Control access utilizing video analytics

ABSTRACT

A computer-implemented method including receiving, by a monitoring system that is configured to monitor a property and from a touchless doorbell device that includes a camera and a motion sensor, an image, analyzing, by the monitoring system, the image, based on analyzing the image, determining that the image likely includes a representation of a person, and based on determining that the image likely includes a representation of a person, performing a monitoring system action.

CROSS REFERENCE TO RELATED APPLICATION

This application claims benefit of U.S. Provisional Application No.62/513,588, filed Jun. 1, 2017, and titled “Control Access UtilizingVideo Analytics,” which is incorporated by reference in its entirety.

TECHNICAL FIELD

This disclosure relates to property monitoring technology and, forexample, utilizing video analytics and passive infrared (PIR) technologyto detect visitors at the front door of the monitored property.

BACKGROUND

Many people equip homes and businesses with monitoring systems toprovide increased security for their homes and businesses.

SUMMARY

Techniques are described for monitoring technology. For example,techniques are described for integrating a monitoring system with atouchless doorbell device that includes a camera that utilizes videoanalytics combined with PIR technology to detect a visitor at themonitored property. The automated process of detecting the presence of avisitor at the door of the monitored property eliminates the need for aphysical doorbell.

According to an innovative aspect of the subject matter described inthis application, a monitoring system that is configured to monitor aproperty, the monitoring system includes a touchless doorbell devicethat includes a camera and a motion sensor and that is configured todetect, motion in a vicinity of the touchless doorbell device using themotion sensor, capture an image using the camera based on detectingmotion in a vicinity of the touchless doorbell device, based oncapturing the image, transmit the image to a monitor control unit. Themonitor control unit that is configured to receive the image from thetouchless doorbell device, analyze the image, determine that the imagelikely includes a representation of a person based on analyzing theimage, and perform a monitoring system action based on determining thatthe image likely includes a representation of a person. These and otherimplementations each optionally include one or more of the followingoptional features. The monitor control unit is configured to perform amonitoring system action by providing, for output to a client device ofa resident of the property, a notification indicating that a person islikely at the monitored property. The notification indicating that aperson is likely at the monitored property includes at least one of theone or more captured images of the person, and a control to indicatethat the person is allowed to access the property. The monitor controlunit is configured to receive, from the client device of the resident ofthe property, data indicating a selection of the control indicating thatthe person is allowed to access the property, and in response toreceiving data indicating the selection of the control indicating thatthe person is allowed to access the property, granting the person accessto the property.

The monitor control unit is configured to determine that the imagelikely includes a representation of a person by determining a confidencescore that reflects a likelihood that the image includes arepresentation of a person, comparing the confidence score that reflectsthe likelihood that the image includes a representation of a person to aconfidence score threshold, and based on comparing the confidence scorethat reflects the likelihood that the image includes a representation ofa person to the confidence score threshold, determining that theconfidence score that reflects the likelihood that the image includes arepresentation of a person satisfies the confidence score threshold. Themonitor control unit is configured to compare the received image to oneor more stored images of one or more known persons, determine a scorethat reflects a likelihood that the received image is an image of aknown person based on comparing the received image to the one or morestored images of one or more known persons, compare the score thatreflects a likelihood that the received image is an image of a knownperson to a threshold, and based on comparing the score that reflects alikelihood that the received image is an image of a known person to athreshold, determining that the score that reflects a likelihood thatthe received image is an image of a known person satisfies thethreshold.

The monitor control unit is configured to determine the monitoringsystem is in an armed state, and perform an action by automaticallydisarming the monitoring system, and unlocking a front door to themonitored property. The touchless doorbell device is configured toreceive, from the monitor control unit, data indicating that the scorethat reflects a likelihood that the received image is an image of aknown person satisfies the threshold, and based on receiving, from themonitor control unit, data indicating that the score that reflects alikelihood that the received image is an image of a known personsatisfies the threshold, outputting, by a speaker of the touchlessdoorbell device, a prerecorded message that is specific to an identifyof the known person in the received image. The monitor control unit isconfigured to receive, from the user, one or more user preferences thatidentifies a specific chime for each of the one or more known persons,determine, an identity of the known person in the received image,determine, a chime that matches the identity of the known person in thereceived image, and the touchless doorbell device is configured tooutput, by the speaker to an inside of the property, the chime thatmatches the identity of the known person in the received image.

The monitor control unit is configured to compare the received image toone or more stored images of one or more known persons, based oncomparing the received image to the one or more stored images of one ormore known persons, determine a score that reflects a likelihood thatthe received image is an image of a known person, compare the score thatreflects a likelihood that the received image is an image of a knownperson to a threshold, and based on comparing the score that reflects alikelihood that the received image is an image of a known person to athreshold, determining that the score that reflects a likelihood thatthe received image is an image of a known person does not satisfy thethreshold, determine the monitoring system is in an unarmed state, andperform an action by automatically arming the monitoring system, andperforming one or more actions that simulate occupancy the property. Themonitor control unit is configured to determine, based on the analyzingthe image, that a face portion of the representation of a person isobstructed, based on determining that the face portion of therepresentation of a person is obstructed, providing, for output by thespeaker of the touchless doorbell device, an audio message informing theperson to remove any obstructions, receive, at a second later time, fromthe touchless doorbell device, a second image, determine, based onanalyzing the second image, that a face portion of the representation ofa person is obstructed, and based on determining that the face portionof the representation of a person is obstructed, locking the front doorand sounding an alarm.

The monitor control unit is configured to determine, based on analyzingthe image, a duress score that reflects a likelihood that the person inthe image is under duress, compare the duress score that reflects alikelihood that the person in the image is under duress to a duressscore threshold, based on comparing the duress score that reflects alikelihood that the person in the image is under duress to a duressscore threshold, determining that the duress score satisfies the duressscore threshold, and based on determining that the duress score exceedsthe duress score threshold, sounding an alarm.

The monitor control unit is configured to determine, based on analyzingthe image, that the image likely includes a representation of a package,and based on determining that the image likely includes a representationof a package, outputting, by a speaker of the touchless doorbell device,a prerecorded message that indicates to place the package at a frontdoor, and providing, for output to a client device of a resident of theproperty, a notification indicating that a package is likely deliveredto the property.

According to another innovative aspect of the subject matter describedin this application, a computer implemented method includes receiving,by a monitoring system that is configured to monitor a property and froma touchless doorbell device that includes a camera and a motion sensor,an image, analyzing, by the monitoring system, the image, based onanalyzing the image, determining that the image likely includes arepresentation of a person, and based on determining that the imagelikely includes a representation of a person, performing a monitoringsystem action.

Implementations of the described techniques may include hardware, amethod or process implemented at least partially in hardware, or acomputer-readable storage medium encoded with executable instructionsthat, when executed by a processor, perform operations.

The details of one or more implementations are set forth in theaccompanying drawings and the description below. Other features will beapparent from the description and drawings, and from the claims.

DESCRIPTION OF DRAWINGS

FIGS. 1A and 1B illustrate examples of a system for utilizing videoanalytics and sensor technology to detect visitors at a monitoredproperty.

FIG. 2 illustrates an example of a monitoring system integrated with atouchless doorbell device.

FIG. 3 is a flow chart of an example process for sending an alertnotification to a user.

FIG. 4 illustrates an example of a system for determining when to send anotification to the user.

FIG. 5 is a flow chart of an example process for performing a monitoringsystem action.

DETAILED DESCRIPTION

Techniques are described for integrating a monitoring system with atouchless doorbell device that utilizes video analytics combined withPIR technology to detect visitors at a front door of a monitoredproperty. The touchless doorbell device is a device that includes acamera, one or more sensors, a speaker, a microphone, and my cable offacilitating a two-way audio/video communication. The touchless doorbelldevice may be mounted to an exterior wall of the monitored propertyapproximate to the front door entrance way, and the camera of the deviceis configured to have a wide field of view to easily detect visitors asthey approach the front door. The camera of the touchless doorbelldevice includes a Passive Infrared Sensor (PIR), that is configured todetect heat radiated from objects to detect movement of a livingorganism within the field of view of the sensor and camera lens. Whenthe PIR sensor detects movement, the camera initiates the capture ofvideo data which is then communicated to a control unit within themonitoring system. The control unit then automatically notifies a userassociated with the monitoring property of the arrival of the visitorthereby eliminating the need for a physical doorbell at the property.

FIG. 1A illustrates an example of a monitoring system 100 integratedwith a touchless doorbell device 104. As shown in FIG. 1A, a property102 (e.g. a home) of a user 116 is monitored by an in-home monitoringsystem (e.g. in-home security system) that includes components that arefixed within the property 102. The in-home monitoring system may includea control unit 112, one or more sensors 110, one or more cameras 108,one or more lights 106, and a touchless doorbell device 104. The user116 may integrate the touchless doorbell device 104 into the in-homemonitoring system to monitor for visitors/guests arriving at themonitored property thereby eliminating the need for a physical doorbell.

In the example shown in FIG. 1, a visitor 120 may approach the monitoredproperty 102. When the visitor is within the field of view (FOV) 105 ofthe camera of the touchless doorbell device 104, the PIR sensor withinthe camera may detect the heat radiated off the visitor 120 to detectmovement within the FOV 105. When the presence of the visitor 120 isdetected within the FOV 105 of the touchless doorbell device 104, thetouchless doorbell device 104 initiates the capture of video and/orimage data. The touchless doorbell device 104 may immediatelycommunicate the capture video and/or image data to the control unit 112within the monitored property 102. In some examples, the touchlessdoorbell device may include one or more cameras that are configured toensure that anyone approaches the monitored property 102 is captured inthe FOV of at least one camera. In some examples, a touchless doorbelldevice may be mounted to the backdoor entrance, and the garage doorentrance of the monitored property 102.

The control unit 112 notifies the user 116 to the arrival of the visitor120. In some implementations, the control unit 112 may send a messagethrough a monitoring application that runs on the user device 118. Themessage may include the video and/or image data captured by thetouchless doorbell device 104. The user 116 may review the receivedvideo and/or image data received, and based on the identity of thevisitor 120, the user may decide unlock the front door. For example, theuser 116 may respond to the received notification commanding the controlunit 112 to unlock the front door.

The control unit 112 may receive the command from the user 116, and maythen communicate with a connected door knob or door hinge device tounlock and open the front door of the monitored property 102. Aconnected door knob device is a device that is configured to lock orunlock a door within the monitored property based on a lock or unlockcommand received from the control unit 112. A connected door hingedevice is a device that is configured to open or close a door within themonitored property based on an open or close command received from thecontrol unit 112. In some examples, the control unit 112 may prompt thespeaker of the touchless doorbell device 104 to output a message to thevisitor 120 notifying the visitor 120 that the front door is unlockedand opened. Based on the use of video analytics and the PIR sensor, themonitoring system may detect visitors, notify the user 116, and open thefront door thereby eliminating the need for a physical doorbell at themonitored property 102.

When the touchless doorbell device 104 detects the presence of a visitor120, the device may immediately send a notification alert to the controlunit 112, which in turn immediately sends a notification to the userdevice 118 of the user 116. Based on receiving a notification of avisitor at the property 102, the user 116 may choose to initiate atwo-way voice/audio session to communicate with the visitor 120. Thetouchless doorbell device 104 may be configured to enable two-wayvoice/audio communication with the user 116. The user 116 may identifythe visitor through the video communication, and may instruct thevisitor on how to proceed. In some implementations, when the touchlessdoorbell device 104 detects the presence of a visitor and communicatesthe notification to the control unit 112, the touchless doorbell device104 may then output a pre-recorded message to the visitor. For example,the pre-recorded message may indicate that the user 116 may be at thedoor shortly. In some examples, the pre-recorded message that is outputby the speaker is selected from one or more messages, and may be basedon the current armed status of the monitoring system. For example, whenthe monitoring system is armed away, the pre-recorded message mayindicate that no one is currently at the monitored property, and whenthe monitoring system is armed stayed, the pre-recorded message mayindicate that someone will be at the door shortly.

In some implementations, when the touchless doorbell device 104 detectsthe presence of a visitor 120 at the front door, a speaker within theproperty generates an audible chiming sound to mimic the sound of atypical doorbell within the monitored property 102. In theseimplementations, the user 116 may have the ability to customize thesound generated by the speaker through the use of the monitoringapplication on the user device 118. The user 116 may select anappropriate volume of the sound produced, and may select the sound thatis produced by choosing from a variety of sound options availablethrough the monitoring application. In some examples, the user mayselect a song to be used as the audible output. In some implementations,the user 116 may select a pre-recorded message to be generated when thetouchless doorbell device 104 detects the presence of a visitor. Forexample, the speaker may output a pre-recorded message of “There is avisitor at the front door,” based on detecting the presence of avisitor.

The touchless doorbell device 104 may use facial recognition software toidentify visitors. Images of visitors whose identity was previousconfirmed by the user 116 may be stored in memory at the control unit112. When a known visitor arrives at the property 102, the control unit112 may identify the visitor as known, and may send a notification tothe user 116 indicating that a known visitor is at the door. In someexamples, the user 116 may have the ability to set pre-recordedgreetings and audible “doorbell” tones that are specific to one or moredifferent visitors. For example, when the user's mother arrives at theproperty 102, the pre-recording may be “Mum, come on in,” and the chimemay be song special to the user 116. When an unknown visitor arrives atthe property 102, the speaker of the touchless doorbell device mayoutput a pre-recorded message that notifies the visitor that they arebeing recorded. In some examples, when the user 116 receives video/imagedata of the visitor 120, and is unable to identify the visitor, the usermay command the control unit 112 to generate an alarm event if thevisitor does not identify themselves and the reason for visiting theproperty 102.

In some implementations, when the touchless doorbell device 104 detectsthe presence of a visitor, one or more other connected devices at theproperty 102 are activated. The control unit 112 may determine which ofthe one or more connected devices are activated based on the time of dayand/or the identity of the visitor. For example, when the touchlessdoorbell device 104 detects a visitor at the door after sun down, one ormore lights 106 on located at the front exterior of the property 102 maybe switched on. In another example, when the touchless doorbell device104 detects a visitor whose identity is unknown, the control unit 112may command one or more interior light to switch on, and may prompt aspeaker to output a pre-recorded sound of a dog barking in efforts todeter a potential intruder.

In some implementations, the touchless doorbell device 104 may include alow power light sensitive sensor. The low power light sensor may beconfigured to collimate light such that an adequate number of regions ofthe field of view are collimated onto a sufficient number of regions onthe sensor, and may be configured to assess the amount of light strikingthe different regions of the sensor. In visual conditions other thantotal darkness, objects moving within the field of view 105 of thecamera of the touchless doorbell device 104 may cause changes in theamount of light reaching the light sensitive sensor, and based on thevariations in the light intensity, the touchless doorbell device 104 maydetermine when an object is moving. As illustrated in FIG. 1B, the lightsensitive sensor within the touchless doorbell device 104 may determinewhether an object in its field of view is increasing in size, indicatingthe object is moving toward the device 104, or may determine whether theobject is decreasing in size, indicating the object is moving away fromthe device 104. The touchless doorbell device 104 may be configured todetermine the shape of the detected object and may determine whether theobject is a human or animal based on the determined shape.

As depicted in FIG. 1B, in the camera sensor representation, at a firstmoment in time (I), the object, in this case the visitor 120 is smallerthan at the second moment in time (II), that is, the visitor 120 isincreasing in size within the field of view of the touchless doorbelldevice 104. The light sensitive sensor in the device 104 may also beconfigured to distinguish between a human form and an animal form. Basedon the configuration of the light striking the light sensitive sensor,the sensor determines the object is of human form. Based on confirmingthe object in the FOV 105 of the touchless doorbell device 104, thedevice 104 may initiate capturing video and/or image data of the visitor120. In examples where the touchless doorbell device 104 determines theobject in the FOV 105 is an animal form, the device 104 may not initiatethe capturing of video and/or image data since the object is likely nota visitor. For example, a stray cat may walk up to the monitoredproperty 102, and the device 104 will not start capturing data based onthe light sensitive sensor indicating the object in the FOV is an animalform and is therefore not a visitor. The light sensitive sensor may alsodetermine when someone is within the FOV 105 of the touchless doorbelldevice 104 but is merely walking by the monitored property 102. When thedetected human form traverses the screen of the sensor this indicatesthat the person is walking by and is not approaching the front door.

FIG. 2 illustrates an example of a system 200 configured to monitor aproperty. The system 200 includes a network 205, a monitoring systemcontrol unit 210, one or more user devices 240, and a monitoringapplication server 260. The network 205 facilitates communicationsbetween the monitoring system control unit 210, the one or more userdevices 240, and the monitoring application server 260. The network 205is configured to enable exchange of electronic communications betweendevices connected to the network 205. For example, the network 205 maybe configured to enable exchange of electronic communications betweenthe monitoring system control unit 210, the one or more user devices240, and the monitoring application server 260. The network 205 mayinclude, for example, one or more of the Internet, Wide Area Networks(WANs), Local Area Networks (LANs), analog or digital wired and wirelesstelephone networks (e.g., a public switched telephone network (PSTN),Integrated Services Digital Network (ISDN), a cellular network, andDigital Subscriber Line (DSL)), radio, television, cable, satellite, orany other delivery or tunneling mechanism for carrying data. Network 205may include multiple networks or subnetworks, each of which may include,for example, a wired or wireless data pathway. The network 205 mayinclude a circuit-switched network, a packet-switched data network, orany other network able to carry electronic communications (e.g., data orvoice communications). For example, the network 205 may include networksbased on the Internet protocol (IP), asynchronous transfer mode (ATM),the PSTN, packet-switched networks based on IP, X.25, or Frame Relay, orother comparable technologies and may support voice using, for example,VoIP, or other comparable protocols used for voice communications. Thenetwork 205 may include one or more networks that include wireless datachannels and wireless voice channels. The network 205 may be a wirelessnetwork, a broadband network, or a combination of networks including awireless network and a broadband network.

The monitoring system control unit 210 includes a controller 212 and anetwork module 214. The controller 212 is configured to control amonitoring system (e.g., a home alarm or security system) that includesthe monitor control unit 210. In some examples, the controller 212 mayinclude a processor or other control circuitry configured to executeinstructions of a program that controls operation of an alarm system. Inthese examples, the controller 212 may be configured to receive inputfrom indoor door knobs, sensors, detectors, or other devices included inthe alarm system and control operations of devices included in the alarmsystem or other household devices (e.g., a thermostat, an appliance,lights, etc.). For example, the controller 212 may be configured tocontrol operation of the network module 214 included in the monitoringsystem control unit 210.

The network module 214 is a communication device configured to exchangecommunications over the network 205. The network module 214 may be awireless communication module configured to exchange wirelesscommunications over the network 205. For example, the network module 214may be a wireless communication device configured to exchangecommunications over a wireless data channel and a wireless voicechannel. In this example, the network module 214 may transmit alarm dataover a wireless data channel and establish a two-way voice communicationsession over a wireless voice channel. The wireless communication devicemay include one or more of a GSM module, a radio modem, cellulartransmission module, or any type of module configured to exchangecommunications in one of the following formats: LTE, GSM or GPRS, CDMA,EDGE or EGPRS, EV-DO or EVDO, UMTS, or IP.

The network module 214 also may be a wired communication moduleconfigured to exchange communications over the network 205 using a wiredconnection. For instance, the network module 214 may be a modem, anetwork interface card, or another type of network interface device. Thenetwork module 214 may be an Ethernet network card configured to enablethe monitoring control unit 210 to communicate over a local area networkand/or the Internet. The network module 214 also may be a voicebandmodem configured to enable the alarm panel to communicate over thetelephone lines of Plain Old Telephone Systems (POTS).

The monitoring system may include multiple sensors 220. The sensors 220may include a contact sensor, a motion sensor, a glass break sensor, orany other type of sensor included in an alarm system or security system.The sensors 220 also may include an environmental sensor, such as atemperature sensor, a water sensor, a rain sensor, a wind sensor, alight sensor, a smoke detector, a carbon monoxide detector, an airquality sensor, etc. The sensors 220 further may include a healthmonitoring sensor, such as a prescription bottle sensor that monitorstaking of prescriptions, a blood pressure sensor, a blood sugar sensor,a bed mat configured to sense presence of liquid (e.g., bodily fluids)on the bed mat, etc. In some examples, the sensors 220 may include aradio-frequency identification (RFID) sensor that identifies aparticular article that includes a pre-assigned RFID tag.

The monitoring system may include a touchless doorbell device 222. Thetouchless doorbell device 222 may include a PIR sensor, a lightsensitive sensor, a speaker, and a camera. The monitoring system mayalso include one or more other cameras 230. Each of the camera or thetouchless doorbell device 222 and the one or more cameras 230 may bevideo/photographic cameras or other type of optical sensing deviceconfigured to capture images. For instance, the cameras may beconfigured to capture images of an area within a building monitored bythe monitor control unit 210. The cameras may be configured to capturesingle, static images of the area and also video images of the area inwhich multiple images of the area are captured at a relatively highfrequency (e.g., thirty images per second). The cameras may becontrolled based on commands received from the monitor control unit 210.

The cameras may be triggered by several different types of techniques.For instance, a Passive Infra Red (PIR) motion sensor may be built intothe cameras and used to trigger the one or more cameras 230 to captureone or more images when motion is detected. The one or more cameras 230also may include a microwave motion sensor built into the camera andused to trigger the camera to capture one or more images when motion isdetected. Each of the one or more cameras 230 may have a “normally open”or “normally closed” digital input that can trigger capture of one ormore images when external sensors (e.g., the sensors 220, PIR,door/window, etc.) detect motion or other events. In someimplementations, at least one camera 230 receives a command to capturean image when external devices detect motion or another potential alarmevent. The camera may receive the command from the controller 212 ordirectly from one of the sensors 220.

In some examples, the one or more cameras 230 triggers integrated orexternal illuminators (e.g., Infra Red, Z-wave controlled “white”lights, lights controlled by the module 214, etc.) to improve imagequality when the scene is dark. An integrated or separate light sensormay be used to determine if illumination is desired and may result inincreased image quality.

The sensors 220, the touchless doorbell device 222, and the cameras 230communicate with the controller 212 over communication links 224, 226,and 228. The communication links 224, 226, and 228 may be a wired orwireless data pathway configured to transmit signals from the sensors220, the touchless doorbell device 222, and the cameras 230 to thecontroller 212. The communication link 224, 226, and 228 228 may includea local network, such as, 802.11 “Wi-Fi” wireless Ethernet (e.g., usinglow-power Wi-Fi chipsets), Z-Wave, Zigbee, Bluetooth, “HomePlug” orother Powerline networks that operate over AC wiring, and a Category 5(CATS) or Category 6 (CAT6) wired Ethernet network.

The monitoring application server 260 is an electronic device configuredto provide monitoring services by exchanging electronic communicationswith the monitor control unit 210, and the one or more user devices 240,over the network 205. For example, the monitoring application server 260may be configured to monitor events (e.g., alarm events) generated bythe monitor control unit 210. In this example, the monitoringapplication server 260 may exchange electronic communications with thenetwork module 214 included in the monitoring system control unit 210 toreceive information regarding events (e.g., alarm events) detected bythe monitoring system control unit 210. The monitoring applicationserver 260 also may receive information regarding events (e.g., alarmevents) from the one or more user devices 240.

The one or more user devices 240 are devices that host and display userinterfaces. The user device 240 may be a cellular phone or anon-cellular locally networked device with a display. The user device240 may include a cell phone, a smart phone, a tablet PC, a personaldigital assistant (“PDA”), or any other portable device configured tocommunicate over a network and display information. For example,implementations may also include Blackberry-type devices (e.g., asprovided by Research in Motion), electronic organizers, iPhone-typedevices (e.g., as provided by Apple), iPod devices (e.g., as provided byApple) or other portable music players, other communication devices, andhandheld or portable electronic devices for gaming, communications,and/or data organization. The user device 240 may perform functionsunrelated to the monitoring system, such as placing personal telephonecalls, playing music, playing video, displaying pictures, browsing theInternet, maintaining an electronic calendar, etc.

The user device 240 includes a monitoring application 242. Themonitoring application 242 refers to a software/firmware program runningon the corresponding mobile device that enables the user interface andfeatures described throughout. The user device 240 may load or installthe monitoring application 242 based on data received over a network ordata received from local media. The monitoring application 242 runs onmobile devices platforms, such as iPhone, iPod touch, Blackberry, GoogleAndroid, Windows Mobile, etc. The monitoring application 242 enables theuser device 140 to receive and process image and sensor data from themonitoring system.

The central alarm station server 270 is an electronic device configuredto provide alarm monitoring service by exchanging communications withthe monitor control unit 210, the one or more user devices 240, and themonitoring application server 260 over the network 205. For example, thecentral alarm station server 270 may be configured to monitor alarmevents generated by the monitoring system control unit 210. In thisexample, the central alarm station server 270 may exchangecommunications with the network module 214 included in the monitorcontrol unit 210 to receive information regarding alarm events detectedby the monitor control unit 210. The central alarm station server 270also may receive information regarding alarm events from the one or moreuser devices 240.

In some implementations, the one or more user devices 240 communicatewith and receive monitoring system data from the monitor control unit210 using the communication link 238. For instance, the one or more userdevices 240 may communicate with the monitor control unit 210 usingvarious local wireless protocols such as Wi-Fi, Bluetooth, Z-Wave,Zigbee, “HomePlug,” or other Powerline networks that operate over ACwiring, or Power over Ethernet (POE), or wired protocols such asEthernet and USB, to connect the one or more user devices 240 to localsecurity and automation equipment. The one or more user devices 240 mayconnect locally to the monitoring system and its sensors and otherdevices. The local connection may improve the speed of status andcontrol communications because communicating through the network 205with a remote server (e.g., the monitoring application server 260) maybe significantly slower.

Although the one or more user devices 240 are shown as communicatingwith the monitor control unit 210, the one or more user devices 240 maycommunicate directly with the sensors and other devices controlled bythe monitor control unit 210. In some implementations, the one or moreuser devices 240 replace the monitoring system control unit 210 andperform the functions of the monitoring system control unit 210 forlocal monitoring and long range/offsite communication. Otherarrangements and distribution of processing is possible and contemplatedwithin the present disclosure.

FIG. 3 illustrates an example process 300 for sending a notification toa user. The control unit 112 receives data from the touchless doorbelldevice 104 detecting the presence of a person at the front door at themonitored property 102 (310). The PIR sensor of the touchless doorbelldevice 104 detects the heat radiated off objects to detect movement of aliving organism within the FOV 105 of the camera lens of the touchlessdoorbell device 104. In some examples, the touchless doorbell device 104may include one or more cameras that are arranged to detect movement atthe front door from one or more different angles. Including one or morecameras that may detect movement from the one or more different anglesensures that the touchless doorbell device 104 detects any possiblemotion near the front door of the monitored property 102.

In some implementations, the touchless doorbell device 104 may include alight sensitive sensor. The light sensitive sensor may be a low powersensor that is configured to collimate light to assess the amount oflight that strikes the different regions of the sensor. The lightsensitive sensor detects objects moving within the FOV 105 of thetouchless doorbell device 104 in visual conditions other than in totaldarkness. The light sensitive sensor is configured to determine whetheran object within the FOV 105 is increasing in size, indicating theobject is moving toward the touchless doorbell device 104, or maydetermine whether the object is decreasing in size, indicating theobject is moving away from the touchless doorbell device 104. The lightsensitive sensor can also distinguish between a human form object and ananimal form object in the FOV 105 of the touchless doorbell device 104.The PIR sensor along with the light sensitive sensor detect the presenceof a person at the front door of the property based on detecting motionwithin the FOV and detecting the object causing the motion is movingtowards the touchless doorbell device and is of a human form. The sensordata is communicated from the touchless doorbell device 104 to thecontrol unit 112 at the monitored property 102.

The control unit 112 receives image data from the touchless doorbelldevice 104 (320). The touchless doorbell device 104 is prompted toinitialize the capture of video and/or image data when motion isdetected in the FOV 105 of the device 104. The touchless doorbell devicemay capture several still images of the person at the front door. Insome examples, the touchless doorbell device 104 may be a pan and tiltcamera that is configured to pan and tilt its position to capture imagesof the person at the front door. The captured image and/or video data iscommunicated over the network 103 to the control unit 112. The controlunit 112 may command one or more external lights near the front door ofthe monitored property to switch on, based on the control unit 112receiving poor quality images. The control unit 112 may switch on theone or more lights and capture several more images of the person at thefront door.

In examples where the person is wearing a mask or some other object thatblocks the person's face, the touchless doorbell device 104 outputs apre-recorded message that notifies the person to immediately remove themask, that they are being recorded, and failure to remove the mask willresult in altering the authorities.

The control unit 112 compares the received images to stored images ofone or more known users (330). The user 116 may log into the monitoringapplication on the user device 118 and may provide a list of preferredvisitors and their image. For example, the user may include an image ofhis mother, father, best friend, nanny, and dog walker, along with thecorresponding images. The preferred visitors and associated image datamay be stored at a backend monitoring server 114, that manages themonitoring application and that is in communication with the controlunit 112. As seen in FIG. 1A, the monitoring server 114 may be locatedremotely to the monitored property 102, and may be in communication withthe control unit 112. The monitoring server 114 may communicate theimages of the preferred visitors to the control unit 112 for comparison.In some implementations, the control unit 112 communicates the capturedimages of the visitor to the monitoring server 114, and the monitoringserver 114 uses facial recognition software to identify the visitor.

In some implementations, the control unit 112 may store the capturedimages of visitors that visited the monitored property 102 in the past.For example, when a visitor approaches the property, the control unit112 communicates a notification to the user, and the user initiates atwo-way audio call with the visitor to confirm the visitor's identity.The control unit 112 may store the images of the confirmed visitors inmemory for comparative use in the future.

The control unit 112 confirms the identity of the person at the frontdoor (340). The control unit 112 may utilize facial recognition softwareto identify matches in the captured images and the stored images ofknown users. In some examples, the monitoring server 114 may perform thecomparison of the images. When the control unit 112 confirms the personat the front door is a known visitor, the touchless doorbell device 104may generate an audible chiming sound to mimic the sound of a typicaldoorbell within the monitored property 104. In some implementations, theuser 116 may associate preferred visitors with a set specific chimingsound. For example, the user 116 may associate a special chime for hismother and a different chime for his best friend. The touchless doorbelldevice 104 may output a pre-recorded message when the person at thefront door is a known visitor. The user 116 may assign pre-recordedmessages for each of the one or more preferred users through themonitoring application.

The user 116 may associate a list of actions to be performed once theidentity of the person is confirmed to be a known visitor. The user 116may associate the preferred actions with each of the one or morepreferred visitors. For example, the user 116 may wish for the frontdoor to automatically unlock when the dog walker arrives at themonitored property 102. In these examples, when the control unit 112confirms the person at the front door is the dog walker, the controlunit 112 commands monitoring system to disarm, and the connected doorknob device on the front door to unlock the front door so the dog walkermay enter. The user 116 may have the ability to set time schedules tothe list of actions to prohibit the dog walker from arriving at theproperty at 5:00 AM and gaining access to the property. The user 116 mayupdate and change the times and list of actions as often as desiredthrough the monitoring application on his mobile device 118.

The control unit 112 sends an alert notification to the user 116 (350).The notification may be sent as an in-app message through the monitoringapplication to the user device 118. In some examples, the notificationmay include a captured image of the person and the time of theirarrival. The notification may include an option to initiate a two-wayaudio or video call with the visitor. In some implementations, the user116 may have the ability to respond to the notification and include oneor more actions the control unit 112 may implement. For example, theuser 116 may respond commanding the control unit 112 to unlock the frontdoor to allow the person to enter the property 102. When the controlunit 112 confirms that the person at the front door is either the user116, or another user that resides at the monitored property 102, thecontrol unit 112 will not send a notification to the mobile device 118of the user 116.

In some implementations, the control unit 112 may be configured to usethe facial expressions of the user 116 to assess a level of duress whenthe user 116 approaches the touchless doorbell 104 with an unknownperson. For example, the user 116 may be a victim of a burglary wherethe burglar is holding the user under duress to gain access to themonitored property 102. When the user 116 approaches the touchlessdoorbell device, but is in the presence of the unknown person (theburglar), the control unit 112 may use the image and video data receivedto assess the level of duress in the facial expressions of the user 116.When the control unit 112 determines that the level of duress of theuser 116 is beyond a threshold, the control unit 112 may communicatewith the monitoring server 114 to alert the authorities. In someexamples, the control unit 112 may communicate the received images ofthe user 116 and the unknown person to the monitoring server 114 whichmay in turn submit the images to the authorities. In some examples, thecontrol unit 112 may prompt the monitoring system at the property tosound an audible alarm to attempt to deter the burglar.

In other implementations, the control unit 112 may be configured toidentify “alarm expressions.” The user 116 may set user preferencesthrough the monitoring application that includes an expression that maybe used by the user 116 when the authorities should be contacted. Forexample, the user 116 may have been followed home by a burglar who isattempting to force himself into the property 102, when the user 116approaches the touchless doorbell device 104, the user 116 may pull onhis ear to signal the control unit 112 to contact the authorities.

FIG. 5 illustrates an example of a monitoring system integrated with atouchless doorbell device 104, where the system may determine not tosend a visitor notification to the user 116. As described with referenceto FIG. 1A, a property 102 (e.g. a home) of a user 116 is monitored byan in-home monitoring system (e.g. in-home security system) thatincludes components that are fixed within the property 102. The in-homemonitoring system may include a control unit 112, one or more sensors110, one or more cameras 108, one or more lights 106, and a touchlessdoorbell device 104. The control unit 112 may use the data received fromthe touchless doorbell device 104 to determine whether or not to send anotification to the user 116. The control unit 112 may not send anotification to the user 116 when the control unit confirms the visitoris a delivery man 302.

As depicted in FIG. 5, the delivery man 402 approaches the monitoredproperty 102. When the delivery man 402 is within the field of view(FOV) 105 of the camera of the touchless doorbell device 104, the PIRsensor within the camera may detect the heat radiated off the deliveryman 402 to detect movement within the FOV 105. When the presence of thedelivery man 402 is detected within the FOV 105 of the touchlessdoorbell device 104, the device 104 initiates the capture of videoand/or image data. The camera of the touchless doorbell device 104 maypan and/or tilt to capture the video and/or image data of the deliveryman 402. The control unit 112 receives the video and/or image data fromthe camera of the touchless doorbell device 104, and determines thedelivery man 402 is not a known visitor.

Based in the control unit 112 determining that the delivery man 402 isnot a known visitor, the control unit 112 continues to capture video andimage data of the delivery man 402. The camera of the touchless doorbelldevice 104 may use different analytics such as, object recognition,shape recognition, etc., to identify the package, identify any logosassociated with the delivery man 402. The camera of the touchless doorbell device may be configured to perform analytics on other parts of thecaptured images to identify other items in the frame. For example, thecamera may identify a delivery truck parked in front of the property.The data analytics may be communicated to the control unit 112, and inturn communicated to the monitoring server 114 to be compared against ashared database of data to confirm the visitor is indeed a UPS deliveryman. Based on confirming the visitor as a delivery man 402, the controlunit may not send a notification to the user 116 to notify the user of avisitor. In some examples, the control unit may send a notification tothe user 116 to notify the user that a delivery man was at the property.In examples where the control unit receives package information from themonitoring server, the notification may include details of the sender ofthe package and the package delivery time.

The monitoring server 114 may manage the monitoring application, and maybe in communication with one or more other control units from othermonitored properties. In some implementations, when the identity of thedelivery man 402 is not confirmed as a known visitor, the control unit112 may communicate the received image and video data to the monitoringserver 114. The monitoring server 114 may receive data from third partyservers 124. The third party servers 124 may be servers of shippingcompanies such as UPS, FedEx, and US Postal Service. The third partyservers 124 may also include servers of merchant websites such asAmazon, Groupon, WayFair etc. The monitoring server 114 may access thedata received from the third party servers 124 to confirm the visitor isa delivery man, based on the received images including images of thedelivery man 402 with one or more packages, the man wearing a companyissued uniform with a company logo, and based on information thatconfirms a package was shipped by a shipping company from one of themerchant websites.

For example, the user 116 may have ordered an item from Amazon that wasshipped via UPS. The third party servers from both Amazon and UPS wouldcommunicate the order information along with the tracking information ofthe package to the monitoring server 114. The monitoring server 114 mayconfirm a package delivery was expected on the given day based on theinformation received from the third party servers 124, and may confirmbased on the video analytics that indicate a delivery man was wearing aUPS uniform and was holding a package arrived at the monitored property.The monitoring server 114 confirms the delivery man 402 is the expectedUPS delivery man and communicates the confirmation to the control unit112. In turn, the control unit does not send a notification alert to theuser 116 to notify of the visitor, since the delivery man 402 is likelyjust dropping off a package. In some examples, when the control unitconfirms the visitor 402 is a delivery man, the control unit prompts thespeaker of the touchless doorbell device 104 to output a pre-recordedmessage to leave the package on the door step.

FIG. 5 illustrates an example process 500 for performing an action. Amonitoring system at a monitored property may be controlled by a monitorcontrol unit. The monitoring system may be integrated with one or moresensors, one or more lights, one or more cameras, and a touchlessdoorbell device. The touchless doorbell device includes a camera, one ormore sensors, a speaker, and a microphone. The touchless doorbell devicemay be capable of facilitating two-way audio/video communication. Themotion sensor of the touchless doorbell device detects motion in avicinity of the touchless doorbell device (510). For example, the motionsensor detects motion when an object moves within a four feet radioiusfrom the touchless doorbell device. In some implementations, the PIRsensor of the camera of the touchless doorbell device detects motion ofa person within the field of view (FOV) of the camera (510). Thetouchless doorbell device may be mounted to an exterior wall of themonitored property near to the front door entryway. The camera of thetouchless doorbell device includes a Passive Infrared Sensor (PIR) thatis configured to detect heat radiated from objects to detect movement ofa living organism within the field of view of the sensor and cameralens. For example, the PIR sensor detects heat radiated off a person asthe person approaches the front door of the monitored property. In theseimplementations, the touchless doorbell device may detect heat off anobject and determine to capture one or more images of the object withinthe field of view of the camera of the touchless doorbell device.

In some implementations, the camera of the touchless doorbell device mayinclude a light sensitive sensor. The light sensitive sensor may be alow power sensor that is configured to collimate light to assess theamount of light that strikes the different regions of the sensor. Thelight sensitive sensor is configured to detect objects moving within thefield of view of the camera of the touchless doorbell device in visualconditions other than in total darkness. The camera of the touchlessdoorbell device is configured to capture one or more images of theobject moving within the field of view. The camera communicates the oneor more images of the object to the monitor control unit. The monitorcontrol unit is configured to analyze the one or more images todetermine whether an object within the FOV is increasing in size,indicating the object is moving toward the touchless doorbell device, ormay determine whether the object is decreasing in size, indicating theobject is moving away from the touchless doorbell device. The monitorcontrol unit is configured to analyze the one or more images todetermine whether an object within the FOV is not changing in size,indicating the object is walking passed the monitored property. Themonitor control unit is also configured to distinguish between a humanform object and an animal form of the object within the FOV of thecamera.

The camera of the touchless doorbell device captures an image based ondetecting motion in a vicinity of the touchless doorbell device (520).The touchless doorbell device may capture one or more images of anobject within the field of view of the camera. When the PIR sensor ofthe camera of the touchless doorbell device detects heat radiated off aliving object, the camera may be prompted to capture one or more imagesand or video data of the object in the FOV. In other implementations,the touchless doorbell device may determine to capture one or moreimages of an object within the field of view of the camera when theobject is determined to be a human form moving towards the monitoredproperty. The resident user may have the ability to customize the use ofthe touchless doorbell device through the use of the monitoring systemapplication running on a user device. The resident user may setpreferences for determining when one or more images and or video datashould be captured by the camera of the touchless doorbell device. Forexample, the user may set preferences to have the camera of thetouchless doorbell device capture image data when a human form iswalking pass the monitored property, or a human form is walking towardsthe monitored property. In some examples, the user may set preferencesto have the camera of the touchless doorbell device not capture anyimages of the object when the object is determined to be an animal.

The monitor control unit receives the image from the touchless doorbelldevice (530). The touchless doorbell device may communicate with themonitor control unit via a wired or wireless data pathway. For example,the touchless doorbell device may communicate with the control unit by a“Wi-Fi” wireless Ethernet (e.g., using low-power Wi-Fi chipsets),Z-Wave, Zigbee, Bluetooth, “HomePlug” or other Powerline networks thatoperate over AC wiring, and a Category 5 (CATS) or Category 6 (CAT6)wired Ethernet network.

In some implementations, the monitor control unit determines whether theobject within the FOV of the camera of the touchless doorbell is a humanor animal form, and determines whether the animal or human is movingtowards, away from, or walking by the monitored property. In theseimplementations, the camera of the touchless doorbell device may capturea first image of the object within the FOV of the camera when the PIRsensor detects the heat emitted from the objection. The camera of thetouchless device may then capture a second image of the object withinthe FOV at a second later time. The camera of the touchless device thencommunicates the first and second images to the monitor control unit.The monitor control unit analyzes the first and second images todetermine the form of the object in the image, and to determine whetherthe object is moving away from, towards, or walking by the monitoredproperty.

The monitor control unit analyzes the image (540). The monitor controlunit is configured to distinguish between a human form object and ananimal form of the object within the FOV of the camera. Based onanalyzing the image, the monitor control unit determines that the imagelikely includes a representation of a person (550). The monitor controlunit performs a monitoring system action based on determining that theimage includes a representation of a person (560).

In some implementations, the monitor control unit may provide for outputon a user device of the resident, a notification indicating that aperson is likely at the monitored property. In some implementations, themonitor control unit is configured to determine that the image is animage of a known person. The resident user at the monitored property mayconfigure one or more known users that are allowed access to themonitored property. The resident user may configure a profile for eachof the one or more known persons. The resident user may provide one ormore images of each of the known persons to the monitor control unitthrough the monitoring system application hosted on a user's device. Forexample, the resident user may configure himself, his wife, his mother,the nanny, and the dog walker as known persons. In some implementations,the resident user may configure a profile for one or more unwelcomedpersons. In these implementations, the resident may provide images ofthe unwanted persons retrieved from a social media account or from apublic record mug shot. For example, the resident user may configure aprofile for an ex-spouse. For another example, the resident user mayconfigure a profile for a fired nanny.

The resident user may provide preferences for the action taken by themonitoring system when a known person arrives at the monitored property.For example, the resident user may set preferences to disarm themonitoring system, and automatically unlock the front door of theproperty when the user himself arrives at the property. For anotherexample, the resident may set preferences to initiate a two-wayaudio/video communication when the dog walker arrives at the property.For an example, when the person at the property is an unwelcomed guest,the resident may set preferences to arm the monitoring system and lockthe front door.

The monitor control unit may analyze the image received from thetouchless doorbell device to determine whether the person at theproperty is a known person or an unknown person. The monitor controlunit may use one or more facial recognition software algorithms todetermine a likelihood of whether the representation of a person in theperson in the received image is a known person. For example, the monitorcontrol unit may determine a confidence score that reflects thelikelihood that the person in the one or more captured images is a knownuser. The monitor control unit may compare the determined confidencescore to a threshold, and may determine that the person is likely aknown person when the confidence score exceeds the threshold. Forexample, the monitor control unit may determine a confidence score of90%, and determines the person is a known person based on the confidencescore exceeding the 75% threshold. In some implementations, the residentuser may provide preferences for the action to be taken by themonitoring system based on the determined confidence score. For example,the resident user may set preferences to initiate a two-way audio/videocommunication when the monitor control unit determines the confidencescore is 65%, below the 75% threshold, and to automatically disarm themonitoring system and unlock the front door when the monitor controlunit determines the confidence score is 95%.

In some implementations, the monitor control unit may adjust theconfidence score threshold based on data received from the monitoringsystem. For example, when the monitoring system is armed away, themonitor control unit may decrease the confidence score threshold. Forexample, when the monitoring system is armed stay, the monitor controlunit may increase the confidence score threshold.

In some implementations, the monitor control unit may generate anotification indicating that a known person is at the monitoredproperty, and provide the notification for output on the user's device.In some examples, the notification may include the one or more capturedimages of the known person. In some examples, the notification mayinclude a selectable option that requests the user's feedback. Forexample, the notification may provide the one or more images, and mayrequest user feedback on whether to disarm and unlock the front door, orto provide an audio message, for output by the speaker of the touchlessdoorbell device instructing the visitor that the resident will be thereto open the door shortly.

The monitor control unit may determine the current armed state of themonitoring system, and may perform an action based on the determinedstate. For example, the monitor control unit determines that themonitoring system is in an unarmed state, and the person at the propertyis determined to be a known person, the monitoring control unit mayunlock and open the front door. For another example, the monitor controlunit determines that the monitoring system is in an armed state, and theperson at the property is determined to be a known person, themonitoring control unit may disarm the monitoring system and unlock thefront door. For another example, the monitor control unit may determinethat the monitoring system is in an armed away state, and the person atthe property is unknown, the monitor control unit prompt on or moreactions at the property that simulate occupancy. For example, themonitor control unit may command one or more lights at the property toswitch on, and may output a dog parking sound from a speaker at theproperty. The one or more lights and the sound of a barking dog maydeter the person from potentially burglarizing the monitored property.

The monitor control unit may command a speaker at an interior of theproperty to output a specific chime sound when a known person isdetermined to be at the monitored property. The resident user may setpreferences for the chime sound to be output for each of a one or moreknown persons. For example, the user may set a preference for aparticular song to be played from a speaker when his mother arrives atthe monitored property. In some implementations the monitor control unitmay command the speaker at the property to output a specific audiomessage when a known person is determined to be at the property. Forexample, the user may set a preference to output “Come in Dad” as anaudio message when his father arrives at the monitored property.

In some implementations, the monitor control unit may command thetouchless doorbell device to output an audio warning when the monitorcontrol unit cannot make a determination of the identity of the personat the property. For example, a person may approach the front door ofthe monitored property with a scarf or a ski mask blocking their face.When the monitor control unit receives the one or more images of theperson and the face of the person is blocked, the monitor control unitcannot make a determination. The monitor control unit may command thespeaker of the touchless device to output an audio message requestingthe person unblock their face. The message may indicate that theauthorities would be contacted if the person does not have their faceuncovered.

In some implementations, the monitor control unit may be configured todetermine a level of duress when a known person or the resident arrivesat the property with an unknown person. For example, the user may arriveat the property with one or more friends, and the camera of thetouchless doorbell device may capture one or more images of each of thepersons at the front door. Based on determining a level of duress thatis lower than a threshold, the monitor control unit disarms themonitoring system and unlocks the front door to allow the user and hisfriends to access to the property. For another example, the resident mayarrive with another person who is wearing a ski mask, and the camera ofthe touchless doorbell device may capture one or more images of each ofthe persons at the front door. Based on determining a level of duressthat is higher than the threshold, and based on the monitor control unitnot being able to make a determination of the identity of the personwith the resident, the monitor control unit may sound an alarm at theproperty and contact the authorities.

In other implementations, the monitor control unit may be configured toidentify one or more user set “alarm expressions.” The resident user mayset user preferences through the monitoring application that includes anexpression that may be used by the user 116 when the resident is indistress, and the authorities should be contacted. For example, theresident user may have been followed home by a burglar who is attemptingto force himself into the property, when the user approaches thetouchless doorbell device, the resident user may pull on his ear tosignal that he is in distress. When the monitor control unit receivesthe image data indicating the resident user pulling on his ear, themonitor control unit may sound an alarm at the property, and may contactthe authorities.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus implementing thesetechniques may include appropriate input and output devices, a computerprocessor, and a computer program product tangibly embodied in amachine-readable storage device for execution by a programmableprocessor. A process implementing these techniques may be performed by aprogrammable processor executing a program of instructions to performdesired functions by operating on input data and generating appropriateoutput. The techniques may be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device. Each computerprogram may be implemented in a high-level procedural or object-orientedprogramming language, or in assembly or machine language if desired; andin any case, the language may be a compiled or interpreted language.Suitable processors include, by way of example, both general and specialpurpose microprocessors. Generally, a processor will receiveinstructions and data from a read-only memory and/or a random accessmemory. Storage devices suitable for tangibly embodying computer programinstructions and data include all forms of non-volatile memory,including by way of example semiconductor memory devices, such asErasable Programmable Read-Only Memory (EPROM), Electrically ErasableProgrammable Read-Only Memory (EEPROM), and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Anyof the foregoing may be supplemented by, or incorporated in,specially-designed ASICs (application-specific integrated circuits).

It will be understood that various modifications may be made. Forexample, other useful implementations could be achieved if steps of thedisclosed techniques were performed in a different order and/or ifcomponents in the disclosed systems were combined in a different mannerand/or replaced or supplemented by other components. Accordingly, otherimplementations are within the scope of the disclosure.

The invention claimed is:
 1. A monitoring system that is configured tomonitor a property, the monitoring system comprising: a touchlessdoorbell device that includes a camera with a passive infrared sensorand a motion sensor and that is configured to: detect, using the motionsensor, motion in a vicinity of the touchless doorbell device; detect,using the camera with the passive infrared sensor, heat radiated from anobject within the vicinity of the touchless doorbell device; based ondetecting motion in a vicinity of the touchless doorbell device anddetecting the heat radiated from the object within the vicinity of thetouchless doorbell device, capture, using the camera, an image; andbased on capturing the image, transmit, to a monitor control unit, theimage; and the monitor control unit that is configured to: receive, fromthe touchless doorbell device, the image; analyze the image; based onanalyzing the image, determine that the image likely includes arepresentation of a person and that a face portion of the representationof the person is obstructed; based on determining that the image likelyincludes a representation of a person and that the face portion of therepresentation of the person is obstructed, providing, for output by aspeaker of the touchless doorbell device, an audio message informing theperson to remove any obstructions; receive, at a second later time, fromthe touchless doorbell device, a second image; determine, based onanalyzing the second image, that a face portion of anotherrepresentation of the person is still obstructed after output of theaudio message informing the person to remove any obstructions; and basedon determining that that the face portion of the another representationof the person is still obstructed after output of the audio messageinforming the person to remove any obstructions, sounding an alarm. 2.The system of claim 1, wherein the monitor control unit is configuredto: provide for output to a client device of a resident of the property,a notification indicating that a person is likely at the monitoredproperty and that the face portion of the representation of the personis obstructed.
 3. The system of claim 2, wherein the notificationindicating that a person is likely at the monitored property includes atleast one of the one or more captured images of the person, and acontrol to indicate that the person is allowed to access the property.4. The system of claim 3, wherein the monitor control unit is configuredto: receive, from the client device of the resident of the property,data indicating a selection of the control indicating that the person isallowed to access the property; and in response to receiving dataindicating the selection of the control indicating that the person isallowed to access the property, perform a monitoring system action byunlocking a front door and granting the person access to the property.5. The system of claim 1, wherein the monitor control unit is configuredto determine that the image likely includes a representation of a personby: determining a confidence score that reflects a likelihood that theimage includes a representation of a person; comparing the confidencescore that reflects the likelihood that the image includes arepresentation of a person to a confidence score threshold; and based oncomparing the confidence score that reflects the likelihood that theimage includes a representation of a person to the confidence scorethreshold, determining that the confidence score that reflects thelikelihood that the image includes a representation of a personsatisfies the confidence score threshold.
 6. The system of claim 1,wherein the monitor control unit is configured to: receive, at a thirdlater time, from the touchless doorbell devices, a third image; comparethe third image to one or more stored images of one or more knownpersons; based on comparing the third image to the one or more storedimages of one or more known persons, determine a score that reflects alikelihood that the third image is an image of a known person; comparethe score that reflects a likelihood that the third image is an image ofa known person to a threshold; and based on comparing the score thatreflects a likelihood that the third image is an image of a known personto a threshold, determining that the score that reflects a likelihoodthat the third image is an image of a known person satisfies thethreshold.
 7. The system of claim 6, wherein the monitor control unit isconfigured to: determine the monitoring system is in an armed state; andperform an action by automatically disarming the monitoring system, andunlocking a front door to the monitored property.
 8. The system of claim6, wherein, the touchless doorbell device is configured to: receive,from the monitor control unit, data indicating that the score thatreflects a likelihood that the third image is an image of a known personsatisfies the threshold; and based on receiving, from the monitorcontrol unit, data indicating that the score that reflects a likelihoodthat the third image is an image of a known person satisfies thethreshold, outputting, by the speaker of the touchless doorbell device,a prerecorded message that is specific to an identify of the knownperson in the third image.
 9. The system of claim 6 wherein, the monitorcontrol unit is configured to: receive, from a user, one or more userpreferences that identifies a specific chime for each of the one or moreknown persons; determine, an identity of the known person in thereceived image; determine, a chime that matches the identity of theknown person in the received image; and the touchless doorbell device isconfigured to: output, by the speaker to an inside of the property, thechime that matches the identity of the known person in the receivedimage.
 10. The system of claim 6, wherein, the monitor control unit isconfigured to: compare the third image to one or more stored images ofone or more known persons; based on comparing the third image to the oneor more stored images of one or more known persons, determine a scorethat reflects a likelihood that the third image is an image of a knownperson; compare the score that reflects a likelihood that the thirdimage is an image of a known person to a threshold; and based oncomparing the score that reflects a likelihood that the third image isan image of a known person to a threshold, determining that the scorethat reflects a likelihood that the third image is an image of a knownperson does not satisfy the threshold; determine the monitoring systemis in an unarmed state; and perform an action by automatically armingthe monitoring system, and performing one or more actions that simulateoccupancy the property.
 11. The system of claim 4, wherein the monitorcontrol unit is configured to: receive, at a third later time, from thetouchless doorbell devices, a third image; analyze the third image;based on analyzing the third image, determine that the third imagelikely includes a representation of a person and determine, a duressscore that reflects a likelihood that the person in the image is underduress; compare the duress score that reflects a likelihood that theperson in the image is under duress to a duress score threshold; basedon comparing the duress score that reflects a likelihood that the personin the image is under duress to a duress score threshold, determine thatthe duress score satisfies the duress score threshold; and based ondetermining that the duress score exceeds the duress score threshold,sounding an alarm.
 12. The system of claim 1, wherein the monitorcontrol unit is configured to: receive, at a third later time, from thetouchless doorbell devices, a third image; analyze the third image;based on analyzing the third image, determine that the image likelyincludes a representation of a person and a representation of a package;and based on determining that the third image likely includes arepresentation of a person and a representation of a package,outputting, by the speaker of the touchless doorbell device, aprerecorded message that indicates to place the package at a front door,and providing, for output to a client device of a resident of theproperty, a notification indicating that a package is likely deliveredto the property.
 13. A computer-implemented method comprising:receiving, by a monitoring system that is configured to monitor aproperty and from a touchless doorbell device that includes a camerawith a passive infrared sensor and a motion sensor, an image; analyzing,by the monitoring system, the image; based on analyzing the image,determining that the image likely includes a representation of a personand that a face portion of the representation of the person isobstructed; based on determining that the image likely includes arepresentation of a person and that the face portion of therepresentation of the person is obstructed, providing, for output by aspeaker of the touchless doorbell device, an audio message informing theperson to remove any obstructions; receiving, at a second later time,from the touchless doorbell device, a second image; determining, basedon analyzing the second image, that a face portion of anotherrepresentation of the person is still obstructed after output of theaudio message informing the person to remove any obstructions; and basedon determining that that the face portion of the another representationof the person is still obstructed after output of the audio messageinforming the person to remove any obstructions, sounding an alarm. 14.The method of claim 13, comprising: providing, for output to a clientdevice of a resident of the property, a notification indicating that aperson is likely at the monitored property and that the face portion ofthe representation of the person is obstructed.
 15. The method of claim14, wherein the notification indicating that a person is likely at themonitored property includes at least one of the one or more capturedimages of the person, and a control to indicate that the person isallowed to access the property.
 16. The method of claim 15, comprising:receiving, from the client device of the resident of the property, dataindicating a selection of the control indicating that the person isallowed to access the property; and in response to receiving dataindicating the selection of the control indicating that the person isallowed to access the property, performing a monitoring system action byunlocking a front door and granting the person access to the property.17. The method of claim 13, determining that the image likely includes arepresentation of a person comprises: determining a confidence scorethat reflects a likelihood that the image includes a representation of aperson; comparing the confidence score that reflects the likelihood thatthe image includes a representation of a person to a confidence scorethreshold; and based on comparing the confidence score that reflects thelikelihood that the image includes a representation of a person to theconfidence score threshold, determining that the confidence score thatreflects the likelihood that the image includes a representation of aperson satisfies the confidence score threshold.
 18. The method of claim13, comprising: comparing the received image to one or more storedimages of one or more known persons; based on comparing the receivedimage to the one or more stored images of one or more known persons,determining a score that reflects a likelihood that the received imageis an image of a known person; comparing the score that reflects alikelihood that the received image is an image of a known person to athreshold; and based on comparing the score that reflects a likelihoodthat the received image is an image of a known person to a threshold,determining that the score that reflects a likelihood that the receivedimage is an image of a known person satisfies the threshold.
 19. Themethod of claim 13, comprising: receive, at a third later time, from thetouchless doorbell devices, a third image; comparing the third image toone or more stored images of one or more known persons; based oncomparing the third image to the one or more stored images of one ormore known persons, determining a score that reflects a likelihood thatthe third image is an image of a known person; comparing the score thatreflects a likelihood that the third image is an image of a known personto a threshold; and based on comparing the score that reflects alikelihood that the third image is an image of a known person to athreshold, determining that the score that reflects a likelihood thatthe third image is an image of a known person satisfies the threshold.20. The method of claim 13, wherein the audio message informs the personthe alarm will be sounded if the person does not uncover their face. 21.A non-transitory computer-readable medium storing software comprisinginstructions executable by one or more computers which, upon suchexecution, cause the one or more computers to perform operationscomprising: receiving, by a monitoring system that is configured tomonitor a property and from a touchless doorbell device that includes acamera with a passive infrared sensor and a motion sensor, an image;analyzing, by the monitoring system, the image; based on analyzing theimage, determining that the image likely includes a representation of aperson and that a face portion of the representation of the person isobstructed; based on determining that the image likely includes arepresentation of a person and that the face portion of therepresentation of the person is obstructed, providing, for output by thespeaker of the touchless doorbell device, an audio message informing theperson to remove any obstructions; receiving, at a second later time,from the touchless doorbell device, a second image; determining, basedon analyzing the second image, that a face portion of anotherrepresentation of the person is still obstructed after output of theaudio message informing the person to remove any obstructions; and basedon determining that that the face portion of the another representationof the person is still obstructed after output of the audio messageinforming the person to remove any obstructions, sounding an alarm.