Notification priority sequencing for video security

ABSTRACT

Determining a sequence for providing a notification regarding activity recorded by a camera is described. In one aspect, a priority sequence for can be determined based on a variety of characteristics of the available devices registered with the home security system of the camera.

CLAIM FOR PRIORITY

This application is a continuation application of U.S. patentapplication Ser. No. 16/276,422, entitled “Notification PrioritySequencing for Video Security,” and filed on Feb. 14, 2019, which claimspriority to U.S. Provisional Patent Application No. 62/633,017, entitled“Optimization and Testing of Wireless Devices,” and filed on Feb. 20,2018. The content of the above-identified applications are incorporatedherein by reference in their entirety.

TECHNICAL FIELD

The disclosure relates to security systems, and in particular providingnotifications to field devices regarding video data.

BACKGROUND

Security systems for home or business uses can include a base station incommunication with cameras mounted within or outside of a structure torecord activity. When relevant or alarming activity is determined to beoccurring, a user might be notified regarding the occurrence of theactivity, and whether any action should be taken.

Multiple users might be registered with the security system. At times,only a single notification to one user might be provided, for example,when a visitor is at a door to the home or business. A notification caninclude video data depicting the visitor at the door and the userreceiving the notification can use an electronic device (e.g., asmartphone) to receive the notification and to verbally communicate withthe visitor via the camera and base station. However, if one userreceives the notification but does not respond, the activity might notbe addressed even though another user registered with the securitysystem might have been available to receive a notification and respond.Thus, the robustness of the security system can be degraded.

SUMMARY

Some of the subject matter described herein includes a method includingreceiving video data indicative of activity captured within a field ofview of a camera; determining characteristics of a first device and asecond device associated with a security system related to the camera;determining, by a processor, a priority sequence for providing anotification regarding occurrence of the activity based on thecharacteristics, the priority sequence indicating that a first device isto be provided the notification before a second device; providing thenotification to the first device; receiving a response from the firstdevice, the response indicating an action to be performed in response tothe occurrence of the activity; and performing the action based on theresponse indicating that the action is to be performed in response tothe occurrence of the activity.

In some implementations, determining the characteristics includes:determining a first network bandwidth available to the first device anda second network bandwidth available to the second device, and whereinthe first network bandwidth is higher than the second network bandwidth.

In some implementations, determining the characteristics includes:determining a first location of the first device and a second locationof the second device, and wherein the first location is a first locationtype, the second location is a second location type, one of the firstlocation type or the second location type being residential and theother being commercial.

In some implementations, determining the characteristics includes:determining first operational characteristics of the first device andsecond operational characteristics of the second device, the firstoperational characteristics being different than the second operationalcharacteristics, and the priority sequence based on the firstoperational characteristics and the second operational characteristics.

In some implementations, the first operational characteristics include afirst video processing functionality of the first device, and the secondoperational characteristics include a second video processingfunctionality of the second device, the first video processingfunctionality providing a higher quality video processing than thesecond video processing functionality.

In some implementations, determining the characteristics includes:determining a first history of the first device responding to previousnotifications and a second history of the second device responding toprevious notifications, and wherein the priority sequence is based onthe first history and the second history.

In some implementations, wherein the notification is a voice call placedto the first device, and the action performed is to contact emergencyservices in response to the occurrence of the activity.

Some of the subject matter described herein includes an electronicdevice, comprising: one or more processors; and memory storinginstructions, wherein the processor is configured to execute theinstructions such that the processor and memory are configured to:receive video data indicative of activity captured within a field ofview of a camera; determine characteristics of a first device and asecond device associated with a security system related to the camera;determine a priority sequence for providing a notification regardingoccurrence of the activity based on the characteristics, the prioritysequence indicating that a first device is to be provided thenotification before a second device; provide the notification to thefirst device; receive a response from the first device, the responseindicating an action to be performed in response to the occurrence ofthe activity; and perform the action based on the response indicatingthat the action is to be performed in response to the occurrence of theactivity.

In some implementations, determining the characteristics includes:determine a first network bandwidth available to the first device and asecond network bandwidth available to the second device, and wherein thefirst network bandwidth is higher than the second network bandwidth.

In some implementations, determining the characteristics includes:determine a first location of the first device and a second location ofthe second device, and wherein the first location is a first locationtype, the second location is a second location type, one of the firstlocation type or the second location type being residential and theother being commercial.

In some implementations, determining the characteristics includes:determine first operational characteristics of the first device andsecond operational characteristics of the second device, the firstoperational characteristics being different than the second operationalcharacteristics, and the priority sequence based on the firstoperational characteristics and the second operational characteristics.

In some implementations, the first operational characteristics include afirst video processing functionality of the first device, and the secondoperational characteristics include a second video processingfunctionality of the second device, the first video processingfunctionality providing a higher quality video processing than thesecond video processing functionality.

In some implementations, determining the characteristics includes:determine a first history of the first device responding to previousnotifications and a second history of the second device responding toprevious notifications, and wherein the priority sequence is based onthe first history and the second history.

In some implementations, the notification is a voice call placed to thefirst device, and the action performed is to contact emergency servicesin response to the occurrence of the activity.

Some of the subject matter described herein includes a computer programproduct including one or more non-transitory computer-readable mediastoring computer program instructions, execution of which by aprocessing system causes the processing system to perform operationscomprising: receive video data indicative of activity captured within afield of view of a camera; determine characteristics of a first deviceand a second device associated with a security system related to thecamera; determine a priority sequence for providing a notificationregarding occurrence of the activity based on the characteristics, thepriority sequence indicating that a first device is to be provided thenotification before a second device; provide the notification to thefirst device; receive a response from the first device, the responseindicating an action to be performed in response to the occurrence ofthe activity; and perform the action based on the response indicatingthat the action is to be performed in response to the occurrence of theactivity.

In some implementations, determining the characteristics includes:determine a first network bandwidth available to the first device and asecond network bandwidth available to the second device, and wherein thefirst network bandwidth is higher than the second network bandwidth.

In some implementations, determining the characteristics includes:determine a first location of the first device and a second location ofthe second device, and wherein the first location is a first locationtype, the second location is a second location type, one of the firstlocation type or the second location type being residential and theother being commercial.

In some implementations, determining the characteristics includes:determine first operational characteristics of the first device andsecond operational characteristics of the second device, the firstoperational characteristics being different than the second operationalcharacteristics, and the priority sequence based on the firstoperational characteristics and the second operational characteristics.

In some implementations, the first operational characteristics include afirst video processing functionality of the first device, and the secondoperational characteristics include a second video processingfunctionality of the second device, the first video processingfunctionality providing a higher quality video processing than thesecond video processing functionality.

In some implementations, determining the characteristics includes:determine a first history of the first device responding to previousnotifications and a second history of the second device responding toprevious notifications, and wherein the priority sequence is based onthe first history and the second history.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example of generating a notification regarding anactivity depicted in video data.

FIG. 2 illustrates an example of a block diagram for generating anotification.

FIG. 3 illustrates an example of a block diagram for generating asequence for contacting field devices in accordance with a priorityranking.

FIG. 4 illustrates an example of a simplified block diagram of anelectronic device which may be used with some implementations.

DETAILED DESCRIPTION

This disclosure describes techniques for determining which user is to beselected for being provided a notification regarding activity capturedby a camera of a security system. In one example, a family can have ahome security system including a base station in communication withcameras inside and outside the home. When alarming or eventful activityis captured by one of the cameras, the base station can determine thisand generate data to provide a notification with video data depictingthe activity. Additionally, the base station can include communicationcapabilities to contact a user regarding the activity, for example, byplacing a cellular phone call to verbally alert the user to thesituation at the home. The user can respond to the notification, forexample, by verbally instructing the base station to place a call toemergency services (e.g., call police via “911”).

Because the family can have multiple users that can be contacted toprovide a notification, the base station can determine a sequence orpriority of providing notifications to users such that only some (e.g.,not all) of the users can be contacted. For example, in some activitiessuch as a visitor being detected at the front door, a single user mightbe contacted via a notification to be provided video data depicting thevisitor as well as offered the capability to communicate to the visitorvia a speaker and microphone of a camera positioned at the front door.The users can be prioritized based on factors including their history ofresponding to notifications, current location, network bandwidthavailable to their device at the current location, and operationalcharacteristics of their device (e.g., an electronic device such as asmartphone, a tablet, a laptop computer, a desktop computer, asmartwatch, etc.).

In some implementations, the characteristics of the notification canalso be determined using the aforementioned factors for prioritizing theusers to be provided notifications. For example, the type ofnotification (e.g., whether the notification includes a verbal alertasking the user whether emergency services should be called), a type ofcompression to use for providing video data, etc.), and othercharacteristics can be determined by the base station.

By prioritizing the users to receive the notification, the base stationcan provide a more robust security system because a user more likely toview and respond to the notification can be prioritized over otherusers. This can improve the user experience of the security systemimplemented by the base station.

In more detail, FIG. 1 illustrates an example of generating anotification regarding an activity depicted in video data. In FIG. 1,base station 135 can be in wireless communication with camera 105 (e.g.,using one of the Institute of Electrical and Electronics Engineers(IEEE) 802.11 wireless local area network (WLAN) standards, a personalarea network standard such as Bluetooth, etc.). Camera 105 can includean image sensor capable of capturing image information used to generatevideo data of activity occurring within field of vision 110. In FIG. 1,this can include generating video data 120 depicting visitor 115 at afront door of a home.

Video data 120 can be provided to base station 135 and base station 135can analyze the content of video data 120 to determine that visitor 115is at the front door. A visitor at the front door can be an activitythat a user from the home should be aware of and, therefore, basestation 135 can generate a notification to be provided to the user suchthat the activity can be responded to, for example, by enabling atwo-way audio conversation using a microphone and a speaker of camera105 to communicate with visitor 115.

However, the home might be a residence for multiple people. For example,in FIG. 1, device 160 a might be the smartphone of one resident of thehome, and device 160 b might be the smartphone of another resident ofthe home. Only a single user should be allowed to have a conversationwith visitor 115 and, therefore, base station 135 can determine which ofdevice 160 a or 160 b can be provided notification 150 or 155,respectively, to provide an alert regarding visitor 115.

The possible users who can be contacted can be stored by base station135 as contacts 145 in FIG. 1. Base station 135 can further determinepriority information 140 which can be a sequence of providingnotifications to users based on a determined priority. In someimplementations, priority information 140 can be updated using a hiddenmarkov model (HMM), Viterbi's algorithm, or other machine learning orartificial intelligence techniques to predict which user should beprovided a notification by determining the priorities.

For example, base station 135 can determine a variety of factorsregarding how users have responded to notifications in the past, acurrent location of a user or device, network bandwidth available to adevice at the current location, and operational characteristics of thedevice such as its battery life and functional capabilities (e.g., videoprocessing functionalities including the types of video codecs or othermultimedia capabilities used by the device). Based on these factors,priority information 140 can be generated and used to provide anotification.

For example, if video data 120 depicting visitor 115 is received by basestation 135 at 9:00 a.m. on a Friday, base station might determine thatdevice 160 a should be prioritized over device 160 b in being providednotification 150 because device 160 a has in the past responded tonotifications on weekday mornings while device 160 b has not. Forexample, in the past at 9:00 a.m. on a Friday, the user of device 160 amight have reviewed a notification and indicated that the activity thatthe notification is regarding is alarming (e.g., emergency servicesshould be called). However, if the same activity occurred at 8:00 p.m.on a Saturday, then device 160 b might be prioritized over device 160 aand provided notification 155 due to having a history of responding tomore notifications at that time. Thus, over time, base station 135 canlearn which user to provide a notification using a variety of machinelearning or artificial intelligence techniques to learn the schedules ofvarious users.

In addition to how users respond to notifications on their devices overhistory, other factors can also be considered. For example, devices 160a and 160 b can include software installed to communicate with cloudserver 165. Cloud server 165 can be a cloud-based network servercollecting data from devices 160 a and 160 b that can then be providedto base station 135. For example, cloud server 165 can receivegeographical information such as a current location of the devices. Thisinformation can then be provided to base station 135. However, in otherimplementations, this information can be transmitted from devices 160 aand 160 b to base station 135 without the use of cloud server 165.

The network bandwidth available to devices 160 a and 160 b can also beprovided to base station 135 in a similar manner. The network bandwidthcan be used by base station 135 to determine the data transfer rateavailable to communicate with devices 160 a and 160 b. The networkbandwidth of the devices can then be used to generate priorityinformation 140. For example, the device with a higher network bandwidthcan be prioritized over the other device. This can allow for an increaselikelihood that a high-quality video can be viewed by the device withthe higher network bandwidth rather than the device with the lowernetwork bandwidth viewing a lower-quality video.

The current location of devices 160 a and 160 b can also be provided tobase station 135 in a similar manner and used to generate priorityinformation 140. For example, if device 160 a is determined to be in anoffice and device 160 b is in a car along a road, then device 160 amight be prioritized over device 160 b because being in an office mightoffer a better opportunity to respond to the notification. Commercial orbusiness locations can be prioritized over residential locations, orvice versa.

The operational characteristics of devices 160 a and 160 b can also beprovided to base station 135 in a similar manner. For example, thebattery level of devices 160 a and 160 can be used by base station 135to generate priority information 140. In one example, if the batterylevel of device 160 a is below a threshold (e.g., less than ten percent)and device 160 b is above the threshold, then device 160 b can beprioritized because it has a higher battery level and, therefore, mightbe able to more reliably view the notification, and provide a responsewithout having the battery of device 160 b run out of charge.

Other operational characteristics can include the capabilities of thedevices. For example, a device that can process higher-quality videodata can be prioritized over a device that does not have the capabilityto process higher-quality video data. Thus, the video processingcapabilities of the devices can be used to determine the sequence.

FIG. 2 illustrates an example of a block diagram for generating anotification. In FIG. 2, video data can be received by a base station(205). For example, in FIG. 1, video data 120 can be generated by camera105 and provided to base station 135.

Base station 135 can then determine a priority for providing anotification regarding the video data (215). For example, base station135 can identify, using contacts 145, that one or both of device 160 aand device 160 b should be provided notification 150 or notification155, respectively, to alert a user regarding activity depicted in videodata 120.

Generating the priority can be based on a variety of factors. FIG. 3illustrates an example of a block diagram for generating a sequence forcontacting field devices in accordance with a priority ranking. In FIG.3, the location of devices can be determined (305), the networkbandwidth available to devices can be determined (310), operationalcharacteristics of the devices can be determined (315), and the historyof the devices responding to previous notifications can be determined(320). One or more of these factors can be used to generate a sequenceof priority for contacting the devices (325).

Returning to FIG. 2, a notification in accordance with the priority canbe provided (220) and a device can receive the notification (225). Thenotification can be a message that is displayed in a graphical userinterface (GUI) on the device. In some implementations, the message canindicate the activity (e.g., an intruder detected on a camera, motiondetected, movement depicted in an object on a camera, etc.), provide avideo depicting the activity, and even provide audio playback (alongwith the video playback) as well as offer two-way audio communication,as previously discussed. A notification can also include a phone callwith a verbal prompt asking for the user of the device to provide aresponse, for example, to verbally indicate whether emergency servicesshould be called, whether it is a false alarm, etc.

Additionally, the characteristics of the notification can be based onany of the aforementioned factors. For example, if the network bandwidthavailable for the device is lower than a threshold, then a still imageof the activity might be provided, but if the network bandwidth is highthen video playback can be provided. In another implementation, audiomight not be provided if the network bandwidth available to the deviceis low. Thus, the content of the notification can be based on theaforementioned factors.

Additionally, the type of notification (e.g., text message, message viathe operating system (OS) or application installed on the device, phonecall, etc.) can also be based on the aforementioned factors. Forexample, if the device is in a location with an acceptable cellularnetwork coverage, then a phone call can be placed to the device (by thebase station) to provide the notification. However, if the device is notwithin an acceptable cellular network coverage, or if the networkbandwidth of the cellular connection is not acceptable, then anothertype of notification can be provided.

The user of the device can then indicate a response to the activitydepicted in the video data (230). For example, the activity can bedeemed to be a security incident and indicate that emergency servicesshould be called, an alarm should be triggered to turn on within thehome, or other security-related activity.

The base station can then receive the response indicating the action tobe performed (235) and then perform the action in accordance with theresponse (240).

Though some of the examples describe a sequence of priority forcontacting devices one-at-a-time, in other implementations, multipledevices can be provided notifications at the same or similar times. Forexample, two devices might be provided a notification first, and ifneither of the two devices respond, then a third device can be notifiednext.

The base station can also determine characteristics of the video dataand generate the priority for notifications. For example, the content ofthe video data can be analyzed by the base station to determine whetherunidentified people are depicted, whether animals are depicted, movementof objects, etc. Thus, different types of content can be used to adjustthe notification priority. For example, if people are detected, then aparent of the home can be contacted, but if an animal is detected thenchildren of the home can be provided the notification.

In some implementations, multiple cameras can be placed within andoutside of the home. As activity is detected, video data can begenerated and provided by these different cameras to the base station.The camera being used to generate the video data (i.e., the cameradetecting a possible security-related incident) can be determined andused to determine the priority of notifications. For example, activityoccurring outside of the home can have one priority sequence, butactivity then occurring within the home can result in a differentpriority sequence. This would result in different devices beingprioritized based on the location of the activity.

In another example, activity outside of the home can result in asequential priority in which one device can be contacted at a time, aspreviously discussed. However, activity within the home can result inevery device to be contacted. Thus, different levels of securityawareness can be provided and different levels can result in differentpriorities.

In some implementations, base station 135 and camera 105 can becommunicatively coupled with a wireless mesh network within the home.The wireless mesh network can have a variety of nodes implementing anetwork topology to provide wireless communications to devices withinand outside of the home.

FIG. 4 illustrates an example of a simplified block diagram of anelectronic device which may be used with particular implementations. Theelectronic device of FIG. 4 can implement any of the functionalities andfeatures discussed above, including base station 135.

For example, FIG. 6 portrays a high-level block diagram illustrating aprocessing device 600 implementing base station 135 in which at leastsome operations described herein can be implemented. In someimplementations, the block diagram can also implement the other devicesdescribed herein, such as cameras and radar sensos. The processingsystem can be a system that can run any of themethods/algorithms/techniques described above.

In the illustrated embodiment, the processing device 600 includes one ormore processors 605, memory 610, antenna 615, and one or more radios620. Processors 605 may be or include, for example, one or moregeneral-purpose programmable microprocessors or microprocessor cores,microcontrollers, application specific integrated circuits (ASICs),programmable gate arrays, or the like, or a combination of such devices.The processor(s) 605 control the overall operation of the processingdevice 600. Memory 610 may be or include one or more physical storagedevices, which may be in the form of random access memory (RAM),read-only memory (ROM) (which may be erasable and programmable), flashmemory, miniature hard disk drive, or other suitable type of storagedevice, or a combination of such devices. Memory 610 may store data andinstructions that configure the processor(s) 605 to execute operationsin accordance with the techniques described above. Processing device 600can also include communication devices that may be or include, forexample, an Ethernet adapter, cable modem, Wi-Fi adapter, cellulartransceiver, Bluetooth transceiver, or the like, or a combinationthereof. Depending on the specific nature and purpose of the processingdevice 600, it can also include I/O devices that can include devicessuch as a display (which may be a touch screen display), audio speaker,keyboard, mouse or other pointing device, microphone, camera, etc.Processing device 600 can also include radios 620, for example, adifferent radio for each band that communication links can beestablished within. Processing device 600 can also include one or moreantennas 615 for aiding the establishing of the communication links. Forexample, radio 620 can generate a signal that is transmitted via antenna615.

While processes or blocks are presented in a given order, alternativeembodiments may perform routines having steps, or employ systems havingblocks, in a different order, and some processes or blocks may bedeleted, moved, added, subdivided, combined, and/or modified to providealternative or sub-combinations, or may be replicated (e.g., performedmultiple times). Each of these processes or blocks may be implemented ina variety of different ways. In addition, while processes or blocks areat times shown as being performed in series, these processes or blocksmay instead be performed in parallel, or may be performed at differenttimes. When a process or step is “based on” a value or a computation,the process or step should be interpreted as based at least on thatvalue or that computation.

Software or firmware to implement the techniques introduced here may bestored on a machine-readable storage medium and may be executed by oneor more general-purpose or special-purpose programmable microprocessors.A “machine-readable medium”, as the term is used herein, includes anymechanism that can store information in a form accessible by a machine(a machine may be, for example, a computer, network device, cellularphone, personal digital assistant (PDA), manufacturing tool, any devicewith one or more processors, etc.). For example, a machine-accessiblemedium includes recordable/non-recordable media (e.g., read-only memory(ROM); random access memory (RAM); magnetic disk storage media; opticalstorage media; flash memory devices; etc.), etc.

Note that any and all of the embodiments described above can be combinedwith each other, except to the extent that it may be stated otherwiseabove or to the extent that any such embodiments might be mutuallyexclusive in function and/or structure.

Although the present invention has been described with reference tospecific exemplary embodiments, it will be recognized that the inventionis not limited to the embodiments described, but can be practiced withmodification and alteration within the spirit and scope of the appendedclaims. Accordingly, the specification and drawings are to be regardedin an illustrative sense rather than a restrictive sense.

Physical and functional components (e.g., devices, engines, modules, anddata repositories, etc.) associated with processing device 600 can beimplemented as circuitry, firmware, software, other executableinstructions, or any combination thereof. For example, the functionalcomponents can be implemented in the form of special-purpose circuitry,in the form of one or more appropriately programmed processors, a singleboard chip, a field programmable gate array, a general-purpose computingdevice configured by executable instructions, a virtual machineconfigured by executable instructions, a cloud computing environmentconfigured by executable instructions, or any combination thereof. Forexample, the functional components described can be implemented asinstructions on a tangible storage memory capable of being executed by aprocessor or other integrated circuit chip. The tangible storage memorycan be computer readable data storage. The tangible storage memory maybe volatile or non-volatile memory. In some embodiments, the volatilememory may be considered “non-transitory” in the sense that it is not atransitory signal. Memory space and storages described in the figurescan be implemented with the tangible storage memory as well, includingvolatile or non-volatile memory.

Each of the functional components may operate individually andindependently of other functional components. Some or all of thefunctional components may be executed on the same host device or onseparate devices. The separate devices can be coupled through one ormore communication channels (e.g., wireless or wired channel) tocoordinate their operations. Some or all of the functional componentsmay be combined as one component. A single functional component may bedivided into sub-components, each sub-component performing separatemethod step or method steps of the single component.

In some embodiments, at least some of the functional components shareaccess to a memory space. For example, one functional component mayaccess data accessed by or transformed by another functional component.The functional components may be considered “coupled” to one another ifthey share a physical connection or a virtual connection, directly orindirectly, allowing data accessed or modified by one functionalcomponent to be accessed in another functional component. In someembodiments, at least some of the functional components can be upgradedor modified remotely (e.g., by reconfiguring executable instructionsthat implements a portion of the functional components). Other arrays,systems and devices described above may include additional, fewer, ordifferent functional components for various applications.

While embodiments have been described in the context of fullyfunctioning computers, those skilled in the art will appreciate that thevarious embodiments are capable of being distributed as a programproduct in a variety of forms and that the disclosure applies equally,regardless of the particular type of machine or computer-readable mediaused to actually effect the embodiments.

From the foregoing, it will be appreciated that specific embodiments ofthe invention have been described herein for purposes of illustration,but that various modifications can be made without deviating from thescope of the invention. Accordingly, the invention is not limited exceptas by the appended claims.

I/We claim:
 1. A method comprising: determining, by a computer system,first operational characteristics including a first video processingfunctionality of a first device; determining, by the computer system,second operational characteristics including a second video processingfunctionality of a second device, the first video processingfunctionality providing a higher quality video processing than thesecond video processing functionality; determining, by the computersystem, a priority sequence using machine learning, the prioritysequence for providing a notification based on the first operationalcharacteristics and the second operational characteristics; andproviding, by the computer system, the notification to the first devicebased on the priority sequence.
 2. The method of claim 1, whereindetermining the priority sequence is based on a hidden Markov model(HMM) or Viterbi's algorithm.
 3. The method of claim 1, whereindetermining the first operational characteristics and the secondoperational characteristics comprises: determining, by the computersystem, a first network bandwidth available to the first device and asecond network bandwidth available to the second device, wherein thefirst network bandwidth is greater than the second network bandwidth. 4.The method of claim 1, wherein determining the first operationalcharacteristics and the second operational characteristics comprises:determining, by the computer system, a first location of the firstdevice and a second location of the second device, wherein the firstlocation is a first location type, the second location is a secondlocation type, and one of the first location type or the second locationtype is residential and the other is commercial.
 5. The method of claim1, wherein determining the first operational characteristics and thesecond operational characteristics comprises: determining, by thecomputer system, a first history of the first device responding toprevious notifications and a second history of the second deviceresponding to previous notifications, wherein the priority sequence isbased on the first history and the second history.
 6. The method ofclaim 1, wherein the notification is a voice call placed to the firstdevice, the method further comprising: receiving, by the computersystem, video data indicative of activity captured within a field ofview of a camera related to a security system associated with the firstdevice and the second device.
 7. The method of claim 6, furthercomprising: receiving, by the computer system, a response from the firstdevice, the response indicating an action to be performed in response tothe occurrence of the activity; and performing, by the computer system,an action based on the response indicating that the action is to beperformed in response to the occurrence of the activity.
 8. The methodof claim 7, wherein performing the action comprises contacting, by thecomputer system, emergency services in response to the occurrence of theactivity
 9. The method of claim 1, further comprising receiving, by thecomputer system, a first location of the first device and a secondlocation of the second device from a cloud server, wherein determiningthe first operational characteristics and the second operationalcharacteristics is based on the first location and the second location.10. An electronic device, comprising: one or more processors; andnon-transitory memory storing instructions, wherein the processor isconfigured to execute the instructions such that the processor andmemory are configured to: determine first operational characteristicsincluding a first video processing functionality of a first device;determine second operational characteristics including a second videoprocessing functionality of a second device, the first video processingfunctionality providing a higher quality video processing than thesecond video processing functionality; determine a priority sequenceusing machine learning, the priority sequence for providing anotification based on the first operational characteristics and thesecond operational characteristics; and provide the notification to thefirst device based on the priority sequence.
 11. The electronic deviceof claim 10, wherein determining the priority sequence is based on ahidden Markov model (HMM) or Viterbi's algorithm.
 12. The electronicdevice of claim 10, wherein determining the first operationalcharacteristics and the second operational characteristics comprises:determining a first network bandwidth available to the first device anda second network bandwidth available to the second device, wherein thefirst network bandwidth is greater than the second network bandwidth.13. The electronic device of claim 10, wherein determining the firstoperational characteristics and the second operational characteristicscomprises: determining, by the computer system, a first location of thefirst device and a second location of the second device, wherein thefirst location is a first location type, the second location is a secondlocation type, and one of the first location type or the second locationtype is residential and the other is commercial.
 14. The electronicdevice of claim 10, wherein determining the first operationalcharacteristics and the second operational characteristics comprises:determining, by the computer system, a first history of the first deviceresponding to previous notifications and a second history of the seconddevice responding to previous notifications, wherein the prioritysequence is based on the first history and the second history.
 15. Theelectronic device of claim 10, wherein the notification is a voice callplaced to the first device, the processor further configured to executethe instructions such that the processor and memory are furtherconfigured to: receive video data indicative of activity captured withina field of view of a camera related to a security system associated withthe first device and the second device.
 16. The electronic device ofclaim 15, wherein the processor is further configured to execute theinstructions such that the processor and memory are further configuredto: receive a response from the first device, the response indicating anaction to be performed in response to the occurrence of the activity;and perform an action based on the response indicating that the actionis to be performed in response to the occurrence of the activity. 17.The electronic device of claim 16, wherein performing the actioncomprises contacting emergency services in response to the occurrence ofthe activity.
 18. The electronic device of claim 10, wherein theprocessor is further configured to execute the instructions such thatthe processor and memory are further configured to: receive a firstlocation of the first device and a second location of the second devicefrom a cloud server, wherein determining the first operationalcharacteristics and the second operational characteristics is based onthe first location and the second location.
 19. A computer programproduct including one or more non-transitory computer-readable mediastoring computer program instructions, execution of which by aprocessing system causes the processing system to: determine firstoperational characteristics including a first video processingfunctionality of a first device; determine second operationalcharacteristics including a second video processing functionality of asecond device, the first video processing functionality providing ahigher quality video processing than the second video processingfunctionality; determine a priority sequence using machine learning, thepriority sequence for providing a notification based on the firstoperational characteristics and the second operational characteristics;and provide the notification to the first device based on the prioritysequence.
 20. The computer program product of claim 19, whereindetermining the priority sequence is based on a hidden Markov model(HMM) or Viterbi's algorithm.