Pool monitor systems and methods

ABSTRACT

Cameras can be used to detect if unauthorized visitors enter pool areas. Cameras can send alerts to remote computing devices regarding unauthorized pool entry. Several embodiments include using a camera to take an image of a pool area, sending the image from the camera to a remote computing device, displaying the image on the remote computing device, and using the remote computing device to select a detection zone. Some embodiments include ignoring certain portions of the camera&#39;s field of view in response to detection zone selections.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/529,334; filed Oct.31, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; whichclaims the benefit of and is a continuation-in-part of U.S.Nonprovisional patent application Ser. No. 14/463,548; filed Aug. 19,2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; whichclaims the benefit of U.S. Provisional Patent Application No.62/035,646; filed Aug. 11, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS. The entire contents of patent application Ser. No.14/529,334; patent application Ser. No. 14/463,548; and PatentApplication No. 62/035,646 are incorporated by reference herein.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/502,601; filed Sep.30, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS. Theentire contents of patent application Ser. No. 14/502,601 areincorporated by reference herein.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/492,809; filed Sep.22, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; whichclaims the benefit of and is a continuation-in-part of U.S.Nonprovisional patent application Ser. No. 14/275,811; filed May 12,2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S.Pat. No. 8,872,915); which claims the benefit of and is acontinuation-in-part of U.S. Nonprovisional patent application Ser. No.14/142,839; filed Dec. 28, 2013; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS (now U.S. Pat. No. 8,842,180); which claims thebenefit of and is a continuation-in-part of U.S. Nonprovisional patentapplication Ser. No. 14/099,888; filed Dec. 6, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S. Pat. No.8,823,795); which claims the benefit of and is a continuation of U.S.Nonprovisional patent application Ser. No. 14/098,772; filed Dec. 6,2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS (now U.S.Pat. No. 8,780,201); which claims the benefit of U.S. Provisional PatentApplication No. 61/872,439; filed Aug. 30, 2013; and entitled DOORBELLCOMMUNICATION SYSTEMS AND METHODS; and also claims the benefit of U.S.Provisional Patent Application No. 61/859,070; filed Jul. 26, 2013; andentitled DOORBELL COMMUNICATION SYSTEMS AND METHODS.

The entire contents of patent application Ser. No. 14/492,809; U.S. Pat.No. 8,872,915; U.S. Pat. No. 8,842,180; U.S. Pat. No. 8,823,795; U.S.Pat. No. 8,780,201; Patent Application No. 61/872,439; and PatentApplication No. 61/859,070 are incorporated by reference herein.

The entire contents of the following application are incorporated hereinby reference: International Application No. PCT/US14/53506; filed Aug.29, 2014 with the U.S. Patent and Trademark Office; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS.

The entire contents of the following application are incorporated hereinby reference: International Application No. PCT/US14/47622; filed Jul.22, 2014 with the U.S. Patent and Trademark Office; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS.

BACKGROUND

1. Field

Various embodiments disclosed herein relate to monitoring systems.Certain embodiments relate to methods of monitoring pools of water andemitting notifications regarding unauthorized entry.

2. Description of Related Art

Drowning is the second-leading cause of injury-related death forchildren under 14 years old. Traditional pool monitoring devices rely ondetecting when a person enters the water. People, however, can drown inless than two minutes. As a result, emitting an alert when a personenters the water can leave insufficient time for a rescuer to save thedrowning person. Moreover, a potential rescuer might not hear an alertemitted by a pool monitoring device. Various embodiments describedherein address at least some of these shortcomings of traditional poolmonitoring devices.

SUMMARY

Monitoring systems can be used to detect visitors. For example, if aperson comes too close to a pool of water, the monitoring system canemit a warning sound and/or can send a wireless alert to a remotecomputing device such as a smartphone, laptop, desktop, tablet, or anyother computing device with an electronic screen. As used herein, “poolof water” is used in a broad sense and can include any body of waterthat could be used for swimming or bathing. Example pools of water caninclude swimming pools, hot tubs, bathtubs, swift rivers, ponds, andlakes.

Several embodiments include methods for using a monitoring system todetect a first visitor. The monitoring system can comprise a cameraassembly and a remote computing device. The camera assembly can includea camera, a speaker, a motion sensor, a button, a printed circuit board,and an outer housing, which can be waterproof. The remote computingdevice can include an electronic display such as a liquid-crystaldisplay. iPhones made by Apple Inc. and other types of smartphonesinclude electronic displays.

Some embodiments include obtaining the camera assembly; configuring thecamera assembly such that a camera comprises a field of view thatincludes at least a portion of a pool of water; using the camera to takea first image of at least the portion of the pool of water; sending thefirst image wirelessly from the camera assembly to the remote computingdevice; displaying the first image on the electronic display of theremote computing device; and/or using the remote computing device toselect a first detection zone within the first image. The firstdetection zone can comprise a portion of the first image.

Several embodiments include displaying a grid pattern on the first imageon the electronic display of the remote computing device such that thefirst image is divided into at least six sections by lines that crosseach other. In some application, six sections can be the minimum numberof sections necessary to adequately subdivide the first image. Severalapplication use at least two sections, at least ten sections, and/or atleast fifty sections.

Some embodiments include selecting the first detection zone within thefirst image by touching at least a first subset of the sections on theelectronic display of the remote computing device. Embodiments caninclude using the camera assembly to detect a first indication of thefirst visitor.

The first indication can be located inside of the field of view. Forexample, the location of the first indication can be seen in the fieldof view (e.g., such that a camera could see the location if the camerawere taking a picture).

An indication can be suggestive of the visitor if the indication is of atype that may indicate a visitor (even if the indication can sometimesresult in false positives). For example, the indication can be a motionindication, but at times, motion indications may result from movingobjects, pets, and plants. As a result, a motion indication may notactually indicate a visitor even though the indication suggests that avisitor may be present (e.g., near a pool).

An infrared signature that seems to indicate that a visitor is presentcan be a type of indication. The infrared signature may be of a shapeand/or temperature that suggests the infrared signature is from avisitor (i.e., a person). In many cases, infrared signatures suggestiveof visitors are actually from visitors, but in some cases, infraredsignatures suggestive of visitors may be misleading (and not actually befrom visitors). The size of the infrared signature can help the systemdetermine if the visitor is above or below a size threshold. Thisthreshold can be advantageous to enable the system to ignore adults(because adults can likely swim) while not ignoring children (becausemany children cannot swim).

A shape in an image taken by a camera may be an indication suggestive ofa visitor. For example, the shape can be of a size or geometry thatsuggests the shape represents at least a portion of a visitor. In somecases, shapes suggestive of a visitor may not actually be from avisitor.

Several embodiments include determining that the first indication of thefirst visitor is located outside of the first detection zone. Then, themonitoring system can decide to not send a first alert to the remotecomputing device (e.g., in response to determining that the firstindication of the first visitor is located outside of the firstdetection zone). The first alert can be configured to notify the remotecomputing device regarding a presence of the first visitor.

Various embodiments can respond differently to touching the first subseton the electronic display. Touching the first subset can cause the firstsubset to be included in the first detection zone or excluded from thefirst detection zone.

The first detection zone can comprise an area of the first image thatincludes the pool of water. In some embodiments, a user configures thefirst detection zone using the remote computing device by tracing herfinger around a perimeter of a pool in a picture that includes the poolwhile the picture is displayed on the remote computing device. Theremote computing device can record the first detection zone as definedbased on the traced perimeter. Then, the monitoring system can correlatevisitor indications with locations such that the monitoring system candetermine if the visitor indications are located inside or outside ofthe first detection zone even though the indications are sensed by adifferent sensor than the camera. In some embodiments, a calibrationroutine is conducted at the factory to correlate camera field-of-viewlocations with other sensor locations.

In several embodiments, the camera assembly comprises a speaker that canemit a notification sound while the camera assembly is mounted such thatthe field of view includes at least the portion of the pool of water.The camera assembly can emit the notification sound in response to thefirst visitor entering the first detection zone as defined using thefirst image.

In some embodiments, the monitoring system detects when a visitor entersthe field of view and then detects when the visitor enters the firstdetection zone. The first image can be used to establish multipledetection zones. In some embodiments, the first detection zone issurrounded by a second detection zone.

Several embodiments include using the camera assembly to detect a secondindication of the first visitor. The second indication can be locatedinside of the field of view. The monitoring system can also determinethat the second indication of the first visitor is located inside of thefirst detection zone as defined using the first image. The monitoringsystem can then wirelessly send the first alert to the remote computingdevice in response to determining that the second indication of thefirst visitor is located inside of the first detection zone. Themonitoring system can wirelessly send alerts via a wireless networkand/or the Internet. In some embodiments, the camera assembly sends awireless alert to the remote computing device (e.g., via a wirelessnetwork and/or the Internet). Several embodiments include sending thefirst image directly from the camera assembly to the remote computingdevice without using an intermediary server (although some embodimentsuse an intermediary server).

Some embodiments include sending the first alert wirelessly to theremote computing device while emitting a notification sound from thespeaker in response to the first visitor entering the first detectionzone as defined using the first image. Simultaneously sending the firstalert and emitting the notification sound can notify both a user of theremote computing device and people who are within audible range of thenotification sound.

Several embodiments use motion detectors to sense visitors. The cameraassembly can include one or more motion detectors. The first and secondindications can be motion indications.

Some embodiments analyze an image taken by the camera to sense visitors.Methods can include using the camera to take a second image of at leastthe portion of the pool of water, and then the monitoring systemanalyzing the second image to detect the first indication. Methods canalso include using the camera to take a third image of at least theportion of the pool of water, and then the monitoring system analyzingthe third image to detect the second indication.

Some embodiments reduce false positives by preventing the sending of thefirst alert to the remote computing device until after detecting thesecond indication in at least two of the sections. Several embodimentscause a second subset of the sections to be included in the firstdetection zone in response to the first subset comprising an outerperimeter that surrounds the second subset.

Several embodiments include selecting the first detection zone bydisplaying the first image on the electronic display, and then recordingwhich areas of the first image a user indicates to include in the firstdetection zone by touching the electronic display; calculating apercentage of the first detection zone that includes the secondindication of the first visitor; and/or sending the first alert to theremote computing device in response to determining that the percentageof the first detection zone exceeds a first threshold.

Some embodiments include selecting the first detection zone bydisplaying the first image on the electronic display, and then recordingwhich areas of the first image a user indicates to include in the firstdetection zone by touching the electronic display; calculating apercentage of the first detection zone that includes the secondindication of the first visitor; calculating a time in which the secondindication of the first visitor has been in the first detection zone;and/or sending the first alert to the remote computing device inresponse to the percentage of the first detection zone and the time.

Several embodiments include using the camera assembly to detect a firstindication of the first visitor. The first indication can be locatedinside of the field of view. Some embodiments include determining thatthe first indication of the first visitor is located outside of thefirst detection zone, and then the monitoring system ignoring the firstvisitor in response to the first visitor being located outside of thefirst detection zone. Ignoring the first visitor can comprise notsending a first alert to the remote computing device regarding the firstvisitor being outside of the first detection zone.

Some embodiments include using the camera assembly to detect a thirdindication of a second visitor. The third indication can be locatedinside of the field of view. Several embodiments include determiningthat the third indication is located inside of the first detection zoneas defined using the first image.

Several embodiments include determining that the second visitor isgreater than a size threshold, and then ignoring the second visitor inresponse to the second visitor being greater than the size threshold.Ignoring the second visitor can comprise not sending a second alert tothe remote computing device. The second alert can be configured tonotify the remote computing device regarding the second visitor being inthe first detection zone.

Some embodiments include using the camera assembly to detect a fourthindication of a third visitor. The fourth indication can be locatedinside of the field of view. Embodiments can include determining thatthe fourth indication is located inside of the first detection zone asdefined using the first image. Embodiments can also include determiningthat the third visitor is less than the size threshold, and thenwirelessly sending a third alert to the remote computing device inresponse to the third visitor being less than the size threshold. Thethird alert can be configured to notify the remote computing deviceregarding the third visitor being in the first detection zone.

The size threshold can be a height threshold. The height threshold canbe configured to distinguish between small children (who often cannotswim) and tall adults (who typically can swim). The height threshold canbe at least four feet (because most people over four feet can swim).

In some embodiments, monitoring systems can be configured to detectvisitors. Monitoring systems can include a camera assembly having aspeaker and a camera. The camera assembly can be mounted such that thecamera comprises a field of view that includes at least a portion of apool of water. In some embodiments, the camera assembly includes anouter housing that is mounted to a wall, fence, or post. The cameraassembly can be configured to wirelessly communicate with a remotecomputing device having an electronic display. In some embodiments, thecamera assembly is communicatively coupled with the remote computingdevice via a cable. In many embodiments, the camera assembly iscommunicatively coupled to the remote computing device via wirelesscommunication, but is not mechanically coupled to the remote computingdevice.

Monitoring systems can include a first image of at least the portion ofthe pool of water. The first image can be taken by the camera,wirelessly communicated to the remote computing device, and thendisplayed on the electronic display of the remote computing device.Monitoring systems can also include a first detection zone defined by auser touching sections of the first image while the first image isdisplayed on the electronic display of the remote computing device.

Some embodiments include a wireless notification sent from the cameraassembly to the remote computing device in response to the first visitorentering the first detection zone as defined using the first image;and/or a notification sound emitted by the speaker in response to thefirst visitor entering the first detection zone as defined using thefirst image.

Several embodiments include a perimeter defined by the user touching thesections of the first image while the first image is displayed on theelectronic display of the remote computing device. The perimeter canenclose an area of the first image that includes the pool of water. Theperimeter can define the first detection zone.

In some embodiments, the monitoring system is configured to ignore asecond visitor in response to the second visitor being located in thefield of view and outside of the first detection zone. Ignoring thesecond visitor comprises not sending an alert regarding the secondvisitor to the remote computing device.

Several embodiments include using a monitoring system to detect a firstvisitor. Embodiments can include obtaining a camera assembly thatincludes a camera; configuring the camera assembly such that the cameracomprises a field of view that includes at least a portion of a pool ofwater; using the camera to take a first image of at least the portion ofthe pool of water; sending the first image wirelessly from the cameraassembly to a remote computing device that includes an electronicdisplay; and/or using the remote computing device to select a firstdetection zone within the first image. The first detection zone cancomprise a first portion of the first image that shows the portion ofthe pool of water.

Some embodiments include configuring the monitoring system to ignore asecond visitor located within the field of view of the camera inresponse to the second visitor being located outside of the firstdetection zone. Ignoring the second visitor can comprise not sending afirst alert regarding the second visitor to the remote computing device.Several embodiments include configuring the monitoring system to send asecond alert regarding a third visitor to the remote computing device inresponse to determining that the third visitor is located inside of thefirst detection zone as defined based on the first image.

Several embodiments include displaying the first image on the electronicdisplay of the remote computing device, and then selecting the firstdetection zone within the first image of the camera while displaying thefirst image on the electronic display. The first detection zone canrepresent a portion of the field of view of the camera. Selecting thefirst detection zone can comprise selecting a second portion of thefirst image of the camera.

Some embodiments include displaying lines on the first image on theelectronic display of the remote computing device such that the firstimage is divided into sections by the lines; and/or selecting the firstdetection zone within the first image by touching or otherwise selectingat least a first subset of the sections on the electronic display of theremote computing device.

Several embodiments include displaying the first image on the electronicdisplay of the remote computing device; and/or selecting the firstdetection zone within the first image by touching at least a firstsubset of sections on the electronic display of the remote computingdevice. The sections can be visibly differentiated (e.g., by lines) orcan be indistinguishable to the unaided human eye. Some embodimentsinclude millions of sections (e.g., each pixel can be a section).Touching or otherwise selecting the first subset can cause the firstsubset to be included in the first detection zone or excluded from thefirst detection zone. Some embodiments include causing a second subsetof the sections to be included in the first detection zone of themonitoring system in response to the first subset comprising an outerperimeter that surrounds the second subset.

Some methods include sending data regarding the first detection zonefrom the remote computing device to the camera assembly to calibrate thecamera assembly. Calibrating the camera assembly can include configuringthe camera assembly to ignore visitor indications in certain portions ofthe field of view (e.g., whether sensed by the camera or by a motionsensor).

In several embodiments, the camera assembly comprises a microphone,which can help enable audio communication between the third visitor anda user of the remote computing device in response to determining thatthe third visitor is located inside of the first detection zone asdefined based on the first image. The user of the remote computingdevice can hear the visitor via the microphone.

Some embodiments include determining that the second visitor is locatedoutside of the first detection zone by detecting a first motion of thesecond visitor; correlating the first motion to a first location asdefined by the first image; and/or determining that the first locationis located outside of the first detection zone. Embodiments can alsoinclude determining that the third visitor is located inside of thefirst detection zone by detecting a second motion of the third visitor;correlating the second motion to a second location as defined by thefirst image; and/or determining that the second location is locatedinside of the first detection zone.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 illustrates a front view of a monitoring system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates an embodiment in which a camera assembly is connectedto a building, according to some embodiments.

FIGS. 4 and 5 illustrate diagrammatic views of a camera's field of view,according to some embodiments.

FIG. 6 illustrates a front view of a remote computing device displayinga grid pattern on an image taken by a camera, according to someembodiments.

FIG. 7 illustrates a front view of a remote computing device displayinga grid pattern of which sections have been selected to be part of adetection zone, according to some embodiments.

FIG. 8 illustrates a front view of a remote computing device displayinga visitor partially located inside of a detection zone, according tosome embodiments.

FIG. 9 illustrates a diagrammatic view of a monitoring system, accordingto some embodiments.

FIG. 10 illustrates a diagrammatic view of a camera assembly that has afield of view, according to some embodiments.

FIG. 11 illustrates a diagrammatic view of a visitor located within thefield of view from FIG. 10, according to some embodiments.

FIG. 12 illustrates a diagrammatic view of an infrared signature of thevisitor shown in FIG. 11, according to some embodiments.

FIG. 13 illustrates a diagrammatic view of a motion indication of thevisitor shown in FIG. 11, according to some embodiments.

FIGS. 14 and 15 illustrate diagrammatic views of the field of view shownin FIG. 10, according to some embodiments.

FIG. 16 illustrates a diagrammatic view with a wall dividing the fieldof view from FIG. 10, according to some embodiments.

FIG. 17 illustrates a diagrammatic view of a camera assembly used tomonitor a pool area, according to some embodiments.

FIG. 18 illustrates a diagrammatic view of a camera assembly placed neara pool of water, according to some embodiments.

FIG. 19 illustrates a back view of a camera assembly without a mountingbracket, according to some embodiments.

FIG. 20 illustrates a back view of a camera assembly with a mountingbracket, according to some embodiments.

FIG. 21 illustrates a diagrammatic view of an image, according to someembodiments.

FIG. 22 illustrates a front view of a remote computing device displayinga grid pattern on an image taken by a camera, according to someembodiments.

FIG. 23 illustrates a diagrammatic view of a camera assembly placed neara pool of water, according to some embodiments.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed herein,inventive subject matter extends beyond the specifically disclosedembodiments to other alternative embodiments and/or uses, and tomodifications and equivalents thereof. Thus, the scope of the claimsappended hereto is not limited by any of the particular embodimentsdescribed herein. For example, in any method or process disclosedherein, the acts or operations of the method or process may be performedin any suitable sequence and are not necessarily limited to anyparticular disclosed sequence. Various operations may be described asmultiple discrete operations in turn, in a manner that may be helpful inunderstanding certain embodiments; however, the order of descriptionshould not be construed to imply that these operations are orderdependent. Additionally, the structures, systems, and/or devicesdescribed herein may be embodied as integrated components or as separatecomponents.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

Every year, many children drown in unattended pools. While staffing eachpool 24 hours a day with a lifeguard might be ideal, the cost of humanmonitoring is often too high to be feasible. Many monitoring systemembodiments described herein provide means of robotically monitoring apool and then alerting a remotely located individual if an unauthorizedperson enters a pool area. A camera assembly can be used to monitor thepool and then can wirelessly send alerts to a remote computing devicesuch as a smartphone. A user of the remote computing device can receivethe alert and then can decide what action to take (e.g., personallyrushing to the pool or calling 911 for emergency assistance). Thelife-saving benefits of many embodiments cannot be overstated.

Monitoring systems can be used to detect visitors (e.g., a person whoapproaches a pool of water). For example, if a person comes too close toa pool of water, the monitoring system can emit a warning sound and/orcan send a wireless alert to a remote computing device such as asmartphone, laptop, desktop, tablet, or any other computing device withan electronic screen.

As used herein, “pool of water” is used in a broad sense and can includeany body of water that could be used for swimming or bathing. Examplepools of water can include swimming pools, hot tubs, bathtubs, swiftrivers, ponds, and lakes.

RELATIONSHIP TO PREVIOUS APPLICATIONS

The present application is a continuation-in-part of previousapplications, which are incorporated by reference. In some of theprevious applications, the camera assembly is called a security system202 and the monitoring system is called a communication system 200(e.g., see FIG. 1 of U.S. Nonprovisional patent application Ser. No.14/529,334, which is incorporated by reference herein). Camera assemblyembodiments can include any of the features described in the context ofsecurity system embodiments included in applications incorporated byreference.

Applications incorporated by reference include a “camera assembly” 208(e.g., see FIG. 1 of U.S. Nonprovisional patent application Ser. No.14/529,334). However, the term “camera assembly” in the presentapplication is used in a broader sense than it was used in applicationsincorporated by reference. For example, camera assembly embodiments caninclude the motion sensor 218 and the outer housing 224 shown in FIG. 1of U.S. Nonprovisional patent application Ser. No. 14/529,334. Cameraassembly embodiments can also include any of the items shown in FIGS.5-14 of U.S. Nonprovisional patent application Ser. No. 14/275,811 (nowU.S. Pat. No. 8,872,915).

All of the embodiments incorporated by reference can be applied to themonitoring system embodiments described herein. For example, cameraassembly embodiments described herein can be placed in the context ofthe security system embodiments and communication system embodimentsdescribed in applications incorporated by reference. The securitysystems (e.g., camera assemblies) in applications incorporated byreference can be placed near a pool of water.

System Embodiments

Communication systems can provide a secure and convenient way for aremotely located individual to communicate with a person who isapproaching a sensor, such as a proximity sensor or motion sensor, orwith a person who rings a doorbell. A doorbell or camera assembly can belocated in a doorway, near an entrance, within 15 feet of a door, ornear a pool.

Some communication systems allow an individual to hear, see, and talkwith visitors who approach at least a portion of the communicationsystem and/or press a button, such as a doorbell's button. For example,communication systems can use a computing device to enable a remotelylocated person to see, hear, and/or talk with visitors. Computingdevices can include computers, laptops, tablets, mobile devices,smartphones, cellular phones, and wireless devices (e.g., cars withwireless communication). Example computing devices include the iPhone,iPad, iMac, MacBook Air, and MacBook Pro made by Apple Inc.Communication between a remotely located person and a visitor can occurvia the Internet, cellular networks, telecommunication networks, andwireless networks.

Referring now to FIG. 1, communication systems can be a portion of asmart home hub. In some embodiments, the communication system 200 formsthe core of the smart home hub. For example, the various systemsdescribed herein enable complete home automation. In some embodiments,the security system 202 controls various electrical items in a home(e.g., lights, air conditioners, heaters, motion sensors, garage dooropeners, locks, televisions, computers, entertainment systems, poolmonitors, elderly monitors). In some embodiments, the computing device204 controls the security system 202 and other electrical items in ahome (e.g., lights, air conditioners, heaters, motion sensors, garagedoor openers, locks, televisions, computers, entertainment systems, poolmonitors, elderly monitors).

FIG. 1 illustrates a front view of a communication system embodiment(e.g., a monitoring system embodiment). The communication system 200 caninclude a security system 202 (e.g., a camera assembly) and a computingdevice 204. Although the illustrated security system 202 includes manycomponents in one housing, several security system embodiments includecomponents in separate housings. The security system 202 can include acamera 208 and a doorbell button 212. The camera 208 can include a videocamera, which in some embodiments is a webcam. The security system 202can include a diagnostic light 216 and a power indicator light 220. Insome embodiments, the diagnostic light 216 is a first color (e.g., blue)if the security system 202 and/or the communication system 200 isconnected to a wireless Internet network and is a second color (e.g.,red) if the security system 202 and/or the communication system 200 isnot connected to a wireless Internet network. In some embodiments, thepower indicator 220 is a first color if the security system 202 isconnected to a power source. The power source can be power supplied bythe building to which the security system 202 is attached. In someembodiments, the power indicator 220 is a second color or does not emitlight if the security system 202 is not connected to the power source.

The security system 202 (e.g., a doorbell or a camera assembly) caninclude an outer housing 224, which can be water resistant and/orwaterproof. The outer housing can be made from metal or plastic, such asmolded plastic with a hardness of 60 Shore D. In some embodiments, theouter housing 224 is made from brushed nickel or aluminum.

Rubber seals can be used to make the outer housing 224 water resistantor waterproof. The security system 202 can be electrically coupled to apower source, such as wires electrically connected to a building'selectrical power system. In some embodiments, the security system 202includes a battery for backup and/or primary power.

Wireless communication 230 can enable the security system 202 (e.g., adoorbell or a camera assembly) to communicate with the computing device204. Some embodiments enable communication via cellular and/or WiFinetworks. Some embodiments enable communication via the Internet.Several embodiments enable wired communication between the securitysystem 202 and the computing device 204. The wireless communication 230can include the following communication means: radio, WiFi (e.g.,wireless local area network), cellular, Internet, Bluetooth,telecommunication, electromagnetic, infrared, light, sonic, andmicrowave. Other communication means are used by some embodiments. Insome embodiments, such as embodiments that include telecommunication orcellular communication means, the security system 202 can initiate voicecalls or send text messages to a computing device 204 (e.g., asmartphone, a desktop computer, a tablet computer, a laptop computer).

Several embodiments use near field communication (NFC) to communicatebetween the computing device 204 and the security system 202; betweenthe security system 202 and the door lock 250; and/or between thecomputing device 204 and the door lock 250. The security system 208, thecomputing device 204, and/or the door lock 250 can include a NFC tag.Some NFC technologies include Bluetooth, radio-frequency identification,and QR codes.

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. Some embodiments includesoftware designed to run on desktop computers and laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

FIG. 2 illustrates a computing device 204 running software. The softwareincludes a user interface 240 displayed on a display screen 242. Theuser interface 240 can include a security system indicator 244, whichcan indicate the location of the security system that the user interfaceis displaying. For example, a person can use one computing device 204 tocontrol and/or interact with multiple security systems, such as onesecurity system located at a front door and another security systemlocated at a back door. Selecting the security system indicator 244 canallow the user to choose another security system (e.g., the back doorsecurity system rather than the front door security system).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator can indicate whether thecomputing device is in communication with a security system, theInternet, and/or a cellular network. The connectivity indicator 248 canalert the user if the computing device 204 has lost its connection withthe security system 202; the security system 202 has been damaged; thesecurity system 202 has been stolen; the security system 202 has beenremoved from its mounting location; the security system 202 lostelectrical power; and/or if the computing device 204 cannot communicatewith the security system 202. In some embodiments, the connectivityindicator 248 alerts the user of the computing device 204 by flashing,emitting a sound, displaying a message, and/or displaying a symbol.

In some embodiments, if the security system 202 loses power, losesconnectivity to the computing device 204, loses connectivity to theInternet, and/or loses connectivity to a remote server, a remote server206 sends an alert (e.g., phone call, text message, image on the userinterface 240) regarding the power and/or connectivity issue. In severalembodiments, the remote server 206 can manage communication between thesecurity system 202 and the computing device. In some embodiments,information from the security system 202 is stored by the remote server206. In several embodiments, information from the security system 202 isstored by the remote server 206 until the information can be sent to thecomputing device 204, uploaded to the computing device 204, and/ordisplayed to the remotely located person via the computing device 204.The remote server 206 can be a computing device that stores informationfrom the security system 202 and/or from the computing device 204. Insome embodiments, the remote server 206 is located in a data center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202 (e.g., a cameraassembly). If the computing device 204 and/or the remote server 206 isunable to communicate with the security system 202, the computing device204 and/or the remote server 206 alerts the remotely located person viathe software, phone, text, a displayed message, and/or a website. Insome embodiments, the computing device 204 and/or the remote server 206attempts to communicate with the security system 202 periodically; atleast every five hours and/or less than every 10 minutes; at least every24 hours and/or less than every 60 minutes; or at least every hourand/or less than every second.

In some embodiments, the server 206 can initiate communication to thecomputer device 204 and/or to the security system 202. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the security system202.

In several embodiments, a user can log into an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the security systemsettings discussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a security system due to the user'srequest rather than due to actions of a visitor. Some embodimentsinclude a computing device initiating a live video feed (or a video feedthat is less than five minutes old).

In some embodiments, the user interface 240 displays an image 252 suchas a still image or a video of an area near and/or in front of thesecurity system 202 (e.g., a camera assembly). The image 252 can betaken by the camera 208 and stored by the security system 202, server206, and/or computing device 204. The user interface 240 can include arecording button 256 to enable a user to record images, videos, and/orsound from the camera 208, microphone of the security system 202, and/ormicrophone of the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the security system 202. The user interface 240can also include a sound adjustment button 264 and a mute button 268.The user interface 240 can include camera manipulation buttons such aszoom, pan, and light adjustment buttons. In some embodiments, the camera208 automatically adjusts between Day Mode and Night Mode. Someembodiments include an infrared camera and/or infrared lights toilluminate an area near the security system 202 to enable the camera 208to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, and touching a touch screen. Many embodimentsinclude buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton, which can allow a user to select the quality and/or amount ofthe data transmitted from the security system 202 to the computingdevice 204 and/or from the computing device 204 to the security system202.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

The user interface 240 can include a termination button 276 to endcommunication between the security system 202 and the computing device204. In some embodiments, the termination button 276 ends the ability ofthe person located near the security system 202 (i.e., the visitor) tohear and/or see the user of the computing device 204, but does not endthe ability of the user of the computing device 204 to hear and/or seethe person located near the security system 202.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and is a termination button (toend communication between the security system 202 and the computingdevice 204). The button 276 can include the word “Answer” when thesystem is attempting to establish two-way communication between thevisitor and the user. Selecting the button 276 when the system isattempting to establish two-way communication between the visitor andthe user can start two-way communication. The button 276 can include thewords “End Call” during two-way communication between the visitor andthe user. Selecting the button 276 during two-way communication betweenthe visitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe security system and to stop emitting sounds recorded by the securitysystem.

In some embodiments, the user interface 240 opens as soon as thesecurity system detects a visitor (e.g., senses indications of avisitor). Once the user interface 240 opens, the user can see and/orhear the visitor even before “answering” or otherwise accepting two-waycommunication, in several embodiments.

Some method embodiments include detecting a visitor with a securitysystem. The methods can include causing the user interface to display ona remote computing device 204 due to the detection of the visitor (e.g.,with or without user interaction). The methods can include displayingvideo from the security system and/or audio from the security systembefore the user accepts two-way communication with the visitor. Themethods can include displaying video from the security system and/oraudio from the security system before the user accepts the visitor'scommunication request. The methods can include the computing devicesimultaneously asking the user if the user wants to accept (e.g.,answer) the communication request and displaying audio and/or video ofthe visitor. For example, in some embodiments, the user can see and hearthe visitor via the security system before opening a means of two-waycommunication with the visitor.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device might wonder whatis happening near the security system 202. The user can open thesoftware application on the computing device 204 and instruct theapplication to show live video and/or audio from the security device 202even if no event near the security system 202 has triggered thecommunication.

In several embodiments, the security device 202 (e.g., a cameraassembly) can be configured to record when the security device 202detects movement and/or the presence of a person. The user of thecomputing device 204 can later review all video and/or audio recordswhen the security device 202 detected movement and/or the presence of aperson.

Referring now to FIG. 1, in some embodiments, the server 206 controlscommunication between the computing device 204 and the security system202, which can be a doorbell with a camera, a microphone, and a speaker.In several embodiments, the server 206 does not control communicationbetween the computing device 204 and the security system 202.

In some embodiments, data captured by the security system and/or thecomputing device 204 (such as videos, pictures, and audio) is stored byanother remote device such as the server 206. Cloud storage, enterprisestorage, and/or networked enterprise storage can be used to store video,pictures, and/or audio from the communication system 200 or from anypart of the communication system 200. The user can download and/orstream stored data and/or storage video, pictures, and/or audio. Forexample, a user can record visitors for a year and then later can reviewconversations with visitors from the last year. In some embodiments,remote storage, the server 206, the computing device 204, and/or thesecurity system 202 can store information and statistics regardingvisitors and usage.

FIG. 3 illustrates an embodiment in which a security system 202 (e.g., acamera assembly) is connected to a building 300, which can include anentryway 310 that has a door 254. A door lock 250 can be configured tolock and unlock the door 254. Electrical wires 304 can electricallycouple the security system 202 to the electrical system of the building300 such that the security system 202 can receive electrical power fromthe building 300.

A wireless network 308 can allow devices to wirelessly access theInternet. The security system 202 can access the Internet via thewireless network 308. The wireless network 308 can transmit data fromthe security system 202 to the Internet, which can transmit the data toremotely located computing devices 204. The Internet and wirelessnetworks can transmit data from remotely located computing devices 204to the security system 202. In some embodiments, a security system 202connects to a home's WiFi.

As illustrated in FIG. 3, one computing device 204 (e.g., a laptop, asmartphone, a mobile computing device, a television) can communicatewith multiple security systems 202. In some embodiments, multiplecomputing devices 204 can communicate with one security system 202.

In some embodiments, the security system 202 can communicate (e.g.,wirelessly 230) with a television 306, which can be a smart television.Users can view the television 306 to see a visitor and/or talk with thevisitor.

As used herein, an “electronic device” is capable of displaying images,including videos. An electronic device consumes electrical power and iscapable of running software. As used herein, the term “electronicdevice” should not be confused with the term “electronic key.” Manyelectronic key embodiments are not capable of displaying images,consuming electrical power, or running software.

Visitor Detection

Referring now to FIGS. 1 and 3, methods can include using a doorbell(e.g., security system 202) that is configurable to wirelesslycommunicate with a remotely located computing device 204, such as acellular telephone, laptop, or tablet. Some embodiments includeobtaining a doorbell that comprises a speaker, a microphone, a camera,and a button. In some embodiments, the camera acts as a motion sensor. Adoorbell can include an infrared motion detection system (e.g., motiondetector 218). The button 212 of the doorbell can be configurable toenable a visitor to sound a chime 302 (e.g., a speaker or another soundemission device located inside of a building). Some chimes are digitaland some chimes are mechanical.

Several embodiments include using a doorbell system (e.g., communicationsystem 200) to detect a first visitor. The doorbell system can comprisea doorbell and a remote computing device 204 such as a smartphone,laptop, tablet, or desktop computer. Some embodiments include obtainingthe doorbell that comprises a camera, a speaker, a microphone, and abutton, wherein the button is configurable to enable the first visitorto sound a chime.

FIG. 4 illustrates a camera's field of view 840. Methods can includeconfiguring the camera of the doorbell such that the camera comprises afield of view 840, and using the camera of the doorbell to take a firstimage 842. The doorbell system can send the first image 842 from thedoorbell to the remote computing device, which can comprise anelectronic display 242 (shown in FIG. 2). Some methods includedisplaying the first image 842 on the electronic display 242 of theremote computing device, and prompting a user of the remote computingdevice to select a first detection zone 846 within the first image 842.The first detection zone 846 can comprise a portion of the first image842. The first image 842 can comprise all or a portion of the camera'sfield of view 840.

In FIG. 4, the visitor 844 is located inside of the detection zone 846.An indication 850 of the visitor 844 is also located inside of thedetection zone 846. The indication 850 can be any evidence or data thatsuggests the presence of the visitor 844. In FIG. 5, the visitor 844 andthe indication 850 are located outside of the detection zone 846 in asecond image 846. The first image 842 (shown in FIG. 4) and the secondimage 846 can show the same area (e.g., can include the same portion ofthe field of view 840). The detection zone 846 can consist of the samearea (e.g., of an entryway) in both the first image 842 and the secondimage 846. In some embodiments, the first image 842 does not include avisitor 844 to help calibrate the system to a visitor-free state.

Some embodiments include using the camera of the doorbell to take asecond image, analyzing the second image to detect a first indication ofthe first visitor, and determining that the first indication of thefirst visitor in the second image is located outside of the firstdetection zone. The doorbell system can then decide not to send an alert232 (shown in FIG. 1) to the remote computing device in response todetermining that the first indication of the first visitor in the secondimage is located outside of the first detection zone. The alert 232 canbe configured to notify the remote computing device 204 (shown inFIG. 1) regarding a presence of the first visitor.

Analyzing the second image can include determining if there are signs ofseeing the visitor in the second image. In some embodiments, the systemlooks for indications of motion in the image. In several embodiments,the system compares a baseline image (e.g., the first image) to thesecond image in order to determine if there are areas in the secondimage that include an object (e.g., a visitor) that was not present inthe first image. Thus, some embodiments use computer vision to identifythe presence of a visitor within the detection zone.

Several embodiments include using the camera of the doorbell to take athird image and analyzing the third image to detect a second indicationof the first visitor. Methods can include determining that the secondindication of the first visitor in the third image is located inside ofthe first detection zone, and then sending the alert to the remotecomputing device in response to determining that the second indicationof the first visitor in the third image is located inside of the firstdetection zone. In some embodiments, the alert is not sent unless otherconditions are met.

FIG. 6 illustrates a front view of a remote computing device 204displaying a grid pattern 254 on an image 842. Some embodiments includedisplaying a grid pattern 254 on the first image 842 on the electronicdisplay 242 of the remote computing device 204 such that the first image842 is divided into sections 528 by lines 532 that cross each other.(Not all sections 528 and lines 532 are labeled in FIGS. 6-9 to increasethe clarity of various features.)

The lines 532 can include horizontal lines and vertical lines thatintersect at 90 degree angles. The lines can be straight, curved, and/orwavy. The sections can be equal in size and shape. The sections can beirregular and can vary in size. Methods can include preventing thesending of the alert to the remote computing device until afterdetecting an indication of a visitor in at least two, four, and/or eightof the sections. Methods can include preventing the sending of the alertto the remote computing device until after detecting an indication of avisitor in at least twenty percent and/or forty percent of the sections(e.g., of a detection zone).

FIG. 7 illustrates a subset 538 of the sections 528 that have beenselected as part of a detection zone. Several methods include selectingthe first detection zone within the first image 842 by the user touchingat least a first subset 538 of the sections 528 on the electronicdisplay 242 of the remote computing device 204. Touching the firstsubset 538 can cause the first subset 538 to be included in the firstdetection zone. The electronic display 242 can be a touchscreen of acomputer such as a smartphone, tablet, or laptop. The user of the remotecomputing device 204 can swipe the touchscreen to select a detectionzone.

Touching or clicking on each section is not necessary in someembodiments. Some methods include causing a second subset 542 of thesections to be included in the first detection zone in response to thefirst subset 538 comprising an outer perimeter that surrounds the secondsubset 542. For example, the user can swipe the touchscreen to form aclosed shape. All sections at least partially located within the closedshape can be included in the first detection zone.

Some embodiments include two, three, four, and/or many detection zones,which can be independent, interdependent, separate, and/or overlapping.Detecting a visitor in a first detection zone can lead to immediatelynotifying the user of the remote computing device. Detecting a visitorin a second detection zone can include additional safeguards againstfalse-positives.

Several embodiments include selecting the first detection zone bydisplaying the first image on the electronic display and then recordingwhich areas (e.g., sections 528) of the first image the user indicatesto include in the first detection zone by touching the electronicdisplay. Some methods include calculating a percentage of the firstdetection zone that includes the second indication of the first visitor.The percentage can be a percentage of the area of the detection zone orcan be a percentage of the sections. Methods can include sending thealert to the remote computing device in response to determining that thepercentage of the detection zone exceeds a first threshold. The firstthreshold can be 10 percent or 30 percent.

Some methods include sending a picture of a visitor to the remotecomputing device, and then waiting to open audio and/or videocommunication between the visitor and the user of the remote computingdevice until after determining a percentage of the first detection zonethat includes an indication of the visitor and calculating a time inwhich the indication of the visitor has been in the first detectionzone. Embodiments can include opening the audio communication betweenthe visitor and the user of the remote computing device in response tothe percentage of the detection zone and the time. The percentage can beat least 10 percent and/or at least 25 percent. The time can be at leastone second and/or at least four seconds.

Indications of the visitor can be motions indications. Motionindications can be identified by comparing a baseline image to anotherimage. The baseline image can be taken when a visitor is not present.Other indications of the visitor can include presence indications (e.g.,indications that at least a portion of the visitor is present in thesection being analyzed).

Some embodiments include selecting the first detection zone bydisplaying the first image on the electronic display and then recordingwhich areas of the first image the user indicates to include in thefirst detection zone by touching the electronic display. The remotecomputing device can prompt the user to select areas and/or sections toinclude in a detection zone. In some embodiments, the remote computingdevice does not display a grid on the calibration image, but the remotecomputing device prompts the user to select a portion of the image asthe detection zone and/or prompts the user to select a portion of theimage to exclude from the detection zone.

Several embodiments include calculating a percentage of the firstdetection zone that includes the second indication of the first visitorand/or calculating a time in which the second indication of the firstvisitor has been in the first detection zone. Methods can includesending the alert to the remote computing device in response to thepercentage of the detection zone and the time.

The images used in several methods do not necessarily include the entirefield of view of the camera of the doorbell. In some embodiments, thefield of view comprises a portion, and the first image, the secondimage, and the third image consist of the portion of the field of view.Methods can further comprise selecting the portion of the field of view.In some embodiments, the images include the entire field of view of thecamera.

The portion of the field of view can be consistent between thecalibration image and subsequent images to help the system accuratelyanalyze the images. In some methods, the first image, the second image,and the third image consist of at least a portion of the field of view,wherein the method further comprises analyzing the portion of the fieldof view.

Referring now To FIG. 3, although doorbells can be used anywhere, insome embodiments, the camera of the doorbell is configured to record aportion of an entryway 310, wherein the first image, the second image,and the third image show the portion of the entryway 310.

In some embodiments, the doorbell (e.g., 202) and the remote computingdevice 204 are not physically coupled. Methods can include wirelesslysending the first image from the doorbell to the remotely locatedcomputing device. Some embodiments include sending the first imagedirectly from the doorbell to the remote computing device without anintermediary server (e.g., 206 in FIG. 1). This direct transmission canbe via wires or can be wireless. Several embodiments includeintermediary servers that enable the doorbell to communicate with theremote computing device via the Internet.

FIG. 8 illustrates a visitor 844 in a second image 852. The visitor ispartially in the detection zone 846 (which was explained in the contextof FIG. 7). The detection zone 846 was defined by selecting the subsets538, 542 in FIG. 7. By analyzing the detection zone 846, the system candetect indications of the visitor 844. The system can ignore visitorindications located outside of the detection zone 846. Visitorindications can include motion and/or infrared signatures indicative ofhumans. In some embodiments, the system analyzes an image to identifyshapes indicative of humans.

Methods for using a doorbell system to detect a first visitor caninclude obtaining the doorbell that comprises a camera and a button. Thecamera can be configured such that the camera has a field of view.Several embodiments include using the camera of the doorbell to take afirst image to calibrate the doorbell system and sending the first imagefrom the doorbell to the remote computing device. Some methods includedisplaying the first image on the electronic display of the remotecomputing device. Several embodiments include prompting a user of theremote computing device to select a first detection zone within thefirst image. The first detection zone can comprise at least a portion ofthe first image. Methods can include configuring the doorbell system toignore a second visitor located within the field of view but locatedoutside of the first detection zone.

The system can ignore a visitor by not sending an alert regarding thevisitor to the remote computing device. In some embodiments, the systemdoes not send an alert to the remote computing device in response to thepresence of the visitor outside of the detection zone but inside of thefield of view of the camera and/or inside of the image. Even when thesystem ignores a visitor, the system can record the visitor for futurereference by the user. The user can then request to see visitors whowere inside of the field of view but not shown via alerts (because theywere ignored due to being located outside of the detection zone). Thus,the system can ignore the visitor in response to the presence of thevisitor outside of the detection zone, but the system can later provideinformation regarding the visitor to the user in response to a user'srequest. Sending an alert can include sending a push notification to asmartphone.

Several methods include configuring the doorbell system to send apicture of a third visitor to the remote computing device in response todetermining that the third visitor is located inside of the firstdetection zone as defined based on the first image. The first detectionzone can be a two-dimensional zone rather than a three dimensional areaof the physical world. Thus, the detection zone can be decoupled fromproximity.

Some method embodiments include enabling audio and/or videocommunication between a visitor and the user of the remote computingdevice in response to detecting at least one indication of the visitorin at least two of the sections and/or in at least ten of the sections.In some embodiments, the sections with the detected indications must beadjacent to each other.

Some embodiments include selecting the first detection zone within thefirst image by prompting the user of the remote computing device toindicate a first area by touching the first area on the electronicdisplay of the remote computing device; recording the first area; and/orexcluding the first area from the first detection zone. Methods caninclude ignoring a visitor in response to the visitor being located inthe first area.

Doorbells can comprise a motion sensor. Some embodiments include aninfrared motion sensor. Methods can comprise ignoring the second visitorin response to disabling the motion sensor during a predetermined timeperiod. The predetermined time period can be during certain hours of theday or night. The time period can be when the user is home or away fromhome (e.g., where the doorbell is mechanically coupled to the home). Asused herein, “home” can include any type of stationary structureconfigured to shelter people (e.g., an office building).

Several embodiments include using a doorbell system to detect at leastone visitor. Methods can include configuring the camera of the doorbellsuch that the camera comprises a field of view and using the camera ofthe doorbell to take a first image to calibrate the doorbell system byestablishing a baseline of an entryway. The baseline can be used todefine a state without any visitors. Methods can include sending thefirst image from the doorbell to the remote computing device anddisplaying the first image on an electronic display of the remotecomputing device.

Some methods include prompting a user of the remote computing device toselect a first detection zone within the first image. The firstdetection zone can comprise a portion of the first image. The firstdetection zone can include a two-dimensional representation of an areain which the doorbell system is configured to respond to motiondetection. Several embodiments include displaying a grid pattern on thefirst image on the electronic display of the remote computing devicesuch that the first image is divided into at least ten sections by linesthat cross each other. The system can be configured to identify thefirst detection zone within the first image by the user choosing atleast a first subset of the sections on the electronic display of theremote computing device. Choosing the first subset can cause the firstsubset to be included in the first detection zone.

Several methods include configuring the doorbell system to ignore asecond visitor located within the field of view but located outside ofthe first detection zone. Some embodiments include configuring thedoorbell system to send a picture of a third visitor to the remotecomputing device in response to at least some of the following factors:(1) determining that the third visitor is located inside of the firstdetection zone as defined based on the first image, (2) determining thatat least a predetermined percentage (e.g., thirty percent) of the firstdetection zone includes motion indicators, and (3) determining that thefirst detection zone has included the motion indicators for at least apredetermined amount of time (e.g., three seconds).

Some methods include automatically excluding an area from a detectionzone. Automatic exclusion can occur without the user excluding aspecific area (even if the user configures settings that later lead toautomatic exclusions). In some embodiments, indications indicative ofmotorized vehicles (e.g., cars, trucks, vans) are automatically excludedfrom a detection zone. These automatic calibration innovations can takemany forms. Several methods include automatically excluding an area froma detection zone in response to detecting an object (e.g., a motorizedvehicle) moving through the first detection zone at more thantwenty-five miles per hour. Some methods include automatically excludingan area in response to detecting an infrared signal indicative of amotorized vehicle.

Some embodiments include automatically excluding an area from the firstdetection zone in response to at least some of the following items: (1)detecting an indication of a visitor in a detection zone; (2) enablingaudio communication between the doorbell and the remote computing devicein response to detecting the indication of the visitor; and (3) usingthe doorbell to detect an absence of sound indicative of speaking. Thearea that is excluded can be the area in which the indication wasdetected.

FIG. 9 illustrates a doorbell system 528 that comprises a doorbell 506(e.g., security system 202) and a remote computing device 204. Thedoorbell 506 has a camera 208 and a doorbell button 212. Pressing thebutton 212 can cause the chime 302 (shown in FIG. 3) to sound (e.g.,emit a “ding-dong” sound or another notification sound).

The camera 208 is configured such that it has a field of view 840. Thecamera 208 can be positioned such that the field of view 840 shows anentryway 878 (as illustrated in FIG. 9) or at least a portion of a poolof water 1426 (as illustrated in FIG. 18). The camera 208 can take afirst image 862, which can be all or part of the field of view 840. Asused herein, phrases such as “take an image” are used in a very broadsense. A picture can be taken and then recorded on any of the itemslisted herein. Taking a picture can mean that a camera was used as atleast one of several items used to capture an image. Taking a picturecan be part of taking a video. Thus, an item that takes a video alsotakes a picture. The camera can be a digital video camera.

The doorbell system 528 can send the first image 862 to a remotecomputing device 204. The remote computing device 204 can display thefirst image 862 on an electronic display 242. The remote computingdevice 204 can prompt a user (of the remote computing device 204) toselect at least one detection zone 846 within the first image 862. Asillustrated in FIG. 9, the detection zone 846 is a portion of the firstimage 862. Multiple detection zones can overlap or can be separate.

The doorbell system 528 can send data regarding the selected detectionzone 846 from the remote computing device 204 to the doorbell 506. Thedoorbell 506 can then focus on looking for visitors within the detectionzone 846 and/or can ignore indications that are suggestive of a visitorif the indications are located outside of the detection zone 846.

In some embodiments, a computer (e.g., server 206 or computing device204 in FIG. 1) that is located remotely from the doorbell 506 analyzeseach image. Thus, the computer can apply the detection zone 846 toanalyses of images from the doorbell 506 such that the doorbell 506 doesnot have to receive data regarding the detection zone 846. In someembodiments, the doorbell 506 sends an alert regarding a visitor to theremote computing device 204, but then the computing device 204 (and/orthe server 206 in FIG. 1) blocks displaying the alert because the alertis from a visitor indication that was outside of the detection zone 846.

The camera 208 can be used to take a second image 870. The detectionzone 846 selected from the first image 862 can be positioned on thesecond image 870 such that the detection zone 846 represents the samearea in front of the camera 208 in both the first image 862 and thesecond image 870. For example, the detection zone 846 can focus avisitor detection analysis on the same portion of an entryway in imagestaken by the camera assembly subsequent to the camera 208 taking thefirst image 862.

The doorbell system 528 can analyze the detection zone 846 of the secondimage 870. The doorbell system 528 can be used to analyze the secondimage 870 to determine whether a first indication of the visitor 844 islocated inside of the detection zone 846. In FIG. 9, the doorbell system528 determines that a first indication of the visitor 844 is locatedoutside of the detection zone 846 (because the visitor 844 is locatedoutside of the detection zone 846 in the second image 870). Then, thedoorbell system 528 can decide not to send an alert and/or can blocksending an alert to the remote computing device 204 in response todetermining that the first indication of the visitor 844 is locatedoutside of the detection zone 846.

The doorbell system 528 can be configured to notify the remote computingdevice 204 regarding a presence of the visitor 844 by sending an alert(e.g., a push notification) to the remote computing device 204. FIG. 9illustrates the doorbell 506 sending an alert 232 to the remotecomputing device 204. The alert 232 can be sent directly from thedoorbell 506 to the remote computing device 204. In some embodiments,the alert 232 is sent directly and wirelessly. In some embodiments, thealert 232 is sent via a server and/or via the Internet. The alert 232can cause a push notification to appear on the user interface 240 of thecomputing device 204. In some embodiments, the alert 232 causes theremote computing device 204 to vibrate or “ring” to notify the user ofthe remote computing device 204 that a visitor may be present near thedoorbell 202. The alert 232 can include a video of the visitor.

After the second image 870 was taken, the visitor 844 moved into thedetection zone 846. The visitor 844 is located at least partially insidethe detection zone 846 in the third image 874. The doorbell system 528can analyze the third image 874 to detect an indication of the visitor844. The doorbell system 528 can determine that an indication of thevisitor 844 is located inside the detection zone 846.

Automatic Calibration

FIG. 10 illustrates a doorbell (e.g., security system 202) that has afield of view (“FOV”) 1000. The doorbell 202 can be part of a doorbellsystem (e.g., communication system 200) that includes a remote computingdevice 204, a server 206, and/or wireless communication 230 (shown inFIG. 1). The button 212 of the doorbell 202 can be configurable suchthat pressing the button 212 rings a chime 302 (shown in FIG. 3). Thefield of view 1000 can include a first portion 1004 and a second portion1008.

Embodiments can include using doorbell 202 to detect a first object 1012within the first portion 1004 of the field of view 1000; and/ordetermining that the button 212 was not pressed within a predeterminedtime after the doorbell detects the first object 1012 within the firstportion 1004 of the field of view 1000. For example, the first object1012 might be a car or a bird that is detected by the camera 208 and/orby the motion detector 218. The car or bird will not press the button212 like an actual visitor might do. As a result of the object's 1012detection not being followed by a button 212 press (e.g., within 60seconds), the doorbell system can become more skeptical of objectsdetected in the first portion 1004 of the field of view 1000. If thedetected object 1012 had actually been a visitor (e.g., a person comingto the door), then the detection of the object 1012 likely would havebeen followed by the visitor pressing the doorbell button 212. Thiscorrelation between detecting remote objects and the doorbell systemdetecting a press of the doorbell button 212 can enable the doorbellsystem to automatically calibrate itself.

More specifically, the doorbell system can calibrate sensitivity incertain areas of the field of view 1000. For example, the first portion1004 of the field of view 1000 might be of a road that passes in frontof the building 300 (shown in FIG. 3) to which the doorbell 202 isattached. The movement on the road and/or the presence of new objects onthe road could lead to many false positives. For example, the doorbell202 could detect a car on the road and then automatically send an alertregarding a “visitor” to the remote computing device 204 (shown in FIG.1). The user of the remote computing device 204 could then be irritatedthat the passing car is not actually a visitor, and thus, the alertinappropriately distracted the user. The doorbell system can reduce thesensitivity of the detection system in the first portion 1004 to reducefalse positives (e.g., due to passing cars). In some cases, thesensitivity of the detection system is reduced so much that the systemexcludes the first portion of the field of view from causing an alertconfigured to notify the remote computing device regarding a presence ofa “visitor” (e.g., when the suspected “visitor” is a passing car and nota visiting person).

The field of view 1000 can include a second portion 1008 that can becommonly associated with detecting indications of real visitors. Forexample, the system can detect an object 1016 in the second portion1008. This detection can be followed by the object 1016 (i.e., a realvisitor) triggering the doorbell button 212 (by pressing the button212). This correlation can increase the probability of another object1020 detected within the second portion 1008 resulting in the systemsending the alert to the remote computing device 204 (shown in FIG. 1)even if the object 1020 does not ring the doorbell button 212 or beforethe object 1020 rings the doorbell button 212.

Embodiments can include many detection areas (such as the first portion1004 and the second portion 1008). For example, the sections 528 in FIG.6 can each be individual detection areas that are individuallycalibrated based on doorbell button triggering data that is individuallyassociated with the detection areas. Some of the sections 528 can beexcluded from causing an alert if motion, image indications, and/orinfrared data detected in those sections is not typically correlatedwith doorbell button triggering.

FIG. 11 illustrates a visitor 844 located within the second portion 1008of the field of view 1000. The visitor detection system 1024 can beconfigured to detect the visitor 844. The visitor detection system 1024can comprise at least one of a camera 208, a motion detector 218, and/oran infrared detector 222. The visitor detection system 1024 isconfigured to detect a first indication 1028 suggestive of the visitor844. In this example, the first indication 1028 is misleading because,although it is suggestive of a visitor, the indication 1028 was causedby something other than a visitor. For example, the first indication1028 might have been caused by a passing car, an animal, or wind blowinga garbage container over. The system can realize that indications in thefirst portion 1004 of the field of view 1000 are unreliable ifindications in the first portion 1004 of the field of view are nottypically followed by the doorbell button 212 being triggered.

An indication can be suggestive of the visitor if the indication is of atype that may indicate a visitor (even if the indication can sometimesresult in false positives). For example, the indication can be a motionindication, but at times, motion indications may result from movingcars, pets, and plants. As a result, a motion indication may notactually indicate a visitor even though the indication suggests that avisitor may be present.

An infrared signature that seems to indicate that a visitor is presentcan be a type of indication. The infrared signature may be of a shapeand/or temperature that suggests the infrared signature is from avisitor (i.e., a person). In many cases, infrared signatures suggestiveof visitors are actually from visitors, but in some cases, infraredsignatures suggestive of visitors may be misleading (and not actually befrom visitors).

A shape in an image taken by a camera may be an indication suggestive ofa visitor. For example, the shape can be of a size or geometry thatsuggests the shape represents at least a portion of a visitor. In somecases, shapes suggestive of a visitor may not actually be from avisitor.

Doorbell triggering (e.g., pressing) data can be used to substantiatesuggestive indicators. Thus, embodiments can grow more skeptical ofindicators if they are not followed by, for example, a visitor pressingthe doorbell button. Certain areas of the field of view can bediscounted or ignored altogether if indicators associated with thecertain areas are not followed by a visitor pressing the doorbellbutton.

Embodiments can grow more confident of indicators if they are followedby a visitor pressing the doorbell button. In some embodiments, allareas of the field of view are configured to trigger an alert regardingthe visitor until indications associated with certain areas are notfollowed by visitors pressing the button. Then, the system can ignoreindications in those areas (to reduce the number of false positives).

Some embodiments include using the visitor detection system to detectthe first indication suggestive of the first visitor within a firstportion of the field of view and determining that the first indicationdetected within the first portion of the field of view is not associatedwith a triggering of the button.

Several methods can be used to determine if an indication is associatedwith a triggering of the button. In some embodiments, the system waitsfor a predetermined amount of time (e.g., 60 seconds or less) afterdetecting the indication to determine if the doorbell button is pressed.If the button is not pressed within the predetermined amount of time,then the indication is not associated with the triggering of the button.

The system can be configured to determine if the object that resulted inthe indication suggestive of the visitor later pressed the doorbellbutton. If the object pressed the doorbell button, then the indicationwas associated with the triggering of the button. If the object did notpress the doorbell button, then the object was not associated with thetriggering of the button. This approach enables the system to calibrateits remote detection capabilities based on doorbell button data. Then,the system can more accurately determine if an indication is actually avisitor (to reduce false positives). As a result, the system can morereliably send an alert about a later visitor even if the visitor doesnot press the button.

A visitor can trigger the doorbell button in several ways. In manyembodiments, the visitor triggers the doorbell button by pressing thedoorbell button (e.g., to make the chime “ring”). Some embodimentsinclude a button that can be triggered without pressing the button. Forexample, the visitor can trigger the button by touching the button. Someembodiments include “contactless” switches (e.g., Hall effect sensors)that enable triggering the button without actually touching the button.

Several embodiments include using the visitor detection system to detecta second indication suggestive of a second visitor within the firstportion of the field of view and excluding the first portion of thefield of view from causing an alert configured to notify the remotecomputing device regarding a presence of the second visitor. Theexcluding can be at least partially in response to determining that thefirst indication detected within the first portion of the field of viewis not associated with the triggering of the button. The excludingprevents the second indication from causing the alert.

In some embodiments, this exclusion can create zones within the field ofview that will not cause the system to send the alert even though thesystem detects an indication suggestive of a visitor in the excludedzones. This exclusion often will not prevent all indications fromcausing an alert if the indications are detected in non-excluded zones.

Several embodiments include using the visitor detection system to detecta third indication suggestive of the second visitor within a secondportion of the field of view and then sending the alert in response todetecting the third indication within the second portion. The firstindication can be a first motion indication, the second indication canbe a second motion indication, and the third indication can be a thirdmotion indication.

In some embodiments, the doorbell system determines that the firstindication detected within the first portion of the field of view is notassociated with the triggering of the button by determining that thebutton was not triggered within 60 seconds after detecting the firstindication. 60 seconds can be a good timeframe because visitorsapproaching a doorbell will typically ring the doorbell within 60seconds. If the item that caused the indication has not pressed thedoorbell button within 60 seconds of being detected, then the item mightnot actually be a visitor and might be a passing car, a pet, awind-blown tree branch, or another misleading item.

Of course, there will be times when an actual visitor does not press thedoorbell button. For example, a person might choose to knock on the doorinstead of ringing the doorbell button. Thus, some embodiments includelistening for sounds 1030 indicative of a visitor. Sounds 1030indicative of a visitor include talking and knocking. Some embodimentsare similar to other embodiments described herein except that theembodiments determine whether an indication detected within the firstportion of the field of view is associated with sounds 1030 indicativeof a visitor.

As a result of there being times when an actual visitor does not pressthe doorbell button, some embodiments do not immediately exclude aportion of the field of view from causing an alert, but instead, rely ondata from many visitors and/or adjust the sensitivity of the visitordetector in the portion of the field of view.

FIG. 11 illustrates an indication 1032 that resulted from a visitor 844approaching the doorbell 202. The doorbell system can detect theindication 1032 based on detecting the infrared signature of the visitor844, detecting the motion of the visitor 844, and/or comparing abaseline image to a second image of the field of view 1000 and thendetermining that the indication 1032 is present in the second image butnot in the baseline image.

Infrared signature is used to describe the appearance of objects toinfrared sensors. Infrared signatures can be influenced by a wide rangeof factors (e.g., object shape, temperature, background). As usedherein, infrared signature is used in a broad sense to describedetecting an object based on the infrared indication of that object.

FIG. 12 illustrates an infrared signature 1036 of the visitor 844 shownin FIG. 11. The infrared detector 222 can detect the infrared signature1036. Although the infrared signature 1036 was caused by a real visitor844, many objects that are not visitors can cause infrared signatures.As a result, many embodiments use doorbell button 212 data to calibratethe visitor detection system 1024. Infrared signatures that are notassociated (e.g., followed) by a press of the doorbell button 212 may becategorized as unreliable indications of a visitor. Portions of thefield of view 1000 that commonly cause unreliable indications may beprecluded from causing an alert to be sent to the remote computingdevice 204 (shown in FIG. 1). For example, cars passing in the firstportion 1004 of the field of view 1000 may have an infrared signaturethat the doorbell system could mistake for a visitor (e.g., a personapproaching the doorbell). If so, the system can become more reliable(and better calibrated) by ignoring infrared signatures in the firstportion 1004 of the field of view 1000.

In some embodiments, the visitor detection system comprises the infrareddetector, wherein using the visitor detection system to detect the firstindication within the first portion of the field of view comprisesdetecting a first infrared signature within the first portion. Methodscan include reducing a first sensitivity of the visitor detection systemwithin the first portion in response to determining that the button wasnot triggered within 60 seconds after detecting the first indication.Reducing the first sensitivity can reduce a first probability of causinga first alert configured to notify the remote computing device regardinga presence of a second visitor in response to detecting a secondindication suggestive of the second visitor within the first portion ofthe field of view.

In several embodiments, the infrared detector comprises a first infraredsensor and a second infrared sensor. The doorbell can comprise a wallthat separates the first infrared sensor from the second infrared sensorsuch that the first infrared sensor is configured to detect the firstinfrared signature within the first portion and the second infraredsensor is configured to detect a second infrared signature within asecond portion of the field of view.

Some embodiments include using the infrared detector to detect a thirdindication suggestive of a third visitor within a second portion of thefield of view; and/or increasing a second sensitivity of the visitordetection system within the second portion in response to determiningthat the button was triggered within 60 seconds after detecting thethird indication. Increasing the second sensitivity can increase asecond probability of causing a second alert configured to notify theremote computing device regarding the presence of the third visitor inresponse to detecting the third indication within the second portion ofthe field of view.

FIG. 13 illustrates an embodiment with motion indications 1038, 1040.The motion detector 218 can detect the motion indications 1038, 1040.The first motion indication 1038 can be from a passing car traveling at35 miles per hour. The second indication 1040 can be from the visitor844 approaching a door located in the same entryway as the doorbell 202.The visitor 844 can be moving at less than 5 miles per hour, which istypical of people as they approach doors. Cars tend to move much fasterthan people walking towards doorbells, so a speed threshold can be auseful way for the doorbell system to distinguish between people (whichare typically true positives) and cars (which are typically falsepositives).

If the first portion 1004 of the field of view 1000 typically results infalse positives (e.g., based on objects that are moving too fast and/orbased on detecting objects that then do not ring the doorbell), then thefirst portion 1004 can be precluded from causing alerts. If the secondportion 1008 of the field of view 1000 typically results in truepositives (e.g., based on objects that are moving at a speed below thepredetermined threshold and/or based on detecting objects that then ringthe doorbell), then the doorbell system can increase its sensitivity tomotion indicators in the second portion 1008 of the field of view 1000.

Speed is one of many factors that can help distinguish betweenmisleading motion and motion that is from an actual visitor. People tendto approach doorbells at less than 5 miles per hour. In contrast, carstend to drive over 25 miles per hour and often drive over 35 miles perhour. Excluding motion that is over 5 miles per hour can help improvethe accuracy of the doorbell system (by screening out motions that aretoo fast to likely be from a visitor).

Several methods include detecting a speed of the first motion; and/orexcluding the first motion from causing the alert configured to notifythe remote computing device regarding the presence of the first visitor.The excluding can be at least partially in response to the speed beinggreater than a predetermined threshold. The predetermined threshold canbe at least 5 miles per hour and can be less than 35 miles per hour. Apredetermined threshold of 15 miles per hour provides a very reliabledividing line between people walking up to a doorbell and cars drivingin front of the doorbell. Several embodiments include a predeterminedthreshold of at least 15 miles per hour.

In some embodiments, the visitor detection system comprises a motiondetector. Using the visitor detection system to detect the firstindication within the first portion of the field of view can comprisedetecting a first motion within the first portion. Embodiments caninclude reducing a first sensitivity of the visitor detection systemwithin the first portion in response to determining that the button wasnot triggered within a predetermined time (e.g., 60 seconds, 30 seconds,15 seconds) after detecting the first indication. Reducing the firstsensitivity can reduce a first probability of causing an alertconfigured to notify the remote computing device regarding a presence ofa second visitor in response to detecting a second indication suggestiveof the second visitor within the first portion of the field of view.

Several embodiments include using the visitor detection system to detecta second motion within a second portion of the field of view; and/orincreasing a second sensitivity of the visitor detection system withinthe second portion in response to determining that the button wastriggered within 60 seconds after detecting the second motion.Increasing the second sensitivity can increase a second probability ofcausing the alert configured to notify the remote computing deviceregarding the presence of the second visitor in response to detectingthe second motion within the second portion of the field of view.

Some embodiments include dividing the field of view into the firstportion and the second portion such that the doorbell system isconfigured to distinguish between the first motion detected in the firstportion and the second motion detected in the second portion. A wall(e.g., a plastic blade) can be used to divide the field of view. In someembodiments, the field of view is divided with software (e.g., ratherthan being physically divided by a wall).

Several embodiments for using a doorbell to detect visitors includeobtaining the doorbell system that comprises a motion detector and abutton; configuring the doorbell system such that the motion detectorcomprises a field of view; detecting a first motion within a firstportion of the field of view; determining that the button was nottriggered within 60 seconds after detecting the first motion within thefirst portion of the field of view; and/or excluding the first portionof the field of view from causing an alert configured to notify theremote computing device regarding a presence of the first visitor. Theexcluding can be at least partially in response to determining that thebutton was not triggered within 60 seconds after detecting the firstmotion within the first portion of the field of view.

Some embodiments include detecting a second motion within a secondportion of the field of view; determining that the button was triggeredwithin 60 seconds after detecting the second motion within the secondportion of the field of view; and/or configuring the doorbell system toautomatically send the alert regarding a third motion detected in thesecond portion of the field of view at least partially in response todetermining that the button was triggered within 60 seconds afterdetecting the second motion within the second portion of the field ofview.

Several embodiments include detecting the third motion within the secondportion of the field of view; and/or automatically sending the alert tothe remote computing device regarding the presence of a visitor inresponse to detecting the third motion within the second portion of thefield of view. Methods can include automatically initiating the sendingof the alert to the remote computing device regarding the presence ofthe first visitor prior to the first visitor pressing the button.

FIG. 14 illustrates a baseline image 1044 of the field of view 1000.FIG. 15 illustrates a second image 1048 of the field of view 1000.Referring now to FIGS. 14 and 15, the camera 208 can take the baselineimage 1044 and the second image 1048. The doorbell system can comparethe baseline image 1044 to the second image 1048 to detect an indication1052 of the visitor 844. The system can then determine that theindication 1052 is present in the second image 1048 but not in thebaseline image 1048.

In several embodiments, the visitor detection system comprises a camera,and using the visitor detection system to detect the first indicationwithin the first portion of the field of view comprises using the camerato take a first image. Then, the doorbell system can analyze the firstimage to detect the first indication. Embodiments can include reducing afirst sensitivity of the visitor detection system within the firstportion in response to determining that the button was not triggeredwithin a predetermined time after detecting the first indication.Reducing the first sensitivity can reduce a first probability of causinga first alert configured to notify the remote computing device regardinga presence of a second visitor in response to detecting a secondindication suggestive of the second visitor within the first portion ofthe field of view.

Some embodiments include using the camera to take a second image. Then,the doorbell system can analyze the second image to detect a thirdindication suggestive of a third visitor within a second portion of thefield of view. Methods can include increasing a second sensitivity ofthe visitor detection system within the second portion in response todetermining that the button was triggered within 60 seconds afterdetecting the third indication by analyzing the second image. Increasingthe second sensitivity can increase a second probability of causing asecond alert configured to notify the remote computing device regardingthe presence of the third visitor in response to detecting the thirdindication within the second portion of the field of view.

Several embodiments include using a doorbell system to detect a firstvisitor. The doorbell system can comprise a doorbell and a remotecomputing device. Methods can include obtaining the doorbell thatcomprises a camera and a button. The button can be configurable toenable the first visitor to sound a chime. Methods can also includeconfiguring the doorbell system such that the camera comprises a fieldof view; using the camera of the doorbell to take a baseline image tocalibrate the doorbell system by establishing a baseline of at least apart of the field of view; using the camera of the doorbell to take asecond image of at least the part of the field of view; determining thata first object is present in the second image, but not in the baselineimage; associating the first object with a first portion of the field ofview; determining that the button was not triggered within 60 secondsafter determining that the first object is present in the second image,but not in the baseline image; and/or excluding the first portion of thefield of view from causing an alert configured to notify the remotecomputing device regarding a presence of the first visitor. Theexcluding can be at least partially in response to determining that thebutton was not triggered within 60 seconds after determining that thefirst object is present in the second image, but not in the baselineimage.

Associating the first object with the first portion of the field of viewcan include correlating the first object with a location within thefield of view. For example, the system can know where in the field ofview the first object was detected. This relative location informationcan be helpful so the system can determine which areas of the field ofview are causing misleading indications (e.g., as implied by anindication not being followed by a triggering of the doorbell buttonwithin 60 seconds of the system detecting the indication).

Many factors and methods can be used to exclude a portion of the fieldof view from causing an alert. For example, sound data and button datacan be combined to exclude the portion of the field of view. In someembodiments, many button press data points are used to eventuallyexclude a portion of the field of view. Thus, excluding can be at leastpartially in response to determining that the button was not triggeredwithin 60 seconds after determining that the first object is present inthe second image, but not in the baseline image, even though otherfactors and methods are ultimately used in the full exclusion decision.

Several embodiments include using the camera of the doorbell to take athird image of at least the part of the field of view; determining thata second object is present in the third image, but not in the baselineimage; associating the second object with a second portion of the fieldof view; determining that the button was triggered within 60 secondsafter determining that the second object is present in the third image,but not in the baseline image; and/or configuring the doorbell system toautomatically send the alert regarding a third object detected in thesecond portion of the field of view at least partially in response todetermining that the button was triggered within 60 seconds afterdetermining that the second object is present in the third image, butnot in the baseline image.

Some embodiments include using the camera of the doorbell to take afourth image of at least the part of the field of view; determining thatthe third object is present in the fourth image, but not in the baselineimage; associating the third object with the second portion of the fieldof view; and/or automatically sending the alert to the remote computingdevice regarding the presence of a visitor.

Several embodiments include automatically initiating the sending of thealert to the remote computing device regarding the presence of the firstvisitor prior to the first visitor pressing the button. Initiating thesending of the alert does not necessarily mean that the alert hasarrived at the remote computing device.

The baseline image can comprise several images. In some embodiments, thebaseline image is actually a collection of images taken at differenttimes. Thus, a first image can be the baseline image for a second image,and the second image can be the baseline image for a third image.

FIG. 16 illustrates an embodiment in which a wall 1060 divides the fieldof view 1000 into a first portion 1064 and a second portion 1068. Theinfrared detector 222 and/or the motion detector 218 (shown in FIG. 12)can include a first sensor 1070 and a second sensor 1074. The sensors1070, 1074 can be infrared sensors and/or motion sensors.

In several embodiments, the infrared detector 222 comprises a firstinfrared sensor and a second infrared sensor. The doorbell 202 (shown inFIG. 12) can be configured such that the wall 1060 separates the firstinfrared sensor from the second infrared sensor such that the firstinfrared sensor is configured to detect the first infrared signaturewithin the first portion and the second infrared sensor is configured todetect a second infrared signature within a second portion of the fieldof view.

The wall 1060 can be configured to divide the field of view 1000 intoportions 1064, 1068 such that the doorbell system can distinguishbetween motions in different portions 1064, 1068. For example, the wall1060 can be configured to prevent a second sensor 1074 from detecting amotion that the first sensor 1070 can detect (e.g., because the wall1060 can “hide” the motion from the second sensor 1074).

Pool Monitoring

FIG. 17 shows FIG. 50 of U.S. Nonprovisional patent application Ser. No.14/275,811 (now U.S. Pat. No. 8,872,915), which illustrates adiagrammatic view of a security system (e.g., a camera assembly) used tomonitor a pool area. (Also see FIG. 50 of U.S. Nonprovisional patentapplication Ser. No. 14/142,839, which is now U.S. Pat. No. 8,842,180.)The entire contents of U.S. Nonprovisional patent application Ser. No.14/275,811 and U.S. Nonprovisional patent application Ser. No.14/142,839 are incorporated by reference herein.

Referring now to FIG. 17, the motion detector 218 can be configured todetermine whether a person is located in the pool 5030 even when thesecurity system 202 is located outside of the pool 5030. In someembodiments, the security system 202 is placed at least three feetand/or less than fifty feet from the pool 5030. The security system 202can watch over the pool 5030 and can send a notification to a remotecomputing device if a visitor enters a zone 5034 that includes at leasta portion of the pool 5030.

The security system 202 can take a picture 208 with the camera 208 inresponse to detecting motion (e.g., via the motion detector 218). Thesecurity system 202 (or another portion of the communication system 200illustrated in FIG. 1) can analyze the picture to determine if themotion was caused by an adult or by a child (e.g., by a person under apredetermined height threshold). In some cases, the height threshold canbe at least 5 feet, 4.5 feet, 3.5 feet, or 3 feet.

The camera 208 can be configured to visually identify people throughmachine vision and/or image recognition. For example, the camera 208 cantake an image of the person located near the pool 5030. Software run byany portion of the system can then analyze select features of the personfrom the image. The software can use scaling to estimate the height ofthe person (e.g., based on previous calibration procedures andinformation).

In some embodiments, if the motion was caused by an adult and/or by aperson taller than the height threshold, then the system will not send anotification (e.g., alarm) to the remote computing device and/or willnot emit an alert sound from the speaker 488 (shown in FIG. 19 hereinand in FIG. 11 of U.S. Nonprovisional patent application Ser. No.14/142,839) of the security system 202. In some embodiments, if themotion was caused by a child and/or by a person shorter than the heightthreshold, then the system will send a notification to the remotecomputing device and/or will emit an alert from the speaker of thesecurity system 202.

Although the security system 202 can be configured to detect if a personfalls into the pool 5030, the security system 202 can also be configuredto detect whether a person is located within a zone 5034 that includesat least a portion of the pool 5030. In some embodiments, the zone 5034includes all of the pool 5030 and/or an area around the perimeter of thepool 5030. The zone 5034 can define a danger zone. Once the securitysystem 202 detects that a person is located in the zone 5034, thesecurity system can enter a Standby Mode in which the security system202 conducts at least one analysis to determine if the person might bein danger (e.g., if the person is shorter than the height threshold orif the person is unauthorized to be in the zone 5034 and/or in the pool5030).

In some embodiments, the security system 202 will send a notification toa remote computing device and/or emit an alert sound from the speakerunless the detected person is wearing a device that indicates the personis authorized to be in the zone 5034 and/or in the pool 5030. Theauthorization device 5038 can be a bracelet or other object worn by theperson. The authorization device 5038 can include a radio-frequencyidentification (“RFID”) or Bluetooth communication device configured toprovide data to the security system 202 (e.g., data regarding theauthorization of the device to be located in the zone 5034 and/or in thepool 5030).

Several methods include using the security system 202 to detect whethera person is located in the zone 5034. Methods can include determiningwhether the person is authorized to be in the zone 5034. In someembodiments, methods include sending a notification to a remotecomputing device and/or emitting an alert sound from a speaker 488 ofthe security system 202 if the person is located in the zone 5034 and/ornot authorized to be in the zone 5034.

FIG. 18 illustrates an embodiment that can be applied to any of thecommunication system embodiments and security system embodimentsincorporated by reference. A camera assembly 1422 (e.g., the securitysystem 202 shown in FIG. 1) is placed near a pool of water 1426 suchthat the camera 208 of the camera assembly 1422 includes a field of view1000 that comprises (e.g., is configured to “see”) at least a portion ofthe pool of water 1426.

A monitoring system 1430 can include the camera assembly 1422 and aremote computing device 204. The camera assembly 1422 can wirelesslycommunicate with the remote computing device 204 via wirelesscommunications 230. Alerts from the camera assembly 1422 can be shown onthe electronic display 242 of the remote computing device 204.

If the visitor 844 enters a detection zone 1434 and/or falls into thepool of water 1426, then the camera assembly 1422 can take a picture ofthe visitor 844. This picture can be shown on the electronic display242. A user of the remote computing device 204 can then determine if thevisitor 844 is someone who can swim and/or is authorized to be in thedetection zone 1434 (e.g., a pool area). The camera assembly 1422 candetect visitors via analyzing images taken by the camera 208, via themotion detector 218, and/or via an infrared detector 222.

In many cases, the computing device 204 is located out of visible rangeof the camera assembly 1422 when the camera assembly 1422 sends an alert(e.g., a wireless communication 230) to the remote computing device 204.In the embodiment illustrated in FIG. 18, the remote computing device204 is not mechanically coupled to the camera assembly 1422. Forexample, the camera assembly 1422 can be mounted to a wall 1438 and theremote computing device 204 can be inside a home that is adjacent to thepool of water 1426. In some cases, the remote computing device 204 canbe thousands of miles away from the camera assembly 1422 and can stillbe configured to receive alerts regarding unauthorized visitors from thecamera assembly 1422.

A mounting bracket 420 can be used to mount the camera assembly 1422.The mounting bracket 420 is shown in FIG. 20 herein and in FIGS. 10 and12 of U.S. Nonprovisional patent application Ser. No. 14/275,811 (nowU.S. Pat. No. 8,872,915). Various embodiments can use many differenttypes of mounting brackets.

FIGS. 19 and 20 are based on FIGS. 11 and 12 from U.S. Nonprovisionalpatent application Ser. No. 14/142,839, which is now U.S. Pat. No.8,842,180. FIG. 19 illustrates a back view of a camera assembly 1422without a mounting bracket 420. FIG. 20 illustrates a back view of thecamera assembly 1422 with a mounting bracket 420.

Referring now to FIGS. 18 and 19, the monitoring system 1430 can be usedto detect a first visitor 844. The camera assembly 1422 can include acamera 208, a speaker 488, a motion sensor 218, a button 212, a printedcircuit board 516, and an outer housing 224, which can bewater-resistant or waterproof. The remote computing device 204 caninclude an electronic display 242 configured to show images taken by thecamera 208.

Some embodiments include obtaining the camera assembly 1422 andconfiguring the camera assembly 1422 such that a camera 208 comprises afield of view 1000 that includes at least a portion of a pool of water1426.

FIG. 21 illustrates a first image 1050 of the field of view 1000.Referring now to FIGS. 18 and 21, the camera 208 can be used to take thefirst image 1050 of at least a portion of the pool of water 1426.Embodiments can include sending the first image 1050 wirelessly from thecamera assembly 1422 to the remote computing device 204; displaying thefirst image 1050 on the electronic display 242 of the remote computingdevice 204; and/or using the remote computing device 204 to select afirst detection zone 1434 within the first image 1050. The firstdetection zone 1434 can comprise a portion of the first image 1050.

The first image 842 in FIG. 7 can be replaced with the first image 1050shown in FIG. 21. FIG. 22 illustrates a front view of a remote computingdevice 204 displaying a grid pattern 524 on the first image 1050 takenby a camera 208 (shown in FIG. 18). Sections 528 of the grid pattern 524can be selected to form a detection zone 1434 (which is also shown inFIGS. 18 and 21).

Several embodiments include displaying the grid pattern 524 on the firstimage 1050 on the electronic display 242 of the remote computing device204 such that the first image 1050 is divided into at least six sections528 by lines 532 that cross each other. In some application, sixsections can be the minimum number of sections necessary to adequatelysubdivide the first image 1050. Several application use at least twosections, at least ten sections, and/or at least fifty sections. Someembodiments include selecting the first detection zone 1434 within thefirst image 1050 by touching at least a first subset of the sections 528on the electronic display 242 of the remote computing device 204. (Inthe interest of clarity, not all of the sections 528 and lines 532 arelabeled in FIG. 22.)

Referring now to FIG. 18, the monitoring system 1430 can be configuredto detect a first indication 1028 suggestive of the visitor 844 (e.g.,like the visitor detection system 1024 is configured to detectindications suggestive of visitors as described in the context of FIGS.11, 12, 13, and 15). Embodiments can include using the camera assembly1422 to detect an indication 1028 of the first visitor.

The indication 1028 can be located inside of the field of view 1000. Forexample, the location of the indication 1028 can be seen in the field ofview 1000 (e.g., such that the camera 208 could see the location if thecamera 208 were taking a picture).

An indication can be suggestive of the visitor 844 if the indication isof a type that may indicate a visitor (even if the indication cansometimes result in false positives). For example, the indication 1028can be a motion indication, but at times, motion indications may resultfrom moving objects, pets, and plants. As a result, a motion indicationmay not actually indicate a visitor even though the indication suggeststhat a visitor may be present (e.g., near a pool).

An infrared signature that seems to indicate that a visitor is presentcan be a type of indication. The infrared signature may be of a shapeand/or temperature that suggests the infrared signature is from avisitor (i.e., a person). In many cases, infrared signatures suggestiveof visitors are actually from visitors, but in some cases, infraredsignatures suggestive of visitors may be misleading (and not actually befrom visitors). The size of the infrared signature can help the systemdetermine if the visitor is above or below a size threshold. Thisthreshold can be advantageous to enable the system to ignore adults(because adults can likely swim) while not ignoring children (becausemany children cannot swim).

A shape in an image taken by a camera may be an indication suggestive ofa visitor. For example, the shape can be of a size or geometry thatsuggests the shape represents at least a portion of a visitor. In somecases, shapes suggestive of a visitor may not actually be from avisitor.

In FIG. 18, the indication 1028 of the visitor 844 is located outside ofthe first detection zone 1434. Embodiments can include determining thatthe indication 1028 is located outside of the first detection zone 1434,and then the monitoring system 1430 deciding to not send a first alert(e.g., 232 in FIG. 1) to the remote computing device 204 (e.g., inresponse to determining that the indication 1028 of the visitor 844 islocated outside of the first detection zone 1434). The first alert canbe configured to notify the remote computing device 204 regarding apresence of the visitor 844.

Referring now to FIG. 7, various embodiments can respond differently totouching the first subset 538 on the electronic display 242. Touchingthe first subset 538 can cause the first subset 538 to be included inthe first detection zone or excluded from the first detection zone.

Referring now to FIG. 22, the first detection zone can 1434 comprise anarea of the first image 1050 that includes the pool of water 1426. Insome embodiments, a user configures the first detection zone 1434 usingthe remote computing device 204 by tracing her finger around a perimeterof a pool 1426 in a picture (e.g., the first image 1050) that includesthe pool 1426 while the picture is displayed on the remote computingdevice 204. The remote computing device 204 can record the firstdetection zone 1434 as defined based on the traced perimeter (e.g., asshown by the dotted line of the detection zone 1434 in FIG. 22).

Referring now to FIG. 18, the monitoring system 1430 can correlatevisitor indications 1028 with locations such that the monitoring system1430 can determine if the visitor indications 1028 are located inside oroutside of the first detection zone 1434 even though the indications1028 are sensed by a different sensor than the camera 208. For example,the indications 1028 can be detected via the motion detector 218 and/orthe infrared detector 218. In some embodiments, a calibration routine isconducted at the factory to correlate camera field-of-view locationswith other sensor locations.

The camera assembly 1422 can include a speaker 488 (shown in FIG. 19)that can emit a notification sound 1042 (shown in FIG. 23) while thecamera assembly 1422 is mounted such that the field of view 1000includes at least the portion of the pool of water 1426 (e.g., as shownin FIG. 18). The camera assembly 1422 can emit the notification sound inresponse to the visitor 844 entering the first detection zone 1434 asdefined using the first image 1050 (shown in FIG. 21).

In some embodiments, the monitoring system 1430 detects when a visitor844 enters the field of view 1000 and then detects when the visitor 844enters the first detection zone 1434. The first image 1050 (shown inFIG. 21) can be used to establish multiple detection zones. In someembodiments, the first detection zone 1434 is surrounded by a seconddetection zone.

Referring now to FIG. 23, several embodiments include using the cameraassembly 1422 to detect a second indication 1034 of the first visitor844. The second indication 1034 can be located inside of the field ofview 1000. The monitoring system 1430 can also determine that the secondindication 1034 of the first visitor 844 is located inside of the firstdetection zone 1434 as defined using the first image. The monitoringsystem 1430 can then wirelessly send the first alert to the remotecomputing device 204 in response to determining that the secondindication 1034 of the first visitor 844 is located inside of the firstdetection zone 1434.

The monitoring system 1430 can wirelessly send alerts via a wirelessnetwork and/or the Internet. In some embodiments, the camera assembly1422 sends a wireless alert to the remote computing device 204 (e.g.,via a wireless network and/or the Internet). Several embodiments includesending the first image directly from the camera assembly 1422 to theremote computing device 204 without using an intermediary server(although some embodiments use an intermediary server).

Some embodiments include sending the first alert wirelessly to theremote computing device 204 while emitting a notification sound 1042from the speaker 488 (shown in FIG. 19) in response to the first visitor844 entering the first detection zone 1434 as defined using the firstimage. Simultaneously sending the first alert and emitting thenotification sound 1042 can notify both a user of the remote computingdevice 204 and people who are within audible range of the notificationsound 1042.

Several embodiments use motion detectors 218 to sense visitors 844. Thecamera assembly 1422 can include one or more motion detectors 218. Thefirst and second indications described in various embodiments herein canbe motion indications.

Some embodiments analyze an image taken by the camera 208 to sensevisitors. Methods can include using the camera 208 to take a secondimage of at least the portion of the pool of water, and then themonitoring system analyzing the second image to detect the firstindication. Methods can also include using the camera 208 to take athird image of at least the portion of the pool of water 1426, and thenthe monitoring system 1430 analyzing the third image to detect thesecond indication 1034.

Some embodiments reduce false positives by preventing the sending of thefirst alert to the remote computing device until after detecting thesecond indication in at least two of the sections 528 (shown in FIG.22). Several embodiments cause a second subset 542 of the sections 528to be included in the first detection zone in response to the firstsubset 538 comprising an outer perimeter that surrounds the secondsubset 542 (as described in the context of FIG. 7).

Several embodiments include selecting the first detection zone bydisplaying the first image on the electronic display, and then recordingwhich areas of the first image a user indicates to include in the firstdetection zone by touching the electronic display; calculating apercentage of the first detection zone that includes the secondindication of the first visitor; and/or sending the first alert to theremote computing device in response to determining that the percentageof the first detection zone exceeds a first threshold.

Some embodiments include selecting the first detection zone bydisplaying the first image on the electronic display, and then recordingwhich areas of the first image a user indicates to include in the firstdetection zone by touching the electronic display; calculating apercentage of the first detection zone that includes the secondindication of the first visitor; calculating a time in which the secondindication of the first visitor has been in the first detection zone;and/or sending the first alert to the remote computing device inresponse to the percentage of the first detection zone and the time(e.g., exceeding thresholds).

Several embodiments include using the camera assembly to detect a firstindication of the first visitor. The first indication can be locatedinside of the field of view. Some embodiments include determining thatthe first indication of the first visitor is located outside of thefirst detection zone, and then the monitoring system ignoring the firstvisitor in response to the first visitor being located outside of thefirst detection zone. Ignoring the first visitor can comprise notsending a first alert to the remote computing device regarding the firstvisitor being outside of the first detection zone.

Some embodiments include using the camera assembly to detect a thirdindication of a second visitor. The third indication can be locatedinside of the field of view. Several embodiments include determiningthat the third indication is located inside of the first detection zoneas defined using the first image.

Several embodiments include determining that the second visitor isgreater than a size threshold, and then ignoring the second visitor inresponse to the second visitor being greater than the size threshold.Ignoring the second visitor can comprise not sending a second alert tothe remote computing device. The second alert can be configured tonotify the remote computing device regarding the second visitor being inthe first detection zone.

Some embodiments include using the camera assembly to detect a fourthindication of a third visitor. The fourth indication can be locatedinside of the field of view. Embodiments can include determining thatthe fourth indication is located inside of the first detection zone asdefined using the first image. Embodiments can also include determiningthat the third visitor is less than the size threshold, and thenwirelessly sending a third alert to the remote computing device inresponse to the third visitor being less than the size threshold. Thethird alert can be configured to notify the remote computing deviceregarding the third visitor being in the first detection zone.

The size threshold can be a height threshold. The height threshold canbe configured to distinguish between small children (who often cannotswim) and tall adults (who typically can swim). The height threshold canbe at least four feet (because most people over four feet can swim).

Referring now to FIG. 18, monitoring systems 1430 can be configured todetect visitors 844. Monitoring systems 1430 can include a cameraassembly 1422 having a speaker and a camera 208. The camera assembly1422 can be mounted (e.g., to a wall 1438) such that the camera 208comprises a field of view 1000 that includes at least a portion of apool of water 1426. In some embodiments, the camera assembly 1422includes an outer housing 224 that is mounted to a wall 1438, fence, orpost. The camera assembly 1422 can be configured to wirelesslycommunicate with a remote computing device 204 having an electronicdisplay 242. In some embodiments, the camera assembly 1422 iscommunicatively coupled with the remote computing device 204 via acable. In many embodiments, the camera assembly 1422 is communicativelycoupled to the remote computing device 204 via wireless communication230, but is not mechanically coupled to the remote computing device 204.

Monitoring systems 1430 can include a first image of at least theportion of the pool of water. The first image can be taken by the camera208, wirelessly communicated to the remote computing device 204, andthen displayed on the electronic display 242 of the remote computingdevice 204. Monitoring systems 1430 can also include a first detectionzone 1434 defined by a user touching sections of the first image whilethe first image is displayed on the electronic display 242 of the remotecomputing device 204.

Some embodiments include a wireless notification sent from the cameraassembly 1422 to the remote computing device 204 in response to thefirst visitor 844 entering the first detection zone 1434 as definedusing the first image; and a notification sound 1042 (shown in FIG. 23)emitted by the speaker in response to the first visitor 844 entering thefirst detection zone 1434 as defined using the first image. In FIG. 23,the visitor 844 is located inside the first detection zone 1434.

In some embodiments, the monitoring system is configured to ignore asecond visitor in response to the second visitor being located in thefield of view and outside of the first detection zone. Ignoring thesecond visitor comprises not sending an alert regarding the secondvisitor to the remote computing device

Referring now to FIG. 18, several embodiments include using a monitoringsystem 1430 to detect a first visitor 844. Embodiments can includeobtaining a camera assembly 1422 that includes a camera 208; configuringthe camera assembly 1422 such that the camera 208 comprises a field ofview 1000 that includes at least a portion of a pool of water 1426;using the camera 208 to take a first image of at least the portion ofthe pool of water 1426; sending the first image wirelessly from thecamera assembly 1422 to a remote computing device 204 that includes anelectronic display 242; and/or using the remote computing device 204 toselect a first detection zone 1434 within the first image 1050 (shown inFIG. 21). The first detection zone 1434 can comprise a first portion ofthe first image that shows the portion of the pool of water 1426.

Some embodiments include configuring the monitoring system 1430 toignore a second visitor located within the field of view 1000 of thecamera 208 in response to the second visitor being located outside ofthe first detection zone 1434. Ignoring the second visitor can comprisenot sending a first alert regarding the second visitor to the remotecomputing device 204. Several embodiments include configuring themonitoring system 1430 to send a second alert regarding a third visitorto the remote computing device 204 in response to determining that thethird visitor is located inside of the first detection zone 1434 asdefined based on the first image.

Several embodiments include displaying the first image on the electronicdisplay 242 of the remote computing device 204, and then selecting thefirst detection zone 1434 within the first image from the camera 208while displaying the first image on the electronic display 242. Thefirst detection zone 1434 can represent a portion of the field of view1000 of the camera 208. Selecting the first detection zone 1434 cancomprise selecting a second portion of the first image of the camera208.

Referring now to FIG. 22, some embodiments include displaying lines 532on the first image 1050 on the electronic display 242 of the remotecomputing device 204 such that the first image 1050 is divided intosections 528 by the lines 532; and selecting the first detection zone1434 within the first image 1050 by touching or otherwise selecting atleast a first subset 538 (shown in FIG. 7) of the sections 528 on theelectronic display 242 of the remote computing device 204.

Several embodiments include displaying the first image 1050 on theelectronic display 242 of the remote computing device 204; and selectingthe first detection zone 1434 within the first image 1050 by touching atleast a first subset 538 (shown in FIG. 7) of sections 528 on theelectronic display 242 of the remote computing device 204. The sections528 can be visibly differentiated (e.g., by lines) or can beindistinguishable to the unaided human eye. Some embodiments includemillions of sections 528 (e.g., each pixel can be a section). Touchingor otherwise selecting the first subset 538 (shown in FIG. 7) can causethe first subset 538 to be included in the first detection zone 1434 orexcluded from the first detection zone 1434. Some embodiments includecausing a second subset 542 (shown in FIG. 7) of the sections 528 to beincluded in the first detection zone 1434 of the monitoring system inresponse to the first subset 538 comprising an outer perimeter thatsurrounds the second subset 542.

Referring now to FIG. 18, some methods include sending data regardingthe first detection zone 1434 from the remote computing device 204 tothe camera assembly 1422 to calibrate the camera assembly 1422.Calibrating the camera assembly 1422 can include configuring the cameraassembly 1422 to ignore visitor indications in certain portions of thefield of view 1000 (whether sensed by the camera, by a motion sensor, orby any other sensor).

In several embodiments, the camera assembly 1422 comprises a microphone484 (shown in FIG. 19), which can help enable audio communicationbetween the third visitor and a user of the remote computing device 204in response to determining that the third visitor is located inside ofthe first detection zone 1434 as defined based on the first image 1050(shown in FIG. 21). The user of the remote computing device 204 can hearthe visitor via the microphone 484.

Some embodiments include determining that the second visitor is locatedoutside of the first detection zone 1434 by detecting a first motion ofthe second visitor; correlating the first motion to a first location asdefined by the first image; and determining that the first location islocated outside of the first detection zone 1434. Embodiments can alsoinclude determining that the third visitor is located inside of thefirst detection zone 1434 by detecting a second motion of the thirdvisitor; correlating the second motion to a second location as definedby the first image; and determining that the second location is locatedinside of the first detection zone 1434.

Connecting to a Network

Referring now to FIG. 18, the camera assembly 1422 can communicate withthe computing device 204 via a wireless network 308 (shown in FIG. 3).Several embodiments include setup modes to connect the camera assembly1422 (e.g., a security system) to a wireless network. Some of theseembodiments are described in U.S. Nonprovisional patent application Ser.No. 14/502,601; filed Sep. 30, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS. The entire contents of patent application Ser. No.14/502,601 are incorporated by reference herein. Some of theseembodiments are described in U.S. Nonprovisional patent application Ser.No. 14/275,811; filed May 12, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS (now U.S. Pat. No. 8,872,915). The entire contentsof patent application Ser. No. 14/275,811 are incorporated by referenceherein.

In several embodiments, the camera assembly 1422 does not useelectricity from an external power source to charge a battery 462 (shownin FIG. 19) of the camera assembly 1422. In addition, the button pressedto initiate the setup mode is not necessarily a doorbell button.

Also, the embodiments described in the context of a security systemand/or a doorbell in U.S. Nonprovisional patent application Ser. No.14/502,601 and/or U.S. Nonprovisional patent application Ser. No.14/275,811 can be applied to the context of camera assemblies 1422placed such that the field of view 1000 of a camera 208 includes atleast a portion of a pool of water 1426.

In some embodiments, a setup mode comprises a network connection mode,and the method comprises entering the network connection mode inresponse to pressing a button 212 (shown in FIG. 18). Severalembodiments include pressing the button 212 for at least two seconds.The network connection mode can comprise detecting a wireless network308 (shown in FIG. 3) and inputting a camera identification code 222 binto the remotely located computing device 204 (e.g., a remote computingdevice). In some embodiments, inputting the identification code 222 bincludes typing letters, numbers, words, and/or symbols on the remotelylocated computing device 204. Inputting the identification code 222 bcan include speaking letters, numbers, words, and/or symbols such thatthe remotely located computing device 204 hears the information andcaptures the information.

The identification code 222 b can be associated with the camera assembly1422 such that the code is correlated with at least one camera assembly.The identification code 222 b can be used as an electronic key to unlockaccess to the camera assembly 1422 (e.g., to enable administrativefunctions). The identification code 222 b can enable the computingdevice 204 to activate the camera assembly 1422 and/or can enable thecomputing device 204 to wirelessly receive alerts from the cameraassembly 1422.

The network connection mode can comprise using the identification code222 b to verify whether the remotely located computing device 204 (e.g.,the remote computing device) is authorized to communicate with thecamera assembly 1422. For example, the code 222 b can prevent anunauthorized computing device from hacking into the camera assembly 1422and receiving visitor alerts from the camera assembly 1422.

In several embodiments, the network connection mode comprises enablingcommunication from the remotely located computing device 204 to thecamera assembly 1422 in response to pressing the button and/or inputtingthe identification code 222 b into the remotely located computing device204.

In some embodiments, the remotely located computing device 204 isconnected to the wireless network 308 (shown in FIG. 3) such that theremotely located computing device 204 is configured to transmit data viathe wireless network 308. The wireless network 308 can comprise a nameand a password. The name can identify the wireless network 308 toentities searching for wireless networks. The password can enable anelectronic device to connect to the wireless network 308. The wirelessnetwork 308 can enable electronic devices to connect to the Internet.

The communication from the remotely located computing device 204 to thecamera assembly 1422 can comprise the name and the password of thewireless network to which the remotely located computing device 204 isconnected. The network connection mode can comprise connecting thecamera assembly 1422 to the wireless network to which the remotelylocated computing device 204 is connected such that the camera assembly1422 can send an alert regarding a presence of the visitor to theremotely located computing device 204 via the wireless network.

Some embodiments include using the camera assembly 1422 to detectmultiple wireless networks. The wireless network to which the remotelylocated computing device 204 is connected can be one of the multiplewireless networks. Methods can comprise automatically selecting thewireless network to which the remotely located computing device 204 isconnected. For example, the system 1430 can choose which wirelessnetwork to connect the camera assembly 1422 without asking a personwhich wireless network the system 1430 should choose.

In some embodiments, a setup mode comprises a network connection mode.Methods can comprise entering the network connection mode in response topressing the button (e.g., for at least two seconds). The networkconnection mode can comprise detecting a first wireless network 308(shown in FIG. 3) having a name and a password. The network connectionmode can comprise inputting an identification code 222 b into theremotely located computing device 204. The identification code 222 b canbe associated with the camera assembly 1422. The network connection modecan comprise using the identification code 222 b to verify whether theremotely located computing device 204 is authorized to communicate withthe camera assembly 1422. The network connection mode can comprise theremotely located computing device 204 creating a second wireless network308 b (shown in FIG. 3). For example, the second wireless network 308 bcan emanate from the remotely located computing device 204. The networkconnection mode can comprise transmitting the name and the password ofthe first wireless network directly from the remotely located computingdevice 204 to the camera assembly 1422 via the second wireless network308 b to enable the camera assembly 1422 to communicate with theremotely located computing device 204 via the first wireless network 308(shown in FIG. 3). Methods can comprise the remotely located computingdevice 204 directly communicating with the camera assembly 1422 via thesecond wireless network 308 b prior to the camera assembly 1422indirectly communicating with the remotely located computing device 204via the first wireless network 308. For example, the wirelesscommunication from the remotely located computing device 204 can travelthrough the air directly to the camera assembly 1422. The wirelesscommunication from the remotely located computing device 204 can travelindirectly to the camera assembly 1422 via a third electronic devicesuch as a server 206 (shown in FIG. 1).

A remotely located computing device 204 can be located near a cameraassembly 1422. For example, during setup some users will hold a cellularphone within a couple of feet from the camera assembly 1422 to input anidentification code 222 b into the cellular phone to verify that thephone is authorized to communicate with the camera assembly 1422 and tohelp the camera assembly 1422 connect to a wireless network. The phoneis located remotely from the camera assembly 1422 because it is notmechanically attached to the camera assembly 1422.

Some embodiments comprise detecting multiple wireless networks andautomatically selecting a first wireless network for communicatingbetween the camera assembly 1422 and the remotely located computingdevice 204. Prior to the automatic selection, the remotely locatedcomputing device 204 can be connected to the first wireless network.Methods can further comprise authorizing the camera assembly 1422 tocommunicate with the remotely located computing device 204 by pressingthe button 212 and/or inputting an identification code 222 b into theremotely located computing device 204. The identification code 222 b canbe associated with the camera assembly 1422. The first wireless networkcan comprise a name and a password. Methods can further comprisewirelessly communicating the name and the password from the remotelylocated computing device 204 to the camera assembly 1422.

Several methods include entering a network connection mode prior tosending the wireless notification. The network connection mode cancomprise detecting a first wireless network having a name and apassword. The network connection mode can comprise inputting anidentification code 222 b into the remotely located computing device204. The identification code 222 b can be associated with the cameraassembly 1422. The network connection mode can further comprise usingthe identification code 222 b to verify whether the remotely locatedcomputing device 204 is authorized to communicate with the cameraassembly 1422. The network connection mode can comprise the remotelylocated computing device 204 creating a second wireless network 308 b(shown in FIG. 3). The network connection mode can comprise transmittingthe name and the password of the first wireless network directly fromthe remotely located computing device 204 to the camera assembly 1422via the second wireless network to enable the camera assembly 1422 tocommunicate with the remotely located computing device 204 via the firstwireless network. Methods can comprise the camera assembly 1422 directlycommunicating with the remotely located computing device 204 via thesecond wireless network prior to the camera assembly 1422 indirectlycommunicating with the remotely located computing device 204 via thefirst wireless network.

Interpretation

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other.

The section headings and subheadings provided herein are nonlimiting.The section headings and subheadings do not represent or limit the fullscope of the embodiments described in the sections to which the headingsand subheadings pertain. For example, a section titled “Topic 1” mayinclude embodiments that do not pertain to Topic 1 and embodimentsdescribed in other sections may apply to and be combined withembodiments described within the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodiments caninclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy.

While certain example embodiments have been described, these embodimentshave been presented by way of example only, and are not intended tolimit the scope of the inventions disclosed herein. Thus, nothing in theforegoing description is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit of theinventions disclosed herein.

The following is claimed:
 1. A method for using a monitoring system todetect a first visitor, wherein the monitoring system comprises a cameraassembly and a remote computing device, the method comprising: obtainingthe camera assembly, wherein the camera assembly comprises a camera;configuring the camera assembly such that the camera comprises a fieldof view that includes at least a portion of a pool of water; using thecamera to take a first image of at least the portion of the pool ofwater; sending the first image wirelessly from the camera assembly tothe remote computing device, wherein the remote computing devicecomprises an electronic display; displaying the first image on theelectronic display of the remote computing device; and using the remotecomputing device to select a first detection zone within the firstimage, wherein the first detection zone comprises a portion of the firstimage.
 2. The method of claim 1, further comprising: displaying a gridpattern on the first image on the electronic display of the remotecomputing device such that the first image is divided into at least sixsections by lines that cross each other; selecting the first detectionzone within the first image by touching at least a first subset of thesections on the electronic display of the remote computing device; usingthe camera assembly to detect a first indication of the first visitor,wherein the first indication is located inside of the field of view; anddetermining that the first indication of the first visitor is locatedoutside of the first detection zone, and then the monitoring systemdeciding to not send a first alert to the remote computing device inresponse to determining that the first indication of the first visitoris located outside of the first detection zone, wherein the first alertis configured to notify the remote computing device regarding a presenceof the first visitor.
 3. The method of claim 2, wherein touching thefirst subset causes the first subset to be included in the firstdetection zone.
 4. The method of claim 2, wherein touching the firstsubset causes the first subset to be excluded from the first detectionzone.
 5. The method of claim 2, wherein the first detection zonecomprises an area of the first image that includes the pool of water. 6.The method of claim 2, wherein the camera assembly comprises a speaker,and the method further comprises emitting a notification sound from thespeaker of the camera assembly while the camera assembly is mounted suchthat the field of view includes at least the portion of the pool ofwater, wherein the camera assembly emits the notification sound inresponse to the first visitor entering the first detection zone asdefined using the first image.
 7. The method of claim 2, furthercomprising: using the camera assembly to detect a second indication ofthe first visitor, wherein the second indication is located inside ofthe field of view; determining that the second indication of the firstvisitor is located inside of the first detection zone as defined usingthe first image; and sending the first alert wirelessly to the remotecomputing device in response to determining that the second indicationof the first visitor is located inside of the first detection zone. 8.The method of claim 7, wherein the camera assembly comprises a speaker,and the method further comprises sending the first alert wirelessly tothe remote computing device while emitting a notification sound from thespeaker in response to the first visitor entering the first detectionzone as defined using the first image.
 9. The method of claim 7, whereinthe camera assembly comprises a motion detector, the first indication isa first motion indication, and the second indication is a second motionindication.
 10. The method of claim 7, further comprising: using thecamera to take a second image of at least the portion of the pool ofwater, and then the monitoring system analyzing the second image todetect the first indication; and using the camera to take a third imageof at least the portion of the pool of water, and then the monitoringsystem analyzing the third image to detect the second indication. 11.The method of claim 7, further comprising preventing the sending of thefirst alert to the remote computing device until after detecting thesecond indication in at least two of the sections.
 12. The method ofclaim 7, further comprising causing a second subset of the sections tobe included in the first detection zone in response to the first subsetcomprising an outer perimeter that surrounds the second subset.
 13. Themethod of claim 7, further comprising: selecting the first detectionzone by displaying the first image on the electronic display, and thenrecording which areas of the first image a user indicates to include inthe first detection zone by touching the electronic display; calculatinga percentage of the first detection zone that includes the secondindication of the first visitor; and sending the first alert to theremote computing device in response to determining that the percentageof the first detection zone exceeds a first threshold.
 14. The method ofclaim 7, further comprising: selecting the first detection zone bydisplaying the first image on the electronic display, and then recordingwhich areas of the first image a user indicates to include in the firstdetection zone by touching the electronic display; calculating apercentage of the first detection zone that includes the secondindication of the first visitor; calculating a time in which the secondindication of the first visitor has been in the first detection zone;and sending the first alert to the remote computing device in responseto the percentage of the first detection zone and the time.
 15. Themethod of claim 7, further comprising sending the first image directlyfrom the camera assembly to the remote computing device without using anintermediary server.
 16. The method of claim 1, further comprising:using the camera assembly to detect a first indication of the firstvisitor, wherein the first indication is located inside of the field ofview; determining that the first indication of the first visitor islocated outside of the first detection zone, and then the monitoringsystem ignoring the first visitor in response to the first visitor beinglocated outside of the first detection zone, wherein ignoring the firstvisitor comprises not sending a first alert to the remote computingdevice regarding the first visitor being outside of the first detectionzone; using the camera assembly to detect a third indication of a secondvisitor, wherein the third indication is located inside of the field ofview; determining that the third indication is located inside of thefirst detection zone as defined using the first image; determining thatthe second visitor is greater than a size threshold, and then ignoringthe second visitor in response to the second visitor being greater thanthe size threshold, wherein ignoring the second visitor comprises notsending a second alert to the remote computing device, wherein thesecond alert is configured to notify the remote computing deviceregarding the second visitor being in the first detection zone; usingthe camera assembly to detect a fourth indication of a third visitor,wherein the fourth indication is located inside of the field of view;determining that the fourth indication is located inside of the firstdetection zone as defined using the first image; and determining thatthe third visitor is less than the size threshold, and then wirelesslysending a third alert to the remote computing device in response to thethird visitor being less than the size threshold, wherein the thirdalert is configured to notify the remote computing device regarding thethird visitor being in the first detection zone.
 17. The method of claim16, wherein the size threshold is a height threshold.
 18. A monitoringsystem configured to detect a first visitor, the monitoring systemcomprising: a camera assembly having a speaker and a camera, wherein thecamera assembly is mounted such that the camera comprises a field ofview that includes at least a portion of a pool of water, and whereinthe camera assembly is configured to wirelessly communicate with aremote computing device having an electronic display; a first image ofat least the portion of the pool of water, wherein the first image istaken by the camera, wirelessly communicated to the remote computingdevice, and then displayed on the electronic display of the remotecomputing device; and a first detection zone defined by a user touchingsections of the first image while the first image is displayed on theelectronic display of the remote computing device.
 19. The monitoringsystem of claim 18, further comprising: a wireless notification sentfrom the camera assembly to the remote computing device in response tothe first visitor entering the first detection zone as defined using thefirst image; and a notification sound emitted by the speaker in responseto the first visitor entering the first detection zone as defined usingthe first image.
 20. The monitoring system of claim 19, furthercomprising a perimeter defined by the user touching the sections of thefirst image while the first image is displayed on the electronic displayof the remote computing device, wherein the perimeter encloses an areaof the first image that includes the pool of water, and wherein theperimeter defines the first detection zone, wherein the monitoringsystem is configured to ignore a second visitor in response to thesecond visitor being located in the field of view and outside of thefirst detection zone, wherein ignoring the second visitor comprises notsending an alert regarding the second visitor to the remote computingdevice.
 21. A method for using a monitoring system to detect a firstvisitor, wherein the monitoring system comprises a camera assembly and aremote computing device, the method comprising: obtaining the cameraassembly, wherein the camera assembly comprises a camera; configuringthe camera assembly such that the camera comprises a field of view thatincludes at least a portion of a pool of water; using the camera to takea first image of at least the portion of the pool of water; sending thefirst image wirelessly from the camera assembly to the remote computingdevice, wherein the remote computing device comprises an electronicdisplay; and using the remote computing device to select a firstdetection zone within the first image, wherein the first detection zonecomprises a first portion of the first image that shows the portion ofthe pool of water.
 22. The method of claim 21, further comprising:configuring the monitoring system to ignore a second visitor locatedwithin the field of view of the camera in response to the second visitorbeing located outside of the first detection zone, wherein ignoring thesecond visitor comprises not sending a first alert regarding the secondvisitor to the remote computing device; and configuring the monitoringsystem to send a second alert regarding a third visitor to the remotecomputing device in response to determining that the third visitor islocated inside of the first detection zone as defined based on the firstimage.
 23. The method of claim 22, further comprising: displaying thefirst image on the electronic display of the remote computing device,and then selecting the first detection zone within the first image ofthe camera while displaying the first image on the electronic display,wherein the first detection zone represents a portion of the field ofview of the camera, and wherein selecting the first detection zonecomprises selecting a second portion of the first image of the camera.24. The method of claim 23, further comprising: displaying lines on thefirst image on the electronic display of the remote computing devicesuch that the first image is divided into sections by the lines; andselecting the first detection zone within the first image by touching atleast a first subset of the sections on the electronic display of theremote computing device.
 25. The method of claim 22, further comprising:displaying the first image on the electronic display of the remotecomputing device; selecting the first detection zone within the firstimage by touching at least a first subset of sections on the electronicdisplay of the remote computing device, wherein touching the firstsubset causes the first subset to be included in the first detectionzone; and causing a second subset of the sections to be included in thefirst detection zone of the monitoring system in response to the firstsubset comprising an outer perimeter that surrounds the second subset.26. The method of claim 25, further comprising sending data regardingthe first detection zone from the remote computing device to the cameraassembly to calibrate the camera assembly.
 27. The method of claim 22,wherein the camera assembly comprises a microphone, the method furthercomprising enabling audio communication between the third visitor and auser of the remote computing device in response to determining that thethird visitor is located inside of the first detection zone as definedbased on the first image.
 28. The method of claim 22, furthercomprising: determining that the second visitor is located outside ofthe first detection zone by detecting a first motion of the secondvisitor, correlating the first motion to a first location as defined bythe first image, and determining that the first location is locatedoutside of the first detection zone; and determining that the thirdvisitor is located inside of the first detection zone by detecting asecond motion of the third visitor, correlating the second motion to asecond location as defined by the first image, and determining that thesecond location is located inside of the first detection zone.