Doorbell communication systems and methods

ABSTRACT

Methods can include using a doorbell to wirelessly communicate with a remotely located computing device. Doorbells can include a speaker, a microphone, a camera, and a button to sound a chime. A doorbell shipping mode can detect whether the doorbell is electrically coupled to an external power source. Methods can include entering a setup mode or a standby mode in response to detecting electricity from the external power source.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional PatentApplication No. 61/859,070; filed Jul. 26, 2013; and entitled DOORBELLCOMMUNICATION SYSTEMS AND METHODS; and U.S. Provisional PatentApplication No. 61/872,439; filed Aug. 30, 2013; and entitled DOORBELLCOMMUNICATION SYSTEMS AND METHODS; the entire contents of which areincorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/098,772; filed Dec.6, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/099,888; filed Dec.6, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/142,839; filed Dec.28, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference.

BACKGROUND

1. Field

Various embodiments disclosed herein relate to devices and methods thatenable remotely located individuals to communicate. Certain embodimentsrelate to communication between a person near an entry point such as adoorway and a person in another location.

2. Description of Related Art

Homes, offices, and other buildings sometimes include communication andsurveillance systems to enable friendly visitors to summon occupants ofthe buildings and to deter unwanted visitors. Communication andsurveillance systems can include video cameras and doorbells.

Doorbells can enable a person located outside of an entry point, such asa door, to alert a person inside of an entry point that someone outsidewould like to talk to someone inside. Doorbells sometimes include abutton located near a door, such as a front door, side door, or backdoor of a home, office, dwelling, warehouse, building, or structure.Doorbells are sometimes used near a gate or some other entrance to apartially enclosed area. Pushing the doorbell sometimes causes a chimeor other alerting sound to be emitted. In some cases, this alertingsound can typically be heard within a short distance from the entrypoint or sound source. For example, a homeowner located remotely fromher home likely would not be able to hear the alerting sound, and thus,would not be aware that someone is ringing her doorbell. Thus, there isa need for devices and methods to alert remotely located individualsthat someone seeks the attention of the homeowner, tenant, buildingguardian, or steward.

SUMMARY

Methods can include using a doorbell that is configurable to wirelesslycommunicate with a remotely located computing device, such as a cellulartelephone, laptop, or tablet. Some embodiments include obtaining adoorbell that comprises a speaker, a microphone, a camera, and a button.The button can be configurable to enable a visitor to sound a chime(e.g., a speaker or another sound emission device located inside of abuilding). Several embodiments include shipping the doorbell in ashipping mode that consumes power. In the shipping mode, the doorbellcan detect whether the doorbell is electrically coupled to an externalpower source (e.g., the electricity of a building to which the doorbellis attached). Methods can then include entering a network connectionmode in response to detecting electricity from the external powersource. The shipping mode can consume less power than the networkconnection mode. The network connection mode can comprise detecting awireless network (e.g., a wireless network emitted by a router). Severalmethods include detecting a first indication of the visitor using thedoorbell.

Methods for using a doorbell that is configurable to wirelesslycommunicate with a remotely located computing device can includeobtaining the doorbell that comprises a speaker, a microphone, a camera,and a button. The button can be configured to enable a visitor to sounda chime. Some methods include shipping the doorbell in a shipping modethat consumes power. During the shipping mode, the doorbell can beconfigured to detect whether the doorbell is electrically coupled to anexternal power source. Methods can include entering a setup mode inresponse to detecting electricity from the external power source. Theshipping mode can consume less power than the setup mode. The setup modecan increase electrical activities of the doorbell relative to theshipping mode. Some embodiments include increasing the electricalactivities of the communication module, circuit board, battery,microphone, speaker, and/or camera. Some embodiments include detecting afirst indication of the visitor. The first indication can be detectedusing the doorbell.

The remotely located computing device can be a cellular telephone havinga display screen. Methods can comprise sending an image of the visitorfrom the doorbell to the cellular telephone and displaying the image ofthe visitor on the display screen of the cellular telephone.

Some embodiments comprise detecting a second indication of the visitor,wherein the second indication is detected using the doorbell. Severalmethods comprise sending a wireless notification to the remotely locatedcomputing device regarding a presence of the visitor in response todetecting both the first indication and the second indication.

In some embodiments, detecting the first indication comprises detectinga signal indicative of the visitor above a first threshold and detectingthe second indication comprises detecting the signal indicative of thevisitor above a second threshold. In some embodiments, the secondthreshold is greater than the first threshold. The doorbell can comprisea first sensor. The signal indicative of the visitor can be sensed bythe first sensor of the doorbell.

In several embodiments, the first sensor of the doorbell comprises amotion sensor and the signal is related to motion. The camera, thespeaker, and/or the microphone can be disabled during the setup mode.

The first sensor of the doorbell can comprise a proximity sensor. Thesignal can be related to proximity of the visitor.

The first sensor of the doorbell can comprise a microphone. The signalcan be related to sound. In some embodiments, detecting the secondindication comprises detecting a knocking sound.

In several embodiments, a doorbell comprises a first sensor and a secondsensor. The first indication can be detected using the first sensor andthe second indication can be detected using the second sensor. The firstsensor can be a different type of sensor than the second sensor.

In some embodiments, the first sensor of the doorbell comprises a motionsensor. The second sensor can comprise the microphone. Methods cancomprise using the microphone to detect a knocking sound to verify thepresence of the visitor detected by the motion sensor.

In several embodiments, the first sensor of the doorbell can comprise aninfrared detector and the second sensor can comprise the camera.

In some embodiments, the doorbell comprises a battery. The setup modecan comprise automatically charging the battery in response to detectingthe electricity from the external power source.

In some embodiments, the setup mode comprises automatically replenishingat least a portion of electrical energy consumed from the battery by thedoorbell during the shipping mode. Methods can comprise precludingwireless communication by the doorbell until after replenishing theportion of the electrical energy and then entering a network connectionmode in response to pressing the button for at least eight seconds.Pressing the button for at least eight seconds can help the doorbelldistinguish between when the user just wants to sound the chime and whenthe user wants the doorbell to enter the network connection mode. Thenetwork connection mode can comprise detecting a wireless network.

In several embodiments, the doorbell comprises a battery and the setupmode comprises using the electricity from the external power source tocharge the battery before enabling communication between the doorbelland the remotely located computing device.

In some embodiments, the setup mode comprises a network connection mode,and the method comprises entering the network connection mode inresponse to pressing the button for at least eight seconds. The networkconnection mode can comprise detecting a wireless network and inputtinga doorbell identification code into the remotely located computingdevice. In some embodiments, inputting the doorbell identification codeincludes typing letters, numbers, words, and/or symbols on the remotelylocated computing device. Inputting the doorbell identification code caninclude speaking letters, numbers, words, and/or symbols such that theremotely located computing device hears the information and captures theinformation.

The doorbell identification code can be associated with the doorbellsuch that the code is correlated with at least one doorbell. The codecan be used as an electronic key to unlock access to the doorbell. Thenetwork connection mode can comprise using the doorbell identificationcode to verify whether the remotely located computing device isauthorized to communicate with the doorbell. For example, the code canprevent an unauthorized computing device from hacking into the doorbelland receiving visitor alerts from the doorbell.

In several embodiments, the network connection mode comprises enablingcommunication from the remotely located computing device to the doorbellin response to pressing the button for at least eight seconds andinputting the doorbell identification code into the remotely locatedcomputing device. Pressing the button for at least eight seconds canhelp the doorbell distinguish between when the user just wants to soundthe chime and when the user wants to enable communication from theremotely located computing device to the doorbell.

In some embodiments, the remotely located computing device is connectedto the wireless network such that the remotely located computing deviceis configured to transmit data via the wireless network. The wirelessnetwork can comprise a name and a password. The name can identify thewireless network to entities searching for wireless networks. Thepassword can enable an electronic device to connect to the wirelessnetwork. The wireless network can enable electronic devices to connectto the Internet.

The communication from the remotely located computing device to thedoorbell can comprise the name and the password of the wireless networkto which the remotely located computing device is connected. The networkconnection mode can comprise connecting the doorbell to the wirelessnetwork to which the remotely located computing device is connected suchthat the doorbell can send an alert regarding a presence of the visitorto the remotely located computing device via the wireless network.

Some embodiments include using the doorbell to detect multiple wirelessnetworks. The wireless network to which the remotely located computingdevice is connected can be one of the multiple wireless networks.Methods can comprise automatically selecting the wireless network towhich the remotely located computing device is connected. For example,the system can choose which wireless network to connect the doorbellwithout asking a person which wireless network the system should choose.

In some embodiments, a setup mode comprises a network connection mode.Methods can comprise entering the network connection mode in response topressing the button for at least eight seconds. The network connectionmode can comprise detecting a first wireless network having a name and apassword. The network connection mode can comprise inputting a doorbellidentification code into the remotely located computing device. Thedoorbell identification code can be associated with the doorbell. Thenetwork connection mode can comprise using the doorbell identificationcode to verify whether the remotely located computing device isauthorized to communicate with the doorbell. The network connection modecan comprise the remotely located computing device creating a secondwireless network (e.g., that emanates from the remotely locatedcomputing device). The network connection mode can comprise transmittingthe name and the password of the first wireless network directly fromthe remotely located computing device to the doorbell via the secondwireless network to enable the doorbell to communicate with the remotelylocated computing device via the first wireless network. Methods cancomprise the remotely located computing device directly communicatingwith the doorbell via the second wireless network prior to the doorbellindirectly communicating with the remotely located computing device viathe first wireless network. For example, the wireless communication fromthe remotely located computing device can travel through the airdirectly to the doorbell. The wireless communication from the remotelylocated computing device can travel indirectly to the doorbell via athird electronic device such as a server.

A remotely located computing device can be located near a doorbell. Forexample, during setup some users will hold a cellular phone within acouple of feet from the doorbell to input a doorbell identification codeinto the cellular phone to verify that the phone is authorized tocommunicate with the doorbell and to help the doorbell connect to awireless network. The phone is located remotely from the doorbellbecause it is not physically attached to the doorbell.

Several methods include using a doorbell that is configurable towirelessly communicate with a remotely located computing device. Methodscan include shipping the doorbell in a shipping mode that consumespower. During some shipping mode embodiments, the doorbell is configuredto detect whether the doorbell is electrically coupled to an externalpower source. Several embodiments include entering a standby mode inresponse to detecting electricity from the external power source. Theshipping mode can consume less power than the standby mode. The speakerand the microphone can be disabled during the standby mode.

Some embodiments include exiting the standby mode and entering an alertmode in response to detecting a first indication of the visitor. Thefirst indication can be detected using the doorbell. Several embodimentsinclude sending a wireless notification to the remotely locatedcomputing device regarding a presence of the visitor in response toentering the alert mode.

Some embodiments comprise detecting multiple wireless networks andautomatically selecting a first wireless network for communicatingbetween the doorbell and the remotely located computing device. Prior tothe automatic selection, the remotely located computing device can beconnected to the first wireless network. Methods can further compriseauthorizing the doorbell to communicate with the remotely locatedcomputing device by pressing the button for at least eight seconds andinputting a doorbell identification code into the remotely locatedcomputing device. The doorbell identification code can be associatedwith the doorbell. The first wireless network can comprise a name and apassword. Methods can further comprise wirelessly communicating the nameand the password from the remotely located computing device to thedoorbell.

Several methods include entering a network connection mode prior tosending the wireless notification. The network connection mode cancomprise detecting a first wireless network having a name and apassword. The network connection mode can comprise inputting a doorbellidentification code into the remotely located computing device. Thedoorbell identification code can be associated with the doorbell. Thenetwork connection mode can further comprise using the doorbellidentification code to verify whether the remotely located computingdevice is authorized to communicate with the doorbell. The networkconnection mode can comprise the remotely located computing devicecreating a second wireless network. The network connection mode cancomprise transmitting the name and the password of the first wirelessnetwork directly from the remotely located computing device to thedoorbell via the second wireless network to enable the doorbell tocommunicate with the remotely located computing device via the firstwireless network. Methods can comprise the doorbell directlycommunicating with the remotely located computing device via the secondwireless network prior to the doorbell indirectly communicating with theremotely located computing device via the first wireless network.

In some embodiments, devices enable a person to communicate with aremotely located individual and/or remotely answer a door. For example,a person might ring a doorbell of a building when no one is inside thebuilding. A communication system can notify a remotely located personregarding the doorbell ring via a computing device such as a computer,laptop, or phone. The computing device can then allow the remotelylocated person to hear, see, and/or communicate with the person who rangthe doorbell. In some embodiments, communication systems include adoorbell, a microphone, a speaker, a camera, and/or a wirelesscommunication system. In several embodiments, ringing a doorbell isunnecessary because communication is triggered by a person approaching asensor such as a motion sensor or proximity sensor. In some embodiments,ringing a doorbell is unnecessary because communication is triggered bya person making a sound, such as a knocking sound, stepping sound,and/or rustling noises.

Some embodiments include a doorbell system configured to electricallycouple to an electrical system of a building. The building can have anarea in which electrical wires protrude toward an outer portion of thebuilding. The electrical wires are electrically coupled to theelectrical system. The doorbell system can include a wirelesscommunication assembly capable of communicating with a wireless networkto enable the doorbell system to communicate with a remotely locatedcomputing device. The doorbell system can also include a doorbell, acamera, a microphone, and a speaker. The doorbell system can beconfigured to send images recorded by the camera and sounds recorded bythe microphone to the remotely located computing device. The doorbellsystem can also include a housing coupled to the doorbell, the camera,the microphone, and the speaker. The doorbell system can also include amounting bracket with an open section configured to fit around the areain which electrical wires protrude toward an outer portion of thebuilding. The mounting bracket can be configured to couple to thehousing. The mounting bracket can also be configured to enable theelectrical wires to pass through the open section and electricallycouple with at least a portion of the doorbell system.

Some embodiments include a method for using a doorbell, wherein thedoorbell can be configurable to wirelessly communicate with a remotelylocated computing device. Methods can include obtaining the doorbellthat can comprise a speaker, a microphone, and a camera, wherein thedoorbell can be configurable for mounting near an entryway. As usedherein, “configurable” can be “capable.”

Several methods can comprise entering a shipping mode and then enteringa sleep mode in response to detecting electricity from an external powersource, wherein the shipping mode consumes less power than the sleepmode. The shipping mode can consume at least 50% less power or at least90% less power than a sleep mode.

Methods can include entering a sleep mode, wherein the sleep mode canconsume less power (e.g., at least 20% less power, at least 40% lesspower, at least 65% less power) than a standby mode.

Wireless communication can disabled during the sleep mode such that thedoorbell does not wirelessly communicate with the remotely locatedcomputing device (e.g., a smartphone or a computer that is notphysically coupled to the doorbell). In some embodiments, the doorbellcan temporarily exit sleep mode to wirelessly communicate (e.g., with aserver or computer) before returning to sleep mode. In some embodiments,the camera of the doorbell can disabled during the sleep mode such thatthe doorbell does not record and/or sense images during sleep mode.

Several embodiments include entering the standby mode in response todetecting a first indication of a visitor. The first indication can bedetected using the doorbell. The standby mode can consume less power(e.g., at least 20% less power, at least 40% less power, at least 65%less power) than an alert mode. Standby mode can increases an activityof at least one component relative to the sleep mode. In someembodiments, standby mode increases the electrical activity, processingactivity, or sensing activity of a wireless communication system, asensor (e.g., a motion sensor, a proximity sensor, a sound sensor, abutton), a camera, a microphone, a speaker, or a computer processor. Forexample, a camera can be inactive during sleep mode but can be activeduring standby mode.

Some methods include entering the alert mode in response to detecting asecond indication of the visitor. The second indication can be detectedusing the doorbell. The doorbell can record an image using the cameraduring the alert mode. As used herein, “record” is used in a very broadsense and does not necessarily mean that the image is stored in a memoryof the doorbell. For example, a doorbell could “record an image” bysending data related to an image that is displayed on a remotely locatedcomputing device. Recording an image can include taking an image,capturing an image, or sensing an image.

In several embodiments, detecting the first indication can comprisedetecting a signal indicative of the visitor above a first threshold.For example, detecting a very faint motion signal might be insufficientto detect the first indication that a visitor might be present, butdetecting a stronger motion signal could be sufficient to detect thefirst indication. Detecting the second indication can comprise detectingthe signal indicative of the visitor above a second threshold. Thesecond threshold can be greater than the first threshold.

The doorbell can comprise a first sensor. The signal indicative of thevisitor can be sensed by the first sensor of the doorbell. The firstsensor of the doorbell can comprise a motion sensor, and the signal canbe related to motion. The camera can be disabled (e.g., turned off,prevented from recording) during the sleep mode. The first sensor of thedoorbell can comprise a proximity sensor, and the signal can be relatedto proximity of the visitor.

The first sensor of the doorbell can comprise a microphone, and thesignal can be related to sound. The sound can be a knocking sound. Thespeaker can comprise a flat speaker located in a sound chamberconfigured to amplify an emitted sound.

In several embodiments, the doorbell can comprise a first sensor and asecond sensor. The first indication can be detected using the firstsensor, and the second indication can be detected using the secondsensor. The first sensor can be a different type of sensor than thesecond sensor. For example, the first sensor can be one type of motionsensor while the second sensor is another type of motion sensor.

In some embodiments, the first sensor of the doorbell can comprise amotion sensor that is at least partially covered by a cover. Somemethods comprise detecting motion through the cover while obscuring themotion sensor from the visitor and/or while not emitting a visible lightfrom the doorbell. In some cases, this approach can enable the doorbellto record a visitor's actions without the visitor becoming aware theactions are being recorded and/or transmitted. The second sensor cancomprise a microphone.

In several embodiments, the first sensor of the doorbell comprises amicrophone. In some embodiments, the first sensor of the doorbellcomprises an infrared detector and/or the second sensor comprises thecamera. The first sensor of the doorbell can comprise a proximitysensor.

Some method embodiments include using a doorbell that is configurable tocommunicate wirelessly with a remotely located computing device. Severalembodiments can include obtaining the doorbell that comprises a speaker,a microphone, a camera, and a button, wherein the button is configurableto enable a visitor to sound a chime. For example, once the doorbell isinstalled properly in an entryway, pressing the button can cause a chime(e.g., a speaker) to emit a sound inside of a building. Some embodimentscan include entering a sleep mode, wherein the sleep mode can consumeless power than an alert mode. Wireless communication can be off (e.g.,disabled, inactive) during the sleep mode. Several embodiments caninclude entering the alert mode in response to detecting a firstindication of the visitor, wherein the first indication can be detectedusing the doorbell. The doorbell can record an image using the cameraduring the alert mode.

Some embodiments can include sending a wireless notification to theremotely located computing device regarding a presence of the visitor inresponse to the visitor being present for more than a first thresholdamount of time. Several methods comprise sending the notification to theremotely located computing device before the visitor presses the buttonof the doorbell or activates a switch of the doorbell configured totrigger a chime such that the chime emits a sound. The first thresholdamount of time can be at least three seconds, at least eight seconds,less than 20 seconds, and/or less than 40 seconds. The camera can be offduring sleep mode (although some embodiments include temporarily exitingsleep mode to turn the camera on).

Several embodiments include preventing (e.g., blocking) a redundantnotification regarding the visitor (e.g., to avoid unnecessarilybothering a user). Some methods include preventing a redundantnotification regarding the visitor until after a second threshold amountof time. The second threshold amount of time can be at least 20 seconds,at least 30 seconds, at least 60 seconds, at least five minutes, lessthan 70 seconds, and/or less than 12 minutes.

Some embodiments include a method for using a doorbell system. Severalmethods include obtaining a doorbell that comprises a speaker, amicrophone, and/or a camera. The doorbell can be configurable formounting near an entryway and/or in an entryway. Several methods includeassigning a first priority to a first remote computing device andassigning a second priority to a second remote computing device, whereinthe first priority is superior to the second priority.

As used herein, “superior” is used in a very broad sense to mean thatthe first priority includes rights and/or privileges not included in thesecond priority. In some embodiments, a superior priority means that afirst remote computing device receives a notification (e.g., a doorbellcommunication request) before a second remote computing device. In someembodiments, a superior priority does not result in a first remotecomputing device receiving a notification before a second remotecomputing device, but means that the device with the superior priorityhas other rights such as the ability to block a device with an inferiorpriority from receiving notifications or the ability to restrict how andwhen a device with an inferior priority receives notifications.

Several embodiments include using the doorbell to detect a visitor. Someembodiments comprise generating a doorbell communication requestregarding the visitor. The doorbell communication request can include apicture and/or video of the visitor. The doorbell communication requestcan include other visitor information such as the visitor's name,company, classification, number of previous visits to the doorbell,credit score, and/or criminal history.

Some embodiments comprise sending the doorbell communication request tothe first remote computing device due to the first priority (e.g., inresponse to the first priority). Methods can include determining whetherto send the doorbell communication request to the second remotecomputing device due to the second priority (e.g., in response to thesecond priority) and/or sending the doorbell communication request tothe second remote computing device.

Some methods comprise entering an autonomous answering mode. Theautonomous answering mode can comprise emitting a pre-recorded voicemessage from the speaker of the doorbell. For example, a user of aremote computing device can record a message such as, “thanks forvisiting my house,” or “what brings you to my home?” The speaker of thedoorbell can later emit the pre-recorded message for the visitor tohear. Some methods include automatically replacing the pre-recordedvoice message with a non-word sound (e.g., a beeping sound, a buzzingsound, a ringing sound) after a time such that the autonomous answeringmode comprises emitting the non-word sound rather than the pre-recordedvoice message. The time can be at least one hour, at least five hours,and/or at least 24 hours.

Several methods comprise emitting (e.g., displaying, notifying, ringing)the doorbell communication request from (e.g., using) the first remotecomputing device for at least seven seconds, at least 10 seconds, and/orat least 15 seconds before emitting the doorbell communication requestfrom the second remote computing device. Then, some methods comprisesimultaneously emitting the doorbell communication request from both thefirst remote computing device and the second remote computing device.

In some methods, assigning the first priority comprises assigningadministrative rights (e.g., setup control, notification control,profile control). Several methods comprise simultaneously sending thedoorbell communication request to the first remote computing device andthe second remote computing device. Some methods comprise providingcontrol of the doorbell communication request to the first remotecomputing device such that the first remote computing device canterminate communication with the second remote computing device.

In some cases, determining whether to send the doorbell communicationrequest to the second remote computing device comprises determiningwhether a threshold amount of time has passed without the first remotecomputing device accepting the doorbell communication request. Thethreshold amount of time can be at least five seconds, at least eightseconds, at least 15 seconds, at least 30 seconds, and/or less than 90seconds.

Several embodiments comprise a method for using a doorbell system.Methods can include obtaining a doorbell that comprises a speaker, amicrophone, and/or a camera. The doorbell can be configurable formounting near an entryway. Several embodiments include assigning a firstpriority to a first remote computing device and assigning a secondpriority to a second remote computing device, wherein the first priorityis superior to the second priority. Some embodiments include using thedoorbell to detect a visitor and generating a doorbell communicationrequest regarding the visitor. Several embodiments comprise sending thedoorbell communication request to the first remote computing device dueto (e.g., as a result of) the first priority and/or determining whetherto send the doorbell communication request to the second remotecomputing device.

Some embodiments comprise blocking the doorbell communication requestfrom being sent to, accepted by, and/or displayed by the second remotecomputing device due to (e.g., as a result of) a profile associated withthe second remote computing device. The profile can include restrictionsthat can prohibit the second remote computing device from receiving,accepting, and/or displaying the doorbell communication request in somecircumstances. Methods can comprise blocking the doorbell communicationrequest from being displayed by the second remote computing device.

The profile can include restrictions regarding a time of day, anidentity of the visitor, and/or a location of the second remotecomputing device. In some embodiments, if a second remote computingdevice is located in a certain area (e.g., inside of the building towhich the doorbell is coupled) then the second remote computing devicewill not receive, accept, and/or display doorbell communicationrequests.

As used herein, a “doorbell communication request” is a type ofnotification related to a visitor and can be sent to a user of acomputing device, which can be located remotely from the doorbell.

Several methods for using a doorbell comprise obtaining a doorbell thatcomprises a speaker, a microphone, and a camera. The doorbell can beconfigurable for mounting near an entryway. Embodiments can compriseassigning a first priority to a first remote computing device andassigning a second priority to a second remote computing device. Severalembodiments include using the doorbell to detect a visitor (e.g., via asensor of the doorbell). Some methods include generating a doorbellcommunication request regarding the visitor. Several methods includesending the doorbell communication request to the first remote computingdevice and/or to the second remote computing device. Several methodsinclude sending the doorbell communication request to a third remotecomputing device, a fourth remote computing device, and/or a fifthremote computing device. The order in which the doorbell communicationrequest is sent to multiple computing devices can vary.

Some embodiments comprise terminating the doorbell communication requestto the second remote computing device in response to the first remotecomputing device accepting the doorbell communication request. Forexample, once the first remote computing device accepts the doorbellcommunication request, the method can include blocking the second remotecomputing device from also accepting the doorbell communication request.In some embodiments, both the first remote computing device and thesecond remote computing device can accept the doorbell communicationrequest such that multiple users can simultaneously communicate with avisitor via multiple remote computing devices. As used herein,“accepting” a doorbell communication request can include answering adoorbell communication request and/or initiating two-way audiocommunication between a doorbell and a remote computing device (e.g., toenable a visitor and a user to talk to each other).

Several embodiments comprise using the first remote computing device todisplay an image of the visitor and then using the first remotecomputing device to instruct the doorbell to emit a pre-recorded voicemessage from the speaker. For example, a user can select a button on agraphical user interface that causes the doorbell to emit the voicemessage from the speaker of the doorbell. Then, some embodimentscomprise initiating two-way audio communication between the first remotecomputing device and the doorbell (e.g., after the visitor has respondedto the pre-recorded voice message).

Several embodiments comprise initiating two-way audio communicationbetween the first remote computing device and the second remotecomputing device in response to the doorbell communication request andbefore initiating two-way audio communication between the doorbell andat least one of the first remote computing device and the second remotecomputing device. For example, a user of the first remote computingdevice might want to talk with a user of the second remote computingdevice before starting two-way audio communication with the visitor.

Some embodiments comprise emitting a notification sound (e.g., a ringingsound) from a sound output device (e.g., a chime, a speaker) locatedinside of a building in response to the doorbell detecting the visitor.Then, some embodiments comprise enabling the visitor to choose whetherto send the doorbell communication request to the first remote computingdevice. For example, the doorbell can instruct the visitor to press abutton to talk with the owner of the home. Then, several embodimentscomprise sending the doorbell communication request to the first remotecomputing device in response to the visitor choosing to send thedoorbell communication request to the first remote computing device.

Several embodiments comprise determining whether the visitor is stillpresent after sending the doorbell communication request and terminatingthe doorbell communication request in response to determining thevisitor is not present prior to at least one of the first remotecomputing device and the second remote computing device accepting thedoorbell communication request. In some cases, this approach can reduceoccurrences of a doorbell communication request unnecessarily botheringusers when a visitor is no longer present and/or when the doorbellfalsely detected a visitor.

Some embodiments comprise blocking (e.g., preventing) the first remotecomputing device from displaying the doorbell communication request. Theblocking can be response to a location of the first remote computingdevice.

Several embodiments comprise creating (e.g., forming, generating) aprofile of user preferences related to doorbell notifications. Theprofile can comprise a first time when the first remote computing devicewill not notify a user regarding the doorbell communication request. Theprofile can comprise a second time when a chime (e.g., an audio speaker)located inside of a building will not emit a sound. The profile cancomprise a list of computing devices capable of receiving (e.g.,authorized to receive) the doorbell communication request.

Several embodiments include methods for using a doorbell system. Methodscan include obtaining a doorbell that comprises a speaker, a microphone,a camera, and an outer housing. Several embodiments include connectingthe doorbell electrically to an electrical power supply of a buildingand connecting the doorbell electrically to a sound output devicelocated inside of the building. Some methods include receiving a firstalternating current into the doorbell from the power supply of thebuilding. Several methods include converting at least a first portion ofthe first alternating current into a first direct current. Thisconversion can occur within the outer housing of the doorbell. Thedoorbell can use the first direct current to provide a first electricalenergy to the camera. Several embodiments include draining the firstdirect current to the sound output device located inside of thebuilding.

As used herein, “connecting” electrically is used in a very broad senseto mean that a first item is coupled to a second item by at least oneconductor. For example, a doorbell can be electrically connected to anelectrical power supply by a conductor such as a wire (even if noelectricity is flowing through the wire).

The first direct current can provide a first electrical power that isless than a triggering threshold of the sound output device such thatthe sound output device does not emit a notification sound in responseto the first electrical power. Several methods comprise using thedoorbell to supply a second electrical power to the sound output device,wherein the second electrical power is greater than the triggeringthreshold of the sound output device such that the sound output deviceemits the notification sound in response to the second electrical power.The second electrical power can comprise a second alternating current.

In some embodiments, the power supply comprises a transformer having amaximum available electrical power. The second electrical power can beat least eighty percent, at least ninety percent, or at leastninety-five percent of the maximum available electrical power. Themaximum available electrical power is the maximum amount of electricalpower that the transformer can emit as it is currently configured in thebuilding. A given transformer might have a greater maximum availableelectrical power in a first building than in a second building.

Some embodiments comprise using the first direct current to provide asecond electrical energy to a printed circuit board of the doorbellwhile draining the first direct current to the sound output device.Methods can include using the printed circuit board to provide a thirdelectrical energy to the microphone and the speaker.

In several embodiments, the doorbell comprises a rectifier configured toconvert the first portion of the first alternating current into thefirst direct current. Doorbells can comprise a battery. Some methodscomprise using the first direct current to charge the battery of thedoorbell while draining the first direct current to the sound outputdevice.

Some embodiments comprise converting at least the first portion of thefirst alternating current into the first direct current while using thedoorbell to supply a second alternating current to the sound outputdevice. The second alternating current can supply a second electricalpower to the sound output device. The second electrical power can begreater than the triggering threshold of the sound output device suchthat the sound output device emits the notification sound in response tothe second electrical power.

In several embodiments, the doorbell comprises a battery and a printedcircuit board. Some methods comprises using the battery to supply athird electrical power to the printed circuit board while using thedoorbell to supply a second alternating current to the sound outputdevice. The second alternating current can supply a second electricalpower to the sound output device. The second electrical power can begreater than the triggering threshold of the sound output device suchthat the sound output device emits the notification sound in response tothe second electrical power.

In some embodiments, the power supply comprises a transformer with amaximum available electrical power. The first electrical power can beless than fifteen percent, less than ten percent, and/or less than fivepercent of the maximum available electrical power.

The sound output device can comprise a chime. In some cases, the soundoutput device comprises a speaker located inside of a building.

Some embodiments include methods for replacing a first doorbell with asecond doorbell. The first doorbell can comprise a switch configured toclose a circuit between a transformer and a sound output device toenable the sound output device to emit a notification sound (e.g., a“ding-dong” sound). Several embodiments include detaching the firstdoorbell from a first wire that is electrically connected to thetransformer and/or detaching the first doorbell from a second wire thatis electrically connected to the sound output device.

As used herein, “electrically connected” is used in a very broad senseto mean that a first item is coupled to a second item by at least oneconductor. Two items can be electrically connected even if noelectricity is flowing through the conductor that couples the items. Forexample, the first wire can be electrically connected to the transformereven if no power is connected or flowing to the transformer (e.g., toprevent electrical shocks to a person detaching the first doorbell andreplacing the first doorbell with the second doorbell).

Several embodiments include obtaining a second doorbell, which cancomprise a speaker, a microphone, a camera, and an outer housing. Thespeaker, the microphone, and the camera can be coupled to the outerhousing and/or located at least partially inside of the outer housing.The second doorbell can be electrically connected to the first wire thatis electrically connected to the transformer. The second doorbell can beelectrically connected to the second wire that is electrically connectedto the sound output device. As used herein, “wire” is used in a broadsense to mean a long conductive member such as a cable or wire capableof conducting electricity.

Several embodiments include receiving a first alternating current intothe second doorbell from at least one of the first wire and the secondwire. Methods can include converting at least a first portion of thefirst alternating current into a first direct current. This conversioncan occur within the outer housing of the second doorbell. Someembodiments include using the first direct current to provide a firstelectrical energy to at least a second portion of the second doorbell.Several methods comprise draining the first direct current via at leastone of the first wire and the second wire.

In some embodiments, the draining provides a first electrical power thatis less than a triggering threshold of the sound output device such thatthe sound output device does not emit a notification sound in responseto the first electrical power. Several embodiments comprise convertingat least the first portion of the first alternating current into thefirst direct current while using the doorbell to supply a secondalternating current to the sound output device. The second alternatingcurrent can supply a second electrical power to the sound output device.The second electrical power can be equal to or greater than thetriggering threshold of the sound output device such that the soundoutput device emits the notification sound in response to the secondelectrical power.

In several embodiments, the second doorbell receives the firstalternating current via the first wire. The second doorbell can drainthe first direct current via the second wire. In some embodiments, thesecond doorbell receives the first alternating current via the secondwire, and the second doorbell drains the first direct current via thefirst wire.

In some embodiments, the second portion of the second doorbell comprisesa printed circuit board connected electrically to the speaker, themicrophone, and/or the camera. The printed circuit board can be locatedinside of the outer housing. Methods can comprise using the first directcurrent to provide a second electrical energy to the speaker, themicrophone, and/or the camera via the printed circuit board.

Several methods of using a doorbell system include obtaining a doorbellthat comprises a speaker, a microphone, a camera, and/or an outerhousing. The speaker, the microphone, and/or the camera can be coupledto the outer housing of the doorbell. Some methods include receiving afirst alternating current into the doorbell from an external powersupply and converting at least a first portion of the first alternatingcurrent into a first direct current. This conversion can occur withinthe outer housing of the doorbell. Some methods include using the firstdirect current to provide a first electrical energy to at least a secondportion of the doorbell and draining the first direct current to a chime(or other type of sound output device).

The first direct current can provide a first electrical power that isless than a triggering threshold of the chime such that the chime doesnot emit a notification sound in response to the first electrical power.Several embodiments comprise using the doorbell to supply a secondalternating current to the chime. The second alternating current cansupply a second electrical power to the chime. The second electricalpower can be equal to or greater than the triggering threshold of thechime such that the chime emits the notification sound in response tothe second electrical power.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 illustrates a front view of a communication system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates an embodiment in which a security system is connectedto a building, according to some embodiments.

FIG. 4 illustrates a communication system that includes a securitysystem, a doorbell button, a wireless router, a server, and users,according to some embodiments.

FIG. 5 illustrates a front view of a security system, according to someembodiments.

FIG. 6 illustrates a perspective view of the security system from FIG.5, according to some embodiments.

FIG. 7 illustrates a side view of the security system from FIG. 5,according to some embodiments.

FIG. 8 illustrates a perspective view of a camera assembly, according tosome embodiments.

FIG. 9 illustrates a partial, perspective, cross-sectional view alongline 9-9 from FIG. 5, according to some embodiments.

FIG. 10 illustrates a perspective, cross-sectional view along line 9-9from FIG. 5, according to some embodiments.

FIG. 11 illustrates a back view of the security system from FIG. 5without a mounting bracket, according to some embodiments.

FIG. 12 illustrates a back view of the security system from FIG. 5 witha mounting bracket, according to some embodiments.

FIG. 13 illustrates a perspective view of the outer housing from FIG. 5,according to some embodiments.

FIG. 14 illustrates a front view of a mounting bracket coupled to awall, according to some embodiments.

FIG. 15 illustrates a partial, side view of the mounting bracket,according to some embodiments.

FIGS. 16 and 17 illustrate methods of using a security system, accordingto some embodiments.

FIG. 18 illustrates data prioritization methods, according to someembodiments.

FIGS. 19 and 20 illustrate a visitor in two locations within a camera'sfield of view, according to some embodiments.

FIGS. 21 and 22 illustrate methods of displaying a visitor, according tosome embodiments.

FIG. 23 illustrates several devices that can communicate with a securitysystem, according to some embodiments.

FIG. 24 illustrates an embodiment of a security system with multiplebuttons, according to some embodiments.

FIG. 25 depicts an illustrative embodiment of a security system withhardware and software components, according to some embodiments.

FIG. 26 depicts an illustrative embodiment of a system or architecture2600 in which a security system for allowing communication may beimplemented, according to some embodiments.

FIG. 27 depicts a flow diagram showing methods of operating a doorbellcommunication system, according to some embodiments.

FIG. 28 depicts an illustrative embodiment of several features that canbe implemented in a mobile application, according to some embodiments.

FIG. 29 depicts an illustrative embodiment of a user being provided withthe ability to record a message via a remote computing device, accordingto some embodiments.

FIG. 30 depicts an illustrative embodiment of emergency functionality,according to some embodiments.

FIG. 31 depicts an illustrative embodiment of a menu for selectingnotification settings, according to some embodiments.

FIG. 32 depicts an illustrative embodiment of a menu for selectingvolume settings for a security system, according to some embodiments.

FIG. 33 depicts an illustrative embodiment of a menu for selecting soundsettings for the security system, according to some embodiments.

FIG. 34 depicts an illustrative embodiment of a menu for selectingnotification settings for the security system, according to someembodiments.

FIG. 35 depicts an illustrative embodiment of a menu for selecting whichusers receive notifications for the security system, according to someembodiments.

FIG. 36 depicts an illustrative embodiment of a menu for viewingmultiple security systems, according to some embodiments.

FIG. 37 depicts an illustrative embodiment of a menu for viewingsettings of the security system, according to some embodiments.

FIG. 38 illustrates a user interface configured to enable a user toadjust the field of view of a camera, according to some embodiments.

FIG. 39 illustrates a top view of a camera orientation embodiment,according to some embodiments.

FIG. 40 illustrates a side view of the camera orientation embodimentfrom FIG. 39, according to some embodiments.

FIGS. 41 and 42 illustrate perspective views of the camera orientationembodiment from FIG. 39, according to some embodiments.

FIG. 43 illustrates a front view of a security system, according to someembodiments.

FIGS. 44A and 44B illustrate methods of using a security system,according to some embodiments.

FIG. 45 illustrates a perspective view of a security system with alocking assembly, according to some embodiments.

FIGS. 46A and 46B illustrate side views with a partial cross section ofthe locking assembly shown in FIG. 45, according to some embodiments.

FIG. 47 illustrates a diagrammatic view of an electrical powerconfiguration, according to some embodiments.

FIG. 48 illustrates a diagrammatic view of a security system configuredto wirelessly communicate with a sound output device, according to someembodiments.

FIG. 49 illustrates a diagrammatic view of a security system locatedinside of a building, according to some embodiments.

FIG. 50 illustrates a diagrammatic view of a security system used tomonitor a pool area, according to some embodiments.

FIG. 51 illustrates a communication system with two wireless networks,according to some embodiments.

FIG. 52 illustrates methods of using a security system, according tosome embodiments.

FIG. 53 illustrates scanning barcodes on a package to enable notifying auser regarding the delivery of the package, according to someembodiments.

FIG. 54 illustrates a front view of a dashboard of a vehicle, accordingto some embodiments.

FIG. 55 illustrates a perspective view of glasses, according to someembodiments.

FIG. 56 illustrates a perspective view of a camera assembly coupleddirectly to a printed circuit board, according to some embodiments.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed below, inventivesubject matter extends beyond the specifically disclosed embodiments toother alternative embodiments and/or uses, and to modifications andequivalents thereof. Thus, the scope of the claims appended hereto isnot limited by any of the particular embodiments described below. Forexample, in any method or process disclosed herein, the acts oroperations of the method or process may be performed in any suitablesequence and are not necessarily limited to any particular disclosedsequence. Various operations may be described as multiple discreteoperations in turn, in a manner that may be helpful in understandingcertain embodiments; however, the order of description should not beconstrued to imply that these operations are order dependent.Additionally, the structures, systems, and/or devices described hereinmay be embodied as integrated components or as separate components.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

The following patent is incorporated herein by reference: U.S. Pat. No.7,583,191, entitled SECURITY SYSTEM AND METHOD FOR USE OF SAME, andfiled Nov. 14, 2006.

Introduction

Communication systems can provide a secure and convenient way for aremotely located individual to communicate with a person who isapproaching a sensor, such as a proximity sensor or motion sensor, orwith a person who rings a doorbell, which can be located in a doorway,near an entrance, or within 15 feet of a door. Some communicationsystems allow an individual to hear, see, and talk with visitors whoapproach at least a portion of the communication system and/or press abutton such as a doorbell's button. For example, communication systemscan use a computing device to enable a remotely located person to see,hear, and/or talk with visitors. Computing devices can includecomputers, laptops, tablets, mobile devices, smartphones, cellularphones, and wireless devices (e.g., cars with wireless communication).Example computing devices include iPhone, iPad, iMac, MacBook Air, andMacBook Pro made by Apple Inc. Communication between a remotely locatedperson and a visitor can occur via the Internet, cellular networks,telecommunication networks, and wireless networks.

FIG. 1 illustrates a front view of a communication system embodiment.The communication system 200 can include a security system 202 (e.g., adoorbell) and a computing device 204. Although the illustrated securitysystem 202 includes many components in one housing, several securitysystem embodiments include components in separate housings. The securitysystem 202 can include a camera assembly 208 and a doorbell button 212.The camera assembly 208 can be a video camera, which in someembodiments, is a webcam. The security system 202 can include adiagnostic light 216 and a power indicator light 220. In someembodiments, the diagnostic light 216 is a first color (e.g., blue) ifthe security system 202 and/or the communication system 200 is connectedto a wireless internet network and is a second color (e.g., red) if thesecurity system 202 and/or the communication system 200 is not connectedto a wireless internet network. In some embodiments, the power indicator220 is a first color if the security system 202 is connected to a powersource. The power source can be power supplied by the building to whichthe security system 202 is attached. In some embodiments, the powerindicator 220 is a second color or does not emit light if the securitysystem 202 is not connected to the power source.

The security system 202 (e.g., a doorbell) can include an outer housing224, which can be water resistant and/or waterproof. The outer housingcan be made from metal or plastic, such as molded plastic with ahardness of 60 Shore D. In some embodiments, the outer housing 224 ismade from brushed nickel or aluminum.

Rubber seals can be used to make the outer housing 224 water resistantor waterproof. The security system 202 can be electrically coupled to apower source, such as wires electrically connected to a building'selectrical power system. In some embodiments, the security system 202includes a battery for backup and/or primary power.

Wireless communication 230 can enable the security system 202 (e.g., adoorbell) to communicate with the computing device 204. Some embodimentsenable communication via cellular and WiFi networks. Some embodimentsenable communication via the Internet. Several embodiments enable wiredcommunication between the security system 202 and the computing device204. The wireless communication 230 can include the followingcommunication means: radio, WiFi (e.g., wireless local area network),cellular, Internet, Bluetooth, telecommunication, electromagnetic,infrared, light, sonic, and microwave. Other communication means areused by some embodiments. In some embodiments, such as embodiments thatinclude telecommunication or cellular communication means, the securitysystem 202 can initiate voice calls or send text messages to a computingdevice 204.

Software

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. Some embodiments includesoftware designed to run on desktop computers and laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

FIG. 2 illustrates a computing device 204 running software. Thecomputing device 204 in FIG. 2 is a cellular telephone, but embodimentscan use diverse types of computing devices. The software includes a userinterface 240 displayed on a display screen 242. The user interface 240can include a security system indicator 244, which can indicate thelocation of the security system that the user interface is displaying.For example, a person can use one computing device 204 to control and/orinteract with multiple security systems, such as one security systemlocated at a front door and another security system located at a backdoor. Selecting the security system indicator 244 can allow the user tochoose another security system (e.g., the back door security systemrather than the front door security system).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator can indicate whether thecomputing device is in communication with a security system, theinternet, and/or a cellular network. The connectivity indicator 248 canalert the user if the computing device 204 has lost its connection withthe security system 202; the security system 202 has been damaged; thesecurity system 202 has been stolen; the security system 202 has beenremoved from its mounting location; the security system 202 lostelectrical power; and/or if the computing device 204 cannot communicatewith the security system 202. In some embodiments, the connectivityindicator 248 alerts the user of the computing device 204 by flashing,emitting a sound, displaying a message, and/or displaying a symbol.

In some embodiments, if the security system 202 loses power, losesconnectivity to the computing device 204, loses connectivity to theInternet, and/or loses connectivity to a remote server, a remote server206 sends an alert (e.g., phone call, text message, image on the userinterface 240) regarding the power and/or connectivity issue. In severalembodiments, the remote server 206 can manage communication between thesecurity system 202 and the computing device. In some embodiments,information from the security system 202 is stored by the remote server206. In several embodiments, information from the security system 202 isstored by the remote server 206 until the information can be sent to thecomputing device 204, uploaded to the computing device 204, and/ordisplayed to the remotely located person via the computing device 204.The remote server 206 can be a computing device that stores informationfrom the security system 202 and/or from the computing device 204. Insome embodiments, the remote server 206 is located in a data center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202. If thecomputing device 204 and/or the remote server 206 is unable tocommunicate with the security system 202, the computing device 204and/or the remote server 206 alerts the remotely located person via thesoftware, phone, text, a displayed message, and/or a website. In someembodiments, the computing device 204 and/or the remote server 206attempts to communicate with the security system 202 periodically; atleast every five hours and/or less than every 10 minutes; at least every24 hours and/or less than every 60 minutes; or at least every hourand/or less than every second.

In some embodiments, the server 206 can initiate communication to thecomputer device 204 and/or to the security system 202. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the security system202.

In several embodiments, a user can log into an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the security systemsettings discussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a security system due to the user'srequest rather than due to actions of a visitor. Some embodimentsinclude a computing device initiating a live video feed (or a video feedthat is less than five minutes old).

In some embodiments, the user interface 240 displays an image 252 suchas a still image or a video of an area near and/or in front of thesecurity system 202. The image 252 can be taken by the camera assembly208 and stored by the security system 202, server 206, and/or computingdevice 204. The user interface 240 can include a recording button 256 toenable a user to record images, videos, and/or sound from the cameraassembly 208, microphone of the security system 202, and/or microphoneof the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the security system 202. The user interface 240can also include a sound adjustment button 264 and a mute button 268.The user interface 240 can include camera manipulation buttons such aszoom, pan, and light adjustment buttons. In some embodiments, the cameraassembly 208 automatically adjusts between Day Mode and Night Mode. Someembodiments include an infrared camera and/or infrared lights toilluminate an area near the security system 202 to enable the cameraassembly 208 to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, and touching a touch screen. Many embodimentsinclude buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton, which can allow a user to select the quality and/or amount ofthe data transmitted from the security system 202 to the computingdevice 204 and/or from the computing device 204 to the security system202. For example, if the data transmission capability of the wirelesscommunication is insufficient to transmit high-resolution video from thesecurity system 202 to the computing device 204, the user might select alower resolution video setting. In some cases, the user might select astill image rather than video or a single still image every period oftime where the period of time can be more than 0.1 seconds and/or lessthan 60 seconds; more than 0.5 seconds and/or less than 30 seconds; ormore than 1 second and/or less than 15 seconds. In some cases, thesecurity system 202 might only send a single still image to thecomputing device 204.

Some embodiments include facial recognition such that the cameraassembly 208 waits until the camera assembly 208 has a good view of theperson located near the security system 202 and then captures an imageof the person's face. Facial recognition can be used to establish avisitor's identity.

Several embodiments can establish a visitor's identity by detecting asignal from a device associated with the visitor. Examples of such asignal include Bluetooth, WiFi, RFID, NFC, and/or cellular telephonetransmissions.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

The user interface 240 can include a termination button 276 to endcommunication between the security system 202 and the computing device204. In some embodiments, the termination button 276 ends the ability ofthe person located near the security system 202 (i.e., the visitor) tohear and/or see the user of the computing device 204, but does not endthe ability of the user of the computing device 204 to hear and/or seethe person located near the security system 202.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and is a termination button (toend communication between the security system 202 and the computingdevice 204). The button 276 can include the word “Answer” when thesystem is attempting to establish two-way communication between thevisitor and the user. Selecting the button 276 when the system isattempting to establish two-way communication between the visitor andthe user can start two-way communication. The button 276 can include thewords “End Call” during two-way communication between the visitor andthe user. Selecting the button 276 during two-way communication betweenthe visitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe security system and to stop emitting sounds recorded by the securitysystem.

In some embodiments, the user interface 240 opens as soon as thesecurity system detects a visitor (e.g., senses indications of avisitor). Once the user interface 240 opens, the user can see and/orhear the visitor even before “answering” or otherwise accepting two-waycommunication, in several embodiments.

Some method embodiments include detecting a visitor with a securitysystem. The methods can include causing the user interface to display ona remote computing device 204 due to the detection of the visitor (e.g.,with or without user interaction). The methods can include displayingvideo from the security system and/or audio from the security systembefore the user accepts two-way communication with the visitor. Themethods can include displaying video from the security system and/oraudio from the security system before the user accepts the visitor'scommunication request. The methods can include the computing devicesimultaneously asking the user if the user wants to accept (e.g.,answer) the communication request and displaying audio and/or video ofthe visitor. For example, in some embodiments, the user can see and hearthe visitor via the security system before opening a means of two-waycommunication with the visitor.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device might wonder whatis happening near the security system 202. The user can open thesoftware application on the computing device 204 and instruct theapplication to show live video and/or audio from the security device 202even if no event near the security system 202 has triggered thecommunication.

In several embodiments, the security device 202 can be configured torecord when the security device 202 detects movement and/or the presenceof a person. The user of the computing device 204 can later review allvideo and/or audio records when the security device 202 detectedmovement and/or the presence of a person.

Some embodiments include a media roll or other means to record a certainamount of data and then record over some of the data, such as the oldestdata or low-priority data. For example, some systems record over datathat is older than seven days, 14 days, or one month. Some securitysystems can be configured to continuously record video and/or audio to amedia roll, which can be viewed on a remotely located computing device.

In several embodiments, the system (e.g., software, computing device204, security system 202 in FIG. 1) can be configured to allow usercustomization of where, when, and/or how notifications (e.g., doorbellcommunication requests) are received on one or more computing devices(e.g., 204 in FIG. 3). In some embodiments, the system can be configuredto only notify a user's smartphone at certain times of day or night. Insome embodiments, the system can be configured to only notify a user'ssmartphone when the smartphone is in a predetermined proximity to thebuilding (e.g., within 10 feet, within 50 feet, within 100 feet). Insome embodiments, the system can be configured to only notify a user'ssmartphone when the smartphone is at or near a specified location. Insome embodiments, the system can be configured to only notify a user'ssmartphone when the smartphone is connected to a home network. In someembodiments, the system can be configured to only notify a first user'ssmartphone when a second user's smartphone is present or absent. In someembodiments, the system can be configured to send only text messages atcertain times of day (rather than sending other types of notifications,such as launching an app and then displaying an image). In someembodiments, the system can be configured to send one-way audio orone-way video (rather than two-way audio and/or two-way video) if theuser is away from home. In some embodiments, the system can beconfigured to block notifications during certain times, when the user isin certain places (e.g., in a meeting, in the building to which thesecurity system is attached), and/or if the user prefers not to receivenotifications.

Referring now to FIGS. 1 and 2, in several embodiments, software, thecomputing device 204, and/or the user interface 240 enables a user tocontrol the doorbell's features and functions. In some embodiments, thesoftware, the computing device 204, and/or the user interface 240enables a user to turn the security system 202 off and/or turn theringing function off such that pressing the doorbell button 212 will notemit a sound, such as a chime, inside the building. Example chimesinclude sounds emitted from door chimes made by HeathCo LLC under thebrand Heath Zenith. Turning the security system 202 off and/or turningthe ringing function off can be helpful when the user does not wantpeople inside the building to be bothered by doorbell sounds (e.g.,chimes). For example, people might be sleeping inside the home.

The user interface 240 can include a button to silence the doorbellsound and to place the security system 202 in Silent Mode. In someembodiments of Silent Mode, pressing the doorbell button 212 will notsend a signal to a chime located inside the building for the chime toemit a sound. In some embodiments, the chime is a speaker (such as aspeaker made by Bose Corporation) located inside of the building, whichcan be a home, office, warehouse, or other structure.

In some embodiments, a security system 202 and/or a computing device 204communicates with a baby monitor. If the baby monitor detects indicatorsthat a baby is sleeping (e.g., the presence of a baby that is notmoving, as sensed by an IR motion detector) the communication system candisable the doorbell sound to avoid disturbing the baby's sleep. Someembodiments work the same way except that the baby is replaced by aperson, such as an adult.

Several embodiments include a motion detector 218. The motion detector218 can sense whether a visitor is located near an entryway.

Several embodiments include sending a notification to the user regardingthe presence of the visitor even if the visitor has not pressed thedoorbell button 212 to “ring” the doorbell (e.g., to sound a chimeinside of the building). In several embodiments, if motion is detectedby the doorbell for five seconds and the doorbell button 212 has notbeen pressed (e.g., within the last five seconds, within the last 30seconds, within the last 60 seconds), then the doorbell automaticallysends a notification to the user regarding the presence of the visitor.The notification can be sent to a remotely located computing device 204and/or via a chime 302 (shown in FIG. 3).

In several embodiments, if the doorbell button 212 has been pressed(e.g., within the last 5 seconds, within the last 30 seconds, within thelast 60 seconds), then motion alerts are canceled for three minutes. Forexample, methods can include blocking notifications based on motiondetection for three minutes (or for at least 60 seconds, at least threeminutes, and/or less than ten minutes) from the time the doorbell button212 has been pressed.

In some embodiments, the user interface 240 has a button to make thedoorbell ring (e.g., make the chime emit a sound inside of thebuilding). The user can ring the doorbell by pressing a button on thecomputing device 204.

Some embodiments include administrative privileges. These privileges caninclude administrative abilities and the ability to alter settings. Theadministrative privileges can be password protected. The administratorcan add and remove notification recipients and/or computing devices 204.For example, a user who sets up the communication system 200 byinitially pairing a computing device 204 with a security system 202 canbe given administrative privileges and the highest priority (asexplained herein). This administrative user can give permissions andpriorities to other users and computing devices 204 (e.g., as explainedin the context of FIG. 17). This administrative user can choose settings(e.g., as explained in the context of FIG. 18). This administrative usercan give or transfer administrative rights to another user and/orcomputing device 204.

Several embodiments include a mode to address overly frequentnotifications. This mode is called Peaceful Mode. For example, onHalloween, the security system 202 may sense doorbell button 212presses, motion, proximity, and/or sound more frequently than the userwants to be notified. Some embodiments include a maximum notificationsetting (e.g., the maximum number of notifications that will becommunicated to the user per unit of time). If the maximum number ofnotifications is exceeded, then the system can enter Peaceful Mode. Inseveral embodiments, the maximum number of notifications is threenotifications per hour; four notifications per hour; five notificationsper hour; seven notifications per hour; ten notifications per hour; fournotifications per day; seven notifications per day; seven notificationsper 24 hours; or fifteen notifications per 24 hours. In someembodiments, the user can set the maximum number of notifications and/orthe time period over which the notifications are counted towards amaximum number. In some embodiments, the user can set the maximum numberof notifications via the software, a website configured to communicatewith the server 206, and/or a user interface 240.

In some embodiments of Peaceful Mode, the system stops alerting the uservia the computing device 204. For example, a visitor pressing thedoorbell button 212 could cause a sound (e.g., a chime) to be emittedinside or near the building but would not cause the computing device 204to notify the user.

In some embodiments of Peaceful Mode, the system stops alerting the uservia the chime located inside of the building. For example, a visitorpressing the doorbell button 212 could cause the computing device 204 tonotify the user, but would not cause a sound (e.g., a chime) to beemitted inside or near the building.

In some embodiments of Peaceful Mode, the system stops alerting the uservia the chime located inside of the building and via the computingdevice 204. For example, a visitor pressing the doorbell button 212would not cause a sound (e.g., a chime) to be emitted inside or near thebuilding and would not cause the computing device 204 to notify theuser.

In some embodiments of Peaceful Mode, the system does not automaticallystop alerting the user via the computing device and does notautomatically stop alerting the user via the chime, but instead, oncethe maximum number of notifications is exceeded, the software, computingdevice 240, and/or user interface 240 asks the user if the user wants toenter Peaceful Mode, turn off notifications via the computing device240, and/or turn off notifications via the sounds emitted inside and/ornear the building (e.g., chimes). In several embodiments, the software,computing device 240, and/or user interface 240 asks the user how longthe user wants to turn off notifications via the computing device 240,and/or turn off notifications via the sounds emitted inside and/or nearthe building. In some embodiments, notifications are turned off for atleast 15 minutes and/or less than 4 hours; at least 5 minutes and/orless than one hour; or at least 30 minutes and/or less than 24 hours.

In some embodiments of Peaceful Mode, Peaceful Mode does not turn offnotifications, but instead reduces the volume, frequency, and/orintensity of notifications. In some embodiments of Peaceful Mode, thechime volume can be reduced by at least 30 percent, at least 50 percent,or at least 70 percent. In some embodiments of Peaceful Mode, the alertsto the computing device 204 switch to Non-auditory Mode such that thecomputing device 204 does not ring or send auditory alerts, but insteadsends alerts such as vibrations (with little or no sound) and/or visualalerts (e.g., messages on the user interface 240).

Referring now to FIG. 2, in several embodiments, software of thecomputing device includes a snapshot feature, which enables a user totake an image or short video (e.g., less than five seconds, less than 10seconds) of the visitor. The image and/or short video is stored in thecomputing device 204 and/or in a remote location and is retrievable bythe computing device.

In some embodiments, an image and/or video of each visitor isautomatically stored in a visitor log retrievable by the user. The imageand/or video of each visitor can be automatically triggered by thesecurity system detecting a visitor.

Data sent between a security system and a computing device can besecured via encryption, transport layer security, secure sockets layer,and/or cryptographic protocols. Data regarding a security system that issent from one computing device to another computing device can besecured via encryption, transport layer security, secure sockets layer,and/or cryptographic protocols.

Many security system embodiments and method embodiments are configuredto work with any computing device (e.g., a cellular phone, tablet,laptop, desktop computer). Software applications can be configured towork with particular operating systems. In some cases, making softwareapplications compatible with all operating systems and computing devicescan be challenging. Some embodiments open a website (e.g., on thedisplay screen 242 shown in FIG. 2) in response to a user accepting apush notification (e.g., regarding the presence of a visitor detected bya doorbell).

A simple software application can be used to launch the website inresponse to the user accepting a push notification. Many diversecomputing devices are capable of opening websites, which can enable awebsite-based system to be compatible with a broad range of computingdevices.

Website-based systems can be used for pool monitoring and elderlymonitoring applications. For example, a security system 202 can be usedto monitor a pool 5030 (shown in FIG. 50). An unwanted visitor into thepool 5030 (or into a zone 5034 around the pool 5030) can trigger a pushnotification to a computing device 204 (shown in FIG. 51). The user canrespond to the push notification by accepting communication with thesecurity system 202, which can result in opening a website in responseto the user accepting the push notification. The website 5558 can showan image taken by a camera of the security system 202 and can beconfigured to enable the user to hear the visitor and talk with thevisitor.

Server Interaction

Referring now to FIG. 1, in some embodiments, the server 206 controlscommunication between the computing device 204 and the security system202, which can be a doorbell with a camera, a microphone, and a speaker.In several embodiments, the server 206 does not control communicationbetween the computing device 204 and the security system 202.

Server 206 control can prevent unwanted communication between thecomputing device 204 and the security system 202. For example, if thecomputing device 204 is stolen from a user, the user can contact aserver administrator to block communication between the security system202 and the computing device 204. The user can provide an authenticationmeans, such as a password or user information, so the serveradministrator knows the user is in fact authorized to make changes. Insome embodiments, the server 206 can update any of the settings andoptions described herein. In some embodiments, the user can update anyof the settings and options described herein via a website. The server206 can be used to register users and update settings of the computingdevice 204, the security system 202, and/or the communication system200.

In some embodiments, data captured by the security system and/or thecomputing device 204 (such as videos, pictures, and audio) is stored byanother remote device such as the server 206. Cloud storage, enterprisestorage, and/or networked enterprise storage can be used to store video,pictures, and/or audio from the communication system 200 or from anypart of the communication system 200. The user can download and/orstream stored data and/or storage video, pictures, and/or audio. Forexample, a user can record visitors for a year and then later can reviewconversations with visitors from the last year. In some embodiments,remote storage, the server 206, the computing device 204, and/or thesecurity system 202 can store information and statistics regardingvisitors and usage.

In some embodiments, this information can be transferred, forwarded,and/or sent to other computing devices and/or servers. A user can recorda communication (e.g., video and audio) with a visitor and then canforward the communication to another person. The forwarded informationcan include additional information from the user such as a recordedmessage and/or a text message. For example, if one user talks with avisitor via a security system 202, the user can forward the conversationto the person that the visitor was seeking.

High-Level System Overview

FIG. 3 illustrates an embodiment in which a security system 202 isconnected to a building 300, which can include an entryway 310.Electrical wires 304 can electrically couple the security system 202 tothe electrical system of the building 300 such that the security 202 canreceive electrical power from the building 300.

A wireless network 308 can allow devices to wirelessly access theinternet. The security system 202 can access the internet via thewireless network 308. The wireless network 308 can transmit data fromthe security system 202 to the internet, which can transmit the data toremotely located computing devices 204. The internet and wirelessnetworks can transmit data from remotely located computing devices 204to the security system 202. In some embodiments, a security system 202connects to a home's WiFi.

As illustrated in FIG. 3, one computing device 204 (e.g., a laptop, asmartphone, a mobile computing device, a television) can communicatewith multiple security systems 202. In some embodiments, multiplecomputing devices 204 can communicate with one security system 202.

In some embodiments, the security system 202 can communicate (e.g.,wirelessly 230) with a television 306, which can be a smart television.The television 306 can display any of the items shown in FIGS. 28 to 38,although many other types of computing devices (e.g., smart phones,tablets, laptops) can also display any of the items shown in FIGS. 28 to38. Users can view the television 306 to see a visitor and/or talk withthe visitor.

Joining a Wireless Network

Although some security system embodiments include using electricity fromelectrical wires 304 of a building 300, many security system embodimentscommunicate with computing devices 204 via a wireless network 308 thatallows security systems 202 to connect to a regional and sometimesglobal communications network. In some embodiments, the security system202 communicates via a wireless network 308 with a router that enablescommunication with the Internet, which can enable communication viadiverse means including telecommunication networks. In this way, asecurity system 202 can communicate with computing devices 204 that aredesktop computers, automobiles, laptop computers, tablet computers,cellular phones, mobile devices, and smart phones.

In some embodiments, a security system (e.g., a doorbell) needs to knowwhich wireless network to join and needs to know the wireless network'spassword. A computing device, such as a smartphone, can provide thisinformation to the security system.

The following method is used in some embodiments. (Some embodimentsinclude orders that are different from the following order.) First, thecomputing device (e.g., a smartphone) creates an ad hoc wirelessnetwork. Second, the user opens software (such as an app) on thecomputing device. When the security system is in Setup Mode, thesecurity system can automatically join the computing device's ad hocnetwork. Third, the user can utilize the software to select the wirelessnetwork that the security system should join and to provide the passwordof the wireless network (e.g., of the router) to the security system.

Diverse methods can be used to connect a security system (e.g., adoorbell) to a wireless network (such as a wireless network of a home).Several embodiments include transmitting an identifier (e.g., a name) toa security system, wherein the identifier enables the security system toidentify the wireless network to which the security system shouldconnect. Several embodiments include transmitting a password of thewireless network to the security system, wherein the password enablesthe security system to connect to the network. In some embodiments, acomputing device (e.g., a smartphone) transmits the identifier andpassword.

In several embodiments, methods of connecting a security system (e.g., adoorbell) to a wireless network (e.g., a wireless network of a home orbuilding) can include placing the security system in Setup Mode. Somesecurity systems automatically go into Setup Mode upon first use, firstreceiving electrical power, first receiving electrical power after areset button is pushed, first receiving electrical power after beingreset, and/or when a reset button is pushed.

In some embodiments, a Setup Mode comprises a Network Connection Mode.Methods can comprise entering the Network Connection Mode in response topressing the button for at least eight seconds. The Network ConnectionMode can comprise detecting a first wireless network having a name and apassword. The Network Connection Mode can comprise inputting a doorbellidentification code into the remotely located computing device. Thedoorbell identification code can be associated with the doorbell. TheNetwork Connection Mode can comprise using the doorbell identificationcode to verify whether the remotely located computing device isauthorized to communicate with the doorbell. The Network Connection Modecan comprise the remotely located computing device creating a secondwireless network (e.g., that emanates from the remotely locatedcomputing device). The Network Connection Mode can comprise transmittingthe name and the password of the first wireless network directly fromthe remotely located computing device to the doorbell via the secondwireless network to enable the doorbell to communicate with the remotelylocated computing device via the first wireless network. Methods cancomprise the remotely located computing device directly communicatingwith the doorbell via the second wireless network prior to the doorbellindirectly communicating with the remotely located computing device viathe first wireless network. For example, the wireless communication fromthe remotely located computing device can travel through the airdirectly to the doorbell. The wireless communication from the remotelylocated computing device can travel indirectly to the doorbell via athird electronic device such as a server.

FIG. 51 illustrates a communication system with two wireless networks5556, 5560. The first wireless network 5560 can emanate from a router5550. The second wireless network can emanate from the computing device204 (e.g., a cellular telephone). The first wireless network 5560 canenable indirect wireless communication 5552 between the computing device204 and the security system 202 via the router 5550 or via a server 206(shown in FIG. 1). The second wireless network 5556 can enable directwireless communication 5554 between the computing device 204 and thesecurity system 202. The computing device 204 can send a password and aname of the first wireless network 5560 to the security system 202 viathe second wireless network 5556. In some embodiments, the secondwireless network 5556 does not require a password.

In some embodiments, a security system creates its own wireless network(e.g., WiFi network) with a recognizable network name (e.g., a serviceset identifier). Software can provide setup instructions to the user viaa computing device, in some cases, upon detecting a new wireless networkwith the recognizable network name. The instructions can inform the userhow to temporarily join the security system's wireless network with thecomputing device. The user can select and/or transmit the name andpassword of a target wireless network to the security system from thecomputing device. The security system can join the target wirelessnetwork (e.g., the wireless network of the building to which thesecurity system is attached) and can terminate its own wireless network.

In some cases, the computing device can capture the name and password ofthe target network before joining the network of the security system. Insome cases, the user enters the name and password of the target networkinto the computing device to enable the computing device to provide thename and password of the target network to the security system.

In some cases, the computing device recognizes the name of the networkof the security system, automatically joins the network of the securitysystem, and transmits the name and password of the target network to thesecurity system. In some cases, these steps are preceded by launchingsoftware (on the computing device) configured to perform these stepsand/or capable of performing these steps.

Methods can include the security system trying to joint an ad hocnetwork (or other wireless network) with a fixed network name or anetwork name based on an identifier of the security system (e.g., theserial number of the security system, the model number of the securitysystem). The computing device can provide instructions to the user totemporarily setup the network (e.g., the ad hoc network) via thecomputing device. The network can have the fixed network name or thename based on the identifier. The security system can recognize the nameand join the network. The computing device can use the network totransmit the name and password of a target network (e.g., the wirelessnetwork of the building to which the security system will be coupled) tothe security system. The security system can use the name and passwordof the target network to join the target network.

In some embodiments, the computing device displays an image (e.g., aquick response code) that contains or communicates the name and passwordof the target network. The security system can use its camera andonboard software to scan and decode the image (to determine the name andpassword of the target network). The security system can use the nameand password of the target network to join the target network.

The computing device can generate and display pulses of light (e.g., byflashing black and white images on the screen of the computing device).The security system can use its camera and software to analyze anddecode the pulses of light. The pulses of light can contain the nameand/or password of the wireless network. The security system can use thename and password of the target network to join the target network.

In some embodiments, only the password of the target network is given tothe security system. The security system can use the password to testeach detected wireless network until it identifies a wireless network towhich it can connect using the password.

The computing device can generate and emit an audio signal thatcorresponds to the name and/or password of the target network. Thesecurity system can use its microphone and software to analyze anddecode the audio signal to receive the name and/or password of thetarget network. The security system can use the name and password of thetarget network to join the target network.

In some embodiments, the computing device transmits the name andpassword of the target network to the security system via Morse code(e.g., using the doorbell button, using light pulses, using soundpulses).

In some embodiments, the security system can pair with the computingdevice via Bluetooth. The computing device can transmit the name andpassword of the target network to the security system (e.g., viaBluetooth). The security system can use the name and password of thetarget network to join the target network.

In several embodiments, the computing device transmits the name and/orpassword of the target network via infrared (“IR”) communication (e.g.,IR light) to the security system. The computing device can emit the IRcommunication via IR LEDs or IR display emissions. An infrared emissiondevice (e.g., with an IR LED) can be electrically coupled to thecomputing device to enable the computing device to send IRcommunications. The security system can detect the IR communication viaIR sensors. The security system can use the name and password of thetarget network to join the target network.

Initiating Communication

Referring now to FIG. 3, in some embodiments, multiple computing devicesare candidates to receive information from a security system. Forexample, a person might initiate a communication request by pressing thedoorbell button 212 (shown in FIG. 1) or triggering a motion orproximity sensor. The security system can notify multiple remotelylocated computing devices at once. The security system mightsimultaneously notify a smartphone of a first homeowner, a tablet of ahousekeeper, and a laptop located inside the building to which thesecurity system is connected. In some embodiments, once the doorbellring is answered by one computing device, communication between thesecurity system and the other computing devices is terminated,maintained, or kept open so another user can also participate in thecommunication. For example, if a housekeeper answers the communicationrequest initiated by the doorbell ring, the homeowner might be unable tojoin the communication because communication with her computing devicewas terminated or might have the option to join the communication. Insome embodiments, computing devices are assigned a priority andcomputing devices with a higher priority can terminate the communicationof lower priority devices. For example, the homeowner could answer thecommunication request later than the housekeeper, but the homeownercould terminate the communication between the security device and thehousekeeper's computing device. In some embodiments, users can forwardcommunication requests from one computing device to another computingdevice.

In some embodiments, multiple computing devices are notified in seriesregarding a communication request. For example, the communicationrequest might initially go to a first remote computing device, but ifthe communication request is not answered within a certain period oftime, the communication request might go to a second remote computingdevice. If the communication request is not answered, the communicationrequest might go to a third remote computing device.

FIG. 4 illustrates a communication system 310 that includes a securitysystem 320, a doorbell button 324, a WiFi router 328, a server 332, andusers 336. In step 340, a visitor initiates a communication request bypressing the doorbell button 324 or triggering a motion or proximitysensor. The visitor can trigger the motion or proximity sensor byapproaching the security system 320. In step 350, the security system320 connects or otherwise communicates with a home WiFi router 328. Instep 360, the server 332 receives a signal from the WiFi router 328 andsends video and/or audio to the users 336 via a wireless network 364. Instep 370, the users see the visitor, hear the visitor, and talk with thevisitor. Step 370 can include using a software application to see, hear,and/or talk with the visitor. The visitor and users 336 can engage intwo-way communication 374 via the internet or other wirelesscommunication system even when the visitor and the users 336 are locatedfar away from each other. Some embodiments enable users to receivecommunication requests and communicate with visitors via diverse mobilecommunication standards including third generation (“3G”), fourthgeneration (“4G”), long term evolution (“LTE”), worldwideinteroperability for microwave access (“WiMAX”), and WiFi.

In some cases, the users 336 utilize the communication system 310 tocommunicate with visitors who are in close proximity to the users 336.For example, a user 336 located inside her home can communicate with avisitor located just outside the home via the communication system 310.

Referring now to FIG. 3, some embodiments include a location detectionsystem (e.g., GPS) to determine if the computing device 204 is locatedinside the home, near the home, within 100 feet of the home, within 100feet of the security system 202, within 50 feet of the home, and/orwithin 50 feet of the security system 202, in which case the computingdevice 204 is considered in Close Mode. In some embodiments, thecomputing device 204 is considered in Close Mode if the computing device204 is connected to a wireless network 308 of the building to which thesecurity system 202 is coupled. In several embodiments, the computingdevice 204 is considered in Close Mode if the computing device 204 andthe security system 202 are connected to the same wireless network 308.If the computing device 204 is not in Off Mode and not in Close Mode,then the computing device 204 is in Away Mode, in which the computingdevice 204 is considered to be located remotely from the building 300.

In several embodiments, the computing device 204 can behave differentlyin Close Mode than in Away Mode. In some embodiments, the computingdevice 204 will not notify the user of visitors if the computing device204 is in Close Mode. In several embodiments, Close Mode silencesalerts, which can include precluding and/or eliminating the alerts.Instead, the user might have to listen for typical indications of avisitor such as the ring of a traditional doorbell. Once the computingdevice 204 enters Away Mode, the computing device 204 can notify theuser of the visitor. In some embodiments, the computing device 204notifies the user regarding the visitor if the computing device 204 isin Close Mode or Away Mode.

In several embodiments, the building's 300 doorbell chime is silencedwhen the computing device 204 is configured to alert the user. In someembodiments, the building's 300 doorbell chime emits sound and thecomputing device 204 is configured to alert the user.

In several embodiments, the user can decline a communication request byselecting via the user interface 240 a pre-recorded message to be playedby the security system 202. The pre-recorded message can include audioand/or video content. Some embodiments can provide the user with optionsfor playing a pre-recorded message on demand, and/or automaticallyplaying a pre-recorded message under user-specified conditions. Examplesof conditions that can be specified include time of day, user location,facial recognition or non-recognition of visitors, and/or number ofrecent visitors. In some embodiments, a pre-recorded message caninterrupt two-way communications, which can resume after delivery of themessage. In some embodiments, a pre-recorded message can be deliveredwithout interrupting two-way communications.

In some embodiments, the security system 202 includes a memory 492(shown in FIG. 11). If the security system 202 cannot communicate withthe computing device 204 and/or with the server 206 (shown in FIG. 1),the memory 492 of the security system 202 can store a recorded messageand/or video from the visitor. Once the security system 202 cancommunicate with the computing device 204 and/or the server 206, thesecurity system 202 can communicate the recorded message and/or video tothe computing device 204 and/or the server 206.

In several embodiments, the security system 202 can ask a visitor torecord a message and/or can record pictures (e.g., video, stillpictures) when the security system 202 cannot communicate via thewireless network 308. The security system 202 can include a NetworkEnabled Mode and a Network Disabled Mode. In the Network Enabled Mode,the security system 202 can communicate via the wireless network 308with a remote server and/or computing device 204. In the NetworkDisabled Mode, the security system 202 cannot communicate via thewireless network 308 with a remote server and/or computing device 204.

In the Network Enabled Mode, the security system 202 can send videoand/or audio from the visitor to the user instantaneously; nearlyinstantaneously; immediately; within 15 seconds of capturing the videoand/or audio; and/or within 60 seconds of capturing the video and/oraudio. In the Network Enabled Mode, the security system 202 canpreferentially send data (e.g., video, audio, traits, identification)regarding the visitor to the computing device 204 rather than storingthe data in the memory of the security system 202. In the NetworkDisabled Mode, the security system 202 can act as a typical doorbell by,for example, causing a chime inside the building 300 to emit a sound. Insome embodiments of the Network Disabled Mode, the security system 202emits a visible error signal (e.g., flashing light, red light); recordsimages and audio to the security system's memory; asks the visitor toleave a message for the user; and/or alerts the user regarding the lackof wireless communication.

In some embodiments, the security system 202 can maintain a visitor log,which can capture information such as the date, time, audio, video,and/or images of the visitor. The user interface 240 can display thisinformation in a “guest book” format; as a timeline or calendar; as aseries of images, videos, and/or audio files; or as a log file.

The user can accept or decline a communication request from a visitor.In some embodiments, the user can push a button (e.g., 276) on the userinterface 240 (shown in FIG. 2) to decline a communication request oraccept a communication request. The user can decline a communicationrequest without the visitor knowing that the user received thecommunication request. Prior to accepting a communication request, thecomputing device 204 can allow the user to click a button, such as anicon on a graphical user interface on a touch screen, to see and/or hearthe visitor. In some embodiments, accepting a communication requestincludes opening a two-way line of communication (e.g., audio and/orvideo) between the visitor and the user to enable the user to speak withthe visitor.

A visitor can initiate a communication request by ringing the doorbellof the security system 202, triggering a motion sensor of the securitysystem 202, triggering a proximity sensor of the security system 202,and/or triggering an audio alarm of the security system 202. In someembodiments, the audio alarm includes the microphone of the securitysystem 202. The security system 202 can determine if sounds sensed bythe microphone are from a knocking sound, a stepping sound, and/or froma human in close proximity to the security system 202. The securitysystem 202 can detect important sounds such as knocking, talking, andfootsteps by recording the sounds and then computing features that canbe used for classification. Each sound class (e.g., knocking) hasfeatures that enable the security system 202 to accurately identify thesound as knocking, talking, stepping, or extraneous noise. Features canbe analyzed using a decision tree to classify each sound. For example,in some embodiments, a visitor can trigger an audio alarm (and thus,initiate a communication request) by knocking on a door located withinhearing range of a microphone of the security system 202. In severalembodiments, a visitor can trigger an audio alarm (and thus, initiate acommunication request) by stepping and/or talking within hearing rangeof a microphone of the security system 202.

Hardware

FIG. 5 illustrates a front view of the security system 202, according tosome embodiments. The security system 202 can include a camera assembly208, which can be a fisheye camera and/or a camera located inside of adome or spherical holder. The camera assembly 208 can be configured toallow the user or installer to adjust the orientation of the cameraassembly 208 by moving an orientation feature 400. Adjusting theorientation of the camera assembly 208 can include inserting amanipulation tool, such as a pin, paperclip, or needle, into anorientation feature 400, which can be a hole, a cylindrical hole, alumen, and/or a shaft. Once the manipulation tool is coupled to theorientation feature 400, the user or installer can move the cameraassembly 208 like an eye can move in an eye socket.

A doorbell identification code 222 can be associated with the securitysystem 202 (e.g., a doorbell) such that the code 222 is correlated withthe doorbell. The code 222 can be used as an electronic key to unlockaccess to the doorbell. A Network Connection Mode can comprise using thedoorbell identification code 222 to verify whether a computing device204 (shown in FIG. 2) is authorized to communicate with the doorbell.

FIG. 6 illustrates a perspective view of the security system 202 fromFIG. 5. The camera assembly 208 can include a fisheye lens 210, whichcan produce a visual distortion to create a wide panoramic orhemispherical image. The fisheye lens 210 can create a broader field ofview than would be possible without a fisheye lens.

In some embodiments, a sensor 226 is hidden under the cover 404. Thesensor 226 can be a motion sensor. In several embodiments, the sensor226 is a proximity sensor. A light 1042 (e.g., a laser system), shown inFIG. 53, can be hidden under the cover 404.

In some embodiments, the camera assembly 208 is not configured to rotateand is not spherical. In several embodiments, the fisheye lens 210 canprovide a sufficient field of view without moving the camera assembly208. The fisheye lens 210 can be oriented directly outward from theouter housing 224 (e.g., perpendicular to an outward face of the outerhousing 224) as shown in FIG. 7.

FIG. 56 illustrates a perspective view of a camera assembly 534 coupleddirectly to the PCB 450. Flexible conductors 438 (shown in FIG. 9) arenot used to couple the camera assembly 534 to the PCB 450 in theembodiment illustrated in FIG. 56. The camera assembly 534 does notinclude a ball shape (e.g., a spherical shape) but can be cylindrical.The cylinder can include a front side that comprises a fisheye lens 536.The cylinder can include a backside that is coupled to the PCB.

The fisheye lens 536 can be a wide-angle lens configured to create awider field of view than would result from a flat lens. The fisheye lens536 can include a convex outer surface. The fisheye lens 536 can includea focal length of 2 millimeters to 16 millimeters. The fisheye lens 536can include a horizontal field of view and/or a vertical field of viewof at least 90 degrees, at least 100 degrees, at least 130 degrees, atleast 160 degrees, and/or less than 190 degrees. In some embodiments,the fisheye lens 536 can include a horizontal field of view and/or avertical field of view of at least 180 degrees. In several embodiments,the horizontal field of view is at least 30 degrees greater than thevertical field of view.

The PCB 450 can include a microphone 540, which can be mounted on alower section of the PCB 450. In some embodiments, the PCB 450 includesan upper half that comprises the camera assembly 534, and the PCB 450includes a lower half that comprises the microphone 540.

FIG. 7 illustrates a side view of the security system 202 from FIG. 5.The domed shape of the camera assembly 208 is visible in FIG. 7,although some embodiments include non-domed camera assemblies. Thesecurity system 202 can be a doorbell with a camera, microphone,speaker, and/or doorbell button coupled together in a single unit (e.g.,at least partially inside an outer housing 224).

FIG. 8 illustrates a perspective view of the camera assembly 208. Thecamera assembly 208 can include a domed enclosure 430 and theorientation feature 400, which can be a hole. The camera assembly 208can also include a lens 434, which can be transparent and/or translucentglass or plastic. The camera assembly 208 can be electrically coupled toother parts of the security system 202 by a flex circuit, wires, cablesand/or flexible conductors 438. In some embodiments, the camera assembly208 can be mounted directly to the PCB 450 (shown in FIG. 9) such thatflexible conductors 438 are not used to electrically couple the cameraassembly 208 to the PCB 450.

FIG. 9 illustrates a partial, perspective, cross-sectional view alongline 9-9 from FIG. 5. The camera assembly 208 is secured between a cover404 and a printed circuit board (“PCB”) 450. A front portion of thecamera assembly 208 fits in a hole in the cover 404 and a back portionof the camera assembly 208 fits in a hole in the PCB 450. In someembodiments, a remote computing device can adjust the camera's viewingangle and zoom settings.

In some embodiments, the cover 404 is translucent to allow infrared(“IR”) light from IR light emitting diodes 458 (“LED”) to exit thesecurity system 202 to illuminate visitors to enable nighttime video. Inseveral embodiments, the cover 404 appears opaque or semi-opaque, butallows IR light to pass. In some embodiments, the cover 404 has avisible light transmission of at least 10% and/or less than 90%; atleast 25% and/or less than 80%, or at least 35% and/or less than 75%. Insome embodiments, the cover 404 has an IR light transmission of at least30% and a visible light transmission of less than 90%; an IR lighttransmission of at least 40% and a visible light transmission of lessthan 80%; or an IR light transmission of at least 50% and a visiblelight transmission of less than 50%. In some embodiments, the cover 404allows IR light to exit the security system but does not allow people toview into the security system in normal lighting conditions (i.e., 50foot-candles).

Light sources, such as IR LEDs 458, can be located in an interiorportion of a security system. The light sources can be oriented towithin 30 degrees of the viewing orientation of the camera assembly 208such that the light sources are configured to illuminate the camera'sfield of view and/or objects located in front of the camera assembly208. The translucent or semi-translucent cover 404 can be locatedbetween the light sources and objects in front of the camera assembly208. The cover 404 can be configured to obscure visibility into theinterior portion of the security system 202. The cover 404 can beconfigured to enable light from the light sources to illuminate thecamera's field of view and/or objects located in front of the cameraassembly 208.

In some embodiments, a security system includes an outer housing and theouter housing includes a translucent or semi-translucent cover 404configured to allow light from light sources to travel from an interiorportion of the security system to an area in front of the securitysystem (e.g., to an area outside of the security system). Light sourcescan be located beneath the cover 404 and can be oriented to emit lightthrough the cover 404. In some embodiments, the cover 404 couples acamera assembly with the outer housing.

In some embodiments, a tube 454 leads from the orientation feature 400(e.g., a hole in the outer surface of the camera assembly dome) to amicrophone 452, 456 located inside of the security system 202 (e.g., ona printed circuit board). The microphone 456 can be located outside ofthe camera assembly on a printed circuit board. The microphone 452 canbe located inside of the camera assembly (e.g., inside of the sphericalassembly that houses at least a portion of the camera). The tube 454 canbe configured to conduct sound and/or direct sound to a microphone 452,456 located inside of the security system 202. The tube 454; microphones452,456; and the orientation feature 400 are not included and/orindicated in some figures in the interest of clarity.

FIG. 10 illustrates a perspective, cross-sectional view along line 9-9from FIG. 5. The security system 202 can include a battery 462, whichcan be rechargeable. Some embodiments include alkaline or lithiumbatteries. In some embodiments, the battery 462 can be a 3,500 mAhbattery and/or a battery between 1,000 mAh and 5,000 mAh.

The lens 408 can allow light, such as IR light, to enter the securitysystem 202 to enable an IR detector 470 to sense and/or detect the IRlight. Several embodiments include the IR detector 470. The IR detector470 can be used to determine if a visitor is near the security system202 due to the unique IR signature and/or characteristics of peoplecompared to non-living objects. The IR detector 470 can be a thermal orphotonic IR detector. The system (e.g., 200 in FIG. 1) can be configuredto distinguish between the IR characteristics of people and backgroundIR characteristics. Thus, the system can determine if a visitor is in anentryway (e.g., in front of a door). The IR detector 470 can be a motionsensor.

In several embodiments, the IR detector 470 is a light detector, whichcan be used to distinguish day (i.e., light hours) from night (i.e.,dark hours). In some embodiments, day versus night is distinguishedbased on time rather than light. The communication system 200 can have aDay Mode and a Night Mode, wherein Night Mode reduces, alters, orprecludes alerts to the user.

Pressing the doorbell button 212 can activate a switch 474, which cancause a chime inside the building to emit a sound and/or can initiate acommunication request to the user. In some embodiments, pressing thedoorbell button 212 can trigger the system to record a fingerprint ofthe visitor. The lens 408 can be large enough to enable the securitysystem 202 to take a picture (e.g., an IR image) of the visitor'sfinger. In some embodiments, the fingerprint is compared against adatabase of fingerprints to identify the visitor and/or to classify thevisitor. Visitors in a welcome class (e.g., family, a person withpermission to enter) can cause a door to open (e.g., the security systemcan unlock the door). In some embodiments, the button 212 is afingerprint reader that can optically scan fingerprints when visitorstouch a glass imaging window.

FIG. 11 illustrates a back view of the security system 202 from FIG. 5without a mounting bracket 420. Security systems 202 can include a chip480 (e.g., integrated circuits, microprocessor, computer) and a memory492. Security systems 202 can also include a microphone 484 and aspeaker 488. The speaker 488 can comprise a flat speaker and a soundchamber 460 configured to amplify an emitted sound. The flat speaker canbe located in the sound chamber. Some security system embodimentsinclude a proximity sensor 500. In several embodiments, security systems202 include a wireless communication module 504, such as a WiFi module.The communication module 504 can have an integrated antenna. In someembodiments, an antenna is contained within the outer housing 224.

FIG. 12 illustrates a back view of the security system 202 from FIG. 5with a mounting bracket 420. In some embodiments, the mounting bracket420 is molded from plastic or machined from metal, such as aluminum. Themounting bracket 420 can include screw holes 412, which can be slotsconfigured to allow a threaded portion of a screw to pass, but not allowthe head of the screw to pass. A wire hole 416 can be located in thecenter of the mounting bracket 420. Referring now to FIGS. 3 and 12,electrical wires 304 from the building 300 can pass through the wirehole 416 and couple to electrical connectors 510 (shown in FIG. 11).

FIG. 13 illustrates a perspective view of the outer housing 224 fromFIG. 5. The outer housing 224 can include grooves 514 that extendradially outward from the central axis of the outer housing 224. Thegrooves 514 can be located on an inner diameter and/or inner surface ofthe outer housing 224, which can be part of a doorbell. Some embodimentsinclude one continuous groove along an inner surface while otherembodiments include separate grooves (such as the grooves illustrated inFIG. 13). Separate grooves can help control the angular orientation ofthe doorbell when it is mounted to a wall.

FIG. 14 illustrates a front view of the mounting bracket 420 coupled(e.g., screwed) to a wall. Screws 522 can be used to couple the mountingbracket 420 to a wall of a building, structure, and/or enclosure.

The mounting bracket 420 can have protrusions 518 that can extendradially outward from the mounting bracket 420. The protrusions 518 canbe configured to fit inside the grooves 514 as shown in the dashed boxof FIG. 9. Flex zones 526 (e.g., holes, open areas, slots, flexiblematerial) can be located radially inward from the protrusions 518. Theflex zones 526 can allow the protrusions 518 to moves radially inward asthe outer housing 224 is pushed onto the bracket 420 (e.g., when thebracket is mounted to a wall).

Referring now to FIGS. 13 and 14, moving radially inward can help theprotrusions 518 clear lips 530 associated with the grooves 514. The lips530 can be located closer to the back side of the outer housing 224 ordoorbell than the grooves 514 such that, in some embodiments, the lip530 moves past the protrusion 518 before the protrusion 518 reaches thegroove 514. The lips 530 can extend further radially inward than thegrooves 514. In some embodiments, the outer housing 224 is configured toflex radially outward (e.g., at least in areas within 1 centimeter ofthe lips 530 and/or grooves 514) to enable the lips 530 to clear (e.g.,snap over, move beyond) the protrusions 518.

FIG. 15 illustrates a partial, side view of the mounting bracket 420.The protrusions 518 can have a first side 550, which can be a front side(i.e., configured to be mounted facing away from a wall of a building).The protrusions 518 can have a second side 554, which can be a back side(i.e., configured to be mounted facing towards a wall of a building). Insome embodiments, the first side 550 of the protrusion 518 includes arounded or chamfered edge to facilitate pushing the outer housing 224onto the bracket 420 to create a snap fit.

In some embodiments, the outer housing 224 includes protrusions thatextend radially inward and the bracket 420 includes grooves and/orindentations that extend radially inward to capture the protrusions ofthe outer housing 224. In some embodiments, the outer housing 224 snapsonto the bracket 420. In several embodiments, the outer housing 224 iscoupled to the bracket by threads (e.g., screws with threads, threadsalong the outer perimeter of the bracket).

Referring now to FIGS. 13-15, the outer housing 224 can lock onto thebracket 420 to reduce the likelihood of theft. The outer housing 224 andbracket 420 can be configured such that mounting means (e.g.,protrusions 518, screws 522) are hidden when the outer housing 224 iscoupled to the bracket 420. In some embodiments, the outer housing 224covers coupling members (e.g., protrusions 518, screws 522) when theouter housing 224 is coupled to the bracket 420.

Methods of Use

FIG. 16 illustrates a method of using a security system, according tosome embodiments. The illustrated method includes optional steps. Insome embodiments, the steps can be performed in orders different thanthe order illustrated. In at least one embodiment, at least some of thesteps are performed in the order illustrated in FIG. 16.

Step 600 can include removing a first doorbell from a wall (e.g., thewall of a building). The first doorbell can be a traditional doorbellwithout a camera. Step 604 can include decoupling electrical wires(e.g., 304 in FIG. 3) from the first doorbell. Step 608 can includepassing the electrical wires through a hole (e.g., 416 in FIG. 14) in abracket or mounting device. Step 612 can include coupling (e.g.,screwing, fastening) the bracket to the wall. Step 616 can includeelectrically coupling a second doorbell (e.g., 202 in FIG. 1) to theelectrical wires. The second doorbell can be a security system, such asa security system 202 illustrated in FIG. 3. The second doorbell caninclude a camera (such as a video camera), a speaker, a microphone,and/or a wireless communication assembly. Step 620 can include couplingthe second doorbell to the bracket.

Step 624 can include using the electrical wires to provide electricalpower to a speaker, microphone, and/or camera located at least partiallyinside of the second doorbell. Step 628 can include using a firstcomputing device (e.g., mobile computing device, smartphone, laptop,desktop, tablet) to connect the second doorbell to a wireless network.Step 632 can include using a motion sensor, proximity sensor, audiosensor, and/or button located at least partially inside of the seconddoorbell to detect at least one visitor. The visitor can be a person whoapproaches the second doorbell and/or rings the second doorbell.

Step 636 can include sending information regarding the visitor (e.g.,the presence of the visitor, doorbell ring, video, audio) to a secondcomputing device (e.g., a remotely located computing device), which canbe the first computing device. Step 640 can include opening a means fortwo-way communication between the visitor and a user of the secondcomputing device. The means for two-way communication can enable theuser to talk with the visitor and/or see the visitor via a wirelessnetwork, a cellular network, and/or the Internet.

Modes of Operation

FIG. 17 illustrates methods of using a security system, according tosome embodiments. The steps can be performed by a security system and/orby a remotely located server and/or computer. In some embodiments, allof the steps shown in FIG. 17 are performed by a security system (e.g.,a doorbell). In some embodiments, Steps 700, 704, 708, 712, 716, 720,and/or 724 are performed by a security system (e.g., a doorbell). Insome embodiments, Steps 720, 724, 728, 732, 736, 740, 744, and/or 748are performed by at least one remote server and/or at least one remotecomputing system. The steps can be performed in many different orders.

Some embodiments include a Shipping Mode, which can be an ultra-lowpower mode (e.g., can use even less power than a Sleep Mode). Wirelesscommunication (e.g., WiFi communication, communication module 504 inFIG. 11) can be disabled during Shipping Mode. The camera, motiondetector, sound detector, microphone, infrared sensors, infrared lights,infrared components, thermometer, heating element, and/or proximitysensor can be disabled during Shipping Mode. During Shipping Mode, thesecurity system (e.g., 202 in FIG. 11) can be configured to detectwhether the security system is electrically coupled to an external powersource (e.g., electricity from a building or home). If the securitysystem detects that the security system is electrically coupled to anexternal power source, then the security system can be configured toexit Shipping Mode and enter another mode (e.g., Sleep Mode, StandbyMode, Detection Mode, Alert Mode). In some embodiments, a securitysystem enters Sleep Mode once the security system exits Shipping Mode.Step 692 can include entering a Shipping Mode. Step 696 can includedetecting external power. Methods can include exiting a Shipping Modeand/or entering a Sleep Mode in response to detecting external power(e.g., power from outside of the security system).

Step 700 can include entering a Sleep Mode. In some embodiments, SleepMode has lower power consumption than Standby Mode and/or Alert Mode. Inseveral embodiments, Sleep Mode turns off, powers down, and/or reducesthe activity of one or more components and/or assemblies. In someembodiments, the camera is off, not recording, and/or in Low Power Modewhile the system is in Sleep Mode. In some embodiments, the speaker isoff, not recording, and/or in Low Power Mode while the system is inSleep Mode. In several embodiments, the microphone is off, notrecording, and/or in Low Power Mode while the system is in Sleep Mode.

Step 704 can include detecting motion, proximity, and/or noise. Step 708can include exiting the Sleep Mode and entering a Standby Mode. Step 712can include detecting motion, proximity, noise, and/or button contact.Step 716 can include entering an Alert Mode.

In some embodiments, thresholds necessary to exit the Sleep Mode andenter a Standby Mode are less than thresholds necessary to exit theStandby Mode and enter an Alert Mode. In several embodiments, greatermotion, closer proximity, and/or louder noise are necessary to enter anAlert Mode than are necessary to exit the Sleep Mode and enter a StandbyMode. In some embodiments, button contact is necessary to enter an AlertMode. In some embodiments, a system will exit the Sleep Mode and enter aStandby Mode upon detecting motion, detecting motion within 10 feet, ordetecting motion within 20 feet. In some embodiments, a system will exitthe Sleep Mode and enter a Standby Mode upon detecting sound, upondetecting sound louder than 10 decibels, upon detecting sound louderthan 25 decibels, upon detecting sound louder than 50 decibels, upondetecting sound louder than 80 decibels, or upon detecting sound louderthan 90 decibels.

In several embodiments, Standby Mode turns on, powers up, and/orincreases the activity (e.g., electrical activity, detection activity,detecting) of one or more components and/or assemblies (relative toSleep Mode). In some embodiments, the camera is on, recording, and/or inan Intermediate Power Mode while the system is in Standby Mode. In someembodiments of Standby Mode, the camera is configured to quickly startrecording, but is not recording. In several embodiments of Standby Mode,the microphone is on, in Detection Mode, and/or detecting sounds to helpthe system determine if it should change to Alert Mode.

In several embodiments, the system takes a picture when the systementers Standby Mode. In some embodiments, the system takes a pictureeach time a visitor is detected even if the visitor does not ring thedoorbell.

In some embodiments of Alert Mode, the system has determined that avisitor is present and/or attempting to contact a person in the building(e.g., the visitor is ringing a doorbell, waiting by the doorbell,knocking on a door). Some embodiments go into Alert Mode even if thevisitor is not trying to contact a person in the building (e.g., thevisitor could be a person trying to break into the building). The systemcan be configured to enter Alert Mode if the system detects a visitorwithin 20 feet, within 10 feet, or within five feet. The system can beconfigured to enter Alert Mode if the system detects a sound greaterthan 50 decibels, 80 decibels, and/or 90 decibels. The system can beconfigured to enter Alert Mode if a visitor presses a doorbell buttonand/or triggers a proximity sensor.

The system can be configured to block or allow a communication request(as shown in Steps 720 and 724). The user might want to blockcommunication requests because she is busy or asleep. The user canconfigure the system to autonomously and/or automatically blockcommunication requests (e.g., a visitor ringing the doorbell would notinitiate a communication request to the user). In several embodiments,the system that blocks or allows a communication request can be thedoorbell (e.g., 202 in FIG. 1), a computing device (e.g., 204 in FIG.1), or a remote server (e.g., 206 in FIG. 1).

If the communication request is allowed, the system can send thecommunication request via Simultaneous Mode as illustrated in Step 728.Simultaneous Mode can include sending the communication requestsimultaneously to at least two computing devices (e.g., computingdevices 204 in FIG. 3). The request can be sent simultaneously even ifthe communication requests are not initiated at the same moment as longas the communication requests overlap in at least one moment of time. Insome embodiments, if a first user does not respond to a firstcommunication request to a first computing device, the system can send asecond communication request to a second computing device while thefirst communication request is still underway. As a result, the systemstarts by sending the communication request to the first user, but thensimultaneously sends communication requests to both the first user and asecond user.

Step 732 can include assigning priorities to remote computing devices.In some embodiments, a computing device with a higher priority willreceive a communication request before a computing device with a lowerpriority. In several embodiments, a computing device and/or user withhigher priority will have privileges that are not available to acomputing device and/or user with a lower priority. These privileges caninclude administrative abilities and the ability to alter settings.

Step 736 can include sending the communication request to a first remotecomputing device with the first highest priority. Step 740 can includedetermining whether to send the communication request to a secondcomputing device with the second highest priority. Step 744 can includesending the communication request to the second remote computing devicewith the second highest priority.

Step 748 can include determining whether to enter an Autonomous AnswerMode. Autonomous Answer Mode can include methods of the security system,server, and/or remote computing device interacting with the visitorwithout user action. For example, if a user does not respond to acommunication request, the system can play a recorded message, providepre-recorded instructions from the user to the visitor, and/or requestthe visitor to leave a message for the user (e.g., an audio message, avideo message).

In some embodiments, the Autonomous Answer Mode includes sending thecommunication request to an answering service such as a call center. Anoperator at the answering service can speak with the visitor, provideinstructions to the visitor, and/or take a message from the visitor.

In several embodiments, the user can select a pre-recorded message forthe security system to play for the visitor. The security system canplay the pre-recorded message for the visitor by emitting the audiomessage from the speaker. Once the visitor has responded to thepre-recorded message, the user can initiate two-way communication withthe visitor. In one embodiment, the pre-recorded message asks thevisitor to identify herself and/or to describe her reason for being atthe building. The user can listen to the visitor's response beforeopening two-way communication with the visitor and/or letting thevisitor know that the user is listening to the visitor and/or watchingthe visitor.

FIG. 52 illustrates methods of using a security system (e.g., adoorbell), according to some embodiments. Step 1002 can includeobtaining a doorbell that comprises a speaker, a microphone, a camera, abattery, and a button. Step 1006 can include shipping a doorbell in aShipping Mode. The Shipping Mode can be configured to detect whether thedoorbell is electrically coupled to an external power source. Step 1010can include entering a Setup Mode. Some methods include entering a SetupMode in response to detecting electricity from an external power source.Step 1014 can include entering a Standby Mode. Several methods includeentering a Standby Mode in response to detecting electricity from anexternal power source. Step 1018 can include entering a NetworkConnection Mode. Some methods include entering a Network Connection Modein response to pressing a button of the doorbell for a period of time.Some methods include entering a Network Connection Mode in response todetecting electricity from an external power source. Step 1022 caninclude entering an Alert Mode. Several methods include entering anAlert Mode in response to detecting an indication of a visitor. Step1026 can include sending a wireless notification to the remotely locatedcomputing device regarding a presence of the visitor. FIG. 52 includesoptional steps and steps that can be combined with portions of othermethods. The steps can be performed in many different orders.

Methods can include using a doorbell that is configurable to wirelesslycommunicate with a remotely located computing device, such as a cellulartelephone, laptop, or tablet. Some embodiments include obtaining adoorbell that comprises a speaker, a microphone, a camera, and a button.The button can be configurable to enable a visitor to sound a chime(e.g., a speaker or another sound emission device located inside of abuilding). Several embodiments include shipping the doorbell in aShipping Mode that consumes power. In the Shipping Mode, the doorbellcan detect whether the doorbell is electrically coupled to an externalpower source (e.g., the electricity of a building to which the doorbellis attached). Methods can then include entering a Network ConnectionMode in response to detecting electricity from the external powersource. The Shipping Mode can consume less power than the NetworkConnection Mode. The Network Connection Mode can comprise detecting awireless network (e.g., a wireless network emitted by a router). Severalmethods include detecting a first indication of the visitor using thedoorbell.

Methods for using a doorbell that is configurable to wirelesslycommunicate with a remotely located computing device can includeobtaining the doorbell that comprises a speaker, a microphone, a camera,and a button. The button can be configured to enable a visitor to sounda chime. Some methods include shipping the doorbell in a Shipping Modethat consumes power. During the Shipping Mode, the doorbell can beconfigured to detect whether the doorbell is electrically coupled to anexternal power source. Methods can include entering a Setup Mode inresponse to detecting electricity from the external power source. TheShipping Mode can consume less power than the Setup Mode. The Setup Modecan increase electrical activities of the doorbell relative to theShipping Mode. Some embodiments include increasing the electricalactivities of the communication module, circuit board, battery,microphone, speaker, and/or camera. Some embodiments include detecting afirst indication of the visitor. The first indication can be detectedusing the doorbell.

The remotely located computing device can be a cellular telephone havinga display screen. Methods can comprise sending an image of the visitorfrom the doorbell to the cellular telephone and displaying the image ofthe visitor on the display screen of the cellular telephone.

Some embodiments comprise detecting a second indication of the visitor,wherein the second indication is detected using the doorbell. Severalmethods comprise sending a wireless notification to the remotely locatedcomputing device regarding a presence of the visitor in response todetecting both the first indication and the second indication.

In some embodiments, detecting the first indication comprises detectinga signal indicative of the visitor above a first threshold and detectingthe second indication comprises detecting the signal indicative of thevisitor above a second threshold. In some embodiments, the secondthreshold is greater than the first threshold. The doorbell can comprisea first sensor. The signal indicative of the visitor can be sensed bythe first sensor of the doorbell.

In several embodiments, the first sensor of the doorbell comprises amotion sensor and the signal is related to motion. The camera, thespeaker, and/or the microphone can be disabled during the Setup Mode.

The first sensor of the doorbell can comprise a proximity sensor. Thesignal can be related to proximity of the visitor.

The first sensor of the doorbell can comprise a microphone. The signalcan be related to sound. In some embodiments, detecting the secondindication comprises detecting a knocking sound.

In several embodiments, a doorbell comprises a first sensor and a secondsensor. The first indication can be detected using the first sensor andthe second indication can be detected using the second sensor. The firstsensor can be a different type of sensor than the second sensor.

In some embodiments, the first sensor of the doorbell comprises a motionsensor. The second sensor can comprise the microphone. Methods cancomprise using the microphone to detect a knocking sound to verify thepresence of the visitor detected by the motion sensor.

In several embodiments, the first sensor of the doorbell can comprise aninfrared detector and the second sensor can comprise the camera.

In some embodiments, the doorbell comprises a battery. The Setup Modecan comprise automatically charging the battery in response to detectingthe electricity from the external power source.

In some embodiments, the Setup Mode comprises automatically replenishingat least a portion of electrical energy consumed from the battery by thedoorbell during the Shipping Mode. Methods can comprise precludingwireless communication by the doorbell until after replenishing theportion of the electrical energy and then entering a Network ConnectionMode in response to pressing the button for at least eight seconds.Pressing the button for at least eight seconds can help the doorbelldistinguish between when the user just wants to sound the chime and whenthe user wants the doorbell to enter the Network Connection Mode. TheNetwork Connection Mode can comprise detecting a wireless network.

In several embodiments, the doorbell comprises a battery and the SetupMode comprises using the electricity from the external power source tocharge the battery before enabling communication between the doorbelland the remotely located computing device.

In some embodiments, the Setup Mode comprises a Network Connection Mode,and the method comprises entering the Network Connection Mode inresponse to pressing the button for at least eight seconds. The NetworkConnection Mode can comprise detecting a wireless network and inputtinga doorbell identification code into the remotely located computingdevice. In some embodiments, inputting the doorbell identification codeincludes typing letters, numbers, words, and/or symbols on the remotelylocated computing device. Inputting the doorbell identification code caninclude speaking letters, numbers, words, and/or symbols such that theremotely located computing device hears the information and captures theinformation.

The doorbell identification code can be associated with the doorbellsuch that the code is correlated with at least one doorbell. The codecan be used as an electronic key to unlock access to the doorbell. TheNetwork Connection Mode can comprise using the doorbell identificationcode to verify whether the remotely located computing device isauthorized to communicate with the doorbell. For example, the code canprevent an unauthorized computing device from hacking into the doorbelland receiving visitor alerts from the doorbell.

In several embodiments, the Network Connection Mode comprises enablingcommunication from the remotely located computing device to the doorbellin response to pressing the button for at least eight seconds andinputting the doorbell identification code into the remotely locatedcomputing device. Pressing the button for at least eight seconds canhelp the doorbell distinguish between when the user just wants to soundthe chime and when the user wants to enable communication from theremotely located computing device to the doorbell.

In some embodiments, the remotely located computing device is connectedto the wireless network such that the remotely located computing deviceis configured to transmit data via the wireless network. The wirelessnetwork can comprise a name and a password. The name can identify thewireless network to entities searching for wireless networks. Thepassword can enable an electronic device to connect to the wirelessnetwork. The wireless network can enable electronic devices to connectto the Internet.

The communication from the remotely located computing device to thedoorbell can comprise the name and the password of the wireless networkto which the remotely located computing device is connected. The NetworkConnection Mode can comprise connecting the doorbell to the wirelessnetwork to which the remotely located computing device is connected suchthat the doorbell can send an alert regarding a presence of the visitorto the remotely located computing device via the wireless network.

Some embodiments include using the doorbell to detect multiple wirelessnetworks. The wireless network to which the remotely located computingdevice is connected can be one of the multiple wireless networks.Methods can comprise automatically selecting the wireless network towhich the remotely located computing device is connected. For example,the system can choose which wireless network to connect the doorbellwithout asking a person which wireless network the system should choose.

In some embodiments, a Setup Mode comprises a Network Connection Mode.Methods can comprise entering the Network Connection Mode in response topressing the button for at least eight seconds. The Network ConnectionMode can comprise detecting a first wireless network having a name and apassword. The Network Connection Mode can comprise inputting a doorbellidentification code into the remotely located computing device. Thedoorbell identification code can be associated with the doorbell. TheNetwork Connection Mode can comprise using the doorbell identificationcode to verify whether the remotely located computing device isauthorized to communicate with the doorbell. The Network Connection Modecan comprise the remotely located computing device creating a secondwireless network (e.g., that emanates from the remotely locatedcomputing device). The Network Connection Mode can comprise transmittingthe name and the password of the first wireless network directly fromthe remotely located computing device to the doorbell via the secondwireless network to enable the doorbell to communicate with the remotelylocated computing device via the first wireless network. Methods cancomprise the remotely located computing device directly communicatingwith the doorbell via the second wireless network prior to the doorbellindirectly communicating with the remotely located computing device viathe first wireless network. For example, the wireless communication fromthe remotely located computing device can travel through the airdirectly to the doorbell. The wireless communication from the remotelylocated computing device can travel indirectly to the doorbell via athird electronic device such as a server.

A remotely located computing device can be located near a doorbell. Forexample, during setup some users will hold a cellular phone within acouple of feet from the doorbell to input a doorbell identification codeinto the cellular phone to verify that the phone is authorized tocommunicate with the doorbell and to help the doorbell connect to awireless network. The phone is located remotely from the doorbellbecause it is not physically attached to the doorbell.

Several methods include using a doorbell that is configurable towirelessly communicate with a remotely located computing device. Methodscan include shipping the doorbell in a Shipping Mode that consumespower. During some Shipping Mode embodiments, the doorbell is configuredto detect whether the doorbell is electrically coupled to an externalpower source. Several embodiments include entering a Standby Mode inresponse to detecting electricity from the external power source. TheShipping Mode can consume less power than the Standby Mode. The speakerand the microphone can be disabled during the Standby Mode.

Some embodiments include exiting the Standby Mode and entering an AlertMode in response to detecting a first indication of the visitor. Thefirst indication can be detected using the doorbell. Several embodimentsinclude sending a wireless notification to the remotely locatedcomputing device regarding a presence of the visitor in response toentering the Alert Mode.

Some embodiments comprise detecting multiple wireless networks andautomatically selecting a first wireless network for communicatingbetween the doorbell and the remotely located computing device. Prior tothe automatic selection, the remotely located computing device can beconnected to the first wireless network. Methods can further compriseauthorizing the doorbell to communicate with the remotely locatedcomputing device by pressing the button for at least eight seconds andinputting a doorbell identification code into the remotely locatedcomputing device. The doorbell identification code can be associatedwith the doorbell. The first wireless network can comprise a name and apassword. Methods can further comprise wirelessly communicating the nameand the password from the remotely located computing device to thedoorbell.

Several methods include entering a Network Connection Mode prior tosending the wireless notification. The Network Connection Mode cancomprise detecting a first wireless network having a name and apassword. The Network Connection Mode can comprise inputting a doorbellidentification code into the remotely located computing device. Thedoorbell identification code can be associated with the doorbell. TheNetwork Connection Mode can further comprise using the doorbellidentification code to verify whether the remotely located computingdevice is authorized to communicate with the doorbell. The NetworkConnection Mode can comprise the remotely located computing devicecreating a second wireless network. The Network Connection Mode cancomprise transmitting the name and the password of the first wirelessnetwork directly from the remotely located computing device to thedoorbell via the second wireless network to enable the doorbell tocommunicate with the remotely located computing device via the firstwireless network. Methods can comprise the doorbell directlycommunicating with the remotely located computing device via the secondwireless network prior to the doorbell indirectly communicating with theremotely located computing device via the first wireless network.

Network Congestion

In some cases, communication networks might be unable to transmit dataat sufficient rates between a security system 202 and a remote computingdevice 204. Network congestion can occur when a link or node is carryingtoo much data, which can result in the deterioration of the quality ofcommunication services. Several embodiments include methods to addressnetwork congestion and low data transmission rates.

FIG. 18 illustrates a data prioritization method, according to someembodiments. FIG. 18 includes optional steps and steps that can beperformed in any order. Step 800 can include determining if a datatransmission rate is insufficient to avoid communication issues (e.g.,delayed transmission, blocked transmission). For example, a datatransmission rate between a security system 202 and a computing device204 can be insufficient if audio and/or video is not transmittedreliably, is transmitted intermittently, and/or the video data istransmitted more than 0.2 seconds after the audio data. If the datatransmission rate is insufficient, the method can include means toaddress the problem, and then can include determining if the means toaddress the problem resolved the insufficiency. If the insufficiency isnot resolved, the method can include using another means to address theproblem, and then can include determining if the second means to addressthe problem resolved the insufficiency. The method can include usingadditional means to address the insufficiency until the datatransmission rate is sufficient to avoid communication issues.

Several embodiments include prioritizing audio data over image data(e.g., video data), which is included in FIG. 18 as Step 804. Methodscan include determining if a data transmission rate is insufficient toavoid communication issues. If the data transmission rate isinsufficient to avoid communication issues, the method can includeadding and/or using priority information (e.g., control information,header information) regarding the type of service (e.g., quality ofservice) to audio data and/or video data (e.g., payload data). Themethod can also include making the priority information for audio datahigher than the priority information for video data.

Some embodiments include making the priority information for a picture(e.g., a still image) of the visitor higher than the priorityinformation for a video of the visitor. Some embodiments include makingthe priority information for audio of the visitor higher than thepriority information for the picture of the visitor and/or higher thanthe priority information for the video of the visitor. Some embodimentsinclude making the priority information for audio of the user (e.g., theuser of the computing device 204 in FIG. 1) higher than the priorityinformation for the audio of the visitor.

Step 808 can include reducing the resolution of images transmitted to acomputing device. Step 812 can include reducing the number of frames persecond transmitted to the computing device. Step 816 can includeswitching from a Video Mode to a Snapshot Mode. The Snapshot Modeincludes sending at least one still image (not more than every 0.3seconds). Step 820 can include switching from a Picture Mode (e.g., theVideo Mode, the Snapshot Mode) to an Audio Mode. In the Audio Mode, novideos or pictures are sent to the computing device (e.g., 204 in FIG.1).

Following Mode

Referring now to FIGS. 2 and 5, in some embodiments, allowing the userto see the visitor can be important to facilitate quality interactionwith the visitor or to identify the visitor. In some embodiments, thecamera assembly 208 moves to point towards the visitor (e.g., movestowards the center the motion detected by the motion detector, movestowards the center of an IR signal indicative of a human temperature,moves as controlled by the user via a computing device 204).

In several embodiments, the image 252 is a portion of the image capturedby the camera assembly 208. The image captured by the camera assembly208 is the camera's field of view (“FOV”) 840 (as shown in FIGS. 19 and20). The image 252 can be a portion of the camera's FOV 840 thatincludes the visitor (as detected by the motion sensor, IR sensor,machine vision, and/or facial recognition software).

Referring now to FIGS. 2, 19, and 20, the portion of the camera's FOV840 that is shown on the computing device 204 (e.g., in the image 252)is the displayed portion 848 a,b. The communication system can beconfigured such that the displayed portion 848 a,b includes the visitor844 even when the visitor 844 moves from a first position (asillustrated in FIG. 19) to a second position (as illustrated in FIG. 20)within the camera's FOV 840. In some embodiments, the camera's FOV 840is maintained (i.e., doesn't change) even though the displayed portion848 a,b changes. The method of displaying a portion that includes avisitor is called Following Mode.

In some embodiments, the user can select characteristics of the portionof the camera's FOV 840 that is shown on the computing device 204. Thesecharacteristics can include a Face Mode, wherein the displayed portion848 a,b includes less than 90% of the FOV 840 but at least 40% of thedisplayed portion 848 a,b shows the visitor's head, at least 30% of thedisplayed portion 848 a,b shows the visitor's head, or at least 15% ofthe displayed portion 848 a,b shows the visitor's head. Thesecharacteristics can include a Body Mode wherein the image 252 includesless than the entire FOV 840 or less than 80% of the FOV 840 butincludes at least 80% of the body of the visitor, at least 50% of thebody of the visitor, or at least 30% of the body of the visitor. Thesecharacteristics can include a Group Mode wherein the image 252 includesless than the entire FOV 840 or less than 80% of the FOV 840 butincludes at least a portion of each of two visitors (if present), atleast a portion of each of three visitors (if present), at least atportion of the majority of each of the visitors, at least 30% of all ofthe visitors, or at least the heads of all of the visitors. Once theuser sets Face Mode, Body Mode, or Group Mode, the system automaticallyshows the portion of the FOV 840 described above in the image 252without the user having to manually zoom.

FIG. 21 illustrates a method of displaying a visitor, according to someembodiments of Following Mode. Step 860 can include detecting thepresence of a visitor. Step 864 can include recording an image with asecurity system. Step 868 can include identifying a portion of the imagethat includes the visitor. Step 872 can include displaying the portionon a remote computing device.

FIG. 22 illustrates a method of displaying a visitor, according to someembodiments of Following Mode. Step 880 can include detecting thepresence of a visitor. Step 884 can include recording (e.g., filming,taking, sensing even if not stored in memory) a first image with asecurity system. Step 888 can include identifying a first location ofthe visitor within the first image at a first time. Step 892 can includedisplaying a first portion of the first image, wherein the first portionincludes at least a portion of the first location. Step 896 can includerecording a second image with the security system. Step 900 can includeidentifying a second location of the visitor within the second image ata second time. In some embodiments, the first image and the second imagehave the same FOV. Some methods include maintaining the camera's fieldof view between the first image and the second image. Step 904 caninclude displaying a second portion of the second image, wherein thesecond portion includes at least a portion of the second location.Displaying can include displaying an image on a computing device (e.g.,204 in FIG. 2).

Additional Devices

Communication systems can include additional devices, can work inconjunction with additional devices, and/or can communicate withadditional devices. In some embodiments, the additional devices (e.g.,chimes as described previously) are part of the communication system. Insome embodiments, the additional devices are not part of thecommunication system.

Referring now to FIG. 23, additional devices can include chimes 910,speakers 914, and lights 918, 922. In some embodiments, a communicationsystem causes an exterior light 918 (e.g., a porch light) and/or aninterior light 922 (e.g., a lamp, overhead lights inside of a home) toilluminate when the security system 202 detects a visitor (e.g., when avisitor pushes the doorbell button).

Some embodiments include a speaker 914 located inside of the building.The user's voice can be emitted from the speaker 914 located inside ofthe building to make the visitor believe the user is speaking frominside the building (even when the user is located far away from thebuilding and speaking into a remote computing device such as asmartphone). The security system 202 can transmit the user's audioinformation to the speaker 914 located inside of the building viawireless communication means such as Bluetooth.

In some embodiments, the security system 202 wirelessly communicateswith a chime 910 located inside of the building. In some embodiments,the security system sends information or signals to a chime 910 viawires.

In several embodiments, the security system 202 wirelessly communicateswith a garage door opener 926, which can be located inside of thebuilding and configured to open a garage door of the building. The usercan instruct the garage door to open via a user interface on a remotecomputing device 204 a. The remote computing device 204 a cancommunicate with the security system 202, which can wirelesslycommunicate the command to the garage door and/or garage door opener926.

In several embodiments, the security system 202 communicates with a doorlock 930 (e.g., a deadbolt). The user can instruct the door lock 930 toopen via a user interface on a remote computing device 204 a. The remotecomputing device 204 a can communicate with the security system 202,which can communicate the command to the door lock 930. In someembodiments, the user can “buzz” someone into an apartment complex viaan app on a computing device such as a smartphone.

In several embodiments, the security system 202 communicates with a gateopener 934 (e.g., an electric or robotic gate opener configured tounlock and/or open a gate, such as a gate to an apartment complex or agate that blocks an entrance to a driveway).

As illustrated in FIG. 23, a first remote computing device 204 a cansend commands to and/or receive information from devices (e.g., chimes910, speakers 914, exterior lights 918, interior lights 922, garage dooropeners 926, door locks 930) via a security system 202, which caninclude a doorbell. The security system 202 can communicate with asecond remote computing device 204 b.

In some embodiments, the first remote computing device 204 a cancommunicate information regarding the security system 202 with thesecond remote computing device 204 b. The information regarding thesecurity system 202 communicated between remote computing devices can beany of the information described herein.

In several embodiments, the first remote computing device 204 a forwardsinformation from the security system 202 to a third remote computingdevice 204 c and/or to an alert device 938. The alert device 938 can beany device configured to alert a user or person. In some embodiments,the alert device 938 is a watch that vibrates or displays a message to auser. In some embodiments, the alert device 938 is an alarm system.

In some embodiments, the software and/or user interface of a firstcomputing device 204 a allows the user to forward the communicationrequest to a second computing device 204 b and/or to a third computingdevice 204 c. For example, a user might see that the visitor is a friendof the user's child. The user can then forward the communication requestto the child's computing device with or without answering thecommunication request. In some embodiments, once a communication requestis forwarded to another computing device, the security system plays apre-recorded message, which can be a message that instructs the visitorto standby, wait, and/or have patience while the communication requestis forwarded to another user.

Some embodiments include one security system 202 that can communicatewith many computing devices. For example, one security system 202 can beplaced at the entrance of an apartment complex that includes 100individual homes. The security system 202 can be configured to properlyroute a communication request to the appropriate user. Some multi-homebuildings include a call box near a central entryway. The securitysystem 202 can listen to the sounds (e.g., tones) a visitor types in thecall box to identify the home (and thus, the user) the visitor seeks.The security system 202 can listen to the user name the visitor requests(e.g., states) to identify the user the visitor seeks. The securitysystem 202 can use a microphone and/or sound recognition software listenand recognize sounds. In some embodiments, the security system 202identifies that a visitor is making a communication request by listeningfor a sound (e.g., a buzz of an intercom system). The security system202 can then respond appropriately.

FIG. 24 illustrates an embodiment of a security system 950 (e.g., adoorbell) with an outer housing 954 and a camera assembly 958. Thesecurity system 950 can have buttons 962, which can be number and/orletter buttons configured to enable a visitor to select and/or dial aspecific house, apartment, office, and/or person. Not all of the buttons962 are labeled in FIG. 24 in the interest of clarity. The buttons 962are illustrated as circles. The security system 950 can be placed nearan entryway of a building in which many people are located. For example,a visitor might want to contact home number “204.” The visitor can type“204” into the security system 950, which can cause the security systemto initiate contact with a computing device of a user who lives in homenumber “204.”

The security system 950 can enable two-way audio. A microphone insidethe security system 950 can detect a visitor's sounds and a speaker in acomputing device can deliver the visitor's sounds to the user. Amicrophone in the computing device can detect a user's sounds and aspeaker in the security system 950 can deliver the user's sounds. Thesecurity system 950 can enable two-way video. A video camera of thesecurity system 950 can detect images of the visitor and a screen of thecomputing device can display the images of the visitor. A video cameraof the computing device can detect images of the user and a screen 970of the security system 950 can display the images of the user. Thescreen 970 can be a light emitting diode display, a liquid crystaldisplay, a plasma display, or any other display that can show images.

Some security system embodiments allow users and/or visitors to enterinformation (e.g., a password) with the buttons 962 to cause certainactions and/or enable certain features (e.g., unlock a door, open agarage, open a gate, turn an alarm system off, turn an alarm system on,call a particular person, enter a network password, enter a networkname, enter any of the modes described herein, exit any of the modesdescribed herein).

Select System Embodiments

FIG. 25 depicts an illustrative embodiment of a security system 202. Thesecurity system 202 may include at least one processing unit (orprocessor(s)) 2502 and at least one memory 2504. The processor(s) 2502may be implemented as appropriate in hardware, computer-executableinstructions, firmware or combinations thereof. Computer-executableinstruction or firmware implementations of the processor(s) 2502 mayinclude computer-executable or machine-executable instructions writtenin any suitable programming language to perform the various functionsdescribed. The security system 202 may also contain communicationsconnection(s) 2506 that allow the security system 202 to communicatewith a wireless router, another computing device or server, userterminals, and/or other devices.

The processor 2502 described herein can be hardware circuitry or atleast one computer system. As used herein “microprocessor” and“processor” can refer to circuitry, hardware circuitry, a computer, acomputer system, and/or one or more computer systems. As used herein,“module” can refer to a portion of a security system, a portion of acomputer, hardware circuitry, and/or software.

In some implementations, the memory 2504 may include different types ofmemory, such as static random access memory (“SRAM”), dynamic randomaccess memory (“DRAM”) or read only memory (“ROM”). Turning to thecontents of the memory 2504 in more detail, the memory 2504 may includean operating system 2508 and at least one application program or servicefor implementing the features disclosed herein including at least afunctionality module 2510. The functionality module 2510 can refer tosoftware and/or a computer. The memory 2504 may further includeadditional storage 2512 that is capable of storing recorded data.

FIG. 26 depicts an illustrative embodiment of a system or architecture2600 in which a security system may be implemented. In some embodimentsof this architecture 2600, at least one security system 202 may be incommunication with a service provider 2604 via a network 2606. Thesecurity system 202 may provide notifications or recorded data to theservice provider 2604.

The remote computing devices 2608 may be any type of computing devicesuch as, but not limited to, a mobile phone, a smart phone, a personaldigital assistant (“PDA”), a laptop computer, a desktop computer, aserver computer, a thin-client device, a tablet PC, etc. The remotecomputing device 2608 may include at least one device processor 2610capable of processing data recorded by the security system 202. Data maybe stored in the remote computing device's 2608 device memory 2612 or itmay be streamed over the network 2606. Where the data is streamed overthe network 2606, it may be displayed using a browser application 2614.The device processor 2610 described herein can be hardware circuitry.

In some embodiments, the networks 2606 may include any one or acombination of many different types of networks, such as cable networks,the Internet, wireless networks, cellular networks, and other privateand/or public networks. While the illustrated embodiment represents theusers accessing the browser application 2614 over the networks 2606, thedescribed techniques may equally apply in instances where the usersinteract with a service provider computer 2604 via the remote computingdevice 2608 over a landline phone, via a kiosk, or in any other manner.It is also noted that the described techniques may apply in otherclient/server arrangements (e.g., set-top boxes, etc.), as well as innon-client/server arrangements (e.g., locally stored applications,peer-to-peer systems, etc.).

As described briefly above, the browser application 2614 may allow theusers to interact with a service provider computer 2604, such as tostore, access, and/or manage data, develop and/or deploy computerapplications, and/or host web content. The at least one service providercomputer 2604, perhaps arranged in a cluster of servers or as a serverfarm, may host the browser application 2614. These servers may beconfigured to host a website (or combination of websites) viewable viathe remote computing device 2608 or a web browser accessible by a user.Other server architectures may also be used to host the browserapplication 2614. The browser application 2614 may be capable ofhandling requests from many users and serving, in response, various userinterfaces that can be rendered at the remote computing device 2608 suchas, but not limited to, a web site. The browser application 2614 can beany type of website that supports user interaction, including socialnetworking sites, electronic retailers, informational sites, blog sites,search engine sites, news and entertainment sites, and so forth. Asdiscussed above, the described techniques can similarly be implementedoutside of the browser application 2614, such as with other applicationsrunning on the remote computing device.

The service provider computers 2604 may be any type of computing devicesuch as, but not limited to, a mobile phone, a smart phone, a personaldigital assistant (“PDA”), a laptop computer, a desktop computer, aserver computer, a thin-client device, a tablet PC, etc. The serviceprovider computers 2604 may be the server 206 depicted in FIG. 1.Additionally, it should be noted that in some embodiments, the serviceprovider computers 2604 may be executed by at least one virtual machineimplemented in a hosted computing environment. The hosted computingenvironment may include at least one rapidly provisioned and releasedcomputing resource, which may include computing, networking, and/orstorage devices. A hosted computing environment may also be referred toas a cloud-computing environment.

In one illustrative configuration, the service provider computers 2604may include at least one memory 2616 and at least one processing unit(or processor(s)) 2618. The processor(s) 2618 may be implemented asappropriate in hardware, computer-executable instructions, firmware orcombinations thereof. Computer-executable instructions or firmwareimplementations of the processor(s) 2618 may include computer-executableor machine-executable instructions written in any suitable programminglanguage to perform the various functions described. The processor 2618described herein can be hardware circuitry.

The memory 2616 may store program instructions that are loadable andexecutable on the processor(s) 2618, as well as data generated duringthe execution of these programs. Depending on the configuration and typeof service provider computers 2604, the memory 2616 may be volatile,such as random access memory (“RAM”), and/or non-volatile, such asread-only memory (“ROM”) or flash memory. The service provider computers2604 may also include additional storage 2620, such as either removablestorage or non-removable storage including, but not limited to, magneticstorage, optical disks, and/or tape storage. The disk drives and theirassociated computer-readable media may provide non-volatile storage ofcomputer-readable instructions, data structures, program modules, andother data for the computing devices. In some implementations, thememory 2616 may include multiple different types of memory, such asstatic random access memory (“SRAM”), dynamic random access memory(“DRAM”) or ROM. Turning to the contents of the memory 2616 in moredetail, the memory 2616 may include an operating system 2622 and atleast one application program or service for implementing the featuresdisclosed herein including at least one operating module 2624. Thememory 2616 may further include a database 2626 with information relatedto contacts or people. The database 2626 may also be a third-partydatabase. One illustrative example of this element is a socialnetworking website database or a criminal database. The operating module2624 can be a computer, hardware circuitry, and/or software.

The memory 2616 and the additional storage 2620, both removable andnon-removable, are examples of computer-readable storage media. Forexample, computer-readable storage media may include volatile ornon-volatile, removable or non-removable media implemented in any methodor technology for storage of information such as computer-readableinstructions, data structures, program modules or other data. As usedherein, modules may refer to programming modules executed by computingsystems (e.g., processors) that are part of the remote computing device2608 or the service provider computers 2604. The service providercomputers 2604 may also contain communications connection(s) 2628 thatallow the service provider computers 2604 to communicate with a storeddatabase, another computing device or server, user terminals, and/orother devices on the networks 2606. The service provider computers 2604may also include input/output (“I/O”) device(s) and/or ports 2630, suchas for enabling connection with a keyboard, a mouse, a pen, a voiceinput device, a touch input device, a display, speakers, a printer, etc.

Turning to the contents of the memory 2616 in more detail, the memory2616 may include an operating system 2622, a database containing contactdata 2626 and the at least one application program or service forimplementing the features disclosed herein including an operating module2626.

Some or all aspects of the operating module 2624 may be implemented on aremote computing device 2608, such as in a mobile application. There aremany methods of implementing the following features. For example, thefollowing features could be implemented by installing a mobileapplication on a remote computing device 2608 or by accessing a serviceprovider 2604 via a web browser application 2614 on a remote computingdevice 2608. The operating module 2624 may be configured to process datareceived from at least one remote computing device 2608 and/or thesecurity system 202. The operating module 2624 may also be configured toconvey messages between the remote computing device 2608 and thesecurity system 202. Additionally, the operating module 2624 may providea user of the remote computing device 2608 with the ability to controlsettings or functions of the security system 202.

In some embodiments, the operating module 2624 may have facialrecognition functionality capable of identifying a potential visitor.There are multiple methods of implementing such a system. For example,some social networking sites, such as Facebook.com, have facialrecognition functionality. It is envisioned that the operating module2624 may communicate with such a site to receive a visitor's identity.Alternatively, the service provider 2604 may provide the functionalityitself based on contacts stored in a database 2626. Facial recognitionmay also be used to determine if a human is present. For example, if amotion detector on the security system 202 detects movement, theoperating module 2624 may use facial recognition to determine whether aperson is present before notifying a remote computing device 2608.

The operating module 2624 may be configured to communicate and interactwith the functionality module 2510 of the security system 202, as wellas the remote computing device 2608. This communication and interactioncan be achieved in a variety of ways. It is envisioned that theoperating module 2624 will be able to provide a user of the remotecomputing device 2608 with the ability to perform several types offunctions in conjunction with the security system 202.

Temperature Regulation

Referring now to FIG. 11, the security system 202 can include one ormore heating elements 508 configured to regulate the temperature of thesecurity system 202. For example, security systems 202 can be used invery cold environments, such as in Alaska. The heating element 508 canbe used in various methods to protect temperature sensitive portions ofthe security system 202 from cold weather.

While protecting the security system 202 from cold weather can beimportant in some embodiments, protecting visitors from excessive heatcan also be important in some embodiments. Excessive heat could burnvisitors as they “ring” the doorbell (e.g., press the doorbell button212 shown in FIG. 10).

The security system 202 can include a thermometer 512 to enable thesystem to determine the temperature inside a portion of the securitysystem 202 and/or outside of the security system 202. In someembodiments, a remote computing device, a server, a service provider,and/or the security system 202 is the portion of the system thatdetermines the temperature based on data from the thermometer 512.

In some embodiments, heating elements 508 generate heat by passingelectric current through a conductive path with high resistance. Thisprocess can convert electricity to heat. The conductive path withrelatively high resistance can be straight, coiled, or oriented in acurved path. Heating elements can use wire, ribbon, or strips made from80% nickel and 20% chromium. Some heating elements useiron-chromium-aluminum alloys or copper-nickel alloys. Some heatingelements use a conductive path made from ceramic such as molybdenumdisilicide, molybdenum silicide, or molybdenum disilicide doped withaluminum. Some heating elements use a conductive path made from PCTceramic with a positive thermal coefficient of resistance. Some heatingelements use screen printed metal and/or ceramic tracks deposited onceramic insulated metal plates.

In some embodiments, the heating element 508 produces heat when atemperature inside of the security system 202 falls below a firstthreshold. In some embodiments, the first threshold that causes theheating element 508 to produce heat is less than 50 degrees Fahrenheit(“F”) and/or greater than negative 20 degrees F.; less than 35 degreesF. and/or greater than negative 10 degrees F.; less than 32 degrees F.and/or greater than 0 degrees F.; or less than 10 degrees F. In someembodiments, the heating element 508 stops producing heat when thetemperature inside of the security system 202 rises above a secondthreshold. In several embodiments, the second threshold that causes theheating element 508 to stop producing heat is less than 50 degrees F.and/or greater than negative 20 degrees F.; less than 35 degrees F.and/or greater than negative 10 degrees F.; less than 32 degrees F.and/or greater than 0 degrees F.; or less than 10 degrees F.

In some embodiments, the first threshold is equal to the secondthreshold, although in several embodiments, the first threshold is notequal to the second threshold. In some embodiments, the second thresholdis at least 5 degrees F., at least 10 degrees F., or at least 15 degreesF. greater than the first threshold. In an example embodiment, theheating element 508 starts generating heat when the temperature insideof the security system 202 falls below 35 degrees F. and the heatingelement 508 continues to generate heat until the temperature inside ofthe security system 202 rises above 45 degrees F.

Referring now to FIGS. 10 and 11, some embodiments include stopping thegeneration of heat from the heating element 508 before the doorbellbutton 212 and/or the outer housing 224 reaches a temperature of greaterthan 50 degrees F., 65 degrees F., or 80 degrees F. The IR detector 470can face towards (or at least partially towards) the outer face 214 ofthe outer housing 224 and/or towards (or at least partially towards) thedoorbell button 212. The IR detector 470 can be used to collect dataindicative of an outer temperature (e.g., the temperature of the outerhousing 224, the outer face 214, and/or the doorbell button 212).Although this indicative data may actually be the temperature of aninner surface of the outer housing 224, the outer face 214, and/or thedoorbell button 212, the indicative data can be used to determinewhether to stop generating heat (e.g., via the heating element 508).

Thus, some embodiments including collecting data indicative oftemperature using the IR detector 470 and/or the thermometer 512;analyzing the data to determine whether to start generating heat (e.g.,when a temperature falls below a threshold); generating heat inside aportion of a security system (e.g., doorbell) by running electricalcurrent through a heating element; collecting data indicative oftemperature using the IR detector 470 and/or thermometer 512; analyzingthe data to determine whether to stop generating heat; and/or stoppingthe flow of electrical current to a heating element (e.g., when atemperature rises above a threshold).

Some heating embodiments include power management methods. In someembodiments, the first and second thresholds are lower when the securitysystem 202 is relying on internal power (e.g., from a battery 462) thanwhen the security system 202 is relying on external power (e.g., from abuilding's electrical system). In some embodiments, the first thresholdand/or the second threshold are at least 10 degrees F. lower, at least20 degrees F. lower, or at least 30 degrees F. lower when the securitysystem 202 is relying on internal power than when the security system202 is relying on external power. In some embodiments, the securitysystem 202 is configured to provide heat via the heating element 508when the security system 202 has access to external power and when atemperature (inside or outside of the security system 202) falls below athreshold. In some embodiments, the security system 202 is configured tonot provide heat via the heating element 508 when the security systemdoes not have access to external power (e.g., to conserve batterypower).

Silent Modes

Various embodiments include many different means of alerting users andvisitors. In some embodiments, certain means of alerting users and/orvisitors are silenced based on settings selected by a user (e.g., anadministrator, the user of the primary computing device). Referring nowto FIGS. 2 and 3, software with a user interface 240 can be used toallow a user to silence one or more of the following items: a chime 302(e.g., a speaker, a sound output device) located inside of a building300, a remote computing device 204, and a security system 202 (e.g., thespeaker 488 shown in FIG. 11). The user interface 240 can include abutton to silence the doorbell sound and to place the security system202 in Silent Mode.

In some embodiments of Silent Mode, pressing the doorbell button 212will not send a signal (e.g., from the security system 202) to a chimelocated inside the building. As a result, the chime will not emit asound. In some embodiments, the chime is a speaker (such as a speakermade by Bose Corporation) located inside of the building, which can be ahome, office, warehouse, or other structure. For example, a visitorpressing the doorbell button 212 could cause the computing device 204 tonotify the user, but would not cause a sound (e.g., a chime) to beemitted inside and/or near the building. In several embodiments, thesecurity system 202 is configured to emit a sound even when the chime(e.g., speaker) located inside of the building is silenced. Thisconfiguration can notify the visitor that the security system 202 hasdetected the communication request of the visitor without disturbingpeople inside of the building.

In several embodiments, the security system 202 is silenced such thatpressing the doorbell button 212 will not cause the security system 202to emit a sound from the security system 202 (e.g., the speaker 488 inFIG. 11 will not emit a sound). When the security system 202 issilenced, the chime located inside of the building can optionally notifypeople inside of the building and/or the remote computing device 204 canoptionally notify a user. In some embodiments, both the security system202 and the chime inside of the building are silenced, but the computingdevice is not silenced. In some embodiments, the entire system issilenced. For example, the security system 202, the chime inside of thebuilding, and the computing device can be silenced.

In some embodiments, the remote computing devices 204 are silenced suchthat they do not emit a sound to notify users of the remote computingdevices 204. In several embodiments, the remote computing devices 204provide no real-time audio alert, no real-time alert, or no real-timenotification to users but store information (e.g., pictures of thevisitor, videos of the visitor, sound from the visitors) for laterreview by the users of the remote computing devices 204. As used herein,“real-time alert” refers to an alert provided to a user while thevisitor is located by the security system 202.

A user interface can enable users to select the types of alerts providedby the computing devices 204. Example types of alerts include sounds,images, and haptic notifications (e.g., vibrations).

Emergency Responses

In some embodiments, the operating module 2624 and/or the remotecomputing device 2608 may be configured to provide emergency responses,behaviors, and functions. The user of a remote computing device 2608 maybe provided with the ability to dial an emergency number while still incommunication with the security system 202 and/or without exiting theapplication software used to control the security system 202. Forexample, a user of the remote computing device 2608 may use the securitysystem 202 to identify a threatening individual at the entryway to hisresidence. The user may then be provided with the ability to dial 911without disconnecting communication with the security system 202, whichcan allow the user to continue to observe the threatening individual(e.g., a potentially harmful or destructive visitor).

FIG. 37 illustrates an emergency options selection button 3708. The usercan change the phone number or other notification means that thecommunication system calls in the event of an emergency. For example,some users might want to call the police in the event of an emergencywhile other users might want to call a neighbor. FIG. 30 illustrates abutton 3000 that allows a user to select which phone number is called inan emergency. FIG. 28 illustrates an emergency button 2816 that canallow for quick notification of emergency personnel or another person.Pressing the emergency button 2816 can cause the computing device 2608to call the selected emergency number and/or send an emergencynotification. The user can press the emergency button 2816 withoutexiting the communication system's software application running on thecomputing device 2608. As a result, users can more easily call emergencypersonnel. In addition, users can continue to watch the visitor via theuser interface while they wait for emergency personnel to arrive.

Several embodiments reduce the likelihood of inadvertently selecting theemergency button 2816. In one embodiment, the emergency button 2816 mustbe continuously selected (e.g., pressed or contacted) for more than athreshold amount of time (e.g., at least 2 seconds, at least 3 seconds,at least 5 seconds) before the system will trigger an emergency response(e.g., notify emergency personnel or another emergency contact person).In another embodiment, the user must select the emergency button 2816and then confirm the emergency selection and/or the presence of anemergency (e.g., by pressing a confirmation button) before the systemwill trigger an emergency response (e.g., notify emergency personnel oranother emergency contact person). In some embodiments, the system willnotify the user that the system will call emergency response personnel(e.g., will call 911) unless the user cancels the request (e.g., withina particular timeframe such as within 5 seconds or within 10 seconds).The emergency response can be that the system calls 911, provideslocation information to emergency response personnel, and/or providescircumstantial information to emergency response personnel (e.g., thenature of the emergency, the identity of the user).

In several embodiments, when a user indicates there is an emergency(e.g., by pressing the emergency button 2816), the security system takesa picture or a video (e.g., of the visitor). The picture or video takenin response to the user indicating there is an emergency can be storedon a server 206, on a computing device 204 (e.g., the computing devicethat the user utilizes to indicate there is an emergency or anothercomputing device), and/or on the security system 202 (shown in FIG. 1).Referring now to FIG. 26, the picture or video taken in response to theuser indicating there is an emergency can be stored by a network 2606,by a service provider 2604, and/or by one or more remote computingdevices 2608.

The user can indicate there is an emergency by any of the meansdescribed herein including by pressing a button and/or by making a noiseindicative of an emergency (e.g., screaming). Referring now to FIG. 1,the security system 202 can automatically take a picture and/or a video(e.g., of the visitor) when there is a triggering event, such as anemergency, breaking glass sounds, the presence of an unwanted visitor,an unwanted visitor entering the building, and/or any other event thatthe user configures to trigger automatically taking a picture and/orvideo. In some embodiments, the user can configure the security system202 to automatically take a picture and/or video at time increments, atparticular times, when a visitor is present, when a particular type(e.g., classification) of visitor is present, and/or when there is anemergency.

Some embodiments include detecting the presence of a visitor; sending animage or video of the visitor to a remote computing device; displayingthe image or video of the visitor on a display of the remote computingdevice; detecting an emergency indicator (e.g., detecting a userindicating there is an emergency via the remote computing device);taking a picture (or recording a video) of the visitor in response tothe emergency indicator; saving the picture or video of the visitor thatwas taken in response to the emergency indicator; and/or sending thepicture or video taken in response to the emergency indicator to a thirdparty (e.g., the police, a central monitoring company, monitoringpersonnel, security personnel, a remote server, a person locatedremotely from the user and the visitor).

In some embodiments, the system enables the user to allow the visitor tohear the emergency response personnel (e.g., the 911 operator) to scarethe visitor away (e.g., the call to the emergency personnel is emittedthrough a speaker of the security system). As soon as the user pressesthe emergency button 2816, the security system 202 can emit a sound,which can be an alert sound such as a siren sound.

In several embodiments, the user can hear the visitor and can hear acontact person of the emergency response personnel (e.g., the 911operator). In some embodiments, the user can hear a contact person ofthe emergency response personnel and can see the visitor, but thevisitor cannot hear the contact person of the emergency responsepersonnel.

In some embodiments, the software application of the communicationsystem provides information regarding the emergency to the emergencypersonnel. For example, the communication system can communicate atleast some of the following information to the emergency personnel: theaddress of the security system, the name of the user, informationregarding the unwanted visitor, a video of the visitor, a picture of thevisitor, audio of the visitor, and audio of the user.

In some embodiments, the operating module 2624 and/or the remotecomputing device 2608 may be configured to contact emergency personnelif the remote computing device 2608 is shaken, if several keys orbuttons are pressed, or if the remote computing device 2608 detectsnoises indicative of potential panic or harm (e.g., screams). In severalembodiments, the communication system will enter a Potential EmergencyMode if the communication system determines there is a potentialemergency. The communication system can determine there is a potentialemergency by the security system 202 and/or the computing device 2608detecting screams, loud noises, breaking glass, and/or tampering withthe security system 202 (e.g., removed from building). In someembodiments, the computing device 2608 will call emergency responsepersonnel (e.g., the police) if the user does not intervene within apredetermined time period. The predetermined time period can be at least3 seconds and/or less than 60 seconds or at least 10 seconds and/or lessthan 120 seconds. The user can intervene by instructing the computingdevice 2608 not to call emergency response personnel (e.g., by selectinga button on a user interface to preclude the call).

In some embodiments, the operating module 2624 and/or the securitysystem 202 may be configured to contact emergency personnelautomatically. For example, a user may have a restraining order or ano-contact order against a particular visitor. The operating module 2624may be configured to identify a potential visitor as the particularindividual (such as through facial recognition or fingerprint matching)and send an alert to law enforcement. In some embodiments, the operatingmodule 2624 may send a notification to at least one remote computingdevice 2608 with the option to notify law enforcement.

In some embodiments, the operating module 2624 and/or the securitysystem 202 may be configured to contact law enforcement if someone otherthan a resident attempts to use the entryway. For example, the securitysystem 202 may be configured to detect that an entry attempt has beenmade, such as a deadbolt has been released and/or that a door has beenopened. In this embodiment, the operating module 2624 may be configuredto send a notification to law enforcement and/or a remote computingdevice 2608 if the individual is not identified as being granted access.In some embodiments, a user may be able to indicate to the operatingmodule 2624 that he is away from the business or residence. In thisembodiment, the operating module 2624 may be configured to contact lawenforcement if the security system 202 detects that an entry attempt hasbeen made, such as a deadbolt has been released or that a door has beenopened.

In some embodiments, the operating module 2624 and/or the securitysystem 202 may be configured to check potential visitors against acriminal database. The operating module 2624 may send a notification toa remote computing device 2608 and/or emergency personnel. The user ofthe remote computing device 2608 may additionally be given informationrelated to the criminal history of the potential visitor. For example,the operating module 2624 may identify a potential visitor as aregistered sex offender. In some embodiments, the operating module 2624may be configured to contact law enforcement if the potential visitorhas a criminal background. For example, a user may configure theoperating module 2624 to contact law enforcement when the home isunoccupied and a potential visitor has a history of burglary.

In several embodiments, the communication system 200 uses facialrecognition to identify a visitor. The communication system 200 can thenfind information regarding the visitor. The communication system 200 canthen send information regarding the visitor to the computing device 204(e.g., while the computing device 204 is displaying a picture or videoof the visitor). The information regarding the visitor can include name,age, occupation, number of previous visits to the security system,criminal background, social media profile (e.g., Facebook profile,LinkedIn profile), and/or purpose of the visit. In some embodiments, thecomputing device 204 displays a category or classification that appliesto the visitor. Example categories and classifications include friend,family, acquaintance, sales person, worker, service provider, andunknown.

Custom Messages

In some embodiments, the operating module 2624 may be configured toprovide personal messaging. The security system 202 may be provided withpre-recorded messages that can be chosen by a user. In some embodiments,the user may be able to record a message. Where the user is able torecord a message, the user may be able to record the message on thesecurity system 202 directly, or the user may be able to use a remotecomputing device 2608 to record a message. Messages recorded on thesecurity system 202 and/or the remote computing device 2608 may bestored on the security system 202, on the remote computing device 2608,and/or at the service provider 2604.

In some embodiments, the security system 202 and/or the operating module2624 may be configured to play a specific message for a specificvisiting individual, and/or it may be configured to play a specificmessage when a potential visitor is identified as a specific person oris included in a list of specific people.

In some embodiments, the security system 202 and/or the operating module2624 may be configured to play a specific message if the potentialvisitor is not included in a list. For example, where a potentialvisitor is not included in a list of the resident's contacts, thesecurity system 202 and/or operating module 2624 may be configured toindicate that the resident does not accept solicitors and/or request thevisitor to provide identifying information or describe the purpose ofthe visit.

In some embodiments, the security system 202 and/or the operating module2624 may be configured to play a specific message if the potentialvisitor has a criminal background. For example, a user may configure thesecurity system 202 and/or the operating module 2624 to play a specificmessage where a potential visitor is a registered sex offender.

In some embodiments, the security system 202 may be configured toreceive messages. In these embodiments, a visitor may be able to leave amessage for one or more occupants. For example, where a user has chosennot to answer the door (or where the security system is set to blockcommunication requests) the visitor may be prompted to leave a message,which may be delivered to at least one remote computing device 2608.

Security System Control

In some embodiments, the operating module 2624 may be configured toprovide system control functionality. In these embodiments, the user maybe capable of controlling settings, features, and/or functionality ofthe security system 202 through a remote computing device 2608. Theoperating module 2624 may be configured to provide a user with theability to activate or deactivate any or all of the modes of operationmentioned herein. The operating module 2624 can be configured to enablethe user to see available security systems and connected computingdevices.

In some embodiments, the operating module 2624 may be configured toprovide security system control functionality through a secure login. Insome embodiments, the remote computing device 2608 may be specific toone or more security systems 202. In some embodiments, a user may begiven the ability to change settings for all associated securitysystem(s) 202. For example, where a user has one security system 202 forhis home and one security system 202 for his office building, he may beprovided with the ability to control both security systems 202 from asingle device. Where a user login is needed, the user may be providedwith control over multiple security systems 202 within the same loginsession.

In some embodiments, a user may be able to use a mobile device to pan acamera located on the security system 202 in order to change the FOV.The user may be able to select (or silence) the doorbell speaker sound(the sound heard outside by the visitor). The user may be able to select(or silence) the inside chime (the sound heard inside the building). Theuser may be able to change notification settings, indicate which remotecomputing devices 2608 will receive notifications, or turn offnotifications entirely.

In some embodiments, a user of a remote computing device 2608 may beable to turn on/off the LED light(s) on the security system 202. Forexample, a user interface 3700 can include a button 3704 (shown in FIG.37) configured to turn at least one or all of the visible lights of thesecurity system 202 off. For example, the button 3704 can turn off thepower indicator light 220 and the diagnostic light 216 (shown in FIG.1). When the security system 202 has access to power, but does not emitany visible light, the security system 202 is in Dark Mode. Dark Modecan include emitting infrared light to enable a camera to see at night.

In some embodiments, the operating module 2624 may be configured toprovide a user with the ability to change settings of the securitysystem 202 via a remote computing device. The operating module 2624 maybe configured to provide a user with the ability to set securitysettings as previously discussed. For example, the user may be able toindicate that he is “away” from his home and that all attempts to enterhis home should result in a notification to law enforcement. Theoperating module 2624 may be configured to provide a user with theability to indicate which messages should be played in accordance withthe personal messaging functionality previously discussed.

FIG. 27 depicts a flow diagram embodiment 2700 showing methods ofoperating a doorbell communication system. Portions of FIG. 27illustrate a process for providing a user of a remote computing devicewith functionality related to a visitor. Some or all of the process 2700(or any other processes described herein, or variations and/orcombinations thereof) may be performed under the control of one or morecomputer systems configured with executable instructions and may beimplemented as code (e.g., executable instructions, one or more computerprograms or one or more applications) executing collectively on one ormore processors, hardware circuitry, a computer system, one or morecomputer systems, a network, hardware, or combinations thereof. The codemay be stored on a computer-readable storage medium, for example, in theform of a computer program comprising a plurality of instructionsexecutable by one or more processors. The computer-readable storagemedium may be non-transitory. The one or more service provider computers2604 (e.g., utilizing at least the operating module 2624) shown in FIG.26 and/or the security system 202 from FIG. 25 may perform the process2700 of FIG. 27.

In process 2700, the security system 202 may detect a triggering eventat 2702. A triggering event is any event that indicates that a potentialvisitor may be present. Some non-limiting examples of a triggering eventmay be the ringing of a doorbell on the security system 202, activationof a motion sensor, or detection of a sound. In order to preventexcessive notifications, it may be necessary to determine whether aperson is actually present at 2704. This may be done by comparing thetriggering event against a threshold (such as only identifying that avisitor is present when a motion is within a given distance or a soundis over a given decibel level) or by using a specified technique. Forexample, the service provider 2604 may determine through facialrecognition and/or computer vision that a person is present. If novisitor is detected, then the security system 202 may continue tomonitor for a triggering event at 2706.

If a visitor is detected at 2704, then the service provider 2604 may, at2706, send a notification to one or more remote computing devices 2608,or mobile devices, based on current settings. At 2708, the process 2700will determine whether a user of a particular remote computing device2608 has responded to the notification. If there has been no response,then the process, at 2710, may send a notification to a second device.If a user has responded, then communication may be allowed between theuser of the remote computing device 2608 and the potential visitor at2712. The user may be granted some or all of the functional featurespreviously discussed in this disclosure during the communication at 2714(or at any other time). Some of this functionality is further describedin the following figures.

FIG. 28 depicts an illustrative embodiment of several features that canbe implemented in a mobile application. This embodiment is illustrativeof some features implemented on a remote computing device. In thisembodiment, the security system 202 is identified at 2802 so the userknows which security system 202 the user is utilizing. This may bedesired where more than one security system 202 is associated with aparticular user or remote computing device 2608. In this embodiment, theFOV of the security system 202 is shown at 2804. In some embodiments, itmay be possible to pan, or zoom with the camera in order to change theFOV.

A record button 2806 provides a user with the capability to take videorecordings of the FOV. A picture button 2808 provides a user with thecapability to take still pictures of the FOV. The videos and picturesmay be stored on the security system 202, the remote computing device2608, and/or the service provider 2604. Where a user wishes to watch apreviously recorded video, the user may be given the ability to selectthe playback speed.

A speed button 2810 enables the user to select video settings related tothe displayed video 2804 or image. For example, a user experiencing aslow data transmission rate may choose a lower speed, lower resolution,or still images. In some embodiments, the user can select to view stillimages or videos images of the FOV. In some embodiments, the user canadjust the resolution of the displayed video or images.

A mute button 2812 can allow a user to prevent a visitor from hearingthe user. In some embodiments, the mute button 2812 prevents the userfrom hearing the visitor (e.g., if the sound recorded by the securitysystem is bothering the user). A sound button 2814 allows the user toadjust the speaker volume to help the visitor hear better (e.g., adjustthe sound level of the speaker 488 shown in FIG. 11).

An emergency button 2816 can allow for a quick notification of emergencypersonnel without the need to disconnect communication between thesecurity system 202 and the remote computing device 2608. The “end call”button 2818 allows for disconnection of communication between thesecurity system 202 and the remote computing device 2608.

Several embodiments include “on-demand” service. For example, a user caninitiate communicate via a doorbell and/or can initiate live video fromthe doorbell by pressing a button (e.g., on demand 2820) on a userinterface. Pressing the on-demand button again can terminate thecommunication and/or the live video.

FIG. 29 depicts an illustrative embodiment of a user being provided withthe ability to record a message via a remote computing device. In someembodiments, a user is able to save the message to the security system202 and/or the service provider 2604. The user may then be able toselect if and under what conditions each message is played. In someembodiments, the user can press the custom message button 2900 to recorda message. The user can instruct the system to play the message inparticular circumstances. In some embodiments, the recorded message isplayed each time a visitor presses the doorbell button and/or each timethe security system detects a visitor. The user interface 2904 caninclude an erase button 2908 to erase the previously recorded message, asave button 2912 to save the previously recorded message, and/or are-record button 2916 to record a new message. In several embodiments, auser can record a first message for use in a first set of circumstancesand can record a second message for use in a second set ofcircumstances. For example, the first message can be used when the userwants the visitor to record a message to the user and the second messagecan be used to tell the visitor to go to a location (e.g., to thebackyard, to leave the property).

FIG. 31 depicts an illustrative embodiment of a menu for selectingnotification settings. As depicted in this embodiment, the operatingmodule 2624 may be configured to allow a user to control whatnotification level is provided. In this embodiment, the settings may besaved at the security system 202, at the remote computing device 2608,and/or at the service provider 2604. A first button 3100 allows the userto select that pressing the doorbell button 212 (shown in FIG. 5)results in the communication system calling the computing device andsending an image of the FOV to the computing device. In otherembodiments, the first button 3100 allows the user to select thatpressing the doorbell button 212 (shown in FIG. 5) results in thecommunication system calling the computing device and sending a video ofthe FOV to the computing device. A second button 3104 allows the user toconfigure the communication system such that when the security systemdetects motion (e.g., of a visitor) the security system will call theuser and send an image of the FOV. A third button 3108 allows the userto configure the communication system such that when the security systemdetects motion (e.g., of a visitor) the security system will alert theuser and send an image of the FOV. The alert is different from the callbecause the alert does not include a live feed upon motion detection.

In several embodiments, detection of a visitor (e.g., by the doorbell)results in a static image of the visitor being sent to the remotecomputing device of at least one user. Once the user selects to acceptthe communication request from the doorbell (e.g., from the visitor),the system can show a video (rather than a static image) of the visitoron the remote computing device. If the communication request is sent tomultiple users' computing devices, each computing device can display thestatic image of the visitor. Once one of the users “answers” thecommunication request (e.g., selects to communicate with the visitor),the computing device of the user who “answers” the communication requestcan display a video of the visitor. In some embodiments, detection of avisitor results in a video (rather than a static image) of the visitorbeing sent to at least one remote computing device to enable users to“answer” the communication request.

FIG. 32 depicts an illustrative embodiment of a menu for selectingvolume settings for the security system 202. As depicted in thisembodiment, the operating module 2624 may be configured to allow a userto control the volume of a speaker that will be heard from the securitysystem. For example, a speaker volume selection interface can have threesettings: low 3200, medium 3204, and high 3208. The settings can controlthe volume of the speaker 488 shown in FIG. 11. In this example, thesettings may be saved at the security system 202, at the remotecomputing device 2608, and/or at the service provider 2604.

FIG. 33 depicts an illustrative embodiment of a menu for selecting soundsettings for the security system 202. As depicted in this embodiment,the operating module 2624 may be configured to allow a user to controlwhat sounds are played by the security system 202 when a user presses adoorbell button and/or triggers a sensor of the security system. Theuser may be able to select (or silence) the sound heard outside by thevisitor.

In some embodiments, a user interface is configured to enable a user toselect what sound a visitor hears from the security system (e.g., whenthe visitor “rings” the doorbell). Selecting a first button 3304 canconfigure the security system to emit a traditional chime sound when avisitor presses a doorbell button. Selecting a second button 3308 canconfigure the security system to emit a dial tone sound or ringing soundwhen a visitor presses a doorbell button. Selecting a third button 3312can configure the security system to emit a custom sound when a visitorpresses a doorbell button (e.g., a sound recorded as described in thecontext of FIG. 29). Selecting a fourth button 3316 can configure thesecurity system to not emit sound from a speaker when a visitor pressesa doorbell button. Selecting a fifth button 3320 can enable the user torecord a new custom sound (as described previously), select anothersound from a list, or download a sound. The new custom sound can thenbecome the custom sound emitted due to selecting the third button 3212.In this example, the settings may be saved at the security system 202,at the remote computing device 2608, and/or at the service provider2604.

In some embodiments, the user can use the remote computing device toselect a sound emitted by the chime located inside of the building orsilence the chime located inside of the building. Several embodimentsinclude many different sounds that the inside chime can emit whensomeone rings the doorbell.

FIG. 34 depicts a user interface with a menu for selecting alertsettings (e.g., Ring Modes) for the security system 202. As depicted inthis example, the operating module 2624 may be configured to allow auser to control whether the chime is active and whether alerts are sentto at least one remote device. Selecting a first button 3400 canconfigure the communication system to send an alert to the computingdevice and emit a sound from a chime (e.g., a speaker) located inside ofthe building to which the security system is attached. Selecting asecond button 3404 can configure the communication system to send analert to the computing device, but not emit a sound from a chime (e.g.,a speaker) located inside of the building to which the security systemis attached. Selecting a third button 3408 can configure thecommunication system to emit a sound from a chime (e.g., a speaker)located inside of the building but not send an alert to the computingdevice. Selecting a fourth button 3412 can configure the communicationsystem to not send an alert to the computing device and not emit a soundfrom a chime (e.g., a speaker) located inside of the building to whichthe security system is attached. In this example, the settings may besaved at the security system 202, at the remote computing device 2608,and/or at the service provider 2604.

FIG. 35 depicts an illustrative embodiment of a menu for selecting whichusers receive notifications for the security system 202. As depicted inthis embodiment, the operating module 2624 may be configured to allow auser to control what users are provided with notifications and/or inwhat order notifications are provided. In the illustrated example, afirst user 3500 is the administrator and will receive notifications fromthe security system. The second user 3504 can have subordinate rightsgranted by the administrator to receive notifications from the securitysystem. The third user 3508 will not receive notifications from thesecurity system because the administrator has not selected the thirduser 3508 (as indicated by the lack of a check mark). In this example,the settings may be saved at the security system 202, at the remotecomputing device 2608, and/or at the service provider 2604.

FIG. 36 depicts an embodiment of a menu for selecting between multiplesecurity systems 202. As depicted in this embodiment, the operatingmodule 2624 may be configured to allow a user to select from multiplesecurity systems 202 associated with the same remote computing device2608. In some embodiments, a user may be given the ability to changesettings for all associated security systems 202. For example, where auser has one security system 202 for his home and one security system202 for his office building, the user may be provided with the abilityto control both security systems 202 from a single computing device.Where a user login is needed, the user may be provided with control overmultiple security systems 202 within the same login session. In thisexample, the settings may be saved at the security system 202, at theremote computing device 2608, and/or at the service provider 2604.

Each security system 3600, 3604, 3608 can include a status indicator3612, 3616, 3620 to indicate the strength of the wireless connectionthat each security system 3600, 3604, 3608 is using to communicate withthe computing device. The third status indicator 3620 indicates that thethird security system 3608 is not connected to a network and cannotcommunicate with the computing device. The third status indicator 3620can have a different visual appearance than the first status indicator3612 and the second status indicator 3616 to indicate that the thirdsecurity system 3608 is not connected to a wireless network and cannotcommunicate with the computing device. The different visual appearancecan include a different color, a different icon, and/or a flashing icon.Selecting a security system button in FIG. 36 can cause the computingdevice to display a user interface regarding the selected securitysystem (e.g., the user interface shown in FIG. 37). In some embodiments,security systems (or communication systems) continuously orintermittently monitor communication status (e.g., to evaluate if thesecurity system is ready to send a communication request to a userand/or enable remote communication between a visitor and a user).

FIG. 37 depicts an embodiment for viewing and selecting settings for thesecurity system 202. The settings interface illustrated in FIG. 37summarizes several of the settings configured on other user interfacesillustrated in other figures. As depicted in this embodiment, theoperating module 2624 may be configured to allow a user to selectseveral settings for the security system 202. In this example, thesettings may be saved at the security system 202, at the remotecomputing device 2608, and/or at the service provider 2604.

A status indicator 3712 can indicate whether the security system isconnected to a wireless network. A sensor mode indicator 3716 canindicate how the security system will respond to the triggering ofvarious sensors (see FIG. 31). A call mode indicator 3720 can indicatehow users will be notified regarding communication requests (see FIG.34). A user indicator 3724 can indicate which users will be notified viacomputing devices (see FIG. 35). A wireless network indicator 3728 canindicate the wireless network to which the security device is connected.A sound indicator 3732 can indicate the sound that will be emitted bythe security system (see FIG. 33). A volume indicator 3736 can indicatethe volume level at which sound will be emitted by the security system(see FIG. 32). Selecting the feed button 3740 can start a video streamof the FOV, display a picture of the FOV, initiate an audio stream fromthe security system to the computing device, and/or initiate an audiostream from the computing device to the security system.

Image Delivery Methods and Systems

Methods to address network congestion (e.g., in the context of FIG. 18)and methods of selecting video settings (e.g., in the context of FIG.28) are taught herein. Optimizing the delivery of videos to thecomputing device can be important because increasing video resolutioncan cause the amount of data that must be delivered to the computingdevice to grow exponentially. In addition, some computing devices (e.g.,smartphones) have such small screens that high-resolution video is notnecessary in order to provide a satisfying viewing experience to a user.Sending high-resolution videos from security systems to computingdevices (e.g., as shown in FIG. 1) can lead to inconsistent,intermittent, or choppy video delivery.

As described previously, some embodiments include delivering stillimages rather than videos. Some embodiments include delivering stillimages at less than 50 frames per second (“FPS”) and/or greater than 25FPS; less than 25 FPS and/or greater than 5 FPS; less than 10 FPS and/orgreater than 0.2 FPS; or less than 5 FPS and/or greater than 0.1 FPS.

Some embodiments include delivering a single still image of the visitortaken when the visitor presses the doorbell button. Some embodimentsinclude delivering more than one still image, but include delivering animage of the visitor pressing the doorbell button to help the userdetermine if the user wants to answer the communication request. Toavoid the visitor's hand being in the way, and thus blocking a clearview of the visitor's face, some embodiments include delivering an imageof the visitor taken at least 1 second and/or less than 25 seconds afterthe visitor presses the doorbell button; at least 2 seconds and/or lessthan 10 seconds after the visitor presses the doorbell button; or atleast 1 second and/or less than 5 seconds after the visitor presses thedoorbell button.

Some embodiments include delivering a video taken of the visitor to theuser. In several embodiments, the video can have a resolution of lessthan or equal to 640 pixels wide by less than or equal to 480 pixelshigh. In several embodiments, the video can have a resolution of lessthan or equal to 320 pixels wide by less than or equal to 240 pixelshigh. In some embodiments, the delivered video is at least 30 pixels inwidth and/or less than 400 pixels in width; at least 80 pixels in widthand/or less than 250 pixels in width; or at least 100 pixels in widthand/or less than 200 pixels in width. Some embodiments include veryhigh-resolution video (e.g., 2560×2048).

In several embodiments, video of a user is delivered to a screen 970 ofa security system 950 (shown in FIG. 24). The video of the user can betaken via a camera of a remote computing device.

Remote Camera Adjustments

Referring now to FIGS. 8-10, the camera assembly 208 has a field of view(“FOV”). Sometimes the FOV is inadequate because it does not include adesired area (e.g., outside of a building). For example, a user mightwant to adjust the FOV to better see a particularly tall or shortvisitor. A user might want to move the FOV to see other activities nearthe security system 202, such as the progress of a lawn care crew. Ifthe user is not at home or if the user wants to adjust the FOV withoutgoing outside (e.g., where a visitor might be present), the user mightwant to adjust the FOV remotely.

FIG. 38 illustrates a user interface 3800 configured to enable a user toadjust the FOV of an image 252 displayed on a computing device 204. Theuser interface 3800 can include zoom buttons 3804, 3808. One zoom button3804 can zoom in (i.e., decrease the FOV and make items in the FOVappear larger). Another zoom button 3808 can zoom out (i.e., increasethe FOV and make items in the FOV appear smaller).

In some embodiments, the user interface illustrated in FIG. 38 does notphysically move a camera assembly of a security system, but insteadchanges the portion of the camera's FOV that is displayed in the image252. Referring now to FIGS. 19, 20 and 38, moving the sphere 3812 orotherwise selecting a direction (e.g., the dashed arrows in FIG. 38) cancause the displayed portion 848 a, 848 b to change while the camera'sFOV 840 remains constant. In several embodiments, the user interfaceillustrated in FIG. 38 is used to physically move a camera assembly of asecurity system to enable a user to see different areas.

In some embodiments, user interfaces are configured to enable use withtouch screens, such as the screen of a smartphone or tablet. Userinterfaces can also be used with non-touch screens (e.g., via mouseand/or keyboard input).

Referring now to FIG. 38, the user interface 3800 can also include ameans to adjust the camera's viewing angle (and thus, adjust the FOV).The user interface 3800 can include arrows (shown in dashed lines) thatact as buttons to adjust the viewing angle. In some embodiments, theuser interface 3800 has a virtual sphere (or circle) 3812. The userinterface 3800 can be a touch screen that enables the user to manipulatethe sphere 3812 in any direction (including the directions shown by thedashed arrows). Moving the sphere 3812 can cause the camera assembly 208(shown in FIGS. 8 and 9) to move to adjust the viewing angle. In severalembodiments, the camera assembly 208 moves less than 70% as far as themovement indicated by the user via the sphere 3812. For example, movingthe sphere 3812 50 degrees might only cause the camera assembly 208 tomove 25 degrees. In several embodiments, the camera assembly 208 movesat least 1% and/or less than 70% as far as the movement indicated by theuser via the sphere 3812 and/or arrows; at least 5% and/or less than 50%as far as the movement indicated by the user via the sphere 3812 and/orarrows; or at least 10% and/or less than 30% as far as the movementindicated by the user via the sphere 3812 and/or arrows. This approachcan enable the user to precisely adjust the viewing angle.

FIG. 39 illustrates a top view of a camera orientation embodiment.Referring now to FIGS. 38 and 39, at least one motor assembly 3900 a,3900 b can physically move the camera assembly 208 in response to usercommands entered via the user interface 3800. The motor assemblies 3900a, 3900 b can be coupled to the PCB 450. (Many items are not shown onthe PCB 450 in the interest of clarifying particular items.) The motorassemblies 3900 a, 3900 b can include rollers 3904 rollably coupled tothe camera assembly 208 such that rotation of the rollers 3904 can causethe camera assembly to move. In some embodiments, the roller assemblies3904 contact (e.g., gently contact) an outer surface of the cameraassembly 208, which can be a camera assembly with a spherical portion. Aroller assembly 3904 can include a rubber roller secured by a pin 3908around which the rubber roller rotates. The pins 3908 can be metal rods.Each motor assembly 3900 a, 3900 b can include a motor configured torotate the rollers and powered by electricity that flows through the PCB450.

The camera assembly 208 can be otherwise contained within a housing(e.g., the cover 404 shown in FIG. 9) to prevent the camera assemblyfrom falling out or being inappropriately displaced. In someembodiments, the motor assemblies 3900 a, 3900 b are located on the sideof the PCB 450 that is closest to the outer face 214 and doorbell button212 (shown in FIG. 10).

In some embodiments, two motor assemblies 3900 a, 3900 b are oriented atan angle 3912 relative to each other. The angle can be approximately 90degrees; at least 45 degrees and/or less than 135 degrees; at least 70degrees and/or less than 110 degrees; or at least 80 degrees and/or lessthan 100 degrees. A first motor assembly 3900 a can be configured torotate the camera assembly 208 in a first direction and a second motorassembly can be configured to rotate the camera assembly 208 in a seconddirection. The second direction can be oriented approximately 90 degreesrelative to the first direction; at least 45 degrees and/or less than135 degrees relative to the first direction; at least 70 degrees and/orless than 110 degrees relative to the first direction; or at least 80degrees and/or less than 100 degrees relative to the first direction.

FIG. 40 illustrates a side view of the camera orientation embodimentfrom FIG. 39. Referring now to FIGS. 8, 9, and 40, the camera assembly208 can include a protrusion 4000, which can be located around a cameralens 434 or on the opposite side from the camera lens 434. Theprotrusion 4000 can be configured to contact a perimeter 402 of theouter housing 224 and/or the cover 404. As a result, the protrusion 4000can limit the travel of the camera assembly 208 because the protrusion4000 is configured to collide with the perimeter 402 to limit themovement of the camera assembly 208. The protrusion 4000 can extend awayfrom the rest of the camera assembly 208. In some embodiments, the motorassemblies 3900 a, 3900 b are stepper motors and the software isconfigured to limit the travel of the motor assemblies 3900 a, 3900 b.Some user interfaces include a warning (e.g., sound, image, icon) when auser reaches a movement limit such that the camera assembly 208 cannotmove farther.

FIGS. 41 and 42 illustrate perspective views of the camera orientationembodiment from FIG. 39. The camera assembly 208 is hidden in FIG. 42.The PCB 450 can include a hole 4200 configured to limit the travel ofthe camera assembly 208. The camera assembly 208 can be at leastpartially located in the hole 4200 of the PCB 450.

Identity Scanner

Any of the embodiments described herein can also include an identityscanner, which can be configured to identify the visitor. In someembodiments, the identify scanner can classify the visitor.Classifications can include unwanted visitor, wanted visitor, familymember, owner, employee, and authorized service provider. Some methodsinclude using the identity scanner to determine if the visitor isauthorized to enter the building or if the visitor is unauthorized toenter the building. If the visitor is authorized to enter the building,then the security system (e.g., 202 in FIG. 1) can enable the authorizedvisitor to enter the building. The user can pre-authorize certainindividuals or classifications of visitors such that the security systemwill allow the preauthorized individuals and classifications of visitorsto unlock a door, gate, or entrance (and thereby enter the building)without additional interaction with the user. For example, if a userpre-authorizes a service provider, the security system will allow theservice provider to enter the building (e.g., unlock a door) withoutreal-time input from the user. This approach enables an authorized party(e.g., an authorized visitor) to gain access to the building withoutdisturbing the user.

FIG. 43 illustrates a security system 202 a with multiple identityscanners (e.g., 208 a, 4004). The camera assembly 208 a is configured tovisually identify visitors through machine vision and/or imagerecognition. The security system 202 a can include a finger scanner4004, which can be a fingerprint reader that enables the system tocompare the fingerprint of the visitor to a database of fingerprints toidentify and/or classify the visitor. The database of fingerprints canbe created by the user and/or can include a database of fingerprintsfrom a law enforcement agency (e.g., a database of criminals).

The finger scanner 4004 can use any suitable algorithm including minutiaand pattern algorithms. The finger scanner 4004 can analyze fingerprintpatterns including arch patterns, loop patterns, and whorl patterns. Thefinger scanner 4004 can include any suitable fingerprint sensorincluding optical, ultrasonic, passive capacitance, and activecapacitance sensors. The finger scanner 4004 can be integrated into theouter housing 224 of the security system 202 a, which can be mountedwithin 7 feet of a door or entryway of a building, such as a house. Insome embodiments, the security system 202 a can be configured to bemounted in an entryway. Some methods include mounting a security systemin an entryway of a building.

The finger scanner 4004 can be integrated into the doorbell button 212a. Pressing the doorbell button 212 a can enable the finger scanner 4004to analyze the fingerprint of the visitor. The doorbell button 212 a canbe used to “ring” the doorbell and house at least a portion of thefinger scanner 4004.

The security system 202 a and/or a remote computer can determine if thevisitor is on a pre-authorized list of individuals. The security system202 a and/or a remote computer can determine if the visitor is on a listof unauthorized or screened individuals. The system can block thecommunication request of screened individuals and/or can call emergencyresponse personnel in reaction to determining the identity of a screenedvisitor.

FIGS. 44A and 44B illustrate various method embodiments. Referring nowto FIG. 44A, Block 4008 can include the visitor pressing the doorbellbutton (or placing a finger in proximity to a doorbell housing). Block4012 can include a security system collecting information (e.g.,capturing information) regarding a fingerprint of the visitor. Block4016 can include comparing the fingerprint information to a fingerprintdatabase. The comparison can include implementing a matching algorithm.Block 4020 can include using the fingerprint information to identify thevisitor. Block 4024 can include determining if the visitor is includedin a list of individuals. The list of individuals can be created by theuser (e.g., the user can select which individuals to include in thelist).

In some embodiments, the security system can be configured to collectfingerprint samples, the system can be configured to record thefingerprint samples, and the remote computing device can be configuredto assign fingerprint samples to a list of individuals, classificationsof individuals, and/or information regarding individuals. Referring nowto FIG. 43, a user could use the finger scanner 4004 to collectfingerprint samples of family members, friends, and/or wanted visitors.The user could use a computing device to add the fingerprint samples toa database, assign an identity to each fingerprint sample, and/or addthe fingerprint samples (or a person associated with each sample) to alist of individuals.

Referring now to FIG. 44A, Block 4028 can include implementing anunrecognized visitor protocol. Unrecognized visitor protocols can becustomized by the user. Unrecognized visitor protocols can includedisabling a chime, speaker, or audio output device located inside of thebuilding during certain hours of the day (e.g., between 11:00 PM and6:00 AM). Unrecognized visitor protocols can include directing thecommunication request to a particular user (e.g., an adult user ratherthan to a child user or a user under a certain age threshold).Unrecognized visitor protocols can include emitting a chime or soundinside of the building but not notifying a remote computing device(e.g., 204 in FIG. 1).

Block 4032 can include implementing a recognized visitor protocol, whichcan be different than the unrecognized visitor protocol. If the visitoris include on a list of individuals authorized to automatically enterthe building, then the security system can enable the visitor to enterthe building (e.g., unlock a door) without further approval by the user(e.g., by automatically unlocking a door as shown in Block 4036). Asshown in Block 4040, if the visitor is recognized, but not included on alist of individuals authorized to automatically enter the building, thenthe communication system can wait for the user to provide authorizationvia a remote computing device for the visitor to enter the building(e.g., unlock the door).

As mentioned previously in the context of FIG. 43, the camera assembly208 a can be configured to visually identify visitors through machinevision and/or image recognition. For example, the camera assembly 208 acan take an image of the visitor. Software run by any portion of thesystem can then compare select facial features from the image to afacial database. In some embodiments, the select facial features includedimensions based on facial landmarks. For example, the distance betweena visitor's eyes; the triangular shape between the eyes and nose; andthe width of the mouth can be used to characterize a visitor and then tocompare the visitor's characterization to a database of characterizationinformation to match the visitor's characterization to an identity(e.g., an individual's name, authorization status, and classification).Some embodiments use three-dimensional visitor identification methods.

Referring now to FIG. 44B, Block 4078 can include the visitor pressingthe doorbell button (or placing a finger in proximity to a doorbellhousing). Block 4082 can include a security system collectinginformation (e.g., capturing information such as an image) regarding avisual appearance of the visitor. Block 4086 can include comparing thevisual information to a visual information database. The comparison caninclude implementing a matching algorithm and/or any of the imagerecognition methods mentioned above. Block 4090 can include using thevisual information to identify the visitor. Block 4094 can includedetermining if the visitor is included in a list of individuals. Thelist of individuals can be created by the user (e.g., the user canselect which individuals to include in the list).

Block 4098 can include implementing an unrecognized visitor protocol.Unrecognized visitor protocols can be customized by the user.Unrecognized visitor protocols can include disabling a chime, speaker,or audio output device located inside of the building during certainhours of the day (e.g., between 11:00 PM and 6:00 AM). Unrecognizedvisitor protocols can include directing the communication request to aparticular user (e.g., an adult user rather than to a child user or auser under a certain age threshold). Unrecognized visitor protocols caninclude emitting a chime or sound inside of the building but notnotifying a remote computing device (e.g., 204 in FIG. 1).

Block 4102 can include implementing a recognized visitor protocol, whichcan be different than the unrecognized visitor protocol. If the visitoris include on a list of individuals authorized to automatically enterthe building, then the security system can enable the visitor to enterthe building (e.g., unlock a door) without further approval by the user(e.g., by automatically unlocking a door as shown in Block 4106). Asshown in Block 4110, if the visitor is recognized, but not included on alist of individuals authorized to automatically enter the building, thenthe communication system can wait for the user to provide authorizationvia a remote computing device for the visitor to enter the building(e.g., unlock the door).

Locking System

Various mounting bracket embodiments are described herein (e.g., 420 inFIGS. 12, 14, and 15). FIG. 45 illustrates a perspective view of anembodiment that couples the mounting bracket 420 (shown in FIG. 12) tothe outer housing 224. A threaded screw 4044 (e.g., a setscrew or anysuitable screw) is rotated through a hole 4048 in the outer housing 224by a tool 4052 (e.g., an allen wrench, a hex wrench, a screwdriver). Thethreaded screw 4044 passes at least partially through the hole 4048 andinto a portion of the bracket 420 (not shown). The hole 4048 can belocated at a bottom portion of the outer housing 224 and/or along anouter perimeter of the outer housing 224. In some embodiments, the outerhousing 224 includes a cylindrical shape and the hole 4048 is located onan outer, curved portion of the cylindrical shape.

FIGS. 46A and 46B illustrate side views with a partial cross section toillustrate how the screw 4044 can pass through the hole 4048 in theouter housing 224 and into a hole 4062 of the bracket 420. The hole 4062of the bracket 420 can be threaded. FIG. 46A illustrates the outerhousing 224 in a locked position (e.g., the screw 4044 is coupled to thehole 4062 in the bracket 420 and protrudes into the hole 4048 of theouter housing 224 such that the outer housing 224 is coupled to thebracket 420). FIG. 46B illustrates the outer housing 224 in an unlockedposition (e.g., the screw 4044 does not protrude into the hole 4048 ofthe outer housing 224 such that the outer housing 224 can be removedfrom the bracket 420). Some embodiments include coupling the bracket 420to a wall by screwing screws into the wall in a first direction andcoupling an outer housing 224 (e.g., of a doorbell security system) tothe bracket 420 by screwing a screw in a second direction, wherein thefirst direction is perpendicular to the plane of the wall and the seconddirection is angled at 90 degrees relative to the first direction (e.g.,the second direction is parallel to the plane of the wall).

Auto-Ringing Doorbell

As described herein, various embodiments include the ability to detectwhether a visitor is present even if the visitor does not press adoorbell button. For example, some embodiments include infrareddetection of visitors, motion detection of visitors, noise detection ofvisitors, and/or visual recognition of visitors. If a visitor is presentfor more than a threshold amount of time, the system (e.g., 200 inFIG. 1) can cause a chime (e.g., 302 in FIG. 3) to emit a sound insideof the building and/or can send a notification to a user (e.g., via aremote computing device). The threshold amount of time can be at least 3seconds, at least 5 seconds, at least ten seconds, and/or at leasttwenty seconds. The threshold amount of time can be less than 20seconds, 15 seconds, and/or five seconds.

In some embodiments, the system can be configured to only notify a user(e.g., via a chime and/or via a remote computing device) once perdetected visitor and/or once per detection episode. This approach canprevent unnecessarily redundant notifications. In several embodiments,the system will send a notification to the user when a visitor isdetected (or after a threshold amount of time) but then will not send asecond notification regarding the same visitor unless a secondtriggering event occurs. Example triggering events can include thepassage of a second threshold amount of time, a second knocking episode,and/or pressing the doorbell button.

Power Management

Different parts of the world often use different types of electricalpower. In addition, different houses sometimes have different wiringconfigurations and system installers might use different installationtechniques. Several embodiments include special features that enablecompatibility with any voltage, current, and wiring configuration. Someembodiments can function properly regardless of current direction ortype.

Referring now to FIG. 11, several embodiments can be configured for 9 to40 volts alternating current (“VAC”) and/or 9 to 40 volts direct current(“VDC”). Some embodiments convert input electricity into direct current(DC), such as 12 VDC. Several embodiments include a converter 494 forpower conversion (e.g., converting electrical energy from one form toanother). The converter 494 can convert input power (e.g., from wiringin a building) to a suitable power form for the security system 202. Thepower conversion can convert between AC and DC, change the voltage,and/or change the frequency. The converter 494 can include a transformerand/or a voltage regulator. In several embodiments, the converter 494can include a DC to DC converter, a voltage stabilizer, a linearregulator, a surge protector, a rectifier, a power supply unit, aswitch, an inverter, and/or a voltage converter. In some embodiments,the converter 494 converts 50 Hertz (“Hz”) power into 60 Hz power.

In some embodiments, the security system 202 uses a first amount ofpower to “ring” the chime inside of the building and a second amount ofpower when in Standby Mode, wherein the first amount of power is atleast twice as large as the second amount of power.

FIG. 47 illustrates a diagrammatic view of an electrical powerconfiguration, according to some embodiments. The security system 202can be located outside of a building 300 and/or coupled to a wall of thebuilding 300. The building 300 can be a home, an office building, agovernment building, an enclosure, or any other type of structureconfigured to shelter people.

The building 300 can include a building power supply 5000, which canreceive electrical power from a public utility. A transformer 5004 canbe electrically coupled to the building power supply 5000 by a firstwire 5004 and a second wire 5006. As used herein, “wire” can includeelectrical conductors such as metal cables and wires. The transformer5004 can step down the electrical power (e.g., 120 volts AC, 240 voltsAC) from the building power supply 5000 to a lower voltage (e.g., atleast 10 volts and/or less than 20 volts, at least 7 volts and/or lessthan 25 volts).

A third wire 5010 can electrically couple the transformer 5004 to asound output device 5014, which can be a chime, a speaker, a bell, oranother device suitable to emit a sound inside of the building 300. Afourth wire 5018 can electrically couple the transformer 5004 to thesecurity system 202 (e.g., the doorbell). A fifth wire 5022 canelectrically couple the security system 202 to the sound output device5014. As a result of this configuration, the security system 202 cancontrol the flow of electricity to the sound output device 5014. In manyembodiments, the sound output device 5014 is configured such that itcannot emit sound without a trigger power above a triggering threshold.The trigger power comes from the building power supply 5000 and flowsinto the transformer 5004 (via wires 5004, 5006). Thus, the transformer5004 can supply the trigger power to a first circuit that comprises thefourth wire 5018, at least a portion of the security system 202, thefifth wire 5022, the sound output device 5014, and the third wire 5010.The fourth wire 5018 and the fifth wire 5022 can protrude from a hole5012 in the outside of the building 300.

In some doorbell electrical power configurations, pressing a mechanicaldoorbell button (not shown) creates a closed electrical loop to energizea chime. In other words, the mechanical doorbell button can be a switchthat is normally in an open position and is in a closed position when aperson presses the button.

Some doorbell systems include a sound output device 5014 that includes aplunger configured to strike two flat metal bar resonators. The plungercan be operated by solenoids. Pressing the mechanical doorbell buttoncan cause the solenoid to force the plunger to hit a first resonator. Ifa spring is included, then the spring can cause the plunger to hit asecond resonator (e.g., when the mechanical doorbell button isreleased). The plunger hitting a resonator can cause a sound (e.g., a“ding” sound) to be emitted from the sound output device 5014.

Some sound output devices include a first solenoid and a secondsolenoid. The first solenoid can be configured to hit both a first metalbar and a second metal bar (e.g., to make a “ding-dong” sound). Thesecond solenoid can be configured to hit the first metal bar, but notthe second metal bar (e.g., to make a “ding” sound). In some cases, afirst doorbell (e.g., a front doorbell) activates the first solenoid(e.g., to make a “ding-dong” sound) and a second doorbell (e.g., a backdoorbell) activates the second solenoid (e.g., to make a “ding” sound).This approach can enable a user to distinguish between the frontdoorbell's sound and the back doorbell's sound (as emitted from a soundoutput device).

While pressing a mechanical doorbell button can close an electricalcircuit to energize a chime and thereby cause a chime to emit a sound tonotify a person inside of a building, the security system 202 can beconfigured (in some embodiments) such that pressing the doorbell button212 does not mechanically close an electrical circuit to cause a chimeto emit a sound. In several embodiments, the doorbell button 212 is nota switch that electrically couples the fourth wire 5018 to the fifthwire 5022. Instead, the fourth wire 5018 and the fifth wire 5022 can beelectrically coupled to a printed circuit board (“PCB”) 516 (shown inFIG. 11). The other items in FIG. 11 (e.g., 458, 524, 500, 504, 508,510, 512, 462, 484, 494, 488, 480, 492, 208) can receive electricalpower from the PCB 516.

In some embodiments, the doorbell button 212 is a press sensor (ratherthan the doorbell button 212 being physically coupled to a mechanicalswitch that can electrically close a circuit between the transformer5004 and the sound output device 5014). The sensor can detect when avisitor presses the doorbell button 212. This “press detection” is usedby software of the security system 202 or of the communication system200 (shown in FIG. 1) to help determine whether to emit sound from thesound output device 5014 and/or whether to notify the user via acomputing device (e.g., 204 in FIG. 1) based on additional parameterssuch as a profile and/or user settings.

Referring now to FIGS. 11 and 47, in some embodiments, the securitysystem 202 (e.g., the PCB 516 and electrical components coupled to thePCB 516) is configured to allow alternating current (“AC”) power to flowfrom the security system 202, to the sound output device 5014, and/or tothe transformer 5004. In several embodiments, the security system 202 isconfigured to provide direct current (“DC”) power to at least portionsof the PCB 516. In some embodiments, the security system 202 isconfigured to provide AC power to the sound output device 5014 whileproviding DC power to at least portions of the PCB 516.

In several embodiments, electrical power for the sound output device5014 and/or electrical power for the PCB 516 is routed through thesecurity system 202 and/or through the PCB 516. Electrical power fromthe fourth wire 5018 can be routed through the security system 202and/or through the PCB 516 prior to reaching the fifth wire 5022.Electrical power from the fifth wire 5022 can be routed through thesecurity system 202 and/or through the PCB 516 prior to reaching thefourth wire 5018. Thus, electrical power for the sound output device5014 (e.g., chime) does not need to bypass the security system 202.

In some embodiments, the security system 202 includes a Non-energizingMode in which the security system 202 provides DC power to at leastportions of the PCB 516 while draining power to the sound output device5014, wherein the power to the sound output device is below a triggeringthreshold. The triggering threshold is the amount of electrical power(e.g., volts, current) necessary to cause the sound output device 5014to emit a notification sound (e.g., a sound configured to notify aperson inside of the building 300 that someone is at the door). Inseveral embodiments, the security system 202 includes an Energizing Modein which the security system 202 provides AC power to the sound outputdevice above the triggering threshold. In some embodiments of theEnergizing Mode, the security system 202 provides DC power to at leastportions of the PCB 516.

In some embodiments of the Non-energizing Mode, the security system 202provides less than 30%, less than 20%, less than 10%, at least 3%, atleast 1%, and/or at least 0.1% of the power from the transformer 5004 tothe sound output device 5014. In some embodiments of Energizing Mode,the security system 202 provides at least 70%, at least 80%, at least90%, or at least 95% of the power from the transformer 5004 to the soundoutput device 5014. In several embodiments, the security system 202charges the battery 462 during Non-energizing Mode and does not chargethe battery 462 during Energizing Mode.

In some embodiments, the security system 202 includes a rectifier 524 toconvert AC to DC. The rectifier 524 can comprise vacuum tube diodes,mercury-arc valves, copper and selenium oxide rectifiers, semiconductordiodes, silicone-controlled rectifiers, and/or silicone-basedsemiconductor switches.

FIG. 48 illustrates a diagrammatic view of a security system configuredto communicate wirelessly with a sound output device 5014 and/or aspeaker 5016, according to some embodiments. A digital chime is one typeof sound output device 5014. In some embodiments, chimes do not includesolenoids configured to drive a plunger to hit a metal component to makea sound (e.g., a “ding” sound). In some embodiments, the sound outputdevice 5014 is a speaker 5016 that can emit a digital sound such as apre-recorded “ding” or any other sound (e.g., a song or prerecordedwords).

In some embodiments, the security system 202 is connected electricallyto a transformer 5004 (e.g., via a third wire 5020 and a fourth wire5024) and/or is electrically connected to a building power supply 5000(e.g., via a first wire 5004 and a second wire 5006). In severalembodiments, the security system 202 can wirelessly communicate with thesound output device 5014 (e.g., a solenoid-based chime, a digital chime,a speaker) via any suitable means of wireless communication 230.Wireless communication 230 between the security system 202 (e.g., adoorbell) and the speaker 5016 can enable the system to emitnotification sounds from the external speaker 5016, which can be locatedinside of the building 300 (although the speaker 5016 is externalrelative to the security system 202).

Inside Uses

Several embodiments can be used even in areas that are not entryways ornear doors. For example, security systems (e.g., 202 in FIG. 1) can bemounted on a stand, on an interior wall, on a wheelchair, by a bed, oron another suitable object to enable a person (e.g., the visitor) tosend a communication request (e.g., a notification) to a remote user.For example, an elderly person or a bedridden person can press thebutton 212 (shown in FIG. 1) to communicate with a user who can see andhear the elderly person or bedridden person. Some security systemembodiments include a screen 907 (shown in FIG. 24) that can enable theelderly person or bedridden person to see the user (e.g., an adult childor caregiver).

FIG. 49 illustrates a diagrammatic view of a security system 202 locatedinside of a building 300, according to some embodiments. The securitysystem 202 can be mounted on a stand, on an interior wall, or on anotherobject suitable for holding the security system 202. In severalembodiments, the security system 202 is not electrically connected to anexternal sound output device, although the security system 202 can emitsound from a speaker (e.g., speaker 488 shown in FIG. 11) coupled to thesecurity system 202. In some embodiments, the speaker 488 is locatedinside of an outer housing 224 (shown in FIGS. 1 and 11).

A first wire 5004 and a second wire 5006 can electrically connect (e.g.,couple) the security system 202 to a building power supply 5000 (e.g.,an electrical outlet or an electrical panel). In some embodiments, thesecurity system 202 is battery operated such that attaching the securitysystem 202 to an external power supply (e.g., the building power supply5000) is unnecessary. In several embodiments, the power supply 5000provides more than 6 volts, less than 36 volts, less than 140 volts,and/or less than 260 volts. In some embodiments, electrical power from abuilding must be changed (e.g., different voltage, different current)prior to providing the electrical power to the security system 202(e.g., a doorbell).

Communication Control

Referring now to FIGS. 1 and 11, in several embodiments, the user (e.g.,of the computing device 204) has superior communication rights than thevisitor talking into the security system 202. Sometimes, the user andthe visitor might attempt to talk at the same time. This situation canlead to ineffective communication. In addition, if the microphone 484 iscapturing (e.g., recording, sensing) sound while the speaker 488 isemitting sound from the user of the computing device 204, then thecommunication system 200 could suffer from audio feedback (e.g., theuser's voice emitted by the speaker 488 could be captured by themicrophone 484 and emitted by the computing device 204). At least someof these complications can be solved by various communication controlembodiments.

In some embodiments, the computing device 204 has superior communicationrights relative to the security system 202. As a result, if the speaker488 is emitting sound, then the microphone 488 can be disabled. Inseveral embodiment, the microphone 488 is disabled (e.g., prevented fromcapturing sound or being used to transmit sound to the computing device204) a first period of time before the speaker 488 emits sound, whilethe speaker 488 emits sound, and/or a second period of time after thespeaker 488 emits sound. The first period and/or the second period canbe at least one nanosecond, at least one millisecond, at least 50milliseconds, and/or less than one second. Referring now to FIG. 3, insome embodiments, multiple devices (e.g., 204, 306) are used tocommunicate with a visitor via at least one security system 202. Somemethods include assigning superior communication rights to some devices(e.g., 204, 306) relative to other devices (e.g., 204, 306).

Pool Monitoring

Drowning is the second-leading cause of injury-related death forchildren under 14 years old. Traditional pool monitoring devices rely ondetecting when a person enters the water. People can drown in less thantwo minutes. As a result, sending a notification to a remote computingdevice when a person enters the water can leave insufficient time forthe user of the remote computing device to save the drowning person.Various embodiments described herein address at least some of theseshortcomings of traditional pool monitoring devices.

FIG. 50 illustrates a diagrammatic view of a security system 202 beingused to monitor a pool area, according to some embodiments. The motiondetector 218 can be configured to determine whether a person is locatedin the pool 5030 even when the security system 202 is located outside ofthe pool 5030. In some embodiments, the security system 202 is placed atleast three feet and/or less than fifty feet from the pool 5030.

The security system 202 can take a picture 208 with the camera assembly208 in response to detecting motion (e.g., via the motion detector 218).The security system 202 (or another portion of the communication system200 illustrated in FIG. 1) can analyze the picture to determine if themotion was caused by an adult or by a child (e.g., by a person under apredetermined height threshold). In some cases, the height threshold canbe 5 feet, 4.5 feet, 3.5 feet, or 3 feet.

The camera assembly 208 can be configured to visually identify peoplethrough machine vision and/or image recognition. For example, the cameraassembly 208 can take an image of the person located near the pool 5030.Software run by any portion of the system can then analyze selectfeatures of the person from the image. The software can use scaling toestimate the height of the person (e.g., based on previous calibrationprocedures and information).

In some embodiments, if the motion was caused by an adult and/or by aperson taller than the height threshold, then the system will not send anotification (e.g., alarm) to the remote computing device and/or willnot emit an alert sound from the speaker 488 (shown in FIG. 11) of thesecurity system 202. In some embodiments, if the motion was caused by achild and/or by a person shorter than the height threshold, then thesystem will send a notification to the remote computing device and/orwill emit an alert from the speaker of the security system 202.

Although the security system 202 can be configured to detect if a personfalls into the pool 5030, the security system 202 can also be configuredto detect whether a person is located within a zone 5034 that includesat least a portion of the pool 5030. In some embodiments, the zone 5034includes all of the pool 5030 and/or an area around the perimeter of thepool 5030. The zone 5034 can define a danger zone. Once the securitysystem 202 detects that a person is located in the zone 5034, thesecurity system can enter a Standby Mode in which the security system202 conducts at least one analysis to determine if the person might bein danger (e.g., if the person is shorter than the height threshold orif the person is authorized to be in the zone 5034 and/or in the pool5030).

In some embodiments, the security system 202 will send a notification toa remote computing device and/or emit an alert sound from the speakerunless the detected person is wearing a device that indicates the personis authorized to be in the zone 5034 and/or in the pool 5030. Theauthorization device 5038 can be a bracelet or other object worn by theperson. The authorization device 5038 can include a radio-frequencyidentification (“RFID”) or Bluetooth communication device configured toprovide data to the security system 202 (e.g., data regarding theauthorization of the device to be located in the zone 5034 and/or pool5030).

Several methods include using the security system 202 to detect whethera person is located in the zone 5034. Methods can include determiningwhether the person is authorized to be in the zone 5034. In someembodiments, methods include sending a notification to a remotecomputing device and/or emitting an alert sound from the speaker 488(shown in FIG. 11) of the security system 202 if the person is locatedin the zone 5034 and/or not authorized to be in the zone 5034.

Advertising

In some embodiments, the communication system 200 (shown in FIG. 1) isused to deliver targeted ads based on the location of the user of theremote computing device. Referring now to FIGS. 1 and 2, someembodiments include tracking the location (e.g., GPS coordinates) of thecomputing device 204 and using the location to select advertisements(e.g., based on the location). For example, if the remote computingdevice 204 is located in a particular city, the system 200 can deliverads for nearby restaurants and services. The advertisements 258 can bedisplayed on the user interface 240 (shown in FIG. 2). In someembodiments, the advertisements are shown near the bottom of the screenof the computing device. The advertisements can be sent through and/orcontrolled by the server 206 and/or a database.

In several embodiments, the advertisements 258 are selected based on atleast one feature or characteristic of the visitor. For example, if thevisitor is a vacuum salesperson, then the advertisement 258 can berelated to vacuums. In some embodiments, the advertisements 258 offer toprovide additional information regarding the visitor (e.g., backgroundcheck information, identity information, visit history information,relationships to acquaintances of the user).

Statistics

Several embodiments include tracking, recording, and/or providinginformation regarding visitors and/or visits. This information caninclude statistics and other forms of data. Referring now to FIG. 1,some embodiments track, record, and/or provide the number of times avisitor has visited and/or been detected by a security system 202.Several embodiments track, record, and/or provide the number of times avisitor has pressed (e.g., “rung”) the doorbell button 212, visited aparticular location (e.g., the building to which the security system 202is coupled), and/or communicated with a particular computing device 204.Some embodiments track, record, and/or provide the number of visitorsand/or the number of visits to a particular area monitored by a securitysystem 202.

Several embodiments include aggregating, combining, and/or comparinginformation regarding visitors and/or visits from at least two securitysystems 202 (and/or from at least two buildings). This aggregated and/orcombined data can be analyzed by a third party (e.g., not a user of oneof the security systems 202) to identify visit trends and/or to trackindividual visitors. For example, this data can be used to determinewhich neighborhoods receive the most visitors and/or visits. This datacan also be used to track a particular visitor as the visitor moves fromone building to another building or neighborhood. Aggregated and/orcombined data regarding visitors can be searched and/or analyzed todetermine if a particular individual has visited a particular area,neighborhood, or building.

Some embodiments include creating a log that records the date and timeof opening and closing of a door. Referring now to FIG. 23, the door log916 can include locking and unlocking data. Several embodiments includea log that records whether a door was unlocked by a physical key or viaan automated system (e.g., a security system 202). The security system202 can lock and unlock a door lock 930. Data regarding whether aphysical key or an automated system unlocked a door can aid criminalinvestigations. The door log 916 can also include a picture of visitorswho unlock a door and/or pass through a door. A camera assembly 208(shown in FIG. 1) can take the picture. The door log 916 can alsoinclude the identity of the visitors.

Security

In some embodiments, security systems 202 (e.g., doorbells) are disabledif they are stolen. This approach can deter theft once potential thievesknow stolen systems will not function properly (e.g., once disabled).

In several methods, the owner (e.g., a user) of a stolen security system202 can contact a remote administrator (e.g., the manufacturer of thestolen security system). Based on the request of the owner, the remoteadministrator can disable the stolen security system 202 remotely (e.g.,without physically touching the security system 202). The remoteadministrator can use wireless communication 230 and/or a server 206 todisable the stolen security system 202.

In some embodiments, the remote administrator, the owner, and/or theuser can detect the location of the stolen security system 202. Theremote administrator can tell the owner the location of the stolensecurity system 202. For example, if a person connects the stolensecurity system 202 to a communication network (e.g., the Internet), theadministrator can locate the stolen security system 202.

In several embodiments, once a security system 202 is connected to awireless network, the security system 202 cannot connect to anotherwireless network without being “unlocked.” Thus, if the security system202 is stolen, the security system 202 could be nearly worthless becausethe thief likely will not be able to connect the security system toanother wireless network (e.g., the wireless network at the thief'shome). In this context, “unlocked” means that the security system 202 iscapable of connecting to another wireless network and capable of sendingnotification requests to a remote computing device 204 via the othernetwork. Thus, in some embodiments, once a security system 202 isconnected to a first wireless network, the security system 202 cannot beconnected to another wireless network without being unlocked (e.g., fromthe first wireless network). Once the security system 202 is unlocked,then it can be connected to a second wireless network.

A remote administrator and/or the owner can unlock the security system202 by, for example, entering a password and/or logging into a websiteconfigured for unlocking security systems 202.

Delivery Identification

FIG. 53 illustrates an embodiment of barcodes 1030, 1034 on a package1038 being held up to a camera assembly 208 of a security system 202 toscan the barcodes 1030, 1034. In some embodiments, a doorbell isconfigured to identify a package by scanning a barcode. The package canbe placed with 36 inches and/or within 20 inches of a camera of thedoorbell to enable the doorbell to scan the barcode. “Barcode” is usedin a broad sense herein and includes optical machine-readablerepresentations of data regarding the object to which the barcode isattached. Barcodes can include many different geometric patterns and arenot limited to straight lines. Barcodes can include Quick Response (QR)codes, Universal Product Codes (UPC), and many other machine-readablerepresentations of data.

In some embodiments, once the security system 202 scans a barcode toenable identifying the package 1038, methods include sending anotification to a person associated with the package (such as the personto whom the package is addressed). The notification can include an emailto the person, a text message, and/or an automated phone call. Thenotification can communicate that the package has arrived. Thenotification can also communicate the contents of the package. As usedherein, “package” is used in a broad sense and can include letters andboxes delivered to a building.

Laser Identification

Referring now to FIG. 53, the security system 202 can include a light1042, which can be a laser. The light 1042 can emit a beam of light1044, which can be a laser beam. Some embodiments include using thelaser beam to detect is a visitor is present near the security system202. The security system 202 can be configured to detect whether avisitor is present based on whether the beam 1044 is broken (e.g.,interrupted) by the visitor. In some embodiments, the security system202 determines an average beam behavior and then identifies deviationsfrom the average beam behavior as indications of a visitor. For example,if a beam 1044 typically travels 10 feet without being broken, butsuddenly the beam only travels two feet without being broken, then thesystem can interpret the change in the beam signal as an indication ofthe presence of a visitor. Some security systems 202 are configured todetect light reflected back to the security system 202.

Answering Devices

Many types of computing devices can be used to receive notificationsregarding the presence of a visitor and to communication with a visitor.For example, a car and glasses can be configured to receive alertsregarding the presence of a visitor.

FIG. 54 illustrates a front view of a dashboard of a vehicle 1054 suchas a car, truck, bus, airplane, or motorcycle. The vehicle includes acomputing device 204 a, which can include any of the features andperform any of the methods described herein in the context of otherembodiments and computing devices 204. The computing device 204 a caninclude a display screen 242 a, which can be integrated into thedashboard of the vehicle 1054. Some embodiments include answeringvisitor alerts via vehicles 1054. A user interface 240 can enable usersto control the computing device 204 a.

In some embodiments, the display screen 242 a is part of a television,which can be configured to receive alerts regarding the presence ofvisitors. The television can be configured to receive push notificationsfrom a security system 202 (shown in FIG. 51). Televisions can beembodiments of computing devices 204 (shown in FIG. 51). Someembodiments include answering visitor alerts via televisions.

FIG. 55 illustrates a perspective view of glasses 1058, which can bevirtual reality glasses, augmented reality glasses, and/or a GoogleGlass made by Google Inc. The glasses 1058 can include a display screen242 b. Glasses 1058 can be embodiments of a computing device 204 b,which can include any of the features and perform any of the methodsdescribed herein in the context of other embodiments and computingdevices 204.

Some embodiments include answering visitor alerts via glasses 1058. Auser can control and interact with the glasses 1058 via voice commands.The glasses 1058 can include a speaker to allow the user to hear thevisitor.

Interpretation

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other.

The section headings and subheadings provided herein are nonlimiting.The section headings and subheadings do not represent or limit the fullscope of the embodiments described in the sections to which the headingsand subheadings pertain. For example, a section titled “Topic 1” mayinclude embodiments that do not pertain to Topic 1 and embodimentsdescribed in other sections may apply to and be combined withembodiments described within the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodimentsinclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy.

While certain example embodiments have been described, these embodimentshave been presented by way of example only, and are not intended tolimit the scope of the inventions disclosed herein. Thus, nothing in theforegoing description is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit of theinventions disclosed herein.

The following is claimed:
 1. A method for using a doorbell that isconfigurable to wirelessly communicate with a remotely located computingdevice, the method comprising: obtaining the doorbell that comprises aspeaker, a microphone, a camera, and a button, wherein the doorbell isconfigurable to enable a visitor to sound a chime; entering a setupmode, wherein the setup mode comprises a network connection mode, andthe method comprises entering the network connection mode in response topressing the button for at least a predetermined amount of time, and thenetwork connection mode comprises detecting a first wireless network andinputting a doorbell identification code into the remotely locatedcomputing device, wherein the doorbell identification code is associatedwith the doorbell, and wherein the network connection mode furthercomprises using the doorbell identification code to verify whether theremotely located computing device is authorized to communicate with thedoorbell, wherein the network connection mode comprises enablingcommunication from the remotely located computing device to the doorbellin response to pressing the button for at least the predetermined amountof time and inputting the doorbell identification code into the remotelylocated computing device, wherein the remotely located computing deviceis connected to the first wireless network such that the remotelylocated computing device is configured to transmit data via the firstwireless network, wherein the first wireless network comprises a nameand a password, and wherein the communication from the remotely locatedcomputing device to the doorbell comprises the name and the password ofthe first wireless network to which the remotely located computingdevice is connected; and detecting a first indication of the visitor,wherein the first indication is detected using the doorbell.
 2. Themethod of claim 1, wherein the remotely located computing devicecomprises a cellular telephone having a display screen, the methodfurther comprising sending an image of the visitor from the doorbell tothe cellular telephone and displaying the image of the visitor on thedisplay screen of the cellular telephone, the method further comprisingentering the setup mode in response to detecting electricity from anexternal power source.
 3. The method of claim 1, further comprisingdetecting a second indication of the visitor, wherein the secondindication is detected using the doorbell, and further comprisingsending a wireless notification to the remotely located computing deviceregarding a presence of the visitor in response to detecting both thefirst indication and the second indication.
 4. The method of claim 3,wherein detecting the first indication comprises detecting a signalindicative of the visitor above a first threshold and detecting thesecond indication comprises detecting the signal indicative of thevisitor above a second threshold, wherein the second threshold isgreater than the first threshold, and wherein the doorbell comprises afirst sensor, and the signal indicative of the visitor is sensed by thefirst sensor of the doorbell.
 5. The method of claim 4, wherein thefirst sensor of the doorbell comprises a motion sensor and the signal isrelated to motion, and wherein the camera is disabled during the setupmode.
 6. The method of claim 4, wherein the first sensor of the doorbellcomprises a proximity sensor and the signal is related to proximity ofthe visitor.
 7. The method of claim 4, wherein the first sensor of thedoorbell comprises the microphone and the signal is related to sound. 8.The method of claim 7, wherein detecting the second indication comprisesdetecting a knocking sound.
 9. The method of claim 3, wherein thedoorbell comprises a first sensor and a second sensor, and wherein thefirst indication is detected using the first sensor and the secondindication is detected using the second sensor, wherein the first sensoris a different type of sensor than the second sensor.
 10. The method ofclaim 9, wherein the first sensor of the doorbell comprises a motionsensor.
 11. The method of claim 10, wherein the second sensor comprisesthe microphone, wherein the method further comprises using themicrophone to detect a knocking sound to verify the presence of thevisitor detected by the motion sensor.
 12. The method of claim 9,wherein the first sensor of the doorbell comprises an infrared detectorand the second sensor comprises the camera.
 13. The method of claim 1,wherein the doorbell comprises a battery, and the setup mode comprisesautomatically charging the battery in response to detecting electricityfrom an external power source.
 14. The method of claim 13, wherein thesetup mode comprises automatically replenishing at least a portion ofelectrical energy consumed from the battery by the doorbell during ashipping mode, the method further comprising precluding wirelesscommunication by the doorbell until after replenishing the portion ofthe electrical energy, wherein the network connection mode comprises thedoorbell detecting the first wireless network.
 15. The method of claim1, wherein the doorbell comprises a battery and the setup mode comprisesusing electricity from an external power source to charge the batterybefore enabling the communication between the doorbell and the remotelylocated computing device.
 16. The method of claim 1, wherein thepredetermined amount of time is eight seconds.
 17. The method of claim1, wherein the button is configurable to enable the visitor to sound thechime.
 18. The method of claim 1, further comprising shipping thedoorbell in a shipping mode that consumes electrical energy from thedoorbell, wherein during the shipping mode the doorbell is configured todetect whether the doorbell is electrically coupled to an external powersource, and then entering the setup mode in response to detectingelectricity from the external power source, wherein the shipping modeconsumes less electrical power than the setup mode, and the setup modeincreases electrical activities of the doorbell relative to the shippingmode.
 19. The method of claim 1, wherein the network connection modecomprises connecting the doorbell to the first wireless network to whichthe remotely located computing device is connected such that thedoorbell can send an alert regarding a presence of the visitor to theremotely located computing device via the first wireless network. 20.The method of claim 19, further comprising using the doorbell to detectmultiple wireless networks, wherein the multiple wireless networkscomprise the first wireless network, the method further comprisingautomatically selecting the first wireless network to which the remotelylocated computing device is connected from the multiple wirelessnetworks to enable the doorbell to connect to the first wireless networkto which the remotely located computing device is connected.
 21. Themethod of claim 1, wherein the network connection mode comprises theremotely located computing device creating a second wireless network,and the network connection mode comprises transmitting the name and thepassword of the first wireless network directly from the remotelylocated computing device to the doorbell via the second wireless networkto enable the doorbell to communicate with the remotely locatedcomputing device via the first wireless network, wherein the methodcomprises the remotely located computing device directly communicatingwith the doorbell via the second wireless network to transmit the nameand the password prior to the doorbell indirectly communicating with theremotely located computing device via the first wireless network.
 22. Amethod for using a doorbell that is configurable to wirelesslycommunicate with a remotely located computing device, the methodcomprising: obtaining the doorbell that comprises a speaker, amicrophone, a camera, and a button, wherein the doorbell is configurableto enable a visitor to sound a chime; shipping the doorbell in ashipping mode that consumes electrical energy from the doorbell, whereinduring the shipping mode the doorbell is configured to detect whetherthe doorbell is electrically coupled to an external power source, andthen entering a standby mode in response to detecting electricity fromthe external power source, wherein the shipping mode consumes lesselectrical power than the standby mode and wherein the speaker and themicrophone are disabled during the standby mode; exiting the standbymode and entering an alert mode in response to detecting a firstindication of the visitor, wherein the first indication is detectedusing the doorbell; sending a wireless notification to the remotelylocated computing device regarding a presence of the visitor in responseto entering the alert mode; and entering a network connection mode priorto sending the wireless notification, wherein the network connectionmode comprises detecting a first wireless network having a name and apassword, and the network connection mode comprises inputting a doorbellidentification code into the remotely located computing device, whereinthe doorbell identification code is associated with the doorbell, andwherein the network connection mode further comprises using the doorbellidentification code to verify whether the remotely located computingdevice is authorized to communicate with the doorbell, wherein thenetwork connection mode comprises the remotely located computing devicecreating a second wireless network, and the network connection modecomprises transmitting the name and the password of the first wirelessnetwork directly from the remotely located computing device to thedoorbell via the second wireless network to enable the doorbell tocommunicate with the remotely located computing device via the firstwireless network, wherein the method comprises the doorbell directlycommunicating with the remotely located computing device via the secondwireless network prior to the doorbell indirectly communicating with theremotely located computing device via the first wireless network. 23.The method of claim 22, further comprising detecting multiple wirelessnetworks and automatically selecting the first wireless network forcommunicating between the doorbell and the remotely located computingdevice, wherein prior to the automatic selection the remotely locatedcomputing device is connected to the first wireless network, the methodfurther comprising authorizing the doorbell to communicate with theremotely located computing device by pressing the button for at leasteight seconds and inputting the doorbell identification code into theremotely located computing device.
 24. A method for using a doorbellthat is configurable to wirelessly communicate with a remotely locatedcomputing device, the method comprising: obtaining the doorbell thatcomprises a speaker, a microphone, a camera, and a button, wherein thedoorbell is configurable to enable a visitor to sound a chime; sending awireless notification to the remotely located computing device regardinga presence of the visitor in response to the doorbell detecting thevisitor; and entering a network connection mode prior to sending thewireless notification, wherein the network connection mode comprisesdetecting a first wireless network having a name and a password, and thenetwork connection mode comprises inputting a doorbell identificationcode into the remotely located computing device, wherein the doorbellidentification code is associated with the doorbell, and wherein thenetwork connection mode further comprises using the doorbellidentification code to verify whether the remotely located computingdevice is authorized to communicate with the doorbell, wherein thenetwork connection mode comprises the remotely located computing devicecreating a second wireless network, and the network connection modecomprises transmitting the name and the password of the first wirelessnetwork directly from the remotely located computing device to thedoorbell via the second wireless network to enable the doorbell tocommunicate with the remotely located computing device via the firstwireless network, wherein the method comprises the doorbell directlycommunicating with the remotely located computing device via the secondwireless network prior to the doorbell indirectly communicating with theremotely located computing device via the first wireless network. 25.The method of claim 24, wherein the button is configurable to enable thevisitor to sound the chime, the method further comprising entering thenetwork connection mode in response to pressing the button for at leasta predetermined amount of time.
 26. The method of claim 24, furthercomprising detecting a first indication and a second indication of thevisitor, wherein the first indication and the second indication aredetected using the doorbell, and further comprising sending the wirelessnotification to the remotely located computing device regarding thepresence of the visitor in response to detecting both the firstindication and the second indication.
 27. The method of claim 26,wherein detecting the first indication comprises detecting a signalindicative of the visitor above a first threshold, and detecting thesecond indication comprises detecting the signal indicative of thevisitor above a second threshold, wherein the second threshold isgreater than the first threshold, and wherein the doorbell comprises afirst sensor, and the signal indicative of the visitor is sensed by thefirst sensor of the doorbell.
 28. The method of claim 26, wherein thedoorbell comprises a first sensor and a second sensor, and wherein thefirst indication is detected using the first sensor and the secondindication is detected using the second sensor, wherein the first sensoris a different type of sensor than the second sensor.