Remote interactive identity verification of lodging guests

ABSTRACT

A method for using a doorbell to remotely identify a visitor, comprising the use of a doorbell apparatus that comprises a speaker, a microphone, a camera, and a button with an audible response to a visitors input, further using the doorbell to detect the visitor while the visitor is located outside of a secured lodging, and within a detectable range of the doorbell, further using the doorbell to take a video of the visitor while the visitor accepts lodging terms, recording the video to validate that the visitor accepted the lodging terms and sending the video of the visitor from the doorbell to a remote computing device for displaying images of the visitor on the remote computing device for the purposes of verifying the identity of the visitor and then enabling the visitor to control the lock in response to the identity verification

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a divisional application of, and claims priority to,U.S. Nonprovisional Utility patent application Ser. No. 14/512,277,entitled REMOTE IDENTITY VERIFICATION OF LODGING GUESTS, filed 10 Oct.2014, first named inventor Joseph Scalisi; the entire contents of whichare incorporated by reference herein.

The following applications are incorporated by reference herein: U.S.Provisional Patent Application No. 61/859,070; filed Jul. 26, 2013; andentitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; U.S. ProvisionalPatent Application No. 61/872,439; filed Aug. 30, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS; U.S. Nonprovisional patentapplication Ser. No. 14/098,772; filed Dec. 6, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS; U.S. Nonprovisional patentapplication Ser. No. 14/099,888; filed Dec. 6, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS; U.S. Nonprovisional patentapplication Ser. No. 14/142,839; filed Dec. 28, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS; U.S. Nonprovisional patentapplication Ser. No. 14/275,811; filed May 12, 2014; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS. This application claims thebenefit of U.S. Provisional Patent Application No. 62/011,038; filedJun. 12, 2014; and entitled REMOTE IDENTITY VERIFICATION OF LODGINGGUEST, the entire contents of which are incorporated by referenceherein. This application claims the benefit of U.S. Provisional PatentApplication No. 62/011,039; filed Jun. 12, 2014; and entitled REMOTEIDENTITY VERIFICATION OF LODGING GUESTS BY SIMULTANEOUSLY DISPLAYINGIMAGES FROM TWO SOURCES, the entire contents of which are incorporatedby reference herein. This application claims the benefit of U.S.Provisional Patent Application No. 62/011,040; Filed Jun. 12, 2014; andentitled REMOTE IDENTITY VERIFICATION OF MULTIPLE LODGING GUESTS, theentire contents of which are incorporated by reference herein. Thisapplication is a divisional application and claims priority to U.S.Nonprovisional patent application Ser. No. 14/512,277, filed 10 Oct.2014, first named inventor Joseph Scalisi; the entire contents of whichare incorporated by reference herein.

BACKGROUND

1. Field of the Invention

Various embodiments disclosed herein relate to devices and methods thatenable remotely located individuals to communicate. Certain embodimentsrelate to verifying the identity of a guest in connection with providingthe guest with access to lodging.

2. Description of Related Art

Guests often arrive at a location that provides temporary lodging. Aguest may ask an attendant for access to the lodging. The attendant maydecide to provide a key to the guest to enable the guest to open a doorto the lodging. For example, a guest can receive a hotel key thatprovides access to a hotel room. Some locations that provide lodging maynot have an attendant that can hand out keys. Thus, there is a need toenable access to lodging without requiring an attendant to be present todistribute keys. Some locations that provide lodging may wish to providea key that only enables temporary access to the lodging (rather thanlong-term access to the lodging). Thus, there is a need to enabletemporary lodging access while avoiding inadvertently providinglong-term lodging access.

SUMMARY

Several embodiments include using a doorbell to detect a visitor whilethe visitor is located outside of a lodging (e.g., outside of abuilding, outside of a hotel room, outside of an apartment). The lodgingcan include an entrance (e.g., a door with a lock). The visitor can bedetected while the visitor is within 30 feet of the entrance. Someembodiments include using the doorbell to take a video of the visitorwhile the visitor accepts lodging terms (e.g., terms required for thevisitor to stay in the lodging). Example terms include a maximum numberof guests, smoke-free requirements, and payment terms. Some methodsinclude recording (e.g., storing) the video to validate that the visitoraccepted the lodging terms.

A visitor can accept lodging terms in many different ways including byagreeing to lodging terms. In some embodiments, a visitor acceptslodging terms by entering into a contract that includes lodging terms.Visitors can enter into a contract verbally or by signing a contract.Visitors can use electronic devices to accept lodging terms (e.g., byclicking a button on a graphical user interface).

Some methods include using a doorbell to identify a visitor. The visitormay be seeking lodging, such as a room at a hotel or a short-term rentalapartment. Methods can include obtaining the doorbell that comprises aspeaker, a microphone, a camera, and a button. The button can beconfigurable to enable the visitor to sound a chime (e.g., a soundoutput device to emit a “ringing” sound).

Several methods include using the doorbell to detect the visitor whilethe visitor is located outside of a building to which the doorbell isattached and/or while the visitor is located within 30 feet of thedoorbell. The building can comprise a door having a lock. The lock canbe configured to fasten the door to inhibit (e.g., guard against)unauthorized entry into the building. In some embodiments, the buildingis a hotel room, a rental condominium, a timeshare, a rental apartment,a rental home, or a rental cabin. Some buildings are not rentals. Asused herein, in some embodiments, a “building” can mean a portion of astructure (e.g., a hotel room inside a hotel with many rooms).

Several embodiments include using the doorbell to take an image of thevisitor. The image can be a picture or a video. For example, a doorbellcan have an integrated camera configured to take pictures or videos ofvisitors. Some embodiments include sending the image of the visitor fromthe doorbell to a remote computing device (e.g., a smartphone, a tablet,a laptop, a smart television, a desktop) and displaying the image of thevisitor on the remote computing device (e.g., such that a user of theremote computing device can see the image).

Several methods include using the remote computing device to verify anidentity of the visitor and then enabling the visitor to control thelock in response to verifying the identity of the visitor. Control ofthe lock comprises an ability to unlock the lock (at authorized times).

Enabling the visitor to control the lock can comprise sending a passwordto the visitor. The password can comprise numbers and/or letters. Somemethods comprise the visitor entering the password into the lock tounlock the door. For example, the visitor can speak the password (whilethe microphone of the doorbell records the password and the doorbelldetermines whether the password is correct). In some embodiments, thevisitor types the password into a keypad electrically coupled to thelock and/or to the doorbell.

Enabling the visitor to control the lock can comprise sending anelectronic key to an electronic device in possession of the visitor. Forexample, a remote database and/or the remote computing device can sendthe electronic key to the cellular telephone of the visitor. Theelectronic key can be configured to enable unlocking the lock. In someembodiments, bringing the electronic device in close proximity (e.g.,within communication distance) of the lock can permit the electronic keyto enable unlocking the lock. The electronic key can be sent via a ShortMessage Service (SMS), via an email, or via a software application. Insome embodiments, the electronic key is sent wirelessly from theproperty manager to the visitor such that the property manager (e.g., anowner) does not have to be physically present at the property to providea key to a visitor.

Some methods for using a doorbell to identify a visitor compriseobtaining a doorbell that has a speaker, a microphone, a camera, and abutton (e.g., configurable to enable the visitor to sound a chime insideand/or outside of a building). Several methods include recording a firstimage of the visitor in a remote database prior to the visitorapproaching the doorbell.

As used herein, “approaching a doorbell,” means moving (walking orrunning) towards a doorbell as a person approaches the building orstructure to which the doorbell is attached. For example, a person whomoves in a wheelchair up a walkway to a home and then comes in closeproximity to a doorbell has approached the doorbell. A person drivingpast houses on a street is not approaching the doorbells on the street.Approaching a doorbell typically requires coming within 30 feet of thedoorbell.

Some embodiments include using a doorbell to detect the visitor afterthe visitor has approached the doorbell while the visitor is locatedoutside of a building to which the doorbell is attached. The buildingcan comprise a door having a lock. The lock can be configured to fastenthe door to prevent unauthorized entry into the building.

Several embodiments comprise using the doorbell to take a second imageof the visitor after the visitor has approached the doorbell. Someembodiments include sending an alert to a remote computing device inresponse to the doorbell detecting the visitor. A doorbell can detectthe visitor in many ways. For example, the visitor may press the buttonto ring the chime and/or may be detected by a motion sensor. The alertcan be configured to notify a user of the remote computing deviceregarding a presence of the visitor outside of the building. Forexample, the user might receive a push notification on her smartphone.The user can choose to “answer” the notification by selecting a buttonon the smartphone.

Some embodiments include sending the first image of the visitor from theremote database to the remote computing device and/or sending the secondimage of the visitor from the doorbell to the remote computing device.Several embodiments include storing the first image of the visitor onthe remote computing device such that the first image is ready for theremote computing device to display along with the second image. Methodscan include displaying (e.g., simultaneously or one after the other) thefirst image and the second image of the visitor on the remote computingdevice and then recording whether the visitor is shown in both the firstimage and the second image. Some methods include verifying whether thevisitor is shown in both images (or determining that different peopleare shown in the images). Methods can include enabling the visitor tocontrol the lock in response to recording and/or verifying that thefirst image and the second image show the visitor.

Several methods include using the remote computing device to verify thatthe visitor is shown in both the first image and the second image;saving a third image that comprises the first image and the second imageto validate that the visitor actually visited the building; sending thethird image to the remote database; and/or associating a timestamp withthe third image such that the timestamp is correlated with the thirdimage in the remote database. The timestamp can represent an occasionwhen the visitor requested access to the building.

Various events can result in saving the third image. Some methodscomprise automatically saving the third image in response to verifyingthat the visitor is shown in both the first image and the second image.Some methods comprise automatically saving the third image in responseto displaying the first image and the second image.

In some embodiments, enabling the visitor to control the lock comprisessending an electronic key to an electronic device in possession of thevisitor. The electronic key can be configured to enable unlocking thelock. Several embodiments comprise automatically saving the third imagein response to sending the electronic key to the electronic device inpossession of the visitor.

In several embodiments, enabling the visitor to control the lockcomprises the remote computing device instructing the remote database tosend the electronic key to the electronic device in possession of thevisitor.

The building described herein can be many different types of buildings(including rental properties and buildings that provide lodging totravelers). In some embodiments, the building comprises a hotel, and theelectronic key is configured to unlock a hotel room. The electronicdevice can comprises a cellular telephone, a tablet, a television,and/or a computer. Methods can comprise the visitor unlocking the hotelroom using the electronic key.

Some embodiments include placing the electronic device within ten feetor within 30 feet of the lock, and then wirelessly transferring anidentification code from the electronic device to the lock in order tounlock the lock.

Some methods include disabling the electronic key within ten hours afterthe end of a rental period. Several embodiments include disabling theelectronic key when the rental period ends. Several embodiments includeautomatically disabling the electronic key in response to the rentalperiod ending. Disabling the electronic key prevents the electronic keyfrom being able to unlock the lock. As used herein, the rental period isa time in which the visitor is authorized to enter the building.

Several embodiments comprise taking at least one additional image of thevisitor on each occasion the visitor unlocks the lock; associating atime and a date with each additional image; and recording the additionalimages, the times, and the dates in the remote database. Methods canfurther comprise enabling the remote computing device to display theadditional images, the times, and the dates. For example, a user of theremote computing device can search through the additional images to seethe visitor who entered the building at a particular entry time.

Some methods comprise selecting a first expected person profile inresponse to a time at which the doorbell detects the visitor. Forexample, if a visitor is detected on the first day of May, the systemcan select the profile of the person who is scheduled to rent thebuilding on the first day of May. The user of the remote device can thendetermine if the visitor matches the identity of the person who isscheduled to rent the building on the first day of May. The firstexpected person profile can include a picture of the visitor and thename of the visitor. Methods can comprise sending the first expectedperson profile to the remote computing device and displaying the name onthe remote computing device (e.g., along with the picture of theexpected guest). The user of the remote computing device can thencompare the picture of the expected guest to the live picture (e.g., avideo) of the visitor currently by the doorbell. If the user is unsureof the identity of the visitor, the user can ask the visitor a securityquestion. The answer to the security question can be displayed alongwith the name and the guest picture on the remote computing device.Several embodiments include the visitor displaying her driver's licenseto the camera of the doorbell to enable the user of the remote computingdevice to verify that the name on the driver's license matches the nameon the credit card used to rent and/or reserve the property. In severalembodiments, the remote database comprises the first expected personprofile having a first rental period and a second expected personprofile having a second rental period. The remote database can send thefirst expected person profile to the remote computing device if the timeat which the doorbell detects the visitor is within the first rentalperiod, and the remote database can send the second expected personprofile to the remote computing device if the time at which the doorbelldetects the visitor is within the second rental period.

Some embodiments use computer-based facial recognition to determinewhether the visitor is shown in both the first image and the secondimage. For example, facial landmarks can be used to determine if bothimages “match” (e.g., both images show the same person).

Several methods include using a doorbell to identify one or morevisitors. Methods can include obtaining the doorbell that comprises aspeaker, a microphone, a camera, and a button. Several embodimentsinclude recording a first image of a first guest in a remote databaseprior to the first guest approaching the doorbell; recording a secondimage of a second guest in the remote database prior to the second guestapproaching the doorbell; and/or recording a third image of a thirdguest in the remote database prior to the third guest approaching thedoorbell. The remote database can store guest images for later displayon a remote computing device.

In some embodiments, the system needs to know which guest image todisplay on the remote computing device. In several embodiments, thefirst guest can be scheduled to rent the building during a first rentalperiod; the second guest can be scheduled to rent the building during asecond rental period; and/or the third guest can be scheduled to rentthe building during a third rental period. The doorbell can detect thevisitor at a time within the first rental period, which can provide thesystem with an indication of which guest might be the visitor at thedoorway. However, this indication might not always correctly match thevisitor to the correct guest profile.

The second rental period can be chronologically closest to the firstrental period. The third rental period can be the next chronologicallyclosest rental period to the first rental period.

Some embodiments include using the doorbell to take an identificationimage of the visitor after the visitor has approached the doorbell.Methods can include sending an alert to a remote computing device inresponse to the doorbell detecting the visitor. The alert can beconfigured to notify a user of the remote computing device regarding apresence of the visitor outside of the building. An alert can appear asa message on the remote computing device.

Several embodiments include sending the first image of the first guestand the second image of the second guest from the remote database to theremote computing device and sending the identification image of thevisitor from the doorbell to the remote computing device. Embodimentscan include displaying the first image and the identification image onthe remote computing device, and then displaying the second image on theremote computing device in response to recording that the visitor is notthe first guest. Methods can include recording whether the visitor isshown in both the second image and the identification image. Someembodiments include enabling the visitor to control the lock in responseto recording that the second image and the identification image show thevisitor.

Several embodiments comprise using the remote computing device to verifythat the visitor is shown in both the second image and theidentification image. Some embodiments include saving a fourth imagethat comprises the second image and the identification image to documentthat the visitor actually visited the building. For example, methods caninclude taking at least a partial screenshot of the user interface ofthe remote computing device to validate the transaction (e.g., that theproperty manager matched the images and sent an electronic key to thevisitor). Some embodiments include disabling the electronic key after anappropriate amount of time and/or after inappropriate visitor behavior.Several methods include disabling the electronic key within three hoursafter the end of the second rental period in which the visitor isauthorized to enter the building.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 illustrates a front view of a communication system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates an embodiment in which a security system is connectedto a building, according to some embodiments.

FIGS. 4-6 illustrate diagrammatic views of remote identity verificationmethods, according to some embodiments.

FIG. 7 illustrates a front view of a user interface, according to someembodiments.

FIG. 8 illustrates a diagrammatic view of guest profiles, according tosome embodiments.

FIG. 9 illustrates a diagrammatic view of remote identity verificationmethods, according to some embodiments.

FIG. 10 illustrates a history of lock-related events displayed on a userinterface, according to some embodiments.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed below, inventivesubject matter extends beyond the specifically disclosed embodiments toother alternative embodiments and/or uses, and to modifications andequivalents thereof. Thus, the scope of the claims appended hereto isnot limited by any of the particular embodiments described below. Forexample, in any method or process disclosed herein, the acts oroperations of the method or process may be performed in any suitablesequence and are not necessarily limited to any particular disclosedsequence. Various operations may be described as multiple discreteoperations in turn, in a manner that may be helpful in understandingcertain embodiments; however, the order of description should not beconstrued to imply that these operations are order dependent.Additionally, the structures, systems, and/or devices described hereinmay be embodied as integrated components or as separate components.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

Traditional hotels often include a lobby where a visitor goes to provideher credit card and to receive a physical key to a hotel room. Companiessuch as Airbnb, Inc. (based in San Francisco, Calif.) are seeking todisrupt traditional hotels by enabling individuals to rent their homes(e.g., single-family homes, apartments, condos) to strangers. This trendis becoming increasingly popular. Several websites enable propertyowners to rent their property to strangers: VRBO.com, HomeAway.com,WIMDU.com, 9flats.com, and Tripping.com.

There are challenges associated with renting property to strangers. Forexample, property owners might be justifiably concerned about keysgetting into the hands of the wrong people. Moreover, property ownerswould benefit from a convenient way to take keys back from previousguests to preclude unwanted future access. Controlling key access isessential to protecting properties and to providing safe access toguests.

Various embodiments described herein provide means to verify theidentity of individuals requesting access to lodging prior to giving theindividuals access to the lodging. Some embodiments terminate access tolodging once a rental period has expired.

FIG. 1 illustrates a security system 202 (e.g., a doorbell) thatincludes a camera assembly 208. When a visitor approaches the securitysystem 202 (e.g., rings a doorbell 212), the security system 202 cansend a wireless notification to a computing device 204 that is locatedremotely relative to the security system 202. For example, the owner ofthe rental property may be at work or even in another country.

The owner (i.e., the user) can verify the identity of the visitor asexplained in more detail below. For example, the owner can see thevisitor on the computing device 204. Once the owner has verified theidentity of the visitor, the owner can grant the visitor access to therental property (e.g., by unlocking the door lock 250 to let the visitorinside the rental property). The security system 202 can be configuredsuch that it can unlock the door lock 250. In some embodiments, thesecurity system 202 wirelessly controls the door lock 250.

The door lock 250 can include a deadbolt or other locking mechanism thatlocks and unlocks a door in response to remote commands. For example,the security system 202 can notify the door lock 250 to lock and unlockthe door. The door lock 250 can be controlled by a remote computingdevice 204 (e.g., a smartphone). Example door locks 250 includeLockitron made by Apigy Inc., the August Smart Lock made by Yves Beharand Jason Johnson, electronic locks made by Schlage (a Allegioncompany), and the Kevo lock made by Kwikset (a division of SpectrumBrands Holdings).

In several embodiments, the “key” that the owner provides to the visitoris not a physical, metal key, but instead, is an electronic key (e.g., avirtual key). The electronic key can be configured to enable access tothe property only during the rental period. After the rental period, theelectronic key can be disabled by the system.

The owner can send the key to the visitor remotely such that the owneris not required to be physically present at the property to transfer thekey. In some embodiments, the owner sends the key to the visitor via atext message, an email, or a software application. In severalembodiments, the visitor can keep the key on her phone to enable herphone to unlock the door lock 250 during an authorized period of time(e.g., during the rental period).

The text message or email can prompt the visitor to download a softwareapplication that includes an electronic key. The software applicationcan enable the visitor to lock and unlock the door lock 250.

Electronic keys can be sent to visitors that are located remotely fromthe owner. The owner can be the key administrator. The administrator cansee who locked and unlocked a door in the past. The administrator canalso see if a visitor failed to lock the door (e.g., during a burglaryor vandalism of the lodging). A lock log can record locking dataincluding the identity of the person using the electronic key, thecomputing device using the electronic key, and the time the electronickey was used to lock or unlock a door.

The owner can create new electronic keys and can disable electronickeys. Some electronic keys are configured to be automatically disabledafter a period of time (e.g., after a rental period or after less than12 hours after the end of a rental period). In some embodiments, avisitor can forward an electronic key to other people and/or tocomputing devices other than the computing device that first receivedthe electronic key from the owner.

In some embodiments, the security system 202 takes a picture when thedoor lock 250 is unlocked and/or locked to document the identity of theperson unlocking and/or locking the door. The owner can record a pictureof the visitor for security purposes. If the visitor knows about thepicture, the visitor will be more likely to behave appropriately. If thevisitor's actions lead to property damage, the picture can be used tohelp prosecute the visitor.

System Embodiments

Communication systems can provide a secure and convenient way for aremotely located individual to communicate with a person who isapproaching a sensor, such as a proximity sensor or motion sensor, orwith a person who rings a doorbell, which can be located in a doorway,near an entrance, or within 15 feet of a door. Some communicationsystems allow an individual to hear, see, and talk with visitors whoapproach at least a portion of the communication system and/or press abutton, such as a doorbell's button. For example, communication systemscan use a computing device to enable a remotely located person to see,hear, and/or talk with visitors. Computing devices can includecomputers, laptops, tablets, mobile devices, smartphones, cellularphones, and wireless devices (e.g., cars with wireless communication).Example computing devices include the iPhone, iPad, iMac, MacBook Air,and MacBook Pro made by Apple Inc. Communication between a remotelylocated person and a visitor can occur via the Internet, cellularnetworks, telecommunication networks, and wireless networks.

Referring now to FIG. 1, communication systems can be a portion of asmart home hub. In some embodiments, the communication system 200 formsthe core of the smart home hub. For example, the various systemsdescribed herein enable complete home automation. In some embodiments,the security system 202 controls various electrical items in a home(e.g., lights, air conditioners, heaters, motion sensors, garage dooropeners, locks, televisions, computers, entertainment systems, poolmonitors, elderly monitors). In some embodiments, the computing device204 controls the security system 202 and other electrical items in ahome (e.g., lights, air conditioners, heaters, motion sensors, garagedoor openers, locks, televisions, computers, entertainment systems, poolmonitors, elderly monitors).

FIG. 1 illustrates a front view of a communication system embodiment.The communication system 200 can include a security system 202 (e.g., adoorbell) and a computing device 204. Although the illustrated securitysystem 202 includes many components in one housing, several securitysystem embodiments include components in separate housings. The securitysystem 202 can include a camera assembly 208 and a doorbell button 212.The camera assembly 208 can be a video camera, which in some embodimentsis a webcam. The security system 202 can include a diagnostic light 216and a power indicator light 220. In some embodiments, the diagnosticlight 216 is a first color (e.g., blue) if the security system 202and/or the communication system 200 is connected to a wireless Internetnetwork and is a second color (e.g., red) if the security system 202and/or the communication system 200 is not connected to a wirelessInternet network. In some embodiments, the power indicator 220 is afirst color if the security system 202 is connected to a power source.The power source can be power supplied by the building to which thesecurity system 202 is attached. In some embodiments, the powerindicator 220 is a second color or does not emit light if the securitysystem 202 is not connected to the power source.

The security system 202 (e.g., a doorbell) can include an outer housing224, which can be water resistant and/or waterproof. The outer housingcan be made from metal or plastic, such as molded plastic with ahardness of 60 Shore D. In some embodiments, the outer housing 224 ismade from brushed nickel or aluminum.

Rubber seals can be used to make the outer housing 224 water resistantor waterproof. The security system 202 can be electrically coupled to apower source, such as wires electrically connected to a building'selectrical power system. In some embodiments, the security system 202includes a battery for backup and/or primary power.

Wireless communication 230 can enable the security system 202 (e.g., adoorbell) to communicate with the computing device 204. Some embodimentsenable communication via cellular and/or Wi-Fi networks. Someembodiments enable communication via the Internet. Several embodimentsenable wired communication between the security system 202 and thecomputing device 204. The wireless communication 230 can include thefollowing communication means: radio, Wi-Fi (e.g., wireless local areanetwork), cellular, Internet, Bluetooth, telecommunication,electromagnetic, infrared, light, sonic, and microwave. Othercommunication means are used by some embodiments. In some embodiments,such as embodiments that include telecommunication or cellularcommunication means, the security system 202 can initiate voice calls orsend text messages to a computing device 204 (e.g., a smartphone, adesktop computer, a tablet computer, a laptop computer).

Several embodiments use near field communication (NFC) to communicatebetween the computing device 204 and the security system 202; betweenthe security system 202 and the door lock 250; between the computingdevice 204 and the door lock 250; between the electronic device 464(shown in FIG. 5) and the door lock 250; and/or between the electronicdevice 464 and the security system 202. The security system 208, thecomputing device 204, the door lock 250, and/or the electronic device464 can include a NFC tag. Some NFC technologies include Bluetooth,radio-frequency identification, and QR codes.

Several embodiments include wireless charging (e.g., near fieldcharging, inductive charging) to supply power to and/or from thesecurity system 208, the door lock 250, the computing device 204, and/orthe electronic device 464 (shown in FIG. 5). Some embodiments useinductive charging (e.g., using an electromagnetic field to transferenergy between two objects).

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. Some embodiments includesoftware designed to run on desktop computers and laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

FIG. 2 illustrates a computing device 204 running software. The softwareincludes a user interface 240 displayed on a display screen 242. Theuser interface 240 can include a security system indicator 244, whichcan indicate the location of the security system that the user interfaceis displaying. For example, a person can use one computing device 204 tocontrol and/or interact with multiple security systems, such as onesecurity system located at a front door and another security systemlocated at a back door. Selecting the security system indicator 244 canallow the user to choose another security system (e.g., the back doorsecurity system rather than the front door security system).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator can indicate whether thecomputing device is in communication with a security system, theInternet, and/or a cellular network. The connectivity indicator 248 canalert the user if the computing device 204 has lost its connection withthe security system 202; the security system 202 has been damaged; thesecurity system 202 has been stolen; the security system 202 has beenremoved from its mounting location; the security system 202 lostelectrical power; and/or if the computing device 204 cannot communicatewith the security system 202. In some embodiments, the connectivityindicator 248 alerts the user of the computing device 204 by flashing,emitting a sound, displaying a message, and/or displaying a symbol.

In some embodiments, if the security system 202 loses power, losesconnectivity to the computing device 204, loses connectivity to theInternet, and/or loses connectivity to a remote server, a remote server206 sends an alert (e.g., phone call, text message, image on the userinterface 240) regarding the power and/or connectivity issue. In severalembodiments, the remote server 206 can manage communication between thesecurity system 202 and the computing device.

In some embodiments, the remote server 206 stores information from thesecurity system 202. In several embodiments, information from thesecurity system 202 is stored by the remote server 206 until theinformation can be sent to the computing device 204, uploaded to thecomputing device 204, and/or displayed to the remotely located personvia the computing device 204. The remote server 206 can be a computingdevice that stores information from the security system 202 and/or fromthe computing device 204. In some embodiments, the remote server 206 islocated in a data center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202. If thecomputing device 204 and/or the remote server 206 is unable tocommunicate with the security system 202, the computing device 204and/or the remote server 206 alerts the remotely located person via thesoftware, phone, text, a displayed message, and/or a website. In someembodiments, the computing device 204 and/or the remote server 206attempts to communicate with the security system 202 periodically; atleast every five hours and/or less than every 10 minutes; at least every24 hours and/or less than every 60 minutes; or at least every hourand/or less than every second.

In some embodiments, the server 206 can initiate communication to thecomputer device 204 and/or to the security system 202. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the security system202.

In several embodiments, a user can log into an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the security systemsettings discussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a security system due to the user'srequest rather than due to actions of a visitor. Some embodimentsinclude a computing device initiating a live video feed (or a video feedthat is less than five minutes old).

In some embodiments, the user interface 240 displays an image 252 suchas a still image or a video of an area near and/or in front of thesecurity system 202. The image 252 can be taken by the camera assembly208 and stored by the security system 202, server 206, and/or computingdevice 204. The user interface 240 can include a recording button 256 toenable a user to record images, videos, and/or sound from the cameraassembly 208, microphone of the security system 202, and/or microphoneof the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the security system 202. The user interface 240can also include a sound adjustment button 264 and a mute button 268.The user interface 240 can include camera manipulation buttons such aszoom, pan, and light adjustment buttons. In some embodiments, the cameraassembly 208 automatically adjusts between Day Mode and Night Mode. Someembodiments include an infrared camera and/or infrared lights toilluminate an area near the security system 202 to enable the cameraassembly 208 to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, and touching a touch screen. Many embodimentsinclude buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton, which can allow a user to select the quality and/or amount ofthe data transmitted from the security system 202 to the computingdevice 204 and/or from the computing device 204 to the security system202.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

The user interface 240 can include a termination button 276 to endcommunication between the security system 202 and the computing device204. In some embodiments, the termination button 276 ends the ability ofthe person located near the security system 202 (i.e., the visitor) tohear and/or see the user of the computing device 204, but does not endthe ability of the user of the computing device 204 to hear and/or seethe person located near the security system 202.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and is a termination button (toend communication between the security system 202 and the computingdevice 204). The button 276 can include the word “Answer” when thesystem is attempting to establish two-way communication between thevisitor and the user. Selecting the button 276 when the system isattempting to establish two-way communication between the visitor andthe user can start two-way communication. The button 276 can include thewords “End Call” during two-way communication between the visitor andthe user. Selecting the button 276 during two-way communication betweenthe visitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe security system and to stop emitting sounds recorded by the securitysystem.

In some embodiments, the user interface 240 opens as soon as thesecurity system detects a visitor (e.g., senses indications of avisitor). Once the user interface 240 opens, the user can see and/orhear the visitor even before “answering” or otherwise accepting two-waycommunication, in several embodiments.

Some method embodiments include detecting a visitor with a securitysystem. The methods can include causing the user interface to display ona remote computing device 204 due to the detection of the visitor (e.g.,with or without user interaction). The methods can include displayingvideo from the security system and/or audio from the security systembefore the user accepts two-way communication with the visitor. Themethods can include displaying video from the security system and/oraudio from the security system before the user accepts the visitor'scommunication request. The methods can include the computing devicesimultaneously asking the user if the user wants to accept (e.g.,answer) the communication request and displaying audio and/or video ofthe visitor. For example, in some embodiments, the user can see and hearthe visitor via the security system before opening a means of two-waycommunication with the visitor.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device might wonder whatis happening near the security system 202. The user can open thesoftware application on the computing device 204 and instruct theapplication to show live video and/or audio from the security device 202even if no event near the security system 202 has triggered thecommunication.

In several embodiments, the security device 202 can be configured torecord when the security device 202 detects movement and/or the presenceof a person. The user of the computing device 204 can later review allvideo and/or audio records when the security device 202 detectedmovement and/or the presence of a person.

Referring now to FIG. 1, in some embodiments, the server 206 controlscommunication between the computing device 204 and the security system202, which can be a doorbell with a camera, a microphone, and a speaker.In several embodiments, the server 206 does not control communicationbetween the computing device 204 and the security system 202.

In some embodiments, data captured by the security system and/or thecomputing device 204 (such as videos, pictures, and audio) is stored byanother remote device such as the server 206. Cloud storage, enterprisestorage, and/or networked enterprise storage can be used to store video,pictures, and/or audio from the communication system 200 or from anypart of the communication system 200. The user can download and/orstream stored data and/or storage video, pictures, and/or audio. Forexample, a user can record visitors for a year and then later can reviewconversations with visitors from the last year. In some embodiments,remote storage, the server 206, the computing device 204, and/or thesecurity system 202 can store information and statistics regardingvisitors and usage.

FIG. 3 illustrates an embodiment in which a security system 202 isconnected to a building 300, which can include an entryway 310 that hasa door 254. A door lock 250 can be configured to lock and unlock thedoor 254. Electrical wires 304 can electrically couple the securitysystem 202 to the electrical system of the building 300 such that thesecurity system 202 can receive electrical power from the building 300.

A wireless network 308 can allow devices to wirelessly access theInternet. The security system 202 can access the Internet via thewireless network 308. The wireless network 308 can transmit data fromthe security system 202 to the Internet, which can transmit the data toremotely located computing devices 204. The Internet and wirelessnetworks can transmit data from remotely located computing devices 204to the security system 202. In some embodiments, a security system 202connects to a home's Wi-Fi.

As illustrated in FIG. 3, one computing device 204 (e.g., a laptop, asmartphone, a mobile computing device, a television) can communicatewith multiple security systems 202. In some embodiments, multiplecomputing devices 204 can communicate with one security system 202.

In some embodiments, the security system 202 can communicate (e.g.,wirelessly 230) with a television 306, which can be a smart television.Users can view the television 306 to see a visitor and/or talk with thevisitor.

Visitor Identification Embodiments

Many embodiments utilize the visitor identification abilities of theperson using the remote computing device 204 (shown in FIG. 1). Varioustechnologies, however, can be used to help the user of the remotecomputing device 204 to identify the visitor. Some embodiments useautomated visitor identification that does not rely on the user, someembodiments use various technologies to help the user identify thevisitor, and some embodiments display images and information (e.g., aguest name) to the user, but otherwise do not help the user identify thevisitor.

Referring now to FIG. 1, the camera assembly 208 can be configured tovisually identify visitors through machine vision and/or imagerecognition. For example, the camera assembly 208 can take an image ofthe visitor. Software run by any portion of the system can then compareselect facial features from the image to a facial database. In someembodiments, the select facial features include dimensions based onfacial landmarks. For example, the distance between a visitor's eyes;the triangular shape between the eyes and nose; and the width of themouth can be used to characterize a visitor and then to compare thevisitor's characterization to a database of characterization informationto match the visitor's characterization to an identity (e.g., anindividual's name, authorization status, and classification). Someembodiments use three-dimensional visitor identification methods.

Some embodiments include facial recognition such that the cameraassembly 208 waits until the camera assembly 208 has a good view of theperson located near the security system 202 and then captures an imageof the person's face.

Some embodiments include fingerprint matching to verify the identity ofthe visitor. A visitor can place her finger over the camera assembly 208to enable the system 200 to detect her fingerprint. Some security system202 embodiments include a fingerprint reader 210. The fingerprint reader210 can enable the system to compare the fingerprint of the visitor to adatabase of fingerprints to identify and/or classify the visitor. Thedatabase of fingerprints can be created by the user and/or can include adatabase of fingerprints from a law enforcement agency (e.g., a databaseof criminals).

The fingerprint reader 210 can use any suitable algorithm includingminutia and pattern algorithms. The fingerprint reader 210 can analyzefingerprint patterns including arch patterns, loop patterns, and whorlpatterns. The fingerprint reader 210 can include any suitablefingerprint sensor including optical, ultrasonic, passive capacitance,and active capacitance sensors.

The fingerprint reader 210 can be integrated into the outer housing 224of the security system 202, which can be mounted within 7 feet of a dooror entryway of rental lodging, such as a hotel room or an apartment forshort-term rent. In some embodiments, the security system 202 can beconfigured to be mounted in an entryway. Some methods include mounting asecurity system in an entryway of a building.

The fingerprint reader 210 can be integrated into the doorbell button212. Pressing the doorbell button 212 can enable the fingerprint reader210 to analyze the fingerprint of the visitor. Several embodiments canestablish a visitor's identity by detecting a signal from a deviceassociated with the visitor (e.g., detecting the visitor's smartphone).Examples of such a signal include Bluetooth, Wi-Fi, RFID, NFC, and/orcellular telephone transmissions.

Key Distribution Embodiments

Some methods include using a doorbell to identify a visitor. The visitormay be seeking lodging, such as a room at a hotel or a short-term rentalapartment. Methods can include obtaining the doorbell that comprises aspeaker, a microphone, a camera, and a button. The button can beconfigurable to enable the visitor to sound a chime (e.g., a soundoutput device to emit a “ringing” sound).

Referring now to FIG. 3, several methods include using the doorbell(e.g., security system 202) to detect the visitor while the visitor islocated outside of a building 300 to which the doorbell is attachedand/or while the visitor is located within 30 feet of the doorbell. Thebuilding can comprise a door 254 having a lock 250. The lock 250 can beconfigured to fasten the door 254 to inhibit unauthorized entry into thebuilding 300. In some embodiments, the building 300 is a hotel room, arental condominium, a timeshare, a rental apartment, a rental home, or arental cabin. Some buildings are not rentals.

Referring now to FIG. 4, several embodiments include using the doorbell(e.g., security system 202) to take an image 440 of the visitor. Theimage 440 can be a picture or a video. For example, a doorbell can havean integrated camera (e.g., camera assembly 208) configured to takepictures or videos of visitors. Some embodiments include sending theimage 440 of the visitor from the doorbell to a remote computing device204 (e.g., a smartphone, a tablet, a laptop, a smart television, adesktop computer) and displaying the image of the visitor on the remotecomputing device 204.

The video taken by the camera assembly 208 can act as proof of thevisitor accepting the terms of her stay. Some embodiments includerecording a video validation of the terms of the visitor's stay (e.g.,by recording the visitor's acceptance of the terms). The term acceptanceand recorded validation video can be transferred from the computingdevice 204 to a remote database 436 (shown in FIG. 5) for storage and/orcan be transferred from the security system 202 to the remote database202 for storage.

Several methods include using the remote computing device 204 to verifyan identity of the visitor and then enabling the visitor to control thelock 250 in response to verifying the identity of the visitor. Controlof the lock 250 comprises an ability to unlock the lock (at authorizedtimes).

Enabling the visitor to control the lock 250 can comprise sending apassword 444 to the visitor. The password 444 can comprise numbersand/or letters. Some methods comprise the visitor entering the passwordinto the lock 250 to unlock the door. For example, the visitor can speakthe password (while the microphone of the doorbell records the passwordand the doorbell determines whether the password is correct). In someembodiments, the visitor types the password into a keypad electricallycoupled to the lock 250 and/or to the doorbell (e.g., security system202).

As used herein, an “electronic device” is capable of displaying images,including videos. An electronic device consumes electrical power and iscapable of running software. As used herein, the term “electronicdevice” should not be confused with the term “electronic key.” Manyelectronic key embodiments are not capable of displaying images,consuming electrical power, or running software.

Referring now to FIG. 5, enabling the visitor to control the lock 250can comprise sending an electronic key 448 to an electronic device 464in possession of the visitor. For example, a remote database 436 and/orthe remote computing device 204 can send the electronic key 448 to acellular telephone of the visitor. The computing device 204 can send akey request 466 to the remote database 436, which can then send anelectronic key 448 to the electronic device 464. The key request 466 canbe generated in response to the user verifying that the visitor is theintended guest for a rental period.

The electronic key 448 can be configured to enable unlocking the lock250. In some embodiments, bringing the electronic device 448 in closeproximity (e.g., within a short-range communication distance) to thelock 250 can permit the electronic key 448 to enable unlocking the lock250. The electronic key 448 can be sent via a Short Message Service(SMS), via an email, or via a software application.

In some embodiments, the electronic key 448 is sent wirelessly from theproperty manager to the visitor such that the property manager (e.g., anowner) does not have to be physically present at the property (e.g.,building 300 in FIG. 3) to provide a key to a visitor.

Referring now to FIG. 6, several methods include recording a first image468 of the visitor in a remote database 436 prior to the visitorapproaching the doorbell (e.g., security system 202). The visitor canupload the first image 468 via a website. The website can then transferthe first image 468 to the remote database 436. In some embodiments, aguest creates a profile using a website that facilitates bookinglodging. The profile can include the first image and the name of theguest. The profile can then be associated with lodging reservations thatthe guest makes.

Some embodiments include using a doorbell to detect the visitor afterthe visitor has approached the doorbell while the visitor is locatedoutside of a building (e.g., building 300 in FIG. 3) to which thedoorbell is attached. The building can comprise a door having a lock250. The lock 250 can be configured to fasten the door to preventunauthorized entry into the building (without breaking down the door).

Several embodiments comprise using the doorbell to take a second image472 of the visitor after the visitor has approached the doorbell. Someembodiments include sending an alert 476 to a remote computing device204 in response to the doorbell (e.g., security system 202) detectingthe visitor. A doorbell can detect the visitor in many ways. Forexample, the visitor may press the button 212 (labeled in FIG. 1) toring the chime and/or may be detected by a motion sensor 218 (labeled inFIG. 1). The alert 476 can be configured to notify a user (e.g., aproperty owner or a property manager) of the remote computing device 204regarding a presence of the visitor outside of the building 300 (shownin FIG. 3). For example, the user might receive a push notification onher smartphone. The user can choose to “answer” the notification byselecting a button (e.g., 276 shown in FIG. 2) on the smartphone.

Some embodiments include sending the first image 468 of the visitor fromthe remote database 436 to the remote computing device 204 and/orsending the second image 472 of the visitor from the doorbell (e.g.,security system 202) to the remote computing device 202. Severalembodiments include storing the first image 468 of the visitor on theremote computing device 204 such that the first image 468 is ready forthe remote computing device 204 to display along with the second image472.

In some embodiments, the electronic device 464 is a Bluetooth-enabledcellular phone that communicates with the door lock 250 via Bluetooth.The electronic device 464 can pass an authentication code (or otherauthentication data) to the door lock 250 via Bluetooth to enable thedoor lock 250 to verify that the electronic device 464 is authorized tocontrol the door lock 250 (e.g., is authorized to unlock the door lock250). Several embodiments include a time period in which the door lock250 will accept that the authentication data means the electronic device464 is authorized to control the door lock 250. Prior to the time periodand/or after the time period, the door lock 250 can be configured toprevent the authentication data from enabling the electronic device 464to unlock the door lock 250. In several embodiments, the electronicdevice 464 can still lock the door lock 250 after the time period, butcannot unlock the door lock 250 after the time period.

FIG. 7 illustrates a user interface 478 that can be displayed on thecomputing device 204 (shown in FIG. 1). User interfaces can have manydifferent shapes and layouts. Some user interfaces are websites. Someuser interfaces are displayed on smartphones.

The user interface 478 can simultaneously display the first image 468(e.g., an image from a guest profile) and the second image 472 (e.g., animage taken by the doorbell when a visitor approaches the doorbell). Thesecond image 472 can be a “live” image that shows the visitor at thedoor in real time.

The user interface 478 can also include a first button 482, a secondbutton 486, and a third button 490. Selecting the first button 482 cancause the doorbell to take a picture of the visitor. Selecting and/orholding the second button 486 can allow the user to talk with thevisitor. Selecting the third button 490 can terminate communicationbetween the user and the visitor.

Selecting a fourth button 496 can activate an electronic key and/orindicate that the person shown in the first image 468 is the personshown in the second image 472. Activating the electronic key, indicatingthat the two images show the same person, and/or selecting a button cancause the system to record an image (e.g., a screenshot of at least aportion of the user interface 478) that includes the first image 468 andthe second image 472.

Several methods include using a remote computing device 204 (shown inFIG. 6) to verify that the visitor is shown in both the first image 468and the second image 472; saving a third image 498 (e.g., the screenshotdescribed above) that comprises the first image 468 and the second image472 to validate that the visitor actually visited the building; sendingthe third image 498 to the remote database 436 (shown in FIG. 6); and/orassociating a timestamp 506 with the third 498 image such that thetimestamp 506 is correlated with the third image 498 in the remotedatabase 436. The timestamp 506 can represent an occasion when thevisitor requested access to the building 300 (shown in FIG. 3).

Various events can result in saving the third image 498. Some methodscomprise automatically saving the third image 498 in response toverifying that the visitor is shown in both the first image 468 and thesecond image 472.

Methods can include displaying (e.g., simultaneously or one after theother) the first image 468 and the second image 472 of the visitor onthe remote computing device 204 (shown in FIG. 6) and then recordingwhether the visitor is shown in both the first image 468 and the secondimage 472. Some methods include verifying whether the visitor is shownin both images (or determining that different people are shown in theimages). Methods can include enabling the visitor to control the lock250 (shown in FIG. 6) in response to recording and/or verifying that thefirst image 468 and the second image 472 show the same person. In someembodiments, the first image 468 is a still picture and the second image472 is a real-time video. As used herein, “real-time video” means thateach moment captured in the video is displayed on a remote computingdevice within ten seconds (i.e., with less than a ten second delay).

The user interface 478 can also display information 528 from an expectedperson profile. The information 528 can include the name of the expectedguest (e.g., based on the time that the visitor is approaching thebuilding). The information 528 can also include rental data (e.g., theprice paid for the rental, rental dates, building identification, rentalterms, special accommodations, services to be provided).

Referring now to FIGS. 6 and 7, enabling the visitor to control the lock250 can comprise sending an electronic key 448 to an electronic device464 in possession of the visitor. The electronic key 448 can beconfigured to enable unlocking the lock 250. Several embodimentscomprise automatically saving the third image 498 (to validate that thevisitor actually visited the building) in response to sending theelectronic key 448 to the electronic device 464 in possession of thevisitor.

The buildings described herein can be many different types of buildings(including rental properties and buildings that provide lodging totravelers). In some embodiments, the building comprises a hotel, and theelectronic key is configured to unlock a hotel room. The electronicdevice 464 (shown in FIG. 6) can comprise a cellular telephone, atablet, a television, and/or a computer. Methods can comprise thevisitor unlocking the hotel room using the electronic key.

Some embodiments include placing the electronic device 464 within tenfeet or within 30 feet of the lock 250, and then wirelessly transferringan identification code 520 from the electronic device 464 to the lock250 in order to unlock the lock 250.

Some methods include disabling the electronic key 448 within ten hoursafter the end of a rental period. Several embodiments include disablingthe electronic key 448 when the rental period ends. Disabling theelectronic key prevents the electronic key 448 from being able to unlockthe lock 250. As used herein, the rental period is a time in which thevisitor is authorized to enter the building.

Several embodiments comprise taking at least one additional image of thevisitor on each occasion the visitor unlocks the lock 250; associating atime and a date with each additional image; and recording the additionalimages, the times, and the dates in the remote database 250. The cameraassembly 208 can take the additional pictures. Methods can furthercomprise enabling the remote computing device 204 to display theadditional images, the times, and the dates. For example, a user of theremote computing device 204 can search through the additional images tosee the visitor who entered the building at a particular entry time.

Some methods comprise selecting a first expected person profile 532 inresponse to a time at which the doorbell (e.g., security system 202)detects the visitor. For example, if a visitor is detected on the firstday of May, the system can select the profile 532 of the person who isscheduled to rent the building on the first day of May. The user of theremote device 204 can then determine if the visitor matches the identityof the guest who is scheduled to rent the building on the first day ofMay. The first expected person profile 532 can include a picture of theguest (e.g., the first image 468) and the name of the guest.

Methods can comprise sending the first expected person profile 532 tothe remote computing device 204 and displaying the name on the remotecomputing device 204 (e.g., along with the first image 468 of theexpected guest). The user of the remote computing device 204 can thencompare the picture of the expected guest to the live picture (e.g., avideo) of the visitor currently by the doorbell. If the user is unsureof the identity of the visitor, the user can ask the visitor a securityquestion. The correct answer to the security question can be displayedalong with the name and the guest picture on the remote computing device204.

FIG. 8 illustrates a first expected person profile 532 for a first guestand a second expected person profile 538 for a second guest. Severalembodiments include additional expected person profiles. Each expectedperson profile can include a name of the guest, an image of the guest,the rental period for which the guest has reserved lodging, specialrequests related to the lodging, rental data (e.g., check-in time,check-out time, amount paid, payment information, rental history), andbackground check information (e.g., criminal record information, creditrating).

Referring now to FIGS. 6 and 8, in several embodiments, the remotedatabase 436 comprises the first expected person profile 532 having afirst rental period and a second expected person profile 538 having asecond rental period. In some embodiments, the remote database 436 cansend the first expected person profile 532 to the remote computingdevice 204 if the time at which the doorbell detects the visitor iswithin the first rental period, and the remote database 436 can send thesecond expected person profile 538 to the remote computing device 204 ifthe time at which the doorbell detects the visitor is within the secondrental period.

In several embodiments, the computing device 204 stores the firstexpected person profile 532 and the second expected person profile 538,but the user interface 478 (shown in FIG. 7) displays information fromthe first expected person profile 532 if the time at which the doorbelldetects the visitor is within the first rental period, and the userinterface 478 displays information from the second expected personprofile 538 if the time at which the doorbell detects the visitor iswithin the second rental period.

Several embodiments include recording a first image of a first guest ina remote database prior to the first guest approaching the doorbell;recording a second image of a second guest in the remote database priorto the second guest approaching the doorbell; and recording a thirdimage of a third guest in the remote database prior to the third guestapproaching the doorbell. The remote database 436 can store guest images(e.g., the first image 468) for subsequent display on the remotecomputing device 204. In some embodiments, the system needs to knowwhich guest image to display on the remote computing device 204.

In several embodiments, the first guest can be scheduled to rent thebuilding during a first rental period; the second guest can be scheduledto rent the building during a second rental period; and the third guestcan be scheduled to rent the building during a third rental period. Thedoorbell (e.g., the security system 202) can detect the visitor at atime within the first rental period, which can provide the system (e.g.,the communication system 200) with an indication of which guest might bethe visitor at the doorway. However, this indication might not alwayscorrectly match the visitor to the correct guest profile (e.g., 532,538).

The second rental period can be chronologically closest to the firstrental period. The third rental period can be the next chronologicallyclosest rental period to the first rental period.

Referring now to FIG. 9, some embodiments include a first guestuploading a first image 542 via the Internet and a first computer 544(e.g., a smartphone, a tablet, a laptop, a desktop). A second guest canupload a second image 546 via the Internet and a second computer 548(e.g., a smartphone, a tablet, a laptop, a desktop). Methods can includesending the first image 542 and the second image 546 to the remotedatabase 436 and then to the computing device 204.

Some embodiments include using the doorbell (e.g., using the cameraassembly 208 of the security system 202) to take an identification image552 of an unrecognized visitor after the visitor has approached thedoorbell (e.g., the security system 202). Methods can include sending analert 476 (shown in FIG. 6) to a remote computing device 204 in responseto the doorbell detecting the visitor. The alert 476 can be configuredto notify a user of the remote computing device 204 regarding a presenceof the visitor outside of the building 300 (shown in FIG. 3). An alert476 can appear as a message on the remote computing device 204.

Several embodiments include sending the first image 542 of the firstguest and the second image 546 of the second guest from the remotedatabase 436 to the remote computing device 204 and sending theidentification image 552 of the visitor from the doorbell (e.g., thesecurity system 202) to the remote computing device 204. Embodiments caninclude displaying the first image 542 and the identification image 552on the remote computing device 204, and then displaying the second image546 on the remote computing device in response to recording that thevisitor is not the first guest. Methods can include recording whetherthe same person is shown in both the second image 546 and theidentification image 546.

Some embodiments include enabling the visitor to control the lock 250 inresponse to recording that the second image 546 and the identificationimage 552 show the visitor. Lock control can be enabled by using thecomputing device 204 to authorize the electronic device 464 to unlockthe lock 250. In some embodiments, the authorization is sent via theInternet and/or cellular networks. In some embodiments, the electronicdevice 464 is configured to unlock the lock 250 via Bluetoothcommunication between the electronic device 464 and the door lock 250.The lock authorization can expire after a rental period.

Lock History Embodiments

FIG. 10 illustrates a history 570 of lock-related events displayed on auser interface (e.g., of a smartphone, tablet, laptop, desktop computer,or television). The history can include when electronic keys were sentto a guest along with the name of the guest. The history can includewhen a door was locked and unlocked. The history can also include whenthe lock was set up and/or “paired” with the electronic device 464and/or with the computing device 204 (shown in FIG. 9).

Referring now to FIG. 9, several embodiments comprise taking at leastone additional image of the visitor on each occasion the visitor unlocksthe lock 250; associating a time and a date with each additional image;and recording the additional images, the times, and the dates in theremote database 436. Methods can further comprise enabling the remotecomputing device 204 to display the additional images, the times, andthe dates. For example, a user of the remote computing device 204 cansearch through the additional images to see the visitor who entered thebuilding at a particular entry time (as captured in the history).

Exemplary Method Embodiments

According to some embodiments, a method for using a doorbell to identifya visitor may comprise obtaining the doorbell apparatus that comprises aspeaker, a microphone, a camera, and a button, wherein the button isconfigurable to enable the visitor to sound a chime, and subsequentlyusing the doorbell to detect the visitor while the visitor is locatedoutside of a lodging and while the visitor is located within adetectable range of the doorbell. The lodging is secured using a lock toinhibit unauthorized entry into the lodging. The doorbell apparatus isused to take a video of the visitor while the visitor accepts lodgingterms while recording the video to validate that the visitor acceptedthe lodging terms and then sending the video of the visitor from thedoorbell to a remote computing device. Following the transmission, thevideo of the visitor is displayed on the remote computing device; andthe user/owner/property manager then uses the remote computing device toverify the visitor's identity. At this point, the remote computingdevice, either automatically, or via a prompt of the user, enables thevisitor to control the lock in response to verifying the identity of thevisitor, wherein the control of the lock comprises an ability to unlockthe lock. Further modifications to the method enable the visitor tocontrol the lock by sending a password to the visitor in response to theobtained video. The password may comprise numbers or letters, and themethod to gain entry terminates with the visitor entering the passwordinto the lock to unlock the door. According to additional embodiments,the visitor controls the lock following the receipt of an electronic keysent by the remote computing device, wherein the electronic key isconfigured to enable unlocking the lock, and eventually includes thestep of the visitor using the electronic key to unlock the lock. Theelectronic key may take additional forms, including but not limited to,a text message, a push notification, and an email.

According to additional embodiments for facilitating the use of thelodging location for a series of successive guests, a method for using adoorbell to identify a visitor, the method follows from obtaining thedoorbell that comprises a speaker, a microphone, a camera, and a button,wherein the button is configurable to enable the visitor to sound achime. The doorbell records a first image of a first guest in a remotedatabase prior to the first guest approaching the doorbell, recording asecond image of a second guest in the remote database prior to thesecond guest approaching the doorbell, and recording a third image of athird guest in the remote database prior to the third guest approachingthe doorbell. The doorbell is used to detect the visitor after thevisitor has approached the doorbell while the visitor is located outsideof a building to which the doorbell is attached, wherein the buildingcomprises a door having a lock, wherein the lock is configured to fastenthe door to inhibit unauthorized entry into the building. The firstguest is scheduled to rent the building during a first rental period,the second guest is scheduled to rent the building during a secondrental period, and the third guest is scheduled to rent the buildingduring a third rental period, wherein the doorbell detects the visitorat a time within the first rental period, and wherein the second rentalperiod is chronologically closest to the first rental period. Thedoorbell is used to take an identification image of the visitor afterthe visitor has approached the doorbell and thus sends or transmits analert to a remote computing device in response to the doorbell detectingthe visitor, wherein the alert is configured to notify a user of theremote computing device regarding a presence of the visitor outside ofthe building. The doorbell sends the first image of the first guest andthe second image of the second guest from the remote database to theremote computing device and sending the identification image of thevisitor from the doorbell to the remote computing device. The remotecomputing device displays the first image and the identification image,and then displays the second image on the remote computing device inresponse to recording that the visitor is not the first guest. Therecording further comprises whether the visitor is shown in both thesecond image and the identification image; and the remote computingdevice enables the visitor to control the lock in response to recordingthat the second image and the identification image show the visitor.According to further embodiments, the remote computing device verifiesthat the visitor is shown in both the second image and theidentification image, and saves a fourth image that comprises the secondimage and the identification image to document that the visitor actuallyvisited the building. Additionally, the method may contain theadditional step of using facial recognition to determine whether thevisitor is shown in both the second image and the identification image.

The means of operating control for the visitor may comprise sending anelectronic key to an electronic device in possession of the visitor,wherein the electronic key is configured to enable unlocking the lock.Still additional enhancements to the method comprise using the remotecomputer device for sending the electronic key, or operating control,via at least one of a text message, a push notification, and an email.Security enhancements may include timed intervals for control with anexpiration period resulting in the remote computing device disabling theelectronic key within three hours after an end of the second rentalperiod in which the visitor is authorized to enter the building. Thedoorbell apparatus and its image collecting devices and features may beused, according to some embodiments, for taking at least one additionalimage of the visitor on each occasion the visitor unlocks the lock;associating a timestamp and a date with each additional image; recordingthe additional images, the timestamps, and the dates in the remotedatabase; and enabling the remote computing device to display theadditional images, the timestamps, and the dates.

In some embodiments, a method for using a doorbell to identify a visitorcomprises obtaining the doorbell that comprises a speaker, a microphone,a camera, and a button, wherein the button is configurable to enable thevisitor to sound a chime and subsequently record a first image of thevisitor in a remote database prior to the visitor approaching thedoorbell. The doorbell is used to detect the visitor after the visitorhas approached the doorbell while the visitor is located outside of abuilding to which the doorbell is attached, wherein the buildingcomprises a door having a lock, wherein the lock is configured to fastenthe door to inhibit unauthorized entry into the building. Further, thedoorbell is used to take a second image of the visitor after the visitorhas approached the doorbell and subsequently sending an alert to aremote computing device in response to the doorbell detecting thevisitor, wherein the alert is configured to notify a user of the remotecomputing device regarding a presence of the visitor outside of thebuilding. The transmission includes the first image of the visitor fromthe remote database to the remote computing device and the second imageof the visitor from the doorbell to the remote computing device. Thefirst image and the second image of the visitor are displayedsimultaneously on the remote computing device, thus recording whetherthe visitor is shown in both the first image and the second image andprompting the user of the remote computing device to determine that thevisitor is shown in both the first image and the second image. This useof the remote computing device to record that the user determined thatthe visitor is shown in both the first image and the second image isfollowed by enabling the visitor to control the lock in response torecording that the first image and the second image show the visitor.

According to some embodiments, the doorbell apparatus is used to recorda second image of a second guest in the remote database prior to thesecond guest approaching the doorbell, followed by recording a thirdimage of a third guest in the remote database prior to the third guestapproaching the doorbell, while using the doorbell to detect the visitorafter the visitor has approached the doorbell while the visitor islocated outside of a building to which the doorbell is attached, whereinthe building comprises a door having a lock to secure the premises. Thefirst guest is scheduled to rent the building during a first rentalperiod, the second guest is scheduled to rent the building during asecond rental period, and the third guest is scheduled to rent thebuilding during a third rental period, wherein the doorbell detects thevisitor at a time within the first rental period, and wherein the secondrental period is chronologically closest to the first rental period. Theidentification image of the visitor, taken by the doorbell after thevisitor has approached the doorbell is sent, with an alert, to a remotecomputing device in response to the doorbell detecting the visitor,wherein the alert is configured to notify a user of the remote computingdevice regarding a presence of the visitor outside of the building. Thetransmissions to the remote computing device include the first image ofthe first guest and the second image of the second guest from the remotedatabase to the remote computing device and sending the identificationimage of the visitor from the doorbell to the remote computing device,wherein the remote computing device displays the first image and theidentification image on the remote computing device, and then displayingthe second image on the remote computing device in response to recordingthat the visitor is not the first guest. Recording whether the visitoris shown in both the second image and the identification image followsthis sequence; and, if the images match, enabling the visitor to controlthe lock in response to recording that the second image and theidentification image show the visitor.

According to additional embodiments, the remote computing device is usedto verify that the visitor is shown in both the second image and theidentification image, and saving a fourth image that comprises thesecond image and the identification image to document that the visitoractually visited the building. Additional embodiments include employingthe remote computing device for using facial recognition to determinewhether the visitor is shown in both the second image and theidentification image. The visitor's control of lock may be via asupplied electronic key means, wherein the electronic key is configuredto enable unlocking the lock. This electronic key may be in the form ofat least one of a text message, a push notification, and an email. Theelectronic key may be manipulated by the remote computing to device todisable the electronic key within three hours after an end of the secondrental period in which the visitor is authorized to enter the building.

Some embodiments of the method further comprise taking at least oneadditional image of the visitor on each occasion the visitor unlocks thelock, associating a timestamp and a date with each additional image, andrecording the additional images, the timestamps, and the dates in theremote database. The remote computing device is enabled to display theadditional images, the timestamps, and the dates. According to someembodiments, the video camera feature of the doorbell apparatus may beused to take a video of the visitor while the visitor accepts lodgingterms; recording the video to validate that the visitor accepted thelodging terms; sending the video of the visitor from the doorbell to aremote computing device; displaying the video of the visitor on theremote computing device; and using the remote computing device to verifyan identity of the visitor to finally enable the visitor to control thelock in response to verifying the identity of the visitor, wherein thecontrol of the lock comprises an ability to unlock the lock. Thesemethod embodiments may include steps enabling the visitor to control thelock with by sending a password to the visitor in response to using thedoorbell to take the video of the visitor and then using the remotecomputing device to verify the identity of the visitor, wherein thepassword comprises numbers or letters. The method further comprises thevisitor entering the password into the lock to unlock the door.Alternative means to alphanumeric passwords comprise sending anelectronic key to an electronic device in possession of the visitor,wherein the electronic key is configured to enable unlocking the lock,the method further comprising the visitor using the electronic key tounlock the lock. The electronic key may be sent via at least one of atext message, a push notification, and an email.

Interpretation

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other. The sectionheadings and subheadings provided herein are nonlimiting. The sectionheadings and subheadings do not represent or limit the full scope of theembodiments described in the sections to which the headings andsubheadings pertain. For example, a section titled “Topic 1” may includeembodiments that do not pertain to Topic 1 and embodiments described inother sections may apply to and be combined with embodiments describedwithin the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodiments caninclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy.

While certain example embodiments have been described, these embodimentshave been presented by way of example only, and are not intended tolimit the scope of the inventions disclosed herein. Thus, nothing in theforegoing description is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit of theinventions disclosed herein.

1. A method for using a doorbell to identify a visitor, the methodcomprising: obtaining the doorbell that comprises a speaker, amicrophone, a camera, and a button, wherein the button is configurableto enable the visitor to sound a chime; using the doorbell to detect thevisitor while the visitor is located outside of a lodging and while thevisitor is located within a detectable range of the doorbell, whereinthe lodging comprises a door having a lock, wherein the lock isconfigured to fasten the door to inhibit unauthorized entry into thelodging; using the doorbell to take a video of the visitor while thevisitor accepts lodging terms; recording the video to validate that thevisitor accepted the lodging terms; sending the video of the visitorfrom the doorbell to a remote computing device; displaying the video ofthe visitor on the remote computing device; and using the remotecomputing device to verify an identity of the visitor and then enablingthe visitor to control the lock in response to verifying the identity ofthe visitor, wherein the control of the lock comprises an ability tounlock the lock.
 2. The method of claim 1, wherein enabling the visitorto control the lock comprises sending a password to the visitor inresponse to using the doorbell to take the video of the visitor and thenusing the remote computing device to verify the identity of the visitor,wherein the password comprises numbers or letters, the method furthercomprising the visitor entering the password into the lock to unlock thedoor.
 3. The method of claim 1, wherein enabling the visitor to controlthe lock comprises sending an electronic key to an electronic device inpossession of the visitor, wherein the electronic key is configured toenable unlocking the lock, the method further comprising the visitorusing the electronic key to unlock the lock.
 4. The method of claim 3,further comprising using the remote computer device for sending theelectronic key via at least one of a text message, a push notification,and an email.
 5. A method for using a doorbell to identify a visitor,the method comprising: obtaining the doorbell that comprises a speaker,a microphone, a camera, and a button, wherein the button is configurableto enable the visitor to sound a chime; recording a first image of afirst guest in a remote database prior to the first guest approachingthe doorbell, recording a second image of a second guest in the remotedatabase prior to the second guest approaching the doorbell, andrecording a third image of a third guest in the remote database prior tothe third guest approaching the doorbell; using the doorbell to detectthe visitor after the visitor has approached the doorbell while thevisitor is located outside of a building to which the doorbell isattached, wherein the building comprises a door having a lock, whereinthe lock is configured to fasten the door to inhibit unauthorized entryinto the building, wherein the first guest is scheduled to rent thebuilding during a first rental period, the second guest is scheduled torent the building during a second rental period, and the third guest isscheduled to rent the building during a third rental period, wherein thedoorbell detects the visitor at a time within the first rental period,and wherein the second rental period is chronologically closest to thefirst rental period; using the doorbell to take an identification imageof the visitor after the visitor has approached the doorbell; sending analert to a remote computing device in response to the doorbell detectingthe visitor, wherein the alert is configured to notify a user of theremote computing device regarding a presence of the visitor outside ofthe building; sending the first image of the first guest and the secondimage of the second guest from the remote database to the remotecomputing device and sending the identification image of the visitorfrom the doorbell to the remote computing device; displaying the firstimage and the identification image on the remote computing device, andthen displaying the second image on the remote computing device inresponse to recording that the visitor is not the first guest; recordingwhether the visitor is shown in both the second image and theidentification image; and enabling the visitor to control the lock inresponse to recording that the second image and the identification imageshow the visitor.
 6. The method of claim 5, further comprising using theremote computing device to verify that the visitor is shown in both thesecond image and the identification image, and saving a fourth imagethat comprises the second image and the identification image to documentthat the visitor actually visited the building.
 7. The method of claim5, further comprising using facial recognition to determine whether thevisitor is shown in both the second image and the identification image.8. The method of claim 5, wherein enabling the visitor to control thelock comprises sending an electronic key to an electronic device inpossession of the visitor, wherein the electronic key is configured toenable unlocking the lock.
 9. The method of claim 8, further comprisingusing the remote computer device sending the electronic key via at leastone of a text message, a push notification, and an email.
 10. The methodof claim 9, further comprising disabling the electronic key within threehours after an end of the second rental period in which the visitor isauthorized to enter the building.
 11. The method of claim 5, furthercomprising taking at least one additional image of the visitor on eachoccasion the visitor unlocks the lock; associating a timestamp and adate with each additional image; recording the additional images, thetimestamps, and the dates in the remote database; and enabling theremote computing device to display the additional images, thetimestamps, and the dates.
 12. A method for using a doorbell to identifya visitor, the method comprising: obtaining the doorbell that comprisesa speaker, a microphone, a camera, and a button, wherein the button isconfigurable to enable the visitor to sound a chime; recording a firstimage of the visitor in a remote database prior to the visitorapproaching the doorbell; using the doorbell to detect the visitor afterthe visitor has approached the doorbell while the visitor is locatedoutside of a building to which the doorbell is attached, wherein thebuilding comprises a door having a lock, wherein the lock is configuredto fasten the door to inhibit unauthorized entry into the building;using the doorbell to take a second image of the visitor after thevisitor has approached the doorbell; sending an alert to a remotecomputing device in response to the doorbell detecting the visitor,wherein the alert is configured to notify a user of the remote computingdevice regarding a presence of the visitor outside of the building;sending the first image of the visitor from the remote database to theremote computing device and sending the second image of the visitor fromthe doorbell to the remote computing device; displaying the first imageand the second image of the visitor simultaneously on the remotecomputing device and then recording whether the visitor is shown in boththe first image and the second image; prompting the user of the remotecomputing device to determine that the visitor is shown in both thefirst image and the second image; using the remote computing device torecord that the user determined that the visitor is shown in both thefirst image and the second image; and enabling the visitor to controlthe lock in response to recording that the first image and the secondimage show the visitor.
 13. The method of claim 12, further comprising:recording a second image of a second guest in the remote database priorto the second guest approaching the doorbell; recording a third image ofa third guest in the remote database prior to the third guestapproaching the doorbell; using the doorbell to detect the visitor afterthe visitor has approached the doorbell while the visitor is locatedoutside of a building to which the doorbell is attached, wherein thebuilding comprises a door having a lock, wherein the lock is configuredto fasten the door to inhibit unauthorized entry into the building,wherein the first guest is scheduled to rent the building during a firstrental period, the second guest is scheduled to rent the building duringa second rental period, and the third guest is scheduled to rent thebuilding during a third rental period, wherein the doorbell detects thevisitor at a time within the first rental period, and wherein the secondrental period is chronologically closest to the first rental period;using the doorbell to take an identification image of the visitor afterthe visitor has approached the doorbell; sending an alert to a remotecomputing device m response to the doorbell detecting the visitor,wherein the alert is configured to notify a user of the remote computingdevice regarding a presence of the visitor outside of the building;sending the first image of the first guest and the second image of thesecond guest from the remote database to the remote computing device andsending the identification image of the visitor from the doorbell to theremote computing device; displaying the first image and theidentification image on the remote computing device, and then displayingthe second image on the remote computing device in response to recordingthat the visitor is not the first guest; recording whether the visitoris shown m both the second image and the identification image; andenabling the visitor to control the lock in response to recording thatthe second image and the identification image show the visitor.
 14. Themethod of claim 13, further comprising using the remote computing deviceto verify that the visitor is shown in both the second image and theidentification image, and saving a fourth image that comprises thesecond image and the identification image to document that the visitoractually visited the building.
 15. The method of claim 13, furthercomprising using facial recognition to determine whether the visitor isshown in both the second image and the identification image.
 16. Themethod of claim 13, wherein enabling the visitor to control the lockcomprises sending an electronic key to an electronic device inpossession of the visitor, wherein the electronic key is configured toenable unlocking the lock.
 17. The method of claim 16, furthercomprising sending the electronic key via at least one of a textmessage, a push notification, and an email.
 18. The method of claim 17,further comprising disabling the electronic key within three hours afteran end of the second rental period in which the visitor is authorized toenter the building.
 19. The method of claim 13, further comprisingtaking at least one additional image of the visitor on each occasion thevisitor unlocks the lock; associating a timestamp and a date with eachadditional image; recording the additional images, the timestamps, andthe dates in the remote database; and enabling the remote computingdevice to display the additional images, the timestamps, and the dates.20. The method of claim 12, further comprising: using the doorbell totake a video of the visitor while the visitor accepts lodging terms;recording the video to validate that the visitor accepted the lodgingterms; sending the video of the visitor from the doorbell to a remotecomputing device; displaying the video of the visitor on the remotecomputing device; and using the remote computing device to verify anidentity of the visitor and then enabling the visitor to control thelock in response to verifying the identity of the visitor, wherein thecontrol of the lock comprises an ability to unlock the lock.
 21. Themethod of claim 20, wherein enabling the visitor to control the lockcomprises sending a password to the visitor in response to using thedoorbell to take the video of the visitor and then using the remotecomputing device to verify the identity of the visitor, wherein thepassword comprises numbers or letters, the method further comprising thevisitor entering the password into the lock to unlock the door.
 22. Themethod of 20, wherein enabling the visitor to control the lock comprisessending an electronic key to an electronic device in possession of thevisitor, wherein the electronic key is configured to enable unlockingthe lock, the method further comprising the visitor using the electronickey to unlock the lock.
 23. The method of claim 22, further comprisingsending the electronic key via at least one of a text message, a pushnotification, and an email.