Doorbell package detection systems and methods

ABSTRACT

Delivery parcel detection systems can include a remote computing device and a doorbell configured to detect a delivery parcel. Methods of enabling a door to be unlocked to allow access to a delivery person may include sending a digital key to a remote computing device. Methods may include ways to ensure security of the building.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional PatentApplication No. 62/571,465; filed Oct. 12, 2017; and entitled DOORBELLPACKAGE DETECTION SYSTEMS AND METHODS; and having an attorney docketnumber SKYBELL.079A.CP1PR. The entire contents of U.S. ProvisionalPatent Application No. 62/571,465 are incorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Non-Provisional patent application Ser. No. 15/341,125; filed Nov.2, 2016; entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; and havingan attorney docket number SKYBELL.090A. The entire contents of U.S.patent application Ser. No. 15/341,125 are incorporated by referenceherein. U.S. Non-Provisional patent application Ser. No. 15/341,125claims the benefit of and is a continuation-in-part of U.S.Non-Provisional patent application Ser. No. 15/167,831 (issued as U.S.Pat. No. 9,508,239 on Nov. 29, 2016); filed May 27, 2016; entitledDOORBELL PACKAGE DETECTION SYSTEMS AND METHODS; and having an attorneydocket number SKYBELL.079A. The entire contents of U.S. patentapplication Ser. No. 15/167,831 are incorporated by reference herein.

The entire contents of the following application are incorporated byreference herein: U.S. Provisional Patent Application No. 62/571,465;filed Oct. 12, 2017; and entitled DOORBELL PACKAGE DETECTION SYSTEMS ANDMETHODS.

The entire contents of the following application are incorporated byreference herein: U.S. Nonprovisional patent application Ser. No.15/167,831; filed May 27, 2016; and entitled DOORBELL PACKAGE DETECTIONSYSTEMS AND METHODS.

The entire contents of the following application are incorporated byreference herein: U.S. Nonprovisional patent application Ser. No.15/008,304; filed Jan. 27, 2016; and entitled DOORBELL PACKAGE DETECTIONSYSTEMS AND METHODS.

The entire contents of the following application are incorporated byreference herein: U.S. Nonprovisional patent application Ser. No.14/861,613; filed Sep. 22, 2015; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS.

The entire contents of the following application are incorporated byreference herein: U.S. Nonprovisional patent application Ser. No.14/813,479; filed Jul. 30, 2015; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS.

The entire contents of the following application are incorporated byreference herein: U.S. Nonprovisional patent application Ser. No.14/589,830; filed Jan. 5, 2015; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS.

The entire contents of the following application are incorporated byreference herein: U.S. Nonprovisional patent application Ser. No.14/743,849; filed Jun. 18, 2015; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS.

The entire contents of the following applications are incorporated byreference herein: U.S. Nonprovisional patent application Ser. No.14/612,376; filed Feb. 3, 2015; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; U.S. Nonprovisional patent application Ser. No.14/502,601; filed Sep. 30, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; U.S. Nonprovisional Patent Application No.14/492,809; filed Sep. 22, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; U.S. Nonprovisional patent application Ser. No.14/275,811; filed May 12, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; U.S. Nonprovisional patent application Ser. No.14/142,839; filed Dec. 28, 2013; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; U.S. Nonprovisional patent application Ser. No.14/099,888; filed Dec. 6, 2013; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; and U.S. Nonprovisional patent application Ser. No.14/098,772; filed Dec. 6, 2013; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS.

The entire contents of the following application are incorporated byreference herein: International Application No. PCT/US14/47622; filedJul. 22, 2014 with the U.S. Patent and Trademark Office; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS.

The entire contents of the following application are incorporated byreference herein: International Application No. PCT/US14/53506; filedAug. 29, 2014 with the U.S. Patent and Trademark Office; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS.

BACKGROUND Field

Various embodiments disclosed herein relate to doorbells. Certainembodiments relate to doorbell systems that detect packages.

Description of Related Art

Doorbells can enable a person located outside of an entry point, such asa door, to alert a person inside of an entry point that someone outsidewould like to talk to someone inside. Doorbells sometimes include abutton located near a door, such as a front door, side door, or backdoor of a home, office, dwelling, warehouse, building, or structure.Doorbells are sometimes used near a gate or some other entrance to apartially enclosed area. Pushing the doorbell sometimes causes a chimeor other alerting sound to be emitted.

A doorbell chime can be communicatively coupled with a doorbell whilethe chime is located remotely relative to the doorbell. For example, thedoorbell can be coupled to an exterior surface of a building (e.g., nearan entryway) and the chime can be coupled to an interior surface of abuilding.

Delivery parcels (e.g., packages, envelopes) are often left in apublicly accessible entryway of a building. These delivery parcels aresometimes stolen before the rightful owner can pick up the deliveryparcels. Thus, there is a need for systems that reduce the likelihood ofdelivery parcel theft.

SUMMARY

In several embodiments, methods may include using a delivery parceldetection system. The methods may comprise sending a digital key to aremote computing device of a delivery person. The digital key can beconfigured to enable unlocking a door of a building to which a deliveryparcel is addressed. The door may comprise a lock system configured toimpede unauthorized entry into the building. Methods may includedetecting, by at least one of a doorbell and the lock system, thedigital key via a first wireless communication from the remote computingdevice to at least one of the doorbell and the lock system.

Some embodiments may include unlocking the door to permit the deliveryperson to place the delivery parcel inside the building in response todetecting the digital key.

In several embodiments, the delivery parcel may include an expecteddelivery time window. Methods may include sending the digital key to theremote computing device in response to a first time being at least oneof within the expected delivery time window and within a predeterminedperiod prior to the expected delivery time window. Methods may includeenabling the digital key. Methods may include disabling the digital keyin response to a second time being past the expected delivery timewindow

In several embodiments, methods may include receiving, by at least oneof the doorbell and the lock system, a delivery parcel identificationcode of the delivery parcel, and unlocking the door in response to bothdetecting the digital key and receiving the delivery parcelidentification code. Methods may include unlocking the door in responseto verifying that the delivery parcel identification code corresponds toan expected delivery time. In some embodiments, methods may includeunlocking the door in response to verifying that the delivery parcelidentification code corresponds to an expected delivery item.

In several embodiments, methods may include recording a video, by thedoorbell, in response to detecting the delivery person and in responseto determining that the delivery parcel is an expected delivery item.Methods may include saving the video and labeling the video as adelivery such that the labeling indicates to a doorbell user that thevideo shows the delivery of at least one item.

In some embodiments, methods may include detecting a first location ofthe remote computing device and sending the digital key to the remotecomputing device in response to the first location. Methods may includesending the digital key to the remote computing device in response tothe first location being within one mile of at least one of the doorbelland the lock system. Methods may include sending the digital key to theremote computing device in response to the first location being withinone hundred yards of at least one of the doorbell and the lock system.In some embodiments, methods may include sending the digital key to theremote computing device in response to the first location being within adirect wireless communication range of at least one of the doorbell andthe lock system. The delivery parcel may include an expected deliverytime window. Methods can include disabling the digital key in responseto a second time being past the expected delivery time window.

In some embodiments, methods may include detecting, by at least one ofthe doorbell and the lock system, a delivery parcel identification codeof the delivery parcel, and unlocking the door in response to bothdetecting the digital key and detecting the delivery parcelidentification code.

In several embodiments, methods may include recording a video by thedoorbell, determining that the video shows a delivery, and labeling thevideo. The labeling can indicate to a doorbell user that the video showsthe delivery of at least one item.

In several embodiments, methods may include detecting a first locationof a delivery vehicle and sending the digital key to the remotecomputing device in response to the first location. The delivery vehiclecan be configured to transport the remote computing device and thedelivery parcel. Methods may include sending the digital key to theremote computing device in response to the first location being withinone mile of at least one of the doorbell and the lock system. Methodsmay include sending the digital key to the remote computing device inresponse to the first location being within a direct wirelesscommunication range of at least one of the doorbell and the lock system.In some embodiments, the delivery parcel may comprise an expecteddelivery time window. Methods may include disabling the digital key inresponse to a second time being past the expected delivery time window.

In some embodiments, methods may include detecting, by at least one ofthe doorbell and the lock system, a delivery parcel identification codeof the delivery parcel, and unlocking the door in response to bothdetecting the digital key and detecting the delivery parcelidentification code.

In some embodiments, methods may include recording a video by thedoorbell, determining that the video shows a delivery, and labeling thevideo such that the labeling indicates to a doorbell user that the videoshows the delivery of at least one item.

In several embodiments, the method may include detecting a firstidentification code from the remote computing device, verifying that thefirst identification code is indicative of the remote computing devicebeing authorized for deliveries, and sending the digital key to theremote computing device in response to detecting the firstidentification code and in response to verifying the firstidentification code. Methods may include detecting the firstidentification code by at least one of the doorbell and the lock system.The delivery parcel may include an expected delivery time window.Methods may include disabling the digital key in response to a secondtime being past the expected delivery time window.

In some embodiments, the method includes detecting, by at least one ofthe doorbell and the lock system, a delivery parcel identification codeof the delivery parcel, and unlocking the door in response to bothdetecting the digital key and detecting the delivery parcelidentification code. Methods may include recording a video by thedoorbell, determining that the video show a delivery, and labeling thevideo such that the labeling indicates to a doorbell user that the videoshows the delivery of at least one item. Methods may include sending thevideo to an entity associated with sending the delivery parcel.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 illustrates a front view of a communication system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates a diagrammatic view of multiple computing devices anddoorbells, according to some embodiments.

FIG. 4 illustrates a back view of a doorbell without a back cover toshow various components of the doorbell's electrical system, accordingto some embodiments.

FIGS. 5 and 6 illustrate diagrammatic views of a doorbell system thatcan use a floor covering to detect parcels, according to someembodiments.

FIG. 7 illustrates a diagrammatic view of a doorbell system that can usea radio frequency identification reader to detect parcels, according tosome embodiments.

FIGS. 8 and 9 illustrate a diagrammatic view of a doorbell system thatcan use a radio frequency identification reader to detect parcels,according to some embodiments.

FIGS. 10, 11, and 12 illustrate a diagrammatic view of a doorbell systemthat can use a radio frequency identification reader to detect parcelswithin a detection range, according to some embodiments.

FIGS. 13 and 14 illustrate a diagrammatic view of a doorbell system thatcan use a radio frequency identification reader to detect parcels withina detection range, according to some embodiments.

FIGS. 15, 16, and 17 illustrate a diagrammatic view of a doorbell andlock system, according to some embodiments.

FIGS. 18a and 18b are schematics of a method of enabling the unlockingof a door, according to some embodiments.

FIG. 19 illustrates a diagrammatic view of a doorbell and lock system,according to some embodiments.

FIG. 20 is a schematic of a method of recording, labeling, and sending avideo, according to some embodiments.

FIGS. 21a and 21b are schematics of methods of activating anddeactivating a digital key, according to some embodiments.

FIG. 22 illustrates a diagrammatic view of a doorbell and lock system,according to some embodiments.

FIG. 23 illustrates a diagrammatic view of a doorbell and lock systemand a delivery vehicle, according to some embodiments.

FIGS. 24a and 24b are schematics of methods of sending and deactivatinga digital key, according to some embodiments.

FIG. 25 illustrates a schematic of a method of verifying and sending adigital key, according to some embodiments.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed below, inventivesubject matter extends beyond the specifically disclosed embodiments toother alternative embodiments and/or uses, and to modifications andequivalents thereof. Thus, the scope of the claims appended hereto isnot limited by any of the particular embodiments described below. Forexample, in any method or process disclosed herein, the acts oroperations of the method or process may be performed in any suitablesequence and are not necessarily limited to any particular disclosedsequence. Various operations may be described as multiple discreteoperations in turn, in a manner that may be helpful in understandingcertain embodiments; however, the order of description should not beconstrued to imply that these operations are order dependent.Additionally, the structures, systems, and/or devices described hereinmay be embodied as integrated components or as separate components.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

System Embodiments

Communication systems can provide a secure and convenient way for aremotely located individual to communicate with a person who isapproaching a sensor, such as a proximity sensor or motion sensor, orwith a person who rings a doorbell, which can be located in a doorway,near an entrance, or within 15 feet of a door. Some communicationsystems allow an individual to hear, see, and talk with visitors whoapproach at least a portion of the communication system and/or press abutton, such as a doorbell's button. For example, communication systemscan use a computing device to enable a remotely located person to see,hear, and/or talk with visitors. Computing devices can includecomputers, laptops, tablets, mobile devices, smartphones, cellularphones, and wireless devices (e.g., cars with wireless communication).Example computing devices include the iPhone, iPad, iMac, MacBook Air,and MacBook Pro made by Apple Inc. Communication between a remotelylocated person and a visitor can occur via the Internet, cellularnetworks, telecommunication networks, and wireless networks.

Referring now to FIG. 1, the doorbell 202 can record video and audio,which can then be sent to a remote computing device 204. The remotecomputing device 204 displays the video and emits the audio from thedoorbell 202 to enable a user of the remote computing device 204 to seeand hear a visitor. For example, when the doorbell 202 detects a visitor(e.g., a motion sensor 218 detects a visitor or the visitor presses thebutton 212), the doorbell 202 can send a push notification to the remotecomputing device 204. A user of the remote computing device 204 can thensee and hear the visitor.

The user of the remote computing device 204 can select a button onapplication software running on the remote computing device 204 toinitiate two-way audio and/or video communication with the visitor. Insome embodiments, the user can see and hear the visitor, and the visitorcan hear (but not see the user). In several embodiments, the user canhear (but not see) the visitor. In some embodiments, the user andvisitor can both see and hear each other (e.g., the doorbell 202 caninclude a display screen to show live video captured by a camera of theremote computing device 204).

Doorbell systems can be a portion of a smart home hub. In someembodiments, the doorbell system 200 forms the core of the smart homehub. For example, the various systems described herein enable completehome automation. In some embodiments, the doorbell 202 controls variouselectrical items in a home (e.g., lights, air conditioners, heaters,motion sensors, garage door openers, locks, televisions, computers,entertainment systems, pool monitors, elderly monitors). In someembodiments, the computing device 204 controls the doorbell 202 andother electrical items in a home (e.g., lights, air conditioners,heaters, motion sensors, garage door openers, locks, televisions,computers, entertainment systems, pool monitors, elderly monitors).

FIG. 1 illustrates a front view of a communication system embodiment.The doorbell system 200 can include a doorbell 202 (e.g., a securitysystem) and a computing device 204. Although the illustrated doorbell202 includes many components in one housing, several doorbellembodiments include components in separate housings. The doorbell 202can include a camera assembly 208 and a doorbell button 212. The cameraassembly 208 can include a video camera, which in some embodiments is awebcam. The doorbell 202 can include a diagnostic light 216 and a powerindicator light 220. In some embodiments, the diagnostic light 216 is afirst color (e.g., blue) if the doorbell 202 and/or the doorbell system200 is connected to a wireless Internet network and is a second color(e.g., red) if the doorbell 202 and/or the doorbell system 200 is notconnected to a wireless Internet network. In some embodiments, the powerindicator 220 is a first color if the doorbell 202 is connected to apower source. The power source can be supplied by the building to whichthe doorbell 202 is attached. In some embodiments, the power indicator220 is a second color or does not emit light if the doorbell 202 is notconnected to the power source.

The doorbell 202 can include an outer housing 224, which can be waterresistant and/or waterproof. The outer housing can be made from metal orplastic, such as molded plastic with a hardness of 60 Shore D. In someembodiments, the outer housing 224 is made from brushed nickel oraluminum.

Rubber seals can be used to make the outer housing 224 water resistantor waterproof. The doorbell 202 can be electrically coupled to a powersource, such as wires electrically connected to a building's electricalpower system. In some embodiments, the doorbell 202 includes a batteryfor backup and/or primary power.

Wireless communication 230 can enable the doorbell 202 to communicatewith the computing device 204. Some embodiments enable communication viacellular networks and/or wireless local area networks (“WiFi”). Someembodiments enable communication via the Internet. Several embodimentsenable wired communication between the doorbell 202 and the computingdevice 204. The wireless communication 230 can comprise the followingcommunication means: radio, WiFi, cellular, Internet, Bluetooth,Bluetooth Low Energy, telecommunication, electromagnetic, infrared,light, sonic, and microwave. Other communication means are used by someembodiments. In some embodiments, such as embodiments that includetelecommunication or cellular communication means, the doorbell 202 caninitiate voice calls or send text messages to a computing device 204(e.g., a smartphone, a desktop computer, a tablet computer, a laptopcomputer).

Several embodiments use near field communication (“NFC”) to communicatebetween the computing device 204 and the doorbell 202. The doorbell 202and/or the computing device 204 can include a NFC tag. Some NFCtechnologies include Bluetooth, radio-frequency identification, andquick response codes (“QR codes”).

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. Some embodiments includesoftware designed to run on desktop computers and laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

FIG. 2 illustrates a computing device 204 running software. The softwareincludes a user interface 240 displayed on a display screen 242. Theuser interface 240 can include a doorbell indicator 244, which canindicate the location of the doorbell that the user interface isdisplaying. For example, a person can use one computing device 204 tocontrol and/or interact with multiple doorbells, such as one doorbelllocated at a front door and another doorbell located at a back door.Selecting the doorbell indicator 244 can allow the user to chooseanother doorbell (e.g., a doorbell located by a back door rather than adoorbell located by a front door).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator 248 can indicate whether thecomputing device is in communication with a doorbell, the Internet,and/or a cellular network. The connectivity indicator 248 can alert theuser if the computing device 204 has lost its connection with thedoorbell 202; the doorbell 202 has been damaged; the doorbell 202 hasbeen stolen; the doorbell 202 has been removed from its mountinglocation; the doorbell 202 has lost electrical power; and/or if thecomputing device 204 cannot communicate with the doorbell 202. In someembodiments, the connectivity indicator 248 notifies the user of thecomputing device 204 by flashing, emitting a sound, displaying amessage, and/or displaying a symbol.

Referring now to FIG. 1, in some embodiments, if the doorbell 202 losespower, loses connectivity to the computing device 204, losesconnectivity to the Internet, and/or loses connectivity to a remoteserver, a remote server 206 sends an alert 232 (e.g., phone call, textmessage, image on the user interface 240) regarding the power and/orconnectivity issue. In several embodiments, the remote server 206 canmanage communication between the doorbell 202 and the computing device204. In some embodiments, information from the doorbell 202 is stored bythe remote server 206. In several embodiments, information from thedoorbell 202 is stored by the remote server 206 until the informationcan be sent to the computing device 204, uploaded to the computingdevice 204, and/or displayed to the remotely located person via thecomputing device 204. The remote server 206 can be a computing devicethat stores information from the doorbell 202 and/or from the computingdevice 204. In some embodiments, the remote server 206 is located in adata center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the doorbell 202. If the computingdevice 204 and/or the remote server 206 is unable to communicate withthe doorbell 202, the computing device 204 and/or the remote server 206alerts the remotely located person via the software, phone, text, adisplayed message, and/or a website. In some embodiments, the computingdevice 204 and/or the remote server 206 attempts to communicate with thedoorbell 202 periodically; at least every five hours and/or less thanevery 10 minutes; at least every 24 hours and/or less than every 60minutes; or at least every hour and/or less than every second.

In some embodiments, the server 206 can initiate communication with thecomputing device 204 and/or with the doorbell 202. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the doorbell 202. Inseveral embodiments, a user can log in to an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the doorbell settingsdiscussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a doorbell due to the user's requestrather than due to actions of a visitor. Some embodiments include acomputing device initiating a live video feed (or a video feed that isless than five minutes old).

Referring now to FIGS. 1 and 2, in some embodiments, the user interface240 displays an image 252 such as a still image or a video of an areanear and/or in front of the doorbell 202. The image 252 can be taken bythe camera assembly 208 and stored by the doorbell 202, server 206,and/or computing device 204. The user interface 240 can include arecording button 256 to enable a user to record images, videos, and/orsound from the camera assembly 208, microphone of the doorbell 202,and/or microphone of the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the doorbell 202. The user interface 240 canalso include a sound adjustment button 264 and a mute button 268. Theuser interface 240 can include camera manipulation buttons such as zoom,pan, and light adjustment buttons. In some embodiments, the cameraassembly 208 automatically adjusts between Day Mode and Night Mode. Someembodiments include an infrared camera and/or infrared lights toilluminate an area near the doorbell 202 to enable the camera assembly208 to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, and touching a touch screen. Many embodimentsinclude buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton 272, which can allow a user to select the quality and/or amountof the data transmitted from the doorbell 202 to the computing device204 and/or from the computing device 204 to the doorbell 202.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

The user interface 240 can include a termination button 276 to endcommunication between the doorbell 202 and the computing device 204. Insome embodiments, the termination button 276 ends the ability of theperson located near the doorbell 202 (i.e., the visitor) to hear and/orsee the user of the computing device 204, but does not end the abilityof the user of the computing device 204 to hear and/or see the personlocated near the doorbell 202.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and a termination button (to endcommunication between the doorbell 202 and the computing device 204).The button 276 can include the word “Answer” when the system isattempting to establish two-way communication between the visitor andthe user. Selecting the button 276 when the system is attempting toestablish two-way communication between the visitor and the user canstart two-way communication. The button 276 can include the words “EndCall” during two-way communication between the visitor and the user.Selecting the button 276 during two-way communication between thevisitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe doorbell and to stop emitting sounds recorded by the doorbell.

In some embodiments, the user interface 240 opens as soon as thedoorbell detects a visitor (e.g., senses indications of a visitor). Oncethe user interface 240 opens, the user can see and/or hear the visitoreven before “answering” or otherwise accepting two-way communication, inseveral embodiments.

Some method embodiments include detecting a visitor with a doorbell. Themethods can include causing the user interface to display on a remotecomputing device 204 due to the detection of the visitor (e.g., with orwithout user interaction). The methods can include displaying video fromthe doorbell and/or audio from the doorbell before the user acceptstwo-way communication with the visitor. The methods can includedisplaying video from the doorbell and/or audio from the doorbell beforethe user accepts the visitor's communication request. The methods caninclude the computing device simultaneously asking the user if the userwants to accept (e.g., answer) the communication request and displayingaudio and/or video of the visitor. For example, in some embodiments, theuser can see and hear the visitor via the doorbell before opening ameans of two-way communication with the visitor.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device can wonder whatis happening near the doorbell 202. The user can open the softwareapplication on the computing device 204 and instruct the application toshow live video and/or audio from the security device 202 even if noevent near the doorbell 202 has triggered the communication.

In several embodiments, the security device 202 can be configured torecord when the security device 202 detects movement and/or the presenceof a person. The user of the computing device 204 can later review allvideo and/or audio records from when the security device 202 detectedmovement and/or the presence of a person.

Referring now to FIG. 1, in some embodiments, the server 206 controlscommunication between the computing device 204 and the doorbell 202,which can be a doorbell with a camera, a microphone, and a speaker. Inseveral embodiments, the server 206 does not control communicationbetween the computing device 204 and the doorbell 202.

In some embodiments, data captured by the doorbell and/or the computingdevice 204 (such as videos, pictures, and audio) is stored by anotherremote device such as the server 206. Cloud storage, enterprise storage,and/or networked enterprise storage can be used to store video,pictures, and/or audio from the doorbell system 200 or from any part ofthe doorbell system 200. The user can download and/or stream stored dataand/or storage video, pictures, and/or audio. For example, a user canrecord visitors for a year and then later can review conversations withvisitors from the last year. In some embodiments, remote storage, theserver 206, the computing device 204, and/or the doorbell 202 can storeinformation and statistics regarding visitors and usage.

FIG. 3 illustrates an embodiment in which a doorbell 202 is connected toa building 300, which can include an entryway 310 that has a door 254. Avisitor 388 can approach the doorbell 202 and then can be detected bythe doorbell 202. The visitor 388 can press the doorbell button 212. Theuser of the doorbell 202 can configure the doorbell 202 such that whenthe visitor 388 presses the doorbell button 212, the user receives anotification regarding the visitor 388.

Electrical wires 304 can electrically couple the doorbell 202 to theelectrical system 312 of the building 300, such that the doorbell 202can receive electrical power from the building 300. The building caninclude a door lock 250 to lock the door 254.

A wireless network 308 can allow devices to wirelessly access theInternet. The doorbell 202 can access the Internet via the wirelessnetwork 308. The wireless network 308 can transmit data from thedoorbell 202 to the Internet, which can transmit the data to remotelylocated computing devices 204. The Internet and wireless networks cantransmit data from remotely located computing devices 204 to thedoorbell 202. In some embodiments, a doorbell 202 connects to a home'sWiFi.

As illustrated in FIG. 3, multiple computing devices 204 can communicatewith one doorbell 202. In some embodiments, one computing device 204(e.g., a laptop, a smartphone, a mobile computing device, a television)can communicate with multiple doorbells 202.

In some embodiments, the doorbell 202 can communicate (e.g., wirelessly230) with a television 306, which can be a smart television. Users canview the television 306 to see a visitor and/or talk with the visitor.

FIG. 4 illustrates an internal view of the doorbell 202. Doorbells 202can include a chip 480 (e.g., integrated circuits, microprocessor,computer) and a memory 492. Doorbells 202 can also include a microphone484 and a speaker 488. The speaker 488 can comprise a flat speaker and asound chamber 460 configured to amplify an emitted sound. The flatspeaker can be located in the sound chamber. Some doorbell embodimentsinclude a proximity sensor 500. In several embodiments, doorbells 202include a wireless communication module 504, such as a WiFi module. Thecommunication module 504 can have an integrated antenna. In someembodiments, an antenna is contained within the outer housing 224.

The doorbell 202 can include one or more heating elements 508 configuredto regulate the temperature of the doorbell 202. For example, doorbells202 can be used in very cold environments, such as in Alaska. Theheating element 508 can be used in various methods to protecttemperature sensitive portions of the doorbell 202 from cold weather.

While protecting the doorbell 202 from cold weather can be important insome embodiments, protecting visitors from excessive heat can also beimportant in some embodiments. Excessive heat could burn visitors asthey “ring” the doorbell (e.g., press the doorbell button 212 shown inFIG. 1). The doorbell 202 can include a thermometer 512 to enable thesystem to determine the temperature inside a portion of the doorbell 202and/or outside the doorbell 202.

Several embodiments can be configured for 9 to 40 volts alternatingcurrent (“VAC”) and/or 9 to 40 volts direct current (“VDC”). Someembodiments convert input electricity into direct current (“DC”), suchas 12 VDC. Several embodiments include a converter 494 for powerconversion (e.g., converting electrical energy from one form toanother). The converter 494 can convert input power (e.g., from wiringin a building) to a suitable power form for the doorbell 202. The powerconversion can convert between AC and DC, change the voltage, and/orchange the frequency. The converter 494 can include a transformer and/ora voltage regulator. In several embodiments, the converter 494 caninclude a voltage stabilizer, a linear regulator, a surge protector, arectifier, a power supply unit, a switch, an inverter, and/or a voltageconverter. In some embodiments, the converter 494 converts 50 Hertz(“Hz”) power into 60 Hz power.

The electrical components of the doorbell 202 (e.g., the camera assembly208, the memory 492, the chip 480, the speaker 488, the converter 494,the microphone 484, the lights 458, a rectifier, the proximity sensor500, the communication module 504, the heating element 508, theelectrical connectors 510, the thermometer 512, the image analysissystem 520, and the battery 462) can be electrically coupled to aprinted circuit board (“PCB”) 516 and can receive electrical power fromthe PCB 516.

The PCB 516 and the electrical components of the doorbell 202 can be theelectrical system 456 of the doorbell 202. Additional details regardingthe PCB 516 and the electrical components of the doorbell 202 aredescribed in U.S. Nonprovisional patent application Ser. No. 14/612,376;filed Feb. 3, 2015; and entitled DOORBELL COMMUNICATION SYSTEMS ANDMETHODS. The entire contents of patent application Ser. No. 14/612,376are incorporated by reference herein.

The doorbell 202 can include a detection system 528. The doorbell 202may be configured to alert the user to the presence of a visitor 388 by,for example, sounding a chime 302.

Although some embodiments are described in the context of devices andsystems, the device embodiments and the system embodiments can also beformulated as methods. Devices and systems described herein can beapplied to the methods incorporated by references herein.

Although some embodiments are described in the context of methods, themethod embodiments can also be formulated as devices and systems.Methods described herein can be applied to the devices and systemsincorporated by references herein.

Doorbell Package Detection Embodiments

Millions of parcels are delivered each week. Often, these parcels aredelivered during working hours when the homeowner is away at work. Whenthe parcels are too large to fit in a mailbox, mail carriers and otherdelivery personnel often leave the parcels on a front porch of the homeor even in a common area of an apartment building.

These parcels can sit unattended for long periods of time. Thieves seeunattended parcels as soft targets and often drive around neighborhoodslooking for unattended parcels. Thieves can jump out of a car, steal theparcel, and then drive away within seconds. With shopping being doneincreasingly online and the resulting increase in parcel deliveries,parcel theft is becoming more and more of a problem. Until now, littlehas been done to combat parcel theft.

Embodiments described herein include high-tech floor coverings (e.g.,mats) that can communicate wirelessly with a smart doorbell. The floorcoverings can include sensors, such as pressure sensors and opticalsensors, to detect when a parcel (e.g., a package, an envelope) isplaced on the floor covering.

The floor covering can “wake up” the smart doorbell by sending awireless communication (e.g., via Bluetooth Low Energy) to the doorbell.The doorbell can then send an alert to a remote computing device (e.g.,a smartphone) to alert the user regarding the arrival or removal of thedelivery parcel.

If the doorbell's motion sensor and/or camera detects a visitor when adelivery parcel is located on the floor covering, the doorbell can startrecording a video. If the visitor takes the delivery parcel, then thevideo will document who took the delivery parcel. If the system sensesthat the visitor removed the delivery parcel from the floor covering,the system can send an alert (e.g., a push notification) to the remotecomputing device. This alert can include the video.

The system can recognize when a delivery parcel has arrived via imagerecognition. The system can create a security zone around the deliveryparcel. If a visitor enters the security zone, the system can send analert to the remote computing device and/or emit lights and sounds(e.g., from the doorbell, from the floor covering). This security zonecan be a portion of the field of the view of the camera.

FIG. 5 illustrates a diagrammatic view of a delivery parcel detectionsystem 200. A doorbell 202 is mounted to an exterior of a building 300(e.g., in an entryway 310 near a door 254). The doorbell 202 can includea camera assembly 208 and a motion detector 218. The camera assembly 208and the motion detector 218 can detect when a visitor 388 approaches thedoorbell 202. This configuration enables the doorbell 202 to monitor thedelivery parcel 241, which can be located in the entryway 310.

The floor covering 235 can communicate with the doorbell 202 (e.g., cansend information to the doorbell 202). In some embodiments, the floorcovering 235 is communicatively coupled (e.g., wirelessly coupled) to awireless network 308 (e.g., of the building 300). The doorbell 202 canbe communicatively coupled to the same wireless network 308 as the floorcovering 235.

In several embodiments, the floor covering 235 communicates directly(via wires or wirelessly) with the doorbell 202. For example, Bluetooth,Bluetooth Low Energy, radio waves, and/or any suitable short-rangecommunication system or protocol can be used by the communication system504 b of the floor covering 235 to enable the floor covering 235 tocommunicate with the doorbell 202.

The doorbell 202 can communicate with a remote computing device 204,which can be located inside the building 300, outside the building 300,or even many miles away from the building 300. The doorbell 202 can becommunicatively coupled with the remote computing device 204 via thewireless network 308, the Internet, cellular networks, telecommunicationnetworks, the server 206, and/or any other suitable system.

The delivery parcel 241 is located on top of a floor covering 235, whichcan be a mat. As used herein, the term “delivery parcel” is used broadlyand can mean a box or envelope that is usually given, sent, or deliveredto a person. For example, a mail carrier, a FedEx Corporation deliveryworker, and any suitable delivery service can place a delivery parcel241 near the building 300. In some cases, a friend or neighbor places adelivery parcel 241 near the building 300 (e.g., on the floor covering235). Delivery parcels 241 can be large boxes, small boxes, odd-shapedpackages, large envelopes, small envelopes, and/or any object that isplaced on the floor covering 235.

As used herein, the term “floor covering” is used broadly. Floorcoverings are configured for placing on the ground. Floor coverings canbe mats. Mats can have a length and width that are more than ten timestheir thickness, which is measured vertically upward when the mat isplaced on the ground. In some embodiments, mats can be used to wipingsoiled shoe soles; however, not all mats are used for wiping shoe soles.For example, mats can be specially designed such that a delivery personcan place parcels on the mats. Mats can be made of fabric or can bemolded from plastic.

In FIG. 5, the floor covering 235 is located directly in front of thedoor 254, but in several embodiments, the floor covering 235 is locatedon the ground to the side of the door 254 to discourage visitors 388from stepping on the floor covering 235.

The floor covering 235 can include sensors 239 to detect whether adelivery parcel 241 is located on the floor covering 235. In someembodiments, these sensors 239 are pressure sensors.

The pressure sensors can be thin and flexible. Tekscan, Inc., having anoffice in South Boston, Mass., makes high resolution pressure sensorsthat can be embedded in floor coverings 235. The nature of Tekscan'spressure sensors enables the system 200 to detect the footprint and theweight of the delivery parcel 241. This information can be compared to adatabase of parcels that are expected to be delivered to the address atwhich the floor covering 235 is located. This comparison enables thesystem 200 to determine which expected parcel has a footprint and/orweight indicative of being the parcel 239 located on the floor covering235. The communication 230 b to the remote computing device 204 can theninclude information regarding the contents of the parcel 241.

Digi-Key Corporation, having an office in Thief River Falls, Minn.,sells many types of pressure sensors that can be embedded into the floorcovering 235. Digi-Key sells pressure sensors from FreescaleSemiconductor, Inc. that can be mounted to a PCB of the floor covering235. Digi-Key also sells pressure sensors from STMicroelectronics N.V.that can be surface mounted on the floor covering 235.

In several embodiments, floor covering 235 comprises sensors 239 thatare optical sensors. For example, the optical sensors can include lightemitting diodes (“LEDs”) that emit light upwards (away from the ground).The optical sensors can also include light sensors configured to detectthe light from the LEDs. The optical sensors can face upwards. If noobject is located on top of the floor covering 235, the light from theLEDs simply continues upward and is not sensed by the light sensors. Ifan object is located on top of the floor covering 235, the light fromthe LEDs can reflect off the object such that the light is redirectedback towards the light sensors. As a result, the light sensors candetect the object (e.g., a delivery parcel).

A light sensor can be located in the same upward facing hole as an LED,such that the light sensor is configured to detect light emitted fromthe LED if a delivery parcel covers the hole to deflect the lightemitted from the LED towards the light sensor. The light sensor can beconfigured to only detect a specific type of light emitted by the LED,such that the sensor system does not confuse the presence or lack ofsunlight as the presence or removal of a delivery parcel.

As shown in FIG. 5, a delivery parcel detection system 200 can include adoorbell 202 having a first wireless communication system 504 (shown inFIG. 4); and a floor covering 235 configured for placement on the ground(e.g., an entryway floor). The floor covering 235 can comprise a sensor239 configured to detect a first indication of a delivery parcel 124 onthe floor covering 235. The floor covering 235 is communicativelycoupled to the doorbell 202 (e.g., via wires or wirelessly). Thedoorbell 202 can be mounted to a wall of the building 300 while thefloor covering is located on the ground. The floor covering 235 can be amat that includes a battery to provide electrical power to electricalcomponents of the floor covering 235.

The system 200 can include a first communication 230 a (e.g., aBluetooth wireless communication) sent from the floor covering 235 tothe doorbell 202 in response to the floor covering 235 detecting thefirst indication of the delivery parcel 241. The system 200 can alsoinclude a second communication 230 b (e.g., a wireless communication)sent from the doorbell 202 to a remote computing device 204 in responseto the doorbell 202 receiving the first communication 230 a.

The doorbell 202 can include a camera 208. The second communication 230b can comprise a first picture 243 taken by the doorbell 202, such thatthe doorbell 202 is configured to send the first picture 243 to theremote computing device 204 in response to the floor covering 235detecting the first indication of the delivery parcel 241. Asillustrated in FIG. 5, the first picture 243 can show the deliveryparcel 241 to enable the user of the remote computing device 204 to seethe delivery parcel 241. The first picture 243 can be sent directly fromthe doorbell 202 to the computing device 204, but in many embodiments,the first picture 243 is sent from the doorbell 202 to the remotecomputing device 204 indirectly (e.g., via a server 206).

The first indication of the delivery parcel 241 can be a weight of thedelivery parcel 241 sensed by the floor covering 235 (e.g., via apressure sensor). The first indication of the delivery parcel 241 canalso be a light sensed by a light sensor (e.g., as described above). Thefirst indication can be due to the arrival of the delivery parcel (e.g.,a pressure increase, a light increase) or can be due to a removal of thedelivery parcel from the floor covering 235 (e.g., a pressure decrease,a light decrease).

The first indication can be associated with an arrival of the deliveryparcel 241 to the floor covering 235. The first indication can beassociated with a removal of the delivery parcel 241 from the floorcovering 235. The communication 230 b sent to the remote computingdevice 204 can indicate if the delivery parcel 241 arrived or wasremoved.

The system 200 can also comprise a first alert 232 regarding thedelivery parcel 241. In some embodiments, the first alert is a pushnotification sent to the remote computing device 204 (e.g., sentwirelessly over various communication networks, sent via WiFi). Thefirst alert 232 can be a text message on the remote computing device.The first alert 232 can be a graphic displayed on the screen of theremote computing device 204. The graphic can be configured to enable auser of the remote computing device 204 to see information regarding thedelivery parcel (e.g., a picture of the parcel, a time of parcelarrival, a time of parcel removal, an identity of the person whodelivered the parcel, an identity of the person who removed the parcel).

The first alert 232 can be displayed on the remote computing device 204in response to the remote computing device 204 receiving the secondcommunication 230 b from the doorbell 202. The system 200 can include agraphical user interface 240 displayed on the remote computing device204. The graphical user interface 240 can be configured to displayinformation regarding the delivery parcel 241.

This information regarding the delivery parcel 241 can be displayedsimultaneously with weather information (e.g., as detected by the system200) described in U.S. Nonprovisional patent application Ser. No.14/813,479; filed Jul. 30, 2015; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS, which is incorporated by references herein. Forexample, the display can show information such as, “your package isoutside in the rain” or “wind of 25 miles per hour is blowing your mailaway.”

As shown in FIG. 5, the graphical user interface shows a picture 243 ofthe delivery parcel 241. The graphical user interface 240 can displaythe following information, and any other relevant information, regardingthe delivery parcel 241: delivery time, to whom the delivery parcel isaddressed, sender information, contents, and the status. The status canindicate whether the delivery parcel 241 is currently located on thefloor covering 235. The status can also indicate if the delivery parcel241 is still within a detection range (e.g., a field of view of thecamera 208) of the doorbell 202.

The graphical user interface 240 is configured to enable changing atleast one setting of the lights 216 b of the doorbell 202. The userinterface 240 can include buttons 237 (e.g., touch screen icons, whichare not necessarily physical buttons). At least one of these buttons 237can be a light adjustment button configured to enable changing settingsof a light 216 b (e.g., an LED) of the doorbell 202.

The setting that is changed by the button 237 can be a color of thelight 216 b. For example, the color can change from red to green to blueto white. Millions of color combinations are possible with LEDs. Thecolor can correspond with holiday colors or special occasions. Thesetting that is changed by the button 237 can be a brightness of thelight 216 b. For example, the button 237 can act as a light dimmer.

In some embodiments, the system 200 automatically changes the setting inresponse to the floor covering 235 detecting the first indication of thedelivery parcel 241. For example, parcel 241 removal can cause a redlight to flash from the doorbell 202 and/or from the floor covering 235.Parcel 241 arrival can cause a green light to flash.

In several embodiments, the system 200 (e.g., the doorbell) emits asound or audible words in response to detecting the arrival or removalof the parcel 241. The sound and/or words can thank the deliver and/orwarn the remover.

Many types of warning sounds be can emitted from the doorbell 202 (e.g.,from the speaker 488 shown in FIG. 4) in response to the system 200detecting a removal of the delivery parcel 241 from the floor covering235. The floor covering 235 can also emit the warning sound from aspeaker 488 b. The warning sound can be a voice saying a predeterminedmessage such as, “stop, package theft is against the law.” Reducedpressure, as sensed by the floor covering 235, can enable the system 200to detect the removal of the parcel 241.

In addition to having a speaker 488 b, the floor covering 235 can alsoinclude many warning lights 216 c, which can be LEDs. In severalembodiments, a warning light and a warning sound are emitted from atleast one of the doorbell 202 and the floor covering 235 in response tothe system 200 detecting motion (e.g., via the motion detector 218).

In some embodiments, a warning light and a warning sound are emittedfrom at least one of the doorbell 202 and the floor covering 235 inresponse to the system 200 detecting that an object (e.g., a visitor388) has moved into a field of view of a camera 208 of the doorbell 202.For example, if a visitor 388 approaches the doorbell 202 and/or thefloor covering 235 while a parcel 241 is located on the floor covering235 and/or detected by the doorbell 202, the doorbell 202 and/or thefloor covering 235 can emit the warning light from the lights 216 b, 216c and can emit the warning sounds from the speakers 488 b, 488 (shown inFIG. 4). Thus, the system 200 can emit the warnings in response tomotion and/or object detection plus in response to the system 200determining the delivery parcel 241 is located on the floor covering235.

In some embodiments, the system 200 is configured to not emit a warningif a person carrying the remote computing device 204 is the one removingthe parcel 241. In contrast, if a person is removing the parcel 241 whenthe remote computing device 204 is located far from the doorbell 202(e.g., is away from home), then the person removing the parcel 241 canbe a thief. Thus, some embodiments include a warning light and a warningsound emitted from at least one of the doorbell 202 and the floorcovering 235 in response to the system 200 detecting a removal of thedelivery parcel 241 from the floor covering 235 during a period when thesystem has determined that the remote computing device 204 is at leastone of not located within a predetermined distance of the doorbell 202and not located within a detection range of the doorbell 202. Thepredetermined distance can be within 30 meters of the doorbell 202.

The system 200 can determine if the computing device 204 is within apredetermined distance based on Global Positioning System (“GPS”)information from the doorbell 202 and the remote computing device 204.The system 200 can determine if the remote computing device 204 iswithin a detection range of the doorbell 202 via the doorbell 202 tryingto communicate with the remote computing device 204 directly via ashort-range communication protocol such as Bluetooth. If the remotecomputing device 204 does not respond to the Bluetooth signal from thedoorbell 202, then the system 200 determines that the remote computingdevice 204 is outside of the detection range of the doorbell 202.

Doorbell 202 power consumption minimization can be important, especiallyin embodiments in which the doorbell 202 is powered exclusively viabattery power (rather than via electrical wires 304 from a building 300as shown in FIG. 3). In some embodiments, the doorbell 202 is in a SleepMode that precludes the camera 208 from recording without exiting theSleep Mode. The floor covering 235 detecting parcel 241 delivery,movement, or removal can cause the doorbell 202 to exit the sleep mode,take a picture, and/or start recording a video. The picture and videocan be sent to the server 206 and/or to the remote computing device 204.In some embodiments, the doorbell 202 comprises an electrical powerconsumption rate that increases in response to the floor covering 235detecting the first indication of the delivery parcel 241 (e.g., due tothe activity of the camera 208).

In several embodiments, the doorbell 202 comprises a camera 208configured to take at least one picture in response to the floorcovering 235 detecting the first indication of the delivery parcel 241.The sensor 239 can comprise a pressure sensor configured such thatplacing the delivery parcel 241 on the floor covering 235 enables thepressure sensor to detect the first indication.

A camera 208 can be electrically coupled to the doorbell 202. The camera208 can also be electrically coupled to the floor covering 235. Thesystem 200 can comprise a video taken by the camera 208 in response tothe system detecting a removal of the delivery parcel 241. A video canbe taken by the camera 208 in response to the camera 208 detecting anobject (e.g., a visitor 388) that has moved into a field of view of thecamera 208 during a period when the system 200 has determined thedelivery parcel 241 is located on the floor covering 235.

The doorbell 202 can include a motion detector 218. The floor coveringcan also include a motion detector 218, which can have all the samefeatures and functions of the motion detector 218 of the doorbell 202.In some embodiments, a motion detector 218 and a camera 208 areelectrically coupled to at least one of the doorbell 202 and the floorcovering 235. The system 200 can comprise a video taken by the camera208 in response to the motion detector 218 detecting a motion indicationduring a period when the system 200 has determined the delivery parcel241 is located on the floor covering 235. A second communication 230 bcan be sent from the doorbell 202 to the remote computing device 204 inresponse to the motion detector 218 detecting the motion indication. Thesecond communication 230 b can comprise the video.

In several embodiments, the first indication is associated with aremoval of the delivery parcel 241 from the floor covering 235. Thesystem can further comprise a first communication 230 a sent from thefloor covering 235 to the doorbell 202 in response to the floor covering235 detecting the first indication. The system can also comprise asecond communication 230 b sent from the doorbell 202 to a remotecomputing device 204 in response to the doorbell 202 receiving the firstcommunication 230 a. As described previously, a camera 208 can beelectrically coupled to at least one of the doorbell 202 and the floorcovering 235. The second communication 230 b can comprise a picturetaken by the camera 208 within five seconds of the sensor 239 detectingthe first indication. Taking the picture within five seconds can helpensure the picture (which can be a video) shows the thief who removedthe parcel 241 (via the system 200 taking the picture before the thiefis able to run away).

The system 200 can take pictures 245 when the system 200 detects thearrival of the parcel 241, a visitor 388 moving (e.g., towards thedoorbell 202), a movement of the parcel 241, and/or the removal of theparcel 241. The communication 230 b between the doorbell 202 and theremote computing device 204 can include these pictures 245. Thus, thesystem 200 can send many pictures to the remote computing device 204depending on the preferences of the user of the remote computing device204. As used herein, sending a video includes sending a picture (becausea picture is a portion of a video). Thus, a picture can be a stillpicture and can be an instant of a video (e.g., can be one frame of avideo).

A doorbell communication 230 d regarding the parcel 241 can be sent viaa wireless network 308 (e.g., of the building 300), via Bluetooth, viacellular networks, via telecommunication networks, via the Internet,and/or via a server 206 to the remote computing device 204. In someembodiments, another remote computing device 204 n also receives thedoorbell communication 230 d regarding the parcel 241. The doorbellcommunication 230 d can include a picture 243 of the parcel 241 and/or apicture 243 taken by a camera 208, 208 b of the system 200 at a timewithin 5 seconds of the doorbell 202 and/or the floor covering 235detecting of an indication of the parcel 241 (e.g., an arrival of theparcel 241, a movement of the parcel 241, and/or a removal of the parcel241 from the floor covering 235 and/or from a field of view of thedoorbell 202).

In some embodiments, the second remote computing device 204 n is aneighbor's remote computing device. The doorbell communication 230 d caninclude a request for the neighbor to pick up and move the parcel 241.In response to this request, the neighbor can bring the parcel 241 tothe neighbor's home to prevent the parcel 241 from being stolen untilthe parcel's owner can get the parcel 241 from the neighbor.

Some embodiments of the system 200 use the floor covering 235 to detectparcels 241. Some embodiments of the system 200, however, do not use thefloor covering 235 to detect parcels 241. For example, the doorbell 202can use the camera 208 to detect parcels 241.

The doorbell 202 can use the camera 208 to take a picture 243 when thedoorbell 202 detects movement (via the camera 208 and/or via the motiondetector 218). The system 200 can then analyze the picture 243 todetermine if the picture 243 shows a parcel 241. This picture analysiscan use image recognition procedures to look for indications of a parcel241 in the picture 243. For example, the image recognition procedure caninclude looking for colors that are typical of cardboard delivery boxes(e.g., brown). The image recognition procedure can include looking forflat surfaces connected at approximately ninety degree angles (which areindicative of a box shape). The image recognition procedure can includelooking for flat surfaces located in different locations in images takenat different times (which is indicative of a box being carried towardsthe doorbell 202 such that the box is located in a first position in afirst picture and is located in a second position in a second picturetaken within 10 seconds of the first picture).

The parcel 241 detection procedure can also include using the microphone484 (shown in FIG. 4) of the doorbell 202 to listen for soundsindicative of delivery vehicles (e.g., the sounds of large engines andheavy trucks typical of delivery services such as FedEx Corporation andUnited Parcel Service, Inc.). The system 200 can also use the microphone484 to listen for sounds indicative of a parcel 241 being dropped on afloor (e.g., of an entryway 310). The system 200 can then analyze thesounds to identify that the parcel 241 has been delivered to thebuilding 300 (e.g., the parcel 241 is located outside of the building300 within a detection range of the doorbell 202).

The system 200 can hear a delivery vehicle stop within a detection rangeof the doorbell 202 (e.g., within a range that the microphone 484 canhear the delivery vehicle). However, the system 200 can not know if thedelivery vehicle left a parcel 241 at the building 300 or at aneighbor's home. The system 200 can distinguish between deliveries toneighbors' homes and deliveries to the building 300 by identifying aparcel delivery in response to detecting movement (via the camera 208and/or via the motion detector 218) within 30 seconds of detectingsounds indicative of a delivery vehicle.

In FIG. 5 illustrates a perspective view of the floor covering 235. Theview of FIG. 5 shows a front view of the door 254. FIG. 5 is a view thata visitor 388 typically sees as she walks towards a door 254 of a home.

FIG. 6 illustrates a diagrammatic view of the floor covering 235. FIG. 6illustrates a top view of the floor covering 235 and a front view of thedoorbell 202. Electrical wires 304 electrically couple the doorbell 202to the floor covering 235 to enable the doorbell 202 to provideelectrical power to the floor covering 235 (or vice versa). The doorbell202 can receive electrical power from the building 300 (shown in FIG. 5)and then can provide at least a portion of the electrical power to thefloor covering 235 via the electrical wires 304 (e.g., while thedoorbell 202 is mounted to a wall of the building 300 and while thefloor covering 235 is located on the ground). The electrical wires 304can also be used for one-way communication and/or two-way communicationbetween the doorbell 202 and the floor covering 235.

Several embodiments do not include electrical wires 304 between thedoorbell 202 and the floor covering. The doorbell 202 can sendcommunications 230 c to the floor covering 235 wirelessly. The floorcovering 235 can send communications 230 a to the doorbell 202wirelessly.

The floor covering 235 can comprise a PCB, a speaker 488 b, a light 216c, a battery 462 b, a camera 208 b, and a motion detector 218 b. Thefloor covering 235 can also include a communication system 504 bconfigured to enable communication between the floor covering 235 andthe doorbell 202. The communication system 504 b can include atransceiver. The communication system 504 b can be a Bluetoothcommunication system, which can use Bluetooth Low Energy.

The sensor 239 can be configured to detect parcels on at least 60percent of the top surface of the floor covering 235. This configurationcan help minimize the occurrences of failing to detect a parcel that islocated on the floor covering 235. The sensor 239 can be made of manyindividual pressure sensors, light sensors, package sensors, and/or anysensor configured to detect a parcel.

Although some embodiments are described in the context of devices andsystems, the device embodiments and the system embodiments can also beformulated as methods. Some embodiments include methods of detectingparcels. Methods can include obtaining a delivery parcel detectionsystem comprising a doorbell having a first wireless communicationsystem; and a floor covering configured for placement on an entrywayfloor. The floor covering can comprise a sensor. Methods can includedetecting, by the sensor of the floor covering, a first indication of adelivery parcel on the floor covering. Methods can includecommunicatively coupling the doorbell to the floor covering; mountingthe doorbell to a building; and/or placing the floor covering in on anentryway floor.

Several embodiments include sending a first communication from the floorcovering to the doorbell in response to the floor covering detecting thefirst indication of the delivery parcel. Some methods include sending asecond communication from the doorbell to a remote computing device inresponse to the doorbell receiving the first communication.

The second communication can comprise a first picture taken by thedoorbell. Some methods comprise sending, by the doorbell, the firstpicture to the remote computing device in response to the floor coveringdetecting the first indication of the delivery parcel.

Referring now to FIGS. 7 and 8, in several embodiments, a deliveryparcel detection system 700 includes a doorbell 702, a remote computingdevice 704, and a delivery parcel 706. The doorbell 702 may have a firstwireless communication system 708 and a radio-frequency identificationreader 710. The doorbell 702 can be attached to the outside wall of abuilding 711, for example near a door 713. The remote computing device704 may be communicatively coupled with the doorbell 702 via the firstwireless communication system 708. The first wireless communicationsystem 708 may be configured to interface with or include a wirelessnetwork 709. The delivery parcel 706 may have a radio-frequencyidentification tag 712. When a parcel 706 with a radio frequencyidentification tag 712 is left near the door 713 by, for example, a mailcarrier, the doorbell 702 can detect the parcel 706. The doorbell 702detects the parcel 706 by the radio-frequency identification reader 710reading the radio-frequency identification tag 712 of the deliveryparcel 706.

When the doorbell 702 detects the radio-frequency identification tag712, a first communication 714 can be sent from the doorbell 702 to aremote computer system 716. The remote computer system 716 may comprisea database 718. The remote computer system 716 may be affiliated withthe sender. The database 718 may have information 715 regarding thedelivery parcel 706. A second communication 720 may be sent from theremote computer system 716 to the doorbell 702 in response to the remotecomputer system 716 receiving the first communication 714. The secondcommunication 720 may comprise the information 715 regarding thedelivery parcel 706.

In some embodiments, the system 700 may further comprise a thirdcommunication 722 sent from the doorbell 702 to the remote computingdevice 704 in response to the doorbell 702 receiving the secondcommunication 720. The third communication 722 can contain theinformation 715 that was received by the doorbell 702 from the sender.The third communication 722 may also contain a time 724 indicative ofwhen the doorbell 702 first detected the delivery parcel 706.

For example, the user may order a product from the sender online. Thesender ships the product and when it arrives on the doorstep (thedelivery parcel 706), the doorbell 702 detects the parcel 706 and sendsa communication 714 to the sender that the parcel 706 has arrived at itsdestination. The sender may then send information 715 associated withthe delivery parcel 706 back to the doorbell 702. Once the doorbell 702has this information 715 it may send it on, in another communication, tothe user, thus allowing the user to be notified that they have a parcel706 and information 715 about it. The communication may also notify themof the time of delivery of the parcel 706. The information 715associated with the delivery parcel 706 may be a description of thecontents of the parcel 706, the name of the sender of the parcel 706,the value of the parcel 706, etc. The remote computer system 716 may be,for example, a server, a website, a computer, or a workstation.

Referring now to FIG. 9, the doorbell 702 may also include a camera 730to allow the user to see the parcel 706 that has been delivered. Whenthe doorbell 702 detects a parcel 706, it may take a picture of theparcel 706 and send it to the remote computing device 704 in a fourthcommunication 726. A fourth communication 726 may also be sent from thedoorbell 702 to the remote computing device 704 in response to thedoorbell 702 receiving the second communication 720. The fourthcommunication 726 may comprise a first picture 728 taken by a camera730. The first picture 728 may show the delivery parcel 706.

Referring now to FIG. 10, in several embodiments the system 800 maycomprise a first notification 814 sent from the doorbell 802 to theremote computing device 804 in response to the doorbell 802 detectingthe radio-frequency identification tag 812 of the delivery parcel 806.The first notification 814 may comprise a first picture 828 taken by acamera 830 of the doorbell 802 in response to the doorbell 802 detectingthe radio-frequency identification tag 812 of the delivery parcel 806.The remote computing device 804 may have a display screen 832 to allow auser to, for example, view at least a portion of the first picture 828displayed on the display screen 832. The system 800 may be configured toenable a user of the remote computing device 804 to see the deliveryparcel 806 on the display screen 832 in response to the firstnotification 814.

Referring now to FIGS. 11 and 12, the doorbell 802 may be attached to abuilding 811, for example, near a door 813. The doorbell has aradio-frequency identification reader 810, which has a specificdetection range 834. When a package is brought into this detection range834, the radio-frequency identification reader 810 is able to read theradio-frequency identification tag 812 on the parcel 806. The system 800may send a notification 814 to the remote computing device when a parcel806 with a radio-frequency identification tag 812 enters the detectionrange 834. Likewise, if a parcel 806 with a radio-frequencyidentification tag 812 is removed from the detection range 834 (i.e. isno longer detected by the doorbell 802), the doorbell 802 may send anotification 820 to the remote computing device 804. The removal of aparcel 806 may trigger the camera 830 to take a picture 836. The picture836 may allow a user to determine if the parcel 806 was stolen, or blownaway, etc. The notification 820 that the parcel 806 has been removedcould also alert a user when a parcel 806 is picked up by, for example,a mail carrier. The notification 820 that the parcel 806 has beenremoved may contain the picture 836 taken by the camera 830 of thedoorbell 802 as well as other information (i.e. the time, date, etc.).

Referring now to FIGS. 13 and 14, the doorbell 802 may also detect whenthe parcel 806 is moving. It may detect the parcel moving by comparingstrengths of two different signals 838, 842 from the radio-frequencyidentification tag 812 on the parcel 806. For example, the system 800may further comprise a first signal 838 of the radio-frequencyidentification tag 812 detected by the doorbell 802 at a first time, asecond signal 842 of the radio-frequency identification tag 812 detectedby the doorbell 802 at a second time 844, and a second notification 820sent from the doorbell 802 to the remote computing device 804. Thesystem may determine that the parcel is moving farther from the doorbell802 or is being removed if the second signal 842 is weaker than thefirst signal 838. In response to the doorbell 802 detecting the parcelmoving farther from the doorbell or a removal of the delivery parcel 806the doorbell 802 may send a second notification 820 to the remotecomputing device 804. The doorbell 802 may also take a picture 836 withthe camera 830 in response to the doorbell 802 detecting the parcel 806is moving or is removed. The second notification 820 may comprise thesecond picture 836 taken by a camera 830 of the doorbell 802. Theradio-frequency identification tag 812 may be an active tag. Thedoorbell 802 may be configured to detect the delivery parcel 806 by theradio-frequency identification reader 810 reading the passiveradio-frequency identification tag 812 of the delivery parcel 806. Thedoorbell 802 may be configured to detect the delivery parcel 806 by theradio-frequency identification reader 810 reading the activeradio-frequency identification tag 812 of the delivery parcel 806.

Package theft is a growing problem. One way to combat package theft isto enable a delivery person to place packages inside the home. Thisapproach, however, often depends on providing a key to the deliveryperson. Some embodiments provide physical keys, but many embodimentsprovide temporary digital keys that enable the delivery person to unlocka smart lock that secures the door.

Ensuring that only authorized delivery personnel can use digital keys isimportant. Embodiments provide diverse ways to help appropriate deliverypersonnel to gain access to homes while precluding, for example, aburglar from using a package to open a lock.

FIG. 15 shows a delivery parcel detection system 900. A delivery personmay receive a digital key 901 from a delivery parcel detection system900, from a smart lock 903, and/or from a doorbell 902. The deliveryperson may receive the digital key 901 on, for example, the remotecomputing device 904 of the delivery person. The digital key 901 can beconfigured to enable unlocking a door 913 of a building 911 to which adelivery parcel 906 is addressed to permit the delivery person to placethe delivery parcel 906 inside the building 911 in response to detectingthe digital key 901. The building 911 may be one or more of thefollowing: a house, an apartment, a hotel room, a business, an office, ashed, or a closet. The door 913 may include a lock system 903 configuredto impede unauthorized entry into the building 911. The system mayinclude a wireless network 909. At least one of a doorbell 902 and thelock system 903 may detect the digital key 901 via a first wirelesscommunication 920 from the remote computing device 904 to at least oneof the doorbell 902 and the lock system 903. Enabling the door 913 to beunlocked can include unlocking the door 913 in response to detection ofthe digital key 901, disengaging the locking mechanism to allow the door913 to be opened, allowing a lock 903 to be turned by a delivery personprior to opening the door 913, and/or enabling a code or a password tobe used to unlock the door 913. The door 913 can be any door of abuilding. In some embodiments, the door 913 is a front door with sidehinges. In several embodiments, the door 913 is a garage door configuredto be opened vertically by a garage door opener. In some embodiments,the door 913 is a gate.

Further security measures may be used or designed to, for example,ensure security of the building 911. Some of these security measures mayincorporate one or more of the following: timed delivery windows,package identification, delivery vehicle tracking, proximity detectors,delivery person identification, video surveillance, and/or anycombination thereof.

The digital key 901 can be sent to a remote computing device 904 such asa smartphone or the package scanning device often used by deliverypersonnel. The remote computing device 904 can be communicativelycoupled to the doorbell 902 and/or lock 903 of the building 911 via adirect wireless communication and/or via indirect wireless communication(e.g., through a cellular network or the cloud).

Referring now to FIG. 16, it may not be desirable for a delivery personto have a digital key 1001 that can allow them access to a house orbuilding 1011 at any time. One way to increase security and bettercontrol access to the building 1011 or room can include the deliveryparcel 1006 having an expected delivery time window 1005. Many deliveryservices already provide an expected delivery time or expected deliverytime window 1005, i.e., between 10:00 am to 2:00 pm on Wednesday, forwhen the parcel 1006 will be delivered. There are several ways tocontrol access to the house or building 1011 using the expected deliverytime window 1005. For example, the digital key 1001 can be sent to theremote computing device 1004 only once this time window 1005 hasarrived, e.g., at 10:00 am on Wednesday in the example above. Thedigital key 1001 can be configured to enable unlocking the door 1013during a delivery window 1005. For example, if a delivery parcel 1006(such as a package or envelope) is scheduled to arrive from 10:00 am to2:00 pm on Wednesday, the digital key 1001 will only enable unlockingthe lock 1003 from 10:00 am to 2:00 pm on Wednesday. The digital key1001 may also be sent within a predetermined period prior to theexpected delivery time window, e.g., the digital key 1001 is sent onehour prior to the expected delivery time window 1005, and then thesystem 1000 may only enable the digital key 1001 once the expecteddelivery window 1005 has arrived. Since, packages do not always arriveprecisely within their expected delivery window 1005, in someembodiments, the digital key 1001 will also permit unlocking the lock1003 for a certain amount of time before and after the delivery window.(i.e., ten minutes before the expected delivery window 1005). Enablingthe digital key 1001 can include the system recognizing the digital key1001 or configuring the lock 1003 and/or doorbell 1002 to unlock thedoor 1013 in response to detecting the digital key 1001. The digital key1001 may also be disabled in response to a second time being past theexpected delivery time window 1005 or a second time being outside of acertain amount of time after the expected delivery window 1005.Disabling the digital key 1001 can include the system 1000 no longerrecognizing the digital key 1001 or configuring the lock 1003 and/ordoorbell 1002 to not unlock the door 1013 in response to detecting thedigital key 1001. By enabling the digital key 1001 only during anexpected time window 1005, or for a certain time around an expected timewindow 1005, and/or disabling it after the expected time window 1005, ora certain time around an expected time window 1005, users can bettercontrol access to the building 1011 or home.

Referring now to FIGS. 17, 18 a, and 18 b, another way to increasesecurity would be to “tie” the digital key 1101 to the parcel 1106. Thedigital key can be “tied” to the parcel delivery such that the digitalkey is not functional unless used in conjunction with the parceldelivery. Tying the parcel 1106 to the digital key 1101 would only allowthe digital key 1101 to function when used in conjunction with theparcel delivery. This may be used as another line of security. A personwho has the digital key 1101 but not the parcel 1106 cannot gain accessto the building 1111 and likewise, someone who has the parcel 1106 butnot the digital key 1101 cannot gain access.

One way to tie the parcel 1106 to the digital key 1101 is with the useof a parcel identification code 1116. The doorbell 1102 and/or the locksystem 1103 can receive 1150 a delivery parcel identification code 1116of the delivery parcel 1106. The doorbell 1102 or lock system 1103 mayreceive 1150 the delivery parcel identification code of the deliveryparcel 1106 by detecting it (i.e., when the delivery parcel 1106 orremote computing device 1104 is within direct wireless communicationwith the lock system 1103 or doorbell 1102), it may be received when thedelivery person manually enters or scans a code, or in some other way.The delivery parcel identification code 1116 may be a radio-frequencyidentification (“RFID”) tag, a barcode, or another type ofidentification code. The delivery parcel identification code 1116 can bescanned by the delivery person, using his remote computing device 1104or another scanner, or may be scanned by the lock 1103 and/or doorbell1102 either wirelessly or via a reader 1114. The doorbell 1102 and/orthe lock system 1103 can also detect 1152 a digital key 1101. Inresponse to both detecting 1152 the digital key 1101 and receiving 1150the delivery parcel identification code 1116 the system can enableunlocking 1154 of the door 1113. The system does not enable unlocking1156 of the door 1113 if it does not detect 1152 the digital key 1101 ordoes not receive 1150 the parcel identification code 1116. In order toensure that the delivery parcel identification code 1116 is associatedwith a parcel 1106 which is expected by the user, the system 1100 canverify 1155 any number of features of the parcel 1106 prior to enabling1154 the lock 1003 to be disengaged, as shown in FIG. 18b . For example,the system 1100 can verify that the delivery parcel identification code1116 corresponds to an expected delivery time window. The system 1100can verify that the delivery parcel identification code 1116 correspondsto an expected delivery item, i.e., something the user has ordered andis expected to be delivered. If the parcel 1106 does not correspond toan expected parcel 1106, the system does not enable 1156 unlocking ofthe door 1113.

Referring now to FIGS. 19 and 20, the doorbell 1202 can include a camera1230. The camera 1230 could allow the doorbell 1202 to be configured toautomatically record video upon detection of a delivery person (e.g., aUPS, FedEx, or USPS delivery person). The system 1200 can be configuredto know that the package delivery is authorized, can record a video ofthe delivery and/or of the parcel 1206, and/or can save the video as adelivery recording.

Retailers and delivery services may want to know that a parcel 1206 hasbeen correctly delivered. The video can be sent to an entity associatedwith the delivery (e.g., to show Amazon that their parcel 1206 wasdelivered to the delivery address). This video can be used to resolvedisputes regarding whether the parcel 1206 was actually delivered topreclude customers from receiving a parcel 1206, claiming they did notreceive the parcel 1206, and then receiving a refund.

The system 1200 can include the ability to use visual analysis to detectthe shape (i.e rectangle, square, circle, etc) of a parcel 1206 andnotify the user that her parcel 1206 has arrived. Shape recognition maybe used to verify the parcel 1206 is an expected delivery item prior tosending the digital key 1201 or prior to enabling the lock 1203 to bedisengaged. The notification can specify whether the parcel 1206 isoutside on the ground or is in their possession (e.g., inside the home).

The doorbell 1202 records a video 1264 in response to detecting 1260 thedelivery person and/or in response to determining 1262 that the deliveryparcel 1206 is an expected delivery item. The system may enable theunlocking 1254 of the door in response to determining the parcel 1206 isan expected parcel and does not enable the unlocking 1256 of the door inresponse to determining the parcel 1206 is not an expected deliveryparcel. A parcel 1206 may be an envelope, a box, a padded envelope, abag, and/or container. Several methods may be used to determine that thedelivery parcel 1206 is an expected delivery item including RFID tagscanning, bar code scanning by the camera 1230, reader 1214, or remotecomputing device 1204, shape recognition, label identification, etc. Thevideo can then be saved 1268 to a phone, computer, the cloud, otheronline storage, or within the doorbell system itself and labeled 1266 asa delivery. A doorbell 1202 can record many videos during the day,labeling 1266 the video indicates to a doorbell user that the videoshows the delivery of at least one item. A user may have many videos ontheir phone, computer, or the cloud, and a label may be useful inidentifying a video that contains data relating to a parcel 1206 thusallowing the user to more easily find the appropriate video.

When a video is recorded 1264 by the doorbell, several methods may beused to determine that the video shows a delivery. Once it is determinedthe video shows a delivery, then the video may be labeled to indicatethat the video shows a delivery. The labeling can indicate to a doorbelluser that the video shows the delivery of at least one item. Videos maythen be sent to an entity 1270 associated with sending the deliveryparcel. For example, if the delivery parcel is from Amazon, the entitycan be Amazon, a third party that organizes the sending the deliveryparcel, or the delivery service provider such as UPS, FedEx, or USPS, orany combination of those.

Referring now to FIGS. 21a, 21b , and 22, a digital key 1301 can be acode that the delivery person enters or it can be transmitted from theremote computing device 1304 to the lock 1303 or doorbell 1302 withoutthe delivery person ever seeing the actual “key”. In order to limit thetime that the digital key 1301 is active and therefore the time that thedelivery person has access to a house or other building, the digital key1301 may be sent to the delivery person or the remote computing device1304 only when they are within a certain distance of the building orwhen they are at a certain location. The system 1300 detects 1360 whenthe remote computing device 1304 is at a first location and in responseto detecting 1360 that the remote computing device 1304 is at thislocation, sends 1362 the digital key 1301 to the remote computing device1304. The first location can be the delivery warehouse, the scheduledstop before the delivery of the user's package, the house or building ofthe user, or a specific distance away from the house or building of theuser (i.e., within one mile of the lock system or the doorbell or withinone mile of the lock system or doorbell, etc.). Several methods may beused to determine the location of the remote computing device 1304,including GPS tracking, or tracking over a cellular network. The digitalkey 1301 may also be delivered to the remote computing device 1304 inresponse to the remote computing device 1304 being within a directwireless communication range 1370 of the doorbell 1302 or lock system1303. Direct wireless communication range 1370 may be the range of WiFiassociated with the doorbell 1302 and/or lock 1303, the range ofBluetooth associated with the lock 1303 and/or doorbell 1302, the rangeof an RFID reader associated with the lock 1303 and/or doorbell 1302, orthe range of another wireless communication system associated with thelock 1303 and/or doorbell 1302. Likewise, the digital key 1301 may besent to the remote computing device 1304 at any time prior to deliveryand then only activated once the remote computing device 1304 has beendetected at the first location. It may also be desirable to deactivate1366 the digital key 1301 when the remote computing device 1304 isdetected 1364 at a second location. For example, the digital key 1301may be deactivated 1366 when the remote computing device 1304 isdetected at the next scheduled delivery stop, when the remote computingdevice 1304 is detected to be outside of a certain distance of the houseor building, or when the remote computing device 1304 is no longer in adirect wireless communication range 1370 of the doorbell 1302 and/orlock 1303.

Some types of remote computing devices are small and can be stolen orgiven to another person. Referring now to FIGS. 23, 24 a, and 24 b,tracking the location of the delivery vehicle 1405 may be a more secureway to ensure that only the person delivering the parcel 1406 has accessto the house or building. The digital key 1401 may be sent 1462 to theremote computing device 1404 in response to the lock system 1403 ordoorbell 1402 detecting a first location 1460 of a delivery vehicle1405. The system 1400 detects 1460 when the delivery vehicle 1405 is ata first location and in response to detecting 1460 that the deliveryvehicle 1405 is at this location, sends 1462 the digital key 1401 to theremote computing device 1404. The first location can be the deliverywarehouse, the scheduled stop before the delivery of the user's package,the house or building of the user, or a specific distance away from thehouse or building of the user (i.e., within one mile of the lock systemor the doorbell or within one mile of the lock system or doorbell,etc.). The location of a delivery vehicle 1405 can be detected using aGPS attached to the delivery vehicle 1405 or another locator connectedto the delivery vehicle 1405. The delivery vehicle can be configured totransport the remote computing device 1404 and the delivery parcel 1406.Methods may include sending the digital key 1401 to the remote computingdevice 1404 in response to the first location being within a directwireless communication range 1470 of at least one of the doorbell 1402and the lock system 1403. Direct wireless communication range 1470 maybe the range of WiFi associated with the doorbell 1402 and/or lock 1403,the range of Bluetooth associated with the lock 1403 and/or doorbell1402, the range of an RFID reader associated with the lock 1403 and/ordoorbell 1402, or the range of another wireless communication systemassociated with the lock 1403 and/or doorbell 1402. Likewise, thedigital key 1401 may be sent to the remote computing device 1404 at anytime prior to delivery and then only activated once the delivery vehicle1405 has been detected at the first location. It may also be desirableto deactivate 1466 the digital key 1401 when the delivery vehicle 1405is detected at a second location 1464. For example, the digital key 1401may be deactivated 1466 when the delivery vehicle 1405 is detected atthe next scheduled delivery stop, when the delivery vehicle 1405 isdetected to be outside of a certain distance of the house or building,or when the delivery vehicle 1405 is no longer in a direct wirelesscommunication range 1470 of the doorbell 1402 and/or lock system 1403.

Referring now to FIG. 25, the system detects a first identification code1560 from the remote computing device. Then the system verifies 1562that the first identification code is indicative of the remote computingdevice being authorized for deliveries. The system may then send thedigital key 1564 to the remote computing device in response to detectingthe first identification code 1560 and in response to verifying thefirst identification code 1562. The identification code may be a digitalidentification code sent wirelessly or may be a physical identificationcode, i.e., a badge or a bar code. Verifying the first identificationcode 1562 may include checking the code against a database of validcodes stored in the lock and/or doorbell, or stored remotely. Forexample in the cloud or on a server to see if the code is valid. Thefirst identification code may be detected by at least one of thedoorbell and the lock system.

The door 254 can be a garage door that is configured to open in responseto detecting an authorized delivery parcel. A garage door opener can beconfigured to receive a wireless communication configured to cause thegarage door opener to open the garage at least part way in response tothe system (which can be any system described herein and/or incorporatedby reference) determining that the delivery parcel is an expected and/orauthorized delivery parcel. The system can determine that the deliveryparcel is expected and/or authorized by analyzing an identification codeof the delivery parcel.”

“A garage door opening system can comprise a parcel identificationdetection system, which can comprise a camera, scanner, and/or RFIDreceiver configured to detect a delivery parcel identification code of adelivery parcel. The garage door opening system can comprise a garagedoor opener configured to open a garage door; and a first computersystem configured to receive the delivery parcel identification codedetected by the parcel identification detection system, compare thedelivery parcel identification code to a first database comprising atleast one expected delivery identification code, and send a firstcommunication to the garage door opener in response to determining thatthe delivery parcel identification code is indicative of the deliveryparcel being an expected delivery. The garage door opener can beconfigured to open the garage door at least partially in response to thefirst communication. The first computer system can be communicativelycoupled to the parcel detection system and the garage door opener. Theparcel identification detection system can be coupled to a building thatcomprises the garage door. A doorbell system can comprise the parcelidentification detection system.”

INTERPRETATION

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other.

The section headings and subheadings provided herein are nonlimiting.The section headings and subheadings do not represent or limit the fullscope of the embodiments described in the sections to which the headingsand subheadings pertain. For example, a section titled “Topic 1” mayinclude embodiments that do not pertain to Topic 1 and embodimentsdescribed in other sections may apply to and be combined withembodiments described within the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“can,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodiments caninclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy.

While certain example embodiments have been described, these embodimentshave been presented by way of example only, and are not intended tolimit the scope of the inventions disclosed herein. Thus, nothing in theforegoing description is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit of theinventions disclosed herein.

The following is claimed:
 1. A method of using a delivery parceldetection system, the method comprising: sending a digital key to aremote computing device of a delivery person, wherein the digital key isconfigured to enable unlocking a door of a building to which a deliveryparcel is addressed, wherein the door comprises a lock system configuredto impede unauthorized entry into the building; and detecting, by atleast one of a doorbell and the lock system, the digital key via a firstwireless communication from the remote computing device to at least oneof the doorbell and the lock system.
 2. The method of claim 1, furthercomprising unlocking the door to permit the delivery person to place thedelivery parcel inside the building in response to detecting the digitalkey.
 3. The method of claim 2, wherein the delivery parcel comprises anexpected delivery time window, the method further comprising sending thedigital key to the remote computing device in response to a first timebeing at least one of within the expected delivery time window andwithin a predetermined period prior to the expected delivery timewindow.
 4. The method of claim 3, further comprising enabling thedigital key.
 5. The method of claim 3, further comprising disabling thedigital key in response to a second time being past the expecteddelivery time window.
 6. The method of claim 3, further comprisingreceiving, by at least one of the doorbell and the lock system, adelivery parcel identification code of the delivery parcel, andunlocking the door in response to both detecting the digital key andreceiving the delivery parcel identification code.
 7. The method ofclaim 6, further comprising unlocking the door in response to verifyingthat the delivery parcel identification code corresponds to an expecteddelivery time.
 8. The method of claim 6, further comprising unlockingthe door in response to verifying that the delivery parcelidentification code corresponds to an expected delivery item.
 9. Themethod of claim 3, further comprising recording a video, by thedoorbell, in response to detecting the delivery person and in responseto determining that the delivery parcel is an expected delivery item.10. The method of claim 9, further comprising saving the video andlabeling the video as a delivery such that the labeling indicates to adoorbell user that the video shows the delivery of at least one item.11. The method of claim 2, further comprising detecting a first locationof the remote computing device and sending the digital key to the remotecomputing device in response to the first location.
 12. The method ofclaim 11, further comprising sending the digital key to the remotecomputing device in response to the first location being within one mileof at least one of the doorbell and the lock system.
 13. The method ofclaim 11, further comprising sending the digital key to the remotecomputing device in response to the first location being within onehundred yards of at least one of the doorbell and the lock system. 14.The method of claim 11, further comprising sending the digital key tothe remote computing device in response to the first location beingwithin a direct wireless communication range of at least one of thedoorbell and the lock system.
 15. The method of claim 11, wherein thedelivery parcel comprises an expected delivery time window, the methodfurther comprising disabling the digital key in response to a secondtime being past the expected delivery time window.
 16. The method ofclaim 11, further comprising detecting, by at least one of the doorbelland the lock system, a delivery parcel identification code of thedelivery parcel, and unlocking the door in response to both detectingthe digital key and detecting the delivery parcel identification code.17. The method of claim 11, further comprising recording a video by thedoorbell, determining that the video shows a delivery, and labeling thevideo such that the labeling indicates to a doorbell user that the videoshows the delivery of at least one item.
 18. The method of claim 2,further comprising detecting a first location of a delivery vehicle andsending the digital key to the remote computing device in response tothe first location.
 19. The method of claim 18 wherein the deliveryvehicle is configured to transport the remote computing device and thedelivery parcel.
 20. The method of claim 18, further comprising sendingthe digital key to the remote computing device in response to the firstlocation being within one mile of at least one of the doorbell and thelock system.
 21. The method of claim 18, further comprising sending thedigital key to the remote computing device in response to the firstlocation being within a direct wireless communication range of at leastone of the doorbell and the lock system.
 22. The method of claim 18,wherein the delivery parcel comprises an expected delivery time window,the method further comprising disabling the digital key in response to asecond time being past the expected delivery time window.
 23. The methodof claim 18, further comprising detecting, by at least one of thedoorbell and the lock system, a delivery parcel identification code ofthe delivery parcel, and unlocking the door in response to bothdetecting the digital key and detecting the delivery parcelidentification code.
 24. The method of claim 18, further comprisingrecording a video by the doorbell, determining that the video shows adelivery, and labeling the video such that the labeling indicates to adoorbell user that the video shows the delivery of at least one item.25. The method of claim 2, further comprising detecting a firstidentification code from the remote computing device, verifying that thefirst identification code is indicative of the remote computing devicebeing authorized for deliveries, and sending the digital key to theremote computing device in response to detecting the firstidentification code and in response to verifying the firstidentification code.
 26. The method of claim 25, further comprisingdetecting the first identification code by at least one of the doorbelland the lock system.
 27. The method of claim 25, wherein the deliveryparcel comprises an expected delivery time window, the method furthercomprising disabling the digital key in response to a second time beingpast the expected delivery time window.
 28. The method of claim 25,further comprising detecting, by at least one of the doorbell and thelock system, a delivery parcel identification code of the deliveryparcel, and unlocking the door in response to both detecting the digitalkey and detecting the delivery parcel identification code.
 29. Themethod of claim 25, further comprising recording a video by thedoorbell, determining that the video shows a delivery, and labeling thevideo such that the labeling indicates to a doorbell user that the videoshows the delivery of at least one item.
 30. The method of claim 29,further comprising sending the video to an entity associated withsending the delivery parcel.