Doorbell call center

ABSTRACT

Techniques are described for enabling a service administrator to respond to a detected doorbell press at a property when an authorized user is unavailable to respond. In some implementations, a determination that a doorbell press has been detected at a property is made. Video data collected by a doorbell device of the property is obtained in response to determining that the doorbell press has been detected at the property. Sensor data collected by one or more sensors of a monitoring system located within the property is obtained in response to determining that the doorbell press has been detected at the property. A present security risk for the property is determined based at least on the obtained sensor data and the obtained video data. A communication session between the doorbell device and a server system associated with the monitoring system of the property is established in response to determining the present security risk for the property.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.17/155,787, filed Jan. 22, 2021, now allowed, which is a continuation ofU.S. application Ser. No. 16/715,497, filed Dec. 16, 2019, now U.S. Pat.No. 10,904,397, issued Jan. 26, 2021, which is a continuation of U.S.application Ser. No. 16/284,004, filed Feb. 25, 2019, now U.S. Pat. No.10,511,719, issued Dec. 17, 2019, which is a continuation of U.S.application Ser. No. 15/811,141, filed Nov. 13, 2017, now U.S. Pat. No.10,218,855, issued Feb. 26, 2019, which claims the benefit of U.S.Provisional Patent Application No. 62/421,474, filed on Nov. 14, 2016and titled “DOORBELL CALL CENTER.” All of these prior applications areincorporated by reference in their entirety.

TECHNICAL FIELD

This disclosure application relates generally to home monitoringtechnology and more particularly to doorbell devices.

BACKGROUND

The operation of connected devices within a property can be integratedto improve monitoring of the property. For example, data gathered by theconnected devices can be aggregated to determine when people are presentin the property.

SUMMARY

Techniques are described for enabling a service administrator to respondto a detected doorbell press at a property when an authorized user isunavailable to respond. For instance, a system includes a doorbelldevice that initially detects a doorbell press by a visitor. Thedoorbell device then transmits a request to a central monitoring stationassociated with the property. The service administrator responds to therequest by initiating a two-way communication session between thecentral monitoring station and the doorbell device. A video or audiofeed associated with the service administrator is then provided foroutput to the visitor through an output device (e.g., a display ormicrophone) associated with the doorbell device. In this regard, theservice administrator can automatically respond to the doorbell press inthe authorized user's absence in order to visually verify the risk of asecurity breach at the property resulting from the detected doorbellpress.

In some implementations, the system is capable of automaticallyperforming specific actions in response to detecting the doorbell press.For instance, the system may aggregate data collected from varioussensors and devices located within the current property in order toidentify present conditions at the time point of the detected doorbellpress. The system then selects a designated action to perform based oncomparing the present conditions of the property to predeterminedconditions specified within a doorbell action repository. The doorbellaction repository includes a list of actions that the system can takewhen the present conditions match a set of predetermined conditions. Forexample, the system can transmit a notification of the detected doorbellpress to a user device if an authorized user for the property ispresently located inside the property when the doorbell is pressed. Inanother example, the system can initiate a two-way communication sessionbetween a visitor that presses the doorbell and a service administratorassociated with a central monitoring system if the authorized user isdetermined to be located outside the property at the time when thedoorbell is pressed. In this regard, the system can use different typesof data to identify the appropriate action to take in order to reducethe likelihood of an intrusion event taking place after the detecteddoorbell press.

Implementations of the described techniques may include hardware, amethod or process implemented at least partially in hardware, or acomputer-readable storage medium encoded with executable instructionsthat, when executed by a processor, perform operations.

The details of one or more implementations are set forth in theaccompanying drawings and the description below. Other features will beapparent from the description and drawings, and from the claims.

DESCRIPTION OF DRAWINGS

FIG. 1 illustrates an example of a system that is capable ofautomatically initiating a two-way communication session between adoorbell device and a central monitoring station.

FIG. 2 illustrates an example of a process for automatically initiatinga two-way communication session between a doorbell device and a centralmonitoring station.

FIG. 3A illustrates an example of a process for automatically performingdesignated action in response to a doorbell press based on sensor dataassociated with a property.

FIG. 3B illustrates an example of a system that is capable ofautomatically performing designated action in response to a doorbellpress based on sensor data associated with a property.

FIG. 4 illustrates an example of a system that is capable of aggregatingdoorbell data indicating prior intruder events across multipleproperties.

FIG. 5 illustrates an example of a process for establishing acommunication session in response to a detected doorbell press at aproperty.

In the figures, like reference numbers represent corresponding partsthroughout.

DETAILED DESCRIPTION

In general, techniques are described for enabling a serviceadministrator to respond to a detected doorbell press at a property whenan authorized user is unavailable to respond. For instance, a systemincludes a doorbell device that initially detects a doorbell press by avisitor. The doorbell device then transmits a request to a centralmonitoring station associated with the property. The serviceadministrator responds to the request by initiating a two-waycommunication session between the central monitoring station and thedoorbell device. A video or audio feed associated with the serviceadministrator is then provided for output to the visitor through anoutput device (e.g., a display or microphone) associated with thedoorbell device. In this regard, the service administrator canautomatically respond to the doorbell press in the authorized user'sabsence in order to visually verify the risk of a security breach at theproperty resulting from the detected doorbell press.

FIG. 1 illustrates an example of a system 100 that is capable ofautomatically initiating a two-way communication session between adoorbell device and a central monitoring station. The system 100 isassociated with a property 101 and may include a monitor control unit110, sensors 122, appliances 124, and a doorbell device 126 thatexchange communications over a network 105. The system 100 may alsoinclude a central monitoring station 130 that exchanges communicationswith the monitor control unit 110, and a mobile device 140 associatedwith a user 102 of the property 101.

Although FIG. 1 illustrates one property for clarity, the centralmonitoring station 130 may also collect and exchange data relating tomultiple properties and/or structures. For example, the centralmonitoring station 130 may communicate directly with the monitoringcontrol units of multiple properties over a cellular network, or throughother communications media and protocol (e.g., through the local network105, over Bluetooth, Zigbee, etc.).

In general, the architecture of the system 100 enables the doorbelldevice 126 to establish a two-way communication session with the centralmonitoring station 130 in response to receiving a doorbell press from anindividual 104. The two-way communication session can be initiated whenthe user 102 is presently located outside the property 101 or otherwiseunavailable to answer the door. For example, the user 102 may be onvacation, or may indicate that he/she should not be receivingnotifications related to the property 101. In such an example, anadministrator associated with the central monitoring station 130 caninstead respond to the doorbell press to either inform the individual104 that the user is presently unavailable, or if the individual 104 islikely to represent an intruder, dissuade the individual 104 fromintruding upon the property 101 in the user's absence. The administratormay also trigger one or more security-related operations, which aredescribed in more detail below.

In addition, the architecture of the system 100 enables the visualverification of a possible intruder prior to the dispatching ofemergency services in response to detecting an intrusion or other typeof security breach at the property 101. For example, the doorbell device126 enables the recording of individuals that attempt to ring a doorbellin order to confirm that a property is vacant before intruding thepremises. In addition, as described below, the system 100 enables aservice administrator to automatically initiate a two-way communicationsession through the doorbell device 126 in response to detecting adoorbell press in order to verify whether the individual that rang thedoorbell presents a security threat to the property 101.

Referring initially to the example depicted in FIG. 1, the individual104 initially presses a doorbell associated with the property 101. Dataindicating the doorbell press is then transmitted from the monitorcontrol unit 110 to the central monitoring station 130. A serviceadministrator associated with the central monitoring station 130 thenoperates an interface 132 to establish a two-way communication sessionbetween the central monitoring station 130 and the doorbell device 126over the network 105. An output device associated with the doorbelldevice 126 then provides video or audio feed 126 a of the administratorfor output to the individual 104 nearby the front door of the property101.

During the two-way communication session, the service administrator mayuse the interface 132 to inspect whether the individual 104 representsan actual visitor to the property or may likely to be an intruder thatposes a security risk to the property 101. For example, the serviceadministrator may view a video feed 134 of the individual 104 capturedthrough the doorbell device 126 on the interface 132. The serviceadministrator may also select various options 136 to perform follow-upinspections of the property 101.

For example, the service administrator may view property security data(e.g., a present security status for the property, sensor data recentlycollected by the sensors 122 and/or the appliances 124). In thisexample, the service administrator may inspect recent events that tookplace prior to or during the detected doorbell press to determine if theindividual 104 has attempted to enter into property 101 usingalternative means. In another example, the property administrator mayalso select an option to transmit an alert to the property owner (e.g.,the authorized user 102). In this example, the central monitoringstation 130 may transmit a text or voice notification to the user device140 indicating the detected doorbell press and/or associated informationsuch as a captured image of the authorized user 102, or the option tojoin or listen in on the ongoing two-way communication session betweenthe central monitoring station 130 and the doorbell device 126. In yetanother example, if the service administrator believes that theindividual 104 is highly likely to represent an intruder and/or thepresent conditions of the property indicate a high risk of intrusion,the service administrator may select an option to generate an alarmsignal for the property 101, which may then, for example, enable a sirenwithin the property 101, automatically transmit an alert notification tolocal law enforcement agencies, or transmit an alert notification to theuser device 140.

The local network 105 may be configured to enable electroniccommunications between devices connected to the local network 105. Forexample, the local network 105 may be configured to enable exchange ofelectronic communications between the monitor control unit 110, thesensors 122, and the appliances 124. The local network 105 may include,for example, Local Area Networks (LANs), for example, Wi-Fi, analog ordigital wired and wireless telephone networks, for example, a publicswitched telephone network (PSTN), Integrated Services Digital Network(ISDN), a cellular network, and Digital Subscriber Line (DSL), Ethernet,Internet Protocol (IP) over broadband, radio, television, cable,satellite, or any other delivery or tunneling mechanism for carryingdata.

The local network 105 may include multiple networks or subnetworks, eachof which may include, for example, a wired or wireless data pathway. Thelocal network 105 may also include a circuit-switched network, apacket-switched data network, or any other network able to carryelectronic communications (e.g., data or voice communications). Forexample, the local network 105 may include networks based on theInternet protocol (IP), asynchronous transfer mode (ATM), the PSTN,packet-switched networks based on IP, X.25, or Frame Relay, or othercomparable technologies and may support voice using, for example, VoIP,or other comparable protocols used for voice communications. The localnetwork 105 may include one or more networks that include wireless datachannels and wireless voice channels. The local network 105 may also bea wireless network, a broadband network, or a combination of networksincluding a wireless network and a broadband network.

The monitor control unit 110 may be an electronic device thatcoordinates and/or monitors the operations of devices connected to thelocal network 105 such as the sensors 122, the appliances 124, and thedoorbell device 126. In some instances, the monitor control unit 110includes a controller and a network module. The controller is configuredto control a system 100 (e.g., a HVAC system, an energy monitoringsystem) that includes the monitor control unit 110. In some examples,the controller may include a processor or other control circuitryconfigured to execute instructions of a program that controls operationof an alarm system. In these examples, the controller may be configuredto receive input from sensors, detectors, or other devices included inthe alarm system and control operations of devices included in the alarmsystem or other household devices (e.g., a thermostat, an appliance,lights, etc.). For example, the controller may be configured to controloperation of the network module included in the monitor control unit110.

The network module is a communication device configured to exchangecommunications over the network 105. The network module may be awireless communication module configured to exchange wirelesscommunications over the network 105. For example, the network module maybe a wireless communication device configured to exchange communicationsover a wireless data channel and a wireless voice channel. In thisexample, the network module may transmit alarm data over a wireless datachannel and establish a two-way voice communication session over awireless voice channel. The wireless communication device may includeone or more of a LTE module, a GSM module, a radio modem, cellulartransmission module, or any type of module configured to exchangecommunications in one of the following formats: LTE, GSM or GPRS, CDMA,EDGE or EGPRS, EV-DO or EVDO, UMTS, or IP.

The network module may also be a wired communication module configuredto exchange communications over the network 105 using a wiredconnection. For instance, the network module may be a modem, a networkinterface card, or another type of network interface device. The networkmodule may be an Ethernet network card configured to enable the monitorcontrol unit 110 to communicate over a local area network and/or theInternet. The network module also may be a voice-band modem configuredto enable the alarm panel to communicate over the telephone lines ofPlain Old Telephone Systems (POTS).

The monitor control unit 110 also may include a communication modulethat enables the monitor control unit 110 to communicate other devicesof the system 100. The communication module may be a wirelesscommunication module that allows the monitor control unit 110 tocommunicate wirelessly. For instance, the communication module may be aWi-Fi module that enables the monitor control unit 110 to communicateover a local wireless network at the property 101. The communicationmodule further may be a 900 MHz wireless communication module thatenables the monitor control unit 110 to communicate directly with amonitor control unit. Other types of short-range wireless communicationprotocols, such as Bluetooth, Bluetooth LE, Zwave, ZigBee, etc., may beused to allow the monitor control unit 110 to communicate with otherdevices in the property 101.

In some implementations, the monitor control unit 110 may include datacapture and recording devices. In these examples, the monitor controlunit 110 may include one or more cameras, one or more motion sensors,one or more microphones, one or more biometric data collection tools,one or more temperature sensors, one or more humidity sensors, one ormore air flow sensors, and/or any other types of sensors that may beuseful in capturing monitoring data related to the property 101 andusers in the property.

The monitor control unit 110 further may include processor and storagecapabilities. The monitor control unit 110 may include any suitableprocessing devices that enable the monitor control unit 110 to operateapplications and perform the actions described throughout thisdisclosure. In addition, the monitor control unit 110 may include solidstate electronic storage that enables the monitor control unit 110 tostore applications, configuration data, collected sensor data, and/orany other type of information available to the monitor control unit 110.

The monitor control unit 110 may exchange communications with thesensors 122, the appliances 124, the doorbell device 126, and thecentral monitoring station 130 using multiple communication links. Themultiple communication links may be a wired or wireless data pathwaysconfigured to transmit signals from the sensors 122, the appliances 124,the doorbell device 126, and the central monitoring station 130 to thecontroller. The sensors 122, the appliances 124, the doorbell sensor126, and the central monitoring station 130 may continuously transmitsensed values to the controller, periodically transmit sensed values tothe monitor control unit 110, or transmit sensed values to the monitorcontrol unit 110 in response to a change in a sensed value.

In some implementations, the monitor control unit 110 may additionallybe used to perform routine surveillance operations on a property. Forinstance, the monitor control unit 110 may be assigned to one or moreparticular properties within a geographic location and may routinelycollect surveillance footage during specified time periods (e.g., afterdark), which may then be transmitted to the central monitoring station130 for transmitting back to each particular property owner. In suchimplementations, the property owner may receive the surveillance footageover the local network 105 as a part of a service provided by a securityprovider that operates the central monitoring station 130. For example,transmissions of the surveillance footage collected by the monitorcontrol unit 110 may be part of a premium security service packageprovided by a security provider in addition to the routine droneemergency response service.

In some implementations, the monitor control unit 110 may monitor theoperation of the electronic devices of the system 100 such as thesensors 122, the appliances 124, the doorbell device 126, and thecentral monitoring station 130. For instance, the monitor control unit110 may enable or disable the devices of the system 100 based on a setof rules associated with energy consumption, user-specified settings,and/or other information associated with the conditions near or withinthe property 101 where the system 100 is located. In some examples, themonitor control unit 110 may be used as a replacement to a traditionalsecurity panel (or monitor control unit) that is used to monitor andcontrol the operations of the system 100. In other examples, the monitorcontrol unit 110 may coordinate monitoring operations with a separatesecurity panel of the system 100. In such examples, the monitor controlunit 110 may monitor particular activities of the devices of the system100 that are not monitored by the security panel, or monitor theoperation of particular devices that are not monitoring by the securitypanel.

In some implementations, the monitor control unit 110 and/or thecomponents of the monitor control unit 110 may partially or completelyoperate outside of the property 101. For example, the monitor controlunit 110 may reside on the central monitoring station 130. In suchexamples, data collected by the sensors 122, the appliances 124, and thedoorbell device 126 may be transmitted over the network 105 to thecentral monitoring station 130. In other examples, the monitor controlunit 110 may be located on another remote server other than the centralmonitoring station 130 that exchanges data with the central monitoringstation 130 through another cloud network.

As described above, the property 101 may include various monitoringdevices that are each capable of performing individual monitoringoperations and/or capable to performing a set of coordinated operationsbased on instructions received from either the monitor control unit 110or the central monitoring station 130. For instance, the property 101may include the sensors 122, the appliances 124, the doorbell device126, and other devices that provide monitoring data associated withdevices, areas, or individuals located nearby or within the premises ofthe property 101.

The sensors 122 may include one or more of a contact sensor, a motionsensor, a glass break sensor, an occupancy sensor, or any other type ofsensor that can be included in an alarm or security system. The sensors122 may also include an environmental sensor, such as a temperaturesensor, a water sensor, a rain sensor, a wind sensor, a light sensor, asmoke detector, a carbon monoxide detector, an air quality sensor, etc.The sensors 122 may further include a health monitoring sensor, such asa prescription bottle sensor that monitors taking of prescriptions, ablood pressure sensor, a blood sugar sensor, a bed mat configured tosense presence of liquid (e.g., bodily fluids) on the bed mat, etc. Insome examples, the sensors 122 may include a radio-frequencyidentification (RFID) sensor that identifies a particular article thatincludes a pre-assigned RFID tag.

In some implementations, the sensors 122 may include one or morecameras. The cameras may be video/photographic cameras or other type ofoptical sensing devices configured to capture images. For instance, thecameras may be configured to capture images of an area within a buildingmonitored by the monitor control unit 110. The cameras may be configuredto capture single, static images of the area and also video images ofthe area in which multiple images of the area are captured at arelatively high frequency (e.g., thirty images per second). The camerasmay be controlled based on commands received from the monitor controlunit 110.

The cameras may be triggered by several different types of techniques.For instance, a Passive Infra Red (PIR) motion sensor may be built intothe cameras and used to trigger the cameras to capture one or moreimages when motion is detected. The cameras also may include a microwavemotion sensor built into the camera and used to trigger the cameras tocapture one or more images when motion is detected. The cameras may havea “normally open” or “normally closed” digital input that can triggercapture of one or more images when external sensors (e.g., the sensors122, PIR, door/window, etc.) detect motion or other events. In someimplementations, the cameras receive a command to capture an image whenexternal devices detect motion or another potential alarm event. Thecameras may receive the command from the controller or directly from oneof the sensors 122.

In some implementations, the cameras trigger integrated or externalilluminators (e.g., Infra Red, Z-wave controlled “white” lights, etc.)to improve image quality when the scene is dark. An integrated orseparate light sensor may be used to determine if illumination isdesired and may result in increased image quality.

The cameras may be programmed with any combination of time/dayschedules, system “arming state”, or other variables to determinewhether images should be captured or not when triggers occur. Thecameras may enter a low-power mode when not capturing images. In thiscase, the cameras may wake periodically to check for inbound messagesfrom the controller. The cameras may be powered by internal, replaceablebatteries if located remotely from the monitor control unit 110. Thecameras may employ a small solar cell to recharge the battery when lightis available. Alternatively, the cameras may be powered by thecontroller's 112 power supply if the cameras are co-located with thecontroller.

The appliances 124 may be home automation devices connected to the localnetwork 105 that are configured to exchange electronic communicationswith other devices of the system 100. The appliances 124 may include,for example, connected kitchen appliances, controllable light sources,safety and security devices, energy management devices, and/or othertypes of electronic devices capable of exchanging electroniccommunications over the local network 105. In some instances, theappliances 124 may periodically transmit information and/or generateddata to the monitor control unit 110 such that the monitor control unit110 can automatically control the operation of the appliances 124 basedon the exchanged communications. For example, the monitor control unit110 may operate one or more of the appliances 124 based on a fixedschedule specified by the user. In another example, the monitor controlunit 110 may enable or disable one or more of the appliances 124 basedon received sensor data from the sensors 122.

The doorbell device 126 may be an electronic computing device that isplaced on the exterior of the property 101 and configured to capturevideo and image footage of an exterior region of the property 101. Insome implementations, the doorbell device 126 can be a connected deviceplaced on the front door of the property 101 that is capable ofreceiving a button press from an individual near the front door (e.g.,the individual 104). In such implementations, the doorbell device 126may be configured to exchange communications with a separate securitycamera that captures footage of the front exterior of the property 101.Alternatively, in other implementations, the doorbell device 126 mayinclude one or more integrated camera devices that are capable ofcapable of collecting footage of the exterior region. The integratedcameras may also be capable of detecting motion within the exteriorregion such that, after initially detecting a doorbell press, thedoorbell device 126 can correlate a doorbell press detection event andsubsequent motion detected within the exterior region in order toidentify possible security risks to the property 101.

In some implementations, the doorbell device 126 may be capable ofperforming one or more response actions to a detected doorbell press todeter possible intruders. For instance, the doorbell device 126 caninclude a speaker that plays a pre-recorded message of the authorizeduser 102 to indicate that someone is presently within the property 101even when the property 101 is unoccupied. In other examples, thedoorbell device 126 may be capable of transmitting signals to deviceswithin the property 101 (e.g., the sensors 122, the appliances 124) inresponse to detecting a doorbell press to simulate occupancy within theproperty 101. In other examples, the doorbell device 126 may alsocommunicate directly with the monitor control unit 110, which can thenrelay the communication with the doorbell device 126 to devices withinthe property over another signal path using a different communicationprotocol (e.g., Bluetooth, Bluetooth LE, ZWave, ZigBee, etc.).

In some implementations, the doorbell device 126 may analyze videos orimages captured of the detectable regions for the presence of persons inthe captured videos or images. For instance, the doorbell device 126 mayuse image processing techniques in order to identify shapes in thecaptured images that resemble a human body near the front door of theproperty 101 where the doorbell device 126 is located. The doorbelldevice 126 also may analyze the images for moving objects (or use othertechniques to identify moving objects) and target imaging on capture ofmoving objects.

Based on detection of the individual 104, the doorbell device 126 maylock onto the location of the individual 104 within the exterior regionand follow the individual 104 within the exterior region. In addition,once the doorbell device 126 locks onto the individual 104, the doorbelldevice 126 can transmit a signal to the monitor control unit 110 tocoordinate operations between the sensors 122 and the appliances 124 andgather data collected by these devices to determine a security stateassociated with the property 101.

Upon detection of the individual 104, the doorbell device 126 can alsotransmit a signal to the monitor control unit 110. For instance, thetransmitted signal may include attributes of the individual 104, motiondetection data within the exterior region, the number of doorbellpresses received within a particular time period, and/or a time durationrepresented by the particular time period. Based on the informationincluded within the transmitted signal, the monitor control unit 110 maydetermine whether there may be a potential security concern for theproperty 101 and take action accordingly. For example, metadataassociated with the information included within the transmitted signalcan be transferred to the central monitoring station 130 or a centralalarm station server.

In some implementations, the doorbell device 126 may perform imagerecognition processing on the captured videos or images of the exteriorregion in an attempt to detect whether any of the identified individualare authorized users (e.g., users authorized to access the property101). In these examples, the doorbell device 126 may have access toimages of authorized users of the property 101 and may compare imagesbeing captured to the accessed images of authorized users. Based on thecomparison, the doorbell device 126 may use facial recognitiontechniques to determine whether the imaged user matches an authorizeduser 102 of the property 101. The doorbell device 126 may then use thedetermination of whether the imaged user matches an authorized user 102of the property 101 or an intruder to control further trackingoperation.

For example, based on a determination that the imaged user is anintruder, the doorbell device 126 may continue tracking the intruder andensure that sufficient videos or images to identify the intruder havebeen captured. Alternatively, based on a determination that the imageduser is an authorized user, the doorbell device 126 may discontinuetracking the authorized user. The doorbell device 126 also may reportthe location of the authorized user 102 to the monitor control unit 110.

In other examples, the doorbell device 126 or the monitor control unit110 can also store a blacklist that specifies a list of knownindividuals that the authorized user has indicated should not be able toaccess the property 101. The blacklist may include one or more photos ofthe known individuals that the integrated that are compared to photos ofindividuals detected within the detectable region. In response todetermining that the detected image of an individual within thedetectable region matches at least one photograph of an individualwithin the blacklist, the doorbell device 126 or the monitor controlunit 110 can take security measures to restrict access to the property101. For example, in response to determining that the captured photo ofthe individual within the detectable region matches a photograph of anindividual within the blacklist, the monitor control unit 110 cantransmit a signal to the central monitoring station 130 indicating apotential security risk to the property 101, and an alert with thephotograph can then be transmitted to the user 140.

The central monitoring station 130 may be an electronic deviceconfigured to provide monitoring services by exchanging electroniccommunications with the monitor control unit 110 and/or the user device140 over the local network 105 and the Internet. For example, thecentral monitoring station 130 may be configured to monitor events(e.g., a present security status, alarm events detected) generated bythe monitor control unit 110 and/or other devices connected over thelocal network 105. In this example, the central monitoring station 130may exchange electronic communications with the network module includedin the monitor control unit 110 to receive information regarding eventsdetected by the monitor control unit 110.

The central monitoring station 130 may also exchange data communicationswith the user device 140 associated with the authorized user 102 of theproperty 101. For instance, the central monitoring station 130 may beassociated with an application provided by that runs on the user device150. In some instances, the application may be provided by the serviceprovider that operates and maintains the operations of the centralmonitoring station 130. The application may provide various types ofinformation related to the local network 105 within the property 101.For example, the application may provide an authorized user 102 withinformation relating to a current security status of the property 101,data that is being monitored by the monitor control unit 110, and/orhistorical door press data associated with the property 101. Inaddition, the authorized user 102 may use the application to remotelymonitor, configure, and/or adjust the monitoring operations performed byeither the monitor control unit 110 or the central monitoring station130.

The central monitoring station 130 can be operated and maintained by aservice provider that is associated with the monitoring system installedwithin the property 101. For example, the service provider may provide asubscription-based security services package that includes variousmonitoring features that are performed by a combination of the monitorcontrol unit 110, the sensors 122, the appliances 124, the doorbelldevice 126, and/or the central monitoring station 130. For example, theservice provider may provide a monitoring service by which an associatedservice administrator associated with the service provider responds to adetected doorbell press when the authorized user 102 is either locatedoutside the property 101 or currently unavailable to the answer thedoor. More detailed descriptions relating to this example are providedin greater detail below.

The user device 140 may be an electronic device associated with theauthorized user 102 (e.g., a property owner or an occupant) thatexchanges network communications over the local network 105. Forexample, the user device 140 may be one or more of a smartphone, atablet computing device, personal computing device (PCs), anetwork-enabled media player, a home entertainment system, a cloudstorage device, and other types of network-enabled devices. The userdevice 140 may access a service made available by the central monitoringstation 130 on the network 105, such as a mobile application. The datagenerated by the user device 140 may include over the network 105, whichmay be monitored by the monitor control unit 110.

The user device 140 can include a native surveillance application. Thenative surveillance application refers to a software/firmware programrunning on the corresponding mobile device that enables the userinterface and features described throughout. The user device 140 mayload or install the native surveillance application based on datareceived over a network (e.g., the network 105) or data received fromlocal media. The native surveillance application runs on mobile devicesplatforms. The native surveillance application also enables the userdevice 140 to receive and process image and sensor data from themonitoring system.

In some implementations, the user device 140 communicates with andreceive monitoring system data from the monitor control unit 110 using acommunication link. For instance, the user device 140 may communicatewith the monitor control unit 110 using various local wireless protocolssuch as Wi-Fi, Bluetooth, Zwave, ZigBee, HomePlug (Ethernet overpowerline), or wired protocols such as Ethernet and USB, to connect theuser device 140 to local security and automation equipment. The userdevice 140 may connect locally to the monitoring system and sensors 122and other devices. The local connection may improve the speed of statusand control communications because communicating through the network 105with a remote server (e.g., the central monitoring station 130) may besignificantly slower.

Although the user device 140 is shown as communicating with the centralmonitoring station 130, the user device 140 may also communicatedirectly with the sensors 122 and other devices controlled by themonitor control unit 110 when the user device 140 is near or within theproperty 101. For example, the user device 140 may exchangecommunications with the devices of the system 100 over the network 105when the individual 104 is located within the property 101.

In some implementations, the user device 140 receives monitoring systemdata captured by the monitor control unit 110 through the network 105.The user device 140 may receive the data from the monitor control unit110 through the network 105 or the central monitoring station 130 mayrelay data received from the monitor control unit 110 to the user device140 through the network 105. In this regard, the central monitoringstation 130 may facilitate communication between the user device 140 andthe monitoring system.

In some implementations, the monitor control unit 110 performs themonitoring operations described above over the network 105 without beingphysically present within the property 101. For example, the monitorcontrol unit 110 can be a software module within the central monitoringstation 130, which exchanges data communications with the doorbelldevice 126. The doorbell device 126 may exchange communications with thecentral monitoring station 130 through the network 105, oralternatively, through a separate cellular network that connects thedoorbell device 126 and the central monitoring station 130. In theseexamples, the central monitoring station 130 includes one or moresoftware modules that are capable of performing the operations of boththe monitor control unit 110 and the central monitoring station 130 asdescribed above.

FIG. 2 illustrates an example of a process 200 for automaticallyinitiating a two-way communication session between a doorbell device anda central monitoring station. Briefly, the process 200 may include dataindicating a doorbell press at a doorbell device of a property (210),obtaining data from a plurality of sensors located within the property(220), determining that a user associated with the property is notpresently located within the property (230), and initiating a two-waycommunication session between the doorbell device and a centralmonitoring station (240).

In more detail, the process 200 may include obtaining data indicating adoorbell press at a doorbell device of a property (210). For instance,the monitor control unit 110 may obtain data from the doorbell device126 indicating that the individual 102 has pressed a doorbell of theproperty 101. In some instances, the obtained data can also includesecurity footage of motion detected within an exterior region of theproperty 101 that is within a field of view of the doorbell device 126.The obtained data may include other types of information that can beused to determine if the individual 104 is likely to represent apotential security risk to the property 101. For example, the obtaineddata may include a number of doorbell presses, the time of the detecteddoorbell press, or detected motion by the individual 104 in response todetermining that the property 101 is presently vacant.

The process 200 may include obtaining data from a plurality of sensorslocated within the property (220). For instance, after obtaining thedata from the doorbell device 126, the monitor control unit 110 may alsogather data collected by the sensors 122, the appliances 124, or otherdevices connected to the local network 105. The obtained data caninclude, for example, sensor data indicating occupancy informationinside the property 101 at the time of the detected doorbell press(e.g., the number and identity of the occupants within the property101), location information of the user device 140 indicating whether anauthorized user 102 is presently located within the property 101, apresent security status of the property 101 (e.g., “armed,” “disarmed),and/or usage data for the appliances 124 (e.g., number of devices thatare currently on, recent usage patterns prior to the detection of thedoorbell press).

In some implementations, the monitor control unit 110 may aggregate thereceived data from the sensors 122, the appliances 124, and otherdevices connected over the local network 105. The monitor control unit110 may aggregate the obtained data based on using pattern recognitiontechniques in order to determine subsets of the received information totransmit to the central monitoring station 130.

The process 200 may include determining that a user associated with theproperty is not presently located within the property (230). Forinstance, the monitor control unit 110 may determine that the authorizeduser 102 is not presently located within the property 101 based on theobtained data from the sensors 122, the appliances 124, and/or the userdevice 140. For example, if location data obtained from the user device140 indicates that the user device 140 is not presently located withinthe property 101, the monitor control unit may determine that theauthorized user 102 is not presently located within the property 101. Inother examples, this determination can be based on obtained occupancydata indicating that the property 101 is presently occupied, or motionsensor data indicating no detected motion within the property over acertain period of time.

In some implementations, the monitor control unit 110 may determine thatthe authorized user 102 is presently located within the property 101 butis unavailable to answer the doorbell press of the property becausehe/she may be preoccupied by another activity (e.g., sleeping, cooking,or located in an area where the doorbell sound is inaudible). In otherimplementations, the monitor control unit 110 may determine if usersthat are present within the property are capable of answering thedoorbell press. For example, if the users that occupy the property 101are children, then the monitor control unit 110 may determine that thereare no authorized users that are available to respond to the doorbellpress of the property 101.

The process 200 may include initiating a two-way communication sessionbetween the doorbell device and a central monitoring station (240). Forinstance, in response to determining that the authorized user 102 (orany other authorized user) is not presently located within the property101, the monitor control unit 110 may transmit a request to the centralmonitoring station 130 to initiate a two-way communication sessionbetween the doorbell device 126 and the central monitoring station 130.In response to receiving the request, a service administrator associatedwith a security provider of the property 101 may utilize the interface132 to initiate the two-way communication session with the individual104. As described above, the communication session may either be a videoor an audio conference. After the two-way conference has been initiated,audio or video may be provided for output to the individual 104 throughan output device associated with the doorbell device 126. For instance,if the two-way communication session is a video conference, the doorbelldevice 126 may include a display that provides a video feed of theservice administrator. Alternatively, if the two-way communication is anaudio conference, the doorbell device 126 may include one or more speaksthat provide an audio feed of the service administrator. The two-waycommunication may be conducted over the network 105 through thedirection and control of the monitor control unit 110.

FIG. 3A illustrates an example of a process 300A for automaticallyperforming designated action in response to a doorbell press based onsensor data associated with a property. Briefly, the process 300A mayinclude obtaining data indicating a doorbell press at a doorbell deviceof a property (310), obtaining data from a plurality of sensors locatedwithin the property (320), determining a present security status of theproperty based on the obtained data from the plurality of sensors (330),identifying an action to be performed in response to the doorbell press(340), and performing the action in response to the doorbell press(350).

In more detail, the process 300A may include obtaining data indicating adoorbell press at a doorbell device of a property (310). For instance,the monitor control unit 110 may obtain data from the doorbell device126 indicating that the individual 102 has pressed a doorbell of theproperty 101. In some instances, the obtained data can also includesecurity footage of motion detected within an exterior region of theproperty 101 that is within a field of view of the doorbell device 126.The obtained data may include other types of information that can beused to determine if the individual 104 is likely to represent apotential security risk to the property 101. For example, the obtaineddata may include a number of doorbell presses, the time of the detecteddoorbell press, or detected motion by the individual 104 in response todetermining that the property 101 is presently vacant.

The process 300A may include obtaining data from a plurality of sensorslocated within the property (320). For instance, after obtaining thedata from the doorbell device 126, the monitor control unit 110 may alsogather data collected by the sensors 122, the appliances 124, or otherdevices connected to the local network 105. The obtained data caninclude, for example, sensor data indicating occupancy informationinside the property 101 at the time of the detected doorbell press(e.g., the number and identity of the occupants within the property101), location information of the user device 140 indicating whether anauthorized user 102 is presently located within the property 101, apresent security status of the property 101 (e.g., “armed,” “disarmed),and/or usage data for the appliances 124 (e.g., number of devices thatare currently on, recent usage patterns prior to the detection of thedoorbell press).

The process 300A may include determining a present security status ofthe property based on the obtained data from the plurality of sensors(330). For instance, the monitor control unit 110 may identify asecurity status associated with a security system of the property 101based on the data obtained from the sensors 122, the appliances 124, orother devices connected over the local network 105. The security statusmay indicate whether the authorized user 102 or a security providerpreviously armed the security system of the property 101 prior to thedetected doorbell press. The security status can be used to identify apotential security risk that may be caused by the detected doorbellpress given the present conditions of the property 101.

In some implementations, instead of being a dedicated status associatedwith the security system, the security status may instead be determinedby the monitor control unit 110 based on the received data from thesensors 122 or the appliances 124. For example, the monitor control unit110 can use an aberrant engine to initially determine if the obtaineddata includes information indicating a potential security breach withinthe interior or exterior of the property 101, and in response, themonitor control unit 110 can designate a security status for theproperty 101 that indicates the potential security breach. As anexample, the monitor control unit 110 may determine a low risk securitystatus for the property 101 if the obtained data indicates significantactivity and/or level of occupancy within the property 101 at the timewhen a doorbell press is detected by the doorbell device 126. In anotherexample, the monitor control unit 110 may determine a high risk securitystatus if the doorbell press is detected during an odd time (e.g., 3A.M.) when the property 101 is determined to be vacant because theauthorized user 102 and other users are not presented located within theproperty 101.

The process 300A may include identifying an action to be performed inresponse to the doorbell press (340). For instance, the monitor controlunit 110 may initially transmit a data package to the central monitoringstation 130 that includes doorbell information associated with thedetected doorbell press. As described above, the doorbell informationcan be based on the data received from the sensors 122 or the appliances124. In response, the central monitoring station 130 may access adoorbell action repository in order to determine an appropriate actionto be performed in response to the detected doorbell press. As describedbelow with respect to FIG. 3B, the determination of the appropriateaction can be based on a set of indicators associated with the presentcondition of the property 101 at the time of the doorbell press (e.g.,occupancy information, doorbell information, security information).

The process 300A may include performing the action in response to thedoorbell press (350). For instance, after determining the appropriateaction to be performed based on selecting an action from the doorbellaction repository, the monitor control unit 110 may perform the selectedaction. For instance, the monitor control unit 110 may transmit adistributed signal to one or more devices within the property 101 toperform a particular action. As described above with respect to FIG. 2,one example of an action that is performed is initiating a two-waycommunication session between the central monitoring station 130 and thedoorbell device 126. In this example, the monitor control unit 110 maytransmit an instruction to the doorbell device 126 to initiate a two-waycommunication over the local network 105 such that a serviceadministrator may respond to the detected doorbell press. Other examplesactions that can be performed are described in more detail below withrespect to FIG. 3B.

FIG. 3B illustrates an example of a system 300B that is capable ofautomatically performing a designated action in response to a detecteddoorbell press based on sensor data associated with a property 101. Thesystem 300B may include the doorbell device 126, the sensors 122, themonitor control unit 110, the mobile device 140, the central monitoringstation 130, and a law enforcement system 322.

In general, the monitor control unit 110 may use data obtained from thesensors 122 and/or the appliances 124 to automatically determine andperform a specified action in response to a doorbell press detected bythe doorbell device 126. As described above, this can be accomplished byidentifying the present conditions for the property 101 (e.g.,occupancy, security status) and selecting a particular doorbell responseaction from among a set of actions specified within a doorbell actionrepository 312. In the examples depicted in the figure, the doorbellaction repository 312 includes three examples of doorbell responseactions that can be performed by the monitor control unit 110 based onthe data obtained from the doorbell device 126, the sensors 122, and/orthe appliances 124.

In the first example, represented by the letter “A,” the monitor controlunit 110 transmits a notification 350 to the user device 140, which isdetermined to be located within the property 101. The notification 350notifies the authorized user 102 that there is the individual 104 is atthe front door of the property 101. The notification 350 also includesan image or video of the individual 104 captured by the doorbell device126 in response to the detected doorbell press. In this example, themonitor control unit 110 performs this particular action because thepresent conditions of the property 101, based on the obtained data fromthe sensors 122 and the appliances 124, indicates that the authorizeduser 102 is currently at home, and the security status associated withthe doorbell press indicates a low risk of intrusion.

In the second example, represented by the letter “B,” the monitorcontrol unit 110 transmits a request to the central monitoring station130 to initiate a two-way communication session between the doorbelldevice 126 and the central monitoring station 130. In this example, aservice administrator associated with the security provider of theproperty 101 can use an interface 360 to initiate a two-way videocommunication conference with the individual 104 through doorbell device126. In this example, the monitor control unit 110 performs thisparticular action because the authorized user 102 is determined to be onvacation and has indicated that he/she would not like to receive updatesregarding doorbell presses at the property 101. In addition, the presentconditions of the property 101 indicates that the security statusassociated with the doorbell press indicates a low risk of intrusion.The service administrator can then either provide security-relatedinformation to the individual 104 to reduce a chance of intrusion,transmit an instruction to unlock the front door and provide access tothe individual 104 if the authorized user 102 has provided permission tothe individual 104 in advance. In some instances, the interface 360corresponds to the interface 132 described previously with respect toFIG. 1.

In the third example, represented by the letter “C,” the monitor controlunit 110 transmits an alert notification 370 to a system associated witha law enforcement agency 322 indicating that there may be a potentialattempted burglary presently taking place at the property 101. In thisexample, the monitor control unit 110 performs this particular actionbecause the authorized user 102 is determined to be remote from theproperty 101 at the time of the detected doorbell press and the presentconditions of the property 101 indicates that the security statusassociated with the doorbell press indicates a high risk of intrusion.The notification 370 includes information related to the detecteddoorbell press and an image of the individual 104 captured by thedoorbell device 126.

Although not illustrated in FIG. 3B, in some implementations, inresponse to detecting a doorbell press, the monitor control unit 110 mayadditionally or alternatively transmit instructions to the sensors 122and/or the appliances 124 to perform specified actions that emulateconditions indicating that the property 101 is presently occupied by auser. For example, the monitor control unit 110 may transmit signals toautomatically turn lights on and off to deter a possible intruder. Inanother example, the monitor control unit 110 may play a pre-recordedaudio sequence that provides an impression that the authorized user 102is presently located within the property 101.

Although FIG. 3B illustrates the monitor control unit 110 automaticallyperforming a designated action in response to a detected doorbell press,in some implementations, the operations described above can be performedby the central monitoring station 130. For example, as described abovewith respect to FIG. 1, the monitor control unit 110 can be a softwaremodule of the central monitoring station 130 that is configured toperform the operations described above over a network (e.g., the localnetwork 105, or a cellular network that connects the doorbell device 126and the central monitoring station 130). In such implementations, theoperations described above with respect to FIG. 3B can be carried outremotely over a cloud network without requiring a separate device forthe monitor control unit 110. In this regard, the operations describedabove may be performed for properties that have less sophisticatedmonitoring systems that lack a dedicated monitoring panel to controland/or adjust the monitoring operations of network-enabled devices(e.g., the sensors 122 and the appliances 124).

FIG. 4 illustrates an example of a system 400 that is capable ofaggregating doorbell data indicating prior intruder events acrossmultiple properties. The system 400 may include the central monitoringstation 130, which obtains doorbell data collected at the property 101depicted in FIG. 1 and multiple other properties 410, 420, and 430located within a specific region (e.g., region A). The doorbell dataobtained from the multiple properties can then be processed in order togenerate aggregated doorbell data 450. In some implementations, thesystem 100 includes the system 400 illustrated in the figure.

In general, central monitoring station 130 can obtain doorbell data 402,404, 406, and 408 from the properties 101, 410, 420, and 430,respectively. The doorbell data can include, for example, historicaldata related to doorbell detection events at each of the respectiveproperties. For example, the doorbell data include event logs related towhen two-communication sessions were initiated in response to a detectedevent, and the actions taken by service administrators in order to deterindividuals from intruding upon a property. In implementations whereactions are automatically performed by a monitor control unit 110 inresponse to detected doorbell press (e.g., as illustrated in FIG. 3B),the doorbell data can include a list of previously actions taken andindications as to whether each of the previously taken actions weresuccessful in deterring intrusions at the respective properties. Thedoorbell data can also include classifications for detected events(e.g., points of entry, time periods of intrusions, etc.) in order toclassify detected events across multiple properties within Region A.

After obtaining the doorbell data from multiple properties, the centralmonitoring station 130 may use various pattern recognition techniques toidentify common vulnerabilities across multiple properties locatedwithin a particular geographic region (e.g., the Region A) based on thehistorical doorbell data associated with each of the properties withinthe particular geographic region. For example, the central monitoringstation 130 may identify common periods in which intrusion events havepreviously taken place, reoccurring types of motion data associated theintrusion events, among other types of sensor information. The patternsidentified by the central monitoring station may be stored in theaggregated doorbell data 450.

In some implementations, the aggregated doorbell data 450 can be usedprovide security forecasts relating to predicted intrusion eventsrelated to a particular geographic region. For example, common patternsassociated with intrusion events detected in multiple properties withinthe particular geographic region can be used to predict likelihood thatthe patterns are likely to reoccur at subsequent time periods within theparticular geographic region. In such implementations, if the aggregateddoorbell data 450 indicates a high likelihood that an intrusion event islikely to occur within a particular geographic region (e.g., based oncurrent conditions matching prior conditions when a historical eventtook place), then central monitoring station 130 may transmit alertnotifications to user devices associated each of the properties withinthe geographic region to take precautionary measures to ensure thattheir property is safe and protected. Alternatively, the data can alsobe transmitted to local law enforcement agencies in order to improveinvestigation efforts if an intrusion event does actually take place ata subsequent time point.

As discussed above, the aggregated doorbell data 450 can identifydifferent types of deterrence techniques previously applied by, forexample, monitoring systems of the properties 410, 420, 430 in responseto previously detected doorbell presses where an individual is predictedto be an intruder. An example of a deterrence technique can be playing avoice projection from a speaker placed within a property to provide theimpression that a property is occupied even it is not occupied. Forinstance, in response to a detected doorbell press, a monitoring systemcan provide a signal of network-enabled device to play a pre-recordedaudio file that emulates a user's response to a detected doorbell press.

The aggregated doorbell data 450 can also include various types ofinformation associated with previously applied deterrence techniques todetermine whether a particular deterrence technique was successfullyapplied (i.e., whether a previously applied deterrence prevented apredicted intrusion at the property). The central monitoring station 130can then apply statistical testing techniques to identify deterrencetechniques that are more likely to prevent subsequent intrusions at aproperty within a specific geographic region. For example, the centralmonitoring station 130 can generate apply various regression-basedstatistics to the doorbell data 404, 406, and 408 to generate apredictive model that identifies a respective likelihood that aparticular deterrence technique will prevent a subsequent predictedintrusion at, for example, the property 101. Data used to generate thepredictive model can be based on data that is passively collected by themonitoring systems of different properties, e.g., log data indicatingdetected doorbell presses and sensor data collected after detecteddoorbell presses. In this instance, the properties can be connectedwithin a property network that is monitored by the central monitoringstation 130. Additionally, or alternatively, the data used to generatethe predictive model can also be based on user feedback activelyprovided by users of the multiple properties. For example, users canprovide reviews and/or opinions on different previously applieddeterrence techniques so that the central monitoring station 130 can usethe user feedback data to identify the deterrence techniques that arelikely to be successful in preventing future intrusions.

FIG. 5 illustrates an example of a process 500 for establishing acommunication session in response to a detected doorbell press at aproperty. Briefly, the process 500 can include the operations ofdetermining that a doorbell press has been detected at a property (510),obtaining video data collected by a doorbell device of the property(520), obtaining sensor data collected by one or more sensors of amonitoring system located within the property (530), determining apresent security risk for the property (540), and establishing acommunication session between the doorbell device and a server systemassociated with the monitoring system (550).

In general, the process 500 is described in reference to system 100,although any system can additionally or alternatively perform theoperations of the process 500. Additionally, one or more of theoperations of the process 500 can be performed by the doorbell device126, the central monitoring station 130, the doorbell device 126, or acombination thereof. For example, the doorbell device 126 can determinethat a doorbell press has been detected at the property 101, and themonitor control unit 110 can determine a present security risk for theproperty 101 and in response, establish a communication session betweenthe doorbell device 126 and the central monitoring station 130. Inanother example, the central monitoring station 130 alternativelydetermines the present security risk for the property 101 and inresponse, establishes the communication.

In more detail, the process 500 can include the operation of determiningthat a doorbell press has been detected at a property (510). Forexample, the monitor control unit 110 and/or the central monitoringstation 130 can determine a doorbell press has been detected at theproperty 101. The doorbell press can be detected based on video datacollected by the doorbell device 126, e.g., video data of the exteriorof the property 101. Additionally, or alternatively, the doorbell presscan be detected by a doorbell sensor placed on the doorbell of theproperty 101 that generates a signal based on a detected actuation ofthe doorbell.

The process 500 can include the operation of obtaining video datacollected by a doorbell device of the property (520). For example, themonitor control unit 110 and/or the central monitoring station 130 canobtain video data collected by the doorbell device 126 of the property101. As discussed above, the video data can include video footage of anexterior region of the property 101 surrounding the front entrance. Thevideo data can also identify an individual that provides a doorbellpress or approaches the front entrance of the property. In someinstances, the video data can include video footage of entrances of theproperty besides the front entrance, such as a back entrance, sideentrance, basement entrance, etc.

In some implementations, the monitor control unit 110 and/or the centralmonitoring station 130 processes the video data using facial recognitiontechniques to identify the identity of a user that is detected withinthe video data. For example, if the detected user is identified as aknown user that is authorized to enter the property 101, e.g., anoccupant of the property 101, then the monitor control unit 110 and/orthe central monitoring station 130 can automatically provide access tothe property 101. In another example, if the detected user is identifiedas an unknown user, then the monitor control unit 110 and/or the centralmonitoring station 130 can output playback of a pre-recorded videoand/or a message on a display of the doorbell device 126. In yet anotherexample, if the detected user is identified as likely representing anintruder, then the monitor control unit 110 and/or the centralmonitoring station 130 can automatically initiate a two-waycommunication session as depicted in the example of FIG. 1.

The process 500 can include the operation of obtaining sensor datacollected by one or more sensors of a monitoring system located withinthe property (530). For example, the monitor control unit 110 and/or thecentral monitoring station 130 can obtain sensor data collected by thesensors 122 located within the property 101. As discussed above, theobtained sensor data can be used to identify present conditions withinthe property 101 when the doorbell press is detected. For example, theobtained sensor data can be used to determine a present occupancy withinthe property 101 when the doorbell press is detected. As anotherexample, the obtained sensor data can be used to determine whether auser occupying the property 101 is likely to respond to the detecteddoorbell press. For instance, if the user is detected in a locationwhere the doorbell press is not likely to be heard, e.g., the basement,the monitor control unit 110 and/or the central monitoring station 130may nonetheless determine the likelihood of a security risk at theproperty 101.

The process 500 can include the operation of determining a presentsecurity risk for the property (540). For example, the monitor controlunit 110 and/or the central monitoring station 130 can determine apresent security risk for the property 101 based on obtaining sensordata collected by the sensors 122. The security risk can represent alikelihood that an intrusion will occur after a doorbell press has beendetected at the property 101. As discussed above, the security risk canbe determined based on the present occupancy of the property 101, thecurrent location of the user 102, the likelihood that the user 104detected by the doorbell device 126 represents an intruder, the presentstatus of windows or doors, e.g., open/closed, or a combination ofmultiple indicators. In one example, determining the present securityrisk at the property includes determining that the property 101 ispresently unoccupied when the doorbell press is detected at the property101.

In this example, the monitor control unit 110 and/or the centralmonitoring station 130 determines a security risk because the property101 is susceptible to intrusion because the detected doorbell press maybe an intruder that is attempting to determine whether the property 101is presently unoccupied. In another example, determining the presentsecurity risk at the property 101 includes determining that the mobiledevice 140 of the user 102 is not presently located within the propertywhen the doorbell press is detected at the property. In this example,the monitor control unit 110 and/or the central monitoring station 130determines a security risk because the user 102 is unable to respond tothe doorbell press. In yet another example, determining the presentsecurity risk for the property 101 includes processing video datacollected by the doorbell device 126. The processing video can includeidentifying an individual within the video data collected by thedoorbell device 126, and determining a likelihood that the identifiedindividual is an intruder based on the sensor data collected by thesensors 122. In this example, the monitor control unit 110 and/or thecentral monitoring station 130 determines a security risk if thelikelihood satisfies a predetermined threshold associated with asecurity risk at the property 101. For instance, the threshold can bedefined based on the clothing worn by the user, time when the doorbellpress is detected, the number of times the doorbell is pressed, thenumber of detected doorbell presses within a specified period of time,among others.

In some implementations, the monitor control unit 110 and/or the centralmonitoring station 130 provides a communication indicating thedetermined security risk to the mobile device 140 of the user 102. Thecommunication can represent a text message, an email, or an applicationnotification. The communication can include a summary of the presentconditions within the property determined based on the sensor data,e.g., the number of users occupying the property 101, status of windowsor doors, among others. The communication can also include video datacollected by the doorbell device 126 in response to the detecteddoorbell press. For example, the communication can include a photo imagefrom video footage of an individual detected near the exterior of theproperty 101.

The process 500 can include the operation of establishing acommunication session between the doorbell device and a server systemassociated with the monitoring system (550). For example, the monitorcontrol unit 110 and/or the central monitoring station 130 can establisha communication session between the doorbell device 126 and the centralmonitoring station 130. As discussed above with respect to FIG. 1, thecommunication session can enable a system administrator associated witha service provider that manages the monitoring system 100 to answer thedetected doorbell press. In some instances, such as the example depictedin FIG. 1, the established communication can be a two-way videoconference between the doorbell device 126 and the central monitoringstation 130. In such instances, a video feed of the system administratorcan be presented on the display of the doorbell device 126. In otherinstances, the communication can be an audio conference. Additionally,or alternatively, in some implementations, the established communicationsession can include providing a recorded video for output on a displayof the doorbell device 126. For example, the recorded video can be ofthe user 102 providing a message to an individual that presses adoorbell of the property 101. In another example, the recorded video canbe one that gives an individual that provides the doorbell press theimpression that the property 101 is presently occupied even though it isactually unoccupied.

In some implementations, the monitor control unit 110 and/or the centralmonitoring station 130 can perform different types of system actionsbased on a present condition of the property 101 when the doorbell pressis detected by the doorbell device 126. In such implementations, themonitor control unit 110 and/or the central monitoring station 130 canaccess a doorbell action repository that specifies a different systemaction for each present condition of the property 101. For instance, asshown in the example depicted in FIG. 3B, the doorbell action repositorycan include a system action for transmitting a notification of adetected doorbell press to the mobile device 140 if the presentcondition indicates low security state. The doorbell action repositorycan also include another system action for transmitting a notificationof an attempted burglary at the property 101 to a law enforcement agencyif the present condition indicates a high security state. The monitorcontrol unit 110 and/or the central monitoring station 130 selects aparticular system from the doorbell action repository based on matchinga determined present condition to a corresponding system actionspecified by the doorbell action repository.

In some implementations, determining the present security risk for theproperty 101 includes determining that the user 102 presently occupiesthe property 101 when the doorbell press is detected at the property,and is presently unable to answer the detected doorbell press. Forexample, the user 102 can be determined to be located in a region of theproperty 101 where the doorbell press is unable to be heard by the user102, e.g., the basement, the backyard, etc. As another example, activitysensors within the property 101 can be used to determine that the user102 is performing an action that may distract him/her from hearing thedetected doorbell press, e.g., activity indicating that the user 102 issleeping when the doorbell press is detected. In such implementations,the monitor control unit 110 and/or the central monitoring station 130establishes the communication discussed above based on determining thatthe user 102 presently occupies the property 101 but is presently unableto answer the detected doorbell press.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus implementing thesetechniques may include appropriate input and output devices, a computerprocessor, and a computer program product tangibly embodied in amachine-readable storage device for execution by a programmableprocessor. A process implementing these techniques may be performed by aprogrammable processor executing a program of instructions to performdesired functions by operating on input data and generating appropriateoutput. The techniques may be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device. Each computerprogram may be implemented in a high-level procedural or object-orientedprogramming language, or in assembly or machine language if desired; andin any case, the language may be a compiled or interpreted language.Suitable processors include, by way of example, both general and specialpurpose microprocessors. Generally, a processor will receiveinstructions and data from a read-only memory and/or a random accessmemory. Storage devices suitable for tangibly embodying computer programinstructions and data include all forms of non-volatile memory,including by way of example semiconductor memory devices, such asErasable Programmable Read-Only Memory (EPROM), Electrically ErasableProgrammable Read-Only Memory (EEPROM), and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Anyof the foregoing may be supplemented by, or incorporated in, speciallydesigned application-specific integrated circuits (ASICs).

It will be understood that various modifications may be made. Forexample, other useful implementations could be achieved if steps of thedisclosed techniques were performed in a different order and/or ifcomponents in the disclosed systems were combined in a different mannerand/or replaced or supplemented by other components. Accordingly, otherimplementations are within the scope of the disclosure.

What is claimed is:
 1. A method comprising: determining a security riskat a property in relation to a doorbell press detected by a doorbelldevice at the property; selecting an action associated with acommunication session between the doorbell device and a server, whereinthe action is selected (i) to be performed in response to the doorbellpress and (ii) based on the security risk at the property; andproviding, for output, an instruction to perform the action.
 2. Themethod of claim 1, wherein: determining the security risk at theproperty comprises determining that an individual that provided thedoorbell press is an intruder; and providing the instruction to performthe action comprises providing an alert notification to a lawenforcement agency.
 3. The method of claim 1, wherein: determining thesecurity risk at the property comprises determining that an individualthat provided the doorbell press is an intruder; and providing theinstruction to perform the action comprises providing an alertnotification to a user device associated with the property.
 4. Themethod of claim 1, wherein: the method further comprises obtainingsecond sensor data collected at the property before the doorbell pressis detected at the property; and determining the security risk at theproperty comprises determining that sensor data collected at theproperty indicates that an individual that provided the doorbell pressattempted to enter the property before the doorbell press is detected bythe doorbell device.
 5. The method of claim 1, wherein determining thesecurity risk at the property comprises determining that a propertyadministrator of the property is not located within the property whenthe doorbell press is detected by the doorbell device.
 6. The method ofclaim 1, the communication session comprises a two-way video conferencebetween the doorbell device and the server.
 7. The method of claim 1,wherein providing the instruction to perform the action comprisesproviding a recorded video for output on a display of the doorbelldevice.
 8. A system comprising: one or more computing devices; and oneor more storage devices storing instructions that are executable by theone or more computing devices to cause the one or more computing devicesto perform operations comprising: determining a security risk at aproperty in relation to a doorbell press detected by a doorbell deviceat the property; selecting an action associated with a communicationsession between the doorbell device and a server, wherein the action isselected (i) to be performed in response to the doorbell press and (ii)based on the security risk at the property; and providing, for output,an instruction to perform the action.
 9. The system of claim 8, wherein:determining the security risk at the property comprises determining thatan individual that provided the doorbell press is an intruder; andproviding the instruction to perform the action comprises providing analert notification to a law enforcement agency.
 10. The system of claim8, wherein: determining the security risk at the property comprisesdetermining that an individual that provided the doorbell press is anintruder; and providing the instruction to perform the action comprisesproviding an alert notification to a user device associated with theproperty.
 11. The system of claim 8, wherein: the operations furthercomprise obtaining second sensor data collected at the property beforethe doorbell press is detected at the property; and determining thesecurity risk at the property comprises determining that sensor datacollected at the property indicates that an individual that provided thedoorbell press attempted to enter the property before the doorbell pressis detected by the doorbell device.
 12. The system of claim 8, whereindetermining the security risk at the property comprises determining thata property administrator of the property is not located within theproperty when the doorbell press is detected by the doorbell device. 13.The system of claim 8, the communication session comprises a two-wayvideo conference between the doorbell device and the server.
 14. Thesystem of claim 8, wherein providing the instruction to perform theaction comprises providing a recorded video for output on a display ofthe doorbell device.
 15. At least one non-transitory computer-readablestorage device storing instructions that cause one or more processors toperform operations comprising: determining a security risk at a propertyin relation to a doorbell press detected by a doorbell device at theproperty; selecting an action associated with a communication sessionbetween the doorbell device and a server, wherein the action is selected(i) to be performed in response to the doorbell press and (ii) based onthe security risk at the property; and providing, for output, aninstruction to perform the action.
 16. The storage device of claim 15,wherein: determining the security risk at the property comprisesdetermining that an individual that provided the doorbell press is anintruder; and providing the instruction to perform the action comprisesproviding an alert notification to a law enforcement agency.
 17. Thestorage device of claim 15, wherein: determining the security risk atthe property comprises determining that an individual that provided thedoorbell press is an intruder; and providing the instruction to performthe action comprises providing an alert notification to a user deviceassociated with the property.
 18. The storage device of claim 15,wherein: the operations further comprise obtaining second sensor datacollected at the property before the doorbell press is detected at theproperty; and determining the security risk at the property comprisesdetermining that sensor data collected at the property indicates that anindividual that provided the doorbell press attempted to enter theproperty before the doorbell press is detected by the doorbell device.19. The storage device of claim 15, wherein determining the securityrisk at the property comprises determining that a property administratorof the property is not located within the property when the doorbellpress is detected by the doorbell device.
 20. The storage device ofclaim 15, the communication session comprises a two-way video conferencebetween the doorbell device and the server.