Doorbell communication systems and methods

ABSTRACT

Doorbell systems can include a speaker and a visitor detection system that includes at least one of a button, a camera, and a motion detector. Doorbell systems can be configured to detect an identity of a visitor via facial recognition, initiate a communication session with a remote computing device, and send the identity to the remote computing device via the first communication session.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of and is a continuation of U.S.Non-Provisional patent application Ser. No. 14/861,613; filed Sep. 22,2015; entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; and having anattorney docket number SKYBELL.063A. The entire contents of U.S. patentapplication Ser. No. 14/861,613 are incorporated by reference herein.U.S. Non-Provisional patent application Ser. No. 14/861,613 is acontinuation-in-part of U.S. Non-Provisional patent application Ser. No.14/740,199; filed Jun. 15, 2015; entitled IDENTITY VERIFICATION USING ASOCIAL NETWORK; and having an attorney docket number SKYBELL.012A. Theentire contents of U.S. patent application Ser. No. 14/740,199 areincorporated by reference herein. U.S. Non-Provisional patentapplication Ser. No. 14/740,199 claims the benefit of U.S. ProvisionalPatent Application No. 62/135,133, filed Mar. 18, 2015; entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS; and having an attorneydocket number SKYBELL.012PR4. The entire contents of U.S. PatentApplication No. 62/135,133 are incorporated by reference herein. U.S.Non-Provisional patent application Ser. No. 14/740,199 claims thebenefit of U.S. Provisional Patent Application No. 62/016,057, filedJun. 23, 2014; entitled IDENTITY VERIFICATION OF FREQUENT ANDNON-FREQUENT VISITORS; and having an attorney docket numberSKYBELL.012PR3. The entire contents of U.S. patent application Ser. No.62/016,057 are incorporated by reference herein. U.S. Non-Provisionalpatent application Ser. No. 14/740,199 claims the benefit of U.S.Provisional Patent Application No. 62/016,053, filed Jun. 23, 2014;entitled IDENTITY VERIFICATION USING A SOCIAL NETWORK AND A NAME OF AVISITOR; and having an attorney docket number SKYBELL.012PR2. The entirecontents of U.S. Patent Application No. 62/016,053 are incorporated byreference herein.

U.S. Non-Provisional patent application Ser. No. 14/740,199 claims thebenefit of U.S. Provisional Patent Application No. 62/016,050, filedJun. 23, 2014; entitled IDENTITY VERIFICATION USING A SOCIAL NETWORK;and having an attorney docket number SKYBELL.012PR1. The entire contentsof U.S. Patent Application No. 62/016,050 are incorporated by referenceherein.

U.S. Non-Provisional patent application Ser. No. 14/861,613 is acontinuation-in-part of U.S. Non-Provisional patent application Ser. No.14/737,411; filed Jun. 11, 2015; entitled DOORBELL CHIME SYSTEMS ANDMETHODS; and having an attorney docket number SKYBELL.043A.CP4. Theentire contents of U.S. patent application Ser. No. 14/737,411 areincorporated by reference herein.

U.S. Non-Provisional patent application Ser. No. 14/861,613 is acontinuation-in-part of U.S. Non-Provisional patent application Ser. No.14/743,849, filed Jun. 18, 2015; entitled DOORBELL COMMUNICATION SYSTEMSAND METHODS; and having an attorney docket number SKYBELL.009A.CP11. Theentire contents of U.S. patent application Ser. No. 14/743,849 areincorporated by reference herein.

The entire contents of the following applications are incorporated byreference herein: U.S. patent application Ser. No. 14/612,376; filedFeb. 3, 2015; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS;U.S. patent application Ser. No. 14/589,830; filed Jan. 5, 2015; andentitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; U.S. patentapplication Ser. No. 14/623,741; filed Feb. 17, 2015; and entitled POWEROUTLET CAMERAS; U.S. patent application Ser. No. 14/748,054; filed Jun.23, 2015; and entitled DOORBELL COMMUNITIES; and U.S. patent applicationSer. No. 14/502,601; filed Sep. 30, 2014; and entitled DOORBELLCOMMUNICATION SYSTEMS AND METHODS.

BACKGROUND Field

Various embodiments disclosed herein relate to doorbells. Certainembodiments relate to communication between a person near a doorbell anda person in another location.

Description of Related Art

Homes, offices, and other buildings sometimes include communication andsurveillance systems to enable friendly visitors to summon occupants ofthe buildings and to deter unwanted visitors. Communication andsurveillance systems can include video cameras and doorbells.

Doorbells can enable a person located outside of an entry point, such asa door, to alert a person inside of an entry point that someone outsidewould like to talk to someone inside. Doorbells sometimes include abutton located near a door, such as a front door, side door, or backdoor of a home, office, dwelling, warehouse, building, or structure.Doorbells are sometimes used near a gate or some other entrance to apartially enclosed area. Pushing the doorbell sometimes causes a chimeor other alerting sound to be emitted. In some cases, this alertingsound can typically be heard within a short distance from the entrypoint or sound source. For example, a homeowner located remotely fromher home likely would not be able to hear the alerting sound, and thus,would not be aware that someone is ringing her doorbell. Thus, there isa need for devices and methods to alert remotely located individualsthat someone seeks the attention of the homeowner, tenant, buildingguardian, or steward.

SUMMARY

This disclosure includes methods of operating doorbell systems. Adoorbell system can comprise a speaker, a microphone, and a visitordetection system. The visitor detection system can comprise at least oneof a button, a camera, and a motion detector. The method can comprisedetecting a first indication of a first visitor, and then in response todetecting the first indication, contacting a first resident. The methodmay also include detecting a second indication of a second visitor, andthen in response to detecting the second indication, contacting a secondresident.

Methods can further include detecting, via voice recognition, a firstidentity of the first visitor, and then in response to detecting thefirst identity, contacting the first resident. As well, methods caninclude detecting, via voice recognition, a second identity of thesecond visitor, and then in response to detecting the second identity,contacting the second resident.

Methods can also include detecting, via facial recognition, a firstidentity of the first visitor, and then in response to detecting thefirst identity, contacting the first resident. Methods can includedetecting, via facial recognition, a second identity of the secondvisitor, and then in response to detecting the second identity,contacting the second resident.

As well, methods can include detecting a first motion of the firstvisitor, wherein the first motion defines a first identity of the firstvisitor, and then in response to detecting the first identity,contacting the first resident. Methods can also include detecting asecond motion of the second visitor, wherein the second motion defines asecond identity of the second visitor, and then in response to detectingthe second identity, contacting the second resident.

Furthermore, methods can include detecting, via voice recognition, afirst identity of the first visitor, and then in response to detectingthe first identity, emitting a noise with a first chime located within afirst unit of the first resident. The first chime can be communicativelycoupled to the doorbell. Methods can also include detecting, via voicerecognition, a second identity of the second visitor, and then inresponse to detecting the second identity, emitting a noise with asecond chime located within a second unit of the second resident. Thesecond chime can be communicatively coupled to the doorbell. The firstunit can comprise a first residential unit, and the second unit cancomprise a second residential unit. In embodiments, the first unit cancomprise a first commercial unit, and the second unit can comprise asecond commercial unit.

In embodiments, contacting the first resident can comprise initiating acommunication session with a first remote computing device of the firstresident, and contacting the second resident can comprise initiating acommunication session with a second remote computing device of thesecond resident.

As well, detecting the first indication of the first visitor cancomprise detecting a first name as spoken by the first visitor, and thenin response to detecting the first name, methods can include contactingthe first resident. Detecting the second indication of the secondvisitor can comprise detecting a second name as spoken by the secondvisitor, and then in response to detecting the second name, methods caninclude contacting the second resident.

Methods can further include receiving an indication of a button press byat least one of the first visitor and the second visitor. In response tothe button press, methods can include emitting an audible message to askthe at least one of the first visitor and the second visitor to audiblyspeak a resident's name.

As well, methods can include receiving an indication of a button pressby at least one of the first visitor and the second visitor. In responseto the button press, methods can include emitting an audible messagethat includes two or more resident's names.

Methods can include electing to contact the first resident based on atime at which the doorbell detects the first indication. Methods canalso include electing to contact the second resident based on a time atwhich the doorbell detects the second indication.

Furthermore, methods can include detecting an amount of light, electingto contact the first resident based on the amount of light, and electingto contact the second resident based on the amount of light.

Methods can include electing to contact the first resident based upon afirst contact parameter, and electing to contact the second residentbased upon a second contact parameter. The first contact parameter cancomprise at least one of a time and an identity of the first visitor. Aswell, the second contact parameter can comprise at least one of a timeand an identity of the second visitor.

The disclosure also includes a method of using a first doorbell todetect an indication of a high-risk visitor. The first doorbell cancomprise a speaker, a microphone, and a visitor detection system. Thevisitor detection system can have at least one of a button, a camera,and a motion detector. The method can comprise receiving, via the firstdoorbell, data from a second doorbell that is located remote to thefirst doorbell. The data can comprise an indication of the high-riskvisitor. As well, the method can include detecting an indication of avisitor. Then in response to detecting the indication of the visitor,the method can include determining whether the indication of the visitorsubstantially matches the indication of the high-risk visitor.

In response to determining that the indication of the visitorsubstantially matches the indication of the high-risk visitor, methodscan include initiating an alert. In embodiments, the alert can compriseilluminating a light on the doorbell. In embodiments, the alert cancomprise emitting a noise with a speaker of the doorbell. Inembodiments, the alert can comprise initiating a communication sessionwith a remote computing device to thereby inform a user of the remotecomputing device of the indication of the high-risk visitor.

In embodiments, the first doorbell can be indirectly communicativelycoupled to the second doorbell via a remote computer. In embodiments,the first doorbell can be directly communicatively coupled to the seconddoorbell.

In embodiments, the first doorbell can be attached to a first building.In embodiments, the second doorbell can be attached to a second buildinglocated at least 50 feet from the first building.

Methods can include receiving, via the first doorbell, data from a thirddoorbell that is located remote to both the first and second doorbells.The data can comprise an indication of a second high risk visitor. Inresponse to detecting the indication of the visitor, methods can includedetermining whether the indication of the visitor substantially matchesthe indication of the second high risk visitor.

The embodiments described above include many optional features andaspects. Features and aspects of the embodiments can be combined.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 illustrates a front view of a communication system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates an embodiment in which a security system is connectedto a building, according to some embodiments.

FIG. 4 illustrates various identifying characteristics of a visitor,according to some embodiments.

FIG. 5 illustrates a network of security systems, according to someembodiments.

FIG. 6 illustrates a network of security systems, according to someembodiments.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed below, inventivesubject matter extends beyond the specifically disclosed embodiments toother alternative embodiments and/or uses, and to modifications andequivalents thereof. Thus, the scope of the claims appended hereto isnot limited by any of the particular embodiments described below. Forexample, in any method or process disclosed herein, the acts oroperations of the method or process may be performed in any suitablesequence and are not necessarily limited to any particular disclosedsequence. Various operations may be described as multiple discreteoperations in turn, in a manner that may be helpful in understandingcertain embodiments; however, the order of description should not beconstrued to imply that these operations are order dependent.Additionally, the structures, systems, and/or devices described hereinmay be embodied as integrated components or as separate components.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

The following patent is incorporated herein by reference: U.S. Pat. No.7,583,191; entitled SECURITY SYSTEM AND METHOD FOR USE OF SAME; andfiled Nov. 14, 2006.

Communication systems can provide a secure and convenient way for aremotely located individual to communicate with a person who isapproaching a sensor, such as a proximity sensor or motion sensor, orwith a person who rings a doorbell, which can be located in a doorway,near an entrance, or within 15 feet of a door. Some communicationsystems allow an individual to hear, see, and talk with visitors whoapproach at least a portion of the communication system and/or press abutton, such as a doorbell's button. For example, communication systemscan use a computing device to enable a remotely located person to see,hear, and/or talk with visitors. Computing devices can includecomputers, laptops, tablets, mobile devices, smartphones, cellularphones, and wireless devices (e.g., cars with wireless communication).Example computing devices include the iPhone, iPad, iMac, MacBook Air,and MacBook Pro made by Apple Inc. Communication between a remotelylocated person and a visitor can occur via the Internet, cellularnetworks, telecommunication networks, and wireless networks.

FIG. 1 illustrates a front view of a communication system embodiment.The communication system 200 can include a security system 202 (e.g., adoorbell) and a computing device 204. Although the illustrated securitysystem 202 includes many components in one housing, several securitysystem embodiments include components in separate housings. The securitysystem 202 can include a camera assembly 208 and a doorbell button 212.The camera assembly 208 can be a video camera, which in some embodimentsis a webcam.

The security system 202 can include a diagnostic light 216 and a powerindicator light 220. In some embodiments, the diagnostic light 216 is afirst color (e.g., blue) if the security system 202 and/or thecommunication system 200 is connected to a wireless Internet network andis a second color (e.g., red) if the security system 202 and/or thecommunication system 200 is not connected to a wireless Internetnetwork. In some embodiments, the power indicator 220 is a first colorif the security system 202 is connected to a power source. The powersource can be power supplied by the building 300 to which the securitysystem 202 is attached. In some embodiments, the power indicator 220 isa second color or does not emit light if the security system 202 is notconnected to the power source.

As well, the security system 202 can include at least one speaker 488.The speaker 488 can be located along any portion of the security system202. For example, the speaker 488 can be located within an inner portionof the security system 202 or along an outer portion of the securitysystem 202. The speaker 488 can be any type of sound output deviceconfigured to emit sound, such as a digital speaker, an analog speaker,and the like.

Furthermore, the security system 202 (e.g., a doorbell) can include anouter housing 224, which can be water resistant and/or waterproof. Theouter housing can be made from metal or plastic, such as molded plasticwith a hardness of 60 Shore D. In some embodiments, the outer housing224 is made from brushed nickel or aluminum. Rubber seals can be used tomake the outer housing 224 water resistant or waterproof. The securitysystem 202 can be electrically coupled to a power source, such as wireselectrically connected to a building's electrical power system. In someembodiments, the security system 202 includes a battery for backupand/or primary power.

Wireless communication 230 can enable the security system 202 (e.g., adoorbell) to communicate with the computing device 204. Some embodimentsenable communication via cellular and/or WiFi networks. Some embodimentsenable communication via the Internet. Several embodiments enable wiredcommunication between the security system 202 and the computing device204. The wireless communication 230 can include the followingcommunication means: radio, WiFi (e.g., wireless local area network),cellular, Internet, Bluetooth, telecommunication, electromagnetic,infrared, light, sonic, and microwave. Other communication means areused by some embodiments. In some embodiments, such as embodiments thatinclude telecommunication or cellular communication means, the securitysystem 202 can initiate voice calls or send text messages to a computingdevice 204 (e.g., a smartphone, a desktop computer, a tablet computer, alaptop computer).

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. Some embodiments includesoftware designed to run on desktop computers and laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

FIG. 2 illustrates a computing device 204 running software. The softwareincludes a user interface 240 displayed on a display screen 242. Theuser interface 240 can include a security system indicator 244, whichcan indicate the location of the security system that the user interfaceis displaying. For example, a person can use one computing device 204 tocontrol and/or interact with multiple security systems, such as onesecurity system located at a front door and another security systemlocated at a back door. Selecting the security system indicator 244 canallow the user to choose another security system (e.g., the back doorsecurity system rather than the front door security system).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator can indicate whether thecomputing device is in communication with a security system, theInternet, and/or a cellular network. The connectivity indicator 248 canalert the user if the computing device 204 has lost its connection withthe security system 202; the security system 202 has been damaged; thesecurity system 202 has been stolen; the security system 202 has beenremoved from its mounting location; the security system 202 lostelectrical power; and/or if the computing device 204 cannot communicatewith the security system 202. In some embodiments, the connectivityindicator 248 alerts the user of the computing device 204 by flashing,emitting a sound, displaying a message, and/or displaying a symbol.

In some embodiments, if the security system 202 loses power, losesconnectivity to the computing device 204, loses connectivity to theInternet, and/or loses connectivity to a remote server, a remote server206 sends an alert (e.g., phone call, text message, image on the userinterface 240) regarding the power and/or connectivity issue. In severalembodiments, the remote server 206 can manage communication between thesecurity system 202 and the computing device. In some embodiments,information from the security system 202 is stored by the remote server206. In several embodiments, information from the security system 202 isstored by the remote server 206 until the information can be sent to thecomputing device 204, uploaded to the computing device 204, and/ordisplayed to the remotely located person via the computing device 204.The remote server 206 can be a computing device that stores informationfrom the security system 202 and/or from the computing device 204. Insome embodiments, the remote server 206 is located in a data center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202. If thecomputing device 204 and/or the remote server 206 is unable tocommunicate with the security system 202, the computing device 204and/or the remote server 206 alerts the remotely located person via thesoftware, phone, text, a displayed message, and/or a website. In someembodiments, the computing device 204 and/or the remote server 206attempts to communicate with the security system 202 periodically; atleast every five hours and/or less than every 10 minutes; at least every24 hours and/or less than every 60 minutes; or at least every hourand/or less than every second.

In some embodiments, the server 206 can initiate communication to thecomputer device 204 and/or to the security system 202. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the security system202.

In several embodiments, a user can log into an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the security systemsettings discussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a security system due to the user'srequest rather than due to actions of a visitor. Some embodimentsinclude a computing device initiating a live video feed (or a video feedthat is less than five minutes old).

In some embodiments, the user interface 240 displays an image 252 suchas a still image or a video of an area near and/or in front of thesecurity system 202. The image 252 can be taken by the camera assembly208 and stored by the security system 202, server 206, and/or computingdevice 204. The user interface 240 can include a recording button 256 toenable a user to record images, videos, and/or sound from the cameraassembly 208, microphone of the security system 202, and/or microphoneof the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the security system 202. The user interface 240can also include a sound adjustment button 264 and a mute button 268.The user interface 240 can include camera manipulation buttons such aszoom, pan, and light adjustment buttons. In some embodiments, the cameraassembly 208 automatically adjusts between Day Mode and Night Mode. Someembodiments include an infrared camera and/or infrared lights toilluminate an area near the security system 202 to enable the cameraassembly 208 to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, and touching a touch screen. Many embodimentsinclude buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton, which can allow a user to select the quality and/or amount ofthe data transmitted from the security system 202 to the computingdevice 204 and/or from the computing device 204 to the security system202.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

The user interface 240 can include a termination button 276 to endcommunication between the security system 202 and the computing device204. In some embodiments, the termination button 276 ends the ability ofthe person located near the security system 202 (i.e., the visitor) tohear and/or see the user of the computing device 204, but does not endthe ability of the user of the computing device 204 to hear and/or seethe person located near the security system 202.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and is a termination button (toend communication between the security system 202 and the computingdevice 204). The button 276 can include the word “Answer” when thesystem is attempting to establish two-way communication between thevisitor and the user. Selecting the button 276 when the system isattempting to establish two-way communication between the visitor andthe user can start two-way communication. The button 276 can include thewords “End Call” during two-way communication between the visitor andthe user. Selecting the button 276 during two-way communication betweenthe visitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe security system and to stop emitting sounds recorded by the securitysystem.

In some embodiments, the user interface 240 opens as soon as thesecurity system detects a visitor (e.g., senses indications of avisitor). Once the user interface 240 opens, the user can see and/orhear the visitor even before “answering” or otherwise accepting two-waycommunication, in several embodiments.

Some method embodiments include detecting a visitor with a securitysystem. The methods can include causing the user interface to display ona remote computing device 204 due to the detection of the visitor (e.g.,with or without user interaction). The methods can include displayingvideo from the security system and/or audio from the security systembefore the user accepts two-way communication with the visitor. Themethods can include displaying video from the security system and/oraudio from the security system before the user accepts the visitor'scommunication request. The methods can include the computing devicesimultaneously asking the user if the user wants to accept (e.g.,answer) the communication request and displaying audio and/or video ofthe visitor. For example, in some embodiments, the user can see and hearthe visitor via the security system before opening a means of two-waycommunication with the visitor.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device might wonder whatis happening near the security system 202. The user can open thesoftware application on the computing device 204 and instruct theapplication to show live video and/or audio from the security device 202even if no event near the security system 202 has triggered thecommunication.

In several embodiments, the security device 202 can be configured torecord when the security device 202 detects movement and/or the presenceof a person. The user of the computing device 204 can later review allvideo and/or audio records when the security device 202 detectedmovement and/or the presence of a person.

Referring now to FIG. 1, in some embodiments, the server 206 controlscommunication between the computing device 204 and the security system202, which can be a doorbell with a camera, a microphone, and a speaker.In several embodiments, the server 206 does not control communicationbetween the computing device 204 and the security system 202.

In some embodiments, data captured by the security system and/or thecomputing device 204 (such as videos, pictures, and audio) is stored byanother remote device such as the server 206. Cloud storage, enterprisestorage, and/or networked enterprise storage can be used to store video,pictures, and/or audio from the communication system 200 or from anypart of the communication system 200. The user can download and/orstream stored data and/or storage video, pictures, and/or audio. Forexample, a user can record visitors for a year and then later can reviewconversations with visitors from the last year. In some embodiments,remote storage, the server 206, the computing device 204, and/or thesecurity system 202 can store information and statistics regardingvisitors and usage.

FIG. 3 illustrates an embodiment in which a security system 202 isconnected to a building 300, which can include an entryway 310 that hasa door 254. A door lock 250 can be configured to lock and unlock thedoor 254. Electrical wires 304 can electrically couple the securitysystem 202 to the electrical system of the building 300 such that thesecurity system 202 can receive electrical power from the building 300.

A wireless network 308 can allow devices to wirelessly access theInternet. The security system 202 can access the Internet via thewireless network 308. The wireless network 308 can transmit data fromthe security system 202 to the Internet, which can transmit the data toremotely located computing devices 204. The Internet and wirelessnetworks can transmit data from remotely located computing devices 204to the security system 202. In some embodiments, a security system 202connects to a home's WiFi.

As illustrated in FIG. 3, one computing device 204 (e.g., a laptop, asmartphone, a mobile computing device, a television) can communicatewith multiple security systems 202. In some embodiments, multiplecomputing devices 204 can communicate with one security system 202.

In some embodiments, the security system 202 can communicate (e.g.,wirelessly 230) with a television 306, which can be a smart television.Users can view the television 306 to see a visitor and/or talk with thevisitor.

The entire contents of the following patent application are incorporatedby reference herein: U.S. patent application Ser. No. 14/612,376; filedFeb. 3, 2015; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS.

FIG. 4 of patent application Ser. No. 14/612,376 illustrates acommunication system 310 that includes a security system 320, a doorbellbutton 212, a WiFi router 328, a server 332, and users 336. In step 340,a visitor initiates a communication request by pressing the doorbellbutton 212 or triggering a motion or proximity sensor. The visitor cantrigger the motion or proximity sensor by approaching the securitysystem 320. In step 350, the security system 320 connects or otherwisecommunicates with a home WiFi router 328. In step 360, the server 332receives a signal from the WiFi router 328 and sends video and/or audioto the users 336 via a wireless network 364. In step 370, the users seethe visitor, hear the visitor, and talk with the visitor. Step 370 caninclude using a software application to see, hear, and/or talk with thevisitor. The visitor and users 336 can engage in two-way communication374 via the internet or other wireless communication system even whenthe visitor and the users 336 are located far away from each other. Someembodiments enable users to receive communication requests andcommunicate with visitors via diverse mobile communication standardsincluding third generation (“3G”), fourth generation (“4G”), long termevolution (“LTE”), worldwide interoperability for microwave access(“WiMAX”), and WiFi.

In some cases, the users 336 utilize the communication system 310 tocommunicate with visitors who are in close proximity to the users 336.For example, a user 336 located inside her home can communicate with avisitor located just outside the home via the communication system 310.

Referring now to FIG. 4 of the present application, the security system202 may be configured to detect various indications of visitors. Inresponse to detecting any of the various indications, the securitysystem 202 may contact a specific resident associated with an indicationof a respective visitor. In some embodiments, the security system 202may be configured to utilize voice recognition to identify the voice 789of a visitor 510 and contact a resident associated with the voice 789 ofthe visitor 510. For example, the security system 202 may contact Bob, aresident of a multi-family dwelling, in response to the security system202 detecting the voice of Suzie, Bob's girlfriend.

As illustrated in FIG. 4, the security system 202 may detect a visitor'sidentity via facial recognition and then contact a specific residentassociated with the face 790 of the visitor 510. For example, thesecurity system 202 may contact Carol, an office manager of a companylocated within a commercial office building, in response to the securitysystem 202 detecting the face of Fred, an applicant whom Carol will beinterviewing for a job.

The security system 202 may be configured to identify a visitor by amotion 797 of a visitor 510. For example, the security system 202 may beconfigured to identify the visitor 510 by a motion of the visitor (e.g.,gait analysis, analysis of a visitor's locomotion or body mechanics,etc.). In a specific example, the security system 202 may detect avisitor 510 approaching the building 300, to which the security system202 is attached. As the visitor 510 approaches the building the securitysystem 202 may analyze specific body movements of the visitor 510, whichindicate the identity of the visitor 510. For example, the securitysystem 202 may determine that the motion of the visitor is associatedwith a repairman who is scheduled to be at the building 300 withinseveral minutes.

As shown in FIG. 4, the security system 202 can validate the identity ofthe visitor 510 from the initial identity, e.g., as determined by thevisitor's motion, through secondary means. For example, as the visitor510 approaches the security system 202, the security system 202 can thenask the visitor 510 to state his name. The security system 202 can thenvalidate the visitor's identity through voice recognition.

Furthermore, the security system 202 may determine that a visitor isassociated with a resident through various technologies, such asscanning of the visitor's retina 792 (i.e., retina scanning), detectionof the visitor's remote computing device 204, scanning of the visitor'sfinger print 796 (i.e., finger print scanning), and the like. In someembodiments, the security system 202 may associate the visitor with theresident through various social networks. In this manner, the securitysystem 202 may retrieve any identifying characteristics of a visitor andassociate them with a particular resident. In some embodiments, thevisitor may be associated with the resident through a previous identityof the visitor. For example, the resident may load an image or a voiceof the visitor into the security system 202 to thereby recognize thevisitor when the visitor approaches the security system 202.

In response to detecting an indication of the visitor's identity, thesecurity system 202 may contact the resident associated with the visitorthrough various methods. In some embodiments, the security system 202rings a chime of the resident. In some embodiments, the security system202 initiates a communication session with the resident's remotecomputing device (e.g., sends a notification to the resident's smartphone). Even still, in some embodiments, the security system 202 emitsan audible message within the vicinity of the resident. For example, ifthe security system 202 detects that Joe's friend Greg is located at thefront door, the security system 202 may audibly announce within thehome, “Greg is here.” It should be appreciated that any suitable methodof contacting the resident may be implemented.

As well, the security system 202 may be configured to work in any typeof building 300. For example, the building 300 may comprise amulti-family dwelling, a single family home, an office building, awarehouse, or any building configured to permanently or temporarilyhouse residents.

The security system 202 may be configured to actively or passivelydetermine the identity of the visitor 510. For example, the securitysystem 202 may automatically detect a visitor 510 and then determine thevisitor's identity. As well, the security system 202 may be configuredto determine the visitor's identity in response to an input from thevisitor, such as the visitor pressing the button 212.

Furthermore, the security system 202 may prompt the visitor 510 throughvarious manners. For example, in response to the visitor 510 pressingthe button 212, the security system 202 may audibly announce the namesof various residents of the building 300 to determine which resident thevisitor 510 is seeking to visit. Once the visitor 510 announces theresident's name, the security system 202 may determine the visitor'sidentity, as a validation that the visitor is in fact associated withthe resident.

The security system 202 may also be configurable to elect to contact theresident associated with the visitor in response to various parameters.For example, the security system 202 may elect to contact or not contactthe resident based on the time of day, such as based upon the actualtime of day, or based upon the amount of outdoor light as detected bythe security system 202. As well, the election parameters may be used incombination. For example, if the security system 202 detects that Fred'sfather is present, the security system 202 may elect to contact theresident Fred no matter what time of day Fred's father arrives. However,for someone not as closely connected to the resident Fred, such as awork colleague Barney, the security system 202 may elect to only contactFred during daylight hours, and not contact Fred during nighttime hours.It should be appreciated that the security system 202 may be configuredto elect to contact residents in response to any suitable electionparameters.

As illustrated in FIGS. 5 and 6, embodiments of the security system 202may be configured to communicate with other security systems 202 thatare communicatively coupled within a network. For example, a firstsecurity system 202 a may be configured to receive data from a secondsecurity system 202 b that is located remote to the first securitysystem 202 a. The data can comprise any type of information such as anindication of a high-risk visitor roaming the neighborhood (e.g., aprowler that has been detected in a neighborhood). The data received bythe first security system 202 a may include identifying characteristicsof the high-risk visitor.

Accordingly, the first security system 202 a uses the data to determinewhether a visitor 510 who is approaching the first building 300 a is infact the high risk visitor. This may be accomplished by the firstsecurity system 202 a determining that the identity of the visitor 510substantially matches the identity of the high-risk visitor using any ofthe embodiments described throughout this disclosure.

In response to detecting the presence of the high-risk visitor, thefirst security system 202 a can then be configured to initiate an alertto notify the resident of the first building 300 a and/or anyone locatedwithin the area. In some embodiments, the first security system 202 acan be configured to secretly notify the resident so as not to spook thehigh-risk visitor, such as by initiating a communication session with aremote computing device 204 to thereby inform a user of the remotecomputing device 204 of the presence of the high-risk visitor. In someembodiments, the first security system 202 a can be configured toinitiate an alarm to thereby scare the high-risk visitor to flee thepremises. In some embodiments, the alert may comprise illuminating alight on the first security system 202 a, and/or emitting a noise with aspeaker of the first security system 202 a.

It should be appreciated that the network or ecosystem of securitysystems 202 may be communicatively coupled indirectly through acommunication network 414, such as through a cloud computer, as shown inFIG. 5. As well, the network of security systems 202 may becommunicatively coupled directly to each other, as shown in FIG. 6.

The network of security systems 202 may be implemented in variousapplications, such as security systems 202 being attached to varioushomes within a neighborhood (e.g., separate homes located more than 50feet from each other). As well, the security systems 202 may be attachedto various units within one building, such as apartment units within anapartment building. As well, any number of security systems 202 may belinked through the network, such as at least two security systems 202,at least three security systems 202 (i.e., addition of at least a thirdsecurity system 202 c as shown in FIGS. 5 and 6, as attached to a thirdbuilding 300 c), and at least four or more security systems 202.

Interpretation

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other.

The section headings and subheadings provided herein are nonlimiting.The section headings and subheadings do not represent or limit the fullscope of the embodiments described in the sections to which the headingsand subheadings pertain. For example, a section titled “Topic 1” mayinclude embodiments that do not pertain to Topic 1 and embodimentsdescribed in other sections may apply to and be combined withembodiments described within the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodimentsinclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy. While certain example embodiments have been described, theseembodiments have been presented by way of example only, and are notintended to limit the scope of the inventions disclosed herein. Thus,nothing in the foregoing description is intended to imply that anyparticular feature, characteristic, step, module, or block is necessaryor indispensable. Indeed, the novel methods and systems described hereinmay be embodied in a variety of other forms; furthermore, variousomissions, substitutions, and changes in the form of the methods andsystems described herein may be made without departing from the spiritof the inventions disclosed herein.

The following is claimed:
 1. A method of operating a doorbell systemcomprising a speaker, a microphone, and a visitor detection systemhaving a camera, the method comprising: detecting, via facialrecognition, a first identity of a first visitor; and contacting a firstresident in response to detecting the first identity.
 2. The method ofclaim 1, further comprising contacting the first resident in response tothe first resident being associated with the first visitor.
 3. Themethod of claim 1, further comprising electing to contact the firstresident based on a first contact parameter related to the firstidentity.
 4. The method of claim 1, further comprising electing tocontact the first resident based on a time at which the doorbell systemdetects an indication of the first visitor.
 5. The method of claim 1,further comprising electing to contact the first resident based on afirst contact parameter related to the first identity and based on atime at which the doorbell system detects an indication of the firstvisitor, wherein the first contact parameter comprises the firstidentity of the first visitor.
 6. The method of claim 1, furthercomprising, in response to detecting the first identity, emitting anoise with a chime located remotely relative to the doorbell system,wherein the chime is communicatively coupled to the doorbell system. 7.The method of claim 1, wherein contacting the first resident comprisesinitiating a first communication session with a first remote computingdevice of the first resident.
 8. A method of operating a doorbell systemcomprising a speaker, a microphone, and a visitor detection systemhaving a camera, the method comprising: detecting, via facialrecognition, a first identity of a first visitor; initiating a firstcommunication session with a first remote computing device configured tobe used by a first resident; and sending the first identity to the firstremote computing device.
 9. The method of claim 8, further comprisinginitiating the first communication session with the first remotecomputing device in response to the first remote computing device beingassociated with the first visitor.
 10. The method of claim 8, furthercomprising electing to initiate the first communication session with thefirst remote computing device based on a first contact parameter relatedto the first identity.
 11. The method of claim 10, wherein the firstcontact parameter comprises the first identity of the first visitor. 12.The method of claim 8, further comprising electing to initiate the firstcommunication session with the first remote computing device based on atime at which the doorbell system detects an indication of the firstvisitor.
 13. The method of claim 8, further comprising electing toinitiate the first communication session with the first remote computingdevice based on a first contact parameter related to the first identityand based on a time at which the doorbell system detects an indicationof the first visitor, wherein the first contact parameter is related tothe first identity of the first visitor.
 14. The method of claim 8,further comprising, in response to detecting the first identity,emitting a noise with a chime located remotely relative to the doorbellsystem, wherein the chime is communicatively coupled to the doorbellsystem.
 15. A method of operating a doorbell system comprising aspeaker, a microphone, and a visitor detection system having a camera,the method comprising: detecting, via facial recognition, a firstidentity of a first visitor, and then in response to detecting the firstidentity, contacting a first resident, and detecting, via facialrecognition, a second identity of a second visitor, and then in responseto detecting the second identity, contacting a second resident.
 16. Themethod of claim 15, further comprising contacting the first resident inresponse to the first resident being associated with the first visitor.17. The method of claim 16, further comprising contacting the secondresident in response to the second resident being associated with thesecond visitor.
 18. The method of claim 15, further comprising, inresponse to detecting the first identity, emitting a noise with a chimelocated remotely relative to the doorbell system.
 19. The method ofclaim 18, wherein the chime is communicatively coupled to the doorbellsystem.
 20. The method of claim 15, wherein contacting the firstresident comprises initiating a first communication session with a firstremote computing device of the first resident.
 21. The method of claim20, wherein contacting the second resident comprises initiating a secondcommunication session with a second remote computing device of thesecond resident.
 22. The method of claim 15, wherein contacting thefirst resident comprises initiating, in response to detecting via facialrecognition the first identity, a first communication session with afirst remote computing device of the first resident.
 23. The method ofclaim 15, further comprising electing to contact the first residentbased on a first contact parameter.
 24. The method of claim 23, whereinthe first contact parameter is related to the first identity.
 25. Themethod of claim 23, wherein the first contact parameter comprises thefirst identity of the first visitor.
 26. The method of claim 25, furthercomprising electing to contact the second resident based on a secondcontact parameter, wherein the second contact parameter comprises thesecond identity of the second visitor.
 27. The method of claim 15,wherein contacting the first resident comprises initiating a firstcommunication session with a first remote computing device of the firstresident, and wherein contacting the second resident comprisesinitiating a second communication session with a second remote computingdevice of the second resident.
 28. The method of claim 15, furthercomprising electing to contact the first resident based on a first timeat which the doorbell system detects a first indication of the firstvisitor.
 29. The method of claim 28, further comprising electing tocontact the second resident based on a second time at which the doorbellsystem detects a second indication of the second visitor.
 30. The methodof claim 28, further comprising electing to contact the first residentbased on a first contact parameter, wherein the first contact parametercomprises the first identity of the first visitor.