Doorbell communication systems and methods

ABSTRACT

Doorbells can include a speaker and a visitor detection system having at least one of a button, a camera, and a motion detector. The speaker of the doorbell can be configurable to emit a first sound in response to the visitor detection system detecting a first indication of a visitor&#39;s presence. As well, the speaker of the doorbell can be configurable to emit a second sound in response to the visitor detection system detecting a second indication of the visitor&#39;s presence.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional PatentApplication No. 62/127,660; filed Mar. 3, 2015; and entitled DOORBELLCOMMUNICATION SYSTEMS AND METHODS. The entire contents of PatentApplication No. 62/127,660 are incorporated by reference herein.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/589,830; filed Jan.5, 2015; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. Theentire contents of patent application Ser. No. 14/589,830 areincorporated by reference herein.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/502,601; filed Sep.30, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. Theentire contents of patent application Ser. No. 14/502,601 areincorporated by reference herein.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/492,809; filed Sep.22, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; whichclaims the benefit of and is a continuation-in-part of U.S.Nonprovisional patent application Ser. No. 14/275,811; filed May 12,2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S.Pat. No. 8,872,915); which claims the benefit of and is acontinuation-in-part of U.S. Nonprovisional patent application Ser. No.14/142,839; filed Dec. 28, 2013; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS (now U.S. Pat. No. 8,842,180); which claims thebenefit of and is a continuation-in-part of U.S. Nonprovisional patentapplication Ser. No. 14/099,888; filed Dec. 6, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S. Pat. No.8,823,795); which claims the benefit of and is a continuation of U.S.Nonprovisional patent application Ser. No. 14/098,772; filed Dec. 6,2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S.Pat. No. 8,780,201); which claims the benefit of U.S. Provisional PatentApplication No. 61/872,439; filed Aug. 30, 2013; and entitled DOORBELLCOMMUNICATION SYSTEMS AND METHODS; and also claims the benefit of U.S.Provisional Patent Application No. 61/859,070; filed Jul. 26, 2013; andentitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. The entire contentsof patent application Ser. No. 14/492,809; U.S. Pat. No. 8,872,915; U.S.Pat. No. 8,842,180; U.S. Pat. No. 8,823,795; U.S. Pat. No. 8,780,201;Patent Application No. 61/872,439; and Patent Application No. 61/859,070are incorporated by reference herein.

The entire contents of the following application are incorporated hereinby reference: International Application No. PCT/US14/53506; filed Aug.29, 2014 with the U.S. Patent and Trademark Office; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS.

The entire contents of the following application are incorporated hereinby reference: International Application No. PCT/US14/47622; filed Jul.22, 2014 with the U.S. Patent and Trademark Office; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS.

BACKGROUND

1. Field

Various embodiments disclosed herein relate to doorbells. Certainembodiments relate to communication between a person near a doorbell anda person in another location.

2. Description of Related Art

Homes, offices, and other buildings sometimes include communication andsurveillance systems to enable friendly visitors to summon occupants ofthe buildings and to deter unwanted visitors. Communication andsurveillance systems can include video cameras and doorbells.

Doorbells can enable a person located outside of an entry point, such asa door, to alert a person inside of an entry point that someone outsidewould like to talk to someone inside. Doorbells sometimes include abutton located near a door, such as a front door, side door, or backdoor of a home, office, dwelling, warehouse, building, or structure.Doorbells are sometimes used near a gate or some other entrance to apartially enclosed area. Pushing the doorbell sometimes causes a chimeor other alerting sound to be emitted. In some cases, this alertingsound can typically be heard within a short distance from the entrypoint or sound source. For example, a homeowner located remotely fromher home likely would not be able to hear the alerting sound, and thus,would not be aware that someone is ringing her doorbell. Thus, there isa need for devices and methods to alert remotely located individualsthat someone seeks the attention of the homeowner, tenant, buildingguardian, or steward.

SUMMARY

This disclosure includes methods of operating doorbell systems. Thedoorbell system can comprise a speaker and a visitor detection system.The visitor detection system can comprise at least one of a button, acamera, and a motion detector. The method can comprise receiving a firstindication of a visitor's presence. In response to receiving the firstindication of the visitor's presence, the method can further includeemitting a first sound with the speaker.

Methods can also comprise receiving a second indication of a visitor'spresence. In response to receiving the second indication of thevisitor's presence, some methods can also comprise emitting a secondsound with the speaker. The doorbell system can be attached to a home ofa homeowner.

In embodiments, the visitor detection system can comprise the button,and the first indication can comprise an indication that the button hasbeen pressed. As well, in embodiments, the visitor detection system cancomprise at least one of the camera and the motion detector, and thesecond indication can comprise an indication of motion of the visitor.

This disclosure also includes a method of operating a doorbell system.The doorbell system can comprise a speaker and a visitor detectionsystem. The visitor detection system can comprise at least one of abutton, a camera, and a motion detector. The method can comprisereceiving an indication of a visitor's presence at a first time of day.In response to receiving the indication of the visitor's presence at thefirst time of day, the method can include emitting a first sound withthe speaker.

Methods can comprise receiving an indication of the visitor's presenceat a second time of day. In response to receiving the indication of thevisitor's presence at the second time of day, methods can compriseemitting a second sound with the speaker. The first time of day canoccur between sunrise and sunset. The second time of day can occurbetween sunset and sunrise.

The first sound can comprise an audible message spoken by a voice.Methods can include downloading at least one of the first sound and thesecond sound from a remote computer.

This disclosure also includes a doorbell system, comprising a housing, avisitor detection system coupled to the housing, and a speaker coupledto the housing. The visitor detection system can comprise at least oneof a button, a camera, and a motion detector. The speaker can beconfigurable to emit a first sound in response to the visitor detectionsystem detecting an indication of a visitor's presence.

In some embodiments, the indication can be a first indication, and thespeaker can be configurable to emit a second sound in response to thevisitor detection system detecting a second indication of the visitor'spresence.

The visitor detection system can comprise the button, and the firstindication can comprise an indication that the button has been pressed.The visitor detection system can comprise at least one of the camera andthe motion detector, and the second indication can comprise anindication of motion of the visitor.

The speaker can be configurable to emit a second sound in response tothe visitor detection system detecting the indication of the visitor'spresence at a second time of day. The second time of day can occurbetween sunset and sunrise. The second sound can comprise an audiblemessage spoken by a voice.

The indication of the visitor's presence can occur at a first time ofday. The first time of day can occur between sunrise and sunset, and thefirst sound can comprise an audible message spoken by a voice.

The disclosure includes a method of operating a doorbell comprising aspeaker and a visitor detection system having at least one of a button,a camera, and a motion detector. The method can comprise detecting afirst indication of a first visitor, and then in response to detectingthe first indication, emitting a first sound with the speaker of thedoorbell. As well, the method can comprise detecting a second indicationof a second visitor, and then in response to detecting the secondindication, emitting a second sound with the speaker of the doorbell,wherein the second sound is audibly different than the first sound.

Methods can comprise selecting the first sound and the second sound witha remote computing device that is configured to receive alerts from thedoorbell, and wirelessly sending the first sound and the second sound tothe doorbell.

Some methods can include electing to emit the first sound or the secondsound based on a time at which the doorbell detects the firstindication. Methods can comprise detecting an amount of light, andelecting to emit the first sound or the second sound based on the amountof light. As well, methods can further comprise electing to emit thefirst sound or the second sound based on whether the doorbell detectedthe first indication or the second indication using the button, thecamera, or the motion detector.

The first indication can be detected by at least one of the camera andthe motion detector, the second indication can be a first press of thebutton. The doorbell can emit the first sound after detecting the firstindication and prior to the first press, and then in response to thefirst press, the doorbell can emit the second sound, wherein the firstvisitor is a first person as the first person approaches the button, andthe second visitor is the first person upon pressing the button.

Methods can further include emitting the first sound in response todetecting the first indication by at least one of the camera and themotion detector, and emitting the second sound in response to detectinga first press of the button.

As well, methods can further include recording the first sound with aremote computing device, entering an expiration date of the first soundwith the remote computing device, sending wirelessly the first sound andthe expiration date from the remote computing device to the doorbell,and ceasing to emit the first sound from the doorbell by the expirationdate.

Methods can further include recording the first sound with a remotecomputing device that is configured to receive alerts from the doorbell,entering at least one sound emitting parameter into the remote computingdevice, sending wirelessly the first sound and the sound emittingparameter from the remote computing device to the doorbell, and emittingthe first sound from the doorbell according to the sound emittingparameter.

In embodiments the sound emitting parameter comprises an identity of thefirst visitor. In embodiments the sound emitting parameter comprisesdata associated with the first visitor. In embodiments the soundemitting parameter comprises a time. In embodiments the sound emittingparameter comprises a location of a user of the remote computing device.

Methods can further include selecting sound emitting parameters with aremote computing device, sending wirelessly the sound emittingparameters to the doorbell, the doorbell automatically downloading athird sound based on the sound emitting parameters, and the doorbellemitting the third sound from the speaker according to rules associatedwith the third sound.

The embodiments described above include many optional features andaspects. Features and aspects of the embodiments can be combined.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 illustrates a front view of a communication system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates an embodiment in which a security system is connectedto a building, according to some embodiments.

FIG. 4 illustrates a communication system that includes a securitysystem, a doorbell button, a wireless router, a server, and users,according to some embodiments.

FIG. 5 illustrates a flow diagram showing a method of operating asecurity system, according to some embodiments.

FIG. 6 illustrates a flow diagram showing another method of operating asecurity system, according to some embodiments.

FIGS. 7, 8, 9 and 10 illustrate visitors being detected by securitysystems, according to various embodiments.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed below, inventivesubject matter extends beyond the specifically disclosed embodiments toother alternative embodiments and/or uses, and to modifications andequivalents thereof. Thus, the scope of the claims appended hereto isnot limited by any of the particular embodiments described below. Forexample, in any method or process disclosed herein, the acts oroperations of the method or process may be performed in any suitablesequence and are not necessarily limited to any particular disclosedsequence. Various operations may be described as multiple discreteoperations in turn, in a manner that may be helpful in understandingcertain embodiments; however, the order of description should not beconstrued to imply that these operations are order dependent.Additionally, the structures, systems, and/or devices described hereinmay be embodied as integrated components or as separate components.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

The following patent is incorporated herein by reference: U.S. Pat. No.7,583,191, entitled SECURITY SYSTEM AND METHOD FOR USE OF SAME, andfiled Nov. 14, 2006.

Introduction

Communication systems can provide a secure and convenient way for aremotely located individual to communicate with a person who isapproaching a sensor, such as a proximity sensor or motion sensor, orwith a person who rings a doorbell, which can be located in a doorway,near an entrance, or within 15 feet of a door. Some communicationsystems allow an individual to hear, see, and talk with visitors whoapproach at least a portion of the communication system and/or press abutton, such as a doorbell's button. For example, communication systemscan use a computing device to enable a remotely located person to see,hear, and/or talk with visitors. Computing devices can includecomputers, laptops, tablets, mobile devices, smartphones, cellularphones, and wireless devices (e.g., cars with wireless communication).Example computing devices include the iPhone, iPad, iMac, MacBook Air,and MacBook Pro made by Apple Inc. Communication between a remotelylocated person and a visitor can occur via the Internet, cellularnetworks, telecommunication networks, and wireless networks.

FIG. 1 illustrates a front view of a communication system embodiment.The communication system 200 can include a security system 202 (e.g., adoorbell) and a computing device 204. Although the illustrated securitysystem 202 includes many components in one housing, several securitysystem embodiments include components in separate housings. The securitysystem 202 can include a camera assembly 208 and a doorbell button 212.The camera assembly 208 can be a video camera, which in some embodimentsis a webcam.

The security system 202 can include a diagnostic light 216 and a powerindicator light 220. In some embodiments, the diagnostic light 216 is afirst color (e.g., blue) if the security system 202 and/or thecommunication system 200 is connected to a wireless Internet network andis a second color (e.g., red) if the security system 202 and/or thecommunication system 200 is not connected to a wireless Internetnetwork. In some embodiments, the power indicator 220 is a first colorif the security system 202 is connected to a power source. The powersource can be power supplied by the building 300 to which the securitysystem 202 is attached. In some embodiments, the power indicator 220 isa second color or does not emit light if the security system 202 is notconnected to the power source.

As well, the security system 202 can include at least one speaker 488.The speaker 488 can be located along any portion of the security system202. For example, the speaker 488 can be located within an inner portionof the security system 202 or along an outer portion of the securitysystem 202. The speaker 488 can be any type of sound output deviceconfigured to emit sound, such as a digital speaker, an analog speaker,and the like.

Furthermore, the security system 202 (e.g., a doorbell) can include anouter housing 224, which can be water resistant and/or waterproof. Theouter housing can be made from metal or plastic, such as molded plasticwith a hardness of 60 Shore D. In some embodiments, the outer housing224 is made from brushed nickel or aluminum.

Rubber seals can be used to make the outer housing 224 water resistantor waterproof. The security system 202 can be electrically coupled to apower source, such as wires electrically connected to a building'selectrical power system. In some embodiments, the security system 202includes a battery for backup and/or primary power.

Wireless communication 230 can enable the security system 202 (e.g., adoorbell) to communicate with the computing device 204. Some embodimentsenable communication via cellular and/or WiFi networks. Some embodimentsenable communication via the Internet. Several embodiments enable wiredcommunication between the security system 202 and the computing device204. The wireless communication 230 can include the followingcommunication means: radio, WiFi (e.g., wireless local area network),cellular, Internet, Bluetooth, telecommunication, electromagnetic,infrared, light, sonic, and microwave. Other communication means areused by some embodiments. In some embodiments, such as embodiments thatinclude telecommunication or cellular communication means, the securitysystem 202 can initiate voice calls or send text messages to a computingdevice 204 (e.g., a smartphone, a desktop computer, a tablet computer, alaptop computer).

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. Some embodiments includesoftware designed to run on desktop computers and laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

FIG. 2 illustrates a computing device 204 running software. The softwareincludes a user interface 240 displayed on a display screen 242. Theuser interface 240 can include a security system indicator 244, whichcan indicate the location of the security system that the user interfaceis displaying. For example, a person can use one computing device 204 tocontrol and/or interact with multiple security systems, such as onesecurity system located at a front door and another security systemlocated at a back door. Selecting the security system indicator 244 canallow the user to choose another security system (e.g., the back doorsecurity system rather than the front door security system).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator can indicate whether thecomputing device is in communication with a security system, theInternet, and/or a cellular network. The connectivity indicator 248 canalert the user if the computing device 204 has lost its connection withthe security system 202; the security system 202 has been damaged; thesecurity system 202 has been stolen; the security system 202 has beenremoved from its mounting location; the security system 202 lostelectrical power; and/or if the computing device 204 cannot communicatewith the security system 202. In some embodiments, the connectivityindicator 248 alerts the user of the computing device 204 by flashing,emitting a sound, displaying a message, and/or displaying a symbol.

In some embodiments, if the security system 202 loses power, losesconnectivity to the computing device 204, loses connectivity to theInternet, and/or loses connectivity to a remote server, a remote server206 sends an alert (e.g., phone call, text message, image on the userinterface 240) regarding the power and/or connectivity issue. In severalembodiments, the remote server 206 can manage communication between thesecurity system 202 and the computing device. In some embodiments,information from the security system 202 is stored by the remote server206. In several embodiments, information from the security system 202 isstored by the remote server 206 until the information can be sent to thecomputing device 204, uploaded to the computing device 204, and/ordisplayed to the remotely located person via the computing device 204.The remote server 206 can be a computing device that stores informationfrom the security system 202 and/or from the computing device 204. Insome embodiments, the remote server 206 is located in a data center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202. If thecomputing device 204 and/or the remote server 206 is unable tocommunicate with the security system 202, the computing device 204and/or the remote server 206 alerts the remotely located person via thesoftware, phone, text, a displayed message, and/or a website. In someembodiments, the computing device 204 and/or the remote server 206attempts to communicate with the security system 202 periodically; atleast every five hours and/or less than every 10 minutes; at least every24 hours and/or less than every 60 minutes; or at least every hourand/or less than every second.

In some embodiments, the server 206 can initiate communication to thecomputer device 204 and/or to the security system 202. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the security system202.

In several embodiments, a user can log into an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the security systemsettings discussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a security system due to the user'srequest rather than due to actions of a visitor. Some embodimentsinclude a computing device initiating a live video feed (or a video feedthat is less than five minutes old).

In some embodiments, the user interface 240 displays an image 252 suchas a still image or a video of an area near and/or in front of thesecurity system 202. The image 252 can be taken by the camera assembly208 and stored by the security system 202, server 206, and/or computingdevice 204. The user interface 240 can include a recording button 256 toenable a user to record images, videos, and/or sound from the cameraassembly 208, microphone of the security system 202, and/or microphoneof the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the security system 202. The user interface 240can also include a sound adjustment button 264 and a mute button 268.The user interface 240 can include camera manipulation buttons such aszoom, pan, and light adjustment buttons. In some embodiments, the cameraassembly 208 automatically adjusts between Day Mode and Night Mode. Someembodiments include an infrared camera and/or infrared lights toilluminate an area near the security system 202 to enable the cameraassembly 208 to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, and touching a touch screen. Many embodimentsinclude buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton, which can allow a user to select the quality and/or amount ofthe data transmitted from the security system 202 to the computingdevice 204 and/or from the computing device 204 to the security system202.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

The user interface 240 can include a termination button 276 to endcommunication between the security system 202 and the computing device204. In some embodiments, the termination button 276 ends the ability ofthe person located near the security system 202 (i.e., the visitor) tohear and/or see the user of the computing device 204, but does not endthe ability of the user of the computing device 204 to hear and/or seethe person located near the security system 202.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and is a termination button (toend communication between the security system 202 and the computingdevice 204). The button 276 can include the word “Answer” when thesystem is attempting to establish two-way communication between thevisitor and the user. Selecting the button 276 when the system isattempting to establish two-way communication between the visitor andthe user can start two-way communication. The button 276 can include thewords “End Call” during two-way communication between the visitor andthe user. Selecting the button 276 during two-way communication betweenthe visitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe security system and to stop emitting sounds recorded by the securitysystem.

In some embodiments, the user interface 240 opens as soon as thesecurity system detects a visitor (e.g., senses indications of avisitor). Once the user interface 240 opens, the user can see and/orhear the visitor even before “answering” or otherwise accepting two-waycommunication, in several embodiments.

Some method embodiments include detecting a visitor with a securitysystem. The methods can include causing the user interface to display ona remote computing device 204 due to the detection of the visitor (e.g.,with or without user interaction). The methods can include displayingvideo from the security system and/or audio from the security systembefore the user accepts two-way communication with the visitor. Themethods can include displaying video from the security system and/oraudio from the security system before the user accepts the visitor'scommunication request. The methods can include the computing devicesimultaneously asking the user if the user wants to accept (e.g.,answer) the communication request and displaying audio and/or video ofthe visitor. For example, in some embodiments, the user can see and hearthe visitor via the security system before opening a means of two-waycommunication with the visitor.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device might wonder whatis happening near the security system 202. The user can open thesoftware application on the computing device 204 and instruct theapplication to show live video and/or audio from the security device 202even if no event near the security system 202 has triggered thecommunication.

In several embodiments, the security device 202 can be configured torecord when the security device 202 detects movement and/or the presenceof a person. The user of the computing device 204 can later review allvideo and/or audio records when the security device 202 detectedmovement and/or the presence of a person.

Referring now to FIG. 1, in some embodiments, the server 206 controlscommunication between the computing device 204 and the security system202, which can be a doorbell with a camera, a microphone, and a speaker.In several embodiments, the server 206 does not control communicationbetween the computing device 204 and the security system 202.

In some embodiments, data captured by the security system and/or thecomputing device 204 (such as videos, pictures, and audio) is stored byanother remote device such as the server 206. Cloud storage, enterprisestorage, and/or networked enterprise storage can be used to store video,pictures, and/or audio from the communication system 200 or from anypart of the communication system 200. The user can download and/orstream stored data and/or storage video, pictures, and/or audio. Forexample, a user can record visitors for a year and then later can reviewconversations with visitors from the last year. In some embodiments,remote storage, the server 206, the computing device 204, and/or thesecurity system 202 can store information and statistics regardingvisitors and usage.

FIG. 3 illustrates an embodiment in which a security system 202 isconnected to a building 300, which can include an entryway 310 that hasa door 254. A door lock 250 can be configured to lock and unlock thedoor 254. Electrical wires 304 can electrically couple the securitysystem 202 to the electrical system of the building 300 such that thesecurity system 202 can receive electrical power from the building 300.

A wireless network 308 can allow devices to wirelessly access theInternet. The security system 202 can access the Internet via thewireless network 308. The wireless network 308 can transmit data fromthe security system 202 to the Internet, which can transmit the data toremotely located computing devices 204. The Internet and wirelessnetworks can transmit data from remotely located computing devices 204to the security system 202. In some embodiments, a security system 202connects to a home's WiFi.

As illustrated in FIG. 3, one computing device 204 (e.g., a laptop, asmartphone, a mobile computing device, a television) can communicatewith multiple security systems 202. In some embodiments, multiplecomputing devices 204 can communicate with one security system 202.

In some embodiments, the security system 202 can communicate (e.g.,wirelessly 230) with a television 306, which can be a smart television.Users can view the television 306 to see a visitor and/or talk with thevisitor.

FIG. 4 illustrates a communication system 310 that includes a securitysystem 320, a doorbell button 212, a WiFi router 328, a server 332, andusers 336. In step 340, a visitor initiates a communication request bypressing the doorbell button 212 or triggering a motion or proximitysensor. The visitor can trigger the motion or proximity sensor byapproaching the security system 320. In step 350, the security system320 connects or otherwise communicates with a home WiFi router 328. Instep 360, the server 332 receives a signal from the WiFi router 328 andsends video and/or audio to the users 336 via a wireless network 364. Instep 370, the users see the visitor, hear the visitor, and talk with thevisitor. Step 370 can include using a software application to see, hear,and/or talk with the visitor. The visitor and users 336 can engage intwo-way communication 374 via the internet or other wirelesscommunication system even when the visitor and the users 336 are locatedfar away from each other. Some embodiments enable users to receivecommunication requests and communicate with visitors via diverse mobilecommunication standards including third generation (“3G”), fourthgeneration (“4G”), long term evolution (“LTE”), worldwideinteroperability for microwave access (“WiMAX”), and WiFi.

In some cases, the users 336 utilize the communication system 310 tocommunicate with visitors who are in close proximity to the users 336.For example, a user 336 located inside her home can communicate with avisitor located just outside the home via the communication system 310.

Situational Sound Embodiments

The security system 202 may be configured to play unique sounds inresponse to detecting specific situations and/or during certain times ofday. The sounds may be preprogrammed sounds or completely customizableby a user of the security system 202. As well, the security system 202may be configured to play any of the sounds according to specificsituations. For example, the security system 202 may be configured toplay a specific message for a specific visiting individual, and/or maybe configured to play a specific message when a potential visitor isidentified as a specific person or is included in a list of specificpeople.

The security system 202 may include a speaker 488 configured to emit anytype of sound. The security system 202 may also include a visitordetection system that may include at least one of a button 212, a camera208, and a motion detector 218. Accordingly, the visitor detectionsystem may be configurable to receive various indications of a visitor'spresence. As well, the speaker 488 and the visitor detection system maybe directly or indirectly coupled to the security system 202. Evenstill, the speaker 488 and the visitor detection system may bemechanically, electrically, and/or communicatively coupled to thesecurity system 202.

The security system 202 may detect different indications of a visitor'spresence. As shown in FIG. 5, the security system 202 can be configuredto receive a first indication of a visitor's presence (at step 560). Inresponse to receiving the first indication of the visitor's presence,the security system 202 can emit a first sound with the speaker 488 (atstep 562). The security system 202 can be configured to receive a secondindication of a visitor's presence (at step 564). In response toreceiving the second indication of the visitor's presence, the securitysystem 202 can emit a second sound with the speaker 488 (at step 566).The first sound can be audibly different than the second sound.

Some of the indications can be interpreted as being associated with afriendly or welcome visitor, while other indications can be interpretedas being associated with an unfriendly or unwelcome visitor. Accordingto these different indications, the security system 202, by the speaker488, can emit different sounds.

With reference to FIG. 7, when the security system 202 receives anindication that a visitor 580 has pressed the button 212 (at step 582),this can be interpreted as an indication of a friendly, or welcomevisitor. In response to receiving the indication that the button 212 hasbeen pressed, the speaker 488 can emit a first sound (at step 584), suchas a friendly sound (e.g. “Welcome to our humble abode.”).

As illustrated in FIG. 8, when the security system 202 receives anindication that a visitor 586 has been moving in front of the securitysystem 202 for a prolonged or predetermined time (e.g. 15 seconds or anytime that indicates that the visitor is loitering) without pressing thebutton 212 (at step 588), this can be interpreted as an unfriendly orunwelcome visitor. In response to receiving the indication that thevisitor has been moving in front of the security system 202 withoutpressing the button 212, the speaker 488 can emit a second sound (atstep 590). The second sound can be an alert sound (e.g. a warning tomove away from the building 300—“Step away from the house!”). It shouldbe appreciated that the security system 202 can be configured to emitany number of sounds, such as a third sound, a fourth sound, a fifthsound, and any number of additional sounds.

The security system 202 can be configured to receive any number ofindications. For example, in addition to a button press and a motion ofa visitor, the indications can include indications of a remote computingdevice 204, a noise, a thermal signature (such as a thermal gradientindicating the presence of a person or animal), a retina scan, afingerprint scan, a ground vibration, and the like. It should beappreciated that the indication can include any indication of a presenceof any visitor, such as a person or animal.

In some embodiments, the security system 202 can emit different soundsfor a first visitor. For example, as the first visitor approaches thebuilding 300, the security system 202 can emit a first sound based uponthe motion of the first visitor. As well, the security system 202 canemit a second sound once the first visitor pushes the button 212 of thesecurity system 202.

Furthermore, any of the indications described in this disclosure can beassociated with a visitor that is either welcome or unwelcome at thebuilding. Accordingly, the security system 202 can be configured to anyenvironment in which the building 300 is situated. For example, somebuildings 300 can be located in high traffic areas where it is commonfor people to walk by the front of the security system 202 withoutpressing the button 212. In this regard, the security system 202 can beconfigured to ignore indications of motion and only emit sounds inresponse to affirmative indications that the visitor is visiting thebuilding 300, such as an indication that the button 212 has beenpressed. In some embodiments, the security system 202 can be configuredto only respond to motion in certain zones. For example, if the securitysystem 202 is located 20 feet from a busy sidewalk, then the securitysystem 202 can be configured to ignore all motion that occurs more than15 feet from the security system 202. In this manner, the securitysystem 202 can only respond to movements occurring on the buildingproperty.

As well, combinations of indications can be interpreted in variousmanners. For example, a combination of an indication of motion (i.e.movement) of a visitor in front of the security system 202 and anindication that the visitor has pressed the button 212 can indicate thatthe visitor is welcome at the building 300. As previously described, thespeaker 488 of the security system 202 can emit a friendly message inresponse to the combination of indications.

Even still, the security system 202 can be configured to emit differentsounds in response to a positive detection of one indication and anegative detection of another indication. For example, if the securitysystem 202 detects motion of a visitor but does not detect sound, thiscan be interpreted as an unwelcome visitor, such as a prowler sneakingaround the outside of the building 300. In response, the speaker 488 ofthe security system 202 can emit an alert sound (e.g. a warning to exitthe premise before the authorities are notified).

Furthermore, the time of day and/or day when a visitor approaches thebuilding 300 can also indicate whether the visitor is welcome or not. Asshown in FIG. 6, the security system 202 can be configured to receive anindication of a visitor's presence at a first time of day (at step 570).The first time of day can occur between sunrise and sunset, or any othertime of day. In response to receiving the indication of the visitor'spresence at the first time of day, the security system 202 can emit afirst sound with the speaker 488 (at step 572). In some embodiments, thefirst sound comprises an audible message spoken by a female voice, whilesome embodiments may comprise an audible message spoken by a male voice.

Furthermore, the security system 202 can be configured to receive anindication of the visitor's presence at a second time of day (at step574). It should be appreciated that the second time of day can occurbetween sunset and sunrise, or any other time of day. In response toreceiving the indication of the visitor's presence at the second time ofday, the security system 202 can emit a second sound with the speaker488 (at step 576). In some embodiments, the second sound comprises anaudible message spoken by a male voice, while some embodiments maycomprise an audible message spoken by a female voice.

To illustrate a more specific example, such as the one shown in FIG. 9,if a visitor 592 presses the button 212 at noon on a weekend day (atstep 594), the speaker 488 can emit a welcome message (e.g. “Welcome.We'll be right there.) (at step 596). In another example, as illustratedin FIG. 10, if a visitor 597 presses the button 212 at midnight on aworkday (at step 598), the speaker 488 can emit a do not disturb messageor a message instructing the visitor to come back another time (e.g.“Please come back tomorrow!”).

Combinations of indications can be interpreted differently depending onthe time of day. For example, in response to an indication of a motionand a noise during the day, the speaker 488 of the security system 202can emit a friendly message. However, in response to an indication of amotion and a noise during the night, the speaker 488 can emit a warningmessage.

Even still, the security system 202 can be configured to responddifferently based on the unique circumstances of the indication. Forexample, if the motion detector 218 of the security system 202 detects aslow movement versus a faster movement, then the speaker 488 can emitdifferent sounds based upon these various circumstances. A slow movementcan be interpreted as a prowler approaching the building, while a fastermovement, such as a movement of a person walking at 3.5 miles per hour,can be interpreted as a friendly visitor approaching the building 300.

The time of day can be any selected time of day and any number of timeranges can be used. For example, the security system 202 can emit awelcome message during sunrise to sunset and an alert or warning messageduring sunset to sunrise. Accordingly, because sunrise and sunset changeon a daily basis, the security system 202 can be communicatively coupledto an outside database(s) to allow the security system 202 to therebyautomatically respond to these ever-changing conditions.

The security system 202 (e.g. doorbell) can elect to emit a particularsound, such as a first sound or a second sound, based on a time at whichthe security system 202 detects an indication of a presence of avisitor. In some embodiments, the security system 202 is configured todetect an amount of light, which may indicate a time of day. In responseto detecting the amount of light, the security system 202 can elect toemit the first sound or the second sound based on the amount of light.

As well, the security system 202 can be configured to provide uniqueresponses during different time ranges on specific days. For example,the user may have a bowling league every third Monday of the month.Accordingly, during that time, (e.g. from 6 pm-8:30 pm) on the thirdMonday of the month, in response to detecting an indication of apresence of a friendly visitor, the speaker 488 of the security system202 can emit a friendly message telling the visitor that their presenceis appreciated but the visitor should come back another time. In anotherexample, the user may be on vacation from the 1^(st) to the 10^(th) andthe user may wish to emit more intimidating warnings to secure thebuilding 300. Generally speaking, the security system 202 can beconfigured to emit any type of sound in response to any time of dayand/or day.

The security system 202 can be configured to detect specific visitorsand emit certain sounds in response to detecting the specific visitors.For example, if the security system 202 detects a first visitor, such asa relative of the homeowner, the security system 202 can always emit afriendly sound, no matter how the first visitor approaches the home, orduring what time of day. As well, if the security system 202 detects asecond visitor, such as an unknown party (e.g. a solicitor), thesecurity system 202 can emit an unfriendly sound, no matter how thesecond visitor approaches the home, or during what time of day.

To determine the identity of a visitor, the security system 202 can useany type of identity recognition technology, such as facial recognition,to determine an indication of an identity of a visitor. Some of thesetypes of identity recognition technologies are disclosed in U.S.Nonprovisional patent application Ser. No. 14/612,376; filed Feb. 3,2015; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. Theentire contents of patent application Ser. No. 14/612,376 areincorporated by reference herein.

The different types of sounds emitted by the speaker 488 can beconfigured to match the appropriate indication as detected by thesecurity system 202. For example, if the security system 202 detects anunfriendly visitor, the speaker 488 can emit a message spoken by a malevoice to thereby intimidate the unfriendly visitor. Contra, if thesecurity system 202 detects a friendly visitor, the speaker 488 can emita message spoken by a female voice to thereby welcome the visitor. Aswell, the security system 202 can be configured to emit any other typeof sound. For example, a welcome visitor can be greeted by a pleasantmelody or a ding-dong, while an unwelcome visitor can be greeted by analarm sound or a warning message.

As well, messages can be spoken in any language, volume, pitch, accent,and the like. Users may find that various combinations of vocalcharacteristics to be useful in different situations. For example, if auser is hosting a Mardi gras party, the user can configure the securitysystem 202 to emit a message spoken by a person with a southern accent.Generally, it should be appreciated that the speaker 488 of the securitysystem 202 can be configured to emit any type of sound for any type ofspecific situation.

Likewise, the security system 202 can be configured to play a specificmessage if the potential visitor is not included in a list. For example,where a potential visitor is not included in a list of the resident'scontacts, the security system 202 can be configured to indicate that theresident does not accept solicitors and/or request the visitor toprovide identifying information or describe the purpose of the visit.

In some embodiments, the security system 202 can be configured to play aspecific message if the potential visitor has a criminal background. Forexample, a user can configure the security system 202 to play a specificmessage where a potential visitor is a registered sex offender.

The sounds emitted by the security system 202 can be recorded by theuser him/herself. As well, the sounds can be downloaded from anothersource, such as a remote computer (e.g. a remote server), a remotecomputing device (e.g. a smart phone), a website, a database (e.g.iTunes®), and the like. Also, methods can include selecting the firstsound and the second sound with a remote computing device that isconfigured to receive alerts from the doorbell. The selected sounds canbe wirelessly transmitted to the doorbell.

As well, the sounds can be recorded with a remote computing device 204and the sounds can be set up for temporary use whereby the sounds canexpire upon a predetermined time. For example, a user can enter anexpiration date of the recorded sound with the remote computing device204. Furthermore, the user can wirelessly send the first sound and theexpiration date from the remote computing device to the doorbell. Oncethe expiration date passes, the security system 202 can then cease toemit the recorded sound from the security system 202.

As well, the security system 202 can be configured to receive soundemitting parameters from a remote computing device 204. The securitysystem 202 can emit a predetermined sound based upon the sound emittingparameter. In some embodiments, the sound emitting parameter includes atleast one of an identity of the first visitor, data associated with thefirst visitor, a time, a location of a user of the remote computingdevice. In some embodiments, the security system 202 can automaticallydownload a third sound based on the sound emitting parameters. Thesecurity system 202 can emit the third sound from the speaker accordingto rules associated with the third sound.

Alert Communication Embodiments

Embodiments of the security system 202 can be configured to alertindividuals located outside of a building (e.g. a home). For example,the security system 202 can be configured to flash a light, emit a sound(e.g. alternating high pitch and low pitch sounds), initiate acommunication session with a remote computing device 204, and the like.These various alerts can be useful to individuals, such as firstresponders, seeking to identify the location of an event, such as anadverse event(s) occurring within or outside the home.

In various embodiments, the security system 202 can be communicativelycoupled, directly and/or via the cloud, to a hub device and/or aperipheral device (e.g. event detection device), such as a Nest Protect,Nest Learning Thermostat®, DropCam®, and the like. The hub device,peripheral device and/or the security system 202 can be used to monitorvarious events within the home. Specifically, the hub device (may bereferred to as “device”) and/or peripheral device (may also be referredto as “device”) can detect adverse events and then notify the securitysystem 202. In some embodiments, the hub device is communicativelycoupled to the peripheral device that detects the adverse event. In thismanner, the security system 202 may directly or indirectly receive anotification of the adverse event from the peripheral device and/or thehub device.

The security system 202 may be configured as a passive or active device.As a passive device, the security system 202 may receive notificationsof adverse events from the hub device and/or the peripheral device. Asan active device, the security system 202 may be configured to activelymonitor whether the hub device and/or peripheral device has detected theoccurrence or initiation of an adverse event.

The security system 202 may comprise an alert communication system thatmay include a light, a speaker, and a wireless communication system thatmay be configured to initiate a transmission with a remote computingdevice 204. For example, the hub device may comprise a smart smokedetector (e.g. Nest Protect), and in response to the smart smokedetector detecting elevated levels of smoke, or elevated levels of othertoxic gases, the security system 202 may activate its alertcommunication system (e.g. flashing a light and/or emit a sound). Thismay thereby alert individuals outside the home as to the location of thehome where the adverse event is occurring. As well, it should beappreciated that the adverse event can comprise any type of event thatmay require the attention of another party. For example, the adverseevent may comprise at least one of a fire, a gas leak, a break-in,elevated levels of smoke, elevated levels of radon, elevated levels ofcarbon monoxide, and the like.

The alert communication system can be configured to alert individualslocated outside the home in any variety of ways. For example, the alertcommunication system can flash a bright light emitting diode and/or alight located behind the doorbell button 212, such as the diagnosticlight 216, on the security system 202. In some examples, the alertcommunication system can emit a loud sound from the speaker. Forexample, the loud sound can be alternating high and low pitch soundsthat may be heard by individuals located within 300 feet of the home.The high and low pitch sounds can be of high and low frequencies thatmay be heard by individuals located within a neighboring home and/or avehicle passing by. The loud sound can be a unique sound that is easilydetectable by individuals and something that indicates danger or help isrequired.

Furthermore, the alert communication system can be configured toinitiate a transmission to a remote computing device 204. For example,if the security system 202 determines that a break-in has occurred, thesecurity system 202 may initiate a computing session and/or anotification with the remote computing device 204 to alert an individualthat is operating the remote computing device 204 of the break-in at thehome. As well, it should be appreciated that the security system 202 caninitiate a transmission to any other party, such as an emergencydispatcher (e.g. 911).

The security system 202 may be configured to activate its alertcommunication system after a predetermined amount of time. Thepredetermined amount of time may be 0 seconds, 10 seconds, 20 seconds, 1minute, and the like. Generally, it should be appreciated that the alertcommunication system may activate nearly at the same time as the hubdevice detecting the adverse event or any time thereafter.

The alert communication system may be deactivated in a variety of ways.For example, the alert communication system may deactivate (e.g. turnoff the current alert) in response to the security system 202 receivingan indication that the doorbell button 212 has been pressed. In someembodiments, the security system 202 may be configured to turn off thealert communication system in response to receiving an audiblepredetermined message, such as a spoken safety message or a spokenpassword that indicates that the event is being attended to or hasended. In some embodiments, the security system 202 can receive adeactivation command from the remote computing device 204. In thismanner, the individual operating the remote computing device 204 maysend a command through the remote computing device 204 to terminate theongoing alert.

Interpretation

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other.

The section headings and subheadings provided herein are nonlimiting.The section headings and subheadings do not represent or limit the fullscope of the embodiments described in the sections to which the headingsand subheadings pertain. For example, a section titled “Topic 1” mayinclude embodiments that do not pertain to Topic 1 and embodimentsdescribed in other sections may apply to and be combined withembodiments described within the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodimentsinclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy.

While certain example embodiments have been described, these embodimentshave been presented by way of example only, and are not intended tolimit the scope of the inventions disclosed herein. Thus, nothing in theforegoing description is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit of theinventions disclosed herein.

The following is claimed:
 1. A doorbell, comprising: a housing; aspeaker coupled to the housing; a motion detector coupled to thehousing; a first sound emitted by the speaker in response to the motiondetector detecting a first motion and a second sound emitted by thespeaker in response to the motion detector detecting a second motion. 2.The doorbell of claim 1, wherein the first sound comprises a warningmessage and the second sound comprises a welcoming message.
 3. Thedoorbell of claim 1, further comprising a microphone coupled to thehousing, wherein the first sound is emitted by the speaker in responseto the motion detector detecting the first motion and the microphonedetecting a first noise, and wherein the second sound is emitted by thespeaker in response to the motion detector detecting the second motionand the microphone detecting a second noise.
 4. The doorbell of claim 3,wherein the second noise is louder than the first noise.
 5. The doorbellof claim 1, wherein the first motion comprises a first predeterminedmotion and the second motion comprises a second predetermined motionthat is different from the first predetermined motion.
 6. The doorbellof claim 1, wherein the first motion comprises a fast movement and thesecond motion comprises a slow movement.
 7. The doorbell of claim 1,wherein the first motion is determined to be located within apredetermined distance from the doorbell and the second motion isdetermined to be located more than a predetermined distance from thedoorbell.
 8. The doorbell of claim 1, further comprising a buttoncoupled to the housing, and a third sound emitted by the speaker inresponse to the button receiving a button press.
 9. A doorbell,comprising: a housing; a speaker coupled to the housing; a visitordetection system coupled to the housing, the visitor detection systemcomprising a motion detector and a button; a first sound emitted by thespeaker in response to the motion detector detecting a first motion anda second sound emitted by the speaker in response to at least one of themotion detector detecting a second motion and the button receiving abutton press.
 10. The doorbell of claim 9, wherein the first sound isspoken by a male voice and the second sound is spoken by a female voice.11. The doorbell of claim 9, wherein the first sound comprises a warningmessage and the second sound comprises a welcoming message.
 12. Thedoorbell of claim 9, wherein the first motion is detected between sunsetand sunrise and the second motion is detected between sunrise andsunset.
 13. The doorbell of claim 9, further comprising a camera coupledto the housing and a microphone coupled to the housing.
 14. The doorbellof claim 9, wherein the doorbell is attached to a building.
 15. A methodof operating a doorbell system comprising a doorbell, wherein thedoorbell comprises a speaker and a visitor detection system comprisingat least one of a button, a camera, and a motion detector, the methodcomprising: detecting, by the visitor detection system, an indication ofa visitor; detecting, by the doorbell system, at least one of a firstamount of light and a second amount of light; and emitting, by thespeaker, at least one of the first sound and the second sound inresponse to detecting the indication of the visitor, wherein the firstsound is emitted by the speaker in response to detecting the firstamount of light and the second sound is emitted by the speaker inresponse to detecting the second amount of light.
 16. The method ofclaim 15, wherein the indication comprises a motion detected by themotion detector.
 17. The method of claim 15, wherein the indicationcomprises a button press received by the button.
 18. The method of claim15, wherein the indication comprises an image captured by the camera.19. The method of claim 15, wherein the second amount of light isgreater than the first amount of light.
 20. The method of claim 19,wherein the first amount of light is detected between sunset and sunriseand the second amount of light is detected between sunrise and sunset.21. The method of claim 20, wherein the first sound comprises a firstmessage spoken by a male voice and the second sound comprises a secondmessage spoken by a female voice.
 22. The method of claim 15, furthercomprising downloading at least one of the first sound and the secondsound with a remote computing device.
 23. The method of claim 15,further comprising recording at least one of the first sound and thesecond sound with a remote computing device.
 24. A method of operating adoorbell system comprising a doorbell, wherein the doorbell comprises aspeaker and a visitor detection system comprising at least one of abutton, a camera, and a motion detector, the method comprising:detecting, by the doorbell, a first indication of a first visitor, andthen in response to detecting the first indication, emitting a firstsound with the speaker; detecting, by the doorbell, a second indicationof a second visitor, and then in response to detecting the secondindication, emitting a second sound with the speaker, wherein the secondsound is audibly different from the first sound; and entering anexpiration date of at least one of the first sound and the second soundwith a remote computing device, and sending wirelessly the expirationdate from the remote computing device to the doorbell.
 25. The method ofclaim 24, further comprising ceasing to emit at least one of the firstsound and the second sound from the doorbell by the expiration date. 26.The method of claim 24, further comprising selecting at least one of thefirst sound and the second sound with the remote computing device, andwirelessly sending at least one of the first sound and the second soundto the doorbell.
 27. The method of claim 24, further comprising enteringa sound emitting parameter into the remote computing device, andemitting at least one of the first sound and the second sound from thedoorbell according to the sound emitting parameter.
 28. The method ofclaim 27, wherein the sound emitting parameter comprises at least oneof: an identity of at least one of the first visitor and the secondvisitor, data associated with at least one of the first visitor and thesecond visitor, and a location of a user of the remote computing device.29. The method of claim 27, further comprising sending wirelessly thesound emitting parameter to the doorbell and the doorbell automaticallydownloading a third sound based on the sound emitting parameter.
 30. Themethod of claim 29, further comprising the doorbell emitting the thirdsound from the speaker according to rules associated with the thirdsound.