Security / automation system control panel with active microphones

ABSTRACT

Example implementations include a method, apparatus, and computer-readable medium comprising monitoring, by a control panel, an ambient noise via one or more microphones in the control panel. The implementations further include determining, by the control panel, whether the ambient noise is indicative of a security event. In some non-limiting implementations, the control panel may be configured to detect events based on various noise detection models, such as continued noise level above a threshold, noise associated with multiple short sharp impacts (e.g., an intruder trying to kick down a door), gunshot detection, voice recognition to identify a request for assistance (e.g., a person asking for help), glass break detection, or detection of a particular standardized pattern of beeps such as the temporal-three pattern of a smoke detector going off (according to ISO 8201 and ANSI/ASA S3.41 Temporal Pattern), the temporal-four pattern of a carbon monoxide detector going off, etc.

CROSS REFERENCE TO RELATED APPLICATION(S)

This application claims the benefit of U.S. Provisional Application Ser.No. 63/151,363, entitled “CLOUD SECURITY/AUTOMATION SYSTEM” and filed onFeb. 19, 2021, which is expressly incorporated by reference herein inits entirety.

FIELD

The present disclosure relates generally to security/automation systemsand methods.

SUMMARY

The following presents a simplified summary of one or more aspects inorder to provide a basic understanding of such aspects. This summary isnot an extensive overview of all contemplated aspects, and is intendedto neither identify key or critical elements of all aspects nordelineate the scope of any or all aspects. Its sole purpose is topresent some concepts of one or more aspects in a simplified form as aprelude to the more detailed description that is presented later.

An example implementation includes a method comprising monitoring, by acontrol panel, an ambient noise via one or more microphones in thecontrol panel. The method further includes determining, by the controlpanel, whether the ambient noise is indicative of a security event.

Another example implementation includes an apparatus comprising a memoryand a processor communicatively coupled with the memory. The processoris configured to monitor, by a control panel, an ambient noise via oneor more microphones in the control panel. The processor is furtherconfigured to determine, by the control panel, whether the ambient noiseis indicative of a security event.

Another example implementation includes an apparatus comprising meansfor monitoring, by a control panel, an ambient noise via one or moremicrophones in the control panel. The apparatus further includes meansfor determining, by the control panel, whether the ambient noise isindicative of a security event.

Another example implementation includes a computer-readable mediumstoring instructions executable by a processor that, when executed,cause the processor to monitor, by a control panel, an ambient noise viaone or more microphones in the control panel. The instructions arefurther executable by the processor to cause the processor to determine,by the control panel, whether the ambient noise is indicative of asecurity event.

To the accomplishment of the foregoing and related ends, the one or moreaspects comprise the features hereinafter fully described andparticularly pointed out in the claims. The following description andthe annexed drawings set forth in detail certain illustrative featuresof the one or more aspects. These features are indicative, however, ofbut a few of the various ways in which the principles of various aspectsmay be employed, and this description is intended to include all suchaspects and their equivalents.

BRIEF DESCRIPTION OF THE DRAWINGS

The disclosed aspects will hereinafter be described in conjunction withthe appended drawings, provided to illustrate and not to limit thedisclosed aspects, wherein like designations denote like elements, andin which:

FIG. 1 is a schematic diagram of an example security/automation system,according to some aspects;

FIG. 2 is an isometric view of an example of a control panel in FIG. 1,according to some aspects;

FIG. 3 is a first example graphical user interface (GUI) of a diagnostictool in a control panel in FIG. 1, according to some aspects;

FIG. 4 is a second example GUI of a diagnostic tool in a control panelin FIG. 1, according to some aspects;

FIG. 5 is a block diagram of an example computing device which mayimplement all or a portion of any component in FIG. 1, according to someaspects;

FIG. 6 is a block diagram of example components of a computing devicewhich may implement all or a portion of a control panel in FIG. 1configured for event detection using active built-in microphones,according to some aspects; and

FIG. 7 is a flow diagram of an example method for event detection usingactive built-in microphones, according to some aspects.

DETAILED DESCRIPTION

The detailed description set forth below in connection with the appendeddrawings is intended as a description of various configurations and isnot intended to represent the only configurations in which the conceptsdescribed herein may be practiced. The detailed description includesspecific details for the purpose of providing a thorough understandingof various concepts. However, it will be apparent to those skilled inthe art that these concepts may be practiced without these specificdetails. In some instances, well known components may be shown in blockdiagram form in order to avoid obscuring such concepts.

Deconstructed Security/Automation System

Some security/automation systems provide an “All-in-One” control panelthat includes hardware features, computing resources, software resourcesfor implementing application intelligence, a user interface (UI), one ormore radios, and external communication (e.g., with a monitoringstation, a cloud system, etc.). For example, a control panel may includea user interface (e.g., processor and software resources), one or moreradios (configured according to a protocol such as, e.g., PowerG,Z-wave, etc.) to wirelessly communicate with associated sensors andautomation devices, interfaces to connect to wired sensors, applicationintelligence (e.g., processor and software resources), and communicationof state to a remote application (according to a protocol such as, e.g.,wireless fidelity (Wi-Fi), long term evolution (LTE), etc.).

Generally, Internet of things (IoT) is driving the proliferation of LTEcategory M (cat-M) and narrowband IoT (NB-IoT) devices (e.g., cheap, lowpower, cellular connected sensors). Deployment of LTE and Wi-Fi isbecoming near ubiquitous, while inexpensive silicon for modernmodulation schemes is allowing for improved performance and features forsensors. Some systems provide Wi-Fi with multiple bands, multiple-inputmultiple-output (MIMO) communication, mesh networking, and cheap Wi-Ficonnected cameras. Moreover, computing resources are becoming availablein the form of cloud computing (e.g., a private or public cloud systemthat provides computing and storage resources via access over a network,e.g., Amazon Web Services (AWS)), software as a service (SaaS),on-demand computing for artificial intelligence (AI) and neuralnetworking (e.g., user independent voice recognition, facialrecognition), etc. Cell phones and “smart” home assistant devices havealso introduced user interaction in the form of voice UIs (e.g., AmazonAlexa, Google, Siri, etc.).

Given the above, some aspects provide a “deconstructed”security/automation system. The user interface of the deconstructedsecurity/automation system may be provided as an application or “app” ona user device (e.g., on a user phone, tablet, computer, bring your owndevice (BYOD), etc.). The application intelligence of the deconstructedsecurity/automation system may be moved to the cloud, where eachcustomer has a virtual instance of the intelligence, and the instanceruns in the cloud and communicates to the UI of a user device whereverthe user is and on whatever device the user is using at a given time.The state of the deconstructed security/automation system may becommunicated to a remote application (e.g., via Wi-Fi, LTE, etc.). In anaspect, the sensors of the deconstructed security/automation system andtheir associated radios provide reliable, 2-way, encryptedcommunication, and the sensors are low power and have long battery life.

In an aspect, the hardware of the deconstructed security/automationsystem may be configured as a box which may be located in a closet ormounted on a wall (e.g., at a garage). The box may include a router withWi-Fi MIMO, LTE, sensor radios, and Z-wave, and may be configured forimproved antenna performance. The box may have a wide area network (WAN)port to plug into a cable or digital subscriber line (DSL) router. In anaspect, the UI of the deconstructed security/automation system may beprovided by an app on a user device (e.g., a phone, a tablet, etc.). Theintelligence of the deconstructed security/automation system (e.g.,functionality for maintaining state, deciding on actions based on statechanges, etc.), voice recognition, facial recognition, etc. may beimplemented in the cloud.

In an aspect, the deconstructed security/automation system providesWi-Fi MIMO, mesh, and real router performance. Accordingly, for example,the deconstructed security/automation system may provide whole homecoverage, where mesh nodes are added as needed. The deconstructedsecurity/automation system may also support Wi-Fi cameras with highresolution and high frame rate. The deconstructed security/automationsystem may allow for integration with other smart devices. For example,in an aspect, the deconstructed security/automation system may allow forintegration with a smart television (TV) with an app that shows sensorchanges and camera views in a pop-up window while watching TV.

In an aspect, the deconstructed security/automation system implementscloud computing and storage. Accordingly, the deconstructedsecurity/automation system may provide virtually unlimited compute powerthat may be scaled up or down on demand. In this aspect, thedeconstructed security/automation system may allow for voice recognitionand/or facial recognition as seamless features that are available fromany device with a microphone/camera. In this aspect, software updates toa user's virtual instance may be flexibly scheduled/performed in thecloud as needed (unlike conventional security/automation systems whereupdates are performed by a dealer). Various features of thedeconstructed security/automation system may be readily turned on/offand billed for. This aspect may also provide cloud storage of images andvideos from cameras associated with the system.

In an aspect, the manufacturer or dealer for the deconstructedsecurity/automation system may own the cellular contract with thecustomer. However, for customers that desire monitored security, stateinformation may go from the cloud of the deconstructedsecurity/automation system to the servers or cloud of the companyproviding the monitoring service.

By pushing the intelligence to the cloud, the deconstructedsecurity/automation system may provide a “home security/automationsystem” that is distributed and virtual. The deconstructedsecurity/automation system is no longer limited to a single system andthe sensors that are within radio range. Instead, the deconstructedsecurity/automation system may include an aggregate of devices that areassociated with an instance of intelligence running in the cloud. Aslong as a device can communicate to the cloud, the device may be a partof the security/automation system. For example, the system may includeIoT devices with LTE cat-M or NB-IoT radios, and the IoT devices may begeographically located anywhere (e.g., the sensors in the system do notneed to be within radio range of a control panel). In an aspect, forexample, multiple physical installations may be integrated into a singleinstance for monitoring and control. Alternatively, the system mayprovide one physical installation for a multi-unit building, and maythen provide a separate virtual instance for each unit (e.g., providepartitions).

In an aspect, the system may include a fully integrated control panel.In an aspect, the panel may include a color liquid crystal display (LCD)touchscreen interface that provides an intuitive graphical userinterface (GUI) that allows for gesture-based user interaction (e.g.,touch, swipe, etc.). In one non-limiting aspect, the panel may include amulti-core processor (e.g., four processor cores) that, while waitingfor sensor state changes in the security/automation system, providesadditional functionality as described with reference to various aspectsherein (e.g., active panel microphones below). In one non-limitingaspect, the panel may include a chipset (e.g., a Qualcomm Snapdragonchipset) that is configured to connect to the Internet via a Wi-Fiand/or cellular network. The chipset may include multiple radios forcommunication with premises security sensors/devices and/or premisesautomation sensors/devices. For example, in an aspect, the chipset mayinclude radios for Bluetooth, PowerG, Z-Wave, etc. In an aspect, thesensors/devices of the security/automation system may be wireless andmay include, for example, one or more door/window sensors, motionsensors, carbon monoxide detectors, smoke detectors, flood sensors, etc.

In one non-limiting aspect, for example, since the panel can connect tothe Internet via a Wi-Fi network or a cellular network, an app may runon a user smartphone or other mobile device (e.g., a tablet, a wearable,etc.). The user may use the app to remotely control various features ofa premises security/automation system, for example, by a gesture on auser interface of the app (e.g., by a touch, swipe, etc.), or viewimages/video from a camera. For example, the user, who may be remotefrom a premises and who is planning to return to the premises, may usethe app to remotely turn a porch light on or to remotely change asetting on a heating, ventilation, and air conditioning (HVAC)thermostat, so that the premises is comfortable when the user arrives atthe premises.

Active Panel Microphones

In one non-limiting aspect, the panel may include one or moremicrophones that can be utilized to monitor the ambient noise in aprotected area (e.g., a premises). In one aspect, for example, the panelmay include one or more software, hardware, and/or firmware modules thatimplement AI algorithms to recognize normal household voices andactivity patterns. The user may put the panel into a monitoring modewhere the panel sends an alert if the panel hears: (a) any voices in theprotected area at a time when there typically is none, such as themiddle of the night; (b) unknown voices in the protected area at a timewhen there typically is none, such as the middle of the night; (c) anyunknown voices regardless of the time of day or activity period. Usingthis data, a user may configure the panel to either initiate an alarm orsimply notify the user. In another aspect, voice activation/commandsalong with AI algorithms can be used to configure and use the panel.Accordingly, the panel may include built-in processing power (e.g., thedigital signal processing (DSP) implemented by a processor of a chipsetin the panel, such as the Qualcomm Snapdragon) and built-insensors/microphones to implement ambient noise-related event detection,without requiring a separate sensor/device to be installed at apremises.

In an aspect, when the panel is triggered by any of the aboveconditions, the panel may send a corresponding notification, forexample, to a mobile app through a cloud system. In an aspect, when thepanel is triggered, the panel may also use a built-in camera to takestill images or a video clip and send the images or the video clip tothe cloud system, which may then send the images or the video clip to amobile app or web app on a user device (e.g., a smartphone) for visualverification of an event that triggered the panel. In one non-limitingaspect, for example, AI algorithms in the panel or in the cloud aremodeled to scan for unidentified persons, smoke, or other events in thevideo clip for visual verification. In one non-limiting aspect, forexample, a video clip that includes fifteen seconds before and fifteenseconds after the actual event is sent as notification to the cloud.

In an aspect, the panel may be configured to detect events based onvarious noise detection models, such as continued noise level above athreshold, noise associated with multiple short sharp impacts (e.g., anintruder trying to kick down a door), gunshot detection, voicerecognition to identify a request for assistance (e.g., a person fallingdown and asking for help), glass break detection, or detection of aparticular standardized pattern of beeps such as the temporal-threepattern of a smoke detector going off (according to InternationalOrganization for Standardization (ISO) 8201 and American NationalStandards Institute (ANSI)/American Standards Association (ASA) S3.41Temporal Pattern), the temporal-four pattern of a carbon monoxidedetector going off, etc.

For example, in an aspect, the panel may use one or more built-inmicrophones to detect a fire event based on detecting the temporal-threepattern of a smoke detector alarm and/or the temporal-four pattern of acarbon monoxide detector alarm. Accordingly, the panel may implementfire detection functionality without requiring a wired or wirelessconnection with any fire detection sensors such as smoke detectors orcarbon monoxide detectors. In one non-limiting aspect, the panel mayvoice annunciate fire or CO based on detecting these patterns.

In another aspect, for example, the panel may be configured to use oneor more built-in microphones to perform occupancy detection (e.g., forsenior care). For example, the panel may use the built-in microphones todetect the ambient noise at a premises and analyze the ambient noise todetermine activity of a senior (e.g., whether the senior got out of bed,operated a kitchen appliance, watched TV, etc.). The panel may reportsuch activity of the senior to a remote user (e.g., to a relative of thesenior) via an app on a smartphone of the user. In one non-limitingaspect, for example, voice commands can be given to the panel toactivate emergency services.

In an aspect, the panel uses built-in processing resources to implementAI algorithms for analyzing various discrete events and for determiningwhat to do in response to a single detected event or in response tomultiple detected events. Accordingly, an event may be a triggeringpoint for taking certain actions. In an aspect, for example, the AIalgorithms may be downloaded to the panel from a server and may becustomized for each individual panel.

In an aspect, the panel may allow for integration of multiple events.For example, the panel may detect multiple unrelated events, and thencorrelate/infer an integrated event from the multiple unrelated eventsusing built-in AI algorithms. For example, the panel may detect multiplefront door open/close events reported by a door contact switch, while aBluetooth radio of the panel may also detect multiple unrecognizeddevices/smartphones within range at the premises, and/or the panel maydetect an unrecognized person by the AI algorithms running on imagerycaptured by the internal panel camera and/or by external cameras. Thepanel may then infer that a gathering is happening at the premises.

In an aspect, the built-in microphone of the panel may continuouslylisten and may sample the ambient noise at regular intervals to detectaudio events, and at the same time the panel may receive reports ofother events via various built-in radios such as a Bluetooth radio. Inthis aspect, the panel has intelligence to correlate multipleconcurrently happening events based on an AI model. The AI model maychange depending on how a user intends to correlate various concurrentlyhappening events, for example, based on a certain anomaly or a use casedesired by the user. For example, the AI model may be configured to takeno action when a glass break event is detected while no other event isconcurrently detected, but generate an alarm when a glass break event isdetected concurrently with another event. In an aspect, the AI modelingand anomaly detection may be dynamically implemented and changed.

In an aspect, the panel may use built-in processing power and one ormore built-in microphones to virtually create and simulate one or moresensors. For example, the panel may use one or more built-in microphonesand added application to virtually create a fire detection sensor asdescribed above (e.g., by detecting audio patterns of a smoke detectorgoing off) or to virtually create a glass break detection sensor asdescribed below. In an aspect, such virtually created and simulatedsensors may either replace or augment respective dedicated physicalsensors in a security/automation system of a premises.

In an aspect, the panel itself may also be virtualized. In an aspect,for example, the panel may use built-in microphones/sensors tovirtualize and integrate various simulated sensors to take input in, andthen the processing and intelligence applied to the input may beperformed in a cloud system in communication with the panel.

Acoustic Signature Detection

In some aspects, the panel may use one or more built-in microphones todetect an acoustic signature associated with one or more events. Forexample, the panel may include one or more built-in microphones that canbe utilized to monitor the ambient noise in a protected area anddetermine whether the ambient noise includes an acoustic signatureassociated with an event. In some aspects, for example, the panel mayreceive sound waves and compare them to one or more of a plurality ofknown acoustic signatures associated with one or more events such as: aglass break, a gunshot, a dog barking, a person shouting, a smokedetector alarm, a voice, one or more keywords, or any other number ofconfigurable sound events.

In one non-limiting aspect, for example, the panel may perform glassbreak detection using one or more microphones. For example, the panelmay include one or more built-in microphones that can be utilized tomonitor the ambient noises in a protected area to detect a glass breakevent.

In an aspect, the panel may go into a low-power sleep mode, and may thenwake up upon detecting a first sound from a probable glass break. Afterwaking up, the panel may continue to analyze subsequent noises detectedby the one or more microphone to determine if an actual glass break hasoccurred.

A glass break event generates a sound with a particular acousticsignature which starts with a thump sound and then follows with acrashing noise. Accordingly, the panel may execute an application that,using the microphones in the panel, is configured to detect a glassbreak event by identifying a sequence of sounds corresponding to theacoustic signature of a glass break event. For example, in an aspect,the panel has built-in processing power to execute software code tocontinually listen to the built-in microphones of the panel to detect athump sound, and may then continue listening to the built-in microphonesto determine if a crashing noise associated with a glass break eventfollows the thump sound.

Accordingly, a control panel at a premises may include built-inprocessing power and built-in sensors/microphones to implement glassbreak detection functionality without requiring a separate glass breakdetection sensor/device to be installed at the premises.

Cloud Communicative Sensors

In some security/automation systems, the sensors are short range devicesthat talk directly to a control panel using wired or wirelessconnections. However, in an aspect, a security/automation systemincludes sensors that talk directly to a cloud system, rather than goingto the panel first. In an aspect, each sensor device may have a built-incellular radio, so that the sensor device may use the cellular networkto send information directly to a dedicated cloud. Such cloudcommunicative sensors remove the requirement for the panel to be aphysical unit within a protected area. In other words, the panel may bea cloud-based application accessible on a fixed or mobile device thatcan be located and controlled at any geographic location. The cloudcommunicative sensors also allow the panel to become increasinglycomplex as the panel is no longer bound by physical hardware, software,or memory constraints. As technology improves, the panel application mayalso improve seamlessly.

In some aspect, one or more sensors may use a cellular radio tocommunicate with a cloud system that supports a security/automationsystem. In an aspect, one or more sensors may each include a radioconfigured for communication according to the NB-IoT protocol. TheNB-IoT protocol is designed and configured at hardware and at protocollevel for small widely-deployed battery-powered devices that only needto communicate infrequently, such as a water meter that connects andreports on a daily basis. In an aspect, for example, an NB-IoT radio maybe included in a contact or PIR motion sensor (e.g., a door/windowsensor, motion detector, etc.) such that the sensor may connect to acellular network to send events and other information directly to thecloud.

In an aspect, a security/automation system may include a virtualizedcontrol panel and may provide state management and intelligence in adedicated cloud that can be hosted in a private or public cluster (e.g.,AWS, private data center, etc.).

Accordingly, any devices that are capable of establishing a directcellular connection with the cloud may be configured as a part of thesecurity/automation system, such as one or more NB-IoT sensorsconfigured to communicate directly with the cloud using a cellularconnection. In an aspect, the NB-IoT sensors of such asecurity/automation system may be located at various differentgeographic locations. For example, in one non-limiting aspect, asecurity system may include one or more cameras that use a cellularradio to send video clips to the cloud when the local AI algorithmsdetect unidentifiable persons or objects.

In an aspect, instead of configuring the security/automation system viaa physical control panel, a user may use a virtual control panelprovided by a mobile app that is configured as an interface to thecloud. For example, the user may use a controlling application (app) ona user device to connect to the cloud and configure thesecurity/automation system, e.g., manage and monitor sensors (e.g., turnsensors on or off), implement new sensors in the security/automationsystem, remove one or more sensors from the security/automation system,etc.

In one non-limiting aspect, for example, such a virtualized controlpanel may allow for aggregating the security/automation system ofmultiple buildings together. For example, in an aspect, a user may owntwo properties at two different physical locations, and may use a singlevirtualized control panel to monitor both locations.

In an aspect, the virtualized control panel may allow for establishing ahierarchical security/automation system that includes several buildings.For example, at a highest hierarchical level, the virtualized controlpanel may be configured to indicate whether there are any issuesreported at any of the geographical locations of buildings in ageographically distributed security/automation system, while a lowerhierarchical level may provide more granularity and further details ofissues reported to the security/automation system, such as a state, acity, a specific building, or a specific room where an issue wasdetected and reported.

In an aspect, the virtualized control panel may allow for configuring asecurity/automation system that blankets a region. In an aspect, thevirtualized control panel may allow for configuring asecurity/automation system that blankets the assets of a business. In anaspect, for example, the virtualized control panel may allow forconfiguring a security/automation system that includes a number ofNB-IoT sensors installed at various geographically distributed publicutility structures. In one non-limiting aspect, for example, thevirtualized control panel may allow for configuring asecurity/automation system that includes one or more door/windowcontacts, and/or cellular cameras at the entrance kiosk of state parks,national grid substations, high voltage transmission towers, and/orother national infrastructures.

In another non-limiting aspect, for example, the virtualized controlpanel may allow for configuring a security/automation system thatincludes a contact sensor at a mailbox, where the contact sensorcommunicates directly to the cloud to indicate at what times the mailboxhas been opened. Accordingly, the security/automation system may send anotification to a user if the mailbox has been opened/accessed at an oddhour (e.g., between midnight and 5:00 am).

Alarm Event Pictures

In one non-limiting aspect, a control panel may include a built-inforward facing camera. In an aspect, the camera may be used to take apicture of the person who interacts with the panel to arm or disarm thepanel and/or set-up the security/automation system and/or the panel. Inan alternative or additional aspect, the camera may be used as a motiondetector. In an aspect, for example, the panel may delay taking alarmevent pictures until motion is detected (e.g., by the panel or by asensor in communication with the panel) or the local AI algorithmdetects an unrecognized person. Accordingly, the panel may not wastememory storage space on meaningless pictures. For example, in an aspect,the panel may detect an alarm event and trigger a siren and/or alert amonitoring center/homeowner. At the same time, the panel may wait untilmotion is sensed/detected (e.g., by the panel or by a sensor incommunication with the panel). Only after motion is sensed/detected, thepanel may begin recording video or taking pictures to assist with thedetermination of who or what caused the alarm event. By waiting untilmotion is detected or the local AI algorithm detects an unrecognizedperson, the panel avoids taking unnecessary pictures and thereforeretains more memory for pictures that have a greater likelihood of beingmaterial to the alarm event.

In one non-limiting aspect, the panel performs motion detection bycomparing subsequent frames captured by a built-in camera in the panel.In an aspect, for example, if a door is opened while the panel is in anarmed state, the built-in camera continuously captures images and/orvideo, and the panel performs frame-by-frame comparison of the imagesand/or video captured by the built-in camera to detect motion based onthe amount of change in the pixels of subsequent frames. In onenon-limiting aspect, for example, in order to detect motion, anoptimized algorithm selectively samples for pixel changes in a frame.The algorithm may be calibrated to ignore pets and other unwantedobjects. After motion is detected, the panel starts recording theimages/video captured by the built-in camera and sends the recordedimages/video to the cloud. The cloud may then send the recordedimages/video to a device of a user (e.g., a smartphone, a tablet, etc.)for viewing on an app running on the device of the user.

In one non-limiting aspect, for example, when a person disarms thepanel, a user may be notified via an app on the user smartphone that thepanel has been disarmed. The user may then use the app to remotely viewan image or video of the person who disarmed the panel, where the imageor video is taken by a built-in camera in the panel at the time thepanel was disarmed or immediately after the panel was disarmed.

In another non-limiting alternative or additional aspect, the user mayuse the app to remotely view images and videos of the premises taken bya built-in camera of the panel. In response to determining that aservice person has arrived at the premises, the user may use the app toremotely disarm the panel.

Facial Recognition by the Control Panel

In one non-limiting aspect, the control panel may include a built-incamera and may use the built-in camera to implement facial recognition.In an aspect, for example, when a person is arming or disarming thepanel, the panel may use the built-in camera to take video and/or imagesof the person and perform facial recognition based on the captured videoand/or images to identify the person and determine whether the person islegitimate and authorized to arm or disarm the panel. In an aspect, thepanel may use facial recognition in addition to another form ofauthentication (e.g., passcode, voice recognition, etc.) to performmulti-factor authentication and determine whether the person islegitimate and authorized to arm or disarm the panel.

In an aspect, upon recognizing the person, the panel may control one ormore devices to operate according to a desired setting of the recognizedperson. For example, the panel may turn some lights on or off, turnmusic or radio on or off, adjust an HVAC temperature setting to adesired temperature, etc.

In another aspect, for example, when the panel is next to a premisesentry point such as a door, and a door contact sensor indicates to thepanel that the door has been opened, the panel may use the built-incamera to take images of the person passing by and perform facialrecognition, optionally together with voice recognition or othersensors, to determine whether the person is legitimate and authorized toenter the premises.

In an aspect, the panel may use facial recognition, optionally togetherwith voice recognition or other sensors, to determine how many peopleare present at a premises and whether known or unknown people arepresent at the premises. In one non-limiting aspect, for example, thepanel may identify, via a built-in Bluetooth radio, that a number ofBluetooth devices are in range, which indicates a possibility ofmultiple people being present at the premises. The panel may then usefacial recognition (via a built-in security camera), and optionallytogether with voice recognition (via a built-in microphone) to determinehow many people are present at the premises and whether any of thosepeople are legitimate and authorized to be at the premises.

In an aspect, the panel may use a combination of the above to determinewhether an unusual event is happening at the premises. For example, thepanel may determine whether a number of unrecognized faces have passedby, whether a door has been opened and closed an unusually large numberof times, whether an unusually large number of Bluetooth devices are inrange, whether a noise sensor is indicating an unusually high amount ofnoise, whether an infra-red (IR) sensor is detecting an unusually largenumber of bodies, etc.

In an aspect, the panel may use facial recognition for generating analarm. For example, the panel may initiate an alarm upon recognizing oneor more specific individuals.

GUI Functionality

In one non-limiting aspect, the control panel may implement AIfunctionality for tracking the applications and functions that aparticular user typically invokes and/or is allowed to access.Accordingly, when the panel recognizes a person (e.g., through voice orfacial recognition), the panel may bring up and display GUI features(e.g., buttons, icons, apps, etc.) that are typically invoked by and/orassociated with the recognized person.

In an alternative or additional aspect, the panel may allow forrestricting one or more features for one or more recognized user. Forexample, the panel may allow for implementing parental control to limitaccess to certain features that are otherwise controllable via thepanel.

In an aspect, the panel may bring up personalized GUI features of aspecific person based on facial recognition using a built-in camera inthe panel, as described above.

In an aspect, the AI algorithms for facial recognition are executed by abuilt-in multicore processor of the panel. In an alternative oradditional aspect, the panel may send the images/video captured by thebuilt-in camera to the cloud, and the AI algorithms for facialrecognition are executed in the cloud. The cloud then sends the outcomeof the facial recognition back to the panel. For example, if the cloudrecognizes a person by applying facial recognition to images/videocaptured by the built-in camera of the panel, the cloud may send theidentity of the recognized person to the panel.

Window/Door Sensors using Capacitive Sensing

In one non-limiting aspect, a security/automation system may include awindow/door sensor that implements capacitive sensing to detect if adoor or window is open or closed. Such sensors are beneficial becausethe sensors do not use the conventional magnetic reed switches or othermechanical designs that require two separate pieces to be installed.

Specifically, for example, some sensors used in security/automationsystems for detecting whether a window/door is open or closed use amagnet and reed switch. The sensor containing the reed switch, or othermagnetic sensing device, is typically mounted on or in the window/doorframe, and the magnet is mounted on the window/door. When thewindow/door is closed, the magnet is in close proximity to the reedswitch, keeping it closed. When the window/door is opened, the magnetmoves away from the reed switch, causing it to open. The sensor detectsthe change of state of the reed switch and transmits to a control panel,using wired or wireless communication. These sensors therefore have twocomponents—the sensor device, and the associated magnet.

It is desired to make the window/door sensor as small and inexpensive aspossible. As small magnets with high magnetic field strength are asignificant part of the overall sensor cost, it is advantageous toeliminate the magnet and use a different method to detect if thewindow/door is open or closed.

Accordingly, some aspects sense the proximity of the window/door to thewindow/door frame without a magnet by measuring the capacitance betweentwo conductive measurement points. When the window/door is open, thecapacitance will be lower compared to when the window/door is closed andphysically close to the two measurement points. A microcontroller withappropriate circuitry may periodically measure the capacitance and thendetermine whether the window/door is open or closed.

Additionally, in some aspects, the sensing device may have a mode toself-calibrate when it is installed so it knows the difference betweenopen and closed, thus accounting for differences in capacitance causedby different materials (such as wood, metal, masonry, etc.), differentphysical spacing between the sensor and the window/door, etc.

Additionally, in some aspects, the device may keep a long term historyof any drift in values caused (for example) by changes in the moisturecontent of a wood window/door, changes in spacing caused by seasonalshifting or settling of construction, painting, etc.

In an aspect, for example, the window/door sensor includes an electricalcircuit capable of measuring the capacitance between two closely-spacedmetal elements, and the capacitance between the two metal elementschanges depending on their proximity to the window/door. The metalelements can be implemented as patterns in the copper plating on aprinted circuit board, or as separate metal elements connected to themeasurement circuitry.

In an aspect, the window/door sensor may be calibrated/trained duringinstallation by opening and closing the window/door multiple times. Inan aspect, for example, in order to calibrate the sensor, the capacitivecoupling of the sensor may be measured at different states of thewindow/door (e.g., fully open, fully closed, half open, etc.).

In an aspect, the sensor threshold settings derived by calibration mayvary depending on the material of the window/door (e.g., metal, wood,glass, etc.) and/or depending on the location/orientation of the sensoron the window/door and/or on the frame of the window/door.

Bass Augmentation Sub-System (BASS)

In one non-limiting aspect, a control panel may include multiple primaryspeakers and a modular back speaker. In an aspect, the panel implementsa modular speaker that may be attached or removed and which improves thesound qualities of the panel. The panel may use the modular speaker andone or more microphones to communicate with users through voice commandsand responses, and may also use the modular speaker to broadcast othermessages and music. Accordingly, the panel may function as a homeappliance that communicates clearly and effectively.

In an aspect, the panel may allow for audio as well as video userinteraction. For example, the panel may include one or morespeakerphones and microphones. In one non-limiting aspect, for example,if the panel goes into an alarm condition, the panel may report an alarmto a monitoring center and may use a cellular interface of the controlpanel to establish a two-way voice call between the panel and themonitoring center. For example, in an aspect, in response to a reportedevent, the monitoring center may make a voice call to the panel and aska homeowner, via one or more speakerphones on the panel, about anyemergencies existing at the premises and/or whether the homeownerrequires assistance.

Diagnostic Tool

One non-limiting aspect implements a diagnostic tool that tests,measures, and/or graphically maps the signal strength of the connectionbetween one or more sensors and the control panel. Accordingly, atechnician may do diagnostic analysis by using the panel itself, ratherthan needing to use additional signal strength meters, etc. This mayspeed up the installation of a security/automation system and/or providea more robust installed security/automation system.

In one non-limiting aspect, the diagnostic tool may measure the receivedsignal strength of wireless signals between one or more sensors and oneor more radios in the panel (e.g., cellular or other radios). In anaspect, the diagnostic tool reads the received signal strength indicator(RSSI) of a radio. For example, the diagnostic tool may listen to aradio and determine an instantaneous RSSI related to the backgroundnoise and plot the instantaneous RSSI on a graph over time. Accordingly,a technician/installer may use the graph to identify sources of noise inthe environment that would interfere with the operation of thesecurity/automation system.

For example, in an aspect, RSSI of sensor radios is sent to the cloudand historic signal strength data is maintained. By observing thehistoric graphical information over time, a technician/installer maynotice that operation of an electrical device is producing a signal thatinterferes with the signal transmitted by a sensor or camera that istrying to communicate with the panel. The technician may then adjust theinstallation of the panel, sensor, or camera and/or the electricaldevice to mitigate the interference.

In an aspect, the graph may also display the average of the backgroundnoise by a first horizontal bar, and may also display a minimumacceptable sensor RSSI by a second horizontal bar that is above thefirst horizontal bar. Accordingly, the technician/installer may observethe graph over time and discern whether the RSSI of a sensor is abovethe second bar, thus being acceptable. In an aspect, various data pointsin the graph may be color-coded to indicate different signal qualitycategories, e.g., good signal, marginal signal, unreliable signal, etc.In an aspect, for example, when the graph color-codes a data point of asensor as being marginal or unreliable, the technician/installer mayreposition the sensor and/or reposition the panel until subsequent datapoints of the sensor are color-coded in the graph as being a goodsignal.

In an aspect, repositioning the sensor may include changing the locationand/or changing an orientation of the sensor. Similarly, repositioningthe panel may include changing a location and/or changing an orientationof the panel.

Use of a Short Range Communication Radio for Disarming

In one non-limiting aspect, a short range communication radio of thecontrol panel may be used to determine whether a known device is inrange, and the control panel may be automatically disarmed in responseto the known device being in range. In one non-limiting aspect, anentrance of a premises may also be unlocked in response to the knowndevice being in range. In an aspect, the short range communication radiomay be, for example, but is not limited to, a Bluetooth radio, aBluetooth Low Energy (BLE) radio, a near-field communication (NFC)radio, etc.

In one non-limiting aspect, for example, when a panel recognizes a BLEsignal from a known device, the panel is automatically disarmed. In anaspect, instead of arming/disarming the panel by determining the exactlocation of a user, the panel arms/disarms based on detecting that auser is within BLE range and that a BLE device of the user has beenregistered with the panel.

In one non-limiting aspect, for example, a user smartphone may be pairedwith the panel in a premises, e.g., using a built-in Bluetooth radio inthe panel. In one non-limiting aspect, for example, when the userapproaches a front or back door of the premises, the built-in Bluetoothradio in the panel may detect that the user smartphone is within range.In response to detecting that the user smartphone is within range, thepanel may disarm and send a Z-Wave command to unlock the door and/orturn on the lights at the premises. In one non-limiting aspect, if theuser opens the back door of the premises, a sensor on the back door maysend a signal to the panel to indicate that the back door has beenopened. In response, the panel may, for example, chime and play an audiomessage such as “Back door opened!” In another non-limiting aspect, thebuilt-in Bluetooth radio in the panel may be used to pair new securityor home automation sensors with the panel. For example, in an aspect,pairing the sensor may be performed from a mobile phone app by scanningthe sensor QR code and sending the sensor details to the panel usingBluetooth.

Turning now to the figures, example aspects are depicted with referenceto one or more components described herein, where components in dashedlines may be optional.

Referring to FIG. 1, a security/automation system 100 of a premises 102may include various security devices 104 (e.g., sensors, cameras, etc.)installed/positioned throughout the premises 102. In some aspects, atleast some of the security devices 104 may include a first cellularradio 116 for communicating directly (e.g., via a cellular network) witha cloud system 120 that implements at least some of the functionalitiesprovided by the system 100, as described herein with reference tovarious aspects. Alternatively and/or additionally, at least some of thesecurity devices 104 may communicate with the cloud system 120 viaanother wired or wireless connection, for example, via a physicalEthernet connection.

In an aspect, at least some of the security devices 104 may communicatewith a control panel 106 that is physically installed at the premises102. In an aspect, for example, at least some of the security devices104 may include one or more first other radios 118 (e.g., Bluetooth,PowerG, Z-Wave, Zigbee, etc.) for communicating with the panel 106 thatincludes one or more corresponding second other radios 134 (e.g.,Bluetooth, PowerG, Z-Wave, etc.). Alternatively and/or additionally, atleast some of the security devices 104 may communicate with the panel106 via another wired or wireless connection, for example, via aphysical Ethernet connection.

In an aspect, the system 100 may be at least partially configured and/orcontrolled via a first UI 122 of the panel 106 to implement at leastsome of the functionalities described herein with reference to variousaspects. In an aspect, the panel 106 may include one or more built-incameras 126, one or more built-in microphones 128, and/or one or morebuilt-in speakers 130 to implement at least some of the functionalitiesdescribed herein with reference to various aspects.

In some aspects, the panel 106 may include a second cellular radio 132for communicating directly (e.g., via a cellular network) with the cloudsystem 120 to implements at least some of the functionalities providedby the system 100, as described herein with reference to variousaspects. Alternatively and/or additionally, the panel 106 maycommunicate with the cloud system 120 via another wired or wirelessconnection, for example, via a physical Ethernet connection.

In some alternative or additional aspects, the system 100 may be atleast partially configured and/or controlled via a second UI 124 of avirtual control panel 110 provided via an app 112 executing on a userdevice 114 (e.g., a mobile device). In some aspects, the user device 114may include a third cellular radio 136 for communicating directly (e.g.,via a cellular network) with the cloud system 120 to implements at leastsome of the functionalities provided by the system 100, as describedherein with reference to various aspects. Alternatively and/oradditionally, the user device 114 may communicate with the cloud system120 via another wired or wireless connection, for example, via aphysical Ethernet connection. In some aspects, the user device 114 mayalso include one or more other radios 138 (e.g., Bluetooth, PowerG,Z-Wave, etc.).

Referring to FIG. 2, in an aspect, the panel 106 may include a removableback speaker 140 that may also provide support as a stand for placingthe panel 106 on a surface such as a countertop or a desk.

FIG. 3 includes a first non-limiting example of a GUI 300 of thediagnostic tool described above with reference to some aspects. In FIG.3, a test/installer tool graph of the signal strength 306 changes from−50 dBm to less than −90 dBm as a sensor is progressively moved awayfrom the control panel 106. The graph also displays the average of thebackground noise by a first horizontal bar 304, and also displays aminimum acceptable sensor RSSI by a second horizontal bar 302 that isabove the first horizontal bar 304.

FIG. 4 includes a second non-limiting example of a GUI 400 of thediagnostic tool described above with reference to some aspects. In FIG.4, a graph shows a real-time noise floor measurement 402 at the controlpanel 106, indicating the interference caused by a switching powersupply in an LED light fixture. Specifically, the noise floor isslightly above −110 dBm when the LED light is off, but jumps up to theneighborhood of −90 dBm when the LED light is turned on, and drops downto −110 dBm when the LED light is turned back off again. In otherexample aspects, alternative or additional sources of noise/interferencemay include, for example, a microwave oven, a cordless phone, etc.

FIG. 5 illustrates an example block diagram providing details ofcomputing components in a computing device 1000 that may implement allor a portion of one or more components in a control panel, a cloudsystem, a sensor device, a user device (e.g., a smartphone, a tablet, alaptop computer, a desktop computer, etc.), or any other componentdescribed above. The computing device 1000 includes a processor 1002which may be configured to execute or implement software, hardware,and/or firmware modules that perform any functionality described abovewith reference to one or more components in a control panel, a cloudsystem, a sensor device, a user device, or any other component describedabove. For example, the processor 1002 may be configured to execute anactive panel microphone functionality component 1012 to provide activepanel microphone functionality, a glass break detection functionalitycomponent 1014 to provide glass break detection functionality, a cloudcommunicative sensor functionality component 1016 to provide cloudcommunicative sensor functionality, an alarm event picture functionalitycomponent 1018 to provide alarm event picture functionality, a facialrecognition functionality component 1020 to provide facial recognitionfunctionality, a GUI functionality component 1022 to provide GUIfunctionality, a diagnostic tool functionality component 1024 to providediagnostic tool functionality, and/or a BLE disarming functionalitycomponent 1026 to provide functionality for using BLE for disarming, asdescribed herein with reference to various aspects.

The processor 1002 may be a micro-controller and/or may include a singleor multiple set of processors or multi-core processors. Moreover, theprocessor 1002 may be implemented as an integrated processing systemand/or a distributed processing system. The computing device 1000 mayfurther include a memory 1004, such as for storing local versions ofapplications being executed by the processor 1002, related instructions,parameters, etc. The memory 1004 may include a type of memory usable bya computer, such as random access memory (RAM), read only memory (ROM),tapes, flash drives, magnetic discs, optical discs, volatile memory,non-volatile memory, and any combination thereof.

Additionally, the processor 1002 and the memory 1004 may include andexecute an operating system executing on the processor 1002, one or moreapplications, display drivers, etc., and/or other components of thecomputing device 1000.

Further, the computing device 1000 may include a communicationscomponent 1006 that provides for establishing and maintainingcommunications with one or more other devices, parties, entities, etc.,utilizing hardware, software, and services. The communications component1006 may carry communications between components on the computing device1000, as well as between the computing device 1000 and external devices,such as devices located across a communications network and/or devicesserially or locally connected to the computing device 1000. For example,the communications component 1006 may include one or more buses, and mayfurther include transmit chain components and receive chain componentsassociated with a wireless or wired transmitter and receiver,respectively, operable for interfacing with external devices.

Additionally, the computing device 1000 may include a data store 1008,which can be any suitable combination of hardware and/or software, thatprovides for mass storage of information, databases, and programs. Forexample, the data store 1008 may be or may include a data repository forapplications and/or related parameters not currently being executed byprocessor 1002. In addition, the data store 1008 may be a datarepository for an operating system, application, display driver, etc.,executing on the processor 1002, and/or one or more other components ofthe computing device 1000.

The computing device 1000 may also include a user interface component1010 operable to receive inputs from a user of the computing device 1000and further operable to generate outputs for presentation to the user(e.g., via a display interface to a display device). The user interfacecomponent 1010 may include one or more input devices, including but notlimited to a keyboard, a number pad, a mouse, a touch-sensitive display,a navigation key, a function key, a microphone, a voice recognitioncomponent, or any other mechanism capable of receiving an input from auser, or any combination thereof. Further, the user interface component1010 may include one or more output devices, including but not limitedto a display interface, a speaker, a haptic feedback mechanism, aprinter, any other mechanism capable of presenting an output to a user,or any combination thereof.

Some further aspects are provided below.

1. A control panel comprising:

one or more microphones;

at least one memory; and

at least one processor coupled with the at least one memory, wherein theat least one processor is configured to:

monitor an ambient noise via the one or more microphones; and

determine whether the ambient noise is indicative of a security event.

2. The control panel of clause 1, wherein, in response to determiningthat the ambient noise is indicative of the security event, the at leastone processor is further configured to initiate an alarm or send anotification to a cloud system.

3. The control panel of clause 1, wherein, in response to determiningthat the ambient noise is indicative of the security event, the at leastone processor is further configured to:

capture one or more still images or videos via a camera of the controlpanel; and

send the one or more still images or videos to a cloud system, whereinthe cloud system is configured to send the one or more still images orvideos to a device of a user for viewing on an app running on the deviceof the user.

4. The control panel of clause 1, wherein, to determine whether theambient noise is indicative of the security event, the at least oneprocessor is further configured to determine whether the ambient noiseincludes one or more known or unknown voices.

5. The control panel of clause 1, wherein, to determine whether theambient noise is indicative of the security event, the at least oneprocessor is further configured to determine whether the ambient noiseis continually above a threshold level for longer than a time period.

6. The control panel of clause 1, wherein, to determine whether theambient noise is indicative of the security event, the at least oneprocessor is further configured to determine whether the ambient noiseincludes a sequence of short sharp impacts.

7. The control panel of clause 1, wherein the security event comprises afire event, wherein, to determine whether the ambient noise isindicative of the fire event, the at least one processor is furtherconfigured to determine whether the ambient noise includes astandardized pattern of beeps associated with activation of a firedetection device in response to the fire event.

8. The control panel of clause 1, wherein the security event comprises afire event, wherein, to determine whether the ambient noise isindicative of the fire event, the at least one processor is furtherconfigured to determine whether the ambient noise includes at least oneof a temporal-three pattern associated with a smoke detector going offor a temporal-four pattern associated with a carbon monoxide detectorgoing off.

9. The control panel of clause 1, wherein, to determine whether theambient noise is indicative of the security event, the at least oneprocessor is further configured to perform occupancy detection based onthe ambient noise.

10. The control panel of clause 1, wherein, to determine whether theambient noise is indicative of the security event, the at least oneprocessor is further configured to:

determine, based on the ambient noise, whether there is an activitywithin a monitored area; and

send a notification to a cloud system in response to detecting theactivity within the monitored area.

11. The control panel of clause 1, wherein, to determine whether theambient noise is indicative of the security event, the at least oneprocessor is further configured to execute an artificial intelligencemodule locally at the control panel.

12. The control panel of clause 11, wherein the artificial intelligencemodule is downloaded to the control panel from a server, wherein theartificial intelligence module is customized for the control panel.

13. The control panel of clause 11, wherein the artificial intelligencemodule is configured to determine an action in response to a singledetected event or in response to multiple concurrently-detected discreteevents.

14. The control panel of clause 11, wherein the artificial intelligencemodule is configured to integrate multiple concurrently-detecteddiscrete events to infer that an integrated event is happening.

15. The control panel of clause 14, wherein the multipleconcurrently-detected discrete events includes at least two eventsdetected using at least two different sensor types.

16. The control panel of clause 14, wherein the multipleconcurrently-detected discrete events includes at least one eventdetected based on the ambient noise using the one or more microphones.

17. The control panel of clause 14, wherein the multipleconcurrently-detected discrete events includes at least one eventdetected based on a wired or wireless signal received by the controlpanel from a sensor.

18. The control panel of clause 11, wherein the artificial intelligencemodule is configured to integrate multiple concurrently-detecteddiscrete events based on one or more user preferences received via thecontrol panel.

19. The control panel of clause 1, wherein the security event isassociated with an acoustic signature, wherein, to determine whether theambient noise is indicative of the security event, the at least oneprocessor is further configured to determine whether the ambient noiseincludes the acoustic signature.

20. The control panel of clause 19, wherein the security event comprisesa glass break event, wherein, to determine whether the ambient noise isindicative of the glass break event, the at least one processor isfurther configured to:

detect a first noise by the one or more built-in microphones, whileoperating in a low-power sleep mode;

wake up from the low-power sleep mode in response to determining thatthe first noise is associated with a first sound in the acousticsignature of a probable glass break; and

analyze subsequent noises to determine whether an actual glass break hasoccurred, based on subsequent sounds in the acoustic signature.

21. The control panel of clause 19, wherein the first sound comprises athump sound, wherein the subsequent sounds comprise crashing sounds.

22. A system comprising at least one sensor device that includes:

a sensor element configured to sense a physical phenomenon;

a cellular radio;

a memory; and

at least one processor coupled with the memory, wherein the at least oneprocessor is configured to:

receive a signal from the sensor element, the signal being indicative ofthe physical phenomenon as sensed by the sensor;

determine whether a level of the signal element is indicative of analarm condition; and

use the cellular radio to send a notification directly to a cloud systemin response to the level of the signal being indicative of the alarmcondition.

23. The system of clause 22, wherein the cellular radio is operableaccording to narrowband Internet of things “NB-IoT” protocol.

24. The system of clause 22, wherein the at least one sensor devicecomprises a fire detection sensor.

25. The system of clause 22, further comprising a virtual control panelimplemented as a cloud-based application executable on a user device,wherein the virtual control panel is configured to communicate with thecloud system to interact with or configure the system.

26. The system of clause 25, further comprising at least two sensordevices located at two different geographical locations, wherein eachone of the at least two sensor devices is configured to communicatedirectly with the cloud system, wherein the virtual control panel isconfigured to communicate with the cloud system to configure the atleast two sensors or to receive information communicated by the at leasttwo sensors.

27. A control panel comprising:

at least one camera;

at least one memory; and

at least one processor coupled with the at least one memory, wherein theat least one processor is configured to:

determine that a security event has happened; and

take one or more still images or videos by the at least one camerasubsequent to determining that the security event has happened.

28. The control panel of clause 27, wherein the at least one cameracomprises a front-facing camera.

29. The control panel of clause 27, wherein the security event isassociated with a motion, wherein, in order to determine that thesecurity event has happened, the at least one processor is furtherconfigured to detect the motion using the at least one camera.

30. The control panel of clause 31, wherein, in response to determiningthat the security event has happened, the at least one processor isfurther configured to initiate an alarm or send a notification to acloud system.

31. The control panel of clause 27, wherein the at least one processoris further configured to send the one or more still images or videos toa cloud system, wherein the cloud system is configured to send the oneor more still images or videos to a device of a user for viewing on anapp running on the device of the user.

32. The control panel of clause 27, wherein the security event isassociated with identification or authentication of a user, wherein theat least one processor is further configured to use the one or morestill images or videos to perform facial recognition.

33. The control panel of clause 32, wherein the security event comprisesa user interaction with the control panel.

34. The control panel of clause 32, wherein the security event comprisesarming or disarming the control panel.

35. The control panel of clause 32, wherein the at least one processoris further configured to perform a multi-factor authentication based onthe facial recognition and at least one other form of authentication.

36. The control panel of clause 32, wherein, in response to the userbeing identified or authenticated, the at least one processor is furtherconfigured to control one or more devices to operate according to adesired setting of the user.

37. The control panel of clause 27, wherein the security event isassociated with activation of a door switch of a door located next tothe control panel.

38. The control panel of clause 27, further comprising a Bluetoothradio, wherein the security event is associated with one or moreBluetooth devices being in range, wherein, in order to determine thatthe security event has happened, the at least one processor is furtherconfigured to use the Bluetooth radio to detect the one or moreBluetooth devices.

39. The control panel of clause 38, wherein the at least one processoris further configured to:

use the one or more still images or videos to perform facialrecognition; and

determine, based on the facial recognition, whether one or moreindividuals associated with the one or more Bluetooth devices arepresent at a premises.

40. The control panel of clause 38, wherein the control panel furthercomprises one or more microphones, wherein the at least one processor isfurther configured to:

record an ambient noise by the one or more microphones;

use the ambient noise to perform voice recognition;

use the one or more still images or videos to perform facialrecognition; and

determine, based on the voice recognition and the facial recognition,whether one or more individuals associated with the one or moreBluetooth devices are present at a premises.

41. A control panel comprising:

at least one camera or microphone;

a display configured to provide a graphical user interface;

at least one memory; and

at least one processor coupled with the at least one memory, wherein theat least one processor is configured to:

perform at least one of a voice recognition or a facial recognition,using the at least one camera or microphone; and

present, on the display, the graphical user interface including featuresassociated with an individual recognized according to at least one ofthe voice recognition or the facial recognition.

42. The control panel of clause 41, wherein, in order to perform atleast one of the voice recognition or the facial recognition, the atleast one processor is further configured to execute an artificialintelligence module locally at the control panel.

43. The control panel of clause 41, wherein, in order to perform atleast one of the voice recognition or the facial recognition, the atleast one processor is further configured to:

send data captured by the at least one camera or microphone to a cloudsystem; and

receive an outcome of the voice recognition or the facial recognitionfrom the cloud system, responsive to sending the data.

44. A door/window displacement detector comprising a capacitive sensingcircuit configured to indicate whether a door/window is open or close.

45. A control panel comprising:

at least one primary speaker configured to broadcast a first soundtoward a front or a side of the control panel; and

a removable back speaker removably attachable to a back side of thecontrol panel and configured to broadcast a second sound toward the backside of the control panel.

46. A control panel comprising:

at least one memory including a diagnostic tool; and

at least one processor coupled with the at least one memory, wherein theat least one processor is configured to:

execute the diagnostic tool locally at the control panel to at least oneof test, measure, or graphically map a signal strength of a wired orwireless connection between the control panel and at least one sensorconfigured to communicate with the control panel over the wired orwireless connection.

47. A control panel comprising:

a short range communication radio;

at least one memory; and

at least one processor coupled with the at least one memory, wherein theat least one processor is configured to:

receive a short range communication signal transmitted by a device,using the short range communication radio; and

automatically disarm the control panel responsive to recognizing thedevice as a known device.

48. The control panel of clause 47, wherein the short rangecommunication radio comprises a Bluetooth radio, a Bluetooth low energy“BLE” radio, or a near-field communication “NFC” radio.

Referring to FIG. 6 and FIG. 7, in operation for active panel microphonefunctionality, computing device 600 may implement at least a portion ofone or more components in FIGS. 1-5 above, such as all or at least aportion of the control panel 106 in FIG. 1, and may perform method 700such as via execution of active panel microphone functionality component1012 by processor 605 and/or memory 610. Specifically, computing device600 may be configured to perform method 700 for performing an aspect ofactive panel microphone functionality, as described herein. It should benoted that computing device 600, processor 605, and memory 610 may bethe same or similar to computing device 1000, processor 1002, and memory1004 as described above with respect to FIG. 5

At block 702, the method 700 includes monitoring, by a control panel, anambient noise via one or more microphones in the control panel. Forexample, in an aspect, computing device 600, processor 605, memory 610,active panel microphone functionality component 1012, and/or monitoringcomponent 620 may be configured to or may comprise means for monitoring,by a control panel, an ambient noise via one or more microphones in thecontrol panel.

For example, the monitoring at block 702 may include the control panel106, that includes one or more built-in microphones 128, using themonitoring component 620 to control the one or more built-in microphones128, e.g., turn them on, adjust their sound detecting capabilities,etc., to obtain sound waves for analysis and monitor the ambient noisein a protected area (e.g., the premises 102). For instance, the ambientnoise may be any noise or sounds in the environment adjacent to orreceivable by the one or more built-in microphones 128 in the controlpanel 106.

At block 704, the method 700 includes determining, by the control panel,whether the ambient noise is indicative of a security event. Forexample, in an aspect, computing device 600, processor 605, memory 610,active panel microphone functionality component 1012, and/or determiningcomponent 625 may be configured to or may comprise means fordetermining, by the control panel, whether the ambient noise isindicative of a security event.

For example, in an aspect, the determining at block 704 may include thecontrol panel 106 using the determining component 625 to determinewhether the ambient noise captured by the one or more built-inmicrophones 128 of the control panel 106 is indicative of a securityevent happening at the premises 102. For example, the control panel 106may execute one or more software, hardware, and/or firmware modules tocompare the obtained sound waves associated with the monitoring of theambient noise in a protected area (e.g., the premises 102), comparecharacteristics of the sound waves, to one or more known soundwaves/patterns associated with one or more security events. Forinstance, the one or more known sound waves may be patterns of soundwaves, e.g., frequency over time of a sound associated with an eventthat produces a sound. The determining component 625 may attempt tomatch, within one or more thresholds, one or more of the characteristicsof the ambient noise, e.g., a pattern of frequency over time of thenoise, with known characters of the one or more known sound waves. Ifthe comparison determines that one or more of the characteristics are anexact match, or within the threshold of matching, a corresponding one ormore known characteristics of a known sound wave, then the determiningcomponent 625 may identify at least the matching portion of the ambientnoise indicating occurrence of the security event associated with thematching, known sound wave.

In an optional aspect, at block 706, the method 700 may further includecapturing one or more still images or videos via a camera of the controlpanel. For example, in an aspect, computing device 600, processor 605,memory 610, active panel microphone functionality component 1012, and/orcapturing component 630 may be configured to or may comprise means forcapturing one or more still images or videos via a camera of the controlpanel.

For example, the capturing at block 706 may include the control panel106, upon detecting a security event at the premises 102 based onambient noise captured by the one or more built-in microphones 128 ofthe control panel 106, using the capturing component 630 to control oneor more built-in cameras 126 of the control panel 106, e.g., turn themon, adjust their image/video capturing capabilities, etc., to take stillimages or a video clip at the premises 102. For instance, the capturedstill images or videos may capture the environment adjacent to or in afield of view of a forward facing built-in camera 126 of the controlpanel 106.

In an optional aspect, at block 708, the method 700 may further includesending the one or more still images or videos to a cloud system,wherein the cloud system is configured to send the one or more stillimages or videos to a device of a user for viewing on an app running onthe device of the user. For example, in an aspect, computing device 600,processor 605, memory 610, active panel microphone functionalitycomponent 1012, and/or sending component 635 may be configured to or maycomprise means for sending the one or more still images or videos to acloud system, wherein the cloud system is configured to send the one ormore still images or videos to a device of a user for viewing on an apprunning on the device of the user.

For example, the sending at block 708 may include the control panel 106using the sending component 635, which may include or may be associatedwith a wired or wireless transmitter or transceiver, to send the imagesor the video clip captured by the one or more built-in cameras 126 ofthe control panel 106 to a cloud system 120 (e.g., over the Internet,via a wireless connection, etc.), which may send the images or the videoclip to an app 112 (e.g., a mobile app or web app) on a user device 114(e.g., a smartphone) for visual verification of an event that triggeredthe control panel 106. In one non-limiting aspect, for example, a videoclip that includes fifteen seconds before and fifteen seconds after theactual event is sent by the control panel 106 as notification to thecloud system 120.

In some optional aspects, the determining at block 704 of method 700 mayinclude an activity detection action at block 710 and a cloudnotification action at block 712.

For example, in an optional aspect, at block 710, the method 700 mayfurther include determining, based on the ambient noise, whether thereis an activity within a monitored area. For example, in an aspect,computing device 600, processor 605, memory 610, active panel microphonefunctionality component 1012, and/or determining component 625 may beconfigured to or may comprise means for determining, based on theambient noise, whether there is an activity within a monitored area.

For example, the determining at block 710 may include the control panel106 using the determining component 625 to recognize normal householdvoices and activity patterns based on ambient noise captured by the oneor more built-in microphones 128 of the control panel 106. For example,the control panel 106 may execute one or more software, hardware, and/orfirmware modules that implement AI algorithms to analyze the ambientnoise captured by the one or more built-in microphones 128 of thecontrol panel 106 and determine whether the ambient noise is indicativeof normal household voices and activity patterns.

In an optional aspect, at block 712, the method 700 may further includesending a notification to a cloud system in response to detecting theactivity within the monitored area. For example, in an aspect, computingdevice 600, processor 605, memory 610, active panel microphonefunctionality component 1012, and/or sending component 635 may beconfigured to or may comprise means for sending a notification to acloud system in response to detecting the activity within the monitoredarea.

For example, the sending at block 712 may include the control panel 106using the sending component 635, which may include or may be associatedwith a wired or wireless transmitter or transceiver, to send anotification to the cloud system 120 in response to detecting anactivity within the premises 102. For example, the control panel 106 maybe configured into a monitoring mode where the control panel 106 sendsan alert to the cloud system 120 if the control panel 106 hears via theone or more built-in microphones 128 certain voices or activitypatterns.

In an optional aspect, in response to determining that the ambient noiseis indicative of the security event, the method 700 may further includeinitiating an alarm or sending a notification to a cloud system. Forexample, in an aspect, computing device 600, processor 605, memory 610,active panel microphone functionality component 1012, and/or determiningcomponent 625 may be configured to or may comprise means for initiatingan alarm or sending a notification to a cloud system. For example, in anaspect, in response to determining that the ambient noise captured bythe one or more built-in microphones 128 of the control panel 106 isindicative of a security event, the control panel 106 initiates an alarmor sends a notification to the cloud system 120.

In an optional aspect, determining whether the ambient noise isindicative of the security event comprises determining whether theambient noise includes one or more known or unknown voices. For example,in an aspect, the control panel 106 may operate the determiningcomponent 625 to determine whether the ambient noise captured by the oneor more built-in microphones 128 includes (a) any voices in theprotected area (e.g., the premises 102) at a time when there typicallyis none, such as the middle of the night; (b) unknown voices in theprotected area at a time when there typically is none, such as themiddle of the night; (c) any unknown voices regardless of the time ofday or activity period. For instance, the determining component 625 maycompare the ambient noise to voice information, in general, or to knownvoices, in particular, to determine if the ambient noise includes anyvoices and/or if the ambient noise includes a known or unknown voice.

In an optional aspect, determining whether the ambient noise isindicative of the security event comprises determining whether theambient noise is continually above a threshold level for longer than atime period. For example, in an aspect, the control panel 106 mayoperate the determining component 625 to determine whether the ambientnoise captured by the one or more built-in microphones 128 of thecontrol panel 106 is continually above a threshold level for longer thana time period, such as by comparing the noise level to the thresholdlevel.

In an optional aspect, determining whether the ambient noise isindicative of the security event comprises determining whether theambient noise includes a sequence of short sharp impacts. For example,in an aspect, the control panel 106 may operate the determiningcomponent 625 to determine whether the ambient noise captured by the oneor more built-in microphones 128 of the control panel 106 includesnoises associated with multiple short sharp impacts (e.g., an intrudertrying to kick down a door). For instance, the determining component 625may compare the ambient noise to known sounds of a sharp impact todetermine if there is a match.

In an optional aspect, the security event comprises a fire event, anddetermining whether the ambient noise is indicative of the fire eventcomprises determining whether the ambient noise includes a standardizedpattern of beeps associated with activation of a fire detection devicein response to the fire event. For example, in an aspect, the controlpanel 106 may operate the determining component 625 to determine whetherthe ambient noise captured by the one or more built-in microphones 128of the control panel 106 includes voices or sounds indicative of a fireevent at the premises 102. For instance, the determining component 625may compare the ambient noise to known sounds of a fire event, such asbut not limited to sound associated with items burning, fire, smoke, orcarbon monoxide alarm sounds, etc., to determine if there is a match.

In an optional aspect, the security event comprises a fire event, anddetermining whether the ambient noise is indicative of the fire eventcomprises determining whether the ambient noise includes at least one ofa temporal-three pattern associated with a smoke detector going off or atemporal-four pattern associated with a carbon monoxide detector goingoff. For example, in an aspect, the control panel 106 may determinewhether the ambient noise captured by the one or more built-inmicrophones 128 of the control panel 106 includes sounds generated byfire detection devices, such as a particular standardized pattern ofbeeps such as the temporal-three pattern of a smoke detector going off(according to ISO 8201 and ANSI/ASA S3.41 Temporal Pattern), thetemporal-four pattern of a carbon monoxide detector going off, etc. Inone non-limiting aspect, the control panel 106 may also voice annunciatefire or CO based on detecting these patterns.

In an optional aspect, determining whether the ambient noise isindicative of the security event comprises performing occupancydetection based on the ambient noise. For example, in an aspect, thecontrol panel 106 may perform occupancy detection (e.g., for senior careat the premises 102) by analyzing the ambient noise captured by the oneor more built-in microphones 128 of the control panel 106 to determineactivity of a person, such as senior (e.g., whether the senior got outof bed, operated a kitchen appliance, watched TV, etc.). The controlpanel 106 may report such activity of the person (e.g., senior) to aremote user (e.g., to a relative of the senior) via an app 112 on asmartphone (e.g., the user device 114) of the user. In one non-limitingaspect, for example, voice commands can be given to the control panel106 to activate emergency services.

In an optional aspect, determining whether the ambient noise isindicative of the security event comprises executing an artificialintelligence module locally at the control panel. For example, in anaspect, in order to determine whether the ambient noise captured by theone or more built-in microphones 128 of the control panel 106 isindicative of a security event, the control panel 106 may use built-inprocessing resources of the control panel 106 to implement AI algorithmsconfigured for analyzing various discrete events and for determiningwhat to do in response. Accordingly, an event may be a triggering pointfor taking certain actions.

In an optional aspect, the artificial intelligence module is downloadedto the control panel from a server, and the artificial intelligencemodule is customized for the control panel. In an aspect, for example,the AI algorithms may be downloaded to the control panel 106 from aserver and may be customized for each individual panel.

In an optional aspect, the artificial intelligence module is configuredto determine an action in response to a single detected event or inresponse to multiple concurrently-detected discrete events. For example,in an aspect, AI algorithms used in the control panel 106 for analyzingvarious discrete events may further be configured to determine what todo in response to a single detected event or in response to multipledetected events.

In an optional aspect, the artificial intelligence module is configuredto integrate multiple concurrently-detected discrete events to inferthat an integrated event is happening. In an aspect, for example, thecontrol panel 106 may allow for integration of multiple events. Forexample, the control panel 106 may detect multiple unrelated events, andthen correlate/infer an integrated event from the multiple unrelatedevents using built-in AI algorithms of the control panel 106.

In an optional aspect, the multiple concurrently-detected discreteevents include at least two events detected using at least two differentsensor types. For example, in an aspect, a Bluetooth radio (e.g., secondother radios 134 in FIG. 1) of the control panel 106 may detect multipleunrecognized devices/smartphones within range at the premises 102, andthe control panel 106 may also detect an unrecognized person by AIalgorithms running locally at the control panel 106 on imagery capturedby one or more built-in cameras 126 of the control panel 106. Thecontrol panel 106 may then infer that a gathering is happening at thepremises 102.

In an optional aspect, the multiple concurrently-detected discreteevents include at least one event detected based on the ambient noiseusing the one or more microphones. For example, in an aspect, the one ormore built-in microphones 128 of the control panel 106 may continuouslylisten and may sample the ambient noise at the premises 102 at regularintervals to detect audio events, and at the same time the control panel106 may receive reports of other events via various built-in radios(e.g., second other radios 134 in FIG. 1) such as a Bluetooth radio. Inthis aspect, the control panel 106 has intelligence to correlatemultiple concurrently happening events based on an AI model implementedby an AI module at the control panel 106.

In an optional aspect, the multiple concurrently-detected discreteevents include at least one event detected based on a wired or wirelesssignal received by the control panel from a sensor. For example, in anaspect, the control panel 106 may detect multiple front door open/closeevents reported by a door contact switch at an entrance of the premises102, while a Bluetooth radio (e.g., second other radios 134 in FIG. 1)of the control panel 106 may also detect multiple unrecognizeddevices/smartphones within range at the premises 102, and/or the controlpanel 106 may detect an unrecognized person by AI algorithms runninglocally at the control panel 106 on imagery captured by one or morebuilt-in cameras 126 of the control panel 106 and/or by externalcameras. The control panel 106 may then infer that a gathering ishappening at the premises 102.

In an optional aspect, the artificial intelligence module is configuredto integrate multiple concurrently-detected discrete events based on oneor more user preferences received via the control panel. In an aspect,for example, the AI model used in the artificial intelligence module ofthe control panel 106 to integrate multiple concurrently-detecteddiscrete events may change depending on how a user intends to correlatevarious concurrently-happening events, for example, based on a certainanomaly or a use case desired by the user. For example, the AI model maybe configured to take no action when a glass break event is detectedwhile no other event is concurrently detected, but generate an alarmwhen a glass break event is detected concurrently with another event. Inan aspect, the AI modeling and anomaly detection may be dynamicallyimplemented and changed.

Some further example aspects are provided below.

1. A method comprising:

monitoring, by a control panel, an ambient noise via one or moremicrophones in the control panel; and

determining, by the control panel, whether the ambient noise isindicative of a security event.

2. The method of clause 1, further comprising, in response todetermining that the ambient noise is indicative of the security event,initiating an alarm or sending a notification to a cloud system.

3. The method of any of the above clauses, further comprising, inresponse to determining that the ambient noise is indicative of thesecurity event:

capturing one or more still images or videos via a camera of the controlpanel; and

sending the one or more still images or videos to a cloud system,wherein the cloud system is configured to send the one or more stillimages or videos to a device of a user for viewing on an app running onthe device of the user.

4. The method of any of the above clauses, wherein determining whetherthe ambient noise is indicative of the security event comprisesdetermining whether the ambient noise includes one or more known orunknown voices.

5. The method of any of the above clauses, wherein determining whetherthe ambient noise is indicative of the security event comprisesdetermining whether the ambient noise is continually above a thresholdlevel for longer than a time period.

6. The method of any of the above clauses, wherein determining whetherthe ambient noise is indicative of the security event comprisesdetermining whether the ambient noise includes a sequence of short sharpimpacts.

7. The method of any of the above clauses, wherein the security eventcomprises a fire event, wherein determining whether the ambient noise isindicative of the fire event comprises determining whether the ambientnoise includes a standardized pattern of beeps associated withactivation of a fire detection device in response to the fire event.

8. The method of any of the above clauses, wherein the security eventcomprises a fire event, wherein determining whether the ambient noise isindicative of the fire event comprises determining whether the ambientnoise includes at least one of a temporal-three pattern associated witha smoke detector going off or a temporal-four pattern associated with acarbon monoxide detector going off.

9. The method of any of the above clauses, wherein determining whetherthe ambient noise is indicative of the security event comprisesperforming occupancy detection based on the ambient noise.

10. The method of any of the above clauses, wherein determining whetherthe ambient noise is indicative of the security event comprises:

determining, based on the ambient noise, whether there is an activitywithin a monitored area; and

sending a notification to a cloud system in response to detecting theactivity within the monitored area.

11. The method of any of the above clauses, wherein determining whetherthe ambient noise is indicative of the security event comprisesexecuting an artificial intelligence module locally at the controlpanel.

12. The method of any of the above clauses, wherein the artificialintelligence module is downloaded to the control panel from a server,wherein the artificial intelligence module is customized for the controlpanel.

13. The method of any of the above clauses, wherein the artificialintelligence module is configured to determine an action in response toa single detected event or in response to multiple concurrently-detecteddiscrete events.

14. The method of any of the above clauses, wherein the artificialintelligence module is configured to integrate multipleconcurrently-detected discrete events to infer that an integrated eventis happening.

15. The method of any of the above clauses, wherein the multipleconcurrently-detected discrete events include at least two eventsdetected using at least two different sensor types.

16. The method of any of the above clauses, wherein the multipleconcurrently-detected discrete events include at least one eventdetected based on the ambient noise using the one or more microphones.

17. The method of any of the above clauses, wherein the multipleconcurrently-detected discrete events include at least one eventdetected based on a wired or wireless signal received by the controlpanel from a sensor.

18. The method of any of the above clauses, wherein the artificialintelligence module is configured to integrate multipleconcurrently-detected discrete events based on one or more userpreferences received via the control panel.

An apparatus comprising:

a memory; and

a processor communicatively coupled with the memory and configured toperform the method of any of the above clauses.

A non-transitory computer-readable medium storing instructionsexecutable by a processor that, when executed, cause the processor toperform the method of any of the above clauses.

An apparatus comprising means for performing the method of any of theabove clauses.

The previous description is provided to enable any person skilled in theart to practice the various aspects described herein. Variousmodifications to these aspects will be readily apparent to those skilledin the art, and the generic principles defined herein may be applied toother aspects. Thus, the claims are not intended to be limited to theaspects shown herein, but is to be accorded the full scope consistentwith the language claims, wherein reference to an element in thesingular is not intended to mean “one and only one” unless specificallyso stated, but rather “one or more.” The word “exemplary” is used hereinto mean “serving as an example, instance, or illustration.” Any aspectdescribed herein as “exemplary” is not necessarily to be construed aspreferred or advantageous over other aspects. Unless specifically statedotherwise, the term “some” refers to one or more. Combinations such as“at least one of A, B, or C,” “one or more of A, B, or C,” “at least oneof A, B, and C,” “one or more of A, B, and C,” and “A, B, C, or anycombination thereof” include any combination of A, B, and/or C, and mayinclude multiples of A, multiples of B, or multiples of C. Specifically,combinations such as “at least one of A, B, or C,” “one or more of A, B,or C,” “at least one of A, B, and C,” “one or more of A, B, and C,” and“A, B, C, or any combination thereof” may be A only, B only, C only, Aand B, A and C, B and C, or A and B and C, where any such combinationsmay contain one or more member or members of A, B, or C. All structuraland functional equivalents to the elements of the various aspectsdescribed throughout this disclosure that are known or later come to beknown to those of ordinary skill in the art are expressly incorporatedherein by reference and are intended to be encompassed by the claims.Moreover, nothing disclosed herein is intended to be dedicated to thepublic regardless of whether such disclosure is explicitly recited inthe claims. The words “module,” “mechanism,” “element,” “device,” andthe like may not be a substitute for the word “means.” As such, no claimelement is to be construed as a means plus function unless the elementis expressly recited using the phrase “means for.”

What is claimed is:
 1. A method comprising: monitoring, by a controlpanel, an ambient noise via one or more microphones in the controlpanel; and determining, by the control panel, whether the ambient noiseis indicative of a security event.
 2. The method of claim 1, furthercomprising, in response to determining that the ambient noise isindicative of the security event, initiating an alarm or sending anotification to a cloud system.
 3. The method of claim 1, furthercomprising, in response to determining that the ambient noise isindicative of the security event: capturing one or more still images orvideos via a camera of the control panel; and sending the one or morestill images or videos to a cloud system, wherein the cloud system isconfigured to send the one or more still images or videos to a device ofa user for viewing on an app running on the device of the user.
 4. Themethod of claim 1, wherein determining whether the ambient noise isindicative of the security event comprises determining whether theambient noise includes one or more known or unknown voices.
 5. Themethod of claim 1, wherein determining whether the ambient noise isindicative of the security event comprises determining whether theambient noise is continually above a threshold level for longer than atime period.
 6. The method of claim 1, wherein determining whether theambient noise is indicative of the security event comprises determiningwhether the ambient noise includes a sequence of short sharp impacts. 7.The method of claim 1, wherein the security event comprises a fireevent, wherein determining whether the ambient noise is indicative ofthe fire event comprises determining whether the ambient noise includesa standardized pattern of beeps associated with activation of a firedetection device in response to the fire event.
 8. The method of claim1, wherein the security event comprises a fire event, whereindetermining whether the ambient noise is indicative of the fire eventcomprises determining whether the ambient noise includes at least one ofa temporal-three pattern associated with a smoke detector going off or atemporal-four pattern associated with a carbon monoxide detector goingoff.
 9. The method of claim 1, wherein determining whether the ambientnoise is indicative of the security event comprises performing occupancydetection based on the ambient noise.
 10. The method of claim 1, whereindetermining whether the ambient noise is indicative of the securityevent comprises: determining, based on the ambient noise, whether thereis an activity within a monitored area; and sending a notification to acloud system in response to detecting the activity within the monitoredarea.
 11. The method of claim 1, wherein determining whether the ambientnoise is indicative of the security event comprises executing anartificial intelligence module locally at the control panel.
 12. Themethod of claim 11, wherein the artificial intelligence module isdownloaded to the control panel from a server, wherein the artificialintelligence module is customized for the control panel.
 13. The methodof claim 11, wherein the artificial intelligence module is configured todetermine an action in response to a single detected event or inresponse to multiple concurrently-detected discrete events.
 14. Themethod of claim 11, wherein the artificial intelligence module isconfigured to integrate multiple concurrently-detected discrete eventsto infer that an integrated event is happening.
 15. The method of claim14, wherein the multiple concurrently-detected discrete events includeat least two events detected using at least two different sensor types.16. The method of claim 14, wherein the multiple concurrently-detecteddiscrete events include at least one event detected based on the ambientnoise using the one or more microphones.
 17. The method of claim 14,wherein the multiple concurrently-detected discrete events include atleast one event detected based on a wired or wireless signal received bythe control panel from a sensor.
 18. The method of claim 11, wherein theartificial intelligence module is configured to integrate multipleconcurrently-detected discrete events based on one or more userpreferences received via the control panel.
 19. An apparatus comprising:a memory; and a processor communicatively coupled with the memory andconfigured to: monitor, by a control panel, an ambient noise via one ormore microphones in the control panel; and determine, by the controlpanel, whether the ambient noise is indicative of a security event. 20.A non-transitory computer-readable medium storing instructionsexecutable by a processor that, when executed, cause to the processorto: monitor, by a control panel, an ambient noise via one or moremicrophones in the control panel; and determine, by the control panel,whether the ambient noise is indicative of a security event.