage-based property insurance
US20140362213A1 (en) 2013-06-05 2014-12-11 Vincent Tseng Residence fall and inactivity monitoring system
EP3013643A4 (en) 2013-06-27 2017-03-15 Scope Technologies Holdings Limited Onboard vehicle accident detection and damage estimation system and method of use
JP6204086B2 (en) 2013-06-28 2017-09-27 日本光電工業株式会社 Respiratory state determination device
US10360634B2 (en) 2013-07-16 2019-07-23 Esurance Insurance Services, Inc. Virtual home inspection
TWI547623B (en) 2013-07-16 2016-09-01 許今彥 Intelligent toilet with multiple sensing fields
US9424737B2 (en) 2013-07-26 2016-08-23 Adt Holdings, Inc. User management of a response to a system alarm event
US20150032480A1 (en) * 2013-07-26 2015-01-29 Bank Of America Corporation Use of e-receipts to determine insurance valuation
US9710858B1 (en) 2013-08-16 2017-07-18 United Services Automobile Association (Usaa) Insurance policy alterations using informatic sensor data
US10846370B2 (en) * 2013-08-19 2020-11-24 University Of Virginia Patent Foundation Techniques facilitating mobile telemedicine for stroke patients
US9516141B2 (en) * 2013-08-29 2016-12-06 Verizon Patent And Licensing Inc. Method and system for processing machine-to-machine sensor data
US10335059B2 (en) 2013-09-11 2019-07-02 Koninklijke Philips N.V. Fall detection system and method
US10687193B2 (en) 2013-09-19 2020-06-16 Unaliwear, Inc. Assist device and system
CA3148692C (en) 2013-10-07 2023-09-26 Google Llc Smart-home hazard detector providing context specific features and/or pre-alarm configurations
EP3036722A1 (en) 2013-10-17 2016-06-29 ADT US Holdings, Inc. Portable system for managing events
US10383794B2 (en) 2013-10-23 2019-08-20 Nexpil, Inc. Medication compliance alert device
US9824397B1 (en) 2013-10-23 2017-11-21 Allstate Insurance Company Creating a scene for property claims adjustment
US10269074B1 (en) 2013-10-23 2019-04-23 Allstate Insurance Company Communication schemes for property claims adjustments
US10810283B2 (en) 2013-10-31 2020-10-20 Knox Medical Diagnostics Inc. Systems and methods for monitoring respiratory function
US9336670B2 (en) * 2013-11-06 2016-05-10 Nettalon Security Systems, Inc. Method for remote initialization of targeted nonlethal counter measures in an active shooter suspect incident
US10474768B2 (en) * 2013-11-08 2019-11-12 Schneider Electric USA, Inc. Sensor-based facility energy modeling
US20150154880A1 (en) 2013-12-02 2015-06-04 Aetna Inc. Healthcare management with a support network
US10089691B2 (en) 2013-12-04 2018-10-02 State Farm Mutual Automobile Insurance Company Systems and methods for detecting potentially inaccurate insurance claims
WO2015084415A1 (en) * 2013-12-16 2015-06-11 Intel Corporation Emergency evacuation service
US20150161452A1 (en) 2013-12-11 2015-06-11 Echostar Technologies, Llc Home Monitoring and Control
US9900177B2 (en) * 2013-12-11 2018-02-20 Echostar Technologies International Corporation Maintaining up-to-date home automation models
US20150170288A1 (en) 2013-12-12 2015-06-18 The Travelers Indemnity Company Systems and methods for weather event-based insurance claim handling
US9696740B2 (en) * 2013-12-17 2017-07-04 Eaton Corporation Method and apparatus to change generator start delay and runtime following outage
US20150187016A1 (en) * 2013-12-31 2015-07-02 Hartford Fire Insurance Company System and method for telematics based underwriting
US20150187019A1 (en) 2013-12-31 2015-07-02 Hartford Fire Insurance Company Systems and method for autonomous vehicle data processing
US10552911B1 (en) 2014-01-10 2020-02-04 United Services Automobile Association (Usaa) Determining status of building modifications using informatics sensor data
US9429925B2 (en) 2014-01-15 2016-08-30 Haier Us Appliance Solutions, Inc. Method for operating an appliance and a refrigerator appliance
US9368009B2 (en) 2014-01-28 2016-06-14 Honeywell International Inc. Home automation system monitored by security system
US10475141B2 (en) 2014-02-06 2019-11-12 Empoweryu, Inc. System and method for adaptive indirect monitoring of subject for well-being in unattended setting
US9798993B2 (en) 2014-02-11 2017-10-24 State Farm Mutual Automobile Insurance Company Systems and methods for simulating home loss prevention
US10380692B1 (en) 2014-02-21 2019-08-13 Allstate Insurance Company Home device sensing
US10430887B1 (en) 2014-02-21 2019-10-01 Allstate Insurance Company Device sensing
US8917186B1 (en) 2014-03-04 2014-12-23 State Farm Mutual Automobile Insurance Company Audio monitoring and sound identification process for remote alarms
US10467701B1 (en) 2014-03-10 2019-11-05 Allstate Insurance Company Home event detection and processing
US10043369B2 (en) 2014-03-20 2018-08-07 Better Alerts, LLC System and method for sending medical emergency alerts
US10062118B1 (en) 2014-04-02 2018-08-28 Liberty Mutual Insurance Company Concepts for providing an insurance quote
US9491277B2 (en) 2014-04-03 2016-11-08 Melissa Vincent Computerized method and system for global health, personal safety and emergency response
US9691266B2 (en) 2014-04-07 2017-06-27 Google Inc. Smart hazard detector drills
US10636104B2 (en) 2014-04-16 2020-04-28 Vios Medical, Inc. Patient care and health information management systems and methods
US9892463B1 (en) 2014-04-25 2018-02-13 State Farm Mutual Automobile Insurance Company System and methods for community-based cause of loss determination
US10296978B1 (en) 2014-05-08 2019-05-21 Allstate Insurance Company Connected home and alert notifications
US20150356701A1 (en) 2014-06-06 2015-12-10 Play-it Health, Inc. Monitoring and adapting a patient's medical regimen and facilitating communication with a caregiver
US9727921B2 (en) 2014-06-09 2017-08-08 State Farm Mutual Automobile Insurance Company Systems and methods for processing damage to insured properties or structures
WO2015191562A1 (en) 2014-06-09 2015-12-17 Revon Systems, Llc Systems and methods for health tracking and management
US10922935B2 (en) 2014-06-13 2021-02-16 Vivint, Inc. Detecting a premise condition using audio analytics
US10198771B1 (en) 2014-06-20 2019-02-05 Allstate Insurance Company Data hub
SG11201610035RA (en) 2014-06-30 2017-01-27 Evolving Machine Intelligence Pty Ltd A system and method for modelling system behaviour
WO2016001165A2 (en) 2014-07-02 2016-01-07 Doro AB Improved communication
US20170193164A1 (en) 2014-07-11 2017-07-06 Cerora, Inc.. System for the distributed collection of brain health information
US10452233B2 (en) 2014-07-18 2019-10-22 Shanghai Chule (Cootek) Information Technology Co., Ltd. Information interactive platform, system and method
US10354329B2 (en) 2014-08-06 2019-07-16 Hartford Fire Insurance Company Smart sensors for roof ice formation and property condition monitoring
US9786158B2 (en) 2014-08-15 2017-10-10 Adt Us Holdings, Inc. Using degree of confidence to prevent false security system alarms
US9683856B2 (en) * 2014-08-18 2017-06-20 Trimble Inc. Evacuation navigation device
US20160165387A1 (en) * 2014-08-26 2016-06-09 Hoang Nhu Smart home platform with data analytics for monitoring and related methods
US10322302B2 (en) 2014-09-09 2019-06-18 Shuo hong CHEN Intelligent disaster prevention and escape method and system
US9299239B1 (en) 2014-09-17 2016-03-29 Travis John GIECK Device and methods for monitoring environmental conditions
US9800570B1 (en) 2014-09-26 2017-10-24 Adt Us Holdings, Inc. Method of persistent authentication with disablement upon removal of a wearable device
US10573146B1 (en) 2014-10-07 2020-02-25 State Farm Mutual Automobile Insurance Company Systems and methods for improved assisted or independent living environments
EP3221708A4 (en) 2014-11-17 2018-06-27 Curb Inc. Resource monitoring system with disaggregation of devices and device-specific notifications
US9739813B2 (en) 2014-11-26 2017-08-22 Sense Labs, Inc. Determining information about devices in a building using different sets of features
US9057746B1 (en) 2014-11-26 2015-06-16 Sense Labs, Inc. Determining information about devices in a building using different sets of features
US9443195B2 (en) 2014-11-26 2016-09-13 Sense Labs, Inc. Assisted labeling of devices with disaggregation
US9152737B1 (en) 2014-11-26 2015-10-06 Sense Labs, Inc. Providing notifications to a user
US20160161940A1 (en) 2014-12-04 2016-06-09 Yaakov S. MAX Intelligent water emergency system
US9861151B2 (en) 2014-12-05 2018-01-09 SaPHIBeat Technologies, Inc. Activity monitoring systems and methods for accident detection and response
US9613523B2 (en) * 2014-12-09 2017-04-04 Unilectric, Llc Integrated hazard risk management and mitigation system
WO2016096678A1 (en) * 2014-12-19 2016-06-23 Koninklijke Philips N.V. Medical bracelet standard
US10653369B2 (en) 2014-12-23 2020-05-19 Intel Corporation Device for health monitoring and response
US20160225562A1 (en) * 2015-01-29 2016-08-04 Unilectric, Llc Enhanced circuit breakers and circuit breaker panels and systems and methods using the same
US10129047B2 (en) 2015-01-29 2018-11-13 Time Warner Cable Enterprises Llc Home automation system deployment
US9923971B2 (en) 2015-02-02 2018-03-20 State Farm Mutual Automobile Insurance Company Systems and methods for identifying unidentified plumbing supply products
US10042341B1 (en) 2015-02-19 2018-08-07 State Farm Mutual Automobile Insurance Company Systems and methods for monitoring building health
US20160269883A1 (en) 2015-03-13 2016-09-15 Kapali Eswaran Automated Service Systems and Methods
US11042131B2 (en) 2015-03-16 2021-06-22 Rockwell Automation Technologies, Inc. Backup of an industrial automation plant in the cloud
WO2016147126A1 (en) 2015-03-19 2016-09-22 Koninklijke Philips N.V. Systems and methods for building supportive relationships between patients and caregivers
US10107708B1 (en) 2015-04-02 2018-10-23 State Farm Mutual Automobile Insurance Company Smart carpet, pad, or strip for leak detection and loss mitigation
USD764461S1 (en) 2015-04-17 2016-08-23 Viveo Labs, Inc. Device for tracking status of time-sensitive articles
US9866507B2 (en) 2015-04-27 2018-01-09 Agt International Gmbh Method of monitoring well-being of semi-independent persons and system thereof
EP3940609A1 (en) * 2015-04-30 2022-01-19 Honeywell International Inc. System for integrating multiple sensor data to predict a fall risk
US9706376B2 (en) * 2015-05-15 2017-07-11 Avaya Inc. Navigational aid for emergency response personnel
US10902946B2 (en) 2015-05-20 2021-01-26 Watchrx, Inc. Medication adherence device and coordinated care platform
US9894471B1 (en) * 2015-07-25 2018-02-13 Gary M. Zalewski Wireless coded communication (WCC) devices with power harvesting power sources for processing biometric identified functions
US10217068B1 (en) 2015-08-10 2019-02-26 State Farm Mutual Automobile Insurance Company Systems and methods for pre-scheduling repair of home equipment
US10229394B1 (en) 2015-08-10 2019-03-12 State Farm Mutual Automobile Insurance Company Systems and methods for sending diagnostic information during scheduling of home equipment repair
US10206630B2 (en) 2015-08-28 2019-02-19 Foresite Healthcare, Llc Systems for automatic assessment of fall risk
AU2016315947B2 (en) 2015-08-31 2021-02-18 Masimo Corporation Wireless patient monitoring systems and methods
US9882985B1 (en) 2015-09-14 2018-01-30 EMC IP Holding Company LLC Data storage path optimization for internet of things computing system
US9767680B1 (en) 2015-09-30 2017-09-19 Alarm.Com Incorporated Abberation detection technology
US11430570B2 (en) 2015-10-29 2022-08-30 Lai King Yee System and method for mobile platform designed for digital health management and support for remote patient monitoring
US9922524B2 (en) 2015-10-30 2018-03-20 Blue Willow Systems, Inc. Methods for detecting and handling fall and perimeter breach events for residents of an assisted living facility
US20170124277A1 (en) 2015-11-03 2017-05-04 Wolf Shlagman Systems and Methods for Automated and Remote Care Giving
US10047974B1 (en) 2015-11-06 2018-08-14 State Farm Mutual Automobile Insurance Company Automated water heater flushing and monitoring system
US9888371B1 (en) 2015-11-13 2018-02-06 State Farm Mutual Automobile Insurance Company Portable home and hotel security system
CN108702409A (en) 2015-12-17 2018-10-23 快速求救公司 Device and method for effective urgent call
US10482746B1 (en) 2016-01-06 2019-11-19 State Farm Mutual Automobile Insurance Company Sensor data to identify catastrophe areas
US10147296B2 (en) 2016-01-12 2018-12-04 Fallcall Solutions, Llc System for detecting falls and discriminating the severity of falls
US10387966B1 (en) 2016-01-14 2019-08-20 State Farm Mutual Automobile Insurance Company Identifying property usage type based upon smart sensor data
US10493936B1 (en) 2016-01-22 2019-12-03 State Farm Mutual Automobile Insurance Company Detecting and responding to autonomous vehicle collisions
US20190122760A1 (en) 2016-02-03 2019-04-25 Kevin Sunlin Wang Method and system for customized scheduling of home health care services
WO2017161457A1 (en) 2016-03-24 2017-09-28 Alert Labs Inc. System and method for characterizing and passively monitoring a property to identify events affecting occupants of the property
EP3443944A4 (en) 2016-04-14 2019-04-10 Konica Minolta, Inc. Watching system and management server
EP3455754A1 (en) 2016-05-13 2019-03-20 Koninklijke Philips N.V. System and method for tracking informal observations about a care recipient by caregivers
US10319209B2 (en) 2016-06-03 2019-06-11 John Carlton-Foss Method and system for motion analysis and fall prevention
WO2017210661A1 (en) 2016-06-03 2017-12-07 Sri International Virtual health assistant for promotion of well-being and independent living
US10226204B2 (en) 2016-06-17 2019-03-12 Philips North America Llc Method for detecting and responding to falls by residents within a facility
US9911042B1 (en) 2016-07-01 2018-03-06 State Farm Mutual Automobile Insurance Company Real property image analysis system to identify similar properties
CA3030761A1 (en) * 2016-07-13 2018-01-18 Palarum, LLC Patient monitoring system
US20180032696A1 (en) 2016-07-28 2018-02-01 Nancy ROME Wholecare
US11042938B1 (en) 2016-08-08 2021-06-22 Allstate Insurance Company Driver identity detection and alerts
US10506990B2 (en) 2016-09-09 2019-12-17 Qualcomm Incorporated Devices and methods for fall detection based on phase segmentation
KR102573383B1 (en) 2016-11-01 2023-09-01 삼성전자주식회사 Electronic apparatus and controlling method thereof
US20180211724A1 (en) 2016-11-11 2018-07-26 Kevin Sunlin Wang System and method for healthcare billing verification
US20180153477A1 (en) 2016-12-02 2018-06-07 Cardiac Pacemakers, Inc. Multi-sensor stroke detection
CA3074729A1 (en) 2016-12-05 2018-06-14 Barron Associates, Inc. Autonomous fall monitor having sensor compensation
WO2018106839A2 (en) 2016-12-06 2018-06-14 Nocira, Llc Systems and methods for treating neurological disorders
US20180160988A1 (en) * 2016-12-13 2018-06-14 Liza Miller Medical Alert Device
CN110139598B (en) 2016-12-29 2022-07-01 关健强 Monitoring and tracking system, method, article and apparatus
EP3573591A4 (en) 2017-01-26 2021-06-30 Elements of Genius, Inc. Wearable interactive notification device and interactive notification system
EP3579750A1 (en) * 2017-02-13 2019-12-18 Starkey Laboratories, Inc. Fall prediction system including an accessory and method of using same
US9800958B1 (en) 2017-02-22 2017-10-24 Sense Labs, Inc. Training power models using network data
US10750252B2 (en) 2017-02-22 2020-08-18 Sense Labs, Inc. Identifying device state changes using power data and network data
US9699529B1 (en) 2017-02-22 2017-07-04 Sense Labs, Inc. Identifying device state changes using power data and network data
US11126708B2 (en) 2017-02-24 2021-09-21 The Adt Security Corporation Automatic password reset using a security system
US10446000B2 (en) 2017-02-24 2019-10-15 The Adt Security Corporation Detecting an intruder's wireless device during a break in to a premises
US11164082B2 (en) 2017-02-28 2021-11-02 Anixa Diagnostics Corporation Methods for using artificial neural network analysis on flow cytometry data for cancer diagnosis
CA2998249A1 (en) 2017-03-17 2018-09-17 Edatanetworks Inc. Artificial intelligence engine incenting merchant transaction with consumer affinity
US20180308569A1 (en) 2017-04-25 2018-10-25 S Eric Luellen System or method for engaging patients, coordinating care, pharmacovigilance, analysis or maximizing safety or clinical outcomes
US10325471B1 (en) 2017-04-28 2019-06-18 BlueOwl, LLC Systems and methods for detecting a medical emergency event
US20180322947A1 (en) 2017-05-03 2018-11-08 ScriptDrop, Inc. Systems and methods for providing prescription medication delivery and reminder services
US10258295B2 (en) 2017-05-09 2019-04-16 LifePod Solutions, Inc. Voice controlled assistance for monitoring adverse events of a user and/or coordinating emergency actions such as caregiver communication
US20180342329A1 (en) 2017-05-24 2018-11-29 Happie Home, Inc. Happie home system
US11138861B2 (en) 2017-05-25 2021-10-05 Robert Blatt Easily customizable inhabitant behavioral routines in a location monitoring and action system
US10430553B2 (en) 2017-06-08 2019-10-01 Sethumadavan Sanjay-Gopal Systems and methods for personalized care management
US10623790B2 (en) 2017-08-11 2020-04-14 Benjamin Dean Maddalena Methods and systems for cloud-based content management
US10542889B2 (en) 2017-08-14 2020-01-28 Amrita Vishwa Vidyapeetham Systems, methods, and devices for remote health monitoring and management
CN111527550A (en) 2017-09-20 2020-08-11 强生消费者公司 Nursing personnel health care behavior guidance system and method
WO2019067489A1 (en) * 2017-09-29 2019-04-04 Sensogram Technologies, Inc. Fall sensing and medical alert systems
GB2568073A (en) 2017-11-03 2019-05-08 Tended Ltd Method and apparatus for monitoring the safety of a person
US11020003B2 (en) 2017-11-07 2021-06-01 Foneclay, Inc. Patient monitoring and communication system
US10930398B2 (en) * 2017-12-12 2021-02-23 Jawahar Jain Graded escalation based triage
US10181246B1 (en) 2018-01-03 2019-01-15 William David Jackson Universal user variable control utility (UUVCU)
JP7118757B2 (en) 2018-01-22 2022-08-16 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Server, program and method
US20190228397A1 (en) 2018-01-25 2019-07-25 The Bartley J. Madden Foundation Dynamic economizer methods and systems for improving profitability, savings, and liquidity via model training
CA3093066A1 (en) 2018-03-08 2019-09-12 Frontive, Inc. Methods and systems for speech signal processing
US11232694B2 (en) 2018-03-14 2022-01-25 Safely You Inc. System and method for detecting, recording and communicating events in the care and treatment of cognitively impaired persons
US10825318B1 (en) 2018-04-09 2020-11-03 State Farm Mutual Automobile Insurance Company Sensing peripheral heuristic evidence, reinforcement, and engagement system
US20190320900A1 (en) 2018-04-18 2019-10-24 CureCompanion Inc. Telemedicine system
US10827951B2 (en) * 2018-04-19 2020-11-10 Careview Communications, Inc. Fall detection using sensors in a smart monitoring safety system
US20200013500A1 (en) 2018-07-03 2020-01-09 Eric Mora Cloud-based system for caregiver and client for credentialing, patient referrals, clinical documentation, and scheduling
KR101940029B1 (en) 2018-07-11 2019-01-18 주식회사 마키나락스 Anomaly detection
US10740691B2 (en) 2018-10-02 2020-08-11 Sense Labs, Inc. Identifying devices connected to a smart plug
US10692606B2 (en) 2018-10-23 2020-06-23 International Business Machines Corporation Stress level reduction using haptic feedback
US20200143655A1 (en) 2018-11-06 2020-05-07 iEldra Inc. Smart activities monitoring (sam) processing of data
US11651666B2 (en) 2020-02-12 2023-05-16 Alarm.Com Incorporated Attempted entry detection

Also Published As

Publication number Publication date
US10573149B1 (en) 2020-02-25
US10795329B1 (en) 2020-10-06
US10522009B1 (en) 2019-12-31
US10388135B1 (en) 2019-08-20
US11334040B2 (en) 2022-05-17
US10515372B1 (en) 2019-12-24
US20210158671A1 (en) 2021-05-27
US11043098B1 (en) 2021-06-22
US11656585B1 (en) 2023-05-23
US11004320B1 (en) 2021-05-11
US20220215733A1 (en) 2022-07-07
US10353359B1 (en) 2019-07-16
US11423754B1 (en) 2022-08-23
US10943447B1 (en) 2021-03-09
US11551235B1 (en) 2023-01-10
US20230251610A1 (en) 2023-08-10
US20210142648A1 (en) 2021-05-13
US10346811B1 (en) 2019-07-09
US10249158B1 (en) 2019-04-02
US10282788B1 (en) 2019-05-07
US20200302549A1 (en) 2020-09-24
US10741033B1 (en) 2020-08-11
US20230161305A1 (en) 2023-05-25
US10573146B1 (en) 2020-02-25
US9898912B1 (en) 2018-02-20
US11049078B1 (en) 2021-06-29
US20220334544A1 (en) 2022-10-20
US20220215732A1 (en) 2022-07-07
US10282961B1 (en) 2019-05-07
US10356303B1 (en) 2019-07-16
US11815864B2 (en) 2023-11-14
US20210297579A1 (en) 2021-09-23

Similar Documents

Publication Publication Date Title
US11004320B1 (en) Systems and methods for analyzing sensor data to detect property intrusion events
US11361387B1 (en) Systems and methods for managing insurance associated with devices populated within a property

Legal Events

Date Code Title Description
AS Assignment

Owner name: STATE FARM MUTUAL AUTOMOBILE INSURANCE COMPANY, ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JORDAN, JACKIE O., II;DONOVAN, JOHN;TURRENTINE, DAVID;AND OTHERS;SIGNING DATES FROM 20151104 TO 20151215;REEL/FRAME:056128/0241

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION