Accessing smart home devices using a fingerprint sensor on a doorbell device

ABSTRACT

This disclosure includes techniques for controlling smart home devices upon entering a home with a fingerprint sensor in a doorbell device. After capturing a fingerprint of a digit of a guest and sending the fingerprint to a server device, the server device matches the fingerprint of the digit to an entry in a guest fingerprint database for a first user. The server device sends an operational command to a smart home device separate from the doorbell device and located at a same premises as the doorbell device. In response to receiving the operational command from the server device, the smart home device performs an action corresponding to the operational command.

TECHNICAL FIELD

The disclosure relates to smart home appliances.

BACKGROUND

To date, smart home devices are typically only controlled by a selectfew household members that are given explicit control of an entiresystem by an owner of the system. When users wish to grant guests accessto their smart home devices, they typically are relegated to sharingsecure information without putting adequate limitations on the access.For instance, if a user wishes to grant control of their computerizedlock to a guest, they typically have to give their secure PIN to theguest. When the user wishes to revoke access, they are generally forcedto change the PIN itself, disrupting the process for every trusted user.

SUMMARY

In general, the disclosure is directed to a system for controlling smarthome devices in a building using a fingerprint sensor located at anentrance to the building, such as a doorbell device. The fingerprintsensor can capture a representation of a fingerprint for a particularperson. A trusted operator of the device can install a particular set ofrules on the device for the guest with that fingerprint to controlcertain smart home devices in certain ways when that fingerprint isscanned. For instance, the rules can include actions such as unlock acomputerized locking mechanism on the front door, set a thermostat to aparticular temperature for heating or cooling of the home, turn on aparticular playlist of music to play over a smart speaker in the home,turn on a smart television to a particular channel or streamingapplication, or control lights in the home, among other things. Thedoorbell device sends the representation of the fingerprint to theserver device for verification whenever the guest arrives, and theserver device will, in turn, send the command stored in the database tothe smart home device, either directly via the same network that theserver device received the representation of the fingerprint or, in aninstance of the case of the smart home device being from a third-partymanufacturer, potentially through a third-party cloud server run by thethird-party manufacturer.

Using the techniques described herein, a homeowner or trusted user of asmart home ecosystem can securely and simply grant immediate and limitedaccess to a variety of smart home devices in a manner explicitlycustomized by the trusted user. With trusted guests, such as familymembers or close friends, the user can adjust various devices within thehome to operate in accordance with the trusted guests' preferred manner,providing quick and consistent comfort and efficiency to those trustedusers whenever they wish to enter the home. With less casual guests whorequire access to the home, such as cleaning crews or dogwalkers, theuser can customize the setup to unlock the door, potentially turn onpreferred playlists of music for when they are conducting business withthe home, and possibly turning on security cameras within the home tomonitor their presence.

Furthermore, when the user wishes for that guest to no longer have thataccess, the user can remove or edit the entry for that guest withoutdisrupting every other user and/or guest who accesses the home. Forinstance, if the user's dogwalker finds different employment and theuser needs to find a new dogwalker, the user can revoke access from theprevious dogwalker and add access to the new dogwalker, editing onlytheir experience without requiring security changes to every otherguest. Furthermore, the separation of processes between the doorbell,the server, and the smart home device creates added stability, security,and consistency with the more trusted infrastructure over the networkwhich those devices communicate.

In one example, the disclosure is directed to a system comprising acomputerized locking mechanism in a locked state. The system furthercomprises a server device comprising one or more processors. The systemalso comprises a doorbell device separate from the computerized lockingmechanism, the doorbell device comprising a fingerprint sensor. Thedoorbell device is configured to detect, using the fingerprint sensor, atouch input from a first digit of a first guest. The doorbell device isfurther configured to capture, using the fingerprint sensor, arepresentation of a fingerprint of the first digit of the first guest.The doorbell device is also configured to, in response to capturing therepresentation of the fingerprint of the first digit, transmit therepresentation of the fingerprint of the first digit to the serverdevice. The one or more processors of the server device are configuredto, in response to receiving the representation of the fingerprint ofthe first digit, compare the representation of the fingerprint of thefirst digit to one or more entries of a guest fingerprint database for afirst user, wherein a profile of the first user includes an associationwith the doorbell device. The one or more processors of the serverdevice are further configured to, in response to determining that therepresentation of the fingerprint of the first digit substantiallymatches a first entry of the guest fingerprint database for the firstuser, send an unlock command to the computerized locking mechanism. Thecomputerized locking mechanism is configured to, in response toreceiving the unlock command from the server device, change to anunlocked state.

In another example, the disclosure is directed to a method includingdetecting, by fingerprint sensor of a doorbell device, a touch inputfrom a first digit of a first guest. The method further includescapturing, by the fingerprint sensor, a representation of a fingerprintof the first digit of the first guest. The method also includes, inresponse to capturing the representation of the fingerprint of the firstdigit, transmitting, by the doorbell device, the representation of thefingerprint of the first digit to a server device. The method furtherincludes, in response to receiving the representation of the fingerprintof the first digit, comparing, by the server device, the representationof the fingerprint of the first digit to one or more entries of a guestfingerprint database for a first user, wherein a profile of the firstuser includes an association with the doorbell device. The method alsoincludes, in response to determining that representation of thefingerprint of the first digit substantially matches a first entry ofthe guest fingerprint database for the first user, sending anoperational command to a smart home device separate from the doorbelldevice and located at a same premises as the doorbell device. The methodfurther includes, in response to receiving the operational command fromthe server device, performing, by the smart home device, an actioncorresponding to the operational command.

In another example, the disclosure is directed to a non-transitorycomputer-readable storage medium containing instructions. Theinstructions, when executed, cause one or more processors to receive,from a doorbell device comprising a fingerprint sensor, a representationof a fingerprint of a first digit of a first guest. The instructionsfurther cause the one or more processors to, in response to receivingthe representation of the fingerprint of the first digit, compare therepresentation of the fingerprint of the first digit to one or moreentries of a guest fingerprint database for a first user, wherein aprofile of the first user includes an association with the doorbelldevice. The instructions also cause the one or more processors to, inresponse to determining that representation of the fingerprint of thefirst digit substantially matches a first entry of the guest fingerprintdatabase for the first user, send an unlock command to the computerizedlocking mechanism

The details of one or more examples of the disclosure are set forth inthe accompanying drawings and the description below. Other features,objects, and advantages of the disclosure will be apparent from thedescription and drawings, and from the claims.

BRIEF DESCRIPTION OF DRAWINGS

The following drawings are illustrative of particular examples of thepresent invention and therefore do not limit the scope of the invention.The drawings are not necessarily to scale, though embodiments caninclude the scale illustrated, and are intended for use in conjunctionwith the explanations in the following detailed description wherein likereference characters denote like elements. Examples of the presentinvention will hereinafter be described in conjunction with the appendeddrawings.

FIG. 1 is a block diagram illustrating an example system for unlocking acomputerized locking mechanism using a fingerprint sensor on a doorbelldevice, in accordance with the techniques described herein.

FIG. 2 is a block diagram illustrating a more detailed example of acomputing device configured to perform the techniques described herein.

FIG. 3 is a conceptual diagram illustrating a guest accessing a smarthome ecosystem using a fingerprint sensor on a doorbell device, inaccordance with the techniques described herein.

FIG. 4 is a flow diagram chart illustrating an example method forverifying a guest using a fingerprint sensor on a doorbell device inorder to control one or more smart home devices, in accordance with thetechniques described herein.

DETAILED DESCRIPTION

The following detailed description is exemplary in nature and is notintended to limit the scope, applicability, or configuration of theinvention in any way. Rather, the following description provides somepractical illustrations for implementing examples of the presentinvention. Those skilled in the art will recognize that many of thenoted examples have a variety of suitable alternatives.

FIG. 1 is a block diagram illustrating an example system 102 forunlocking computerized locking mechanism 108 using fingerprint sensor106 on doorbell device 104, in accordance with the techniques describedherein. System 102 may also include server device 110, which maycommunicate with both doorbell device 104 and computerized lockingmechanism 108 via network 112.

Server device 110 may be any computer with the processing power requiredto adequately execute the techniques described herein. For instance,server device 110 may be any one or more of a mobile computing device(e.g., a smartphone, a tablet computer, a laptop computer, etc.), adesktop computer, a smart home component (e.g., a computerizedappliance, a home security system, a control panel for home components,a lighting system, a smart power outlet, etc.), a wearable computingdevice (e.g., a smart watch, computerized glasses, a heart monitor, aglucose monitor, smart headphones, etc.), a virtual reality/augmentedreality/extended reality (VR/AR/XR) system, a video game or streamingsystem, a network modem, router, or server system, or any othercomputerized device that may be configured to perform the techniquesdescribed herein.

Doorbell device 104 may be any computerized doorbell device that cancommunicate with a server, such as server device 110, over a network,such as network 112. Doorbell device 104 may include an input device,such as a button or a touch screen, that, when activated, prompts asound to be output in or around a building on which doorbell device 104is installed to make a dweller aware of the person's presence. Doorbelldevice 104 may include additional sensors not shown, such as a camerasensor and a motion sensor. Doorbell device 104 may also includefingerprint sensor 106, which may be any sensor capable of capturing arepresentation of a fingerprint. For instance, fingerprint sensor 106may be an optical fingerprint sensor, a capacitive fingerprint sensor,an ultrasound fingerprint sensor, a thermal fingerprint sensor, or anyother type of sensor that can capture a representation of a fingerprint.

Computerized locking mechanism 108 may be any lock capable of beinginstalled on an entry point, such as a door or a window, that is capableof being operated electronically and can communicate with a server, suchas server device 110, over a network, such as network 112.

Network 112 may be any piece of infrastructure to transmitcommunications from an end device to a server, such as server device110. Network 112 may be an Internet connection, typically assisted by amodem and/or router device located at the home to receive the initialcommunications from the end device and transmit the communications tonetwork 112. Network 112 may also be a different form of long- orshort-distance communication network, such as a hardwired Internet orfiber optic connection, a wireless Internet or cellular connection, aradio connection, a Bluetooth® connection, a ZigBee® connection, or anyother suitable connection.

Throughout this disclosure, the term “guest” will be used to describe anindividual operating fingerprint sensor 106 and doorbell device 104.“Guest” may be any individual programmed to have access to the smarthome ecosystem. For instance, the guest may be a user or owner of thesmart home ecosystem, a family member of the user or owner of the smarthome ecosystem2, a friend of the user or owner of the smart homeecosystem, an employee of the user or owner of the smart home ecosystem,or any other acquaintance, personal, business, or otherwise, of the useror owner of the smart home ecosystem. As such, a “guest” may be anyindividual attempting to access the smart home ecosystem or the homethat contains the smart home ecosystem. In other words, while the term“guest” is used throughout this disclosure, the term may, in addition tonon-users, visitors, or non-owners, refer to the user which owns oroperates the smart home devices, including the user that would benotified of the attempted access.

In accordance with the techniques described herein, fingerprint sensor106 of doorbell device 104 detects a touch input from a first digit of afirst guest. Fingerprint sensor 106 captures a representation of afingerprint of the first digit of the first guest. In response tocapturing the representation of the fingerprint of the first digit,doorbell device 104 transmits the representation of the fingerprint ofthe first digit to a server device. In response to receiving therepresentation of the fingerprint of the first digit, server device 110compares the representation of the fingerprint of the first digit to oneor more entries of a guest fingerprint database for a first user, wherea profile of the first user includes an association with the doorbelldevice. In response to determining that representation of thefingerprint of the first digit substantially matches a first entry ofthe guest fingerprint database for the first user, server device 110sends an unlock command to computerized locking mechanism 108, separatefrom doorbell device 104 and located at a same premises as doorbelldevice 104. In response to receiving the operational command from theserver device, computerized locking mechanism 108 changes to an unlockedstate.

FIG. 2 is a block diagram illustrating an example computing deviceconfigured to analyze a received representation of a fingerprint inorder to control various smart home devices, in accordance with one ormore aspects of the techniques described in this disclosure. Serverdevice 210 of FIG. 2 is described below as an example of server device110 of FIG. 1 . FIG. 2 illustrates only one particular example of serverdevice 210, and many other examples of server device 210 may be used inother instances and may include a subset of the components included inexample server device 210 or may include additional components not shownin FIG. 2 .

Server device 210 may be any computer with the processing power requiredto adequately execute the techniques described herein. For instance,server device 210 may be any one or more of a mobile computing device(e.g., a smartphone, a tablet computer, a laptop computer, etc.), adesktop computer, a smart home component (e.g., a computerizedappliance, a home security system, a control panel for home components,a lighting system, a smart power outlet, etc.), a wearable computingdevice (e.g., a smart watch, computerized glasses, a heart monitor, aglucose monitor, smart headphones, etc.), a virtual reality/augmentedreality/extended reality (VR/AR/XR) system, a video game or streamingsystem, a network modem, router, or server system, or any othercomputerized device that may be configured to perform the techniquesdescribed herein.

As shown in the example of FIG. 2 , server device 210 includes userinterface component (UIC) 212, one or more processors 240, one or morecommunication units 242, one or more input components 244, one or moreoutput components 246, and one or more storage components 248. UIC 212includes display component 202 and presence-sensitive input component204. Storage components 248 of server device 210 include fingerprintmodule 220, communication module 222, and guest fingerprint database226.

One or more processors 240 may implement functionality and/or executeinstructions associated with server device 210 to analyze a receivedfingerprint representation and control various smart home devices. Thatis, processors 240 may implement functionality and/or executeinstructions associated with server device 210 to receive a fingerprintrepresentation from doorbell device 104, analyze the receivedfingerprint representation, and control one or more smart home devices,such as computerized lock 108 or smart speakers 322 of FIG. 3 .

Examples of processors 240 include application processors, displaycontrollers, auxiliary processors, one or more sensor hubs, and anyother hardware configure to function as a processor, a processing unit,or a processing device. Modules 220 and 222 may be operable byprocessors 240 to perform various actions, operations, or functions ofserver device 210. For example, processors 240 of server device 210 mayretrieve and execute instructions stored by storage components 248 thatcause processors 240 to perform the operations described with respect tomodules 220 and 222. The instructions, when executed by processors 240,may cause server device 210 to receive a fingerprint representation fromdoorbell device 104, analyze the received fingerprint representation,and control one or more smart home devices, such as computerized lock108 or smart speakers 322 of FIG. 3 .

Fingerprint module 220 may execute locally (e.g., at processors 240) toprovide functions associated with comparing a received representation ofa fingerprint to stored, trusted representations of fingerprints inguest fingerprint database 226. In some examples, fingerprint module 220may act as an interface to a remote service accessible to server device210. For example, fingerprint module 220 may be an interface orapplication programming interface (API) to a remote server that comparesa received representation of a fingerprint to stored, trustedrepresentations of fingerprints in guest fingerprint database 226.

In some examples, communication module 222 may execute locally (e.g., atprocessors 240) to provide functions associated with receivingfingerprint representations and sending operational commands to smarthome devices. In some examples, communication module 222 may act as aninterface to a remote service accessible to server device 210. Forexample, communication module 222 may be an interface or applicationprogramming interface (API) to a remote server that receives fingerprintrepresentations and sends operational commands to smart home devices.

One or more storage components 248 within server device 210 may storeinformation for processing during operation of server device 210 (e.g.,server device 210 may store data accessed by modules 220 and 222 duringexecution at server device 210). In some examples, storage component 248is a temporary memory, meaning that a primary purpose of storagecomponent 248 is not long-term storage. Storage components 248 on serverdevice 210 may be configured for short-term storage of information asvolatile memory and therefore not retain stored contents if powered off.Examples of volatile memories include random access memories (RAM),dynamic random access memories (DRAM), static random access memories(SRAM), and other forms of volatile memories known in the art.

Storage components 248, in some examples, also include one or morecomputer-readable storage media. Storage components 248 in some examplesinclude one or more non-transitory computer-readable storage mediums.Storage components 248 may be configured to store larger amounts ofinformation than typically stored by volatile memory. Storage components248 may further be configured for long-term storage of information asnon-volatile memory space and retain information after power on/offcycles. Examples of non-volatile memories include magnetic hard discs,optical discs, floppy discs, flash memories, or forms of electricallyprogrammable memories (EPROM) or electrically erasable and programmable(EEPROM) memories. Storage components 248 may store program instructionsand/or information (e.g., data) associated with modules 220 and 222, andguest fingerprint database 226. Storage components 248 may include amemory configured to store data or other information associated withmodules 220 and 222, and guest fingerprint database 226.

Communication channels 250 may interconnect each of the components 212,240, 242, 244, 246, and 248 for inter-component communications(physically, communicatively, and/or operatively). In some examples,communication channels 250 may include a system bus, a networkconnection, an inter-process communication data structure, or any othermethod for communicating data.

One or more communication units 242 of server device 210 may communicatewith external devices via one or more wired and/or wireless networks bytransmitting and/or receiving network signals on one or more networks.Examples of communication units 242 include a network interface card(e.g., such as an Ethernet card), an optical transceiver, a radiofrequency transceiver, a GPS receiver, a radio-frequency identification(RFID) transceiver, a near-field communication (NFC) transceiver, or anyother type of device that can send and/or receive information. Otherexamples of communication units 242 may include short wave radios,cellular data radios, wireless network radios, as well as universalserial bus (USB) controllers.

One or more input components 244 of server device 210 may receive input.Examples of input are tactile, audio, and video input. Input components244 of server device 210, in one example, includes a presence-sensitiveinput device (e.g., a touch sensitive screen, a PSD), mouse, keyboard,voice responsive system, camera, microphone or any other type of devicefor detecting input from a human or machine. In some examples, inputcomponents 244 may include one or more sensor components (e.g., sensors252). Sensors 252 may include one or more biometric sensors (e.g.,fingerprint sensors, retina scanners, vocal input sensors/microphones,facial recognition sensors, cameras) one or more location sensors (e.g.,GPS components, Wi-Fi components, cellular components), one or moretemperature sensors, one or more movement sensors (e.g., accelerometers,gyros), one or more pressure sensors (e.g., barometer), one or moreambient light sensors, and one or more other sensors (e.g., infraredproximity sensor, hygrometer sensor, and the like). Other sensors, toname a few other non-limiting examples, may include a heart rate sensor,magnetometer, glucose sensor, olfactory sensor, compass sensor, or astep counter sensor.

One or more output components 246 of server device 210 may generateoutput in a selected modality. Examples of modalities may include atactile notification, audible notification, visual notification, machinegenerated voice notification, or other modalities. Output components 246of server device 210, in one example, includes a presence-sensitivedisplay, a sound card, a video graphics adapter card, a speaker, acathode ray tube (CRT) monitor, a liquid crystal display (LCD), a lightemitting diode (LED) display, an organic LED (OLED) display, avirtual/augmented/extended reality (VR/AR/XR) system, athree-dimensional display, or any other type of device for generatingoutput to a human or machine in a selected modality.

UIC 212 of server device 210 may include display component 202 andpresence-sensitive input component 204. Display component 202 may be ascreen, such as any of the displays or systems described with respect tooutput components 246, at which information (e.g., a visual indication)is displayed by UIC 212 while presence-sensitive input component 204 maydetect an object at and/or near display component 202.

While illustrated as an internal component of server device 210, UIC 212may also represent an external component that shares a data path withserver device 210 for transmitting and/or receiving input and output.For instance, in one example, UIC 212 represents a built-in component ofserver device 210 located within and physically connected to theexternal packaging of server device 210 (e.g., a screen on a mobilephone). In another example, UIC 212 represents an external component ofserver device 210 located outside and physically separated from thepackaging or housing of server device 210 (e.g., a monitor, a projector,etc. that shares a wired and/or wireless data path with server device210).

UIC 212 of server device 210 may detect two-dimensional and/orthree-dimensional gestures as input from a user of server device 210.For instance, a sensor of UIC 212 may detect a user's movement (e.g.,moving a hand, an arm, a pen, a stylus, a tactile object, etc.) within athreshold distance of the sensor of UIC 212. UIC 212 may determine a twoor three-dimensional vector representation of the movement and correlatethe vector representation to a gesture input (e.g., a hand-wave, apinch, a clap, a pen stroke, etc.) that has multiple dimensions. Inother words, UIC 212 can detect a multi-dimension gesture withoutrequiring the user to gesture at or near a screen or surface at whichUIC 212 outputs information for display. Instead, UIC 212 can detect amulti-dimensional gesture performed at or near a sensor which may or maynot be located near the screen or surface at which UIC 212 outputsinformation for display.

Server device 210 may be included in system 102 of FIG. 1 , such as byreplacing or supplementing server device 110. As such, additionalreference to certain elements of FIG. 1 will follow as they wouldinteract with a device such as server device 210, although server device210 may also interact with additional devices not shown in FIG. 1 .

In accordance with the techniques described herein, a doorbell device,such as doorbell device 104, may detect, using a fingerprint sensor,such as fingerprint sensor 106, a touch input from a first digit of afirst guest. Fingerprint sensor 106 may capture a representation of afingerprint of the first digit of the first guest.

In some instances, fingerprint sensor 106 may comprise an opticalfingerprint sensor. When capturing the representation of the fingerprintof the first digit, fingerprint sensor 106 may, in response to detectingthe touch input of the first digit, capture a digital image of thefingerprint of the first digit of the first guest.

In other instances, fingerprint sensor 106 may be a capacitivefingerprint sensor. When capturing the representation of the fingerprintof the first digit, fingerprint sensor 106 may create an electrostaticfield near a conductive plate on doorbell device 104. In response todetecting the touch input of the first digit at the conductive plate,fingerprint sensor 106 or doorbell device 104 may measure a change inthe electrostatic field resulting from the touch input. Doorbell device104 or fingerprint sensor 106 may then create a digital image based onthe change in the electrostatic field resulting from the touch input,where the representation of the fingerprint of the first digit is thedigital image.

In response to capturing the representation of the fingerprint of thefirst digit, doorbell device 104 may transmit the representation of thefingerprint of the first digit to server device 210. Server device 210may receive the representation of the fingerprint using communicationmodule 222 and communication units 242.

In response to receiving the representation of the fingerprint of thefirst digit, fingerprint module 220 may compare the representation ofthe fingerprint of the first digit to one or more entries of guestfingerprint database 226 for a first user. A profile of the first userincludes an association with doorbell device 104, such as by indicatingthat the first user owns doorbell device 104 or is an authorized user tocontrol doorbell device 104. Entries of guest fingerprint database 226may include any one or more of a representation of an acceptedfingerprint for each trusted guest (including the first guest), anidentifier for each trusted guest (e.g., a name or a relation), and aset of one or more operational commands defined for each particularguest that server device 210 will send to each corresponding smart homedevice. In response to determining that the representation of thefingerprint of the first digit substantially matches a first entry ofguest fingerprint database 226 for the first user, communication module222 may send an operational command, such as an unlock command, to asmart home device, such as a computerized locking mechanism (e.g.,computerized locking mechanism 108 of FIG. 1 ). In some instances,communication module 222 may additionally output, to a mobile deviceassociated with the first user, a notification that the first guest hasaccessed the system, such as by unlocking computerized locking mechanism108. In response to receiving the operational command from communicationmodule 222, the smart home device may perform an action corresponding tothe operational command. For instance, computerized locking mechanism108 may change from a locked state to an unlocked state.

Other smart home devices that communication module 222 may controlinclude, for instance, any one or more of a thermostat, a lightingstructure, a security panel, a security monitoring device, a householdappliance, an entertainment device, and a wireless internet router,among other things. For instance, when the smart home device includes athermostat, the operational command may include setting the thermostatto a particular temperature, turning on heat or air conditioning, or anyother operation typically performed by a thermostat.

When smart home device includes a lighting structure, the operationalcommand may include turning on a light or set of lights, turning off alight or set of lights, turning on a ceiling fan, setting a brightnesslevel of a light, or any other operation typically performed by alighting structure.

When smart home device includes a security panel, the operationalcommand may include turning off a home security system or any otheroperation typically performed by a security panel.

When smart home device includes a security monitoring device, such as acamera device, a motion sensor, or a contact sensor the operationalcommand may include activating the security monitoring device,deactivating the security monitoring device, or any other operationtypically performed by a security monitoring device.

When smart home device includes a household appliance, such as a washingmachine, a dishwasher, a coffee maker, a robotic vacuum cleaner, or anyother typical household appliance that connects to a network, theoperational command may include turning on or off any operationtypically performed by a household appliance.

When smart home device includes an entertainment device, such as a smartspeaker, a television set, a cable box, a gaming console, or a streamingbox, the operational command may include turning the entertainmentdevice on or off, setting the entertainment device to a particularchannel or streaming application, turning on a particular program ormusic playlist, or any other operation typically performed by anentertainment device.

When smart home device includes a wireless internet router, theoperational command may include turning on a wireless broadcast, turningoff a wireless broadcast, turning on a guest network, or any otheroperation typically performed by a wireless internet router.

In some instances, the first entry for guest fingerprint database 226may further include a personalized tone for the first guest. Rather thanplaying a typical or default doorbell chime, communication module 222may instead output, for playback at one or more audio output devices inor around the home, the personalized tone.

Server device 210 may operate in a different manner in othercircumstances, such as when the corresponding entry in guest fingerprintdatabase 226 contains different operational commands or is not presentat all in guest fingerprint database 226. For instance, when the secondguest is not in guest fingerprint database 226, fingerprint sensor 106may detect a touch input from a second digit of a second guest differentthan the first guest and capture a representation of a fingerprint ofthe second digit. In response to capturing the representation of thefingerprint of the second digit, doorbell device 104 may transmit therepresentation of the fingerprint of the second digit to server device210 and communication module 222. In response to receiving therepresentation of the fingerprint of the second digit at communicationmodule 222, fingerprint module 220 may compare the representation of thefingerprint of the second digit to the one or more entries of guestfingerprint database 226 for the first user. In response to fingerprintmodule 220 determining that the representation of the fingerprint of thesecond digit does not substantially match any of the one or more entriesof guest fingerprint database 226 for the first user, communicationmodule 220 may send a camera activation command to doorbell device 104.Doorbell device 104 may, in response to receiving the camera activationcommand from communication module 220, activate a camera operativelyconnected to doorbell device 104.

In another instance, the operational command itself may restrict accessfor the guest. In such instances, fingerprint sensor 106 may detect atouch input from a second digit of a second guest different than thefirst guest and capture a representation of a fingerprint of the seconddigit. In response to capturing the representation of the fingerprint ofthe second digit, doorbell device 104 may transmit the representation ofthe fingerprint of the second digit to server device 210 andcommunication module 222. In response to receiving the representation ofthe fingerprint of the second digit at communication module 222,fingerprint module 220 may compare the representation of the fingerprintof the second digit to the one or more entries of guest fingerprintdatabase 226 for the first user. In response to fingerprint module 220determining that the representation of the fingerprint of the seconddigit substantially matches a second entry of guest fingerprint database226 for the first user, fingerprint module 220 may determine that thesecond entry includes a second set of one or more commands that includessending a camera activation command to the doorbell device.Communication module 222 may send the camera activation command todoorbell device 104, which may, in response to receiving the cameraactivation command from communication module 222, activate a cameraoperatively connected to doorbell device 104. In this instance,computerized locking mechanism 108 may remain in the locked state, evenafter doorbell device 104 activates the camera. This may be because theuser does not wish to provide that particular guest with access to theirhome.

In a similar scenario with an unwanted guest, while computerized lockingmechanism 108 is in the locked state, computerized locking mechanism 108may include motion, contact, or pressure sensors that detect that asecond guest is attempting to open a door controlled by computerizedlocking mechanism 108. In response to detecting that the second guest isattempting to open the door controlled by computerized locking mechanism108 while it is in the locked state, computerized locking mechanism 108may send an indication of an unexpected entry attempt to server device210 and communication module 222. In such instances, communicationmodule 222 may, in response to receiving the indication of theunexpected entry attempt, output, to a mobile device associated with thefirst user, an alert warning the user of the unexpected entry attempt.

In still some instance, the second guest may be a new acquaintance orcontact that the user wishes to add to guest fingerprint database 226.In such instances, fingerprint sensor 106 may detect a touch input froma second digit of a second guest different than the first guest andcapture a representation of a fingerprint of the second digit. Inresponse to capturing the representation of the fingerprint of thesecond digit, doorbell device 104 may transmit the representation of thefingerprint of the second digit to server device 210 and communicationmodule 222. In response to receiving the representation of thefingerprint of the second digit at communication module 222, fingerprintmodule 220 may compare the representation of the fingerprint of thesecond digit to the one or more entries of guest fingerprint database226 for the first user. In response to fingerprint module 220determining that the representation of the fingerprint of the seconddigit does not substantially match any of the one or more entries ofguest fingerprint database 226 for the first user, communication module220 may issue a prompt to a mobile device associated with the first userto add an entry to guest fingerprint database 226. The new entry maythen include at least the representation of the fingerprint of thesecond digit received by communication module 220 and a set of one ormore operational commands for the second guest.

Using the techniques described herein, a homeowner or trusted user of asmart home ecosystem can securely and simply grant immediate and limitedaccess to a variety of smart home devices in a manner explicitlycustomized by the trusted user. With trusted guests, such as familymembers or close friends, the user can adjust various devices within thehome to operate in accordance with the trusted guests' preferred manner,providing quick and consistent comfort and efficiency to those trustedusers whenever they wish to enter the home. With less casual guests whorequire access to the home, such as cleaning crews or dogwalkers, theuser can customize the setup to unlock the door, potentially turn onpreferred playlists of music for when they are conducting business withthe home, and possibly turning on security cameras within the home tomonitor their presence.

Furthermore, when the user wishes for that guest to no longer have thataccess, the user can remove or edit the entry for that guest withoutdisrupting every other user and/or guest who accesses the home. Forinstance, if the user's dogwalker finds different employment and theuser needs to find a new dogwalker, the user can revoke access from theprevious dogwalker and add access to the new dogwalker, editing onlytheir experience without requiring security changes to every otherguest. Furthermore, the separation of processes between the doorbell,the server, and the smart home device creates added stability, security,and consistency with the more trusted infrastructure over the networkwhich those devices communicate.

FIG. 3 is a conceptual diagram illustrating guest 316 accessing smarthome ecosystem 302 using a fingerprint sensor on doorbell device 304, inaccordance with the techniques described herein. Smart home ecosystem302 may include doorbell device 304, computerized locking mechanism 308,server device 310, and network 312, which may be substantially similarto doorbell device 104, computerized locking mechanism 108, serverdevice 110, and network 112, respectively. Smart home ecosystem 302 mayalso include additional smart home devices, such as security panel 318,thermostat 320, and smart speaker 322, although other examples of smarthome ecosystem 302 could include additional or different devices, suchas a lighting structure, a security monitoring device (e.g., motionsensors, contact sensors, or a security camera), a household appliance,an alternative entertainment device, and a wireless internet router,among other things.

Guest 316, as defined throughout this description, may be any individualprogrammed to have access to smart home ecosystem 302. For instance,guest 316 may be a user or owner of smart home ecosystem 302, a familymember of the user or owner of smart home ecosystem 302, a friend of theuser or owner of smart home ecosystem 302, an employee of the user orowner of smart home ecosystem 302, or any other acquaintance, personal,business, or otherwise, of the user or owner of smart home ecosystem302. As such, guest 316 may be any individual attempting to access smarthome ecosystem 302 or the home that contains smart home ecosystem 302.In other words, while the term “guest” is used throughout thisdisclosure, the term may, in addition to non-users or non-owners, referto the user which owns or operates the smart home devices, including theuser that would be notified of the attempted access.

In the example of FIG. 3 , guest 316 may approach doorbell device 304.In some instances, a motion sensor or camera within doorbell device 304may detect the motion of guest 316 as guest 316 approaches doorbelldevice 304. With the detected motion, a camera within doorbell device,in some instances, may activate, and a user associated with smart homeecosystem 302 (which may or may not be guest 316) may be notified of thepresence of guest 316, such as through a typical notification API.

Guest 316 may place a digit on a fingerprint sensor of doorbell device304. The fingerprint sensor, be it an optical sensor a capacitivesensor, an ultrasound sensor, or a thermal sensor, captures arepresentation of the fingerprint and sends the representation to serverdevice 310 via network 312 for verification. Server device 310 maycompare the representation of the fingerprint to stored, trustedrepresentations of fingerprints for various trusted individuals. If acertain percentage of the received representation matches a stored,trusted representation, server device 310 may declare the receivedrepresentation to be a match with that respective entry in the guestfingerprint database. For instance, if a minutiae-based analysis (i.e.,comparing locations and directions of various points of the fingerprint,which may be sometimes referred to as “Galton Points”), a fingerprintmay have anywhere between 20 and 30 minutiae, and the fingerprints maymatch if more than 10 minutiae are in common between the receivedrepresentation and the stored representation. In a pattern matchinganalysis, the received representation may match the storedrepresentation if a comparative image analysis considers the tworepresentations to be more than a percentage similar (e.g., more than40% similar, 50% similar, 75% similar, 90% similar, 99% similar, or anyother reasonable threshold).

If server device 310 finds a match for the received fingerprintrepresentation, server device 310 may further refer to thatcorresponding entry of the matched representation to determine whichactions have been defined for that particular individual. In someinstances, this could be unlocking computerized locking mechanism 308.In other instances, computerized locking mechanism 308 may remainlocked, and a user/owner of smart home ecosystem 302 may be notified oftheir presence and prompted to start a video chat with guest 316. Instill other instances, additional operational commands may be stored inguest fingerprint database for controlling other smart home devices,such as starting to stream a playlist of music over smart speaker 322,or adjusting thermostat 320 to control an HVAC system to a particulartemperature.

If server device 310 does not find a match for the received fingerprintrepresentation, server device 310 may perform a variety of actions. Insome instances, server device 310 may send doorbell device 304 a commandto activate a camera in doorbell device and send a notification to amobile device associated with the user to notify the user of thepresence of guest 316 and their lack of a trusted status. In otherinstances, server device 310 may send a prompt to the mobile deviceassociated with the user to add guest 316 and their captured fingerprintrepresentation to the guest fingerprint database, along with a set ofone or more operational commands to perform when server device 310verifies the identity of guest 316 at the home.

After verifying the identity of guest 316, server device 310 may sendthe operational commands stored along with the guest database entry tothe corresponding smart home devices. In some instances, if those smarthome devices are manufactured by a third-party that is different thanthe manufacturer or brand of doorbell device 304 and server device 310,the third-party may require that remote commands sent to those devicesgo through third-party cloud 314. While other third-party manufacturersmay allow direct communication over network 312, if the third-party doesrequire communication through third-party cloud 314, server device 310may send the operational command to third-party cloud 314 via network312. Third-party cloud 314 may then forward the operational command tothe corresponding smart home device. In other instances, server device310 may send the operational command directly to the corresponding smarthome device via network 312.

In one example, server device 310 may identify guest 316 as a dogwalkerfor the user. As such, server device 310 may send an unlock command tocomputerized lock mechanism 308, enabling guest 316 to open door 314 andenter the home. Server device 310 may also send an operational commandto an entryway light to turn on so that guest 316 may retrieve the doglocated inside of the home and take them for the walk.

In another example, server device 310 may identify guest 316 as a memberof a cleaning crew who comes weekly to clean the user's home. As such,server device 310 may send an unlock command to computerized lockmechanism 308, enabling guest 316 to open door 314 and enter the home.Server device 310 may also send an operational command to all of thelights on the entry level of the home to turn on, and may set smartspeaker 322 to a particular playlist that the user knows the cleaningcrew member enjoys listening to while they clean the user's home, whilealso sending a command to a security camera inside the home to beginmonitoring the cleaning crew member's actions in the home.

In yet another example, server device 310 may identify guest 316 as theuser's girlfriend. As such, server device 310 may send an unlock commandto computerized lock mechanism 308, enabling guest 316 to open door 314and enter the home. Server device 310 may also send an operationalcommand to thermostat 320 to turn on the heat to 70 degrees Fahrenheit,an operational command to security panel 318 to turn off the homesecurity system, and an operational command to a television set to turnon and be set to guest 316's favorite streaming application. This entryfor guest 316 may also include a personalized doorbell tone for guest316, such as playing a romantic ballad or a smooth jazz ditty in lieu ofa typical or default doorbell chime. As such, server device 310 mayfurther output the personalized tone at an audio output device attachedto doorbell device 304 in response to validating the identity of guest316.

In yet another example, server device 310 may identify guest 316 as theuser him or herself. The user may set up a profile for themselves in theguest fingerprint database so that smart home ecosystem 302 is set totheir preferences upon returning home from work or a personal excursion.For instance, server device 310 may send an unlock command tocomputerized lock mechanism 308 to unlock. Server device 310 may alsosend an operational command to thermostat 320 to turn on the airconditioning to 64 degrees Fahrenheit, an operational command tosecurity panel 318 to turn off the home security system, an operationalcommand to the living room light to turn on to 50% intensity, and anoperational command to a connected coffee pot to begin brewing a cup ofcoffee.

FIG. 4 is a flow diagram chart illustrating an example method forverifying a guest using a fingerprint sensor on a doorbell device inorder to control one or more smart home devices, in accordance with thetechniques described herein. The techniques of FIG. 4 may be performedby one or more processors of a computing device, such as system 102 ofFIG. 1 and/or server device 210 illustrated in FIG. 2 . For purposes ofillustration only, the techniques of FIG. 4 are described within thecontext of system 102 of FIG. 1 , although computing devices havingconfigurations different than that of system 102 (e.g., different smarthome devices other than computerized locking mechanism 108) may performthe techniques of FIG. 4 .

In accordance with the techniques described herein, fingerprint sensor106 of doorbell device 104 detects a touch input from a first digit of afirst guest (402). Fingerprint sensor 106 captures a representation of afingerprint of the first digit of the first guest (404). In response tocapturing the representation of the fingerprint of the first digit,doorbell device 104 transmits the representation of the fingerprint ofthe first digit to a server device (406).

In response to receiving the representation of the fingerprint of thefirst digit, server device 110 compares the representation of thefingerprint of the first digit to one or more entries of a guestfingerprint database for a first user (408), where a profile of thefirst user includes an association with the doorbell device. In responseto determining that representation of the fingerprint of the first digitsubstantially matches a first entry of the guest fingerprint databasefor the first user, server device 110 sends an operational command to asmart home device (410), such as computerized locking mechanism 108,separate from the doorbell device and located at a same premises as thedoorbell device. In response to receiving the operational command fromthe server device, the smart home device (e.g., computerized lockingmechanism 108, or other devices such as security panel 318, thermostat320, or smart speaker 322) perform an action corresponding to theoperational command (412).

It is to be recognized that depending on the example, certain acts orevents of any of the techniques described herein can be performed in adifferent sequence, may be added, merged, or left out altogether (e.g.,not all described acts or events are necessary for the practice of thetechniques). Moreover, in certain examples, acts or events may beperformed concurrently, e.g., through multi-threaded processing,interrupt processing, or multiple processors, rather than sequentially.

In one or more examples, the functions described may be implemented inhardware, software, firmware, or any combination thereof. If implementedin software, the functions may be stored on or transmitted over as oneor more instructions or code on a computer-readable medium and executedby a hardware-based processing unit. Computer-readable media may includecomputer-readable storage media, which corresponds to a tangible mediumsuch as data storage media, or communication media including any mediumthat facilitates transfer of a computer program from one place toanother, e.g., according to a communication protocol. In this manner,computer-readable media generally may correspond to (1) tangiblecomputer-readable storage media which is non-transitory or (2) acommunication medium such as a signal or carrier wave. Data storagemedia may be any available media that can be accessed by one or morecomputers or one or more processors to retrieve instructions, codeand/or data structures for implementation of the techniques described inthis disclosure. A computer program product may include acomputer-readable medium.

By way of example, and not limitation, such computer-readable storagemedia can comprise RAM, ROM, EEPROM, CD-ROM or other optical diskstorage, magnetic disk storage, or other magnetic storage devices, flashmemory, or any other medium that can be used to store desired programcode in the form of instructions or data structures and that can beaccessed by a computer. Also, any connection is properly termed acomputer-readable medium. For example, if instructions are transmittedfrom a website, server, or other remote source using a coaxial cable,fiber optic cable, twisted pair, digital subscriber line (DSL), orwireless technologies such as infrared, radio, and microwave, then thecoaxial cable, fiber optic cable, twisted pair, DSL, or wirelesstechnologies such as infrared, radio, and microwave are included in thedefinition of medium. It should be understood, however, thatcomputer-readable storage media and data storage media do not includeconnections, carrier waves, signals, or other transitory media, but areinstead directed to non-transitory, tangible storage media. Disk anddisc, as used herein, includes compact disc (CD), laser disc, opticaldisc, digital versatile disc (DVD), floppy disk and Blu-ray disc, wheredisks usually reproduce data magnetically, while discs reproduce dataoptically with lasers. Combinations of the above should also be includedwithin the scope of computer-readable media.

Instructions may be executed by one or more processors, such as one ormore digital signal processors (DSPs), general purpose microprocessors,application specific integrated circuits (ASICs), field programmablelogic arrays (FPGAs), or other equivalent integrated or discrete logiccircuitry. Accordingly, the term “processor,” as used herein may referto any of the foregoing structure or any other structure suitable forimplementation of the techniques described herein. In addition, in someaspects, the functionality described herein may be provided withindedicated hardware and/or software modules configured for encoding anddecoding, or incorporated in a combined codec. Also, the techniquescould be fully implemented in one or more circuits or logic elements.

The techniques of this disclosure may be implemented in a wide varietyof devices or apparatuses, including a wireless handset, an integratedcircuit (IC) or a set of ICs (e.g., a chip set). Various components,modules, or units are described in this disclosure to emphasizefunctional aspects of devices configured to perform the disclosedtechniques, but do not necessarily require realization by differenthardware units. Rather, as described above, various units may becombined in a codec hardware unit or provided by a collection ofinteroperative hardware units, including one or more processors asdescribed above, in conjunction with suitable software and/or firmware.

Various examples of the disclosure have been described. Any combinationof the described systems, operations, or functions is contemplated.These and other examples are within the scope of the following claims.

What is claimed is:
 1. A system comprising: a computerized lockingmechanism in a locked state; a server device comprising one or moreprocessors; and a doorbell device separate from the computerized lockingmechanism, the doorbell device comprising a fingerprint sensor, andwherein the doorbell device is configured to: detect, using thefingerprint sensor, a touch input from a first digit of a first guest;capture, using the fingerprint sensor, a representation of a fingerprintof the first digit of the first guest; and in response to capturing therepresentation of the fingerprint of the first digit, transmit therepresentation of the fingerprint of the first digit to the serverdevice, wherein the one or more processors of the server device areconfigured to: in response to receiving the representation of thefingerprint of the first digit, compare the representation of thefingerprint of the first digit to one or more entries of a guestfingerprint database, wherein a profile for the guest fingerprintdatabase includes an association with the doorbell device; and inresponse to determining that the representation of the fingerprint ofthe first digit substantially matches a first entry of the guestfingerprint database, send an unlock command to the computerized lockingmechanism, wherein the first entry for the guest fingerprint databasecomprises: a representation of an accepted fingerprint for the firstguest, an identifier for the first guest, and a first set of one or moreoperational commands that includes sending the unlock command to thecomputerized locking mechanism, wherein the first set of one or moreoperational commands does not include sending a camera activationcommand to the doorbell device, wherein the computerized lockingmechanism is configured to: in response to receiving the unlock commandfrom the server device, change to an unlocked state, wherein thedoorbell device is further configured to: detect, using the fingerprintsensor, a touch input from a second digit of a second guest differentthan the first guest; capture, using the fingerprint sensor, arepresentation of a fingerprint of the second digit; and in response tocapturing the representation of the fingerprint of the second digit,transmit the representation of the fingerprint of the second digit tothe server device, wherein the one or more processors of the serverdevice are further configured to: in response to receiving therepresentation of the fingerprint of the second digit, compare therepresentation of the fingerprint of the second digit to the one or moreentries of the guest fingerprint database; in response to determiningthat the representation of the fingerprint of the second digitsubstantially matches a second entry of the guest fingerprint database,determining that the second entry includes a second set of one or morecommands that includes sending a camera activation command to thedoorbell device; and send the camera activation command to the doorbelldevice, and wherein the doorbell device is further configured to: inresponse to receiving the camera activation command from the serverdevice, activate a camera operatively connected to the doorbell device.2. The system of claim 1, wherein the system further comprises a smarthome device separate from each of the doorbell device and thecomputerized locking mechanism, and wherein the one or more processorsof the server device are further configured to: in response todetermining that the representation of the fingerprint of the firstdigit substantially matches the first entry of the guest fingerprintdatabase, send an operational command to the smart home device, whereinthe smart home device is configured to: in response to receiving theoperational command from the server device, perform an actioncorresponding to the operational command.
 3. The system of claim 2,wherein the smart home device comprises one of a thermostat, a lightingstructure, a security panel, a security monitoring device, a householdappliance, an entertainment device, and a wireless internet router. 4.The system of claim 1, wherein the fingerprint sensor comprises anoptical fingerprint sensor, and wherein the doorbell device beingconfigured to capture the representation of the fingerprint of the firstdigit comprises the doorbell device being configured to: in response todetecting the touch input of the first digit, capture, using the opticalfingerprint sensor, a digital image of the fingerprint of the firstdigit of the first guest.
 5. The system of claim 1, wherein thefingerprint sensor comprises a capacitive fingerprint sensor, andwherein the doorbell device being configured to capture therepresentation of the fingerprint of the first digit comprises thedoorbell device being configured to: create, using the capacitivefingerprint sensor, an electrostatic field near a conductive plate onthe doorbell device; in response to detecting the touch input of thefirst digit at the conductive plate, measure a change in theelectrostatic field resulting from the touch input; and create a digitalimage based on the change in the electrostatic field resulting from thetouch input, wherein the representation of the fingerprint of the firstdigit comprises the digital image.
 6. The system of claim 1, wherein thedoorbell device is further configured to: detect, using the fingerprintsensor, a touch input from a second digit of a second guest differentthan the first guest; capture, using the fingerprint sensor, arepresentation of a fingerprint of the second digit; and in response tocapturing the representation of the fingerprint of the second digit,transmit the representation of the fingerprint of the second digit tothe server device, wherein the one or more processors of the serverdevice are further configured to: in response to receiving therepresentation of the fingerprint of the second digit, compare therepresentation of the fingerprint of the second digit to the one or moreentries of the guest fingerprint database; and in response todetermining that the representation of the fingerprint of the seconddigit does not substantially match any of the one or more entries of theguest fingerprint database, send a camera activation command to thedoorbell device, wherein the doorbell device is further configured to:in response to receiving the camera activation command from the serverdevice, activate a camera operatively connected to the doorbell device.7. The system of claim 1, wherein the computerized locking mechanismremains in the locked state after the doorbell device activates thecamera.
 8. The system of claim 1, wherein the one or more processors ofthe server device are further configured to: output, to a mobile deviceassociated with the profile, a notification that the first guest hasunlocked the computerized locking mechanism.
 9. The system of claim 1,wherein the first entry for the guest fingerprint database comprises apersonalized tone for the first guest, wherein the one or moreprocessors of the server device are further configured to: output, forplayback at one or more audio output devices, the personalized tone. 10.The system of claim 1, wherein the computerized locking mechanism isfurther configured to: while the computerized locking mechanism is inthe locked state, detect that a second guest is attempting to open adoor controlled by the computerized locking mechanism; and in responseto detecting that the second guest is attempting to open the doorcontrolled by the computerized locking mechanism, send an indication ofan unexpected entry attempt to the server device, wherein the one ormore processors of the server device are further configured to: inresponse to receiving the indication of the unexpected entry attempt,output, to a mobile device associated with the profile, an alert. 11.The system of claim 1, wherein the doorbell device is further configuredto: detect, using the fingerprint sensor, a touch input from a seconddigit of a second guest different than the first guest; capture, usingthe fingerprint sensor, a representation of a fingerprint of the seconddigit; and in response to capturing the representation of thefingerprint of the second digit, transmit the representation of thefingerprint of the second digit to the server device, wherein the one ormore processors of the server device are further configured to: inresponse to receiving the representation of the fingerprint of thesecond digit, compare the representation of the fingerprint of thesecond digit to the one or more entries of the guest fingerprintdatabase; and in response to determining that the representation of thefingerprint of the second digit does not substantially match any of theone or more entries of the guest fingerprint database, issue a prompt toa mobile device associated with the profile to add a second entry to theguest fingerprint database, the second entry including at least therepresentation of the fingerprint of the second digit and a set of oneor more operational commands for the second guest.
 12. A methodcomprising: detecting, by fingerprint sensor of a doorbell device, atouch input from a first digit of a first guest; capturing, by thefingerprint sensor, a representation of a fingerprint of the first digitof the first guest; in response to capturing the representation of thefingerprint of the first digit, transmitting, by the doorbell device,the representation of the fingerprint of the first digit to a serverdevice; in response to receiving the representation of the fingerprintof the first digit, comparing, by the server device, the representationof the fingerprint of the first digit to one or more entries of a guestfingerprint database, wherein a profile for the guest fingerprintdatabase includes an association with the doorbell device; in responseto determining that representation of the fingerprint of the first digitsubstantially matches a first entry of the guest fingerprint database,sending an operational command to a smart home device separate from thedoorbell device and located at a same premises as the doorbell device,wherein the first entry for the guest fingerprint database comprises: arepresentation of an accepted fingerprint for the first guest, anidentifier for the first guest, and a first set of one or moreoperational commands that includes sending the operational command tothe smart home device, wherein the first set of one or more operationalcommands does not include sending a camera activation command to thedoorbell device; in response to receiving the operational command fromthe server device, performing, by the smart home device, an actioncorresponding to the operational command; detecting, by the fingerprintsensor, a touch input from a second digit of a second guest differentthan the first guest; capturing, by the fingerprint sensor, arepresentation of a fingerprint of the second digit; and in response tocapturing the representation of the fingerprint of the second digit,transmitting, by the doorbell device, the representation of thefingerprint of the second digit to the server device, in response toreceiving the representation of the fingerprint of the second digit,comparing, by the server device, the representation of the fingerprintof the second digit to the one or more entries of the guest fingerprintdatabase; in response to determining that the representation of thefingerprint of the second digit substantially matches a second entry ofthe guest fingerprint database, determining, by the server device, thatthe second entry includes a second set of one or more commands thatincludes sending a camera activation command to the doorbell device;sending, by the server device, the camera activation command to thedoorbell device, and in response to receiving the camera activationcommand from the server device, activating, by the doorbell device, acamera operatively connected to the doorbell device.
 13. The method ofclaim 12, wherein the smart home device comprises one of a thermostat, alighting structure, a security panel, a security monitoring device, ahousehold appliance, an entertainment device, a wireless internetrouter, and a computerized lock.
 14. The method of claim 12, furthercomprising: outputting, by the server device, and to a mobile deviceassociated with the profile, a notification that the first guest hasaccessed the smart home device.
 15. The method of claim 12, furthercomprising: detecting, using the fingerprint sensor of the doorbelldevice, a touch input from a second digit of a second guest differentthan the first guest; capturing, using the fingerprint sensor of thedoorbell device, a representation of a fingerprint of the second digit;in response to capturing the representation of the fingerprint of thesecond digit, transmitting, by the doorbell device, the representationof the fingerprint of the second digit to the server device; in responseto receiving the representation of the fingerprint of the second digit,comparing, by the server device, the representation of the fingerprintof the second digit to the one or more entries of the guest fingerprintdatabase; and in response to determining that the representation of thefingerprint of the second digit does not substantially match any of theone or more entries of the guest fingerprint database, issuing, by theserver device, a prompt to a mobile device associated with the profileto add a second entry to the guest fingerprint database, the secondentry including at least the representation of the fingerprint of thesecond digit and a set of one or more operational commands for thesecond guest.
 16. A non-transitory computer-readable storage mediumcomprising instructions that, when executed by one or more processors ofa server device, cause the one or more processors to: receive, from adoorbell device comprising a fingerprint sensor, a representation of afingerprint of a first digit of a first guest; in response to receivingthe representation of the fingerprint of the first digit, compare therepresentation of the fingerprint of the first digit to one or moreentries of a guest fingerprint database, wherein a profile for the guestfingerprint database includes an association with the doorbell device;in response to determining that representation of the fingerprint of thefirst digit substantially matches a first entry of the guest fingerprintdatabase, send an unlock command to a computerized locking mechanism,wherein the first entry for the guest fingerprint database comprises: arepresentation of an accepted fingerprint for the first guest, anidentifier for the first guest, and a first set of one or moreoperational commands that includes sending the unlock command to thecomputerized locking mechanism, wherein the first set of one or moreoperational commands does not include sending a camera activationcommand to the doorbell device; receive, from the doorbell device, arepresentation of a fingerprint of a second digit of a second guest; inresponse to receiving the representation of the fingerprint of thesecond digit, compare the representation of the fingerprint of thesecond digit to the one or more entries of the guest fingerprintdatabase; in response to determining that the representation of thefingerprint of the second digit substantially matches a second entry ofthe guest fingerprint database, determining, by the server device, thatthe second entry includes a second set of one or more commands thatincludes sending a camera activation command to the doorbell device;sending, by the server device, the camera activation command to thedoorbell device.