Detector Devices for Presenting Notifications and Supporting Context Inferences

ABSTRACT

Techniques can relate to a multi-purpose a detector surface on a network device. A stimulus variable can be identified at a detector device based on an environmental stimulus detected by a sensor. The detector device can include the sensor. The detector device can transmit an initial communication to a device. The first communication can include the stimulus variable. A new communication that includes data corresponding to another device can be received at the detector device. The detector device can determine, based on the stimulus detected by the sensor and is further based on the new communication, that a visual stimulus is to be presented. The visual stimulus can be presented.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.14/452,832, filed on Aug. 6, 2014. This application is also acontinuation of U.S. application Ser. No. 14/755,777, filed on Jun. 30,2015, which is a continuation of U.S. application Ser. No. 14/453,350,filed on Aug. 6, 2014, which is a continuation of U.S. application Ser.No. 14/452,832, filed on Aug. 6, 2014. Each of these references ishereby incorporated by reference in its entirety for all purposes.

FIELD

This disclosure relates in general to a detector device that also isconfigured to conditionally present one or more notifications and tousing data detected by the detector device to infer a context and/orexecute a rule (e.g., for controlling the device or another device).

BACKGROUND

People are surrounded by a dynamic mix of many stimuli. People areadapted to continually adapt our actions based on the current mix. Forexample, as a room becomes darker, a person turns on a light. As a roombecomes colder, a person turns on the heat. However, such responsiveactions are inconvenient. Further, due to the inconvenience or aparticular circumstance, there are times when a person cannot or choosesnot to perform the appropriate action. In such a case, an appeal of anenvironment can suffer.

SUMMARY

Various detecting devices have been developed. However, the utility ofsuch devices has been limited for a variety of reasons. For example, asensing region of a device is typically constrained to a rather small,local region. As another example, a reach of a detecting device isfrequently limited to controlling operations within the device itself.As yet another example, a consequence of a particular detection istypically fixed, such that a user must either choose to use the detectorwith an inflexible rule or to avoid it altogether.

In certain embodiments, techniques relate to expanding the utility ofdetector devices to support presentation of dynamic and/or customnotifications and/or to support inferences forming the basis ofdevice-control rules. In one instance, a detector device (e.g., a lightsensor) includes a surface (e.g., a lens). The detector device can beconfigured to detect a characteristic on an outside of the surface.Additionally, however, one or more light sources can be positioned on aninside of the surface, and the light can be used to present anotification on the surface of the device to a user. The notificationcan be conveyed by a mere presence of a light stimulus, a color and/orintensity of a light stimulus, and/or other stimulus detail (e.g., ashape, included graphic, and/or included text). Whether to present anotification and/or a selection of a notification or notificationcharacteristic can be based on data sensed by the detector device and/orother data (e.g., which can include data sensed from another affiliateddetector device, an operation characteristic of an affiliated device,data from a remote source, etc.).

For example, an intensity of a light emitted by a surface on a detectordevice can be inversely or positively correlated with an intensity oflight detected by the device. As another example, a red light can beconditionally (e.g., and diffusely) presented surface of a detectordevice when a power-consumption variable, based on data collected by oneor more power monitors, exceeds a threshold. As yet another example, anumber identifying a forecasted outside temperature for a day can bepresented on a surface of a detector device.

In one instance, data from each of one or more detector devices iscollected and processed according to one or more rules. An output of arule can identify whether and/or which notification to present (e.g., onthe detector device, on an access device and/or a device selected by arule). An output of a rule can also or alternatively include one or moredevice-control parameters, which can include a device identifier, abinary or non-binary power setting, a time interval (e.g., formaintaining a power setting), and/or an intensity setting. The rule canbe at least partly or completely: fixed, defined by a user and/orgenerated using a learning technique, e.g., by processing association ofpreviously detected data with manual device operation controls. The rulecan include and/or be based on one or more inferences. For example, oneor more detections can support an inference that a user is not in a homeor room, which can correspond with one or more actions to take.

In some instances, the processed detector-device data can include lightdata, such as whether a threshold light intensity was detected, aspatial and/or temporal differential in detected light intensity, acolor of detected light, a spatial and/or temporal differential indetected light color, a pattern of detected light. In some instances,the rule is generated based on an indication as to where each of one ormore detector devices are located and/or the rule can receive andprocess such information.

For example, a light detector can be positioned to monitor light data ata front or side of a house. A rule can indicate that a porch or drivewaylight is to be triggered when it detects a high-intensity light duringan otherwise dark period. As another example, one or morecharacteristics associated with a flashlight illumination in darknesscan be identified, and detection of such characteristic(s) can result inan access device to present a security warning or a security system tobe activated. As another example, a rule can indicate that when a waterdetector (e.g., positioned at a location where water is not supposed tobe) detects water, one or more electrical devices are to be powered off.As another example, a combination of light detectors (e.g., which can becombined into a single device or separately housed) can be used todetect a light pattern. A rule can associate particular patterncharacteristics with particular persons (e.g., a pattern that includeslight at a 3-foot level from the ground but not at a 5-foot level can beassociated with a child).

In some instances, a computer-implemented method is provided. A stimulusvariable can be identified at a detector device based on anenvironmental stimulus detected by a sensor. The detector device caninclude the sensor. The detector device can transmit an initialcommunication to a device. The first communication can include thestimulus variable. A new communication that includes data correspondingto another device can be received at the detector device. The detectordevice can determine, based on the stimulus detected by the sensor andis further based on the new communication, that a visual stimulus is tobe presented. The visual stimulus can be presented.

In some embodiments, a detector device can be provided. The detectordevice can include a sensor for detecting an external stimulus and alight source. The detector device can also include one or moreconnection components configured to receive communications from andtransmit communications to other devices and one or more processorscoupled to the light source and the connection component. The detectordevice can further include a computer-readable storage medium containinginstructions, that, when executed by the one or more processors, causethe one or more processors to perform actions. The actions can includeidentifying a stimulus variable based on an environmental stimulusdetected by the sensor and transmitting, via the one or more connectioncomponents, an initial communication to a device. The firstcommunication can include the stimulus variable. The actions can alsoinclude receiving, via the one or more connection components a newcommunication that includes data corresponding to another device. Theactions can further include determining, based on the stimulus detectedby the sensor and is further based on the new communication, that avisual stimulus is to be presented and presenting the visual stimulus.

In some embodiments, a computer-implemented method is provided. One ormore environmental data points can be accessed. Each environmental datapoint in the one or more environmental data points can include onemeasured by a detector device and that characterizes a correspondingenvironmental stimulus. At least one of the environmental data pointscan be indicative of a light intensity or power usage measured by afirst device. An inference can be generated based on the one or moreenvironmental data points. A notification or device control can beidentified based on the inference. A communication can be generated andtransmitted to a second device. Receipt of the communication can causethe second device to present the notification or to be controlled inaccordance with the device control.

In some embodiments, a system is provided that includes one or more dataprocessors and a non-transitory computer readable storage mediumcontaining instructions which when executed on the one or more dataprocessors, cause the one or more data processors to perform actions ina process or method disclosed herein. In some embodiments, acomputer-program product tangibly embodied in a non-transitorymachine-readable storage medium is provides that includes instructionsconfigured to cause one or more data processors to perform actions in amethod or process disclosed herein.

Further areas of applicability of the present disclosure will becomeapparent from the detailed description provided hereinafter. It shouldbe understood that the detailed description and specific examples, whileindicating various embodiments, are intended for purposes ofillustration only and are not intended to necessarily limit the scope ofthe disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

Illustrative embodiments of the present invention are described indetail below with reference to the following drawing figures:

FIG. 1 is an illustration of an example of a network environment, inaccordance with some embodiments.

FIG. 2 is a flowchart illustrating an embodiment of a process forregistering one or more network devices, in accordance with someembodiments.

FIG. 3 is an illustration of an example of a network environment, inaccordance with some embodiments.

FIG. 4 is an illustration of an example of a network environment, inaccordance with some embodiments.

FIG. 5 is an illustration of an example of a network environment, inaccordance with some embodiments.

FIG. 6 illustrates an example of a process for using data from one ormore detector devices to infer a context and control a device operationand/or notification presentation according to an embodiment of theinvention;

FIG. 7 illustrates an example of a process for presenting a stimulus ata detector device according to an embodiment of the invention;

FIG. 8 is an example of a block diagram of a detector device depictingdifferent hardware and/or software components of the detector deviceaccording to an embodiment of the invention;

FIG. 9 is an illustration of an example of a front view of a networkdevice, in accordance with an embodiment.

FIG. 10 is an illustration of an example of a side view of a networkdevice, in accordance with an embodiment.

FIG. 11 is an example of a block diagram of a network device, inaccordance with an embodiment.

FIG. 12 is a block diagram illustrating an example of an access device,in accordance with some embodiments.

FIG. 13 is a block diagram illustrating an example of a server, inaccordance with some embodiments.

FIG. 14 is a block diagram illustrating an example of a gateway, inaccordance with some embodiments.

DETAILED DESCRIPTION

In the following description, for the purposes of explanation, specificdetails are set forth in order to provide a thorough understanding ofembodiments of the invention. However, it will be apparent that variousembodiments may be practiced without these specific details. The figuresand description are not intended to be restrictive.

The ensuing description provides exemplary embodiments only, and is notintended to limit the scope, applicability, or configuration of thedisclosure. Rather, the ensuing description of the exemplary embodimentswill provide those skilled in the art with an enabling description forimplementing an exemplary embodiment. It should be understood thatvarious changes may be made in the function and arrangement of elementswithout departing from the spirit and scope of the invention as setforth in the appended claims.

Specific details are given in the following description to provide athorough understanding of the embodiments. However, it will beunderstood by one of ordinary skill in the art that the embodiments maybe practiced without these specific details. For example, circuits,systems, networks, processes, and other components may be shown ascomponents in block diagram form in order not to obscure the embodimentsin unnecessary detail. In other instances, well-known circuits,processes, algorithms, structures, and techniques may be shown withoutunnecessary detail in order to avoid obscuring the embodiments.

Also, it is noted that individual embodiments may be described as aprocess which is depicted as a flowchart, a flow diagram, a data flowdiagram, a structure diagram, or a block diagram. Although a flowchartmay describe the operations as a sequential process, many of theoperations can be performed in parallel or concurrently. In addition,the order of the operations may be re-arranged. A process is terminatedwhen its operations are completed, but could have additional steps notincluded in a figure. A process may correspond to a method, a function,a procedure, a subroutine, a subprogram, etc. When a process correspondsto a function, its termination can correspond to a return of thefunction to the calling function or the main function.

The term “machine-readable storage medium” or “computer-readable storagemedium” includes, but is not limited to, portable or non-portablestorage devices, optical storage devices, and various other mediumscapable of storing, containing, or carrying instruction(s) and/or data.A machine-readable medium may include a non-transitory medium in whichdata can be stored and that does not include carrier waves and/ortransitory electronic signals propagating wirelessly or over wiredconnections. Examples of a non-transitory medium may include, but arenot limited to, a magnetic disk or tape, optical storage media such ascompact disk (CD) or digital versatile disk (DVD), flash memory, memoryor memory devices. A computer-program product may include code and/ormachine-executable instructions that may represent a procedure, afunction, a subprogram, a program, a routine, a subroutine, a module, asoftware package, a class, or any combination of instructions, datastructures, or program statements. A code segment may be coupled toanother code segment or a hardware circuit by passing and/or receivinginformation, data, arguments, parameters, or memory contents.Information, arguments, parameters, data, etc. may be passed, forwarded,or transmitted via any suitable means including memory sharing, messagepassing, token passing, network transmission, etc.

Furthermore, embodiments may be implemented by hardware, software,firmware, middleware, microcode, hardware description languages, or anycombination thereof. When implemented in software, firmware, middlewareor microcode, the program code or code segments to perform the necessarytasks (e.g., a computer-program product) may be stored in amachine-readable medium. A processor(s) may perform the necessary tasks.

Systems depicted in some of the figures may be provided in variousconfigurations. In some embodiments, the systems may be configured as adistributed system where one or more components of the system aredistributed across one or more networks in a cloud computing system.

A network may be set up to provide an access device user with access tovarious devices connected to the network. For example, a network mayinclude one or more network devices that provide a user with the abilityto remotely configure or control the network devices themselves or oneor more electronic devices (e.g., appliances) connected to the networkdevices. The electronic devices may be located within an environment ora venue that can support the network. An environment can include, forexample, a home, an office, a business, an automobile, a park, or thelike. A network may include one or more gateways that allow clientdevices (e.g., network devices, access devices, or the like) to accessthe network by providing wired connections and/or wireless connectionsusing radio frequency channels in one or more frequency bands. The oneor more gateways may also provide the client devices with access to oneor more external networks, such as a cloud network, the Internet, and/orother wide area networks.

A local area network, such as a user's home local area network, caninclude multiple network devices that provide various functionalities.Network devices may be accessed and controlled using an access deviceand/or one or more network gateways. One or more gateways in the localarea network may be designated as a primary gateway that provides thelocal area network with access to an external network. The local areanetwork can also extend outside of the user's home and may includenetwork devices located outside of the user's home. For instance, thelocal area network can include network devices such as exterior motionsensors, exterior lighting (e.g., porch lights, walkway lights, securitylights, or the like), garage door openers, sprinkler systems, or othernetwork devices that are exterior to the user's home. It is desirablefor a user to be able to access the network devices while located withinthe local area network and also while located remotely from the localarea network. For example, a user may access the network devices usingan access device within the local area network or remotely from thelocal area network.

As explained herein, techniques are provided that allow for a detectornetwork device to conditionally output notifications (e.g., via a sameouter component used to received external stimuli for detection).Further, data from one or more detector network devices (e.g., dataindicative of light presence, intensity, color or pattern) can becollected and analyzed to infer a context. A notification can then bepresented (e.g., on a detector device or on an access device) and/oranother device (e.g., another network device) can be controlled based onthe inferred context. These techniques increase the utility of adetector device and improve automated environment-control and custominformation available to a user.

In some embodiments, a user may create an account with login informationthat is used to authenticate the user and allow access to the networkdevices. For example, once an account is created, a user may enter thelogin information in order to access a network device in a logicalnetwork.

In some embodiments, an accountless authentication process may beperformed so that the user can access one or more network devices withina logical network without having to enter network device logincredentials each time access is requested. While located locally withinthe local area network, an access device may be authenticated based onthe access device's authentication with the logical network. Forexample, if the access device has authorized access to the logicalnetwork (e.g., a WiFi network provided by a gateway), the networkdevices paired with that logical network may allow the access device toconnect to them without requiring a login. Accordingly, only users ofaccess devices that have authorization to access the logical network areauthorized to access network devices within the logical network, andthese users are authorized without having to provide login credentialsfor the network devices.

An accountless authentication process may also be performed when theuser is remote so that the user can access network devices within thelogical network, using an access device, without having to enter networkdevice login credentials. While remote, the access device may access thenetwork devices in the local area network using an external network,such as a cloud network, the Internet, or the like. One or more gatewaysmay provide the network devices and/or access device connected to thelocal area network with access to the external network. To allowaccountless authentication, a cloud network server may provide a networkID and/or one or more keys to a network device and/or to the accessdevice (e.g., running an application, program, or the like). In somecases, a unique key may be generated for the network device and aseparate unique key may be generated for the access device. The keys maybe specifically encrypted with unique information identifiable only tothe network device and the access device. The network device and theaccess device may be authenticated using the network ID and/or eachdevice's corresponding key each time the network device or access deviceattempts to access the cloud network server.

In some embodiments, a home local area network may include a singlegateway, such as a router. A network device within the local areanetwork may pair with or connect to the gateway and may obtaincredentials from the gateway. For example, when the network device ispowered on, a list of gateways that are detected by the network devicemay be displayed on an access device (e.g., via an application, program,or the like installed on and executed by the access device). In thisexample, only the single gateway is included in the home local areanetwork (e.g., any other displayed gateways may be part of other localarea networks). In some embodiments, only the single gateway may bedisplayed (e.g., when only the single gateway is detected by the networkdevice). A user may select the single gateway as the gateway with whichthe network device is to pair and may enter login information foraccessing the gateway. The login information may be the same informationthat was originally set up for accessing the gateway (e.g., a networkuser name and password, a network security key, or any other appropriatelogin information). The access device may send the login information tothe network device and the network device may use the login informationto pair with the gateway. The network device may then obtain thecredentials from the gateway. The credentials may include a service setidentification (SSID) of the home local area network, a media accesscontrol (MAC) address of the gateway, and/or the like. The networkdevice may transmit the credentials to a server of a wide area network,such as a cloud network server. In some embodiments, the network devicemay also send to the server information relating to the network device(e.g., MAC address, serial number, or the like) and/or informationrelating to the access device (e.g., MAC address, serial number,application unique identifier, or the like).

The cloud network server may register the gateway as a logical networkand may assign the first logical network a network identifier (ID). Thecloud network server may further generate a set of security keys, whichmay include one or more security keys. For example, the server maygenerate a unique key for the network device and a separate unique keyfor the access device. The server may associate the network device andthe access device with the logical network by storing the network ID andthe set of security keys in a record or profile. The cloud networkserver may then transmit the network ID and the set of security keys tothe network device. The network device may store the network ID and itsunique security key. The network device may also send the network ID andthe access device's unique security key to the access device. In someembodiments, the server may transmit the network ID and the accessdevice's security key directly to the access device. The network deviceand the access device may then communicate with the cloud server usingthe network ID and the unique key generated for each device.Accordingly, the access device may perform accountless authentication toallow the user to remotely access the network device via the cloudnetwork without logging in each time access is requested. Also, thenetwork device can communicate with the server regarding the logicalnetwork.

In some embodiments, a local area network may include multiple gateways(e.g., a router and a range extender) and multiple network devices. Forexample, a local area network may include a first gateway paired with afirst network device, and a second gateway paired with a second networkdevice. In the event credentials for each gateway are used to create alogical network, a server (e.g., a cloud network server) may registerthe first gateway as a first logical network and may register the secondgateway as a second logical network. The server may generate a firstnetwork ID and a first set of security keys for the first logicalnetwork. The first set of security keys may include a unique securitykey for the first network device and a unique security key for theaccess device for use in accessing the first network device on the firstlogical network. The server may register the second gateway as thesecond logical network due to differences in the credentials between thefirst gateway and second gateway. The server may assign the secondgateway a second network ID and may generate a second set of securitykeys. For example, the server may generate a unique security key for thesecond network device and may generate a unique security key for theaccess device for use in accessing the second network device on thesecond logical network. The server may associate the first networkdevice and the access device with the first logical network by storingthe first network ID and the first set of security keys in a firstrecord or profile. The server may also associate the second networkdevice and the access device with the second logical network by storingthe second network ID and the second set of security keys in a record orprofile. The server may then transmit the first network ID and the firstset of security keys to the first network device, and may transmit thesecond network ID and the second set of security keys to the secondnetwork device. The two network devices may store the respective networkID and set of security keys of the gateway with which each networkdevice is connected. Each network device may send the respective networkID and the access device's unique security key to the access device. Thenetwork devices and the access device may then communicate with thecloud server using the respective network ID and the unique keygenerated for each device.

Accordingly, when multiple gateways are included in the home local areanetwork, multiple logical networks associated with different networkidentifiers may be generated for the local area network. When the accessdevice is located within range of both gateways in the local areanetwork, there is no problem accessing both network devices due to theability of the access device to perform local discovery techniques(e.g., universal plug and play (UPnP)). However, when the user islocated remotely from the local area network, the access device may onlybe associated with one logical network at a time, which prevents theaccess device from accessing network devices of other logical networkswithin the local area network.

Accordingly, some techniques and systems are described herein forgenerating dynamic and/or custom notifications. The notifications can bepresented on a detector surface, such that the surface becomesmulti-purpose. For example, a white translucent lens on a device canserve to filter light (e.g., to filter out visible light and to letinfrared light pass through the lens to activate a sensor, such as a PIRsensor). The lens can further emit or “glow” a diffused color (e.g., ablue color) to provide a notification of an event (e.g., to indicatethat motion has been detected. Some techniques and systems are describedherein for connecting a device to one or more other devices to supportremote measuring, monitoring and/or device management. Thus, one or moredevices can detect a presence, intensity, color and/or pattern of light.Such detection can, in some instances, support an inference (e.g., of apresence, arrival, absence, departure, path and/or device-controlintention of one or more people generally or one or more specificpeople), and one or more same or different devices can be controlledbased on the inference (e.g., to turn on lights, unlock a door, etc.).

FIG. 1 illustrates an example of a local area network 100. The localarea network 100 includes network device 102, network device 104, andnetwork device 106. In some embodiments, any of the network devices 102,104, 106 may include an Internet of Things (IoT) device. As used herein,an IoT device is a device that includes sensing and/or controlfunctionality as well as a WiFi™ transceiver radio or interface, aBluetooth™ transceiver radio or interface, a Zigbee™ transceiver radioor interface, an Ultra-Wideband (UWB) transceiver radio or interface, aWiFi-Direct transceiver radio or interface, a Bluetooth™ Low Energy(BLE) transceiver radio or interface, and/or any other wireless networktransceiver radio or interface that allows the IoT device to communicatewith a wide area network and with one or more other devices. In someembodiments, an IoT device does not include a cellular networktransceiver radio or interface, and thus may not be configured todirectly communicate with a cellular network. In some embodiments, anIoT device may include a cellular transceiver radio, and may beconfigured to communicate with a cellular network using the cellularnetwork transceiver radio. The network devices 102, 104, 106, as IoTdevices or other devices, may include home automation network devicesthat allow a user to access, control, and/or configure various homeappliances located within the user's home (e.g., a television, radio,light, fan, humidifier, sensor, microwave, iron, and/or the like), oroutside of the user's home (e.g., exterior motion sensors, exteriorlighting, garage door openers, sprinkler systems, or the like). Forexample, network device 102 may include a home automation switch thatmay be coupled with a home appliance. In some embodiments, networkdevices 102, 104, 106 may be used in other environments, such as abusiness, a school, an establishment, a park, or any place that cansupport the local area network 100 to enable communication with networkdevices 102, 104, 106. For example, a network device can allow a user toaccess, control, and/or configure devices, such as office-relateddevices (e.g., copy machine, printer, fax machine, or the like), audioand/or video related devices (e.g., a receiver, a speaker, a projector,a DVD player, a television, or the like), media-playback devices (e.g.,a compact disc player, a CD player, or the like), computing devices(e.g., a home computer, a laptop computer, a tablet, a personal digitalassistant (PDA), a computing device, a wearable device, or the like),lighting devices (e.g., a lamp, recessed lighting, or the like), devicesassociated with a security system, devices associated with an alarmsystem, devices that can be operated in an automobile (e.g., radiodevices, navigation devices), and/or the like.

A user may communicate with the network devices 102, 104, 106 using anaccess device 108. The access device 108 may include anyhuman-to-machine interface with network connection capability thatallows access to a network. For example, the access device 108 mayinclude a stand-alone interface (e.g., a cellular telephone, asmartphone, a home computer, a laptop computer, a tablet, a personaldigital assistant (PDA), a computing device, a wearable device such as asmart watch, a wall panel, a keypad, or the like), an interface that isbuilt into an appliance or other device e.g., a television, arefrigerator, a security system, a game console, a browser, or thelike), a speech or gesture interface (e.g., a Kinect™ sensor, aWiimote™, or the like), an IoT device interface (e.g., an Internetenabled device such as a wall switch, a control interface, or othersuitable interface), or the like. In some embodiments, the access device108 may include a cellular or other broadband network transceiver radioor interface, and may be configured to communicate with a cellular orother broadband network using the cellular or broadband networktransceiver radio. In some embodiments, the access device 108 may notinclude a cellular network transceiver radio or interface. While only asingle access device 108 is shown in FIG. 1, one of ordinary skill inthe art will appreciate that multiple access devices may communicatewith the network devices 102, 104, 106. The user may interact with thenetwork devices 102, 104, or 106 using an application, a web browser, aproprietary program, or any other program executed and operated by theaccess device 108. In some embodiments, the access device 108 maycommunicate directly with the network devices 102, 104, 106 (e.g.,communication signal 116). For example, the access device 108 maycommunicate directly with network device 102, 104, 106 using Zigbee™signals, Bluetooth™ signals, WiFi™ signals, infrared (IR) signals, UWBsignals, WiFi-Direct signals, BLE signals, sound frequency signals, orthe like. In some embodiments, the access device 108 may communicatewith the network devices 102, 104, 106 via the gateways 110, 112 (e.g.,communication signal 118) and/or the cloud network 114 (e.g.,communication signal 120).

The local area network 100 may include a wireless network, a wirednetwork, or a combination of a wired and wireless network. A wirelessnetwork may include any wireless interface or combination of wirelessinterfaces (e.g., Zigbee™, Bluetooth™, WiFi™, IR, UWB, WiFi-Direct, BLE,cellular, Long-Term Evolution (LTE), WiMax™, or the like). A wirednetwork may include any wired interface (e.g., fiber, ethernet,powerline ethernet, ethernet over coaxial cable, digital signal line(DSL), or the like). The wired and/or wireless networks may beimplemented using various routers, access points, bridges, gateways, orthe like, to connect devices in the local area network 100. For example,the local area network may include gateway 110 and gateway 112. Gateway110 or 112 can provide communication capabilities to network devices102, 104, 106 and/or access device 108 via radio signals in order toprovide communication, location, and/or other services to the devices.The gateway 110 is directly connected to the external network 114 andmay provide other gateways and devices in the local area network withaccess to the external network 114. The gateway 110 may be designated asa primary gateway. While two gateways 110 and 112 are shown in FIG. 1,one of ordinary skill in the art will appreciate that any number ofgateways may be present within the local area network 100.

The network access provided by gateway 110 and gateway 112 may be of anytype of network familiar to those skilled in the art that can supportdata communications using any of a variety of commercially-availableprotocols. For example, gateways 110, 112 may provide wirelesscommunication capabilities for the local area network 100 usingparticular communications protocols, such as WiFi™ (e.g., IEEE 802.11family standards, or other wireless communication technologies, or anycombination thereof). Using the communications protocol(s), the gateways110, 112 may provide radio frequencies on which wireless enabled devicesin the local area network 100 can communicate. A gateway may also bereferred to as a base station, an access point, Node B, Evolved Node B(eNodeB), access point base station, a Femtocell, home base station,home Node B, home eNodeB, or the like.

The gateways 110, 112 may include a router, a modem, a range extendingdevice, and/or any other device that provides network access among oneor more computing devices and/or external networks. For example, gateway110 may include a router or access point, and gateway 112 may include arange extending device. Examples of range extending devices may includea wireless range extender, a wireless repeater, or the like.

A router gateway may include access point and router functionality, andmay further include an Ethernet switch and/or a modem. For example, arouter gateway may receive and forward data packets among differentnetworks. When a data packet is received, the router gateway may readidentification information (e.g., a media access control (MAC) address)in the packet to determine the intended destination for the packet. Therouter gateway may then access information in a routing table or routingpolicy, and may direct the packet to the next network or device in thetransmission path of the packet. The data packet may be forwarded fromone gateway to another through the computer networks until the packet isreceived at the intended destination.

A range extending gateway may be used to improve signal range andstrength within a local area network. The range extending gateway mayreceive an existing signal from a router gateway or other gateway andmay rebroadcast the signal to create an additional logical network. Forexample, a range extending gateway may extend the network coverage ofthe router gateway when two or more devices on the local area networkneed to be connected with one another, but the distance between one ofthe devices and the router gateway is too far for a connection to beestablished using the resources from the router gateway. As a result,devices outside of the coverage area of the router gateway may be ableto connect through the repeated network provided by the range extendinggateway. The router gateway and range extending gateway may exchangeinformation about destination addresses using a dynamic routingprotocol.

The gateways 110 and 112 may also provide the access device 108 and thenetwork devices 102, 104, 106 with access to one or more externalnetworks, such as the cloud network 114, the Internet, and/or other widearea networks. The cloud network 114 may include a cloud infrastructuresystem that provides cloud services. In certain embodiments, servicesprovided by the cloud network 114 may include a host of services thatare made available to users of the cloud infrastructure system ondemand, such as registration and access control of network devices 102,104, 106. Services provided by the cloud infrastructure system candynamically scale to meet the needs of its users. The cloud network 114may comprise one or more computers, servers, and/or systems. In someembodiments, the computers, servers, and/or systems that make up thecloud network 114 are different from the user's own on-premisescomputers, servers, and/or systems. For example, the cloud network 114may host an application, and a user may, via a communication networksuch as the Internet, on demand, order and use the application.

In some embodiments, the cloud network 114 may host a Network AddressTranslation (NAT) Traversal application in order to establish a secureconnection between the cloud network 114 and one or more of the networkdevices 102, 104, 106. For example, a separate secure TransmissionControl Protocol (TCP) connection may be established by each networkdevice 102, 104, 106 for communicating between each network device 102,104, 106 and the cloud network 114. In some embodiments, each secureconnection may be kept open for an indefinite period of time so that thecloud network 114 can initiate communications with each respectivenetwork device 102, 104, or 106 at any time. In some cases, other typesof communications between the cloud network 114 and the network devices102, 104, 106 and/or the access device 108 may be supported using othertypes of communication protocols, such as a Hypertext Transfer Protocol(HTTP) protocol, a Hypertext Transfer Protocol Secure (HTTPS) protocol,or the like. In some embodiments, communications initiated by the cloudnetwork 114 may be conducted over the TCP connection, and communicationsinitiated by a network device may be conducted over a HTTP or HTTPSconnection. In certain embodiments, the cloud network 114 may include asuite of applications, middleware, and database service offerings thatare delivered to a customer in a self-service, subscription-based,elastically scalable, reliable, highly available, and secure manner.

It should be appreciated that the local area network 100 may have othercomponents than those depicted. Further, the embodiment shown in thefigure is only one example of a local area network that may incorporatean embodiment of the invention. In some other embodiments, local areanetwork 100 may have more or fewer components than shown in the figure,may combine two or more components, or may have a differentconfiguration or arrangement of components.

Upon being powered on or reset, the network devices 102, 104, 106 may beregistered with the cloud network 114 and associated with a logicalnetwork within the local area network 100. FIG. 2 illustrates an exampleof a process 200 for registering one or more network devices, such asthe network devices 102, 104, 106 illustrated in FIG. 1. When multiplenetwork devices 102, 104, 106 and gateways 110, 112 are included withina local area network, the network devices and/or gateways may beinstalled at different times, resulting in the techniques described withrespect to FIG. 2 possibly occurring for each network device and/orgateway at different points in time. For example, a user may installnetwork device 102 at a first point in time on a first floor of theuser's house. Gateway 110 may also be located on the first floor,resulting in the network device 102 pairing with gateway 110. The usermay later install gateway 112 and network device 106 on a second floorof the user's home, resulting in the network device 106 pairing withgateway 112.

At 202, a network device may detect one or more gateways upon beingpowered on or reset. In some embodiments, a provisioning process mayoccur when the network device is powered on or reset and detected by anaccess device (e.g., access device 108). During the provisioningprocess, the access device may directly communicate with the networkdevice. In some embodiments, direct communication between networkdevices (e.g., network devices 102, 104, 106) and access device (e.g.,access device 108) may occur using various communications protocols,such as Universal Plug and Play (UPnP), Bluetooth®, Zigbee®,Ultra-Wideband (UWB), WiFi-Direct, WiFi, Bluetooth® Low Energy (BLE),sound frequencies, and/or the like.

The provisioning process may include pairing the network device with agateway and registering the gateway, network device, and access devicewith a server, such as a server located within the cloud network 114.For example, upon being powered on or reset to factory settings, thenetwork device may send or broadcast identification information to oneor more access devices. The identification information may be sentduring a discovery process. For example, the identification informationmay be sent in response to a discovery request from an access device. Insome cases, the identification information may include a name of thenetwork device.

An application, program, or the like that is installed on and executedby the access device may receive the identification information from thenetwork device. When the application on the access device is launched bya user, the access device may display the identification information forselection by the user. Once the network device identificationinformation is selected, the access device may send a signal to thenetwork device indicating that it has been selected. The network devicemay then send to the access device a list of gateways that are detectedby the network device. The access device may receive and display thelist of gateways. In some embodiments, the list of gateways includesmultiple gateways (e.g., gateways 110 and 112) that are located withinthe local area network. The user may select the gateway that the userwishes for the network device to pair. For example, the gateway thatprovides the best signal strength for the network device may beselected. The access device may then prompt the user to enter logininformation that is required for accessing the network signals providedby the selected gateway. For example, the login information may be thesame information that was originally set up to access the gatewaynetwork signals (e.g., when the gateway was initially installed). Onceentered, the access device may send the login information to the networkdevice. The network device may use the login information to pair withthe selected gateway. As one example, network device 102 and networkdevice 104 may be paired with gateway 110, and network device 106 may bepaired with gateway 112.

Once paired with a gateway, the network device may be registered with acloud network (e.g., cloud network 114). For example, the access device(e.g., via the application, program, or the like) may instruct thenetwork device to register with the cloud network upon receivingconfirmation from the network device that it has been successfullypaired with a gateway. At 204, the network device may obtain credentialsfrom the gateway as part of the registration process. For example,network device 102 may obtain credentials from gateway 110. At a same orlater point in time, network devices 104 and 106 may obtain credentialsfrom gateways 110 and 112, respectively. In some embodiments, thecredentials may include a SSID of the local area network and a MACaddress of the gateway. An SSID received from two gateways (e.g.,gateways 110, 112) may be the same due to the gateways both being withinthe same local area network. In some cases, the SSID of the two gatewaysmay be different. The MAC address of each of the gateways may be uniqueto each gateway. As a result of each gateway having a unique MACaddress, the credentials obtained from a gateway may be unique to thatparticular gateway. One of ordinary skill in the art will appreciatethat other credentials may be obtained from a gateway, such as anInternet Protocol address, or the like.

The network device may then send the gateway credentials to the cloudnetwork at 206. For example, the network devices 102, 104, 106 may sendcredentials for the gateway with which each is paired to the serverlocated within the cloud network 114. For example, network device 102may transmit the credentials obtained from gateway 110 to the server,and network device 106 may transmit the credentials obtained fromgateway 112 to the server. In some embodiments, the network device mayalso send information relating to the network device (e.g., MAC address,serial number, make, model number, firmware version, and/or an interfacemodule identifier, or the like) to the server, and/or informationrelating to the access device (e.g., MAC address, serial number,application unique identifier, or the like) to the server. In someembodiments, the communication of the credentials, the network deviceinformation, and/or the access device information sent from the networkdevice to the cloud network server may be in a Hypertext TransferProtocol (HTTP) format, a Hypertext Transfer Protocol Secure (HTTPS)format, a secure Transmission Control Protocol (TCP) format, or thelike. One of ordinary skill in the art will appreciate that othercommunication formats may be used to communicate between the networkdevice and the cloud network server.

Once the credentials, network device information, and/or access deviceinformation are received by the server, the server may register eachgateway as a logical network within the local area network and maygenerate a network ID for each logical network. For example, the servermay register the gateway 110 as a first logical network. During theregistration process, the server may generate a first network ID foridentifying the first logical network. As noted above, one of ordinaryskill in the art will appreciate that any number of gateways may bepresent within the local area network, and thus that any number oflogical networks may be registered for the local area network. Theserver may further generate a first set of security keys forauthenticating the network device and the access device. For example,the server may generate a unique key for the network device 102 and aseparate unique key for the access device 108.

In some embodiments, as previously described, network device 104 mayalso be paired with gateway 110 at the same or a later point in time asthe network device 102. During registration of the network device 104,the server may determine that the access device 108 has already beenregistered with another network device (e.g., network device 102) thatis associated with the same logical network of gateway 110. In suchembodiments, the server may retrieve the first network ID that was usedin registering the first logical network. The server may also generate anew unique security key for the network device 104, and may retrieve theunique key that was previously generated for the access device 108 whenregistering the gateway 110 as the first logical network.

The gateway 112 may also be registered by the server as a second logicalnetwork with a second network ID. A second set of security keys may begenerated for the network device 106 and the access device 108. Forexample, the server may generate a unique security key for the networkdevice 106 and a unique security key for the access device 108 as itrelates to the second logical network. In some embodiments, the gatewaymay 112 be installed at a later point in time after the gateway 110 isinstalled, and thus may be registered as the second logical network atthe later point in time.

A record or profile may then be created for associating each network IDwith the credentials of a corresponding gateway, the correspondingnetwork device(s), and the access device. For example, the server of thecloud network 114 may associate the first network ID with thecredentials of gateway 110. Similarly, the server may associate thesecond network ID with the credentials of gateway 112. In someembodiments, the server performs the association by generating andstoring a record including the network ID, the set of security keys, thegateway credentials, the network devices associated with the network ID(e.g., MAC address or serial number of a network device), the accessdevices associated with the network ID (e.g., MAC address, serialnumber, application unique identifier, or the like), and/or any otherinformation relevant to the network devices and/or gateways. Forexample, the server may store the first network ID and the first set ofsecurity keys in a first record at a first memory space (e.g., in Flash,DRAM, a database, or the like) along with the SSID and MAC address forgateway 110 and an identifier of the network devices 102 and/or 104. Theserver may also store the second network ID and the second set ofsecurity keys in a second record at a second memory space along with theSSID and MAC address for gateway 112 and an identifier of the networkdevice 106. In some embodiments, an example of a network deviceidentifier may include a MAC address of the network device, a serialnumber of the network device, or any other unique identifier.

Each of the first and second network IDs may include a unique number oralphanumeric string generated sequentially or randomly. For example, thefirst time a network device and an associated gateway are registered onthe cloud network 114, the unique network ID for the logical network ofthe gateway may start with 7000000. Each subsequent logical network thatis created may be a sequential increment of the initial network ID(e.g., 7000001, 7000002, 7000003, etc.). As another example, the networkID may be generated by a random or pseudo-random number generator. Oneof ordinary skill in the art will appreciate that other techniques forgenerating a unique ID may be used. The technique used to generate thenetwork IDs may be dependent on a type of database that is included inthe cloud network 114. For example, different databases may havedifferent proprietary mechanisms for creating a unique identifier.

The set of keys generated for each logical network may be generatedusing database specific technique. For example, a MySQL technique may beused to generate the sets of keys. Each key may include a universallyunique identifier (UUID) or a globally unique identifier (GUID). Asdescribed above, for each logical network, the server may generate aunique key for a network device and a separate unique key for an accessdevice.

At 208, the network device may receive the network ID and the set ofsecurity keys. For example, once the server has generated a record orprofile associating the network device 102 with the first logicalnetwork, the server may transmit the first network ID and the first setof security keys to the network device 102. The network device 102 maystore the first network ID and one or more keys of the first set ofkeys. For example, the network device 102 may store the unique securitykey that was created by the server for the network device 102.

As noted previously, the network devices 102, 104, 106 and gateways 110,112 may be installed at different times. For example, in someembodiments, network device 104 may be installed at a point in timeafter the first logical network is created based on the pairing betweengateway 110 and network device 102. In such embodiments, upon beingpowered on, the network device 104 may pair with gateway 110, obtaincredentials from gateway 110, and transmit the credentials to the serverin the cloud network 114 using similar techniques as those describedabove. The server may associate the network device 104 with thepreviously generated first network ID. As described above, the servermay also generate a new unique security key for the network device 104,and may retrieve the unique key that was previously generated for theaccess device 108 when registering the first logical network. Thenetwork device 104 may then receive and store the first network ID andthe security keys from the server.

At 210, the network device may send the network ID and the set ofsecurity keys to the access device. For example, the network device 102may send to the access device 108 the first network ID and the uniquesecurity key generated for the access device 108. The network device 102and the access device 108 may then communicate with the cloud networkserver using the first network ID and each device's unique key. In someembodiments, the network device and the access device may generate asignature using their respective security key. The signature is sent tothe cloud network server along with a communication from the networkdevice or access device. The cloud network server may process thesignature in order to authenticate each device, as described below. Thenetwork device and access device may use different techniques togenerate a signature.

A network device may generate a signature using its uniquely generatedsecurity key. For example, the signature may be expressed as:Authorization=MacAddress“:”Signature“:”ExpirationTime. The Authorizationterm may be an attribute, and the MacAddress, Signature, andExpirationTime terms may include values for the Authorization attribute.In particular, the MacAddress value may include the MAC address of thenetwork device, which may include a unique alphanumeric or numericstring. The network device may retrieve its MAC address from memory andplace it in the MacAddress field. The Signature value may be expressedas: Signature=Base64(HMAC-SHA1(PrivateKey, StringToSign)). The Signaturevalue may include an alphanumeric or numeric string. HMAC-SHA1 is anopen source technique that includes a Hash-based Message AuthenticationCode (HMAC) using a SHA1 hash function. The HMAC-SHA1 technique uses thevalues PrivateKey and StringToSign as inputs. The PrivateKey inputincludes the unique security key that was generated by the server forthe network device. The StringToSign input may be expressed asStringToSign=MacAddress+“\n”+SerialNumber+“\n”+ExpirationTime.Accordingly, the StringToSign input is generated by appending a serialnumber of the network device and an expiration time to the networkdevice's MAC address. The ExpirationTime term may indicate the period oftime for which the signature is valid. In some embodiments, theExpirationTime term may include a current time at which the signature isgenerated plus period of time for which the signature is valid. In oneexample, the ExpirationTime term may be expressed asExpirationTime=Number of seconds since Jan. 1, 1970.

The network device may place the signature in a data packet fortransmission with a communication signal to the cloud network server.The network device may also place the network ID in the data packet. Thesignature and the network ID, if included, may be used by the cloudnetwork server to verify that the network device is associated with thelogical network. In some embodiments, a signature is provided with eachcommunication sent from the network device to the server. Once thesignature is received by the server, the server generates a signatureusing the same expression as that used by the network device. Forexample, the server may retrieve the network device's key and otherrelevant information from storage and generate the signature using thekey and the other information using the expression described above. Theserver then verifies whether the signatures match. Upon determining thatthe signatures match, the server authenticates the network device'scommunication.

An access device may also generate a signature using its uniquelygenerated security key. For example, the access device signature may beexpressed as: Authorization=SDU UniqueId“:”Signature“:”ExpirationTime.The Authorization term may be an attribute, and the SDU UniqueId,Signature, and ExpirationTime terms may include values for theAuthorization attribute. The SDU UniqueId term may include a uniquephone identifier. The SDU UniqueId value may depend on the type ofaccess device that is used and the type of values that may be accessedand/or generated by the type of access device. In some cases, one typeof access device may not allow an application to access a uniqueidentifier of the access device (e.g., a serial number, UUID, or thelike). In such cases, the SDU UniqueId value may include a valuegenerated by an application or program installed on and executed on theaccess device that is used to access the network device. The value maybe unique to the application or program that generated the value. Inother cases, another type of access device may allow an application toaccess a unique identifier of the access device. In such cases, the SDUUniqueId value may include a value that is unique to the access deviceitself, such as a serial number, UUID, or the like. In this example, theaccess device may retrieve the unique value from storage within theaccess device. One of ordinary skill in the art will appreciate thatother unique identifiers may be used to uniquely identify the accessdevice. The Signature value may be expressed as:Signature=Base64(HMAC-SHA1(PrivateKey, StringToSign)). Using thisexpression, the input to the HMAC-SHA1 technique may include aPrivateKey term and a StringToSign term. The PrivateKey input includesthe unique security key that was generated by the server for the accessdevice with regard to a particular logical network. The StringToSigninput may be expressed as StringToSign=UniqueId+“\n”+“\n”+ExpirationTime. The StringToSign value is different from the StringToSign valuegenerated by network device in that no serial number is included.Accordingly, the StringToSign input is generated by appending anexpiration time to the access device's unique identifier. TheExpirationTime term may indicate the period of time for which thesignature is valid, similar to that above for the signature generated bythe network device.

The access device may place the signature in a data packet and maytransmit the data packet to the cloud network server with acommunication signal. The network device may also place the network IDin the data packet. The signature and the network ID, if included, maybe used by the cloud network server to verify that the access device isassociated with the logical network and authorized to communicate withone or more network devices associated with the logical network. In someembodiments, a signature is provided with each communication sent fromthe access device to the server. The cloud server may receive thesignature and may generate a signature using the same expression as thatused by the access device. For example, the server may retrieve theaccess device's key and other relevant information from storage andgenerate the signature using the key and the other information using theexpression described above. The server then verifies whether thesignatures match. Upon determining that the signatures match, the serverauthenticates the access device and allows it to communicate with one ormore of the network devices associated with logical network.

Once the provisioning process is completed, the access device 108 mayaccess the network device 102 locally via the gateway 110 (e.g.,communication signal 118) or remotely via the cloud network 114 (e.g.,communication signal 120). In some embodiments, the communicationbetween the access device 108 and the cloud network 114 may be a HTTP orHTTPS communication. One of ordinary skill in the art will appreciatethat other communication mechanisms may be used to communicate betweenthe access device 108 and the cloud network 114.

The network 100 may enable a user to monitor and/or control operation ofthe devices 102 and 104. For example, a user may monitor and/or controloperation of devices by interacting with a visual interface of thegateway 110 (i.e., a web page for gateway 110) and/or a visual interfacerendered on a display of an access device, such as access device 108. Insome embodiments, an application may be run on the access device. Theapplication may cause the access device to present a graphical interfacethat includes a visual interface for each device accessible on thenetwork 100.

A network device may generate and/or provide a “status” of the networkdevice. In certain embodiments, the status or state of a network devicecan be indicated on a visual interface on the access device, for examplewithin the tile with text and/or graphically. The status of the networkdevice can change based on time (e.g., a period, an interval, or othertime schedule). The status of a network device may be any piece ofinformation pertinent to that particular network device. The status of anetwork device may be any changeable variable of that particular networkdevice. For example, the status of a network device may include a stateof the network device itself (e.g., on or off) or how the network deviceis situated within the network with respect to the other network andother network devices throughout the network. For example, the status ofa network device may refer to the network device's proximity to anothernetwork device and/or its ability to communicate with another networkdevice because of the relative signal strength between the two networkdevices. In certain embodiments, the status can include a value or someother information indicating a unit of measure for a setting or anattribute related to operation of a device connected to the networkdevice. The setting or the attribute can be adjustable within a range ofvalues. For example, the device connected to the network device can be alight bulb and the status can include a value corresponding tobrightness (e.g., a percentage of total brightness) emitted by the lightbulb when the light bulb is powered-on. In another example, the devicecan be a motion sensor and the status can include a value correspondingto sensitivity of the sensor in a range of values between 0 to 100 whenthe sensor is powered on. In yet another example, the device can be afan and the status can include a value corresponding to a speed of thefan on a scale of 0 to 100 when the fan is powered-on.

As described above, upon being powered on or reset, the-network devices102 and/or 104 may be registered with the cloud network 114 andassociated with a logical network within the local area network 100.Similarly, upon being powered or switched off or otherwise beingdisconnected from the network 100, the status of the-network device 102would be known and stored by a cache (not shown) associated with thenetwork 100. For example, cloud network 114 may include storage (e.g.cache) that stores the status of the network devices within each localarea network 100 it is connected to and/or provides access to. Inanother example, the gateway 110 may include storage that stores thestatus of the network devices within each local area network it isconnected to and/or provides access to. More specifically, the statusstored in the cache may include a status table which indicates thecurrent status of each network device (as of its last communication witheach network device). A status table may include all statuses of eachnetwork device, or individual storage tables for each local area networkor other subset of its network devices/networks. In one embodiment, achange in status may prompt the-network device to push its change instatus to the cloud network 114 for storage or updating of the cloud'sstored status table. In another embodiment, cloud network 114 and/orgateway 110 may continuously (or periodically) communicate witheach-network device to check to see if its status has changed.

In some embodiments, a network device (e.g. network device 102 and/or104) may, upon connecting to the local area network 100, check thestatus of the-network devices on the network 100. In other embodiments,one-network device may check the status of one or more of the othernetwork devices on the network 100. The network device may seek to checkthe status of another network device or access device for variousreasons, including to display such status(es) to a user on a display orotherwise, to check whether that network device belongs to the samenetwork, to synchronize or coordinate any scheduled executions, toupdate an attribute based on adjustment received among others. Forexample, a network device or user may desire to check various statuseson a connected device, such as power level, timestamped activity history(e.g. temperature for a thermostat, motion for a motion detector, etc.),how long it has been active/turned on, attributes for operation of theconnected device (e.g., a brightness of a lamp, a speed of a fan, or asensitivity of a sensor, etc.), among many others.

In some embodiments, a device, such as the access device 108 shown inFIG. 1 or the gateway 110, connected to the network 100 can communicatean updated status of a network device, such as the network devices 102and/or 104. The updated status can be communicated via the network 100and can include an adjustment that affects a status of the networkdevice. The adjustment can include an amount of change to one or moreattributes, one or more settings, or a combination thereof related tooperation of the network device connected to the network 100. The accessdevice 108 or the gateway 110 can present a graphical interface that canreceive input corresponding to an adjustment to a status of a device. Insome embodiments, the updated status of the network device communicatedto the network 100 can be received by a network device to which theupdated status applies, or can be received by the gateway 110, the cloudnetwork 110, or any other device in communication with the network. Ifthe device cannot directly receive the updated status, it can alsoreceive the updated status from the cloud network 114, the gateway 110,or the other devices in the network 100. In some embodiments, thenetwork device can communicate its updated status to the network 100,which can indicate whether the status has been updated. The updatedstatus can be received by the access device or any other device in thenetwork 100. In some embodiments where the access device is not locatedwithin the network 100, the access device may not immediately receivethe updated status. The updated status can be stored by the cloudnetwork 114 or the gateway 110 for communication to the access device.The status of the network device can indicate whether an adjustment wasmade based on an adjustment in a setting or an attribute transmitted bythe access device. Alternatively, or additionally, the access device canreceive, from any other network device connected to the network 100, astatus update indicating whether the adjustment was in fact made at anetwork device.

A network device seeking to check the status of any other device on thenetwork 100 may communicate with the cloud network 114, to which alldevices on the network 100 are connected either directly or indirectly.Since the cloud network 114 and/or the gateway 110 can store an updatedtable/list of the statuses of each of the network devices 102 and 104within the requesting network's local area network, the cloud network114 and/or gateway 110 may communicate such status data to the networkdevices 102 and 104 and the access device. For example, if-networkdevices 102 and 104 were to each turn on and communicate their statusesto cloud network 114, cloud network 114 may analyze the status ofnetwork devices 102 and 104 and communicate to-network devices 102 and104 that they are each connected to the same local area network 100.

FIG. 3 illustrates an example of a network 300, according to embodimentsof the present invention. Specifically, the network 300 can be awireless local area network enabling an access device to communicatewith network devices to control adjustment of attributes related tooperation of the network devices. Network 300 includes network device302, network device 304, network device 306, and network device 308. Thenetwork 300 also includes access device 108. In other words, the network300 may be substantially similar to the network 100 except that accessdevice 108 has been turned on near the network 300, to which it isassociated, or has entered an area to which the network 300 can reach.

When access device 108 can enter the network 300 as shown in FIG. 3,access device 108 may be authenticated based on the access device'sauthentication with the logical network or may otherwise commencecommunication with cloud network 114. Access device 108 may alsocommunicate notification of its presence or other information directlyto other network devices 302-308 within network 300, as shown in FIG. 3by communication paths 330. As noted, such communication may includevarious communications protocols, such as Universal Plug and Play(UPnP), Bluetooth®, Zigbee®, Ultra-Wideband (UWB), WiFi-Direct, WiFi,Bluetooth® Low Energy (BLE), sound frequencies, and/or the like. Forexample, access device 108 may communicate to all other devices innetwork 300, including network device 302, network device 304, networkdevice 306, and network device 308, information/data regarding itsstatus. Such status data may include the fact that it is present andturned on, or other status data/information. At any time that networkdevices 302, 304, 306 and 308 recognize that access device 108 ispresent at network 300, the network devices may communicate back toaccess device 108. For example, the network devices may send anacknowledgement (e.g., ACK signal) back to access device 108 to confirmthat they received the status data sent by access device 108. Thenetwork devices may also send their own status data to access device108.

While network devices 302-308 and access device 108 may each receivecommunication from other network devices around the network 300,including the status of each of those network devices, network devices302-308 and/or access device 108 may be continuously scanning network300 (including, for example, running discovery algorithms) to determinewhether any devices within the network have moved, turned on/off orotherwise added to or subtracted from the network 300, or have otherwisechanged statuses.

Since network devices 302-308 and access device 108 may each receivecommunication from other devices around network 300, including thestatus of each of those devices, each network device within network 300may know the status of each other network device in the network 300. Forexample, access device 108 or devices 302-308 may not be required tocommunicate with cloud network 114 in order to obtain one or more ofsuch statuses. Since cloud network 114 is an external network and may beremote from network 300, communication between network devices withinthe network 300 and cloud 114 may take more time than communicationbetween two devices within network 300. For example, communicationbetween devices within network 300 may take anywhere from 1 millisecondto 100 milliseconds, while communication between a device within network300 and the cloud network 114 may take anywhere from 50 milliseconds to1 second or more). Furthermore, if a network device is retrievinginformation from cloud 114, the request must travel from the networkdevice to cloud network 114, and then the information must travel backfrom cloud network 114 to the network device. This process may doublethe latency caused by retrieving information with cloud 114. Therefore,devices within the network 300 may choose to send and receive/retrievestatuses directly with other devices within the network 300 instead ofcommunicating such information via cloud network 114. When a networkdevice receives status data from another network device on the device'slocal area network 300, it may store that status data so that it mayretrieve and use that status data at a later time.

FIG. 4 illustrates an example of a network 400, according to embodimentsof the present invention. The local area network 400 may include networkdevice 302, network device 304, network device 306, network device 308,and access device 108. FIG. 4 also illustrates that one or more networkdevices 302-308 and/or access device 108 may include a storage device,such as a cache, for storing data, including data regarding its ownstatus and data regarding statuses received from the other deviceswithin local area network 400. For example, access device 108 may, afterbeing powered up, broadcast/send its status to network device 308 viacommunication 434. Network device 308 may store the status data receivedfrom access device 108 until the next time access device 108 updates itsstatus by sending new/updated status data to network device 308. Cachemay be used for storage within network devices 302-308 and/or accessdevices within the local area network 400 so that each of the devicesmay be able to quickly retrieve the data it needs from storage. Anapplication operating on the access device 108 can access the cache toobtain information to display the visual interface for each networkdevice 302-308 registered within the network 400. Although a cachingdevice may be used to store such data within the network and/or accessdevices within the local area network 400, other types of storage may beused.

The cache can contain a known interface list including interfaceinformation for different, known types of devices. The known list caninclude a record for each network device known by the access device 108to exist on the network 400. When an application is run on the accessdevice 108, the access device 108 can access the known interfaces in thecache to present the display of access device 108. The display canpresent one or more visual interfaces, each corresponding to a networkdevice known to exist on the network 400. Each visual interface can begenerated based on a visual interface module corresponding to eachdevice on the network 400. In an example, the display can include avisual interface (e.g., a module tile) for each device in the network400 having an interface in the known interface list.

The cache can also contain known status information about each networkdevice in the known device list. When the application is run on theaccess device 108, the access device 108 can access the known statusinformation in the cache to present a status display. The access device108 can populate each tile with an indicator representing the respectiveknown status information for each device in the known device list. Thestatus display can include an indicator of one or more attributes, oneor more settings, or a combination thereof related to operation of eachdevice in the network 400. For example, the status display can include aspeed of a fan (e.g., a fan speed of 56 in a range of values between 0and 100) of the network device 302 (e.g., a fan), a value of sensitivityof a sensor (e.g., a value of 34 in a range of values 0-100) for thenetwork device 304 (e.g., a motion sensor), a value of brightness (e.g.,65 percent brightness) for the network device 306 (e.g., a light bulb),and a value of temperature (e.g. a slow cooker). Although shown ashaving a single indicator for an attribute or a setting related tooperation of a network device, the status display can present aplurality of indicators corresponding to different attributes and/orsettings related to operation of a network device.

In some embodiments, the cache can include other information about anetwork device. The other information can indicate a device's firmwareversion, last known firmware update status, connectivity to cloudstatus, registration status (e.g., whether the network device has a keyor not), and other such information. The cache can include informationthat could be used for troubleshooting. In embodiments described below,the access device 108 can access status information from another otherdevice on the network 400 and can use that information to update its owncache, update the status display, and/or pass the information to thecloud network 114 and/or the gateway 110 for trouble shooting and/orstorage.

Even though each network device may know and store (e.g. in cache) thestate of each other network device within local area network 400, anetwork device may not know when another network device changes status(e.g. turns/powers off). However, network devices and/or access deviceswithin local area network 400 may broadcast/send any updates in itsstatus to other devices on the network. For example, if network device302 changes status, it may send status data to the other networkdevices, such as network devices 304, 306 and 308 and to access device108. However, network device 302 may not know which devices to updatesince the other devices may change statuses periodically (e.g. turnoff).

Therefore, a network or access device may subscribe to another networkor access device within local area network 400. For example, networkdevices 304, 306 and 308 and access device 108 may subscribe to statusdata notifications/updates from network device 302. Such a subscriptionmay be registered for upon initial connection with network device 302when network device 302 first enters local area network 400 or at anyother time after network device 302 has been associated with local areanetwork 400. Subscriptions may be controlled to last indefinitely or mayexpire after a certain predetermined period of time after initialsubscription. However, network devices may re-subscribe to anothernetwork device before or after their previous subscription has expired.

Subscriptions between network device and/or access devices may beregistered, similar to registering a network device upon initialentrance into the local area network, including security registrationsdescribed herein with respect to FIGS. 1 and 2. For example, a networkdevice may send its unique security key, which it may have stored alongwith its network ID after being registered on the network, to a networkdevice to which it wants to subscribe. However, subscriptions may takeon many other forms, including sending a different form ofidentification to a network device to which a network device wants tosubscribe. However, subscriptions may take on many other forms,including sending a different form of identification to a network deviceto which a network device wants to subscribe.

Upon receiving a subscription from another network device or accessdevice, the device being subscribed to may store a list of the devicesthat subscribed to it. For example, network device 302 may store a listof network devices 304, 306 and 308 and access device 108 after thosedevices subscribe to network device 302. Then, when network device 302undergoes a change in status, network device 302 may send that change instatus to only the devices that had previously subscribed to it butwhere the subscription had not yet expired. Furthermore, according tosome embodiments, the subscription list of a network device may beautomatically updated if that device receives notification that anotherdevice has left the range of the local area network, either from thatdevice itself or from a different device. Therefore, the various deviceswithin a given local area network, such as network 400, each containcontinuously updated statuses of each other device on the network andobtain those statuses and updates through direct communication withoutnecessary use of the cloud.

FIG. 5 illustrates an access device 108 that is located remotely fromnetwork 500 (e.g. local area network), according to embodiments of thepresent invention. Local area network 500 includes gateway 110 andnetwork devices 502 and 504 (which may be, for example, the same as anyof network devices 302-308 in FIGS. 3 and 4), as shown in FIG. 5.However, network 500 may also include a variety of other network devicesand one or more access devices directly connected to network 500.Gateway 110 is connected to cloud network 114, and allows networkdevices 502 and 504 to connect to cloud 114, the internet, or otherexternal networks via gateway 110. In some embodiments, the networkdevices 502 and 504 may include home automation devices that allow auser to access, control, and/or configure various home applianceslocated within the user's home, such as a television, radio, light,microwave, iron, and/or the like.

Access device 108 is not directly connected to network 500. Instead,access device 108 is external to network 500 and may connect to cloudnetwork 114 and to network 500 via cloud network 114. As noted, networkdevices 502 and 504 may change status on a periodic basis. In someembodiments, even when external to and not directly connected to network500, an access device may request to check the status of the devices onthe network. When access device 108 seeks to check the status of anydevice on the network, the access device 108 may transmit/send acommunication 536 to the cloud network 114, to which all devices on thenetwork are connected either directly or indirectly via gateway 110.Since the cloud network 114 stores an updated table/list of the statusesof each of the devices within the requesting access device's network,the cloud network 114 may transmit a communication 538 of such statusdata to the access device 108. For example, after network devices 502and 504 are turned on, authenticated and are a part of network 500,network devices 502 and 504 may communicate their statuses to cloudnetwork 114. Furthermore, any time the status of network devices 502 and504 changes, the device that incurred a status change may push/sendinformation (e.g. an indication) of that status change to cloud network114. Cloud network 114 may store, in cache 526 or otherwise, thestatuses (which may be time stamped in metadata or otherwise) of networkdevices 502 and 504. Therefore, when access device 108 requests fromcloud network 114 the statuses of devices on network 500, cloud 114 maysend its most recently stored/updated statuses to access device 108.

To obtain the most updated status data of devices within network 500,cloud 114 may, upon receiving a request for status data related tonetwork devices 502 and 504, transmit/send a communication 532 (e.g.request, query, etc.) for such status data to network devices 502 and504 via gateway 110. Once network devices 502 and 504 receive thisrequest, network devices 502 and 504 may send a communication 534 (e.g.updated status data) to cloud 114 to replace the previouslystored/cached statuses in cache 526. Upon receipt of updated status data534 from network 500, cloud 114 may send a communication 538 of suchstatus data to the access device 108.

However, the process of cloud network 114 requesting updated statusesfrom network devices 502 and 504 within network 500 may cause latencywithin the system. More specifically, the time required for cloudnetwork 114 to request updated statuses from network devices 502 and 504and to in turn receive updated statuses from network devices 502 and 504may be substantially greater than the time required for cloud network114 to send its currently stored statuses (without being updated) fornetwork devices 502 and 504 to access device 108. For example, of thetotal time required for access device 108 to receive updated statusesfrom cloud network 114, 80% or more of that total time may include cloudnetwork 114 requesting updated statuses from network devices 502 and504. On the other hand, of the total time required for access device 108to receive updated statuses from cloud network 114, 20% or more of thattotal time may include the status data being transmitted from cloudnetwork 114 to access device 108. Since a majority of the processrequired for access device 108 to request and receive status data fornetwork devices 502 and 504 is the transmission of data between cloud114 and network devices 502 and 504, the access device 108 and cloudnetwork 114 may maximize efficiency by minimizing the effect of thetransmission of data between cloud 114 and network devices 502 and 504on the whole process/system.

FIG. 6 illustrates an example of a process 600 for using data from oneor more detector devices to infer a context and control a deviceoperation and/or notification presentation according to an embodiment ofthe invention. Part or all of process 600 can be performed, for example,by the cloud network 114, a gateway 110 or 112, or a network device 102,104 or 106.

Process 600 can begin at block 602 where environmental stimulus datafrom one or more detector devices is accessed. Each of the one or moredetector devices can be a network device, such as the network devices102, 104, 106 illustrated in FIG. 1. In some instances, the one or moredetector devices include different types of devices (e.g., configured todetect different types of stimuli) and/or devices positioned atdifferent and/or corresponding locations (e.g., different rooms within ahouse or different locations within a room).

A detector of the one or more detector devices can be configured todetect data related to an environmental stimulus such as light, sound,acceleration, vibration, liquid (e.g., for leak detection, water usageor rain detection), humidity, temperature, pressure, air quality,seismic activity, smoke, carbon monoxide, etc. The detector of the oneor more detector devices can be configured to detect a presence,intensity, pattern, type (e.g., light color), location and/or directionof the stimulus. The environmental stimulus can relate to a localenvironment around at least part of the detector, an inside environment(e.g., of a room or building), and/or an outside environment. In oneinstance, the environmental stimulus data is indicative of a presence,intensity, color, temporal pattern or spatial pattern of light detectedby one or more light detectors. In some instances, at least one (oreach) detector device can include an outer surface that serves as aninterface to receive environmental stimuli. For example, the interfacecan include a lens (e.g., a Fresnel lens).

In some instances, a detector device is physically connected to anothernetwork device. The connection can be a permanent or interchangeableconnection. For example, a detector device and another network devicecan each include a port configured to receive a connecting cable. Inthis manner, a given network device can be connected to any of a varietyof devices. A physical connection can, in some instances, focus adetection to variables associated with the connected device (e.g., apower usage, a wireless connection strength, and/or a light emission ofthe device).

In some instances, the environmental stimulus data includes a pluralityof data points. The plurality of data points can correspond tomeasurements from a single device made at a plurality of times and/or tomeasurements made from multiple devices (e.g., made at a single time,during a single time period or at different times). In instances wherethe data points are associated with multiple devices, the devices can beassociated with a same gateway, network identifier, access device and/oruser identifier. Two or more (or all) of the devices can be locatedwithin a same building or room. Two or more (or all) of the devices can,but need not, be of a same type. For example, one or more data pointscan be collected from each of a set of light detectors positioned atdifferent locations within a home.

In some instances, at least one (or each) detector device is configuredto perform and/or initiate an operation in addition to and/orindependent of the detection. The operation can include a home-controloperation, a power-control operation and/or an operation with an effectbeyond data processing and/or presentation. For example, the operationcan include controlling whether a light is on or off, operation of anHVAC system, a kitchen-appliance operation, operation of a securitysystem, or operation of a laundry machine. In some instances, at leastone (or each) detector device is a passive device that itself does notitself perform or initiate an operation (e.g., of one or more of theabove-identified types).

At block 604, one or more stimulus variables are generated based on thedata. In some instances, a stimulus variable includes stimulus datadetected by a detector device. In some instances, a stimulus variable isa processed version of one or more detected stimulus data points. Forexample, a stimulus variable can include an average of a set of datapoints measured by a single detector, an average of a set of data pointsmeasured by different detectors, a latency between data points (orabove-threshold measurements) measured by multiple detectors, a binarytransformation of one or more data points, a spatial or temporaldifferential in measurements based by one or multiple detectors, etc.

In one instance, a stimulus variable is determined based on multipleenvironmental stimulus data from multiple detector devices. In oneinstance, a unique stimulus variable can be associated with each of aset of binary detector detections. For example, if a system included alight detector in three rooms, and each was associated with a thresholdused to estimate whether a light was on, each of nine stimulus variablescould represent a particular combination of the lights being on or off.In some instances, determining the stimulus variable can includedetermining one or more weights, such as a weight associated with eachdetector device (e.g., as determined using a learning technique. In someinstances, the stimulus variable depends on an order of multipledetections. For example, a stimulus variable can depend on a sequence inwhich light was detected in multiple rooms.

At block 606, one or more device variables (e.g., each associated with adevice that detected one or more environmental stimulus data pointsaccessed at block 602) are identified. A device variable can relate, forexample, to a device location (e.g., geographic coordinates or a room),orientation, setting, type, sensitivity, measurement scale, detectionrange, height, and/or movement. A device variable for a device can bebased on, for example, stored data pertaining to the device, a signalfrom the device, a signal from another device, user input (e.g.,identifying a functional location) or assessment of data points measuredby the device.

At block 608, an inference is made based on the one or more stimulusvariables. In some instances, the inference further depends on theidentified one or more device variables. Generating an inference caninclude inferring a characteristic of a context, such as (for example) acharacteristic of a context of a device (e.g., a device performing partor all of process 600 and/or a detector device of the one or moredetector devices at block 602), person or user, home, and/or room. Insome instances, generating an inference can include determining acontext variable (e.g., such as an identifier) indicative of a contextcharacteristic.

For example, a context variable can correspond to an inference as towhether anyone is in a home, who is in a home, who is about to enter ahome, who is arriving at a home, whether a person is asleep, and/or anoutside weather condition corresponding to a device location. In someinstances, generating an inference includes a generating a prediction.For example, a prediction can be made as to which rooms in a house oneor more people will occupy within 5 seconds, whether a user will besatisfied with (or would instead change) a device setting and/or a paththat a user is embarking on.

The context can be inferred using, for example, a rule which can, forexample, include one at least partly (or entirely) defined by a userand/or identified using a learning technique (e.g., using adecision-tree, association-rule, neural-network,inactive-logic-programming, support-vector-machine, clustering,Bayesian-networks, reinforcement-learning, representation-learning,similarity-learning, and/or sparse-dictionary-learning technique). Thelearning technique can include a dynamic or fixed technique and can bebuilt on or updated using a data set associated with, for example, agroup of users, group of device types, group of locations, a singleuser, a single device type, and/or a single location.

In one instance, one or more (e.g., a set of) of each of: stimulus,device, context and/or action variables can be analyzed to identify ormodify properties of a learning technique (e.g., variable selectionand/or weights). An analysis result can identify, for example, whichstimulus and/or device variables are predictive of, correlated with orotherwise associated with one or more context and/or action variablesand a relationship between such stimulus and/or device variables and thecontext and/or action variables. In one instance, a clustering techniqueis performed to identify clusters of stimulus and action variables. Eachcluster can be approximated to be associated with a context.

A context variable (e.g., a cluster identifier) can be indicative of acontext and, for example, identified based on input or other data (e.g.,from a detector device). For example, detection of a local input from ahome device can indicate that at least one person is at home, ordetection of motion near a door can be indicative of a time of entry toa home or room.

An action variable can be indicative of a control of one or more devices(e.g., network devices) and/or a notification to be presented on adevice. For example, an action variable can include a power state, levelor intensity, setting, time control, and/or preset identifier (e.g.,corresponding to a preset for a given user). In some instances, anaction variable includes a change of a control of one or more devices(e.g., turning a device from off to on, setting a device timer, etc.).As another example, an action variable includes text and/or a graphicfor a receiving device to present. Various action variables cancorrespond to context variables. For example, if a user locally changesa setting or power state for a device in a given room, such action canindicate that someone is present in the room.

In one instance, a context variable is distinct from an action variable.For example, a context variable can indicate that a user just arrived athome, and an action variable can indicate that a user de-activated asecurity system. In one instance, an action variable can serve as acontext variable. In such instances, the inference made at block 608 caninclude predicting an action that a user will or would want to take.Thus, a rule can associate stimulus and/or device variables directlywith desired actions rather than inferring why the reasons areappropriate.

At block 610, one or more actions (and/or one or more deviceidentifiers) can be identified based on the context. The action can bedetermined using, for example, a look-up table or rule (e.g., defined bya user or determined using a learning technique, such as one disclosedherein). In one instance, a look-up table can associate each of one ormore context variables with an action variable and/or a deviceidentifier. For example, a context variable representing that one ormore people are in a front yard after dark can correspond to a power-onaction variable associated with a porch-light device identifier. Asanother example, a context variable associated with a user path from abedroom to a front door can correspond to action and device variablesassociated with a time series of turning lights on and off. As yetanother example, a context variable associated with a child napping cancorrespond to action and device variables associated with turning off ormuting a doorbell, phone, laundry machine, sprinkler system, and HVAC.

At block 612, a communication can be sent to each of one or moredevices, where the communication includes a context and/or actionvariable. When a context variable is included in the communication, insome instances, the receiving device can determine an action (if any) toperform based on the context variable. In some instances, thecommunication corresponds to an absolute or conditional instruction toperform an action (e.g., power on, power off, set a setting, set asensitivity, present a notification) corresponding to the actionvariable. For example, in one instance, a communication can cause adevice to present an indication of an action and to perform the actionif contrary user input is not received within a defined time period. Asanother example, a communication can cause a device to perform an actionso long as the device has not inferred a context contrary to a contextvariable included in the communication.

It will be appreciated that (as is true for all processes disclosedherein), in some instances, process 600 can be modified to omit one ormore depicted blocks. For example, process 600 can be performed at anetwork device, and the action identified at block 610 can correspond toone to be performed by the network device. In some instances, block 612may then be omitted, though in other instances, block 612 can bemodified to transmit a notification of a context or action variable(e.g., such that it can be used for inter-device coordination or rulemodification).

Through process 600, devices can coordinate their detections andoperations. Because devices can (for example) be positioned at differentlocations, have different detection capabilities, have different userpopularities, etc., using data from a first device to influence anoperation of a second device can improve a success (e.g., in terms ofuser satisfaction) of such automated operation. Further, in someinstances, a rule can directly relate environmental stimulus data toaction variables. However, introducing an intermediate non-actioncontext variable in the relationship can further improve a ruleadaptability and a user's satisfaction with the rule. For example, acontext-based rule can identify three different stimulus variablesindicating that a particular user is home and five different actionsthat are to be performed when it is inferred that the user is home. Iflater a new stimulus variable is determined to be indicative of a userbeing home, a learning technique need not separately learn that the newvariable is associated with each of the five actions; rather, the singleassociation with the home context can automatically associate the newstimulus variable with each of the actions.

FIG. 7 illustrates an example of a process 700 for presenting a stimulusat a detector device according to an embodiment of the invention. Partor all of process 700 can be performed, for example, by a detectordevice, which can also be network device 102, 104 or 106. In someinstances, a detector device (as referred to herein) can include onelacking a user interface, one or more buttons, a touchscreen, aninput-component port, etc.

Process 700 can begin at block 702 where the device can receive inputstimulus data. The input stimulus data can include data reflecting anenvironment. For example, a detector device can be configured toreceive, process and/or detect light, sound, acceleration, vibration,liquid (e.g., for leak detection, water usage or rain detection),humidity, temperature, pressure, air quality, seismic activity, smoke,or carbon monoxide data. The stimulus can be received at an interface ofthe device, which can include, for example, a lens or membrane. In oneinstance, a device receives multiple input stimuli. For example, adevice can be configured to detect light intensity corresponding todifferent spatial locations.

In one instance, the detector device can be configured to receive alight stimulus and/or to detect a presence, intensity, pattern, type(e.g., light color), location and/or direction of the stimulus. Thedevice can include, for example, a photodiode, photoresistor,active-pixel sensor, and/or reverse-biased LED.

At block 704, a stimulus variable can be identified based on the inputstimulus. The stimulus variable can include a property of the detectedstimulus, such as a presence, intensity, direction, time, spatialpattern and/or temporal pattern of the stimulus. The variable can bedetermined by thresholding received data (using hardware or software) toestimate whether a stimulus was present. The threshold can be fixed,determined based on user input or determined based on other detectordata points (e.g., associated with a corresponding time or time period,such as to be able to implement a relative spatial or temporaldetection). In one instance, a stimulus variable reflects a digitaloutput, resistance or current corresponding to a detected lightintensity. Determining a stimulus variable can include processing rawdata (e.g., using hardware or software) to, for example, filter the dataover time or identify an average or extremum of a collection of datapoints.

At block 706, a first communication that includes the stimulus variablecan be transmitted by the detector device. The first communication canbe transmitted to, for example, another network device, a gateway or aserver on a cloud network. The first communication can also include, forexample, an identifier of the device, a network identifier, a gatewayidentifier, and/or a time (e.g., at which the stimulus was received, thestimulus variable was identified or the first communication wastransmitted). In some instances, the transmission includes a conditionedtransmission. For example, the transmission can occur only when thestimulus variable exceeds a particular threshold, when a change in thestimulus variable exceeds a particular threshold, when a defined timeperiod has passed since a previous transmission, when the devicereceived a request for the stimulus variable, etc.

At block 708, the detector device can receive a second communication.The second communication can be from a same device as to which the firstcommunication was transmitted or a different device. The secondcommunication can be received from, for example, another network device,a gateway or a server on a cloud network. The second communication caninclude also include an identifier of the device, a network identifier,a gateway identifier, and/or a time.

The second communication can include raw or processed data detected atone or more detector devices (e.g., of same or different types and/orcorresponding to a same or different gateway, room, location, building,network identifier, and/or user account). For example, the secondcommunication can include one or more stimulus variables or processedversions thereof. The one or more detector devices may, or may not,include the device receiving the communication.

The data can relate to a presence, intensity, direction, time, spatialpattern and/or temporal pattern of one or more detected stimuli. In oneinstance, the data includes processing aggregated stimulus variables(e.g., aggregated across device) to, e.g., obtain a statistic (e.g., aminimum, maximum, mean, mode, variation, count, percentage (e.g., ofabove-threshold variables) or median), filter the data or categorize thedata. For example, a time series of power detections can be obtainedfrom each of a set of devices. The time series can be summed acrossdevices and filtered in time. A maximum can then be identified from theprocessed time series and included in the second communication.

As another example, the second communication can indicate that acumulative power usage as detected by devices in one room or a house, alight intensity detected by a detector in another room (e.g., a child'sbedroom) has substantially decreased, or a temperature detected inside ahouse is warmer than an outside temperature associated with a locationof the house etc.). As another example, the second communication caninclude data reflecting user input or device operation at anothernetwork device (e.g., a power status, a setting or an estimatedtask-completion time), and/or data pertaining to a user account (e.g.,identifying a calendar event, a new email, a new text message or a newvoice message).

In some instances, the second communication includes an implicit orexplicit instruction. The instruction can include presenting a generalstimulus (e.g., by powering a single light source at the device) orpresenting a specific stimulus (e.g., by powering one or more selectlight sources, applying select spectral or spatial filters, selecting astimulus from amongst a set of stimuli, presenting text included in orgenerated based on the second communication, etc.).

At block 710, a determination can be made based on the secondcommunication as to whether to present a stimulus. In one instance,receipt of the second communication is indicative that a stimulus is tobe presented. In one instance, data in the second communication can beanalyzed to determine whether a stimulus is to be presented. Forexample, the determination can be based on a detected value (e.g.,whether a detected value exceeds a threshold) and/or a device identifierincluded in the second communication (e.g., whether it matches one in apresentation look-up table).

In one instance, the determination is based at least in part on adetection, context or characteristic of the detector device. Forexample, a presentation condition can include that the stimulus variableidentified at block 704 exceed a threshold. Such a condition can resultin a reservation of stimulus presentation for times when it can beinferred or is likely that someone is near (e.g., is in a same room orbuilding or is across from) the detector device, such that presentationsnot likely to be seen by anyone can be avoided (e.g., to thereby reduceenergy consumption, light resources, etc.).

As another example, in some instances, data included in the secondcommunication is based on the identified stimulus variable (e.g., if thesecond communication includes a statistic representative of the variableand other stimulus variables). Thus, a presentation determination candepend on the identified stimulus variable by virtue of being based onthe data included in the second communication.

As yet another example, if the detector device is presenting anotherstimulus, it can postpone or reject postponing another stimulusparticularly associated with the second communication. As anotherexample, the detector device can present the stimulus only if light ormotion is detected by the detector device, if a charge of the detectordevice is above a threshold and/or if a power supply is of a particulartype. In some instances, determining whether to present the stimulusincludes inferring a context (e.g., a user or house), such as inferringhow many (and/or which) users are in a home, whether and/or when a useris predicted to arrive at a home or in a room, etc.

When it is determined that a stimulus is not to be presented, process700 can return to block 708 (and/or to block 702). When it is determinedthat a stimulus is to be presented, process 700 can continue to block712 where a stimulus can be selected. In some instances, a detectordevice is configured to present only a single stimulus, and thus, thestimulus selected at block 712 can correspond to the single stimulus. Insome instances, a detector device can be configured to present any ofmultiple stimuli. Selecting a stimulus can then include, for example,selecting a color, spatial pattern, temporal pattern, duration and/orintensity for a stimulus (e.g., a visual stimulus) and/or selecting textand/or an image to include in the stimulus. In some instances, theselection includes selecting between a set of stimuli.

The selection can be based on, for example, data included in the secondcommunication (e.g., which can include a raw or processed stimulusvariable from one or more detector devices), an identifier in the secondcommunication, a detection, context or characteristic of the detectordevice, and/or a stimulus-selection rule (e.g., as defined based on, forexample, user data or a learning technique). For example, a color of alight stimulus can be indicative of which device type sent the secondcommunication. As another example, a stimulus can be indicative of aninferred arrival or departure of a user in a house; a first stimuluscharacteristic (e.g., a color) can correspond to an estimated identityof the user, and a second stimulus characteristic (e.g., a temporalflashing pattern) can correspond to whether it is estimated that theuser is arriving or leaving. As yet another example, an intensity of afirst region of a stimulus can correspond to a power usage detected atthe detector device and an intensity of a second region (e.g., next to,inside or around the first region) of the stimulus can correspond to apower usage accumulated across devices in a given room or house.

In some instances, the stimulus can be of a same modality of the inputstimulus. For example, a detector device can be configured to detectvisual stimuli (e.g., by detecting light intensity) and also to presentvisual stimuli. In some instances, the stimulus includes a differentmodality relative to the input stimulus (e.g., the stimulus being anaudio stimulus).

At block 714, the selected stimulus can be presented. In some instances,the stimulus is presented using at least part of a same interface asused to receive the input stimulus at block 702. For example, a lens canbe used both to receive light and to present a visual stimulus. In someinstances, the stimulus is presented using at least partly a differentinterface as compared to that used to receive the input stimulus. Forexample, a lens on a detector device can be used to receive light and avisual stimulus can be presented at or through a different surface onthe device.

Thus, process 700 illustrates how a device can both serve to detectlocal stimuli and also to receive data from other devices (e.g.,connected to a same gateway) to present stimuli serving as notificationsof events or inferences. Such a passive notification can be used toconvey operation of household devices, detections pertaining tohousehold members or the house and/or alerts in a non-intrusive mannerusing an interface already present in a setting.

It will be appreciated that (as is the case for all processes disclosedherein), the order of the blocks is illustrative and be modified. Forexample, blocks 702-706 can be performed after blocks 708-714 or708-710. Further, it will be appreciated that blocks in process 700 canbe performed a different number of times. For example, blocks 702-706can be performed multiple times relative to a number of times blocks708-714 are performed.

In one particular implementation, process 700 can be performed by amotion or light detector. Thus, the input stimulus received at block 702can include light input, and the stimulus can be received via a lens(e.g., a Fresnel lens). Further, the stimulus variable identified atblock 704 can be detected used a PIR (passive infrared) sensor and caninclude one or more light-intensity measures. At block 714, presentingthe stimulus can include emitting a light at a light source in thedevice, filtering the light and/or projecting the light. In someinstances, the device can be configured to include multiple pixels. Topresent a stimulus, one or more intensities (e.g., RGB intensities) canbe assigned to each pixel.

FIG. 8 is an example of a block diagram of a detector device 800depicting different hardware and/or software components of the detectordevice 800. Detector device can include a housing 802 surrounding part,most or all of the device. A material of the housing can include, forexample, a plastic or metal. The material can be opaque or translucent.In some instances, a part of a housing includes a lens 804 or otherfocusing device. An absorption, reflectivity, transmissivity, refractiveindex and/or material of lens 804 can differ from and/or be greater thananother portion of housing 802.

Device 800 can include a filter 806 positioned behind the lens. Thefilter can include a filtered to filter out infrared light, visiblelight or light associated with particular wavelengths (e.g., associatedwith particular colors). A sensor 808 can be positioned to receivefiltered light. The sensor can be configured to detect visible orinfrared light. For example, sensor 808 can include a PIR sensor or aphotodetector or photodiode. A raw or processed output of sensor 808 canbe included in a signal, which a transmitter of device 810 (not shown)can transmit to another device.

Device 800 can also include a light source 812. Light source 812includes a backlight or frontlight. In some instances, device 800further includes a light controller 814 (e.g., one or more light valves,power regulators, and/or filters) to specify light properties, such aswhether light is emitted, a light wavelength, a light intensity, atemporal light pattern or duration, and/or a spatial light pattern orsize. Device 800 can, in some instances, include a projecting device 816to project the light towards lens 804. Thus, device 800 can beconfigured to detect a visual stimulus and to present a visual stimulus.

As discussed herein, whether and/or which visual stimulus can depend ondata received at one or more other network devices. The visual stimuluscan depend on a device detection and/or a context inference.

It will be appreciated that detector device 800 can also includeadditional components not shown in FIG. 8 and/or different operationcapabilities or properties beyond or instead of those described withrespect to the figure. For example, detector device 800 can include aprocessor, DSP and/or memory and/or a component as shown in any of FIGS.9-13 or discussed in relation to any such figure. In some instances,detector device 800 lacks a user interface.

FIG. 9 illustrates an example of a front view of a network device 900.FIG. 10 illustrates an example of a side view of the network device 900.The network device 900 may include any of the network devices 102, 104,or 106 described herein. In some embodiments, the network device 900 maybe a home automation network device. For example, the network device 900may include a home automation switch that may be coupled with a homeappliance. A user may wirelessly access the network device 900 in orderto access, control, and/or configure various home appliances locatedwithin the user's home. For instance, the user may remotely controlappliances such as a television, radio, light, microwave, iron, spaceheater, wall A/C unit, washer, dryer, fan, and/or the like. Networkdevice 900 can include one configured to communicate directly orindirectly (e.g., via a gateway or cloud network) with a detectordevice. Additionally or alternatively, a detection or operation ofnetwork device 900 can, in part or in full, support a context inferenceand/or a determination that a detector device is to present a stimulus(e.g., corresponding to a notification, such as a notification of apower usage).

In some embodiments, the network device 900 may include a WiFi enabledswitch that connects home appliances and other electronic devices to acompatible 802.11b/g/n/ac WiFi network. The network device 900 may thusallow users to locally or remotely turn devices on or off from anywhere,program customized notifications, and/or change device status. Thenetwork device 900 may further allow a user to create custom schedulesor have devices respond to sunrise or sunset.

The network device 900 includes an power switch 902 that may bedepressed in order to turn the network device 900 on and off. In someembodiments, a light source may be integrated with or located behind thepower switch. For example, a light-emitting diode (LED) may be locatedon a circuit board under the power button 902. The light source may beilluminated when the network device 900 is powered on, and may not beilluminated when the network device 900 is powered off.

The network device 900 further includes a communications signalindicator 904. The signal indicator 904 may indicate whether the networkdevice 900 has access to a communications signal, such as a WiFi signal.For example, the signal indicator 904 may include a light source (e.g.,a LED) that illuminates when the network device 900 is connected to acommunications signal. The light source may depict different colors orother characteristics (e.g., flashing, dimming, or the like) to indicatedifferent levels of signal strength or mode of operation.

The network device 900 includes a restore button 1010. The restorebutton 1010 may allow a user to reset the network device 900 to factorydefault settings. For example, upon being depressed, the restore button1010 may cause all software on the device to be reset to the settingsthat the network device 900 included when purchased from themanufacturer.

The network device 900 further includes a plug 1008 and an outlet 906.The plug 1008 allows the network device 900 to be plugged into a wallsocket, such as a socket providing 120V, 220V, or the like. In turn, anappliance may be plugged into the outlet 906. Once the network device900 is registered according to the techniques described above, anappliance plugged into the socket 906 may be controlled by a user usingan access device (e.g., access device 108).

FIG. 11 is an example of a block diagram of the network device 900depicting different hardware and/or software components of the networkdevice 900. As described above with respect to FIGS. 9 and 10, thenetwork device 900 includes the outlet 906, the plug 1008, the powerbutton 902, the restore button 1010, and the communications signalindicator 904. The network device 900 also includes light source 1128associated with the power button 902. As previously described, the lightsource 1128 may be illuminated when the network device 900 is poweredon.

The network device 900 further includes a relay 1110. The relay 1110 isa switch that controls whether power is relayed from the plug 1008 tothe outlet 906. The relay 1110 may be controlled either manually usingthe power button 902 or remotely using wireless communication signals.For example, when the power button 902 is in an ON position, the relay1110 may be closed so that power is relayed from the plug 1008 to theoutlet 906. When the power button 902 is in an OFF position, the relay1110 may be opened so that current is unable to flow from the plug 1008to the outlet 906. As another example, an application or program runningon an access device may transmit a signal that causes the relay 1110 tobe opened or closed. For instance, an access application may display agraphical interface on the access device that includes a power button.The user may tap or otherwise select the power button, and the accessapplication may send a communication signal (e.g., over a WiFi network)to the network device 900 instructing the network device 900 to open orclose the relay 1110.

The network device 900 further includes flash memory 1120 and dynamicrandom access memory (DRAM) 1122. The flash memory 1120 may be used tostore instructions or code relating to an operating system, one or moreapplications, and any firmware. The flash memory 1120 may includenonvolatile memory so that any firmware or other program can be canupdated. In the event the network device 900 loses power, informationstored in the flash memory 1120 may be retained. The DRAM 1122 may storevarious other types of information needed to run the network device 900,such as all runtime instructions or code.

The network device 900 further includes a CPU/Radio 1118. The CPU/Radio1118 controls the operations of the network device 900. For example, theCPU/Radio 1118 may execute various applications or programs stored inthe flash memory 1120 and/or the dynamic random access memory (DRAM)1122. The CPU/Radio 1118 may also receive input from the varioushardware and software components, interpret the input, and perform oneor more functions in response to the input. As one example, theCPU/Radio 1118 may determine whether the power button 902 has beenpressed, and determines whether the relay 1110 needs to be opened orclosed. The CPU/Radio 1118 may further perform all communicationsfunctions in order to allow the network device 900 to communicate withother network devices, one or more gateways, a cloud network, and/or oneor more access devices. While the CPU and radio of the network device900 are shown to be combined in the CPU/Radio 1118, one of ordinaryskill in the art will appreciate that, in some embodiments, the CPU andradio may be separately located within the network device 900. Forexample, CPU circuitry may be situated at a separate location on acircuit board from the location of radio circuitry, the CPU circuitrymay be located on a different circuit board from the radio circuitry, orthe like. Further, the network device 900 may include multiple radiosthat are configured to communicate using one or more communicationprotocols, such as any combination of a WiFi™ transceiver radio, aBluetooth™ transceiver radio, a Zigbee™ transceiver radio, a UWBtransceiver radio, a WiFi-Direct transceiver radio, a BLE transceiverradio, and/or any other wireless network transceiver radio or interface.In some embodiments, the network device 900 does not include a cellularnetwork transceiver radio or interface, and thus may not be configuredto directly communicate with a cellular network. In some embodiments,the network device 900 may include a cellular network transceiver radio,and may be configured to communicate with a cellular network using thecellular network transceiver radio.

The network device 900 may communicate with other devices and/ornetworks via antenna 1124. For example, antenna 1124 may include a 2.4GHz antenna, a 5 GHz antenna, or the like, that can transmit and receiveWiFi communications signals. The network device 900 may include othertypes of antennas that can communicate Bluetooth® signals, Zigbee®signals, Ultra-Wideband (UWB) signals, WiFi-Direct signals, BLE signals,and/or the like. In some embodiments, the antenna 1124 may be configuredto communicate different types of signals, such as the WiFi signals,Bluetooth® signals, Zigbee® signals, UWB signals, WiFi-Direct signals,BLE signals, and/or the like. In some embodiments, the network device900 may include multiple antennas for communicating the different typesof communication signals. As one example, the network device 900 mayinclude both a 2.4 GHz antenna and a 5 GHz antenna.

The network device 900 further includes a driver 1116, a switching powersupply 1112, and a voltage regulator 1114. The driver 1116 may includeinstructions or code that can be used to translate control signals orcommands received from applications running on the DRAM 1122 to commandsthat the various hardware components in the network device 900 canunderstand. In some embodiments, the driver 1116 may include an ambientapplication running on the DRAM 1122. The switching power supply 1112may be used to transfer power from the outlet in which the plug 1008 isconnected to the various loads of the network device 900 (e.g.,CPU/Radio 1118). The switching power supply 1112 may efficiently convertthe voltage and current characteristics of the electrical power to alevel that is appropriate for the components of the network device 900.For example, the switching power supply 1112 may perform AC-DCconversion. In some embodiments, the switching power supply 1112 may beused to control the power that is relayed from the plug 1008 to theoutlet 906. The voltage regulator 1114 may be used to convert thevoltage output from the switching power supply 1112 to a lower voltageusable by the CPU/Radio 1118. For example, the voltage regulator 1114may regulate the DC voltage from 5V to 3.3V.

In various embodiments, functions may be stored as one or morecomputer-program products, such as instructions or code, in anon-transitory machine-readable storage medium, such as the flash memory1120 and/or the DRAM 1122. The network device 900 can also comprisesoftware elements (e.g., located within the memory), including, forexample, an operating system, device drivers, executable libraries,and/or other code, such as one or more application programs, which maycomprise computer programs implementing the functions provided byvarious embodiments, and/or may be designed to implement methods and/orconfigure systems, as described herein. Merely by way of example, one ormore procedures described with respect to the processes discussed above,for example as described with respect to FIG. 2, may be implemented ascode and/or instructions executable by a computer (and/or a processorwithin a computer); in an aspect, then, such code and/or instructionscan be used to configure and/or adapt a general purpose computer (orother device) to perform one or more operations in accordance with thedescribed methods. Such functions or code may include code to performthe steps described above with respect to FIG. 2. The memory, such asthe flash memory 1120 and/or the DRAM 1122, may be a processor-readablememory and/or a computer-readable memory that stores software code(programming code, instructions, etc.) configured to cause aprocessor(s) within the CPU/Radio 1118 to perform the functionsdescribed. In other embodiments, one or more of the functions describedmay be performed in hardware.

A set of these instructions and/or code might be stored on anon-transitory machine-readable storage medium, such as the flash memory1120 and/or the DRAM 1122. In some cases, the storage medium might beincorporated within a computer system, such as the CPU/Radio 1118. Inother embodiments, the storage medium might be separate from a computersystem (e.g., a removable medium, such as a compact disc), and/orprovided in an installation package, such that the storage medium can beused to program, configure and/or adapt a general purpose computer withthe instructions/code stored thereon. These instructions might take theform of executable code, which is executable by the network device 900and/or might take the form of source and/or installable code, which,upon compilation and/or installation on the network device 900 (e.g.,using any of a variety of generally available compilers, installationprograms, compression/decompression utilities, etc.) then takes the formof executable code.

Substantial variations may be made in accordance with specificrequirements. For example, customized hardware might also be used,and/or particular elements might be implemented in hardware, software(including portable software, such as applets, etc.), or both. Further,connection to other access or computing devices such as networkinput/output devices may be employed.

It should be appreciated that the network device 900 may have othercomponents than those depicted in FIGS. 9-11. Further, the embodimentshown in the figures are only one example of a network device that mayincorporate an embodiment of the invention. In some other embodiments,network device 900 may have more or fewer components than shown in thefigure, may combine two or more components, or may have a differentconfiguration or arrangement of components.

FIG. 12 illustrates an example of an access device 1200. The accessdevice 1200 may include any human-to-machine interface with networkconnection capability that allows access to a network. For example, theaccess device 1200 may include a stand-alone interface (e.g., a cellulartelephone, a smartphone, a home computer, a laptop computer, a tablet, apersonal digital assistant (PDA), a computing device, a wearable devicesuch as a smart watch, a wall panel, a keypad, or the like), aninterface that is built into an appliance or other device (e.g.,television, refrigerator, security system, game console, browser, or thelike), a speech or gesture interface (e.g., Kinect™ sensor, Wiimote™, orthe like), an internet of things (IoT) device interface (e.g., anInternet enabled appliance such as a wall switch, a control interface,or the like). The access device 1200 includes hardware elements that canbe electrically coupled via a bus 1218 (or may otherwise be incommunication, as appropriate). In one embodiment, the bus 1218 can beused for the processor(s) 1202 to communicate between cores and/or withthe memory 1212. The hardware elements may include one or moreprocessors 1202, including without limitation one or moregeneral-purpose processors and/or one or more special-purpose processors(such as digital signal processing chips, graphics accelerationprocessors, and/or the like); one or more input devices 1216, which caninclude without limitation a camera, a mouse, a keyboard, a touchsensitive screen, a touch pad, a keypad, and/or the like; and one ormore output devices 1214, which can include, without limitation, adisplay, a printer, and/or the like.

The access device 1200 may include one or more wireless transceivers1206 connected to the bus 1218. The wireless transceiver 1206 may beoperable to receive wireless signals (e.g., signal 1210) via antenna1208. The wireless signal 1210 may be transmitted via a wirelessnetwork. In some embodiments, the wireless network may be any wirelessnetwork such as a wireless local area network (e.g., local area network100), such as WiFi, a Personal Access Network (PAN), such as Bluetooth®,Zigbee®, or UWB, or a cellular network (e.g. a GSM, WCDMA, LTE, CDMA2000network). Wireless transceiver 1206 may be configured to receive variousradio frequency (RF) signals (e.g., signal 1210) via antenna 1208 fromone or more gateways, network devices, other access devices, cloudnetworks, and/or the like. Access device 1200 may also be configured todecode and/or decrypt, via the DSP 1204 and/or processor(s) 1202,various signals received from one or more gateways, network devices,other access devices, cloud networks, and/or the like.

The access device 1200 may further include (and/or be in communicationwith) one or more non-transitory machine-readable storage mediums orstorage devices (e.g., memory 1212), which can comprise, withoutlimitation, local and/or network accessible storage, and/or can include,without limitation, a disk drive, a drive array, an optical storagedevice, a solid-state storage device such as a random access memory(“RAM”) and/or a read-only memory (“ROM”), which can be programmable,flash-updateable and/or the like. Such storage devices may be configuredto implement any appropriate data storage, including without limitation,various file systems, database structures, and/or the like.

In various embodiments, functions may be stored as one or morecomputer-program products, such as instructions or code, in memory 1212,such as RAM, ROM, FLASH, or disc drive, and executed by processor(s)1202 or DSP 1204. The access device 1200 can also comprise softwareelements (e.g., located within the memory 1212), including, for example,an operating system, device drivers, executable libraries, and/or othercode, such as one or more application programs, which may comprisecomputer programs implementing various functions. Memory 1212 may be anon-transitory machine-readable storage medium, processor-readablememory, and/or a computer-readable memory that stores the one or morecomputer-program products configured to cause the processor(s) 1202and/or DSP 1204 to perform the various functions. In other embodiments,the various functions described may be performed in hardware.

FIG. 13 illustrates an example of a server 1300. The server 1300includes hardware elements that can be electrically coupled via a bus1316 (or may otherwise be in communication, as appropriate). In oneembodiment, the bus 1316 can be used for the processor(s) 1302 tocommunicate between cores and/or with the memory 1312. The hardwareelements may include one or more processors 1302, including withoutlimitation one or more general-purpose processors and/or one or morespecial-purpose processors (such as digital signal processing chips,graphics acceleration processors, and/or the like), memory 1312, DSP1304, a wireless transceiver 1306, a bus 1316, and antenna 1308.Furthermore, in addition to the wireless transceiver 1306, server 1300can further include a network interface 1314 to communicate with anetwork (e.g., a local area network, a network of a preferred carrier,Internet, etc.).

The server 1300 may further include (and/or be in communication with)one or more non-transitory machine-readable storage mediums or storagedevices (e.g., memory 1312), which can comprise, without limitation,local and/or network accessible storage, and/or can include, withoutlimitation, a disk drive, a drive array, an optical storage device, asolid-state storage device such as a random access memory (“RAM”) and/ora read-only memory (“ROM”), which can be programmable, flash-updateableand/or the like. Such storage devices may be configured to implement anyappropriate data storage, including without limitation, various filesystems, database structures, and/or the like.

In various embodiments, functions may be stored as one or more one ormore computer-program products, such as instructions or code, in memory1312. The server 1300 can also comprise software elements (e.g., locatedwithin the memory), including, for example, an operating system, devicedrivers, executable libraries, and/or other code, such as one or moreapplication programs, which may comprise computer programs implementingthe functions provided by various embodiments, and/or may be designed toimplement methods and/or configure systems, as described herein. Merelyby way of example, one or more procedures described with respect to theprocesses discussed above may be implemented as code and/or instructionsexecutable by a computer (and/or a processor within a computer); in anaspect, then, such code and/or instructions can be used to configureand/or adapt a general purpose computer (or other device) to perform oneor more operations in accordance with the described methods. Suchfunctions or code may include code to perform the steps described abovewith respect to FIG. 2. The memory 1312 may be a non-transitorymachine-readable storage medium, processor-readable memory, and/or acomputer-readable memory that stores the one or more computer-programproducts configured to cause the processor(s) 1302 to perform thefunctions described. In other embodiments, one or more of the functionsdescribed may be performed in hardware.

A set of these instructions and/or code might be stored on anon-transitory machine-readable storage medium, such as the memory 1312.In some cases, the storage medium might be incorporated within acomputer system. In other embodiments, the storage medium might beseparate from a computer system (e.g., a removable medium, such as acompact disc), and/or provided in an installation package, such that thestorage medium can be used to program, configure and/or adapt a generalpurpose computer with the instructions/code stored thereon. Theseinstructions of one or more computer-program products might take theform of executable code, which is executable by the server 1300 and/ormight take the form of source and/or installable code, which, uponcompilation and/or installation on the server 1300 (e.g., using any of avariety of generally available compilers, installation programs,compression/decompression utilities, etc.) then takes the form ofexecutable code.

FIG. 11 illustrates an example of a gateway 1100. The gateway 1100 mayinclude a range extending device, a router, an access point, a modem,and/or any other device that provides network access among one or morecomputing devices and/or external networks. For example, the gateway1100 may include a router gateway with access point and routerfunctionality, and may further include an Ethernet switch and/or amodem. As another example, the gateway 1100 may include a rangeextending gateway that may be used to improve signal range and strengthwithin a network by taking an existing signal from another gateway(e.g., a router gateway, an access point, or the like) andrebroadcasting the signal to create a second logical network.

The gateway 1100 includes hardware elements that can be electricallycoupled via a bus 1118 (or may otherwise be in communication, asappropriate). In one embodiment, the bus 1118 can be used for theprocessor(s) 1102 to communicate between cores and/or with the memory1112. The hardware elements may include one or more processors 1102,including without limitation one or more general-purpose processorsand/or one or more special-purpose processors (such as digital signalprocessing chips, graphics acceleration processors, and/or the like);one or more input devices 1116, which can include without limitation oneor more buttons, a keyboard, a keypad, a touch sensitive screen, a touchpad, and/or the like; and one or more output devices 1114, which caninclude, without limitation, a display, light or sound indicators,and/or the like.

The gateway 1100 may include one or more wireless transceivers 1106 and1120 connected to the bus 1118. The wireless transceiver 1106 may beoperable to receive wireless signals (e.g., a wireless signal 1110) viaan antenna 1108. The wireless transceivers 1120 may be operable toreceive wireless signals (e.g., a wireless signal 1114) via an antenna1122. The wireless transceivers 1106 and 1120 may each include a WiFitransceiver radio designed to transmit and receive signals usingfrequencies of a specific frequency band, which may be referred toherein as “WiFi circuits.” For example, wireless transceiver 1106 mayinclude a 2.4 GHz WiFi circuit, and wireless transceiver 1120 mayinclude a 5 GHz WiFi circuit. Accordingly, the gateway 1100 may includea single WiFi circuit for a first WiFi frequency band, and a single WiFicircuit for a second WiFi frequency band. In some embodiments, thegateway 1100 may include multiple wireless transceivers (not shown) foreach available frequency band. The antennas 1108 and 1122 may includemultiple band antennas that can transmit and/or receive signals overdifferent frequency bands.

The gateway 1100 may further include radio frequency (RF) circuit 1126.In some embodiments, the wireless transceivers 1106 and 1120 may beintegrated with or coupled to the RF circuit 1126 so that the RF circuit1126 includes the wireless transceivers 1106 and 1120. In someembodiments, the wireless transceivers 1106 and 1120 and the RF circuit1126 are separate components. The RF circuit 1126 may include a RFamplifier that may amplify signals received over antennas 1108 and 1122.The RF circuit 1126 may also include a power controller that may be usedto adjust signal amplification by the RF amplifier. The power controllermay be implemented using hardware, firmware, software, or anycombination thereof.

The wireless signals 1110 and 1124 may be transmitted via a wirelessnetwork. In some embodiments, the wireless network may be any wirelessnetwork such as a wireless local area network (e.g., local area network100), such as WiFi™, a Personal Access Network (PAN), such asBluetooth®, Zigbee®, or UWB, or a cellular network (e.g. a GSM, WCDMA,LTE, CDMA2000 network). Wireless transceivers 1106 and 1120 may beconfigured to receive various radio frequency (RF) signals (e.g.,signals 1110 and 1124) via antennas 1108 and 1124, respectively, fromone or more other gateways, access devices, network devices, cloudnetworks, and/or the like. Gateway 1100 may also be configured to decodeand/or decrypt, via the DSP 1104 and/or processor(s) 1102, varioussignals received from one or more gateways, network devices, cloudnetworks, and/or the like.

The gateway 1100 may include a power supply (not shown) that can powerthe various components of the gateway 1100. The power supply may includea switch-mode power supply, a linear power supply, a push-pull powersupply, or any other suitable type of power supply. In some embodiments,the gateway 1100 may include multiple power supplies. For example, aswitch-mode power supply may be used to condition input power, and alinear power supply may be used to power the RF circuit 1126. The powersupply may be configured to operate over various ranges of appropriateinput voltages.

The gateway 1100 may further include (and/or be in communication with)one or more non-transitory machine-readable storage mediums or storagedevices (e.g., memory 1112), which can comprise, without limitation,local and/or network accessible storage, and/or can include, withoutlimitation, a disk drive, a drive array, an optical storage device, asolid-state storage device such as a random access memory (“RAM”) and/ora read-only memory (“ROM”), which can be programmable, flash-updateableand/or the like. Such storage devices may be configured to implement anyappropriate data storage, including without limitation, various filesystems, database structures, and/or the like.

In various embodiments, functions may be stored as one or morecomputer-program products, such as instructions or code, in memory 1112,such as RAM, ROM, FLASH, or disc drive, and executed by processor(s)1102 or DSP 1104. The gateway 1100 can also comprise software elements(e.g., located within the memory 1112), including, for example, anoperating system, device drivers, executable libraries, and/or othercode, such as one or more application programs, which may comprisecomputer programs implementing the functions provided by variousembodiments, and/or may be designed to implement methods and/orconfigure systems, as described herein. Merely by way of example, one ormore procedures described with respect to the processes discussed above,for example as described with respect to FIGS. 2, 6 and/or 7, may beimplemented as code and/or instructions executable by a computer (and/ora processor within a computer); in an aspect, then, such code and/orinstructions can be used to configure and/or adapt a general purposecomputer (or other device) to perform one or more operations inaccordance with the described methods. Such functions or code mayinclude code to perform the steps described above with respect to FIGS.2, 6 and/or 7. The memory 1112 may be a non-transitory machine-readablestorage medium, processor-readable memory, and/or a computer-readablememory that stores the one or more computer-program products configuredto cause the processor(s) 1102 to perform the functions described. Inother embodiments, one or more of the functions described may beperformed in hardware.

A set of these instructions and/or code might be stored on anon-transitory machine-readable storage medium, such as the memory 1112.In some cases, the storage medium might be incorporated within acomputer system. In other embodiments, the storage medium might beseparate from a computer system (e.g., a removable medium, such as acompact disc), and/or provided in an installation package, such that thestorage medium can be used to program, configure and/or adapt a generalpurpose computer with the instructions/code stored thereon. Theseinstructions of one or more computer-program products might take theform of executable code, which is executable by the gateway 1100 and/ormight take the form of source and/or installable code, which, uponcompilation and/or installation on the gateway 1100 (e.g., using any ofa variety of generally available compilers, installation programs,compression/decompression utilities, etc.) then takes the form ofexecutable code.

Substantial variations may be made in accordance with specificrequirements. For example, customized hardware might also be used,and/or particular elements might be implemented in hardware, software(including portable software, such as applets, etc.), or both. Further,connection to other access or computing devices such as networkinput/output devices may be employed.

In the foregoing specification, aspects of the invention are describedwith reference to specific embodiments thereof, but those skilled in theart will recognize that the invention is not limited thereto. Variousfeatures and aspects of the above-described invention may be usedindividually or jointly. Further, embodiments can be utilized in anynumber of environments and applications beyond those described hereinwithout departing from the broader spirit and scope of thespecification. The specification and drawings are, accordingly, to beregarded as illustrative rather than restrictive.

In the foregoing description, for the purposes of illustration, methodswere described in a particular order. It should be appreciated that inalternate embodiments, the methods may be performed in a different orderthan that described. It should also be appreciated that the methodsdescribed above may be performed by hardware components or may beembodied in sequences of machine-executable instructions, which may beused to cause a machine, such as a general-purpose or special-purposeprocessor or logic circuits programmed with the instructions to performthe methods. These machine-executable instructions may be stored on oneor more machine readable mediums, such as CD-ROMs or other type ofoptical disks, floppy diskettes, ROMs, RAMs, EPROMs, EEPROMs, magneticor optical cards, flash memory, or other types of machine-readablemediums suitable for storing electronic instructions. Alternatively, themethods may be performed by a combination of hardware and software.

Where components are described as being configured to perform certainoperations, such configuration can be accomplished, for example, bydesigning electronic circuits or other hardware to perform theoperation, by programming programmable electronic circuits (e.g.,microprocessors, or other suitable electronic circuits) to perform theoperation, or any combination thereof.

It will be appreciated that, while some disclosures herein reference ahouse or a household, such disclosures can be extended to apply todifferent settings, such as a building, an office, an apartment, aschool, or a vehicle.

While illustrative embodiments of the application have been described indetail herein, it is to be understood that the inventive concepts may beotherwise variously embodied and employed, and that the appended claimsare intended to be construed to include such variations, except aslimited by the prior art.

EXAMPLES Example 1

A user can interact with an app on a mobile phone to define a “workingfrom home” context and can indicate that noise is to be inhibited insuch context. A user can indicate that he may be working from homeduring normal work hours from a home office. A series of light detectorscan monitor light and motion throughout a house and outside a front of ahome. Further, a series of door detectors can monitor whether each of avariety of homes are closed or open. A rule can be generated to infer(e.g., at the cloud network) the context when motion is detected in aroom designated as a home office during the hours of 8 am-6 pm. Uponsuch detection, signals to sprinkle, dehumidifier, air-purifier anddoorbell devices can be sent to temporarily deactivate the devices.Further, a notification of such inference and consequence can be sent tothe user's phone. The user can indicate when such inference is erroneousand/or when a consequence is undesired, and the rule can then bemodified. For example, the rule can be modified to require sensing avehicle in a particular parking spot and requiring detection of a doorof the home office room being closed before inferring that the user isworking from home.

Example 2

A user can indicate that a small child is living in a house and identifyone or more devices located in the child's bedroom. A system can proceedto develop a rule associated with a sleep schedule of the child.Initially, light, motion and device interactions can be monitored. Intime, the system can associate reduced interactions (or suppressinginteractions) with noisier or light devices with particular times. Arule can thus be developed that infers that a child normally wakes uparound 7 am, goes to sleep around 8 pm and takes a nap from 12-3. Therule can also infer that the child is likely to be sleeping when thechild's room is darker than ambient brightness (e.g., due to shadesbeing drawn) and when a door to the room is closed. The rule can weightfactors such as activity preceding a sleep interval (e.g., to indicatethat a family was home), darkness and time to arrive at a finalinference.

During learning, messages can be presented to a user on an access ornetwork device to request verification of estimates as to whether thechild is asleep. A same or different rule can identify device controls(e.g., quieting or muting doorbells, phone speakers, security-systemalerts, etc.) to be implemented during a child-sleeping context.Controls can include those as identified by a user, those consistentwith controls identified by the user, those performed by a user during aconfirmed or inferred child-sleeping context or those consistent withcontrols identified by the user. When a child-sleeping context isinferred, a notice of controls to be implemented can be sent of anaccess device, which can present the notice with an option to block oneor more controls. If no such block is received, the devices can becontrolled accordingly.

Example 3

A user interacts with a network device and indicates that there are fourhousehold members living in a house. Light detectors and power-usagedetectors are positioned across the house. Data detected by the devicescan be used to infer which rooms have at least one occupant and a numberof occupants. Thus, an inference as to a total number of occupants inthe house can be made. Further, using data from a light detectorpositioned to detect light from outside, it can be inferred whether andwhen someone is approaching a house. When it is inferred that allhousehold members are inside a house, an alert can be sent to a user'sphone to alert the user of the guest and/or to a security system toactivate the system.

Example 4

A first device emits a light indicative of maintenance status (e.g.,maintenance needed, operation questionable, error) or resource status(e.g., of a charge or light source). The light can be indicative of aproperty the first device or of another device. In one instance, a lightswitch estimates a time before a light bulb will burn out. A lightdetector positioned near the emission monitors the emission. Particulardetections (e.g., indicating maintenance needed or low remainingresource) can cause a second device that controls power to the firstdevice to reduce or stop the power provided to the first device (e.g.,to conserve resources or prevent improper device functioning).

Example 5

A series of light detectors are positioned across a house. The lightdetectors can be positioned to detect whether various rooms' lights areturned on. Each light detector can communicate its data to a server inthe cloud network. Further, other devices (e.g., those including orattached to) an alarm clock, coffee maker, iron, house stereo, HVAC,security system and vehicle preheater can also send transmission to theserver to indicate when such device are turned off and on. The servercan learn common patterns in light changes. The patterns can correspondto a user moving across the house (such that the user is activelyturning lights on during the movement or such that lights areautomatically turned on). The server can further learn how deviceoperations relate to the patterns. For example, one pattern can includeactivation of an alarm clock in Bedroom #1, followed by successive lightactivations from Bedroom #1 to the kitchen, followed by turning on acoffee maker. Another pattern can include activation of a light inBathroom #2 in a morning, followed by successive light activations fromBathroom #2 to the front door, followed by turning on a security system.In some instances, an estimate is made for each of one or more path asto which user the path corresponds to (e.g., based on an originating orfinal room), such that preferences for the user can further be used toidentify common patterns and device-control objectives.

Once a pattern is learned, the pattern can be precipitated (e.g., byturning on lights in anticipation of a user entering a room, turning ona coffee maker after detecting a change in power consumed by an alarmclock, activating a security system after detecting that a user hasarrived through a learned path at a front door). In some alternative oradditional instances, such pattern assistance can be proposed to a useras a rule to implement.

Example 6

One or more light detectors detect light inside or outside a home. Datafrom inside detectors can be, for example, low-pass filtered to reduceinfluence on artificial lighting. The data are processed (e.g., at anetwork device, at a server on the cloud network or at a gateway) toestimate a dusk or darkness time. Signals are sent to network devicesto, e.g., turn on one or more inside and/or outside lights, shutcurtains, turn on a laundry machine, turn on a sprinkler, turn on adishwasher, and/or turn on a robotic cleaning (e.g., vacuuming) device.

Example 7

A light detector is located near a window and positioned to detect lightoutside. A learning technique is used to identify characteristics ofcommon outside arrival characteristics. For example, for each of one ormore learned arrival, a characteristic can include a detected vehiclesize, stationary vehicle position (parking spot), vehicle arrival time,headlight color, and/or headlight size. When a new vehicle is detected,a detector device estimates whether the new vehicle corresponds to acommon vehicle. If so, control signals are sent to home devices to,e.g., de-activate a security system, adjust an internal temperature andturn on indoor and porch lights. Further, a notification is sent to ahome or mobile user device with an alert of the arrival (e.g., and atime and estimated identity of arriving person(s)). If the new vehicledoes not correspond to a common vehicle, control signals are sent tohome devices to, e.g., active a security system. A notification isfurther sent to a home or mobile user device with an alert of thearrival and an indication of a potential security concern (e.g., and anoption to override the security activation).

Example 8

Data from a light detector can be processed to estimate whether adetected light signal corresponds to a flashlight (e.g., based on a sizeand color of the light and a time). When it is estimated that the lightdoes correspond to a flashlight, a signal can be sent to a securitysystem to issue an alarm.

Example 9

Based on light-detector data, it is determined that a light is on in aroom and that there has not been any motion for a period of time.Determining that the light is on in the room can include distinguishingdetected light from daylight (e.g., expected at a given time) and fromlight originating from a neighboring room. In response to thedetermination, a signal is sent to one or more devices (which caninclude a device in a room with detected motion, a mobile device and/oranother or same light detector) to present a notification indicative ofan estimate that a light has been inadvertently left on.

Example 10

Each of a set of power-monitoring detector devices communicating with agateway can monitor power usage associated with the device itself oranother device. A server communicating with the gateway can trackcumulative usages for the gateway and assign thresholds for low usageand high usage (e.g., by identifying a value for which a particularpercentage of monitored cumulative power usages were below the value).Real-time cumulative power usages can be tracked to determine whether itis characterized of low, medium or high usage. A signal can be sent toeach power-monitoring device indicating the characterization, and thedevice can then present a light with a color indicative of the usagecategory. Using such technique, a person in one room in a household canbe alerted as to potentially concerning power usage even if it isattributable to a device in another room.

Example 11

A weight sensor in a house's laundry washing machine can detect that themachine is loaded with clothes. A series of flow detectors in thehouse's bathrooms can detect when a shower is in use. A rule can infer ashower use when an above-threshold flow is detected for at least adefined time period. When a number of inferred showers matches a numberof household members or a normal number of inferred morning showers, itcan be inferred that a household has completed all of their morningshowers. A signal can then be sent to the washing machine to start awashing cycle.

Example 12

A weight sensor in a house's dishwasher can detect that the machine isloaded with clothes. A power detector in a family room can detect when atelevision is on, and a light detector in the family room can detectwhen a light (e.g., an artificial light or light from the television) ison. A rule can weight and combine data from the detectors to inferwhether a person is using the family room. When it is after a time pointassociated with an electricity or water discount (e.g., as identified bya user or automatically obtained from an electricity or water provider)and if it is inferred that no person is in the family room, a signal canbe sent to the dishwasher to start a cycle.

Example 13

A set of light- and motion-detecting devices are positioned in variousrooms in a house. The devices can sequentially detect movement beginningnear a front door and ending in a teenager's bedroom. Using the data, agateway device can make an inference that the teenager arrived home at11 pm. The gateway device can transmit the inference to a light detectorin a parent's bedroom, which can then emit a stimulus with “11 pm” textin a color representative of the teenager's identity.

Example 14

A set of inter-communicating temperature detecting devices arepositioned in various rooms in a house. At least one of the devices canpresent a simplified map of the house can be portrayed on a surface ofthe device. Representations of rooms with temperature-detecting devicescan be colored to reflect the detected temperatures.

What is claimed is:
 1. A computer-implemented method comprising:identifying, at a detector device, a stimulus variable based on anenvironmental stimulus detected by a sensor, wherein the detector deviceincludes the sensor and a visual display; transmitting; from thedetector device, an initial communication to a device, wherein theinitial communication includes the stimulus variable; receiving, at thedetector device, a new communication that includes data that isreflective of an operation of or an input detected at another device;determining that a visual stimulus is to be presented, wherein thedetermination is based on the stimulus detected by the sensor and isfurther based on the new communication; and presenting, at the displayof the detector device, the visual stimulus.
 2. The method as recited inclaim 1, wherein the data is reflective of a power status of the otherdevice.
 3. The method as recited in claim 1, wherein the data isreflective of a setting of the other device.
 4. The method as recited inclaim 1, wherein the data is reflective of an estimated time forcompleting a task at the other device.
 5. The method as recited in claim1, wherein the new communication includes an instruction to present thevisual stimulus.
 6. The method as recited in claim 1, furthercomprising: selecting a characteristic of the visual stimulus, whereinthe visual stimulus has the characteristic.
 7. The method as recited inclaim 6, further comprising: identifying which device was a source ofthe new communication, wherein the characteristic is identified based onthe identification of which device was a source of the newcommunication.
 8. The method as recited in claim 6, wherein thecharacteristic includes a color, spatial pattern, temporal pattern,duration or intensity.
 9. The method as recited in claim 1, wherein: thedetector device includes a lens positioned to concentrate receivedlight; the sensor includes a passive infrared sensor that receives theconcentrated light; the passive infrared sensor detects the lightintensity; and presenting the visual stimulus includes causing lightsupplied by a light source to be projected onto the lens.
 10. The methodas recited in claim 1, wherein each of the detector device and the otherdevice is associated with a same network identifier, and wherein each ofthe detector device and the other device is located in a same building.11. The method as recited in claim 1, wherein determining that thevisual stimulus is to be presented includes determining that thestimulus variable exceeds a threshold
 12. A detector device comprising:a sensor for detecting an external stimulus; a light source; one or moreconnection components configured to receive communications from andtransmit communications to other devices; one or more processors coupledto the light source and the connection component; and acomputer-readable storage medium containing instructions, that, whenexecuted by the one or more processors, cause the one or more processorsto perform actions including: identifying, at the detector device, astimulus variable based on an environmental stimulus detected by thesensor of the detector device; transmitting, via the one or moreconnection components of the detector device, an initial communicationto a device, wherein the initial communication includes the stimulusvariable; receiving, via the one or more connection components of thedetector device, a new communication that includes data that isreflective of an operation of or an input detected at another device;determining, at the detector device, that a visual stimulus is to bepresented, wherein the determination is based on the stimulus detectedby the sensor and is further based on the new communication; andpresenting, at the detector device, the visual stimulus.
 13. Thedetector device as recited in claim 12, wherein the data is reflectiveof a power status of the other device.
 14. The detector device asrecited in claim 12, wherein the data is reflective of a setting of theother device.
 15. The detector device as recited in claim 12, whereinthe data is reflective of an estimated time for completing a task at theother device.
 16. The detector device as recited in claim 12, whereinthe new communication includes an instruction to present the visualstimulus.
 17. The detector device as recited in claim 12, wherein theactions further include: selecting a characteristic of the visualstimulus, wherein the visual stimulus has the characteristic.
 18. Thedetector device as recited in claim 12, further comprising a lenspositioned to concentrate received light, wherein: the sensor includes apassive infrared sensor that receives the concentrated light; thepassive infrared sensor detects the light intensity; and presenting thevisual stimulus includes causing the light supplied by the light sourceto be projected onto the lens.
 19. The detector device as recited inclaim 12, wherein each of the detector device and the other device isassociated with a same network identifier, and wherein each of thedetector device and the other device is located in a same building. 20.The detector device as recited in claim 12, wherein determining that thevisual stimulus is to be presented includes determining that thestimulus variable exceeds a threshold.