Doorbell communication systems and methods

ABSTRACT

Doorbells can detect visitors using a visitor detection system that includes a camera assembly, a motion detector assembly, or an infrared detector assembly. The visitor detection system can have a first sensor configured to detect a first indication suggestive of a visitor and a second sensor configured to detect a second indication suggestive of a visitor. A wall can separate the first sensor from the second sensor to divide the field of view of the visitor detection system such that the first sensor is configured to detect the first indication within a first portion of the field of view and the second sensor is configured to detect the second indication within a second portion of the field of view.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of and is a continuation of U.S.Nonprovisional patent application Ser. No. 14/529,334; filed Oct. 31,2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. Theentire contents of patent application Ser. No. 14/529,334 areincorporated by reference herein.

The entire contents of the following applications are incorporated byreference herein: U.S. Nonprovisional patent application Ser. No.14/502,601; filed Sep. 30, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; U.S. Nonprovisional patent application Ser. No.14/492,809; filed Sep. 22, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; U.S. Nonprovisional patent application Ser. No.14/463,548; filed Aug. 19, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; U.S. Nonprovisional patent application Ser. No.14/275,811; filed May 12, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS (now U.S. Pat. No. 8,872,915); U.S. Nonprovisionalpatent application Ser. No. 14/142,839; filed Dec. 28, 2013; andentitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S. Pat. No.8,842,180); U.S. Nonprovisional patent application Ser. No. 14/099,888;filed Dec. 6, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS ANDMETHODS (now U.S. Pat. No. 8,823,795); and U.S. Nonprovisional patentapplication Ser. No. 14/098,772; filed Dec. 6, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S. Pat. No.8,780,201).

The entire contents of the following applications are incorporated byreference herein: U.S. Provisional Patent Application No. 62/035,646;filed Aug. 11, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS ANDMETHODS; U.S. Provisional Patent Application No. 61/872,439; filed Aug.30, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; andU.S. Provisional Patent Application No. 61/859,070; filed Jul. 26, 2013;and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS.

The entire contents of the following applications are incorporated byreference herein: International Application No. PCT/US14/53506; filedAug. 29, 2014 with the U.S. Patent and Trademark Office; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS; and InternationalApplication No. PCT/US14/47622; filed Jul. 22, 2014 with the U.S. Patentand Trademark Office; and entitled DOORBELL COMMUNICATION SYSTEMS ANDMETHODS.

BACKGROUND

1. Field

Various embodiments disclosed herein relate to doorbells. Certainembodiments relate to doorbell methods to detect visitors.

2. Description of Related Art

Doorbells can enable a person located outside of an entry point, such asa door, to alert a person inside of an entry point that someone outsidewould like to talk to someone inside. Doorbells sometimes include abutton located near a door, such as a front door, side door, or backdoor of a home, office, dwelling, warehouse, building, or structure.Doorbells are sometimes used near a gate or some other entrance to apartially enclosed area. Pushing the doorbell sometimes causes a chimeor other alerting sound to be emitted. In some cases, this alertingsound can typically be heard within a short distance from the entrypoint or sound source. For example, a homeowner located remotely fromher home might not be able to hear the alerting sound, and thus, mightnot be aware that someone is ringing her doorbell. Thus, there is a needfor devices and methods to alert remotely located individuals thatsomeone seeks the attention of the homeowner, tenant, building guardian,or steward.

In some cases, doorbells should detect the presence of a visitor. Somedoorbells, however, may falsely detect the presence of a visitor. Somedoorbells may fail to detect a visitor. Thus, there is need for devicesand methods that increase the accuracy and/or reliability of doorbellsdetecting visitors.

SUMMARY

Methods can include using a doorbell that is configurable to wirelesslycommunicate with a remotely located computing device, such as a cellulartelephone, laptop, tablet, or desktop computer. Some embodiments includeobtaining a doorbell that comprises a speaker, a microphone, a camera,and a button. In some embodiments, the camera acts as a motion sensor. Adoorbell can include an infrared motion detection system. The button ofthe doorbell can be configurable to enable a visitor to sound a chime(e.g., a speaker or another sound emission device located inside abuilding). Some chimes are digital and others are mechanical.

Some embodiments include methods for using a doorbell system to detect avisitor. The doorbell system can comprise a doorbell and a remotecomputing device. Methods can include obtaining the doorbell system thatcomprises a visitor detection system. The visitor detection system cancomprise at least one of a camera, a motion detector, and an infrareddetector. The visitor detection system can be configured to detect afirst indication suggestive of a first visitor.

An indication can be suggestive of the visitor if the indication is of atype that may indicate a visitor (even if the indication can sometimesresult in false positives). For example, the indication can be a motionindication, but at times, motion indications may result from movingcars, pets, and plants. As a result, a motion indication may notactually indicate a visitor even though the indication suggests that avisitor may be present.

An infrared signature that seems to indicate that a visitor is presentcan be a type of indication. The infrared signature may be of a shapeand/or temperature that suggests the infrared signature is from avisitor (i.e., a person). In many cases, infrared signatures suggestiveof visitors are actually from visitors, but in some cases, infraredsignatures suggestive of visitors may be misleading (and not actually befrom visitors).

A shape in an image taken by a camera may be an indication suggestive ofa visitor. For example, the shape can be of a size or geometry thatsuggests the shape represents at least a portion of a visitor. In somecases, shapes suggestive of a visitor may not actually be from avisitor.

Doorbell triggering (e.g., pressing) data can be used to substantiatesuggestive indicators. Thus, embodiments can grow more skeptical ofindicators if they are not followed by, for example, a visitor pressingthe doorbell button. Certain areas of the field of view can bediscounted or ignored altogether if indicators associated with thecertain areas are not followed by a visitor pressing the doorbellbutton.

Embodiments can grow more confident of indicators if they are followedby a visitor pressing the doorbell button. In some embodiments, allareas of the field of view are configured to trigger an alert regardingthe visitor until indications associated with certain areas are notfollowed by visitors pressing the button. Then, the system can ignoreindications in those areas (to reduce the number of false positives).

Doorbells can comprise a button that is configurable to enable the firstvisitor to sound a chime. The chime can be located inside of thebuilding to which the doorbell is attached. The chime can be digital ormechanical. In some embodiments, the chime can be a speaker attached tothe building. Some users might not actually configure the doorbellbutton to sound a chime even though the button is configurable to soundthe chime.

Several embodiments include configuring the doorbell system such thatthe visitor detection system comprises a field of view. The doorbell caninclude a camera, a motion sensor, and/or an infrared sensor that can bemounted in an entryway to enable the doorbell to see an area in front ofthe doorbell. In some embodiments, the camera, motion sensor, and/orinfrared sensor is not physically coupled to the doorbell, but instead,is mounted remotely from the doorbell. The doorbell system canwirelessly communicate with the camera, motion sensor, and/or infraredsensor. In several embodiments, the camera, motion sensor, and/orinfrared sensor is integrated into the doorbell.

Some embodiments include using the visitor detection system to detectthe first indication suggestive of the first visitor within a firstportion of the field of view and determining that the first indicationdetected within the first portion of the field of view is not associatedwith a triggering of the button.

Several methods can be used to determine if an indication is associatedwith a triggering of the button. In some embodiments, the system waitsfor a predetermined amount of time (e.g., 60 seconds or less) afterdetecting the indication to determine if the doorbell button is pressed.If the button is not pressed within the predetermined amount of time,then the indication is not associated with the triggering of the button.

The system can be configured to determine if the object that resulted inthe indication suggestive of the visitor later pressed the doorbellbutton. For example, the system can detect an indication of an object(e.g., a car, a moving tree, a pet, a visitor). The system can thendetermine if the object later pressed the doorbell button.

If the object pressed the doorbell button, then the indication wasassociated with the triggering of the button. If the object did notpress the doorbell button, then the object was not associated with thetriggering of the button. This approach enables the system to calibrateits remote detection capabilities based on doorbell button data. Then,the system can more accurately determine if an indication is actually avisitor (to reduce false positives). As a result, the system can morereliably send an alert about a later visitor even if the visitor doesnot press the button.

A visitor can trigger the doorbell button in several ways. In manyembodiments, the visitor triggers the doorbell button by pressing thedoorbell button (e.g., to make the chime “ring”). Some embodimentsinclude a button that can be triggered without pressing the button. Forexample, the visitor can trigger the button by touching the button. Someembodiments include “contactless” switches (e.g., Hall effect sensors)that enable triggering the button without actually touching the button.

Several embodiments include using the visitor detection system to detecta second indication suggestive of a second visitor within the firstportion of the field of view and excluding the first portion of thefield of view from causing an alert configured to notify the remotecomputing device regarding a presence of the second visitor. Theexcluding can be at least partially in response to determining that thefirst indication detected within the first portion of the field of viewis not associated with the triggering of the button. The excludingprevents the second indication from causing the alert.

In some embodiments, this exclusion can create zones within the field ofview that will not cause the system to send the alert even though thesystem detects an indication suggestive of a visitor in the excludedzones. This exclusion often will not prevent all indications fromcausing an alert if the indications are detected in non-excluded zones.

Several embodiments include using the visitor detection system to detecta third indication suggestive of the second visitor within a secondportion of the field of view and then sending the alert in response todetecting the third indication within the second portion. The firstindication can be a first motion indication, the second indication canbe a second motion indication, and the third indication can be a thirdmotion indication.

In some embodiments, the doorbell system determines that the firstindication detected within the first portion of the field of view is notassociated with the triggering of the button by determining that thebutton was not triggered within 60 seconds after detecting the firstindication. 60 seconds can be a good timeframe because visitorsapproaching a doorbell will typically ring the doorbell within 60seconds. If the item that caused the indication has not pressed thedoorbell button within 60 seconds of being detected, then the item mightnot actually be a visitor and might be a passing car, a pet, awind-blown tree branch, or another misleading item.

Of course, there will be times when an actual visitor does not press thedoorbell button. For example, a person might choose to knock on the doorinstead of ringing the doorbell button. Thus, some embodiments includelistening for sounds indicative of a visitor. Sounds indicative of avisitor include talking and knocking. Some embodiments are similar toother embodiments described herein except that the embodiments determinewhether an indication detected within the first portion of the field ofview is associated with sounds indicative of a visitor.

As a result of there being times when an actual visitor does not pressthe doorbell button, some embodiments do not immediately exclude aportion of the field of view from causing an alert, but instead, rely ondata from many visitors and/or adjust the sensitivity of the visitordetector in the portion of the field of view.

In several embodiments, the visitor detection system comprises a camera,and using the visitor detection system to detect the first indicationwithin the first portion of the field of view comprises using the camerato take a first image. Then, the doorbell system can analyze the firstimage to detect the first indication. Embodiments can include reducing afirst sensitivity of the visitor detection system within the firstportion in response to determining that the button was not triggeredwithin a predetermined time after detecting the first indication and/orafter taking the first image. Reducing the first sensitivity can reducea first probability of causing a first alert configured to notify theremote computing device regarding a presence of a second visitor inresponse to detecting a second indication suggestive of the secondvisitor within the first portion of the field of view.

Some embodiments include using the camera to take a second image. Then,the doorbell system can analyze the second image to detect a thirdindication suggestive of a third visitor within a second portion of thefield of view. Methods can include increasing a second sensitivity ofthe visitor detection system within the second portion in response todetermining that the button was triggered within 60 seconds afterdetecting the third indication by analyzing the second image. Increasingthe second sensitivity can increase a second probability of causing asecond alert configured to notify the remote computing device regardingthe presence of the third visitor in response to detecting the thirdindication within the second portion of the field of view.

Several embodiments include using a doorbell system to detect a firstvisitor. The doorbell system can comprise a doorbell and a remotecomputing device. Methods can include obtaining the doorbell thatcomprises a camera and a button. The button can be configurable toenable the first visitor to sound a chime. Methods can also includeconfiguring the doorbell system such that the camera comprises a fieldof view; using the camera of the doorbell to take a baseline image tocalibrate the doorbell system by establishing a baseline of at least apart of the field of view; using the camera of the doorbell to take asecond image of at least the part of the field of view; determining thata first object is present in the second image, but not in the baselineimage; associating the first object with a first portion of the field ofview; determining that the button was not triggered within 60 secondsafter determining that the first object is present in the second image,but not in the baseline image; and/or excluding the first portion of thefield of view from causing an alert configured to notify the remotecomputing device regarding a presence of the first visitor. Theexcluding can be at least partially in response to determining that thebutton was not triggered within 60 seconds after detecting that thefirst object is present in the second image (but not in the baselineimages).

Associating the first object with the first portion of the field of viewcan include correlating the first object with a location within thefield of view. For example, the system can know where in the field ofview the first object was detected. This relative location informationcan be helpful so the system can determine which areas of the field ofview are causing misleading indications (e.g., as implied by anindication not being followed by a triggering of the doorbell buttonwithin 60 seconds of the system detecting the indication).

Many factors and methods can be used to exclude a portion of the fieldof view from causing an alert. For example, sound data and button datacan be combined to exclude the portion of the field of view. In someembodiments, many button press data points are used to eventuallyexclude a portion of the field of view. Thus, excluding can be at leastpartially in response to determining that the button was not triggeredwithin 60 seconds after determining that the first object is present inthe second image, but not in the baseline image, even though otherfactors and methods are ultimately used in the full exclusion decision.

Several embodiments include using the camera of the doorbell to take athird image of at least the part of the field of view; determining thata second object is present in the third image, but not in the baselineimage; associating the second object with a second portion of the fieldof view; determining that the button was triggered within 60 secondsafter determining that the second object is present in the third image,but not in the baseline image; and/or configuring the doorbell system toautomatically send the alert regarding a third object detected in thesecond portion of the field of view at least partially in response todetermining that the button was triggered within 60 seconds afterdetermining that the second object is present in the third image, butnot in the baseline image.

Some embodiments include using the camera of the doorbell to take afourth image of at least the part of the field of view; determining thatthe third object is present in the fourth image, but not in the baselineimage; associating the third object with the second portion of the fieldof view; and/or automatically sending the alert to the remote computingdevice regarding the presence of a visitor.

Several embodiments include automatically initiating the sending of thealert to the remote computing device regarding the presence of the firstvisitor prior to the first visitor pressing the button. Initiating thesending of the alert does not necessarily mean that the alert hasarrived at the remote computing device.

The baseline image can comprise several images. In some embodiments, thebaseline image is actually a collection of images taken at differenttimes. Thus, a first image can be the baseline image for a second image,and the second image can be the baseline image for a third image.

In some embodiments, the visitor detection system comprises a motiondetector. Using the visitor detection system to detect the firstindication within the first portion of the field of view can comprisedetecting a first motion within the first portion. Embodiments caninclude reducing a first sensitivity of the visitor detection systemwithin the first portion in response to determining that the button wasnot triggered within a predetermined time (e.g., 60 seconds, 30 seconds,15 seconds) after detecting the first indication. Reducing the firstsensitivity can reduce a first probability of causing an alertconfigured to notify the remote computing device regarding a presence ofa second visitor in response to detecting a second indication suggestiveof the second visitor within the first portion of the field of view.

Several embodiments include using the visitor detection system to detecta second motion within a second portion of the field of view; and/orincreasing a second sensitivity of the visitor detection system withinthe second portion in response to determining that the button wastriggered within 60 seconds after detecting the second motion.Increasing the second sensitivity can increase a second probability ofcausing the alert configured to notify the remote computing deviceregarding the presence of the second visitor in response to detectingthe second motion within the second portion of the field of view.

Some embodiments include dividing the field of view into the firstportion and the second portion such that the doorbell system isconfigured to distinguish between the first motion detected in the firstportion and the second motion detected in the second portion. A wall(e.g., a plastic blade) can be used to divide the field of view. In someembodiments, the field of view is divided with software (e.g., ratherthan being physically divided by a wall).

Several embodiments for using a doorbell to detect visitors includeobtaining the doorbell system that comprises a motion detector and abutton; configuring the doorbell system such that the motion detectorcomprises a field of view; detecting a first motion within a firstportion of the field of view; determining that the button was nottriggered within 60 seconds after detecting the first motion within thefirst portion of the field of view; and/or excluding the first portionof the field of view from causing an alert configured to notify theremote computing device regarding a presence of the first visitor. Theexcluding can be at least partially in response to determining that thebutton was not triggered within 60 seconds after detecting the firstmotion within the first portion of the field of view.

Some embodiments include detecting a second motion within a secondportion of the field of view; determining that the button was triggeredwithin 60 seconds after detecting the second motion within the secondportion of the field of view; and/or configuring the doorbell system toautomatically send the alert regarding a third motion detected in thesecond portion of the field of view at least partially in response todetermining that the button was triggered within 60 seconds afterdetecting the second motion within the second portion of the field ofview.

Several embodiments include detecting the third motion within the secondportion of the field of view; and/or automatically sending the alert tothe remote computing device regarding the presence of the first visitorin response to detecting the third motion within the second portion ofthe field of view. Methods can include automatically initiating thesending of the alert to the remote computing device regarding thepresence of the first visitor prior to the first visitor pressing thebutton.

Speed is one factor that can help distinguish between misleading motionand motion that is from an actual visitor. People tend to approachdoorbells at less than 5 miles per hour. In contrast, cars tend to driveover 25 miles per hour and often drive over 35 miles per hour. Excludingmotion that is over 5 miles per hour can help improve the accuracy ofthe doorbell system (by screening out motions that are too fast tolikely be from a visitor).

Several methods include detecting a speed of the first motion; and/orexcluding the first motion from causing the alert configured to notifythe remote computing device regarding the presence of the first visitor.The excluding can be at least partially in response to the speed beinggreater than a predetermined threshold. The predetermined threshold canbe at least 5 miles per hour and can be less than 35 miles per hour. Apredetermined threshold of 15 miles per hour provides a very reliabledividing line between people walking up to a doorbell and cars drivingin front of the doorbell. Several embodiments include a predeterminedthreshold of at least 15 miles per hour.

In some embodiments, the visitor detection system comprises the infrareddetector, wherein using the visitor detection system to detect the firstindication within the first portion of the field of view comprisesdetecting a first infrared signature within the first portion. Methodscan include reducing a first sensitivity of the visitor detection systemwithin the first portion in response to determining that the button wasnot triggered within 60 seconds after detecting the first indication.Reducing the first sensitivity can reduce a first probability of causinga first alert configured to notify the remote computing device regardinga presence of a second visitor in response to detecting a secondindication suggestive of the second visitor within the first portion ofthe field of view.

In several embodiments, the infrared detector comprises a first infraredsensor and a second infrared sensor. The doorbell can comprise a wallthat separates the first infrared sensor from the second infrared sensorsuch that the first infrared sensor is configured to detect the firstinfrared signature within the first portion and the second infraredsensor is configured to detect a second infrared signature within asecond portion of the field of view.

Some embodiments include using the infrared detector to detect a thirdindication suggestive of a third visitor within a second portion of thefield of view; and/or increasing a second sensitivity of the visitordetection system within the second portion in response to determiningthat the button was triggered within 60 seconds after detecting thethird indication. Increasing the second sensitivity can increase asecond probability of causing a second alert configured to notify theremote computing device regarding the presence of the third visitor inresponse to detecting the third indication within the second portion ofthe field of view.

Several embodiments include using a doorbell system to detect a firstvisitor. The doorbell system can comprise a doorbell and a remotecomputing device. Methods can include obtaining the doorbell thatcomprises a field of view having at least a first portion and a secondportion. The doorbell can comprise a button that is configurable toenable the first visitor to sound a chime. Embodiments can include usingdoorbell to detect a first object within the first portion of the fieldof view; and/or determining that the button was not pressed within apredetermined time after the doorbell detects the first object withinthe first portion of the field of view. Embodiments can includeexcluding the first portion of the field of view from causing an alertconfigured to notify the remote computing device regarding a presence ofthe first visitor. The excluding can be at least partially in responseto determining that the button was not triggered within 60 seconds afterthe doorbell detects the first object within the first portion of thefield of view.

Embodiments can include using the doorbell to detect a second objectwithin the second portion of the field of view; and/or sending the alertto the remote computing device in response to the doorbell detecting thesecond object within the second portion of the field of view.

Several embodiments include using a doorbell system to detect a firstvisitor. The doorbell system can comprise a doorbell and a remotecomputing device such as a smartphone, laptop, tablet, or desktopcomputer. Some embodiments include obtaining the doorbell that comprisesa camera, a speaker, a microphone, and a button, wherein the button isconfigurable to enable the first visitor to sound a chime. Methods caninclude configuring the camera of the doorbell such that the cameracomprises a field of view, and using the camera of the doorbell to takea first image. The doorbell system can send the first image from thedoorbell to the remote computing device, which can comprise anelectronic display (e.g., a computer screen). Some methods includedisplaying the first image on the electronic display of the remotecomputing device and prompting a user of the remote computing device toselect a first detection zone within the first image. The firstdetection zone can comprise a portion of the first image.

Some embodiments include using the camera of the doorbell to take asecond image, analyzing the second image to detect a first indication ofthe first visitor, and determining that the first indication of thefirst visitor in the second image is located outside of the firstdetection zone. The doorbell system can then decide not to send an alertto the remote computing device in response to determining that the firstindication of the first visitor in the second image is located outsideof the first detection zone. The alert can be configured to notify theremote computing device regarding a presence of the first visitor.

Analyzing the second image can include determining if there are signs ofseeing the visitor in the second image. In some embodiments, the systemlooks for indications of motion in the image. In several embodiments,the system compares a baseline image (e.g., the first image) to thesecond image in order to determine if there are areas in the secondimage that include an object (e.g., a visitor) that was not present inthe first image. Thus, some embodiments use computer vision to identifythe presence of a visitor within the detection zone.

Several embodiments include using the camera of the doorbell to take athird image, and analyzing the third image to detect a second indicationof the first visitor. Methods can include determining that the secondindication of the first visitor in the third image is located inside ofthe first detection zone, and then sending the alert to the remotecomputing device in response to determining that the second indicationof the first visitor in the third image is located inside of the firstdetection zone. In some embodiments, the alert is not sent unless otherconditions are met.

Some embodiments include displaying a grid pattern on the first image onthe electronic display of the remote computing device such that thefirst image is divided into at least ten sections by lines that crosseach other. The lines can include horizontal and vertical lines thatintersect at 90 degree angles. The lines can be straight, curved, and/orwavy. The sections can be equal in size and shape. The sections can beirregular and can vary in size. Methods can include preventing thesending of the alert to the remote computing device until afterdetecting an indication of a visitor in at least two, four, and/or eightof the sections. Methods can include preventing the sending of the alertto the remote computing device until after detecting an indication of avisitor in at least twenty percent and/or forty percent of the sections.

Several methods include selecting the first detection zone within thefirst image by the user touching at least a first subset of the sectionson the electronic display of the remote computing device. Touching thefirst subset causes the first subset to be included in the firstdetection zone. The electronic display can be a touchscreen of acomputer such as a smartphone or tablet. The user of the remotecomputing device can swipe the touchscreen to select a detection zone.Touching or clicking on each section is not necessary in someembodiments.

Some methods include causing a second subset of the sections to beincluded in the first detection zone in response to the first subsetcomprising an outer perimeter that surrounds the second subset. Forexample, the user can swipe the touchscreen to form a closed shape. Allsections at least partially located within the closed shape can beincluded in the first detection zone.

Some embodiments include two, three, four, and/or many detection zones,which can be independent, interdependent, separate, and/or overlapping.Detecting a visitor in a first detection zone can lead to immediatelynotifying the user of the remote computing device. Detecting a visitorin a second detection zone can include additional safeguards againstfalse-positives.

Several embodiments include selecting the first detection zone bydisplaying the first image on the electronic display and then recordingwhich areas of the first image the user indicates to include in thefirst detection zone by touching the electronic display. Some methodsinclude calculating a percentage of the first detection zone thatincludes the second indication of the first visitor. The percentage canbe a percentage of the area of the detection zone or can be a percentageof the sections. Methods can include sending the alert to the remotecomputing device in response to determining that the percentage of thedetection zone exceeds a first threshold. The first threshold can be 10percent or 30 percent.

Some methods include sending a picture of a visitor to the remotecomputing device, and then waiting to open audio and/or videocommunication between the visitor and the user of the remote computingdevice until after determining a percentage of the first detection zonethat includes an indication of the third visitor and calculating a timein which the indication of the third visitor has been in the firstdetection zone. Embodiments can include opening the audio communicationbetween the third visitor and the user of the remote computing device inresponse to the percentage of the detection zone and the time. Thepercentage can be at least 10 percent and/or at least 25 percent. Thetime can be at least one second and/or at least four seconds.

Indications of the visitor can be motion indications. Motion indicationscan be identified by comparing a baseline image to another image. Thebaseline image can be taken when a visitor is not present. Otherindications of the visitor can include presence indications (e.g.,indications that at least a portion of the visitor is present in thesection being analyzed).

Some embodiments include selecting the first detection zone bydisplaying the first image on the electronic display and then recordingwhich areas of the first image the user indicates to include in thefirst detection zone by touching the electronic display. The remotecomputing device can prompt the user to select areas and/or sections toinclude in a detection zone. In some embodiments, the remote computingdevice does not display a grid on the calibration image, but the remotecomputing device prompts the user to select a portion of the image asthe detection zone and/or prompts the user to select a portion of theimage to exclude from the detection zone.

Several embodiments include calculating a percentage of the firstdetection zone that includes the second indication of the first visitorand/or calculating a time in which the second indication of the firstvisitor has been in the first detection zone. Methods can includesending the alert to the remote computing device in response to thepercentage of the detection zone and the time.

The images used in several methods do not necessarily include the entirefield of view of the camera of the doorbell. In some embodiments, thefield of view comprises a portion, and the first image, the secondimage, and the third image consist of the portion of the field of view.Methods can further comprise selecting the portion of the field of view.In some embodiments, the images include the entire field of view of thecamera.

The portion of the field of view can be consistent between thecalibration image and subsequent images to help the system accuratelyanalyze the images. In some methods, the first image, the second image,and the third image consist of at least a portion of the field of view,wherein the method further comprises analyzing the portion of the fieldof view.

Although doorbells can be used anywhere, in some embodiments, the cameraof the doorbell is configured to record a portion of an entryway,wherein the first image, the second image, and the third image show theportion of the entryway.

In some embodiments, the doorbell and the remote computing device arenot physically coupled. Methods can include wirelessly sending the firstimage from the doorbell to the remotely located computing device. Someembodiments include sending the first image directly from the doorbellto the remote computing device without an intermediary server. Thisdirect transmission can be via wires or can be wireless. Severalembodiments include intermediary servers that enable the doorbell tocommunicate with the remote computing device via the Internet.

Methods for using a doorbell system to detect a first visitor caninclude obtaining the doorbell that comprises a camera and a button. Thecamera can be configured such that the camera has a field of view.Several embodiments include using the camera of the doorbell to take afirst image to calibrate the doorbell system and sending the first imagefrom the doorbell to the remote computing device. Some methods includedisplaying the first image on the electronic display of the remotecomputing device. Several embodiments include prompting a user of theremote computing device to select a first detection zone within thefirst image. The first detection zone can comprise at least a portion ofthe first image. Methods can include configuring the doorbell system toignore a second visitor located within the field of view but locatedoutside of the first detection zone. Ignoring the second visitor caninclude failing to send a notification regarding the second visitor tothe remote computing device (e.g., even if the doorbell otherwiseresponds to the second visitor, for example, by flashing an LED light).

The system can ignore a visitor by not sending an alert regarding thevisitor to the remote computing device. In some embodiments, the systemdoes not send an alert to the remote computing device in response to thepresence of the visitor outside the detection zone but inside the fieldof view of the camera and/or inside the image. Even when the systemignores a visitor, the system can record the visitor for futurereference by the user. The user can then request to see visitors whowere inside the field of view but not shown via alerts (because theywere ignored due to being located outside the detection zone). Thus, thesystem can ignore the visitor in response to the presence of the visitoroutside the detection zone, but the system can later provide informationregarding the visitor to the user in response to a user's request.Sending an alert can include sending a push notification to asmartphone.

Several methods include configuring the doorbell system to send apicture of a third visitor to the remote computing device in response todetermining that the third visitor is located inside of the firstdetection zone as defined based on the first image. The first detectionzone can be a two-dimensional zone rather than a three-dimensional areaof the physical world. Thus, the detection zone can be decoupled fromproximity.

Some method embodiments include enabling audio and/or videocommunication between a visitor and the user of the remote computingdevice in response to detecting at least one indication of the visitorin at least two of the sections and/or in at least ten of the sections.In some embodiments, the sections with the detected indications must beadjacent to each other.

Some embodiments include selecting the first detection zone within thefirst image by prompting the user of the remote computing device toindicate a first area by touching the first area on the electronicdisplay of the remote computing device; recording the first area; andexcluding the first area from the first detection zone. Methods caninclude ignoring a visitor in response to the visitor being located inthe first area. The user can select areas for exclusion from thedetection zone and can select areas for inclusion in the detection zone.

Doorbells can comprise a motion sensor. Some embodiments include aninfrared motion sensor. Methods can comprise ignoring the second visitorin response to disabling the motion sensor during a predetermined timeperiod. The predetermined time period can be during certain hours of theday or night. The time period can be when the user is home or away fromhome (e.g., where the doorbell is mechanically coupled to the home). Asused herein, “home” can include any type of stationary structureconfigured to shelter people (e.g., an office building).

Several embodiments include using a doorbell system to detect at leastone visitor. Methods can include configuring the camera of the doorbellsuch that the camera comprises a field of view and using the camera ofthe doorbell to take a first image to calibrate the doorbell system byestablishing a baseline of an entryway. The baseline can be used todefine a state without any visitors. Methods can include sending thefirst image from the doorbell to the remote computing device anddisplaying the first image on an electronic display of the remotecomputing device.

Some methods include prompting a user of the remote computing device toselect a first detection zone within the first image. The firstdetection zone can comprise a portion of the first image. The firstdetection zone can include a two-dimensional representation of an areain which the doorbell system is configured to respond to motiondetection. Several embodiments include displaying a grid pattern on thefirst image on the electronic display of the remote computing devicesuch that the first image is divided into at least six sections by linesthat cross each other. The system can be configured to identify thefirst detection zone within the first image by the user choosing atleast a first subset of the sections on the electronic display of theremote computing device. Choosing the first subset can cause the firstsubset to be included in the first detection zone.

Several methods include configuring the doorbell system to ignore asecond visitor located within the field of view but located outside ofthe first detection zone. Some embodiments include configuring thedoorbell system to send a picture of a third visitor to the remotecomputing device in response to at least some of the following factors:(1) determining that the third visitor is located inside of the firstdetection zone as defined based on the first image, (2) determining thatat least a predetermined percentage (e.g., thirty percent) of the firstdetection zone includes motion or visitors indicators, and (3)determining that the first detection zone has included the indicatorsfor at least a predetermined amount of time (e.g., three seconds).

Some methods include automatically excluding an area from a detectionzone. Automatic exclusion can occur without the user excluding aspecific area (even if the user configures settings that later lead toautomatic exclusions). In some embodiments, indications indicative ofmotorized vehicles (e.g., cars, trucks, vans) are automatically excludedfrom a detection zone. These automatic calibration innovations can takemany forms. Several methods include automatically excluding an area froma detection zone in response to detecting an object (e.g., a motorizedvehicle) moving through the first detection zone at more thantwenty-five miles per hour. Some methods include automatically excludingan area in response to detecting an infrared signal indicative of amotorized vehicle.

Some embodiments include automatically excluding an area from the firstdetection zone in response to at least some of the following items: (1)detecting an indication of a visitor in a detection zone; (2) enablingaudio communication between the doorbell and the remote computing devicein response to detecting the indication of the visitor; and (3) usingthe doorbell to detect an absence of sound indicative of speaking. Thearea that is excluded can be the area in which the indication wasdetected.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 illustrates a front view of a communication system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates an embodiment in which a security system is connectedto a building, according to some embodiments.

FIGS. 4 and 5 illustrate diagrammatic views of a camera's field of view,according to some embodiments.

FIG. 6 illustrates a front view of a remote computing device displayinga grid pattern on an image taken by a camera of a doorbell, according tosome embodiments.

FIG. 7 illustrates a front view of a remote computing device displayinga grid pattern on which sections have been selected to be part of adetection zone, according to some embodiments, according to someembodiments.

FIG. 8 illustrates a front view of a remote computing device displayinga visitor partially located inside of a detection zone, according tosome embodiments.

FIG. 9 illustrates a diagrammatic view of a doorbell system, accordingto some embodiments.

FIG. 10 illustrates a diagrammatic view of a doorbell that has a fieldof view, according to some embodiments.

FIG. 11 illustrates a diagrammatic view of a visitor located within thefield of view from FIG. 10, according to some embodiments.

FIG. 12 illustrates a diagrammatic view of an infrared signature of thevisitor shown in FIG. 11, according to some embodiments.

FIG. 13 illustrates a diagrammatic view of a motion indication of thevisitor shown in FIG. 11, according to some embodiments.

FIGS. 14 and 15 illustrate diagrammatic views of the field of view shownin FIG. 10, according to some embodiments.

FIG. 16 illustrates a diagrammatic view with a wall dividing the fieldof view from FIG. 10, according to some embodiments.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed below, inventivesubject matter extends beyond the specifically disclosed embodiments toother alternative embodiments and/or uses, and to modifications andequivalents thereof. Thus, the scope of the claims appended hereto isnot limited by any of the particular embodiments described below. Forexample, in any method or process disclosed herein, the acts oroperations of the method or process may be performed in any suitablesequence and are not necessarily limited to any particular disclosedsequence. Various operations may be described as multiple discreteoperations in turn, in a manner that may be helpful in understandingcertain embodiments; however, the order of description should not beconstrued to imply that these operations are order dependent.Additionally, the structures, systems, and/or devices described hereinmay be embodied as integrated components or as separate components.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

Doorbell systems can include a doorbell, a remote computing device, anda means of communication between the doorbell and the remote computingdevice. The means of communication can include the Internet, a wirelessnetwork, and/or a server. In some embodiments, the doorbell communicateswith the remote computing device without using a server.

Doorbells can include a means of visitor detection. For example, thedoorbell can use a motion sensor. In some embodiments, the camera of thedoorbell can be used to detect visitors by comparing a baseline image toa second image taken when the visitor is present.

False positives can be problematic. Thus, some embodiments includedefining at least one detection zone within the field of view (FOV) ofthe camera. The doorbell system can be configured such that areasoutside of the detection zones will not trigger sending a notificationto a user of a remote computing device.

The detection zones can be created using many different methods. In somemethods, a picture taken by the camera of the doorbell is displayed onthe remote computing device. The picture is divided into sections by agrid. The user can select which areas of the grid should be included inthe detection zones.

FIG. 1 illustrates a security system 202 (e.g., a doorbell) thatincludes a camera assembly 208 and a motion detector 218. When a visitorapproaches the security system 202 (e.g., rings a doorbell button 212),the security system 202 can send a wireless notification to a computingdevice 204 that is located remotely relative to the security system 202.

System Embodiments

Communication systems can provide a secure and convenient way for aremotely located individual to communicate with a person who isapproaching a sensor, such as a proximity sensor or motion sensor, orwith a person who rings a doorbell, which can be located in a doorway,near an entrance, or within 15 feet of a door. Some communicationsystems allow an individual to hear, see, and talk with visitors whoapproach at least a portion of the communication system and/or press abutton, such as a doorbell's button. For example, communication systemscan use a computing device to enable a remotely located person to see,hear, and/or talk with visitors. Computing devices can includecomputers, laptops, tablets, mobile devices, smartphones, cellularphones, and wireless devices (e.g., cars with wireless communication).Example computing devices include the iPhone, iPad, iMac, MacBook Air,and MacBook Pro made by Apple Inc. Communication between a remotelylocated person and a visitor can occur via the Internet, cellularnetworks, telecommunication networks, and wireless networks.

Referring now to FIG. 1, communication systems can be a portion of asmart home hub. In some embodiments, the communication system 200 formsthe core of the smart home hub. For example, the various systemsdescribed herein enable complete home automation. In some embodiments,the security system 202 controls various electrical items in a home(e.g., lights, air conditioners, heaters, motion sensors, garage dooropeners, locks, televisions, computers, entertainment systems, poolmonitors, elderly monitors). In some embodiments, the computing device204 controls the security system 202 and other electrical items in ahome (e.g., lights, air conditioners, heaters, motion sensors, garagedoor openers, locks, televisions, computers, entertainment systems, poolmonitors, elderly monitors).

FIG. 1 illustrates a front view of a communication system embodiment.The communication system 200 can include a security system 202 (e.g., adoorbell) and a computing device 204. Although the illustrated securitysystem 202 includes many components in one housing, several securitysystem embodiments include components in separate housings. The securitysystem 202 can include a camera assembly 208 and a doorbell button 212.The camera assembly 208 can include a video camera, which in someembodiments is a webcam. The security system 202 can include adiagnostic light 216 and a power indicator light 220. In someembodiments, the diagnostic light 216 is a first color (e.g., blue) ifthe security system 202 and/or the communication system 200 is connectedto a wireless Internet network and is a second color (e.g., red) if thesecurity system 202 and/or the communication system 200 is not connectedto a wireless Internet network. In some embodiments, the power indicator220 is a first color if the security system 202 is connected to a powersource. The power source can be power supplied by the building to whichthe security system 202 is attached. In some embodiments, the powerindicator 220 is a second color or does not emit light if the securitysystem 202 is not connected to the power source.

The security system 202 (e.g., a doorbell) can include an outer housing224, which can be water resistant and/or waterproof. The outer housingcan be made from metal or plastic, such as molded plastic with ahardness of 60 Shore D. In some embodiments, the outer housing 224 ismade from brushed nickel or aluminum.

Rubber seals can be used to make the outer housing 224 water resistantor waterproof. The security system 202 can be electrically coupled to apower source, such as wires electrically connected to a building'selectrical power system. In some embodiments, the security system 202includes a battery for backup and/or primary power.

Wireless communication 230 can enable the security system 202 (e.g., adoorbell) to communicate with the computing device 204. Some embodimentsenable communication via cellular and/or WiFi networks. Some embodimentsenable communication via the Internet. Several embodiments enable wiredcommunication between the security system 202 and the computing device204. The wireless communication 230 can include the followingcommunication means: radio, WiFi (e.g., wireless local area network),cellular, Internet, Bluetooth, telecommunication, electromagnetic,infrared, light, sonic, and microwave. Other communication means areused by some embodiments. In some embodiments, such as embodiments thatinclude telecommunication or cellular communication means, the securitysystem 202 can initiate voice calls or send text messages to a computingdevice 204 (e.g., a smartphone, a desktop computer, a tablet computer, alaptop computer).

Several embodiments use near field communication (NFC) to communicatebetween the computing device 204 and the security system 202; betweenthe security system 202 and the door lock 250; and/or between thecomputing device 204 and the door lock 250. The security system 208, thecomputing device 204, and/or the door lock 250 can include a NFC tag.Some NFC technologies include Bluetooth, radio-frequency identification,and QR codes.

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. Some embodiments includesoftware designed to run on desktop computers and laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

FIG. 2 illustrates a computing device 204 running software. The softwareincludes a user interface 240 displayed on a display screen 242. Theuser interface 240 can include a security system indicator 244, whichcan indicate the location of the security system that the user interfaceis displaying. For example, a person can use one computing device 204 tocontrol and/or interact with multiple security systems, such as onesecurity system located at a front door and another security systemlocated at a back door. Selecting the security system indicator 244 canallow the user to choose another security system (e.g., the back doorsecurity system rather than the front door security system).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator can indicate whether thecomputing device is in communication with a security system, theInternet, and/or a cellular network. The connectivity indicator 248 canalert the user if the computing device 204 has lost its connection withthe security system 202; the security system 202 has been damaged; thesecurity system 202 has been stolen; the security system 202 has beenremoved from its mounting location; the security system 202 lostelectrical power; and/or if the computing device 204 cannot communicatewith the security system 202. In some embodiments, the connectivityindicator 248 alerts the user of the computing device 204 by flashing,emitting a sound, displaying a message, and/or displaying a symbol.

In some embodiments, if the security system 202 loses power, losesconnectivity to the computing device 204, loses connectivity to theInternet, and/or loses connectivity to a remote server, a remote server206 sends an alert (e.g., phone call, text message, image on the userinterface 240) regarding the power and/or connectivity issue. In severalembodiments, the remote server 206 can manage communication between thesecurity system 202 and the computing device. In some embodiments,information from the security system 202 is stored by the remote server206. In several embodiments, information from the security system 202 isstored by the remote server 206 until the information can be sent to thecomputing device 204, uploaded to the computing device 204, and/ordisplayed to the remotely located person via the computing device 204.The remote server 206 can be a computing device that stores informationfrom the security system 202 and/or from the computing device 204. Insome embodiments, the remote server 206 is located in a data center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202. If thecomputing device 204 and/or the remote server 206 is unable tocommunicate with the security system 202, the computing device 204and/or the remote server 206 alerts the remotely located person via thesoftware, phone, text, a displayed message, and/or a website. In someembodiments, the computing device 204 and/or the remote server 206attempts to communicate with the security system 202 periodically; atleast every five hours and/or less than every 10 minutes; at least every24 hours and/or less than every 60 minutes; or at least every hourand/or less than every second.

In some embodiments, the server 206 can initiate communication to thecomputer device 204 and/or to the security system 202. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the security system202.

In several embodiments, a user can log into an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the security systemsettings discussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a security system due to the user'srequest rather than due to actions of a visitor. Some embodimentsinclude a computing device initiating a live video feed (or a video feedthat is less than five minutes old).

In some embodiments, the user interface 240 displays an image 252 suchas a still image or a video of an area near and/or in front of thesecurity system 202. The image 252 can be taken by the camera assembly208 and stored by the security system 202, server 206, and/or computingdevice 204. The user interface 240 can include a recording button 256 toenable a user to record images, videos, and/or sound from the cameraassembly 208, microphone of the security system 202, and/or microphoneof the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the security system 202. The user interface 240can also include a sound adjustment button 264 and a mute button 268.The user interface 240 can include camera manipulation buttons such aszoom, pan, and light adjustment buttons. In some embodiments, the cameraassembly 208 automatically adjusts between Day Mode and Night Mode. Someembodiments include an infrared camera and/or infrared lights toilluminate an area near the security system 202 to enable the cameraassembly 208 to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, and touching a touch screen. Many embodimentsinclude buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton, which can allow a user to select the quality and/or amount ofthe data transmitted from the security system 202 to the computingdevice 204 and/or from the computing device 204 to the security system202.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

The user interface 240 can include a termination button 276 to endcommunication between the security system 202 and the computing device204. In some embodiments, the termination button 276 ends the ability ofthe person located near the security system 202 (i.e., the visitor) tohear and/or see the user of the computing device 204, but does not endthe ability of the user of the computing device 204 to hear and/or seethe person located near the security system 202.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and is a termination button (toend communication between the security system 202 and the computingdevice 204). The button 276 can include the word “Answer” when thesystem is attempting to establish two-way communication between thevisitor and the user. Selecting the button 276 when the system isattempting to establish two-way communication between the visitor andthe user can start two-way communication. The button 276 can include thewords “End Call” during two-way communication between the visitor andthe user. Selecting the button 276 during two-way communication betweenthe visitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe security system and to stop emitting sounds recorded by the securitysystem.

In some embodiments, the user interface 240 opens as soon as thesecurity system detects a visitor (e.g., senses indications of avisitor). Once the user interface 240 opens, the user can see and/orhear the visitor even before “answering” or otherwise accepting two-waycommunication, in several embodiments.

Some method embodiments include detecting a visitor with a securitysystem. The methods can include causing the user interface to display ona remote computing device 204 due to the detection of the visitor (e.g.,with or without user interaction). The methods can include displayingvideo from the security system and/or audio from the security systembefore the user accepts two-way communication with the visitor. Themethods can include displaying video from the security system and/oraudio from the security system before the user accepts the visitor'scommunication request. The methods can include the computing devicesimultaneously asking the user if the user wants to accept (e.g.,answer) the communication request and displaying audio and/or video ofthe visitor. For example, in some embodiments, the user can see and hearthe visitor via the security system before opening a means of two-waycommunication with the visitor.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device might wonder whatis happening near the security system 202. The user can open thesoftware application on the computing device 204 and instruct theapplication to show live video and/or audio from the security device 202even if no event near the security system 202 has triggered thecommunication.

In several embodiments, the security device 202 can be configured torecord when the security device 202 detects movement and/or the presenceof a person. The user of the computing device 204 can later review allvideo and/or audio records when the security device 202 detectedmovement and/or the presence of a person.

Referring now to FIG. 1, in some embodiments, the server 206 controlscommunication between the computing device 204 and the security system202, which can be a doorbell with a camera, a microphone, and a speaker.In several embodiments, the server 206 does not control communicationbetween the computing device 204 and the security system 202.

In some embodiments, data captured by the security system and/or thecomputing device 204 (such as videos, pictures, and audio) is stored byanother remote device such as the server 206. Cloud storage, enterprisestorage, and/or networked enterprise storage can be used to store video,pictures, and/or audio from the communication system 200 or from anypart of the communication system 200. The user can download and/orstream stored data and/or storage video, pictures, and/or audio. Forexample, a user can record visitors for a year and then later can reviewconversations with visitors from the last year. In some embodiments,remote storage, the server 206, the computing device 204, and/or thesecurity system 202 can store information and statistics regardingvisitors and usage.

FIG. 3 illustrates an embodiment in which a security system 202 isconnected to a building 300, which can include an entryway 310 that hasa door 254. A door lock 250 can be configured to lock and unlock thedoor 254. Electrical wires 304 can electrically couple the securitysystem 202 to the electrical system of the building 300 such that thesecurity system 202 can receive electrical power from the building 300.

A wireless network 308 can allow devices to wirelessly access theInternet. The security system 202 can access the Internet via thewireless network 308. The wireless network 308 can transmit data fromthe security system 202 to the Internet, which can transmit the data toremotely located computing devices 204. The Internet and wirelessnetworks can transmit data from remotely located computing devices 204to the security system 202. In some embodiments, a security system 202connects to a home's WiFi.

As illustrated in FIG. 3, one computing device 204 (e.g., a laptop, asmartphone, a mobile computing device, a television) can communicatewith multiple security systems 202. In some embodiments, multiplecomputing devices 204 can communicate with one security system 202.

In some embodiments, the security system 202 can communicate (e.g.,wirelessly 230) with a television 306, which can be a smart television.Users can view the television 306 to see a visitor and/or talk with thevisitor.

As used herein, an “electronic device” is capable of displaying images,including videos. An electronic device consumes electrical power and iscapable of running software. As used herein, the term “electronicdevice” should not be confused with the term “electronic key.” Manyelectronic key embodiments are not capable of displaying images,consuming electrical power, or running software.

Visitor Detection

Referring now to FIGS. 1 and 3, methods can include using a doorbell(e.g., security system 202) that is configurable to wirelesslycommunicate with a remotely located computing device 204, such as acellular telephone, laptop, or tablet. Some embodiments includeobtaining a doorbell that comprises a speaker, a microphone, a camera,and a button. In some embodiments, the camera acts as a motion sensor. Adoorbell can include an infrared motion detection system (e.g., motiondetector 218). The button 212 of the doorbell can be configurable toenable a visitor to sound a chime 302 (e.g., a speaker or another soundemission device located inside of a building). Some chimes are digitaland some chimes are mechanical.

Several embodiments include using a doorbell system (e.g., communicationsystem 200) to detect a first visitor. The doorbell system can comprisea doorbell and a remote computing device 204 such as a smartphone,laptop, tablet, or desktop computer. Some embodiments include obtainingthe doorbell that comprises a camera, a speaker, a microphone, and abutton, wherein the button is configurable to enable the first visitorto sound a chime.

FIG. 4 illustrates a camera's field of view 840. Methods can includeconfiguring the camera of the doorbell such that the camera comprises afield of view 840, and using the camera of the doorbell to take a firstimage 842. The doorbell system can send the first image 842 from thedoorbell to the remote computing device, which can comprise anelectronic display 242 (shown in FIG. 2). Some methods includedisplaying the first image 842 on the electronic display 242 of theremote computing device, and prompting a user of the remote computingdevice to select a first detection zone 846 within the first image 842.The first detection zone 846 can comprise a portion of the first image842. The first image 842 can comprise all or a portion of the camera'sfield of view 840.

In FIG. 4, the visitor 844 is located inside of the detection zone 846.An indication 850 of the visitor 844 is also located inside of thedetection zone 846. The indication 850 can be any evidence or data thatsuggests the presence of the visitor 844. In FIG. 5, the visitor 844 andthe indication 850 are located outside of the detection zone 846 in asecond image 846. The first image 842 (shown in FIG. 4) and the secondimage 846 can show the same area (e.g., can include the same portion ofthe field of view 840). The detection zone 846 can consist of the samearea (e.g., of an entryway) in both the first image 842 and the secondimage 846. In some embodiments, the first image 842 does not include avisitor 844 to help calibrate the system to a visitor-free state.

Some embodiments include using the camera of the doorbell to take asecond image, analyzing the second image to detect a first indication ofthe first visitor, and determining that the first indication of thefirst visitor in the second image is located outside of the firstdetection zone. The doorbell system can then decide not to send an alert232 (shown in FIG. 1) to the remote computing device in response todetermining that the first indication of the first visitor in the secondimage is located outside of the first detection zone. The alert 232 canbe configured to notify the remote computing device 204 (shown inFIG. 1) regarding a presence of the first visitor.

Analyzing the second image can include determining if there are signs ofseeing the visitor in the second image. In some embodiments, the systemlooks for indications of motion in the image. In several embodiments,the system compares a baseline image (e.g., the first image) to thesecond image in order to determine if there are areas in the secondimage that include an object (e.g., a visitor) that was not present inthe first image. Thus, some embodiments use computer vision to identifythe presence of a visitor within the detection zone.

Several embodiments include using the camera of the doorbell to take athird image and analyzing the third image to detect a second indicationof the first visitor. Methods can include determining that the secondindication of the first visitor in the third image is located inside ofthe first detection zone, and then sending the alert to the remotecomputing device in response to determining that the second indicationof the first visitor in the third image is located inside of the firstdetection zone. In some embodiments, the alert is not sent unless otherconditions are met.

FIG. 6 illustrates a front view of a remote computing device 204displaying a grid pattern 254 on an image 842. Some embodiments includedisplaying a grid pattern 254 on the first image 842 on the electronicdisplay 242 of the remote computing device 204 such that the first image842 is divided into sections 528 by lines 532 that cross each other.(Not all sections 528 and lines 532 are labeled in FIGS. 6-9 to increasethe clarity of various features.)

The lines 532 can include horizontal lines and vertical lines thatintersect at 90 degree angles. The lines can be straight, curved, and/orwavy. The sections can be equal in size and shape. The sections can beirregular and can vary in size. Methods can include preventing thesending of the alert to the remote computing device until afterdetecting an indication of a visitor in at least two, four, and/or eightof the sections. Methods can include preventing the sending of the alertto the remote computing device until after detecting an indication of avisitor in at least twenty percent and/or forty percent of the sections(e.g., of a detection zone).

FIG. 7 illustrates a subset 538 of the sections 528 that have beenselected as part of a detection zone. Several methods include selectingthe first detection zone within the first image 842 by the user touchingat least a first subset 538 of the sections 528 on the electronicdisplay 242 of the remote computing device 204. Touching the firstsubset 538 can cause the first subset 538 to be included in the firstdetection zone. The electronic display 242 can be a touchscreen of acomputer such as a smartphone, tablet, or laptop. The user of the remotecomputing device 204 can swipe the touchscreen to select a detectionzone.

Touching or clicking on each section is not necessary in someembodiments. Some methods include causing a second subset 542 of thesections to be included in the first detection zone in response to thefirst subset 538 comprising an outer perimeter that surrounds the secondsubset 542. For example, the user can swipe the touchscreen to form aclosed shape. All sections at least partially located within the closedshape can be included in the first detection zone.

Some embodiments include two, three, four, and/or many detection zones,which can be independent, interdependent, separate, and/or overlapping.Detecting a visitor in a first detection zone can lead to immediatelynotifying the user of the remote computing device. Detecting a visitorin a second detection zone can include additional safeguards againstfalse-positives.

Several embodiments include selecting the first detection zone bydisplaying the first image on the electronic display and then recordingwhich areas (e.g., sections 528) of the first image the user indicatesto include in the first detection zone by touching the electronicdisplay. Some methods include calculating a percentage of the firstdetection zone that includes the second indication of the first visitor.The percentage can be a percentage of the area of the detection zone orcan be a percentage of the sections. Methods can include sending thealert to the remote computing device in response to determining that thepercentage of the detection zone exceeds a first threshold. The firstthreshold can be 10 percent or 30 percent.

Some methods include sending a picture of a visitor to the remotecomputing device, and then waiting to open audio and/or videocommunication between the visitor and the user of the remote computingdevice until after determining a percentage of the first detection zonethat includes an indication of the visitor and calculating a time inwhich the indication of the visitor has been in the first detectionzone. Embodiments can include opening the audio communication betweenthe visitor and the user of the remote computing device in response tothe percentage of the detection zone and the time. The percentage can beat least 10 percent and/or at least 25 percent. The time can be at leastone second and/or at least four seconds.

Indications of the visitor can be motions indications. Motionindications can be identified by comparing a baseline image to anotherimage. The baseline image can be taken when a visitor is not present.Other indications of the visitor can include presence indications (e.g.,indications that at least a portion of the visitor is present in thesection being analyzed).

Some embodiments include selecting the first detection zone bydisplaying the first image on the electronic display and then recordingwhich areas of the first image the user indicates to include in thefirst detection zone by touching the electronic display. The remotecomputing device can prompt the user to select areas and/or sections toinclude in a detection zone. In some embodiments, the remote computingdevice does not display a grid on the calibration image, but the remotecomputing device prompts the user to select a portion of the image asthe detection zone and/or prompts the user to select a portion of theimage to exclude from the detection zone.

Several embodiments include calculating a percentage of the firstdetection zone that includes the second indication of the first visitorand/or calculating a time in which the second indication of the firstvisitor has been in the first detection zone. Methods can includesending the alert to the remote computing device in response to thepercentage of the detection zone and the time.

The images used in several methods do not necessarily include the entirefield of view of the camera of the doorbell. In some embodiments, thefield of view comprises a portion, and the first image, the secondimage, and the third image consist of the portion of the field of view.Methods can further comprise selecting the portion of the field of view.In some embodiments, the images include the entire field of view of thecamera.

The portion of the field of view can be consistent between thecalibration image and subsequent images to help the system accuratelyanalyze the images. In some methods, the first image, the second image,and the third image consist of at least a portion of the field of view,wherein the method further comprises analyzing the portion of the fieldof view.

Referring now To FIG. 3, although doorbells can be used anywhere, insome embodiments, the camera of the doorbell is configured to record aportion of an entryway 310, wherein the first image, the second image,and the third image show the portion of the entryway 310.

In some embodiments, the doorbell (e.g., 202) and the remote computingdevice 204 are not physically coupled. Methods can include wirelesslysending the first image from the doorbell to the remotely locatedcomputing device. Some embodiments include sending the first imagedirectly from the doorbell to the remote computing device without anintermediary server (e.g., 206 in FIG. 1). This direct transmission canbe via wires or can be wireless. Several embodiments includeintermediary servers that enable the doorbell to communicate with theremote computing device via the Internet.

FIG. 8 illustrates a visitor 844 in a second image 852. The visitor ispartially in the detection zone 846 (which was explained in the contextof FIG. 7). The detection zone 846 was defined by selecting the subsets538, 542 in FIG. 7. By analyzing the detection zone 846, the system candetect indications of the visitor 844. The system can ignore visitorindications located outside of the detection zone 846. Visitorindications can include motion and/or infrared signatures indicative ofhumans. In some embodiments, the system analyzes an image to identifyshapes indicative of humans.

Methods for using a doorbell system to detect a first visitor caninclude obtaining the doorbell that comprises a camera and a button. Thecamera can be configured such that the camera has a field of view.Several embodiments include using the camera of the doorbell to take afirst image to calibrate the doorbell system and sending the first imagefrom the doorbell to the remote computing device. Some methods includedisplaying the first image on the electronic display of the remotecomputing device. Several embodiments include prompting a user of theremote computing device to select a first detection zone within thefirst image. The first detection zone can comprise at least a portion ofthe first image. Methods can include configuring the doorbell system toignore a second visitor located within the field of view but locatedoutside of the first detection zone.

The system can ignore a visitor by not sending an alert regarding thevisitor to the remote computing device. In some embodiments, the systemdoes not send an alert to the remote computing device in response to thepresence of the visitor outside of the detection zone but inside of thefield of view of the camera and/or inside of the image. Even when thesystem ignores a visitor, the system can record the visitor for futurereference by the user. The user can then request to see visitors whowere inside of the field of view but not shown via alerts (because theywere ignored due to being located outside of the detection zone). Thus,the system can ignore the visitor in response to the presence of thevisitor outside of the detection zone, but the system can later provideinformation regarding the visitor to the user in response to a user'srequest. Sending an alert can include sending a push notification to asmartphone.

Several methods include configuring the doorbell system to send apicture of a third visitor to the remote computing device in response todetermining that the third visitor is located inside of the firstdetection zone as defined based on the first image. The first detectionzone can be a two-dimensional zone rather than a three dimensional areaof the physical world. Thus, the detection zone can be decoupled fromproximity.

Some method embodiments include enabling audio and/or videocommunication between a visitor and the user of the remote computingdevice in response to detecting at least one indication of the visitorin at least two of the sections and/or in at least ten of the sections.In some embodiments, the sections with the detected indications must beadjacent to each other.

Some embodiments include selecting the first detection zone within thefirst image by prompting the user of the remote computing device toindicate a first area by touching the first area on the electronicdisplay of the remote computing device; recording the first area; andexcluding the first area from the first detection zone. Methods caninclude ignoring a visitor in response to the visitor being located inthe first area.

Doorbells can comprise a motion sensor. Some embodiments include aninfrared motion sensor. Methods can comprise ignoring the second visitorin response to disabling the motion sensor during a predetermined timeperiod. The predetermined time period can be during certain hours of theday or night. The time period can be when the user is home or away fromhome (e.g., where the doorbell is mechanically coupled to the home). Asused herein, “home” can include any type of stationary structureconfigured to shelter people (e.g., an office building).

Several embodiments include using a doorbell system to detect at leastone visitor. Methods can include configuring the camera of the doorbellsuch that the camera comprises a field of view and using the camera ofthe doorbell to take a first image to calibrate the doorbell system byestablishing a baseline of an entryway. The baseline can be used todefine a state without any visitors. Methods can include sending thefirst image from the doorbell to the remote computing device anddisplaying the first image on an electronic display of the remotecomputing device.

Some methods include prompting a user of the remote computing device toselect a first detection zone within the first image. The firstdetection zone can comprise a portion of the first image. The firstdetection zone can include a two-dimensional representation of an areain which the doorbell system is configured to respond to motiondetection. Several embodiments include displaying a grid pattern on thefirst image on the electronic display of the remote computing devicesuch that the first image is divided into at least ten sections by linesthat cross each other. The system can be configured to identify thefirst detection zone within the first image by the user choosing atleast a first subset of the sections on the electronic display of theremote computing device. Choosing the first subset can cause the firstsubset to be included in the first detection zone.

Several methods include configuring the doorbell system to ignore asecond visitor located within the field of view but located outside ofthe first detection zone. Some embodiments include configuring thedoorbell system to send a picture of a third visitor to the remotecomputing device in response to at least some of the following factors:(1) determining that the third visitor is located inside of the firstdetection zone as defined based on the first image, (2) determining thatat least a predetermined percentage (e.g., thirty percent) of the firstdetection zone includes motion indicators, and (3) determining that thefirst detection zone has included the motion indicators for at least apredetermined amount of time (e.g., three seconds).

Some methods include automatically excluding an area from a detectionzone. Automatic exclusion can occur without the user excluding aspecific area (even if the user configures settings that later lead toautomatic exclusions). In some embodiments, indications indicative ofmotorized vehicles (e.g., cars, trucks, vans) are automatically excludedfrom a detection zone. These automatic calibration innovations can takemany forms. Several methods include automatically excluding an area froma detection zone in response to detecting an object (e.g., a motorizedvehicle) moving through the first detection zone at more thantwenty-five miles per hour. Some methods include automatically excludingan area in response to detecting an infrared signal indicative of amotorized vehicle.

Some embodiments include automatically excluding an area from the firstdetection zone in response to at least some of the following items: (1)detecting an indication of a visitor in a detection zone; (2) enablingaudio communication between the doorbell and the remote computing devicein response to detecting the indication of the visitor; and (3) usingthe doorbell to detect an absence of sound indicative of speaking. Thearea that is excluded can be the area in which the indication wasdetected.

FIG. 9 illustrates a doorbell system 528 that comprises a doorbell 506(e.g., security system 202) and a remote computing device 204. Thedoorbell 506 has a camera assembly 208 and a doorbell button 212.Pressing the button 212 can cause the chime 302 (shown in FIG. 3) tosound (e.g., emit a “ding-dong” sound or another notification sound).

The camera assembly 208 is configured such that it has a field of view840. The camera assembly 208 can be positioned such that the field ofview 840 shows an entryway 878 (as illustrated in FIG. 9). The cameraassembly 208 can take a first image 862, which can be all or part of thefield of view 840. As used herein, phrases such as “take an image” areused in a very broad sense. A picture can be taken and then recorded onany of the items listed herein. Taking a picture can mean that a camerawas used as at least one of several items used to capture an image.Taking a picture can be part of taking a video. Thus, an item that takesa video also takes a picture. The camera can be a digital video camera.

The doorbell system 528 can send the first image 862 to a remotecomputing device 204. The remote computing device 204 can display thefirst image 862 on an electronic display 242. The remote computingdevice 204 can prompt a user (of the remote computing device 204) toselect at least one detection zone 846 within the first image 862. Asillustrated in FIG. 9, the detection zone 846 is a portion of the firstimage 862. Multiple detection zones can overlap or can be separate.

The doorbell system 528 can send data regarding the selected detectionzone 846 from the remote computing device 204 to the doorbell 506. Thedoorbell 506 can then focus on looking for visitors within the detectionzone 846 and/or can ignore indications that are suggestive of a visitorif the indications are located outside of the detection zone 846.

In some embodiments, a computer (e.g., server 206 or computing device204 in FIG. 1) that is located remotely from the doorbell 506 analyzeseach image. Thus, the computer can apply the detection zone 846 toanalyses of images from the doorbell 506 such that the doorbell 506 doesnot have to receive data regarding the detection zone 846. In someembodiments, the doorbell 506 sends an alert regarding a visitor to theremote computing device 204, but then the computing device 204 (and/orthe server 206 in FIG. 1) blocks displaying the alert because the alertis from a visitor indication that was outside of the detection zone 846.

The camera assembly 208 can be used to take a second image 870. Thedetection zone 846 selected from the first image 862 can be positionedon the second image 870 such that the detection zone 846 represents thesame area in front of the camera assembly 208 in both the first image862 and the second image 870. For example, the detection zone 846 canfocus a visitor detection analysis on the same portion of an entryway inimages taken by the camera assembly subsequent to the camera assembly208 taking the first image 862.

The doorbell system 528 can analyze the detection zone 846 of the secondimage 870. The doorbell system 528 can be used to analyze the secondimage 870 to determine whether a first indication of the visitor 844 islocated inside of the detection zone 846. In FIG. 9, the doorbell system528 determines that a first indication of the visitor 844 is locatedoutside of the detection zone 846 (because the visitor 844 is locatedoutside of the detection zone 846 in the second image 870). Then, thedoorbell system 528 can decide not to send an alert and/or can blocksending an alert to the remote computing device 204 in response todetermining that the first indication of the visitor 844 is locatedoutside of the detection zone 846.

The doorbell system 528 can be configured to notify the remote computingdevice 204 regarding a presence of the visitor 844 by sending an alert(e.g., a push notification) to the remote computing device 204. FIG. 9illustrates the doorbell 506 sending an alert 232 to the remotecomputing device 204. The alert 232 can be sent directly from thedoorbell 506 to the remote computing device 204. In some embodiments,the alert 232 is sent directly and wirelessly. In some embodiments, thealert 232 is sent via a server and/or via the Internet. The alert 232can cause a push notification to appear on the user interface 240 of thecomputing device 204. In some embodiments, the alert 232 causes theremote computing device 204 to vibrate or “ring” to notify the user ofthe remote computing device 204 that a visitor may be present near thedoorbell 202. The alert 232 can include a video of the visitor.

After the second image 870 was taken, the visitor 844 moved into thedetection zone 846. The visitor 844 is located at least partially insidethe detection zone 846 in the third image 874. The doorbell system 528can analyze the third image 874 to detect an indication of the visitor844. The doorbell system 528 can determine that an indication of thevisitor 844 is located inside the detection zone 846.

Automatic Calibration

FIG. 10 illustrates a doorbell (e.g., security system 202) that has afield of view (“FOV”) 1000. The doorbell 202 can be part of a doorbellsystem (e.g., communication system 200) that includes a remote computingdevice 204, a server 206, and/or wireless communication 230 (shown inFIG. 1). The button 212 of the doorbell 202 can be configurable suchthat pressing the button 212 rings a chime 302 (shown in FIG. 3). Thefield of view 1000 can include a first portion 1004 and a second portion1008.

Embodiments can include using doorbell 202 to detect a first object 1012within the first portion 1004 of the field of view 1000; and/ordetermining that the button 212 was not pressed within a predeterminedtime after the doorbell detects the first object 1012 within the firstportion 1004 of the field of view 1000. For example, the first object1012 might be a car or a bird that is detected by the camera assembly208 and/or by the motion detector 218. The car or bird will not pressthe button 212 like an actual visitor might do. As a result of theobject's 1012 detection not being followed by a button 212 press (e.g.,within 60 seconds), the doorbell system can become more skeptical ofobjects detected in the first portion 1004 of the field of view 1000. Ifthe detected object 1012 had actually been a visitor (e.g., a personcoming to the door), then the detection of the object 1012 likely wouldhave been followed by the visitor pressing the doorbell button 212. Thiscorrelation between detecting remote objects and the doorbell systemdetecting a press of the doorbell button 212 can enable the doorbellsystem to automatically calibrate itself.

More specifically, the doorbell system can calibrate sensitivity incertain areas of the field of view 1000. For example, the first portion1004 of the field of view 1000 might be of a road that passes in frontof the building 300 (shown in FIG. 3) to which the doorbell 202 isattached. The movement on the road and/or the presence of new objects onthe road could lead to many false positives. For example, the doorbell202 could detect a car on the road and then automatically send an alertregarding a “visitor” to the remote computing device 204 (shown in FIG.1). The user of the remote computing device 204 could then be irritatedthat the passing car is not actually a visitor, and thus, the alertinappropriately distracted the user. The doorbell system can reduce thesensitivity of the detection system in the first portion 1004 to reducefalse positives (e.g., due to passing cars). In some cases, thesensitivity of the detection system is reduced so much that the systemexcludes the first portion of the field of view from causing an alertconfigured to notify the remote computing device regarding a presence ofa “visitor” (e.g., when the suspected “visitor” is a passing car and nota visiting person).

The field of view 1000 can include a second portion 1008 that can becommonly associated with detecting indications of real visitors. Forexample, the system can detect an object 1016 in the second portion1008. This detection can be followed by the object 1016 (i.e., a realvisitor) triggering the doorbell button 212 (by pressing the button212). This correlation can increase the probability of another object1020 detected within the second portion 1008 resulting in the systemsending the alert to the remote computing device 204 (shown in FIG. 1)even if the object 1020 does not ring the doorbell button 212 or beforethe object 1020 rings the doorbell button 212.

Embodiments can include many detection areas (such as the first portion1004 and the second portion 1008). For example, the sections 528 in FIG.6 can each be individual detection areas that are individuallycalibrated based on doorbell button triggering data that is individuallyassociated with the detection areas. Some of the sections 528 can beexcluded from causing an alert if motion, image indications, and/orinfrared data detected in those sections is not typically correlatedwith doorbell button triggering.

FIG. 11 illustrates a visitor 844 located within the second portion 1008of the field of view 1000. The visitor detection system 1024 can beconfigured to detect the visitor 844. The visitor detection system 1024can comprise at least one of a camera 208, a motion detector 218, and/oran infrared detector 222. The visitor detection system 1024 isconfigured to detect a first indication 1028 suggestive of the visitor844. In this example, the first indication 1028 is misleading because,although it is suggestive of a visitor, the indication 1028 was causedby something other than a visitor. For example, the first indication1028 might have been caused by a passing car, an animal, or wind blowinga garbage container over. The system can realize that indications in thefirst portion 1004 of the field of view 1000 are unreliable ifindications in the first portion 1004 of the field of view are nottypically followed by the doorbell button 212 being triggered.

An indication can be suggestive of the visitor if the indication is of atype that may indicate a visitor (even if the indication can sometimesresult in false positives). For example, the indication can be a motionindication, but at times, motion indications may result from movingcars, pets, and plants. As a result, a motion indication may notactually indicate a visitor even though the indication suggests that avisitor may be present.

An infrared signature that seems to indicate that a visitor is presentcan be a type of indication. The infrared signature may be of a shapeand/or temperature that suggests the infrared signature is from avisitor (i.e., a person). In many cases, infrared signatures suggestiveof visitors are actually from visitors, but in some cases, infraredsignatures suggestive of visitors may be misleading (and not actually befrom visitors).

A shape in an image taken by a camera may be an indication suggestive ofa visitor. For example, the shape can be of a size or geometry thatsuggests the shape represents at least a portion of a visitor. In somecases, shapes suggestive of a visitor may not actually be from avisitor.

Doorbell triggering (e.g., pressing) data can be used to substantiatesuggestive indicators. Thus, embodiments can grow more skeptical ofindicators if they are not followed by, for example, a visitor pressingthe doorbell button. Certain areas of the field of view can bediscounted or ignored altogether if indicators associated with thecertain areas are not followed by a visitor pressing the doorbellbutton.

Embodiments can grow more confident of indicators if they are followedby a visitor pressing the doorbell button. In some embodiments, allareas of the field of view are configured to trigger an alert regardingthe visitor until indications associated with certain areas are notfollowed by visitors pressing the button. Then, the system can ignoreindications in those areas (to reduce the number of false positives).

Some embodiments include using the visitor detection system to detectthe first indication suggestive of the first visitor within a firstportion of the field of view and determining that the first indicationdetected within the first portion of the field of view is not associatedwith a triggering of the button.

Several methods can be used to determine if an indication is associatedwith a triggering of the button. In some embodiments, the system waitsfor a predetermined amount of time (e.g., 60 seconds or less) afterdetecting the indication to determine if the doorbell button is pressed.If the button is not pressed within the predetermined amount of time,then the indication is not associated with the triggering of the button.

The system can be configured to determine if the object that resulted inthe indication suggestive of the visitor later pressed the doorbellbutton. If the object pressed the doorbell button, then the indicationwas associated with the triggering of the button. If the object did notpress the doorbell button, then the object was not associated with thetriggering of the button. This approach enables the system to calibrateits remote detection capabilities based on doorbell button data. Then,the system can more accurately determine if an indication is actually avisitor (to reduce false positives). As a result, the system can morereliably send an alert about a later visitor even if the visitor doesnot press the button.

A visitor can trigger the doorbell button in several ways. In manyembodiments, the visitor triggers the doorbell button by pressing thedoorbell button (e.g., to make the chime “ring”). Some embodimentsinclude a button that can be triggered without pressing the button. Forexample, the visitor can trigger the button by touching the button. Someembodiments include “contactless” switches (e.g., Hall effect sensors)that enable triggering the button without actually touching the button.

Several embodiments include using the visitor detection system to detecta second indication suggestive of a second visitor within the firstportion of the field of view and excluding the first portion of thefield of view from causing an alert configured to notify the remotecomputing device regarding a presence of the second visitor. Theexcluding can be at least partially in response to determining that thefirst indication detected within the first portion of the field of viewis not associated with the triggering of the button. The excludingprevents the second indication from causing the alert.

In some embodiments, this exclusion can create zones within the field ofview that will not cause the system to send the alert even though thesystem detects an indication suggestive of a visitor in the excludedzones. This exclusion often will not prevent all indications fromcausing an alert if the indications are detected in non-excluded zones.

Several embodiments include using the visitor detection system to detecta third indication suggestive of the second visitor within a secondportion of the field of view and then sending the alert in response todetecting the third indication within the second portion. The firstindication can be a first motion indication, the second indication canbe a second motion indication, and the third indication can be a thirdmotion indication.

In some embodiments, the doorbell system determines that the firstindication detected within the first portion of the field of view is notassociated with the triggering of the button by determining that thebutton was not triggered within 60 seconds after detecting the firstindication. 60 seconds can be a good timeframe because visitorsapproaching a doorbell will typically ring the doorbell within 60seconds. If the item that caused the indication has not pressed thedoorbell button within 60 seconds of being detected, then the item mightnot actually be a visitor and might be a passing car, a pet, awind-blown tree branch, or another misleading item.

Of course, there will be times when an actual visitor does not press thedoorbell button. For example, a person might choose to knock on the doorinstead of ringing the doorbell button. Thus, some embodiments includelistening for sounds 1030 indicative of a visitor. Sounds 1030indicative of a visitor include talking and knocking. Some embodimentsare similar to other embodiments described herein except that theembodiments determine whether an indication detected within the firstportion of the field of view is associated with sounds 1030 indicativeof a visitor.

As a result of there being times when an actual visitor does not pressthe doorbell button, some embodiments do not immediately exclude aportion of the field of view from causing an alert, but instead, rely ondata from many visitors and/or adjust the sensitivity of the visitordetector in the portion of the field of view.

FIG. 11 illustrates an indication 1032 that resulted from a visitor 844approaching the doorbell 202. The doorbell system can detect theindication 1032 based on detecting the infrared signature of the visitor844, detecting the motion of the visitor 844, and/or comparing abaseline image to a second image of the field of view 1000 and thendetermining that the indication 1032 is present in the second image butnot in the baseline image.

Infrared signature is used to describe the appearance of objects toinfrared sensors. Infrared signatures can be influenced by a wide rangeof factors (e.g., object shape, temperature, background). As usedherein, infrared signature is used in a broad sense to describedetecting an object based on the infrared indication of that object.

FIG. 12 illustrates an infrared signature 1036 of the visitor 844 shownin FIG. 11. The infrared detector 222 can detect the infrared signature1036. Although the infrared signature 1036 was caused by a real visitor844, many objects that are not visitors can cause infrared signatures.As a result, many embodiments use doorbell button 212 data to calibratethe visitor detection system 1024. Infrared signatures that are notassociated (e.g., followed) by a press of the doorbell button 212 may becategorized as unreliable indications of a visitor. Portions of thefield of view 1000 that commonly cause unreliable indications may beprecluded from causing an alert to be sent to the remote computingdevice 204 (shown in FIG. 1). For example, cars passing in the firstportion 1004 of the field of view 1000 may have an infrared signaturethat the doorbell system could mistake for a visitor (e.g., a personapproaching the doorbell). If so, the system can become more reliable(and better calibrated) by ignoring infrared signatures in the firstportion 1004 of the field of view 1000.

In some embodiments, the visitor detection system comprises the infrareddetector, wherein using the visitor detection system to detect the firstindication within the first portion of the field of view comprisesdetecting a first infrared signature within the first portion. Methodscan include reducing a first sensitivity of the visitor detection systemwithin the first portion in response to determining that the button wasnot triggered within 60 seconds after detecting the first indication.Reducing the first sensitivity can reduce a first probability of causinga first alert configured to notify the remote computing device regardinga presence of a second visitor in response to detecting a secondindication suggestive of the second visitor within the first portion ofthe field of view.

In several embodiments, the infrared detector comprises a first infraredsensor and a second infrared sensor. The doorbell can comprise a wallthat separates the first infrared sensor from the second infrared sensorsuch that the first infrared sensor is configured to detect the firstinfrared signature within the first portion and the second infraredsensor is configured to detect a second infrared signature within asecond portion of the field of view.

Some embodiments include using the infrared detector to detect a thirdindication suggestive of a third visitor within a second portion of thefield of view; and/or increasing a second sensitivity of the visitordetection system within the second portion in response to determiningthat the button was triggered within 60 seconds after detecting thethird indication. Increasing the second sensitivity can increase asecond probability of causing a second alert configured to notify theremote computing device regarding the presence of the third visitor inresponse to detecting the third indication within the second portion ofthe field of view.

FIG. 13 illustrates an embodiment with motion indications 1038, 1040.The motion detector 218 can detect the motion indications 1038, 1040.The first motion indication 1038 can be from a passing car traveling at35 miles per hour. The second indication 1040 can be from the visitor844 approaching a door located in the same entryway as the doorbell 202.The visitor 844 can be moving at less than 5 miles per hour, which istypical of people as they approach doors. Cars tend to move much fasterthan people walking towards doorbells, so a speed threshold can be auseful way for the doorbell system to distinguish between people (whichare typically true positives) and cars (which are typically falsepositives).

If the first portion 1004 of the field of view 1000 typically results infalse positives (e.g., based on objects that are moving too fast and/orbased on detecting objects that then do not ring the doorbell), then thefirst portion 1004 can be precluded from causing alerts. If the secondportion 1008 of the field of view 1000 typically results in truepositives (e.g., based on objects that are moving at a speed below thepredetermined threshold and/or based on detecting objects that then ringthe doorbell), then the doorbell system can increase its sensitivity tomotion indicators in the second portion 1008 of the field of view 1000.

Speed is one of many factors that can help distinguish betweenmisleading motion and motion that is from an actual visitor. People tendto approach doorbells at less than 5 miles per hour. In contrast, carstend to drive over 25 miles per hour and often drive over 35 miles perhour. Excluding motion that is over 5 miles per hour can help improvethe accuracy of the doorbell system (by screening out motions that aretoo fast to likely be from a visitor).

Several methods include detecting a speed of the first motion; and/orexcluding the first motion from causing the alert configured to notifythe remote computing device regarding the presence of the first visitor.The excluding can be at least partially in response to the speed beinggreater than a predetermined threshold. The predetermined threshold canbe at least 5 miles per hour and can be less than 35 miles per hour. Apredetermined threshold of 15 miles per hour provides a very reliabledividing line between people walking up to a doorbell and cars drivingin front of the doorbell. Several embodiments include a predeterminedthreshold of at least 15 miles per hour.

In some embodiments, the visitor detection system comprises a motiondetector. Using the visitor detection system to detect the firstindication within the first portion of the field of view can comprisedetecting a first motion within the first portion. Embodiments caninclude reducing a first sensitivity of the visitor detection systemwithin the first portion in response to determining that the button wasnot triggered within a predetermined time (e.g., 60 seconds, 30 seconds,15 seconds) after detecting the first indication. Reducing the firstsensitivity can reduce a first probability of causing an alertconfigured to notify the remote computing device regarding a presence ofa second visitor in response to detecting a second indication suggestiveof the second visitor within the first portion of the field of view.

Several embodiments include using the visitor detection system to detecta second motion within a second portion of the field of view; and/orincreasing a second sensitivity of the visitor detection system withinthe second portion in response to determining that the button wastriggered within 60 seconds after detecting the second motion.Increasing the second sensitivity can increase a second probability ofcausing the alert configured to notify the remote computing deviceregarding the presence of the second visitor in response to detectingthe second motion within the second portion of the field of view.

Some embodiments include dividing the field of view into the firstportion and the second portion such that the doorbell system isconfigured to distinguish between the first motion detected in the firstportion and the second motion detected in the second portion. A wall(e.g., a plastic blade) can be used to divide the field of view. In someembodiments, the field of view is divided with software (e.g., ratherthan being physically divided by a wall).

Several embodiments for using a doorbell to detect visitors includeobtaining the doorbell system that comprises a motion detector and abutton; configuring the doorbell system such that the motion detectorcomprises a field of view; detecting a first motion within a firstportion of the field of view; determining that the button was nottriggered within 60 seconds after detecting the first motion within thefirst portion of the field of view; and/or excluding the first portionof the field of view from causing an alert configured to notify theremote computing device regarding a presence of the first visitor. Theexcluding can be at least partially in response to determining that thebutton was not triggered within 60 seconds after detecting the firstmotion within the first portion of the field of view.

Some embodiments include detecting a second motion within a secondportion of the field of view; determining that the button was triggeredwithin 60 seconds after detecting the second motion within the secondportion of the field of view; and/or configuring the doorbell system toautomatically send the alert regarding a third motion detected in thesecond portion of the field of view at least partially in response todetermining that the button was triggered within 60 seconds afterdetecting the second motion within the second portion of the field ofview.

Several embodiments include detecting the third motion within the secondportion of the field of view; and/or automatically sending the alert tothe remote computing device regarding the presence of a visitor inresponse to detecting the third motion within the second portion of thefield of view. Methods can include automatically initiating the sendingof the alert to the remote computing device regarding the presence ofthe first visitor prior to the first visitor pressing the button.

FIG. 14 illustrates a baseline image 1044 of the field of view 1000.FIG. 15 illustrates a second image 1048 of the field of view 1000.Referring now to FIGS. 14 and 15, the camera assembly 208 can take thebaseline image 1044 and the second image 1048. The doorbell system cancompare the baseline image 1044 to the second image 1048 to detect anindication 1052 of the visitor 844. The system can then determine thatthe indication 1052 is present in the second image 1048 but not in thebaseline image 1048.

In several embodiments, the visitor detection system comprises a camera,and using the visitor detection system to detect the first indicationwithin the first portion of the field of view comprises using the camerato take a first image. Then, the doorbell system can analyze the firstimage to detect the first indication. Embodiments can include reducing afirst sensitivity of the visitor detection system within the firstportion in response to determining that the button was not triggeredwithin a predetermined time after detecting the first indication.Reducing the first sensitivity can reduce a first probability of causinga first alert configured to notify the remote computing device regardinga presence of a second visitor in response to detecting a secondindication suggestive of the second visitor within the first portion ofthe field of view.

Some embodiments include using the camera to take a second image. Then,the doorbell system can analyze the second image to detect a thirdindication suggestive of a third visitor within a second portion of thefield of view. Methods can include increasing a second sensitivity ofthe visitor detection system within the second portion in response todetermining that the button was triggered within 60 seconds afterdetecting the third indication by analyzing the second image. Increasingthe second sensitivity can increase a second probability of causing asecond alert configured to notify the remote computing device regardingthe presence of the third visitor in response to detecting the thirdindication within the second portion of the field of view.

Several embodiments include using a doorbell system to detect a firstvisitor. The doorbell system can comprise a doorbell and a remotecomputing device. Methods can include obtaining the doorbell thatcomprises a camera and a button. The button can be configurable toenable the first visitor to sound a chime. Methods can also includeconfiguring the doorbell system such that the camera comprises a fieldof view; using the camera of the doorbell to take a baseline image tocalibrate the doorbell system by establishing a baseline of at least apart of the field of view; using the camera of the doorbell to take asecond image of at least the part of the field of view; determining thata first object is present in the second image, but not in the baselineimage; associating the first object with a first portion of the field ofview; determining that the button was not triggered within 60 secondsafter determining that the first object is present in the second image,but not in the baseline image; and/or excluding the first portion of thefield of view from causing an alert configured to notify the remotecomputing device regarding a presence of the first visitor. Theexcluding can be at least partially in response to determining that thebutton was not triggered within 60 seconds after determining that thefirst object is present in the second image, but not in the baselineimage.

Associating the first object with the first portion of the field of viewcan include correlating the first object with a location within thefield of view. For example, the system can know where in the field ofview the first object was detected. This relative location informationcan be helpful so the system can determine which areas of the field ofview are causing misleading indications (e.g., as implied by anindication not being followed by a triggering of the doorbell buttonwithin 60 seconds of the system detecting the indication).

Many factors and methods can be used to exclude a portion of the fieldof view from causing an alert. For example, sound data and button datacan be combined to exclude the portion of the field of view. In someembodiments, many button press data points are used to eventuallyexclude a portion of the field of view. Thus, excluding can be at leastpartially in response to determining that the button was not triggeredwithin 60 seconds after determining that the first object is present inthe second image, but not in the baseline image, even though otherfactors and methods are ultimately used in the full exclusion decision.

Several embodiments include using the camera of the doorbell to take athird image of at least the part of the field of view; determining thata second object is present in the third image, but not in the baselineimage; associating the second object with a second portion of the fieldof view; determining that the button was triggered within 60 secondsafter determining that the second object is present in the third image,but not in the baseline image; and/or configuring the doorbell system toautomatically send the alert regarding a third object detected in thesecond portion of the field of view at least partially in response todetermining that the button was triggered within 60 seconds afterdetermining that the second object is present in the third image, butnot in the baseline image.

Some embodiments include using the camera of the doorbell to take afourth image of at least the part of the field of view; determining thatthe third object is present in the fourth image, but not in the baselineimage; associating the third object with the second portion of the fieldof view; and/or automatically sending the alert to the remote computingdevice regarding the presence of a visitor.

Several embodiments include automatically initiating the sending of thealert to the remote computing device regarding the presence of the firstvisitor prior to the first visitor pressing the button. Initiating thesending of the alert does not necessarily mean that the alert hasarrived at the remote computing device.

The baseline image can comprise several images. In some embodiments, thebaseline image is actually a collection of images taken at differenttimes. Thus, a first image can be the baseline image for a second image,and the second image can be the baseline image for a third image.

FIG. 16 illustrates an embodiment in which a wall 1060 divides the fieldof view 1000 into a first portion 1064 and a second portion 1068. Theinfrared detector 222 and/or the motion detector 218 (shown in FIG. 12)can include a first sensor 1070 and a second sensor 1074. The sensors1070, 1074 can be infrared sensors and/or motion sensors.

In several embodiments, the infrared detector 222 comprises a firstinfrared sensor and a second infrared sensor. The doorbell 202 (shown inFIG. 12) can be configured such that the wall 1060 separates the firstinfrared sensor from the second infrared sensor such that the firstinfrared sensor is configured to detect the first infrared signaturewithin the first portion and the second infrared sensor is configured todetect a second infrared signature within a second portion of the fieldof view.

The wall 1060 can be configured to divide the field of view 1000 intoportions 1064, 1068 such that the doorbell system can distinguishbetween motions in different portions 1064, 1068. For example, the wall1060 can be configured to prevent a second sensor 1074 from detecting amotion that the first sensor 1070 can detect (e.g., because the wall1060 can “hide” the motion from the second sensor 1074).

Interpretation

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other.

The section headings and subheadings provided herein are nonlimiting.The section headings and subheadings do not represent or limit the fullscope of the embodiments described in the sections to which the headingsand subheadings pertain. For example, a section titled “Topic 1” mayinclude embodiments that do not pertain to Topic 1 and embodimentsdescribed in other sections may apply to and be combined withembodiments described within the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodiments caninclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy.

While certain example embodiments have been described, these embodimentshave been presented by way of example only, and are not intended tolimit the scope of the inventions disclosed herein. Thus, nothing in theforegoing description is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit of theinventions disclosed herein.

The following is claimed:
 1. A doorbell system comprising a doorbell,wherein the doorbell system comprises: a button configurable to enable avisitor to sound a chime; a visitor detection system having at least oneof a camera assembly, a motion detector assembly, and an infrareddetector assembly, wherein the visitor detection system is configurableto detect the visitor within a field of view of the visitor detectionsystem; an outer housing coupled to the visitor detection system,wherein the visitor detection system comprises a first sensorconfigurable to detect a first indication suggestive of the visitorwithin the field of view, and a second sensor configurable to detect asecond indication suggestive of the visitor within the field of view;and a wall that separates the first sensor from the second sensor,wherein the wall divides the field of view such that the first sensor isconfigured to detect the first indication within a first portion of thefield of view and the second sensor is configured to detect the secondindication within a second portion of the field of view, wherein thebutton, the first sensor, and the second sensor face outward towards thefield of view, wherein an outer surface of the wall faces outward, andthe outer surface of the wall is located further outward than an outersurface of the first sensor and an outer surface of the second sensor.2. The doorbell system of claim 1, wherein the wall protrudes outwardtowards the field of view such that the wall hides a third portion ofthe field of view from the first sensor and hides a fourth portion ofthe field of view from the second sensor to enable the doorbell systemto distinguish between a third indication detected in the third portionand a fourth indication detected in the fourth portion.
 3. The doorbellsystem of claim 1, wherein the wall is located at least partiallybetween the first sensor and the second sensor.
 4. The doorbell systemof claim 1, wherein the first sensor comprises a first infrared detectorand the second sensor comprises a second infrared detector, wherein thefirst infrared detector is configurable to detect a first infraredsignature within the first portion of the field of view and the secondinfrared detector is configurable to detect a second infrared signaturewithin the second portion of the field of view.
 5. The doorbell systemof claim 1, wherein the first sensor comprises a first motion detectorand the second sensor comprises a second motion detector, wherein thefirst motion detector is configurable to detect a first motion withinthe first portion of the field of view and the second motion detector isconfigurable to detect a second motion within the second portion of thefield of view.
 6. The doorbell system of claim 1, wherein the firstsensor comprises a first camera and the second sensor comprises a secondcamera, wherein the first camera is configurable to detect a first imagewithin the first portion of the field of view and the second camera isconfigurable to detect a second image within the second portion of thefield of view.
 7. The doorbell system of claim 1, wherein the wall isconfigurable to prevent the first sensor from detecting the secondindication suggestive of the visitor from the second portion of thefield of view, and wherein the wall is configurable to prevent thesecond sensor from detecting the first indication suggestive of thevisitor from the first portion of the field of view.
 8. The doorbellsystem of claim 1, wherein when the doorbell is attached to a building,the first sensor is horizontally spaced from the second sensor.
 9. Thedoorbell system of claim 1, wherein the first sensor and the secondsensor are recessed within the outer housing while the doorbell isattached to a building, and the button protrudes outward from the outerhousing.
 10. The doorbell system of claim 1, wherein an outer surface ofthe button is located further outward than the outer surface of thewall.
 11. The doorbell system of claim 1, wherein the visual detectionsystem further comprises the camera assembly, wherein each of the cameraassembly, the first sensor, and the second sensor face outward, whereinan outer surface of the camera assembly protrudes further outward thanan outer surface of the first sensor, and wherein the outer surface ofthe camera assembly protrudes further outward than an outer surface ofthe second sensor.
 12. The doorbell system of claim 11, wherein thecamera assembly comprises a fisheye lens, wherein a first location ofthe fisheye lens protrudes further outward than an outer surface of thebutton, and wherein the outer surface of the button protrudes furtheroutward than a second location of the fisheye lens.
 13. The doorbellsystem of claim 11, wherein when the doorbell is attached to a building,the camera assembly is positioned between the button and the firstsensor such that the button is positioned lower than the cameraassembly, and the camera assembly is positioned lower than the firstsensor.
 14. The doorbell system of claim 13, wherein the first sensor isspaced a first distance from the camera assembly, and the cameraassembly is spaced a second distance from the button, and wherein thesecond distance is greater than the first distance.
 15. The doorbellsystem of claim 1, wherein the outer housing comprises a first outerportion and a second outer portion, wherein the first outer portiondefines a first color and the second outer portion defines a secondcolor that is different from the first color, wherein each of the wall,the first sensor and the second sensor are surrounded by the first outerportion.
 16. The doorbell system of claim 15, wherein the visitordetection system further comprises the camera assembly, and wherein thecamera assembly is surrounded by the first outer portion.
 17. Thedoorbell system of claim 16, wherein the button is surrounded by thesecond outer portion.
 18. A method for using a doorbell systemcomprising a button configurable to enable a visitor to sound a chime, afirst motion sensor configurable to detect a first indication suggestiveof the visitor within a field of view of the doorbell system, a secondmotion sensor configurable to detect a second indication suggestive ofthe visitor within the field of view, and an outer housing having abackside configured to be coupled to a building and having a frontsidefacing outward towards the field of view, the method comprising:orienting the button of the doorbell system such that the button facesoutward from the frontside of the outer housing; orienting the firstmotion sensor to face outward from the frontside of the outer housing;orienting the second motion sensor to face outward from the frontside ofthe outer housing; placing a wall at least partially between the firstmotion sensor and the second motion sensor such that the wall isconfigured to hide a first portion of the field of view from the firstmotion sensor and to hide a second portion of the field of view from thesecond motion sensor; configuring the doorbell system to distinguishbetween motions detected in different sections of the field of view byassociating the first indication detected by the first motion sensorwith a first area of the field of view and associating the secondindication detected by the second motion sensor with a second area ofthe field of view; and configuring the doorbell system to ignore thefirst indication in response to associating the first indication withthe first area of the field of view.
 19. A doorbell system comprising: abutton configurable to enable a visitor to sound a chime; a first motionsensor configurable to detect a first indication suggestive of thevisitor within a field of view of the doorbell system; a second motionsensor configurable to detect a second indication suggestive of thevisitor within the field of view; an outer housing having a backsideconfigured to be coupled to a building and having a frontside facingoutward towards the field of view, wherein the button of the doorbellsystem is oriented such that the button faces outward from the frontsideof the outer housing, the first motion sensor is oriented such that thefirst motion sensor faces outward, and the second motion sensor isoriented such that the second motion sensor faces outward; and a walllocated at least partially between the first motion sensor and thesecond motion sensor such that the wall is configured to hide a firstportion of the field of view from the first motion sensor and to hide asecond portion of the field of view from the second motion sensor,wherein the doorbell system is configured to distinguish between motionsdetected in different sections of the field of view by associating thefirst indication detected by the first motion sensor with a first areaof the field of view and associating the second indication detected bythe second motion sensor with a second area of the field of view, andwherein the doorbell system is configured to ignore the first indicationin response to associating the first indication with the first area ofthe field of view.
 20. The doorbell system of claim 19, wherein at leasta portion of the wall is located further outward than the first sensorand the second sensor.
 21. The doorbell system of claim 19, wherein thefirst sensor comprises a first infrared detector and the second sensorcomprises a second infrared detector, wherein the first infrareddetector is configurable to detect a first infrared signature within thefirst portion of the field of view and the second infrared detector isconfigurable to detect a second infrared signature within the secondportion of the field of view.
 22. The doorbell system of claim 19,wherein the first motion sensor comprises a first camera and the secondmotion sensor comprises a second camera, wherein the first camera isconfigurable to detect a first image within the first portion of thefield of view and the second camera is configurable to detect a secondimage within the second portion of the field of view.
 23. The doorbellsystem of claim 19, wherein the wall is configurable to prevent thefirst sensor from detecting the second indication suggestive of thevisitor from the second portion of the field of view, and the wall isconfigurable to prevent the second sensor from detecting the firstindication suggestive of the visitor from the first portion of the fieldof view.
 24. The doorbell system of claim 19, wherein the first sensoris configurable to detect the first indication within the first portionof the field of view and the second sensor is configurable to detect thesecond indication within the second portion of the field of view. 25.The doorbell system of claim 19, wherein the doorbell is coupled to abuilding, the first sensor and the second sensor are recessed within theouter housing, and an outer surface of the button protrudes outward fromthe outer housing.
 26. The doorbell system of claim 19, furthercomprising a camera assembly having a fisheye lens.
 27. The doorbellsystem of claim 19, wherein when the doorbell is attached to a building,the camera assembly is positioned between the button and the firstsensor such that the button is positioned lower than the cameraassembly, and the camera assembly is positioned lower than the firstsensor.
 28. The doorbell system of claim 19, wherein the outer housingcomprises a first outer portion and a second outer portion, wherein thefirst outer portion defines a first color and the second outer portiondefines a second color that is different from the first color, whereinthe wall, the first sensor, and the second sensor are surrounded by thefirst outer portion.
 29. The doorbell system of claim 28, wherein thevisitor detection system further comprises a camera assembly, the cameraassembly is surrounded by the first outer portion, and the button issurrounded by the second outer portion.