Asset tracking and protection

ABSTRACT

A device that is configured to track an asset is disclosed. In one aspect, the device includes a radio module that generates proximity data that indicates a distance between the computing device and the device. The device includes a processor that compares the distance between the computing device and the device to a distance threshold. The processor determines that the distance between the computing device and the device satisfies the distance threshold. The processor arms the device. The device includes a motion sensor that generates motion data. The processor compares the motion data to a motion threshold. The processor determines that the motion data satisfies the motion threshold. The processor activates an alarm state.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/865,792, filed May 4, 2020, now allowed, which is a continuation ofU.S. application Ser. No. 16/170,240, filed Oct. 25, 2018, now U.S. Pat.No. 10,643,441, issued May 5, 2020, which claims the benefit of U.S.Provisional Application No. 62/576,864, filed Oct. 25, 2017. All ofthese prior applications are incorporated by reference in theirentirety.

FIELD

This disclosure generally relates to wireless security systems andmethods.

BACKGROUND

Valuable assets are constantly a target for theft, and thieves arefrequently finding ways to evade being caught. Smarter systems areneeded to alert asset owners of any tampering or theft of their assets.

SUMMARY

This disclosure generally describes systems and methods for tracking andprotecting assets. A tracker may be attached to an asset. The trackermay register itself with a user device and may be used to track movementof the asset. As long as the tracker is located within a thresholddistance to the user device, the tracker remains in a disarmed mode andtransmits or receives beacon signals to or from the user device. Whenthe tracker is located at a distance greater than a threshold distancefrom the user device, the tracker operates in an armed mode andtransmits data through a cellular network. In the armed mode, thetracker activates motion sensors to track the asset's movement, andperiodically transmits the asset's location to the user device. If theasset returns to a location that is within the threshold distance fromthe user device, the tracker may return to operating in the disarmedmode.

If the asset remains at a distance greater than the threshold distancebut the asset's movement is less than a particular movement threshold,the system may transmit a notification message to the user deviceindicating that a movement of the asset beyond the threshold distance isoccurring. If the asset remains at a distance greater than the thresholddistance and the asset moves at a high speed such that the asset'smovement is greater than the particular movement threshold, the trackermay activate an alarm mode, and additional contingency measures may betaken to monitor the asset's movement. For example, additional sensors,cameras, or drones may be deployed and activated to track the asset'smovement and obtain additional information regarding the asset'smovement.

The asset tracking and protection methods and systems described in thisspecification offer a number of advantages. One advantage is that a usermay be alerted in real time whenever a user's asset is moved more than athreshold distance away from the user without the user's knowledge.Another advantage is that a user may continuously monitor where theasset is located and the direction of the asset's movement even when theasset is not within the user's sight. Yet another advantage is thatadditional resources of a user's network or a security provider'snetwork may be deployed to assist with tracking of the asset. Theseadditional resources may provide additional information to a userregarding the movement of the asset or a visual image of an entity thatmay be involved with the movement of the asset.

According to an innovative aspect of the subject matter described inthis application, a device is configured to track an asset. The deviceincludes a radio module that is configured to communicate with acomputing device; and based on communicating with the computing device,generate proximity data that indicates a distance between the computingdevice and the device. The device includes a processor that isconfigured to receive, from the radio module, the proximity data;compare the distance between the computing device and the device to adistance threshold; based on comparing the distance between thecomputing device and the device to the distance threshold, determinethat the distance between the computing device and the device satisfiesthe distance threshold; and, based on determining that that the distancebetween the computing device and the device satisfies the distancethreshold, arm the device; a motion sensor that is configured toactivate based on arming the device; and generate motion data. Theprocessor is configured to compare the motion data to a motionthreshold; based on comparing the motion data to a motion threshold,determine that the motion data satisfies the motion threshold; and,based on determining that the motion data satisfies the motionthreshold, activate an alarm state.

This implementation and other implementations may include one or more ofthe following optional features. The radio module that is configured to,based on communicating with the computing device, generate additionalproximity data that indicates an additional distance between thecomputing device and the device. The processor is configured to receive,from the radio module, the additional proximity data; compare theadditional distance between the computing device and the device to thedistance threshold; based on comparing the additional distance betweenthe computing device and the device to the distance threshold, determinethat the additional distance between the computing device and the devicedoes not satisfy the distance threshold; and based on determining thatthat the additional distance between the computing device and the devicedoes not satisfy the distance threshold, set the device to an unarmedstate. The motion sensor is configured to deactivate based on the devicebeing in an unarmed state. The motion sensor is configured to generateadditional motion data.

The processor is configured to compare the additional motion data to themotion threshold; based on comparing the additional motion data to themotion threshold, determine that the additional motion data does notsatisfy the motion threshold; and based on determining that theadditional motion data does not satisfy the motion threshold, maintainthe device in the armed state. The processor is configured to comparethe additional motion data to an additional motion threshold; based oncomparing the additional motion data to the additional motion threshold,determine that the additional motion data satisfies the additionalmotion threshold; and based on determining that the additional motiondata satisfies the additional motion threshold, generate a notificationindicating movement of the asset. The radio module is configured totransmit the notification indicating the movement of the asset. Thedevice further includes a GPS receiver that is configured to generatelocation data based on the device being in an alarm state. The radiomodule is configured to transmit the location data. The processor isconfigured to generate a request to deploy a drone and the locationdata. The radio module is configured to transmit the request to deploy adrone and the location data. The processor is configured to generate arequest activate a camera in a vicinity of the device and the locationdata.

The radio module is configured to transmit the request to activate acamera in a vicinity of the device and the location data. The processoris configured to determine that, based on the location data, a locationof the device is not changing; and, based on determining that thelocation of the device is not changing, deactivate the GPS receiver andmaintain the motion sensor in an active state. The radio module isconfigured to, based on communicating with the computing device,generate additional proximity data that indicates an additional distancebetween the computing device and the device. The processor that isconfigured to receive, from the radio module, the additional proximitydata; compare the additional distance between the computing device andthe device to the distance threshold; and, based on comparing theadditional distance between the computing device and the device to thedistance threshold, determine that the distance between the computingdevice and the device does not satisfy the distance threshold. The radiomodule is configured to receive an instruction to arm the device. Theprocessor is configured to receive the instruction to arm the device;and, based on the instruction to arm the device, arm the device. Theradio module is configured to communicate using a short range radio or acellular radio.

According to another innovative aspect of the subject matter describedin this application, a method for tracking an asset includes the actionsof communicating, by a radio module of a device that is configured totrack an asset, with a computing device; based on communicating with thecomputing device, generating, by the radio module of the device,proximity data that indicates a distance between the computing deviceand the device; based on the proximity data that indicates the distancebetween the computing device and the device, comparing, by a processorof the device, the distance between the computing device and the deviceto a distance threshold; based on comparing the distance between thecomputing device and the device to a distance threshold, determining, bythe processor of the device, that the distance between the computingdevice and the device satisfies the distance threshold; based ondetermining that that the distance between the computing device and thedevice satisfies the distance threshold, arming, by the processor of thedevice, the device; based on arming the device, activating, by theprocessor of the device, a motion sensor of the device; receiving, bythe processor of the device, motion data generated by the motion sensor;comparing, by the processor of the device, the motion data to a motionthreshold; based on comparing the motion data to a motion threshold,determining, by the processor of the device, that the motion datasatisfies the motion threshold; and based on determining that the motiondata satisfies the motion threshold, activating, by the processor of thedevice, an alarm state.

This implementation and other implementations may include one or more ofthe following optional features. The actions further include, based oncommunicating with the computing device, generating, by the radio moduleof the device, additional proximity data that indicates an additionaldistance between the computing device and the device; comparing, by theprocessor of the device, the additional distance between the computingdevice and the device to the distance threshold; based on comparing theadditional distance between the computing device and the device to thedistance threshold, determining, by the processor of the device, thatthe additional distance between the computing device and the device doesnot satisfy the distance threshold; based on determining that that theadditional distance between the computing device and the device does notsatisfy the distance threshold, setting, by the processor of the device,the device to an unarmed state; and based on the device being in anunarmed state, deactivating, by the processor of the device, the motionsensor.

The actions further include generating, by the motion sensor of thedevice, additional motion data; comparing, by the processor of thedevice, the additional motion data to the motion threshold; based oncomparing the additional motion data to the motion threshold,determining, by the processor of the device, that the additional motiondata does not satisfy the motion threshold; and, based on determiningthat the additional motion data does not satisfy the motion threshold,maintaining, by the processor of the device, the device in the armedstate. The actions further include comparing, by the processor of thedevice, the additional motion data to an additional motion threshold;based on comparing the additional motion data to the additional motionthreshold, determining, by the processor of the device, that theadditional motion data satisfies the additional motion threshold; basedon determining that the additional motion data satisfies the additionalmotion threshold, generating, by the processor of the device, anotification indicating movement of the asset; and transmitting, by theradio module of the device, the notification indicating the movement ofthe asset. The actions further include generating, by a GPS receiver ofthe device, location data based on the device being in an alarm state;and transmitting, by the radio module of the device, the location data.The actions further include generating, by the processor of the device,a request to deploy a drone and the location data; and transmitting, bythe radio module of the device, the request to deploy a drone and thelocation data.

The actions further include generating, by the processor of the device,a request activate a camera in a vicinity of the device and the locationdata; and transmitting, by the radio module of the device, the requestto activate a camera in a vicinity of the device and the location data.The actions further include determining, by the processor of the device,based on the location data, a location of the device is not changing;and, based on determining that the location of the device is notchanging, deactivating, by the processor of the device, the GPS receiverand maintaining the motion sensor in an active state. The actionsfurther include, based on communicating with the computing device,generating, by the radio module of the device, additional proximity datathat indicates an additional distance between the computing device andthe device; comparing, by the processor of the device, the additionaldistance between the computing device and the device to the distancethreshold; based on comparing the additional distance between thecomputing device and the device to the distance threshold, determining,by the processor of the device, that the distance between the computingdevice and the device does not satisfy the distance threshold;receiving, by the radio module of the device, an instruction to arm thedevice; and, based on the instruction to arm the device, arming, by theprocessor of the device, the device. The radio module is configured tocommunicate using a short range radio or a cellular radio.

Other implementations include corresponding systems, apparatus,computer-readable storage media, and computer programs configured toimplement the actions of the above-noted methods.

The details of one or more implementations are set forth in theaccompanying drawings and the description below. Other features andadvantages will become apparent from the description, the drawings, andthe claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A-1D depict example asset-tracking scenarios.

FIG. 2 depicts an example flowchart of an asset tracking method.

FIG. 3 depicts an example asset-tracking system.

FIG. 3A is a flowchart of an example process for asset tracking.

FIG. 4 is a block diagram of an example security monitoring system.

Like reference numbers and designation in the various drawings indicatelike elements.

DETAILED DESCRIPTION

FIGS. 1A-1D depict example asset-tracking scenarios. FIG. 1A illustratesan example of a tracker operating in a disarmed mode. In FIG. 1A, a user110 may have a user device 114 and an asset 116. Although theillustration depicts the asset 116 as a bicycle, an asset 116 may be anypossession of the user 110. For example, the asset may be a paper,envelope, automobile, electronic device, and, in general, any physicalitem owned or possessed by user 110.

The asset 116 may have a tracker 118 attached to it. The tracker 118 maybe attached to the asset 116 through any suitable method. For example,the tracker 118 may be attached by a screw, glue, Velcro, clamps, or anyother method that allows the tracker 118 to be fixed to the asset 116.In some implementations, the tracker 118 may be attached and protectedby a security box or cover so that the tracker 118 cannot be tamperedwith or removed from the asset 116. In general, any suitable way ofprotecting the tracker 118 from being removed or tampering may be used.

When the tracker 118 is attached to the asset 116, the tracker 118 maycommunicate and register itself with the user device 114 or a securitynetwork, such as the Alarm.com security network (1A). In addition, thetracker 118 may communicate with the user device 114 and establish atwo-way communication channel such that the tracker 118 may periodicallytransmit or receive beacon signals to or from the user device 114through a short-range wireless network, such as a Bluetooth network. Theprocess for registering the tracker 118 and establishing a communicationchannel with user device 114 is described further with respect to FIG.2. When the tracker 118 receives a beacon signal from the user device114 or a response to a beacon signal emitted by the tracker 118 from theuser device 114, the tracker 118 may determine that the asset 116 iswithin a threshold distance of the user 110 or within a safe zone (16).The tracker 118 may continue to operate in a disarmed mode and listenfor or transmit beacon signals until a time when no more beacon signalsor responses to beacon signals are received.

One example of a scenario in which no more beacon signals or responsesto beacon signals are received by the tracker 118 is when anunauthorized person 112, such as a thief, attempts to steal or move theasset 116, as illustrated in FIG. 1B. The unauthorized person 112 maymove the asset 116 until the asset 116 is beyond a threshold distancefrom the user (2A). When the tracker 118 no longer receives beaconsignals or responses to beacon signals because the asset 116 is locatedbeyond the threshold distance of the user 110, the tracker 118 mayactivate cellular radios and antennas and enter an armed mode ofoperation. The tracker 118 may then begin transmitting an alarm messagethat includes the asset 116's location information to the user device114 or a security network server by communicating through the one ormore towers 120 of a cellular network (2B), as shown in FIG. 1B, whichillustrates an example of the tracker 118 operating in an armed mode. Insome cases, the tracker 118 may simultaneously listen for beacon signalswhile transmitting the cellular signal in case the asset 116 returnswithin the safe zone. If the movement of the asset 116 is less than amovement threshold such as a displacement threshold or speed threshold,the tracker 118 may remain in an armed mode and continue to periodicallytransmit alarm messages with updated location information of the asset116. If the movement of the asset 116 is greater than the movementthreshold (3A), the tracker 118 may activate an alarm mode as shown inFIG. 1C, continue to periodically transmit alarm messages to the userdevice 114 with updated location information of the asset 116 (3B) (3C),and activate one or more resources of the security network to monitorthe movement of the asset 116 (3D). In some cases, the security networkmay activate additional resources upon receiving a request by a user 110who received the alarm message through user device 114. The one or moreresources of the security network may include one or more sensors, suchas cameras 126A, 126B, and a drone 124.

FIG. 1D illustrates an example of the resources deployed in the alarmmode. The security network may determine a likely location of the asset116 according to coordinates provided in the location informationreceived in the alert message, and activate one or more cameras 122A,122B that the security network has deployed in a region where the asset116 is likely located. In some cases, the security network may deploy adrone 124 and direct the drone 124 to a likely location of the asset116. Cameras 122A, 122B or a camera on the drone 124 may capture videoinformation and transmit the captured video information back to a serverof the security network or the user device 114. The video informationmay be transmitted back to the user device 114 or security network usingany suitable method, for example, by transmitting the video informationthrough a cellular network tower 120. With the additional informationprovided by the network sensors, e.g., cameras, and the locationinformation periodically transmitted by the tracker 118, the user or anagent of the security network may have more information to track downthe movement of the asset 116 and attempt to repossess the asset 116.

It should be understood that the scenarios depicted in FIGS. 1A-1D aresome of many possible scenarios involving the unanticipated orunauthorized movement of a user's asset. Another example scenario mayarise when the user 110 begins to move away from asset 116 and is nolonger within a threshold distance of the asset 116. In general, varioustypes of assets may be monitored and tracked, and various types ofresources may be utilized to track the asset. The security network maybe a security network operated by a company or organization such as, forexample, Alarm.com, or may be a network of devices controlled by anindividual such as an owner of the asset.

FIG. 2 depicts an example flowchart of an asset tracking method.Initially, a tracker may be attached to an asset and activated (202). Aspart of the activation, the tracker and the asset may be registered witha security network. Tracker registration may include storing dataindicative of one or more of a tracker identification (ID), modelinformation, version information, manufacturer information, a serialnumber, and a network address of the tracker. Asset registration mayinclude storing data indicative of one or more of an asset ID, assetmodel information, asset version information, asset manufacturerinformation, a serial number, and a network address of the asset. Theasset and tracker registration information may be stored in a databaseassociated with the security network.

In some implementations, the user may be provided with controls duringregistration allowing the user to elect if and when location informationof the asset may be collected. Any user data collected may be treated inone or more ways before it is stored or used, so that personallyidentifiable information is removed and the collected data satisfies theuser's selections. Thus, the user may have control over what informationis collected, how that information is used, and what information isprovided to the user.

The activation of the tracker also includes establishing one or morewireless network connections between the tracker and one or more userdevices. The user, or owner of the asset, may have one or more userdevices, which may include, for example, a smart phone, a laptop, anelectronic pad, a smart watch, a fitness band, a smart television (TV),a desktop, a personal digital assistant, a mobile audio or video player,a game console, or a combination of one or more of these devices. Ingeneral, the user device may be a wired or wireless device capable ofexecuting wireless communications with the tracker. To establish awireless connection with a user device, the tracker and user device mayexchange network ID information such as an Internet Protocol (IP)address, a Media Access Control (MAC) address, and any other informationsuch as encryption/decryption keys or passwords to wirelessly connectwith each other.

In general, the tracker and one or more user devices may be connectedthrough any suitable short-range wireless network, such as a WiFinetwork, a Bluetooth network, a Zigbee network, or an infrared network,and may implement corresponding protocols to connect with one another.In some implementations, after connecting with one or more user devicesand registering itself with a security network, the tracker may receiveownership information indicative of an owner of the asset. The ownershipinformation may be received from the security network or from the userdevice. In some implementations, the communications protocol used forcommunications between a user device and the tracker may specify whethera user device or the tracker is to transmit periodic beacon signals.

After being activated, the tracker confirms the presence of the one ormore user devices near the tracker (204). In some implementations, thetracker may periodically transmit beacon signals over the short-rangewireless network to the one or more user devices and wait to receive aresponse from the one or more user devices in order to confirm theproximity of at least one user device. If a response is received from atleast one user device, the tracker determines that the asset is still islocated in proximity with a user device or a location within a user'ssafe zone. The tracker may then activate a disarmed mode (206). In thedisarmed mode, the tracker may periodically confirm the presence of theone or more user devices near the tracker as described above (204).

In some implementations, the tracker may operate in a listening mode andreceive periodic beacon signals from at least one of the one or moreuser devices. By receiving the periodic signals, the tracker maydetermine that at least one user device is still within a thresholddistance of the tracker, and that the asset is still is located inproximity with a user device or a location within a user's safe zone.The tracker may then determine that the asset is located in proximitywith a user device or a location within a user's safe zone, and mayactivate a disarmed mode (206). The determined threshold distance maydepend on the wireless network communication protocol being used by thetracker and user device for communication, and may be, for example, 10feet or 20 feet.

If the tracker does not receive a beacon signal or a response to atransmitted beacon signal, the tracker may determine that the asset isno longer located in proximity with a user device and is located outsidea user's safe zone. The tracker may then activate an armed mode (208).In response to activating the armed mode, the tracker may activate oneor more sensors on the asset or the tracker, such as motion sensors, andmay continue searching for user devices (214). The activated sensors mayinclude one or more of a gyroscope, an accelerometer, a haptic feedbacksensor, a passive infrared sensor, a radar, a vibration sensor, anoptical sensor, a microwave sensor, and in general, any detector thatsenses motion of the asset. In some implementations, the tracker mayalso continue to broadcast beacon signals or listen for beacon signalsto determine if any user devices are detected within a thresholddistance of the tracker (216).

As noted above, if the tracker receives a beacon signal or receives aresponse to a beacon signal transmitted by the tracker, the tracker maydetermine that the user device has moved back to an area that is withina determined threshold distance of the tracker or a location within auser's safe zone. In some cases, the tracker may then deactivate thearmed mode and activate a disarmed mode (206). In some cases, the usermay select a control to enable or disable the tracker's ability todeactivate the armed mode.

If no beacon signal or response to a beacon signal is received, thetracker may process data received from the motion sensors. Theprocessing may include determining one or more of a direction of theasset movement, a physical displacement of the asset, a speed of theasset movement, an acceleration of the asset movement, and, in general,any movement of the asset. In addition, the tracker may determine thecurrent location of the asset. In general, any suitable locationdetermining service may be used to determine the asset's location. Forexample, a Global Navigation Satellite System (GNSS) receiver or aGlobal Positioning System (GPS) receiver, or a General Packet RadioService (GPRS) receiver included in the tracker may be used to determinethe location of an asset attached to the tracker.

The tracker may compare the amount of movement detected by the motionsensors with one or more thresholds (218). If the amount of movement isless than a first motion threshold, the tracker may transmit a messagenotifying the user device of the asset's movement (220). Thenotification may indicate one or more of an amount of movement, acurrent location of the asset at the time the notification istransmitted, and a direction of the asset's movement. The notificationmay be transmitted using any suitable cellular communication protocol,such as GSM voice calls, SMS, EMS, or MMS messaging, CDMA, TDMA, PDC,WCDMA, CDMA2000, LTE, or GPRS, among others. After transmitting themessage (220), the tracker may broadcast beacon signals or listen forbeacon signals to determine if any user devices are detected within thethreshold distance of the tracker (216).

The one or more motion thresholds may be set by an asset owner or by asecurity network administrator. The thresholds may include directionalthresholds, physical displacement thresholds, or speed thresholds. Thefirst motion threshold may be a threshold that, when satisfied orexceeded, indicates that the asset is likely moving away from the userat a rapid rate. For instance, in some implementations, if the movementof the asset indicates that the asset is moving at a high speed, highacceleration, or has a significantly large physical displacement fromthe user, the first motion threshold may be satisfied.

When the amount of movement is greater than or equal to the first motionthreshold, the tracker activates an alarm mode (222). Activating thealarm mode triggers the execution of one or more contingency operations(224). In some implementations, the tracker may send a message (226) toa server of the security network, e.g., the Alarm.com network, thatincludes a location of the asset when the alarm mode is activated and analert that the asset is moving at a high rate. The security network maythen activate one or more resources of the security network to supportthe tracking of the asset. For example, the security network mayactivate one or more cameras at or around the location of the asset sothat additional resources can be utilized to track the asset.

In some cases, by utilizing the additional resources, the securitynetwork may obtain information that indicates the type of activity orindividuals involved in the movement of the asset. For instance, in somecases, the additional resources may identify an entity such as a personor vehicle other than the asset owner or owner's vehicle that are movingthe asset. In some cases, the additional resources may confirm that theasset owner is moving the asset. In some cases, the additional resourcesmay indicate additional conditions, e.g., flooding, associated with themovement of the asset. In some implementations, the security network maydeploy a drone to the location of the asset. The drone may obtain imagesfrom an aerial view and track the asset. Information obtained by theadditional resources may help to continue tracking the asset until theasset is repossessed by the user.

In some implementations, a user may send a deactivate command to thetracker through the cellular network or the security network. Uponreceiving the deactivate command, the tracker may interact with the userdevice to execute the deactivate command. For example, if the asset is abicycle, the deactivate command may be a command to lock the breaks inthe bicycle so that the bicycle wheels can no longer move. If the assetis a car, the deactivate command may be a command to cease power to theengine so that the car's engine cannot support movement of the car. Ifthe asset is an envelope, the deactivate command may be a command toactivate a destruction mechanism. The destruction mechanism may triggera fire ignition or chemical reaction that may result in the destructionof the asset. In general, various types of deactivate commands may beexecuted and may vary based on the type of asset.

In some implementations, after alerting the user by sending a message(226), the tracker may continue to monitor movement of the asset andcompare the amount of movement detected by the motion sensors with oneor more thresholds as described above (218). In some implementations,the tracking of the asset may continue until the user provides an inputto reset the tracker to the disarm mode (210). In general, the user mayprovide an input through a user account accessible through anapplication or web browser executed on the user device to set thetracker to the armed mode (212) or disarmed mode (210) at any time. Inthe disarmed mode, the tracker may periodically broadcast beacon signalsor listen for signals transmitted from user devices, as described above.

In operation 218, if the amount of movement is less than a first motionthreshold but greater than zero, the tracker may transmit a messagenotifying the user device of the asset's movement (220). The tracker maycontinue to transmit location information and beacon signals, but thesecurity network or user may not execute a contingency operation.

FIG. 3 depicts an exemplary asset tracker. The tracker may include anexternal connector 302, a solar cell 304, a power management unit 306, abattery management and charger 308, a battery 310, a memory 312, one ormore light emitting diodes (LEDs) 314, one or more sensors 318, amicrocontroller unit (MCU) 316, input unit 320, a cellular radio 322, aGNSS receiver 324, a short range radio 326, a cell antenna 328, a GNSSantenna 330, and a local area antenna 332.

The external connector 302 may connect the tracker to any externaldevice. The external connector 302 may include one or more ports such asa universal serial bus (USB), a serial port, a parallel port, a smallcomputer systems interface (SCSI), IEEE 1394 port, PS/2 port, MIDI port,and a coaxial port. In some implementations, the external connector 302may be connected to the asset, and may facilitate communications anddata exchange between an asset and the tracker.

The solar cell 304 may include any suitable photovoltaic cell thatconverts solar energy intro electrical energy. The solar cell 304 may beformed using any suitable semiconductor material. The battery 310 mayprovide power to the tracker. Various suitable types of batteries may beused. The battery 310 may include any suitable type of electrochemicalcell such as a wet cell or a dry cell. The battery 310 may be includezinc-carbon, zinc-chloride, nickel, lithium, mercury, magnesium, or anycombination of these materials. The battery management and charger 308may monitor the power levels of the battery, and charge the battery 310using the solar cell 304 when the power level of the battery 310 dropsbelow a particular power threshold. The power management unit 306 maymanage power provided to different components of the tracker.

The memory 312 may be any suitable storage device configured to storedata. The memory 312 may be volatile or non-volatile. The memory 312 mayinclude one or more mass storage devices, for example, magnetic, magnetooptical disks, optical disks, EPROM, EEPROM, flash memory devices, andmay be implemented as internal hard disks, removable disks, or magnetooptical disks. In some implementations, the memory 312 may include anon-tangible computer-readable storage medium that containsinstructions, which when executed, perform one or more methods orportions of the methods described above.

As noted above, the one or more sensors 318 may include any suitablemotion sensor such as a gyroscope, an accelerometer, a haptic feedbacksensor, a passive infrared sensor, a radar, a vibration sensor, anoptical sensor, or a microwave sensor. The input unit 320 may includeone or more devices that are configured to receive one or more inputs.For example, the input unit 320 may include a touch pad, buttons, orkeyboard for receiving alphanumeric text. The LEDs 314 may output alight signal in response to commands received from the MCU 316. Ingeneral, various suitable types of LEDs 314 may be used. In someimplementations, the LEDs 314 may emit different types of light based onthe type of mode the tracker is operating at. For example, the LEDs 314may emit light having a particular color (e.g., red color) when theasset is in an alarm mode, and a different color (e.g., white) when theasset is in a disarm mode.

The cellular radio 322, GNSS receiver 324, short-range radio 326, cellantenna 328, GNSS antenna 330, and local area antenna 332 may each beused to communicate with external network devices. For example, thecellular radio 322 and cell antenna 328 may be used to perform cellularcommunications with devices on a cellular network. The GNSS receiver 324and GNSS antenna 330 may be used to perform GNSS communications withdevices on a GNSS network. Similarly, a short-range radio 326 and localarea network may be used to perform communications with any suitableshort-range network.

In general, the tracker may wirelessly communicate with a device overone or more networks to execute one or more operations of the methoddescribed in FIG. 2. For example, the tracker may transmit locationinformation of the asset to a security network. The one or more networksmay include access points, storage systems, cloud systems, modules, oneor more databases including one or more media databases, and serversincluding one or more network servers. The one or more network serversmay include any suitable computing device coupled to the one or morenetworks, including but not limited to a personal computer, a servercomputer, a series of server computers, a mini computer, and a mainframecomputer, or combinations thereof. The one or more network servers mayalso include an application server, a web server, or a series ofservers, running a network operating system, examples of which mayinclude but are not limited to Microsoft® Windows® Server, Novell®NetWare®, or Linux®. The one or more network servers may be used forand/or provide cloud and/or network computing and media provisionservices. Although not shown in the figures, the server may haveconnections to external systems providing messaging functionality suchas e-mail, SMS messaging, text messaging, and other functionalities,such as advertising services, search services, etc.

In some implementations, the one or more networks may include a cloudsystem that may provide Internet connectivity and other network-relatedfunctions. For example, the cloud system may provide storage services tostore registration information of one or more user devices. The cloudsystem or one or more networks may also include one or more databases,which may include a media storage database, a media provision database,a cloud database, or a database managed by a database management system(DBMS). A DBMS may be implemented as an engine that controlsorganization, storage, management, and retrieval of data in a database.DBMSs frequently provide the ability to query, backup and replicatedata, enforce rules, provide security, do computation, perform changeand access logging, and automate optimization. A DBMS typically includesa modeling language, data structure, database query language, andtransaction mechanism. The modeling language is used to define theschema of each database in the DBMS, according to the database model,which may include a hierarchical model, network model, relational model,object model, or some other applicable known or convenient organization.Data structures can include fields, records, files, objects, and anyother applicable known or convenient structures for storing data. A DBMSmay also include metadata about the data that is stored.

The MCU 316 may include one or more processors that control thecomponents in the tracker. The one or more processors may includegeneral or special purpose microprocessors. The one or more processorscan execute one or more computer programs and process instructions forexecution within the tracker to execute the operations described in thisspecification and instructions stored in the memory 312. The one or moreprocessors may also include analog processors, digital processors, orboth. The one or more processors may provide, for example, forcoordination of the other components of the device, such as control ofsensors 318, wireless communications by the tracker, and output of lightor audio signals. Generally, the one or more processors may includevarious logic circuitry and programs to execute the variousimplementations described herein.

A computer program, also known as a program, software, softwareapplication, script, plug-in, or code, may be written in any form ofprogramming language, including compiled or interpreted languages, andit may be deployed in any form, including as a standalone program or asa module, component, subroutine, or other unit suitable for use in acomputing environment. A computer program does not necessarilycorrespond to a file in a file system. A program may be stored in aportion of a file that holds other programs or data in a single filededicated to the program in question, or in multiple coordinated files.A computer program may be executed on one computer or on multiplecomputers that are located at one site or distributed across multiplesites and interconnected by a communication network.

Although not shown in FIG. 3, in some implementations, the tracker mayinclude a speaker. The speaker may be configured to emit a particularsound when in the armed mode or the alarm mode. For example, the MCU 316may instruct the speaker to emit a particular sound, such as a highpitch sound, at regular intervals when the tracker is in the alarm mode.The high pitch sound may help the asset stand out or be easilyidentified by a person in the vicinity of the asset.

FIG. 3A is a flowchart of an example process 300 a for asset tracking.In general, the process 300 a uses a device attached to an asset totrack the asset. The device may provide location information to an ownerof the asset in the event that the asset is moved while the device isarmed. The process 300 a will be described as being performed by adevice that includes a processor and other components. An example of thedevice may be tracker 118 of FIGS. 1A-1D or the system of FIG. 3.

The device communicates, using a radio module, with a computing device(305 a). In some implementations, the radio module communicates using ashort range radio. The computing device may respond indicating that thedevice is within range of the device. The computing device may notrespond if the device is too far from the computing device. Thecomputing device may be a mobile phone, smart watch, wearable device, orany other similar computing device.

The device, based on communicating with the computing device, generates,using the radio module, proximity data that indicates a distance betweenthe computing device and the device (310 a). If the computing devicedoes not respond, because, perhaps, the computing device is out of rangeof the device, the device may determine that the computing device isoutside of a threshold distance.

The device, based on the proximity data that indicates the distancebetween the computing device and the device, compares the distancebetween the computing device and the device to a distance threshold (315a). The device may use the power of the signal received from thecomputing device to determine a distance between the device and thecomputing device. For example, the device may determine that thecomputing device is five meters from the device based on receiving aresponse signal of three decibel-millwatts. If the device does notreceive a response, then the device may determine that the computingdevice is farther than the range for short range radio, e.g., thirtymeters. The distance threshold may be set by a user. For example, theuser may set the distance threshold to fifteen meters. The devicecompares the computed distance to the distance threshold.

The device, based on comparing the distance between the computing deviceand the device to a distance threshold, determines that the distancebetween the computing device and the device satisfies the distancethreshold (320 a). For example, the device may determine that thedistance is twenty meters which is greater than the threshold of fifteenmeters. In some implementations, the device may determine that thedistance does not satisfy the distance threshold. For example, thedevice may determine that the distance is ten meters which is less thanthe distance threshold of fifteen meters.

The device, based on determining that that the distance between thecomputing device and the device satisfies the distance threshold, arms(325 a). The device, based on arming the device, activates a motionsensor of the device (330 a). The motion sensor may be an accelerometer,gyroscope, or any other sensor that is configured to detect movement. Ininstances where the distance does not satisfy the distance threshold,for example, the distance is ten meters and the distance threshold isfifteen meters, the device may remain unarmed.

In some implementations, the device may receive an instruction to armfrom the computing device. For example, the owner may be going inside astore. The owner's bike with the device may be right outside the storeand the owner's phone may be within range of the device, but the ownermay not be able to see the bike. In this instance, the owner may requestthat the device arm.

The device receives motion data generated by the motion sensor (335 a).For example, the accelerometer may generate motion data in response to athief stealing the bike. The accelerometer may generate motion data inresponse to somebody bumping into the bike. The accelerometer maygenerate motion data in response to the bike falling over.

The device compares the motion data to a motion threshold (340 a). Themotion threshold may be set by the owner. The owner may not be worriedabout somebody bumping the asset and may only wish to prevent the assetfrom being stolen. In this case the owner may set the motion thresholdhigher than an owner who wants to prevent any contact with the asset.

The device, based on comparing the motion data to a motion threshold,determines that the motion data satisfies the motion threshold (345 a).For example, the motion data may indicate that the device moved onemeter and the motion threshold is ten centimeters. The device, based ondetermining that the motion data satisfies the motion threshold,activates an alarm state (350 a). During the alarm state, the device maycommunicate with the computing device or another computer, e.g., aserver, through a cellular radio. The device may activate a GPS receiverand transmit the location of the device to the other computer. In someimplementations, the device may request deployment of a drone to trackthe location of the device. For example, the user may set the device todeploy the user's drone or a nearby drone when the device is in an alarmstate. The device may communicate directly or through a server with thedrone. The drone may use the GPS location of the device to track thedevice. In some implementations, the drone may be able to track thedevice through a short range radio when within range of the device. Insome implementations, the drone may be able to communicate with thedevice through a cellular radio and track the device using that signal.

In some implementations, the device may use triangulation, e.g., using acellular radio to generate location data. In some implementations, thedevice may be in an alarm state and not moving. In this instance, thedevice may transmit its GPS location and then deactivate the GPSreceiver to preserve the battery. The device may reactivate the GPSreceiver if the motion sensor detects motion greater than a motionthreshold that may be preprogrammed or set by the user.

In some implementations, the device may continue to search for thecomputing device while in alarm mode. If the device detects thecomputing device using a short range radio, then the device may exitalarm mode. In some implementations, the device may not exit alarm modeuntil the user instructs the device to exit alarm mode. In this case,the user can confirm that the user is reunited with the asset. Forexample, a user may be near the user's bike, but the bike may be insidea locked building. In this instance, the user may want the device toremain armed so that the user can track the location of the bike in theevent the bike moves before the bike is recovered.

While the device is in armed mode, the device may compare the motion toseveral different motion thresholds. The motion thresholds may be set bythe user and may indicate the action that the device should take. Forexample, the user may set two thresholds. Motion below the firstthreshold, may be something similar to another person bumping into thebike. Bumping into a parked bike may be common if others are parkingbikes nearby. In this case, the user may want to ensure that the user isnot interrupted and the device is not armed in response to a bump. Abovethe first threshold and below the second threshold, may be somethingsimilar to the bike falling over. In this instance, the user may wish tobe notified of the bike falling over, but there may not be a need to armthe device since it has not moved more than the second threshold. Motionabove the second threshold may cause the device to enter alarm mode. Theuser may receive a notification when the device enters alarm mode also.In some implementations, the device may generate an audible alarm whenin alarm mode. In some implementations, the device may be silent when inalarm mode. In some implementations, the device may generate an audiblealarm when in alarm mode and when the device detects the computingdevice within a threshold distance that may be set by user orpredetermined.

The user may configure the motion thresholds differently. Motion below afirst threshold and above zero, or a near zero threshold, may trigger anotification to the user. Motion above the first threshold may cause thedevice to enter alarm mode. The user may not set an additionalthreshold.

In some implementations, the device may be in armed mode and continue touse the short range radio to search for the computing device. If thedevice communicates with the computing device and determines that thedevice is within the threshold distance, then the device may disarm. Forexample, if the device is armed and determines that the computing deviceis within twenty meters of the device, then based on a thresholddistance of fifteen meters, the device may remain armed. If the deviceis armed and determines that the computing device is within ten metersof the device, then based on a threshold distance of fifteen meters, thedevice may disarm. In some implementations, the device may not disarmwithout an instruction from the computing device even if the computingdevice is within the threshold distance.

In some implementations, the device may transmit a request to activatenearby camera to generate image data when in alarm mode. The device maytransmit location data upon activating alarm mode. The location data maybe based on GPS data or triangulation data. The device may transmitlocation data periodically at a frequency specified by the user ordictated by the battery power or if the motion sensor detects athreshold level of motion. A sever may receive the location data andidentify cameras that the server can received image data from. Thecameras may be on a monitoring network accessible by the server. Theserver can request image data from the cameras near the location of thedevice. As the location of the device changes, the server may indicatethat some cameras can deactivate and other camera should activate. Theserver may analyze the image data to determine whether any of the imagesinclude the device or the asset or both. The server may transmit theimage data to the computing device of the user or another computingdevice. The user may indicate which images include the device or theasset or both. The server may use that information to activateadditional cameras. In some implementations, the server may receiveaudio data form microphones, video data from video camera, or othertypes of data from other sensors that may be accessible to the server.

Embodiments and all of the functional operations and/or actionsdescribed in this specification may be implemented in the examplesecurity monitoring system 400 shown in FIG. 4. The electronic system400 includes a network 405, a control unit 410, one or more user devices440 and 450, a monitoring application server 460, and a central alarmstation server 470. In some examples, the network 405 facilitatescommunications between the control unit 410, the one or more userdevices 440 and 450, the monitoring application server 460, and thecentral alarm station server 470.

The network 405 is configured to enable exchange of electroniccommunications between devices connected to the network 405. Forexample, the network 405 may be configured to enable exchange ofelectronic communications, such as alert message or location dataprovided by a tracker, between the control unit 410, the one or moreuser devices 440 and 450, the monitoring application server 460, and thecentral alarm station server 470. The network 405 may include, forexample, one or more of the Internet, Wide Area Networks (WANs), LocalArea Networks (LANs), analog or digital wired and wireless telephonenetworks (e.g., a public switched telephone network (PSTN), IntegratedServices Digital Network (ISDN), a cellular network, and DigitalSubscriber Line (DSL)), radio, television, cable, satellite, or anyother delivery or tunneling mechanism for carrying data. Network 405 mayinclude multiple networks or subnetworks, each of which may include, forexample, a wired or wireless data pathway. The network 405 may include acircuit-switched network, a packet-switched data network, or any othernetwork able to carry electronic communications (e.g., data or voicecommunications). For example, the network 405 may include networks basedon the Internet protocol (IP), asynchronous transfer mode (ATM), thePSTN, packet-switched networks based on IP, X.25, or Frame Relay, orother comparable technologies and may support voice using, for example,VoIP, or other comparable protocols used for voice communications. Thenetwork 405 may include one or more networks that include wireless datachannels and wireless voice channels. The network 405 may be a wirelessnetwork, a broadband network, or a combination of networks including awireless network and a broadband network.

The control unit 410 includes a controller 412 and a network module 414.The controller 412 is configured to control a control unit monitoringsystem (e.g., a control unit system) that includes the control unit 410.In some examples, the controller 412 may include a processor or othercontrol circuitry configured to execute instructions of a program thatcontrols operation of a control unit system. In these examples, thecontroller 412 may be configured to receive input from sensors, flowmeters, or other devices included in the control unit system and controloperations of devices included in the household (e.g., speakers, lights,doors, etc.). For example, the controller 412 may be configured tocontrol operation of the network module 414 included in the control unit410.

The network module 414 is a communication device configured to exchangecommunications over the network 405. The network module 414 may be awireless communication module configured to exchange wirelesscommunications over the network 405. For example, the network module 414may be a wireless communication device configured to exchangecommunications over a wireless data channel and a wireless voicechannel. In this example, the network module 414 may transmit alarm dataover a wireless data channel and establish a two-way voice communicationsession over a wireless voice channel. The wireless communication devicemay include one or more of a LTE module, a GSM module, a radio modem,cellular transmission module, or any type of module configured toexchange communications in one of the following formats: LTE, GSM orGPRS, CDMA, EDGE or EGPRS, EV-DO or EVDO, UMTS, or IP.

The network module 414 also may be a wired communication moduleconfigured to exchange communications over the network 405 using a wiredconnection. For instance, the network module 414 may be a modem, anetwork interface card, or another type of network interface device. Thenetwork module 414 may be an Ethernet network card configured to enablethe control unit 410 to communicate over a local area network and/or theInternet. The network module 414 also may be a voiceband modemconfigured to enable the alarm panel to communicate over the telephonelines of Plain Old Telephone Systems (POTS).

The control unit system that includes the control unit 410 includes oneor more sensors. For example, the monitoring system may include multiplesensors 420. The sensors 420 may include a lock sensor, a contactsensor, a motion sensor, or any other type of sensor included in acontrol unit system. The sensors 420 also may include an environmentalsensor, such as a temperature sensor, a water sensor, a rain sensor, awind sensor, a light sensor, a smoke detector, a carbon monoxidedetector, an air quality sensor, etc. In some examples, the sensors 420may include a radio-frequency identification (RFID) sensor thatidentifies a particular article that includes a pre-assigned RFID tag.

The control unit 410 communicates with the module 422 and the camera 430to perform monitoring. The module 422 is connected to one or moredevices that enable asset tracking as described in the implementationsabove. Also, the module 422 may be connected to one or more electroniclocks at a user's property and may be configured to control operation ofthe one or more electronic locks (e.g., control Z-Wave locks usingwireless communications in the Z-Wave protocol. Further, the module 422may be connected to one or more appliances at the property and may beconfigured to control operation of the one or more appliances. Themodule 422 may include multiple modules that are each specific to thetype of device being controlled in an automated manner. The module 422may control the one or more devices based on commands received from thecontrol unit 410. For instance, the module 422 may cause a lightingsystem to illuminate an area to provide a better image of the area whencaptured by a camera 430.

The camera 430 may be a video/photographic camera or other type ofoptical sensing device configured to capture images. For instance, thecamera 430 may be configured to capture images of an asset. The camera430 may be configured to capture single, static images of the asset andalso video images of the asset in which multiple images of the asset arecaptured at a relatively high frequency (e.g., thirty images persecond). The camera 430 may be controlled based on commands receivedfrom the control unit 410.

The camera 430 may be triggered by several different types oftechniques. For instance, a Passive Infra-Red (PIR) motion sensor may bebuilt into the camera 430 and used to trigger the camera 430 to captureone or more images when motion is detected. The camera 430 also mayinclude a microwave motion sensor built into the camera and used totrigger the camera 430 to capture one or more images when motion isdetected. The camera 430 may have a “normally open” or “normally closed”digital input that can trigger capture of one or more images whenexternal sensors (e.g., the sensors 420, PIR, door/window, etc.) detectmotion or other events. In some implementations, the camera 430 receivesa command to capture an image when external devices detect motion oranother potential alarm event. The camera 430 may receive the commandfrom the controller 412 or directly from one of the sensors 420.

In some examples, the camera 430 triggers integrated or externalilluminators (e.g., Infra-Red, Z-wave controlled “white” lights, lightscontrolled by the module 422, etc.) to improve image quality when thescene is dark. An integrated or separate light sensor may be used todetermine if illumination is desired and may result in increased imagequality.

The camera 430 may be programmed with any combination of time/dayschedules, system “arming state”, or other variables to determinewhether images should be captured or not when triggers occur. The camera430 may enter a low-power mode when not capturing images. In this case,the camera 430 may wake periodically to check for inbound messages fromthe controller 412. The camera 430 may be powered by internal,replaceable batteries if located remotely from the control unit 410. Thecamera 430 may employ a small solar cell to recharge the battery whenlight is available. Alternatively, the camera 430 may be powered by thecontroller's 412 power supply if the camera 430 is co-located with thecontroller 412.

In some implementations, the camera 430 communicates directly with themonitoring application server 460 or a processing server over theInternet. In these implementations, image data captured by the camera430 does not pass through the control unit 410 and the camera 430receives commands related to operation from the monitoring applicationserver 460.

The system 400 also includes thermostat 434 to perform dynamicenvironmental control at the property. The thermostat 434 is configuredto monitor temperature and/or energy consumption of an HVAC systemassociated with the thermostat 434, and is further configured to providecontrol of environmental (e.g., temperature) settings. In someimplementations, the thermostat 434 can additionally or alternativelyreceive data relating to activity at a property and/or environmentaldata at a property, e.g., at various locations indoors and outdoors atthe property. The thermostat 434 can directly measure energy consumptionof the HVAC system associated with the thermostat, or can estimateenergy consumption of the HVAC system associated with the thermostat434, for example, based on detected usage of one or more components ofthe HVAC system associated with the thermostat 434. The thermostat 434can communicate temperature and/or energy monitoring information to orfrom the control unit 410 and can control the environmental (e.g.,temperature) settings based on commands received from the control unit410.

In some implementations, the thermostat 434 is a dynamicallyprogrammable thermostat and can be integrated with the control unit 410.For example, the dynamically programmable thermostat 434 can include thecontrol unit 410, e.g., as an internal component to the dynamicallyprogrammable thermostat 434. In addition, the control unit 410 can be agateway device that communicates with the dynamically programmablethermostat 434.

A module 437 is connected to one or more components of an HVAC systemassociated with a property, and is configured to control operation ofthe one or more components of the HVAC system. In some implementations,the module 437 may be configured to monitor energy consumption of theHVAC system components, for example, by directly measuring the energyconsumption of the HVAC system components or by estimating the energyusage of the one or more HVAC system components based on detecting usageof components of the HVAC system. The module 437 can communicate energymonitoring information and the state of the HVAC system components tothe thermostat 434 and can control the one or more components of theHVAC system based on commands received from the thermostat 434.

In some examples, the system 400 further includes one or more roboticdevices. The robotic devices may be any type of robots that are capableof moving and taking actions that assist in security monitoring. Forexample, the robotic devices may include drones that are capable ofmoving throughout a property based on automated control technologyand/or user input control provided by a user. In this example, thedrones may be able to fly, roll, walk, or otherwise move about theproperty. The drones may include helicopter type devices (e.g., quadcopters), rolling helicopter type devices (e.g., roller copter devicesthat can fly and also roll along the ground, walls, or ceiling) and landvehicle type devices (e.g., automated cars that drive around aproperty). In some cases, the robotic devices may be robotic devicesthat are intended for other purposes and merely associated with thesystem 400 for use in appropriate circumstances. For instance, a trackermay be associated with the monitoring system 400 as one of the roboticdevices and may be controlled to take action responsive to monitoringsystem events.

In some examples, the robotic devices automatically navigate within ageographic area. In these examples, the robotic devices include sensorsand control processors that guide movement of the robotic devices withinthe area. For instance, the robotic devices may navigate within the areausing one or more cameras, one or more proximity sensors, one or moregyroscopes, one or more accelerometers, one or more magnetometers, aglobal positioning system (GPS) unit, an altimeter, one or more sonar orlaser sensors, and/or any other types of sensors that aid in navigationabout a space. The robotic devices may include control processors thatprocess output from the various sensors and control the robotic devicesto move along a path that reaches the desired destination and avoidsobstacles. In this regard, the control processors detect walls or otherobstacles in the property and guide movement of the robotic devices in amanner that avoids the walls and other obstacles.

In addition, the robotic devices may store data that describesattributes of the area. For instance, the robotic devices may store amap, navigation guide, or building plans that enable the robotic devicesto navigate the area. During initial configuration, the robotic devicesmay receive the data describing attributes of the area, determine aframe of reference to the data (e.g., a home or reference location inthe area), and navigate the area based on the frame of reference and thedata describing attributes of the area. Further, initial configurationof the robotic devices also may include learning of one or morenavigation patterns in which a user provides input to control therobotic devices to perform a specific navigation action (e.g., fly to aparticular building or location and return to a home charging base). Inthis regard, the robotic devices may learn and store the navigationpatterns such that the robotic devices may automatically repeat thespecific navigation actions upon a later request.

In some examples, the robotic devices may include data capture andrecording devices. In these examples, the robotic devices may includeone or more cameras, one or more motion sensors, one or moremicrophones, one or more biometric data collection tools, one or moretemperature sensors, one or more humidity sensors, one or more air flowsensors, and/or any other types of sensors that may be useful incapturing monitoring data related to the area and users in the area. Theone or more biometric data collection tools may be configured to collectbiometric samples of a person in the home with or without contact of theperson. For instance, the biometric data collection tools may include afingerprint scanner, a hair sample collection tool, a skin cellcollection tool, and/or any other tool that allows the robotic devicesto take and store a biometric sample that can be used to identify theperson (e.g., a biometric sample with DNA that can be used for DNAtesting).

In some implementations, the robotic devices may include output devices.In these implementations, the robotic devices may include one or moredisplays, one or more speakers, and/or any type of output devices thatallow the robotic devices to communicate information to a nearby user.

The robotic devices also may include a communication module that enablesthe robotic devices to communicate with the control unit 410, eachother, and/or other devices. The communication module may be a wirelesscommunication module that allows the robotic devices to communicatewirelessly. For instance, the communication module may be a Wi-Fi modulethat enables the robotic devices to communicate over a local wirelessnetwork at the property. The communication module further may be a 900MHz wireless communication module that enables the robotic devices tocommunicate directly with the control unit 410. Other types ofshort-range wireless communication protocols, such as Bluetooth,Bluetooth LE, Zwave, Zigbee, etc., may be used to allow the roboticdevices to communicate with other devices in the property.

The robotic devices further may include processor and storagecapabilities. The robotic devices may include any suitable processingdevices that enable the robotic devices to operate applications andperform the actions described throughout this disclosure. In addition,the robotic devices may include solid state electronic storage thatenables the robotic devices to store applications, configuration data,collected sensor data, and/or any other type of information available tothe robotic devices.

The robotic devices are associated with one or more charging stations.The charging stations may be located at predefined home base orreference locations in the property. The robotic devices may beconfigured to navigate to the charging stations after completion oftasks needed to be performed for the monitoring system 400. Forinstance, after completion of a monitoring operation or upon instructionby the control unit 410, the robotic devices may be configured toautomatically fly to and land on one of the charging stations. In thisregard, the robotic devices may automatically maintain a fully chargedbattery in a state in which the robotic devices are ready for use by themonitoring system 400.

The charging stations may be contact based charging stations and/orwireless charging stations. For contact based charging stations, therobotic devices may have readily accessible points of contact that therobotic devices are capable of positioning and mating with acorresponding contact on the charging station. For instance, ahelicopter type robotic device may have an electronic contact on aportion of its landing gear that rests on and mates with an electronicpad of a charging station when the helicopter type robotic device landson the charging station. The electronic contact on the robotic devicemay include a cover that opens to expose the electronic contact when therobotic device is charging and closes to cover and insulate theelectronic contact when the robotic device is in operation.

For wireless charging stations, the robotic devices may charge through awireless exchange of power. In these cases, the robotic devices needonly locate themselves closely enough to the wireless charging stationsfor the wireless exchange of power to occur. In this regard, thepositioning needed to land at a predefined home base or referencelocation in the property may be less precise than with a contact basedcharging station. Based on the robotic devices landing at a wirelesscharging station, the wireless charging station outputs a wirelesssignal that the robotic devices receive and convert to a power signalthat charges a battery maintained on the robotic devices.

In some implementations, each of the robotic devices has a correspondingand assigned charging station such that the number of robotic devicesequals the number of charging stations. In these implementations, therobotic devices always navigate to the specific charging stationassigned to that robotic device. For instance, a first robotic devicemay always use a first charging station and a second robotic device mayalways use a second charging station.

In some examples, the robotic devices may share charging stations. Forinstance, the robotic devices may use one or more community chargingstations that are capable of charging multiple robotic devices. Thecommunity charging station may be configured to charge multiple roboticdevices in parallel. The community charging station may be configured tocharge multiple robotic devices in serial such that the multiple roboticdevices take turns charging and, when fully charged, return to apredefined home base or reference location in the property that is notassociated with a charger. The number of community charging stations maybe less than the number of robotic devices.

Also, the charging stations may not be assigned to specific roboticdevices and may be capable of charging any of the robotic devices. Inthis regard, the robotic devices may use any suitable, unoccupiedcharging station when not in use. For instance, when one of the roboticdevices has completed an operation or is in need of battery charge, thecontrol unit 410 references a stored table of the occupancy status ofeach charging station and instructs the robotic device to navigate tothe nearest charging station that is unoccupied.

The system 400 further includes one or more integrated security devices480. The one or more integrated security devices 480 may include anytype of device, such as the tracker, used to provide or receive alertsbased on received sensor data. For instance, the one or more controlunits 410 may receive one or more alerts from the one or more integratedsecurity input/output devices. Additionally, the one or more controlunits 410 may receive one or more sensor data from the sensors 420 anddetermine whether to provide an alert to the one or more integratedsecurity input/output devices 480.

The sensors 420, the module 422, the camera 430, the thermostat 434, andthe integrated security devices 480 communicate with the controller 412over communication links 424, 426, 428, 432, 484, and 586. Thecommunication links 424, 426, 428, 432, 484, and 586 may be a wired orwireless data pathway configured to transmit signals from the sensors420, the module 422, the camera 430, the thermostat 434, and theintegrated security devices 480 to the controller 412. The sensors 420,the module 422, the camera 430, the thermostat 434, and the integratedsecurity devices 480 may continuously transmit sensed values to thecontroller 412, periodically transmit sensed values to the controller412, or transmit sensed values to the controller 412 in response to achange in a sensed value.

The communication links 424, 426, 428, 432, 484, and 586 may include alocal network. The sensors 420, the module 422, the camera 430, thethermostat 434, and the integrated security devices 480, and thecontroller 412 may exchange data and commands over the local network.The local network may include 802.11 “Wi-Fi” wireless Ethernet (e.g.,using low-power Wi-Fi chipsets), Z-Wave, Zigbee, Bluetooth, “Homeplug”or other “Powerline” networks that operate over AC wiring, and aCategory 5 (CAT5) or Category 5 (CAT6) wired Ethernet network. The localnetwork may be a mesh network constructed based on the devices connectedto the mesh network.

The monitoring application server 460 or processing server is anelectronic device configured to provide monitoring services byexchanging electronic communications with the control unit 410, the oneor more user devices 440 and 450, and the central alarm station server470 over the network 405. For example, the monitoring application server460 may be configured to monitor events (e.g., alarm events) generatedby the control unit 610. In this example, the monitoring applicationserver 660 may exchange electronic communications with the networkmodule 414 included in the control unit 410 to receive informationregarding events (e.g., alerts) detected by the control unit server 104a. The monitoring application server 460 also may receive informationregarding events (e.g., alerts) from the one or more user devices 440and 450 or the integrated security devices 480.

In some examples, the monitoring application server 460 may route alertdata received from the network module 414 or the one or more userdevices 440 and 450 to the central alarm station server 470. Forexample, the monitoring application server 460 may transmit the alertdata to the central alarm station server 470 over the network 405.

The monitoring application server 460 may store sensor and image datareceived from the monitoring system and perform analysis of sensor andimage data received from the monitoring system. Based on the analysis,the monitoring application server 460 may communicate with and controlaspects of the control unit 410 or the one or more user devices 440 and450.

The central alarm station server 470 is an electronic device configuredto provide alarm monitoring service by exchanging communications withthe control unit 410, the one or more mobile devices 440 and 450, theintegrated security devices 480, and the monitoring application server460 over the network 405. For example, the central alarm station server470 may be configured to monitor alerting events. In this example, thecentral alarm station server 470 may exchange communications with thenetwork module 414 included in the control unit 410 to receiveinformation regarding alerting events detected by the control unit 410.The central alarm station server 470 also may receive informationregarding alerting events from the one or more mobile devices 440 and450 and/or the monitoring application server 460.

The central alarm station server 470 is connected to multiple terminals472 and 474. The terminals 472 and 474 may be used by operators toprocess alerting events. For example, the central alarm station server470 may route alerting data to the terminals 472 and 474 to enable anoperator to process the alerting data. The terminals 472 and 474 mayinclude general-purpose computers (e.g., desktop personal computers,workstations, or laptop computers) that are configured to receivealerting data from a server in the central alarm station server 470 andrender a display of information based on the alerting data. Forinstance, the controller 412 may control the network module 414 totransmit, to the central alarm station server 470, alerting dataindicating movement of an asset. The central alarm station server 470may receive the alerting data and route the alerting data to theterminal 472 for processing by an operator associated with the terminal472. The terminal 472 may render a display to the operator that includesinformation associated with the alerting event and the operator mayhandle the alerting event based on the displayed information.

In some implementations, the terminals 472 and 474 may be mobile devicesor devices designed for a specific function. The one or more userdevices 440 and 450 are devices that host and display user interfaces.For instance, the user device 440 is a mobile device that hosts one ormore native applications (e.g., the smart home application 442). Theuser device 440 may be a cellular phone or a non-cellular locallynetworked device with a display. The user device 440 may include a cellphone, a smart phone, a tablet PC, a personal digital assistant (“PDA”),or any other portable device configured to communicate over a networkand display information. For example, implementations may also includeBlackberry-type devices (e.g., as provided by Research in Motion),electronic organizers, iPhone-type devices (e.g., as provided by Apple),iPod devices (e.g., as provided by Apple) or other portable musicplayers, other communication devices, and handheld or portableelectronic devices for gaming, communications, and/or data organization.The user device 440 may perform functions unrelated to the monitoringsystem, such as placing personal telephone calls, playing music, playingvideo, displaying pictures, browsing the Internet, maintaining anelectronic calendar, etc.

The user device 440 includes a smart home application 442. The smarthome application 442 refers to a software/firmware program running onthe corresponding mobile device that enables the user interface andfeatures described throughout. The user device 440 may load or installthe smart home application 442 based on data received over a network ordata received from local media. The smart home application 442 runs onmobile devices platforms, such as iPhone, iPod touch, Blackberry, GoogleAndroid, Windows Mobile, etc. The smart home application 442 enables theuser device 440 to receive and process image and sensor data from themonitoring system. In some cases, the smart home application 442 mayallow a user to alerts regarding any asset movement.

The user device 450 may be a general-purpose computer (e.g., a desktoppersonal computer, a workstation, or a laptop computer) that isconfigured to communicate with the monitoring application server 460and/or the control unit 410 over the network 405. The user device 450may be configured to display a smart home user interface 452 that isgenerated by the user device 450 or generated by the monitoringapplication server 460. For example, the user device 450 may beconfigured to display a user interface (e.g., a web page) provided bythe monitoring application server 460 that enables a user to perceiveimages captured by the camera 430 and/or reports related to themonitoring system.

In some implementations, the one or more user devices 440 and 450communicate with and receive monitoring system data from the controlunit 410 using the communication link 438. For instance, the one or moreuser devices 440 and 450 may communicate with the control unit 410 usingvarious local wireless protocols such as Wi-Fi, Bluetooth, Zwave,Zigbee, HomePlug (ethernet over powerline), or wired protocols such asEthernet and USB, to connect the one or more user devices 440 and 450 tolocal security and automation equipment. The one or more user devices440 and 450 may connect locally to the monitoring system and its sensorsand other devices. The local connection may improve the speed of statusand control communications because communicating through the network 405with a remote server (e.g., the monitoring application server 460) maybe significantly slower.

Although the one or more user devices 440 and 450 are shown ascommunicating with the control unit 410, the one or more user devices440 and 450 may communicate directly with the sensors and other devicescontrolled by the control unit 410. In some implementations, the one ormore user devices 440 and 450 replace the control unit 410 and performthe functions of the control unit 410 for local monitoring and longrange/offsite communication.

In other implementations, the one or more user devices 440 and 450receive monitoring system data captured by the control unit 410 throughthe network 405. The one or more user devices 440, 450 may receive thedata from the control unit 410 through the network 405 or the monitoringapplication server 460 may relay data received from the control unit 410to the one or more user devices 440 and 450 through the network 405. Inthis regard, the monitoring application server 460 may facilitatecommunication between the one or more user devices 440 and 450 and themonitoring system.

In some implementations, the one or more user devices 440 and 450 may beconfigured to switch whether the one or more user devices 440 and 450communicate with the control unit 410 directly (e.g., through link 438)or through the monitoring application server 460 (e.g., through network405) based on a location of the one or more user devices 440 and 450.For instance, when the one or more user devices 440 and 450 are locatedclose to the control unit 410 and in range to communicate directly withthe control unit 410, the one or more user devices 440 and 450 usedirect communication. When the one or more user devices 440 and 450 arelocated far from the control unit 410 and not in range to communicatedirectly with the control unit 410, the one or more user devices 440 and450 use communication through the monitoring application server 460.

Although the one or more user devices 440 and 450 are shown as beingconnected to the network 405, in some implementations, the one or moreuser devices 440 and 450 are not connected to the network 405. In theseimplementations, the one or more user devices 440 and 450 communicatedirectly with one or more of the monitoring system components and nonetwork (e.g., Internet) connection or reliance on remote servers isneeded.

In some implementations, the one or more user devices 440 and 450 areused in conjunction with only local sensors and/or local devices in ahouse. In these implementations, the system 400 only includes the one ormore user devices 440 and 450, the sensors 420, the module 422, thecamera 430, and the robotic devices. The one or more user devices 440and 450 receive data directly from the sensors 420, the module 422, thecamera 430, and the robotic devices and sends data directly to thesensors 420, the module 422, the camera 430, and the robotic devices.The one or more user devices 440, 450 provide the appropriateinterfaces/processing to provide visual surveillance and reporting.

In some implementations, the system 400 further includes network 405 andthe sensors 420, the module 422, the camera 430, the thermostat 434, andthe robotic devices are configured to communicate sensor and image datato the one or more user devices 440 and 450 over network 405 (e.g., theInternet, cellular network, etc.). In some implementations, the sensors420, the module 422, the camera 430, the thermostat 434, and the roboticdevices (or a component, such as a bridge/router) are intelligent enoughto change the communication pathway from a direct local pathway when theone or more user devices 440 and 450 are in close physical proximity tothe sensors 420, the module 422, the camera 430, the thermostat 434, andthe robotic devices to a pathway over network 405 when the one or moreuser devices 440 and 450 are farther from the sensors 420, the module422, the camera 430, the thermostat 434, and the robotic devices. Insome examples, the system leverages GPS information from the one or moreuser devices 440 and 450 to determine whether the one or more userdevices 440 and 450 are close enough to the sensors 420, the module 422,the camera 430, the thermostat 434, and the robotic devices to use thedirect local pathway or whether the one or more user devices 440 and 450are far enough from the sensors 420, the module 422, the camera 430, thethermostat 434, and the robotic devices that the pathway over network405 is required. In other examples, the system leverages statuscommunications (e.g., pinging) between the one or more user devices 440and 450 and the sensors 420, the module 422, the camera 430, thethermostat 434, and the robotic devices to determine whethercommunication using the direct local pathway is possible. Ifcommunication using the direct local pathway is possible, the one ormore user devices 440 and 450 communicate with the sensors 420, themodule 422, the camera 430, the thermostat 434, and the robotic devicesusing the direct local pathway. If communication using the direct localpathway is not possible, the one or more user devices 440 and 450communicate with the sensors 420, the module 422, the camera 430, thethermostat 434, and the robotic devices using the pathway over network405.

In some implementations, the system 400 provides end users with accessto images captured by the camera 430 to aid in decision making. Thesystem 400 may transmit the images captured by the camera 430 over awireless WAN network to the user devices 440 and 450. Becausetransmission over a wireless WAN network may be relatively expensive,the system 400 uses several techniques to reduce costs while providingaccess to significant levels of useful visual information.

In some implementations, a state of the monitoring system and otherevents sensed by the monitoring system may be used to enable/disablevideo/image recording devices (e.g., the camera 430). In theseimplementations, the camera 430 may be set to capture images on aperiodic basis when the alarm system is armed in an “Away” state, butset not to capture images when the alarm system is armed in a “Stay”state or disarmed. In addition, the camera 430 may be triggered to begincapturing images when the alarm system detects an event, such as analarm event, a door-opening event for a door that leads to an areawithin a field of view of the camera 430, or motion in the area withinthe field of view of the camera 430. In other implementations, thecamera 430 may capture images continuously, but the captured images maybe stored or transmitted over a network when needed.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus implementing thesetechniques may include appropriate input and output devices, a computerprocessor, and a computer program product tangibly embodied in amachine-readable storage device for execution by a programmableprocessor. A process implementing these techniques may be performed by aprogrammable processor executing a program of instructions to performdesired functions by operating on input data and generating appropriateoutput. The techniques may be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device. Each computerprogram may be implemented in a high-level procedural or object-orientedprogramming language, or in assembly or machine language if desired; andin any case, the language may be a compiled or interpreted language.Suitable processors include, by way of example, both general and specialpurpose microprocessors. Generally, a processor will receiveinstructions and data from a read-only memory and/or a random accessmemory. Storage devices suitable for tangibly embodying computer programinstructions and data include all forms of non-volatile memory,including by way of example, semiconductor memory devices, such asErasable Programmable Read-Only Memory (EPROM), Electrically ErasableProgrammable Read-Only Memory (EEPROM), and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Anyof the foregoing may be supplemented by, or incorporated in, speciallydesigned ASICs (application-specific integrated circuits).

While this specification contains many specifics, these should not beconstrued as limitations on the scope of the disclosure or of what maybe claimed, but rather as descriptions of features specific toparticular embodiments. Certain features that are described in thisspecification in the context of separate embodiments may also beimplemented in combination in a single embodiment. Conversely, variousfeatures that are described in the context of a single embodiment mayalso be implemented in multiple embodiments separately or in anysuitable sub-combination. Moreover, although features may be describedabove as acting in certain combinations and may even be claimed as such,one or more features from a claimed combination may, in some cases, beexcised from the combination, and the claimed combination may bedirected to a sub-combination or variation of a sub-combination.

Similarly, the separation of various system components in theembodiments described above should not be understood as requiring suchseparation in all embodiments, and it should be understood that thedescribed program components and systems may generally be integratedtogether in a single software product or packaged into multiple softwareproducts. For example, although some operations are described as beingperformed by a processing server, one of more of the operations may beperformed by the smart meter or other network components.

It should be understood that the phrase one or more of and the phrase atleast one of include any combination of elements. For example, thephrase one or more of A and B includes A, B, or both A and B. Similarly,the phrase at least one of A and B includes A, B, or both A and B.

Thus, particular implementations have been described. Otherimplementations are within the scope of the following claims. Forexample, the actions recited in the claims may be performed in adifferent order and still achieve desirable results.

What is claimed is:
 1. A device that is configured to track an asset,the device comprising: a radio module that is configured to: communicatewith a computing device; and based on communicating with the computingdevice, generate proximity data that indicates a distance between thecomputing device and the device; a processor that is configured to:receive, from the radio module, the proximity data; compare the distancebetween the computing device and the device to a distance threshold;based on comparing the distance between the computing device and thedevice to the distance threshold, determine that the distance betweenthe computing device and the device satisfies the distance threshold;and based on determining that that the distance between the computingdevice and the device satisfies the distance threshold, arm the device;and a motion sensor that is configured to: activate based on arming thedevice; and generate motion data, wherein the processor is configuredto: compare the motion data to a motion threshold; based on comparingthe motion data to a motion threshold, determine that the motion datasatisfies the motion threshold; and based on determining that the motiondata satisfies the motion threshold, activate an alarm state.
 2. Thedevice of claim 1, wherein: the radio module is configured to: based oncommunicating with the computing device, generate additional proximitydata that indicates an additional distance between the computing deviceand the device, and the processor is configured to: receive, from theradio module, the additional proximity data; compare the additionaldistance between the computing device and the device to the distancethreshold; based on comparing the additional distance between thecomputing device and the device to the distance threshold, determinethat the additional distance between the computing device and the devicedoes not satisfy the distance threshold; based on determining that thatthe additional distance between the computing device and the device doesnot satisfy the distance threshold, set the device to an unarmed state;and the motion sensor is configured to deactivate based on the devicebeing in an unarmed state.
 3. The device of claim 1, wherein: the motionsensor is configured to generate additional motion data, and theprocessor is configured to: compare the additional motion data to themotion threshold; based on comparing the additional motion data to themotion threshold, determine that the additional motion data does notsatisfy the motion threshold; and based on determining that theadditional motion data does not satisfy the motion threshold, maintainthe device in the armed state.
 4. The device of claim 3, wherein: theprocessor is configured to: compare the additional motion data to anadditional motion threshold; based on comparing the additional motiondata to the additional motion threshold, determine that the additionalmotion data satisfies the additional motion threshold; and based ondetermining that the additional motion data satisfies the additionalmotion threshold, generate a notification indicating movement of theasset, the radio module is configured to transmit the notificationindicating the movement of the asset.
 5. The device of claim 1,comprising: a GPS receiver that is configured to generate location databased on the device being in an alarm state, wherein the radio module isconfigured to transmit the location data.
 6. The device of claim 5,wherein: the processor is configured to generate a request to deploy adrone and the location data, and the radio module is configured totransmit the request to deploy a drone and the location data.
 7. Thedevice of claim 5, wherein: the processor is configured to generate arequest activate a camera in a vicinity of the device and the locationdata, and the radio module is configured to transmit the request toactivate a camera in a vicinity of the device and the location data. 8.The device of claim 5, wherein the processor is configured to: determinethat, based on the location data, a location of the device is notchanging; and based on determining that the location of the device isnot changing, deactivate the GPS receiver and maintain the motion sensorin an active state.
 9. The device of claim 1, wherein: the radio moduleis configured to, based on communicating with the computing device,generate additional proximity data that indicates an additional distancebetween the computing device and the device; the processor is configuredto: receive, from the radio module, the additional proximity data;compare the additional distance between the computing device and thedevice to the distance threshold; and based on comparing the additionaldistance between the computing device and the device to the distancethreshold, determine that the distance between the computing device andthe device does not satisfy the distance threshold; the radio module isconfigured to receive an instruction to arm the device, and theprocessor is configured to: receive the instruction to arm the device;and based on the instruction to arm the device, arm the device.
 10. Thedevice of claim 1, wherein the radio module is configured to communicateusing a short range radio or a cellular radio.
 11. Acomputer-implemented method, comprising: communicating, by a radiomodule of a device that is configured to track an asset, with acomputing device; based on communicating with the computing device,generating, by the radio module of the device, proximity data thatindicates a distance between the computing device and the device; basedon the proximity data that indicates the distance between the computingdevice and the device, comparing, by a processor of the device, thedistance between the computing device and the device to a distancethreshold; based on comparing the distance between the computing deviceand the device to a distance threshold, determining, by the processor ofthe device, that the distance between the computing device and thedevice satisfies the distance threshold; based on determining that thatthe distance between the computing device and the device satisfies thedistance threshold, arming, by the processor of the device, the device;based on arming the device, activating, by the processor of the device,a motion sensor of the device; receiving, by the processor of thedevice, motion data generated by the motion sensor; comparing, by theprocessor of the device, the motion data to a motion threshold; based oncomparing the motion data to a motion threshold, determining, by theprocessor of the device, that the motion data satisfies the motionthreshold; and based on determining that the motion data satisfies themotion threshold, activating, by the processor of the device, an alarmstate.
 12. The method of claim 11, comprising: based on communicatingwith the computing device, generating, by the radio module of thedevice, additional proximity data that indicates an additional distancebetween the computing device and the device; comparing, by the processorof the device, the additional distance between the computing device andthe device to the distance threshold; based on comparing the additionaldistance between the computing device and the device to the distancethreshold, determining, by the processor of the device, that theadditional distance between the computing device and the device does notsatisfy the distance threshold; based on determining that that theadditional distance between the computing device and the device does notsatisfy the distance threshold, setting, by the processor of the device,the device to an unarmed state; and based on the device being in anunarmed state, deactivating, by the processor of the device, the motionsensor.
 13. The method of claim 11, comprising: generating, by themotion sensor of the device, additional motion data; comparing, by theprocessor of the device, the additional motion data to the motionthreshold; based on comparing the additional motion data to the motionthreshold, determining, by the processor of the device, that theadditional motion data does not satisfy the motion threshold; and basedon determining that the additional motion data does not satisfy themotion threshold, maintaining, by the processor of the device, thedevice in the armed state.
 14. The method of claim 13, comprising:comparing, by the processor of the device, the additional motion data toan additional motion threshold; based on comparing the additional motiondata to the additional motion threshold, determining, by the processorof the device, that the additional motion data satisfies the additionalmotion threshold; based on determining that the additional motion datasatisfies the additional motion threshold, generating, by the processorof the device, a notification indicating movement of the asset; andtransmitting, by the radio module of the device, the notificationindicating the movement of the asset.
 15. The method of claim 11,comprising: generating, by a GPS receiver of the device, location databased on the device being in an alarm state; and transmitting, by theradio module of the device, the location data.
 16. The method of claim15, comprising: generating, by the processor of the device, a request todeploy a drone and the location data; and transmitting, by the radiomodule of the device, the request to deploy a drone and the locationdata.
 17. The method of claim 15, comprising: generating, by theprocessor of the device, a request activate a camera in a vicinity ofthe device and the location data; and transmitting, by the radio moduleof the device, the request to activate a camera in a vicinity of thedevice and the location data.
 18. The method of claim 15, comprising:determining, by the processor of the device, based on the location data,a location of the device is not changing; and based on determining thatthe location of the device is not changing, deactivating, by theprocessor of the device, the GPS receiver and maintaining the motionsensor in an active state.
 19. The method of claim 11, comprising: basedon communicating with the computing device, generating, by the radiomodule of the device, additional proximity data that indicates anadditional distance between the computing device and the device;comparing, by the processor of the device, the additional distancebetween the computing device and the device to the distance threshold;based on comparing the additional distance between the computing deviceand the device to the distance threshold, determining, by the processorof the device, that the distance between the computing device and thedevice does not satisfy the distance threshold; receiving, by the radiomodule of the device, an instruction to arm the device; and based on theinstruction to arm the device, arming, by the processor of the device,the device.
 20. The method of claim 11, wherein the radio module isconfigured to communicate using a short range radio or a cellular radio.