Smart door lock

ABSTRACT

In some embodiments, systems, methods, and techniques relating to security and/or automation systems, collectively referred to as automation systems, may include determining a presence of a first device proximate at least one entry to a location, obtaining information related to an identification of an entity associated with the at least one device, authenticating the first device, the authenticating based at least in part on obtaining information related to the identification, and taking an action based at least in part on determining the authenticity.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims priority to U.S. Provisional PatentApplication No. 62/096,449, titled: “Smart Card Reader,” filed on Dec.23, 2014, U.S. Provisional Patent Application No. 62/143,203, titled:“Smart Delivery,” filed on Apr. 5, 2015, and U.S. Provisional PatentApplication No. 62/143,205, titled: “Smart Door Lock Systems,” filed onApr. 5, 2015, and assigned to the assignee hereof, each of which isincorporated by this reference in its entirety.

BACKGROUND

The present disclosure relates to security and/or automation systems,and more particularly to reading a card or other elements via a readerlocated proximate a residence.

Accessing a home may present challenges. For example, physical keys maybe misplaced, and lending out a physical key may lead to duplicate keycopies or allowing a person to enter the entire home without confiningthe access to a desired area of the premise. In another example, if anautomation system is present, a user may lose a key code, or not havethe ability to enter a key code to unlock a door or disarm one or moreaspects of the automation system.

In some examples, the door may have an electronic door unlock feature,but activating this feature may be slow or may require an inconvenientamount of time to activate before authorizing a user's entry. Forexample, the door unlock feature may enter a sleep state after a periodof inactivity, and may then require a certain amount of time totransition from the sleep state to an awake state before allowing a userto interact with the door lock feature to lock or unlock a door.

SUMMARY

In some embodiments, security and/or automation systems (hereinafter“automation systems”), may activate a door-lock feature prior tophysical interaction with the door lock mechanism. A camera locatedproximate an entry to a building may be enabled to detect motion. Insome embodiments, the camera may detect motion occurring within apre-determined distance from the entry. The camera may be additionallyenabled to differentiate between environmental motion such as a passingvehicle, an animal, or wind and the movement of a person. In someembodiments, the camera may activate a door-lock feature based at leastin part on detecting motion. The door-lock feature may allow a user toenter a home without the use of a key.

According to at least one embodiment, a method for a security and/orautomation system is described. In some embodiments, the method mayinclude determining a first presence of a first card located proximateat least one entry to a location, obtaining information related to anidentification of an entity associated with the at least one card,wherein obtaining information comprises identifying at least one featureof the first card, performing an authentication on the first card, theauthentication based at least in part on obtaining information relatedto the identification, and taking an action based at least in part onperforming the authentication.

According to at least one embodiment, an apparatus for a security and/orautomation system is described. In some embodiments, the method mayinclude determining a first presence of a first card located proximateat least one entry to a location, obtaining information related to anidentification of an entity associated with the at least one card,wherein obtaining information comprises identifying at least one featureof the first card, performing an authentication on the first card, theauthentication based at least in part on obtaining information relatedto the identification, and taking an action based at least in part onperforming the authentication.

According to at least one embodiment, a non-transitory computer-readablemedium may further include determining a first presence of a first cardlocated proximate at least one entry to a location, obtaininginformation related to an identification of an entity associated withthe first card, wherein obtaining information comprises identifying atleast one feature of the first card, performing an authentication on thefirst card, the authentication based at least in part on obtaininginformation related to the identification, and taking an action based atleast in part on performing the authentication.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe unlocking a door and/ordisabling at least part of a security system.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe before taking the action,sending information related to performing the authentication the firstcard to a user associated with the security and/or automation system,and receiving input from the user on which actions to take based onsending the information.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe performing theauthentication on the card by an analyzing data associated with anentity profile with the identification obtained.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe wherein performing theauthentication further comprises requesting additional informationrelated to the first card; receiving additional information from theentity, and performing a second authentication on the first card, theauthentication based at least in part on the additional information.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describes wherein analyzing dataassociated with the entity profile further comprises analyzing dataassociated with a service company.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe, wherein determining thefirst presence of the first card further comprises emitting a discoverysignal.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe, wherein emitting thediscovery signal further comprises emitting a directional signal,wherein the directional signal communicates with devices external to thelocation.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe, wherein detecting thefirst presence of the first card further comprises obtainingidentification information from the first card, wherein the first cardmay be at least one of: a radio frequency identification card, or aphoto identification card, or an electronic chip card, or a cardcomprising a magnetic strip, or a smart card, or a card comprising or aquick response code, or a card comprising a bar code, or a combinationthereof.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe, wherein taking the actionfurther comprises: authorizing a delivery to be delivered proximate toat least one entry to the location by the service company based at leastin part on performing the authentication of the first card.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describes, wherein authorizing thedelivery further comprises sending an entry code to a person associatedwith the first card.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describes, wherein sending theentry code further comprises sending a graphic to a portable electronicdevice associated with the person, wherein the graphic may be scanned bya second electronic device located proximate the at least one entry tothe location.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describes, wherein authorizing thedelivery further comprises sending an indication of a receipt.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describes, wherein in authorizingthe delivery further comprises: unlocking a door at the entry to thelocation and/or disabling at least part of a security system; andauthoring the service company to place the delivery in an interior roomassociated with the location.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe determining a secondpresence of a second card proximate the at least one entry to thelocation; wherein obtaining information further comprises obtaininginformation related to a second identification of a second entityassociated with the second card; performing an authentication of thesecond card, the authentication based at least in part on obtaininginformation related to the second identification; creating a ranking ofthe entities; and wherein taking the action further comprises taking theaction based at least in part on the ranking.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe determining the first cardhas been previously authorized; and wherein taking the action furthercomprises taking a pre-determined action based at least in part ondetermining the first card has been previously authorized.

In some embodiments, the method, apparatus, and/or non-transitorycomputer-readable medium may further describe determining an indicationof a subsequent presence of the first card, the subsequent presenceoccurring within a pre-determined time from the first presence.

In some embodiments, a method for security and/or automation systems isdescribed. The method may include receiving information regarding adetection of at least one card proximate at least one entry to aresidence. One or more features may be recognized based at least in parton the receiving. The one or more features may be associated with arequested action.

The method may include linking the one or more features to a profileassociated with an automation system. The method may additionallyinclude taking an action requested by a user associated with theprofile. The action may comprise unlocking a door and disabling asecurity system.

In some embodiments, the method may include associating the one or morefeatures with a service company and transmitting the one of morefeatures to a user of an automation system. Input from a user may berequested on which actions to take based at least in part on thetransmitting. In some embodiments, the service company may be a deliverycompany. The one or more features may comprise an image of a deliverycompany identification card. A delivery by the delivery company may beauthorized based at least in on the transmitting. One or moreconfirmations may be transmitted to the service company based at leastin part on the authorizing. At least a portion of the automation systemmay be deactivated to allow the delivery to be placed inside theresidence.

In some embodiments, the method may include receiving informationregarding a detection of more than one card proximate the at least oneentry to the residence and determining a profile associated with eachcard. A ranking of the profiles may be determined. The method mayinclude performing one or more actions based at least in part on theranking of the profiles. The action taken may be an action requested bythe profile with a highest priority. A specific combination of detectedcards may prompt a requested action based at least in part on thereceiving. The card may be within a predetermined distance of a cardreader proximate the at least one entry to the residence.

In some embodiments, an apparatus for security and/or automation systemsis described. The apparatus may include a processor, memory inelectronic communication with the processor, and instructions stored inthe memory. The instructions may be executable by the processor toreceive information regarding a detection of at least one card proximateat least one entry to a residence, recognize one or more features basedat least in part on the receiving, and associate the one or morefeatures with a requested action.

In some embodiments, a non-transitory computer-readable medium storingcomputer-executable code is described. The code may be executable by aprocessor to receive information regarding a detection of at least onecard proximate at least one entry to a residence, recognize one or morefeatures based at least in part on the receive, and associate the one ormore features with a requested action.

In some embodiments, a method for security and/or automation systems isdescribed. The method may include receiving information regarding apresence of a service personnel proximate an entry to a residence anddetermining a company associated with the service personnel based atleast in part on the receiving. The method may further includevalidating an authenticity of the service personnel based at least inpart on the determining and authenticating an action to be taken by theservice personnel based at least in part on the validating.

In some embodiments, user approval may be received to authenticate theaction to be taken by the service personnel. The action may compriseauthenticating a delivery to be left at the entry to the residence. Theauthentication may be transmitted to the service personnel, wherein theauthentication serves as a signature on delivery. The action maycomprise unlocking a door and disabling at least a portion of a securitysystem.

In some embodiments, the method may include receiving informationdetailing a reason for a visit by the service personnel and transmittinga name of the company and the reason for the visit of the servicepersonnel to a user of an automation system. Input may be requested fromthe user on which actions to take based at least in part on thetransmitting. At least a portion of the automation system may bedeactivated to allow a delivery to be placed inside the residence. Insome embodiments, refuting information may be received that the servicepersonnel is not associated with the company. Additional information maybe requested from the service personnel. The authenticity of the servicepersonnel may be revalidated based at least in part on the additionalinformation. In some embodiments, an entry code may be delivered to theservice personnel. The entry code may be a graphical code and may bescannable by a camera proximate the entry to the residence.

In some embodiments, an apparatus for security and/or automation systemsis described. The apparatus may comprise a processor, memory inelectronic communication with the processor, and instructions stored inthe memory. The instructions may be executable by the processor toreceive information regarding a presence of a service personnelproximate an entry to a residence and determine a company associatedwith the service personnel based at least in part on the receiving. Theinstructions may be further executable to validate an authenticity ofthe service personnel based at least in part on the determining andauthenticate an action to be taken by the service personnel based atleast in part on the validating.

In some embodiments, a non-transitory computer-readable medium storingcomputer-executable code is described. The code may be executable by aprocessor to receive information regarding a presence of a servicepersonnel proximate an entry to a residence and determine a companyassociated with the service personnel based at least in part on thereceiving. The code may be further executable to validate anauthenticity of the service personnel based at least in part on thedetermining and authenticate an action to be taken by the servicepersonnel based at least in part on the validating.

In some embodiments, a method for security and/or automation systems isdescribed. The method may include receiving information regarding adetection of motion proximate an entry to a residence and identifying adevice proximate the entry to the residence based at least in part onthe detecting. The method may further include validating an authenticityof the identified device and activating a door-lock feature based atleast in part on the validating wherein the door-lock feature isproximate the entry to the residence.

In some embodiments, validating the authenticity of the identifieddevice may include associating the identified device with a userprofile, wherein the user profile is linked to an automation system. Insome embodiments, the method may include unlocking a door based at leastin part on the associating. In some embodiments, the method may includesending a discovery signal to detect a one or more devices proximate theentry to the residence. The discovery signal is a directional signal andcaptures devices external to the residence.

In some embodiments, identifying a device may differentiate betweennewly discovered devices and devices with an established connection toan automation system. Identifying a device may further compriseidentifying a device that recently connected to an automation systemwithin a predetermined time duration. Receiving information regarding adetection of motion may further comprise identifying human motionproximate the entry to the residence. Receiving information regarding adetection of motion may further include identifying a vehicle proximatea driveway to a residence. The method may include detecting multipledevices proximate the entry to the residence and determining at leastone of the multiple devices is associated with the automation system.The at least one of the multiple devices may be associated with a userprofile. The motion detected by a camera may be proximate the entry tothe residence. The device may be associated with a guest profile withpermissions to enter the residence.

In some embodiments, an apparatus for security and/or automation systemsis described. The apparatus may comprise a processor, memory inelectronic communication with the processor, and instructions stored inthe memory. The instructions may be executable by the processor toreceive information regarding a detection of motion proximate an entryto a residence and identify a device proximate the entry to theresidence based at least in part on the detecting. The instructions maybe further executable by the processor to validate an authenticity ofthe identified device and activate a door-lock feature based at least inpart on the validating wherein the door-lock feature is proximate theentry to the residence.

In some embodiments, a non-transitory computer-readable medium storingcomputer-executable code is described. The code may be executable by aprocessor to receive information regarding a detection of motionproximate an entry to a residence and identify a device proximate theentry to the residence based at least in part on the detecting. The codemay be further executable by the processor to validate an authenticityof the identified device and activate a door-lock feature based at leastin part on the validating wherein the door-lock feature is proximate theentry to the residence.

The foregoing has outlined rather broadly the features and technicaladvantages of examples according to this disclosure so that thefollowing detailed description may be better understood. Additionalfeatures and advantages will be described below. The conception andspecific examples disclosed may be readily utilized as a basis formodifying or designing other structures for carrying out the samepurposes of the present disclosure. Such equivalent constructions do notdepart from the scope of the appended claims. Characteristics of theconcepts disclosed herein—including their organization and method ofoperation—together with associated advantages will be better understoodfrom the following description when considered in connection with theaccompanying figures. Each of the figures is provided for the purpose ofillustration and description only, and not as a definition of the limitsof the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of the presentdisclosure may be realized by reference to the following drawings. Inthe appended figures, similar components or features may have the samereference label. Further, various components of the same type may bedistinguished by following a first reference label with a dash and asecond label that may distinguish among the similar components. However,features discussed for various components—including those having a dashand a second reference label—apply to other similar components. If onlythe first reference label is used in the specification, the descriptionis applicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

FIG. 1 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 2 shows a block diagram of a device relating to a security and/oran automation system, in accordance with various aspects of thisdisclosure;

FIG. 3 shows a block diagram of a device relating to a security and/oran automation system, in accordance with various aspects of thisdisclosure;

FIG. 4 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 5 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 6 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 7 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 8 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 9 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 10 shows a swim diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 11 shows a swim diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 12 shows a diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 13 is a flow chart illustrating an example of a method relating toa security and/or an automation system, in accordance with variousaspects of this disclosure;

FIG. 14 is a flow chart illustrating an example of a method relating toa security and/or an automation system, in accordance with variousaspects of this disclosure;

FIG. 15 is a flow chart illustrating an example of a method relating toa security and/or an automation system, in accordance with variousaspects of this disclosure;

FIG. 16 is a flow chart illustrating an example of a method relating toa security and/or an automation system, in accordance with variousaspects of this disclosure;

FIG. 17 is a flow chart illustrating an example of a method relating toa security and/or an automation system, in accordance with variousaspects of this disclosure;

FIG. 18 is a flow chart illustrating an example of a method relating toa security and/or an automation system, in accordance with variousaspects of this disclosure;

FIG. 19 is a flow chart illustrating an example of a method relating toa security and/or an automation system, in accordance with variousaspects of this disclosure; and

FIG. 20 is a flow chart illustrating an example of a method relating toa security and/or an automation system, in accordance with variousaspects of this disclosure.

DETAILED DESCRIPTION

In some embodiments, an automation system may allow a user to performone or more actions and/or facilitate one or more interactions with(e.g., to a disarm one or more portions and/or elements) a securityand/or automation system through the use of a card reader. Theautomation system may additionally authenticate one or more actionsusing a card associated with an administrator of the automation system,a technician of the automation system, a third-party company, etc. Insome embodiments, the card may be a security card, an identificationcard, a license, or the like, and the card need not be specific to theautomation system. For example, the card may be an identification cardissued by a company, and the card may be detected and identified by theautomation system. The company identification card may prompt one ormore responses by the automation system; for example, validatingpersonnel identity, validating delivery information, authorizing adelivery, deactivating one or more security features, and/or the like.

In other embodiments, the automation system may activate a door lockprior to tactile interaction with the door lock (e.g., entering a codeby way of interaction with a touchscreen, a fingerprint scanner, etc.).An image capture, such as a camera, may be located proximate an entry toa residence and may detect motion occurring within a pre-determineddistance from the image capture device. In one example, the motion maybe caused by a person or may be caused by a vehicle approaching theresidence. In other examples, the motion may be caused by factors suchas animals or tree branches blowing in the wind; however, the automationsystem may be enabled to differentiate environmental types of motionfrom motion specific to the residence. Once motion is detected, theautomation system may send out a discovery signal to determine if themotion is linked to a device. If an associated device is detected, theautomation system may determine if the device is linked to a profileassociated with the automation system. If the device is linked to aprofile, the automation system may activate a door-lock. In one example,the system may transmit a wireless signal to wake up the door-lock. Inanother example, the door lock may be a touch-sensitive device which mayunlock a door to the residence based on one or more tactile inputs.

The following description provides examples and is not limiting of thescope, applicability, and/or examples set forth in the claims. Changesmay be made in the function and/or arrangement of elements discussedwithout departing from the scope of the disclosure. Various examples mayomit, substitute, and/or add various procedures and/or components asappropriate. For instance, the methods described may be performed in anorder different from that described, and/or various steps may be added,omitted, and/or combined. Also, features described with respect to someexamples may be combined in other examples.

FIG. 1 illustrates an example of a communications system 100 inaccordance with various aspects of the disclosure. The communicationssystem 100 may include control panels 105, devices 115, a network 130,sensors 150, card readers 155, and/or door locks 160. The network 130may provide user authentication, encryption, access authorization,tracking, Internet Protocol (IP) connectivity, and other access,calculation, modification, and/or functions. The control panels 105 mayinterface with the network 130 through wired and/or wirelesscommunication links 132 to communication with one or more remote servers145. The control panels 105 may perform communication configuration,adjustment, and/or scheduling for communication with the devices 115, ormay operate under the control of a controller. In various examples, thecontrol panels 105 may communicate—either directly or indirectly (e.g.,through network 130)—with each other over wired and/or wirelesscommunication links 134. Control panels 105 may communicate with a backend server (such as the remote servers 145)—directly and/orindirectly—using one or more communication links 132.

The control panels 105 may wirelessly communicate with the devices 115via one or more antennas. Each of the control panels 105 may providecommunication coverage for a respective geographic coverage area 110. Insome examples, control panels 105 may be referred to as a controldevice, a base transceiver station, a radio base station, an accesspoint, a radio transceiver, or some other suitable terminology. Thegeographic coverage area 110 for a control panel 105 may be divided intosectors making up only a portion of the coverage area. Thecommunications system 100 may include control panels 105 of differenttypes. There may be overlapping geographic coverage areas 110 for one ormore different parameters, including different technologies, features,subscriber preferences, hardware, software, technology, and/or methods.For example, each control panel 105 may be related to one or morediscrete structures (e.g., a home, a business) and each of the one morediscrete structures may be related to one or more discrete areas. Inother examples, multiple control panels 105 may be related to the sameone or more discrete structures (e.g., multiple control panels relatingto a home and/or a business complex).

The devices 115 may be dispersed throughout the communications system100 and each device 115 may be stationary and/or mobile. A device 115may include a cellular phone, a personal digital assistant (PDA), awireless modem, a wireless communication device, a handheld device, atablet computer, a laptop computer, a cordless phone, a wireless localloop (WLL) station, a display device (e.g., TVs, computer monitors,etc.), a printer, a camera, and/or the like. A device 115 may alsoinclude or be referred to by those skilled in the art as a user device,a smartphone, a smartwatch or other wearable, a BLUETOOTH® device, aWi-Fi device, a mobile station, a subscriber station, a mobile unit, asubscriber unit, a wireless unit, a remote unit, a mobile device, awireless device, a wireless communications device, a remote device, anaccess terminal, a mobile terminal, a wireless terminal, a remoteterminal, a handset, a user agent, a mobile client, a client, and/orsome other suitable terminology.

The control panels 105 may wirelessly communicate with the sensors 150via one or more antennas. The sensors 150 may be dispersed throughoutthe communications system 100 and each sensor 150 may be stationaryand/or mobile. A sensor 150 may include and/or be one or more sensorsthat sense: proximity, motion, temperatures, humidity, sound level,smoke, structural features (e.g., glass breaking, window position, doorposition), time, light geo-location data of a user and/or a device,distance, biometrics, weight, speed, height, size, preferences, light,darkness, weather, time, system performance, and/or other inputs thatrelate to a security and/or an automation system. A device 115 and/or asensor 150 may be able to communicate through one or more wired and/orwireless connections with various components such as control panels,base stations, and/or network equipment (e.g., servers, wirelesscommunication points, etc.) and/or the like.

The control panels 105 may also wirelessly communicate with the cardreaders 155 via one or more antennas. The card readers 155 may bedispersed throughout the communications system 100 and each card reader155 may be proximate an entry to a premise. The entry may comprise agate to access grounds or a door to access a building or residence. Thecard reader 155 may include any medium capable of reading a card. Thismay include a proximity card reader, smart card reader, Wiegand card,magnetic strip, barcode, photo identification reader, access controlcard reader, some combination thereof, or the like. The card reader 155may additionally comprise an image capture device such as a camera,video camera, and/or security camera. The card reader 155 may be part of(or coupled to) a doorbell device. The card reader 155 may be able tocommunicate through one or more wired and/or wireless connections withvarious components such as control panels, base stations, and/or networkequipment (e.g., servers, wireless communication points, etc.) and/orthe like.

The control panels 105 may also wirelessly communicate with the doorlock 160 via one or more antennas. The door locks 160 may be dispersedthroughout the communications system 100 and each door lock 160 may beproximate an entry to a premise. The entry may comprise a gate to accessgrounds and/or a door to access a building or residence. In someembodiments, the door lock 160 may be installed in a door and mayinclude any type of lock capable of securing a door. The door lock 160may additionally comprise one or more inputs including a key hole, atactile input, or the like. The door lock 160 may be coupled to adoorbell device. The door lock 160 may be able to communicate throughone or more wired and/or wireless connections with various componentssuch as control panels, base stations, and/or network equipment (e.g.,servers, wireless communication points, etc.) and/or the like.

The communication links 125 shown in communications system 100 mayinclude uplink (UL) transmissions from a device 115, card reader 155,door lock 160, and/or sensor 150 to a control panel 105, and/or downlink(DL) transmissions, from a control panel 105 to a device 115, cardreader 155, door lock 160, and/or sensor 150. The downlink transmissionsmay also be called forward link transmissions while the uplinktransmissions may also be called reverse link transmissions. Eachcommunication link 125 may include one or more carriers, where eachcarrier may be a signal made up of multiple sub-carriers (e.g., waveformsignals of different frequencies) modulated according to the variousradio technologies. Each modulated signal may be sent on a differentsub-carrier and may carry control information (e.g., reference signals,control channels, etc.), overhead information, user data, etc. Thecommunication links 125 may transmit bidirectional communications and/orunidirectional communications. Communication links 125 may include oneor more connections, including but not limited to, 345 MHz, Wi-Fi,BLUETOOTH®, BLUETOOTH® Low Energy, cellular, Z-WAVE®, 802.11,peer-to-peer, LAN, WLAN, Ethernet, fire wire, fiber optic, and/or otherconnection types related to security and/or automation systems.

In some embodiments of the communications system 100, control panels 105and/or devices 115 may include one or more antennas for employingantenna diversity schemes to improve communication quality andreliability between control panels 105 and devices 115. Additionally oralternatively, control panels 105 and/or devices 115 may employmultiple-input, multiple-output (MIMO) techniques that may takeadvantage of multi-path, mesh-type environments to transmit multiplespatial layers carrying the same or different coded data.

While the devices 115 may communicate with each other through thecontrol panel 105 using communication links 125, each device 115 mayalso communicate directly with one or more other devices via one or moredirect communication links 134. Two or more devices 115 may communicatevia a direct communication link 134 when both devices 115 are in thegeographic coverage area 110 or when one or neither devices 115 iswithin the geographic coverage area 110. Examples of directcommunication links 134 may include Wi-Fi Direct, BLUETOOTH®, wired,and/or, and other P2P group connections. The devices 115 in theseexamples may communicate according to the WLAN radio and basebandprotocol including physical and MAC layers from IEEE 802.11, and itsvarious versions including, but not limited to, 802.11b, 802.11g,802.11a, 802.11n, 802.11ac, 802.11ad, 802.11ah, etc. In otherimplementations, other peer-to-peer connections and/or ad hoc networksmay be implemented within communications system 100.

The card reader 155 may be proximate an entry to a premise and mayenable a person to prompt the automation system to take one or moreactions. In one embodiment, the card reader, card, person, or othercontemplate item may be located proximate another person or item withina pre-determined distance, regardless if the location is inside oroutside of a location. For example, a card reader may be located on theoutside of a residence, and the methods and systems described herein mayenable a person to leave an item inside the house, where the location isproximate the outside card reader. In some embodiments, the card reader155 may gather one or more pieces of information and transmit theinformation to a user located remotely from the automation system. Insome embodiments, the information may comprise a request for an actionand/or may comprise transmitting the information to user to alert themof action occurring at a residence.

The door lock 160 may be positioned proximate a door to a residence. Thedoor lock 160 may control one or more aspects of a locking feature ofthe door. In some embodiments, the door lock 160 may be in a sleep stateand require activation before being able to unlock or lock a door andthus enable or prevent entry. The door lock 160 may be activated bytouch or may be activated by one or more commands from an automationsystem.

FIG. 2 shows a block diagram 200 of an apparatus 205 for use inelectronic communication, in accordance with various aspects of thisdisclosure. The apparatus 205 may be an example of one or more aspectsof a control panel 105, a card reader 155, a door lock 160, and/or aremote server 145, described with reference to FIG. 1. The apparatus 205may include a receiver module 210, a smart card reader module 215,and/or a transmitter module 220. The apparatus 205 may also be orinclude a processor. Each of these modules may be in communication witheach other—directly and/or indirectly.

The components of the apparatus 205 may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-Custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented—in whole or in part—with instructions embodied in memoryformatted to be executed by one or more general and/orapplication-specific processors.

The receiver module 210 may receive information such as packets, userdata, and/or control information associated with various informationchannels (e.g., control channels, data channels, etc.). The receivermodule 210 may be configured to receive one or more pieces ofinformation pertinent to a card proximate a card reader. Information maybe passed on to the smart card reader module 215, and to othercomponents of the apparatus 205.

The smart card reader module 215 may recognize one or more cardsproximate a card reader and identify one or more features of the card.In some embodiments, the features may comprise one or more identifyingfeatures. For example, the feature may identify the card as associatedwith the automation system. The feature may additionally identify thecard as being associated with an entity, such as a person, a company(e.g., service company, delivery company). In some instances, thefeature may identify the card as an issued identification card such as abadge for an employee of a company, a school identification card, adriver's license, a government-issued photograph-identification card, aradio-frequency identification card, an electronic chip card and thelike. The smart card reader module 215 may use the information todetermine a subsequent action. If the card has features pre-approved bythe automation system, the smart card reader module 215 may havepre-programmed steps to take. For example, if the card is linked to aprofile, the smart card reader module 215 may take actions listed in theprofile such as disabling a security system, unlocking an entry of thepremises, and the like. If the features identify the card as not havinga profile, one of more features of the card may be sent to a user of theautomation system for further instructions. In still furtherembodiments, the features may identify the card as associated with theautomation system, but a user may have an established relationship suchthat the smart card reader module 215 may take pre-programmed actions.In still further embodiments, an association may take the form of anauthorization, and vice versa. For example, a cleaning service may bepermitted entry based on an identification card, a package may beapproved for delivery, a pest control company may be allowed on thepremises, and the like.

The transmitter module 220 may transmit the one or more signals receivedfrom other components of the apparatus 205. The transmitter module 220may transmit the one or more features of the card to a user of theautomation system and/or may transmit one or more approves or denials toa person requesting action at an automation system. In some examples,the transmitter module 220 may be collocated with the receiver module210 in a transceiver module.

FIG. 3 shows a block diagram 300 of an apparatus 205-a for use inwireless communication, in accordance with various examples. Theapparatus 205-a may be an example of one or more aspects of a controlpanel 105, a card reader 155, a door lock 160, and/or a remote server145 described with reference to FIG. 1. It may also be an example of anapparatus 205 described with reference to FIG. 2. The apparatus 205-amay include a receiver module 210-a, a smart card reader module 215-a,and/or a transmitter module 220-a, which may be examples of thecorresponding modules of apparatus 205. The apparatus 205-a may alsoinclude a processor. Each of these components may be in communicationwith each other. The smart card reader module 215-a may include anidentify module 305, a permissions module 310, and an authorizationmodule 315. The receiver module 210-a and the transmitter module 220-amay perform the functions of the receiver module 210 and the transmittermodule 220, of FIG. 2, respectively.

The components of the apparatus 205-a may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-Custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented—in whole or in part—with instructions embodied in memoryformatted to be executed by one or more general and/orapplication-specific processors.

The identify module 305 may identify one or more features of the card.The identify module 305 may receive information pertaining to one ormore images and/or self-identifying features of the card to determine apotential identity of the person associated with the card. Theself-identifying features may comprise a code or image wirelesslytransferred to the identify module 305. For example, theself-identifying code may comprise a radio frequency identification(RFID) which may wirelessly transfer a code to the identify module 305.In another embodiment, the card may comprise a pictorial representationof a self-identifying feature. For example, the card may comprise aquick response code (QR code), a barcode, an alpha-numerical, numerical,or alphabetical code, a name, a photograph such as a headshot, a logo ofa company, and the like. In some embodiments, the identify module 305may also receive information such as an image of the personnel and use auniform the personnel is wearing to determine an identity of thepersonnel.

The identify module 305 may determine if the detected card is acommercial card and/or linked to a profile. If the card is a commercialcard, the identify module 305 may link the card information to aparticular entity, such as an organization, company, person or the like.A personnel profile associated with the card may exist. The personnelprofile may allow certain companies to take actions, such as deliver apackage, or perform select services at a residence, without additionalapproval from a remote user. The personnel profile may be pre-programmedby a user or may be created after a personnel has arrived at aresidence.

The identify module 305 may additionally verify any identification cardinformation for companies both with and without a personnel profile. Inaddition, a third party may provide verification information. The thirdparty may further provide assurances that the identification card isvalid. In some embodiments, the third party may comprise an issuer ofthe identification card such as a company or corporation, or may be anunassociated third party capable of providing verification information.Therefore, if a badge was reported stolen, an unrelated party may beunable to use the stolen badge to gain access to the residence. Anotherverification method may comprise using facial recognition to capture theimage of the personnel associated with the badge and verify thepersonnel is the named person on the identification card. Otherbiometric features may additionally verify the personnel; for example,the identify module 305 may use biometric identifiers such asfingerprinting and/or voice recognition and/or retinal scanning. Theidentify module 305 may compare the biometric features of the personnelwith a photo located on the identification badge, or may contact acommercial entity, such as the issuing company, to confirm the personnelthrough other biometric analysis.

In other embodiments, the identify module 305 may use a profile listprovided by the company to verify information. The identify module 305may additionally scan package information if the personnel is a deliverypersonnel and may use the package information to verify the identity.The package information may be sent to the delivery company to confirmdetails of the package such as barcode, origination address, and thelike. If the correct personnel is delivering the package and the packagedetails have been confirmed, the identify module 305 may validate thepersonnel.

If the card is linked to a profile, the identify module 305 may transferthe card information and the profile to the permissions module 310. Ifthe identifying information is not linked to any saved profile and/orcompany, the identify module 305 may require one or more authorizationsto be pursued by the permissions module 310.

The permissions module 310 may use the information from the identifymodule 305 to determine one or more permissions associated with thecard. This may include performing one or more actions without specificauthorization from an administrator. For example, the permissions module310 may approve one or more actions requested in an identified userprofile, personnel profile, or request further action from a user if noprofile is found.

If the permissions module 310 receives confirmation that the card isassociated with a personnel profile, the permissions module 310 mayreview the personnel profile to determine required actions. The requiredactions may comprise confirming the identity of the person and theirassociation with the personnel profile. In some embodiments, thepermissions module 310 may grant actions taken without specific userapproval. For example, the personnel profile may allow a delivery personto place a package proximate a door to a residence. It may additionallydisarm other sensors and/or settings to allow the personnel access tothe home for preapproved actions. For example, cleaning personnel may beautomatically granted entry to certain areas of a residence. In someembodiments, select security sensors may remain activated. For example,a home office may remain activated to alert a user if the cleaningpersonnel enter the room. The permissions module 310 may additionallyauthorize a delivery from a delivery company. The authorization maycomprise an audible message, an electronic message, or a scannablemessage displayed on a display proximate the entryway. In someembodiments, the permissions module 310 may require furtheridentification prior to taking action. For example, the permissionsmodule 310 may require another proof of identity such as facialrecognition, voice recognition, fingerprint, or another biometricfeature. This may confirm the identity and allow the subsequent actionsto be taken.

In some embodiments, a user may set up a personnel profile prior topersonnel arriving at a residence. If a user is aware of a pendingpackage delivery, the user may program an abbreviated profile with aprerecorded message to authorize an action. The abbreviated profile mayidentify a company delivery the package, and, in some embodiments, mayidentify the personnel delivering the package. Once the personnel scanshis card and the card is approved and validated, if needs be, the usermay request specific actions. The actions may include deactivating atleast a portion of a security and/or automation system to allow deliverypersonnel to place a package inside a residence. The actions mayadditionally relay a message to the personnel. The message may bedelivered audibly or in writing. The message may comprise instructionsto the personnel. In some embodiments, the instructions may also provideauthorization for the personnel. For example, if a user is expecting apackage, the user may program a personnel profile and play a message tothe delivery personnel to leave the package on the doorstep and that themessage is proof of authorization. The delivery personnel mayadditionally be requested to scan one or more images, such as a barcode,from the package for added confirmation.

If the profile is associated with a user profile, the identified userprofile may request one or more actions to occur. For example, if thecard is associated with a resident of the home, the resident may requestthe front door be unlocked and a predetermined set of lights to beilluminated. The resident may request other actions be taken as well.For example, a security system may be disarmed and a verbal report ofactivity during an armed state may be audibly delivered to the resident.The resident may additionally link the action to a time frame. Forexample, if the resident returns home after work, the resident may wishfor a hot water machine to be turned on to allow the user to have a cupof tea. Additionally, requests may be linked to seasons. In the winter,the resident may wish for a gas fireplace to ignite upon entry to thehome, for holiday lighting to illuminate, or the like.

In another embodiment, multiple cards may be detected by the identifymodule 305 and the identifying feature may be transmitted to thepermissions module 310. If multiple cards are sensed and conflictingactions are requested, the permissions module 310 may determine apriority of the profiles. For example, actions associated with a parentmay take precedent over actions associated with a child. Additionally, auser's profile may take priority over a non-resident. In someembodiments, the permissions module 310 may additionally comprise takingone or more actions based on the combination of cards detected. Forexample, a resident may desire certain actions to be taken when sheenters a house alone, but may wish for different actions to be selecteddepending on her company.

The authorization module 315 may seek user approval of one or moreactions associated with information gathered by the identify module 305.The actions sought by the authorization module 315 may be actionsunauthorized by the permissions module 310. The authorization module 315may transmit one or more pieces of information relating to the cardand/or personnel and may request authorization to perform a specificaction or may request direction on actions to take. If the identifymodule 305 has associated the card with a specific company, the requestmay contain information pertaining to the company and appropriateactions relating thereto. For example, a delivery company may typicallyrequire access or an authorizing signature to deliver a package. If theuser provides authorization, the authorization module 315 may allow thepersonnel to enter a vestibule of a residence and deliver theappropriate materials. The authorization module 315 may electronicallysend approval to the personnel. The authorization module 315 may alsogenerate a signature of the personnel when the package is delivered.This signature may be sent to the user and serve as evidence that thepersonnel delivered the package.

In some embodiments, the personnel may show an identification card to acard reader to begin this process. The identify module 305 may receiveinformation pertaining to a logo, name, picture, etc. on a badgeassociated with the personnel. The identify module 305 may additionallyreceive information regarding the personnel itself. The information maycomprise a biometric feature, appearances such as a uniform, packageinformation, and the like. The personnel may additionally speak and theauthorization module 315 may interpret the speech and transpose thespeech into one or more requested actions for the user to approve. Forexample, it may be a pest company requesting access to spray and/orinspect an exterior of a home. The user may either approve or reject therequest electronically without having to be present at the residence.

FIG. 4 shows a block diagram 400 of an apparatus 205-b for use inwireless communication, in accordance with various examples. Theapparatus 205-b may be an example of one or more aspects of a controlpanel 105, a card reader 155, a door lock 160, and/or a remote server145 described with reference to FIG. 1. It may also be an example of anapparatus 205 described with reference to FIGS. 2 and/or 3. In someembodiments, the apparatus 205-b may detect when an identification cardis within a predetermined distance of the apparatus 205-b. The apparatus205-b may include a receiver module 210-b, a detection module 415,and/or a transmitter module 220-b. The receiver module 210-b andtransmitter module 220-b may be examples of the corresponding modules ofapparatus 205. The apparatus 205-b may also include a processor. Each ofthese components may be in communication with each other. The receivermodule 210-b and the transmitter module 220-b may perform the functionsof the receiver module 210 and the transmitter module 220, of FIG. 2,respectively.

The components of the apparatus 205-b may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-Custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented—in whole or in part—with instructions embodied in memoryformatted to be executed by one or more general and/orapplication-specific processors.

The detection module 415 may include various signaling protocols todetect a multiple of types of identification cards proximate an entry toa building and/or residence. The detection module 415 may comprise ANT+,Bluetooth, cellular, IEE protocols, ISA protocols, infraredcommunication system, near field communication (NFC), radio frequencyidentification (RFID), wireless personal are network (WPAN) protocols,ultra-wide band (UWB) protocols, Wi-Fi, wireless highway addressableremote transducer (HART) protocols, Wireless USB, Zigbee, Z-wave, somecombination thereof, and the like.

In some embodiments, the identification card may not actually be a cardbut may be a wearable device. The wearable device may use one of thesignaling protocols to communicate with the apparatus 205-b. Thewearable device may make it easier for personnel to connect to thedetection module 415. For example, a delivery person may be carryingpackages and may use their wearable device to connect to the detectionmodule 415 preventing the need to put packages down to communicationwith the automation system.

In some embodiments, the detections module may be tailored to eachresidence where the apparatus 205-b is installed. For example, a user ofthe automation system may list the companies they wish to use thedetection module 415. Once a list of companies is known, the detectionmodule 415 may be programmed to detect signaling protocols specific tothose companies. The detection module 415 may sync with the companies toensure their technology is continuously updating along with thecompanies technology without having any lapse in detection capabilities.

In still further embodiments, the detection module 415 may use a camera,speaker, microphone, sensor, user interface, or the like to detect thepresence of an identification card. This embodiment is discussed furtherbelow with respect to FIG. 7.

FIG. 5 shows a block diagram 500 of an apparatus 205-c for use inelectronic communication, in accordance with various aspects of thisdisclosure. The apparatus 205-c may be an example of one or more aspectsof a control panel 105, a card reader 155, a door lock 160, and/or aremote server 145, described with reference to FIG. 1. It may also be anexample of an apparatus 205 described with reference to FIGS. 2-4. Insome embodiments, the apparatus 205-c may detect a short-term entrycode. The apparatus 205-c may include a receiver module 210-c, ashort-term access module 515, and/or a transmitter module 220-c. Thereceiver module 210-c and transmitter module 220-c may be examples ofthe corresponding modules of apparatus 205, 205-a, and/or 205-b. Theapparatus 205-c may also include a processor. Each of these componentsmay be in communication with each other. In some embodiments, theshort-term access module 515 a may include an issue module 505 and aredemption module 510.

The components of the apparatus 205-c may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-Custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented—in whole or in part—with instructions embodied in memoryformatted to be executed by one or more general and/orapplication-specific processors.

The receiver module 210-c may receive information such as packets, userdata, and/or control information associated with various informationchannels (e.g., control channels, data channels, etc.). The receivermodule 210-c may be configured to detect a short-term access codeproximate a card reader. Information may be passed on to the short-termaccess module 515, and to other components of the apparatus 205-c.

The issue module 505 may allow a user of an automation system to grantknown individuals limited access to the automation system. The limitedaccess may comprise a predetermined level of access. The predeterminedlevel of access may include a duration of usage, a time frame of usage,access limitations to selected areas, or some combination thereof. Theindividual may not require repetitive access to the automation system orthe user may wish to limit the individual's access. In some embodiments,a user's ability to issue a short-term access may be limited. Forexample, a parent may not wish a child to have this permission.Likewise, in a commercial setting, an employer may wish to limit thisability to managerial staff, or the like.

To issue access to the individual, the issue module 505 may generate ashort-term entry code. The short-term entry code may comprise anumerical key entry code or a graphical representation of a code such asa bar code or QR code. The short-term entry code may relay specificinformation to the automation system when redeemed. For example, theshort-term entry code may trigger the short-term access module 515 toreview the limited access parameters prior to allowing the individual toaccess the automation system. Once the short-term entry code isgenerated, the short-term entry code may be transferred to theindividual. The short-term entry code may be sent via SMS, e-mail, or asimilar medium.

The redemption module 510 may review the short-term entry code when theindividual attempts to utilize it and determine follow-on actions totake based at least in part on the short-term entry code. To redeem theshort-term entry code, the individual may need to scan the short-termentry code in a card reader (e.g. card reader 155, FIG. 1). The cardreader may include a camera capable of detecting and transmitting theshort-term entry code to the redemption module 510. The redemptionmodule 510 may review the limited access parameters contained within theshort-term entry code and determine if the parameters are satisfied. Forexample, the limited access parameters may restrict access to theautomation system during a specific timeframe. The specific timeframemay include date and time. Additionally, the user may require additionalauthentication of the short-term entry code. For example, the individualmay be required to display their fingerprint or stand in a selectposition for facial recognition. The redemption module 510 may have thebiometric data stored to make a match, or may simply store the biometricdata for future use or for assurances and additional identificationparameters should the individual abuse his privileges and commit illicitacts. If the redemption module 510 determines the limited accessparameters are satisfied, the redemption module 510 may issue a commandto deactivate one or more portions of the automation system.

However, in some instances, even if the limited access parameters aresatisfied, the redemption module 510 may generate an approval request toan administrator of the automation system. For example, theadministrator may request approval access for all short-term entry codesissued by non-administrative users of the automation system. Theadministrator may have the option to approve the request or deny therequest. In some instances, the approval request may include a listingof the information pertaining to the individual such as name and aphotograph taken by the card reader device. Additionally, the approvalrequest may include a reason for the short-term access along with theshort-term access parameters and their status as currently satisfied.

The transmitter module 220-c may transmit the one or more signalsreceived from other components of the apparatus 205-c. The transmittermodule 220-c may transmit the one or more approvals to the individualattempting to access the system. The transmitter module 220-c mayadditionally transmit information to an administrator of the automationsystem to approve the short-term access to the automation system. Ifapproval is received, the transmitter module 220-c may issue a commandto deactivate a portion of the automation system. In some examples, thetransmitter module 220-c may be collocated with the receiver module210-c in a transceiver module.

FIG. 6 shows a block diagram 600 of an apparatus 205-d for use inelectronic communication, in accordance with various aspects of thisdisclosure. The apparatus 205-d may be an example of one or more aspectsof a control panel 105, a card reader 155, a door lock 160, and/or aremote server 145, described with reference to FIG. 1. It may also be anexample of an apparatus 205 described with reference to FIGS. 2-5. Theapparatus 205-d may include a receiver module 210-d, a service approvalmodule 615, and/or a transmitter module 220-d. The receiver module 210-dand transmitter module 220-d may be examples of the correspondingmodules of the apparatus 205 of FIGS. 2-5. The apparatus 205-d may alsoinclude a processor. Each of these components may be in communicationwith each other.

The components of the apparatus 205-d may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented—in whole or in part—with instructions embodied in memoryformatted to be executed by one or more general and/orapplication-specific processors.

The receiver module 210-d may receive information such as packets, userdata, and/or control information associated with various informationchannels (e.g., control channels, data channels, etc.). The receivermodule 210-d may be configured to the presence of a service personnelproximate an entry to a residence. The receiver module 210-d may detectone or more identifying characteristics of the service personnel orreceive information pertaining to an identity and purpose of visit ofthe personnel. Information may be passed on to the service approvalmodule 615, and to other components of the apparatus 205-d.

The service approval module 615 may automate single time access to anautomation system for an individual associated with a known company. Theservice approval module 615 may receive information that a servicepersonnel is proximate an entry to a residence. The proximity may bedetected via a card reader (e.g. card reader 155, FIG. 1). In oneembodiment, proximity may include a pre-determined distance in anydirection (e.g., 360 degrees). The card reader may include a cameraand/or other detection capabilities. The card reader may detect thepresence of personnel once a doorbell is activated. Upon activation, theservice approval module 615 may request additional informationpertaining to the personnel proximate the entryway. If the serviceapproval module 615 determines the personnel is associated with acompany, the service approval module 615 may determine which company isassociated with the personnel and attempt to validate a reason for theservice personnel being present at the automation system. In someembodiments, if the service personnel visit is validated by the company,the service approval module 615 may verify user-defined serviceparameters are satisfied. If both sets of parameters are satisfied, theservice approval module 615 may take further action to authorize one ormore actions to allow the service personnel to perform the dutiesassociated with their visit.

The transmitter module 220-d may transmit the one or more signalsreceived from other components of the apparatus 205-d. The transmittermodule 220-d may transmit authenticating information to a companyassociated with the service personnel to validate their identity. Thetransmitter module 220-d may additionally transmit informationpertaining to the service personnel to a user of the automation systemto authorize one or more actions to be taken by the service personnel.In some examples, the transmitter module 220-d may be collocated withthe receiver module 210-d in a transceiver module.

FIG. 7 shows a block diagram 700 of an apparatus 205-e for use inwireless communication, in accordance with various examples. Theapparatus 205-e may be an example of one or more aspects of a controlpanel 105, a card reader 155, a door lock 160, and/or a remote server145 described with reference to FIG. 1. It may also be an example of anapparatus 205 described with reference to FIGS. 2-6. The apparatus 205-emay include a receiver module 210-e, a service approval module 615-a,and/or a transmitter module 220-e, which may be examples of thecorresponding modules of apparatus 205 of FIGS. 2-6. The apparatus 205-emay also include a processor. Each of these components may be incommunication with each other. The service approval module 615-a mayinclude an initiation module 705, a company verification module 710, auser verification module 715, and an execution module 720.

The components of the apparatus 205-e may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-Custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented—in whole or in part—with instructions embodied in memoryformatted to be executed by one or more general and/orapplication-specific processors.

The initiation module 705 may initiate a service personnel approvalprocess. The approval process may include approving an action to betaken by the service personnel such as a delivery, services, or thelike. The initiation module 705 may receive notification of a servicepersonnel proximate an entry to a residence. The service personnel maycomprise delivery personnel, maintenance personnel, groundskeeper,cleaning personnel, contracting personnel, and the like. Thenotification may comprise one or more images of a personnel to fromwhich analyze and extract information. The notification may additionallycomprise a notification from a company associated with the servicepersonnel. For example, the service personnel may initiate a remoteapproval process based at least in part on the indication of anautomation system at the residence. The initiation module 705 mayreceive a request from the company associated with the personnel tobegin an authorization and/or validation process. In another embodiment,the initiation module 705 may detect identifying insignia such as alogo, barcode, device detection, or the like to begin the approvalprocess.

In some embodiments, the initiation module 705 may receive anotification from the company associated with the service personnel. Forexample, if the service personnel is a delivery personnel, the deliverypersonnel may be equipped with a personal device. The personal devicemay be used to scan packages for delivery confirmation. Upon scanningthe package, the delivery company may recognize the delivery address asa home automation system residence. The delivery company may haveprotocol to follow a process associated with the home automationcompany. This may include sending information to an interface associatedwith the home automation company to request permission for a delivery.The request may detail information further confirmed below in thecompany verification module 710. The request may additionally request apackage drop point and/or an authorization. For example, the deliverypersonnel may determine it is raining and wish to leave a package in agarage or in a house. Additionally, in some embodiments, the user (therecipient of the package) may wish for all packages to be left in ahome.

The company verification module 710 may verify, automatically, thepersonnel. The company verification module 710 may ping the companyassociated with the personnel for one or more verification parameters.The verification parameters may comprise a name of the employee, apurpose for the visit, a time frame of the visit, and the like. Thecompany verification module 710 may signal the company to confirm thesedetails. The company may respond by verifying or refuting the personneland the verification parameters. For example, the company may verifythat the service personnel is indeed scheduled to visit the residencethat day and perform the requested actions. The company may additionallyverify the time frame the service personnel was expected to arrive. Ifthe personnel has been verified, the company verification module 710 maycommunicate personnel approval to the user verification module 715.

If the company verification module 710 receives refuting information,the company verification module 710 may query the personnel foradditional verifying information. The company verification module 710may then begin the verification process again. If the personnel fails asecond time, the company verification module 710 may issue a potentialfraud alert. The fraud alert may result in a message to the user of apotential fraud proximate the residence and alert the user that aheightened security state is being established by the automation system.The company verification module 710 may include information in theiralert to the user concerning the personnel. The information may comprisean image of the personnel, the alleged company associated with thepersonnel, and a reason for visiting. The user may view the informationand remotely verify the personnel. For example, the user may be aware ofthe personnel scheduled to arrive at the house and may override refutinginformation. This may prevent the user from having to reschedule a visitshould a deficiency arise in the verification process. Conversely, theuser may confirm the rejection of the personnel. If the user rejects thepersonnel, one or more alerts may be issued proximate the automationsystem. The alert may warn the personnel to leave the premises and mayestablish a heightened security state at the automation system. If thepersonnel persists in their attempts to gain access to the residence,the automation system may automatically contact one or more authorities.

If the personnel is approved, the user verification module 715 may beginthe user verification process. The user verification process maycomprise a series of rules to authenticate the personnel. The series ofrules may depend upon the purpose for the visit and the personnel. Ifthe personnel does not need to access the house, the user may setpredetermined rules to authorize select actions. For example, rulessurrounding delivery personnel may authorize the delivery personnel toleave a package proximate the residence. A pest control servicepersonnel may be authorized to service the outside of the house. Ifpersonnel need to access the house, the user may implement rules whichrequire specific user approval to admit the personnel into any portionof the automation system. In some embodiments, if the entry requireddoes not need to be specific to an area of the home, the user maydetermine the access points. For example, a furniture deliverypersonnel, grocery delivery personnel, flower delivery personnel, andthe like may leave their delivery in a garage or the main part of thehouse. The user may have the discretion as to which part of the house toallow the personnel to access. Extended access to the residence mayrequire specific user authentication. The specific authentication maycomprise the user remotely approving the specific areas of the home tobe accessed by the personnel and a predetermined duration of access.

If the personnel is verified by the company and/or the user approves thepersonnel, the execution module 720 may execute commands for one or morepermissions to the automation system. The execution may comprisedelivering an entry code to the personnel. The entry code may be similarto the short-term use code described above. The code may comprise anumerical code to enter into a user interface or a graphical code suchas a barcode or QR code. The personnel may scan the graphical code intoa card reader interface proximate an entry to the home. The code maygrant the personnel access to the automation system according toparameters determined by the user. If the personnel does not requirepermission to enter the residence, the execution module 720 may executeone or more authorizations for other actions. For example, the executionmodule 720 may deliver authorization for a delivery personnel to leave apackage at the front door. In another embodiment, the execution module720 may remotely deactivate a portion of the automation system to allowthe service personnel to access the home.

FIG. 8 shows a block diagram 800 of an apparatus 205-f for use inelectronic communication, in accordance with various aspects of thisdisclosure. The apparatus 205-f may be an example of one or more aspectsof a control panel 105, a card reader 155, a door lock 160, and/or aremote server 145, described with reference to FIG. 1. The apparatus205-f may include a receiver module 210-f, a door-lock module 805,and/or a transmitter module 220-f. The apparatus 205-f may also be orinclude a processor. Each of these modules may be in communication witheach other—directly and/or indirectly. In some embodiments, thedoor-lock module 805 may include a motion module 810, a deviceauthentication module 815, and a door-lock activation module 820.

The components of the apparatus 205-f may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-Custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented—in whole or in part—with instructions embodied in memoryformatted to be executed by one or more general and/orapplication-specific processors.

The receiver module 210-f may receive information such as packets, userdata, and/or control information associated with various informationchannels (e.g., control channels, data channels, etc.). The receivermodule 210-f may be configured to receive one or more pieces ofinformation regarding motion proximate an entry to a home, informationregarding devices approaching the residence, and the like. Informationmay be passed on to the door-lock module 805, and to other components ofthe apparatus 205-f.

The door-lock module 805 may receive information regarding motionproximate an entry to a residence. The door-lock module 805 maydetermine the motion is within a motion parameter. If a motion parameteris satisfied, the door-lock module 805 may identify a device proximatethe entry to the residence. If the device is associated with a userprofile, the door-lock module 805 may activate a door lock (e.g. doorlock 160, see FIG. 1).

The motion module 810 may receive information regarding motion proximatean entry to a residence. In some embodiments, the apparatus 205-f may bea doorbell camera and the doorbell camera may sense the motion. Themotion module 810 may analyze the motion to determine if a motionparameter is satisfied. The motion parameter may comprise human motion,vehicular motion, bicycle motion, animal motion, weather motion, and thelike. Only specific motion parameters may enable the motion module 810to take further actions. For example, if the motion parameter satisfiedconsists of animal motion or weather motion, the motion module 810 maynot take any further action. However, if the motion module 810 detectshuman motion or vehicular motion, the motion module 810 may take furtheraction. The motion may need to be detected within a predetermineddistance from the entry to the residence. For example, if the motion isdetected at the street, the motion parameter may not be satisfied.However, if the motion is detected on a front walk, in a yard, in adriveway, or the like, the motion parameter may be satisfied. The motionmodule 810 may detect motion related to people. For example, the motionmodule 810 may detect a person walking, running, a group of people, aperson on a skateboard, scooter, bicycle, or the like.

The device authentication module 815 may authenticate a device proximatethe entry to the residence. For example, if a motion parameter has beensatisfied, the motion module 810 may prompt the device authenticationmodule 815 to emit a discovery signal. The discovery signal may attemptto locate a device proximate the entry. The discovery signal may detectdevices outside of the home. Additionally, the discovery signal maydetect devices within a predetermined range. The discovery signal mayconsist of ANT+, Bluetooth, cellular, IEE protocols, ISA protocols,infrared communication system, near field communication (NFC), radiofrequency identification (RFID), wireless personal are network (WPAN)protocols, ultra-wide band (UWB) protocols, Wi-Fi, wireless highwayaddressable remote transducer (HART) protocols, Wireless USB, Zigbee,Z-wave, some combination thereof, and the like.

If the device authentication module 815 detects at least one device, thedevice authentication module 815 may validate the authenticity of thedevice. Validating the authenticity may comprise associating the devicewith at least one user, wherein the user has a user profile associatedwith the automation system. For example, the device may be a mobiledevice and may have a mobile identification number, a mobilesubscription identification number, an open device identificationnumber, device serial number, or the like. The automation system maylink the identification number to a user profile.

The device authentication module 815 may additionally be able todetermine if a device has newly connected to the automation system. Forexample, a device may have recently connected to a wireless networkassociated with the automation system. Recently may be within theprevious ten minutes prior to motion detection. If the deviceauthentication module 815 detects a recently connected device, thedevice authentication module 815 may determine a device identificationnumber and determine if the device is associated with a user profile.

In some embodiments, multiple devices may be detected by the deviceauthentication module 815. The device authentication module 815 maydetermine if each device is connected to a user profile. As long as onedevice is connected to the automation system, the device authenticationmodule 815 may authorize the door-lock activation module 820. In someembodiments, the device may be associated with a guest profile and mayhave select permissions.

The door-lock activation module 820 may activate a door-lock mechanism(e.g. door lock 160). The door-lock activation module 820 may receiveconfirmation that at least one device associated with the automationsystem has been identified proximate an entry to the residence. Thedoor-lock activation module 820 may enable one or more processors and/orother functions of a door lock to activate. By enabling the door lock toactivate prior to tactile input, the door-lock activation module 820 mayprevent a person from waiting for a door lock to start and prepare foruser input. Instead, the door-lock activation module 820 may preempt auser's attempt to access a home and may enable a user to immediatelygain access to a home. In some embodiments, the door-lock activationmodule 820 may not only activate the door lock but may additionallyunlock the door lock. This may enable the user to have a completely keyand user input free method of entering a residence.

In some embodiments, a guest to the automation system may have similarabilities. A user of the automation system may set guest parameters andif the guest adheres to guest parameters, the door-lock activationmodule 820 may activate and unlock a door lock for the guest. Theparameters may comprise visitation parameters such as day of the week,time of day, specific date, and the like. This may enable a user toallow a guest entry to a home without providing a key or a key code orthe like to a guest.

The transmitter module 220-f may transmit the one or more signalsreceived from other components of the apparatus 205-f. The transmittermodule 220-f may transmit one or more activation signals to a door lockproximate an entry to a residence. The transmitter module 220-f mayadditionally transmit one or more signals to detect a device proximatethe entry to the home. In some examples, the transmitter module 220-fmay be collocated with the receiver module 210-f in a transceivermodule.

FIG. 9 shows a system 900 for use in smart card reader systems, inaccordance with various examples. System 900 may include a control panel105-a which may be an example of one or more aspects of a control panel105 described with reference to FIG. 1. Control panel 105-a may also bean includes aspects one or more embodiments of the apparatus 205described with reference to FIGS. 2-8. A door lock 160-a may be anexample of the door lock 160 described with reference to FIG. 1 and mayinclude aspects of one or more embodiments of the apparatus describedwith reference to FIGS. 2-8. A remote server 145-a may be an example ofthe remote server 145 described with reference to FIG. 1 and may includeaspects of one or more embodiments of the apparatus described withreference to FIGS. 2-8. While this exemplary embodiment shows thecontrol panel 105-a connecting to the door lock 160-a and the remoteserver 145-a, components described herein may additionally be includedin the door lock 160-a and/or the remote server 145-a.

The control panel 105-a may also include components for bi-directionalvoice and data communications including components for transmittingcommunications and components for receiving communications. For example,the control panel 105-a may communicate bi-directionally with one ormore of door lock 160-a, one or more sensors 150-a, remote storage 140,and/or remote server 145-a, which may be an example of the remote serverof FIG. 1. This bi-directional communication may be direct (e.g.,control panel 105-a communicating directly with remote storage 140) orindirect (e.g., control panel 105-a communicating indirectly with remoteserver 145-a through remote storage 140).

The smart card reader module 215-b may identity and take action on anidentification card based at least in part on one or moreself-identifying aspects of the card as described above with referenceto FIGS. 2 and/or 3. For example, the smart card reader module 215-b mayreceive information regarding the detection of one or more cardsproximate a card reader and identify one or more features of the card.The smart card reader module 215-b may use the self-identifyinginformation to determine a next action. For example, if the card islinked to a profile, the smart card reader module 215-a may take actionslisted in the profile such as disabling a security system, unlocking anentry, and the like. If the features identify the card as not having aprofile, the smart card reader module 215-b may send one of morefeatures of the card to a user of the automation system requesting inputon further actions.

The short-term access module 515 may detect an identification card basedat least in part on one or more signaling parameters discussed abovewith reference to FIG. 4. The short-term access module 515 may compriseANT+, Bluetooth, cellular, IEE protocols, ISA protocols, infraredcommunication system, near field communication (NFC), radio frequencyidentification (RFID), wireless personal are network (WPAN) protocols,ultra-wide band (UWB) protocols, Wi-Fi, wireless highway addressableremote transducer (HART) protocols, Wireless USB, Zigbee, Z-wave, somecombination thereof, and the like. The various signaling parameters mayenable an automation system to detect a variety of identificationfeatures associated with multiple companies and/or personnel.

The detection module 415-a may allow an individual to access anautomation system based on one or more short-term access parameters asdescribed above with reference to FIG. 5. The detection module 415-a maygenerate a short-term entry code which may be used with the card reader155-a to gain access to one or more portions of the automation system.The code may adhere to short-term access parameters which may includetime of day, date, areas of the automation system, and the like.

The service approval module 615-b may automate authorizations for one ormore service personnel proximate a residence based at least in part oncompany verifications and/or user verifications as described above withreference to FIGS. 6 and/or 7. The personnel may automatically gainauthorization to perform a service proximate the automation systemwithout need for the user's direct interaction. The authorization maycomprise delivery approvals, entry to the residence, or the like. Theservice personnel may require validation by a company associated withpersonnel prior to providing any authorizations to the personnel.

The door-lock module 805-a may detect motion, identify a device, andactivate a door lock as described above with reference to FIG. 8. Forexample, the door-lock module 805-a may receive information regardingmotion proximate an entry to a residence. The motion may satisfy one ormore motion parameters as described above with reference to FIG. 8. Insome embodiments, if a motion parameter is satisfied, the door-lockmodule 805-a may send out a discovery signal to detect one or moredevices proximate the entry. If the door-lock module 805-a detects adevice and the device is associated with a user profile, the door-lockmodule 805-a may activate a door lock. This may prevent the user fromexperiencing a warm up period of the door lock if the door lock had beenactivated using tactile inputs.

The control panel 105-a may also include a processor module 905, andmemory 910 (including software/firmware code (SW) 915), an input/outputcontroller module 920, a user interface module 925, a transceiver module930, and one or more antennas 935 each of which may communicate—directlyor indirectly—with one another (e.g., via one or more buses 940). Thetransceiver module 930 may communicate bi-directionally—via the one ormore antennas 935, wired links, and/or wireless links—with one or morenetworks or remote devices as described above. For example, thetransceiver module 930 may communicate bi-directionally with one or moreof door lock 160-a, remote storage 140, and/or remote server 145-a. Thetransceiver module 930 may include a modem to modulate the packets andprovide the modulated packets to the one or more antennas 935 fortransmission, and to demodulate packets received from the one or moreantenna 935. While a control panel or a control device (e.g., 105-a) mayinclude a single antenna 935, the control panel or the control devicemay also have multiple antennas 935 capable of concurrently transmittingor receiving multiple wired and/or wireless transmissions. In someembodiments, one element of control panel 105-a (e.g., one or moreantennas 935, transceiver module 930, etc.) may provide a directconnection to a remote server 145-a via a direct network link to theInternet via a POP (point of presence). In some embodiments, one elementof control panel 105-a (e.g., one or more antennas 935, transceivermodule 930, etc.) may provide a connection using wireless techniques,including digital cellular telephone connection, Cellular Digital PacketData (CDPD) connection, digital satellite data connection, and/oranother connection.

The signals associated with system 900 may include wirelesscommunication signals such as radio frequency, electromagnetics, localarea network (LAN), wide area network (WAN), virtual private network(VPN), wireless network (using 902.11, for example), 345 MHz, Z-WAVE®,cellular network (using 3G and/or LTE, for example), and/or othersignals. The one or more antennas 935 and/or transceiver module 930 mayinclude or be related to, but are not limited to, WWAN (GSM, CDMA, andWCDMA), WLAN (including BLUETOOTH® and Wi-Fi), WMAN (WiMAX), antennasfor mobile communications, antennas for Wireless Personal Area Network(WPAN) applications (including RFID and UWB). In some embodiments, eachantenna 935 may receive signals or information specific and/or exclusiveto itself. In other embodiments, each antenna 935 may receive signals orinformation not specific or exclusive to itself.

In some embodiments, one or more sensors 150-a (e.g., motion, proximity,smoke, light, glass break, door, window, carbon monoxide, and/or anothersensor) may connect to some element of system 900 via a network usingone or more wired and/or wireless connections.

In some embodiments, the user interface module 925 may include an audiodevice, such as an external speaker system, an external display devicesuch as a display screen, and/or an input device (e.g., remote controldevice interfaced with the user interface module 925 directly and/orthrough I/O controller module 920).

One or more buses 940 may allow data communication between one or moreelements of control panel 105-a (e.g., processor module 905, memory 910,I/O controller module 920, user interface module 925, etc.).

The memory 910 may include random access memory (RAM), read only memory(ROM), flash RAM, and/or other types. The memory 910 may storecomputer-readable, computer-executable software/firmware code 915including instructions that, when executed, cause the processor module905 to perform various functions described in this disclosure (e.g.,detecting self-identifying features of a card, performing one or moreactions based on the self-identifying features, activating a door lock,etc.). Alternatively, the computer-executable software/firmware code 915may not be directly executable by the processor module 905 but may causea computer (e.g., when compiled and executed) to perform functionsdescribed herein. Alternatively, the computer-readable,computer-executable software/firmware code 915 may not be directlyexecutable by the processor module 905 but may be configured to cause acomputer (e.g., when compiled and executed) to perform functionsdescribed herein. The processor module 905 may include an intelligenthardware device, e.g., a central processing unit (CPU), amicrocontroller, an application-specific integrated circuit (ASIC), etc.

In some embodiments, the memory 910 can contain, among other things, theBasic Input-Output system (BIOS) which may control basic hardware and/orsoftware operation such as the interaction with peripheral components ordevices. For example, the modules to implement the present systems andmethods may be stored within the memory 910. Applications resident withsystem 900 are generally stored on and accessed via a non-transitorycomputer readable medium, such as a hard disk drive or other storagemedium. Additionally, applications can be in the form of electronicsignals modulated in accordance with the application and datacommunication technology when accessed via a network interface (e.g.,transceiver module 930, one or more antennas 935, etc.).

Many other devices and/or subsystems may be connected to one or may beincluded as one or more elements of system 900 (e.g., entertainmentsystem, computing device, remote cameras, wireless key fob, wall mounteduser interface device, cell radio module, battery, alarm siren, doorlock, lighting system, thermostat, home appliance monitor, utilityequipment monitor, and so on). In some embodiments, all of the elementsshown in FIG. 9 need not be present to practice the present systems andmethods. The devices and subsystems can be interconnected in differentways from that shown in FIG. 9. In some embodiments, an aspect of someoperation of a system, such as that shown in FIG. 9, may be readilyknown in the art and are not discussed in detail in this application.Code to implement the present disclosure can be stored in anon-transitory computer-readable medium such as one or more of memory910 or other memory. The operating system provided on I/O controllermodule 920 may be iOS®, ANDROID®, MS-DOS®, MS-WINDOWS®, OS/2®, UNIX®,LINUX®, or another known operating system.

The transceiver module 930 may include a modem configured to modulatethe packets and provide the modulated packets to the antennas 935 fortransmission and/or to demodulate packets received from the antennas935. While the control panel or control device (e.g., 105-a) may includea single antenna 935, the control panel or control device (e.g., 105-a)may have multiple antennas 935 capable of concurrently transmittingand/or receiving multiple wireless transmissions.

FIG. 10 shows a system 1000 for use in smart card reader systems and/orsmart authorization systems, in accordance with various examples. System1000 may include a control panel 105-b which may be an example of one ormore aspects of a control panel 105 described with reference to FIGS. 1and/or 9. Control panel 105-b may also include aspects one or moreembodiments of the apparatus 205 described with reference to FIGS. 2-8.The system 1000 may include a card reader 155-b and/or a device 115-awhich may one example of a card reader 155 and a device 115 describedwith respect to FIG. 1. While this embodiment shows specific actionsbeing taken by the control panel 105-b, the same actions may beperformed by the card reader 155-b and/or a remote server (e.g. remoteserver 145).

The card reader 155-b may detect a card 1005 proximate the card reader155-b. The card reader 155-b may use multiple technologies to detect thecard 1005. The card reader 155-b may use include a proximity cardreader, smart card reader, Wiegand card, Magnetic strip, barcode, photoID reader, access control card reader, some combination thereof, or thelike. The card reader 155-a may additionally comprise an image capturedevice such as a camera, video camera, and/or security camera. The imagecapture device may capture an image of the card and/or a uniform ofpersonnel associated with the card.

In this example, the card reader 155-b may transmit the card information1010 to the control panel 105-b. The control panel 105-b may associatethe card information 1015 into one of three categories. The categoriesmay comprise user profile, personnel profile, and unknown. In someembodiments, associating the card information 1015 may comprisevalidating one or more pieces of information pertaining to thepersonnel. The validation may comprise validating the identity of thepersonnel, the authenticity of the card, the credibility of the package,and the like. If the card information pertains to a user profile and/ora personnel profile with definitive actions requested, the control panelmay approve authorization 1020-a of the personnel and implement therequested actions in either profile.

If the card information falls into the unknown category, the controlpanel 105-b may request authorization 1020-b from a user via the device115-a. The authorization may comprise a preselected list of approval ordenial requests. The authorization may additionally comprise anopen-ended request for instructions. The user may use the device 115-ato provide and/or deny authorization 1025. The control panel 105-b maystore the authorization, or lack thereof, 1030 for future reference. Thecontrol panel 105-b may then transmit the authorization, or lackthereof, 1035 to the personnel. In some embodiments, if written approvalis required, the control panel 105-b may transmit approval 1040 to thepersonnel. For example, approval may be required if a signature upondelivery of a package is required, or other situations requiring homeowner approval. The approval may be transmitted using electronictechnologies such as an SMS, email, or the like.

FIG. 11 shows a system 1100 for use in smart door lock systems, inaccordance with various examples. System 1100 may include a doorbellcamera 1105 which may be an example of one or more aspects of a cardreader 155 described with reference to FIG. 1. The doorbell camera 1105may include aspects of the card reader but be further equipped with theability to detect more than just a card proximate an entry to a home.The doorbell camera 1105 may additionally include one or more aspects ofthe apparatus 205 described with reference to FIGS. 2-8. The system 1100may include a device 115-b and a door lock 160-b which may one exampleof a device 115 and a door lock 160 described with respect to FIG. 1.While this embodiment shows specific actions being taken by the doorbellcamera 1105, the same and/or similar and/or select actions may beperformed by a control panel and/or a remote server (e.g. control panel105 and/or remote server 145).

The doorbell camera 1105 may detect motion 1110 proximate an entry to aresidence. The motion may comprise human motion, vehicular motion,motion relating to nature, and the like. The motion may additionally bewithin a predetermined distance of a home. In some embodiments, thedoorbell camera 1105 may additionally detect noise proximate an entry tothe residence. The noise may be related to a human or may be related tonature. The doorbell camera 1105 may analyze the video and audioinformation to determine if there is a person proximate the entry to theresidence. If the doorbell camera 1105 determines the informationsatisfies one or more door lock activation parameters, the doorbellcamera 1105 may send a discovery signal 1115. The discovery signal maybe directed to a device 115-b which a person may be carrying. If thediscovery signal locates a device 115-b proximate the entry to theresidence, the discovery signal may request identification informationfrom the device 115-b.

The device 115-b may respond in kind by sending its identificationnumber 1120 to the doorbell camera 1105. The identification number maycomprise a mobile identification number, a mobile subscriptionidentification number, an open device identification number, deviceserial number, or the like. The doorbell camera 1105 may use theidentification number to identify the device 1125. Identifying thedevice may comprise linking the device to a user profile associated withan automation system. The doorbell camera 1105 may additionally be ableto link the device to a guest profile and/or a determine the device is aguest of the automation system by determining previous connections to awireless network associated with the automation system.

If the device is associated with a user profile, the doorbell camera1105 may send an activation command 1130 to the door lock 160-b. Thedoor lock 160-b may activate the lock. Activating the lock may compriseactivating at least a portion of the lock which may allow for tactileinput to take a follow-on action. The tactile input may comprise aperson entering a code into a touchscreen interface, entering a codeinto a user interface, touching the lock in a specific place, and thelike. In some embodiments, the door lock 160-b may activate prior to aperson arriving at the door lock 160-b.

FIG. 12 shows a system 1200 for use in smart card reader systems, inaccordance with various examples. System 1200 may include a card reader155-c which may be an example of one or more aspects of a card reader155 described with reference to FIGS. 1, 9, and/or 10, and/or theapparatus 205 of FIGS. 2-8. The system 1200 may additionally include anexemplary identification card 1225.

The card reader 155-c may comprise at least one sensing unit 1205, aspeaker 1210, and/or a microphone 1215. The sensing unit 1205 may be asingle sensing unit or multiple sensing units. The sensing unit 1205 maycomprise a proximity card reader, smart card reader, Wiegand card,Magnetic strip, barcode, photo ID reader, access control card reader,some combination thereof, or the like. The sensing unit 1205 mayadditionally comprise a camera unit. In some embodiments, a motionsensor 1220 may be proximate the sensing unit 1205. Activation of themotion sensor 1220 may activate the sensing unit 1205, microphone 1215,and/or speaker 1210.

The identification card 1225 may comprise one or more features. Theidentification card 1225 may include a company logo 1230, a company name1235, a photograph of the employee 1240, a name of the employee 1245,and a visual self-identifying code 1250. The identification card 1225may additionally include one or more obscure features which maywirelessly transmit one or more self-identifying features to the cardreader 155-c. For example, the identification card 1225 may comprise amagnetic strip, an RFID unit, or the like.

In this embodiment, the visual self-identifying code 1250 is displayedas a barcode. In additional embodiments, the visual self-identifyingcode 1250 may additionally include a QR code, a numerical code, analpha-numeric code, or the like. The visual self-identifying code 1250may be clearly visible, or may be embedded into the identification card1225. For example, the visual self-identifying code 1250 may be awatermark, or embedded into a photograph.

Personnel associated with the identification card 1225 may interact withthe card reader 155-c using any of the mediums provided. For example,the personnel may waive their identification card 1225 a predetermineddistance from the card reader 155-c and wait for select actions to betaken. In some embodiments, the personnel may request one or moreactions, or relay information using the microphone 1215. Additionally,the automation system may interface with the personnel using the speaker1210. The speaker 1210 may allow the automation system to audiblycommunicate with the personnel by dictating actions to the personnel orthe like.

In select embodiments, a remote user may use features of the card reader155-c as an intercom and may carry-on a conversation with the personneleven though the remote user may not be proximate a residence. This mayallow the user to facilitate actions at their residence without therequirement of being physically present.

In some instances, the card reader 155-c may additionally ascertaininformation from a mobile device. For example, if an individual orpersonnel is granted access to the automation system, the individualand/or personnel may have received a graphical code. The individualand/or personnel may display the graphical code on their mobile deviceand positioned their mobile device proximate the card reader 155-c. Thecard reader 155-c may scan the graphical code and take one or moreselect actions based at least in part on an interpretation of the code.

FIG. 13 is a flow chart illustrating an example of a method 1300 forsmart card reader systems, in accordance with various aspects of thepresent disclosure. For clarity, the method 1300 is described below withreference to aspects of one or more of the systems described herein. Insome examples, a control panel, card reader, server, or other device mayexecute one or more sets of codes to control the functional elements ofthe automation system to perform the functions described below.Additionally or alternatively, the control panel, card reader, server,or other device may perform one or more of the functions described belowusing special-purpose hardware.

At block 1305, the method 1300 may include determining a first presenceof a first card located proximate at least one entry to a location. Inone embodiment, a sensing unit may detect one or more cards proximate acard reader, where the card reader is located at or near the entry to alocation. For example, the location may be the front door to aresidence, and the card reader may be mounted near the front door, maybe part of a doorbell system, and/or may be a camera mounted near thefront door. The sensing unit may comprise a camera and/or one or moresignaling protocols as discussed previously. The sensing unit maytransmit the information regarding the detection of the card. At block1310, the method 1300 may include obtaining information related to anidentification of an entity associated with the first card, whereinobtaining information comprises identifying at least one feature of thefirst card. The features may comprise identifying information of thecard. Examples of the features may include a self-identifying code,facial recognition of a photograph identification card, company name,personnel name, visual code, and the like. The features may be detectedusing a camera or may be detected using one or more wireless means, orother detection means. In some embodiments, the self-identifying codemay comprise a signaling protocol which may wirelessly transfer a codeand/or other information. In another embodiment, the card may comprise apictorial representation of a self-identifying feature; for example, thecard may comprise a quick response code (QR code), a barcode, analphanumerical, numerical, or alphabetical code, a name, a photographsuch as a headshot, a logo, and the like. The code may identify anissuing company of the identification card. The operation(s) at blocks1305 and/or 1310 may be performed using the identify module 305described with reference to FIG. 3.

At block 1315, the method 1300 may include performing an authenticationof the first card, the authentication based at least in part onobtaining information related to the identification. Authentication mayinclude associating the features with one or more profiles. For example,the features may place the personnel associated with the card into threemain exemplary categories: a user of the automation system, servicepersonnel associated with the automation system, or unknown personnel.If the features are linked to service personnel associated with theautomation system, the personnel may be linked to personnel profiles.Personnel profiles may not be active user profile granting access to anautomation system. Instead, personnel profiles may be limited to veryspecific actions with specific parameters. For example, a delivery manmay access a vestibule within a five minute window of scanning a card.Cleaning personnel may access preapproved areas of a residence duringtheir cleaning window. A dog walker may have similar approvals. If thepersonnel and/or company associated with the identification card isunknown, follow on actions may be required involving user input todetermine appropriate actions to take. In some embodiments, therequested action may comprise validating one or more features of theidentification card such as company information, authenticity of theidentification card, personnel identity, package information, and thelike.

The user may have a user profile which may request specific actions whentheir card is detected. The actions may be specific to a residence andmay be programmed to rely on multiple factors such as time of year, timeof day, other personnel with the user, or the like. The operation(s) atblock 1315 may be performed using the permissions module 310 describedwith reference to FIG. 3.

At block 1320, the method 1300 may include taking an action based atleast in part on performing the authentication. In one embodiment, theaction may be to unlock the front door or to temporarily disable part ofa security system. In another embodiment, the action may be to send aperson associated with the card an entry code or other passkey to enableentry into the home. In yet another embodiment, the action may be torequest more information from an entity (e.g., a company associated withthe card, the person associated with the card and currently located nearthe card reader).

Thus, the method 1300 may provide for smart card reader systems relatingto automation/security systems. It should be noted that the method 1300is just one implementation and that the operations of the method 1300may be rearranged or otherwise modified such that other implementationsare possible.

FIG. 14 is a flow chart illustrating an example of a method 1400 forsmart card reader systems, in accordance with various aspects of thepresent disclosure. For clarity, the method 1400 is described below withreference to aspects of one or more of the systems described herein. Insome examples, a control panel, card reader, server, or other device mayexecute one or more sets of codes to control the functional elements ofthe automation system to perform the functions described below.Additionally or alternatively, the control panel, card reader, server,or other device may perform one or more of the functions described belowusing special-purpose hardware.

At block 1405, the method 1400 may include associating the one or morefeatures with a service company. The features may comprise any one ofthe self-identifying features associated with the identification cardsuch as a company logo, employee name, unique code, facial recognition,uniform, some combination thereof, and the like. The service company mayhave a personnel profile which may aid in the association. In someembodiments, if a user was expecting personnel to arrive, the user mayhave preprogrammed visit information into the automation system whichmay be outside of a personnel profile. In other embodiments, the method1400 may use other methods to associate the feature with a servicecompany. For example, the card may include a self-identifying featurewhich may positively transfer the company information. In anotherexample, a QR code may immediately transfer information pertaining tothe employee and company and provide information concerning the natureof the visit. The method 1400 may additionally include searching aninterne or other database to affirmatively identify the company. In someembodiments, associating the one or more features with a service companymay additionally comprise validating the identity of the personnel. Oncethe company is identified, the method 1400 may transmit information suchas a name of the employee and a photo of the employee proximate theentry way to confirm the named employee is the present personnel. Thismay prevent a person from using a stolen card to access the residence.The operation(s) at block 1405 may be performed using the permissionsmodule 310 described with reference to FIG. 3.

At block 1410, the method 1400 may include transmitting the one or morefeatures to a user of an automation system. For example, the featuresmay not link the personnel to a personnel profile which may requirefurther authorization from a user. The features sent to the user mayinclude images of the card, information concerning the company, andreasons for the visit as available. In some embodiments, the personnelmay verbally provide information which may be transcribed and sent tothe user. Transmitting the information may also include requesting oneor more actions from the user. The actions may comprise approval of thepersonnel's request, denying the personnel's request, requesting moreinformation, or setting up an intercom to directly communicate with thepersonnel. This may allow a remote user to control aspects of their homewithout the need to be physically present to facilitate information.

At block 1415, the method 1400 may include receiving confirmation toauthorize a delivery. If the user has the necessary information toauthorize the personnel's actions, the user may provide such. Theauthorization may grant restricted permissions to the automation system.The restricted permissions may pertain to the reason for the visit. Suchas unlocking a front door for a shortened duration, deactivating one ormore security features, and the like. Again, this may enable a user tofacilitate actions at a home without the need to be physically present.At block 1420, the method 1400 may also include authorizing a deliveryby the delivery company based at least in part on the associating. Thismay include unlocking a front and deactivating one or more sensorsproximate the necessary delivery parameters. In some embodiments, thismay additionally include using a speaker function to verbally relayinformation to the personnel. If a visual device is proximate thepersonnel, the visual device may additionally enable writtencommunications with the personnel.

At block 1425, the method 1400 may include transmitting one or moreconfirmations to the service company based at least in part on theauthorizing. If the delivery requires a signature, the personnel maytransmit, using the card reader, information pertaining to the delivery.The confirmation may be electronically sent to the personnel to and mayact as a signature of a recipient. The confirmation may comprise an SMSmessage, ping message, email, or the like. In some embodiments, the usermay remote e-sign a form and transmit the form to the personnel asconfirmation.

The operation(s) at blocks 1410, 1415, 1420, and/or 1425 may beperformed using the authorization module 315 described with reference toFIG. 3.

Thus, the method 1400 may provide for smart card reader systems relatingto automation/security systems. It should be noted that the method 1400is just one implementation and that the operations of the method 1400may be rearranged or otherwise modified such that other implementationsare possible.

FIG. 15 is a flow chart illustrating an example of a method 1500 forsmart card reader systems, in accordance with various aspects of thepresent disclosure. For clarity, the method 1500 is described below withreference to aspects of one or more of the systems described herein. Insome examples, a control panel, card reader, server, or other device mayexecute one or more sets of codes to control the functional elements ofthe automation system to perform the functions described below.Additionally or alternatively, the control panel, card reader, server,or other device may perform one or more of the functions described belowusing special-purpose hardware.

At block 1505, the method 1500 may include receiving informationregarding a detection of more than one card proximate the at least oneentry to the residence. This may include multiple personnel scanningtheir card over the card reader, or the card reader may sense the cardspresence wirelessly. The cards may all be similar or may be different.For example, multiple different types of personnel and/or users may beproximate the entry. The method 1500 may use means to require theidentification cards of the personnel. For example, a camera proximatean entry way may sense the presence of multiple people and may requirethe scanning of each card prior to any action taken by an automationsystem.

At block 1510, the method 1500 may include determining a profileassociated with each card. The profiles may comprise a user profileand/or a personnel profile. In some embodiments, at least one card maynot be associated with any profile. Using the one or moreself-identifying features, the method 1500 may determine which personnelare proximate the entry to the residence by linking the profile to auser.

The operation(s) at blocks 1505 and/or 1510 may be performed using theidentify module 305 described with reference to FIG. 3.

At block 1515, the method 1500 may include determining a ranking of theprofiles. For example, each personnel may have a user profile associatedwith the automation system. The profiles profile may have a senioritylevel and/or ranking within the automation system. An administratorand/or parent may not want actions taken that perhaps a teenager mightdesire. Thus, at block 1520, the method 1500 may include performing oneor more actions based at least in part on the ranking of the profiles.The most sensor person in the group may take priority and their profilepreferences may be respected when a group of users is proximate an entryto the residence. In some embodiments, if at least one card is notassociated with a profile, actions taken may be based on one or moreprofiles associated with at least one other card. For example, a user ofthe automation system may have the ability to admit any personnel to theresidence and a ranking or other action may not be required. However, ifat least one user it not present upon the multiple of personnel, a usermay need to authorize any actions taken by the automation system, evenif at least one card is associated with a personnel profile. However, insome embodiments, the personnel profile may enable the personnel to havemultiple people enter the home, such as a cleaning service and the like.

The operation(s) at block 1515 may be performed using the permissionsmodule 310 described with reference to FIG. 3.

Thus, the method 1500 may provide for smart card reader systems relatingto automation/security systems. It should be noted that the method 1500is just one implementation and that the operations of the method 1500may be rearranged or otherwise modified such that other implementationsare possible.

FIG. 16 is a flow chart illustrating an example of a method 1600 forshort-term access codes to automation systems, in accordance withvarious aspects of the present disclosure. For clarity, the method 1600is described below with reference to aspects of one or more of thesystems described herein. In some examples, a control panel, cardreader, server, or other device may execute one or more sets of codes tocontrol the functional elements of the automation system to perform thefunctions described below. Additionally or alternatively, the controlpanel, card reader, server, or other device may perform one or more ofthe functions described below using special-purpose hardware.

At block 1605, the method 1600 may include issuing a short-term entrycode to an individual. The code may be requested by a user. The user maynot wish for the individual to have a user profile with associatedaccess. Instead, the user may wish the individual to enter the premisesfor a single time. The individual may need to borrow an item from theuser, return an item, or perform a function such as feeding a pet,watering plants, and the like. The short-term entry code may compriseentry parameters. The entry parameters may limit a day the code may beredeemed, a time of day, the areas that may be accessed, and the like.The code may be a QR code. The individual may redeem the QR code bypresenting the code to a camera proximate an entry to the residence. Thecamera may be a part of a card reader proximate the entry.

The operation(s) at block 1605 may be performed using issue module 505described with reference to FIG. 5.

At block 1610, the method 1600 may include receiving a notification thatthe short-term entry code is attempting to be redeemed. The individualmay have triggered a camera proximate the entry to the residence. Theindividual may have presented the QR code to the camera. At block 1615,the method 1600 may include validating the short-term entry parametersassociated with the short-term entry code. At block 1620, the method1600 may validate the short-term entry parameters are satisfied. If theentry parameters are satisfied, at block 1620, the method 1600 mayauthenticate an action requested by the individual. The action may beequivalent to the action permitted by the user. If the entry parametersare not satisfied, at block 1630, the method 1600 may deny the actionrequested by the individual based at least in part on the validating. Insome instances, if the parameters are not validated, the method 1600 mayrequest information from the issuing user to determine if the actionshould be permitted. If the user permits the action, the action may beauthorized.

The operation(s) at blocks 1605-1630 may be performed using theredemption module 510 described with reference to FIG. 5.

Thus, the method 1600 may provide for smart card reader systems relatingto automation/security systems. It should be noted that the method 1600is just one implementation and that the operations of the method 1600may be rearranged or otherwise modified such that other implementationsare possible.

FIG. 17 is a flow chart illustrating an example of a method 1700 forsmart personnel systems, in accordance with various aspects of thepresent disclosure. For clarity, the method 1700 is described below withreference to aspects of one or more of the systems described herein. Insome examples, a control panel, card reader, server, or other device mayexecute one or more sets of codes to control the functional elements ofthe automation system to perform the functions described below.Additionally or alternatively, the control panel, card reader, server,or other device may perform one or more of the functions described belowusing special-purpose hardware.

At block 1705, the method 1700 may include receiving informationregarding a presence of a service personnel proximate an entry to aresidence. The service personnel may initiate the process. The servicepersonnel may recognize the residence as a being associated with anautomation system and may trigger the system to begin an approvalprocess. In another instance, a camera proximate the entry to theresidence may detect the presence of a service personnel. The camera maydetect a uniform, a package, a service truck, or the like.

At block 1710, the method 1700 may include determining a companyassociated with the service personnel based at least in part on thereceiving. The method 1700 may detect a logo associated with thepersonnel and determine a company from the logo. Additionally, a barcodemay be scanned and may identify the company associated with thepersonnel. If the personnel initiated the process, the personnel mayself-identify a company. In some embodiments, the personnel mayadditionally provide a validation code to use in authenticating thepersonnel. In some instances, a device belonging to the personnel may beidentified. The device may provide identifying information such ascompany information, personnel information, or the like.

The operation(s) at blocks 1705-1710 may be performed using theinitiation module 705 described with reference to FIG. 7.

At block 1715, the method 1700 may include validating the authenticityof the personnel based at least in part on the determining. Once acompany is determined, the method 1700 may contact the company tovalidate the identity of the personnel. This may all be doneautomatically. A message may be sent to the company to validate thepersonnel. The message may request the company to validate the presenceof the personnel at the residence. For example, a delivery company mayvalidate that personnel are currently en route to deliver a package tothe residence and that the personnel should be at the residence within apredetermined time frame. The company may provide information to theautomation system detailing the necessary steps to be taken by theservice personnel and requesting authorization for the actions.

The operation(s) at block 1715 may be performed using the companyverification module 710 described with reference to FIG. 7.

At block 1720, the method 1700 may include authenticating an action tobe taken by the service personnel based at least in part on thevalidating. The authentication may comprise several actions. Forexample, the method 1700 may provide authentication to the servicepersonnel to leave a package at an entry to the residence. Theauthentication may comprise enabling the personnel access to a portionof the residence or to approve an action to be taken on the grounds. Theactions taken on the grounds may comprise a grounds crew, a dog walker,or the like.

The operation(s) at block 1720 may be performed using the executionmodule 720 described with reference to FIG. 7.

Thus, the method 1700 may provide for smart card reader systems relatingto automation/security systems. It should be noted that the method 1700is just one implementation and that the operations of the method 1700may be rearranged or otherwise modified such that other implementationsare possible.

FIG. 18 is a flow chart illustrating an example of a method 1800 forsmart personnel systems, in accordance with various aspects of thepresent disclosure. For clarity, the method 1800 is described below withreference to aspects of one or more of the systems described herein. Insome examples, a control panel, card reader, server, or other device mayexecute one or more sets of codes to control the functional elements ofthe automation system to perform the functions described below.Additionally or alternatively, the control panel, card reader, server,or other device may perform one or more of the functions described belowusing special-purpose hardware.

At block 1805, the method 1800 may include receiving informationdetailing a reason for the visit by the service personnel. If theservice personnel initiates the approval, the service personnel maycommunicate the reason for the visit in the initiation. In someembodiments, the reason for the visit may be deduced from variousindicators. For example, the company may indicate the reason for thevisit. A delivery company is not likely going to be doing work on thegrounds. If the reason for the visit is not clear, the personnel may berequested to provide more information and details pertaining to theirvisit. This may include a company the service personnel works for, thereason for their visit, the duration of their visit, approvals requiredto fulfill the purpose of the visit, and the like.

The operation(s) at block 1805 may be performed using the initiationmodule 705 described with reference to FIG. 7.

At block 1810, the method 1800 may include transmitting a name of thecompany and the reason for the visit to a user of the automation system.At block 1815, the method 1800 may include requesting input from theuser on which actions to take based at least in part on thetransmitting. The user may want delivery personnel to leave a packageproximate the front door or proximate a garage or shed if there isinclement weather. Likewise, the user may wish to allow the deliverypersonnel to leave the package inside the home if the user will not behome for an extended period of time. The user may allow a cleaningcompany to enter the residence and begin cleaning the home. If theresidence has secure rooms with confidential data, the user may have theadditional option of securing those rooms. For example, the user mayremotely enable the automation system to lock specific rooms and denypersonnel entry into those areas. The user may also activate amonitoring system and record footage of the personnel while they are inthe home. In other instances, the user may reject any actions to betaken by personnel. The user may not wish for any service personnel toenter the home or may not wish to sign for a package or the like.

The operation(s) at blocks 1810-1815 may be performed using the userverification module 715 described with reference to FIG. 7.

At block 1820, the method 1800 may include transmitting theauthentication to the service personnel, wherein the authenticationserves as a signature on a delivery. Some packages require a signatureupon delivery. However, it can be inconvenient for a user to be home.Instead, an authorization to leave the package at the residence mayserve as a signature on the delivery and may negate the need for theuser to be home during the time of delivery. Authentication to theservice personnel may additionally comprise transmitting a short-termaccess code to the personnel to allow the personnel to access at least aportion of the automation system.

The operation(s) at block 1820 may be performed using the executionmodule 720 described with reference to FIG. 7.

Thus, the method 1800 may provide for smart card reader systems relatingto automation/security systems. It should be noted that the method 1800is just one implementation and that the operations of the method 1800may be rearranged or otherwise modified such that other implementationsare possible.

FIG. 19 is a flow chart illustrating an example of a method 1900 forsmart door lock systems, in accordance with various aspects of thepresent disclosure. For clarity, the method 1900 is described below withreference to aspects of one or more of the systems described herein. Insome examples, a control panel, card reader, server, a door lock, orother device may execute one or more sets of codes to control thefunctional elements of the automation system to perform the functionsdescribed below. Additionally or alternatively, the control panel, cardreader, server, door lock, or other device may perform one or more ofthe functions described below using special-purpose hardware.

At block 1905, the method 1900 may include receiving informationregarding a detection of motion proximate an entry to a residence. Themotion may comprise any type of motion. The method 1900 may analyze themotion to determine a cause of the motion. For example, naturaloccurrences may cause motion such as weather. Animals may additionallyactivate a motion detection sensor. The method 1900 may determine whenthe motion is related to a human, such as a person walking, a vehiclemoving, and the like. The method 1900 determine when human motion iswithin a predetermined distance of a home. For example, the motion maybe in a yard, in a driveway, on a walkway, or the like. If the motion isrelated to a person and is within a predetermined distance from a home,one or more motion parameters may be satisfied.

The operation(s) at block 1905 may be performed using the motion module810 described with reference to FIG. 8.

At block 1910, the method 1900 may identify a device proximate the entryto the residence based at least in part on the receiving. At block 1915,the method 1900 may include validating an authenticity of the identifieddevice. The device may have an identification number which may beconnected to a user profile, a guest profile, or the like. By linkingthe device to a profile, the device may be validated. If the device isnot linked to any profile, or has previously connected to the automationsystem, the automation system may alert a user about an unknown personapproaching a door.

The operation(s) at blocks 1910-1915 may be performed using the deviceauthentication module 815 described with reference to FIG. 8.

At block 1920, the method 1900 may activating a door-lock feature basedat least in part on the validating, wherein the door-lock feature isproximate the entry to the residence. The door-lock feature may compriseone or more tactile inputs proximate a door lock (e.g. door lock 160).Activating the door lock may cause the door lock to turn on and preparefor tactile input from a person. Activating the door lock prior to aperson arriving at the entry may prevent a person from having to waitfor the door lock to turn on before using the door lock to enter aresidence.

The operation(s) at block 1920 may be performed using the door-lockactivation module 820 described with reference to FIG. 8.

Thus, the method 1900 may provide for smart door lock systems relatingto automation/security systems. It should be noted that the method 1900is just one implementation and that the operations of the method 1900may be rearranged or otherwise modified such that other implementationsare possible.

FIG. 20 is a flow chart illustrating an example of a method 2000 forsmart door lock systems, in accordance with various aspects of thepresent disclosure. For clarity, the method 2000 is described below withreference to aspects of one or more of the systems described herein. Insome examples, a control panel, card reader, server, a door lock, orother device may execute one or more sets of codes to control thefunctional elements of the automation system to perform the functionsdescribed below. Additionally or alternatively, the control panel, cardreader, server, door lock, or other device may perform one or more ofthe functions described below using special-purpose hardware.

At block 2005, the method 2000 may include identifying human motionproximate the entry to the residence. The method 2000 may discern fromdifferent types of motion detected by a doorbell camera proximate theentry. The doorbell camera may be able to determine when a person isproximate the entry and when an animal such as a squirrel has passed by.In some embodiments, the method 2000 may additionally detect one or moresounds proximate an entry and may discern between human generated soundsand other sounds. The sounds may enable the method 2000 to determine aperson is proximate an entry to the residence prior to the person cominginto the view of the doorbell camera.

The operation(s) at block 2005 may be performed using the motion module810 described with reference to FIG. 8.

At block 2010, the method 2000 may include sending a discovery signal todetect one or more devices proximate the entry to the residence. Thediscovery signal may only detect devices outside of a home.Additionally, the discovery signal may only detect devices within apredetermined range. The discovery signal may include of ANT+,Bluetooth, cellular, IEE protocols, ISA protocols, infraredcommunication system, near field communication (NFC), radio frequencyidentification (RFID), wireless personal are network (WPAN) protocols,ultra-wide band (UWB) protocols, Wi-Fi, wireless highway addressableremote transducer (HART) protocols, Wireless USB, Zigbee, Z-wave, somecombination thereof, and the like. The device may respond to thediscovery signal with an identification number associated with thedevice. If multiple devices are detected, each device may respond withits identification number. If no devices are detected, the method 2000may repeatedly send out a discovery signal for a predetermined period oftime. For example, the method 2000 may send out a continuous signal forfive minutes. In other embodiments, the discovery signal may be sentperiodically such as every ten seconds for three minutes. Any variationis imaginable, as long as the signal is sent for a predetermined timeperiod on a predetermined basis.

At block 2015, the method 2000 may include associating the identifieddevice with a user profile, wherein the user profile is linked to anautomation system. The identification number may link the device to auser profile. In other embodiments, the identification number may linkthe device to a guest profile or a previous guest of the automationsystem. If the identification number is not linked to any profile, themethod 2000 may alert a user of the automation system that an unknownperson is approaching the door.

The operation(s) at blocks 2010-2015 may be performed using the deviceauthentication module 815 described with reference to FIG. 8.

At block 2020, the method 2000 may include unlocking a door based atleast in part on the associating. If the device is linked to a userprofile, the profile may include instructions to unlock the doorproximate the door lock. Unlocking the door may allow a user to walkinto the residence without the need to use a key code, key, or otherauthentication method. Unlocking the door may include first activatingdoor lock then sending a command to the door lock to unlock.

The operation(s) at block 2020 may be performed using the door-lockactivation module 820 described with reference to FIG. 8.

Thus, the method 2000 may provide for smart door lock systems relatingto automation/security systems. It should be noted that the method 2000is just one implementation and that the operations of the method 2000may be rearranged or otherwise modified such that other implementationsare possible.

In some examples, aspects from two or more of the methods 1300-2000 maybe combined and/or separated. It should be noted that the methods1300-2000 are just example implementations, and that the operations ofthe methods 1300-2000 may be rearranged or otherwise modified such thatother implementations are possible.

The detailed description set forth above in connection with the appendeddrawings describes examples and does not represent the only instancesthat may be implemented or that are within the scope of the claims. Theterms “example” and “exemplary,” when used in this description, mean“serving as an example, instance, or illustration,” and not “preferred”or “advantageous over other examples.” The detailed description includesspecific details for the purpose of providing an understanding of thedescribed techniques. These techniques, however, may be practicedwithout these specific details. In some instances, known structures andapparatuses are shown in block diagram form in order to avoid obscuringthe concepts of the described examples.

Information and signals may be represented using any of a variety ofdifferent technologies and techniques. For example, data, instructions,commands, information, signals, bits, symbols, and chips that may bereferenced throughout the above description may be represented byvoltages, currents, electromagnetic waves, magnetic fields or particles,optical fields or particles, or any combination thereof.

The various illustrative blocks and components described in connectionwith this disclosure may be implemented or performed with ageneral-purpose processor, a digital signal processor (DSP), an ASIC, anFPGA or other programmable logic device, discrete gate or transistorlogic, discrete hardware components, or any combination thereof designedto perform the functions described herein. A general-purpose processormay be a microprocessor, but in the alternative, the processor may beany conventional processor, controller, microcontroller, and/or statemachine. A processor may also be implemented as a combination ofcomputing devices, e.g., a combination of a DSP and a microprocessor,multiple microprocessors, one or more microprocessors in conjunctionwith a DSP core, and/or any other such configuration.

The functions described herein may be implemented in hardware, softwareexecuted by a processor, firmware, or any combination thereof. Ifimplemented in software executed by a processor, the functions may bestored on or transmitted over as one or more instructions or code on acomputer-readable medium. Other examples and implementations are withinthe scope and spirit of the disclosure and appended claims. For example,due to the nature of software, functions described above can beimplemented using software executed by a processor, hardware, firmware,hardwiring, or combinations of any of these. Features implementingfunctions may also be physically located at various positions, includingbeing distributed such that portions of functions are implemented atdifferent physical locations.

As used herein, including in the claims, the term “and/or,” when used ina list of two or more items, means that any one of the listed items canbe employed by itself or any combination of two or more of the listeditems can be employed. For example, if a composition is described ascontaining components A, B, and/or C, the composition can contain Aalone; B alone; C alone; A and B in combination; A and C in combination;B and C in combination; or A, B, and C in combination. Also, as usedherein, including in the claims, “or” as used in a list of items (forexample, a list of items prefaced by a phrase such as “at least one of”or “one or more of”) indicates a disjunctive list such that, forexample, a list of “at least one of A, B, or C” means A or B or C or ABor AC or BC or ABC (i.e., A and B and C).

In addition, any disclosure of components contained within othercomponents or separate from other components should be consideredexemplary because multiple other architectures may potentially beimplemented to achieve the same functionality, including incorporatingall, most, and/or some elements as part of one or more unitarystructures and/or separate structures.

Computer-readable media includes both computer storage media andcommunication media including any medium that facilitates transfer of acomputer program from one place to another. A storage medium may be anyavailable medium that can be accessed by a general purpose or specialpurpose computer. By way of example, and not limitation,computer-readable media can comprise RAM, ROM, EEPROM, flash memory,CD-ROM, DVD, or other optical disk storage, magnetic disk storage orother magnetic storage devices, or any other medium that can be used tocarry or store desired program code means in the form of instructions ordata structures and that can be accessed by a general-purpose orspecial-purpose computer, or a general-purpose or special-purposeprocessor. Also, any connection is properly termed a computer-readablemedium. For example, if the software is transmitted from a website,server, or other remote source using a coaxial cable, fiber optic cable,twisted pair, digital subscriber line (DSL), or wireless technologiessuch as infrared, radio, and microwave, then the coaxial cable, fiberoptic cable, twisted pair, DSL, or wireless technologies such asinfrared, radio, and microwave are included in the definition of medium.Disk and disc, as used herein, include compact disc (CD), laser disc,optical disc, digital versatile disc (DVD), floppy disk, and Blu-raydisc where disks usually reproduce data magnetically, while discsreproduce data optically with lasers. Combinations of the above are alsoincluded within the scope of computer-readable media.

The previous description of the disclosure is provided to enable aperson skilled in the art to make or use the disclosure. Variousmodifications to the disclosure will be readily apparent to thoseskilled in the art, and the generic principles defined herein may beapplied to other variations without departing from the scope of thedisclosure. Thus, the disclosure is not to be limited to the examplesand designs described herein but is to be accorded the broadest scopeconsistent with the principles and novel features disclosed.

This disclosure may specifically apply to security system applications.This disclosure may specifically apply to automation systemapplications. In some embodiments, the concepts, the technicaldescriptions, the features, the methods, the ideas, and/or thedescriptions may specifically apply to security and/or automation systemapplications. Distinct advantages of such systems for these specificapplications are apparent from this disclosure.

The process parameters, actions, and steps described and/or illustratedin this disclosure are given by way of example only and can be varied asdesired. For example, while the steps illustrated and/or described maybe shown or discussed in a particular order, these steps do notnecessarily need to be performed in the order illustrated or discussed.The various exemplary methods described and/or illustrated here may alsoomit one or more of the steps described or illustrated here or includeadditional steps in addition to those disclosed.

Furthermore, while various embodiments have been described and/orillustrated here in the context of fully functional computing systems,one or more of these exemplary embodiments may be distributed as aprogram product in a variety of forms, regardless of the particular typeof computer-readable media used to actually carry out the distribution.The embodiments disclosed herein may also be implemented using softwaremodules that perform certain tasks. These software modules may includescript, batch, or other executable files that may be stored on acomputer-readable storage medium or in a computing system. In someembodiments, these software modules may permit and/or instruct acomputing system to perform one or more of the exemplary embodimentsdisclosed here.

This description, for purposes of explanation, has been described withreference to specific embodiments. The illustrative discussions above,however, are not intended to be exhaustive or limit the present systemsand methods to the precise forms discussed. Many modifications andvariations are possible in view of the above teachings. The embodimentswere chosen and described in order to explain the principles of thepresent systems and methods and their practical applications, to enableothers skilled in the art to utilize the present systems, apparatus, andmethods and various embodiments with various modifications as may besuited to the particular use contemplated.

What is claimed is:
 1. A method for a security and/or automation system,comprising: detecting motion of an entity proximate at least one entryto a location; transmitting a discovery signal based at least in part onthe detected motion; determining a first presence of a first cardlocated proximate the at least one entry to the location based at leastin part on the discovery signal; obtaining information related to anidentification of the entity associated with the first card, whereinobtaining information comprises identifying at least one feature of thefirst card; performing an authentication of the first card, theauthentication based at least in part on obtaining information relatedto the identification; and taking an action based at least in part onperforming the authentication.
 2. The method of claim 1, wherein takingthe action further comprises: unlocking a door and/or disabling at leastpart of a security system.
 3. The method of claim 1, further comprising:before taking the action, sending information related to performing theauthentication of the first card to a user associated with the securityand/or automation system; and receiving input from the user on whichactions to take based at least in part on the information.
 4. The methodof claim 1, wherein performing the authentication of the first cardfurther comprises: analyzing data associated with an entity profile. 5.The method of claim 4, further comprising: receiving additionalinformation from the entity; and performing a second authentication ofthe first card, the authentication based at least in part on theadditional information, wherein performing the authentication furthercomprises requesting additional information related to the first card.6. The method of claim 4, wherein analyzing data associated with theentity profile further comprises: analyzing data associated with aservice company.
 7. The method of claim 6, wherein taking the actionfurther comprises: authorizing a delivery to be delivered proximate toan entry to the location by the service company based at least in parton performing the authentication of the first card.
 8. The method ofclaim 7, wherein authorizing the delivery further comprises: sending anentry code to a person associated with the first card.
 9. The method ofclaim 8, wherein sending the entry code further comprises: sending agraphic to a portable electronic device associated with the person,wherein the graphic may be scanned by a second electronic device locatedproximate the entry to the location.
 10. The method of claim 7, whereinauthorizing the delivery further comprises sending an indication of areceipt.
 11. The method of claim 7, wherein in authorizing the deliveryfurther comprises: unlocking a door at the entry to the location and/ordisabling at least part of a security system; and authoring the servicecompany to place the delivery in an interior room associated with thelocation.
 12. The method of claim 1, wherein determining the firstpresence of the first card further comprises: emitting a discoverysignal.
 13. The method of claim 12, wherein emitting the discoverysignal further comprises: emitting a directional signal thatcommunicates with a device external to the location.
 14. The method ofclaim 1, wherein detecting the first presence of the first card furthercomprises: obtaining identification information from the first card,wherein the first card may be at least one of: a radio frequencyidentification card, or a photo identification card, or an electronicchip card, or a card comprising a magnetic strip, or a smart card, or acard comprising a quick response code, or a card comprising a bar code,or a combination thereof.
 15. The method of claim 1, further comprising:determining a second presence of a second card proximate the entry tothe location; wherein obtaining information further comprises obtaininginformation related to a second identification of a second entityassociated with the second card; performing an authentication of thesecond card, the authentication based at least in part on obtaininginformation related to the second identification; creating a ranking ofthe entity and the second entity; and wherein taking the action furthercomprises taking the action based at least in part on the ranking. 16.The method of claim 15, further comprising: determining the first cardhas been previously authorized; and wherein taking the action furthercomprises taking a pre-determined action based at least in part ondetermining the first card has been previously authorized.
 17. Themethod of claim 1, further comprising: determining an indication of asubsequent presence of the first card, the subsequent presence occurringwithin a pre-determined time from the first presence.
 18. An apparatusfor security and/or automation systems, comprising: a processor; memoryin electronic communication with the processor; and instructions storedin the memory, the instructions causing the processor to: determine afirst presence of a first card proximate an entry to a location; obtaininformation related to an identification of an entity associated withthe first card; perform an authentication on the first card, theauthentication based at least in part on obtaining information relatedto the identification; determining a second presence of a second entityproximate the entry to the location; creating a ranking of the entityand the second entity; and take an action based at least in part onperforming the authentication and the ranking.
 19. The apparatus ofclaim 18, wherein the instructions further cause the processor to:determine a second presence of a second card proximate the entry to thelocation; wherein when the processor obtains information, theinstructions further cause the processor to obtain information relatedto a second identification of a second entity associated with the secondcard; perform an authentication of the second card, the authenticationbased at least in part on obtaining information related to the secondidentification; create a ranking of the entity and the second entity;and wherein when the processor takes the action, the instructionsfurther cause the processor to take the action based at least in part onthe ranking.
 20. A non-transitory computer-readable medium storingcomputer-executable code, the code executable by a processor to:determine a presence of a card proximate an entry to a location; obtaininformation related to an identification of an entity associated withthe card; perform an authentication on the card, the authenticationbased at least in part on obtaining information related to theidentification; determine a second presence of a second card proximatethe entry to the location; obtain information related to a secondidentification of a second entity associated with the second card;perform an authentication on the second card, the authentication basedat least in part on obtaining information related to the secondidentification; create a ranking of the entity and the second entity;and take an action based at least in part on performing theauthentication and the ranking.