Home security response using biometric and environmental observations

ABSTRACT

Various arrangements for handling a potential security situation using a home automation system are presented. A biometric measurement of a user may be received. An alert from a home automation device in wireless communication with the home automation host system may be received. If the biometric measurement is associated with the alert, a security response action may be performed.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/714,330, filed on Dec. 13, 2019, entitled “HOME SECURITY RESPONSEUSING BIOMETRIC AND ENVIRONMENTAL OBSERVATIONS,” which application is acontinuation of U.S. patent application Ser. No. 15/566,377, filed onOct. 13, 2017, entitled “HOME SECURITY RESPONSE USING BIOMETRIC ANDENVIRONMENTAL OBSERVATIONS,” now U.S. Pat. No. 10,580,265, issued Mar.3, 2020, which application is a U.S. National Stage of PCT InternationalApplication No. PCT/UA2015/000035, filed on Apr. 17, 2015, entitled“HOME SECURITY RESPONSE USING BIOMETRIC AND ENVIRONMENTAL OBSERVATIONS,”the disclosures of which are hereby incorporated by reference in theirentirety for all purposes.

BACKGROUND

Detecting home invasions, robberies, vandalism, burglaries, trespassing,and/or other security situations is typically performed using securitydevices such as cameras, microphones, motion detectors, and alarmsystems. Solely relying on such devices can result in a significantnumber of false alarms, possibly resulting in wasted time and/orresources in responding to the false alarms. Worse still, if a highnumber of false alarms occur, alarms may start to be ignored,effectively eliminating the security present at a structure. Forinstance, animal activity near a structure can trigger motion detectorsor a door left ajar can trigger an alarm system. Before taking action inresponse to a possible security situation, it may be useful to determinewith a high level of probability that an actual security situation ispresent.

SUMMARY

Various systems, methods, devices, and computer-readable mediums arepresented for handling a potential security situation. In someembodiments, during a defined active monitoring time period, a biometricmeasurement of a user may be received, the biometric measurement of theuser exceeding a defined threshold value for the biometric measurement,wherein the biometric measurement of the user is associated with a firsttime. A security alert from a home automation device in wirelesscommunication with the home automation host system may be received,wherein the security alert is associated with a second time. The firsttime associated with the biometric measurement may be determined to bewithin a threshold time period of the second time associated with thesecurity alert received from the home automation device. In response todetermining the first time associated with the biometric measurement iswithin the threshold time period of the second time associated with thesecurity alert received from the home automation device, a securityresponse action may be performed.

Embodiments of such a system, method, device or computer-readable mediummay include one or more of the following features: The security responseaction may include the home automation host system transmitting amessage that causes a light to be illuminated, wherein the light servesas illumination for a room within a structure in which the homeautomation system is installed. The security response action may includepresenting, via a display device, a video feed from a camera thatcaptures video corresponding to a location of the security alert. Thesecurity response action may include contacting an emergency service.The security response action may include activating a televisionreceiver and a sound system that receives audio data from the televisionreceiver and transmitting, to the television receiver, an instruction tooutput sound by outputting at least one sound source selected from thegroup consisting of: a recorded television program, a recorded sound,and a live broadcast of a television channel. The security response mayinclude transmitting, to the television receiver, by the home automationhost system, a second instruction to set a defined volume level foroutputting sound via the sound system. The biometric measurement may bea heart rate and the defined threshold value is based on a measuredresting heart rate of the user. In some embodiments, a questionnaire isoutput via a presentation device, wherein the questionnaire presents anoption to the user as to how the home automation host system shouldrespond to the security alert if the biometric measurement of the userexceeds the defined threshold value for the biometric measurement. Insome embodiments, a message may be caused to be sent to a definedexternal contact, the defined external contact having been previouslydefined by the user.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of variousembodiments may be realized by reference to the following figures. Inthe appended figures, similar components or features may have the samereference label. Further, various components of the same type may bedistinguished by following the reference label by a dash and a secondlabel that distinguishes among the similar components. If only the firstreference label is used in the specification, the description isapplicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

FIG. 1 illustrates an embodiment of a home automation system.

FIG. 2 illustrates an embodiment of components of a home automation hostsystem that can perform various actions in response to an identifiedsecurity situation.

FIG. 3 illustrates an embodiment of a floor plan of a structure havingan installed home automation system.

FIG. 4 illustrates an embodiment of a presentation device showing aquestionnaire used to determine how the home automation host systemshould respond to various security situations.

FIG. 5 illustrates an embodiment of a method for handling a potentialsecurity situation using a home automation system.

FIG. 6 illustrates another embodiment of a method for handling apotential security situation using a home automation system.

FIG. 7 illustrates an embodiment of a computer system which may beincorporated as part of various computerized devices in a homeautomation system.

DETAILED DESCRIPTION

Information gathered by security-related devices in a home automationsystem can be used in conjunction with information gathered from one ormore biometric sensors that are monitoring a user to determine if abreak-in or other security threat is present. Individually, informationfrom security-related devices may be subject to occasional false alarm,such as by an animal triggering a motion sensor. Similarly, biometricinformation, such as heart rate, blood pressure, and brainwave patternsmay move in accordance with a user's dream pattern when asleep. However,if a security-related device detects a potential threat (e.g., by sound)and the user's biometric readings are elevated, there is a likelihoodthat these measurements are correlated and are resulting from the sametriggering event.

When a biometric reading exceeds a threshold level (referred to as abiometric alert) and a security threat (referred to as a security alert)has been detected by a home automation system, the home automationsystem may perform one or more response actions. The one or moreresponses taken can vary based on the user's preference. For instance,response actions can include: outputting sounds (e.g., by turning on atelevision, outputting content and turning the volume up), outputtingand/or recording security camera footage (e.g., camera footage from thevicinity of where the security alert was determined to occur may berecorded and/or output to a presentation device by the home automationhost system), contacting one or more emergency services (e.g., police,fire, ambulance, security guard, private security company, etc.),contacting one or more private contacts (e.g., a neighbor, a relative),turning on one or more lights (which serve as illumination for a room),locking one or more doors, shutting off lights (as opposed to turningthem on), responding to user voice commands to take requested actions(e.g., “turn on all lights”, “turn on all televisions”), flushing one ormore toilets (e.g., to generate sound), turning on the hot tub (e.g., togenerate sound), and/or turning on the sprinklers (e.g., sound, and tomark any criminal on property by making him wet). Other response actionsare also possible.

In some embodiments, a response can be performed by the home automationsystem in response to just biometric information gathered from a user.If it is determined that the user is awake, the current time is within acertain time period (e.g., between 1 AM-4 AM), and the user's biometricreadings are elevated (a biometric alert is detected), one or more ofthe previously detailed response actions may be taken by the homeautomation host system. Whether a security-device has detected apotential security threat within a threshold amount of time of theuser's elevated biometric information may affect the type of responsethat the home automation system performs. For instance, if only elevatedbiometric information triggers the response, a minor response may beperformed, such as turning on one or more lights (that serve asillumination for a room or outdoor area). But, if elevated biometricinformation is received within a threshold time of a security threatbeing detected by one or more home automation security devices, a moremajor response may be made, such as: turn one or more lights on, outputsound, and contact a security guard. The specific response may bedetermined based on a questionnaire that the user previously answeredthat defines how the home automation system will respond to particularsituations.

FIG. 1 illustrates an embodiment of a home automation system. A homeautomation system that includes multiple home automation devices and ahome automation host may be used in measuring biometric measurements ofa user and obtaining security information in and around a structure(e.g., home, building, office, warehouse, etc.). FIG. 1 illustrates anembodiment of a home automation system 100 hosted by a televisionreceiver (that serves at the home automation host system). Televisionreceiver 150 may be configured to receive television programming from asatellite-based television service provider; in other embodiments, otherforms of television service provider networks may be used, such as anIP-based network (e.g., fiber network), a cable based network, awireless broadcast-based network, etc.

Television receiver 150 may be configured to communicate with varioushome automation devices. The devices with which television receiver 150communicates may use different communication standards. For instance,one or more devices may use a ZigBee® communication protocol while oneor more other devices communicate with the television receiver using aZ-Wave® communication protocol. Other forms of wireless communicationmay be used by devices and the television receiver. For instance,television receiver 150 and one or more devices may be configured tocommunicate using a wireless local area network, which may use acommunication protocol such as IEEE 802.11.

In some embodiments, a separate device may be connected with televisionreceiver 150 to enable communication with home automation devices. Forinstance, communication device 152 may be attached to televisionreceiver 150. Communication device 152 may be in the form of a dongle.Communication device 152 may be configured to allow for Zigbee®,Z-Wave®, and/or other forms of wireless communication. The communicationdevice may connect with television receiver 150 via a USB port or viasome other type of (wired) communication port. Communication device 152may be powered by the television receiver or may be separately coupledwith a power source. In some embodiments, television receiver 150 may beenabled to communicate with a local wireless network and may usecommunication device 152 in order to communicate with devices that use aZigBee® communication protocol, Z-Wave® communication protocol, and/orsome other home wireless communication protocols.

Communication device 152 may also serve to allow additional componentsto be connected with television receiver 150. For instance,communication device 152 may include additional audio/video inputs(e.g., HDMI), a component, and/or a composite input to allow foradditional devices (e.g., Blu-ray players) to be connected withtelevision receiver 150. Such connection may allow video from suchadditional devices to be overlaid with home automation information.Whether home automation information is overlaid onto video may betriggered based on a user's press of a remote control button.

Regardless of whether television receiver 150 uses communication device152 to communicate with home automation devices, television receiver 150may be configured to output home automation information for presentationto a user via display device 160, which may be a television, monitor, orother form of device capable of presenting visual information. Suchinformation may be presented simultaneously with television programmingreceived by television receiver 150. Television receiver 150 may also,at a given time, output only television programming or only homeautomation information based on a user's preference. The user may beable to provide input to television receiver 150 to control the homeautomation system hosted by television receiver 150 or by overlay device151, as detailed below.

In some embodiments, television receiver 150 may not be used as a hostfor a home automation system. Rather, a separate device may be coupledwith television receiver 150 that allows for home automation informationto be presented to a user via display device 160. This separate devicemay be coupled with television receiver 150. In some embodiments, theseparate device is referred to as overlay device 151. Overlay device 151may serve as the home automation host system and may be configured tooverlay (or separately output) information, such as home automationinformation, onto a signal to be visually presented via display device160, such as a television. In some embodiments, overlay device 151 maybe coupled between television receiver 150, which may be in the form ofa set top box (STB), and display device 160, which may be a television,monitor, or other form of presentation device. In such embodiments,television receiver 150 may receive, decode, descramble, decrypt, store,and/or output television programming. Television receiver 150 may outputa signal, such as in the form of an HDMI signal. Rather than be directlyinput to display device 160, the output of television receiver 150 maybe input to overlay device 151. Overlay device 151 may receive the videoand/or audio output from television receiver 150. Overlay device 151 mayadd additional information to the video and/or audio signal receivedfrom television receiver 150. The modified video and/or audio signal maybe output to display device 160 for presentation. In some embodiments,overlay device 151 has an HDMI input and an HDMI output, with the HDMIoutput being connected to display device 160. To be clear, while FIG. 1illustrates lines illustrating communication between television receiver150 and various devices, it should be understood that such communicationmay exist, in addition or alternatively via communication device 152and/or with overlay device 151. It should be understood that all of thehome automation functions attributed to a home automation host in thisdocument can be performed by television receiver 150 (if enabled forhome automation) or by overlay device 151.

In some embodiments, television receiver 150 may be used to provide homeautomation functionality but overlay device 151 may be used to presentinformation via display device 160. It should be understood that thehome automation functionality detailed herein in relation to atelevision receiver may alternatively be provided via overlay device151. In some embodiments, overlay device 151 may provide home automationfunctionality and be used to present information via display device 160.Using overlay device 151 to present automation information via displaydevice 160 may have additional benefits. For instance, multiple devicesmay provide input video to overlay device 151. For instance, televisionreceiver 150 may provide television programming to overlay device 151, aDVD/Blu-Ray player may provide video overlay device 151, and a separateinternet-TV device may stream other programming to overlay device 151.Regardless of the source of the video/audio, overlay device 151 mayoutput video and/or audio that has been modified to include homeautomation information and output to display device 160. As such, insuch embodiments, regardless of the source of video/audio, overlaydevice 151 may modify the audio/video to include home automationinformation and, possibly, solicit for user input. For instance, in someembodiments, overlay device 151 may have four video inputs (e.g., fourHDMI inputs) and a single video output (e.g., an HDMI output). In otherembodiments, such overlay functionality may be part of televisionreceiver 150. As such, a separate device, such as a Blu-ray player, maybe connected with a video input of television receiver 150, thusallowing television receiver 150 to overlay home automation informationwhen content from the Blu-Ray player is being output to display device160.

Regardless of whether television receiver 150 is itself configured toprovide home automation functionality and output home automation inputfor display via display device 160 or such home automation functionalityis provided via overlay device 151, home automation information may bepresented by display device 160 while television programming is alsobeing presented by display device 160. For instance, home automationinformation may be overlaid or may replace a portion of televisionprogramming (e.g., broadcast content, stored content, on-demand content,etc.) presented via display device 160.

Television receiver 150 or overlay device 151 may be configured tocommunicate with one or more wireless devices, such as wireless device116. Wireless device 116 may represent a tablet computer, cellularphone, laptop computer, remote computer, or some other device throughwhich a user may desire to control home automation settings and viewhome automation information. Such a device also need not be wireless,such as a desktop computer. Television receiver 150, communicationdevice 152, or overlay device 151 may communicate directly with wirelessdevice 116, or may use a local wireless network, such as network 170.Wireless device 116 may be remotely located and not connected with asame local wireless network. Via the Internet, television receiver 150or overlay device 151 may be configured to transmit a notification towireless device 116 regarding home automation information. For instance,in some embodiments, a third-party notification server system, such asthe notification server system operated by Apple®, may be used to sendsuch notifications to wireless device 116.

In some embodiments, a location of wireless device 116 may be monitored.For instance, if wireless device 116 is a cellular phone, when itsposition indicates it has neared a door, the door may be unlocked. Whenbedside (e.g., within a threshold distance) it may be assumed that theuser is in bed. Such a determination may also require a certain time ofday, such as between 10 PM and 5 AM. A user may be able to define whichhome automation functions are controlled based on a position of wirelessdevice 116. Other functions could include opening and/or closing agarage door, adjusting temperature settings, turning on and/or offlights, opening and/or closing shades, etc. Such location-based controlmay also take into account the detection of motion via one or moremotion sensors that are integrated into other home automation devicesand/or stand-alone motion sensors in communication with televisionreceiver 150.

In some embodiments, little to no setup of network 170 may be necessaryto permit television receiver 150 (or overlay device 151) to stream dataout to the Internet. For instance, television receiver 150 and network170 may be configured, via a service such as Sling® or other videostreaming service, to allow for video to be streamed from televisionreceiver 150 to devices accessible via the Internet. Such streamingcapabilities may be “piggybacked” to allow for home automation data tobe streamed to devices accessible via the Internet. For example, U.S.patent application Ser. No. 12/645,870, filed on Dec. 23, 2009, entitled“Systems and Methods for Remotely Controlling a Media Server via aNetwork”, which is hereby incorporated by reference, describes one suchsystem for allowing remote access and control of a local device. U.S.Pat. No. 8,171,148, filed Apr. 17, 2009, entitled “Systems and Methodsfor Establishing Connections Between Devices Communicating Over aNetwork”, which is hereby incorporated by reference, describes a systemfor establishing connection between devices over a network. U.S. patentapplication Ser. No. 12/619,192, filed May 19, 2011, entitled “Systemsand Methods for Delivering Messages Over a Network”, which is herebyincorporated by reference, describes a message server that providesmessages to clients located behind a firewall.

Wireless device 116 may serve as an input device for television receiver150. For instance, wireless device 116 may be a tablet computer thatallows text to be typed by a user and provided to television receiver150. Such an arrangement may be useful for text messaging, group chatsessions, or any other form of text-based communication. Other types ofinput may be received for the television receiver from a tablet computeror other device as shown in the attached screenshots, such as lightingcommands, security alarm settings and door lock commands. While wirelessdevice 116 may be used as the input device for typing text, televisionreceiver 150 may output for display text to display device 160.

In some embodiments, a cellular modem 153 may be connected with eitheroverlay device 151 or television receiver 150. Cellular modem 153 may beuseful if a local wireless network is not available. For instance,cellular modem 153 may permit access to the Internet and/orcommunication with a television service provider. Communication with atelevision service provider may also occur via a local wireless or wirednetwork connected with the Internet. In some embodiments, informationfor home automation purposes may be transmitted by a television serviceprovider system to television receiver 150 or overlay device 151 via thetelevision service provider's distribution network, which may includethe use of satellites.

Various home automation devices may be in communication with televisionreceiver 150 or overlay device 151. Such home automation devices may usedisparate communication protocols. Such home automation devices maycommunicate with television receiver 150 directly or via communicationdevice 152. Such home automation devices may be controlled by a userand/or have a status viewed by a user via display device 160 and/orwireless device 116. Further, at least some of such home automationdevices may be security-related uses—such as monitoring for intruders.Home automation devices may include: door sensor 108, lock controller130 (which may be integrated with door sensor 108), smoke detector 109,carbon monoxide detector 115, home security system 107, pet door/feeder111, camera 112, window sensor 113, irrigation controller 132, weathersensor 106, shade controller 104, utility monitor 102, heath sensor 114,intercom 118, light controller 120, thermostat 122, leak detectionsensor 124, appliance controller 126, garage door controller 128,doorbell sensor 123, and VoIP controller 125.

At least some of these home automation devices may be used to monitorthe security of the structure in which they are installed. Relevant datatransmitted to the home automation host system may serve as a securityalert (that is, information that is relevant to security of thestructure). Security alerts may be gleaned from: door sensor 108, whichmay be used to determine when a door has been opened; lock controller130, which may be used to determine when a lock has been unlocked; smokedetector 109, which may be used to determine when smoke is present;carbon monoxide detector 115, which may be used to determine when carbonmonoxide is present; home security system 107, which may include one ormore window monitors, door monitors, motion sensors, microphones, and/orcameras that are used to monitor for an intrusion, motion, and/or sound;pet door/feeder 111, which may monitor for the pet door being opened;camera 112, which may monitor for motion or a person; window sensor 113,which may be used to determine if the window is opened; intercom 118and/or dedicated microphone 127, which may be used to monitor for soundsthrough the structure; garage door controller 128, which may be used todetermine if a garage door is opened; and doorbell sensor 123, which maybe used to determine if the doorbell is actuated. Other security relatedsensors also may be possible. All of the above information may berelevant to security, especially if received during a time when the useris typically sleeping, such as a user defined time period of 10 PM-5 AM;or a time when the user is determined to be sleeping (e.g., based on hislocation, the location of his mobile device, the state of lights withinthe structure and/or the room he is within, the user being determined tobe in bed with the lights off, etc.).

Additional forms of sensors not illustrated in FIG. 1 may also beincorporated as part of a home automation system. For instance, amailbox sensor may be attached to a mailbox to determine when mail ispresent and/or has been picked up. The ability to control one or moreshowers, baths, and/or faucets from television receiver 150, overlaydevice 151 and/or wireless device 116 may also be possible. Pool and/orhot tub monitors may be incorporated into a home automation system. Suchsensors may detect whether or not a pump is running, water temperature,pH level, a splash/whether something has fallen in, etc. Further,various characteristics of the pool and/or hot tub may be controlled viathe home automation system. In some embodiments, a vehicle dashcam mayupload or otherwise make video/audio available to television receiver150 (or overlay device 151) when within range. For instance, when avehicle has been parked within range of a local wireless network withwhich television receiver 150 is connected, video and/or audio may betransmitted from the dashcam to the television receiver for storageand/or uploading to a remote server.

Various biometric sensors 190 may be used to monitor a user. Suchbiometric sensors may be present on the user (e.g., by the user wearinga watch, pendant, bracelet, or other device that has one or morebiometric sensors on-board) or by such biometric sensors being installedin the vicinity of where the user will be present when the biometricreadings of the user are desired to be monitored. For instance, some ofbiometric sensors 190 may be mounted in the vicinity of the user's bed.Heart rate sensor 191 may monitor the user's heart rate. Movement sensor192 may monitor whether the user is moving (e.g., tossing and turning inbed). Blood pressure sensor 193 may monitor the user's blood pressure.Brainwave pattern sensor 195 may monitor an activity level of the user'sbrain (e.g., to identify sleep, REM sleep, being awake, etc.). Galvanicskin response sensor 194 may monitor the user's skin for sweat/dampness,which can be indicative of the user's emotional state (e.g.,nervousness, scared, calm, etc.). Other types of biometric sensors arealso possible. Such biometric sensors 190 may communicate, such aswirelessly, with the device serving as the home automation host system(e.g., television receiver 150 or overlay device 151) either directly orindirectly.

FIG. 2 illustrates an embodiment 200 of components of a home automationhost system that can perform various actions in response to anidentified security situation. Such components may be incorporated aspart of a television receiver, overlay device, or some other form ofdevice that functions as a home automation host system. The homeautomation host system may include: home automation query engine 201,security event engine 202, biometric engine 203, biometric thresholddatabase 204, event engine 205, defined responses database 206, andoutput interface 207. The components of embodiment 200 may beimplemented using specially-purposed hardware, firmware, and/or softwareexecuted by underlying hardware.

Home automation query engine 201 may serve to periodically querybiometric devices and/or home automation devices related to security forstatus updates. Biometric devices may determine when an anomalouscondition (a biometric alert) has occurred and may only respond to suchqueries when a measured biometric condition is above or below athreshold or outside a threshold range. In other embodiments, evaluationof the biometric condition is performed by biometric engine 203. In suchembodiments, in response to a query, a biometric device may respond withone or more most-recent biometric measurements that have been measured.The home automation host system may then determine whether a biometricalert is present based on the one or more measurements and storedthreshold or range data. Queries may be handled in a similar way forsecurity-related home automation devices: security-related homeautomation devices may determine when an anomalous condition hasoccurred and may only respond to such queries when a capturedsecurity-related home automation condition is above or below a thresholdor outside a threshold range. In some embodiments, rather than homeautomation query engine 201 querying biometric devices and/orsecurity-related home automation devices, such devices may periodicallytransmit information indicative of biometric measurements and securityconditions, respectively, to home automation query engine 201.

Security event engine 202 may analyze data received by home automationquery engine 201 from various home automation security devices. Securityevent engine 202 may determine if a security alert is present. Such adetermination may be paid based on the content of the data received byhome automation query engine 201 or by comparing the received data to athreshold value or other form of stored value by security event engine202. Similarly, biometric engine 203 may analyze data received by homeautomation query engine 201 from various biometric devices to determineif biometric alerts are present. Biometric engine 203 may determine if abiometric measurement of the user is elevated or otherwise outside of anormal range by comparing the biometric measurement to one or morestored values in biometric threshold database 204. Such stored valuesmay be based on an average for a person of similar height, weight, age,and gender or may be specific to the user, such as by measuring theuser's blood pressure or heart rate when the user is known to be atrest.

Security event engine 202 may transmit an indication of the securityalert to event engine 205 when such a security alert is identified.Similarly, biometric engine 203 may transmit a biometric alert to eventengine 205 when such a biometric alert is identified by biometric engine203. Event engine 205 may analyze data received from both security eventengine 202 and biometric engine 203. For instance, event engine 205 maydetermine when a security event and biometric event have happened withina defined time period of each other and, thus, are likely attributed toa same cause (e.g., a burglar breaking into the user's house). Dependingon the particular biometric measurement which triggered the biometricalert and/or the particular type of security alert, event engine 205 mayconsult defined responses database 206 to look up an appropriateresponse to be output. Entries in defined responses database 206 may bedefaults defined by a service provider and/or entries that are definedby the user when configuring the system.

Output interface 207 may receive an indication of a defined response tobe output. Output interface 207 may cause the content of the definedresponse forwarded by event engine 205 to be implemented. For instance,this may include output interface 207 interfacing with one or moretelecommunication networks and/or communicating with one or more homeautomation devices present within the structure (e.g., to turn on alight).

FIG. 3 illustrates an embodiment of a floor plan 300 of a structurehaving an installed home automation system. Present on floor plan 300are doors 312 (312-1, 312-2, and 312-3), walls, such as wall 311 (onlyone wall labeled for simplicity), and bed 332. Also present are homeautomation devices 320, 321, 322, 323, and 325. Biometric device 324 maybe either worn by user, attached to bed 332, or otherwise in thevicinity of bed 332 to monitor the user while he is asleep or attemptingto sleep. As an example, home automation device 320 may be a motiondetector. Information that can serve as security alert may betransmitted by home automation device 320 to home automation host system330 when motion is detected. Such information may only be transmittedduring particular times, such as during the night, when motion in thevicinity of door 312-1 is potentially suspicious. Home automation device325 may be a camera (possibly with an on-board microphone). When videois captured that includes motion or sound above a certain thresholdvolume is detected, information that may serve as a security alert maybe transmitted to home automation host system 330. Similar informationthat can serve as a security alert may be transmitted to home automationhost system 330 by home automation device 322. Such home automationdevices may be any of the security-related home automation devicesdetailed in relation to FIG. 1.

Biometric device 324 may also communicate with home automation hostsystem 330. Biometric device 324 may be configured to only transmitinformation to home automation host system 330 when a user is eitherwearing biometric device 324, is in the vicinity of biometric device324, or during a particular time of day such as when the user isexpected to be asleep or trying to sleep. Home automation host system330, which may be an overlay device or television receiver as detailedin relation to FIG. 1, may receive information from both home automationdevices and biometric devices, such as biometric device 324 and may usesuch information to determine when a potential security situation ispresent. As an example, if home automation host system 330 determinesthat a security situation is present, based on information received frombiometric device 324 and a home automation device, one action homeautomation host system 330 may take is to turn on a light, which may behome automation device 322.

FIG. 4 illustrates an embodiment of a display device 400 (which canrepresent display device 160 of FIG. 1) showing a questionnaire outputby a home automation host system used to determine how the homeautomation host system should respond to various security situations. Inthe illustrated embodiment, in table 420 a user is presented withvarious biometric states that correspond to biometric devices that theuser has configured to communicate with a home automation host system.In relation to the various biometric states, a user is presented withvarious indications of whether or not a security alert is present andthe type of security alert. Similarly, the types of security alerts maycorrespond to types of security alerts that can be detected by homeautomation devices that the user has installed in his home and isconfigured to communicate with the home automation host system. The usercan set a first action to take and, possibly, a follow-up, a secondaction to take after an amount of time (the amount of time is discussedin relation to option 434). In some embodiments, at least some of thedefined actions may be set as a default by the service provider. Theavailability of actions may be based on the types of home automationdevices that are in communication with the home automation host system.For instance, in table 420, a user may be presented with a drop-downmenu or other form of selection to select among actions to take that arepossible by the home automation devices that the user has installed andconfigured to communicate with the home automation host system. As anexample, turning on a light may only be presented as an option if theuser has installed a home automation enabled light. In some embodiments,turning on a presentation device and/or outputting sound via a soundsystem with a presentation device itself may always be an option if thehome automation host system is part of a television receiver or is incommunication with the television receiver.

While various combinations of biometric states (biometric alerts) arepresented in combination with various types of security alerts, itshould be understood that similar combinations may be presented informats other than as presented in table 420. For instance, a user maybe presented with a series of questions that can be used to gathersimilar information, such as “If your heartrate is elevated and movementis detected outside your home, what action would you like the homeautomation system to take?”

It could also be possible for the home automation host system to give auser recommendations on how to setup the system. For example, if theuser's structure does not have a motion detector as part of his homeautomation system, the questionnaire interface could recommend that theuser have one installed as a way to decrease a number of false alarms.As another example, the home automation host system could output forpresentation statistics on home invasions and what the most commonand/or effective way for configuring the home automation system todecrease such invasions. Such aspects could be beneficial for promotingsales of motion detectors and other home automation security devices.

Various options may be available to user to customize how security ishandled at the user structure by the home automation host system. Forinstance, active time period option 431 allows the user to define whenthe monitoring of security and biometric alerts will occur. Typically, auser may only want such information monitored at night when the user istypically sleeping. Adjust biometric thresholds option 432 may be usedto set or adjust the threshold used to determine when biometricmeasurements are outside of normal ranges. For instance, adjustbiometric thresholds option 432 may be used to define a number of beatsper minute (bpm), which, if the user's heart rate is above the definedbpm, indicates a biometric alert. Thresholds may be determined based onuser-defined values or by performing measurements on the user while atrest and increasing the rest measurements by a defined delta value. Forinstance, if the user's resting heart rate is 65 bpm, a delta value of25 bpm may be added to establish a threshold heart rate of 90 bpm foruse in determining when a biometric alert is present.

The interface may allow the user to set differing responses for when abiometric alert is identified that is unaccompanied by a security alert(and the reverse situation). For instance, if the user's heartrate isdetermined to be elevated, a response such as turning on a light may beused but if accompanied by a security alert within a threshold time ofthe biometric alert, a stronger response, such as making noise, turningon a television, and turning on a light may be used.

Set contacts option 433 may allow a user to define one or more otherpersons who are contacted as part of either a first or second action inresponse to a biometric alert and/or security alert. The user may bepermitted to specific a telephone number, email address, social mediaaccount, etc. that is contacted in response to a biometric alert and/orsecurity alert combination, such as presented in table 420.

If the user has several people listed in his contacts for emergencycontacts, geo-location of such individuals may be used to identify andclosest contact. For example, if the user has three people listed, suchas his father, brother and sister. His father lives closest, but is inNew York for a business trip as identified using geo-location. Hisbrother's phone is identified as in Florida, so the home automation hostsystem would end up contacting the sister—who, despite being 40 milesaway is still the closest contact.

Define time period between actions option 434 may allow the user tospecify an amount of time that elapses between when a first action istaken and a second action is taken. This may allow a user time todisable the system from performing the second action if the user doesnot desire such an action to be taken (e.g., the user is aware thatthere is no security situation). The time period between actions may bedefined to be times such as 20 seconds, 30 seconds, 1 minute, 5 minutes,etc.

Send log to service provider option 435 may allow information aboutbiometric alerts and security alerts to be transmitted to a serviceprovider. Such a service provider may store and/or analyze the receiveddata for patterns and may compare such data with data collected fromother users in the area.

FIG. 5 illustrates an embodiment of a method 500 for handling apotential security situation using a home automation system. Method 500may be performed using various home automation systems, such as the homeautomation systems detailed in relation to FIGS. 1-4. Each step ofmethod 500 may be performed by the home automation host system.

At block 510, a biometric measurement of the user may be received by thehome automation host system. The home automation host system maydetermine that the received biometric measurement exceeds a definedthreshold level specific to that type of biometric measurement. In someembodiments, rather than the home automation host system performing acomparison between the biometric measurement and the defined thresholdlevel, such an analysis may be performed by the biometric device itself.In such embodiments, the received biometric measurement may have beentransmitted due to the biometric measurement having been determined toexceed the defined threshold level. As a simple example, a biometricmeasurement of the user's heart rate may be made and may have a value of90 bpm. The value of 90 bpm may be determined to exceed the definedthreshold value of 87 bpm. As such, the value of 90 bpm may beinterpreted as being a biometric alert, that is a biometric measurementthat exceeds a defined threshold level or is otherwise outside of anormal range.

At block 520, a security alert from a home automation device may bereceived by the home automation host system. In some embodiments, thedata received from the home automation device is analyzed by the homeautomation host system to determine whether a security alert is present.In other embodiments, the home automation device itself analyzes thedata and determines that a security alert is present and transmitsindication of the security alert to the home automation host system.

At block 530, it is determined whether the biometric measurement ofblock 510 corresponds to a time within a defined threshold period oftime of the security alert of block 520. Therefore, if the biometricmeasurement is received (or measured) at a first time and the securityalert is received (or measured) at a second time, it is determinedwhether the first time is within a threshold time period of the secondtime. If it is not, it may be assumed that the biometric measurement ofblock 510 is unrelated to the security alert of block 520. If the firstand second times are within a threshold time period of each other, itmay be determined that the biometric measurement of block 510 is relatedto the security alert of block 520. As a simple example, the thresholdtime period may be 20 seconds; of course, threshold time periods thatare of shorter duration or longer duration are also possible.

At block 540, after the first time was determined to occur within thethreshold time period of the second time at block 530, one or moresecurity response actions may be performed. As an example, referringback to the interface of FIG. 4, if an elevated heart rate was detectedat block 510, and either sound or movement was detected as the type ofsecurity alert at block 520, and these two events were determined tooccur within a threshold period of time of each other, the securityresponse action may be to turn on a light, such as a light that isclosest to the user or where the sound was detected. After a definedtime period, if the user has not provided input to the home automationhost system to disable actions being performed, a second action may betaken, such as by outputting sound. Outputting sound may involve thehome automation host system turning on a sound system and/orpresentation device such that either recorded content or a livetelevision channel is output. The home automation host system may setthe volume to a user-defined level. If the home automation host systemis incorporated as part of a television receiver, no transmission ofdata external to the home automation host system may be necessary toactivate the television receiver and adjust the volume. If the homeautomation host system is external to the television receiver, such asan overlay device, either a wired or wireless data transmission may beused to activate the television receiver and adjust the volume to anappropriate level. If stored content is to be output, the user may bepermitted to define a particular piece of content or segment of a pieceof content to use. These selected segments of content may be selectedfor having scary or human sounds, such as animal noises or peopletalking. If a biometric alert or security alert was detected without acorresponding alert of the other type, the type of response performed bythe home automation host system may be different from the responseperformed if both types of alerts were detected within the thresholdperiod of time of each other.

FIG. 6 illustrates an embodiment of a method 600 for handling apotential security situation using a home automation system. Method 600may be performed using various home automation systems, such as the homeautomation systems detailed in relation to FIGS. 1-4. Each step ofmethod 600 may be performed by the home automation host system. Method600 may represent a more detailed embodiment of method 500 of FIG. 5.

At block 605, biometric and/or security monitoring may be activatedbased on the time of day and/or day of the week. A user may definedspecific times of the day and/or days of the week during which the homeautomation host system is actively monitoring for a biometric alertoccurring within a defined time of a security alert. For example,referring to the interface of FIG. 4, a user may set the active times aday and/or days of week via active time period option 431. In someembodiments, the home automation host system may monitor for whenbiometric and/or security monitoring should occur based on the location(e.g., in bed, on the couch) of the user and/or the user's activitylevel (e.g., if the user is stationary for an extended time, he islikely asleep).

At block 610, a biometric measurement of the user may be received by thehome automation host system. In some embodiments, the home automationhost system may determine that the received biometric measurementexceeds a defined threshold level specific to that type of biometricmeasurement. In other embodiments, rather than the home automation hostsystem performing a comparison between the biometric measurement and thedefined threshold level, such an analysis may be performed by thebiometric device itself; thus, the received biometric measurement mayserve as a biometric alert.

At block 620, a security alert from a home automation device may bereceived by the home automation host system. In some embodiments, thedata received from the home automation device is analyzed by the homeautomation host system to determine whether a security alert is present.In other embodiments, the home automation device itself analyzes thedata and determines that a security alert is present and transmitsindication of the security alert to the home automation host system.

At block 630, it is determined whether the biometric measurement ofblock 610 corresponds to a time within a defined threshold period oftime of the security alert of block 620. Therefore, if the biometricmeasurement is received (or measured) at a first time and the securityalert is received (or measured) at a second time, it is determinedwhether the first time is within a threshold time period of the secondtime. If it is not, it may be assumed that the biometric measurement ofblock 610 is unrelated to the security alert of block 620. If the firstand second times are within a threshold time period of each other, itmay be determined that the biometric measurement of block 610 is relatedto the security alert of block 620. As a simple example, the thresholdtime period may be 20 seconds; of course, threshold time periods thatare of shorter duration or longer duration are also possible.

At block 640, a storage arrangement may be accessed to determine anappropriate security response based on the biometric measurement ofblock 610, the security alert of block 620, and determining that thebiometric measurement and the security alert occurred within a thresholdtime period at block 630. Referring to FIG. 2, defined responsesdatabase 206 may be accessed from a non-transitory computer readablemedium. Referring to the interface of FIG. 4, it can be seen how a usermay define particular actions to be taken in response to particularcombinations of biometric alerts and security alerts.

At block 650, a first security response action may be performed based oninformation accessed at block 640. As an example, a first securityresponse action may include action such as: turning on one or morelights, outputting sound via a presentation device or sound system,contacting an emergency contact, recording video, recording sound, orperforming some other action that is possible to be performed by one ormore home automation devices located within the user's structure.

At block 660, a defined wait period of time (which corresponds to thedefined time period between actions option 434) may be monitored by thehome automation host system after the first security response action.During this time period, the home automation host system may bemonitoring for user input to the home automation host system thatdisables the security response(s) (e.g., a voice command, user input tothe biometric device, user input directly to the home automation hostsystem, etc.). If the user provides such input, method 600 may end andthe home automation host system may not perform a second securityresponse action. If the user does not provide user input during the waitperiod of time, method 600 may proceed to block 670 and a secondsecurity response action may be performed. The second response actionmay typically be more dire than the first security response action(since the user did not disable future security responses at block 660).For instance, a typical second security response action may be anautomated call to 911 (or, more generally, an emergency service) or to adefined contact of the user.

FIG. 7 illustrates an embodiment of a computer system which may beincorporated as part of various computerized devices in a homeautomation system. A computer system as illustrated in FIG. 7 may beincorporated as part of the previously described home automation hostsystem and, possibly, as any of the home automation devices detailed.FIG. 7 provides a schematic illustration of one embodiment of a computersystem 700 that can perform various steps of the methods provided byvarious embodiments. It should be noted that FIG. 7 is meant only toprovide a generalized illustration of various components, any or all ofwhich may be utilized as appropriate. FIG. 7, therefore, broadlyillustrates how individual system elements may be implemented in arelatively separated or relatively more integrated manner.

The computer system 700 is shown comprising hardware elements that canbe electrically coupled via a bus 705 (or may otherwise be incommunication, as appropriate). The hardware elements may include one ormore processors 710, including without limitation one or moregeneral-purpose processors and/or one or more special-purpose processors(such as digital signal processing chips, graphics accelerationprocessors, video decoders, and/or the like); one or more input devices715, which can include without limitation a mouse, a keyboard, remotecontrol, and/or the like; and one or more output devices 720, which caninclude without limitation a display device, a printer, and/or the like.

The computer system 700 may further include (and/or be in communicationwith) one or more non-transitory storage devices 725, which cancomprise, without limitation, local and/or network accessible storage,and/or can include, without limitation, a disk drive, a drive array, anoptical storage device, a solid-state storage device, such as a randomaccess memory (“RAM”), and/or a read-only memory (“ROM”), which can beprogrammable, flash-updateable and/or the like. Such storage devices maybe configured to implement any appropriate data stores, includingwithout limitation, various file systems, database structures, and/orthe like.

The computer system 700 might also include a communications subsystem730, which can include without limitation a modem, a network card(wireless or wired), an infrared communication device, a wirelesscommunication device, and/or a chipset (such as a Bluetooth™ device, an802.11 device, a WiFi device, a WiMax device, cellular communicationdevice, etc.), and/or the like. The communications subsystem 730 maypermit data to be exchanged with a network (such as the networkdescribed below, to name one example), other computer systems, and/orany other devices described herein. In many embodiments, the computersystem 700 will further comprise a working memory 735, which can includea RAM or ROM device, as described above.

The computer system 700 also can comprise software elements, shown asbeing currently located within the working memory 735, including anoperating system 740, device drivers, executable libraries, and/or othercode, such as one or more application programs 745, which may comprisecomputer programs provided by various embodiments, and/or may bedesigned to implement methods, and/or configure systems, provided byother embodiments, as described herein. Merely by way of example, one ormore procedures described with respect to the method(s) discussed abovemight be implemented as code and/or instructions executable by acomputer (and/or a processor within a computer); in an aspect, then,such code and/or instructions can be used to configure and/or adapt ageneral purpose computer (or other device) to perform one or moreoperations in accordance with the described methods.

A set of these instructions and/or code might be stored on anon-transitory computer-readable storage medium, such as thenon-transitory storage device(s) 725 described above. In some cases, thestorage medium might be incorporated within a computer system, such ascomputer system 700. In other embodiments, the storage medium might beseparate from a computer system (e.g., a removable medium, such as acompact disc), and/or provided in an installation package, such that thestorage medium can be used to program, configure, and/or adapt a generalpurpose computer with the instructions/code stored thereon. Theseinstructions might take the form of executable code, which is executableby the computer system 700 and/or might take the form of source and/orinstallable code, which, upon compilation and/or installation on thecomputer system 700 (e.g., using any of a variety of generally availablecompilers, installation programs, compression/decompression utilities,etc.), then takes the form of executable code.

It will be apparent to those skilled in the art that substantialvariations may be made in accordance with specific requirements. Forexample, customized hardware might also be used, and/or particularelements might be implemented in hardware, software (including portablesoftware, such as applets, etc.), or both. Further, connection to othercomputing devices such as network input/output devices may be employed.

As mentioned above, in one aspect, some embodiments may employ acomputer system (such as the computer system 700) to perform methods inaccordance with various embodiments of the invention. According to a setof embodiments, some or all of the procedures of such methods areperformed by the computer system 700 in response to processor 710executing one or more sequences of one or more instructions (which mightbe incorporated into the operating system 740 and/or other code, such asan application program 745) contained in the working memory 735. Suchinstructions may be read into the working memory 735 from anothercomputer-readable medium, such as one or more of the non-transitorystorage device(s) 725. Merely by way of example, execution of thesequences of instructions contained in the working memory 735 mightcause the processor(s) 710 to perform one or more procedures of themethods described herein.

The terms “machine-readable medium,” “computer-readable storage medium”and “computer-readable medium,” as used herein, refer to any medium thatparticipates in providing data that causes a machine to operate in aspecific fashion. These mediums may be non-transitory. In an embodimentimplemented using the computer system 700, various computer-readablemedia might be involved in providing instructions/code to processor(s)710 for execution and/or might be used to store and/or carry suchinstructions/code. In many implementations, a computer-readable mediumis a physical and/or tangible storage medium. Such a medium may take theform of a non-volatile media or volatile media. Non-volatile mediainclude, for example, optical and/or magnetic disks, such as thenon-transitory storage device(s) 725. Volatile media include, withoutlimitation, dynamic memory, such as the working memory 735.

Common forms of physical and/or tangible computer-readable mediainclude, for example, a floppy disk, a flexible disk, hard disk,magnetic tape, or any other magnetic medium, a CD-ROM, any other opticalmedium, any other physical medium with patterns of marks, a RAM, a PROM,EPROM, a FLASH-EPROM, any other memory chip or cartridge, or any othermedium from which a computer can read instructions and/or code.

Various forms of computer-readable media may be involved in carrying oneor more sequences of one or more instructions to the processor(s) 710for execution. Merely by way of example, the instructions may initiallybe carried on a magnetic disk and/or optical disc of a remote computer.A remote computer might load the instructions into its dynamic memoryand send the instructions as signals over a transmission medium to bereceived and/or executed by the computer system 700.

The communications subsystem 730 (and/or components thereof) generallywill receive signals, and the bus 705 then might carry the signals(and/or the data, instructions, etc. carried by the signals) to theworking memory 735, from which the processor(s) 710 retrieves andexecutes the instructions. The instructions received by the workingmemory 735 may optionally be stored on a non-transitory storage device725 either before or after execution by the processor(s) 710.

It should further be understood that the components of computer system700 can be distributed across a network. For example, some processingmay be performed in one location using a first processor while otherprocessing may be performed by another processor remote from the firstprocessor. Other components of computer system 700 may be similarlydistributed. As such, computer system 700 may be interpreted as adistributed computing system that performs processing in multiplelocations. In some instances, computer system 700 may be interpreted asa single computing device, such as a distinct laptop, desktop computer,or the like, depending on the context.

The methods, systems, and devices discussed above are examples. Variousconfigurations may omit, substitute, or add various procedures orcomponents as appropriate. For instance, in alternative configurations,the methods may be performed in an order different from that described,and/or various stages may be added, omitted, and/or combined. Also,features described with respect to certain configurations may becombined in various other configurations. Different aspects and elementsof the configurations may be combined in a similar manner. Also,technology evolves and, thus, many of the elements are examples and donot limit the scope of the disclosure or claims.

Specific details are given in the description to provide a thoroughunderstanding of example configurations (including implementations).However, configurations may be practiced without these specific details.For example, well-known circuits, processes, algorithms, structures, andtechniques have been shown without unnecessary detail in order to avoidobscuring the configurations. This description provides exampleconfigurations only, and does not limit the scope, applicability, orconfigurations of the claims. Rather, the preceding description of theconfigurations will provide those skilled in the art with an enablingdescription for implementing described techniques. Various changes maybe made in the function and arrangement of elements without departingfrom the spirit or scope of the disclosure.

Also, configurations may be described as a process which is depicted asa flow diagram or block diagram. Although each may describe theoperations as a sequential process, many of the operations can beperformed in parallel or concurrently. In addition, the order of theoperations may be rearranged. A process may have additional steps notincluded in the figure. Furthermore, examples of the methods may beimplemented by hardware, software, firmware, middleware, microcode,hardware description languages, or any combination thereof. Whenimplemented in software, firmware, middleware, or microcode, the programcode or code segments to perform the necessary tasks may be stored in anon-transitory computer-readable medium such as a storage medium.Processors may perform the described tasks.

Having described several example configurations, various modifications,alternative constructions, and equivalents may be used without departingfrom the spirit of the disclosure. For example, the above elements maybe components of a larger system, wherein other rules may takeprecedence over or otherwise modify the application of the invention.Also, a number of steps may be undertaken before, during, or after theabove elements are considered.

What is claimed is:
 1. A method for responding to a security situation,the method comprising: receiving, by a home automation host system, abiometric measurement of a user; receiving, by the home automation hostsystem, security data from a home automation device in communicationwith the home automation host system; determining, by the homeautomation host system, the biometric measurement is associated with thesecurity data received from the home automation device; and in responseto the biometric measurement and the security data received from thehome automation device, performing, by the home automation host system,a security response action.
 2. The method of claim 1, wherein thesecurity response action comprises the home automation host systemtransmitting a message that causes a light to be illuminated.
 3. Themethod of claim 1, wherein the security response action comprisespresenting, via a display device, a video feed from a camera thatcaptures video corresponding to a location of the security alert.
 4. Themethod of claim 1, wherein the security response action comprisescontacting an emergency service.
 5. The method of claim 1, wherein thesecurity response action comprises: activating a sound system; andtransmitting an instruction to output sound to the sound system.
 6. Themethod of claim 5, wherein the security response action furthercomprises: transmitting a second instruction to set a defined volumelevel for outputting sound via the sound system.
 7. The method of claim1, wherein the biometric measurement is a heart rate.
 8. The method ofclaim 1, further comprising: providing a questionnaire via apresentation device, wherein the questionnaire presents an option as tohow the home automation host system should respond to the security alertif the biometric measurement of the user exceeds a threshold value. 9.The method of claim 1, wherein the security response action comprises:causing a message to be sent to an external contact.
 10. A homeautomation host system comprising: one or more processors; and a memorycommunicatively coupled with and readable by the one or more processorsand having stored therein processor-readable instructions which, whenexecuted by the one or more processors, cause the one or more processorsto: receive a biometric measurement of a user; receive data from a homeautomation device in communication with the home automation host system;determine the biometric measurement is associated with the data receivedfrom the home automation device; and perform a security response actionin response to the biometric measurement and the data received from thehome automation device.
 11. The home automation host system of claim 10,wherein the processor-readable instructions that, when executed, causethe one or more processors to perform the security response actioncomprise processor-readable instructions which, when executed, cause theone or more processors to cause a light to be illuminated.
 12. The homeautomation host system of claim 10, wherein the processor-readableinstructions that, when executed, cause the one or more processors toperform the security response action comprise processor-readableinstructions which, when executed, cause the one or more processors tocause a video feed from a camera to be displayed by a display device.13. The home automation host system of claim 10, wherein the securityresponse action comprises contacting an emergency service.
 14. The homeautomation host system of claim 10, wherein the processor-readableinstructions that, when executed, cause the one or more processors toperform the security response action comprise processor-readableinstructions which, when executed, cause the one or more processors to:activate a sound system; and cause sound to be output.
 15. The homeautomation host system of claim 14, wherein the processor-readableinstructions that, when executed, cause the one or more processors toperform the security response action further comprise processor-readableinstructions which, when executed, cause the one or more processors to:set a defined volume level for outputting sound via the sound system.16. The home automation host system of claim 10, wherein the biometricmeasurement is a heart rate.
 17. The home automation host system ofclaim 10, wherein the processor-readable instructions, when executed,further cause the one or more processors to: output a questionnaire viaa presentation device, wherein the questionnaire presents an option tothe user as to how the home automation host system should respond to thesecurity alert if the biometric measurement of the user exceeds adefined threshold value.
 18. The home automation host system of claim10, wherein the processor-readable instructions that, when executed,cause the one or more processors to perform the security response actioncomprise processor-readable instructions which, when executed, cause theone or more processors to: cause a message to be sent to a definedexternal contact, the defined external contact being defined by theuser.
 19. A non-transitory processor-readable medium comprisingprocessor-readable instructions configured to cause one or moreprocessors of a home automation host system to: receive a biometricmeasurement of a user; receive data from a home automation device incommunication with the home automation host system; determine thebiometric measurement is associated with the data received from the homeautomation device; and perform a security response action in response tothe biometric measurement and the data received from the home automationdevice.
 20. The non-transitory processor-readable medium of claim 19,wherein the biometric measurement is a heartrate of the user.