WO2016109839A1 - Gestion d'interaction avec un visiteur dans une maison intelligente en mode "ne pas déranger" - Google Patents

Gestion d'interaction avec un visiteur dans une maison intelligente en mode "ne pas déranger" Download PDF

Info

Publication number
WO2016109839A1
WO2016109839A1 PCT/US2015/068354 US2015068354W WO2016109839A1 WO 2016109839 A1 WO2016109839 A1 WO 2016109839A1 US 2015068354 W US2015068354 W US 2015068354W WO 2016109839 A1 WO2016109839 A1 WO 2016109839A1
Authority
WO
WIPO (PCT)
Prior art keywords
smart
environment
visitor
smart device
computing system
Prior art date
Application number
PCT/US2015/068354
Other languages
English (en)
Inventor
Anthony Michael Fadell
Matthew Lee Rogers
Yoky Matsuoka
David Sloo
Shigefumi Honjo
Scott A. MCGARAGHAN
Michael Plitkins
Maxime Veron
Isabel Guenette
Original Assignee
Google Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/587,530 external-priority patent/US9978238B2/en
Priority claimed from US14/587,599 external-priority patent/US9640055B2/en
Priority claimed from US14/587,485 external-priority patent/US9881474B2/en
Priority claimed from US14/587,993 external-priority patent/US9960929B2/en
Priority claimed from US14/587,966 external-priority patent/US9953514B2/en
Priority claimed from US14/587,876 external-priority patent/US9626841B2/en
Priority claimed from US14/587,441 external-priority patent/US9959727B2/en
Priority claimed from US14/587,663 external-priority patent/US9711036B2/en
Priority claimed from US14/587,795 external-priority patent/US10510035B2/en
Priority claimed from US14/587,835 external-priority patent/US10735216B2/en
Priority claimed from US14/587,694 external-priority patent/US9600645B2/en
Priority claimed from US14/587,636 external-priority patent/US20150156030A1/en
Application filed by Google Inc. filed Critical Google Inc.
Publication of WO2016109839A1 publication Critical patent/WO2016109839A1/fr

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B19/00Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow
    • G08B19/005Alarms responsive to two or more different undesired or abnormal conditions, e.g. burglary and fire, abnormal temperature and abnormal rate of flow combined burglary and fire alarm systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Definitions

  • This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi- sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.
  • Smart home networks may include control panels that a person may use to input settings, preferences, and scheduling information that the smart home network uses to provide automated control of the various devices, appliances, and systems in the home.
  • HVAC heating, ventilation, and air conditioning
  • Embodiments described herein are representative examples of devices, methods, systems, services, and/or computer program products that can be used in conjunction with an extensible devices and services platform that, while being particularly applicable and advantageous for providing security objectives in the smart home context, is generally applicable to any type of enclosure or group of enclosures (e.g., offices, factories, retail stores), vessels (e.g., automobiles, aircraft), or other resource-consuming physical systems that will be occupied by humans or with which humans will physically or logically interact.
  • enclosure or group of enclosures e.g., offices, factories, retail stores
  • vessels e.g., automobiles, aircraft
  • the scope of applicability of the described extensible devices and sendees platform is not so limited.
  • a method of managing a smart environment that includes a plurality of smart devices may include obtaining, at an environment computing system from at least one sensor of at least a first smart device of the plurality of smart devices, environment data associated with the occupancy of the smart environment, analyzing, with the environment computing system, at least a portion of the obtained environment data, determining, with the environment computing system, a status of at least a portion of the smart environment based on the analyzing, enabling, with the environment computing system, a do-not-disturb mode for the at least a portion of the smart environment based on the determining, and at least one of based on the enabling, automatically sharing, by the env ironment computing system with a remote entity, status information indicative of the determined status and, based on the enabling, automatically adjusting, using the environment computing system, the functionality of a particular smart device of the plurality of smart devices.
  • a system for managing a smart environment may include a plurality of smart devices at the smart environment and a computing system operative to receive environment data from at least one sensor of at least a first smart device of the plurality of smart devices, wherein the environment data is associated with the occupancy of the smart environment, process at least a portion of the received environment data, determine a status of at least a portion of the smart environment based on the processed environment data, and enable a do-not-disturb mode for the at least a portion of the smart environment based on the determined status, wherein the environment data includes at least one of the following: data indicative of a location of a user with respect to the smart environment, data indicative of an activity of a user associated with the smart environment, and data indicative of an operation of an electronic device at the smart environment.
  • a non-transitory computer readable medium may include computer readable instructions recorded thereon for obtaining, at an environment computing system from at least one sensor of at least a first smart device of a plurality of smart devices at a smart environment, environment data associated with the occupancy of the smart environment, analyzing, with the environment computing system, at least a portion of the obtained environment data, determining, with the environment computing system, a status of at least a portion of the smart environment based on the analyzing, enabling, with the environment computing system, a do-not-disturb mode for the at least a portion of the smart environment based on the determining, and at least one of the following: based on the enabling, automatically sharing, by the environment computing system with a remote entity, status information indicative of the determined status and, based on the enabling, automatically adjusting, using the environment computing system, the functionality of a particular smart device of the plurality of smart devices.
  • FIG. 1 illustrates an example of a smart-home environment within which one or more of the devices, methods, systems, services, and/or computer program products described further herein will be applicable, according to at least one embodiment.
  • FIG. 2 illustrates a network-level view of an extensible devices and services platform with which the smart-home environment of FIG. 1 can be integrated, according to at least one embodiment.
  • FIG. 3 illustrates an abstracted functional view of the extensible devices and services platform of FIG. 2, with reference to a processing engine as well as devices of the smart-home environment of FIG. 1, according to at least one embodiment.
  • FIG. 4A is a simplified block diagram illustrating components of a wall switch according to at least one embodiment.
  • FIGS. 4B-C illustrate example modular head units for the wall switch of FIG. 4A, according to at least one embodiment.
  • FIG. 5 is a simplified block diagram illustrating components of an intelligent, multi- sensing, network-connected hazard detector, according to at least one embodiment.
  • FIGS. 6-7 are schematic diagrams illustrating a silence gesture for remotely deactivating an alarm, according to at least one embodiment.
  • FIGS. 8A-C are simplified block diagrams illustrating components of an intelligent, multi-sensing, network-connected entryway interface device, according to at least one embodiment.
  • FIG. 9 is a schematic diagram illustrating an intelligent, multi-sensing, network- connected wall plug, according to at least one embodiment.
  • FIGS. lOA-C are schematic diagrams illustrating an intelligent, multi-sensing, network-connected thermostat, according to at least one embodiment.
  • FIG. 11 is a block diagram of an example process for creating neighborhood security networks ("neighborhoods”) and sending security-related notifications to homes in the created neighborhoods, according to at least one embodiment.
  • FIG. 12 is a block diagram of another example process for creating neighborhood security networks ("neighborhoods”) and sending security-related notifications to homes in the created neighborhoods, according to at least one embodiment.
  • FIG. 13 provides an example process for calculating and reporting a security score for a smart-home environment, according to at least one embodiment.
  • FIG. 14 is a schematic diagram illustrating an intelligent, multi-sensing, network- connected doorknob, according to at least one embodiment.
  • FIG. 15 illustrates a block diagram of an embodiment of a computer system, according to at least one embodiment.
  • FIG. 16 illustrates a block diagram of an embodiment of a special-purpose computer, according to at least one embodiment.
  • FIG. 17 is a schematic diagram illustrating example geo-fencing, according to at least one embodiment.
  • FIG. 18 provides an example process for generating a security score, according to at least one embodiment.
  • FIG. 19 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 20 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 21 provides an example process for enhancing delivery of a package, according to at least one embodiment.
  • FIG. 22 provides an example process for delivering a package, according to at least one embodiment.
  • FIG. 23 prov ides an example process for handling a delivery attempt of a package, according to at least one embodiment.
  • FIG. 24 prov ides an example process for handling a delivery attempt of a package, according to at least one embodiment.
  • FIG. 25 prov ides an example process for securely handling a delivery of a package, according to at least one embodiment.
  • FIG. 26 prov ides an example process for tracking delivery of a package, according to at least one embodiment.
  • FIG. 27 prov ides an example process for tracking delivery of a package, according to at least one embodiment.
  • FIG. 28 prov ides an example process for handling a delivery attempt of a package, according to at least one embodiment.
  • FIG. 29 provides an example process for managing a smart environment, according to at least one embodiment.
  • FIG. 30 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 31 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 32 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 33 prov ides an example process for handling a potential visit by a visitor at a smart environment, according to at least one embodiment.
  • FIG. 34 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 35 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 36 prov ides an example process for potentially handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 37 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 38 prov ides an example process for handling delivery of a package, according to at least one embodiment.
  • FIG. 39 prov ides an example process for handling an agent of a service-provider entity, according to at least one embodiment.
  • FIG. 40 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 41 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 42 provides an example process for handling a visitor at a smart environment, according to at least one embodiment.
  • FIG. 43 provides an example process for controlling a smart environment, according to at least one embodiment.
  • FIG. 44 provides an example process for use with respect to a smart-home environment, according to at least one embodiment.
  • Embodiments of the present disclosure generally relate to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of home security/smart home objectives.
  • FIG. 1 illustrates an example of a smart-home environment 100 within which one or more of the devices, methods, systems, services, and/or computer program products described further herein can be applicable.
  • the depicted smart-home environment 100 includes a structure 150, which can include, e.g., a house, office building, garage, or mobile home. It should be appreciated that the smart-home environment 100 includes areas outside the home, such as curtilage, the yard, and other nearby land. It will be appreciated that devices can also be integrated into a smart-home environment 100 that does not include an entire structure 150, such as an apartment, condominium, or office space.
  • the smart home environment can control and/or be coupled to devices outside of the actual structure 150. Indeed, several devices in the smart home environment need not physically be within the structure 150. For example, a device controlling an outdoor lighting system 1 14 or gated entry system 1 16 can be located outside of the structure 150.
  • the depicted structure 150 includes a plurality of rooms 152, separated at least partly from each other via walls 154.
  • the walls 154 can include interior walls or exterior walls.
  • Each room can further include a floor 156 and a ceiling 158.
  • Devices can be mounted on, integrated with and/or supported by a wall 154, floor 156 or ceiling 158.
  • the smart-home environment 100 of FIG. 1 includes a plurality of devices, including intelligent, multi-sensing, network-connected devices, that can integrate seamlessly with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security and/or smart home objectives.
  • the smart-home environment 100 may include one or more intelligent, multi-sensing, network-connected thermostats 102 (herein after referred to as ''smart thermostats 102"), one or more intelligent, network-connected, multi-sensing hazard detection units 104 (herein after referred to as "smart hazard detectors 104"), and one or more intelligent, multi-sensing, network-connected entryway interface devices 106 (herein after referred to as "smart doorbells 106").
  • the smart thermostat 102 detects ambient climate characteristics (e.g., temperature and/or humidity) and controls a HVAC system 103 accordingly.
  • the smart hazard detector 104 may detect the presence of a hazardous substance or a substance indicative of a hazardous substance (e.g., smoke, fire, or carbon monoxide).
  • the smart doorbell 106 may control doorbell functionality, detect a person's approach to or departure from a location (e.g., an outer door), and announce a person's approach or departure via audio or visual means, or control settings on a security system (e.g., to activate or deactivate a security system when occupants go and come).
  • the smart-home environment 100 of FIG. 1 further includes one or more intelligent, multi-sensing, network-connected wall switches 108 (herein after referred to as “smart wall switches 108"), along with one or more intelligent, multi-sensing, network-connected wall plug interfaces 1 10 (herein after referred to as “smart wall plugs 1 10").
  • the smart wall switches 108 may detect ambient lighting conditions, detect room-occupancy states, and control a power and/or dim state of one or more lights. In some instances, smart wall switches 108 may also control a power state or speed of a fan, such as a ceiling fan.
  • the smart wall plugs 110 may detect occupancy of a room or enclosure and control supply of power to one or more wall plugs (e.g., such that power is not supplied to the plug if nobody is at home).
  • one of the smart wall plugs 1 10 controls supply of power to a lamp 118, while another smart wall plug may control supply of power to a through-wall air conditioning unit 142 or any other suitable component of environment 100.
  • the smart-home environment 100 of FIG. 1 further includes one or more intelligent, multi-sensing, network-connected entry detectors 1 12 (herein after referred to as "smart entry detector 1 12").
  • the illustrated smart entry detectors 112 are located at windows 182, doors 186, and other entry points of the smart-home environment 100 for detecting when a window, door, or other entry point is opened, broken, or otherwise breached.
  • the smart entry detectors 112 may include first and second parts. The first part is attached to a fixed part of the house structure, such as the windowsill, door sill, outer frame, side jamb, head jamb, etc.
  • a second part is attached to part of the window or door that moves when opening and closing, such as the upper or lower sash, top or bottom rail, side stile, latch, handle, etc .
  • the first and second parts of the smart entry detectors 112 are in close proximity when the window or door is closed, and the first and second parts move apart from one another when the window or door opens.
  • the smart entry detectors 112 generate a corresponding signal when a window or door is opened or closed, etc.
  • the smart entry detectors 112 can be any type of window, door, entryway alarm sensor known in the art for detecting when a window, door, or other entry point is opened, broken, or otherwise breached, and that the known alarm sensors become smart when connected to the central server or cloud-computing system 164. According to embodiments, the alarm system of the home will not arm unless all smart entry detectors 112 of the home indicate that all doors, windows, and other entryways are closed and/or that all smart entry detectors 112 are "armed”.
  • the smart-home environment 100 of FIG. 1 includes one or more intelligent, multi-sensing, network-connected appliances 113 (herein after referred to as “smart appliances 113"), such as refrigerators, stoves and/or ovens, televisions, washers, dryers, indoor or outdoor lighting, stereos, intercom systems, gated entries, garage-door openers, floor fans, ceiling fans, wall air conditioners, pool heaters, irrigation systems, security systems, safes, and so forth.
  • the network-connected appliances 113 are made compatible with the smart-home environment by cooperating with the respective manufacturers of the appliances.
  • the appliances can be space heaters, window air conditioning units, motorized duct vents, etc.
  • an appliance When plugged in, an appliance can announce itself to the smart-home network, such as by indicating what type of appliance it is, and it can automatically integrate with the controls of the smart-home. Such communication by the appliance to the smart home can be facilitated by any wired or wireless communication protocols known by those having ordinary skill in the art.
  • the smart home also can include one or more of a variety of non-communicating legacy appliances 140, such as old conventional washer/dryers, refrigerators, and the like, which can be controlled, albeit coarsely (ON/OFF), by virtue of the smart wall plugs 110.
  • the smart-home environment 100 can further include one or more of a variety of at least partially communicating legacy appliances 142, such as infrared ("IR”) controlled wall air conditioners or other IR-controlled devices, which can be controlled by IR signals provided by the smart hazard detectors 104 or the smart wall switches 108.
  • legacy appliances 142 such as infrared ("IR") controlled wall air conditioners or other IR-controlled devices, which can be controlled by IR signals provided by the smart hazard detectors 104 or the smart wall switches 108.
  • the smart-home environment 100 of FIG. 1 further includes one or more intelligent, multi-sensing, network-connected doorknobs 122 (herein after referred to as "smart doorknob 122").
  • the illustrated smart doorknobs 122 are located on external doors 186 of the smart-home environment 100.
  • smart doorknobs 122 can be provided on all doors of the smart-home environment 100.
  • the smart doorknob includes a remote controlled electronic lock that locks a spindle 1404. This locks the door because it prevents the spindle from disengaging a latch 1406 of the doorknob from a strike plate 1410 of a door stop 1414.
  • the smart doorknob is able to automatically unlock the door 186, without the user having to touch the doorknob.
  • the smart doorbell 106 can recognize a registered occupant approaching the door and instruct the smart doorknob to automatically unlock.
  • occupants can use a registered mobile device 166 to remotely unlock the door. For example, if when inside the home, the occupant receives notice from the smart doorbell 106 that a trusted neighbor is approaching the door, the occupant can use the mobile device 166 to unlock the door so the neighbor can let himself or herself in. Alternatively, the occupant can speak an audible command instructing the smart doorknob 122 to unlock.
  • the smart doorioiob 122 includes a remote controlled electronic motor that turns the spindle 1404 to disengage the latch 1406 of the doorknob from the strike plate 1410 of the door stop 1414. Accordingly, the smart doorknob is able to automatically open the door 186, without the user having to touch the doorknob.
  • the smart thermostats 102, the smart hazard detectors 104, the smart doorbells 106, the smart wall switches 108, the smart wall plugs 1 10, the smart entry detectors 112, the smart appliances 1 13, the smart doorknobs 122, the keypads, and other devices (collectively referred herein to as "the network-connected smart devices") of the smart-home environment 100 are connected to each other and to the central server or cloud-computing system 164 to accomplish home security and/or smart home objectives for the smart home environment.
  • each of the network-connected smart devices is capable of data communications and information sharing with any other of the network-connected smart devices, as well as to any central server or cloud-computing system 164 or any other device that is network-connected anywhere in the world to accomplish home security and/or smart home objectives.
  • the required data communications can be carried out using any of a variety of custom or standard wireless protocols (Wi-Fi, ZigBee, 6L0WPAN, 3G/4G, etc.) and/or any of a variety of custom or standard wired protocols (CAT6 Ethernet, HomePlug, etc.).
  • backup means of wireless communication e.g., 3G/4G
  • the primary means of communication e.g., Wi-Fi
  • becomes disabled such as due to power outage.
  • all or some of the network-connected smart devices can serve as wireless or wired repeaters.
  • a first one of the network-connected smart devices can communicate with a second one of the network-connected smart devices via a wireless router 160.
  • the network-connected smart devices can further communicate with each other via a connection to a network, such as the Internet 162.
  • the network-connected smart devices can communicate with a central server or a cloud- computing system 164.
  • the central server or cloud-computing system 164 can be associated with a manufacturer, support entity, or sendee provider, such as a home-security provider, associated with the network-connected smart devices.
  • a user may be able to contact local law enforcement and other emergency or security personnel as well as contact customer support using one of the network-connected smart devices itself rather than needing to use other communication means such as a telephone or Internet-connected computer.
  • software updates and security alerts can be automatically sent from the central server or cloud-computing system 164 to the network-connected smart devices (e.g., when available, when purchased, at routine intervals, when emergency news needs to be broadcasted throughout the home, when the security system needs to be armed, and when the smart-home environment needs to be put on lock down).
  • certain functionalities and capabilities of environment 100 may be enabled without active access to the Internet or remote servers or data sources. Instead, in some embodiments, the various smart devices of environment 100
  • devices 102/104/106/108/110/112/1 13/1 14/1 16/122/166/168/170 may be enabled to communicate with one another without active communication with Internet 162 and system 164, and data of those devices may be analyzed, for example, in combination with rules-based inference engines and/or artificial intelligence and/or any suitable smart environment data and/or any suitable rules or settings or inferences or modes that may be associated with environment 100, locally at environment 100 by any suitable computing system (e.g., at a dedicated central processing unit device or computing system of environment 100 or at one or more processors of the various smart devices of
  • environment 100 to dictate the functionality of environment 100.
  • the network-connected smart devices combine to create a mesh network of spokesman and low-power nodes in the smart-home environment 100, where some of the network-connected smart devices are “spokesman” nodes and others are “low-powered” nodes. Spokesman nodes are sometimes referred to herein as “smart” nodes. It should be appreciated that non-smart devices may perform as lower-powered nodes.
  • the spokesman and low-powered nodes are communicatively interconnected and operate to accomplish a common objective or to achieve a common goal in the smart-home
  • some or all of the spokesman and low-powered nodes perform one or more functions in a coordinated manner to accomplish the common objective.
  • Example functions and objectives include, but are not limited to, triggering an alarm for the objective of securing the home, adjusting a thermostat setting for the objective of making the home comfortable, and turning on and off lights for the objective of securing the home or for use by occupants.
  • Other example objectives and functions are provided throughout this document.
  • Some of the network- connected smart devices in the smart-home environment 100 are battery powered, while others have a regular and reliable power source, such as by connecting to wiring (e.g., to 120V line voltage wires) behind the walls 154 of the smart- home environment 100.
  • the network-connected smart devices that have a regular and reliable power source are referred to as "spokesman" nodes. These nodes are equipped with the capability of using any wireless protocol or manner to facilitate bidirectional
  • the network-connected smart devices that are battery powered are referred to as "low-power" nodes. These nodes tend to be smaller than spokesman nodes and communicate using wireless protocol that requires very little power, such as Zigbee, 6L0WPAN, etc. Further, some, but not all, low-power nodes are incapable of bidirectional communication. These low-power nodes send messages, but they are unable to "listen”. Thus, other network- connected smart devices in the smart-home environment 100, such as the spokesman nodes, cannot send information to these low-power nodes.
  • the network-connected smart devices serve as low-power and spokesman nodes to create a mesh network in the smart-home environment 100.
  • Individual low-power nodes in the smart-home env ironment regularly send out messages regarding what they are sensing, and the other low-powered nodes in the smart-home environment - in addition to sending out their own messages - repeat the messages, thereby causing the messages to travel from node to node (i.e., network-connected smart device to network- connected smart device) throughout the smart-home environment 100.
  • the spokesman nodes in the smart-home environment 100 are able to "drop down" to low-powered communication protocols to receive these messages, translate the messages to oilier communication protocols, and send the translated messages to other spokesman nodes and/or the central server or cloud-computing system 164.
  • the low-powered nodes using low-power communication protocols are able to send messages across the entire smart-home
  • the mesh network enables the central server or cloud-computing system 164 to regularly receive data from all of the network-connected smart devices in the smart-home environment, make inferences based on the data, and send commands back to individual one(s) of the network-connected smart devices to accomplish some of the home-security objectives descried herein.
  • the node can send a corresponding message through the mesh network to the central server or cloud-computing system 164, which processes the message and determines the appropriate response, such as contacting authorities and/or the home owner as well as instructing the network-connected smart devices to enter an alarm mode, which may involve activating lights, sounding audible alarms, etc.
  • the spokesman nodes and some of the low-powered nodes are capable of "listening”. Accordingly, users, other devices, and the central server or cloud-computing system 164 can communicate controls to the low-powered nodes. For example, as discussed below, a user can use the portable electronic device (e.g., a smartphone) 166 to send commands over the Internet to the central server or cloud-computing system 164, which then relays the commands to the spokesman nodes in the smart-home environment 100.
  • the portable electronic device e.g., a smartphone
  • the spokesman nodes drop down to a low-power protocol to communicate the commands to the low-power nodes throughout the smart-home environment, as well as to other spokesman nodes that did not receive the commands directly from the central server or cloud-computing system 164.
  • the low-powered nodes and the spokesman nodes are the same type of device (e.g., hazard detector, thermostat, wall plug, etc.).
  • the low-powered and spokesman nodes are identical.
  • all of the low-powered and spokesman nodes have the same stock-keeping unit (SKU) and/or are capable of performing any role, such as performing the role of low- powered and/or spokesman node.
  • SKU stock-keeping unit
  • Examples of spokesman nodes include smart doorbells 106, smart thermostats 102, smart wall switches 108, smart wall plugs 1 10, keypads, doorknobs 122, etc. These devices 102, 106, 108, 110, and 122 are often located near and connected to a reliable power source, and therefore can include more power-consuming components, such as one or more communication chips capable of bidirectional communication in any variety of protocols.
  • the smart entry detector 1 12 includes a low-power wireless communication chip (e.g., ZigBee chip) that sends instantaneous messages coincident with movement of the door or window or with detection of a nearby person, animal or object.
  • the low-power wireless communication chip regularly sends messages regarding the position (open, closed, partially open, etc. ) of the relevant door or window.
  • These messages may be sent wirelessly, using the mesh network, from node to node (i.e., network-connected smart device to network-connected smart device) within the smart-home environment 100 as well as over the Internet 162 to the cenual server or cloud-computing system 164.
  • the nightlight 170 houses a light source having variable intensity. Further, according to embodiments, the color of the light emitted from the nightlight 170 is changeable.
  • the smart nightlight 170 houses an occupancy sensor, such as an ultrasonic or passive IR sensor, and an ambient light sensor, such as a photoresistor or a single-pixel sensor that measures light in the room.
  • the smart nighthght 170 is configured to activate the light source when its ambient light sensor detects that the room is dark and/or when its occupancy sensor detects a person's presence or movement.
  • the smart nighthght 170 is configured to adjust the color and intensity of the light source.
  • the smart nighthght 170 adjusts the intensity of the light source in a manner where intensity is inversely proportional to the amount of natural light detected in the environment.
  • the smart nighthght 170 includes a low-power wireless communication chip (e.g., ZigBee chip) that regularly sends out messages regarding the occupancy of the room and the amount of light in the room, including instantaneous messages coincident with the occupancy sensor detecting the presence of a person in the room.
  • a low-power wireless communication chip e.g., ZigBee chip
  • these messages may be sent wirelessly, using the mesh network, from node to node (i.e., network-connected smart device to network-connected smart device) within the smart-home environment 100 as well as over the Internet 162 to the central server or cloud-computing system 164.
  • a low-powered node is a battery-operated version of the smart hazard detector 104.
  • These smart hazard detectors 104 are often located in an area without access to constant and reliable power and, as discussed in detail below, may include any number and type of sensors, such as smoke/fire/heat sensors, carbon monoxide/dioxide sensors, occupancy/motion sensors, ambient light sensors, temperature sensors, humidity sensors, and the like.
  • smart hazard detectors 104 include a low-power wireless communication chip (e.g., ZigBee chip) that regularly sends messages that correspond to each of the respective sensors to the other network-connected smart devices and the centi'al server or cloud-computing system 164, such as by using the mesh network as described above.
  • a low-power wireless communication chip e.g., ZigBee chip
  • the network-connected devices (a.k.a. the low- and high- power nodes) of the smart-home environment 100 are capable of enhancing home security.
  • all or some of the network-connected smart devices are equipped with motion sensing, heat sensing, pressure sensing, noise sensing, or other types of sensing capabilities that combine with rules-based inference engines and/or artificial intelligence of the central server or cloud-computing system 164 to detect the presence, movement, and/or identity of people, animals, and objects and trigger various alarms in the event a person, animal, or object is in the wrong place at the wrong time anywhere inside or in the curtilage of the smart-home environment 100.
  • a user can remotely interact with one or more of the network-connected smart devices.
  • a user can communicate with one or more of the network-connected smart devices using a computer (e.g., a desktop computer, laptop computer, or tablet) or other portable electronic device (e.g., a smartphone) 166.
  • a webpage or app can be configured to receive communications from the user and control the one or more of the network-connected smart devices based on the communications and/or to present information about the device's operation to the user.
  • the user can view, arm, or disarm the security system of the home.
  • the user can be in the structure during this remote communication or outside the structure.
  • users can control one or more of the network-connected smart devices in the smart-home environment 100 using a network-connected computer or portable electronic device 166.
  • some or all of the occupants e.g., individuals who live in the home
  • Such registration can be made at a central server to authenticate the occupant and/or the mobile device 166 as being associated with the smart-home environment 100, and to give permission to the occupant to use the mobile device 166 to control the network-connected smart devices and the security system of the smart-home environment 100.
  • An occupant can use their registered mobile device 166 to remotely control the network-connected smart devices and security system of the smart-home environment 100, such as when the occupant is at work or on vacation.
  • the occupant may also use their registered mobile device 166 to control the network-connected smart devices when the occupant is actually located inside the smart-home environment 100, such as when the occupant is sitting on a couch inside the home or in a bedroom preparing for sleep.
  • the smart-home environment 100 makes inferences about which individuals live in the home and are therefore occupants and which mobile devices 166 are associated with those individuals. As such, the smart-home environment "learns" who is an occupant and permits the mobile devices 166 associated with those individuals to control the network-connected smart devices of the smart-home environment 100. As described herein, various types of notices and other information are provided to occupants via messages sent to the occupants' mobile devices 166 and other electronic devices.
  • SMS short message service
  • MMS multimedia messaging se dee
  • USSD unstructured supplementary service data
  • the smart-home environment may receive communication from an unregistered mobile device of an individual inside of the home, where said individual is not recognized as an occupant of the home. Further, for example, smart-home environment may receive communication from a mobile device of an individual who is known to be or who is registered as a guest.
  • a guest-layer of controls can be provided to guests of the smart-home environment 100.
  • the guest-layer of controls gives guests access to basic controls (e.g., a judicially selected subset of features of the smart devices), such as temperature adjustments, but it locks out other functionalities.
  • the guest layer of controls can be thought of as a "safe sandbox" in which guests have limited controls, but they do not have access to more advanced controls that could fundamentally alter, undermine, damage, or otherwise impair the occupant-desired operation of the smart devices. For example, the guest layer of controls won't permit the guest to adjust the heat-pump lockout temperature.
  • a use case example of this is when a guest in a smart home, the guest could walk up to the thermostat and turn the dial manually, but the guest may not want to walk the house "hunting" for the thermostat, especially at night while the home is dark and others are sleeping. Further, the guest may not want to go through the hassle of downloading the necessary application to their device for remotely controlling the thermostat. In fact, the guest may not have access to the home owner's login credentials, etc., and therefore cannot remotely control the thermostat via such an application. Accordingly, according to at least some embodiments, the guest can open a mobile browser on their mobile device, type a keyword, such as "NEST" into the URL field and tap "Go" or "Search", etc.
  • the device presents with guest with a user interface, such as Thermozilla UI, which allows the guest to move the target temperature between a limited range, such as 65 and 80 degrees Fahrenheit.
  • a user interface such as Thermozilla UI
  • the user interface provides a guest layer of controls that are limited to basic functions. The guest cannot change the target humidity, modes, or view energy history.
  • a local webserver is provided that is accessible in the local area network (LAN). It does not require a password, because physical presence inside the home is established reliably enough by the guest's presence on the LAN.
  • the home owner is asked if they want to enable a Local Web App (LWA) on the smart device.
  • LWA Local Web App
  • the smart device broadcasts to the LAN that the above referenced keyword, such as "NEST", is now a host alias for its local web server.
  • the above referenced keyword such as "NEST”
  • that same keyword e.g., "NEST” is always the URL you use to access the LWA, provided the smart device is purchased from the same manufacturer.
  • the second and subsequent smart devices do not offer to set up another LWA. Instead, they register themselves as target candidates with the master LWA. And in this case the LWA user would be asked which smart device they want to change the temperature on before getting the simplified user interface, such as Thermozilia UI, for the particular smart device they choose.
  • a guest layer of controls may also be provided to users by means other than a device 166.
  • the smart device such as the smart thermostat, may be equipped with walkup-identification technology (e.g., face recognition, RFID, ultrasonic sensors) that "fingerprints" or creates a "signature" for the occupants of the home.
  • the walkup-identification technology can be the same as or similar to the
  • the smart thermostat and other smart devices “learn” by observing occupant behavior. For example, the smart thermostat learns occupants preferred temperature set-points for mornings and evenings, and it learns when the occupants are asleep or awake, as well as when the occupants are typically away or at home, for example. According to embodiments, when a guest controls the smart devices, such as the smart thermostat, the smart devices do not "learn” from the guest. This prevents the guest's adjustments and controls from affecting the learned preferences of the occupants.
  • a smart television remote control is provided.
  • the smart remote control recognizes occupants by thumbprint, visual identification, RFID, etc., and it recognizes users as guests or as someone belonging to a particular class having limited control and access (e.g., a child).
  • the smart remote control Upon recognizing the user as a guest or someone belonging to a limited class, the smart remote control only permits that user to view a subset of channels and to make limited adjustments to the settings of the television and other devices. For example, a guest cannot adjust the digital video recorder (DVR) settings, and a child is limited to viewing child-appropriate programming.
  • DVR digital video recorder
  • sinks, bathtubs, and showers can be controlled by smart spigots that recognize users as guests or as children and therefore prevents water from exceeding a designated temperature that is considered safe.
  • the network-connected smart devices of the smart- home environment 100 are modular and can be incorporated into older and new houses.
  • the devices are designed around a modular platform consisting of two basic components: a head unit and a backplate, which is also referred to as a docking station.
  • the docking station includes a standard head-connection arrangement, such that any head unit can be removably attached to any docking station.
  • the docking stations are interfaces that serv e as physical connections to the structure and the voltage wiring of the homes, and the interchangeable head units contain all of the sensors, processors, user interfaces, the batteries, and other functional components of the devices.
  • Many different commercial and functional possibilities for provisioning, maintenance, and upgrade are possible. For example, after years of using any particular head unit, a user will be able to buy a new version of the head unit and simply plug it into the old docking station.
  • the various versions of the head units can all be interchangeable, with any of them working when placed into any docking station. This can advantageously encourage sharing and re-deployment of old head units - for example, when an important high- capability head unit, such as a hazard detector, is replaced by a new version of the head unit, then the old head unit can be re-deployed to a backroom or basement, etc.
  • an important high- capability head unit such as a hazard detector
  • the head unit when first plugged into a docking station, can ask the user (by 2D LCD display, 2D/3D holographic projection, voice interaction, etc.) a few simple questions such as, “Where am I” and the user can indicate “living room”, “kitchen” and so forth.
  • some of these modular smart devices have security- enhancing features that trigger a notification or an alarm in the event the head is removed from the docking station.
  • some smart devices are capable of detecting motion and function as "tripwires" in the security system. Others provide live video feeds and function as security cameras.
  • an alarm or alert notification is triggered.
  • the smart device sends a message indicating head unit removal to the central server or cloud-computing system 164.
  • the central server or cloud-computing system 164 Responsive to receiving a message indicating head unit removal, the central server or cloud-computing system 164, according to embodiments, sends a message to the home owner's or other occupants' mobile device(s) 166, indicating the removal and asking whether the removal is authorized. If no response after a timeout period or if the response indicates that removal was not authorized, then the central server or cloud- computing system 164 triggers the alarm. In other embodiments, such as when the alarm is armed (i.e., in security mode), the alarm is triggered immediately upon removal of the head unit.
  • the alarm may be local on the head unit itself and therefore an alert sound is broadcasted from the head unit, or may be centralized and controlled by the central server or cloud-computing system 164 and the other network-connected smart devices are instructed to broadcast an alert sound.
  • the head unit upon removal, asks the person to verbally identify themselves and, if the voice is not recognized, then the alarm is triggered.
  • the smart-home environment 100 may also include communication with devices outside of the smart-home environment 100 but within a proximate geographical range of the home, such as within the home's curtilage.
  • the smart-home environment 100 may include an outdoor lighting system 1 14 that communicates information through the mesh network or directly to the central server or cloud-computing system 164 regarding detected movement and/or presence of people, animals, and any other objects and receives back commands for controlling the lighting accordingly.
  • the central server or cloud- computing system 164 can control the outdoor lighting system 1 14 based on information received from the other network- connected smart devices in the smart-home environment.
  • the central server or cloud- computing system 164 can "turn on” the outdoor lighting system 114 as well as oilier lights in the smart-home environment 100. This is advantageous over known outdoor-motion detecting lights because the motion-detection capability is not limited to just the motion sensor attached to the light itself, but extends across all the network-connected smart devices in the smart- home environment 100.
  • the smart-home environment 100 may include a gated entry 116 that communicates information through the mesh network or directly to the central server or cloud-computing system 164 regarding detected movement and/or presence of people, animals, and any other objects and receives back instructions for controlling the gated entiy such an opening, closing, locking, unlocking the gate.
  • a gated entry 116 that communicates information through the mesh network or directly to the central server or cloud-computing system 164 regarding detected movement and/or presence of people, animals, and any other objects and receives back instructions for controlling the gated entiy such an opening, closing, locking, unlocking the gate.
  • an algorithm is provided for considering the geographic location of the smart-home environment 100, such as based on the zone improvement plan ("ZIP") code or geographic coordinates of the home. The geographic information is then used to obtain data helpful for determining optimal times for turning on/off or otherwise adjusting lighting as well as opening, closing, locking, unlocking gates or otherwise securing the smart-home environment 100.
  • ZIP zone improvement plan
  • these low-powered and spokesman nodes can function as "tripwires" for an alarm system in the smart-home environment.
  • the alarm could be triggered upon receiving an occupancy, motion, heat, sound, etc. message from one or more of the low-powered and spokesman nodes in the mesh network.
  • the central server or cloud-computing system 164 or some other device could trigger an alarm, provided the alarm is arm at the time of detection.
  • the alarm system could be enhanced by various low-powered and spokesman nodes located throughout the smart-home environment 100.
  • a user could enhance the security of the smart-home environment 100 by buying and installing extra smart nightlights 170.
  • the mesh network can be used to automatically rum on and off lights as a person transitions from room to room.
  • the low-powered and spokesman nodes e.g., devices 102, 104, 106, 108, 1 10, 1 12, 113, and 170
  • the central server or cloud-computing system 164 or some other device activates and deactivates the smart wall switches 108 to automatically provide light as the person moves from room to room in the smart-home environment 100.
  • users may provide pre-configuration information that indicates which smart wall plugs 110 provide power to lamps and other light sources, such as the smart nightlight 170.
  • this mapping of light sources to wall plugs 110 can be done automatically (e.g., the smart wall plugs 1 10 detect when a light source is plugged into it, and it sends a corresponding message to the central server or cloud-computing system 164).
  • the central server or cloud-computing system 164 or some other device activates and deactivates the smart wall plugs 1 10 that provide power to lamps and other light sources so as to track the person's movement and provide light as the person moves from room to room.
  • the mesh network of low-powered and spokesman nodes can be used to provide exit lighting in the event of an emergency, such as an earthquake, a fire, a
  • users provide pre-configuration information that indicates exit routes in the smart-home environment 100. For example, for each room in the house, the user provides a map of the best exit route. It should be appreciated that instead of a user providing this information, the central server or cloud-computing system 164 or some other device could automatically determine the routes using uploaded maps, diagrams, architectural drawings of the smart- home environment, as well as using a map generated based on positional information obtained from the nodes of the mesh network (e.g., positional information from the devices is used to construct a map of the house).
  • the central server or cloud-computing system 164 or some other device uses occupancy information obtained from the low-powered and spokesman nodes to determine which rooms are occupied and then turns on lights (e.g., nightlights 170, wall switches 108, wall plugs 110 that power lamps, etc.) along the exit routes from the occupied rooms so as to provide emergency exit lighting.
  • lights e.g., nightlights 170, wall switches 108, wall plugs 110 that power lamps, etc.
  • all or some of the network- connected smart devices including the smart hazard detector 104 and the smart thermostat 102, include a light that is activated to help occupants evacuate the home.
  • an audible alarm can be sounded in the home giving information about the event.
  • a message such as an SMS or MMS message, may be sent to the mobile device of the occupants.
  • the mesh network of low-powered and spokesman nodes can be used to provide security lighting in the event an unauthorized occupant is detected in the home.
  • all lights in and/or outside of the home may be activated, lurning on all light will alert authorized occupants to the danger and will likely cause the unauthorized occupants to flee.
  • the smart home environment 100 may include a home safe for storing valuables, such as jewels, money, rare coins, important documents, etc.
  • a home safe for storing valuables, such as jewels, money, rare coins, important documents, etc.
  • the safe automatically sends out wireless alarms, SMS, notifies the authorities, etc.
  • the safe also includes a location tracking device, such as a GPS device, so that in the event it is carried away, it can transmit information about its location.
  • a safe may be any suitable type of appliance 113, 140, and/or 142.
  • service robots 168 each configured to carry out, in an autonomous manner, any of a variety of household tasks.
  • the sen ' ice robots 168 can be respectively configured to perform floor sweeping, floor washing, etc. in a manner similar to that of known commercially available devices such as the ROOMB A(TM) and
  • one or more of the service robots 168 are configured to perform tasks such as playing music for an occupant, serving as a localized thermostat for an occupant, serving as a localized air monitor/purifier for an occupant, serving as a localized baby monitor, serving as a localized hazard detector for an occupant, and so forth, it being generally more desirable for such tasks to be carried out in the immediate presence of the human occupant.
  • such tasks can be considered as "human-facing" or "human-centric" tasks.
  • a particular one of the service robots 168 can be considered to be facilitating what can be called a "personal comfort-area network" for the occupant, with the objective being to keep the occupant's immediate space at a comfortable temperature wherever that occupant may be located in the home.
  • a personal comfort-area network for the occupant, with the objective being to keep the occupant's immediate space at a comfortable temperature wherever that occupant may be located in the home.
  • conventional wall-mounted room thermostats which have the more attenuated objective of keeping a statically-defined structural space at a comfortable temperature.
  • the localized-thermostat service robot 168 is configured to move itself into the immediate presence (e.g., within five feet) of a particular occupant who has settled into a particular location in the home (e.g., in the dining room to eat their breakfast and read the news).
  • the localized-thermostat service robot 168 includes a temperature sensor, a processor, and wireless communication components configured such that control communications with the HVAC system, either directly or through a wall- mounted wirelessly communicating thermostat coupled to the HVAC system, are maintained and such that the temperature in the immediate vicinity of the occupant is maintained at their desired level. If the occupant then moves and settles into another location (e.g., to the living room couch to watch television), the localized-thermostat service robot 168 proceeds to move and park itself next to the couch and keep that particular immediate space at a comfortable temperature.
  • the localized-thermostat service robot 168 (and/or the larger smart-home system of FIG. 1) can identify and locate the occupant whose personal-area space is to be kept at a comfortable temperature
  • RFID sensing e.g., person having an RFID bracelet, RFID necklace, or RFID key fob
  • synthetic vision techniques e.g., video cameras and face recognition processors
  • audio techniques e.g., voice, sound pattern, vibration pattern recognition
  • ultrasound sensing/imaging techniques e.g., and infrared or near-field communication (NFC) techniques (e.g., person wearing an infrared or NFC-capable smartphone), along with rules-based inference engines or artificial intelligence techniques that draw useful conclusions from the sensed information (e.g., if there is only a single occupant present in the home, then that is the person whose immediate space should be kept at a comfortable temperature, and the selection of the desired comfortable temperature should correspond to that occupant's particular stored profile).
  • RFID sensing e.g., person having an RFID
  • a particular service robot 168 When serving as a localized air monitor/purifier for an occupant, a particular service robot 168 can be considered to be facilitating what can be called a "personal health- area network" for the occupant, with the objective being to keep the air quality in the occupant's immediate space at healthy levels. Alternatively or in conjunction therewith, other health-related functions can be provided, such as monitoring the temperature or heart rate of the occupant (e.g., using finely remote sensors, near-field communication with on- person monitors, etc.). When serving as a localized hazard detector for an occupant, a particular service robot 168 can be considered to be facilitating what can be called a
  • personal safety-area network for the occupant, with the objective being to ensure there is no excessive carbon monoxide, smoke, fire, etc. in the immediate space of the occupant.
  • Methods analogous to those described above for personal comfort-area networks in terms of occupant identifying and tracking are likewise applicable for personal health-area network and personal safety-area network embodiments.
  • the above-referenced facilitation of personal comfort-area networks, personal health-area networks, personal safety-area networks, and/or other such human-facing functionalities of the service robots 168 are further enhanced by logical integration with other smart sensors in the home according to rules-based inferencing techniques or artificial intelligence techniques for achieving better performance of those human-facing functionalities and/or for achieving those goals in energy-conserving or other resource-conserving ways.
  • the air monitor/purifier sen' ice robot 168 can be configured to detect whether a household pet is moving toward the currently settled location of the occupant (e.g., using onboard sensors and/or by data communications with other smart-home sensors along with rules-based inferencing/artificial intelligence techniques), and if so, the air purifying rate is immediately increased in preparation for the arrival of more airborne pet dander.
  • the hazard detector service robot 168 can be advised by other smart-home sensors that the temperature and humidity levels are rising in the kitchen, which is nearby to the occupant's current dining room location, and responsive to this advisory the hazard detector sendee robot 168 will temporarily raise a hazard detection threshold, such as a smoke detection threshold, under an inference that any small increases in ambient smoke levels will most likely be due to cooking activity and not due to a genuinely hazardous condition.
  • a hazard detection threshold such as a smoke detection threshold
  • each service robot 168 includes wireless communication components that facilitate data communications with one or more of the other wirelessly communicating smart-home sensors of FIG. 1 and/or with one or more other senice robots 168 (e.g., using Wi-Fi, Zigbee, Z-Wave, 6L0WPAN, etc.), and one or more of the smart-home devices of FIG. 1 can be in communication with a remote sen r er over the Internet.
  • each service robot 168 can be configured to communicate directly with a remote server by virtue of cellular telephone communications, satellite
  • 3G/4G network data communications or other direct communication method.
  • inventions Provided according to some embodiments are systems and methods relating to the integration of the service robot(s) 168 with home security sensors and related functionalities of the smart home system.
  • the embodiments are particularly applicable and advantageous when applied for those service robots 168 that perform "away” functionalities or that otherwise are desirable to be active when the home is unoccupied (hereinafter "away-service robots").
  • away-service robots Included in the embodiments are methods and systems for ensuring that home security systems, intrusion detection systems, and/or occupancy-sensitive environmental control systems (for example, occupancy-sensitive automated setback thermostats that enter into a lower-energy-using condition when the home is unoccupied) are not erroneously triggered by the away-service robots.
  • a home automation and security system e.g., as shown in FIG. 1 that is remotely monitored by a monitoring service by virtue of automated systems (e.g., cloud-based servers or other central servers, hereinafter "central server") that are in data communications with one or more network-connected elements of the home automation and security system.
  • the away-service robots are configured to be in operative data communication with the central server, and are configured such that they remain in a non-away-service state (e.g., a dormant state at their docking station) unless permission is granted from the central server (e.g., by virtue of an "away-service-OK" message from the central server) to commence their away-service activities.
  • An away-state determination made by the system which can be arrived at (i) exclusively by local on- premises smart device(s) based on occupancy sensor data, (ii) exclusively by the central serv er based on received occupancy sensor data and/or based on received proximity-related information such as GPS coordinates from user smartphones or automobiles, or (iii) any combination of (i) and (ii), can then trigger the granting of away-service permission to the away-service robots by the central server.
  • the central server can readily filter signals from the occupancy sensing devices to distinguish between the away-service robot activity versus any unexpected intrusion activity, thereby avoiding a false intrusion alarm condition while also ensuring that the home is secure.
  • the central server may provide filtering data (such as an expected occupancy-sensing profile triggered by the away-service robots) to the occupancy sensing nodes or associated processing nodes of the smart home, such that the filtering is performed at the local level.
  • filtering data such as an expected occupancy-sensing profile triggered by the away-service robots
  • the central server may temporarily disable the occupancy sensing equipment for the duration of the away-service robot activity.
  • functionality similar to that of the central server in the above example can be performed by an on-site computing device such as a dedicated server computer, a "master" home automation console or panel, or as an adjunct function of one or more of the smart-home devices of FIG. 1.
  • an on-site computing device such as a dedicated server computer, a "master" home automation console or panel, or as an adjunct function of one or more of the smart-home devices of FIG. 1.
  • the away-service robots are configured to emit a standard ultrasonic sound throughout the course of their away-serv ice activity', the activity sensing systems are configured to detect that standard ultrasonic sound, and the activity sensing systems are further configured such that no disturbance-detected outcome will occur for as long as that standard ultrasonic sound is detected.
  • the away-service robots are configured to emit a standard notification signal throughout the course of their away-service activity
  • the activity sensing systems are configured to detect that standard notification signal
  • the activity sensing systems are further configured such that no disturbance-detected outcome will occur for as long as that standard notification signal is detected
  • the standard notification signal comprises one or more of: an optical notifying signal; an audible notifying signal; an infrared notifying signal; an infrasonic notifying signal; a wirelessly transmitted data notification signal (e.g., an IP broadcast, multicast, or unicast notification signal, or a notification message sent in a TCP/IP two-way communication session).
  • the notification signals sent by the away-service robots to the activity sensing systems are authenticated and encrypted such that the notifications cannot be learned and replicated by a potential burglar.
  • Any of a variety of known encryption/authentication schemes can be used to ensure such data security including, but not limited to, methods involving third party data security services or certificate authorities.
  • a permission request-response model can be used, wherein any particular away-service robot requests permission from each activity sensing system in the home when it is ready to perform its away-service tasks, and does not initiate such activity until receiving a "yes” or "permission granted” message from each activity sensing system (or from a single activity sensing system serving as a "spokesman” for all of the activity sensing systems ).
  • One advantage of the described embodiments that do not require a central event orchestrator is that there can (optionally) be more of an arms-length relationship between the supplier(s) of the home security/environmental control equipment, on the one hand, and the supplier(s) of the away-service robot(s), on the other hand, as it is only required that there is the described standard one-way notification protocol or the described standard two-way request/permission protocol to be agreed upon by the respective suppliers.
  • the activity sensing systems are configured to detect sounds, vibrations, RF emissions, or other detectable environmental signals or "signatures" that are intrinsically associated with the away-service activity of each away- service robot, and are further configured such that no disturbance-detected outcome will occur for as long as that particular detectable signal or environmental "signature" is detected.
  • a particular kind of vacuum-cleaning away-service robot may emit a specific sound or RF signature.
  • the away-service environmental signatures for each of a plurality of known away-service robots are stored in the memory of the activity sensing systems based on empirically collected data, the environmental signatures being supplied with the activity sensing systems and periodically updated by a remote update server.
  • the activity sensing systems can be placed into a "training mode" for the particular home in which they are installed, wherein they “listen” and “learn” the particular environmental signatures of the away- service robots for that home during that training session, and thereafter will suppress disturbance-detected outcomes for intervals in which those environmental signatures are heard.
  • the activity sensing system is configured to automatically learn the environmental signatures for the away-service robots by virtue of automatically performing correlations over time between detected environmental signatures and detected occupancy activity.
  • an intelligent automated nonoccupancy- triggered setback thermostat such as the Nest Learning Thermostat can be configured to constantly monitor for audible and RF activity as well as to perform infrared-based occupancy detection.
  • this automatic-learning embodiment is more preferable for application in occupancy-sensitive environmental control equipment (such as an automated setback thermostat) rather than home security systems for the reason that a few false occupancy determinations may cause a few instances of unnecessary heating or cooling, but will not othenvise have any serious, whereas false home security alarms may have more serious consequences.
  • occupancy-sensitive environmental control equipment such as an automated setback thermostat
  • FIG. 2 illustrates a network-level view of an extensible devices and services platform 200 with which a plurality of smart-home environments, such as the smart-home environment 100 of FIG. 1, can be integrated.
  • the extensible devices and services platform 200 includes remote servers or cloud computing architectures 164.
  • Each of the network- connected smart devices from FIG. 1 can communicate with the remote servers or cloud computing architectures 164.
  • a connection to the Internet 162 can be established either directly (for example, using 3G/4G connectivity to a wireless carrier), through a hubbed network 212 (which can be a scheme ranging from a simple wireless router, for example, up to and including an intelligent, dedicated whole-home control node), or through any combination thereof.
  • the devices and services platform 200 communicates with and collects data from the network-connected smart devices of smart- home environment 100 of FIG. 1, it should be appreciated that the devices and services platform 200 communicates with and collects data from a plurality of smart-home environments across the world.
  • the central server or cloud-computing system 164 can collect home data 202 from the network-connected devices of one or more smart- home environments, where the network-connected devices can routinely transmit home data or can transmit home data in specific instances (e.g., when a device queries the home data 202).
  • the devices and services platform 200 routinely collects data from homes across the world.
  • the collected home data 202 includes, for example, security data, such as a map of the home and the respective network-connected smart devices and their capabilities in each room, alarm settings information, contact information for the registered occupants of the home, etc.
  • the collected home data 202 may also include, for example, power consumption data, occupancy data, HVAC settings and usage data, carbon monoxide levels data, carbon dioxide levels data, volatile organic compounds levels data, sleeping schedule data, cooking schedule data, inside and outside temperature humidity data, television viewership data, inside and outside noise level data, etc.
  • the central serv er or cloud-computing architecture 164 can further provide one or more services 204, such as security related services described herein.
  • the services 204 can include software updates, customer support, remote access, remote or distributed control, use suggestions (e.g., based on collected home data 202 to improve performance, reduce utility cost, etc.), and/or sensor data collection/logging, where sensor data and other data from network-connected smart devices of smart-home environments 100 is collected and logged.
  • the data collected and logged may include maps of homes, maps of users' in- home movements from room to room as determined by network-connected smart devices equipped with motion and/or identification technology, time spent in each room, intra-home occupancy maps that indicate which rooms are occupied and by whom at different times (including in real time), fire-detection incidents, false alarms, CO data, temperature data, humidity data, etc.
  • the services 204 increases the frequency at which it collects and logs data from network-connected devices in that home.
  • the services 204 collects data in ten-second intervals.
  • the data collected and logged may be provided to investigators after the occurrence of a crime, fire, etc., so that the data may be used to solve the crime, determine the cause of the fire, etc.
  • the sendees 204 can further include, for example, remote access, remote or distributed control, security improvement suggestions (e.g., provide suggestions for enhancing security of a home based on collected home data 202, etc.), software updates, customer support, etc.
  • Data associated with the services 204 can be stored and/or logged at the central server or cloud-computing system 164 and the central server or the cloud- computing system 164 can retrieve and transmit the data at an appropriate time (e.g., at regular intervals, upon receiving request from a user, etc.).
  • an embodiment of the extensible devices and services platform 200 includes a processing engine 206, which can be concentrated at a single server or distributed among several different computing entities without limitation.
  • the processing engine 206 can include engines configured to receive data from network-connected smart devices of smart-home environments (e.g., via the Internet or a hubbed network), to index the data, to analyze the data and/or to generate statistics based on the analysis or as part of the analysis.
  • the analyzed data can be stored as derived home data 208.
  • Results of the analysis or statistics can thereafter be transmitted back to the network-connected smart device(s) that provided home data used to derive the results, to other network-connected smart devices, to a user mobile device 166, to a server providing a webpage to the user's mobile device 166, or to other non-device entities.
  • patterns and statistics summarizing data received from network-connected smart devices can be generated by the processing engine 206 and transmitted.
  • the results or statistics can be provided via the Internet 162.
  • the processing engine 206 can be configured and programmed to derive a variety of useful information from the home data 202.
  • a single server can include one or more engines.
  • the derived data can be highly beneficial at a variety of different granularities for a variety of useful purposes, ranging from explicit programmed control of network-connected smart devices on a per-home, per-neighborhood, or per-region basis (for example, demand- response programs for electrical utilities, security related statistics unique to particular neighborhoods can be used to control particular network-connected smart devices, etc.), to the generation of inferential abstractions that can assist on a per-home basis (for example, an inference can be drawn that the homeowner has left for vacation and so security detection equipment can be put on heightened sensitivity), to the generation of statistics and associated inferential abstractions that can be used for government or charitable purposes.
  • processing engine 206 can generate statistics about network-connected smart device usage across a population of devices and send the statistics to device users, service providers or other entities (e.g., that have requested or may have provided monetary compensation for the statistics).
  • the devices and serv ices platform 200 exposes a range of application programming interfaces (APIs) 210 to third parties, such as law enforcement agencies 222 (e.g., police or public and/or private security entities), governmental entities 224 (e.g., Health and Safety Agencies, such as the Food and Drug Administration (FDA), the Environmental Protection Agency (EPA), etc.), academic institutions 226 (e.g., university researchers), businesses 228 (e.g., private security businesses or charities or utility companies or companies that may provide device warranties or service to related equipment, targeting advertisers based on home data, etc.), emergency response providers 230, such as fire and ambulance, and other third parties.
  • law enforcement agencies 222 e.g., police or public and/or private security entities
  • governmental entities 224 e.g., Health and Safety Agencies, such as the Food and Drug Administration (FDA), the Environmental Protection Agency (EPA), etc.
  • academic institutions 226 e.g., university researchers
  • businesses 228 e.g., private security businesses or charities
  • the APIs 210 are coupled to and permit third-party systems to communicate with the central server or the cloud-computing system 164, including the services 204, the processing engine 206, the home data 202, and the derived home data 208.
  • the APIs 210 allow
  • third parties can develop programs and/or applications, such as web or mobile apps, that integrate with the central server or the cloud-computing system 164 to provide services and information to users.
  • programs and applications may be, for example, designed to help users reduce energy consumption, to preemptively service faulty equipment, to prepare for high service demands, to track past service performance, etc., or to secure their homes by performing any of a variety of beneficial functions or tasks now- known or hereinafter developed. Examples include providing users with local crime news, information and statistics, safety tips and check lists, such as tips for installing security lights, door and window locks, etc.
  • third-party applications make inferences from the home data 202 and the derived home data 208, such inferences may include when are occupants home, when are they sleeping, when are they in the den watching television, when they shower.
  • the answers to these questions may help third-parties benefit consumers by providing them with interesting security-related information, products and services, as well as with providing them with targeted advertisements.
  • a private security company creates an application that makes inferences regarding when people are away from home.
  • the application uses the inferences to schedule private security officers to stop or drive by the home when people will most likely be away from home, the application may also put the user's network-connected smart devices in alarm mode, notify trusted neighbors that the user is away, etc.
  • a business 228 may be a shipping company that may create an application that makes inferences regarding when people are at home.
  • the application uses the inferences to schedule deliveries for times when people will most likely be at home.
  • the application can also build delivery routes around these scheduled times. This reduces the number of instances where the shipping company has to make multiple attempts to deliver packages, and it reduces the number of times consumers have to pick up their packages from the shipping company (e.g., as described below with respect to FIG. 19).
  • the devices and services platform 200 exposes APIs 210 to third parties, such as businesses 228 in exchange for revenue, such as for a monthly fee, similar to a subscription service.
  • the business 228 may be a retail store that sells consumer products and building and construction supplies and materials, including the network-connected smart devices described above with reference to FIG. 1.
  • the retail store 228 agrees to sell network-connected smart devices at discount in exchange for free or discounted access to the APIs 210.
  • the retails store 228 can use the information from the APIs 210 to better target their customers and increase sales. While the provider of the devices and services platform 200 benefits from a proliferation of discounted network- connected smart devices.
  • FIG. 3 illustrates an abstracted functional view of the extensible devices and services platform 200 of FIG. 2, with particular reference to the processing engine 206 as well as devices, such as the network-connected smart devices of the smart-home environment 100 of FIG. 1.
  • devices such as the network-connected smart devices of the smart-home environment 100 of FIG. 1.
  • DC data consumer 302
  • DS data source 304
  • SC sendees consumer 306
  • SS services source 308
  • the extensible devices and serv ices platform 200 can also be configured to harness the large amount of data that is flowing out of these devices.
  • the extensible devices and serv ices platform 200 can be directed to "repurposing" that data in a variety of automated, extensible, flexible, and/or scalable ways to achieve a variety of useful home security/smart home objectives. These objectives may be predefined or adaptively identified based on, e.g., usage patterns, device efficiency, and/or user input (e.g., requesting specific functionality, manually inputting specific data).
  • FIG. 3 shows processing engine 206 as including a number of paradigms 310.
  • Processing engine 206 can include a managed services paradigm 310a that monitors and manages primary or secondary device functions.
  • the device functions can include ensuring proper operation of a network-connected smart device given user inputs, detecting (e.g., and responding to) an intruder that has entered or is attempted to enter a dwelling (e.g., security), implementing or otherwise responding to energy demand response events, detecting a failure of equipment coupled to a network-connected smart device (e.g., a light bulb having burned out, passive IR senor having gone bad, etc.), or alerting a user of a current event or predicted future events.
  • a network-connected smart device e.g., a light bulb having burned out, passive IR senor having gone bad, etc.
  • Processing engine 206 can further include an advertising/communication paradigm 310b that estimates characteristics (e.g., demographic information, time spent doing particular activities like cooking or watching television), desires and/or products of interest of a user based on device usage and/or data received from network-connected smart devices. Services, promotions, products or upgrades can then be offered or automatically provided to the user.
  • Processing engine 206 can further include a social paradigm 310c that uses information from a social network, provides information to a social network (e.g., based on device usage), and/or processes data associated with user and/or device interactions with the social network platform.
  • a user's status as reported to their trusted contacts on the social network could be updated to indicate when they are home or away based on light detection, security system inactivation or device usage detectors.
  • a user may be able to share device-usage statistics with other users.
  • a user may share HVAC settings that result in low power bills and other users may download the HVAC settings to their smart thermostat 102 to reduce their power bills.
  • the processing engine 206 can include a challenges/niles/compliance/rewards paradigm 31 Od that informs a user of challenges, competitions, rules, compliance regulations and/or rewards and/or that uses operation data to determine whether a challenge has been met, a rule or regulation has been complied with and/or a reward has been earned.
  • the challenges, rules or regulations can relate to efforts to conserve energy, improve security in the home (e.g., regularly lock door, install adequate number of motion detectors or outdoor lights, etc.), to live safely (e.g., reducing exposure to toxins or carcinogens), to conserve money and/or equipment life, to improve health, etc.
  • one challenge may involve participants turning down their thermostat by one degree for one week, or achieving a certain "security score" by properly equipping their home with security devices and sendees and properly using and maintaining those devices. Those that successfully complete the challenge are rewarded, such as by coupons, virtual currency, status, etc.
  • an example involves a parent making a safety and security rule that children are not permitted to leave the home alone after a specified curfew, such as 9:00PM.
  • the network-connected smart devices in the home could track the movement of the various occupants and send alerts to the parent when a child leaves the home alone after the curfew or when the child is away from home after the curfew.
  • another example involves a rental-property owner making a rule that no renters are permitted to access certain owner's rooms. The devices in the room having occupancy sensors could send updates to the owner when the room is accessed.
  • the processing engine 206 can integrate or otherwise utilize extrinsic information 316 from extrinsic sources (e.g., via the Internet, such as weather forecasts, prices of certain goods/sendees, neighborhood/home information, etc.) to improve the functioning of one or more processing paradigms.
  • extrinsic sources e.g., via the Internet, such as weather forecasts, prices of certain goods/sendees, neighborhood/home information, etc.
  • Extrinsic information 316 can be used to interpret data received from a network-connected smart device, to determine a characteristic of the environment near the device (e.g., outside a structure that the device is enclosed in), to determine services or products available to the user, to identify a social network or social-network information, to determine contact information of entities (e.g., public -service entities such as an emergency-response team, the police or a hospital) near the device, etc., to identify statistical or environmental conditions, trends or other information associated with a home or neighborhood, and so forth.
  • entities e.g., public -service entities such as an emergency-response team, the police or a hospital
  • each bedroom of the smart- home environment 100 can be provided with a smart wall switch 108, a smart wall plug 1 10, and'Or smart hazard detectors 104, all or some of which include an occupancy sensor, wherein the occupancy sensor is also capable of inferring (e.g., by virtue of motion detection, facial recognition, audible sound patterns (e.g., voice detection), etc.) whether the occupant is asleep or awake.
  • a smart wall switch 108 e.g., a smart wall plug 1 10, and'Or smart hazard detectors 104, all or some of which include an occupancy sensor, wherein the occupancy sensor is also capable of inferring (e.g., by virtue of motion detection, facial recognition, audible sound patterns (e.g., voice detection), etc.) whether the occupant is asleep or awake.
  • the remote security/monitoring service or police department is advised of how many occupants there are in each bedroom, and whether those occupants are still asleep (or immobile), and the real time location of the intruder in the home. Further, video from the home can be broadcasted to video-capable devices of the nearest security personnel and police so that the police can monitor the activity in the home while in route to the home.
  • video from the home can be broadcasted to video-capable devices of the nearest security personnel and police so that the police can monitor the activity in the home while in route to the home.
  • the same data that is being used for home security can also be "repurposed" by the processing engine 206 in the context of a social paradigm of neighborhood security.
  • the same data discussed in the example above can be collected and made available for processing (properly anonymized) in which the crime patterns and home safety in a particular ZIP code can be tracked. If a serious fire event is sensed, the remote security/monitoring service or fire department is advised of how many occupants there are in each bedroom, and whether those occupants are still asleep (or immobile) or whether they have properly evacuated the bedroom. While this is, of course, a very advantageous capability accommodated by the described extensible devices and services platform, there can be substantially more profound" examples that can truly illustrate the potential of a larger "intelligence" that can be made available.
  • the same data bedroom occupancy data that is being used for fire safety can also be "repurposed” by the processing engine 206 in the context of a social paradigm of neighborhood child development and education.
  • the same bedroom occupancy and motion data discussed in the "ordinary” example can be collected and made available for processing (properly anonymized) in which the sleep patterns of schoolchildren in a particular ZIP code can be identified and tracked. Localized variations in the sleeping patterns of the schoolchildren may be identified and correlated, for example, to different nutrition programs in local schools.
  • the devices and services platform 200 provides a home security services 205 into which users can enroll their smart-home environments 100.
  • the security services 205 can be offered on a non-commitment month-to-month basis. It should also be appreciated that the security services 205 can be offered year-to-year or for lifetime.
  • the security services 205 can provide multi-tiered offerings, including offer basic, plus, and premium services.
  • Basic services for example, include basic intrusion detection and emergency personnel notification.
  • the basic security services 205 monitor incoming data from the network-connected smart devices of the home to determine when a possible intrusion is occurring, as indicated by motion detection outside the home, information from the smart entry detectors indicating that any one of the doors 186 or windows 182 of the home have been opened, etc. Upon detection, the basic security services 205 contact the occupants of the home and/or local law enforcement. Plus security services 205, for example, monitor dangerous conditions in the home including smoke, CO, in addition to home invasion. Premium services 205 include, for example, availing the home to the many benefits of "neighbor security networks" (described below), detecting when individuals in the home are in distress, mimicking user patterns of turning on lights and appliances when the user is on vacation, providing users with security scores and
  • pricing for the security services or any suitable type of home insurance may vary depending on the security score of the home.
  • security score is based on information such as having adequate numbers and placement of network-connected smart devices (e.g., hazard detectors, entry detectors, etc.), percentage of smart devices that have WiFi (rather than low-power communication protocols), percentage of smart devices that are wired (rather than battery powered), number of strangers that visit the home, etc.
  • the higher the security score of the home the more secure the home and the cheaper the security services and/or insurance may be.
  • the devices and sendees platform 200 provides suggestions regarding how to improve security scores and, to incent users to improve their home's score, the platform 200 also indicates what discounts the user will receive if the user's home achieves a particular score.
  • the devices and services platform 200 upon receiving an enrollment request from a user, assess the capabilities of the network-connected smart devices in the user's home, and determines whether the requested services are appropriate for the user. For example, if the user requests a premium service, such as the capability to broadcast live video stream to law enforcement, but the user only has but a couple of video enabled smart devices and/or a limited WiFi network, then the devices and services platform 200 recommends that the user upgrade the smart devices in the home or select more basic sendees.
  • a premium service such as the capability to broadcast live video stream to law enforcement
  • some or all of the network-connected smart devices function as "tripwires" in the security system.
  • one of the network-connected smart devices detects motion, heat, sound, etc., it sends a
  • a user could enhance the security of the smart-home environment 100 by buying and installing extra network- connected smart devices, such as smart motion detectors 112 and smart nightlights 170.
  • the network-connected smart devices are equipped with identification technology (e.g., face recognition, RFID, ultrasonic sensors) that "fingerprints" or creates a "signature" for the people, animals, and objects.
  • identification technology e.g., face recognition, RFID, ultrasonic sensors
  • the identification technology can be the same as or similar to the fingerprinting and signature creating techniques described in other sections of this application.
  • the central server or cloud- computing system 164 stores a list of registered occupants and/or guests of the home.
  • the central server or cloud-computing system 164 logs that person's presence and, if the security system is armed, activates an alarm indicating the presence of an intaider. Further, the central server or cloud-computing system 164 may reference maps of the smart-home environment and schedules to whether the identified person, animal, or object is permitted to be in a particular area (e.g., room of the house) at a particular time and trigger an alarm accordingly.
  • occupant-location data e.g., GPS data, IPS data, etc.
  • the central sen er or cloud-computing system 164 tracks the occupants' movement inside and outside of the home based on occupant-location data received from the mobile devices 166.
  • the central server or cloud-computing system 164 uses this tracking information to make inferences regarding the current and future occupancy of the home and/or rooms, and to control the network-connected smart devices inside the home in a corresponding manner.
  • outdoor lights 114 can be turned on when it is determined that an occupant is returning home, or the smart doorknobs 122 can be locked and the security system can be armed when the occupant is leaving home.
  • the threshold for notifying authorities of an emergency can be adjusted depending on whether an occupant having a registered mobile device 166 is at home. For example, if the registered occupant is at home when an alarm condition (e.g., fire, distressed person, home invasion) is detected, a message can be sent to the occupant's mobile device 166 requesting confirmation that everything is okay. The authorities will only be notified if the registered occupant responds confirming that there is an emergency or if the registered occupant does not respond within a timeout period. On the other hand, if an alarm condition is detected and there are not registered occupants at home, then the authorities are immediately notified and a concurrent message is sent to the mobile devices 166 of the registered occupants.
  • an alarm condition e.g., fire, distressed person, home invasion
  • the central server or cloud-computing system 164 receives occupant-location data directly from the mobile devices, whereas in other instances the data is received from an intermediary, such as one of the network-connected smart devices in the home. In instances where occupant-location data is received directly from the mobile device, the central server or cloud-computing system 164 can determine if the occupant is "at home” or "away” based on whether the received occupant-location data corresponds with the location of the home. What's more, in some embodiments, the central server or cloud- computing system 164 can use the occupant-location data received directly from the mobile devices to determine the occupant's actual room-location (e.g., bedroom, kitchen, garage, etc.).
  • the central server or cloud-computing system 164 can use the occupant-location data received directly from the mobile devices to determine the occupant's actual room-location (e.g., bedroom, kitchen, garage, etc.).
  • the central server or cloud-computing system 164 cross- references the received occupant-location data (e.g., GPS data, IPS data, etc.) with a map of the home.
  • the central sen er or cloud- computing system 164 can infer that the occupant is in the room where the network-connected smart device is located.
  • Network-connected smart devices can detect mobile devices via WiFi, Bluetooth, NFC, etc.
  • passive RFID tags can be used to determine the room-location of occupants (and pets).
  • an RFID is associated with each of the occupants (and pets) of the house, such as by including the tags in wallets, bracelets, wristbands, mobile devices, collars, etc.
  • the network-connected smart devices in the various rooms detect the RFID tags, and send that information to the central server or cloud-computing system 164.
  • the determined room location of an occupant is used determine which user controls to provide to the occupant's mobile device 166 when the occupant uses the mobile device 166 to control the smart-home environment 100.
  • a different menu is displayed to the occupant depending on the occupant's location in the home. For example, if the occupant is located in the garage, then the displayed menu gives the occupant the option to turn up or down sensitivity of the smart entry detector 112 of the garage door. Also for example, if the occupant is in the kitchen, then the displayed menu gives the occupant the option to adjust the smoke-detection sensitivity of the smart hazard detector 104 in the kitchen. This might enable the occupant to cook without triggering a smoke alarm condition. Further, for example, if the occupant is located in a bedroom, then the displayed menu may give the occupant the option to lock the smart doorknob 122 and arm the alarm system.
  • the central server and cloud-computing systems 164 can infer that strangers are in the home when unknown mobile devices are detected. For example, if the network-connected smart devices detected two people in the home, and both of those people are associated with registered mobile devices 166, then it can be inferred that no strangers are in the home. However, if three people are detected in the home, but only two people are associated with registered mobile devices 166, then it can be inferred that there is one stranger in the home. A home may be considered less secure when there are unregistered mobile devices in the home and when there are more occupants than registered devices.
  • a home that is undergoing a remodel and that has dozens of umegistered constaiction workers with unregistered mobile devices coming and going is less secure than a home where all occupants are associated with registered mobile devices and where there are no unregistered mobile devices in the home.
  • occupants can use their registered mobile devices 166 to access the smart-home environment 100.
  • the smart doorknob 122 and the mobile device 166 may be capable of communicating via near field communication (NFC), BLUETOOTH, or some other short-ranger wireless protocol.
  • NFC near field communication
  • BLUETOOTH BLUETOOTH
  • some other short-ranger wireless protocol e.g., BLUETOOTH
  • the mobile device 166 of the user may transmit an access code to the smart doorknob 122, which then verifies with the server 164 that the person is a registered occupant.
  • the mesh network can be used to track a person's movement as the person transitions from room to room.
  • the central server or cloud-computing system 164 knows which room in the smart-home environment is occupied and by whom (e.g., using identification technology) at all times.
  • the low-powered and spokesman nodes e.g., network-connected smart devices 102, 104, 106, 108, 110, 1 12, 122, and 170
  • the low-powered and spokesman nodes detect the person's movement through the smart-home environment 100 and communicate corresponding messages through the mesh network.
  • the central server or cloud- computing system 164 logs the information for later use and/or instructs various smart devices in the home to perform certain operations, such as turn on and off lights, lock the smart doorknobs 122, sound alarms, notify public safety authorities and the home owner, etc. as the person enters and exits rooms.
  • the central server or cloud-computing system 164 can review the logged information about the occupants' movement in the home to detect signature patterns of movement unique to the various occupants. These signature patterns help the central server or cloud-computing system 164 detect strangers in the home. For example, if an individual is quickly moving from room-to-room at a time when occupants typically are not at home and according to a pattern that is not associated with any of the occupants, the central server or cloud-computing system 164 may infer that this individual is a burglar moving from room to room searching for valuable items.
  • some or all of the network-connected smart devices are equipped with WiFi, BLUETOOTH, NFC, and/or other wireless communication capability. Accordingly, in the event one or more burglars enter the home carrying on their person their mobile devices (e.g., smart phones), the network-enabled smart home devices, upon detecting the home-invasion condition, automatically "interrogate" a burglar's mobile device to try and extract as much useful information as possible about the burglar including, but not limited to, the MAC address of their phone, their cell number, and/or anything else that their mobile device will divulge about itself or the burglar.
  • WiFi Wireless Fidelity
  • an alarm message could be sent to the occupant's mobile device 166 and also to a security service (or police, etc.) containing some or all of this information.
  • the smart-home environment 100 and/or the security service that monitors the smart-home environment can automatically connect with a wireless telephone carrier to determine which mobile devices are currently communicating with the cell tower(s) nearest the burglarized home.
  • the wireless telephone carriers could automatically generate a "suspect list" that would necessarily include the burglar's mobile device.
  • the smart-home environment includes a small cellular base station, such as a picocell or microcell.
  • a small cellular base station such as a picocell or microcell.
  • Such cellular base stations provide great LTE, 3G, 4G, etc. data rates in the home and, in some cases, could replace or supplement WiFi.
  • This base station could provide a cellular backup to call emergency personnel such as fire/police in the event of an emergency.
  • the base station could capture all unique IDs (e.g., mac, imei, serial number) from the burglar's mobile device.
  • the network-connected smart devices are equipped with video cameras.
  • the network-connected smart devices can transmit video to the central serv er and cloud- computing system 164, which can make the video available to client devices, such as the user device 166, in the form of a live or prerecorded video stream.
  • client devices such as the user device 166
  • An occupant when away from the home, can use their user device 166 to connect to the central server and cloud-computing system 164 to receive live or prerecorded video of activity occurring in the home.
  • central server and cloud-computing system 164 automatically provides video from the network-connected smart device that is observing the most activity.
  • the central server and cloud-computing system 164 can detect which room is experiencing the most activity (e.g., based on noise and motion), and provide video from that room. It should also be appreciated that the central server and cloud-computing system 164 can provide for display on the user device 166 a grid of cameras in the home to choose from. In this case the central server and cloud-computing system 164 can highlight which camera is observing the most activity, so that the user knows that camera is likely the best one to select. It should also be appreciated that the network-connected smart devices have a microphone and speaker and that two-way voice communication can be established between the network- connected smart device and the user device 166. For example, the two-way voice
  • communication can be over internet protocol. This allows users to see and talk to home occupants when the user is away from home.
  • the network-connected smart devices can broadcast a live video stream to nearby emergency personnel such as police and fire departments.
  • emergency personnel such as police and fire departments.
  • live video can be broadcast to nearby emergency personnel, such as police, fire, medical, and other first responders.
  • the video for example, is transmitted from the room where the most activity is occurring or where the button was pressed. In some cases, the video is transmitted directly to the police car that is responding to the call (e.g., the closest police car).
  • the video may be provided via a secure stream using secure sockets layer (SSL).
  • SSL secure sockets layer
  • the security score of the home may be adjusted based on whether the home has the requisite SSL certificates in place to support the secure video stream to emergency personnel.
  • the network-connected smart devices function as "nanny cams".
  • the nearest network-connected smart device detects that a sleeping child has woken, it will turn on its camera and microphone/speaker.
  • the network-connected smart device will then send a message to the user device 166 of the parentliome occupant, who can accept the message to establish live video of the child and two-way audio communication. It should be appreciated that live two-way video
  • the network-connected smart device can project a video of the user, include a video screen for display of video of the parent, and/or control a nearby television or monitor to display video of the user.
  • the network-connected smart device can detect when the child goes back to sleep, and can automatically shut down the video and/or audio.
  • some or all of the network-connected devices are equipped with pressure sensors, such as digital air pressure sensors, digital barometric pressure sensors, etc.
  • pressure sensors may be, for example, resonant types that measure changes in air density, thermal types that measure changes in thermal conductivity of air, ionization types that measure changes in the flow of ions in air, and/or force collector types (e.g., bellow, diaphragm, piston, etc.) that measure deflection.
  • force collector types e.g., bellow, diaphragm, piston, etc.
  • One example security- related application for these pressure sensors to detect opening and closing of doors as well as occupant movement in the house by sensing pressure variation patterns associated with such activities. For example, when a door opens or closes, the pressure sensors of the network-connected smart devices would record the associated pressure variation.
  • the central server and cloud-computing system 164 upon reviewing the recorded pressure variation, can determine the activity associated with the pressure variation. For example, pressure variation in a first range may indicate that an adult occupant walked through a doorway while transitioning from one room to another, while pressure in a second range may indicate that a particular door, internal or external, opened or closed.
  • the smart-home environment 100 learns over time what activity corresponds with particular pressure variations detected by particular network- connected smart devices in the home.
  • a smart hazard detector 104 located in a foyer near the front door of a home can learn that it is located near an external door.
  • the smart hazard detector 104 can ask the installing user to indicate the room (e.g., kitchen, den, foyer, hallway, etc.) in which it is being installed and whether it is proximate to an external door. Later, when it senses a pressure variation, a message can be sent to an occupant's user device 166 asking, "Was the external door near the foyer just opened?
  • the smart hazard detector 104 After the smart hazard detector 104 "learns" which pressure differentials are associated with which activities, it can contribute to home security. For example, the smart-home environment 100 automatically goes into security mode when it determines that all occupants are in bed for the night or that all occupants are away from the home. When in this security mode, if the smart hazard detector 104 in the foyer senses a pressure differential that indicates the external door has just been opened, it triggers the alarm.
  • the occupants of the home can pre-program the smart- home environment 100 to broadcast specific alarms in response to specific detected conditions.
  • the smart-home environment 100 can broadcast via the network-connected smart devices and/or the home appliances, such as television and stereos, a pre-recorded message from the occupant notifying the occupants of a possible fire and providing emergency exit instructions.
  • the smart-home environment 100 can broadcast a message to the intruders, notifying them that their presence has been detected, that the occupants possess and are trained to use firearms to protect their home, that the police have been notified, etc.
  • the thresholds for triggering these alarms can be varied based on activities occurring in the home. More particularly, technologies including the sensors of the network-enabled smart devices in combination with rules-based inference engines or artificial intelligence provided by the central server and cloud-computer system 164 are used to vary alarm thresholds based on the occupants' activities. Inferences about the occupants' activities can be learned based on data received over time. For example, if the smart hazard detector 104 located in the kitchen observes increased temperature, humidity, and motion in the kitchen, then an inference can be made that one or more of the occupants are cooking ("cooking inference"). These data inputs can be considered on a sliding scale based on time of day and day of week.
  • the smoke-alarm threshold is varied when the cooking inference is made. For example, the smart hazard detector 104 in the kitchen becomes less sensitive when one of the occupants is cooking, whereas the hazard detectors 104 in other rooms remain in normal operation.
  • alarm thr esholds are varied based on human population in the home. Inferences about human population in the home can be made based on sensed changes in motion, temperature, CO, noise, air pressure differentials, frequency of door openings and closings, etc. According to one example, in the event of detecting a concurrent increase in temperature, motion, noise, and CO, an inference can be made than there is a higher than normal human population in the home ("high population inference"). Certain alarm thresholds may be adjusted when a high population inference is made. For example, the alarm threshold for CO can be increased to account for the high number of CO-emitting humans in the home and to avoid triggering a false CO alarm.
  • the security system can be disarmed so that guests can freely transition from room to room and in and out of external doors without triggering the alarm.
  • the alarm threshold for smoke detection can be decreased so that the smoke detectors are more sensitive than usual. This is to protect the large number of people in the home from fire.
  • the network-connected thermostat may adjust the temperature of the home to a standard temperature that is comfortable for most people. For example, if the occupants like the house to be cool and "teach" the network-connected tliermostat to maintain the home at a cooler temperature, then, in the event of a high-occupancy inference, the network- connected thermostat can adjust up to a temperature that is comfortable for most people.
  • the network-connected thermostat can adjust down to a temperature that is comfortable for most people.
  • alarm thresholds can be varied based on proximity of law enforcement and other emergency personnel. For example, if a law enforcement office is nearby the threshold for the home invasion alarm condition can be increased. This may be applicable in apartments of buildings that have private security, including a doorman.
  • an "occupancy emulator” can be provided to emulate the occupants of a smart-home environment 100 when the occupants are away, such as on vacation.
  • the smart wall switches 108 and/or the smart wall plugs 110 can function as an "occupancy emulator” by learning the occupants' patterns of turning on and off lights, appliances, etc. and mimicking those patterns when the occupants are away.
  • the central server or cloud-computing system 164 processes artificial intelligence algorithms capable of making rules-based or learning-based inferences based on sensed patterns of user control of network-connected smart devices, optionally in conjunction with sensed home conditions or other sensed user behaviors.
  • one or more of the smart wall switches 108 is configured to process information acquired by home occupancy sensing devices in conjunction with information from light-switch-control behaviors of the user to produce a result in which the smart wall switches 108 are automatically self-programmed to help the user rum off and on lights according to a preferred schedule, and to mimic the user's patterns when the user is away.
  • This automatic self-programming can also be applied to smart wall plugs 110, which can learn when to turn on and off lamps 118 as well as appliances such as televisions and stereos. Further, it should be appreciated that all network-connected smart devices can automatically self-program.
  • the artificial intelligence algorithms can be configured to sense whether there have been a threshold number of days over the past month (or other evaluation period) for which, at roughly the same time of day ("X o'clock"), the user has turned on or off the same or roughly the same set of smart wall switches 108 and/or smart wall plugs 110 to turn on or off the same or roughly the same lights and/or appliances in the home. If such a pattern has been detected, the user can be sent a message on their smartphone 166 allowing them to opt-in to a setting in which one or more the relevant smart wall switches 108 and/or smart wall plugs 110 will be automatically turned on or off so as to turn on or off the relevant lights and/or appliances at about X-o'clock.
  • the smart-home environment could learn and emulate other patterns. For example, it could learn when the dog barks, such as when a person is within 100 feet of the home or when an occupant returns home from work at about X o'clock, and then record and play back barking sounds at appropriate times. It should also learn when to open and close the garage door to give the appearance that the occupant is going and coming to and from the home.
  • the opt-in message can say, "When you are not at home, I can emulate your presence by automatically turning on the lights and television in the den at about X o'clock on weekdays for about two hours, and at about Y o'clock on weekends for about three hours. It might better secure your home by deterring home invasions! would you like me to do this for you? '[YES/NO]'".
  • the user can then opt in to this functionality and/or modify the schedule and opt in to the modified schedule. If the user's schedule changes, the artificial intelligence algorithms can learn the new schedule and make the proper adjustments.
  • the collection of smart- home sensors is configured to automatically learn selected user behaviors, to emulate the user's patterns when the user is away, and to automatically learn changes in the user's schedule and make corresponding adjustments.
  • security of the smart-home environment can be further enhanced by predicting through inferences when the user intends to leave the home and raising away preparedness measures.
  • artificial intelligence algorithms are capable of making rules-based or learning-based inferences about when the user intends to leave the home based on sensed patterns of user control of smart-home devices, optionally in conjunction with sensed home conditions or other sensed user behaviors.
  • one or more of the light switches is configured to process information acquired by home occupancy sensing devices in conjunction with information from light switch control behaviors of the user to predict when the user intends to leave the home.
  • the artificial intelligence algorithms can be configured to sense whether there have been a threshold number of weekdays over the past month (or other evaluation period) for which, at roughly the same time of day ("X o'clock"), (i) the user has turned off a same or roughly same set of active light switches in the home, including the front door light switch, over a five-minute period (or other pre- departure period), and (ii) this event was followed by an extended period of non-occupancy, such as at least one hour of non-occupancy.
  • X o'clock time of day
  • the user can be sent a message on their smartphone allowing them to opt-in to a setting in which, if the light switch near the front door is turned off at about X-o'clock on a weekday, the set of active light switches will be automatically turned off as well.
  • the opt-in message can say, "If you turn off the light switch near the front door at about X o'clock on weekdays, I can automatically turn off the rest of the lights for you that you have been turning off manually at about that time. It might save you a few steps! would you like me to do this for you? '[YES/NO]'" The user can then opt in to this functionality.
  • the artificial intelligence algorithms can readily 'unlearn' it by virtue of detecting a 'punishing' or 'undo' action by the user in which, the next time the user turns off the front door light switch, they simply walk to one of the automatically-tumed-on light switches and turn it off within five minutes (or other undo interval).
  • the collection of smart-home sensors is configured to automatically leam selected user behaviors, to assist the user with certain tasks when selected qualifying behaviors are observed, and to automatically stop providing such assistance when one or more straightforward undo actions are taken by the user.
  • the central server and cloud-computing system 164 makes an inference that the user intends to leave the home soon. Responsive to this inference, the sensitivity of the network-connected smart devices can be increased in anticipation of the user's imminent departure from the home. For example, the threshold for triggering an alarm indicating a home invasion can be reduced. It should be appreciated that the pattern of turning off lights is merely an example, and that other patterns exist on which imminent-departure inferences can be made.
  • the smart alarm clock is capable of monitoring weather and traffic data, and adjust the user's wakeup time to account for delays that could be caused by bad traffic and weather.
  • user-occupants can communicate with the central server or cloud-computing system 164 via their mobile devices 166 to access an interface for the smart alarm clock. There, occupants can turn on their "smart alarm clock” and input a wake time for the next day and/or for additional days.
  • the occupant may have the option of setting a specific wake time for each day of the week, as well as the option of setting some or all of the inputted wake times to "repeat”. Artificial intelligence will be used to consider the occupant's response to these alarms when they go off and make inferences about the user's preferred sleep patterns over time.
  • the occupant may have the option of setting a specific time at which the user would like to arrive at a particular destination. The user may input information about the destination and its location, such as its address. Artificial intelligence will be used to determine how long it typically takes the occupant to wake up and get ready to leave the home. This information will be considered in combination with traffic on the route to the occupant's specified destination and weather conditions to determine what time to wake the occupant so that the occupant will arrive at the destination at the specified time.
  • the network-connected smart device in the smart-home environment 100 that happens to be closest to the occupant when the occupant falls asleep will be the device that transmits messages regarding when the occupant stopped moving, from which the central server or cloud-computing system 164 will make inferences about where and when the occupant prefers to sleep.
  • This closest network-connected smart device will be the device that sounds the alarm to wake the occupant in time to arrive at the specified destination, accounting for traffic and weather conditions and how long it typically takes the occupant to get ready in the mornings.
  • the "smart alarm clock” will follow the occupant throughout the house, by tracking the individual occupants based on their "unique signature", which is determined based on data obtained from sensors located in the smart devices.
  • the sensors include ultrasonic sensors, passive IR sensors, and the like.
  • the unique signature is based on a combination of walking gate, patterns of movement, voice, height, size, etc. It should be appreciated that facial recognition may also be used.
  • the smart alarm clock in the event of bad weather, such as rain, snow, sleet, ice, etc., can communicate via the central server and/or could computing system 164 with the occupants automobile and tliereby instruct the automobile to automatically shift into all- wheel drive when the user starts up the automobile to drive to the destination. It should also be appreciated that, in cold, winter conditions, the smart-home environment can instruct the automobile to "warm up” and defrost while the occupant is getting ready for work or to leave the home.
  • the wake times associated with the "smart alarm clock” are used by the smart thermostat 102 to control the HVAC in an efficient manner so as to pre-heat or cool the house to the occupant's desired "sleeping" and "awake” temperature settings.
  • the preferred settings can be learned over time, such as be observing which temperature the occupant sets the thermostat to before going to sleep and which temperature the occupant sets the thermostat to upon waking up.
  • a device is positioned proximate to the occupant's bed, such as on an adjacent nightstand, and collects data as the occupant sleeps using noise sensors, motion sensors (e.g., ultrasonic, IR, and optical), etc.
  • Data may be obtained by the other smart devices in the room as well.
  • Such data may include the occupant's breathing patterns, heart rate, movement, etc. Inferences are made based on this data in combination with data that indicates when the occupant actually wakes up. For example, if - on a regular basis - the occupant's heart rate, breathing, and moving all increase by 5% to 10%, twenty to thirty minutes before the occupant wakes up each morning, then predictions can be made regarding when the occupant is going to wake.
  • Other devices in the home can use these predictions to provide other smart-home objectives, such as adjusting the smart thermostat 102 so as to pre-heat or cool the home to the occupant's desired setting before the occupant wakes up. Further, these predictions can be used to set the "smart alarm clock" for the occupant, to turn on lights, etc.
  • technologies including the sensors of the smart devices location through the smart-home environment in combination with rules-based inference engines or artificial intelligence provided at the central server or cloud-computing system 164 are used to detector or monitor the progress of Alzheimer's Disease.
  • the unique signatures of the occupants are used to track the individual occupants' movement throughout the smart-home environment 100. This data can be aggregated and analyzed to identify patterns indicative of Alzheimer's.
  • individuals with Alzheimer's have distinctive patterns of migration in their homes. For example, a person will walk to the kitchen and stand there for a while, then to the living room and stand there for a while, and then back to the kitchen. This pattern will take about thirty minutes, and then the person will repeat the pattern.
  • the remote servers or cloud computing architectures 164 analyze the person's migration data collected by the mesh network of the smart-home environment to identify such patterns.
  • mapping the smart-home environment 100 provides a number of advantages. For example, informed by a map of the smart-home environment 100, the central server and cloud-computing system 164 can determine a distressed occupant's or an intruder's location in the home and notify emergency personnel regard the same. This enables emergency personnel to quickly find distressed people or intruders upon entering the home. In other examples, the central server and cloud-computer system 164 determines an emergency exit route for each room of the home.
  • the central server or cloud-computing system 164 uses occupancy information obtained from the network- connected smart devices in the home to determine which rooms are occupied and then turns on lights (e.g., nightlights 170, wall switches 108, wall plugs 110 that power lamps, etc.) along exit routes from the occupied rooms so as to provide emergency exit lighting.
  • lights e.g., nightlights 170, wall switches 108, wall plugs 110 that power lamps, etc.
  • mapping of the home can be done automatically.
  • a map may be generated based on positional information obtained from the nodes of the mesh network (e.g., positional information from the network-comiected smart devices is used to construct a map of the house).
  • the individual network- smart devices obtain or determine their location upon being installed or at some oilier time, and send the location information to the central server or cloud computing system 164 or to a mapping application on the mobile device 166 of a user.
  • a network-connected smart device when installed, can ask the user (by 2D LCD display, 2D/3D holographic projection, voice interaction, etc.) a few simple questions such as, "Where am I” and the user can select “bedroom” or “living room” and so forth.
  • a smart device can provide the user with insttuctions, such as "Press button once if I am in the kitchen, press twice if I am in the den, etc .”
  • the smart devices may be capable of determining their GPS coordinates and/or transmitting WiFi location or cellphone tower location information.
  • the central server or cloud computing system 164 or the mapping application on the mobile device 166 uses this information to automatically construct a map of the home.
  • a robot 168 (discussed below in detail) 'roams' free in the house and sends mapping information to the application on the mobile device 166 or to the central server or cloud-computing system 164, which uses the mapping information to construct a map of the home.
  • the robot 168 could be put into a 'mapping' mode where it obtains location data as it moves along the walls of each room in the house, and then sends the location data to the application on the mobile device 166 or to the central server or cloud-computing system 164, which uses the mapping information to constaict a map of the home.
  • an indoor positioning system could be used to map the smart-home environment 100.
  • a user could launch a mapping application on the mobile device 166 that uses IPS to create a map of the home.
  • the user would walk along the walls of the home and the mobile device would collect location information using IPS and/or other indoor localization techniques, and use that information to construct a map of the home or send the collected information to the central server or could-computer system 164, which creates the map.
  • the application on the mobile device 166 could use the mobile device's gyroscope,
  • magnetometer magnetometer, accelerometer, and altimeter to obtain location information.
  • RFID tags are used to map the smart-home environment 100.
  • RFID tags are placed throughout the home.
  • the user could scan the tag using the mobile device 166, which would launch an application, instructing the user to input location information.
  • the mobile device could determine its own location (e.g., using any techniques known to those having skill in the art, such as GPS, at the time of the scan) and associate that location information with the tag.
  • a map of the smart- home environment 100 is sent to emergency responders.
  • the central server and cloud- computing services 164 sends a map (e.g., a map created as described above) of the smart- home environment 100, along with an indication of where on the map the emergency event is occurring.
  • This map can be displayed in the vehicles or on mobile devices of emergency responders, so that they can review the map in advance of entering the home. This will enable them to quickly find the appropriate location upon entering the home.
  • smart-home environments can be grouped into
  • neighborhood security networks and information can be shared among smart-home environments in the same “neighborhood.” For example, in the event one smart-home environment experiences a fire, an intrusion, a missing child, a medical emergency or some other type of emergency or notable event, notification is sent to other smart-home environments in the same neighborhood.
  • neighborhood security networks enable smart-home environments to communicate with one another in real time, or near real time, about emergencies and other important events happening in the neighborhood.
  • This real time communication enables network-connected smart devices in non-affected smart-home environments to make appropriate security- and safety-related responses that minimize or eliminate impact from the emergency event, such as lock the smart doorknob 122, arming security systems, turning on outdoor and indoor lights to deter home invasion, sounding alarms to wake up and warn sleeping occupants of a nearby fire, etc .
  • these responses can even resolve or help resolve emergency events, such as by using identification technology to locate a missing child or turning on outdoor lighting so that law enforcement can locate and apprehend fleeing criminals.
  • the central server or cloud-computing architecture 164 automatically creates the "neighborhoods" based on a combination of "neighborhood criteria information", such as geographic location of the homes, demographic information about occupants of the homes, and "opt-in" information about which types of alerts the homes wish to receive.
  • Geographic location information may include home address, ZIP code, GPS coordinates, WiFi location information, cellular tower location information etc.
  • Demographic information about the occupants may include age, gender, health, special needs, etc.
  • Opt-in information may include fire alerts, home invasion alerts, missing children alerts, missing pets alerts, missing property alerts, earthquake alerts, etc.
  • the network-connected smart devices of smart-home may include fire alerts, home invasion alerts, missing children alerts, missing pets alerts, missing property alerts, earthquake alerts, etc.
  • the network-connected smart devices of smart-home may include fire alerts, home invasion alerts, missing children alerts, missing pets alerts, missing property alerts, earthquake alerts, etc.
  • environments 100 provide the "neighborhood criteria information" to the central server or cloud-computing architecture 164 upon registration and/or during ongoing use, and the central server or cloud-computing architecture 164 logs and stores the neighborhood criteria information as the home data 202, the derived home data 208, and/or other data.
  • the central server or cloud-computer architecture 164 correlates network-connected smart devices using the geographic location information and therefore creates the "neighborhoods" based on geo-proximity, such that homes in close proximity to one another are grouped into the same neighborhood. It is possible that each smart-home environment has its own neighborhood that includes other homes within a predefined radius. This way, each home is in the middle of its neighborhood and benefits from being surrounded by neighbors, rather than being on the edge of a neighborhood. The geographic reach of the neighborhood may vary based on the type of event or emergency in question.
  • the central server or cloud- computer architecture 164 creates a neighborhood that includes all homes within a one-mile radius, whereas if a child goes missing then the neighborhood can include all homes within a ten-mile radius or all homes in a particular ZIP code, city, county, etc.
  • the central server or cloud-computer architecture 164 creates neighborhoods based on demographic information. For example, in the event a teenage child of one smart-home environment is out past his or her curfew, the created neighborhood consists of nearby homes where teenagers are members of the household. This way, notice that the teenager is out past his or her curfew is sent to the homes of the neighborhood, and the teenager can be located if he or she is out visiting another teenager whose home is in the same "neighborhood". In another example, in the event an occupant of a particular home contracts the flu or some other communicable illness, the created neighborhood consists of nearby homes where small children or elderly adults live. In this example, a notice is sent to the other homes in the neighborhood so that precautionary measure can be taken to help prevent the young children and elderly adults from contracting the illness.
  • the central server or cloud-computing architecture 164 automatically identifies smart homes within a radius of the home experiencing the emergency or event and sends an alarm to the identified homes.
  • the other homes in the "neighborhood" do not have to sign up for or register to be a part of a safety network, but instead are notified of emergency or event based on their proximity to the location of the emergency or event.
  • the "neighborhood security networks” can be "opt-in” services and that, in addition to or instead of the central server or cloud-computing architecture 164 selecting which homes to send alerts to, individuals can subscribe to participate in such networks and individuals can specify which homes they want to receive alerts from and the types of alerts to be received. This can include, for example, the homes of family members who live in different cities, such that individuals can receive alerts when their loved ones in other locations are experiencing an emergency or other types of events. In some examples, homes having children can subscribe or "opt in” to be a part of a "neighborhood” that sends alerts when children are missing or out past curfew. Further, homes having elderly people can subscribe or “opt in” to be a part of a "neighborhood” that sends alerts regarding their elderly peers and attempt to form a community that looks out for the security, safety, and health of its members.
  • an opt-in message is sent to the home owner, such as via the home owner's mobile device 166.
  • the home owner is provided with information about the other homes in the "neighborhood", the basis on which the neighborhood security network was formed (e.g., geographic location, family relationships, demographic information, etc.), the types of information that will be shared with other homes in the neighborhood security network (e.g., occupants away on vacation, potential invasion, missing child, etc.).
  • notification of an emergency or event occurring in one home can trigger responses in other homes in the "neighborhood".
  • the central server or cloud-computing architecture 164 instructs the network-connected smart devices of the other smart-home environments 100 in the neighborhood to turn on outside lights, to lock the smart doorknob 122 and window latches, to arm the security system, etc.
  • the central server or cloud-computing architecture 164 can increase the sensitivity of the smoke-detecting components of other smart hazard detectors 104 in the neighborhood.
  • the neighborhood may include all units in the same apartment or condominium building.
  • the network-connected smart devices of other homes in the neighborhood can be tuned to detect motions that indicate a dog.
  • a dog is detected by an outdoor network-connected smart device that does not typically detect dogs, then a message can be sent to the home of the missing dog indicating that a stray dog was detected and providing the location of the detection.
  • a RFID tag may be provided on the dog's collar, and the network-connected smart device of the other homes in the neighborhood may locate the dog by "reading" the RFID tag and give the location of the dog upon request.
  • RFID tags may be placed on other property, too, such as bicycles such that other property may be located in a similar manner.
  • individuals may manually broadcast messages to other homes in the "neighborhood". For example, when a family is leaving for vacation, they can cause the central server and cloud-computing system 164 to send a notification to a network of trusted neighbors. This network can be manually defined or inferred.
  • the central server or cloud-computing system 164 may obtain and store identifying information, such as facial recognition data, for the occupants of the smart-home environments 100.
  • identifying information such as facial recognition data
  • the smart doorbell 106 via the processing capabilities of the central server or cloud-computing system 164, is able to recognize the approaching individual and announce his presence. For example, the approaching individual's name and/or status as being a neighbor may be announced, a video of him approaching may be displayed, and/or his image (such as a photograph taken from his social networking account) may be displayed inside the smart-home environment 100.
  • FIG. 11 provides an example process 1 100 for creating neighborhood security networks ("neighborhoods”) and sending security-related notifications to homes in the created neighborhoods, according to at least one embodiment.
  • the process 1100 generally begins when the central server and cloud-computing system 164 obtains geographic location data for a plurality of smart-home environments. In one example, the geographic location data is obtained from the home data 202.
  • the central serv er and cloud-computing system 164 assigns the smart-home environments into neighborhood security networks based at least in part on the geographic locations of the homes. For example, homes in close proximity are grouped into the same "neighborhood".
  • the central server and cloud-computing system 164 monitors for security-related conditions. For example, the central server and cloud-computing system 164 analyzes data received from the network- connected smart devices of a plurality of smart-home environments 100. For example, the security services 205 applies security-related algorithms, logic, and artificial intelligence to review data received from network-connected smart devices to detect security related events, such as home invasions. At 1114, the central server and cloud-computing system 164 detects a security-related condition in one of the smart-home environments.
  • the central server and cloud-computing system 164 may receive data from an entry detector 1 12 of a smart home environment 100 that a window 182 has been opened while the occupants are asleep and the home's security system is armed. At 1116, the central server and cloud- computing system 164 sends a security-condition notice to network-connected smart devices in other homes in the same neighborhood. For example, if the central server and cloud- computing system 164 infers that the opened window 182 indicates that a home invasion is occurring, it sends a home- invasion alarm to the other houses in the neighborhood.
  • the central server and cloud-processing system 164 adjusts one or more alarm conditions in the other homes in the neighborhood and/or invokes precautionary responses in the other homes in the neighborhood. For example, the alarm conditions are adjusted to increase sensitivity for detecting conditions related to the security notification.
  • the security notification relates to a home invasion in one home in the neighborhood
  • the central server and cloud-computing system 164 increases the sensitivity of the smart entry detectors 1 12, turns on the lighting systems 114, and locks the smart doorknobs 122 of other houses in the neighborhood.
  • FIG. 12 provides another example process 1200 for creating neighborhood security networks ("neighborhoods”) and sending security-related notifications to homes in the created neighborhoods, according to at least one embodiment.
  • the process 1200 generally begins by detecting a security event in a smart-home environment 100.
  • the central server and cloud-computing system 164 could detect a home invasion or fire or that a teenager is out past curfew.
  • the central server and cloud-computing system 164 may receive notice of a security event (rather than detect) in one of the homes. An example could be receiving notice that a child has gone missing.
  • the process 1200 involves creating a neighborhood security network consisting of homes that would benefit from receiving notification of the security event.
  • an appropriate radius for the neighborhood is determined based on the detected security event. For example, in the event of a fire, the radius of the neighborhood can be fairly small, such as one mile or less. In this case, homes within a one- mile radius of the fire will be notified. Homes farther than one mile from the fire are not at risk and therefore do not need to be notified. However, in the case of a missing child, the radius of the neighborhood can be much larger. This increases the likelihood that the child will be located.
  • opt-in information is considered. As mentioned above, individual homes can opt- in to receive security-condition notifications. Thus, at 1210, the central server and cloud- computing system 164 determines which homes have opted to receive the particular notice.
  • the central server and cloud-computing system 164 will identify other homes where teenagers live. In other example, if the notice related to a contractible illness that is dangerous for young children and elderly adults, then the central server and cloud-computing system 164 will identify homes where young children and elderly adults live.
  • homes are assigned to the neighborhood. For example, at 1220, the central server and cloud-computing system 164 identifies the homes that are within the radius, have opted-in to receive the relevant type of notification, and have occupants who would benefit from receiving the notification.
  • the process 1200 involves sending the notification to the homes that were assigned to the neighborhood.
  • a security score may be calculated for a smart-home environment.
  • a security score for a home is calculated by comparing the security features of the home against a list of security criterions to determine how many of the security criterions are satisfied. Higher scores indicate that a home satisfies a high number of security criterions and is therefore relatively secure, whereas lower scores indicate that the home fails to satisfy many of the criterions.
  • security scores can be normalized and scaled so that occupants of a home can compare the security of their home to other homes. For example, a score of 0 to 100 can be used, where 0 is the lowest possible score and 100 is the highest possible score.
  • the central server or cloud-computing system 164 may generate a report or log that lists the security criterions and provides an indication of whether the home satisfies each of the criterions. Occupants can review this list to determine which criterions are not satisfied and then make the appropriate improvements to the home so as to increase the home's security score.
  • the central server or cloud-computing system 164 can use this log to generate a list of suggestions for improving the home. It can prioritize the list based on which criterions are associated with the most points, indicate which creation can be easily and cheaply satisfied with only minor improvement, and indicate which unsatisfied criterions are typically satisfied in other homes.
  • the central server or cloud-computing system 164 can send the following message to an occupant's electronic device 166: "We notice that you often leave the front door unlocked. Most homes in your neighborhood keep the front door locked at all times. Locking your front door at night is an easy and inexpensive way to improve your home's security and to improve your security score.”
  • Example security criterions for assessing the security of and calculating a security score are discussed below. However, it should be appreciated that any number and combination of security criterions can be used when assessing security and calculating a security score for a home.
  • One example security criterion is whether the home has a requisite number of network-connected smart devices, such as smart hazard detectors 104, smart entry detectors 112, etc.
  • the requisite number can be determined based on the size of the home, the number of bedrooms in the home, the configuration of the home (single stoiy, two-story), the number of occupants living in the home, the laws, rules, and regulations of the jurisdiction(s) where the home is located, etc. In some cases, this information can be automatically obtained from public real estate databases.
  • the central server and/or cloud-computing services 164 can access a public real estate database(s) to obtain the size, location, configuration, number of bedrooms/bathrooms, etc.
  • the central server and/or cloud-computing services 164 can also access the home data 202 to determine how many network-connected smart devices are located in the home, and compare that number to the requisite number to determine whether the criterion is satisfied.
  • Another example security criterion is whether the v arious types of network- connected smart devices are properly located in the home.
  • the central server and/or cloud-computing services 164 can determine whether a smart-entry detector 1 12 is located at each window 182 and external door 186, whether a smart hazard detector 104 with smoke and motion detecting capabilities is located in all of the appropriate locations, such as one in the kitchen and at least one on each floor of the home, whether the doorbell of the home is a smart doorbell 106 with the security capabilities described herein, whether the wall switches are smart wall switches 108, whether the wall plugs are smart wall plugs 110, etc.
  • the central server and/or cloud-computing services 164 can make these determinations by reviewing the home data 202 to obtain information about the location and capabilities of the various network-connected smart devices in the home and comparing that information against a map of the home.
  • the map can be generated according to the example techniques described herein.
  • a security criterion is whether the house has been "mapped". As discussed elsewhere herein, maps of the homes can be created and stored in the home data 202. Mapping improves security not only because it enables the central server and/or cloud- computing services 164 to determine whether the home has an adequate number of appropriate located network-connected smart devices, but it also enables the central server and/or cloud-computing services 164 to pinpoint within the home where a security event is taking place and to provide that information for emergency responders.
  • Another example security criterion is the average amount of time it takes first responders to get to the home after an alarm has been triggered. This information can be averaged based on data from nearby homes. If the response time is fast, then the security score of the home is increased.
  • Other example security criteria may be related to the capabilities and configurations of the respective network-connected smart devices in the home.
  • the central server and/or cloud-computing services 164 can access and review the home data 202 to determine whether the network-connected smart devices are wired (rather than battery operated), whether the batteries are sufficiently charged, whether they are WiFi enabled and connected to a strong and reliable WiFi network, whether the CO date codes of the smart hazard detectors 104 are up-to-date, whether there is cellular backup in the event WiFi goes down, etc.
  • Another example, criterion is whether the hub spokesman node in the home is wired (rather than battery operated).
  • the central server and/or cloud-computing services 164 can review the security logs for the house provided in the home data to assess whether the occupants are keeping the home secure. For example, one security criterion that can be considered during this review is whether a door or window was left unlocked overnight. Another example, criterion is the number of strangers that visit the house on a regular basis. This can be determined, per the discussion above, by detecting strangers based on the number of unregistered mobile device 166 and/or occupants in the home. The more strangers that visit, the less secure the home and the lower the security score.
  • the central server and/or cloud-computing services 164 can make this determination is by reviewing the number of unrecognized mac addresses that contact the router of the home's WiFi network.
  • the mac addresses of the neighbors' mobile devices can be factored out over time. For example, if the same mac address is seen on a regular basis, then it can be assumed that that device is associated with a neighbor and will not be used to lower the security score of the home.
  • Other example security criteria involve how readily the occupants, or non-resident individuals who are in a position to confirm whether an alarm condition is false, can be contacted in the event of an alarm condition.
  • the central server and/or cloud-computing services 164 considers whether the occupants of the home have verified their contact information. For example, this may include determining whether and which of the occupants have provided their emergency contact information (e.g., mobile telephone number) to the central server and/or cloud-computing services 164.
  • the security score increases if the occupants have verified their contact information because, in the event of an alarm condition, the occupants can be contacted to verify whether the alarm is false and if not they can help resolve or otherwise address the emergency.
  • the security score increases even more if every occupant of the home verifies their contact information.
  • Another example security criterion is the quality of "coverage" in the home.
  • the central server and/or cloud-computing services 164 determines whether the home has a comprehensive mesh network of nodes that are capable of sensing conditions at all locations within the home and communicating data regarding the sensed conditions through the mesh network and to the central server and/or cloud-computing services 164.
  • the central server and/or cloud-computing services 164 tracks an occupant's movement through the home to identify "black spots", which are areas in the home where the central server and/or cloud-computing services 164 was unable to detect the occupant.
  • the security score can be adjusted based on the extent of the black spots in the home.
  • FIG. 13 provides an example process 1300 for calculating and reporting a security score for a smart-home environment, according to at least one embodiment.
  • the process 1300 generally begins by obtaining security criterions.
  • the central server and/or cloud-computing service 164 obtains a list of security criterions from a database.
  • the list of security criterions may include all or some of the example criterions discussed above.
  • security criterions are used to assess the security of the home. For example, when a home satisfies a high number of applicable security' criterions that home has a correspondingly high security' score, and there is a higher probability that the home is indeed secure.
  • the process 1300 involves obtaining security data from the home.
  • the central server and/or cloud-computing service 164 obtain sensor data and other data from and related to the network-connected smart devices of the home. Such data may be included in the home data 202.
  • the process 1300 involves comparing the security data of the home against the obtained security criterions to determine which of the security criterions are satisfied.
  • the central server and/or cloud-computing service 164 processes the obtained home data against the list of security criterions to determine which of the security criterions are satisfied.
  • the security score is calculated. To do so, for example, the central server and/or cloud-computing service 164 determines a security score for the home based on the number of security criterion that were satisfied. The higher the number of satisfied criterion, the higher the security score.
  • a security log is generated.
  • the central server and/or cloud-computing service 164 generates a log that lists each of the security criterions and corresponding indications of whether the respective criterions were satisfied.
  • This log can be outputted, for example, by sending the log to the electronic devices 166 of the occupants.
  • the log includes a written description for each of the security criterions so that occupants can review the descriptions of the unsatisfied criterions to determine what they can do to improve the security of their home.
  • the corresponding indications of whether the respective criterions are satisfied are binary indicators, whereas in other examples the corresponding indications are values indicative of a degree of compliance.
  • the security criterions can include a "proper sensor location” criterion, a “low sensor battery” criterion, a “low WiFi signal” criterion, a "door open” criterion, a “door closed” criterion, a “door locked” criterion, a “window open” criterion, and a “window locked” criterion.
  • "pre-alarm condition trend detection and notification” services are provided to warn users of potential dangerous conditions. More particularly, technologies including the sensors of the network-enabled smart devices in combination with rules-based inference engines or artificial intelligence provided by the central server and cloud-computer system 164 are used to make inferences about potential security conditions in the home. This may occur in situations where the sensor data is not “strong” enough to support an actual alarm condition, but it is enough to cause an inference that potentially dangerous activity may be occurring in the home and that it is worth investigating whether such activity is indeed occurring.
  • the central server or cloud-computing system 164 can review the logged information about occupants' movement in the home to detect signature patterns of movement unique to the individual occupants of the home. These signature patterns help the central server or cloud-computing system 164 detect strangers in the home. For example, if an individual is quickly moving from room to room at a time when occupants typically are not at home and in a pattern that is not a signature pattern of any of the occupants, the central server or cloud-computing system 164 may infer that this individual is potentially a robber moving from room to room searching for valuable items. W'hile this inference may not rise to the level of a home-invasion alarm condition, it may be worth investigating.
  • the central server or cloud-computing system 164 sends a "pre- alarm" alert message to the registered occupants' mobile device 166, informing the occupants of the detected pattern that there may be suspicious activity occurring in the home.
  • the message may include an indication of where in the house suspicious activity is occurring.
  • the message may also request that the occupant verify that this is a false alert or that an actual home-invasion-condition exists.
  • the smart doorbell 106 may observe the same car parked on a street out front of the smart-home environment 100 over the course of several days.
  • the smart doorbell 106 in combination with rules-based inference engines or artificial intelligence provided by the central server and cloud-computer system 164, may infer that the comings and goings of the car are consistent with burglars "casing" the home.
  • the central server and cloud-computer system 164 may send a "pre-alarm" message to the occupants' mobile devices 166 and/or to local law enforcement, alerting them to the potential casing and including a description of the car.
  • the pre-alarm condition trend detection and notification can be applied to detect evaluated levels of potentially dangerous substances (e.g., CO, smoke, etc.) in the smart-home environment 100.
  • an alarm condition may be established based at least in part on a predetermined amount of a substance in an environment.
  • the alarm condition may be stored locally by a smart hazard detector or remotely by the central server and cloud-computer system 164. For example, once the concentration level of CO in the air reaches a certain level, an alarm condition will be triggered.
  • a "pre-alarm condition" is established based at least in part on a predetermined trend in the amount of the substance in the environment.
  • the pre-determined trend can be at least a twenty-percent increase in the amount of the substance over at least a two-week period.
  • the central server and cloud-computer system 164, the smart hazard detector and/or other smart home devices receives sensor data indicating the amount of the substance in the environment and analyzes the sensor data to detect the presence of either the alarm or pre- alarm condition. Responsive to detecting the pre-alarm condition but not the alarm condition, the central server and cloud-computer system 164, the smart hazard detector and/or other smart home devices provides a notification of the pre-alarm condition.
  • the central server and cloud-computer system 164 may send a message to the mobile device 166 of the occupant stating, "The CO level in your home has increased twenty-percent in the last two weeks. You might consider having an expert inspect your home to determine the cause.” Also for example, the smart hazard detector and/or other devices in the home may make a similar audible announcement or display a similar written message.
  • the pre-alarm message may be sent to a repair contractor or a public safety agency, so that they can respond directly.
  • the repair contractor may call the owner to notify the owner of the problem and prepare a plan to repair the problem.
  • the pre-alarm message giving notification of the pre-alarm condition is sent to a centralized bidding system that solicits bids from repair contractors and selects one of the repair contractors to resolve the problem.
  • sound, vibration, and/or motion sensing components of the smart devices are used to detect sound, vibration, and/or motion created by running water.
  • the central server or cloud-computing architecture 164 makes inferences about water usage in the home and provides related services.
  • the central server or cloud-computing architecture 164 can run programs/algorithms that recognize what water sounds like and when it is running in the home.
  • the central server or cloud-computing architecture 164 to map the various water sources of the home, upon detecting running water, the central server or cloud-computing architecture 164 sends a message to an occupant's mobile device asking if water is currently running or if water has been recently run in the home and, if so, which room and which water- consumption appliance (e.g., sink, shower, toilet, etc.) was the source of the water. This enables the central server or cloud-computing architecture 164 to determine the "signature” or "fingerprint” of each water source in the home. This is sometimes referred to herein as "audio fingerprinting water usage.”
  • the central server or cloud-computing architecture 164 creates a signature for the toilet in the master bathroom, and whenever that toilet is flushed, the central server or cloud-computing architecture 164 will know that the water usage at that time is associated with that toilet. Thus, the central server or cloud-computing architecture 164 can track the water usage of that toilet as well as each water-consumption application in the home. This information can be correlated to water bills or smart water meters so as to provide users with a breakdown of their water usage.
  • sound, vibration, and/or motion sensing components of the smart devices are used to detect sound, vibration, and/or motion created by mice and other rodents as well as by termites, cockroaches, and other insects (collectively referred to as "pests").
  • the central server or cloud-computing architecture 164 makes inferences about pest-detection in the home and provides related services.
  • the central server or cloud-computing architecture 164 can run programs/algorithms that recognize what certain pests sound like, how they move, and/or the vibration they create, individually and/or collectively.
  • the central server or cloud-computing architecture 164 can determine the "signatures" of particular types of pests.
  • the central server or cloud-computing architecture 164 detects sounds that may be associated with pests, it notifies the occupants of such sounds and suggests hiring a pest control company. If it is confirmed that pests are indeed present, the occupants input to the central server or cloud-computing architecture 164 confirmation that its detection was correct, along with details regarding the identified pests, such as name, type, description, location, quantity, etc. This enables the central server or cloud-computing architecture 164 to "tune” itself for better detection and create “signatures” or “fingerprints” for specific types of pests. For example, the central server or cloud-computing architecture 164 can use the tuning as well as the signatures and fingerprints to detect pests in other homes, such as nearby homes that may be experiencing problems with the same pests.
  • the central server or cloud- computing architecture 164 can make inferences that nearby homes may also have such problems or may be susceptible to having such problems, and it can send warning messages to those home to help facilitate early detection and prevention.
  • sound, vibration, and/or motion sensing components of the smart devices are used to detect sound, vibration, and/or motion created by intruders impermissibly entering the home.
  • the central server or cloud-computing architecture 164 makes inferences about home invasion and provides related services.
  • the central server or cloud- computing architecture 164 can run programs/algorithms that assess detected sounds, vibrations, and movement in view of whether the home occupants are home or away, sleeping or awake, etc.
  • the central server or cloud-computing architecture 164 detects sounds proximate to windows, doors, and other external entryways while
  • the central server or cloud-computing architecture 164 alerts the occupants to the possible invasion and/or deters the intruders by turning on nearby lights, sounding audible warnings, etc.
  • the audible announcement could be an indication that an intrusion is occurring. This will alert the occupants and hopefully scare away the intruder.
  • sound, vibration, and/or motion sensing components of the smart devices are used to detect sound, vibration, and/or motion created when an occupant of the home is under distress, such as when an individual falls and cannot get up.
  • the central server or cloud- computing architecture 164 Based on the detected sound, vibration, and/or motion, the central server or cloud- computing architecture 164 makes inferences about the respective occupants of the home and their patterns of movement. These inferences may be enhanced by providing the central server or cloud-computing architecture 164 with age, health, and other information about the individual occupants.
  • the central server or cloud-computing architecture 164 can identify and track the movement through the home of the respective occupants using techniques described herein, such as based on their "signature" or signals emitted from their tracking devices (e.g., mobile phones), and activate a distress alarm when an occupant's movement indicates distress.
  • a distress alarm may also be activated when an occupant remains in one position, such as in bed or in a bath, for a period that exceeds a threshold.
  • a distress alarm may be activated upon receiving a verbal command, such as "help", from an occupant.
  • the central server or cloud-computing architecture 164 alerts the occupants to the possible invasion and/or deters the intruders by turning on nearby lights, sounding audible warnings, etc.
  • the wall switches 108 enhance the smart-home environment 100 by providing a retrofit wall light switch that, in addition to maintaining the basic character and purpose of a light switch, incorporates a host of sensing, interface, and communications capabilities for enhancing occupant comfort, convenience, and safety.
  • the wall switch 108 has access to plentiful electrical operating power, such as by connecting to wiring (e.g., to 120 V "hot" line voltage wires) that is behind the walls 154 of the smart-home environment 100 and that is present at virtually all standard home wall light switches.
  • wiring e.g., to 120 V "hot" line voltage wires
  • a rich variety of new interactions are made possible between wall switch 108 and other devices of the smart-home environment 100. Occupancy sensing, for example, can be significantly enhanced by virtue of the great locations (usually right next to room doorways) of most wall light switches, allowing for easy tracking of occupants as they transition between rooms, predictive occupancy algorithms, and so forth.
  • FIGS. 4A-C illustrate example user interfaces and hardware features of the wall switch 108.
  • the wall switch 108 is split into two parts: a head unit 404 and a backplate 408. This bifurcation can increase the success and commercial longevity of the wall switches 108 by making them a modular platform consisting of two basic components.
  • the backplate 408 is a permanent interface box (sometimes referred to herein as "docking station 408") that serves as a physical connection into the wall and to the 120V line voltage wires or other wiring of the smart-home environment 100, and that contains a AC-to-DC powering circuitry 410.
  • the docking station 408 may resemble a conventional one- gang or two-gang wall box, except no dangerous high- voltage wires are exposed to the user.
  • docking station 408 also includes a cellular wireless interface.
  • the head unit 404 (sometimes referred to herein as "replacement module 404") actually contains all of the sensors, processors, user interfaces, the rechargeable battery, and so forth. Users can plug and unplug the unit 404 in and out of the docking station 408. Many different commercial and functional possibilities for provisioning, maintenance, and upgrade are possible. For example, after years of using any particular head unit 404, a user will be able to buy a new version of the head unit 404 and simply plug it into the docking station 408.
  • the head unit 404 there are also many different versions for the head unit 404, such as an extremely low-cost version that is nothing but a motion'Occupancv detector and light switch, and then a progression of increasingly-capable versions, up to and including extremely fancy head units 404 with small OLED televisions and high-fidelity mini-speakers.
  • an extremely low-cost version that is nothing but a motion'Occupancv detector and light switch
  • a progression of increasingly-capable versions up to and including extremely fancy head units 404 with small OLED televisions and high-fidelity mini-speakers.
  • the various versions of the head units 404 can all be interchangeable, with any of them working when placed into any docking station 408.
  • the head unit 404 can ask the user (by 2D LCD display, 2D/3D holographic projection, voice interaction, etc.) a few simple questions such as, "Where am I" and the user can select "bedroom” or "living room” and so forth.
  • the head unit 404 can provide instructions, such as "Press button once if I am in the kitchen, press twice if I am in the den, etc.”
  • the head unit 404 contains a main processor 412, storage 416, display and user interface 424, audio speaker 436, microphone 444, power converter 440, GPS receiver 450, RFID locator 454, and general physical module receiver 458.
  • the head unit 404 further contains wireless and wired networking 462.
  • wireless and wired networking 462 In view of the ample power availability, a variety of communications capabilities can be provided, including Wi-Fi, ZigBee, 3G/4G wireless, CAT6 wired Ethernet, and even optical fiber from the curb.
  • a HomePlug or other powerline- communications capability can be provided.
  • sensors 428 such as temperature, humidity, occupancy, ambient light, fire, smoke, carbon monoxide, active proximity, passive infrared motion, ultrasound, CCD/video camera, etc.
  • a rechargeable battery 432 (or equivalently capable onboard power storage medium) is also included.
  • the battery 432 can be a rechargeable Lithium-Ion battery.
  • the wall switch 108 charges the battery 432 during time intervals in which the hardware power usage is less than what power stealing can safely provide, and that will discharge to provide the needed extra electrical power during time intervals in which the hardware power usage is greater than what power stealing can safely provide.
  • the user interface 424 can include one or more visual displays (TFT, OLED, etc.), touchscreen and/or button input capabilities, the audio speaker 436, and so forth.
  • the module head unit 404 of smart wall switch 108 has a click-and-rotate annular ring input 460.
  • the ciick-and- rotate annular ring input 460 of the wall switch 108 can be used as a dimming light switch.
  • the click-and-rotate annular ring input 460 can provide menu-driven interfaces for user governance of all its various capabilities. As illustrated in FIG.
  • an optional 2D image and/or 3D holographic image projector 470 can also be provided so that the effective dimension of the display is not just limited to the physical size of the wall light switch.
  • the combination of the smart wall switches 108 and the smart doorbells 106 can bring about new- features. For example, if a visitor approaches the front door or rings the doorbell 106, the camera in the doorbell 106 can transmit their image to the smart wall switches 108, which can instantly show the image on the dial of the light switch, or project the image in 2D or 3D (holographic) form. Further, for example, the image of the arriv ing visitor at the front door can be projected only from the smart wall switches 108 of those rooms where occupancy is sensed.
  • the light switches in the home are configured such that at least one of them can be used to control (a) all of the light switches in the home, (b) a single selectable one of the other light switches in the home, and/or (c) one or more selectable groups or sub-groups of the other light switches in the home.
  • This can be particularly convenient, for example, for a light switch that is near the front door (or other entryway commonly used for ingress and egress) of the home.
  • an occupant who is the last person to leave the home can simply turn off all lights at once by controlling the single light switch nearest the door.
  • a returning occupant can turn on a particular subset of lights (for example, the lights corresponding to a pathway from the front door to the kitchen) all at once by controlling that single light switch.
  • a light switch that is in an upstairs master bedroom of the home can be used by the parents to control (a) the lights in all downstairs rooms in the home, (b) the lights leading between the master bedroom and the kitchen, and/or (c) the lights in each of the children's bedrooms.
  • a network-connected smart keypad is provided in the smart home environment 100.
  • an important underlying functionality of the smart keypad is to control the functionality of security features of the smart-home environment 100. It should be appreciated that the smart keypad is enhanced with a variety of multi-sensing capabilities that, while indeed enhancing home safety and security in many ways, can provide additional functionalities relating to controlling the other smart devices in the home, HVAC control, home energy conservation, intra-home communications, entertainment, etc.
  • smart keypad includes powering circuitry, including a rechargeable battery, for extracting power as needed from the 120V "hot" line voltage wire.
  • the rechargeable battery can either be used as a conventional back-up source or as a reservoir to supply excess DC power if needed for short periods.
  • the smart keypad is split into two parts: a head unit and a backplate. This bifurcation can increase the success and commercial longevity of the smart keypads by making them a modular platform consisting of two basic components.
  • the backplate is a permanent interface box (sometimes referred to herein as "docking station") that serves as a physical connection into the wall and to the 120V line voltage wires or other wiring of the smart-home environment 100, and that contains AC-to-DC powering circuitry. When installed, the docking station may resemble a conventional one-gang or two-gang wall box, except no dangerous high-voltage wires are exposed to the user.
  • the docking station also includes a cellular wireless interface.
  • the head unit (sometimes referred to herein as "replacement module”) actually contains all of the sensors, processors, user interfaces, the rechargeable battery, and so forth. Users can plug and unplug the unit in and out of the docking station.
  • the head unit actually contains all of the sensors, processors, user interfaces, the rechargeable battery, and so forth. Users can plug and unplug the unit in and out of the docking station.
  • Many different commercial and functional possibilities for provisioning, maintenance, and upgrade are possible. For example, after years of using any particular head unit, a user will be able to buy a new version of the head unit and simply plug it into the docking station.
  • There are also many different versions for the head unit such as an extremely low-cost version that is nothing but a user interface, and then a progression of increasingly-capable versions, up to and including extremely fancy head units with small OLED televisions and high-fidelity mini-speakers.
  • the various versions of the head units of the smart keypads and other smart devices can all be interchangeable, with any of them working when placed into any docking station.
  • This can advantageously encourage sharing and re-deployment of old head units - for example, when an important high-capability head unit (for the kitchen or living room, for example) can replaced by a great new version of the head unit, then the old head unit can be re-deployed in a bedroom or a basement, etc.
  • the head unit can ask the user (by 2D LCD display, 2D/3D holographic projection, voice interaction, etc.) a few simple questions such as, "Where am I” and the user can select “bedroom” or “living room” and so forth.
  • the head unit can provide instructions, such as "Press button once if I am in the kitchen, press twice if I am in the den, etc.”
  • the smart keypad contains a main processor, storage, display and user interface, audio speaker, microphone, power converter, GPS receiver, RFID locator, and general physical module receiver.
  • the smart keypad further contains wireless and wired networking.
  • wireless and wired networking In view of the ample power availability, a variety of communications capabilities can be provided, including Wi-Fi, ZigBee, 3G/4G wireless, CAT6 wired Ethernet, and even optical fiber from the curb.
  • a HomePlug or other powerline- communications capability can be provided. Accordingly, the smart keypad can be connected to and communicate with the other smart home devices of the smart-home environment 100 and to the central server or cloud-computing system 164.
  • the smart keypad can include any of the components (e.g., temperature sensor, humidity sensor, occupancy sensor, ambient light sensor, communication equipment, processors, memory, etc.) that are included in any of the other smart home devices (e.g., smart doorbells 106, smart thermostats 102, smart wall switches 108, smart wall plugs 1 10, etc.) described herein.
  • the smart keypad is hardwired with a battery backup.
  • the smart keypad is incorporated into the wall switch 108, whereas in other embodiments the smart keypad can be its own device.
  • the smart keypad also includes sensors such as temperature, humidity, occupancy, ambient light, fire, smoke, carbon monoxide, active proximity, passive infrared motion, ultrasound, CCD/video camera, etc.
  • sensors such as temperature, humidity, occupancy, ambient light, fire, smoke, carbon monoxide, active proximity, passive infrared motion, ultrasound, CCD/video camera, etc.
  • a rechargeable battery is also included (or equivalently capable onboard power storage medium).
  • the battery can be a rechargeable Lithium-Ion battery.
  • the smart keypad charges the battery during time intervals in which the hardware power usage is less than what power stealing can safely provide, and that will discharge to provide the needed extra electrical power during time intervals in which the hardware power usage is greater than what power stealing can safely provide.
  • the user interface of the smart keypad can include one or more visual displays (TFT, OLED, etc.), touchscreen and/or button input capabilities, the audio speaker, and so forth.
  • an optional 2D image and/or 3D holographic image projector can also be provided so that the effective dimension of the display is not just limited to the physical size of the smart keypad.
  • the user interface can be user customized by the home occupants.
  • the smart keypad can be secured by a user-determined passcode.
  • the passcode can be a PIN comprising any number and combination of letters and/or numbers.
  • the passcode can be a phrase.
  • the passcode can be a gesture, which the smart keypad senses using ultrasonic sensors, PIR sensors, etc .
  • the passcode is in the form of a unique connect-the-dot pattern, where the user interface displays a plurality of dots (e.g., a grid of dots) and the user moves his or her finger from dot to dot in a unique pattern.
  • the smart keypad manages a user list, which includes a list of users and corresponding times they can control the keypad to arm/disarm the security system and to control other functions of the smart home.
  • the various users may identify themselves to the smart keypad using unique identification numbers and access codes, including the passcodes described above.
  • the smart keypad may be capable of recognizing a user based on the user's ''digital fingerprint", such as by wirelessly identifying the user's mobile electronic device 166.
  • the smart keypad includes a "light your path" feature, whereby the smart keypad activates a light when it senses that a user is approaching in darkness or near darkness.
  • the smart keypad may activate nearby lights in the home or a light incorporated in the smart keypad itself (e.g., LED) to provide a lighted pathway for the user.
  • the smart keypad is incorporated in a wall light switch, and the smart keypad activates the light associated with the wall switch when a user is approaching the smart keypad.
  • the smart keypad or other devices of the home or the server 164 can send notification to the occupants' mobile devices or other electronic devices. Also, for example, the smart keypad can send a notification message to the occupants' mobile devices any time the alarm system is armed or disarmed by a user.
  • the smart keypad is "smash and bash" resistant. For example, in the event the home's alarm system is armed and the smart keypad is smash (e.g., by an intruder attempting to disarm the alarm by bashing the keypad), the alarm remains armed. In some cases, upon being smashed, the smart keypad triggers the alarm and executes pre-configured actions, such as notifying police and'or other emergency personnel.
  • the smart keypad or other devices in the home are capable of assigning user-defined gestures to actions or sets of actions.
  • the user may program the smart keypad with a "panic gesture" that causes the smart keypad, other devices in the smart home, or the server 164 to notify authorities, such as by calling or otherwise notifying medical, police, etc.
  • a panic gesture may be, for example, the user quickly waving his or her hands in the air.
  • the user may also program the smart keypad or other devices in the home with an audible panic command. For example, when the user yells "help", then medical, police, etc. may be called or otherwise notified.
  • the smart keypad can include a panic button that the user can press to call the police, medical, etc.
  • the smart keypad or any of the other smart-home devices have the ability to display customer messages, such as via a display on the device itself or by projection.
  • the smart doorbell 106 may display, "Baby is sleeping. Do not ring.”
  • the smart keypads and other devices are capable of projecting or displaying messages. For example, when a person is at the front door, the keypads may project a message, such as "Someone's at the door". This would be good for situations where the users have deactivated, or the smart home has automatically deactivated, the doorbell and'or other audible notifications because some or all of the occupants are sleeping.
  • the smart keypads and other devices could also project or display warning messages, such as "Evacuate” due to possible intruder, fire, CO, etc.
  • the message could be projected in large font on walls, floors, ceilings, etc. And the message could provide additional information. For example, the message could be "Intruder detected in den”, “Fire detected in kitchen”, etc.
  • the smart keypad and the other smart devices are used as a platform for running home applications.
  • the smart keypad has the capability of downloading and/or executing applications that enable users to control their smart homes.
  • the user could install a "thermostat" app that can be accessed and controlled from any of the smart devices in the home, including the smart keypads, to control the home's HVAC.
  • the user could also install a "security” app, for example. It should be appreciated that the number and type of apps that could be download and installed are endless.
  • FIG. 5 an illustration is provided of an example embodiment of the smart hazard detector 104. According to embodiments, an important underlying
  • each smart hazard detector 104 functionality' of each smart hazard detector 104 is for smoke detection, fire detection, and carbon monoxide detection (more generally, "hazard detection") and associated audible alarming, via a speaker 504 and a buzzer 508.
  • the smart hazard detector 104 is further enhanced with network-connectedness and a variety of multi-sensing capabilities that, while indeed enhancing home safety and security in many ways, can provide additional functionalities relating to HVAC control, home energy conservation, intra-home communications, and entertainment.
  • the smart hazard detector 104 complies with the standards as required by Underwriter
  • the smart hazard detector meets the alarm response time requirements of UL standard 2034, which are as follows: at 70 PPM, the detector 104 must alarm within 60-240 minutes; at 150 PPM, the detector 104 must alarm within 10-50 minutes; and at 400PPM, the detector 104 must alarm within 4 to 15 minutes.
  • the smart hazard detector 104 is a retrofit designed to replace older hazard detectors.
  • the smart hazard detector 104 may comprise two primary components: a head unit 404 and a backplate or docking station 408.
  • the head unit comprises the sensors, battery, processor, storage, and other components, while the docking station serves as a physical connection into the wall and, if applicable, to the 120V line voltage wires or other wiring of the smart-home environment 100.
  • the docking station may resemble a conventional backplate for a tradition hazard detector. Users can plug and unplug the head unit in and out of the docking station.
  • many different commercial and functional possibilities for provisioning, maintenance, and upgrade are possible.
  • the various versions of the head units can all be interchangeable, with any of them working when placed into any docking station.
  • This c an advantageously encourage sharing and re-deployment of old head units - for example, when an important high-capability head unit (for detecting hazards in the kitchen, for example) can replaced by a newer version, then the old head unit can be re-deployed in a bedroom or a basement, etc.
  • the head unit can ask the user (by 2D LCD display, 2D/3D holographic projection, voice interaction, etc.) a few simple questions such as, "Where am I" and the user can select "bedroom” or "living room” and so forth.
  • the smart hazard detector 104 may be a low-power consuming device that is powered by battery 512 and that includes a low-power communication chip (such as a ZigBee chip) and may participate as a low-power node in the mesh network of the smart-home environment 100 by generating and transmitting messages, relay messages from other devices, as well as by "listen” and sometimes making a corresponding response.
  • a low-power communication chip such as a ZigBee chip
  • the smart hazard detector 104 may be powered by AC voltage from the home.
  • the smart hazard detector 104 includes a WiFi chipset that enable it to communicate its status to other devices in the smart-home environment 100, to user mobile devices 166, to the central server or cloud-computing system 164, as well as to external managed security sendees. It should be appreciated that smart hazard detector 104 is microprocessor driven and that the WiFi chip may contain extra processing capacity for controlling all or some operations of the smart hazard detector 104. In some embodiments, a separate processor is provided.
  • the smart hazard detector 104 includes a smoke detector 516, which comprises a smoke photodiode, a detector, and a smoke chamber.
  • the smoke photodiode may be, for example, an IR LED. Alternatively, instead of IR, a visible light LED or a laser may be provided.
  • the detector may be a photon silicon photomultiplier chip.
  • the smoke photodiode and the detector may be programmed to execute a duty cycle every ten seconds, or so. For example, every ten seconds the photodiode and the detector will do an X-axes microsecond smoke test. The photodiode and the detector also execute self-calibration tests at predetermined intervals.
  • the smart hazard detector 104 includes a carbon monoxide sensor 520, which can be either an electrochemical sensor or a metal oxide semiconductor. Additionally, the smart hazard detector 104 may include a temperature sensor, a humidity sensor for reducing false alarms associated with showering and cooking, and an ambient light sensor, such as a single pixel that measures the brightness of the room.
  • the smart hazard detector 104 may be provided with occupancy detecting capabilities. According to an embodiment, one or more ultrasonic sensors 524 are provided for motion detecting. However, it should be appreciated that in addition to or instead of the ultrasonic sensors 524, one or more passive IR (PIR) sensors 528 are provided for occupancy sensing. Having multiple ultrasonic sensor 524 and/or passive IR sensors 528 enhance the occupancy sensing capabilities of the detector. Because they are typically mounted in unobstructed locations, high on walls of often-occupied rooms, smart hazard detectors 104 are particularly well suited for occupancy detection, such as by the use of RFID, ultrasonic sensors, etc. The smart hazard detector 104 may also include a thermopile 534 for flame- heat detection.
  • thermopile or thermo-camera 534 is a group of thermo couples that take infrared light and correlate that to flame heat. In some instances, this is advantageous because the thermo-camera looks into the room and gives advanced warning of heat. Thus, the thermo-camera 534 is able to "see” heat before the heat actually makes its way to the smart hazard detector 104.
  • a PIR sensor 528 may be replaced with an optical CCD sensor.
  • a Fresnel lens may be provided within detector 104 as a true optical imaging lens for light in the visible spectrum.
  • the CCD sensor may provide optical pictures and/or video of individuals and/or objects within the room and within the field of view of the CCD sensor.
  • the lens may also serve as a user-pressable button.
  • a PIR sensor 528, a Fresnel lens, and/or CCD sensor may be incorporated in any of a variety of different smart-home devices, such as security cameras, doorbells, garage door openers, entertainment devices, and so forth. Essentially, these components may be incorporated into any device where an occupancy detecting function of a PIR sensor and/or CCD sensor might be useful and/or where there is a need for a front selectable button.
  • technologies including the sensors of the smart hazard detector 104 in combination with rules-based inference engines or artificial intelligence provided at a central server such as 164 are used to reduce the number of false alarms. For example, inferences about the occupants' activities can be learned based on data received over time. For example, if the smart hazard detector 104 located in the kitchen observes increased temperature, humidity, and motion in the kitchen, then an inference can be made that one or more of the occupants are cooking ("cooking inference"). These data inputs can be considered on a sliding scale based on time of day and day of week.
  • the smart hazard detector 104 is equipped with one or more air quality sensors 538.
  • the air quality sensors 538 may "sniff' for volatile organic compounds (VOCs) that may be present in the house.
  • VOCs volatile organic compounds
  • the smart hazard detector 104 can warn users when there are toxins in the user's home, such as when the user is burning a paraffin wax candle. Paraffin is a by-product of petroleum and has been shown to release an alarming range of (VOCs), such as toluene and benzene.
  • the air quality sensors 538 can "sniff for gas leaks in the house, such as by detecting methane, which is commonly added to natural gas so as to make natural gas detectable. This
  • the air quality sensors 538 can measure levels of particulate, dust, pollen, mold, etc. for detection.
  • the smart hazard detector 104 is capable of transmitting this information to the other devices in the home as well as the central server or cloud-computing system 164. For example, in some
  • the smart hazard detector 104 can transmit this information to the central server or cloud-computing system 164, which communicates with other nodes in the home and just outside of the home, such as the smart doorbell 106, and assess whether the inside air or the outside air is purer. If the outside air is purer, then the central server or cloud-computing system 164 instructs the smart thermostat 102 to open a vent to permit fresh air into the home, otherwise it instructs the thermostat 102 to recirculate air in the home and to not draw in outside air.
  • the central server or cloud-computing system 164 instructs the smart thermostat 102 to open a vent to permit fresh air into the home, otherwise it instructs the thermostat 102 to recirculate air in the home and to not draw in outside air.
  • the central server or cloud-computing system 164 upon receiving the air quality information from the hazard device 104, can send detailed information about the air quality to the mobile device 166 of user.
  • the air quality information may identify the specific types of toxins, particulate, dust, pollen, mold, etc. in the air. This can help the user identify which pollen, etc. the user is allergic to.
  • the central server or cloud-computing system 164 can use the air quality information to provide the user with medication recommendations (e.g., be sure to take you allergy pills today). Furthermore, the central server or cloud-computing system 164 can aggregate data received from multiple homes in various geographic locations and provide, for example, smog alerts, pollen warnings, etc.
  • the smart hazard detector 104 may include a carbon dioxide (CO2) sensor for fire detection, where the detector includes a passive IR detector from lead selenide. Fire produces CO, CO2, and infrared light. The intensity of the infrared light emitted by the flame is pretty constant, until it passes through the layer of CO2 produced by the fire. However, the frequency of light having a wavelength of 4.26 ⁇ excites CO2 molecules when the light contacts the CO2. In response, the CO2 absorbs the infrared light having a wavelength of 4.26 ⁇ , thereby decreasing the intensity of the light at this wavelength.
  • CO2 carbon dioxide
  • a narrow optical bandpass filter is placed in front of the lead selenide IR detector to permit only light having a wavelength 4.26 ⁇ to pass through to the lead selenide IR detector.
  • the lead selenide detects the decrease in intensity of light at a wavelength of 4.26 ⁇ and triggers the fire alarm.
  • technologies including the sensors of the smart hazard detector 104 in combination with rules-based inference engines or artificial intelligence provided at a central server such as 164 are used to warn occupants of dangerous conditions in the home. For example, an inference can be made that an occupant is burning a candle based of the qualities (e.g., intensity, wavelength, frequency, etc.) of the light and/or the toxins begin released into the air. Further, an inference can be made that the occupant in the room has fallen asleep when the occupant is in the room and has not moved for a
  • the smart hazard detector 104 in that room will sound an alarm to wake up the occupant.
  • the smart hazard detector 104 can sound an alarm or send an alert text or email message when it detects dangerous conditions in unoccupied rooms, such as when the stove is left on in the kitchen.
  • a central server such as 164
  • technologies including the sensors of the hazard detectors 104 in combination with rules-based inference engines or artificial intelligence provided at a central server such as 164 are used to determine the cause.
  • the smart hazard detector 104 can detect that the fire started in the kitchen, and the smart hazard detector 104 can detect an active stove, candle, etc. was left unattended in the kitchen just before the fire started.
  • a central server such as 164 can aggregate data from multiple homes that experienced a fire, analyze the data to find patterns and reconstruct what caused the fires, and share this information with fire departments.
  • the smart hazard detector 104 is mounted in a location that is out-of-reach of the occupants, such as high on a wall or on a ceiling. Thus, in the event of a false alarm, the occupants cannot reach the smart hazard detector 104 to press a button that deactivates the alarm. Accordingly, embodiments of the smart hazard detector 104 allow for occupants to deactivate the alarm using "silence gestures". For example, the smart hazard detector 104 detects a particular "silence gesture" from one of the occupants and, in response, deactivates the alarm.
  • the one or more ultrasonic sensors 524 of the smart hazard detector 104 are used to detect the "silence gesture" of the occupant.
  • each of the ultrasonic sensors 524 may contain multiple piezos so as to make the sensor "omni-directional" and to make it easier to detect when an occupant is making a silence gesture.
  • Using ultrasonic sensors 524 in battery-powered versions of the smart hazard detector 104 is particularly advantageous because ultrasonic sensors 524 consume very little power.
  • the ultrasonic sensors 524 work by sending out pulses and then calculate the time interval between sending the pulse and receiving the echo to determine the distance to an object.
  • a single piezo of the ultrasonic sensor sends the pulse and receives the echo. In other embodiments, separate piezos send pulses and receive echoes.
  • the ultrasonic sensors 524 of the smart hazard detector 104 are merely performing occupancy sensing functions. For example, they are determining whether the room is occupied. When performing this function, the ultrasonic sensors 524 have a ping rate of about one hertz. This low ping rate is designed to preserve battery power, while still effectively perform occupancy detection. However, when one of the other sensors, such as the smoke, fire, or carbon monoxide sensors, activates the alarm, the smart hazard detector 104 increases the ping rate, such as up to twenty hertz. The increased ping rate better enables detection of "silence gestures", which are only made when the alarm is activated. When detecting a "silence gesture", the ultrasonic sensors 524 are "looking for" an object, such as a human hand, to remain within in a predefined distance from the smart hazard detector 104 for a specified period.
  • FIG. 6 An example "silence gesture" will be described with references to FIGS. 6 and 7.
  • an occupant is standing in room 612 while an alarm in hazard detector 104 is active and making a "BEEP" sound.
  • a light 610 such as an LED, is provided on an outer portion of the smart hazard detector 104, such that the occupant 608 can see the light 610 when it is turned on.
  • the operation of the light 610 will be described with reference to FIG. 7. Suffice to say for FIG. 6, the light is turned off in blocks 604 through 624.
  • the occupant 608 has walked to a position closer to the smart hazard detector 104, which is mounted out of reach on the ceiling of the room.
  • the occupant 608 walked to a position even closer to the smart hazard detector 104, such that the occupant 608 is almost directly under the smart hazard detector 104.
  • the occupant 608, while standing almost directly under the smart hazard detector 104 is beginning to extend an arm upward, toward the smart hazard detector 104.
  • the arm of the occupant 608 is extended upward, toward the smart hazard detector 104, while the occupant is standing almost directly under the smart hazard detector 104.
  • the ultrasonic sensor of the smart hazard detector 104 "looks" for a trigger to the "silence gesture" period, which is the amount of time the "silence gesture” must be maintained to deactivate the alarm.
  • the trigger is a distance change from a baseline, and to deactivate the alarm the distance change must be maintained for the entire "silence gesture" period (e.g., three seconds).
  • the requisite distance change must be significant enough to ensure that someone is close and likely intends to silence the alarm. For example, if the distance to the floor is ten feet, then the requisite distance change could be eight feet or eighty percent of the original distance. As such, the object would be required to be within two feet of the sensor to trigger the "silence gesture" period, and to deactivate the alarm the object must remain there for the duration of the period.
  • the requisite distance change can be configured based on the height of the ceiling and based on the height of the occupants, among other things.
  • the light 610 is turned on when the occupant 608 successfully triggers the "silence gesture” period, thereby signaling to the occupant 608 to remain in the position for the requisite period, such as three seconds.
  • the hand of the occupant 608 triggered the "silence gesture” period.
  • a tolerance is built in such that if the occupant 608 slightly moves and loses but quickly regains the signal, the "silence gesture” period will continue without having to start over.
  • the occupant kept the hand in within the requisite distance of the sensor for the duration of the "silence gesture” period and, thus the alarm has been deactivated, the "BEEP” has stopped, and the light 610 has turned off.
  • the occupant 608 can walk away from the smart hazard detector 104 and resume normal activity.
  • a CCD chip could be used to detect the "silence gesture".
  • a CCD chip could be used to detect the "silence gesture".
  • Other possible alternatives to ultrasonic sensors 524 include passive IR sensors, thermopile (e.g., thermo-cameras), laser-distance measuring, laser and a camera combination because a camera looks for dot instead of time of arrival (doppler shift), and a full on camera and image processing system.
  • the ultrasonic sensor 524 could work in concert with one or more optical sensors to make the sensing even better. For example, when an occupant attempts to silence by placing a hand in field, the optical sensor will sense the presence of the occupant's hand, and thereby trigger the "silence gesture" period.
  • the ultrasonic sensor 524 could also work in concert with the optical sensor after the "silence gesture" period has been triggered, where the ultrasonic sensor detects the occupant's changing hand distance, and the optical sensor detects the occupant's changing hand distance using proximity and heat techniques.
  • the ultrasonic sensor 524 could work in concert with the passive IR sensor. For example, when an occupant attempts to silence by placing a hand in field, the passive IR will sense this, and thereby trigger the "silence gesture" period.
  • the ultrasonic sensor 524 could also work in concert with the thermopile (e.g., thermo- camera), where both distance change and heat are used to detect the silence gesture. For example, the thermo-camera detects when a human hand is nearby and triggers the "silence gesture" period. Further, the ultrasonic sensor 524 could work in concert with the ambient light sensor.
  • the thermopile e.g., thermo- camera
  • the ambient light sensor know the occupant is neai'by and thus triggers the "silence gesture” period.
  • similar "gesture" controls can be applied to other smart devices in the home, such as to the smart thermostat, the smart wall switches, etc.
  • FIGS. 8A-8C illustrations are provided of an example embodiment of a smart doorbell 106.
  • an important underlying functionality of the smart doorbell 106 is to serve as a home entry way interface unit, providing a doorbell functionality (or other visitor arrival functionality), audio/visual visitor announcement functionality, and like functionalities.
  • a doorbell functionality or other visitor arrival functionality
  • audio/visual visitor announcement functionality or like functionalities.
  • the smart doorbell 106 is further enhanced with network- connectedness and a variety of multi-sensing capabilities to accommodate additional functionalities, and there can be substantial overlap/integration among the smart doorbell 106, the smart hazard detector 104, the smart wall switch 108, and the smart wall plug 110 that leverages their combined processing, sensing, and communications capabilities, as well as their access to cloud-based control and intelligence.
  • the smart doorbell 106 is connected to the wiring of the smart-home environment 100.
  • a 24V low voltage wire is provided at the outer entry points of the home, such as at the front, back, and side doors.
  • the smart doorbell 106 can be connected to this 24V low voltage wire to obtain steady and reliable power.
  • the smart doorbell could include a battery for the purpose of replacing or supplementing power obtained from the home wiring.
  • the battery could be a rechargeable battery, such as a rechargeable Lithium-Ion battery, for extracting power as needed from the house wiring (e.g., 24V low voltage wire).
  • the smart doorbell 106 could charge the battery during time intervals in which the doorbell's power usage is less than what the 24V low voltage wire can safely provide, and that will discharge to provide the needed extra electrical power during time interv als in which the hardware power usage is greater than what the 24V low voltage wire can safely provide.
  • the rechargeable battery could be used as a conventional back-up source or as a reservoir to supply excess DC power if needed for short periods.
  • the smart doorbell 106 includes two parts: a head unit 804 and a backplate 808, which is also referred to as a docking station 808.
  • the docking station 808 is a permanent interface box that serves as a physical connection into an area near the entry way, such as a doorframe or outer wall of the home, and to the voltage wires of the home.
  • the head unit 804 (sometimes referred to herein as "replacement module 804") actually contains all of the sensors, processors, user interfaces, the rechargeable battery, and so forth.
  • the head unit 804 can ask the user (by 2D LCD display, 2D/3D holographic projection, voice interaction, etc.) a few simple questions such as, "Where am I" and the user can select "front door” or “back door” and so forth.
  • Sensor devices such as temperature, humidity, occupancy, ambient light, fire, smoke, carbon monoxide, active proximity, passive infrared motion, any other suitable motion sensing component, ultrasound, CCD/video camera, bar code scanner, etc., as well as I/O devices such as speakers, user interfaces, 2D/3D projectors, etc., are provided in the head unit 804.
  • the sensors and I/O devices are generally represented at 828.
  • technologies including the sensors 828 in combination with rules-based inference engines or artificial intelligence provided at a central server such as 164 are used to detect when packages are delivered to the door of the smart-home environment 100, and to take a variety of automated actions in response.
  • the sensors 828 can "see” the uniform of the delivery person approaching the door or the truck of the deliv ery person, or the sensors can "hear” the truck in combination with a person approaching the door within a period after hearing the truck.
  • the smart doorbell 106 using its speaker, asks the person if he or she is a delivery person, to which that person can reply with an audible response or by indicating as such on the user interface of the doorbell. If the person is making a delivery, the doorbell can instruct the person to place the package in a location proximate the doorbell 106 such that its scanner can scan the bar code or other type of identifying tag affixed to or associated with the package being delivered.
  • a central server such as server 164, can use the bar code to obtain information about the package, such as the sender, recipient, a description of the item therein, whether signature is required, etc. Based on this information the rules-based inferences engines or artificial intelligence can make inference regarding which action to take next. For example, if occupants or more particularly if the specified recipient or recipients are in the home and the package is from a sender or contains an item that is of particular interest to the one or more occupants, an announcement can be made in the home, indicating the package is currently being dropped off and providing details about the package.
  • the smart doorbell in the event signature is required for the package but none of the occupants are home an inference is made to not disturb the occupants, the smart doorbell can provide authorization to leave the package.
  • the doorbell 106 presents an authorization code (either in plain text, barcode, or encrypted forms) on its user interface and prompts the delivery person to use his or her handheld device to record, scan, photograph, or otherwise acquire the authorization code. Once the authorization code has been acquired by the delivery person, the doorbell 106 can then instruct the delivery person regarding where to leave the package, such as at the front door, around the back of the house in a discrete location, etc.
  • technologies including the sensors 828, such as noise, motion, and/or facial recognition detection, in combination with rules-based inference engines or artificial intelligence provided at a central server, such as server 164, are used to detect when one or more unknown individuals are approaching the home.
  • a number of learned inferences can be made in this situation. For example, during late evening hours, an alarm will be sounded in the house, giving notice of the approaching person and/or the doorbell 106 may audibly announce to the individual that he or she is being monitored by a home security system. Further, in the event the person attempts to enter a door, window, or other access point to the home, a message will be sent to local law enforcement. However, during day time hours when one or more occupants are at home, a learned inference can be made to take no action, such as when a meter reader, mail carrier, garbage collector, etc. is approaching the house as per a reasonably predictable and learned schedule.
  • the smart doorbell 106 provides a context-based entry keypad.
  • the entry keypad can be projected, such as via a 2D/3D holographic projection.
  • the entry keypad can be rendered on a display such as a 2D LCD display.
  • Persons standing proximate to the smart doorbell 106 can enter a code into the keypad to obtain access to the smart-home environment 100.
  • the occupants of the home get context-based keypads and/or access codes. For example, the parents get a more sophisticated keypad that provides a variety of controls, whereas children get a simple keypad into which they can enter their access code. Further, non-occupants get context-based keypads, too.
  • the keypad can vary based on factors such as time of day, current news (e.g., any recent crime in the neighborhood?), proximity of security guards and other law enforcement personnel, and which, if any, occupants are currently at home. For example, if there is a nearby security guard, then the keypad requests a three-digit access code or no access code at all, rather than the usual ten-digit access code. In another example, if no one is home or if only children or elderly people are at home, then a ten-digit code is required.
  • this keypad can be provided on any smart device in the home, such as the wall switch 108, the thermostat 102, hazard detector 104, and the wall plug 1 10.
  • the central server such as server 164, based on information received from the doorbell 106, such as noise and motion data, determines that the street adjacent to the home has a threshold level of traffic, the inferences are made regarding the safety of the children residing at the home. For example, an alarm can be triggered in the home in the event one or more of the children are detected by the occupancy sensing to be outside of the home. This alert enables the parents or other caretakers to quickly take actions to protect the child from the traffic. Further, for example, automatic adjustments are made to audio equipment in the home to account for the increased traffic noise, such as by increasing the volume a proportionate amount.
  • the sensors 828 may include temperature and humidity sensors, the data from which may be used for a number of useful services.
  • the outside humidity and temperature data is considered by the thermostat 102 when controlling the HVAC to best accomplish the occupants' desired comfort preferences.
  • this information may be presented to the occupants tlirough a number of user interfaces, such as a user interface associated with another one of the devices located inside of the home, the television, mobile and other computing devices, or audibly.
  • a central serv er such as server 164 collects this information from a plurality of smart homes across a plurality of geographic locations. This aggregated data may be sold to weather services or may be used to provide weather data to smart home occupants.
  • the smart doorbell 106 includes a button 812 that, upon being touched, depressed, or otherwise activated, causes an audible, visual, or otherwise detectable audible notification to be broadcasted within the home or a message to be sent to user interfaces of devices within the home or to a mobile device associated with occupants of the home. Learned inferences can be made regarding the appropriate response to activation of the button 812. For example, the audible notification is only broadcast in occupied rooms, or rooms occupied by one or more occupants who have a relationship with the person at the door, or no alarm is sounded in rooms where occupants, such as small children, are determined to be sleeping.
  • the occupant-selected songs may be broadcast in the home, where different songs may be broadcast for different occupants at home at the time or based on the identity of the person at the door.
  • technologies and sensors at the smart doorbell 106 may identify the person based on facial recognition or based on other characteristics such as the manner in which the person approached the door.
  • a central server can build up an address book of profile data about people who approach the door, such as some identifying biometric data.
  • the address book can be built over time using low-resolution data such as ultrasonic, passive IR, etc. to create a unique signature for individuals.
  • individuals may enable their mobile devices to communicate with the smart doorbell 106, such as via BLUETOOTH, NFC, or other wireless protocols. Also, for example, individuals may "swipe" their smart phones in front of the smart doorbell's RFID scanner. Upon identifying the individual, the smart doorbell may give the individual certain access right to the home, such as by automatically unlocking the door.
  • technologies including the sensors 828 in combination with rules-based inference engines or artificial intelligence provided at a central server, such as server 164 also make learned decisions.
  • a home monitoring and control system may include one or more hazard detectors with wireless capability and occupancy detectors and audio speakers, and a doorbell having a processor and wireless capability.
  • a doorbell- ringing event may trigger the processor to cause the doorbell to wirelessly communicate with one or more of the hazard detectors to cause the audio speakers to alert occupants of a visitor at the door.
  • each hazard detector can be configured with a do-not- disturb setting such that it will remain silent under one or more pre-determined conditions.
  • the pre-determined conditions may include one or more of an occupant determined to be sleeping proximate to the hazard detector, room location of hazard detector is unoccupied, hazard detector is located in an occupied bedroom, and hazard detector is located in a kid's bedroom.
  • the smart wall plugs 1 10 enhance the smart-home environment 100 by providing a retrofit wall plug that, in addition to maintaining the basic character and purpose of a wall plug, incorporates a host of sensing and communication capabilities for enhancing occupant comfort, convenience, and safety.
  • the smart wall plugs 1 10 have access to plentiful electrical operating power, such as by connecting to wiring (e.g., to 120V "hot" line voltage wires) that is located behind the walls 154 of the smart-home environment 100 and that is present at virtually all standard home wall plugs. This unlimited power budget, the numerous installation locations throughout the home, and the reasonably ample physical space in its housing to fit the necessary
  • smart wall plugs 1 10 combine to enable the smart wall plugs 1 10 to accommodate a rich and wide variety of sensing and communications capabilities for the smart-home environment 100, as well as a general platform for the provision of even newer sensing and communications hardware as it becomes available.
  • smart wall plugs may 110 may be mounted on the outside surface of external walls of the smart- home environment, and thereby may connect to the same wiring (e.g., to 120V "hot" line voltage wires) as do the indoor wall plugs.
  • the smart wall plugs 110 can include all or some of the components that are included in the wall switch 108, as illustrated in FIGS. 4A-C.
  • the smart wall plugs 110 can be comprised of two primary parts: a head unit 908 and a docking station 904, which is a permanent interface box that serves as a physical connection into the wall and to the 120V line voltage wires or other wiring of the smart-home environment 100.
  • a head unit 908 contains the sensors, processors, the I/O devices and receptacles, and so forth.
  • head units 908 having advanced motion sensing capabilities can be plugged into docking stations located in areas having clear lines of sight to entry points, such as doorways and windows. Further, these head units 908 can be plugged into docking stations location in areas having clear lines of sight in commonly occupied rooms, rather than behind furniture in or unused rooms. As discussed, these head units may be capable of wirelessly communicating detected motion and can therefore serve as a "tripwire" for the home security system, either inside the home or outside the home.
  • smart wall plugs 1 10 located outside the home provide outdoor tripwires that alert the central server or cloud-computing system 164 to the presence of intmders before unwelcome entry into the home even occurs.
  • head units having advance communication capabilities are plugged into docking stations associated with high-energy consuming appliances, such as a clothes dryer. As discussed, these head units may be capable of wirelessly communicating with smart meters and corresponding providing power to the clothes dryer at off-peak hours. Because this head unit may be located behind a clothes dryer in a rarely-occupied laundry room, it is unnecessary for this head unit to include advanced occupancy sensors, for example.
  • the head unit 908 includes a standard duplex receptacle 960 having upper and lower outlets, each having three slots.
  • the head unit 908 further contains some or all of a main processor, storage, audio speaker, microphone, power converter, GPS receiver, RFID locator, etc.
  • the head unit 908 may include wireless and wired networking. In view of the ample power availability, a variety of communications capabilities can be provided, including Wi-Fi, ZigBee, 3G/4G wireless, CAT6 wired Ethernet, and even optical fiber from the curb.
  • the smart wall plugs 1 10 are spokesman nodes in the mesh network described above.
  • the smart wall plugs 110 regularly send out messages regarding what they are sensing and, in addition to sending out their own messages, the smart wall plugs 1 10 repeat messages from other smart devices in the mesh network, thereby causing the messages to travel from node to node (i.e., smart device to smart device) throughout the smart-home environment 100.
  • node to node i.e., smart device to smart device
  • the smart wall plugs 110 are able to "drop down" to low-powered communication protocols to receive messages from low-power nodes, translate the messages to other communication protocols, and send the translated messages to other spokesman nodes and/or the central server or cloud-computing system 164.
  • the smart-wall plugs 110 enable the low-powered nodes using low-power communication protocols to send messages across the entire smart-home environment 100 as well as over the Internet 162 to the central server or cloud-computing system 164.
  • battery operated smart hazard detectors 104 are able to preserve their limited power resource, yet also communicate with the enteral server or could- computing system 164 in real time or near real time by sending messages in low-power protocols to the wall plugs 110 which repeat the messages in high-power protocols, which are transmitted to the central server or cloud-computing system 164.
  • the mesh network enables the central server or cloud-computing system 164 to regularly receive data from all of the smart devices in the home, make inferences based on the data, and send commands back to individual one of the smart devices to accomplish some of the smart-home objectives descried herein.
  • a HomePlug or other powerline- communications capability can be provided (See FIGS. 4A-C for example illustrations of such components being provided on a wall switch 108).
  • the smart wall plugs 1 10 may include sensors 928 such as temperature, humidity, occupancy, ambient light, fire, smoke, carbon monoxide, active proximity, passive infrared motion, ultrasound, CCD/video camera, an ambient light sensor, such as a photoresistor or a single-pixel sensor that measures light in the room, etc.
  • sensors 928 such as temperature, humidity, occupancy, ambient light, fire, smoke, carbon monoxide, active proximity, passive infrared motion, ultrasound, CCD/video camera, an ambient light sensor, such as a photoresistor or a single-pixel sensor that measures light in the room, etc.
  • the wall plug 110 may include or be associated with a light source having variable intensity and color, and can therefore function in a manner similar to the smart nightlight 170 described above.
  • the light source of the wall plug 110 is configured to activate when the ambient light sensor detects that the room is dark and/or when the occupancy sensor detects a person's presence or movement. The color and intensity of the light source can be adjusted based on information received from sensor of the wall plug 110 or from other smart devices in the smart-home environment.
  • the light source associated with the smart wall plugs 110 can be activated.
  • the light sources associated with the wall plugs 110 can emit a high- intensity red- colored light to indicate that an emergency is occurring and to cause any intruder to leave the home.
  • the smart wall plugs 1 10 wirelessly communicate with smart meters, which are electrical meters that record consumption of electric energy in time intervals and then transmits that information a local radio receiver, which forward the information to utility companies. Utility companies use this data to charge varying rates. For example, power used midday during peak hours is more expensive than energy used at night during off-peak hours.
  • the smart wall plugs 1 10 communicate with the smart meter of the home to obtain power-usage data. This data can be forwarded to a central server such as server 164.
  • Rules-based inference engines or artificial intelligence provided at a central server such as 164 to make decisions regarding how to efficiently operate certain appliances in the home, so as to reduce energy costs, yet also satisfy the occupants' preferences. For example, decisions are made regarding use appliances for non-essential tasks at night (e.g., wash dishes at night), and to permit essential tasks when necessary (e.g., allow refrigerator compressor to turn on mid-day).
  • the smart wall plugs 110 wirelessly communicate with a central server such as server 164.
  • Rules -based inference engines or artificial intelligence provided at a central server such as 164 make security- related decisions based on data received from the smart wall plugs 1 10. For example, decisions are made regarding when to trigger an alarm, when to turn on lights, when to send a warning to the owner's mobile device or to the neighborhood network.
  • the intelligence of the central process can be used for safety.
  • the central server can be programmed with safe operating parameters for each application in the smart home, and can shutoff power to the appropriate wall plug 110 when the corresponding application deviates from its safe operating parameters.
  • the central server may shut off power to that plug.
  • users can remotely control, such as by use of their mobile device, the outlets in the home. For example, a parent may want to shutoff power to all wall plugs 110 in their child's room, or that are outside of the home and there is some risk that a child may be attracted to the plug.
  • FIGS. 10A-B illustrations of a smart thermostat 102 are provided, according to some embodiments.
  • smart thermostat 102 preferably has a sleek, simple, uncluttered and elegant design that does not detract from home decoration, and indeed can serve as a visually pleasing centerpiece for the immediate location in which it is installed.
  • user interaction with smart thermostat 102 is facilitated and greatly enhanced over known conventional thermostats by the design of smart thermostat 102.
  • the smart thermostat 102 includes control circuitry and is electrically connected to an HVAC system, such as is shown with unit 102 in FIG. 1.
  • Smart thermostat 102 is wall mounted, is circular in shape, and has an outer rotatable ring 1012 for receiving user input.
  • Smart thermostat 102 is circular in shape in that it appears as a generally disk-like circular object when mounted on the wall. Smart thermostat 102 has a large front face lying inside the outer ring 1012. According to some embodiments, smart thermostat 102 is approximately 100 mm in diameter.
  • the outer rotatable ring 1012 allows the user to make adjustments, such as selecting a new target temperature. For example, by rotating the outer ring 1012 clockwise, the target temperature can be increased, and by rotating the outer ring 1012 counter-clockwise, the target temperature can be decreased.
  • the smart thermostat 102 may be configured to receive a plurality of types of inputs by virtue of the rotatable ring 1012, such as a scrolling input and a selection input.
  • a rotation of the ring may allow a user to scroll through an array of selection options, and inwards pressure exerted on the ring (inward click) may allow a user to select one of the options (e.g., corresponding to a particular scroll position).
  • the outer rotatable ring 1012 may include a component that may be physically rotated, or, in other embodiments, a static component that may sense a user's virtual rotation of the ring.
  • the outer rotatable ring 1012 may include a touch pad configured to track arcuate motion of a user's finger on the touch pad.
  • the touch pad may comprise, e.g., a ring-shaped or circular area.
  • the touch pad includes multiple portions (e.g., to detect arcuate motion in a first ring-shaped area and to detect tapping in a second inner circular area). Boundaries of a touch pad area may be identified to a user using, e.g., visual or tactile cues.
  • a ring-shaped touchpad area may be indented compared to neighboring areas on the smart thermostat 102, or the area may be a different color than neighboring areas.
  • a user may physically rotate the ring (in embodiments in which the ring is configured to be physically rotatable) regardless of a starting position of the ring. Further, a user may select, e.g., a value of a variable (e.g., select a particular menu, a particular setpoint temperature value, etc.) by rotating the ring multiple times. This feature may be particularly advantageous as the user does not need not to worry about precise rotations in order to select a desired option.
  • a variable e.g., select a particular menu, a particular setpoint temperature value, etc.
  • the front face of the smart thermostat 102 comprises a clear cover 1014 that according to some embodiments is polycarbonate, and a metallic portion 1024 preferably having a number of slots formed therein as shown.
  • the surface of cover 1014 and metallic portion 1024 form a common outward arc or spherical shape gently arcing outward, and this gentle arcing shape is continued by the outer ring 1012.
  • the cover 1014 has two different regions or portions including an outer portion 1014o and a central portion 1014L According to some embodiments, the cover 1014 is painted or smoked around the outer portion 1014o, but leaves the central portion 1014i visibly clear so as to facilitate viewing of an electronic display 1016 disposed
  • the curved cover 1014 acts as a lens that tends to magnify the information being displayed in electronic display 1016 to users.
  • the central electronic display 1016 is a dot-matrix layout (individually addressable) such that arbitrary shapes can be generated, rather than being a segmented layout. According to some embodiments, a combination of dot-matrix layout and segmented layout is employed. According to some embodiments, central display 1016 is a backlit color liquid crystal display (LCD). An example of information displayed on the electronic display 1016 is illustrated in FIG. 10A, and includes central numerals 1020 that are representative of a current setpoint temperature.
  • LCD liquid crystal display
  • Particular presentations displayed on the electronic display 1016 may depend on detected user input. For example, one of a plurality of variables (e.g., current setpoint temperature versus learning status) or variable values (e.g., 65 degrees versus 75 degrees) may be displayed. The one being displayed may depend on a user's rotation of the outer rotatable ring 1012. Thus, for example, when the device is configured to display a current setpoint temperature, the value being displayed may gradually increase as the user rotates the ring in a clockwise direction. The sign of the change in the displayed temperature may depend on whether the user is rotating the ring in a clockwise or counterclockwise direction. The speed at which the displayed temperature is changing may depend (e.g., in a linear manner) on the speed at which the user is rotating the ring.
  • variables e.g., current setpoint temperature versus learning status
  • variable values e.g., 65 degrees versus 75 degrees
  • the one being displayed may depend on a user's rotation of the outer rotatable ring 1012.
  • a displayed characteristic may vary depending on received user input. For example, a displayed temperature may increase as a user rotates the outer rotatable ring 1012 clockwise, or a highlighted indicator may progress across a list of displayed options as the user rotates the ring 1012. Further, or additionally, user inputs may cause the appearance of new types of information. For example, if a user is viewing setpoint- temperature options, a dramatic clockwise rotation may cause a flashing red symbol (to convey an anti-environmental message).
  • a relationship may exist between a single type of user input (e.g., ring rotation) and a change in an active variable (e.g., setpoint temperature changes), and relationships may further exist between the single type of user input and an inactive variable (e.g., an environmental warning flag).
  • an active variable e.g., setpoint temperature changes
  • an inactive variable e.g., an environmental warning flag
  • the presentations on the electronic display 1016 may depend on one or more types of user input.
  • the display may change in a first manner (e.g., to show a varying selection option) as a user rotates the outer rotatable ring 1012 and may change in a second manner (e.g., to confirm a selection or default to a menu screen) as the user exerts inwards pressure on the outer rotatable ring 1012.
  • metallic portion 1024 has a number of slot-like openings so as to facilitate the use of a passive infrared motion sensor 1030 mounted therebeneath.
  • the metallic portion 1024 can alternatively be termed a metallic front grille portion. Further description of the metallic portion/front grille portion is prov ided in the commonly assigned U.S. Ser. No. 13/199,108 (U.S. Patent No. 8,727,611, issued May 20, 2014).
  • the design of the metallic portion 1024 compliments the sleek, simple, uncluttered and elegant design of smart thermostat 102 while facilitating the integration and operation of sensors located within a housing of the thermostat.
  • smart thermostat 102 is enclosed by housing with a forward-facing surface including the cover 1014 and the metallic portion 1024.
  • the housing include a back plate and a head unit.
  • the housing provides an attractive and durable configuration for one or more integrated sensors used by smart thermostat 102 and contained therein.
  • the metallic portion 1024 may be flush-mounted with the cover 1014 on the forward-facing surface of housing. Together the metallic portion 1024 as incorporated in housing does not detract from home or commercial decor, and indeed can serve as a visually pleasing centerpiece for the immediate location in which it is located.
  • the metallic portion 1024 is designed to conceal sensors from view promoting a visually pleasing quality of the thermostat yet permitting them to receive their respective signals. Openings in the metallic portion 1024 along the forward-facing surface of the housing allow signals to pass through that would otherwise not pass through the cover 1014.
  • glass, polycarbonate or other similar materials used for cover 1014 are capable of transmitting visible light but are highly attenuating to infrared energy having longer wavelengths in the range of 10 microns, which is the radiation band of operation for many passive infrared (PIR) occupancy sensors.
  • PIR passive infrared
  • included in the smart thermostat 102 included in the smart thermostat 102, according to some preferred implementations, is an ambient light sensor (not shown) and an active proximity sensor (not shown) positioned near the top of the thermostat just behind the cover 1014.
  • the ambient light sensor and active proximity sensor are configured to detect electromagnetic energy in the visible and shorter-infrared spectrum bands having wavelengths less than 1 micron, for which the glass or polycarbonate materials of the cover 1014 are not highly attenuating.
  • the metallic portion 1024 includes openings in accordance with one or more implementations that allow the longer-wavelength infrared radiation to pass through the openings towards a passive infrared (PIR) motion sensor 1030 as illustrated. Because the metallic portion 1024 is mounted over the radiation receiving surface of PIR motion sensor 1030, PIR motion sensor 1030 continues to receive the longer wavelength infrared radiation through the openings and detect occupancy in an enclosure.
  • PIR passive infrared
  • the metallic portion 1024 also facilitate additional sensors to detect other environmental conditions.
  • the metallic portion may at least partly conceal and/or protect one or more such sensors.
  • the metallic portion 1024 helps a temperature sensor situated inside of the thermostat's housing measure the ambient temperature of air. Openings in the metallic portion 1024 promote air flow towards a temperature sensor located below the metallic portion 1024 thus conveying outside temperatures to the interior of the housing.
  • the metallic portion 1024 may be thermally coupled to a temperature sensor promoting a transfer of heat from outside the housing.
  • the smart thermostat 102 is preferably constructed such that the electronic display 1016 is at a fixed orientation and does not rotate with the outer ring 1012, so that the electronic display 1016 remains easily read by the user.
  • the cover 1014 and metallic portion 1024 also remain at a fixed orientation and do not rotate with the outer ring 1012.
  • the diameter of the smart thermostat 102 is about 80 mm
  • the diameter of the electronic display 1016 is about 45 mm.
  • an LED indicator 1080 is positioned beneath portion 1024 to act as a low-power-consuming indicator of certain status conditions.
  • the LED indicator 1080 can be used to display blinking red when a rechargeable battery of the thermostat is very low and is being recharged. More generally, the LED indicator 1080 can be used for communicating one or more status codes or error codes by virtue of red color, green color, various combinations of red and green, various different blinking rates, and so forth, which can be useful for troubleshooting purposes.
  • occupancy information is used in generating an effective and efficient scheduled program.
  • an active proximity sensor 1070A is provided to detect an approaching user by infrared light reflection
  • an ambient light sensor 1070B is provided to sense visible light.
  • the proximity sensor 1070A can be used to detect proximity in the range of about one meter so that the smart thermostat 102 can initiate "waking up" when the user is approaching the thermostat and prior to the user touching the thermostat.
  • the ambient light sensor 1070B can be used for a variety of intelligence-gathering purposes, such as for facilitating confirmation of occupancy when sharp rising or falling edges are detected (because it is likely that there are occupants who are turning the lights on and off), and such as for detecting long term (e.g., 24-hour) patterns of ambient light intensity for confirming and/or automatically establishing the time of day.
  • the smart thermostat 102 is controlled by only two types of user input, the first being a rotation of the outer ring 1012 as shown in FIG. 10A (referenced hereafter as a “rotate ring” or “ring rotation” input), and the second being an inward push on an outer cap 1008 (see FIG. lOB) until an audible and/or tactile "click” occurs (referenced hereaf er as an "inward click” or simply “click” input).
  • the outer cap 1008 is an assembly that includes all of the outer ring 1012, cover 1014, electronic display 1016, and metallic portion 1024.
  • an imvard click can be achiev ed by direct pressing on the outer ring 1012 itself, or by indirect pressing of the outer ring by virtue of providing inward pressure on the cover 1014, metallic portion 1024, or by various combinations thereof.
  • the smart thermostat 102 can be mechanically configured such that only the outer ring 1012 travels inwardly for the inward click input, while the cover 1014 and metallic portion 1024 remain motionless. It is to be appreciated that a variety of different selections and combinations of the particular mechanical elements that will travel inwardly to achieve the "inward click" input are within the scope of the present teachings, whether it be the outer ring 1012 itself, some part of the cover 1014, or some combination thereof.
  • FIG. IOC illustrates a cross-sectional view of a shell portion 1009 of a frame of the thermostat of FIGS. 10A-B, which has been found to provide a particularly pleasing and adaptable visual appearance of the overall smart thermostat 102 when viewed against a variety of different wall colors and wall textures in a variety of different home environments and home settings.
  • the outer shell portion 1009 is specially configured to convey a "chameleon ' ' quality or characteristic such that the overall device appears to naturally blend in, in a visual and decorative sense, with many of the most common wall colors and wall textures found in home and business environments, at least in part because it will appear to assume the surrounding colors and textures even when viewed from many different angles.
  • the shell portion 1009 has the shape of a frustum that is gently curved when viewed in cross-section, and comprises a sidewall 1076 that is made of a clear solid material, such as polycarbonate plastic.
  • the sidewall 1076 is backpainted with a substantially flat silver- or nickel- colored paint, the paint being applied to an inside surface 1078 of the sidewall 1076 but not to an outside surface 1077 thereof.
  • the outside surface 1077 is smooth and glossy but is not painted.
  • the sidewall 1076 can have a thickness T of about 1.5 mm, a diameter dl of about 78.8 mm at a first end that is nearer to the wall when mounted, and a diameter d2 of about 81.2 mm at a second end that is farther from the wall when mounted, the diameter change taking place across an outward width dimension "h" of about 22.5 mm, the diameter change taking place in either a linear fashion or, more preferably, a slightly nonlinear fashion with increasing outward distance to form a slightly curved shape when viewed in profile, as shown in FIG.
  • the outer ring 1012 of outer cap 1008 is preferably constructed to match the diameter d2 where disposed near the second end of the shell portion 1009 across a modestly sized gap gl therefrom, and then to gently arc back inwardly to meet the cover 1014 across a small gap g2.
  • FIG. IOC only illustrates the outer shell portion 1009 of the smart thermostat 102, and that there are many electronic components internal thereto that are omitted from FIG. IOC for clarity of presentation, such electronic components being described further hereinbelow and/or in other ones of the commonly assigned incorporated applications, such as U.S. Ser. No. 13/199,108 (U.S. Patent No. 8,727,611, issued May 20, 2014).
  • the smart thermostat 102 includes a processing system 1060, display driver 1064 and a wireless communications system 1066.
  • the processing system 1060 may be disposed within a housing of smart thermostat 102, coupled to one or more temperature sensors of smart thermostat 102 and/or coupled to rotatabie ring 1012.
  • the processing system 1060 may be configured to dynamically identify user input via rotatabie ring 1012, dynamically identifying a variable value (e.g., a setpoint temperature value), and/or dynamically identify an HVAC-control-related property.
  • the processing system 1060 may be configured and programmed to provide an interactive thermostat menuing system on display area 1016 responsive to an inward pressing of rotatabie ring 1012 (e.g., such as for asking questions or otherwise obtaining data from users during interactive information-exchange sessions, as described in commonly-assigned U.S. Patent Application No. 13/440,910 (now U.S. Patent Application Publication No. 2013/0268125), which is hereby incorporated by reference herein in its entirety) and/or to provide user navigation within the interactive thermostat menuing system based on rotation of rotatabie ring 1012 and inward pressing of rotatabie ring 1012 (e.g., such as is described in relation to FIG. 5).
  • the processing system 1060 may be adapted to cause the display driver 1064 and display area 1016 to display information to the user and/or to receive user input via the rotatabie ring 1012.
  • an active variable e.g., variable-value selection, setpoint selection, ZIP-code selection
  • a relationship between the variable and user input may be identified.
  • the relationship may be, e.g., linear or non-linear, continuous or discrete, and/or saturating or non-saturating. Such relationships may be pre-defined and stored within the thermostat.
  • User input may be detected.
  • Analysis of the user input may include, e.g., identifying: a type of user input (tapping versus rotation), a degree of input (e.g., a degree of rotation); a final input position (e.g., a final angular position of the rotatabie ring); an input location (e.g., a position of a tapping); and/or a speed of input (e.g., a speed of rotation).
  • the processing system 1060 may then determine a display indicator, such as a digital numerical value representative of an identified value of a variable (e.g., a setpoint temperature).
  • the display indicator may be displayed on display area 1016.
  • a digital numerical value representative of a setpoint temperature to be displayed may be determined based on a prior setpoint value and a saturating and continuous relationship between rotation input and the temperature.
  • the displayed value may be, e.g., numeric, textual or graphical.
  • the processing system 1060 may further set a variable value in accordance with a user selection. For example, a particular type of user input (e.g., inwards pressure exertion) may be detected. A value of a selected variable may be determined based on, e.g., a prior ring rotation, displayed variable value, etc. The variable may then be set to this value.
  • a particular type of user input e.g., inwards pressure exertion
  • a value of a selected variable may be determined based on, e.g., a prior ring rotation, displayed variable value, etc. The variable may then be set to this value.
  • the processing system 1060 is capable of carrying out the governance of the operation of smart thermostat 102 including the user interface features described herein.
  • the processing system 1060 is further programmed and configured to carry out other operations as described further hereinbelow and/or in other ones of the commonly assigned incorporated applications.
  • processing system 1060 is further programmed and configured to maintain and update a thermodynamic model for the enclosure in which the HVAC system is installed, such as described in U.S. Ser. No. 12/881,463 (U.S. Patent No. 8,606,374, issued December 10, 2013).
  • the wireless communications system 1066 is used to communicate with devices such as personal computers and/or other thermostats or FTVAC system components, which can be peer-to-peer communications, communications through one or more servers located on a private network, and/or communications through a cloud-based service.
  • devices such as personal computers and/or other thermostats or FTVAC system components, which can be peer-to-peer communications, communications through one or more servers located on a private network, and/or communications through a cloud-based service.
  • the smart thermostat 102 could be equipped with a tactile mechanical feedback feature for providing software-triggered mechanical feedback to encourage energy efficient user behavior.
  • a tactile mechanical feedback feature for providing software-triggered mechanical feedback to encourage energy efficient user behavior.
  • the tactile mechanical feedback features provide the user with negative mechanical feedback, such as by vibrating, making the ring hard or impossible to turn.
  • any of the smart devices described herein could have means for self-generating power and optionally storing the generated power in a local battery.
  • the smart devices include a Peltier Junction for generating power.
  • the Peltier Junction generates electricity from heat differentials created between the smart device and its mounting location, such as when the smart device gets hot from use.
  • the smart devices are equipped with generators, such as piezoelectric devices that generate electricity when the device is physically used, such as when a user turns the ring on the smart thermostat. While piezoelectric devices are used in this example, it should be appreciated that any generator dev ices known to those having skill in the art could be used.
  • FIG. 15 an example environment with which embodiments may be implemented is shown with a computer system 1500 that can be used by a user 1504 to remotely control, for example, one or more of the sensor-equipped, network-connected smart-home devices according to one or more of the embodiments.
  • the computer system 1510 can alternatively be used for carrying out one or more of the server-based processing paradigms described hereinabove, can be used as a processing device in a larger distributed virtualized computing scheme for carrying out the described processing paradigms, or for any of a variety of other purposes consistent with the present teachings.
  • the computer system 1500 can include a computer 1502, keyboard 1522, a network router 1512, a printer 1508, and a monitor 1506.
  • the monitor 1506, processor 1502 and keyboard 1522 are part of a computer system 1526, which can be a laptop computer, desktop computer, handheld computer, mainframe computer, etc.
  • the monitor 1506 can be a CRT, flat screen, etc.
  • a user 1504 can input commands into the computer 1502 using various input devices, such as a mouse, keyboard, track ball, touch screen, scanner, sensing component, etc. If the computer system 1500 comprises a mainframe, a designer 1504 can access the computer 1502 using, for example, a terminal or terminal interface. Additionally, the computer system 1526 may be connected to a printer 1508 and a server 1510 using a network router 1512, which may connect to the Internet 1518 or a WAN.
  • the server 1510 may, for example, be used to store additional software programs and data.
  • software implementing the systems and methods described herein can be stored on a storage medium in the server 1510.
  • the software can be run from the storage medium in the server 1510.
  • software implementing the systems and methods described herein can be stored on a storage medium in the computer 1502.
  • the software can be run from the storage medium in the computer system 1526. Therefore, in this embodiment, the software can be used whether or not computer 1502 is connected to network router 1512.
  • Printer 1508 may be connected directly to computer 1502, in which case, the computer system 1526 can print whether or not it is connected to network router 1512.
  • FIG. 16 an embodiment of a special-purpose computer system 1600 is shown.
  • the above methods may be implemented by computer-program products that direct a computer system to perform the actions of the above-described methods and components.
  • Each such computer-program product may comprise sets of instructions (codes) embodied on a computer-readable medium that directs the processor of a computer system to perform corresponding actions.
  • the instructions may be configured to run in sequential order, or in parallel (such as under different processing threads), or in a combination thereof. After loading the computer-program products on a general purpose computer system 1526, it is transformed into the special-purpose computer system 1600.
  • Special-purpose computer system 1600 comprises a computer 1502, a monitor 1506 coupled to computer 1502, one or more additional user output devices 1630 (optional) coupled to computer 1502, one or more user input devices 1640 (e.g., keyboard, mouse, track ball, touch screen, scanner, sensing component, etc.) coupled to computer 1502, an optional communications interface 1650 coupled to computer 1502 and/or a communication network 1695, a computer-program product 1605 stored in a tangible computer-readable memory in computer 1502. Computer-program product 1605 directs system 1600 to perform the above- described methods.
  • Computer 1502 may include one or more processors 1660 that communicate with a number of peripheral devices via a bus subsystem 1690.
  • peripheral devices may include user output device(s) 1630, user input device(s) 1640, communications interface 1650, and a storage subsystem, such as random access memory (RAM) 1670 and non- volatile storage drive 1680 (e.g., disk drive, optical drive, solid state drive), which are forms of tangible computer-readable memory.
  • RAM random access memory
  • non- volatile storage drive 1680 e.g., disk drive, optical drive, solid state drive
  • Computer-program product 1605 may be stored in non-volatile storage drive 1680 or another computer-readable medium accessible to computer 1502 and loaded into memory 1670.
  • Each processor 1660 may comprise a microprocessor, such as a microprocessor from Intel ® or Advanced Micro Devices, Inc. ® , or the like.
  • the computer 1502 runs an operating system that handles the communications of product 1605 with the above-noted components, as well as the communications between the above-noted components in support of the computer-program product 1605.
  • Example operating systems include Windows ® or the like from Microsoft Corporation, Solaris ® from Sun Microsystems, LINUX, UNIX, and the like.
  • User input devices 1640 include all possible types of devices and mechanisms to input information to computer system 1502. These may include a keyboard, a keypad, a mouse, a scanner, a digital drawing pad, a touch screen incorporated into the display, audio input devices such as voice recognition systems, microphones, scanners, any other sensing components, and other types of input devices.
  • user input devices 1640 are typically embodied as a computer mouse, a trackball, a track pad, a joystick, wireless remote, a drawing tablet, a voice command system.
  • User input devices 1640 typically allow a user to select objects, icons, text and the like that appear on the monitor 1506 via a command such as a click of a button or the like.
  • User output devices 1630 include all possible types of devices and mechanisms to output information from computer 1502. These may include a display (e.g., monitor 1506), printers, non- visual displays such as audio output devices, etc.
  • Communications interface 1650 provides an interface to other communication networks and devices and may serve as an interface to receive data from and transmit data to other systems, WANs and/or the Internet 1518.
  • Embodiments of communications interface 1650 typically include an Ethernet card, a modem (telephone, satellite, cable, ISDN), a (asynchronous) digital subscriber line (DSL) unit, a Fire Wire ® interface, a USB ® interface, a wireless network adapter, and the like.
  • communications interface 1650 may be coupled to a computer network, to a Fire Wire ® bus, or the like, hi other embodiments, communications interface 1650 may be physically integrated on the motherboard of computer 1502, and/or may be a software program, or the like.
  • RAM 1670 and non-volatile storage drive 1680 are examples of tangible computer- readable media configured to store data such as computer-program product embodiments of the present disclosure, including executable computer code, human-readable code, or the like.
  • Other types of tangible computer-readable media include floppy disks, removable hard disks, optical storage media such as CD-ROMs, DVDs, bar codes, semiconductor memories such as flash memories, read-only-memories (ROMs), battery-backed volatile memories, networked storage devices, and the like.
  • RAM 1670 and non-volatile storage drive 1680 may be configured to store the basic programming and data constructs that provide the functionality of various embodiments of the present disclosure, as described above.
  • RAM 1670 and non- volatile storage drive 1680 may be stored in RAM 1670 and non- volatile storage drive 1680. These instruction sets or code may be executed by the processors) 1660.
  • RAM 1670 and non-volatile storage drive 1680 may also provide a repository to store data and data structures used in accordance with the present disclosure.
  • RAM 1670 and non-volatile storage drive 1680 may include a number of memories including a main random access memory (RAM) to store of instructions and data during program execution and a read-only memory (ROM) in which fixed instructions are stored.
  • RAM 1670 and non-volatile storage drive 1680 may include a file storage subsystem providing persistent (non-volatile) storage of program and/or data files.
  • RAM 1670 and nonvolatile storage drive 1680 may also include removable storage systems, such as removable flash memory.
  • Bus subsystem 1690 provides a mechanism to allow the various components and subsystems of computer 1502 to communicate with each other as intended. Although bus subsystem 1690 is shown schematically as a single bus, alternative embodiments of the bus subsystem may utilize multiple busses or communication paths within the computer 1502.
  • the methodologies may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. Any machine-readable medium tangibly embodying instructions may be used in implementing the methodologies described herein.
  • software codes may be stored in a memory.
  • Memory may be implemented within the processor or external to the processor.
  • the term "memory" refers to any type of long term, short term, volatile, nonvolatile, or other storage medium and is not to be limited to any particular type of memory or number of memories, or type of media upon which memory is stored.
  • the term “storage medium” may represent one or more memories for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information.
  • ROM read only memory
  • RAM random access memory
  • magnetic RAM magnetic RAM
  • core memory magnetic disk storage mediums
  • optical storage mediums flash memory devices and/or other machine readable mediums for storing information.
  • machine-readable medium includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels, and/or various other storage mediums capable of storing that contain or carry instruction(s) and/or data.
  • storage media and computer readable media for containing code, or portions of code may include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information such as computer readable instructions, data structures, program modules, or other data, including RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which may be utilized to store the desired information and which may be accessed by the a system device.
  • programmatic objects may include computer-readable and/or computer-executable instructions of and/or corresponding to any suitable computer programming language, hi at least one embodiment, each computer-readable medium may be tangible. In at least one embodiment, each computer-readable medium may be non-transitory in time. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the various embodiments.
  • occupant-location data e.g., GPS data
  • occupant-location data - in addition to other data obtained from smart home devices - is provided to the central server or cloud-computing system 164, which uses the data to make inferences regarding the current and future occupancy of the home and/or rooms, and to control the smart devices in the home or otherwise associated with the home in a corresponding manner.
  • systems and methods for conflict sensing and resolution for accommodating multiple occupants in the smart-home environment 100, which has occupant-location based controls of the smart home devices, such as temperature adjustments via the smart thermostat.
  • the systems and methods identify conflicts in the preferences (e.g., preferred temperature settings) of the occupants of the home and resolves the conflicts based on prescribed or learned rules, such has giving priority to the preferences of some occupants.
  • the central server or cloud-computing system 164 obtains occupant-location data, such as GPS data, from the mobile devices 166 of the occupants.
  • occupant-location data such as GPS data
  • the occupants of a home e.g., the individuals who live in or frequently visit the home
  • the central server or cloud-computing system 164 receives occupant-location data directly from the mobile devices, whereas in others the data is received from an intermediary, such as one of the smart devices in the home.
  • the central server or cloud-computing system 164 can determine if the occupant is "at home” or "away", as explained below. When an occupant is at home, the central server or cloud-computing system 164 can determine the occupant's actual room- location (e.g., bedroom, kitchen, garage, etc.). To do, for example, the central server or cloud-computing system 164 cross-references the occupant-location (e.g., GPS coordinates) with a map of the home.
  • the central server or cloud-computing system 164 cross-references the occupant-location (e.g., GPS coordinates) with a map of the home.
  • the central server or cloud-computing system 164 can infer that the occupant is inside the home. Further, the room-location of the occupants can be determined. For example, the smart wall switches, the smart wall plugs, the smart doorbells, and other smart devices in the smart- home environment 100 detect the presence of the mobile device 166 and transmit corresponding data to the central server or cloud-computing system 164. Such detection of mobile devices can be accomplished using WiFi, Bluetooth, NFC, etc. It should also be appreciated that passive RFID tags can be used to determine the room-location of occupants (and pets).
  • an RFID is associated with each of the occupants (and pets) of the house, such as by including the tags in wallets, bracelets, wristbands, mobile devices, collars, etc.
  • the smart devices in the various rooms detect the RFID tags, and send that information to the central server or cloud-computing system 164. It should be appreciated that, because they are typical mounted in unobstructed locations, high on walls of often-occupied rooms, smart hazard detectors 104 are particularly well suited for RFID sensors.
  • the occupants include Wife 1714, Husband 1718, and Child 1722, all of whom have registered their mobile device 166 with the central server or cloud-computing system 164 as being associated with the smart-home environment 100. Further, two geo-location boundaries or "geo-fences" 1730, 1734 of any suitable area 1700 are registered as being associated with the smart-home environment 100. In some embodiments, the occupants of the home define and register the geo-fences, while in other embodiments the central server or cloud-computing system 164 auto-generates the geo- fences for the home.
  • Inner geo-fence 1730 defines the perimeter of living area of the home.
  • the area within the inner-geo fence includes not only the home but also the land immediately surrounding the house, including any closely associated structures, such as garages or sheds ("the curtilage").
  • Outer geo-fence 1734 defines an outer perimeter, which is sometimes miles from the home.
  • the outer geo-fence 1734 is adjustable and extends well beyond the curtilage.
  • the perimeter defined by the outer geo-fence 1734 may have a radius of two to three miles in some embodiments, while in other embodiments the radius is larger or smaller.
  • the central server or cloud-computing system 164 infers that an occupant is "at home” when inside the inner geo-fence 1730 and that the occupant is "away” when outside of the inner geo-fence 1730. Further, the central server or cloud- computing system 164 infers an occupant is going home when the occupant moves (e.g., ttavels by car ) from outside to inside the outer geo-fence 1734. As such, the central server or cloud-computing system 164 uses the inner geo-fence 1730 to determine when occupants leave the home, and it uses the outer geo-fence 1734 to determine when occupants are heading home.
  • the central server or cloud-computing system 164 predicts that Wife 1714 is going home, and makes adjustments in the smart-home environment 100 in anticipation of her arrival.
  • Wife 1714 travels from outside to inside the outer geo-fence 1734, thereby triggering an indication that Wife 1714 is heading home.
  • the Wife's speed and the distance between the fence and the home 100 is used to predict the Wife's time of arrival.
  • central server or cloud-computing system 164 can prepare for Wife's arrival, such as by pre-heating or cooling some or all of the rooms in the home 100 to Wife's preferred temperature.
  • Time-to-temperature calculations can be used to make the pre-cooling or heading as efficient as possible, and to ensure Wife's preferred temperature is achieved before she arrives.
  • all rooms are pre-heated or cooled.
  • rooms associated with Wife can be pre-heated or cooled to Wife's desired temperature, while other rooms are set to temperatures based the preferences of Husband 1718 and/or Child 1722 .
  • Rooms associated with Wife can be inferred by the central server or cloud-computing system 164 based on historical occupancy and usage data, as well as based on a set of rules provided by the occupants (see below).
  • the central server or cloud-computing system 164 determines that the home 100 is vacant because all occupants (Wife 1714, Husband 1718, and Child 1722) are outside of the inner geo-fence 1730. In this case, the central server or cloud- computing system 164 places the smart devices in their "away" settings. For example, the lights are turned off, the HVAC is set to a temperature that requires little or no heating or cooling, the alarm is armed, the doors are locked, electronics and appliances (e.g., televisions, stoves, space heaters, etc.) are turned off, etc. In the event, all occupants' mobile devices are outside of the inner geo-fence 1730 and movement is detected in the house, the central server or cloud-computing system 164 can infer the movement is the family dog and can apply the dog's smart devices settings.
  • the central server or cloud-computing system 164 can infer the movement is the family dog and can apply the dog's smart devices settings.
  • Wife 1714, Husband 1718, and Child 1722 are all inside the inner geo-fence 1720.
  • the central server or cloud- computing system 164 knows that Wife 1714 is in the master bedroom and that Husband 1718 and Child 1722 are both in the den (see discussion regarding "room-occupancy detection"). Accordingly, the central server or cloud-computing system 164 adjusts the temperature in the master bedroom to Wife's preferred setting, and it applies a set of ailes to determine whether to set the den to the Husband's or the Child's preferred setting.
  • the set of rule, for each room of the home provide a prioritized list of occupants and their respective settings.
  • Husband's setting are applied in the den because his setting are higher priority than Child's.
  • her setting would be applied instead of Husband's.
  • Wife 1714, Husband 1718, and Child 1722 are all inside the inner geo-fence 1730. Wife and Husband are in the den, but Child is in the yard playing.
  • the central server or cloud-computing system 164 applies the above-described techniques to determine that Wife and Husband are in the den. However, Child is unaccounted for in any of the rooms. In this example. Child was detected in the den earlier that day, and none of the occupants have traveled outside of the inner-fence 1730 that day. Using this information, the central server or cloud-computing system 164 infers that Child is in the yard, playing.
  • the central server or cloud-computing system 164 infers that Child is in the yard because it received data from the smart doorbell that the child exited the house, yet it is also receiving data from Child's mobile device that Child is inside of the inner geo-fence 1730. Because the Child is in the yard, the central server or cloud-computing system 164 prevents the irrigation system from turning on and it broadcasts occasional reminders to Husband and Wife via speakers provided in the smart devices, for example.
  • a security score may be calculated for a smart-home environment.
  • a computing system may be configured to receive home data from one or more network-connected smart devices of a smart-home environment, process the received home data, and generate a security score based on the processed home data.
  • a computing system such as central server or cloud-computing system 164, may be configured to receive home data 202 from one or more network-connected smart devices, such as one or more of
  • process the received home data 202 as derived home data 208 e.g., with a processing engine 206 and/or services 204/205 and/or third party
  • the security score may be generated based on processed home data that may include at least one of various types of data, including, but not limited to, capability data, opportunity data, and
  • Capability data may include any suitable data that may be indicative of at least one capability of at least one network-connected smart device of the one or more network- connected smart devices of the smart-home environment for which a security score is being calculated or otherwise generated.
  • Such capability data may be indicative of any suitable capability or capabilities of any suitable smart device or smart devices, where each capability may be independent of any or all potential external influences.
  • certain capability data may be "device capability data", which may be any suitable data that may be indicative of at least one capability of a particular network-connected smart device of the smart-home environment, where each capability may be independent of any or all potential external influences on that smart device (e.g., as if the particular smart device were placed in a vacuum and not affected by any external influences, such as by an active user or by other characteristic( s) of the smart-home environment in which the smart device may currently exist).
  • device capability data may be any suitable data that may be indicative of at least one capability of a particular network-connected smart device of the smart-home environment, where each capability may be independent of any or all potential external influences on that smart device (e.g., as if the particular smart device were placed in a vacuum and not affected by any external influences, such as by an active user or by other characteristic( s) of the smart-home environment in which the smart device may currently exist).
  • Such device capability data may include, but is not limited to, data that may be indicative of one or more of the following capabilities of a particular smart device: (i) current charge level of a battery of the device; (ii) maximum potential charge capacity of a battery of the device; (iii) any other current or potential capability of a battery or other power source of the device (e.g., estimated length of use possible if no external power source were to be provided for the device); (iv) currently enabled communication protocol(s) of the device; (v) all communication protocols available to the device; ( vi) any other currently enabled or available communication capability of the device (e.g., bidirectional communication capability); (vii) currently enabled security features of the device; (viii) all security features available to the device; (ix) any other currently enabled or available security capability of the device (e.g., user authentication capabilities, data encryption capabilities, etc.); (x) currently enabled sensing features of the device; (xi) all sensing features available to the device; (xii) any other currently enabled or available sensing capabilities
  • this may enable the security score to be based on a detemiination of whether or not the capabilities of a particular smart device of the smart- home environment are outdated/insufficient, sufficient, or top-notch (e.g., as compared to all available smart devices that may be readily available in the current market, which may be determined via extrinsic information 316 accessible to processing system 206), thereby enabling a security score and/or associated suggestions to reflect the ability of a user to upgrade one or more aspects of one or more smart devices of the smart-home environment (e.g., if an upgradeable head unit or software is available).
  • Such device capability data may be processed by a computing system 164 using data from one or more particular smart devices of the environment (e.g., based on information available to/detectable by the device and communicated by the device to the computing system) and/or using information from other sources accessible to the computing system 164 (e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.) that may be used to supplement the processing of any data received from the smart device(s ) for enabling processed home data 208 of the device capability type.
  • data from one or more particular smart devices of the environment e.g., based on information available to/detectable by the device and communicated by the device to the computing system
  • information from other sources accessible to the computing system 164 e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.
  • certain capability data may be "network capability data", which may be any suitable data that may be indicative of at least one capability of a network of two or more networked smart devices of the smart-home environment, where each capability may be independent of any or all potential external influences on that network of smart devices (e.g., as if the particular network of smart devices were placed in a vacuum and not affected by any external influences, such as an active user or characteristic(s) of the smart-home environment in which the network of smart devices may currently exist).
  • network capability data may be any suitable data that may be indicative of at least one capability of a network of two or more networked smart devices of the smart-home environment, where each capability may be independent of any or all potential external influences on that network of smart devices (e.g., as if the particular network of smart devices were placed in a vacuum and not affected by any external influences, such as an active user or characteristic(s) of the smart-home environment in which the network of smart devices may currently exist).
  • Such network capability data may include, but is not limited to, data that may be indicative of one or more of the following capabilities of a particular network of two or more smart devices: (i) distance between any two smart devices of the network; (ii) shared communication protocol(s) between any two smart devices of the network; (iii) combined sensing capabilities of the network; (iv) mesh/spokesman/node relationship between any two or all smart devices of the network; (v) any other suitable capabilities; and (vi) any combinations thereof.
  • this may enable the security score to be based on a determination of whether or not the capabilities of the network of the smart-home environment enable proper networked communication between devices of the network, whether each one of various desired sensing capabilities and/or output capabilities for the environment are provided by at least one of the devices of the network, and the like.
  • Such network capability data may be processed by a computing system 164 using data from the various smart devices of the network itself (e.g., based on information available to/detectable by the network and communicated by the network to the computing system) and/or using information from other sources accessible to the computing system 164 (e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.) that may be used to supplement the processing of any data received from the network for enabling processed home data 208 of the network capability type.
  • data from the various smart devices of the network itself e.g., based on information available to/detectable by the network and communicated by the network to the computing system
  • information from other sources accessible to the computing system 164 e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.
  • Opportunity data may include any suitable data that may be indicative of at least one opportunity afforded to at least one network-connected smart device by at least one infiuencer of the smart-home environment in which the at least one network-connected smart device is provided.
  • opportunity data may be indicative of any suitable opportunity or opportunities afforded to any suitable smart device or smart devices, where each opportunity may be afforded by at least one infiuencer of the smart-home environment in which each of the at least one smart device is provided. That is, opportunity data may be indicative of the effectiveness or ineffectiveness of smart device(s) and/or the ability or inability of smart device(s) to succeed based on any or all potential external factors capable of influencing the smart device(s).
  • certain opportunity data may be "device opportunity data", which may be any suitable data that may be indicative of at least one opportunity afforded to a particular network-connected smart device of the smart-home environment, where each opportunity may be based on any or all potential external factors capable of influencing that smart device (e.g., any external influences by an active user or characteristic(s) of the smart- home environment in which the smart device may currently exist).
  • device opportunity data may be any suitable data that may be indicative of at least one opportunity afforded to a particular network-connected smart device of the smart-home environment, where each opportunity may be based on any or all potential external factors capable of influencing that smart device (e.g., any external influences by an active user or characteristic(s) of the smart- home environment in which the smart device may currently exist).
  • Such device opportunity data may include, but is not limited to, data that may be indicative of one or more of the following opportunities afforded to a particular smart device by the particular environment: (i) type and/or reliability of any environmental power source provided for the device (e.g., whether a fixed power source, such as a 120V line voltage wires of a structure 150 of environment 100, is powering the device); (ii) position and/or use of the device with respect to the environment (e.g., what type of room the device is provided in (e.g., kitchen or bedroom), what type of element the device is proximate/coupled to (e.g., HVAC 103, lamp 118, window 182, door 186, etc.), etc.): (iii) proximity of device to any environmental influencers that may have an undesired or desired effect on the performance of the device (e.g., a PIR sensor of a device being positioned in the direct path of an HVAC vent whereby the air flow from the vent may alter a characteristic of the sensor to
  • the security score may be based on a determination of whether or not the capabilities of a particular smart device of the smart- home environment are promoted or inhibited or jeopardized by one or more external influencers (e.g., by a user or other characteristic(s)) of the smart-home environment in which the smart device may currently exist, thereby enabling a security score and/or associated suggestions to reflect the ability of a user to make adjustments with respect to such external influencers on the smart device (e.g., a suggestion to move the smart device away from the vent, to increase a sensing threshold of a sensor, to turn on a device option such that the device may mimic the user's patterns
  • Such device opportunity data may be processed by a computing system 164 using data from one or more particular smart devices of the environment (e.g., based on any information available to/detectable by the device and communicated by the device to the computing system) and/or using information from other sources accessible to the computing system 164 (e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.) that may be used to supplement the processing of any data received from the smart device(s) for enabling processed home data 208 of the device opportunity type.
  • a smart device with a PIR sensor may also include a camera or thermometer to detect data indicative of the device being positioned too close to a vent.
  • a sensor may continuously detect a high level of a particular particle (e.g., pet dander) and determine that an influencer of the environment may be causing such detection.
  • certain opportunity data may be "network opportunity data", which may be any suitable data that may be indicative of at least one opportunity afforded to a network of two or more networked smart devices of the smart- home environment, where each opportunity may be based on any or all potential external factors capable of influencing that network of smart devices (e.g., any external influences by an active user or
  • Such network opportunity data may include, but is not limited to, data that may be indicative of one or more of the following opportunities afforded to a particular network of two or more smart devices: (i) environmental impediments to a communication channel/pathway between any two smart devices of the network (e.g., a concrete wall between two adjacent devices that may degrade/inhibit data communicated amongst the devices); (ii) environmental impediments to a communication channel/pathway between the network and communication system (e.g., reliability of the environment's wireless router 160 or connection to internet 162 for communicatively coupling the network of smart devices to computing system 164, availability of requisite/trusted SSL certificates for supporting secure video streaming with emergency personnel, etc.); (iii) type and/or reliability of any environmental power source provided for particular devices of the network (e.g., whether a fixed power source, such as a 120V line voltage wires of a structure 150 of environment 100, is
  • enabled/disabled processing feature(s) of the network e.g., timers or otherwise as set by a user of the environment
  • currently enabled/disabled output features of the network e.g., as set by a user of the environment
  • any other suitable network opportunities e.g., any other suitable network opportunities
  • this may enable the security score to be based on a determination of whether or not the capabilities of a network of smart devices of the smart-home environment are promoted or inhibited or jeopardized by one or more external influencers (e.g., by a user or other charaeteristic(s)) of the smart-home environment in which the network may currently exist, thereby enabling a security score and/or associated suggestions to reflect the ability of a user to make adjustments with respect to external influencers on the network (e.g., a suggestion to move at least one of two adjacent smart devices such that a direct path between the two devices avoids a concrete wall, or to decrease the number of active authentication codes for the network, or to turn on a network option such that one or more devices of the network may work in tandem to mimic the user's patterns when the user is away, etc.).
  • external influencers e.g., by a user or other charaeteristic(s)
  • Such network opportunity data may be processed by a computing system 164 using data from the various smart devices of the network itself (e.g., based on information available to/detectable by the network and communicated by the network to the computing system) and/or information from other sources accessible to the computing system 164 (e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.) that may be used to supplement the processing of any data received from the network for enabling processed home data 208 of the network opportunity type.
  • data from the various smart devices of the network itself e.g., based on information available to/detectable by the network and communicated by the network to the computing system
  • information from other sources accessible to the computing system 164 e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.
  • Environmental data may include any suitable data that may be indicative of at least one behavioral characteristic of the smart-home environment in which at least one network- connected smart device is provided. Such environmental data may be indicative of any suitable behavioral characteristic or characteristics of the smart-home environment in which any suitable smart device or smart devices is provided, where each behavioral characteristic may be indicative of at least one security influencer of the smart-home env ironment in which each of the at least one smart device is provided.
  • certain environmental data may be "micro-environmental data", which may be any suitable data that may be indicative of at least one behavioral characteristic of the particular smart-home environment in which each of the at least one smart device is provided (e.g., on a micro-level independent of other smart-home environments or any other environments beyond the scope of the particular smart-home environment that may be in the same neighborhood or share similar traits with the particular smart-home environment).
  • Such micro-environmental data may include, but is not limited to, data that may be indicative of one or more of the following behavioral characteristics of the particular smart-home environment in which each of the at least one smart device is provided: (i) exposure of environmental objects with respect to public view (e.g., an expensive item, such as a large television, being visible through a window 182 of a structure 150 of the environment may increase the target of that env ironment and the likelihood of an attempted robbery, while a crime-deterring item, such as a guard dog or a label identifying the security features of the environment being made apparent to a would be thief may decrease the target of that environment and the likelihood of an attempted robberj'); (ii) a potentially dangerous object not being secured (e.g., a gun detected outside of a suitable receptacle, such as a home safe smart device as described above); (iii) features of an ingress or of any other vulnerability of a structure of the environment (e.g., the size of a window
  • security questions e.g., "Do you hide a key to the environment under a door mat?", "When is the last time you practiced a fire drill?", "Is your environment provided with a back-up power generator in case of a power grid power outage?”, etc.
  • security questions e.g., "Do you hide a key to the environment under a door mat?", "When is the last time you practiced a fire drill?", "Is your environment provided with a back-up power generator in case of a power grid power outage?”, etc.
  • this may enable the security score to be based on a determination of whether or not the behaviors exhibited at the environment on a micro-level promote or inhibit or jeopardize the security of the environment, thereby enabling a security score and/or associated suggestions to reflect the ability of a user to make adjustments with respect to such behaviors (e.g., a suggestion to stop deep frying inside a structure 150 of the environment or to move the expensive television away from the see-through window 182, etc.).
  • Such micro-environmental data may be processed by a computing system 164 using data from one or more particular smart devices of the environment (e.g., based on any information available to/detectable by the device(s ) and communicated by the device(s) to the computing system) and/or information from other sources accessible to the computing system 164 (e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.) that may be used to supplement the processing of any data received from the smart device(s) for enabling processed home data 208 of the micro-environmental type.
  • data from one or more particular smart devices of the environment e.g., based on any information available to/detectable by the device(s ) and communicated by the device(s) to the computing system
  • information from other sources accessible to the computing system 164 e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.
  • a single smart device or a combination of adjacent smart devices may include one or more cameras or other suitable sensors for identifying an expensive object within the environment that may be within a threshold distance of an uncovered window, or for detecting the presence of a pet that barks whenever a sound over a certain threshold is made, and the like.
  • a smart device may include a camera for identifying a window as well as an altimeter for identifying the altitude or height of that window above the ground.
  • a smart device may identify a window and a proximate user device 166 and then poll that device 166 for its altimeter data.
  • a smart device may include a camera configured to detect a window as well as security bars that may be protecting that window.
  • a smart device may identify a window and then propose questions to a user about that window, such as "What is the height of this window above the earth?", or "What is the cross-sectional area of this window?”, or "Are there any security bars protecting this window?”, etc.
  • certain environmental data may be "macro-environmental data", which may be any suitable data that may be indicative of at least one behavioral characteristic of the environment surrounding or otherwise associated with the particular smart-home environment in which each of the at least one smart device is provided (e.g., on a macro-level related to other environments beyond the scope of the particular smart-home environment that may be in the same neighborhood as or share similar traits with the particular smart-home environment).
  • macro-environmental data may include, but is not limited to, data that may be indicative of one or more of the following behavioral
  • environment to security agencies e.g., the distance or travel time between the particular smart-home environment and an emergency response entity, such as the police, fire department, etc., where increased distance/travel time may decrease the security score, and where such travel time may vary by taking into account current weather/travel conditions);
  • ambient environmental conditions e.g., weather, acts of nature, traffic, construction, service status, entities (e.g., nuclear power plants), etc.
  • any other suitable macro-environmental data e.g., security data related to other floors or the entrance of an apartment building if the particular smart-home environment is a single apartment or floor in a larger apartment complex, where such data may include the secureness of the ingress
  • this may enable the security score to be based on a determination of whether or not the behaviors exhibited at the environment on a macro-level promote or inhibit or jeopardize the security of the environment, tliereby enabling a security score and'or associated suggestions to reflect the ability of a user to make adjustments with respect to such behaviors (e.g., a suggestion to enable communication with more neighborhood security networks, or to buy a backup power generator, etc.).
  • Such macro-environmental data may be processed by a computing system 164 using data from one or more particular smart devices of the environment (e.g., based on any information available to/detectable by the device(s) and communicated by the device(s) to the computing system) and/or information from other sources accessible to the computing system 164 (e.g., extrinsic information 316,
  • a smart device may include a GPS device for identifying the current geographical location of the device and, thus, the particular smart- home environment, while extrinsic information 316 or law enforcement 222 may provide crime data for that geographical location.
  • a smart device may include a weather sensor that may be configured to calculate total rainfall or snowfall at that device for any given historical time period.
  • a security' score for a particular smart-home environment may be calculated by comparing home data from one or more smart devices of the particular smart-home environment against a list of security criterions to determine how many of the security criterions are satisfied (e.g., through processed capability data, opportunity data, and/or environmental data). Higher scores may indicate that a particular smart-home environment satisfies a high number of security criterions and is therefore relatively secure, whereas lower scores indicate that the particular smart-home environment fails to satisfy many of the criterions.
  • security scores can be normalized and scaled so that occupants of a particular smart-home environment can compare the security of their particular smart-home environment to other particular smart-home environments.
  • a score of 0 to 100 can be used, where 0 is the lowest possible score and 100 is the highest possible score.
  • the central server or cloud-computing system 164 may generate a report or log that may list the security criterions and/or provide an indication of whether the particular smart-home environment satisfies each of the criterions. Occupants can review this list to determine which criterions are not satisfied and then make the appropriate improvements to the particular smart-home environment so as to increase the security score of the particular smart-home environment. Additionally, the central server or cloud-computing system 164 can use this log to generate a list of suggestions for improving the particular smart-home enviromnent.
  • the central server or cloud-computing system 164 can send the following message to an occupant (e.g., to an occupant's personal electronic smart device 166: "We notice that you often leave the front door unlocked. Most homes in your neighborhood keep the front door locked at all times.
  • FIG. 18 is a flowchart of an illustrative process 1800 for generating a security score.
  • process 1800 may include receiving, at a computing system, home data from network-connected smart devices of a smart-home environment.
  • computing system 164 may receive home data 202 from one or more
  • process 1800 may include processing, with the computing system, the home data received from the network-connected smart devices of the smart-home environment.
  • computing system 164 may process the received home data 202 as derived home data 208 (e.g., with a processing engine 206 and/or services 204/205 and/or third party
  • process 1800 may include generating, with the computing system, a security score based on the processed home data, wherein the processed home data includes at least one of capability data indicative of at least one capability of at least one network-connected smart device of the network-connected smart devices, opportunity data indicative of at least one opportunity afforded to at least one network- connected smart device of the network-connected smart devices by at least one influencer of the smart-home environment, and environmental data indicative of at least one behavioral characteristic of the smart-home environment.
  • computing system 164 may generate a security score (e.g., as a security service 205) based on the processed home data 208 that may include at least one of various types of data, including capability data, opportunity data, and environmental data.
  • Various capabilities of smart doorbell 106 may provide a smart and at least partially automated interface between a resident of smart-home environment 100 and any potential visitor at smart-home environment 100, including delivery sendees, friends, solicitors, strangers, and would-be- thieves.
  • Smart doorbell 106 may be leveraged with one or more other network-connected smart devices of environment 100, such as one or more of devices 102, 104, 106, 108, 110, 112, 113, 1 14, 1 16, 122, 166, 168, and/or 170, and/or with services platform 200, such that smart doorbell 106 may serve as a trusted and effective liaison between a system user associated with environment 100 (e.g., a resident, owner, occupant, etc.) and a visitor that may approach an entry point of environment 100 at which smart doorbell 106 may be provided, whether or not the system user is currently at environment 100.
  • a system user associated with environment 100 e.g., a resident, owner, occupant, etc.
  • smart doorbell 106 may be a visitor interface or entryway interface device operative to detect and react to the approach to and/or departure from a location (e.g., an outer door 186 of structure 150 of environment 100) by a person or any ot er suitable visitor entity, announce such an approach or departure, enhance conventional doorbell functionality for both system users and visitors, control settings on a security system, increase the convenience and efficiency of package delivery, increase the traceability of package deliver ⁇ ', enable secure package delivery, detect environmental data and other useful data for environment 100 and system 164, and the like.
  • a location e.g., an outer door 186 of structure 150 of environment 100
  • a person or any ot er suitable visitor entity announce such an approach or departure
  • enhance conventional doorbell functionality for both system users and visitors control settings on a security system
  • increase the convenience and efficiency of package delivery increase the traceability of package deliver ⁇ ', enable secure package delivery, detect environmental data and other useful data for environment 100 and system 164, and the like.
  • smart doorbell 106 may have access to plentiful electrical operating power, such as by coupling to wiring (e.g., to 120V "hot" line voltage wires) that may be behind walls 154 of smart-home environment 100 and that may be present at virtually all standard wired areas.
  • wiring e.g., to 120V "hot" line voltage wires
  • Such an essentially unlimited power budget, the near-ubiquity of excellent installation locations throughout an environment 100, and the reasonably ample physical space on its face plate and in its housing to fit the necessary components, may combine to enable smart doorbell 106 to accommodate a rich and wide variety of sensing, interface, and communications capabilities for smart-home
  • Occupancy sensing can be significantly enhanced by virtue of the great locations (e.g., usually right next to entryways) of most visitor or entryway interfaces, which may thereby allow for easy tracking of entities (e.g., system users, visitors, etc.) as they approach and/or enter and/or depart and/or exit entryways of environment 100, predictive occupancy algorithms, and so forth.
  • entities e.g., system users, visitors, etc.
  • FIGS. 1 and 8A-8C illustrate example user interfaces and hardware features of a smart doorbell 106 that may incorporate or otherwise have access to a host of sensing, interface, and communications capabilities for enhancing comfort, convenience, and safety of its users.
  • smart doorbell 106 may be split into at least two parts: a head unit 804 and a backplate 808. This bifurcation can increase the success and commercial longevity of smart doorbell 106 by making it a modular platform that may include at least two basic components.
  • backplate 808 may be a permanent interface box (sometimes referred to herein as "docking station 808") that may serve as a physical connection into a wall or other suitable stable element of environment 100 and to the 120V line voltage wires or other wiring of the smart- home environment 100, and that may contain AC-to-DC powering circuitry 810.
  • docking station 808 When installed, docking station 808 may resemble a conventional one-gang or two-gang wall box, except no dangerous high-voltage wires may be exposed to the user.
  • docking station 808 may also include a cellular wireless interface or any other suitable communications interface circuitry 811.
  • head unit 804 (sometimes referred to herein as "replacement module 804") may actually at least partially contain or otherwise provide some or all of the sensors, processors, user interfaces, the rechargeable battery, and so forth of smart doorbell 106. Users can plug and unplug or otherwise removably couple unit 804 in and out of docking station 808. Many different commercial and functional possibilities for provisioning, maintenance, and upgrade are possible. For example, after years of using any particular head unit 804, a user may be able to acquire a new version of head unit 804 and simply plug it into the docking station 808.
  • head unit 804 There are also many different versions for head unit 804, such as an extremely low-cost version that is nothing but a motion/occupancy detector and conventional doorbell, and then a progression of increasingly-capable versions, up to and including extremely fancy head units 804 with a large number of features.
  • head units 804 can all be interchangeable, with any of them working when placed into any docking station 808. This can
  • a particular head unit 804 may be configured to ask the user via any suitable interface (e.g., 2D LCD display, 2D/3D holographic projection, voice interaction, etc.) a few simple questions, such as "Where am I?" and the user can select "front door” or “garage door” or “back door” or “front gate” and so forth.
  • head unit 804 can provide instaictions, such as "Press button once if I am at the front door, press twice if I am at the back door,” etc.
  • head unit 804 may include one or more of a main processor 814, storage 816, button and/or touch screen display and/or any other suitable user interface 812 (e.g., keyboard, trackball, switch, slide, 3-dimensional user input devices/user interfaces, etc.), audio speaker 836, microphone 844, power converter 840, global positioning system (GPS) component 850 (e.g., GPS receiver), radio frequency identification (RFID) locator 854, and general physical module receiver 858.
  • Head unit 804 may additionally or alternatively include one or more types of a wireless and/or wired networking
  • networking component 862 In view of the ample power availability, a variety of any suitable communications capabilities can be provided by networking component 862 to smart doorbell 106, including Bluetooth, Wi-Fi, ZigBee, 3G/4G wireless, CAT6 wired Ethernet, and even optical fiber from the curb. Furthermore, because smart doorbell 106 may be coupled to a home 120V system or any other suitable wired or wireless power system, a HomePlug or other powerline- communications capability can be provided by networking component 862. Such communication capabilities may enable smart doorbell 106 to communicate with any other smart device of environment 100 and/or with any suitable element of platform 200.
  • Head unit 804 of smart doorbell 106 may additionally or alternatively include any number of any suitable sensor components 828, such as any suitable temperature sensor, any suitable humidity sensor, any suitable occupancy sensor, any suitable ambient light sensor (ALS), any suitable fire sensor, any suitable smoke sensor, any suitable carbon monoxide (CO) sensor, any suitable proximity sensor, any suitable passive infrared (PIR) or other motion sensor, any suitable ultrasound sensor, any suitable still or video camera or scanner (e.g., a charge-coupled device (CCD) camera, a complementary metal-oxide-semiconductor (CMOS) camera, or any suitable scanner (e.g., a barcode scanner or any other suitable scanner that may obtain identifying information from a code, such as a linear barcode, a two-dimensional or matrix barcode (e.g., a quick response (“QR”) code), a three-dimensional barcode, or the like), any suitable near-field communication (NFC) technique sensor (e.g., for sensing an entity wearing an infrared or
  • a rechargeable battery 832 or any equivalently capable onboard power storage medium may also be provided by head unit 804.
  • battery 832 can be a rechargeable Lithium-Ion battery.
  • smart doorbell 106 may charge battery 832 during time intervals in which the hardware power usage is less than what power stealing can safely provide, and may discharge to provide any needed extra electrical power during time intervals in which the hardware power usage is greater than what power stealing can safely provide, which may thereby extract power as needed from the 120V "hot" line voltage wire or other suitable power source.
  • Battery 832 may be used as a conventional back-up source or as a reservoir to supply excess DC power if needed for short periods.
  • User interface 812 may include one or more visual displays (e.g., thin film transistor (TFT), organic light-emitting diode (OLED), or any other suitable display), touchscreen, and/or button input capabilities, audio speaker 836, microphone 844, and the like.
  • a particular head unit 804 of smart doorbell 106 may include user interface 812 with a click-and-rotate annular ring input button.
  • the click-and-rotate annular ring input button may be used by a visitor to simply "ring" a doorbell (e.g., for a visitor to attempt to announce itself).
  • such a click-and-rotate annular ring input button may be operative to provide menu-driven interfaces for user governance of some or all of the various capabilities of doorbell 106.
  • User interface 812 may additionally or alternatively be configured to take a variety of forms, including, but not limited to, a touch pad, dial, click wheel, scroll wheel, touch screen, 3-dimensional input and/or output interface, one or more buttons (e.g., a single conventional doorbell-like button or multiple buttons of a keyboard), mouse, joy stick, track ball, and the like.
  • sensor components 828 may also be at least partially used as an input component (e.g., by sensing data from a user (e.g., as a microphone, camera, scanner, biometric sensor, and the like)) and/or may be at least partially integrated into user interface 812 (e.g., user interface 812 may include a biometric fingerprint scanner to identify the fingerprint of an entity that may touch user interface 812).
  • user interface 812 may include a biometric fingerprint scanner to identify the fingerprint of an entity that may touch user interface 812).
  • a 2D image and/or 3D holographic image projector 830 may also be provided so that the effective dimension of the display is not just limited to the physical size of a face of head unit 804. For example, as described below ( e.g., with respect to FIG.
  • smart doorbell 106 may leverage projector 830 to project a defined drop-off area for the package (e.g., area AL of FIG. 1, as described below in more detail).
  • a defined drop-off area for the package e.g., area AL of FIG. 1, as described below in more detail.
  • doorbell 106 may be operative to generate and transmit a signal (e.g., via any suitable wired or wireless communication path) to a user-communicative component for alerting a user that a visitor is at doorbell 106, where such a user-communicative component may be any suitable smart component of smart environment 100 (e.g., an output component of a hazard device 104 or a communication mechanism available to a user device 166) or any conventional component of a user environment (e.g., a chime of a conventional doorbell and/or an emergency light of a home).
  • a signal e.g., via any suitable wired or wireless communication path
  • a user-communicative component may be any suitable
  • Smart doorbell 106 of environment 100 may be configured to include any suitable combination of any of the components described above with respect to any component of platform 200 so as to appropriately interact with other smart devices of environment 100 and services platform 200 and any other suitable entity, such as system users registered with or associated with environment 100 (e.g., owners, occupants, etc.) and/or visitor entities that may visit environment 100 (e.g., package deliverers, friends, solicitors, strangers, would-be-thieves, etc.).
  • system users registered with or associated with environment 100 e.g., owners, occupants, etc.
  • visitor entities e.g., package deliverers, friends, solicitors, strangers, would-be-thieves, etc.
  • Such a smart doorbell 106 may be a visitor interface or entryway interface device operative to control and detect a visitor's approach to and/or departure from a location (e.g., an outer door 186 of structure 150 of environment 100), announce such an approach or departure, enhance conventional doorbell functionality for both system users and visitors, control settings on a security system, increase the convenience and efficiency of package delivery, increase the traceability of package delivery, enable secure package delivery, detect environmental data and other useful data for environment 100 and system 164, and the like.
  • Doorbell 106 on behalf of smart environment 100 and
  • platform 200 may act as a custodian to environment 100 with respect to any visitors that may approach environment 100.
  • One or more sensors 828 of doorbell 106 may be operative to detect when a package is attempted to be delivered to smart-home environment 100, and then doorbell 106 may be operative to take one or more of a variety of automated actions in response to such detection. For example, as shown in FIG.
  • doorbell 106 may be operative to access certain package identification information associated with package PL.
  • doorbell 106 may be operative to receive certain package identification information from deliverer DL, such as by deliverer DL actively physically communicating such package identification information to doorbell 106 (e.g., audibly to an sensing component 828 of doorbell 106) and/or by deliverer DL electronically communicating such package identification information to a networking communication component 862 of doorbell 106 (e.g., by communicating digital data from a deliverer's mobile device 266, which may be similar to a user device 166) using any suitable communications protocol (e.g., via a communication path 107).
  • doorbell 106 may be operative to access certain package identification information directly from package PL, such as by a scanner sensing component 828 of doorbell 106 scanning information (e.g., code
  • platform 200 e.g., doorbell 106, alone or in combination with other smart devices and/or mles-based inference engines and/or artificial intelligence provided at environment 100 and/or services platform 200
  • platform 200 may be operative to access additional information based on that detected package identification information (e.g., the sender, recipient, a description of the contents of package PL, whether signature is required to complete the delivery, etc.) and/or to take one or more of a variety of automated actions based on that detected package identification information and/or additionally accessed information.
  • Such package identification information that may be associated with a package may be generated by any suitable entity or combination of entities using any suitable data.
  • certain package identification information that may be associated with package PL may uniquely identify a particular smart-home
  • a delivery entity e.g., a courier service such as Federal Express
  • a delivery entity may be in the process of delivering package PL to environment 100 may use certain package identification information to access any suitable smart environment data (e.g., dynamic data) regarding environment 100 or a user thereof that may be identifiable by that package identification information for increasing the convenience and efficiency of package delivery.
  • smart environment data may be indicative of a status of environment 100 or of a particular user of environment 100 (e.g., the availability of someone at environment 100 to receive
  • a delivery entity may be able to leverage such smart environment data for more efficiently attempting to deliver package PL.
  • FIG. 19 is a flowchart of an illustrative process 1900 for enhancing visitor handling (e.g., package delivery).
  • process 1900 may include placing an order for delivery of content in a package to a recipient at a location.
  • Such an order may be made by any suitable ordering entity using any suitable communication technique, including via the telephone, the internet (e.g., via a web browser or a mobile application), a local in-person" order, and the like, with respect to any suitable facilitator entity.
  • the ordering entity may be the same as or different than the recipient (e.g., the order may be made by the intended recipient or by another party (e.g., when ordering a gift for the recipient)).
  • a mobile device such as a mobile device 166
  • a mobile device 166 may be used by any suitable person to place the order.
  • Any suitable fulfillment entity or combination of fulfillment entities may facilitate the placement of the order, such as a clerk at a store or a telephonic call center, an online server running code that may enable the ordering entity to place the order (e.g., Amazon.com or Seamless.com or any other suitable online vendor), or any other order facilitator.
  • the content to be delivered in the package of the placed order may be any suitable content (e.g., goods or services) that may be physically transported and/or eventually provided at a particular physical location.
  • the package may or may not include wrapping or a covering to securely contain the content during delivery.
  • the content (e.g., the goods or se dees desired to be delivered) may not be wrapped in a "physical" package but may be delivered as is (e.g., a new car may be ordered for deliver ⁇ ' where the car may not be bound in any package when delivered but the car may be considered both the content and the package, a cable repairman may be ordered for delivery (e.g., to fix a cable connection at the environment 100) where the repairman may be considered both the content and the package, while a set of glassware may be ordered as content for delivery where the glassware may be wrapped in protective bubble wrap and enclosed in a cardboard box as packaging for the glassware content when delivered).
  • a new car may be ordered for deliver ⁇ ' where the car may not be bound in any package when delivered but the car may be considered both the content and the package
  • a cable repairman may be ordered for delivery (e.g., to fix a cable connection at the environment 100) where the repairman may be considered both the content and the package
  • a set of glassware may be ordered as content
  • the location may be any physical location to which content may be delivered, such as any suitable mailing address, post office box, or the like.
  • a recipient may or may not be identified when the order is placed at step 1902. In some embodiments, one or more particular recipients may be identified when the order is placed (e.g., "John Doe” or "John and Jane Doe” or “Rex the Dog” or “Nest Labs, Inc.”).
  • no recipient may be identified and the order may be placed while only identifying a location at which the package should be delivered (e.g., 1 Main Street, Gotham, U.S.A.).
  • no location may be identified and the order may be placed while only identifying a recipient to which the package should be delivered (e.g., John and Jane Doe).
  • process 1900 may include accessing smart environment data that may be associated with at least one of the recipient and the location of the order of step 1902.
  • Such smart environment data may include any suitable data indicative of a particular smart home environment 100 and/or user (e.g., user UL or UR of FIG. 1) that may be registered or otherwise associated with platform 200 (e.g., a smart entity).
  • platform 200 e.g., a smart entity
  • any smart environment 100 e.g., smart home or other environment equipped with one or more smart devices
  • any suitable environment platform-identifier e.g., via address, geographic coordinates, unique environment ID, etc.
  • any system user e.g., person, animal, etc.
  • any suitable user platform-identifier e.g., via name, address, facial detection, a registered personal mobile device 166, unique user ID, etc.
  • certain smart environment data may be accessed that may be associated with that recipient and/or location (e.g., any suitable user platform-identifier of platform 200 associated with that rec ipient as a known user of platform 200 and/or any suitable environment
  • platform-identifier of platform 200 associated with that location as a known environment of platform 200 may communicate with platform 200 in order to attempt to access such smart environment data (e.g., if the recipient or location of the order matches any known user or environment of platform 200).
  • such a facilitator entity may be a fulfillment entity (e.g., Amazon.com) or a delivery entity (e.g., Federal Express) and may be a business 228 that may be operative to communicate with any other suitable portion of platform 200 (e.g., system 164 via one or more APIs 210) to access such smart environment data that may be associated with the recipient and/or location of the order.
  • a fulfillment entity may also be a delivery entity (e.g., a restaurant that receives an order, prepares the meal content, and then delivers (e.g., on foot or bicycle or car) the meal content in a package (e.g., brown bag) to environment 100).
  • the ordering entity that placed the order of step 1902 may provide the facilitator entity with suitable smart environment data (e.g., a user platform-identifier of platform 200 associated with the recipient and/or an environment platform-identifier of platform 200 associated with the location may be known to and shared by the ordering entity with a facilitator entity, either during or after placement of the order at step 1902).
  • suitable smart environment data e.g., a user platform-identifier of platform 200 associated with the recipient and/or an environment platform-identifier of platform 200 associated with the location may be known to and shared by the ordering entity with a facilitator entity, either during or after placement of the order at step 1902).
  • the order placed at step 1902 may be at least partially enabled by a component or subsystem of platform 200 (e.g., of system 164) that may be operative to provide the facilitator entity (e.g., fulfillment entity and/or delivery entity) with suitable smart environment data associated with the order (e.g., a user platform-identifier of platform 200 associated with the recipient and/or an environment platform-identifier of platform 200 associated with the location of the order may be known to and shared by system 164 with a facilitator entity (e.g., via API 210), either during or after placement of the order at step 1902).
  • a facilitator entity e.g., fulfillment entity and/or delivery entity
  • suitable smart environment data associated with the order e.g., a user platform-identifier of platform 200 associated with the recipient and/or an environment platform-identifier of platform 200 associated with the location of the order may be known to and shared by system 164 with a facilitator entity (e.g., via API 210), either during or after placement of the order at step 1902).
  • process 1900 may include generating unique package identification information (e.g., unique invitation identification information) based on the accessed smart environment data and at least one of the content, the recipient, and the location of the ordered package and/or a facilitator of the ordered package.
  • unique package identification information e.g., unique invitation identification information
  • a smart environment 100 and/or a user of platform 200 e.g., a smart system entity
  • a smart environment 100 and/or a user of platform 200 is associated with the location and/or recipient of the ordered package such that smart environment data indicative of that smart environment and/or user may be accessed at step 1904
  • unique package identification information may be generated at step 1906 that may identify that smart environment and/or that user of platform 200 (e.g., using the smart environment data) and/or at least one identifier of the ordered package (e.g., the content, the recipient, the location, and/or a facilitator/fulfiller/deliverer entity that may be at least partially responsible for delivering the package, etc.).
  • Such unique package identification information may be generated by any suitable entity, such as by system 164 and/or a business facilitator entity 228, and may be shared with any other suitable entity or entities (e.g., with system 164 by facilitator entity 228 and/or with facilitator entity 228 by system 164).
  • system 164 may associate smart environment data of a smart system entity (e.g., an environment 100 and/or user U) with at least one of a recipient or location of a placed order and may generate unique package identification information for that order using the smart environment data and any suitable identifier(s) of that order, and then may share that unique package identification information with a facilitator 228 of the order (e.g., a delivery entity charged with delivering the ordered package).
  • a facilitator 228 of the order e.g., a delivery entity charged with delivering the ordered package.
  • a business 228 that may facilitate the order may access smart environment data when at least one of the recipient and location of an order is associated with a smart system entity of system 164 and then business 228 may generate unique package identification information for that order using the smart environment data and/or any suitable identifier(s) of that order (e.g., recipient, deliverer, orderer, contents, location, etc.), where such unique package identification information may be shared by facilitator business 228 with system 164 or any other suitable portion of platform 200 (e.g., a confirmation number generated by such a facilitator entity for a specific order (e.g., a unique order confirmation number) may be leveraged as such unique package identification information).
  • a confirmation number generated by such a facilitator entity for a specific order e.g., a unique order confirmation number
  • Process 1900 may include a facilitator obtaining, at step 1908, a current status or mode setting of a smart system entity (e.g., an environment 100 and/or user U) of the smart environment data that may be associated with the unique identification information of the ordered package and then, at step 1910, altering delivery of the ordered package based on the obtained status. That is, when a smart environment 100 and/or a user U of system 164 (e.g., a smart system entity) may be associated with a placed order (e.g., as a location and/or recipient of the order) such that unique package identification information may be generated that links that environment or user with the placed order, the handling of that order may be affected by any suitable characteristic of that environment or user.
  • a smart system entity e.g., an environment 100 and/or user U
  • a placed order e.g., as a location and/or recipient of the order
  • a current status or characteristic of at least one smart system entity associated with the ordered package may be obtained by a facilitator for altering the delivery of the package.
  • the delivery entity may leverage the unique package identification information of the package to obtain current status information of a smart system entity associated with the package (e.g., associated with the unique package identification information) from platform 200 (e.g., system 164) in order to determine how to most efficiently deliver the package.
  • a smart system entity associated with the package e.g., associated with the unique package identification information
  • the unique package identification information may be incorporated into data (e.g., code data or NFC data) of a shipping label that may be affixed to or otherwise associated with the package (e.g., label ID of package PL of FIG. 1 ), and such a label may be scanned by the delivery entity in advance of an actual delivery attempt of the ordered package (e.g., at step 1908) so as to enable the delivery entity to obtain current status information about the ordered package from platform 200.
  • data e.g., code data or NFC data
  • a shipping label e.g., label ID of package PL of FIG. 1
  • such a label may be scanned by the delivery entity in advance of an actual delivery attempt of the ordered package (e.g., at step 1908) so as to enable the delivery entity to obtain current status information about the ordered package from platform 200.
  • Such status information may be dynamic and change over time (e.g., after step 1906 but before step 1908), such that the facilitator entity may obtain current status information before attempting to deliver the package in order to efficiently deliver the package based on the most useful status information.
  • a deliverer of delivery entity business 228 may first access and leverage the unique package identification information of a package to obtain current status information prior to a deliverer of delivery entity business 228 arriving at environment 100 with the package.
  • a deliverer agent DR at a dispatch center DC of business 228 remote from location LU of environment 100 may utilize label ID of package PL to access and leverage the unique package identification information of package PL to obtain current status information prior to business 228 instructing deliverer agent DL of FIG. 1 to arrive at door 186 of environment 100 with package PL.
  • Status information regarding a smart system entity may be any suitable information generated by or inferred from any suitable data of platform 200 (e.g., of sensors of environment 100 and/or from user U).
  • system 164 may use tracking information to make inferences regarding the current and/or future occupancy of home environment 100 and/or the current and/or future location of a user U (e.g., at environment 100, like user UL of FIG. 1 and Husband 1718 of FIG. 17, or away from environment 100, like user UR of FIG. 1 and Wife 1714 of FIG.
  • system 164 may be configured to enable a user U to access information about any ordered packages that may be associated with that user (e.g., packages to be delivered to that user as a recipient or to that user's smart environment as a location), which may be determined through identifying any unique package identification information that may be associated with that user or an environment of that user (e.g., with an applicable smart system entity ), such that the user may manually update any settings that he or she may wish to have be associated with any such ordered package (e.g., for affecting its delivery).
  • any ordered packages that may be associated with that user (e.g., packages to be delivered to that user as a recipient or to that user's smart environment as a location), which may be determined through identifying any unique package identification information that may be associated with that user or an environment of that user (e.g., with an applicable smart system entity ), such that the user may manually update any settings that he or she may wish to have be associated with any such ordered package (e.g., for affecting its delivery).
  • a user may interface with any suitable user interface that may be provided by any suitable entity of platform 200 (e.g., system 164) to dictate and/or edit any status information that may be associated with an ordered package and then used by a facilitator business 228 for efficiently delivering that package, such as altering the delivery location (e.g., target) at which the package ought to be delivered or defining a particular time during which the delivery should or should not be made to the location, and the like.
  • any suitable entity of platform 200 e.g., system 164
  • a facilitator business 228 for efficiently delivering that package, such as altering the delivery location (e.g., target) at which the package ought to be delivered or defining a particular time during which the delivery should or should not be made to the location, and the like.
  • the status information that may be obtained by a facilitator may be indicative of the actual current status of a smart system entity (e.g., a smart environment 100 or user U) at that moment and/or of a future status of that smart system entity (e.g., during what future times environment 100 is expected to be occupied and during what future times environment 100 is expected to not be occupied, etc.), and such status information may be based on inferences or other processing that may be automatically carried out by platform 200 (e.g., system 164) based on any suitable sensed data with respect to any smart system entity (e.g., by any smart sensing devices of environment 100) and/or based on any manual instructions or settings defined or otherwise provided by a system user to platform 200 (e.g., to a smart device and/or to system 164).
  • a facilitator e.g., a deliverer at step 1908
  • a facilitator may be indicative of the actual current status of a smart system entity (e.g., a smart environment 100 or user U) at that
  • a do-not-disturb mode may be set for a particular environment 100 or at least a portion thereof for any suitable length of time that may start at a current or future moment. Such a mode may indicate that environment 100 may not be willing or able to accept at least certain package deliveries (e.g., deliveries requiring a confirmation of receipt user signature by a particular user or any user).
  • Such a mode may be manually set by an appropriate user (e.g., a user with appropriate management rights for environment 100 using any suitable device 166 or interaction with any other suitable smart device of environment 100 or any other suitable component of system 164 of platform 200) for any suitable reason, such as when the user does not want to greet a visitor (e.g., if the user is feeling under the weather or going to sleep) or when the user will not be at environment 100 (e.g., when the user is going on vacation or leaving a babysitter at home with a child).
  • platform 200 may be operative to collect any suitable information from one or more smart devices of
  • environment 100 may make inferences in order to automatically set a do-not-disturb mode for environment 100 (e.g., based on sensed occupancy data and sensed movement data).
  • Information indicative of when environment 100 may be associated with such a mode may be a type of current status information that may be associated by platform 200 with unique package identification information and shared with or otherwise made accessible to a facilitator entity (e.g., a delivery business 228) for increasing the efficiency of package delivery and'Or of any other activity that may include a visitor interacting with environment 100.
  • a facilitator entity e.g., a delivery business 2248 for increasing the efficiency of package delivery and'Or of any other activity that may include a visitor interacting with environment 100.
  • Such information may be handled with sensitivity so as to not be leveraged for sinister purposes (e.g., for a third party to detect when an environment 100 is in a do-not-disturb mode so as to assume no one is home and attempt a robbery of the premises).
  • System 164 may be configured to share information about a do-not-disturb mode of an environment 100 or any other suitable status information of environment 100 or a user thereof with a third party, such as a facilitator of a package delivery, only when certain data is accessible to that third party. For example, system 164 may only share such status information when a facilitator entity queries system 164 with respect to particular unique package identification information (e.g., such information as may be generated at step 1906 and linked with a particular ordered package). Certain facilitator entities (e.g...
  • Federal Express may be trusted and enabled by platform 200 to interpret such unique package identification information for appropriately querying system 164 about such status information, and whereby system 164 may be configured to only share such status information when queried by a trusted entity (e.g., when the unique package identification information is known by or otherwise leveraged by an entity (e.g., a deliverer entity) trusted by system 164 and not just when any entity has access to the recipient and/or location data of the ordered package).
  • a trusted entity e.g., when the unique package identification information is known by or otherwise leveraged by an entity (e.g., a deliverer entity) trusted by system 164 and not just when any entity has access to the recipient and/or location data of the ordered package.
  • Status information of a smart system entity associated with unique package identification information of an ordered package may include various types of information that may be obtained and leveraged (e.g., at steps 1908/1910) by a facilitator entity for delivering the package in a manner that may be more efficient for the facilitator entity and/or that may be more convenient for environment 100 or a user thereof.
  • such status information may include information indicative of when to allow delivery to a particular location (e.g., after 4:00 PM on Mondays and Wednesdays only at environment 100), information indicative of preferred alternate delivery methods (e.g., do not deliver to environment 100 but rather hold a particular package at a particular deliverer pick up location for manual pick-up by a particular user, or deliver to another recipient and/or to another location other than the recipient and/or location initially defined at step 1902), information indicative of authorization to deliver without signed confirmation of receipt of delivery (e.g., a particular authenticated user of the system hereby authorizes deliverer to deliver a particular package to a particular location and leave next to the front door of that location without a human user signing for that delivery), and/or any other suitable information indicative of any other suitable delivery preferences or delivery instructions.
  • the facilitator may be operative to obtain status information associated with a smart environment of that other location (e.g., for repeating one or more steps of process 1900 with respect to that smart environment
  • status information may be provided to a facilitator on a macro-level in addition to or as an alternative to prov iding status information with respect to just one particular environment 100 and/or user thereof.
  • status information may be made available to a facilitator entity business 228 that may be generally indicative of a status or trend of a particular group of smart system entities (e.g., a neighborhood or ZIP code that may include multiple smart environments 100) that may include a smart system entity identified based on certain package information.
  • such status information may be indicative of certain days of the week or other suitable current or future periods when a majority or any suitable threshold amount of environments of a group of environments including an environment associated with certain package information are not available to receive packages, and such information may be leveraged by the facilitator entity to avoid scheduling deliveries to that entire group (e.g., neighborhood) of environments during those days.
  • Any suitable grouping of environments or users or other suitable smart system entities of any suitable size and type may be used to generate group or macro-level status information that may be made available to a facilitator entity for more efficiently handling business (e.g., deliveries) associated with that group.
  • platform 200 may protect the privacy and/or security of certain environments by not sharing status information associated specifically with only a particular single
  • environment 100 e.g., to preserve at least some anonymity about the status of a particular smart environment.
  • a facilitator entity business 228 may be configured to optimize package delivery. For example, data indicative of when a particular location may and may not be able to receive a package deliver ⁇ ' may be processed by any suitable distribution system to dictate when certain packages are dispatched for maximizing the likelihood of a successful physical deliver ⁇ '.
  • facilitator 228 may immediately deliver the package to environment 100, yet, in other embodiments, when status information is obtained at step 1908 indicative of no current availability of a target environment 100 to receive a package (e.g., not available for at least the next 4 hours), facilitator 228 may delay the delivery of the package to environment 100 (e.g., until new status information may be obtained at a later use of step 1908).
  • facilitator 228 may immediately deliver the package to environment 100, yet, in other embodiments, when status information is obtained at step 1908 indicative of an instruction to deliver a package to a new- target environment 100a rather than an initial target environment 100, facilitator 228 may repeat one or more of steps 1904-1910 with respect to smart environment data associated with that new target environment 100a. This may reduce overhead costs for a delivery entity (e.g., reduce fuel prices and wasted man hours by limiting the number of failed delivery attempts) and/or may reduce insurance costs by limiting the exposure of perishable contents from unnecessary and degrading delivery effects.
  • a delivery entity e.g., reduce fuel prices and wasted man hours by limiting the number of failed delivery attempts
  • insurance costs by limiting the exposure of perishable contents from unnecessary and degrading delivery effects.
  • steps 1902, 1904, 1906, 1908, and 1910 may be at least partially or completely automated using one or more computer systems (e.g., computer system 1500 and/or computer system 1600) that may be leveraged by one or more of environment 100, system 164, facilitator entity business 228, and the like for automatically associating a smart system entity of system 164 with an ordered package and then sharing certain status information of that smart system entity with a deliverer or other facilitator entity at any suitable time for positively affecting the delivery of the package.
  • a user of system 164 may actively and manually define certain preferences or instructions to be shared with facilitator entity businesses 228 for affecting the delivery of a particular ordered package currently associated with that user or for affecting the delivery of any package that may be associated with that user in the future.
  • the delivery of ordered packages associated with a user or environment may be based on inferences made by system 164 and selectively shared with facilitator entity businesses 228 (e.g., without any active manual preferences made by the user but instead done transparently to a user).
  • steps 1904-1910 may be carried out transparently to a system user (e.g., to a recipient of package PL) by platform 200 based on any status information that may be determined automatically by system 164 and/or based on previously defined settings made by a system user.
  • an entryway interface device such as a smart doorbell 106, may be provided at a suitable entryway of a suitable portion of a smart environment 100 for initiating or otherwise facilitating interaction between a delivery entity and smart environment 100 that may efficiently handle a package delivery attempt (e.g., to reduce delivery failures, to increase user satisfaction and convenience, and/or to minimize risk of package theft).
  • one or more sensing components 828 or other suitable components of doorbell 106 in combination with rules-based inference engines or artificial intelligence or any other suitable processing components of platform 200 provided at a central server such as system 164 or otherwise may be used to detect when a package is attempted to be delivered to smart- home environment 100 and to take a variety of automated actions in response.
  • sensing components 828 may be operative to "see” the uniform of a delivery person approaching doorbell 106 or the truck of the delivery person, or the sensors can "hear” a delivery drone or hear a delivery truck in combination with footsteps of a delivery person approaching the door within a period after hearing the truck.
  • doorbell 106 may be configured to ask the suspected deliverer (e.g., using speaker 838) if he or she is a delivery person, to which that person can reply with an audible response or by indicating as such on user interface 812 of doorbell 106. If the person is making a delivery, doorbell 106 can be configured to instruct the person to place the package in a suitable location proximate doorbell 106 such that its scanner or any other suitable sensing component 828 can scan the bar code or other type of identifying tag affixed to or associated with the package being delivered for detecting suitable package identification information.
  • the suspected deliverer e.g., using speaker 838
  • doorbell 106 can be configured to instruct the person to place the package in a suitable location proximate doorbell 106 such that its scanner or any other suitable sensing component 828 can scan the bar code or other type of identifying tag affixed to or associated with the package being delivered for detecting suitable package identification information.
  • a central server such as system 164, can use the bar code or any suitable data detected directly from the deliverer or local package to obtain information about the package, such as the sender, recipient, a description of the item therein, whether signature is required, etc.
  • rules-based inferences engines or artificial intelligence or otherwise of platform 200 may be operative to make one or more inferences regarding any action to take next. For example, if occupants or, more particularly, if a specified recipient or recipients are in the home and the package is from a sender or contains an item that is of particular interest to the one or more occupants, an announcement can be made in the home, indicating the package is currently being dropped off and providing details about the package.
  • doorbell 106 can be configured to provide authorization to the deliverer to leave the package.
  • doorbell 106 may be operative to present an authorization code (e.g., in plain text, barcode, or encrypted forms) via any suitable output component of doorbell 106 and may prompt the deliverer to use a deliverer device to record, scan, photograph, or otherwise acquire the authorization code.
  • an authorization code e.g., in plain text, barcode, or encrypted forms
  • doorbell 106 can then instruct the deliverer regarding how to properly leave the package at environment 100, such as at the front door, around the back of the house in a discrete location, etc.
  • FIG. 20 is a flowchart of an illustrative process 2000 for enhancing visitor handling (e.g., package delivery).
  • process 2000 may include detecting visitor information of a visitor at an entryway interface dev ice of a smart environment, where such a visitor may be a deliverer and such visitor information may be package information associated with a package provided by the deliverer at the entryway interface device of the smart environment.
  • a deliverer DL arrives with a package PL at a portion of environment 100 (e.g., at a door entry point 186 of structure 150 of environment 100)
  • smart doorbell 106 may be configured to detect any suitable package information associated with package PL.
  • doorbell 106 may be operative to receive certain package identification information from deliverer DL, such as by deliverer DL actively physically communicating such package identification information to doorbell 106 (e.g., audibly to an audio sensor 828 of doorbell 106) and'or by deliverer DL electronically communicating such package identification information to a networking communication component 868 or scanner sensor 828 of doorbell 106 (e.g., by
  • doorbell 106 may be operative to access certain package identification information directly from package PL, such as by a scanner sensor 828 of doorbell 106 scanning information
  • Such detected package identification information may include any suitable information that may identify any suitable
  • characteristic of the package or of its attempted delivery such as an identity of an orderer of the package (e.g., the entity that placed an order for the package at step 1902 of
  • an identity of a facilitator of the package e.g., a fulfillment entity that may have processed the order for the package at step 1902 of process 1900, a deliverer entity that may be responsible for deliverer DL bringing package PL to environment 100, etc.
  • an identity of the time and data of the currently attempted delivery an identity of an intended recipient of the package (e.g., the recipient indicated during placement of the order by the orderer or an updated recipient as may be defined by updated status information generated by a smart system entity (e.g., during process 1900 as described above)), an identity of an intended delivery location of the package (e.g., the delivery location indicated during placement of the order by the orderer or an updated delivery location as may be defined by updated status information generated by a smart system entity (e.g., during process 1900 as described above)), an identity of the content of the package (e.g., a description of the specific content or any suitable information describing certain attributes of the content
  • any suitable delivery requirements for the package e.g., a requirement that a particular user or a particular type of user (e.g., an adult) must sign for the package to enable delivery, etc.
  • a particular user or a particular type of user e.g., an adult
  • Such detected package identification information of step 2002 may be unique package identification information that may be initially generated or at least partially defined by system 164 of platform 200 based on smart environment data of a smart system entity associated with the package prior to the delivery attempt (e.g., as described above with respect to step 1906 of process 1900), where such "smart" unique package identification information may be detected by doorbell 106 directly from deliverer DL or device 266 of deliverer DL and/or from package PL (e.g., from label ID).
  • package PL e.g., from label ID
  • such detected package identification information of step 2002 may be conventional package identification information, such as handwritten addressee information that may be manually entered on a shipping label ID of the package by a human or any other conventional delivery shipping label information.
  • the delivery attempt may be for a package that does not include any shipping label ID at all.
  • package PL may simply be a plate of cookies that a friendly neighbor has made and is attempting to deliver as
  • the information associated with the package that may be detected by doorbell 106 may be captured image data of deliverer DL and/or package PL (e.g., as may be captured by a camera sensing component 828 of doorbell 106), spoken word data as may be provided by deliverer DL describing the delivery of package PL (e.g., as may be captured by an audio sensing component 844 of doorbell 106), textual data as may be entered by deliverer DL describing the delivery of package PL (e.g., as may be captured by a keyboard user interface input component 812 of doorbell 106), or any other suitable data that may be detected by doorbell 106 via any suitable data path regarding deliverer DL and/or package PL.
  • image data of deliverer DL and/or package PL e.g., as may be captured by a camera sensing component 828 of doorbell 106
  • spoken word data as may be provided by deliverer DL describing the delivery of package PL
  • audio sensing component 844 of doorbell 106 e.
  • Doorbell 106 may be configured to detect any suitable package identification information at step 2002 in any suitable way, such as by instructing a detected deliverer DL to share such information (e.g., by instructing deliverer DL to position an appropriate portion of package PL (e.g., label ID) in an appropriate location (e.g., using any suitable output component of doorbell 106 or other smart device) such that a sensing component 828 of doorbell 106 may be able to access information therefrom), or doorbell 106 may be configured to automatically detect any suitable package identification information without requiring any specific activity on behalf of the deliverer DL (e.g., doorbell 106 may automatically detect suitable package identification information whenever a deliverer DL arrives with package PL within a particular distance of doorbell 106 (e.g., via NFC or RFID or Bluetooth technology)).
  • a suitable package identification information e.g., by instructing deliverer DL to position an appropriate portion of package PL (e.g., label ID) in an appropriate location (e.g., using any
  • deliverer DL or package PL is detected by doorbell 106, either in response to a deliverer actively identifying itself or the package to doorbell 106, or in response to doorbell 106 automatically identifying the deliverer and/or the package, certain types of information may be accessed for analysis by environment 100 (e.g., time and date of attempted delivery, identification of deliverer, recipient, content of package, any delivery requirements, etc.).
  • process 2000 may include analyzing the detected visitor information (e.g., the detected package identification information) of step 2002 (e.g., in conjunction with any other suitable data available to platform 200, such as settings of a current mode of environment 100 or of a user).
  • the detected visitor information e.g., the detected package identification information
  • doorbell 106 in response to detecting such package identification information at step 2002 with respect to deliverer DL and/or package PL, doorbell 106, alone or in combination with other smart devices and/or rales-based inference engines and/or artificial intelligence provided locally at environment 100 and/or in conjunction with system 164 and/or any other components) of services platform 200 (e.g., business 228), may be operative, at step 2004, to access any suitable additional information based on that detected package identification information that may be useful (e.g., identification of the sender, intended recipient, intended delivery location, deliverer, description of the contents of package PL, whether signature is required to complete the delivery, etc.) and/or any other suitable data available to platform 200 (e.g., setting information of a current mode of environment 100 and/or of a system user), and then to analyze all such available information for determining whether or not to take one or more of a variety of automated actions based on that detected package identification information and/or any additionally accessed information.
  • any suitable additional information based on that detected package
  • Certain package identification information may be directly determined by doorbell 106 from any suitable initial data provided by deliverer DL and/or package PL (e.g., via data communication paths 105 or 107) while other package identification information may be accessed by doorbell 106 from other sources based on such initial data (e.g., from sendee 164 and or business 228 via service 164).
  • a unique code that may be scanned by doorbell 106 from label ID at package PL may be a unique identifier that doorbell 106 may share with service 164 such that service 164 may access particular types of data associated with that identifier (e.g., recipient, content, etc.) from facilitator business 228.
  • such particular recipient and content data may be locally obtained by doorbell 106 directly from package PL or deliverer DL (e.g., via path 107 from device 266, which may or may not be accessing such data from server data of business 228 via internet 162).
  • a facilitator entity 228 may be configured to or otherwise allowed to obtain current status information of a smart system entity associated with package PL (e.g., at step 1908)
  • environment 100 e.g., in conjunction with system 164
  • Any rules or instructions that may be obtained, generated, or otherwise determined by platform 200 (e.g., environment 100 and/or system 164) at step 2004 based on the detected package identification information of step 2002 may be leveraged in any suitable way for positively affecting the delivery attempt of package PL.
  • environment 100 may analyze that package data in combination with any suitable smart environment data or rules or settings or inferences or modes that may be associated with environment 100 or any user or other smart system entity that may be associated with the package data and/or with environment 100 so as to determine one or more ways in which to efficiently handle the delivery attempt of package PL at doorbell 106.
  • Such smart environment data that may be analyzed or processed in conjunction with any package data and/or visitor/deliverer data may include any suitable data associated with a smart environment user (e.g., a user that has been identified as an intended recipient of the package or any other user associated with environment 100) and/or any suitable data associated with the smart environment itself, such as the current and/or anticipated future location of the smart environment user (e.g., location within
  • environment 100 or outside of environment 100, such as with respect to
  • geo-fences 1730/1734 e.g., the user is currently driving towards environment 100 and will arrive at environment 100 within 2 minutes, so as to receive the package
  • the current and/or anticipated future status or mode of a smart environment user e.g., sleeping, busy, on the telephone, etc.
  • the current and/or anticipated future mode of the environment or user e.g., a do-not-disturb mode, etc.
  • Any suitable smart environment data described herein with respect to any smart device of environment 100 or in conjunction with any other feature of platform 200 may be analyzed or otherwise processed at step 2004 in conjunction with any package information that may be associated in any way with a package delivery attempt detected at step 2002 in order to initiate or otherwise prompt (e.g., with doorbell 106 and/or other suitable components of environment 100 and/or platform 200) any suitable action(s) for positively affecting the handling of a visitor (e.g., the deliver ⁇ ' attempt of package PL (e.g., at one or more of steps 2005-2012 of process 2000)).
  • a visitor e.g., the deliver ⁇ ' attempt of package PL (e.g., at one or more of steps 2005-2012 of process 2000)
  • doorbell 106 may be operative to indicate to deliverer DL that doorbell button 812 is disabled (e.g., to prevent deliverer DL from even bothering to try to contact an occupant through interaction with button 812). In some particular embodiments, as described below in more detail, doorbell 106 may be operative to indicate that doorbell button 812 is disabled in order to prevent any visitor from even bothering to try to contact an occupant through interaction with button 812, at least until certain visitor detection and analysis has been completed by system 164.
  • process 2000 may include adjusting the functionality of at least one smart device of environment 100 based on the analysis of step 2004 or even based solely on the detection of step 2002.
  • smart environment 100 may be operative to turn on a light (e.g., outdoor lighting 1 14) to increase the safety of the visitor and/or to increase the security of environment 100.
  • smart environment 100 may be operative to emit any suitable sound (e.g., a dog bark or a greeting) from any suitable smart device (e.g., from audio speaker 836 of doorbell 106) to increase the awareness of the visitor with respect to environment 100.
  • smart environment 100 may be operative to lock any unlocked entry ways to structure 150 (e.g., by locking smart doorknob 122) to increase the security of
  • process 2000 may include communicating with a user associated with the smart environment based on the analysis of step 2004.
  • the analysis of step 2004 determines that an intended recipient of package PL is a user that is currently located at environment 100 and is in an active and available state (e.g., not sleeping, on the telephone, or in any another do-not-disturb state, as may be determined by smart environment 100)
  • smart environment 100 may be operative to communicate information indicative of the current package delivery attempt to that user in any suitable way at step 2006 (e.g., by audibly announcing any suitable information related to the delivery attempt of the particular package via an audio speaker of a smart device that may be located most proximal to the current location of that user within environment 100).
  • smart environment 100 may be operative to communicate information indicative of the current package delivery attempt to that user via system 164 in any suitable way at step 2006 (e.g., by transmitting an electronic message to a personal device 166 associated with that user).
  • the user may communicate in any suitable way a response back to environment 100 (e.g., via any suitable smart device (e.g., hazard device 104 or device 166) to any suitable component of environment 100 or system 164, where such communication may be indicative of how the user would like environment 100 to handle the detected deliver ⁇ ' attempt.
  • the user may instruct any suitable device of environment 100 that the user does not wish to directly interface with the deliverer but that the delivery should be completed or carried out in some particular automated manner by environment 100 and the deliverer.
  • the user may communicate to environment 100 that the user will interface with the deliverer locally, whereby the user may move towards entry point 186 for physically interacting with deliverer DL to receive package PL.
  • the user may communicate to environment 100 that the user will interface with the deliverer remotely via one or more devices of environment 100 or system 164, whereby environment 100 may enable the user to communicate via a first smart device (e.g., a hazard device 104 of environment 100 that may be proximate to user UL local to environment 100 or a personal device 166 of user UL or UR whether the user is local to or remote from environment 100) and whereby environment 100 may enable deliverer DL to communicate via a second smart device (e.g., doorbell 106 or other suitable device of environment 100), such that the interconnectivity of those devices of environment 100 may facilitate effective
  • a first smart device e.g., a hazard device 104 of environment 100 that may be proximate to user UL local to environment 100 or a personal device 166 of user UL or UR whether the user is local to or remote from environment 100
  • a second smart device e.g., doorbell 106 or other suitable device of environment 100
  • process 2000 may reduce the burden of the deliverer while also retaining certain privacy of the user by utilizing system 164 as an intermediary between the user and the deliverer such that certain types of contact information or ways of communicating with the user are guarded and protected by system 164 and not necessarily shared with the deliverer while still enabling communication between the deliverer and the user via such ways of communication.
  • system 164 may enable communication between the user and the deliverer without sharing the whereabouts or contact information of the user with the deliverer.
  • a user may communicate with system 164 via any suitable communication enabled by a smart device of environment 100 when the user (e.g., user UL) is local to environment 100 (e.g., via gestures, as may be described above with respect to smart device 104, via touch input via a touch user interface, audible spoken commands, etc.) and/or via any suitable communication enabled by a system 164 when the user is local to or remote from (e.g., user UR) environment 100 (e.g., via a user device 166).
  • a smart device of environment 100 when the user (e.g., user UL) is local to environment 100 (e.g., via gestures, as may be described above with respect to smart device 104, via touch input via a touch user interface, audible spoken commands, etc.) and/or via any suitable communication enabled by a system 164 when the user is local to or remote from
  • process 2000 may include providing the visitor (e.g., the deliverer) with feedback based on at least one of the analysis of step 2004 and any communication of step 2006.
  • the analysis of step 2004 determines that there are currently no occupants local to environment 100 or otherwise in an active and available state, and/or when no user response is received for any communication attempt of step 2006
  • system 164 may be operative to determine that smart environment 100 may handle the attempted delivery without active user input and doorbell 106 may provide the deliverer at step 2008 with instructions or other suitable feedback on how to proceed with the delivery.
  • system 164 may be operative to determine that a user of smart environment 100 may at least partially handle the attempted delivery and doorbell 106 may provide the deliverer at step 2008 with instructions or other suitable feedback on how to proceed with the delivery.
  • the type of feedback that may be provided via doorbell 106 to the deliverer at step 2008 may vary based on the analysis of step 2004 and/or any communication of step 2006.
  • the feedback may include active communication from the user to the deliverer via doorbell 106 (e.g., audio and/or visual or other suitable information may be conveyed to the deliverer by doorbell 106, where such information may be generated and transmitted by or otherwise under the control of the user via another smart device that the user may directly interface with and that may be communicatively coupled to doorbell 106).
  • the feedback may include automated instructions generated by system 164 for communication to the deliverer via doorbell 106 (e.g., a message that may communicate that "a user is not currently able to actively receive the package right now, please do the following to complete the deliver ⁇ '. ..”, etc.).
  • the feedback may include providing certain environment access to the deliverer, such as by opening door 186 by unlocking doorknob 122 for a certain amount of time (e.g., if deliverer DL is approved by system 164 as an expected and/or authorized deliverer (e.g., through analysis of a label ID), door 186 may be unlocked such that deliverer DL may be enabled to enter structure 150 for delivering package PL within structure 150).
  • a deliverer device 266 may be operative to be communicatively coupled with a smart device of environment 100 and feedback may be communicated by such a smart device to deliverer device 266 for receipt by the deliverer via an output of deliverer device 266 (e.g., device 266 may be communicatively coupled with a communication component 862 via path 107 (e.g., paired via BlueTooth or any other suitable protocol) and such feedback may be communicated via path 107 and then provided to the deliverer via any suitable output component of device 266).
  • a communication component 862 e.g., paired via BlueTooth or any other suitable protocol
  • process 2000 may include detecting an act of the visitor (e.g., an act of the deliverer with the package) based on the provided feedback of step 2008 (e.g., an act performed by the visitor in response to the provided feedback).
  • Doorbell 106 and/or any other smart device of environment 100 may be configured to detect an action of deliverer DL and/or package PL at step 2010 in response to system 164 providing deliverer DL with feedback at step 2008, where that action may be any suitable action indicative of deliverer handling package PL in a particular way.
  • doorbell 106 may detect such placement of package PL at step 2010.
  • doorbell 106 of environment 100 may detect a confirmatory response provided by deliverer DL that the request will be followed (e.g., directly from deliverer DL at a user interface component 812/844 of doorbell 106 or from deliverer device 266 via path 107 at a communications component 862 of doorbell 106) or a confirmatory communication by a smart device of the neighboring environment that may confirm receipt of the package).
  • a confirmatory response provided by deliverer DL that the request will be followed (e.g., directly from deliverer DL at a user interface component 812/844 of doorbell 106 or from deliverer device 266 via path 107 at a communications component 862 of doorbell 106) or a confirmatory communication by a smart device of the neighboring environment that may confirm receipt of the package).
  • Any suitable action of deliverer DL and/or of package PL may be detected or otherwise received by any suitable component of environment 100 and/or of system 164 at step 2010, where such detection may enable system 164 to update system-information about the status of the attempted delivery (e.g., successfully delivered at front door 186, successfully delivered to neighbor ABC, to be re-delivered at time XYZ, etc.).
  • a deliverer DL may communicate with system 164 at step 2010 via any suitable
  • a smart device of environment 100 accessible by deliverer DL e.g., via gestures at doorbell 106, as may be described above with respect to smart device 104, via touch input via a touch user interface, audible spoken commands, etc.
  • any suitable communication enabled by system 164 and deliverer device 266 e.g., via gestures at doorbell 106, as may be described above with respect to smart device 104, via touch input via a touch user interface, audible spoken commands, etc.
  • process 2000 may include communicating with at least one of the user and the visitor (e.g., the deliver) based on the detected act of step 2010.
  • Doorbell 106 and/or any other smart device of environment 100 may be configured to confirm detection of an action of deliverer DL and/or package PL with deliverer DL (e.g., by communicating any suitable confirmation information directly to deliverer DL or to delivery device 266 via doorbell 106 or to delivery business 228 via system 164 of platform 200).
  • doorbell 106 and/or any other component of environment 100 and/or system 164 may be configured to confirm detection of an action of deliverer DL and/or package PL with a user of environment 100 (e.g., by communicating any suitable
  • step 2006 confirmation information to the user via any suitable smart device or personal device of the user, similarly to any communication of step 2006).
  • This may enable deliverer DL and/or the user to remain updated with respect to the current status of the attempted delivery as determined by environment 100 of system 164 (e.g., successfully delivered at front door 186, successfully delivered to neighbor ABC, to be re-delivered at time XYZ, etc.).
  • Such communication of step 2012 may enable deliverer DL to know whether or not any action performed at step 2010 was successfully detected by system 164, thereby removing any doubt about the status of the delivery.
  • This may also create an electronic receipt or trail of the attempted delivery, not only for the particular deliverer DL and/or a user of
  • confirmation of delivery status being electronically or otherwise generated by system 164 rather than by delivery entity business 228, the confirmation may be considered even more reliable or leveraged in combination with any similar confirmation data that may be generated by delivery business 228 (e.g., based on manual entry into deliveiy device 266 by deliverer DL) to ensure accurate delivery status is available to platform 200.
  • system 164 may serve as a secondary or impartial source of information regarding the delivery of packages carried out by delivery entity business 228. This may increase the efficiency and/or effectiveness of delivery entity business 228 and/or may lower overhead costs (e.g., insurance costs) of deliver ⁇ ' entity business 228, as system 164 may provide a new source of accurate and real-time electronic data that may be made available to delivery entity business 228 for use in managing its package delivery tasks while also not being as dependent on delivery data provided by its own deliverers DL.
  • overhead costs e.g., insurance costs
  • a user may be able to have access to an up-to-date status of a package delivery while also being enabled to virtually communicate with a deliverer during a delivery attempt in a manner that is convenient and secure for the user and the deliverer.
  • steps 2002-2012 of process 2000 may be repeated for a particular delivery attempt of a particular package or for any other visitor handling.
  • a user in response to analysis at step 2004 of any package deliveiy information detected at step 2002, a user may comimmicate with the smart environment at step 2006 and that user communication may be shared with deliverer DL at step 2008, in response to which an action of deliverer DL may be detected by the smart environment at step 2010 and that detected action may be communicated back to the user at step 2012, in response to which the user may once again communicate with the smart environment at step 2006 based on that communicated detected action, thereby repeating at least part of process 2000. Therefore, process 2000 may support a virtual conversation between deliverer DL and a user or service 164 as an automated agent of the user.
  • communication of certain package information to a user at step 2006 may equip the user with the ability to decide how the user may want the delivery attempt to be handled. For example, the user may decide to go meet the deliverer at door 186 for personally receiving the package, or the user may remotely instruct the deliverer to leave the package at a certain location via a communication path supported by environment 100 (e.g., via doorbell 106 and any other suitable device) such that the user may actively determine at least a portion of the feedback that may be provided to the deliverer at step 2008.
  • environment 100 e.g., via doorbell 106 and any other suitable device
  • system 164 may be configured to determine and generate the feedback provided to the deliverer at step 2008 without any active input from the user. Such feedback may instead be automatically determined based on inferences or rules of platform 200 (e.g., system 164) and/or any restrictions that may be applicable to the particular delivery (e.g., user signature required).
  • feedback provided at step 2008 may include an instruction for deliverer DL to simply leave package PL at door 186 or to deliver package PL to a neighbor or to re-attempt the delivery at another time that may be specified (e.g., a time that may be determined by system 164 as when an appropriate system user is expected to be available at environment 100 for receiving a delivery).
  • a signature or any other suitable type of acknowledgment of receipt of the package is required in order to complete delivery (e.g., as may be detected through the package information detected and analyzed at steps 2002 and 2004)
  • feedback provided at step 2008 by doorbell 106 may include certain data that may satisfy that receipt acknowledgment requirement.
  • system 164 may have access to any suitable trusted security information that may also be known by or validated by delivery business 228, whereby use of such information by system 164 within feedback provided to deliverer DL at step 2008 may be received and confirmed by delivery business 228 as an acceptable form of waiver of responsibility or acknowledgment such that deliverer DL may be able to leave package PL at environment 100 without actively receiving a signature of a user.
  • doorbell 106 may present an authorization code (e.g., in plain text, as any suitable code, or encrypted forms) on a user interface (e.g., on a display 830) as at least a portion of feedback at step 2008 and may prompt deliverer DL to use deliverer device 266 to record, scan, photograph, or otherwise acquire the authorization code for authentication and acceptance (e.g., as a detectable act at step 2010).
  • a user interface e.g., on a display 830
  • deliverer DL may prompt deliverer DL to use deliverer device 266 to record, scan, photograph, or otherwise acquire the authorization code for authentication and acceptance (e.g., as a detectable act at step 2010).
  • doorbell 106 may be operative to then instruct deliverer DL with respect to where to leave package PL.
  • Communication between deliverer DL and a system user of system 164 may include various types of conversation types.
  • deliverer DL may specifically dictate when and how package PL will be delivered.
  • deliverer DL in response to system 164 providing feedback to deliverer DL at step 2008 indicative of the fact that a user of environment 100 is not available to activ ely communicate with deliv erer DL for facilitating completion of the delivery, deliverer DL may communicate information to system 164 (e.g., via doorbell 106) at step 2010 that may be indicative of the fact that deliverer DL is going to return package PL to a suitable pick-up location
  • system 164 may confirm receipt of that information to deliverer DL and/or may share such information with a user at step 2012. Such a situation may enable the user to be informed of the pick-up status of the package PL in real-time or as soon as the user is able to receive such a communication from system 164, thereby allowing the user to conveniently swing by that pick-up location to retrieve package PL on the user's way home to
  • system 164 may immediately and automatically share such notification information with a user electronically (e.g., via e-mail or text messaging or any other suitable system communication with the user) such that the user need not waste time by driving home to receive a paper notice only to turn right around and drive to the pick-up location to retrieve the package).
  • Such interaction between deliverer DL and system 164 (e.g., via doorbell 106) and such interaction between system 164 and a system user may not only increase the convenience for the user, but may also increase the efficiency of deliverer DL (e.g., by saving paper notices and removing doubt as to whether the notice will be received by the user).
  • the automated communication of such notice information may be provided to a system user without requiring or even allowing direct communication between deliverer DL and the user, thereby enabling system 164 to remain a custodian of certain contact information and whereabouts information of the user.
  • communication between deliverer DL and a system user of system 164 may include two-way communication.
  • a real-time virtual two-way conversation between a user and a deliverer DL at doorbell 106 may be enabled by system 164.
  • a user may communicate a request to system 164 at step 2006 (e.g., "I am unable to come to the door to sign for the package, what are my options?") that may then be provided by system 164 to deliverer DL at step 2008 (e.g., relayed as audio data from an audio sensing device at the user to audio output data from doorbell 106), in response to which deliverer DL may provide a response with one or more options for the user
  • system 164 e.g., doorbell 106
  • system 164 e.g., doorbell 106
  • the user may again communicate to deliverer DL with his decision.
  • a delayed response virtual conversation between a user and a deliverer DL may be enabled by system 164.
  • system 164 may communicate to deliverer DL (e.g., via doorbell 106) at step 2008 that a user of environment 100 is not available to actively communicate with deliverer DL for facilitating completion of the delivery.
  • deliverer DL may communicate information to system 164 (e.g., via doorbell 106) at step 2010 that may be indicative of the fact that deliverer DL will re- attempt to deliver package PL at environment 100 tomorrow.
  • system 164 may confirm receipt of that information to deliverer DL and may share such information with a user at step 2012 (e.g., automatically or immediately after such detection). However, at some later time that same day (e.g., after deliverer DL and package PL have left environment 100), a system user may actually digest that information as shared with it by system 164.
  • system 164 may be configured to enable the user to share such a desire with deliver ⁇ ' business 228 for systematically altering the delivery strategy.
  • system 164 may be operative to provide an intuitive application or user interface (e.g., on the user's device 166 or via any smart device of environment 100) that may enable a user to select from any available options for altering the delivery strategy, where such options may be known or otherwise determined by system 164 based on the package information detected at steps 2002/2004 and/or based on any other suitable information that may be made available to system 164 (e.g., from delivery business 228 via an API 210 or otherwise)). A user-selected option may then be automatically communicated from system 164 to delivery business 228 for updating the planned delivery strategy of package PL, thereby increasing the efficiency and/or convenience of the delivery process.
  • an intuitive application or user interface e.g., on the user's device 166 or via any smart device of environment 100
  • a user-selected option may then be automatically communicated from system 164 to delivery business 228 for updating the planned delivery strategy of package PL, thereby increasing the efficiency and/or convenience of the delivery process.
  • Various types of feedback may be provided to deliverer DL by system 164 (e.g., via doorbell 106) at step 2008 and, responsive thereto, deliverer DL may commit various types of acts that may be detected by system 164 (e.g., via doorbell 106) at step 2010 for advancing the attempted delivery of package PL.
  • platform 200 e.g., via doorbell 106
  • environment 100 and/or system 164 may be configured to enable secure drop-off of package PL by deliverer DL at environment 100 when a system user is unable to physically receive package PL from deliverer DL at environment 100 (e.g., when no user is at environment 100 or when a user is at environment 100 but currently unavailable for active package receipt (e.g., when the user is sleeping or otherwise pre-occupied or otherwise unfit to meet deliverer DL)).
  • Certain steps may be taken by system 164 and/or certain features of environment 100 may be enabled so as to increase the security and reliability of such an "unsupervised" drop-off, otherwise such a drop-off may not be approved by delivery business 228 (e.g., such an act may not meet insurance standards of business 228) or may not be of interest to a user (e.g., such an act may not meet the security interests of the user).
  • platform 200 e.g., system 164 in conjunction with environment 100
  • an unsupervised drop-off may be enabled when
  • environment 100 is configured with an ability to receive and retain package PL in a secure location that may be trusted by both deliverer DL and a system user.
  • a certain secure area of environment 100 may be temporarily made accessibly by system 164 to deliverer DL (e.g., by feedback at step 2008) such that deliverer DL may deposit package PL within that secure area (e.g., at step 2010) for later retrieval by a trusted system user (e.g., the intended recipient).
  • a trusted system user e.g., the intended recipient
  • Any suitable secure area may be provided by environment 100 for this purpose.
  • structure 150 may include a lobby (not shown) just beyond entry point door 186 that itself may be separated by the remainder of structure 150 by another locked door, and system 164 may be configured to temporarily unlock door 186 (e.g., via smart doorknob 122) for granting deliverer DL temporary access to that lobby for depositing package PL therein.
  • a lobby may be a shared lobby amongst multiple distinct tenants (e.g., a shared lobby of a multi-residence apartment building).
  • the lobby may include an area that may otherwise be selectively accessible to mailmen (e.g., via a shared key that Postal Service workers often times are equipped with in urban areas where large apartment buildings are common).
  • Such temporary access as may be granted by system 164 in response to suitable detection and analysis may overcome the need for certain deliverers to carry around one or more master keys for certain neighborhoods or apartment buildings, which may also reduce security concerns for the building while increasing the efficiency and effectiveness of deliverers to securely deposit packages in areas of an environment 100 that have at least a certain amount of security provided to it (e.g., due to a front door of a lobby that is generally accessible only by trusted occupants of the building and not by any visitor attempting to gain access to the building).
  • a smart safe e.g., a smart appliance 1 13
  • environment 100 adjacent doorbell 106 external to structure 150 e.g., smart appliance 113a
  • the interior of which may be selectively and temporarily made accessible to deliverer DL e.g., via any suitable control signals of system 164 or environment 100 (e.g., via
  • doorbell 106) for enabling placement of package PL therein.
  • Any such secure area e.g., a lobby, a safe, etc.
  • system 164 e.g., automatically through system processing and control
  • platform 200 may be securely monitored by platform 200 during such temporary access in order to ensure that deliverer DL positions package PL in that area and/or to ensure that nothing is removed from that area during the period of that temporary access.
  • One or more sensing components 828 of doorbell 106 or of any other smart device of environment 100 may be configured to at least partially carry out such monitoring (e.g., a sensing component within the secure area or external to the secure area but that may sense activity within the secure area and/or at the temporarily accessible opening to the secure area may be activated and/or enhanced (e.g., by platform 200) during such temporary accessibility for securely monitoring the activity of deliverer DL during that accessibility). Additionally or alternatively, one or more output components of doorbell 106 or of any other smart device of environment 100 may be configured to at least partially indicate to deliverer DL where and how to deposit the package securely.
  • System 164 may require that a certain level of trust be achieved between platform 200 (e.g., environment 100 and/or system 164) and deliverer DL before enabling such temporary access to such a secure area of environment 100.
  • platform 200 e.g., environment 100 and/or system 164
  • deliverer DL may be retrieved and analyzed at steps 2002 and 2004 prior to enabling such an "unsupervised" drop-off, such as specific identification data of the particular deliverer DL and/or of the particular package PL at doorbell 106 that system 164 may be able to confirm or cross-check with a taisted delivery business 228 (e.g., via an API 210 of platform 200 between system 164 and business 228).
  • a taisted delivery business 228 e.g., via an API 210 of platform 200 between system 164 and business 228,.
  • system 164 may confirm the identity of deliverer DL and/or package PL based not only on identification data that may be provided to system 164 locally at environment 100 (e.g., via doorbell 106) but also on data that may be provided to system 164 from business 228 remotely from environment 100 (e.g., via an API 210), such that a visitor may not attempt to gain access to a secure area of environment 100 by fraudulently purporting to be a deliverer associated with a trusted delivery entity business 228.
  • identification data may be provided to system 164 locally at environment 100 (e.g., via doorbell 106) but also on data that may be provided to system 164 from business 228 remotely from environment 100 (e.g., via an API 210), such that a visitor may not attempt to gain access to a secure area of environment 100 by fraudulently purporting to be a deliverer associated with a trusted delivery entity business 228.
  • locally-obtained deliverer/package identification data with known or expected whereabouts status data for a particular deliverer/package may be utilized by system 164 for any suitable situation at steps 2002/2004 in order to improve the security of an attempted package delivery.
  • system 164 may be operative to instruct deliverer DL (e.g., via doorbell 106) how to carry out such an unsupervised drop-off.
  • doorbell 106 may be configured to audibly instruct deliverer DL as to where to find a secure drop-off area that may be made temporarily accessible to the deliverer for securing package PL (e.g., via audio speaker 836 that may provide any suitable audio output, such as a verbal instruction to "open the safe just to the right of the front door, place the package therein, and then close the safe").
  • doorbell 106 may be configured to visually instruct deliverer DL as to where to find a secure drop-off area that may be made temporarily accessible to the deliverer for securing package PL (e.g., via user interface 812 and/or projector/display 830).
  • system 164 may also control the secure area for enabling deliverer DL to have access thereto (e.g., by unlocking a door to a safe).
  • system 164 may be configured to securely monitor that secure area during the period when the secure area is made accessible (e.g., by leveraging any suitable monitor sensing components 828 of doorbell 106 and/or any suitable sensing components of the secure area itself or otherwise (e.g., any cameras that may be provided by a smart safe appliance, etc.)). Such monitoring may be leveraged not only to confirm that a particular package PL is secured within the secure area but also to confirm that nothing is removed from the secure area.
  • one or more sensors of environment 100 may be configured to detect label ID or any other suitable identifier of package PL intermittently and/or continuously during the process of placing package PL within the secure area such that system 164 may detect and confirm that package PL has been positioned with the secure area (e.g., steps 2010 and 2012).
  • one or more sensors of environment 100 may be configured to monitor the access point of such a secure area continuously during the process of placing package PL within the secure area such that system 164 may confirm that nothing is removed from the secure area.
  • Such confirmation of proper drop-off of package PL may be shared with delivery entity business 228 by system 164 (e.g., via API 210) and/or with deliverer DL (e.g., via doorbell 106) and/or with a system user (e.g., via a user device 166 or any suitable smart device).
  • system 164 may be configured to terminate the accessibility to the secure area (e.g., by locking the door to the safe).
  • system 164 may enable proper drop-off of package PL by designating a certain area of environment 100 as an area at which package PL may be left and adequately securely monitored by system 164 (e.g., doorbell 106). For example, at step 2008, rather than instructing deliverer DL towards a safe or lobby that may be temporarily made accessible to deliverer DL for depositing package PL, system 164 may leverage doorbell 106 or any other suitable smart device of environment 100 to instruct deliverer DL towards an open area at which deliverer DL may deposit package PL. As shown in FIG.
  • one or more components of doorbell 106 may be operative to generate and display to deliverer DL a suitable deposit area AL at which package PL may be dropped-off (e.g., light from projector 830 may shine to identify area AL on any suitable surface, or instructions provided on a display user interface 812 or audible instructions via audio speaker 836 may otherwise enable deliverer DL to identify the location of area AL).
  • Area AL may be on a portion of a stoop or sidewalk or any other suitable portion of environment 100 adjacent door 186 or otherwise easily accessible to deliverer DL that may be securely monitored by environment 100 (e.g., by one or more sensing components 828 of doorbell 106).
  • area AL may be within a sensing range of an NFC or RFID or camera or any other suitable sensing component 828 of doorbell 106, such that when package PL may be positioned within area AL by deliverer DL, package PL may be securely monitored by one or more smart devices of environment 100, which may ensure secure drop-off of package PL.
  • area AL may not be proximate doorbell 106 but may be an area that may be monitored by another smart device of environment 100 (e.g., a smart device that may be coupled to outdoor lighting 114, which may be around a corner of structure 150 from front door 186, such that other visitors to front door 186 may not obviously notice package PL that has been deposited by deliverer DL for secure monitoring by environment 100).
  • system 164 may be c onfigured to monitor and confirm the adequate deposit of package PL at area AL with deliverer DL and/or delivery entity business 228 for furthering the delivery attempt (e.g., such that deliverer DL may confidently leave package PL at environment 100).
  • Any suitable smart device of environment 100 may provide and/or monitor such an area AL or any other secure area for use in unsupervised drop-off and monitoring of a package PL.
  • system 164 may enable proper drop-off of package PL by providing an accessory device that may be coupled to package PL for enabling secure monitoring of package PL by system 164 (e.g., doorbell 106).
  • an accessory device that may be coupled to package PL for enabling secure monitoring of package PL by system 164 (e.g., doorbell 106).
  • system 164 may leverage doorbell 106 or any other suitable smart device of environment 100 to instruct deliverer DL to couple an accessory component 890 (e.g., of doorbell 106 of FIGS. 8A-8C) to package PL and then to leave package PL with accessory component 890 near doorbell 106 for secure monitoring.
  • an accessory component 890 e.g., of doorbell 106 of FIGS. 8A-8C
  • accessory component 890 of doorbell 106 may be coupled to package PL (e.g., fastened, adhered, affixed, snapped, tied to, rest on, or otherwise attached), where accessory component 890 may be operative to communicate with or be detected by any other component(s) of doorbell 106 (e.g., communications component 862
  • platform 200 may monitor the location and/or any other suitable characteristic(s) of package PL (e.g., based on the monitored location and/or any other suitable characteristic(s) of accessory
  • accessory component 890 may be configured to include any suitable sensing components (e.g., motion sensing components or any other suitable sensing components as described above with respect to sensing components 828) that may detect movement or any other suitable characteristic of accessory component 890 and, thus, package PL when coupled thereto, and such sensed characteristics may be communicated to or otherwise detected by any other component(s) of doorbell 106 and/or any other suitable smart device of environment 100 and, thus, system 164.
  • suitable sensing components e.g., motion sensing components or any other suitable sensing components as described above with respect to sensing components 828, that may detect movement or any other suitable characteristic of accessory component 890 and, thus, package PL when coupled thereto, and such sensed characteristics may be communicated to or otherwise detected by any other component(s) of doorbell 106 and/or any other suitable smart device of environment 100 and, thus, system 164.
  • doorbell 106 and/or any other suitable smart device of environment 100 may be operative to detect the location of accessory component 890 such that if package PL is moved after deliverer DL leaves package PL (e.g., by an animal or wind or otherwise), doorbell 106 and/or any other suitable smart device of environment 100 may be operative to track such movement for use in finding package PL for recovery.
  • a physical coupling of package PL to a component of environment 100 e.g., accessoiy 890 of doorbell 106) may increase the ability and/or effectiv eness of system 164 to securely monitor a package during and after an unsupervised drop-off.
  • Accessory component 890 may be reusable anytime a new package is to be deposited for secure monitoring by doorbell 106 and/or any other suitable smart device of environment 100.
  • accessor ⁇ ' component 890 may be an RFID tag that may be communicatively coupled or otherwise known by another component of doorbell 106. Any movement of package PL (e.g., as may be detected through leveraging accessory component 890) at all or above a certain threshold may trigger one or more additional sensing components of doorbell 106 or otherwise of environment 100 to monitor package PL/component 890 so as to heighten the secure monitoring of package PL.
  • Accessory component 890 may be operative to wirelessly communicate with other components of doorbell 106 and/or any oilier suitable smart device of environment 100 and/or may communicate via a wire 892 that may extend between accessoiy component 890 and other components of doorbell 106. If wire 892 is cut or otherwise disrupted, additional heightened security may be enacted by system 164 to track package PL. In some
  • a holder 891 of doorbell 106 and/or any other suitable smart device of environment 100 may be selectively opened and closed (e.g., through electronic control of system 164) for selectively enabling accessory component 890 to be removed from the remainder of doorbell 106 and/or any other suitable smart device of environment 100 for attachment to package PL.
  • system 164 may continue to intermittently or continuously monitor package PL and/or the secure area (e.g., area AL) to maintain the security of the dropped-off package.
  • environment 100 may be configured to continuously or intermittently monitor the position of dropped-off package PL, such as by detecting status data from accessory component 890 coupled to package PL or by sensing package PL within area AL or by confirming that a secure area (e.g., a lobby or safe) has remained inaccessible since disposal of package PL therein.
  • system 164 may be configured to communicate such security status with any suitable entity, such as delivery entity business 228 and/or any suitable user of environment 100 (e.g., an intended recipient of package PL). However, if at any time after secure disposal of package PL by any suitable entity, such as delivery entity business 228 and/or any suitable user of environment 100 (e.g., an intended recipient of package PL). However, if at any time after secure disposal of package PL by any suitable entity, such as delivery entity business 228 and/or any suitable user of environment 100 (e.g., an intended recipient of package PL). However, if at any time after secure disposal of package PL by any suitable entity, such as delivery entity business 228 and/or any suitable user of environment 100 (e.g., an intended recipient of package PL). However, if at any time after secure disposal of package PL by any suitable entity, such as delivery entity business 228 and/or any suitable user of environment 100 (e.g., an intended recipient of package PL). However, if at any time after secure disposal of package
  • environment 100 detects any type of change in the status of package PL or of a secure area or component with which environment 100 may be securing package PL, any suitable sensing functionality of environment 100 may be activated or enhanced and/or any suitable alarm or notification functionality may be activated. For example, if any movement of package PL is detected by environment 100 (e.g., by a motion sensing component 828 of doorbell 106), additional sensing components of environment 100 (e.g., a camera sensor 828 of doorbell 106) and/or other helpful components of environment 100 (e.g., outdoor lighting 114) may be activated to sense additional information about the status of package PL and/or its surroundings (e.g., whether an animal or other entity may be moving package PL).
  • environment 100 detects any type of change in the status of package PL or of a secure area or component with which environment 100 may be securing package PL, any suitable sensing functionality of environment 100 may be activated or enhanced and/or any suitable alarm or notification functionality may be activated.
  • an alarm may be activated and communicated within structure 150 (e.g., if any occupancy currently exists within structure 150) and/or outside of environment 100 (e.g., at doorbell 106 and/or to any suitable law enforcement entities 222 or delivery entity business 228 or users of environment 100 for aid in securing package PL).
  • any suitable events may be monitored for enhancing the protection of package DL, including, for example, detecting when any unknown user or visitor may come within a certain distance of a secure area at which package PL has been deposited.
  • doorbell 106 or any other suitable portion of smart environment 100 that may be able to monitor package PL may be equipped with walkup-identification technology
  • environment 100 may provide an alarm and or may increase the protection of package PL by activating a new form of package monitoring/securing (e.g., a more sensitive movement sensor with respect to package PL).
  • a new form of package monitoring/securing e.g., a more sensitive movement sensor with respect to package PL.
  • system 164 may be configured to communicate information indicative of that package deposit to any suitable entity (e.g., a system user of environment 100 and/or delivery entity business 228 and the like). Additionally or alternatively, system 164 may be configured to send any suitable reminders at any suitable moment to a system user or delivery entity or other suitable entity that may keep such an entity mindful of the status of a package that has been left at environment 100 but that has not yet been claimed by a system user.
  • any suitable entity e.g., a system user of environment 100 and/or delivery entity business 228 and the like.
  • system 164 may be configured to send any suitable reminders at any suitable moment to a system user or delivery entity or other suitable entity that may keep such an entity mindful of the status of a package that has been left at environment 100 but that has not yet been claimed by a system user.
  • Such reminders may be achieved via any suitable communication technique, such as e-mail, telephone, text message, alert via any suitable smart device (e.g., via a user interface of a hazard device 104 within structure 150 or via a user interface 812 of doorbell 106 that may be easily identified by a user of environment 100 upon waking up within structure 150 or arriving to door 186 of stmcture 150).
  • a suitable communication technique such as e-mail, telephone, text message
  • any suitable smart device e.g., via a user interface of a hazard device 104 within structure 150 or via a user interface 812 of doorbell 106 that may be easily identified by a user of environment 100 upon waking up within structure 150 or arriving to door 186 of stmcture 150.
  • doorbell 106 may be operative to detect that arrival and, responsive thereto, communicate to that user that package PL has been recently left by deliverer DL for user retrieval (e.g., an audible or textual message via an output component of doorbell 106 that may state "welcome home user X, a package PL was delivered by delivered by deliverer DL at time Y and is currently secured at location Z awaiting your retrieval").
  • a simple blinking light may be provided by doorbell 106 (e.g., projector 830) when a package is awaiting user retrieval.
  • environment 100 may be configured in various suitable ways for enabling secure retrieval of the package.
  • certain particular users may be designated by system 164 as authorized to retrieve a securely monitored package PL.
  • an appropriately credentialed system user associated with environment 100 generally and/or package PL specifically may be enabled by system 164 to identify one or more particular people that environment 100 may allow to retrieve package PL.
  • facial detection or other suitable "fingerprint” or “signature” detection capabilities of a smart device of environment 100 may be leveraged to detect a particular user that system 164 may be configured to determine has been authorized (e.g., automatically or by rules-based inferencing techniques or by specific user designation, etc.) to securely retrieve package PL.
  • certain entities may be provided with a particular security PIN or other suitable code that may be received by environment 100 (e.g., by doorbell 106) and confirmed by system 164 as a trusted pass for securely retrieving package PL.
  • an intended recipient of package PL is a known system-user of environment 100 and that user receives a communication (e.g., at step 2012) that deliverer DL has successfully performed a secure unsupervised drop-off of package PL in a secure area of environment 100
  • that user may interface with system 164 (e.g., via personal device 166) in any suitable way for enabling another entity (e.g., a neighbor) to retrieve that package PL on his or her behalf (e.g., that communication received by the user may include a code generated by platform 200, whereby the user may share that code with any entity for use by that entity at environment 100 for re-enabling accessibility to the secure area of the smart environment for collecting the disposed package).
  • the user may create a security clearance within system 164 (e.g., by sharing the identity of that entity with system 164), such that when the entity is detected at environment 100 (e.g., at doorbell 106), environment 100 may be configured to share the location of the secured package PL with the entity and to at least temporarily grant access to that secured area for package retrieval.
  • the user may instruct system 164 to generate a security code that may enable access to the securely monitored package, and the user may then share that security code with the entity to retrieve the package (e.g., by e-mailing or otherwise communicating that code to the entity (e.g., via communication techniques of system 164)).
  • system 164 may be operative to define a particular period of time during which the securely monitored package may be accessible for retrieval by any entity.
  • a system user may interface with system 164 (e.g., via personal device 166) in any suitable way for defining a future time period (e.g., between 5:00 and 5:15pm this afternoon) during which system 164 may be operative to alter certain security monitoring techniques that may enable any entity to effectively retrieve the package PL.
  • a future time period e.g., between 5:00 and 5:15pm this afternoon
  • an alarm or other security features may be disabled during that time such that an entity may successfully retrieve the package without triggering any unnecessary enhanced security.
  • automatic deduction may be utilized by system 164 for enabling environment 100 to safely allow retrieval of a monitored package PL when certain situations arise. For example, when a known system user is detected by environment 100 within a threshold distance of package PL and then package PL is concurrently moved from the secure area, then system 164 may not sound any alarms but may simply allow the package to be retrieved and may communicate confirmation of such retrieval along with any other suitable information (e.g., time and date of the retrieval, identity of the detected system user associated with that retrieval, etc. ) to any suitable entity (e.g., to the recipient user associated with package PL, deliverer entity business 228, etc.) via any suitable communication capability of system 164.
  • suitable information e.g., time and date of the retrieval, identity of the detected system user associated with that retrieval, etc.
  • any suitable entity e.g., to the recipient user associated with package PL, deliverer entity business 228, etc.
  • system 164 may be configured to obtain any suitable information in order to confirm user receipt of the package and/or to otherwise appropriately complete the delivery process of that package. For example, depending on any delivery requirements for a particular package, as may be determined by system 164 during data detection and/or analysis of steps 2002/2004, various data may be obtained by system 164 during retrieval of package PL. In some embodiments, when package retrieval is enabled, any suitable signature or confirmation of receipt action may be collected or otherwise detected by system 164 from the retrieving entity (e.g., the intended recipient system user or a neighbor granted retrieval rights, as described above).
  • the retrieving entity e.g., the intended recipient system user or a neighbor granted retrieval rights, as described above.
  • environment 100 may instruct the retrieving entity to communicate its identity to environment 100 (e.g., via a sensing component 828 or user interface 812 of doorbell 106) or otherwise environment 100 may indicate that an alarm will be sound.
  • environment 100 may require that a retrieving entity present the retrieved package at a suitable smart device of environment 100 or to any other suitable component of system 164 within a suitable period of time after retrieval otherwise environment 100 may indicate that an alarm will be sound.
  • the retrieving entity may position the retrieved package PL in functional view of a sensing component of a smart device of system 164 (e.g., position label ID within a sensing area of a sensing component 828 of doorbell 106 or within a sensing area of a sensing component of any other smart device other than doorbell 106 (e.g., a hazard device 104 of structure 150 or a personal device 166 or smart environment device of the retrieving entity, which may be a user of a neighboring environment that is not environment 100 but that is also a part of system 164)), such that system 164 may confirm that package PL has been retrieved at a certain time and/or by a certain entity that may be in communication with system 164.
  • a sensing component of a smart device of system 164 e.g., position label ID within a sensing area of a sensing component 828 of doorbell 106 or within a sensing area of a sensing component of any other smart device other than doorbell 106 (e.
  • Such sensed information by system 164 may be leveraged by system 164 to achieve a certain amount of trust with respect to the security of the retrieved package such that a confirmation communication may be sent (e.g., at an iteration of step 2012) to one or more suitable parties (e.g., an intended recipient system user and/or delivery entity business 228) to confirm successful retrieval of package PL from a securely monitored area of environment 100, thereby enabling closure of that delivery.
  • suitable parties e.g., an intended recipient system user and/or delivery entity business 2248
  • Such data may be invaluable to a delivery entity that may otherwise never determine if/when a package left at a particular location was actually received by a trusted entity.
  • step 2002 e.g., where information related to a package delivery attempt may be detected by environment 100
  • step 2004 e.g., where additional system information related to the delivery may be acquired and analyzed
  • step 2006 e.g., where additional system information related to the delivery may be acquired and analyzed
  • step 2008 e.g., where any suitable feedback or instructions may be communicated by system 164 to a deliverer of the package or to a potential retriever of the package, or any other suitable visitor (e.g., at doorbell 106)
  • step 2010 e.g., where any suitable action or characteristic of the package or of a deliverer or of any other suitable visitor may be detected during an attempted package delivery
  • step 2012 e.g., where any suitable confirmation of a detected action may be communicated by system 164 to an entity at environment 100 (e.g., at doorbell 106) or to any other suitable entity (e.g., a system user and/or a delivery entity business 228) during an attempted package delivery) of process 2000
  • any suitable data may be collected, stored, processed, or otherwise analyzed by platform 200 (e.g., by environment 100 and/or system 164) and shared with any suitable entity for enhancing the security and/or convenience
  • Time stamps, specific identification of packages and/or visitors (e.g., deliverers) and retrievers, specific actions of packages and/or of visitors (e.g., deliverers) and/or of retrievers, and the like may be sensed, collected, stored, and shared by environment 100 and/or system 164 with any suitable entities, such as system users, other smart environments, trusted third party entities (e.g., businesses 228), and any other suitable data targets.
  • suitable entities such as system users, other smart environments, trusted third party entities (e.g., businesses 228), and any other suitable data targets.
  • Such data collection and sharing may reduce any insurance liability previously held by a delivery entity business 228 that may otherwise have had to attempt delivery of a package multiple times due to an environment being unable to securely receive the package during an initial attempt and/or have left a package at an environment in an insecure fashion (e.g., on a front stoop of a user without any smart devices of the environment being operative to securely monitor the package until it was appropriately retrieved, etc.).
  • such data collection and sharing may enable better tracking of the handling of a package (e.g., in order to determine when during the deliver ⁇ ' process the package may have been ruined (e.g., for fragile package contents)), where one or more sensors of environment 100 may, for example, continuously or intermittently monitor and share movement data of a package as the package is deposited at environment 100 by deliverer DL, as the package is secured prior to retrieval, and'Or as the package is retrieved.
  • This also may enable accurate location and time tracking of deliverer DL and package PL by detecting and logging data at environment 100 (e.g., by enabling deliverer DL to "check-in" to environment 100 and/or "check-out" from
  • system 164 may generate and report its own data that may be compared to and/or relied on by delivery entity business 228 instead of any data generated by deliverer DL, as system data 164 (e.g., as may be generated by doorbell 106) may be trustworthy as an impartial data source (e.g., as compared to a deliverer who may enter incorrect data to inflate his efficiency and/or hide his inefficiencies).
  • status information about deliverer DL known to delivery entity business 228 may be shared with system 164, whereby system 164 may leverage a known status of environment 100 (e.g., modes, current/future occupancy data, current functionality of certain smart devices, etc.) in combination with the shared status information about deliverer DL to enhance the handling of a potential delivery at environment 100 by deliverer DL.
  • a known status of environment 100 e.g., modes, current/future occupancy data, current functionality of certain smart devices, etc.
  • deliveiy entity business 228 may communicate to system 164 an estimated time of arrival for deliverer DL at environment 100 such that system 164 may communicate with smart environment 100 in order to accommodate the arrival of deliverer DL (e.g., by turning on outdoor lighting 1 14 to enable safe and easy access to door 186 by deliverer DL and/or by turning off any sprinkler system smart device (not shown) that may otherwise impair the deliverer's ability to easily bring package PL to door 186 (e.g., to prevent package PL from getting wet)).
  • system 164 may communicate with smart environment 100 in order to accommodate the arrival of deliverer DL (e.g., by turning on outdoor lighting 1 14 to enable safe and easy access to door 186 by deliverer DL and/or by turning off any sprinkler system smart device (not shown) that may otherwise impair the deliverer's ability to easily bring package PL to door 186 (e.g., to prevent package PL from getting wet)).
  • delivery entity business 228 may communicate to system 164 information identifying the deliverer DL in order to improve the ability of environment 100 to detect the expected deliverer (e.g., by enhancing certain sensing functionality of one or more smart devices (e.g., pre-loading a picture of the expected deliverer to increase efficiency of facial detection or turning on additional sensors that may specifically attempt to detect characteristics of the expected visitor, etc.)).
  • delivery entity business 228 may communicate to system 164 information identifying the deliverer DL in order to improve the ability of environment 100 to detect the expected deliverer (e.g., by enhancing certain sensing functionality of one or more smart devices (e.g., pre-loading a picture of the expected deliverer to increase efficiency of facial detection or turning on additional sensors that may specifically attempt to detect characteristics of the expected visitor, etc.)).
  • delivery entity business 228 may communicate to system 164 information identifying the contents of package PL
  • Such communication may also enhance convenience of the delivery process for a recipient user or any other suitable user of environment 100, as system 164 may be operative to continuously keep that user up-to-date with respect to the delivery status and security of package PL while enabling that user control over how that package may be delivered, deposited, and/or retrieved.
  • system 164 may be operative to analyze that status information (e.g., in combination with any current modes or other information associated with environment 100) and may then automatically communicate certain information to a system user about that planned delivery (e.g., via any suitable smart device or personal user device), such that the system user may update any suitable mode settings or define a new mode or otherwise provide instructions to system 164 for handling the planned delivery once the deliverer and/or package are physically detected at environment 100.
  • status information about environment 100 and/or system users associated therewith known to system 164 may be shared with delivery entity business 228 and/or deliverer DL.
  • a status of environment 100 indicative that environment 100 is in a do-not-disturb mode for times X, Y, and Z, as may be shared by system 164 with delivery entity business 228 may enable delivery entity business 228 to more efficiently schedule attempted deliveries to environment 100 (e.g., to adjust a planned and/or current delivery attempt).
  • a status of environment 100 indicative of the ability of smart environment 100 to securely monitor a package during an "unsupervised" drop-off as may be shared by system 164 with delivery entity business 228 (e.g., after status information about
  • deliverer DL known to delivery entity business 228 may be shared with system 164), may enable delivery entity business 228 to more confidently deliver a package to
  • environment 100 even if a do-not-disturb status of environment 100 may not be known.
  • FIG. 21 is a flowchart of an illustrative process 2100 for handling a visitor.
  • process 2100 may be for enhancing delivery of a package by a delivery
  • process 2100 may include determining, at a server, environment status data of the at least one smart
  • process 2100 may include exposing, by the server, at least one application program interface for access by the delivery computing system of the delivery service-provider entity to identify at least a portion of the determined environment status data for the purpose of enhancing the delivery of the package by the delivery service-provider entity to the at least one smart environment.
  • FIG. 22 is a flowchart of an illustrative process 2200 for handling a visitor.
  • process 2200 may be for delivering a package.
  • process 2200 may include acquiring, at a server, package identification information associated with the package.
  • process 2200 may include accessing, at the server using the acquired package identification information, status information associated with a smart environment.
  • process 2200 may include affecting, with the server, the delivery of the package based on the accessed status information.
  • the steps shown in process 2200 of FIG. 22 are merely illustrative and that existing steps may be modified or omitted, additional steps may be added, and the order of certain steps may be altered.
  • FIG. 23 is a flowchart of an illustrative process 2300 for handling a visitor.
  • process 2300 may be for handling a delivery attempt of a package provided by a deliverer at a smart environment that includes a number of smart devices.
  • process 2300 may include detecting package information associated with the package provided by the deliverer at the smart environment using an entryway interface smart device of the smart devices.
  • process 2300 may include analyzing the detected package information using a computing system that is communicatively coupled to the entryway interface smart device.
  • Process 2300 may also include at least one of step 2306 and step 2308.
  • Step 2306 may include automatically communicating with a first smart device of the smart devices using the computing system based on the analyzing.
  • Step 2308 may include automatically providing feedback from the computing system to the deliverer via a second smart device of the smart devices based on at least one of the analyzing and the communicating.
  • FIG. 24 is a flowchart of an illustrative process 2400 for handling a visitor.
  • process 2400 may be for handling a delivery attempt of a package provided by a deliverer at a smart environment that includes a number of smart devices.
  • process 2400 may include detecting package information associated with the package provided by the deliverer at the smart environment using an entryway interface smart device of the smart devices.
  • process 2400 may include, in response to the detecting, determining a current mode of the smart environment using a computing system that is communicatively coupled to the entiyway interface smart device.
  • step 2406 is a flowchart of an illustrative process 2400 for handling a visitor.
  • process 2400 may be for handling a delivery attempt of a package provided by a deliverer at a smart environment that includes a number of smart devices.
  • process 2400 may include detecting package information associated with the package provided by the deliverer at the smart environment using an entryway interface smart device of the smart devices.
  • process 2400 may include,
  • process 2400 may include analyzing the detected package information in combination with at least one setting of the determined current mode using the computing system.
  • process 2400 may include, in response to the analyzing, automatically using the computing system for one of communicating delivery information indicative of the package to a system user associated with the smart environment via a first smart device of the smart devices and communicating feedback information to the deliverer via a second smart device of the smart devices.
  • FIG. 25 is a flowchart of an illustrative process 2500 for handling a visitor.
  • process 2500 may be for securely handling a delivery of a package by a deliverer at a smart environment that includes a number of smart devices.
  • process 2500 may include detecting delivery information associated with at least one of the package and the deliverer at the smart environment using at least an entryway interface smart device of the smart devices.
  • process 2500 may include analyzing the detected delivery information using a computing system that is communicatively coupled to at least the entryway interface smart device of the smart devices.
  • process 2500 may include, in response to the analyzing the detected delivery information, automatically providing drop-off feedback from the computing system to the deliverer via at least a first smart device of the smart devices, wherein the providing the drop-off feedback may include enabling accessibility to a secure area of the smart environment.
  • process 2500 may include, in response to the providing the drop-off feedback, detecting a drop-off action using at least a second smart device of the smart devices.
  • process 2500 may include analyzing the detected drop-off action using the computing system.
  • process 2500 may include, in response to the analyzing the detected drop-off action, disabling the accessibility to the secure area.
  • FIG. 26 is a flowchart of an illustrative process 2600 for tracking delivery of a package by a delivery service-provider entity that includes a delivery computing system to a smart environment that includes at least one smart device.
  • process 2600 may include obtaining, at a server from the at least one smart device located at the smart environment, delivery data collected from the smart environment by at least one sensor of the at least one smart device, wherein the delivery data is associated with the delivery of the package.
  • process 2600 may include sharing, by the server with the delivery computing system of the delivery sen ' ice-provider entity, at least a portion of the delivery data for the purpose of tracking the delivery of the package.
  • FIG. 27 is a flowchart of an illustrative process 2700 for tracking delivery of a package by a delivery service-provider entity to a smart environment that includes at least one smart device.
  • process 2700 may include obtaining, at a delivery computing system of the delivery service-provider entity, deliverer data from a personal device of a particular deliverer of the delivery service-provider entity, wherein the deliverer data is associated with the delivery of the package.
  • process 2700 may include obtaining, at the delivery computing system of the delivery service-provider, delivery data from the at least one smart device of the smart environment, wherein the delivery data is associated with the delivery of the package.
  • process 2700 may include analyzing, with the delivery computing system of the delivery sendee-provider, at least a portion of the obtained deliverer data in combination with at least a portion of the obtained delivery data for the purpose of tracking the delivery of the package.
  • FIG. 28 is a flowchart of an illustrative process 2800 for handling a visitor.
  • process 2800 may be for handling a delivery attempt of a package at a smart environment that includes a number of smart devices by a deliverer of a delivery
  • process 2800 may include obtaining, at an environment computing system from the delivery computing system, deliverer data associated with the status of the delivery attempt.
  • process 2800 may include obtaining, at the environment computing system from at least one sensor of at least a first smart device of the smart devices, environment data associated with the status of the smart environment.
  • process 2800 may include analyzing, with the environment computing system, at least a portion of the obtained deliverer data in combination with at least a portion of the obtained environment data.
  • Process 2800 may also include at least one of step 2808 and step 2810.
  • process 2800 may include automatically instructing the delivery computing system to adjust the delivery attempt using the environment computing system based on the analyzing.
  • process 2800 may include automatically adjusting the functionality of a particular smart device of the smart devices using the environment computing system based on the analyzing.
  • Smart doorbell 106 of environment 100 may be configured to include any suitable combination of any of the components described above so as to appropriately interact with other smart devices of environment 100 and services platform 200 and any suitable user thereof, such as users registered with or associated with environment 100 (e.g., owners, occupants, etc.) and/or users visiting environment 100 (e.g., package deliverers, friends, solicitors, strangers, and would-be-thieves).
  • users registered with or associated with environment 100 e.g., owners, occupants, etc.
  • users visiting environment 100 e.g., package deliverers, friends, solicitors, strangers, and would-be-thieves.
  • such a smart doorbell 106 may be a visitor interface or entryway interface device that may be operative to detect and control or otherwise handle a person's approach to or departure from a location (e.g., an outer door 186 of structure 150 of environment 100), announce such an approach or departure, enhance conventional doorbell functionality for both residents and visitors, control settings on a security system, detect environmental data and other useful data for environment 100 and system 164, and the like. Therefore, doorbell 106, on behalf of smart environment 100 and system 164 and users associated therewith, may act as a security custodian to a location (e.g., an outer door 186 of structure 150 of environment 100), announce such an approach or departure, enhance conventional doorbell functionality for both residents and visitors, control settings on a security system, detect environmental data and other useful data for environment 100 and system 164, and the like. Therefore, doorbell 106, on behalf of smart environment 100 and system 164 and users associated therewith, may act as a security custodian to
  • any suitable information of system 164 including any suitable modes or settings of any suitable portion or entirely of smart environment 100 and/or of a user of such a smart environment.
  • Any suitable type of mode such as a "do-not-disturb mode,” may be set for a particular system user U, for a particular environment 100, and/or for at least a particular portion of a particular environment 100, indefinitely or for any suitable length of time that may start at a current or future moment.
  • a mode may be determined based on any suitable information generated by or inferred from any suitable data of environment 100 and/or user U available to platform 200.
  • system 164 may use tracking information to make inferences regarding the current and/or future occupancy of home environment 100 and/or the current and/or future location of a user U (e.g., at environment 100, like user UL of FIG.
  • platform 200 may leverage sensed data from one or more sensors of one or more smart devices of environment 100 to at least partially define a particular current or future mode for environment 100 (e.g., programs/algorithms may assess detected sounds, vibrations, and movements to determine whether the home occupants are home or away, sleeping or awake, etc.).
  • programs/algorithms may assess detected sounds, vibrations, and movements to determine whether the home occupants are home or away, sleeping or awake, etc.
  • a user U may actively select or otherwise at least partially define a particular current or future mode for
  • mode selection data to system 164 (e.g., via direct user interaction with a user device 166 and/or any suitable smart device of system 164 accessible by the user ).
  • Various determinations of various factors may combine to enable a particular mode for a particular system user and/or a particular system environment or specific portion thereof (e.g., no occupancy within environment 100, lack of user movement within a darkened bedroom, etc.), and various settings may be enabled or made available during that enabled mode (e.g., turn on lights within environment 100 at a certain time of day to mimic occupancy, prevent disruptive communication of an attempted delivery at environment 100 to a darkened room thereof, etc.).
  • a do-not-disturb mode for environment 100 generally may indicate that environment 100 may not be willing or able to accept at least certain package deliveries (e.g., deliveries requiring a confirmation of receipt user signature by a particular user or any user).
  • Such a mode may be manually set by an appropriate user (e.g., a user with appropriate management rights for environment 100 using any suitable device 166 or interaction with any other suitable smart device of environment 100) for any suitable reason, such as when the user does not want to greet a visitor (e.g., if the user is feeling under the weather or going to sleep) or when the user will not be at environment 100 (e.g., when the user is going on vacation or leaving a babysitter at home with a child).
  • platform 200 may be operative to collect any suitable information from one or more smart devices of
  • environment 100 may make inferences in order to automatically set a do-not-disturb mode for environment 100 (e.g., based on sensed occupancy data and sensed movement data).
  • a current mode of environment 100 is set to a "do-not-disturb" mode
  • various suitable settings may be applied by system 164 in response to various suitable detected activities.
  • system 164 may be operative to automatically initiate a particular action, such as communicating to the detected visitor (e.g., via user interface 812 or audio speaker 836 of doorbell 106) that it is not an appropriate time to visit environment 100 and to come back at a later time.
  • a visitor e.g., deliverer DL with or without a package PL
  • system 164 may be operative to automatically initiate a particular action, such as communicating to the detected visitor (e.g., via user interface 812 or audio speaker 836 of doorbell 106) that it is not an appropriate time to visit environment 100 and to come back at a later time.
  • information indicative of when environment 100 may be associated with a do-not-disturb mode may be a type of current status information that may be shared with or otherwise made accessible to a facilitator entity (e.g., a delivery business 228) for increasing the efficiency of package delivery (e.g., delaying delivery until after a do-not-disturb mode is over) and/or of any other activity that may include a visitor interacting with environment 100.
  • a facilitator entity e.g., a delivery business 2208
  • Such information may be handled with sensitivity so as to not be leveraged for sinister purposes (e.g., for a third party to detect when an environment 100 is in a do-not-disturb mode so as to assume no one is home and attempt a robbery of the premises).
  • communication to a detected visitor of such a mode may simply indicate that an occupant of environment 100 is otherwise preoccupied at the moment (e.g., "on an important telephone call” or "putting the baby to sleep") and does not wish to interact with the detected visitor, whether or not there is in fact an occupant currently at environment 100, where such a communication may be
  • system 164 may be configured to share information about a do-not-disturb mode of an environment 100 or any other suitable status information of environment 100 or a user thereof with a third party, such as a facilitator of a package deliver ⁇ ', only when certain data is accessible to that third party.
  • a third party such as a facilitator of a package deliver ⁇ '
  • system 164 may only share such status mformation when a facilitator entity queries system 164 with respect to particular unique package identification information (e.g., such information as may be generated at step 1906 and linked with a particular ordered package).
  • Certain facilitator entities e.g.. Federal Express
  • Various types of data may be detected and analyzed for potentially affecting a current or future mode of a system user and'or at least a portion of a smart environment. For example, user location information with respect to the boundaries of environment 100 or a portion thereof (e.g., with respect to a particular room of structure 150) may be leveraged for determining a system mode. If no user is detected within a particular room of environment 100 or a portion thereof (e.g., with respect to a particular room of structure 150) may be leveraged for determining a system mode. If no user is detected within a particular room of
  • That room may be put into a do-not-disturb mode such that no information is fruitlessly attempted to be communicated to an occupant of that room (e.g., via any smart devices of that room).
  • a do-not-disturb mode such that no information is fruitlessly attempted to be communicated to an occupant of that room (e.g., via any smart devices of that room).
  • an occupant is detected within a particular room of environment 100, but that occupant is detected to have not moved more than a particular threshold amount in a particular amount of time and/or a brightness value of light is below a particular threshold in that room, then it may be inferred that the occupant is asleep and that room may be put into a do-not-disturb mode such that no information is communicated to an occupant of that room (e.g., via any smart devices of that room) to prevent the occupant from being awoken.
  • any other suitable activity of a user may be detected by one or more smart devices for at least partially determining a mode of the user and/or environment 100.
  • platform 200 may determine that a user is conducting a video conference call with business partners (e.g., by analyzing certain mov ements and actions of the user in conjunction with detected operation of one or more appliances or electronic devices of environment 100 (e.g., a video
  • calendar data may be accessible and analyzed for determining a system mode.
  • a calendar application for a particular user e.g., as may be accessible by a processing component of platform 200 from a user device 166) may be accessed and analyzed
  • a current or future activity of the user e.g., leveraging calendar data indicative of an "important telephone call with client X" at a current time in combination with detection of the user being on the telephone may be used to enable a do-not- disturb mode for that user during the duration of that telephone call).
  • a user may affirmatively provide platform 200 with information that may be leveraged to at least partially determine one or more modes to be enabled.
  • a user may communicate any suitable information to platform 200 via any suitable device of environment 100 to define any suitable characteristic that may be analyzed for enabling a mode and/or to specifically enable a particular mode.
  • a user may communicate to platform 200 (e.g., via a user device 166 and/or any suitable user interface of any suitable smart device of environment 100 ) a particular activity that the user is currently performing or will be performing at a future time, such as "putting my baby down for a nap" or “conducting an important business call” or "reading an important work document” or “feeling under the weather” or the like.
  • Such information may be verbally communicated by the user to platform 200 or may be manually entered by interfacing with a graphical user interface or any other suitable user interface of
  • platform 200 Such information may be communicated to platform 200 by a user from any suitable location, whether or not the user is local to a particular environment for affecting a mode of that environment. For example, a user that may have recently left environment 100 via car may utilize its personal device 166 for communicating to platform 200 that the user wishes for a do-not-disturb mode to be enabled for environment 100.
  • a particular mode may be set manually by a user (e.g., to override any alternative mode that might be enabled based on current detected data, such as to enter a do-not-disturb mode for the entirety of environment 100 despite a child and a babysitter currently actively occupying environment 100).
  • Each one of multiple different system users can be associated with its own distinct mode.
  • a first user occupant of environment 100 may be in a do-not-disturb mode (e.g., when on an important telephone call or simply when wishing to not be disturbed) and a second user occupant of environment 100 may not be in a do-not-disturb mode, whereby platform 200 may be operative to balance the settings of each enabled mode of the various occupants of environment 100 when responding to an event (e.g., when a visitor is detected (e.g., at step 2002), platform 200 may communicate with a personal device associated with the second user (e.g., at step 2006) while platform 200 may avoid any communication with devices of environment 100 that may disturb the first user).
  • a personal device associated with the second user e.g., at step 2006
  • platform 200 may be operative to communicate silently with a user device 166 of a first "available” user via a smart device that is proximate to a first "available” user (e.g., with silent blinking lights or text message on a user interface of such a smart device) but not to communicate in any manner that may disturb a "not available” user that may be sleeping next to the available user (e.g., not with an audible message via a smart device proximate both users).
  • each one of multiple different zones or areas of environment 100 can be associated with its own distinct mode.
  • a first room of environment 100 may be in a do-not-disturb mode (e.g., a bedroom when one or more occupants may be resting therein) and a second room of environment 100 may not be in a do-not-disturb mode (e.g., a living room where one or more occupants may be casually watching television), whereby platform 200 may be operative detect such modes and to balance the settings of each enabled mode of the various rooms of environment 100 when responding to an event (e.g., when a visitor is detected (e.g., at step 2002), platform 200 may communicate with one or more smart devices located within the second room (e.g., at step 2006) while platform 200 may avoid any communication with any devices of the first room that may disturb the occupant(s) therein).
  • a do-not-disturb mode e.g., a bedroom when one or more occupants may be resting therein
  • a second room of environment 100 may not be in a do-not-disturb
  • devices 102/104/106/108/1 10/112/1 13/1 14/1 16/122/166/168/170 of a smart-home environment 100 may be processed by platform 200 (e.g., with a processing engine 206 and/or services 204/205 and/or third party sources 222/224/226/228/230 and/or
  • 310a/310b/310c/310d and/or extrinsic information 316 and/or any other suitable information services for example, in combination with rules-based inference engines and/or artificial intelligence
  • home data 202 e.g., for generating derived home data 208
  • data may be analyzed or otherwise used to define and enable a particular mode for a particular user and/or for at least a particular portion of an environment 100.
  • a mode may be associated with an entire environment 100 or only a portion thereof.
  • a particular wing of structure 150 may be utilized at a certain time as an exhibition area for a performance or a meeting, such that that area should be in a
  • do-not-disturb mode at that time such that information may not be communicated to that area by platform 200 for specific events (e.g., for detection of a deliverer DL with a package PL). Additionally or alternatively, such a mode may be associated with a particular user, whether or not the user is local to environment 100 (e.g., user UL) or remote from environment 100 (e.g., user UR).
  • a particular user may be associated with an enabled do-not-disturb mode when an important business call is being conducted by that user, regardless of whether that user is conducting the call within environment 100 or remotely from environment 100 (e.g., while driving away from environment 100), such that that user may not be communicated to by platform 200 in a disturbing manner for alerting that user of a specific event (e.g., for detection of a deliverer DL with a package PL, such as at step 2006).
  • a specific event e.g., for detection of a deliverer DL with a package PL, such as at step 2006.
  • platform 200 When a current mode is enabled for a particular environment or user, various suitable settings may be followed by platform 200 for that mode in response to particular events being detected. For example, when a visitor is detected at environment 100 (e.g., at step 2002), different type(s) of communication may be conducted by platform 200 with one or more users depending on whether or not environment 100 is in a particular do-not-disturb mode (e.g., at step 2006) and/or different type(s) of feedback may be provided by platform 200 to the visitor depending on whether or not environment 100 is in a particular do-not-disturb mode (e.g., at step 2008).
  • a visitor is detected at environment 100 (e.g., at step 2002)
  • different type(s) of communication may be conducted by platform 200 with one or more users depending on whether or not environment 100 is in a particular do-not-disturb mode (e.g., at step 2006) and/or different type(s) of feedback may be provided by platform 200 to the visitor depending on whether or not environment
  • platform 200 may be operative not to communicate the detection of a visitor using any devices within environment 100 according to communication settings of that mode (e.g., so as not to wake any sleeping occupants or so as not to fruitlessly attempt to communicate with non-existent occupants), yet, when environment 100 is not in a do-not-disturb mode, platform 200 may be operative to communicate such detection of a visitor using one or more devices within environment 100 (e.g., so as to alert the occupants of the visitor).
  • communication settings of that mode e.g., so as not to wake any sleeping occupants or so as not to fruitlessly attempt to communicate with non-existent occupants
  • platform 200 may be operative to communicate such detection of a visitor using one or more devices within environment 100 (e.g., so as to alert the occupants of the visitor).
  • certain settings of a particular mode may vary based on certain characteristics of a particular event being detected. For example, when a first particular visitor is detected at environment 100 (e.g., at step 2002), a first particular communication operation may be conducted by platform 200 with a user when a first particular visitor is detected at environment 100 (e.g., at step 2002).
  • a first particular communication operation may be conducted by platform 200 with a user when a first particular visitor is detected at environment 100 (e.g., at step 2002).
  • a first particular feedback may be provided by platform 200 to the visitor when environment 100 is in a particular do-not-disturb mode (e.g., at step 2008), yet, when a second particular visitor is detected at environment 100 (e.g., at step 2002), a second particular communication operation may be conducted by platform 200 with a user when environment 100 is in that same particular do-not-disturb mode (e.g., at step 2006) and/or a second particular feedback may be provided by platform 200 to the visitor when environment 100 is in that same particular do-not-disturb mode (e.g., at step 2008).
  • a particular do-not-disturb mode has been enabled for environment 100 (e.g., because the user is taking a nap)
  • most visitors detected by environment 100 may be provided by platform 200 with feedback instructing the visitor to return at a later time as the occupants are currently unavailable and no communication may be provided by platform 200 to an occupant that might wake the occupant
  • a particular important visitor e.g., a deliverer DL with a highly anticipated or desired package PL
  • platform 200 with feedback e.g., at step 2008
  • appropriate communication may be provided by platform 200 (e.g., at step 2006) to the napping occupant (e.g., to wake the occupant and instruct the occupant to further the desired delivery process).
  • Various settings of a particular mode for an environment or system user may dictate the functionality of one or more devices (e.g., one or more smart devices of
  • certain mode settings may dictate such functionality in a time-based fashion. For example, lighting of environment 100 (e.g., one or more lamps 118 or outdoor lighting 114) may be automatically turned on 30 minutes before sunset (e.g., at 5:00pm) by platform 200 when environment 100 is in a do-not-disturb mode, which may mimic occupant interaction with env ironment lighting such that env ironment 100 may appear occupied. Additionally or alternatively, in some embodiments, certain mode settings may dictate such functionality based on detection of any visitor or a particular visitor.
  • lighting of environment 100 may be automatically turned on when a v isitor is detected by platform 200 (e.g., at doorbell 106) when environment 100 is in a do-not-disturb mode, which may mimic occupant interaction with environment lighting when a visitor is detected such that environment 100 may appear occupied.
  • platform 200 e.g., at doorbell 106
  • certain audio may be automatically output (e.g., by audio speaker 836 of doorbell 106) when an unknown visitor is detected by platform 200 (e.g., at doorbell 106) when environment 100 is in a do-not-disturb mode, which may mimic occupant interaction with environment lighting when a visitor is detected such that environment 100 may appear occupied or otherwise more prepared to thwart a would-be-thief.
  • certain settings of a mode may dictate that platform 200 automatically provides certain feedback with environment 100 when a particular event is detected while that mode is enabled for environment 100 or a user thereof.
  • certain settings of a do-not-disturb mode may be operative to cause certain feedback (e.g., a visual indicator or audible message) to be automatically output by environment 100 (e.g., by projector 830, user interface 812, and/or audio speaker 836 of doorbell 106) when a known visitor or any visitor is detected by platform 200 (e.g., by doorbell 106) at environment 100 when such a do-not-disturb mode is enabled for environment 100 or for a user thereof.
  • certain feedback e.g., a visual indicator or audible message
  • Such feedback may be provided (e.g., at step 2008) to indicate to the visitor detected (e.g., at step 2002) that no occupant of environment 100 is currently available to interact with the visitor.
  • feedback may convey to the detected visitor that "occupant X is currently on an important telephone call right now and cannot be bothered” or "occupant X is currently nursing the baby, please come back at another time” or the like, which may in some way alert the visitor not to bother interacting any further with environment 100 (e.g., not to bother depressing or otherwise interacting with button 812 of doorbell 106) when the visitor is detected such that environment 100 may appear occupied but unable to accommodate occupant interaction with the visitor.
  • such feedback may be provided as a simple indication of the mode on or with respect to user interface doorbell button 812 or any other suitable component of doorbell 106 or other smart device of environment 100 that a visitor would usually interact with to reach an occupant (e.g., doorbell button 812 may be provided with a blinking red light or text message reading "doorbell deactivated, please come back at another time"), whereby a visitor may easily determine that any active visitor interaction with environment 100 would not be worthwhile.
  • such feedback may be provided at an initial entry point to environment 100 (e.g., at a front gate at the border of the curtilage of environment 100), which may thereby indicate the do-not-disturb mode to the visitor at an initial detection of the visitor at environment 100 rather than after the visitor has fruitlessly advanced to the front door 186 of structure 150.
  • This may save valuable time for the visitor (e.g., obviating the need for a deliverer DL to get out of a delivery truck with package PL for approaching door 186) and/or may prevent more intimate visitor interaction with portions of environment 100 that may disturb an occupant (e.g., visitor interaction with front door 186 may needlessly rile up an occupant dog on the interior side of door 186).
  • certain settings of a do-not-disturb mode may be operative to adjust certain fiuictionalities of certain devices of environment 100 when a known visitor or any visitor is detected by platform 200 (e.g., by doorbell 106) at environment 100 when such a do-not-disturb mode is enabled for environment 100 or for a user thereof
  • Such functionality adjustment may include, for example, deactivating the functionality of platform 200 to communicate an interaction of a visitor with doorbell button 812 to a system user of environment 100 when a particular mode is enabled for environment 100 or a user thereof. That is, the conventional functionality of doorbell button 812 may be at least partially deactivated when a particular mode is enabled.
  • Various levels of detailed information regarding the mode may be communicated in such feedback dependent upon the type of visitor detected. For example, if a deliverer DL of a taisted third party deliverer entity 228 is detected (e.g., at step 2002), then platform 200 may be operative to provide feedback (e.g., at step 2008) that may indicate when the current do-not-disturb mode will be over (e.g., "no one is currently available to receive you, but please return between 3:00pm and 5:00pm when an occupant will be ready to greet you"). However, if an unknown visitor is detected, then less detailed feedback may be provided, such as "no one is currently available to receive you, please leave the premises immediately”.
  • feedback e.g., at step 2008
  • platform 200 may be configured to provide visitor-specific messages to specific visitors that may be detected during specific modes. For example, when an occupant is set to take a nap and instructs platform 200 to enable a do-not-disturb mode for the user and/or at least a portion of environment 100 but that occupant wishes to leave a message for a particular visitor if that visitor is detected during that mode (e.g., "Hi visitor Y, I am sorry to miss you, but I had to take a nap, I left your backpack next to the mailbox for you"), the occupant may provide specific instructions for associating such a message with that mode and that message may be communicated to such a visitor if that visitor is detected by platform 200 (e.g., at doorbell 106) when environment 100 is in such a do-not-disturb mode.
  • platform 200 e.g., at doorbell 106
  • Such messages or other suitable customizable settings of a mode may be defined by a user when local to environment 100 (e.g., via any suitable smart device of environment 100) or when remote from environment 100 (e.g., via a user device 166, such as, for example, when the user is currently on vacation but would like to leave a customized note for a visitor that is expected to arrive at environment 100 while the user is still on vacation and environment 100 is in a do-not-disturb mode).
  • current status information e.g., mode
  • a delivery facilitator business entity 228 e.g., at step 1908 to affect the delivery of a package (e.g., to delay delivery until a time when environment 100 may be occupied by the recipient to receive the delivery).
  • current status information e.g., mode
  • mode current status information
  • a smart system entity may include various types of information that may be obtained and leveraged (e.g., at steps 1908/1910) by a third party for more efficiently delivering a package and/or for protecting an environment entity that may be accomplished in a more convenient manner for environment 100 or for a user thereof.
  • such status information may include information indicative of when to allow delivery to a particular location (e.g., after 4:00 PM on Mondays and Wednesdays only), information indicative of preferred alternate delivery methods (e.g., do not deliver to environment 100 but rather hold a particular package at a particular deliverer pick up location for manual pick-up by a particular user, or deliver to another recipient and/or to another location other than the recipient and/or location initially defined at step 1902), information indicative of authorization to deliver without signed confirmation of receipt of delivery (e.g., a particular authenticated user of the system hereby autliorizes deliverer to deliver a particular package to a particular location and leave next to the front door of that location without a human user signing for that delivery ), and/or any other suitable information indicative of any other suitable delivery preferences or delivery instructions.
  • such status information may include information indicative of when an environment is more susceptible to certain security breaches (e.g., no occupants will be alert at environment 100 after 1 1 :00 PM on Mondays and at all on
  • mode status information may be provided to a delivery facilitator and/or a security facilitator on a macro-level in addition to or as an alternative to providing mode status information with respect to just one particular environment 100 and/or user thereof.
  • mode status information may be made available to a facilitator entity 222/228/230 that may be generally indicative of a mode status or mode trend of a particular group of smart system entities (e.g., a neighborhood or ZIP code that may include multiple smart environments 100).
  • such mode status information may be indicative of certain days of the week when a majority of such environments of the group are in a do-not-disturb mode and/or are otherwise not available to receive packages, and such information may be leveraged by the facilitator entity to increase security to that entire group (e.g., neighborhood) of environments during those days and/or to avoid scheduling deliveries to that entire group (e.g., neighborhood) of environments during those days.
  • Any suitable grouping of environments or users or other suitable smart system entities of any suitable size and type may be used to generate group or macro-level mode status information that may be made available to a facilitator entity for more efficiently handling the purpose (e.g., security and/or deliveries) associated with that group.
  • platform 200 by not sharing mode status information associated specifically with only a particular single environment 100 or user (e.g., to preserve at least some anonymity about the status of a particular smart environment or user).
  • a facilitator entity may be configured to optimize package delivery or environment security. For example, data indicative of when a particular location may and may not be able to receive a package delivery may be processed by any suitable distribution system to dictate when certain packages are dispatched for maximizing the likelihood of a successful physical delivery. This may reduce overhead costs for a delivery entity (e.g., reduce fuel prices and wasted man hours by limiting the number of failed delivery attempts) and/or may reduce insurance costs by limiting the exposure of perishable contents from unnec essary and degrading delivery effects.
  • data indicative of when a particular location may and may not be actively occupied may be processed by any suitable security system to dictate when certain security measures are dispatched for increasing the security of the environment.
  • This may reduce overhead costs for a security entity (e.g., reduce fuel prices and wasted man hours by limiting the number of unnecessary visits by a security officer to a location that is currently actively occupied) and/or may reduce insurance costs by limiting the exposure of environments to less than secure conditions.
  • steps 1902, 1904, 1906, 1908, and 1910 may be at least partially or completely automated using one or more computer systems (e.g., computer system 1500 and/or computer system 1600) that may be leveraged by each one of environment 100, system 164, facilitator entity 222/228/230, and the like for associating a smart system entity of system 164 with a mode and then sharing certain mode status information of that smart system entity with a deliverer or other entity at any suitable time for positively affecting the delivery of a package or the security of the environment or user.
  • a user of system 164 may actively and manually define certain preferences or instructions to be shared with such a facilitator entity.
  • the delivery of packages and/or third-party security of a user or environment by a facilitator entity may be based on inferences made by system 164 or other suitable processing components) of platform 200 (e.g., at environment 100 or remote therefrom) and selectively shared with such a facilitator entity (e.g., without any active manual preferences made by a user but instead done transparently to a user).
  • FIG. 29 is a flowchart of an illustrative process 2900 for managing a smart environment that comprises a number of smart devices.
  • process 2900 may include obtaining, at an environment computing system from at least one sensor of at least a first smart device of the smart devices, environment data associated with the occupancy of the smart environment.
  • process 2900 may include analyzing, with the environment computing system, at least a portion of the obtained environment data.
  • process 2900 may include determining, with the environment computing system, a status of at least a portion of the smart environment based on the analyzing.
  • process 2900 may include enabling, with the environment computing system, a
  • Process 2900 may also include at least one of step 2910 and step 2912.
  • process 2900 may include, based on the enabling, automatically sharing, by the environment computing system with a remote entity, status information indicative of the determined status.
  • process 2900 may include, based on the enabling, automatically adjusting, using the environment computing system, the functionality of a particular smart device of the smart devices.
  • Smart doorbell 106 of environment 100 may be configured to include any suitable component or combination of components described above so as to effectively interact with other smart devices of environment 100 and of services platform 200 and with any suitable users thereof, such as users registered with or associated with environment 100 (e.g., owners, occupants, etc.) and/or users visiting environment 100 (e.g., package deliverers, friends, solicitors, strangers, and would-be-thieves), for increasing the security of environment 100 and/or for increasing the convenience of users of environment 100.
  • users registered with or associated with environment 100 e.g., owners, occupants, etc.
  • users visiting environment 100 e.g., package deliverers, friends, solicitors, strangers, and would-be-thieves
  • doorbell 106 may be operative to initially detect a visitor at environment 100, analyze visitor information based on the initial detection (e.g., in light of any applicable enabled modes), adjust a functionality of one or more smart devices of environment 100 based on such analysis, communicate with a user of environment 100 based on such analysis, provide feedback to the visitor based on such analysis and/or based on such communication, detect at least one act performed by the visitor in response to the provided feedback, and/or communicate with at least one of the user and the visitor based on the detected act.
  • a first adjustment of the functionality of a smart device may be performed based on analysis of initial visitor detection information (e.g., based on the detection of a visitor generally), while a second adjustment of the functionality of a smart device may be later performed based on analysis of additional visitor detection information (e.g., based on the detection of an act of a visitor, where detection and analysis of such an act may identify a class of the visitor or that may identify the visitor specifically).
  • Certain adjustment of the functionality of a smart device may enable the visitor to access at least a portion of environment 100 (e.g., unlocking of doorknob 122 of door 186 for enabling a visitor to enter structure 150).
  • Such access may be granted based on analysis of visitor information revealing a taisted invitee (e.g., a guest to a party at a specifically designated time) or a trusted security service entity (e.g., a fireman during a detected emergency situation).
  • the granted access may be limited in one or more ways based on the identity of the visitor and/or based on any other suitable data available for analysis.
  • Various additional data may be leveraged during the analysis of any suitable detected visitor information, including data from a neighborhood security network of one or more additional smart environments associated (e.g., physically) with environment 100.
  • visitor information of a visitor may be detected at an entryway interface device of a smart environment.
  • one or more sensing components 828 of doorbell 106 may be operative to detect any suitable visitor information when any suitable visitor comes within a suitable sensing range of doorbell 106.
  • a visitor may be any suitable entity, such as a package deliverer (e.g., deliverer DL of FIG.
  • first visitor identification information may be detected when a visitor is initially sensed by platform 200 at environment 100 (e.g., by doorbell 106). Such initial first visitor identification
  • information may be any suitable detectable data that may then be analyzed by platform 200 (e.g., at step 2004) in order to determine that a visitor may be present at environment 100.
  • simple motion data e.g., as may be sensed by a motion sensing component 828 of doorbell 106
  • platform 200 e.g., by doorbell 106 alone, in combination with other processing components of environment 100, and/or in combination with other processing components of platform 200, such as system 164 ) to determine that a visitor is present at doorbell 106.
  • more advanced sensing may be performed at step 2002 for initially detecting the presence of a visitor at step 2002 (e.g., motion sensing, audio sensing, camera sensing, PIR sensing, ambient light sensing, ultrasonic sensing, and/or any other suitable sensing capabilities of doorbell 106 or of environment 100 generally (e.g., sensing capabilities of one or more other smart devices)).
  • a visitor e.g., motion sensing, audio sensing, camera sensing, PIR sensing, ambient light sensing, ultrasonic sensing, and/or any other suitable sensing capabilities of doorbell 106 or of environment 100 generally (e.g., sensing capabilities of one or more other smart devices)
  • audio sensing of a fingerprint or signature matching a delivery taick or any other suitable vehicle may be initially detected and analyzed, which may result in additional visitor sensing functionality being enhanced for further detection and analysis (e.g., video sensing and/or motion sensing).
  • process 2000 may include analyzing the detected visitor information of step 2002 (e.g., in conjunction with any other suitable data available to platform 200, such as settings of a current mode of environment 100 or of a user), for determining the presence of a visitor at environment 100 and how to initially respond to such a determination.
  • doorbell 106 in response to detecting such visitor information at step 2002, doorbell 106, alone or in combination with other processing components of other smart devices and/or rules-based inference engines and/or artificial intelligence provided locally at
  • any suitable additional information that may be useful for interpreting the detected visitor information e.g., motion sensing thresholds, visitor "signatures” or “fingerprints", and/or any other suitable data that may help to make a determination about the presence of a visitor in light of the detected visitor information
  • additional information e.g., current mode settings of environment 100, etc.
  • process 2000 may include adjusting the functionality of at least one smart device of environment 100 based on the analysis of step 2004 or even based solely on the detection of step 2002.
  • smart environment 100 may be operative to turn on a light
  • step 2005 to increase the safety of the potential visitor and/or to increase the security of environment 100.
  • smart lighting e.g., outdoor lighting 114 or projector 830 of doorbell 106
  • environment 100 may be operative to increase the sensing functionality of one or more smart devices of environment 100 at step 2005 (e.g., by increasing the sampling rate of a sensing component, by increasing or varying the sensing area covered by a sensing component, by turning on one or more additional sensing components (e.g., of doorbell 106) that may have previously been turned off for power conservancy, etc.) to increase the security of environment 100 (e.g., by enhancing the ability of environment 100 to monitor any potential visitor activity).
  • step 2005 e.g., by increasing the sampling rate of a sensing component, by increasing or varying the sensing area covered by a sensing component, by turning on one or more additional sensing components (e.g., of doorbell 106) that may have previously been turned off for power conservancy, etc.) to increase the security of environment 100 (e.g., by enhancing the ability of environment 100 to monitor any potential visitor activity).
  • smart environment 100 may be operative to generate certain activity at step 2005 that may mimic occupancy at environment 100 detectable by the visitor to increase the security of environment 100, such as by turning on a lamp 118 within structure 150 and/or by outputting audio data from an audio output component of any smart device within structure 150 that may resemble a dog barking or any other suitable noises or activity that may lead a visitor to believe that an active occupant is at environment 100.
  • audio data may be output by an audio output component of a device located within structure 150 but adjacent to door 186, such that the outputted audio (e.g., a played-back recording of a dog barking) may realistically sound like occupancy within structure 150.
  • audio data that is only audible to a dog may be output by an audio output component of environment 100, which may prompt the actual dog to bark for increasing the security of environment 100.
  • smart environment 100 may be operative to output a general message at step 2005 that may instruct the visitor how to initially interface with environment (e.g., by outputting audio data from audio speaker 836 or visual data from projector 830 of doorbell 106 or any other suitable data from any other suitable smart device of
  • smart environment 100 may be operative to lock any unlocked entry ways to structure 150 (e.g., by locking smart doorknob 122) at step 2005 to increase the security of environment 100, whereby, in such embodiments, the previous locked'unlocked condition of such entry ways may be restored once the visitor is no longer detected or has been otherwise securely dealt with.
  • step 2005 may be based on the analysis of step 2004. For example, such adjusting may be done automatically in response to a determination that the presence of a visitor has been detected. Additionally or alternatively, such adjusting may be done automatically not only in response to a determination that the presence of a visitor has been detected but also in response to analysis of any applicable mode settings, rules, inferences, or other suitable information available to platform 200 that may be processed for determining the way or ways in which certain smart device functionality ought to be adjusted in response to the determined visitor presence (e.g., time of day, current functionality of certain smart devices, current mode of environment 100, current occupancy of environment 100, and/or any other suitable information).
  • time of day current functionality of certain smart devices, current mode of environment 100, current occupancy of environment 100, and/or any other suitable information.
  • Such adjusting may also be performed whether or not the detected visitor presence has been determined with respect to a particular visitor (e.g., next door neighbor John Doe), with respect to a particular visitor type (e.g., a delivery drone or a gas utility service man or security agent or firefighter, etc.), or with respect to a visitor generally (e.g., a human or drone or any other suitable entity that may be handled by platform 200 as a potential visitor to environment, even including an animal such as a cat that may be detectable as an unknown stray or detectable as the neighbor's missing pet (e.g., via an NFC chip coupled to the cat and NFC sensing component 828), whereby process 2000 may enable proper detection of the cat and communication of its presence to appropriate users/authorities).
  • Such initial detection of the presence of a visitor may be determined based on analysis of initial detected visitor information that may be compiled without active communication by the visitor of its intent to environment 100. Instead, in some combination of initial detected visitor information that may be compiled without active communication by the visitor of its
  • the presence may be initially determined when the analysis of the visitor information determines that the shape and/or motion and/or any other suitable characteristic of a potential visitor (e.g., generically or specifically) has been detected.
  • Such initial adjusting of the functionality of one or more smart devices at step 2005 in response to initial detection of the presence of a visitor may automatically increase the security of
  • environment 100 and/or increase the safety or convenience of the detected visitor that may be potentially attempting to interact with environment 100 for any suitable purpose (e.g., for communicating with an occupant, for delivering a package, for fetching an item, etc.).
  • any suitable purpose e.g., for communicating with an occupant, for delivering a package, for fetching an item, etc.
  • FIG. 30 is a flowchart of an illustrative process 3000 for handling a visitor at a smart environment that includes a number of smart devices.
  • process 3000 may include detecting visitor information associated with the visitor at the smart environment using an entryway interface smart device of the smart devices.
  • process 3000 may include analyzing the detected visitor information using a computing system that is communicatively coupled to the entryway interface smart device.
  • process 3000 may include, based on the analyzing, automatically adjusting a functionality of a particular smart device of the smart devices using the computing system.
  • process 2000 may include communicating with a user associated with the smart environment based on the analysis of step 2004.
  • the analysis of step 2004 determines that the presence of a visitor has been initially detected at environment 100 and that a mode of environment 100 or of a system user is such that communication may be attempted
  • smart environment 100 may be operative to communicate the determined visitor presence to an appropriate system user or portion of environment 100 in any suitable way at step 2006 (e.g., by audibly announcing any suitable information related to the visitor presence via an audio speaker of a smart device that may be located most proximal to the current location of a user within environment 100).
  • smart environment 100 may be operative to communicate the visitor presence to a system user or appropriate third party via platform 200 in any suitable way at step 2006 (e.g., by transmitting an electronic message to a personal device 166 associated with a remote user U or by transmitting an electronic message to a trusted third party security entity 222-230 associated with environment 100).
  • a system user or appropriate third party via platform 200 in any suitable way at step 2006 (e.g., by transmitting an electronic message to a personal device 166 associated with a remote user U or by transmitting an electronic message to a trusted third party security entity 222-230 associated with environment 100).
  • a video e.g., a recorded loop or a live stream of the detected visitor
  • still image or any other suitable detected visitor information may be communicated at step 2006 to such a user or third party automatically or in response to a request relayed from such a user or third party after being notified of the detected visitor, whereby such communicated visitor information data may be utilized by such a user or third party in any suitable way (e.g., to actively monitor the visitor's activity and/or to attempt to specifically identify the identity of the visitor or at least the type of the identified visitor).
  • process 2000 may include providing the visitor with feedback based on at least one of the analysis of step 2004 and/or any communication of step 2006.
  • the analysis of step 2004 determines that there are currently no occupants local to environment 100 or otherwise in an active and available state for appropriately being told of the detected visitor, and/or when no user response is received for any communication attempt of step 2006 with respect to a detected visitor
  • platform 200 may be operative to determine that smart environment 100 may proceed with handling the detected visitor without active user input and doorbell 106 may provide the visitor at step 2008 with instructions or other suitable feedback on how to proceed.
  • platform 200 may be operative to determine that a user or third party privy to smart environment 100 may at least partially handle the visitor and doorbell 106 may provide the visitor at step 2008 with instructions or other suitable feedback on how to proceed.
  • the type of feedback that may be provided via doorbell 106 and/or via any other suitable smart device of environment 100 to the visitor at step 2008 may vary based on the analysis of step 2004 and/or any communication of step 2006.
  • the feedback may include active communication from the user or third party to the visitor via doorbell 106 (e.g., audible and/or visual information and/or any other suitable information may be conveyed to the visitor by doorbell 106, where such information may be generated and transmitted by or otherwise under the control of the user via another smart device that the user may directly interface with and that may be communicatively coupled to doorbell 106).
  • This may enable a virtual conversation between the user and the visitor via platform 200 (e.g., by repeating one or more of steps 2002-2012, as described above with respect to a deliverer visitor).
  • the feedback may include automated messages or instructions generated by system 164 for communication to the visitor via doorbell 106 (e.g., a message that may communicate that "a user is not currently able to actively interact with you right now, please proceed as follows.", etc.). Additionally or alternatively, the feedback may include providing certain environment access to the visitor, such as by opening door 186 by unlocking doorknob 122 for a certain amount of time (e.g., if the visitor is approved by system 164 as an expected and/or authorized visitor, door 186 may be unlocked such that the visitor may be enabled to enter structure 150).
  • the feedback may include providing certain environment access to the visitor, such as by opening door 186 by unlocking doorknob 122 for a certain amount of time (e.g., if the visitor is approved by system 164 as an expected and/or authorized visitor, door 186 may be unlocked such that the visitor may be enabled to enter structure 150).
  • feedback provided by platform 200 at step 2008 to an initially detected visitor may convey a request for the detected visitor to provide more and/or specific information about the visitor's identity and/or the visitor's intent using any suitable output component of doorbell 106 or any other smart device of environment 100 that may be detected by the visitor.
  • feedback may include any suitable audible and/or visual request for the visitor to physically communicate with environment 100, such as a request to "please state your full name and your intent".
  • such feedback may include any suitable request for the visitor to avail at least a specific portion of the visitor to environment 100 for being properly sensed by environment 100 (e.g., within a detection range of a sensing component 828 of doorbell 106), such as a request to "please align your face with the doorbell's camera” or "please present a form of identification to the doorbell's scanner” or any other suitable instructions for facilitating the detection of any specific visitor identification information and/or visitor intent information.
  • Label ID may be any suitable form of visitor identification, such as a label of package PL or a driver's license of the visitor or an identification tag of a delivery drone or an RFID tag of a pet or personal property, etc., that may be properly sensed by environment 100.
  • process 2000 may include detecting an act of the visitor based on the provided feedback of step 2008 (e.g., an act performed by the visitor in response to the provided feedback).
  • Doorbell 106 and/or any other smart device of environment 100 may be configured to detect an action of the visitor at step 2010 in response to platform 200 providing the visitor with feedback at step 2008, where that action may be any suitable action indicative of the visitor interacting with environment 100 (e.g., doorbell 106) in a particular way.
  • doorbell 106 may detect such additional visitor
  • Any suitable action of the visitor may be detected or otherwise received by any suitable component of environment 100 and/or otherwise of platform 200 at step 2010, where such detection may enable platform 200 to update system-information about the detected visitor, such as with respect to the specific identity of the visitor (e.g., neighbor Billy Bob), the specific type of visitor (e.g.. Federal Express deliverer, child, firefighter), the specific intent of the visitor (e.g., visitor wants to say hi to occupant X, visitor wants to deliver package PL, visitor wants to pick up an item it accidently left at environment 100, etc.), and/or the like.
  • a visitor may communicate with platform 200 at step 2010 via any suitable communication enabled by a smart device of environment 100 accessible by the visitor and/or via any suitable
  • suitable visitor identification data may be communicated with platform 200 by the visitor at step 2010 via visitor gestures towards doorbell 106, as may be described above with respect to smart device 104, via visitor touch input via a touch user interface 812, via visitor audible spoken information via microphone 844, and/or the like.
  • a visitor may scan a driver's license or other suitable identification such as the visitor's face or fingerprint (e.g., at a scanner sensing component 828 of doorbell 106).
  • platform 200 may be configured to automatically detect such additional visitor identification/intent information at step 2010 without prompting the visitor to do so at step 2008.
  • label ID may be automatically detected by a sensing component 828 of doorbell 106 when a visitor is present within a specific distance of doorbell 106 and not in response to a specific act of the visitor done in response to a specific feedback request of platform 200.
  • Specific visitor identification/intent information detected may then be analyzed by platform 200 for more specifically identifying the visitor or its intent (e.g., by repeating step 2004).
  • platform 200 may be operative to analyze such detected visitor information by running any suitable facial detection or fingerprint or other biometric sensing algorithms or any other suitable entity identification algorithms or comparisons using any available databases or processing paradigms or extrinsic information, such as social network contact information of various entities known by the various occupants of environment 100 or known agent information of various business/emergency response entities or known sex offenders or criminals or missing person/pet identification databases of law enforcement agencies in order to detect or confirm the identity of the visitor.
  • One or more iterations of detecting visitor information, analyzing detected visitor information, providing the visitor with feedback, and/or detecting an act of the visitor of process 2000 may be conducted by platform 200 (e.g., via doorbell 106, any other smart devices of environment 100, and/or any other processing capabilities of platform 200), with or without any active communication from a system user or third party, in order to determine the identity and/or intent of a detected visitor with any suitable amount of clarity, confidence, accuracy, and/or specificity for effectively handling the visitor.
  • process 2000 may include communicating with at least one of the user and the visitor based on the detected identity and/or intent of the visitor.
  • Doorbell 106 and/or any other smart device of environment 100 may be configured to confimi detection of an identity and/or intent of the visitor with the visitor (e.g., by communicating any suitable confirmation information directly to the visitor via doorbell 106).
  • doorbell 106 and/or any other component of environment 100 and/or system 164 may be configured to confimi detection of an identity and/or intent of the visitor with a user of environment 100 (e.g., by communicating any suitable confirmation information to the user via any suitable smart device of environment 100 or personal device 166 of the user, similarly to any communication of step 2006). This may enable the visitor and/or the user to remain updated with respect to the current status of the handling of the visitor by platform 200.
  • steps 2002-2012 of process 2000 may be repeated for any suitable visitor handling.
  • feedback requesting additional visitor identification information may be provided to the visitor at step 2008, in response to which an action of the visitor attempting to provide additional visitor information may be detected by the smart environment at step 2010 and any additional visitor information of that detected action may be analyzed at step 2004, in response to which one or more of steps 2005-2012 may again follow.
  • process 2000 may support a virtual interaction between a visitor and platform 200 (e.g., environment 100 or service 164 as an automated agent of a system user).
  • Platform 200 may be operative to enable certain functionality of doorbell 106 to being utilized by a visitor whether or not certain visitor identification information and/or certain visitor intent information has been confirmed. For example, platform 200 may be operative to enable the visitor to leave any suitable message for a system user of
  • doorbell 106 may be operative to enable the visitor to record such a message (e.g., via microphone 844), whereby such a message may then be eventually communicated to a system user of environment 100 (e.g., according to any applicable rules or inferences or mode settings).
  • doorbell 106 may be operative to provide feedback to the visitor indicative of the ability of doorbell 106 to receive such a message (e.g., via audio speaker 836 or projector 830 communicating such a possibility to the visitor, such as by conveying a message like "leave a voicemail for a user of
  • a neighbor visitor may be swinging by environment 100 to return a mitten that was accidently left by a system user at the neighbor's home, and such a visitor may simply provide a message for capture by platform 200 at step 2010 (e.g., "Hi, this is neighbor Billy Bob, I am leaving your mitten at your doorstep"), and platform 200 may then share that message with a system user at a time convenient to the user at step 2012.
  • a message for capture by platform 200 at step 2010 e.g., "Hi, this is neighbor Billy Bob, I am leaving your mitten at your doorstep
  • Platform 200 may be operative to prevent certain functionality of doorbell 106 from being utilized by a visitor until certain visitor identification information and/or certain visitor intent information has been confirmed.
  • user interface button 812 of doorbell 106 may be disabled or presented to the visitor as non-functional (e.g., by displaying a "disabled” message on the button) until any suitable condition has been confirmed by platform 200.
  • doorbell 106 may encourage a visitor to interact with platform 200 in a cooperative manner (e.g., to provide appropriate visitor information at step 2008). This may dissuade a visitor from inceimpulsly pressing button 812 or otherwise interacting with doorbell 106 in an unproductive manner.
  • the actual functionality of doorbell button 812 may be enabled or disabled based on any suitable settings of
  • platform 200 (e.g., if a visitor presses doorbell button 812 despite being presented to the visitor as non-functional, such a visitor interaction may be detected by platform 200 and handled in any suitable way, such as by outputting an audible tone at one or more smart devices of environment 100 for alerting an occupant of the visitor and/or by storing data indicative of that visitor interaction for later use (e.g., for security profiling and/or user review as described below)).
  • platform 200 may attempt to analyze certain system data (e.g., at step 2004) and/or to communicate with a system user during process 2000 (e.g., at step 2006), such as for enabling a user to decide actively how platform 200 may proceed with handling a detected visitor, platform 200 may also be operative to simultaneously communicate certain information to the detected visitor while such analysis and/or user communication is attempted. For example, certain feedback may be provided by environment 100 (e.g., by doorbell 106) to a detected visitor at step 2008 while platform 200 may also be at least attempting to analyze data at step 2004 and/or to communicate with a user at step 2006. Such feedback may be provided for maintaining the visitor's attention and/or for providing security to environment 100.
  • environment 100 e.g., by doorbell 106
  • Such feedback may be provided for maintaining the visitor's attention and/or for providing security to environment 100.
  • such feedback may be a communication instructing the visitor to wait for further instructions (e.g., by playing "hold music” or “hold video” (e.g., an advertisement) or telling the visitor "please wait a moment"), which may maintain the visitor's attention and/or ensure the visitor that their arrival is being handled.
  • Any other suitable message which may be customizable by a system user and utilized by platform 200 based on current mode settings or otherwise, may be provided to a detected visitor (e.g., "if you are a solicitor, please leave this property immediately otherwise you are hereby agreeing to pay the system user $50").
  • such feedback may be a communication that may convey to the visitor that some active occupancy exists at environment 100 (e.g., by outputting audio of a dog barking from within structure 150, as also described above with respect to step 2005), which may increase the security of environment 100 rather than having the visitor wait for instructions amidst silence that may lead the visitor to assume that no one is home, whether or not that assumption is correct.
  • the type of such feedback may vary based on the identity and/or intent of the visitor as may be already determined by platform 200. For example, if the visitor has been determined to be somewhat trusted (e.g., a known acquaintance of a system user or a deliverer of a trusted delivery entity business, etc.), then pleasant hold music may be provided as such feedback. However, if the identity of the visitor has not yet been determined or has been determined to be a stranger or otherwise suspect, then dog barking or other security-enhancing feedback may be provided.
  • the type of attempted communication with a user may vary based on the identity and/or intent of the visitor as may be already determined by platform 200 (e.g., at step 2002/2004). For example, if the visitor has been determined to be somewhat trusted (e.g., a known acquaintance of a system user or a deliverer of a trusted delivery entity business, etc.), then attempted cominunication with the user may be conducted by platform 200 through indicating as much (e.g., communication conveying "your acquaintance Billy Bob is here" or "a Federal Express deliverer is here").
  • somewhat trusted e.g., a known acquaintance of a system user or a deliverer of a trusted delivery entity business, etc.
  • attempted cominunication with the user may be conducted by platform 200 through indicating as much (e.g., communication conveying "your acquaintance Billy Bob is here" or "a Federal Express deliverer is here").
  • an attempted communication with the user may be conducted by platform 200 through indicating as much (e.g., communication conveying "an unknown visitor is here").
  • a communication technique that may prompt a pet dog to bark loudly e.g., emitting a high-pitched "dog whistle” type communication from an output component of a smart device of environment 100
  • an attempted communication may be carried out using a communication technique that may not prompt a pet dog to bark loudly (e.g., emitting a communication (e.g., visual information and/or
  • Platform 200 may be configured to selectively enable a conventional doorbell interface to the visitor at step 2008 (e.g., based on any suitable analysis at step 2004). For example, when any visitor is detected at environment 100 or when a specific type of visitor is detected at environment 100 during any mode or during a particular mode of
  • platform 200 may be operative to provide feedback to the visitor at step 2008 that may be indicative of a visitor's option to interact with doorbell button 812 of doorbell 106 for attempting to announce the visitor's presence to an occupant of environment 100.
  • doorbell 106 may be operative to communicate to the visitor via any suitable communication mechanism (e.g., via
  • any suitable feedback indicating that button 812 has been enabled for optional visitor interaction e.g., feedback conveying a message along the lines of "the visitor may ring doorbell button 812 to attempt to alert an occupant of your presence"
  • this may be enabled by platform 200 if a current occupant of environment 100 is not in a do-not-disturb mode but is willing to be notified of visitors in response to a visitor's active interaction with a doorbell button. This may also provide the visitor with some sense of control in the process.
  • such feedback may be more specific based on current active occupancy or mode of environment 100. As just one specific example, if a first user A (e.g...).
  • Husband 1718 is an active and available occupant at environment 100 but a second user B (e.g., Wife 1714) is currently unavailable at environment 100 (e.g., as may be determined through analysis at step 2004), doorbell 106 may be operative to communicate to the visitor via any suitable communication mechanism (e.g., via projector 830, speaker 836, or an indicator on button 812 itself) any suitable feedback indicating that button 812 has been enabled for optional visitor interaction for attempting to alert only first user A but not second user B of the visitor's presence.
  • any suitable communication mechanism e.g., via projector 830, speaker 836, or an indicator on button 812 itself
  • platform 200 may be operative to provide the visitor with the option to choose whether or not to "ring" doorbell button 812 for attempting to alert occupant user A of the visitor's presence, which may increase the convenience of not only the visitor but also of occupant user A, for example, when the visitor may choose to walk away from environment 100 without ringing the bell if the visitor only wanted to see user B but not user A. This too may provide the visitor with some sense of control in the process.
  • the visitor may choose to interact with button 812 of doorbell 106 for alerting the available occupant(s) of its presence at step 2010.
  • doorbell 106 may provide the visitor with the ability to selectively choose which of the available occupants may be notified of the visitor's presence (e.g., at step 2010).
  • a first portion of button 812 may indicate that visitor interaction therewith may notify a first available occupant of the visitor's presence (e.g., using an output component of a first smart device proximate the first occupant), while a second portion of button 812 may indicate that visitor interaction therewith may notify a second available occupant of the visitor's presence (e.g., using an output component of a second smart device proximate the second occupant), and while a third portion of button 812 may indicate that visitor interaction tlierewith may notify both the first available occupant and the second available occupant of the visitor's presence.
  • FIG. 31 is a flowchart of an illustrative process 3100 for handling a visitor at a smart environment that includes a number of smart devices.
  • process 3100 may include detecting visitor information associated with the visitor at the smart environment using a first smart device of the smart devices.
  • process 3100 may include analyzing the detected visitor information using a computing system that is communicatively coupled to the first smart device.
  • process 3100 may include, based on the analyzing, providing feedback from the computing system to the visitor via a second smart device of the smart devices, wherein the feedback includes an option message indicative of at least one option available to the visitor.
  • visitor identity and/or intent may be analyzed (e.g., at step 2004/2006) in conjunction with any other suitable data (e.g., occupancy data or availability data or settings of a mode of environment 100 or of a system user, inferences, rules, user input, neighboring smart environments, third party entities, time of day, etc.) and then various potential types of specific feedback may be provided to the visitor based on that analysis (e.g., at step 2008) and/or various functionalities of smart devices of environment 100 may be adjusted based on that analysis (e.g., at step 2005).
  • suitable data e.g., occupancy data or availability data or settings of a mode of environment 100 or of a system user, inferences, rules, user input, neighboring smart environments, third party entities, time of day, etc.
  • platform 200 may be operative to take particular action (e.g., automatically) based on various factors of the particular situation for controlling doorbell 106 and/or any other suitable smart devices of environment 100 to increase the security of environment 100, increase the efficiency of the visitor's intentions, increase the convenience of a system user with respect to the handling of the visitor, and the like.
  • platform 200 When a general class of visitor has been determined, various actions may be taken by platform 200. For example, when a deliverer visitor of a known delivery business entity has been detected, platform 200 may be operative to communicate any suitable delivery instructions to the visitor, as described above. As another example, when a firefighter visitor has been detected, platform 200 may be operative to grant access to structure 150 in all situations or only in certain situations (e.g., if a hazard detector 104 has detected a specific type of hazard within structure 150 and no occupant activity has been detected within a certain duration of time). As another example, if a solicitor visitor has been detected (e.g., an entity with an identified intention to solicit something from a system user of
  • platform 200 may be operative to communicate any suitable message to the solicitor (e.g., "please leave this property immediately or you will be subject to arrest” or "please kindly leave a message with doorbell 106 and your solicitation will be considered at a later time”).
  • the solicitor e.g., "please leave this property immediately or you will be subject to arrest” or "please kindly leave a message with doorbell 106 and your solicitation will be considered at a later time”
  • platform 200 may be operative to communicate any suitable status information of that system user to the visitor, where such status information may indicate that the user is currently napping, that the user is currently putting the baby down for a nap but will be available in a few minutes, that the user is currently away from but driving towards environment 100 with an expected arrival time in a few minutes, that the user is currently at the grocery store, or any other suitable status information that may be determined by platform 200.
  • Platform 200 may enable a system user (e.g., via an application on a user device 166) to define different sharing thresholds for different visitors, such that a user may enable platform 200 to share only particular status information with particular visitors at particular times as the user desires.
  • a system user may define a mode setting that instructs platform 200 to convey a particular message if a particular visitor is detected at environment 100 at a particular time, such as "Hi neighbor Billy, I am currently napping but I left your sunglasses hidden next to the large oak tree in the backyard for your own retrieval".
  • platform 200 may be operative to adjust a functionality of a smart device in conjunction with conveying such a message to a particular detected visitor, such as by conveying the message "Hi Uncle Nick, I am sorry I am running late, I will be home in 10 minutes, please go inside and make yourself comfortable” with doorbell 106 while also temporarily unlocking door 186 with doorknob 122.
  • a do-not-disturb mode that may be enabled by a system user when he is napping may include conditional settings that may be operative to instruct platform 200 to interact with most detected visitors by conveying a message to the visitor that "the occupant is currently unavailable at this time, please try again later", but that may be operative to instruct platform 200 to interact with a particular detected visitor (e.g., a highly anticipated visitor) by conveying a unique message "the occupant will be with you in just a moment" to the visitor and to immediately alert the napping user of the particular detected visitor (e.g., via any suitable smart device
  • any suitable message may be conveyed and/or any suitable smart device functionality may be adjusted by platform 200.
  • Platform 200 may be operative to remind system users of certain expected visitors in order to enable adjustment of certain mode settings.
  • platform 200 may leverage any suitable data, such as user calendar event data, deliverer entity business shipping schedule data, and the like to identify certain periods of time during which a visitor is expected at environment 100, and platform 200 may enable adjustment of certain mode settings for handling such visitors in advance of that mode being enabled for execution by platform 200.
  • delivery entity business 228 e.g., Federal Express
  • system 164 e.g., via API 210
  • platform 200 may utilize such information to alert a system user of that expected delivery time if it may coincide with a time frame of a particular mode to be enabled at environment 100.
  • platform 200 may identify that the deliver ⁇ ' of package PL is planned for within that 3 hour time period, communicate as much to the user, and may enable user-adjustment of certain mode settings of the do-not-disturb mode that may affect the handling of the delivery of that particular package PL.
  • the do-not-disturb mode may initially include mode settings operative to instruct platform 200 to tell any detected visitor to come back at a later time, but the expected delivery of package PL may require a physical user signature in order to complete the delivery, whereby platform 200 may be operative to analyze such data and ask the user whether it would like to adjust a setting of the do-not-disturb mode for the handling of that particular delivery visitor (e.g., "would you like to update the settings to alert you if this particular package is attempted to be delivered during the do-not-disturb mode?"), such that the user may update the mode settings of the do-not-disturb mode to instruct platform 200 to wake up the napping user if the delivery of package PL is actually detected by environment 100 at doorbell 106 while that do-not-disturb mode is enabled.
  • a setting of the do-not-disturb mode for the handling of that particular delivery visitor (e.g., "would you like to update the settings to alert you if this particular package is attempted to
  • a calendar application for a particular user may be accessed and analyzed
  • platform 200 may utilize such information to alert a system user of that expected visitor time if it may coincide with a time frame of a particular mode to be enabled or recently enabled at environment 100.
  • platform 200 may automatically identify that the time frame of the expected visitor may overlap with the enablement time frame of the do-not-disturb mode, may communicate this identified overlap to the user, and may enable the user to adjust one or more mode settings of that enabled mode in order to affect the handling of that expected visit.
  • the do-not-disturb mode may initially include mode settings operative to lock gated entry 1 16 and to convey a message to any detected visitor at gated entry 116 (e.g., via a doorbell 106 at gated entry 116) that "no one is available at this time, please come back again later", however such visitor handling may prevent an expected pool repairman from servicing a pool of environment 100 beyond gated entry 1 16, whereby platform 200 may be operative to analyze such data and ask the user whether it would like to adjust a setting of the do-not-disturb mode for the handling of that particular repairman visitor (e.g., "would you like to update the settings to enable access to the outdoor pool if a visit by this particular repairman is detected during the do-not-disturb mode?"), such that the user may update the mode settings of the do-not-disturb mode to instruct
  • platform 200 to temporarily unlock gated entry 116 if the pool repairman is actually detec ted by environment 100. Therefore, platform 200 may be operative to analyze expected visitor information in combination with mode settings of any modes to be enabled during expected visits and may be operative to either automatically update certain mode settings or automatically suggest certain mode setting updates to a system user based on that analysis. This may add an additional layer of convenience to a system user with respect to the handling of visitors at environment 100 by platform 200.
  • FIG. 32 is a flowchart of an illustrative process 3200 for handling a visitor at a smart environment that includes a number of smart devices.
  • process 3200 may include detecting visitor information associated with the visitor at the smart environment using a first smart device of the smart devices.
  • process 3200 may include analyzing the detected visitor information using a computing system that is communicatively coupled to the first smart device.
  • process 3200 may include, based on the analyzing, providing feedback from the computing system to the visitor via a second smart device of the smart devices, wherein the feedback includes at least one of a pre-recorded system message from the computing system to the visitor and a user message from a user of the smart environment to the visitor.
  • FIG. 33 is a flowchart of an illustrative process 3300 for handling a potential visit by a visitor at a smart environment that includes a number of smart devices.
  • process 3300 may include obtaining, at an environment computing system, potential visit data associated with the status of a potential visit.
  • process 3300 may include obtaining, at the environment computing system from at least one sensor of at least one smart device of the smart devices, environment data associated with the status of the smart environment.
  • process 3300 may include analyzing, with the environment computing system, at least a portion of the obtained potential visit data in combination with at least a portion of the obtained environment data.
  • process 3300 may include adjusting, with the environment computing system, a setting of a do-not-disturb mode of the smart environment based on the analyzing.
  • Platform 200 may be operative to detect any suitable type of behavior of a visitor, in addition to or as an alternative to merely the presence, identification, and/or intent of the visitor, and platform 200 may be operative to analyze such detected visitor behavior for increasing the effectiveness of platform 200 to secure environment 100 and/or to handle a visitor. For example, certain detected behavior of a visitor may be analyzed and deemed suspicious, in response to which one or more security features of platform 200 may be leveraged for increasing the security of environment 100. Additionally or alternatively, certain detected behavior of a visitor may be analyzed and deemed informative for use in strengthening any suitable inferences that may be made by any suitable component(s) of platform 200.
  • Any suitable behavior of a visitor at environment 100 may be detected by any suitable portion of platform 200, including any sensing components) of doorbell 106, entry detector 112, doorknob 122, and/or any other suitable smart device of environment 100.
  • Certain visitor behavior may be detected as suspicious and leveraged to increase the security of environment 100 in one or more ways.
  • platform 200 may be operative to detect if/when a visitor attempts to open a door or other entry point to a portion of environment 100 before platform 200 has granted that visitor access to such an entry point, in response to which platform 200 may be operative to leverage the detection of such suspicious visitor behavior to adjust certain security' mechanisms of environment 100.
  • one or more sensing components of doorbell 106 e.g., a camera
  • entry detector 112 at door 186 may be operative to detect when a visitor touches doorknob 122 and/or otherwise attempts to gain access to structure 150 through a closed door 186.
  • smart doorknob 122 may include one or more sensing components 1428, which may include any suitable sensing components similar to those described above with respect to sensing components 828, and which may be operative to detect when a visitor twists, grabs, pulls, or at least touches doorknob 122 and/or otherwise attempts to gain access through door 186.
  • sensing components 1428 may include any suitable sensing components similar to those described above with respect to sensing components 828, and which may be operative to detect when a visitor twists, grabs, pulls, or at least touches doorknob 122 and/or otherwise attempts to gain access through door 186.
  • sensing components 1428 may include any suitable sensing components similar to those described above with respect to sensing components 828, and which may be operative to detect when a visitor twists, grabs, pulls, or at least touches doorknob 122 and/or otherwise attempts to gain access through door 186.
  • sensing components 1428 may include any suitable sensing components similar to those described above with respect to sensing components 828, and which
  • components 1428 may be positioned within a handle portion 1401 of doorknob 122 that may be accessible to a visitor beyond an external side 186e of door 186, where an internal side 186i of door 186 may face an interior of structure 150 when door 186 is closed for preventing entry of the visitor into structure 150, and at least one sensing component 1428 may be operative to detect visitor touching, rotation, pulling, grabbing, or any other suitable visitor interaction with doorknob handle 1401 or with any other suitable portion of doorknob 122.
  • one doorknob sensing component 1428 may include an accelerometer or any other suitable motion sensing component for detecting certain visitor interaction with doorknob 122.
  • a doorknob sensing component 1428 may include a biometric sensing component, such as a fingerprint detector, that may be operative to detect certain specific identification information of a visitor interacting with doorknob 122 (e.g., for use in determining visitor trust and/or unlocking doorknob 122). Any other suitable visitor behavior may be detected and deemed suspicious by platform 200 for initiating enhanced security features other than visitor interaction with doorknob 122 prior to being granted access through closed door 186.
  • a biometric sensing component such as a fingerprint detector
  • platform 200 may be operative to analyze detected information (e.g., at steps 2002/2004) to deem any one of the following or any combination of the following visitor interactions to be suspicious: any suitable unauthorized interaction with doorknob 122 (e.g., physically touching, grabbing, twisting, pulling, etc.); any suitable unauthorized interaction with structure 150 (e.g., visitor physically knocking on door 186 or opening a mail slot or other feature of door 186); one or more failed attempts by the visitor to supply a correct access code or other suitable authentication for entry through closed door 186; interaction with user interface button 812 of doorbell 106 in an unauthorized manner (e.g., a visitor pressing button 812 when button 812 is presented as disabled); any inappropriate visitor interaction with one or more components of a smart device (e.g., a v isitor blocking a camera sensing component 828 of doorbell 812); any visitor behavior that prevents or inhibits visitor identification (e.g., a visitor detected to be wearing a mask); and the like.
  • platform 200 may be operative to adjust a functionality of environment 100 to increase the security thereof.
  • a first or additional lock e.g., a lock of doorknob 122
  • a lock of doorknob 122 may be enabled by platform 200 to more securely retain door 186 in its closed position.
  • an alarm or any other suitable message may be conveyed by platform 200 to (i) the visitor (e.g., by doorbell 106) for instructing the visitor to stop attempting to open door 186 but rather interact only with doorbell 106 and/or (ii) to a system user (e.g., by personal device 166) for alerting the user of the detected suspicious behavior and/or (iii) to an appropriate trusted third party (e.g., law
  • platform 200 may be operative to increase the sensing functionality of one or more smart devices of environment 100 in response to detecting suspicious visitor behavior, such as, by increasing the sampling rate of a sensing component, by increasing or varying the sensing area covered by a sensing component, by turning on one or more additional sensing components (e.g., biometric/fingerprint scanner of doorknob 122, etc.) that may have previously been turned off for power conservancy, etc. to increase the security of
  • environment 100 e.g., by enhancing the ability of environment 100 to monitor any additional potential visitor activity or identify the visitor in any suitable way).
  • Certain visitor behavior may be detected as informative and leveraged for use in strengthening any suitable inferences that may be made by any suitable component(s) of platform 200.
  • platform 200 may be operative to detect when a visitor is granted access through door 186 or is not granted access through door 186 and may update any platform-information based on that treatment of the visitor and any other interaction that visitor had with environment 100.
  • a detected visitor e.g., as detected at one or more iterations of step 2002
  • door 186 e.g., through any suitable workings of platform 200, such as a system user interacting with platform 200 for authorizing the opening of door 186 for that visitor or that visitor successfully providing an authorized access code for electronically opening door 186
  • any suitable visitor information gathered about that visitor e.g., pictures, fingerprints, voice samples, identification card information, visitor interaction with doorbell 106 or doorknob 112 or any other portion of environment 100 prior to the visitor's authorized access, etc.
  • platform 200 for associating that visitor information with a "trusted" entity of environment 100.
  • any suitable visitor information gathered about that visitor e.g., pictures, fingerprints, voice samples, identification card information, visitor interaction with doorbell 106 or doorknob 112 or any other portion of environment 100 prior to the visitor's access being declined, etc.
  • platform 200 may leveraged in any suitable way by platform 200 for associating that visitor information with an "untrusted" entity of environment 100.
  • An association of detected visitor information with determined visitor accessibility treatment for a given visitor interaction with environment 100 may be leveraged by platform 200 as data for informing the processing/analysis of any suitable operation or setting or inference or rule of platform 200, including any futui'e attempt to detect the identity of a visitor and/or the level of taist to be afforded to such a visitor.
  • any or all visitor information detected by doorbell 106 or otherwise by environment 100 about the identification of that visitor and/or its interaction with environment 100 may be leveraged in the future for any suitable purpose by platform 200, such as for increasing the efficiency with which platform 200 may handle a later visit by that particular visitor at environment 100 or any other environment of platform 200 (e.g., by using that data for more quickly identifying the visitor or for more reliably classifying the visitor as a trusted or untrusted visitor for use in determining how platform 200 may handle that later visit).
  • platform 200 may be operative to classify the detected visitor as a "trusted" entity and may utilize that classification for enhancing the current handling of that visitor (e.g., by sharing that trusted classification and any other suitable information, such as the fact that the same visitor was granted access five days ago, with a system user of environment during the current visitor handling (e.g., at step 2006)).
  • analysis e.g., at step 2004
  • if analysis e.g., at step 2004) of detected visitor information is not able to reveal the specific identity of a detected visitor currently at environment 100 but such analysis is able to reveal that the detected visitor was previously denied access to
  • platform 200 may be operative to classify the detected visitor as an "untrusted” entity and may utilize that classification for enhancing the current handling of that visitor (e.g., by sharing that untrusted classification and any other suitable information, such as the fact that the same visitor was denied access five days ago, with a system user of environment during the current visitor handling (e.g., at step 2006) or by more securely locking door 186 (e.g., at step 2005)).
  • FIG. 34 is a flowchart of an illustrative process 3400 for handling a visitor at a smart environment that includes a number of smart devices.
  • process 3400 may include detecting visitor behavior information indicative of particular behavior of the visitor at the smart environment using a first smart device of the smart devices.
  • process 3400 may include analyzing the detected visitor behavior information using a computing system that is communicatively coupled to the first smart device.
  • process 3400 may include, based on the analyzing, determining, using the computing system, that the particular behavior of the visitor is suspicious.
  • process 3400 may include based on the determining, adjusting, using the computing system, a functionality of a second smart device of the smart devices.
  • FIG. 35 is a flowchart of an illustrative process 3500 for handling a visitor at a smart environment that includes a number of smart devices.
  • process 3500 may include detecting visitor behavior information indic ative of particular behavior of the visitor at the smart environment using a first smart device of the smart devices.
  • process 3500 may include detecting visitor identity information associated with the identity of the visitor at the smart environment using a second smart device of the smart devices.
  • process 3500 may include analyzing the detected visitor behavior information using a computing system that is communicatively coupled to the first smart device.
  • process 3500 may include, based on the analyzing, determining, using the computing system, that the particular behavior of the visitor is indicative of a determination of accessibility of the visitor to a secure area of the smart environment.
  • process 3500 may include, based on the determining and the detected visitor identity information, adjusting, using the computing system, at least a portion of an inference available to the computing system.
  • Platform 200 may be operative to leverage data collected by one or more various other smart environments and/or entities 222-230 and/or other suitable data sources of platform 200 for increasing the security of a particular environment 100 during a visitor interaction at environment 100 and/or for enhancing the efficiency/convenience of how that visitor interaction is handled at environment 100. For example, data collected by smart environments or other entities that are within a suitable threshold distance of
  • environment 100 may be leveraged by platform 200 for adjusting the functionality of smart devices of environment 100 and/or analyzing data associated with smart environment 100.
  • the threshold distance defining the relationship between such remote data collection sources and environment 100 may vary based on the purpose of leveraging the data from such remote data sources.
  • Data indicative of a particular visitor being detected by one or more smart environments other than environment 100 or by one or more third party entities 222-230 or by any other detection source of platform 200 may be leveraged by platform 200 for affecting the operation of smart environment 100 with respect to handling the potential arrival of that particular visitor at environment 100.
  • platform 200 may leverage any suitable information about that detected visitor for any suitable use at other environments or entities of platform 200, such as at one or more entities 222-230 associated with environment lOOa/location LA and/or at smart environment 100b at location LB and smart environment lOOc at location LC and smart environment 100 at location LU, each of which may be within a particular distance DD of detecting environment 100a.
  • Platform 200 may be operative to determine that a particular visitor of interest has been detected at any suitable location, not only from visitor information detected at a smart environment of platform 200 (e.g., at one or more of environments 100, 100a, 100b, 100c, etc.) but also from visitor information detected by any suitable entity of platform 200 whether or not that entity' is local to a smart environment (e.g., by a personal device 166 of user UR or Wife 1714 remote from environment 100, or by a device 266 of any agent of any entity 222-230, or by any other device capable of sensing visitor information at any particular location and sharing such detected visitor information with any suitable component of platform 200).
  • a smart environment of platform 200 e.g., at one or more of environments 100, 100a, 100b, 100c, etc.
  • visitor information detected by any suitable entity of platform 200 whether or not that entity' is local to a smart environment (e.g., by a personal device 166 of user UR or Wife 1714 remote from environment 100, or by
  • a "visitor” that may be detected by platform 200 may be any suitable entity that can be identified in any suitable way by one or more sensing components or data sources of platform 200.
  • a detectable visitor may be a human (e.g., a deliveryman or delivery woman of firefighter or security guard or any other suitable human agent of an entity 222-230 of platform 200, a system user/occupant associated with a smart environment, a friend/neighbor/acquaintance of a system user, a solicitor, a stranger, would-be-thieves, etc.), a vehicle of such a human (e.g., a car of a system user or delivery truck of a deliverer), a drone (e.g., a delivery drone or a security drone or any other unmanned vehicle or robot that may carry out certain tasks), an animal (e.g., a pet or stray animal or wild animal that may be detected via facial recognition or any other suitable detection methods such as RFID tag detection, etc.), or any other property or entity
  • platform 200 may be operativ e to increase the security of neighboring environments 100b, 100c, and 100 in any suitable way.
  • platform 200 may inform law enforcement entity 222 and/or may adjust the functionality of one or more smart devices of environment 100 by activating outdoor lighting 114 of environment 100, locking all entry points to environment 100, increasing the sensing capabilities of certain sensing components of environment 100 (e.g., components 828 of doorbell 106), prioritizing the use of that suspected criminal's identification information when attempting to identify a detected visitor at environment 100 (e.g., at steps 2002/2004), warning users/occupants of environment 100 to be extra cautions/on the look-out for that suspected criminal (e.g., by communicating identification information of that suspect (e.g., a photo, last known whereabouts, etc.) via smart devices of environment 100 to its users), enabling a particular mode for environment 100 (e.g., a criminal high alert mode), and the like.
  • a particular mode for environment 100 e.g., a criminal high alert mode
  • platform 200 may inform law enforcement entity 222 and/or may adjust the functionality of one or more smart devices of
  • environment 100 for increasing the likelihood that such a visitor of interest may be detected at environment 100 (e.g., turn on outdoor lights 114, increase sensing functionality of one or more smart devices at environment 100 at least with respect to detecting the visitor of interest, etc.).
  • that event may be reported to system 164 or any other component(s) of platform 200 distinct from environment 100 (e.g., by Husband 1718 of environment 100 when he realizes the child is missing from environment 100, or automatically by one or more smart devices of environment 100 that may automatically detect when the child is no longer an occupant of environment 100, or otherwise when Child 1722 moves outside of geo-fence 1730), such that certain modes or operations or functionalities of various other smart environments of platform 200 within a particular distance of environment 100
  • platform 200 can leverage data indicative of that event such that the network-connected smart devices of other home environments in the neighborhood can be tuned to detect motions that indicate the presence of a dog. In this example, if a dog is detected by an outdoor network-connected smart device
  • any suitable specific identification information may be detected for a lost entity, such as pet, when any suitable identification component is coupled thereto.
  • an RFID tag may be provided on the dog's collar and a network-connected smart device of other home environments in the neighborhood may locate the dog by "reading" the RFID tag and sharing the location of the dog upon request (e.g., automatically by platform 200 when a located entity is known to be missing or otherwise of interest by platform 200 (e.g., by system 164 or the environment 100 that is missing the entity)- RFID tags may be placed on other property, too, such as bicycles such that other property may be located in a similar manner.
  • platform 200 may inform deliverer entity business 228 that may track such a deliverer and/or may adjust the functionality of one or more smart devices of
  • platform 200 may inform academic institution 226 that may track such solicitors and/or may adjust the functionality of one or more smart devices of environment 100 for preventing that solicitor from bothering any occupants of
  • environment 100 e.g., by preventing access of the solicitor through gated entry 1 16, enabling a do-not-disturb mode for environment 100 for a period of time within which platform 200 may estimate the solicitor may arrive at environment 100, etc.
  • detection of a particular type of visitor at a particular location within a particular distance of smart environment 100 may be leveraged by platform 200 to automatically pre-emptively prepare smart environment 100 for handling that visitor if it were to arrive at
  • environment 100 e.g., in accordance with any settings or preferences of that particular environment 100 (e.g., based on the system preferences of a user of environment 100 to interact or not interact with a solicitor)).
  • Platform 200 may be operative to monitor detected visitor identification data from all available data sources over time for tracking the path traveled by particular visitors and/or predicting a future path of such visitors. Platform 200 may leverage such a tracked path of travel for dynamically updating the operation of a certain smart environment based on the calculated likelihood that the tracked path of travel will align with the location of that smart environment.
  • platform 200 may leverage data about such a tracked path of travel for sharing with or selling to interested entities, such as law- enforcement agencies 222 (e.g., for tracked paths of suspected criminals or missing persons), animal control agencies (e.g., for tracked paths of certain animals that may be tagged or otherwise detectable by sensing components of platform 200), academic institution entities 226 (e.g., for tracked paths of certain solicitors, such as during election cycles for studying certain trends), delivery business entities 228 (e.g., for tracked paths of deliverers), emergency response entities 230 (e.g., for tracked paths of emergency risks and or emergency responders), and the like.
  • interested entities such as law- enforcement agencies 222 (e.g., for tracked paths of suspected criminals or missing persons), animal control agencies (e.g., for tracked paths of certain animals that may be tagged or otherwise detectable by sensing components of platform 200), academic institution entities 226 (e.g., for tracked paths of certain solicitors, such as during election cycles for studying certain trends), delivery business entities 228 (e.g.,
  • platform 200 may leverage a wide net of visitor sensing components (e.g., sensing components 828 of smart doorbells 106) that may be provided at effective locations (e.g., at various smart environment entry points, such as at door 186 and/or gated entry 1 16, etc.) at various environments (e.g., environments 100, 100a, 100b, 100c, lOOd, lOOe, lOOf, etc.) that may be spread out across various geographical locations across a neighborhood, city, state, country, or globe, for tracking various types of visitor entities and/or specific visitor entities not only to increase the security and efficiency of those environments 100 but also to increase the effectiveness of various third party entities (e.g., entities 222-230) and paradigms (e.g., paradigms 310) of platform 200 that may have a specific interest in such detected visitors.
  • various third party entities e.g., entities 222-230
  • paradigms e.g., paradigms 310
  • Platform 200 may be operative to analyze a tracked path of a visitor for making inferences regarding the likelihood of a predicted future path for that visitor, and to adjust functionalities of a smart environment based on such tracking and predicting. For example, in response to detecting a suspected criminal at environment 100a at a first location LA at a first time, platform 200 may inform law enforcement entity 222 of the specifics of that detection and/or may adjust the functionality of one or more environments within a certain distance DD of location LA, such as environment 100b at location LB and environment 100c at location LC and environment 100 at location LU (e.g., by increasing a security level of one or more smart devices of environment 100), but not remote environments lOOd, lOOe, or IOOf that may be beyond distance DD of detecting location L A.
  • platform 200 may be operative to determine that the tracked path of the suspected criminal (e.g., the direction of tracked path TP A) is moving farther away from location LU of environment 100 and, in response to that determination, platform 200 may be operative to once again adjust the functionality of environment 100, but this time by reverting the functionality back to its previous settings (e.g., by reducing a security level of one or more smart devices of environment 100).
  • the tracked path of the suspected criminal e.g., the direction of tracked path TP A
  • platform 200 may be operative to once again adjust the functionality of environment 100, but this time by reverting the functionality back to its previous settings (e.g., by reducing a security level of one or more smart devices of environment 100).
  • platform 200 may be operative to determine that the tracked path of the suspected criminal (e.g., the direction of tracked path TPB) is moving closer towards location LU of environment 100 and, in response to that determination, platform 200 may be operative to once again adjust the functionality of environment 100, but this time by increasing a security level of one or more smart devices of environment 100 to an even higher level or by putting environment 100 on even higher alert as analysis by platform 200 of the tracked path of the suspected criminal from location LA to location LB may predict a predicted future path of that criminal (e.g., the direction of predicted path PTPB) that may be determined to pose an increased likelihood that the criminal may arrive at location LU of environment 100.
  • analysis of a tracked path of a deliverer visitor may be operative to determine that the tracked path of the suspected criminal (e.g., the direction of tracked path TPB) is moving closer towards location LU of environment 100 and, in response to that determination, platform 200 may be operative to once again adjust the functionality of environment 100, but this time by increasing a security level of one or more smart
  • platform 200 may enable platform 200 to dynamically adjust a predicted potential deliverer arrival time at environment 100 and utilize that prediction to update modes or settings of environment 100 for preparing environment 100 and/or its users accordingly. Moreover, such tracking and prediction of a deliverer by platform 200 may be shared with a delivery entity business 228 for providing trusted (impartial) tracking data of its deliverer.
  • Platform 200 may be operative to detect and track the path of a neighborhood security guard or any other suitable entity amongst various smart environments that the guard may be tasked with monitoring. As described above with respect to tracking a deliverer DL, platform 200 may be operative to track a security guard or any other suitable entity as it visits various smart environments.
  • doorbell 106 or any other suitable smart device of smart environment 100 may be lev eraged for enabling accurate location and time tracking of such a security guard by detecting and logging data at each inspected environment 100 (e.g., by enabling the guard to "check-in” at env ironment 100 prior to inspecting environment 100 and "check-out" from environment 100 after inspecting environment 100).
  • a security guard is initially detected at environment 100 (e.g., via any suitable sensing component 828 of doorbell 106 or of any other suitable smart device of environment 100)
  • the identity of that guard is authenticated and the time of that detection is collected by platform 200.
  • the security guard may guarantee such detection by affirmatively using a guard identification card at doorbell 106 when initially arriving at environment 100.
  • environment 100 may be operative to activate or otherwise utilize one or more additional sensing components of environment 100 for tracking any action of the guard at
  • the security guard may be enabled to check-out from environment 100 by once again authenticating its identification at doorbell 106 or elsewhere at environment 100 before leaving environment 100.
  • system 164 may be operative to generate and report its own tracking data that may be compared to and/or relied on by a security agency entity (e.g., a security business 228) instead of any data generated by the guard, as data generated by system 164 (e.g., as may be generated by doorbell 106 and/or other smart devices of environment 100) may be trustworthy as an impartial data source (e.g., as compared to a guard who may enter incorrect data to inflate his efficiency and/or hide his inefficiencies and/or forget to enter data at all).
  • a security agency entity e.g., a security business 2248
  • platform 200 may be operative to effectively confirm the appearance and activity of any suitable entity not only at a single particular environment 100 but also to track such appearance and activity at multiple other environments for ensuring that the entity fulfills its particular obligations or for at least providing some oversight for motivating the same. While certain above examples may describe multiple smart environments in the context of distinct lots of neighboring properties (e.g., various distinct smart home environments on different plots of land within the same neighborhood or ZIP code), various other arrangements of neighboring environments may be operative to enable the various concepts of this disclosure, such as various smart environments being associated with various residential apartment units in the same condominium building structure or in various condominium building structures, or with various commercial office suites in the same commercial office building structure or in various commercial office building structures.
  • FIG. 36 is a flowchart of an illustrative process 3600 for potentially handling a visitor at a smart environment that includes at least one smart device.
  • process 3600 may include receiving, at a computing system, first visitor identification data indicative of the visitor being detected at a first location at a first time.
  • process 3600 may include analyzing, using the computing system, at least a portion of the received first identification data to determine that the visitor is of interest.
  • process 3600 may include automatically adjusting, using the computing system, a functionality of the at least one smart device of the smart environment based on the analyzing.
  • Platform 200 may be operative to enable at least partial or limited access to at least certain portions of smart environment 100 by any suitable entity, whether or not that entity is known by platform 200 (e.g., known by any smart environment or service entity 222-230 or processing paradigm 310 or extrinsic information 316 or otherwise (e.g., at system 164)). Such access may be provided to any particular entity as an invitee by generating a smart invitation that may be associated with a particular type of access to a smart environment. While process 1900 of FIG.
  • one or more steps of process 1900 may be utilized with respect to inviting an invitee (e.g., a person or other suitable entity) to be a trusted visitor at a smart environment, where unique invitation identification information may be generated based on one or more attributes of the invitation (e.g., invitation time, invitee, etc.) and/or smart environment data associated with the smart environment, and where such unique invitation identification information may be integrated into data of a smart invitation (e.g., label ID) that may be leveraged by the invitee and/or the smart environment for facilitating the accessibility of that
  • a system user of environment 100 e.g., a user with management authority to grant access to environment 100
  • the user may be enabled by platform 200 to define one or more parameters or rules or settings for environment 100 that may be satisfied by a visitor entity upon arrival at environment 100 (e.g., via doorbell 106 and/or any other suitable smart device) for gaining access to environment 100 (e.g., through gated entry 1 16 into environment 100 generally or through door 186 into structure 150 of environment 100).
  • a system user may define a mode setting that may instruct platform 200 to adjust a functionality of a smart device of environment 100 in conjunction with conveying a particular message if a particular visitor is detected at environment 100 at a particular time, such as by conveying the message "Hi Uncle Nick, I am sorry I am running late, I will be home in 10 minutes, please go inside and make yourself comfortable” with doorbell 106 while also temporarily unlocking door 186 with
  • doorknob 122 for enabling access by that particular detected visitor to structure 150 through door 186.
  • This setting may be defined by the system user interacting with platform 200 in any suitable way.
  • the system user may interact with any suitable user interface of any suitable environment smart device or user personal device for conveying to platform 200 the identity of the particular visitor to be granted access along with any suitable conditions for that access besides that visitor being detected at environment 100
  • platform 200 may only require that the system user convey the name or even a nickname (e.g., "Uncle Nick") of the particular visitor, as platform 200 may already have access to at least some identification record data for an entity with that name that may have been previously associated with environment 100 in any suitable way (e.g., as a previously detected visitor at environment 100 or as a social connection to the system user on a social network with photographs or other identification made available to platform 200 (e.g., at social paradigm 310c), etc.), such that platform 200 may be automatically enabled to adequately confirm the identity of that named particular visitor when its presence may be detected at environment 100 for carrying out the accessibility setting made by the system user.
  • a nickname e.g., "Uncle Nick”
  • platform 200 may not be pre-equipped to detect the identity of a particular visitor at environment 100 for association with a particular accessibility setting being made by the system user for that particular visitor. Instead, some identification information for the particular visitor may need to be provided to platform 200 (e.g., by the system user) such that platform 200 may leverage that identification information for later confirming the presence of the particular visitor at environment 100 for carrying out the accessibility setting made by the system user. For example, the system user may communicate unique identifying feature data of the visitor to platform 200 for later use in identifying the presence of that visitor at environment 100.
  • such unique identifying feature data may include a photograph of the visitor's face or any other visually identifiable feature, a voice sample of the visitor, a fingerprint of the visitor (e.g., if the visitor is a human), an RFID code (e.g., a unique ID code that may be associated with the visitor), or the like, which may be sensed by environment 100 if that visitor arrives at environment 100.
  • the visitor may not be aware of the accessibility setting enabled by environment 100 prior to the visitor being granted such access, but instead environment 100 may be operative to detect the visitor identification information needed by platform 200 to authenticate the visitor's identity solely due to the visitor's presence at environment 100 (e.g., due to the visitor being within a sensing range of a sensing component 828 of doorbell 106).
  • platform 200 not be pre-equipped to detect the identity of a particular visitor at environment 100 for association with a particular accessibility setting being made by a system user for that particular visitor, but also the system user may not be able to communicate unique identifying feature data of the visitor to platform 200 for later use in identifying the presence of that visitor at environment 100 (e.g., the system user may not have access to a proper photograph of the visitor that may be made available to platform 200 for enabling detection of that visitor at environment 100).
  • unique invitation identification information may be generated based on a system user's decision to generate a smart invitation for an invitee visitor with respect to environment 100, and such unique invitation identification information may be shared with both the invitee visitor and platform 200 for later use in identifying the presence of that invitee visitor at environment 100 to authorize carrying out an accessibility setting made by the system user for that invitee visitor to environment 100.
  • Such unique invitation identification information may be made available to both platform 200 and the invitee visitor without specific physical identifying feature data of the invitee being known by the system user (e.g., without the system user having access to a photograph or RFID code or other unique identifying feature of the invitee), which may increase the security and/or privacy of the invitee.
  • the unique invitation identification information generated and provided to platform 200 and the invitee visitor may be uniquely created for a particular smart invitation that might be configured to be useful one time only. While the following may describe the generation and use of such a smart invitation and unique invitation identification information in the context of an invitee visitor's access to a social gathering at a smart environment, it is to be understood that such a smart invitation concept may be leveraged for any suitable situation, including the above-described package delivery context (e.g., a Federal Express package delivery or a local restaurant food delivery).
  • package delivery context e.g., a Federal Express package delivery or a local restaurant food delivery.
  • such unique invitation identification information of such a smart invitation may be similar to the unique package identification information of label ID described above with respect to a package delivery process of FIG. 19, whereby such an invitee visitor may be the facilitator (e.g., a deliverer entity or fulfillment entity).
  • FIG. 37 is a flowchart of an illustrative process 3700 for eiihancing visitor handling using a smart invitation.
  • process 3700 may include acquiring unique invitation identification information for a smart invitation.
  • a system user wishes to define a setting for enabling certain accessibility to environment 100 to an invitee visitor through the generation of a smart invitation with unique invitation identification information for sharing with both the invitee visitor and platform 200 for later use in identifying the presence of that invitee visitor at environment 100 to authorize carrying out such an accessibility setting, the system user may generate a request to create such unique invitation identification
  • a system user may request that any suitable unique invitation identification information be generated by any suitable entity for use as at least a portion of a smart invitation.
  • Such unique invitation identification information may be any suitable data that may be sensed by a sensing component of environment 100 (e.g., by a sensing component 828 of doorbell 106) but that may preferably not be easily guessed by an entity not privy to the unique invitation identification information.
  • such unique invitation identification information may be any suitable password (e.g., a word or string of characters) of any suitable length of any suitable combination of numbers, letters, symbols, and the like
  • XASJCDCFNKWE7821DNDKN or "CLAM CHOWDER”, etc.
  • an invitee e.g., physically via mail, digitally via e-mail, orally via telephone or in person, etc.
  • a sensing component of environment 100 e.g., received at a keypad user interface sensing component 812 of doorbell 106 when manually typed in by a visitor, received at an audio sensing component 828 or at a microphone sensing component 844 of doorbell 106 when orally spoken by a visitor or at a camera sensing component 828 of doorbell 106 when presented for scanning by the visitor, etc.
  • a sensing component of environment 100 e.g., received at a keypad user interface sensing component 812 of doorbell 106 when manually typed in by a visitor, received at an audio sensing component 828 or at a microphone sensing component 844 of doorbell 106 when orally spoken by a visitor or at a camera sensing component 828 of doorbell 106 when presented for scanning by
  • two-dimensional or matrix barcode e.g., a quick response (“QR") code
  • QR quick response
  • three-dimensional barcode or the like, that may be uniquely generated but also easily shared with an invitee (e.g., physically via mail, digitally via e-mail, etc.) and sensed by a sensing component of environment 100 (e.g., read by a scanner sensing component 828 of doorbell 106).
  • a sensing component of environment 100 e.g., read by a scanner sensing component 828 of doorbell 106.
  • such unique invitation identification information may be any electronically stored information, such as such information stored on an RFID or NFC device or any other suitable component from which such electronically stored information may be obtained (e.g., electromagnetically or through electromagnetic induction), where such unique invitation identification information may be uniquely generated and stored on such a component and then shared with an invitee (e.g., physically via mail, etc.) and sensed by a sensing component of environment 100 (e.g., read by an NFC sensing component or RFID sensing component 828 or other electromagnetic sensing component of doorbell 106).
  • the system user may generate the unique invitation identification information itself (e.g., by simply making one up in its head).
  • any suitable component of platform 200 may generate the unique invitation identification information on behalf of the system user.
  • a third party entity may generate the unique invitation identification information on behalf of the system user (e.g., an order facilitator entity, such as a restaurant with which a system user is placing a food order for delivery to environment 100, where such unique invitation identification information may be a confirmation code for that specific order, etc.).
  • process 3700 may include sharing the acquired unique invitation identification information with an invitee (e.g., as at least a portion of a smart invitation). For example, once particular unique invitation identification information has been generated or otherwise acquired (e.g., at step 3702), such unique invitation identification information may be shared by the system user with a particular invitee with which the system user may wish to associate a particular accessibility setting at environment 100. The system user may create a smart invitation including the unique invitation identification information and may communicate the smart invitation to the invitee using any suitable communication mechanism.
  • the system user may simply call a human invitee on the telephone and orally share the password with the invitee as part of a smart invitation (e.g., "your password is 'XSG27HT'") along with any other suitable information that may help the invitee use the password, such as the reason for the password (e.g., "Use your password to access my birthday party"), the address of environment 100 (e.g., "Present your password to the smart doorbell adjacent the front door at 123 Main Street"), the time at which the invitee should use the password (e.g., "anytime between 7:00pm and 11:00pm this Saturday"), and/or any special or additional instructions (e.g., "You must wear red to be granted access as we will be celebrating Valentine's Day").
  • the reason for the password e.g., "Use your password to access my birthday party
  • the address of environment 100 e.g., "Present your password to the smart doorbell adjacent the front door at 123 Main Street”
  • the user may physically mail or e-mail a written message conveying similar information as a smart invitation to the invitee.
  • the unique invitation identification information is a code that may be presented by an invitee for scanning at environment 100
  • the system user may physically mail a print out of the code or e-mail or otherwise communicate a digital copy of the code (e.g., that may be printed by the invitee for use or presented in its digital form by the invitee for use) along with any other suitable information descriptive of the intended use of the code to the invitee as a smart invitation.
  • the unique invitation identification information for a particular smart invitation may be provided in a physical tag, such as an RFID tag or NFC element that may be mailed to the invitee or otherwise made accessible to the invitee for use at environment 100.
  • platform 200 may be operative to generate a complete smart invitation for the system user and communicate that smart invitation to an invitee on behalf of the system user for making the entire process easier for the system user.
  • the system user may simply have to communicate to platform 200 a communication address for the invitee (e.g., an e-mail address of the invitee) and any other suitable information that the user may wish to include in the smart invitation (e.g., the time of the party, dress code, location of environment 100 at which the party may be held, etc.), and platform 200 may be operative to automatically generate and transmit to the invitee a smart invitation that may include not only the unique invitation identification information but also the other information describing the invitation.
  • a communication address for the invitee e.g., an e-mail address of the invitee
  • any other suitable information that the user may wish to include in the smart invitation e.g., the time of the party, dress code, location of environment 100 at which the party may be held, etc.
  • a web browser or a mobile application may be operative to provide such a service to a system user for generating unique invitation identification information and/or communicating to a user-designated invitee particular unique invitation identification information in combination with any additional user-designated invitation information as a smart invitation, where such a sendee may be provided by platform 200 (e.g., system 164) or a third party entity (e.g., an online invitation/e-card company business 228).
  • a third-party order facilitator entity may generate unique invitation identification information when taking an order for a package from the system user (e.g., as a confirmation code for that order), where the facilitator entity may share such unique invitation identification
  • Process 3700 may also include defining a mode setting at step 3706 based on the unique invitation identification information acquired at step 3702. Before, during, or after sharing particular unique invitation identification information with a particular invitee at step 3704, that particular unique invitation identification information may also be provided to platform 200 (e.g., at step 3706) for use in defining any suitable mode setting that may instruct platform 200 how to handle detection of that particular unique invitation
  • identification information by environment 100 e.g., when presented by the particular invitee at a sensing component of doorbell 106 or any other suitable smart device of
  • Platform 200 may be operative to enable a system user to interact with platform 200 in any suitable manner for at least partially defining such a mode setting (e.g., via a personal device 166 or any suitable smart device of environment 100). Any environment 100 that the system user may have authorization to control may be associated with such a mode setting and any suitable platform action(s) by any suitable component(s) of platform 200 may be selectively associated with that environment 100 and the particular unique invitation identification information in such a defined mode setting, whereby platform 200 may be operative to cany out such action(s) when the particular unique invitation identification information of that mode setting is detected at environment 100.
  • Such a platform action may include enabling access to a portion of environment 100 (e.g., via door 186 by controlling smart doorknob 122), conveying a particular message at an entryway of environment 100 where the particular unique invitation identification information may be detected (e.g., via an output component of doorbell 106 to the invitee, such as "Welcome to the party - head through this door and straight back through the kitchen to the back patio"), conveying a particular message to the system user (e.g., via user device 166 or any suitable smart device local to the user, such as "Invitee John Doe has just arrived and is being let in to the party"), conveying a particular message to a social network (e.g., via social
  • a message to be conveyed to a visitor as a platform action of a mode setting may be at least partially defined by dynamic information, such as the current location of the system user within environment 100, such that a particular message conveyed to the visitor at an entryway of environment 100 (e.g., via doorbell 106) may be "Welcome to the party - head through this door and straight back through the kitchen to the back patio to find your party host” if the system user is currently located on the back patio at the time the platform action is to be carried out (e.g., as may be determined by platform 200 through any suitable tracking capabilities as may be described herein) or may be "Welcome to the party - head through this door and up the master stair case to the library to find your party host” if the system user is currently located in the library at the time the platform action is to be
  • Such a platform action for conveying a message to a visitor may be communicated by platform 200 via any suitable smart device (e.g., via an output component 812, 830, and/or 836 of doorbell 106) or to a personal device 266 of the visitor (e.g., via a communications component 862 of doorbell 106) as may be sensed by a smart device of environment 100 or otherwise determined by platform 200.
  • any suitable smart device e.g., via an output component 812, 830, and/or 836 of doorbell 106
  • a personal device 266 of the visitor e.g., via a communications component 862 of doorbell 106
  • one or more conditions may also be selectively associated with a particular unique invitation identification information in such a defined mode setting, whereby platform 200 may be operative to carry out the one or more associated platform actions when the particular unique invitation identification information of that mode setting is detected at environment 100 while any associated conditions are satisfied.
  • a condition may include a particular time frame during which the mode setting may be active (e.g., 7:00pm to 11:00pm, such that if the particular unique invitation identification information of that mode setting is detected at environment 100 before 7:00pm or after 1 1 :00pm then the one or more associated platform actions of that mode setting may not be carried out by platform 200).
  • a condition may include a particular maximum threshold occupancy of env ironment 100 under which the mode setting may be active (e.g., 75 people, such that if the particular unique invitation identification information of that mode setting is detected at
  • such a condition may include general visitor identification information that must be satisfied for the mode setting to be active
  • the one or more associated platform actions of that mode setting may not be carried out by platform 200 (e.g., for strictly enforcing a dress code requirement for a Valentine's Day party)).
  • such a condition may include particular visitor identification information that must be satisfied for the mode setting to be active (e.g., detected visitor satisfies a particular facial detection operation, such that if the particular unique invitation identification information of that mode setting is detected at environment 100 when presented by a visitor whose face does not successfully match a particular facial detection operation (e.g., as may be detectable by a camera sensing component of doorbell 106 in combination with a facial recognition process that may compare detected visitor facial data with a photograph of the intended invitee that may be provided to platform 200 (e.g., by the system user) or otherwise accessible to platform 200 (e.g., v ia querying pictures of a social network database in conjunction with a name associated with the invitation, etc.) for defining such a condition of the defined mode setting) then the one or more associated platform actions of that mode setting may not be carried out by platform 200 (e.g., for ensuring that the invitee visitor to whom the smart invitation was sent is the actual visitor presenting the particular visitor identification information at
  • Each mode setting may be edited independently and/or certain characteristics (e.g., platform actions and/or conditions) of multiple mode settings may be edited simultaneously.
  • each guest invited to a particular event e.g., a Valentine's day party at a system user's environment 100
  • platform 200 may be operative to enable a system user to edit a certain condition of all such mode settings for that particular event at the same time (e.g., through a single instruction provided to platform 200).
  • the system user may decide that a time frame condition for each mode setting defined for each smart invitation for an event should be increased from 4 hours to 6 hours (e.g., instead of from 7:00pm to 1 1 :00pm, now each smart invitation to that event should be active from 7:00pm to 1 :00am).
  • different mode settings for different smart invitations for the same event may be edited independently.
  • the system user may edit a general visitor identification information condition of the mode setting associated with a particular smart invitation to a particular user (e.g., to not require that the specific invitee of that invitation be wearing red to be granted access).
  • platform 200 may be operative to automatically send an updated invitation to that invitee alerting the invitee of the change made to its invitation (e.g., a simple e-mail or text message alerting the invitee that a condition or other characteristic of the invitation has changed), which may or may not include generating and sharing new particular unique invitation identification information to be associated with that invitation, as the initially acquired and shared unique invitation identification information that is also associated with a mode setting need not change when a condition of that mode setting is later edited.
  • an updated invitation to that invitee alerting the invitee of the change made to its invitation (e.g., a simple e-mail or text message alerting the invitee that a condition or other characteristic of the invitation has changed), which may or may not include generating and sharing new particular unique invitation identification information to be associated with that invitation, as the initially acquired and shared unique invitation identification information that is also associated with a mode setting need not change when a condition of that mode setting is later edited.
  • Process 3700 may also include receiving invitation identification data that includes the unique invitation identification information from a smart environment as detected by a smart device of the smart environment at step 3708, and then analyzing the unique invitation identification information of the received invitation identification data from the smart environment to identify the defined mode setting associated with that smart environment at step 3710.
  • platform 200 may be operative to analyze that particular unique invitation identification information when detected at that smart environment using any suitable sensing component(s) of smart environment 100.
  • platform 200 may be operative to analyze that detected unique invitation identification information in combination with any appropriate defined mode setting(s) of that unique invitation identification information, for example, to confirm that any suitable conditions of that defined mode setting are also satisfied (e.g., by analyzing any suitable data available to platform 200 (e.g., via one or more sensing components of one or more smart devices at environment 100 and/or any additional data otherwise accessible to a computing system of platform 200 (e.g., system 164 or a computing system local to environment 100)).
  • any suitable data available to platform 200 e.g., via one or more sensing components of one or more smart devices at environment 100 and/or any additional data otherwise accessible to a computing system of platform 200 (e.g., system 164 or a computing system local to environment 100)).
  • platform 200 may be operative to communicate with the visitor (e.g., via doorbell 106) and/or adjust sensing capabilities of environment 100 (e.g., sensing components 828 of doorbell 106) in any suitable manner as described herein, for enabling platform 200 to properly determine whether or not a condition has been satisfied (e.g., by conveying a message to the visitor to "present your invitation to the scanner just above the doorbell button” or "please align your uncovered face with the camera just above the doorbell button ', etc.). If all such conditions are confirmed to be satisfied, then platform 200 may be operative to carry out any platform tasks of that defined mode setting.
  • a condition e.g., by conveying a message to the visitor to "present your invitation to the scanner just above the doorbell button" or "please align your uncovered face with the camera just above the doorbell button ', etc.
  • process 3700 may also include carrying out at least one platform action of a mode setting identified as associated with the detected unique invitation identification information and the smart environment at step 3712.
  • platform 200 may be operative to enable any appropriate system user to edit one or more characteristics of the defined mode setting (e.g., any associated platform tasks and/or any associated conditions and/or even the associated smart environment that is to detect the particular unique invitation identification information of the defined mode setting).
  • the functionality of the smart invitation may be altered in any suitable way(s) (e.g., at step 3706).
  • platform 200 may be operative to enable any suitable entity to edit or define certain characteristics of such a defined mode setting, where that entity may be the invitee (e.g., as may gain access to editing capabilities on platform 200 through use of the smart invitation (e.g., in an online user interface provided by platform 200)) or any other suitable entity that may be enabled by the system user or platform 200, and where that entity may or may not be any user of any component of platform 200, let alone the system user that may have initiated the smart invitation process and that may have management control of the associated smart environment.
  • the invitee e.g., as may gain access to editing capabilities on platform 200 through use of the smart invitation (e.g., in an online user interface provided by platform 200)
  • any other suitable entity may be enabled by the system user or platform 200, and where that entity may or may not be any user of any component of platform 200, let alone the system user that may have initiated the smart invitation process and that may have management control of the associated smart environment.
  • a particular platform task associated with the mode setting is a message to be conveyed to the system user when the smart invitation is used at smart environment 100
  • the invitee may be enabled to at least partially define what that message might be.
  • a platform task may be to communicate a particular message throughout every portion of environment 100 that is occupied at the time when the smart invitation is used (e.g., as a party-wide announcement letting all the current party attendees know that the invitee associated with the smart invitation has just arrived).
  • the invitee may be enabled to upload an audio recording to platform 200 (e.g., via an invitee visitor device 266 to system 164) in advance of the use of the smart invitation at environment 100, such that platform 200 may be operative to access and playback that audio recording throughout environment 100 (e.g., via audio output components of each smart device within environment 100) when the invitee uses the smart invitation to access the party (e.g., audio recording may be the invitee's catch phrase or favorite song or any other suitable information).
  • platform 200 may enable the invitee to provide such a message to platform 200 at the same time as when the invitee presents the smart invitation to smart environment 100.
  • platform 200 may prompt the invitee visitor to convey certain information to platform 200 for use as the invitee enters environment 100 (e.g., a request for the invitee to state the name by which it should be introduced to the party (e.g., "John the Party Animal Doe is here") and/or the name of an intro song via microphone 844 of doorbell 106, or providing multiple options for an intro song to the visitor from which the visitor may select one via a touch screen user interface 812 of doorbell 106, where such options may be at least partially defined by any suitable data available to platform 200, such as songs queued in a party playlist being played-back at environment 100 (e.g., by a smart device 166 of environment 100)). Any suitable options determined in any suitable manner may be presented to the visitor for selection, in response to which one or more suitable platform actions may be carried out, such as options for music to be played, options for an interactive game being played, and
  • a platform action of a mode setting of a smart invitation may require that platform 200 only enable accessibility to environment 100 by a single human in response to detection of that smart environment (e.g., to prevent "piggybacking" such that each invitation may only be used by a single visitor).

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

L'invention concerne un appareil, des systèmes, des procédés, et des produits programmes d'ordinateur associés permettant de remplir des objectifs liés à la sécurité domestique/aux maisons intelligentes. En particulier, l'invention concerne une pluralité de dispositifs, notamment des dispositifs intelligents, de multidétection et connectés à un réseau, qui communiquent entre eux et/ou avec un serveur central ou un système d'infonuagique afin de remplir l'un quelconque parmi divers objectifs associés à la sécurité domestique/aux maisons intelligentes.
PCT/US2015/068354 2014-12-31 2015-12-31 Gestion d'interaction avec un visiteur dans une maison intelligente en mode "ne pas déranger" WO2016109839A1 (fr)

Applications Claiming Priority (24)

Application Number Priority Date Filing Date Title
US14/587,485 US9881474B2 (en) 2012-09-21 2014-12-31 Initially detecting a visitor at a smart-home
US14/587,876 2014-12-31
US14/587,993 US9960929B2 (en) 2012-09-21 2014-12-31 Environmental sensing with a doorbell at a smart-home
US14/587,636 2014-12-31
US14/587,485 2014-12-31
US14/587,663 2014-12-31
US14/587,966 US9953514B2 (en) 2012-09-21 2014-12-31 Visitor feedback to visitor interaction with a doorbell at a smart-home
US14/587,694 2014-12-31
US14/587,993 2014-12-31
US14/587,876 US9626841B2 (en) 2012-09-21 2014-12-31 Occupant notification of visitor interaction with a doorbell at a smart-home
US14/587,530 US9978238B2 (en) 2012-09-21 2014-12-31 Visitor options at an entryway to a smart-home
US14/587,694 US9600645B2 (en) 2012-09-21 2014-12-31 Smart invitation handling at a smart-home
US14/587,599 US9640055B2 (en) 2012-09-21 2014-12-31 Interacting with a detected visitor at an entryway to a smart-home
US14/587,835 US10735216B2 (en) 2012-09-21 2014-12-31 Handling security services visitor at a smart-home
US14/587,795 US10510035B2 (en) 2012-09-21 2014-12-31 Limited access invitation handling at a smart-home
US14/587,530 2014-12-31
US14/587,636 US20150156030A1 (en) 2012-09-21 2014-12-31 Handling specific visitor behavior at an entryway to a smart-home
US14/587,599 2014-12-31
US14/587,966 2014-12-31
US14/587,835 2014-12-31
US14/587,663 US9711036B2 (en) 2012-09-21 2014-12-31 Leveraging neighborhood to handle potential visitor at a smart-home
US14/587,795 2014-12-31
US14/587,441 US9959727B2 (en) 2012-09-21 2014-12-31 Handling visitor interaction at a smart-home in a do not disturb mode
US14/587,441 2014-12-31

Publications (1)

Publication Number Publication Date
WO2016109839A1 true WO2016109839A1 (fr) 2016-07-07

Family

ID=56285091

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/068354 WO2016109839A1 (fr) 2014-12-31 2015-12-31 Gestion d'interaction avec un visiteur dans une maison intelligente en mode "ne pas déranger"

Country Status (1)

Country Link
WO (1) WO2016109839A1 (fr)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018034999A1 (fr) * 2016-08-18 2018-02-22 BOT Home Automation, Inc. Exploitation de dispositifs d'enregistrement et de communication audio/vidéo pour réduire le crime et améliorer la sécurité publique
DE102016118164A1 (de) * 2016-09-26 2018-03-29 Abus Security-Center Gmbh & Co. Kg Gebäudeüberwachungssystem
WO2020092159A1 (fr) 2018-10-29 2020-05-07 Toyota Research Institute, Inc. Système de notification d'arrivée sélective
US10733681B2 (en) 2017-02-08 2020-08-04 International Business Machines Corporation Precise anticipatory hotel room entry system
DE102019212673A1 (de) * 2019-07-22 2021-01-28 OSRAM CONTINENTAL GmbH Optische anordnung und verfahren
US20210072378A1 (en) * 2018-06-05 2021-03-11 Google Llc Systems and methods of ultrasonic sensing in smart devices
CN113936361A (zh) * 2021-09-29 2022-01-14 深圳市兆驰数码科技股份有限公司 一种智能门锁
US11772603B2 (en) 2021-05-18 2023-10-03 Motional Ad Llc Passenger authentication and entry for autonomous vehicles
CN117523721A (zh) * 2024-01-04 2024-02-06 成都自由行科技有限公司 景区客流量管控系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040257336A1 (en) * 2003-03-05 2004-12-23 Shmuel Hershkovitz Security system user interface with video display
US20120044049A1 (en) * 2010-08-23 2012-02-23 Samir Vig Smart Doorbell Security System and Method to Identify Visitors
KR101380608B1 (ko) * 2013-07-26 2014-04-10 (주) 코콤 스마트기기 기반 가정 주변기기 제어시스템 및 그 제어방법
US20140207721A1 (en) * 2012-08-31 2014-07-24 Nest Labs, Inc. Dynamic distributed-sensor thermostat network for forecasting external events
US20140266669A1 (en) * 2013-03-14 2014-09-18 Nest Labs, Inc. Devices, methods, and associated information processing for security in a smart-sensored home

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040257336A1 (en) * 2003-03-05 2004-12-23 Shmuel Hershkovitz Security system user interface with video display
US20120044049A1 (en) * 2010-08-23 2012-02-23 Samir Vig Smart Doorbell Security System and Method to Identify Visitors
US20140207721A1 (en) * 2012-08-31 2014-07-24 Nest Labs, Inc. Dynamic distributed-sensor thermostat network for forecasting external events
US20140266669A1 (en) * 2013-03-14 2014-09-18 Nest Labs, Inc. Devices, methods, and associated information processing for security in a smart-sensored home
KR101380608B1 (ko) * 2013-07-26 2014-04-10 (주) 코콤 스마트기기 기반 가정 주변기기 제어시스템 및 그 제어방법

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180053225A1 (en) * 2016-08-18 2018-02-22 BOT Home Automation, Inc. Leveraging Audio/Video Recording and Communication Devices to Reduce Crime and Enhance Public Safety
US10846810B2 (en) 2016-08-18 2020-11-24 Amazon Technologies, Inc. Leveraging audio/video recording and communication devices to enhance public safety
WO2018034999A1 (fr) * 2016-08-18 2018-02-22 BOT Home Automation, Inc. Exploitation de dispositifs d'enregistrement et de communication audio/vidéo pour réduire le crime et améliorer la sécurité publique
DE102016118164A1 (de) * 2016-09-26 2018-03-29 Abus Security-Center Gmbh & Co. Kg Gebäudeüberwachungssystem
US10733681B2 (en) 2017-02-08 2020-08-04 International Business Machines Corporation Precise anticipatory hotel room entry system
US20210072378A1 (en) * 2018-06-05 2021-03-11 Google Llc Systems and methods of ultrasonic sensing in smart devices
EP3874445A4 (fr) * 2018-10-29 2022-08-03 Toyota Research Institute, Inc. Système de notification d'arrivée sélective
WO2020092159A1 (fr) 2018-10-29 2020-05-07 Toyota Research Institute, Inc. Système de notification d'arrivée sélective
CN112930549A (zh) * 2018-10-29 2021-06-08 丰田研究所股份有限公司 选择性到达通知系统
CN112930549B (zh) * 2018-10-29 2024-04-26 丰田研究所股份有限公司 选择性到达通知系统
DE102019212673A1 (de) * 2019-07-22 2021-01-28 OSRAM CONTINENTAL GmbH Optische anordnung und verfahren
US11772603B2 (en) 2021-05-18 2023-10-03 Motional Ad Llc Passenger authentication and entry for autonomous vehicles
CN113936361A (zh) * 2021-09-29 2022-01-14 深圳市兆驰数码科技股份有限公司 一种智能门锁
CN117523721A (zh) * 2024-01-04 2024-02-06 成都自由行科技有限公司 景区客流量管控系统
CN117523721B (zh) * 2024-01-04 2024-03-29 成都自由行科技有限公司 景区客流量管控系统

Similar Documents

Publication Publication Date Title
US9626841B2 (en) Occupant notification of visitor interaction with a doorbell at a smart-home
US9711036B2 (en) Leveraging neighborhood to handle potential visitor at a smart-home
US10510035B2 (en) Limited access invitation handling at a smart-home
US9960929B2 (en) Environmental sensing with a doorbell at a smart-home
US10735216B2 (en) Handling security services visitor at a smart-home
US9640055B2 (en) Interacting with a detected visitor at an entryway to a smart-home
US9953514B2 (en) Visitor feedback to visitor interaction with a doorbell at a smart-home
US9652912B2 (en) Secure handling of unsupervised package drop off at a smart-home
US9600645B2 (en) Smart invitation handling at a smart-home
US9881474B2 (en) Initially detecting a visitor at a smart-home
US9978238B2 (en) Visitor options at an entryway to a smart-home
US9959727B2 (en) Handling visitor interaction at a smart-home in a do not disturb mode
AU2021204774B2 (en) Security in a smart-sensored home
US20150120015A1 (en) Automated handling of a package delivery at a smart-home
US20150120598A1 (en) Tracking of a package delivery to a smart-home
US20150156030A1 (en) Handling specific visitor behavior at an entryway to a smart-home
US20150120596A1 (en) Routing optimization for package delivery to a smart-home
WO2016109838A1 (fr) Gestion automatisée de livraison de colis à une maison intelligente
WO2016109839A1 (fr) Gestion d'interaction avec un visiteur dans une maison intelligente en mode "ne pas déranger"

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15876385

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15876385

Country of ref document: EP

Kind code of ref document: A1