Managing barrier and occupancy based home automation system

ABSTRACT

Methods and systems are described for controlling access to a home based on user occupancy. According to at least one embodiment, an apparatus for controlling access to a home based on user occupancy includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to determine a location of a user of a home automation system relative to a barrier of a home being monitored by the home automation system. The instructions are executable to determine whether to permit a change in a locking mechanism of the barrier based in part on the determined location of the user, and maintain a current state of the home automation system.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation of U.S. patent applicationSer. No. 14/262,506, filed Apr. 25, 2014, titled “MANAGING BARRIER ANDOCCUPANCY BASED HOME AUTOMATION SYSTEM” and assigned to the assigneehereof, the disclosure of which is incorporated herein in its entiretyby this reference.

BACKGROUND

Advancements in media delivery systems and media-related technologiescontinue to increase at a rapid pace. Increasing demand for media hasinfluenced the advances made to media-related technologies. Computersystems have increasingly become an integral part of the media-relatedtechnologies. Computer systems may be used to carry out severalmedia-related functions. The wide-spread access to media has beenaccelerated by the increased use of computer networks, including theInternet and cloud networking.

Many homes and businesses use one or more computer networks to generate,deliver, and receive data and information between the various computersconnected to computer networks. Users of computer technologies continueto demand increased access to information and an increase in theefficiency of these technologies. Improving the efficiency of computertechnologies is desirable to those who use and rely on computers.

With the wide-spread use of computers and mobile devices has come anincreased presence of home automation and security products.Advancements in mobile devices allow users to monitor and/or control anaspect of a home or business. As home automation and security productsexpand to encompass other systems and functionality in the home,opportunities exist for simplifying the user's interface with the homeautomation and security system and providing improved automated control.

SUMMARY

Methods and systems are described for controlling access to a home basedon user occupancy. According to at least one embodiment, an apparatusfor controlling access to a home based on user occupancy includes aprocessor, a memory in electronic communication with the processor, andinstructions stored in the memory which are executable by a processor todetermine a location of a user of a home automation system relative to abarrier of a home being monitored by the home automation system. Theinstructions are executable to determine whether to permit a change in alocking mechanism of the barrier based in part on the determinedlocation of the user, and maintain a current state of the homeautomation system.

In one example, the instructions may be executable by the processor todetermine an identity of the user, wherein determining whether to permitthe change in the locking mechanism of the barrier is based in part onthe identity of the user. The state of the home automation system may bean active or armed state. Determining a location of the user may includedetermining whether the user is inside or outside of the home.Determining a location of the user may include determining on which sideof the barrier the user is positioned. The barrier may be one of a dooror a window of the home, and the change in the locking mechanism mayinclude locking or unlocking the locking mechanism to control opening ofthe door or window. Determining the location of the user may includedetermining whether the user is touching an inside handle used tocontrol opening the barrier or an outside handle used to control openingof the barrier. Determining whether to permit a change in the lockingmechanism of the barrier may include unlocking the locking mechanism ifthe user is inside the house. Determining whether to permit a change inthe locking mechanism of the barrier may include unlocking the lockingmechanism if the user is located inside or outside the home and isidentified as an authorized person, and maintaining the barrier lockedif the user is located inside or outside the home and is identified asan unauthorized person. The instructions may be executable by theprocessor to generate an alarm when the user is identified as anunauthorized person and attempts to open the barrier from outside of thehome. Determining a location of a user may include receiving signalsfrom at least one of a touch sensor, a voice recognition sensor, amotion sensor, and an optical sensor.

Another embodiment relates to a computer-program product for controllingaccess to a home based on user occupancy. The computer-program productmay include a non-transitory computer-readable medium storinginstructions executable by a processor to determine a location of a userof a home automation system relative to a barrier of a home beingmonitored by the home automation system. The instructions are executableto determine an identity of the user, determine whether to permit achange in a locking mechanism of the barrier based in part on thedetermined location of the user and the identity of the user, andmaintain a current state of the home automation system.

In one example, maintaining a current state may include maintaining thehome automation system in a constant active state. Determining whetherto permit a change in the locking mechanism of the barrier may includeunlocking the locking mechanism if the user is located inside or outsidethe home and is identified as an authorized person, and maintaining thebarrier locked if the user is located outside the home and is identifiedas an unauthorized person. Determining a location of the user mayinclude determining if the user is touching an inside handle or anoutside handle used to open the barrier. Determining an identity of theuser may include receiving a signal from an electronic device carried bythe user.

A further embodiment is directed to a computer-implemented method forcontrolling access to a home based on user occupancy. The methodincludes determining a location of a user of a home automation systemrelative to a barrier of a home being monitored by the home automationsystem, determining an identity of the user, determining whether topermit opening the barrier based in part on the determined location andidentity of the user, and maintaining an active state of the homeautomation system.

In one example, the method further includes unlocking a lockingmechanism of the barrier when the user is identified as an authorizeduser, and locking the locking mechanism when the user is identified asan unauthorized user. The method may include unlocking a lockingmechanism of the barrier when the user is determined to be located onone side of the barrier, and locking the locking mechanism when the useris determined to be located on an opposite side of the barrier.Determining a location of the user may include determining use of ahandle assembly used to open the barrier.

The foregoing has outlined rather broadly the features and technicaladvantages of examples according to the disclosure in order that thedetailed description that follows may be better understood. Additionalfeatures and advantages will be described hereinafter. The conceptionand specific examples disclosed may be readily utilized as a basis formodifying or designing other structures for carrying out the samepurposes of the present disclosure. Such equivalent constructions do notdepart from the spirit and scope of the appended claims. Features whichare believed to be characteristic of the concepts disclosed herein, bothas to their organization and method of operation, together withassociated advantages will be better understood from the followingdescription when considered in connection with the accompanying figures.Each of the figures is provided for the purpose of illustration anddescription only, and not as a definition of the limits of the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of the embodimentsmay be realized by reference to the following drawings. In the appendedfigures, similar components or features may have the same referencelabel. Further, various components of the same type may be distinguishedby following the reference label by a dash and a second label thatdistinguishes among the similar components. If only the first referencelabel is used in the specification, the description is applicable to anyone of the similar components having the same first reference labelirrespective of the second reference label.

FIG. 1 is a block diagram of an environment in which the present systemsand methods may be implemented;

FIG. 2 is a block diagram of another environment in which the presentsystems and methods may be implemented;

FIG. 3 is a block diagram of another environment in which the presentsystems and methods may be implemented;

FIG. 4 is a block diagram of an example barrier control module of theenvironments shown in FIGS. 1 and 2;

FIG. 5 is a block diagram of an example tracking device of theenvironment shown in FIG. 3;

FIG. 6 is a flow diagram illustrating a method for controlling access toa home based on user occupancy;

FIG. 7 is a flow diagram illustrating another method for controllingaccess to a home based on user occupancy;

FIG. 8 is a flow diagram illustrating another method for controllingaccess to a home based on user occupancy; and

FIG. 9 is a block diagram of a computer system suitable for implementingthe present systems and methods of FIGS. 1-8.

While the embodiments described herein are susceptible to variousmodifications and alternative forms, specific embodiments have beenshown by way of example in the drawings and will be described in detailherein. However, the exemplary embodiments described herein are notintended to be limited to the particular forms disclosed. Rather, theinstant disclosure covers all modifications, equivalents, andalternatives falling within the scope of the appended claims.

DETAILED DESCRIPTION

The systems and methods described herein relate to home automation andhome security, and related security systems and automation for use incommercial and business settings. More specifically, the systems andmethods described herein relate to controlling access to a home orbusiness based at least in part on user occupancy (e.g., whether theuser is inside or outside of the home), user identity, and useractivities. The term “home” used throughout this document genericallyrefers to any dwelling or property that is monitored by a monitoringsystem such as an automation system and/or a security system. Anautomation system may include automation and security features.

One aspect of the present disclosure relates to a home automation and/orhome security system that is always in a “on,” “active” or “armed”state. The system determines via a combination of identifiers whom is inthe home and activities of those in the home, as well as distinguishbetween who is trying to gain access to the home, and whether or not totrigger an alarm when barriers to the home (e.g., doors or windows) areactuated. The system includes sufficient sensor feedback andintelligence to determine who is authorized to gain access to one of thehome barriers and who is not, and then trigger an alarm only whenunauthorized persons gain access to the home. Those who are authorizedto enter the home typically possess or are identified using, forexample, a key code, a near field communication like Bluetooth, a voicerecognition or image recognition, or the like that the system is able toutilize as part of determining identity of a person. In contrast, thosewho do not have authorization would trigger firing of the alarm ifattempting to gain access to the home. The authorized operators of thehome automation and/or home security system (generally referred to as ahome automation system or a monitoring system) are no longer required toarm or disarm the system (e.g., turn on or turn off).

One way to determine whether accessing a barrier of the home isauthorized is to distinguish between accessing the barrier from insidethe house or from outside the house. Various sensors, door and windowlock features, GPS readings, near field communication signals, and thelike may be used to determine the user's position relative to thebarrier as well as the user's intent to open the barrier. Another aspectof the present disclosure relates to using a multi-step verificationprocess to confirm not only the user's location relative to a barrier ofthe home, but also the user's intent and the user's identity.

A further aspect of the present disclosure is directed to devices andrelated systems to track individuals relative to a home or otherpredetermined location. In one example, a device may include at least aGPS feature and a near field communication feature (e.g., Bluetooth)which provide location for the carrier of the device as well as provideidentification information that may provide authorization for the personcarrying the device to access the home. The device may also include anaccelerometer which may provide feedback related to activity level ofthe user. This type of device and related system may be particularlyuseful for tracking children, elderly and handicapped persons, and pets.The device may be integrated into clothing, accessories (e.g., watches,necklaces, bracelets), or a dedicated electronic device such as a fobthat may be held in a pocket or carried on a key chain. Aspects of thedevice may also be integrated into an existing, multi-functionalelectronic device such as a cell phone, a tablet computer, or the like.The electronic device may also include a speaker that provides audiblesignals for communication with the user. The device may be referred toas a tracking device.

FIG. 1 is a block diagram illustrating one embodiment of an environment100 in which the present systems and methods may be implemented. In someembodiments, the systems and methods described herein may be performedon a home automation system 105. The home automation system 105 mayinclude automation and/or security features and functionality. The homeautomation system 105 may be generally referred to as the monitoringsystem, or certain aspects of home automation system 105 may be referredto as a monitoring system, automation system, and/or security system.The home automation system 105 may be useful for applications in a home.Alternatively, or additionally, home automation system 105 may beapplicable to a place of business and/or commercial setting. The sameprinciples disclosed herein related to home automation system 105 andenvironment 100 generally, may be applied in many settings includinghomes and commercial buildings (e.g., warehouses, office buildings,etc.).

The environment 100 may include the home automation system 105, abarrier 115, and first and second sensors 125-a-1 and 125-a-2, whichcommunicate over at least one network 130. Home automation system 105may include a barrier control module 110. Barrier 115 may include alocking device 120. Sensors 125-a-1 and 125-a-2 may be any of a varietyof sensors or other data collection devices used to determine occupancy,activity, identification, and/or specific location of one or morepersons for purposes of, for example, controlling access to a homeand/or determining location of one or more persons relative to a home.The network 130 provides communication via, for example, wired orwireless connections. Further, network 130 may include a plurality ofcommunication mediums.

The sensors 125-a-1 and 125-a-2 may be associated with, for example, anautomation system and/or a security system. The sensors 125-a-1 and125-a-2 may include, for example, a camera sensor, an audio sensors, aforced-entry sensor, a shock sensor, a proximity sensor, a boundarysensor, an appliance sensor, a light fixture sensor, a temperaturesensor, a light beam sensor, a three dimensional (3D) sensor, a motionsensor, a smoke sensor, a glass break sensor, a door sensor, a windowsensor, a carbon monoxide sensor, an accelerometer, a global positioningsystem (GPS) sensor, a Wi-Fi positioning system sensor, a capacitysensor, a radio frequency sensor, a near-field communication sensor(Bluetooth), a heart beat sensor, a breathing sensor, an oxygen sensor,a carbon dioxide sensor, a brainwave sensor, a movement sensor, a voicesensor, and the like.

In some configurations, home automation system 105 may includeadditional components such as, for example, those components describedbelow with reference to FIG. 2. Barrier control module 110, which isdescribed in further detail below related to FIG. 4, is operable toprovide communications and controls related to accessing barriers suchas doors and windows of a building (e.g., home or a commercialbuilding). Barrier control module 110 may include different types offunctionality including, for example, receiving data from locking device120, sensors 125-a-1 and 125-a-2 and other features of environment 100,determining a location of one or more persons relative to the home,determining an intended action of the person (e.g., opening or closing adoor or window), and determining whether to permit the intended actionand/or trigger an alarm if the action is not authorized or is performedby an unauthorized person. Trigger an alarm may include sending a noticeto, for example, police, security personnel, an owner or personresponsible for the home, or a person attempting to perform the action(e.g., operate barrier 115).

A locking device 120 may operate to control opening of barrier 115.Locking device 120 may include capability to determine whether barrier115 is being accessed from inside or outside the home. For example, alocking device 120 may have integrated therein at least one of sensors125-a-1 and 125-a-2, which utilize a technology such as, for example,touch sensors, electromagnetic sensors, motion sensors, optical sensors,or the like. Data received from locking device 120 and/or sensors125-a-1 and 125-a-2 may be used to help determine on which side of thebarrier the operator is positioned and/or which components of lockingdevice 120 are being actuated (e.g., a handle or switch positioned onand outside or inside of the barrier 115).

As discussed above, home automation system 105 and/or environment 100generally may be operable in an always “on” (e.g., active or armed)operational state. Home automation system 105 may be a “smart” systemthat is able to determine, based on information gathered from a varietyof sources such as sensors 125-a-1 and 125-a-2 and other features ofenvironment 100, which individuals located in and around a home areauthorized to access the home and/or perform certainfunctions/activities. By maintaining the home automation system 105 inan always “on” state, authorized users are able to avoid the arduoustask of having to arm and disarm the system (whether onsite or remotely)to provide the desired automation and/or security functionality for thehome.

In one scenario, home automation system 105 operates to permit anyonewho is within the home to exit the home while the home automation system105 remains in an “on” state without triggering an alarm. The systempresumes that any person who is located within the house has beenauthorized in some way to enter the house, and is therefore authorizedto exit the house at any time. Thus, the user's location (e.g.,occupancy) within the home may alone be enough to provide authorizationfor the user to exit the home without triggering an alarm event.Similarly, users positioned within the house may operate windows orother barriers without triggering an alarm as long as the users arewithin the house. The home automation system 105 may be programmed toautomatically operate locking device 120 to unlock barrier 115 as a userapproaches barrier 115 and/or attempts to open barrier 115 (e.g., toexit). Additionally, or alternatively, home automation system 105 may beprogrammed to permit only certain authorized users to operate barrier115 when the user is within the home. In some situations, elderlypersons, handicapped persons, or small children may be prohibited fromexiting the home or operating barrier 115 without express permission ofauthorized users. In such scenarios, those persons residing within thehome may have an identifier that provides home automation system 105with an identification factor used to determine whether that user isauthorized to access barrier 115. In one example, authorized users maybe identified using, for example, a cell phone app, near fieldcommunication such as Bluetooth, voice recognition, facial recognition,fingerprint recognition, or the like. Once home automation system 105confirms whether the user is authorized via one of these identificationmethods, home automation system 105 permits the user to access barrier115 from within the home (e.g., without triggering an alarm).

A similar principle may apply to provide authentication of users who arepositioned outside of the house. Once a user is identified as anauthorized user, home automation system 105 may permit the user toaccess barrier 115 regardless of the location of the user inside oroutside the house. As such, home automation system 105 may remain in anarmed state while an authorized user operates barrier 115 from inside oroutside the house without triggering an alarm.

In at least some scenarios, an additional authentication factor may berequired before permitting access to a barrier. For example, homeautomation system 105 may receive confirmation that the user is anauthorized user and require further information that shows the user'sintent to access barrier 115. Home automation system 105 mayautomatically unlock locking device 120 or otherwise permit operation ofbarrier 115 after both the authentication and intent factors aresatisfied. In one example, a user carries a cell phone that has an appthat communicates with home automation system 105 to confirm that theuser carrying the cell phone is authorized. The user must also touch thedoor handle or other feature of barrier 115 in order to show the user'sintent to access barrier 115 before home automation system 105 performsa function such as, for example, unlocking the locking device 120 orotherwise permitting operation of barrier 115 without triggering analarm. Similarly, home automation system 105 may generate an alarm orprohibit operation of barrier 115 if the user shows his intent tooperate barrier 115 and home automation system 105 determines that theuser is not authorized to operate barrier 115 (e.g., in the case of asmall child, handicapped person, etc.).

Locking device 120 may be controlled automatically by home automationsystem 105 based on criteria such as, for example, whether the user isan authorized user, the location of the user relative to barrier 115(e.g., on inside or outside of barrier 115), the intent of the user(e.g., operating a lock or handle of barrier 115), time of day, apreprogrammed event or rule, etc. The automated control of lockingdevice 120 may permit users to enter and exit the home without the needof a key or other means of manually operating locking device 120. Assuch, the system may be referred to as a keyless system and/or a keylesshome wherein access is automatically granted based on predeterminedcriteria.

Authorized users may obtain entry of unauthorized users in a number ofways. For example, unauthorized users may be given a fab or otherelectronic device that communicates with home automation system 105 topermit access through a barrier of the house. In another example,operation of a barrier by an authorized user, whether from inside oroutside the house, to permit entry or exit by an unauthorized personavoids the unauthorized person triggering an alarm.

Referring now to FIG. 2, in some embodiments, an environment 200 mayinclude the components of environment 100 described above, and mayfurther include an identification device 205 and a number of additionalfeatures associated with home automation system 105-a. Home automationsystem 105-a may be an example of home automation system 105 illustratedin FIG. 1. Home automation system 105-a may include, for example, thebarrier control module 110, a display 210, a user interface 215, anautomation controller 220, an alarm 225, a mobile computing device 230,and an application 235.

Environment 200 addresses at least one of the scenarios discussed abovewith reference to environment 100 in which the user carriesidentification device 205 which communicates with home automation system105-a determine whether the user is a authorized user. If the user isfully authorized (e.g., a highest level of authorization), the user mayaccess barrier 115 from either inside or outside the home withouttriggering an alarm. If the user is identified by identification device205 to have a lower level of authorization, the user may have onlycertain rights such as, for example, operating barrier 115 from theoutside to gain access into the home, while not being authorized toaccess barrier 115 from inside the house to prevent exiting the home. Ifa user does not carry identification device 205 is determined to be anunauthorized user, the user may be permitted to exit the home throughbarrier 115 from the inside (i.e., the system assumes that anyone insidethe home was granted access by an authorized user) but to not operatebarrier 115 from outside of the home without triggering an alarm.

Identification device 205 may include, for example, a cell phone, fob,or other electronic device that signals sufficient information todetermine whether the person carrying identification device 205 isauthorized or has a certain level of authorization. In one example,identification device 205 includes near-field communication capabilitythat generates a beacon or other signal that either identifies theperson carrying identification device 205 as an authorized person, orprovides sufficient information that is unique to that person todetermine whether they are authorized or possess some level ofauthorization for certain actions. Identification device 205 mayinclude, for example, an app carried by a cell phone, tablet or othercomputing device that provides communication with sensors 125-a-1 and125-a-2 or other sensors or features of environment 200. Barrier controlmodule 110 may collect information and/or signals from sensors 125-a-1and 125-a-2 and identification device 205 and determine whether tooperate locking device 120 or otherwise permit operation of barrier 115and/or generate an alarm.

Display 210 may be provided via devices such as, for example, a desk topcomputer, a mobile computing device, or identification device 205. Userinterface 215 may be integrated into display 210. User interface 215 mayinclude a plurality of menus, screens, microphones, speakers, cameras,and other capabilities that provide an interface with the user of homeautomation system 105-a. User interface 215 may be integrated intomobile computing device 230 or other devices (e.g., one of lockingdevice 120 and/or sensors 125-a-1 and 125-a-2).

Automation controller 220 may provide features or functionality relatedto automation and/or security features of home automation system 105-a.Automation controller 220 may provide at least some of the logic,processing and/or functionality for various components of homeautomation system 105-a.

Alarm 225 may provide, for example, audible sounds, lights, or the likethat communicate with one or more users on the premises being monitoredby home automation system 105-a, or communicate with a remote device orsystem related to a condition of the property being monitored by homeautomation system 105-a. Alarm 225 may be integrated into display 210 inthe form of, for example, text, coded displays, or the like.

In some embodiments, mobile computing device 230 may include one or moreprocessors, one or more memory devices, and/or a storage device.Examples of mobile computing device 230 may include DVRs, personal videorecorders (PVRs), and/or mobile computing devices, smart phones,personal computing devices, computers, servers, etc. Mobile computingdevice 230 may include, for example, features or functionality ofidentification device 205, and may, in at least some examples, beinterchangeable with identification device 205.

Application 235 may allow a user to control (either directly or viaautomation controller 220) an aspect of the monitored property,including, for example, security, energy management, locking orunlocking a door (e.g., barrier 115 via locking device 120), checkingthe status of a door, locating a user or item, controlling lighting,thermostats or cameras, receiving notifications regarding a currentstatus or anomaly associated with a home, office, place of business andthe like. In some configurations, application 235 may enable homeautomation system 105-a to interface with automation controller 220 andutilize user interface 215 to display automation, security and/or energymanagement content on display 210, user interface 215, mobile computingdevice 230 or other features of home automation system 105-a. Thus,application 235, via, for example, user interface 215 may allow users tocontrol aspects of their home, office, and/or other type of property.Further, application 235 may be installed on mobile computing device 230in order to allow the user to interface with a function of homeautomation system 105-a (e.g., automation controller 220).

Sensors 125-a-1 and 125-a-2 shown and described with reference to FIGS.1 and 2 may represent one or more separate sensors or a combination oftwo or more sensors in a single device. For example, sensors 125-a-1 and125-a-2 may represent one or more camera sensors and one or more motionsensors connected to environment 200. Additionally, or alternatively,sensors 125-a-1 and 125-a-2 may represent a combination of sensors suchas both a camera sensor and a motion sensor integrated into the samesensor device. Although sensors 125-a-1 and 125-a-2 are depicted asconnected to home automation system 105-a separately via network 130, insome embodiments one or more of sensors 125-a-1 and 125-a-2 may beconnected directly to home automation system 105-a, barrier 115 (e.g.,via locking device 120), or identification device 205. Additionally, oralternatively, sensors 125-a-1 and 125-a-2 may be integrated into a homeappliance or fixture such as a light bulb fixture. Sensors 125-a-1 and125-a-2 may include a wireless communication device, which enablessensors 125-a-1 and 125-a-2 to send and receive data and/or informationto and from one or more devices in environment 200. Additionally, oralternatively, sensors 125-a-1 and 125-a-2 may include a GPS sensor toenable sensors 125-a-1 and 125-a-2 to track the location of a sensor.Sensors 125-a-1 and 125-a-2 may include a proximity sensor to enable thesensor to detect proximity of a user relative to a predetermineddistance from a dwelling (e.g., geo fencing). Sensors 125-a-1 and125-a-2 may include one or more security detection sensors such as, forexample, a glass break sensor, a motion detection sensor, or both.Additionally, or alternatively, sensors 125-a-1 and 125-a-2 may includea smoke detection sensor, a carbon monoxide sensor, or both. In at leastone example, sensors 125-a-1 and 125-a-2 may detect the presence of auser within a dwelling being monitored by a home automation system105-a, a user performing certain functions (e.g., opening or closing adoor or window via, for example, a locking device 120), or a userspeaking a voice command. Feedback from sensors 125-a-1 and 125-a-2 mayfunction as at least one authentication factor used by barrier controlmodule 110 to determine whether a user is authorized to access one ormore barriers 115.

In some embodiments, a user may access the functions of home automationsystem 105-a (e.g., automation controller 220) from a remote locationvia, for example, mobile computing device 230. For example, in someembodiments, a mobile computing device 230 includes a mobile applicationthat interfaces with one or more functions of home automation system105-a (e.g., locking device 120). Locking device 120 and identificationdevice 205 may be one example of mobile computing device 230. Examplesof automation controller 220 may include a dedicated home automationcomputing device (e.g., a wall-mounted controller), a personal computingdevice (e.g., laptop, desktop, etc.), a mobile computing device (e.g.,tablet computing device, smart phone, etc.), and the like.

FIG. 3 illustrates another environment 300 that may include at leastsome of the components of environments 100, 200 described above and mayfurther include a tracking device 315. Home automation system 105 isshown associated with a home 305. Tracking device 315 may be used totrack the location of a person, animal, vehicle, or the like relative toa boundary 310 (e.g., geo fence) and home 305. Tracking device 315 maycommunicate with home automation system 105 via, for example, network130. Tracking device 315 may at times be positioned within home 305, atother times within boundary 310 and outside of home 305, and at othertimes outside of boundary 310.

Tracking device 315 may include a plurality of technologies andfunctionality that help determine not only a location of trackingdevice, but identification of the device and/or the person or objectcarrying tracking device 315, and an activity level of the person orobject carrying tracking device 315. Further details concerning featuresand functionality of tracking device 315 are described below withreference to FIG. 5.

Although home 305 is identified as a building structure being monitoredby home automation system 105, home 305 may represent other buildings,properties, or objects being monitored by home automation system 105.Home automation system 105 may include barrier control module 110 asdescribed above with reference to FIGS. 1 and 2. Barrier control module110 may operate to control operation and/or access through a barrier ofhome 305. Home 305 may include any of the other features andfunctionality of environments 100, 200 described above with reference toFIGS. 1 and 2, including, for example, the barrier 115 including thelocking device 120, the sensors 125-a-1 and 125-a-2, the identificationdevice 205, and various other features of home automation system 105.

Tracking device 315 may include capability to determine a relativelocation between tracking device 315 and home 305. In one example,tracking device 315 includes a GPS or similar technology that providessuch location determination. Tracking device 315 may includeidentification technology such as, for example, near-field communication(e.g., Bluetooth) that helps communicate identification information tohome automation system 105 and/or barrier control module 110. Theidentification information may include, for example, information neededto authenticate one or more users and/or authorize certain actions bythe person or object carrying tracking device 315. In one example,tracking device 315 includes the same or similar functionality ofidentification device 205 described above.

Tracking device 315 may also include an accelerometer or other devicethat helps determine activity of the person or object carrying trackingdevice 315. For example, tracking device 315 may provide informationabout movement of the person or object within a given time period. Inone scenario, the movement data helps determine whether a person hasfallen asleep, has a health problem, is running, etc. This movementinformation may be helpful in determining, for example, whether toimmediately send assistance to the person carrying tracking device 315.

Tracking device 315 may be structured in a variety of forms. Forexample, tracking device 315 may be in the form of a fob, a cell phone,or other electronic device. Tracking device 315 may be integrated intoan existing device that helps conceal tracking device 315. For example,tracking device 315 may be integrated into a piece of clothing (e.g., aseam of a pair of pants, brim of a hat, or a shoe sole), an accessory(e.g., a bracelet, anklet, or necklace), back pack, water bottle, orother portable electronic device (e.g., a tablet, computer, personalgame station, or the like).

FIG. 4 is a block diagram 400 illustrating one example of a barriercontrol module 110-a. Barrier control module 110-a may be one example ofbarrier control module 110 depicted in FIGS. 1, 2 and/or 3. As depicted,barrier control module 110-a may include a location module 405, anidentification module 410, a locking module 415, and an alarm module420. Barrier control module 110-a may include more or fewer modules andcapabilities in other embodiments.

Location module 405 may operate to determine a location of one or moreusers, occupants, and/or visitors to a property such as a home orcommercial place of business. Location module 405 may utilizeinformation provided from a number of sensors, devices or systems todetermine the location of a person or object. For example, locationmodule 405 may receive sensor signals from sensors 125-a-1 and 125-a-2shown in FIGS. 1 and 2. In one example, the information received bylocation module 405 may relate to operation of locking device 120 ofbarrier 115 (see FIGS. 1 and 2). The information about locking device120 and/or barrier 115 may help determine whether the person ispositioned on an interior or exterior of barrier 115. Other informationmay include information from a tracking device such as tracking device315 described with reference to FIG. 3. The person or object may bedetermined to reside not only outside of the home, but also outside of abarrier (e.g., boundary 310 such as a geo fence). Location module 405may also receive information related to a person's direction of travelrelative to a barrier of a home (e.g., moving into or out of a homethrough a barrier).

Identification module 410 may be used to identify one or more persons orobjects. Identification module 410 may receive information from any of aplurality of sensors or other devices or systems that provide insightinto a person's activities is and/or what the person is authorized to dorelative to, for example, a barrier or other activity associated with ahome automation system. In one example, identification module 410receives information from identification device 205, which is carried bya person and may provide information specific to that person. Theinformation received by identification module 410 may identify thatperson as an authorized user, such as a person who is authorized toaccess a barrier 115 to move into or out of a home.

Locking module 415 may determine whether and/or when to actuate alocking device of a barrier for a monitored home. For example, lockingmodule 415 may provide control of locking device 120 shown in FIGS. 1and 2. Locking module 415 may have two-way communication with lockingdevice 120 to not only send instructions concerning locking orunlocking, but also receive confirmation concerning the current state oraction carried out by locking device 120.

Barrier control module 110-a may include other features andfunctionality to permit communication with other features of homeautomation system 105. For example, barrier control module 110-a maydetermine that a person is attempting to operate a barrier of a homefrom outside the home based on functionality or location of module 405.Barrier control module 110-a may determine that the person is anunauthorized user using identification module 410. Barrier controlmodule 110-a may confirm that a locking device remains locked byfunctionality of locking module 415. Barrier control module 110-a maysend a signal to home automation system 105 to generate an alarm that anunauthorized person is attempting to gain access to the property.

In at least some arrangements, barrier control module 110-a may alsoinclude an alarm module 420 that generates an alarm when unauthorizedaccess of barrier occurs.

FIG. 5 is a block diagram 500 illustrating an example tracking device315-a. Tracking device 315-a may be one example of tracking device 315depicted in FIG. 3. Tracking device 315-a, as depicted, may include aGPS module 505, an accelerometer module 510, a Bluetooth module 515, aspeaker 520, and a light 525. Tracking device 315-a may include more orfewer modules and capabilities in other embodiments.

GPS module 505 may operate to provide mapping or positioning of trackingdevice 315-a relative to a reference point such as a property (e.g.,home) being monitored by a home automation system 105 as described withreference to FIGS. 1-3. GPS module 505 may operate using variouspositioning technologies including global positioning systems (GPS),although other types of positioning and/or tracking technologies may bepossible.

Accelerometer module 510 may comprise an accelerometer that monitorsmovement of tracking device 315-a. Accelerometer module 510-a may alsoinfer a particular type of activity being carried out based on themovement data. For example, accelerometer module 510 may determine thata person or object carrying tracking device 315-a is running, walking,sitting/lying, traveling by vehicle, or the like. Accelerometer module510 may be operable to generate notices or other signals based on achange in activity level or maintaining a certain activity level for apredetermine time period.

Bluetooth module 515 may be provide identification information relatedto tracking device 315-a and/or the person or object carrying trackingdevice 315-a. Bluetooth module 515 may implement Bluetooth technology orother near-field communication technology. Other types of technology maybe used to convey identification information such as RFID technology.

Speaker 520 may provide at least one-way communication between trackingdevice 315-a and the person or object carrying tracking device 315-a. Inone example, speaker 520 generates a beep, chime, audible voice message,music, ringtone, etc., wherein any of the generated sounds conveys amessage. For example, speaker 520 may generate a voice message of“Jimmy, come home for dinner” at a certain time of day when GPS module505 confirms that tracking device 315-a carried by Jimmy is away fromhome or outside of a geo boundary relative to the home. In anotherexample, speaker 520 may generate an audible tone when accelerometermodule 510 identifies no activity by the person carrying tracking device315-a for a predetermine time period, which may indicate that the personhas fallen asleep and needs to be roused. In a further example, speaker520 may generate an audible series of numbers that represents a code foraccessing a barrier of a home after Bluetooth module 515 communicateswith a home automation system to confirm that the person carryingtracking device 315-a is an authorized user and the code permits accessby the user.

Tracking device 315-a may include other communication features such as,for example, one or more light-generating devices such as a light 525.Light 525 may provide a visual indication to the person or objectcarrying tracking device 315-a. Light 525 may generate a light pattern,light color, or the like that communicates information to the personcarrying tracking device 315-a. For example, a flashing red light mayindicate that the person has moved outside of a geographical boundaryrelative to the home. A solid light may indicate a low battery fortracking device 315-a. A combination of lights displayed in series maycommunicate other information such as an indication that the personneeds to take a dose of medicine.

Tracking device 315-a may include other features and functionality thatassist in providing information about the person or object carryingtracking device 315-a or communicating directly with the person. In atleast some examples, tracking device 315 includes a two-waycommunication system.

FIG. 6 is a flow diagram illustrating one example of a method 600 forcontrolling access to a home based on user occupancy. In someconfirmations, the method 600 may be implemented by the barrier controlmodule 110 of home automation system 105 shown in FIGS. 1, 2 and/or 3.In other examples, method 600 may be performed generally by homeautomation system 105 shown in FIGS. 1, 2, and/or 3, or even moregenerally by the environments 100, 200, 300 shown in FIGS. 1-3,respectively. In some embodiments, method 600 may be implemented inconjunction with barrier 115 and/or locking device 120 shown in FIGS. 1and/or 2.

At block 605, method 600 includes determining a location of a user of ahome automation system relative to a barrier of a home being monitoredby the home automation system. Block 615 includes determining whether topermit a change in a locking mechanism of the barrier based in part on adetermine location of a user. Block 620 of method 600 includesmaintaining a current state of the home automation system. The currentstate of the home automation system may be an on or active state such asan armed state of the security system.

Other steps of method 600 may include determining an identify of theuser, wherein determining whether to permit the change in the lockingmechanism of the barrier is based in part on the identity of the user.Determining a location of a user may include determining whether theuser is inside or outside of the home. Determining a location of theuser may include determining on which side of a barrier the user ispositioned. The barrier may be a door or a window of the home, and thechange in the locking mechanism may include locking or unlocking thelocking mechanism to control opening of the door or window. Determiningthe location of the user may include determining whether the user istouching an inside handle used to control opening the barrier, or anoutside handle used to control opening of the barrier. Determiningwhether to permit a change in a locking mechanism of the barrier mayinclude unlocking the locking mechanism if the user is inside the house.Determining whether to permit a change in the locking mechanism of thebarrier may include unlocking the locking mechanism if the user islocated inside or outside the home and is identified as an authorizedperson, and maintaining the door locked if the user is located inside oroutside the home and is identified as an unauthorized person. The method600 may include generating an alarm when the user is identified as anunauthorized person and attempts to open the barrier from outside thehome. Determining a location of a user may include receiving signalsfrom at least one of a touch sensor, a voice recognition sensor, amotion sensor, and an optical sensor.

FIG. 7 is a flow diagram illustrating one embodiment of a method 700 forcontrolling access to a home based on user occupancy. In someconfigurations, the method 600 may be implemented by the barrier controlmodule 110 of home automation system 105 shown in FIGS. 1, 2 and/or 3.In some examples, method 700 may be performed generally by homeautomation system 105 shown in FIGS. 1, 2 and/or 3, or even moregenerally by environments 100, 200 or 300 shown in FIGS. 1-3,respectively. In some configurations, method 700 may be implemented inconjunction with locking device 120 and/or barrier 115 shown in FIGS. 1,2 and/or 3.

At block 705, method 700 includes determining a location of a user of ahome automation system relative to a barrier of a home being monitoredby the home automation system. Block 710 includes determining anidentity of the user. Block 715 includes determining whether to permit achange in a locking mechanism of the barrier based in part on thedetermined location of a user and the identity of the user. Block 720includes maintaining a current state of the home automation system.

The current state of the home automation system may include an “on” oractive state such as an armed state of the security system. Thedetermining step shown in block 715 may also include unlocking thelocking mechanism if the user is located inside or outside the home andhas been identified as an authorized person, and maintaining the doorlock if the user is located outside the home and is identified as anunauthorized person. Determining a location of the user may includedetermining if the user is touching an inside handle or an outsidehandle used to open the barrier. Determining the identity of the usermay include receiving a signal from an electronic device carried by theuser.

FIG. 8 is a flow diagram illustrating one example of a method 800 forcontrolling access to a home based on user occupancy. In someconfigurations, the method 800 may be implemented by the barrier controlmodule 110 of home automation system 105, shown in FIGS. 1, 2 and/or 3.In other examples, method 800 may be performed generally by homeautomation system 105 shown in FIGS. 1, 2 and/or 3, or even moregenerally by the environments 100, 200 or 300 shown in FIGS. 1-3,respectively. In some configurations, method 800 may be implemented inconjunction with locking device 120 and/or barrier 115 shown in FIGS. 1and/or 2.

At block 805, the method 800 includes determining a location of a userof a home automation system relative to a barrier of a home beingmonitored by the home automation system. Block 810 includes determiningan identity of the user. Block 815 includes determining whether topermit opening the barrier based in part on the determined location andidentity of a user. Block 820 includes maintaining an active state ofthe home automation system. The active state may be maintained for allsteps of method 800.

Method 800 may also include unlocking a locking mechanism of the barrierwhen a user is identified as an authorized user, and locking the lockingmechanism when the user is identified as an unauthorized user. Themethod 800 may include unlocking a locking mechanism of the barrier whena user is determine to be located on one side of the barrier, andlocking the locking mechanism when the user is determined to be locatedon an opposite side of the barrier. Determining a location of the usermay include determining use of a handle assembly used to open thebarrier.

FIG. 9 depicts a block diagram of a controller 900 suitable forimplementing the present systems and methods. The controller 900 may bean example of the automation controller 220 and/or the mobile computingdevice 230 illustrated in FIG. 3. In one configuration, controller 900includes a bus 905 which interconnects major subsystems of controller900, such as a central processor 910, a system memory 915 (typicallyRAM, but which may also include ROM, flash RAM, or the like), aninput/output controller 920, an external audio device, such as a speakersystem 925 via an audio output interface 930, an external device, suchas a display screen 935 via display adapter 940, an input device 945(e.g., remote control device interfaced with an input controller 950),multiple USB devices 965 (interfaced with a USB controller 970), and astorage interface 980. Also included are at least one sensor 955connected to bus 905 through a sensor controller 960 and a networkinterface 985 (coupled directly to bus 905).

Bus 905 allows data communication between central processor 910 andsystem memory 915, which may include read-only memory (ROM) or flashmemory (neither shown), and random access memory (RAM) (not shown), aspreviously noted. The RAM is generally the main memory into which theoperating system and application programs are loaded. The ROM or flashmemory can contain, among other code, the Basic Input-Output system(BIOS) which controls basic hardware operation such as the interactionwith peripheral components or devices. For example, an barrier controlmodule 110-b to implement the present systems and methods may be storedwithin the system memory 915. The barrier control module 110-b may be anexample of the barrier control module 110 illustrated in FIGS. 1, 2and/or 3. Applications (e.g., application 330) resident with controller900 are generally stored on and accessed via a non-transitory computerreadable medium, such as a hard disk drive (e.g., fixed disk 975) orother storage medium. Additionally, applications can be in the form ofelectronic signals modulated in accordance with the application and datacommunication technology when accessed via interface 985.

Storage interface 980, as with the other storage interfaces ofcontroller 900, can connect to a standard computer readable medium forstorage and/or retrieval of information, such as a fixed disk drive 975.Fixed disk drive 975 may be a part of controller 900 or may be separateand accessed through other interface systems. Network interface 985 mayprovide a direct connection to a remote server via a direct network linkto the Internet via a POP (point of presence). Network interface 985 mayprovide such connection using wireless techniques, including digitalcellular telephone connection, Cellular Digital Packet Data (CDPD)connection, digital satellite data connection, or the like. In someembodiments, one or more sensors (e.g., motion sensor, smoke sensor,glass break sensor, door sensor, window sensor, carbon monoxide sensor,and the like) connect to controller 900 wirelessly via network interface985.

Many other devices or subsystems (not shown) may be connected in asimilar manner (e.g., entertainment system, computing device, remotecameras, wireless key fob, wall mounted user interface device, cellradio module, battery, alarm siren, door lock, lighting system,thermostat, home appliance monitor, utility equipment monitor, and soon). Conversely, all of the devices shown in FIG. 9 need not be presentto practice the present systems and methods. The devices and subsystemscan be interconnected in different ways from that shown in FIG. 9. Theaspect of some operations of a system such as that shown in FIG. 9 arereadily known in the art and are not discussed in detail in thisapplication. Code to implement the present disclosure can be stored in anon-transitory computer-readable medium such as one or more of systemmemory 915 or fixed disk 975. The operating system provided oncontroller 900 may be iOS®, ANDROID®, MS-DOS®, MS-WINDOWS®, OS/2®,UNIX®, LINUX®, or another known operating system.

Moreover, regarding the signals described herein, those skilled in theart will recognize that a signal can be directly transmitted from afirst block to a second block, or a signal can be modified (e.g.,amplified, attenuated, delayed, latched, buffered, inverted, filtered,or otherwise modified) between the blocks. Although the signals of theabove described embodiment are characterized as transmitted from oneblock to the next, other embodiments of the present systems and methodsmay include modified signals in place of such directly transmittedsignals as long as the informational and/or functional aspect of thesignal is transmitted between blocks. To some extent, a signal input ata second block can be conceptualized as a second signal derived from afirst signal output from a first block due to physical limitations ofthe circuitry involved (e.g., there will inevitably be some attenuationand delay). Therefore, as used herein, a second signal derived from afirst signal includes the first signal or any modifications to the firstsignal, whether due to circuit limitations or due to passage throughother circuit elements which do not change the informational and/orfinal functional aspect of the first signal.

While the foregoing disclosure sets forth various embodiments usingspecific block diagrams, flowcharts, and examples, each block diagramcomponent, flowchart step, operation, and/or component described and/orillustrated herein may be implemented, individually and/or collectively,using a wide range of hardware, software, or firmware (or anycombination thereof) configurations. In addition, any disclosure ofcomponents contained within other components should be consideredexemplary in nature since many other architectures can be implemented toachieve the same functionality.

The process parameters and sequence of steps described and/orillustrated herein are given by way of example only and can be varied asdesired. For example, while the steps illustrated and/or describedherein may be shown or discussed in a particular order, these steps donot necessarily need to be performed in the order illustrated ordiscussed. The various exemplary methods described and/or illustratedherein may also omit one or more of the steps described or illustratedherein or include additional steps in addition to those disclosed.

Furthermore, while various embodiments have been described and/orillustrated herein in the context of fully functional computing systems,one or more of these exemplary embodiments may be distributed as aprogram product in a variety of forms, regardless of the particular typeof computer-readable media used to actually carry out the distribution.The embodiments disclosed herein may also be implemented using softwaremodules that perform certain tasks. These software modules may includescript, batch, or other executable files that may be stored on acomputer-readable storage medium or in a computing system. In someembodiments, these software modules may configure a computing system toperform one or more of the exemplary embodiments disclosed herein.

The foregoing description, for purpose of explanation, has beendescribed with reference to specific embodiments. However, theillustrative discussions above are not intended to be exhaustive or tolimit the invention to the precise forms disclosed. Many modificationsand variations are possible in view of the above teachings. Theembodiments were chosen and described in order to best explain theprinciples of the present systems and methods and their practicalapplications, to thereby enable others skilled in the art to bestutilize the present systems and methods and various embodiments withvarious modifications as may be suited to the particular usecontemplated.

Unless otherwise noted, the terms “a” or “an,” as used in thespecification and claims, are to be construed as meaning “at least oneof” In addition, for ease of use, the words “including” and “having,” asused in the specification and claims, are interchangeable with and havethe same meaning as the word “comprising.” In addition, the term “basedon” as used in the specification and the claims is to be construed asmeaning “based at least upon.”

1-20. (canceled)
 21. An apparatus for controlling access to a home basedon user occupancy, comprising: a processor; a memory in electroniccommunication with the processor; and instructions stored in the memory,the instructions being executable by the processor to: receive, from oneor more sensors of a home automation system in an armed state, feedbackassociated with a user of the home automation system; determine, by acontroller of the home automation system, a location of the user of thehome automation system relative to a barrier of a home being monitoredby the home automation system based at least in part on the receivedfeedback; determine whether to permit a change in a locking mechanism ofthe barrier based in part on the determined location of the user; andmaintain the armed state of the home automation system.
 22. Theapparatus of claim 21, wherein the instructions are executable by theprocessor to: determine an identity of the user, wherein determiningwhether to permit the change in the locking mechanism of the barrier isbased in part on the identity of the user.
 23. The apparatus of claim22, wherein determining the identity of the user is based at least inpart on one or more identifiers associated with the user.
 24. Theapparatus of claim 22, wherein determining whether to permit a change inthe locking mechanism of the barrier includes: unlocking the lockingmechanism if the user is located inside or outside the home and isidentified as an authorized person; and maintaining the barrier lockedif the user is located inside or outside the home and is identified asan unauthorized person.
 25. The apparatus of claim 22, wherein theinstructions are executable by the processor to: generate an alarm whenthe user is identified as an unauthorized person and attempts to openthe barrier from outside of the home.
 26. The apparatus of claim 21,wherein determining a location of the user includes determining whetherthe user is inside or outside of the home, determining on which side ofthe barrier the user is positioned, or a combination thereof.
 27. Theapparatus of claim 21, wherein the barrier is one of a door or a windowof the home, and the change in the locking mechanism includes locking orunlocking the locking mechanism to control opening of the door orwindow.
 28. The apparatus of claim 21, wherein determining the locationof the user includes determining one or more intent factors of the user.29. The apparatus of claim 29, wherein determining the intent factors ofthe user comprises determining whether the user is touching an insidehandle used to control opening the barrier or an outside handle used tocontrol opening of the barrier.
 30. The apparatus of claim 21, whereindetermining whether to permit a change in the locking mechanism of thebarrier includes unlocking the locking mechanism if the user is insidethe home.
 31. The apparatus of claim 21, wherein determining a locationof a user includes receiving signals from at least one of a touchsensor, a voice recognition sensor, a motion sensor, and an opticalsensor.
 32. A computer-program product comprising a non-transitorycomputer-readable medium storing instructions executable by a processorto: receive, from one or more sensors of a home automation system in anarmed state, feedback associated with a user of the home automationsystem; determine, by a controller of the home automation system, alocation of the user of the home automation system relative to a barrierof a home being monitored by the home automation system based at leastin part on the received feedback; determine an identity of the user;determine whether to permit a change in a locking mechanism of thebarrier based in part on the determined location of the user and theidentity of the user; and maintain the armed state of the homeautomation system.
 33. The computer-program product of claim 32, whereindetermining whether to permit a change in the locking mechanism of thebarrier includes: unlocking the locking mechanism if the user is locatedinside or outside the home and is identified as an authorized person;and maintaining the barrier locked if the user is located outside thehome and is identified as an unauthorized person.
 34. Thecomputer-program product of claim 32, wherein determining a location ofthe user includes determining if the user is touching an inside handleor an outside handle used to open the barrier.
 35. The computer-programproduct of claim 32, wherein determining an identity of the userincludes receiving a signal from an electronic device carried by theuser.
 36. The apparatus of claim 32, wherein the received feedback isreceivable from the one or more sensors irrespective of whether thestate of the home security system is in the armed state or a disarmedstate.
 37. A computer-implemented method comprising: receiving, from oneor more sensors of a home automation system in an armed state, feedbackassociated with a user of the home automation system; determining alocation of the user of the home automation system relative to a barrierof a home being monitored by the home automation system based at leastin part on the received feedback; determining an identity of the user;determining whether to permit opening the barrier based in part on thedetermined location and identity of the user; and maintaining the armedstate of the home automation system.
 38. The method of claim 37, furthercomprising: unlocking a locking mechanism of the barrier when the useris identified as an authorized user; and locking the locking mechanismwhen the user is identified as an unauthorized user.
 39. The method ofclaim 37, further comprising: unlocking a locking mechanism of thebarrier when the user is determined to be located on one side of thebarrier; and locking the locking mechanism when the user is determinedto be located on an opposite side of the barrier.
 40. The method ofclaim 37, wherein determining a location of the user includesdetermining use of a handle assembly used to open the barrier.