Method and apparatus for exchanging messages with users of a real property monitoring and control system

ABSTRACT

A monitoring and control system receives input indicating occupancy state of a user with regard to a designated area, or a plurality of areas therein or portions thereof. The system further receives, from one or more of a plurality of sensing capable devices of, or in communication with, the monitoring and control system, input indicating a respective event involving the user entering or exiting the designated area, or an area therein or portion thereof, the sensing capable devices situated on or near the user, within the designated area, or in one or more of the plurality of areas therein, or portions thereof. The system transmits a message to the user responsive to the respective event involving the user entering or exiting the designated area and the occupancy state of the user with regard to the designated area.

RELATED APPLICATIONS

This application claims the benefit of the filing date of U.S.provisional patent application No. 62/611,782, filed Dec. 29, 2017,entitled “Autonomous Home and Building Platform”, and is acontinuation-in-part of U.S. nonprovisional patent application Ser. No.16/158,211, filed Oct. 11, 2018, entitled “Method and Apparatus for RealProperty Monitoring and Control System, which is a continuation-in-partof U.S. nonprovisional patent application Ser. No. 15/976,661, filed May10, 2018, entitled “Method and Apparatus for Real Property Monitoringand Control System”, which is a continuation-in-part of U.S.nonprovisional patent application Ser. No. 15/963,031, filed Apr. 25,2018, entitled “Method and Apparatus for Real Property Alarm System”,which claims the benefit of the filing date of U.S. provisional patentapplication No. 62/504,052, filed May 10, 2017, entitled “MountableThermistor”, and U.S. provisional patent application No. 62/504,005,filed May 10, 2017, entitled “A Continuous Monitoring SecurityManagement System and Method of Use”, the entire contents of all ofwhich are incorporated by reference under 37 C.F.R. § 1.57.

TECHNICAL FIELD

Embodiments of the present invention relate to monitoring and controlsystems, and in particular to a monitoring and control system for ahome, building or campus environment that is continuously engaged andthat does not need to be turned on or turned off by a user as the userenters or exits the premises.

BACKGROUND

Traditional alarm or security systems need to be manually activated or“armed” by a user in order for the system to trigger an alarm;correspondingly, the system needs to be manually “disarmed” by a user todeactivate the system to prevent a false alarm upon return. The systemrequires manual intervention to be effective. When not armed, the systemwill, at best, provide audible notification of a sensor trigger (e.g.,beeping if a door is opened), and may provide ‘panic’ buttonconnectivity to the call center. The manual arming and disarming of thesystem is onerous to many users, resulting in infrequent use orabandonment of the system altogether. When armed, the system blindlysends an alarm if a sensor is triggered without disarming within aprerequisite time. There is no determination of reasonableness (e.g., aswhen an alarm is triggered when an internal motion sensor is activated;however, none of the exterior windows or doors were opened), which leadto many false alarms. Even with smart home security monitoring and alertsystems, there is still the notion of the system needing to be armed ordisarmed; that is, the system must be actively armed to providesecurity.

New advances in the field have shifted the burden of arming anddisarming from a manual operation to an automated one, owing totechniques such as monitoring of wireless sensor inputs, for example,geographical location (geolocation) of mobile devices through GlobalSystem for Mobile Communications (GSM) data, or detection of pre-pairedwireless signals between on-person mobile devices and a securitysystem's threshold monitoring device (e.g., wall-mounted securitypanel). However, the system must still be ‘armed’ to provide anysecurity intrusion value, whether the arming is automated, manual, or acombination of the two. Furthermore, such systems are limited tomonitoring and taking action based on an alarm or security event. Whatis needed is a monitoring and control system that monitors and takesaction based on an event, whether an alarm or security event orotherwise, and that considers additional factors, input, and outputs,besides a sensed event, in taking appropriate action.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments are illustrated by way of example, and not by way oflimitation, and can be more fully understood with reference to thefollowing detailed description when considered in connection with thefigures in which:

FIG. 1A is a flowchart of an embodiment of the invention;

FIG. 1B is a flowchart of an embodiment of the invention;

FIG. 1C is a flowchart of an embodiment of the invention;

FIG. 1D is a flowchart of an embodiment of the invention;

FIG. 1E is a flowchart of an embodiment of the invention;

FIG. 1F is a flowchart of an embodiment of the invention;

FIG. 1G is a flowchart of an embodiment of the invention;

FIG. 1H is a flowchart of an embodiment of the invention;

FIG. 2 is a state diagram in accordance with an embodiment of theinvention;

FIG. 3 is an illustration of an environment in which an embodiment ofthe invention may operate;

FIG. 4 is a functional block diagram of the computing environment inwhich an embodiment of the invention may be implemented;

FIG. 5 is an illustration of a plurality of sensors situated in one ormore rooms or areas of a designated area, in accordance with anembodiment of the invention;

FIG. 6A is a perspective view of a sensing device in accordance with anembodiment of the invention;

FIG. 6B is a front view of a sensing device in accordance with anembodiment of the invention;

FIG. 6C is a side view of a sensing device in accordance with anembodiment of the invention;

FIG. 6D is a rear view of a sensing device in accordance with anembodiment of the invention; and

FIG. 7 illustrates a relationship between various variables in acalculation performed in accordance with an embodiment of the invention.

DETAILED DESCRIPTION Definitions

The detailed description references the following terms, as definedbelow.

Sensor

A sensor, sensing device, or sensing capable device, is a device,module, or subsystem whose purpose is to detect events or changes in anenvironment and send the information to other electronics, frequently acomputer processor. A sensor is used with other electronics, fromsomething as simple as a light to something as complex as a computer.“Sensor” as used hereinafter, is intended to refer to either a dedicatedsensor, a sensing device, or a device with sensing capability.

Sensors are the eyes and ears of a monitoring and control system, suchas a security system, providing a significant proportion of informationabout the state of a designated area, such as a building, the positionand status of various properties of the designated area (e.g., building)and about the current occupancy of the designated area/building. Theinformation provided by an individual sensor is at a point-in-time.Learning longer term trends and patterns from the sensor data istypically done by other components, such as a computer subsystem.

Embodiments of the invention categorize sensors into three classes:occupancy, alert and environmental. Some sensors can belong to more thanone of these classes, in particular, depending on their deployment andmanner of use.

Occupancy Sensor

Occupancy sensors are a class of sensors that provide embodiments of theinvention with information about the current occupancy state of thebuilding. An occupancy sensor is an indoor motion detecting device usedto detect the presence of a live body, e.g., an animal or person, toautomatically control operation of a system, such as security, lighting,or temperature or ventilation systems for a building. Occupancy sensorsmay use infrared, ultrasonic, microwave, or other technology. The termencompasses devices as different as passive infrared (PIR) sensors,hotel room keycard locks and smart meters. The operating principles ofan occupancy sensor take into consideration that all objects with atemperature above absolute zero emit heat energy in the form ofradiation. Usually this radiation isn't visible to the human eye becauseit radiates at infrared wavelengths, but it can be detected byelectronic devices designed for such a purpose. The term passive in thisinstance refers to the fact that PIR devices do not generate or radiateenergy for detection purposes. They work entirely by detecting infraredradiation emitted by or reflected from objects. They do not detect ormeasure heat.

Embodiments of the invention contemplate a variety of occupancy sensortypes, such as but not limited to:

-   -   Passive Infrared (PIR) sensors, which work on heat difference        detection, measuring infrared radiation. Inside the device is a        pyroelectric sensor which can detect the sudden presence of        objects (such as humans) who radiate a temperature different        from the temperature of the background, such as the room        temperature of a wall.    -   Environmental sensors, such as temperature, humidity, smoke and        CO2 sensors, which detect the change in the environment due to        the presence of a animal such as a human.    -   Ultrasonic sensors, similar to radar, that work on the Doppler        shift principle. An ultrasonic sensor sends high frequency sound        waves in an area and checks for their reflected patterns. If the        reflected pattern is changing continuously then it assumes that        there is occupancy. If the reflected pattern is the same for a        preset time period then the sensor assumes there is no        occupancy.    -   Microwave sensors, which are similar to the ultrasonic sensor,        and also work on the Doppler shift principle. A microwave sensor        sends high frequency microwaves in an area and will check for        their reflected patterns. If the reflected pattern is changing        continuously then it assumes that there is occupancy. If the        reflected pattern is the same for a preset time then the sensor        assumes there is no occupancy. A microwave sensor has high        sensitivity as well as detection range compared to other types        of sensors.    -   Keycard light slots, used in a hotel energy management system to        detect when a hotel room is occupied, by requiring the guest to        place their keycard in a slot to activate systems such as        lights, thermostats, and security.    -   Smart meters, which work by detecting the change in power        consumption patterns that exhibit distinct characteristics for        occupied and vacant states.    -   Door operated switch.    -   Audio detection.    -   Biometric sensors, which measure and analyze unique physical or        behavioral characteristics, such as fingerprint, facial        features, gestures, voice, pulse rate, blood pressure, etc.,        which can be used to compare against historical averages and        indicate potential medical emergency condition.    -   Siren.    -   Key fobs, which are a class of physical security tokens that        includes smart cards, proximity cards and biometric keyless        entry fobs. Hardware tokens are often small enough for one to        store on a key ring, in their wallet or in their pocket.    -   Keypad PIN.    -   Exterior motion curtain sensor—typically a PIR sensor with a        focused field of view, using infrared for heat detection of an        object (e.g., person) otherwise obscured or hidden behind        shrubbery and trees.    -   Camera motion detection.    -   Radiofrequency motion detection.    -   Remote control device infrared signal detection.    -   Initiation or discontinuation of wireless communications        including but not limited to a Bluetooth pairing, a Wi-Fi        connection, or cellular communication.

Alert Sensor

An alert sensor is a class of sensor that provides notification of anevent about a specific property of a building. In some cases, this alertmay necessitate an immediate response by the monitoring and controlsystem, or user thereof. Alert sensors include:

-   -   Contact sensor. Contact sensors, which provide notification if        something is open or closed. They're typically installed on        doors, windows, drawers (including freezer drawer), valuables (a        safe or jewelry box), a gate to a yard or swimming pool,        throughout a building. They have two components: one installed        on the door, window, gate, or drawer itself; the other installed        next to it on a jamb or frame. When the door, window, gate, or        drawer is opened and the components separate and move apart, the        contact sensor signals ‘open’ to the monitoring and control        system. In embodiments of the invention, a contact sensor's        status (open or closed) can generate real-time alerts that a        door is opened or closed in the building.    -   Glass break sensor.    -   Water, water flow, flood detection sensor.    -   Temperature/heat, smoke, natural gas, and carbon dioxide (CO2)        sensors.    -   Door or window frame temperature sensor/thermostat.    -   Wireless (radio frequency (RF), wi-fi, cellular, Bluetooth)        jamming, interception, rogue access point, wi-phishing, or        amplification detection sensor.    -   Environmental sensors, which provide data about various local        environmental properties in or near a designated area, such as a        building. Environmental sensors include temperature and/or        thermostat sensors, humidity sensors, smoke and CO2 detection        sensors.

Geofence/Geofencing

A geo-fence is a virtual perimeter for a real-world geographic area. Ageo-fence can be dynamically generated, as in a radius around a pointlocation, or a geo-fence can be a predefined set of boundaries (such asschool zones or neighborhood boundaries). The use of a geo-fence iscalled geo-fencing, and one example of usage involves a location-awaredevice of a location-based service (LBS) user entering or exiting ageo-fence. This activity could trigger an alert to the device's user aswell as messaging to the geo-fence operator. This information, whichcould contain the location of the device, could be sent to anapplication executing on a computer, a mobile telephone, a mobilecommunications device, or to an email account.

Geofencing may be used to track location of a person, such as a youngchild, or a person afflicted with Alzheimer's disease, dementia, ormemory loss, so someone can be notified if the tracked location of theperson indicates the person is leaving or has left a designated area.

Geofencing allows users of a monitoring and control system to draw zonesaround places, such as places of work, customer's sites and secureareas. These geo-fences when crossed by an equipped vehicle or personcan trigger a warning to the user or operator via a short messageservice (SMS) or e-mail. In some companies, geofencing is used by thehuman resource department to monitor employees working in speciallocations especially those doing field work. Using a geofencing tool, anemployee is allowed to log his or her attendance using a GPS-enableddevice when within a designated perimeter. Other geofencing applicationsinclude sending an alert if a vehicle is stolen and notifyingauthorities when wildlife stray into farmland or approach an area suchas a campground, or domesticated animals stray outside a designatedarea.

Geofencing, in a security strategy model, provides security to wirelesslocal area networks. This is done by using predefined borders (e.g., anoffice space with borders established by positioning technology attachedto a specially programmed computer). The office space becomes anauthorized location for designated users and wireless mobile devices.

Internet of Things

The Internet of Things (IoT) is the network of physical devices,vehicles, home appliances and other items embedded with electronics,software, sensors, actuators, and connectivity which enables theseobjects to connect and exchange data. Each thing is uniquelyidentifiable through its embedded computing system and is able tointer-operate within an internetworking (e.g., Internet) infrastructure.The IoT allows objects to be sensed or controlled remotely acrossexisting network infrastructure, creating opportunities for more directintegration of the physical world into computer-based systems, andresulting in improved efficiency, accuracy and economic benefit inaddition to reduced human intervention. When IoT is augmented withsensors and actuators, the technology becomes an instance of the moregeneral class of cyber-physical systems, which encompasses technologiessuch as smart homes. It is contemplated that embodiments of theinvention may be implemented at least in part according to an IoTparadigm.

Thermostat

A thermostat is a component which controls the HVAC system to heat orcool to a desired temperature (i.e., the set point temperature) of adesignated area, such as a building, or one or more rooms or areastherein, so that the designated area's temperature is maintained near adesired temperature or setpoint temperature.

Thermostats are used in any device or temperature control system thatheats or cools a space to a setpoint temperature, examples includebuilding heating, central heating, air conditioners, HVAC systems,radiant heaters, baseboard/individual room heaters, water heaters, aswell as kitchen equipment including ovens and refrigerators, and medicaland scientific incubators. Thermostats may be classified asthermostatically controlled loads (TCLs).

A thermostat operates as a “closed loop” control device, as it seeks toreduce the error between the desired setpoint temperature and an ambienttemperature measured by a temperature sensor. Sometimes a thermostatcombines/co-locates both the temperature sensor and temperature controlelements of a temperature control system, such as in an automotivethermostat. In other embodiments, one or more temperatures sensors maybe remotely located with respect to the temperature control elementand/or user interface for the thermostat. In one embodiment, amonitoring and control system as described herein may be a thermostat.

Detailed Written Description

With reference to FIGS. 1A and 4, embodiments of the invention 100, 400cause a monitoring and control system to receive input at 105 indicatingthe occupancy state of, or for, an authenticated user or occupant(“user”) with regard to a designated area, such as a house, one or morerooms or areas in the house, a building, one or more rooms or areas inthe building, a gated community, a group of buildings, a campus, apublic or private venue, a geo-fenced area defining any portion orcombination thereof, and any portions or combinations thereof. Thisinput helps inform the monitoring and control system of the likelihoodthat there are occupants, and in some embodiments, a particular one ormore occupants, in the designated area, or in one or more of a pluralityof areas therein or portions thereof. Based on this input, themonitoring and control system may, optionally, select, at 110, aconfidence level of the occupancy state for the designated area, or forone or more of a plurality of areas therein or portions thereof (box 110in the flowchart of FIGS. 1A-1G is shown in a dashed line to indicate anoptional step in embodiments of the invention). In one embodiment, theconfidence level is selected from one of a number of confidence levelsregarding occupancy state of a user in the designated area, or one ormore of a plurality of areas therein or portions thereof. In oneembodiment, the confidence level is selected from one of a number ofconfidence levels regarding occupancy state of a particular user withinor with regard to the designated area, or one or more of a plurality ofareas therein or portions thereof. The monitoring and control systemreceives input at 115 in the form of one or more sensed events, such as,but not limited to, an authenticated user or occupant entering orexiting a designated area of area therein or portion thereof, apotential security or alarm event, or a temperature event (e.g., ameasured or detected ambient temperature), from one or more sensors 410or mobile devices 465 situated within, and/or around, the user and/orthe designated area, or within or around one or more of a plurality ofareas therein or portions thereof. These sensors or mobile devices maybe dedicated to the monitoring and control system, or one or moresubsystems thereof (e.g., a temperature monitoring and control subsystemand/or a security alarm subsystem), or may be independent devices withwhich the monitoring and control system, or subsystem(s) thereof,interacts. In one embodiment, the devices may be owned by or associatedwith a particular user, and generally kept on or held by the user or inclose proximity thereto. The monitoring and control system selects at120 an action to be taken based on one or more of the sensed events, andthe occupancy state obtained at 105 or the selected confidence levelobtained at 110 if at all. For example, the monitoring and controlsystem may select at 120 to transmit a message to a particular userbased on one or more of the sensed events, and the occupancy stateobtained at 105, or the selected confidence level obtained at 110, if atall. It is appreciated that the embodiments of the invention do notrequire a user or occupant to explicitly arm or turn on the monitoringand control system. Rather, the embodiments continually monitor all theinputs, sensors or otherwise, and then pursue an action to be taken at apoint in time, if any.

In one embodiment, where utilized, occupancy state confidence levels mayinclude a lowest confidence level, a low confidence level, a highconfidence level, and a highest confidence level. The lowest confidencelevel may be defined or characterized as one or more occupants onvacation or the designated area is empty/unoccupied, the low confidencelevel may be defined as the designated area is likely empty orunoccupied, or unoccupied by a particular authenticated user/occupant,the high confidence level may be defined as the designated area islikely occupied, or likely occupied by a particular authenticateduser/occupant, and the highest confidence level may be defined as thedesignated area is, in fact, occupied, or, in fact, occupied by aparticular authenticated user/occupant. In other embodiments, there maybe fewer or more confidence levels along a continuum from a lowestconfidence level to a highest confidence level. The same confidencelevels may be applied when considering occupancy of one or more of aplurality of areas or portions of a designated area.

In one embodiment, the monitoring and control system receives inputindicating occupancy state of a user with regard to the designated area,or of one or more of a plurality of areas therein or portions thereof,from, for example, a user interface 430, e.g., a keyboard or other inputdevice and a monitor display or other output device coupled incommunication with an monitoring and control system controller 405,and/or from one or more sensors 410 and sensor software 415 executingthereon and/or therewith, and/or from one or more mobile communicationdevices 465.

In one embodiment, the user interface may be via a software applicationexecuting on a mobile communication device 465 or user interface 430 ofthe monitoring and control system, or a programmable keypad and displaycoupled in communication with a sensor. The monitoring and controlsystem may receive input from one or more authenticated users orindividuals via one or more of these user interfaces. For example, anauthenticated user may provide input selecting a particular one or morerooms, areas, or portions of the designated area in which the user is orintends to be located for some period of time. Optionally, theauthenticated user may provide input that selects a particular one ormore sensors in the one or more rooms or portions of the designated area(to the extent the user knows or cares about particular sensor(s)therein), so that the monitoring and control system uses the selectedsensor(s) therein as the input. For example, the authenticated user mayprovide input that selects a particular one or more temperature sensorsin the one or more rooms or portions of the designated area (to theextent the user knows or cares about particular temperature sensor(s)therein), so that the monitoring and control system uses the selectedtemperature sensor(s) therein as the input for measuring temperature foruse as input to a temperature control system or one or more thermostatsfor the designated area.

In one embodiment the thermostat is integrated into or replaced byequivalent circuitry and software in the monitoring and control system.In another embodiment, the thermostat, and/or the temperature sensor(s)to which a thermostat control system is linked, may be located proximateto the controller 400 or may be remotely located with respect tocontroller 400 and/or one or more sensors in communication with thethermostat and/or monitoring and control system. In one embodiment, theuser interface is removed from the thermostat (a “headless” thermostat)and placed in or integrated with a user interface of the monitoring andcontrol system, or controlled by an occupant's mobile communicationdevice and accompanying application software, and information can berelayed to the thermostat by the monitoring and control system and/orthe mobile communications device's application software. An examplescenario involves a thermostat that receives input from the monitoringand control system, e.g., controller 400, to drive the temperaturecontrol locally at the thermostat. In this example, a temperature sensorin a master bedroom detects or measures ambient temperature of 68degrees Fahrenheit, but the thermostat located elsewhere (e.g., a mainhallway) and with its own temperature sensor, detects ambienttemperature of 72 degrees. The monitoring and control system, knowing itis nearing bed time (e.g., based on gathered historical and/or currentoccupancy state data), increases the temperature at the thermostat to 76degrees, which may well increase temperature across the entire house,but in particular, raise the temperature in the master bedroom to 72degrees.

In one embodiment, the sensors 410 indicating occupancy state of theuser with regard to a designated area, or of one or more of a pluralityof areas therein or portions thereof, may be one of three basic types ofsensors: an occupancy sensor, an alert sensor, an environmental sensor,or combinations thereof. The alert sensor may be conditional, where analert is sensed or not based on biometric and/or gesture recognitionwhen a known or an unknown occupant is identified by the system.

With reference to the state diagram 200 depicted in FIG. 2, selection ofa confidence level for, or of, an occupancy state at 110 uses multipleinputs at 105, that is, the confidence level of whether one or moreauthenticated people are in a designated area (for example, whether ahouse is occupied or empty), is based on potentially numerous inputs. Inthis regard, authenticated people can be known users—users known to themonitoring and control system, such as a home owner or other individualsthat have an account with the monitoring and control system, orguests—users not known to the monitoring and control system, or unableto be identified, but their entry into or exit from the designated areawas authorized or approved by an authenticated person, e.g., their entryor exit was detected when another authenticated person was alreadypresent in the designated area. In one embodiment, the confidence levelof occupancy state is a determination meant to be calculated on anon-going basis and used as possible input in advance of or in additionto the sensors.

The above enumerated confidence levels for occupancy states and theproposed inputs used to determine which confidence level for occupancystate is the current, or selected, confidence level is further describedbelow.

The lowest confidence level of occupancy state 210 is selected when thedesignated area, or the one or more of a plurality of areas therein orportions thereof, is clearly not occupied by one or more authenticatedusers. This confidence level is entered by one of the followingtransitions.

1. By explicit command entered at 250 by an authenticated user, forexample, via a user interface. This user may be authenticated by a pin,fingerprint biometrics, facial or gesture recognition detection. Theconfidence level 210 may be entered immediately or after a set timeinterval has elapsed.

2. By explicit command entered at 250 by an authenticated user, forexample, via a mobile app, that all authenticated users are leaving thedesignated area, or the one or more of a plurality of areas therein orportions thereof. The confidence level 210 may be entered immediately orafter a set time interval has elapsed.

3. An exit from the designated area is detected and the designated areaappears empty. For example, an exterior door closes (regardless of thetime interval between opening and closing the door, or whether a dooropen event was detected), there are no identified occupants present, nofurther motion is detected in the designated area for a time periodspecified by a configurable parameter, referred to herein as asensitivity for no motion detection after exit parameter. The confidencelevel 210 is entered in this scenario at 252 as a transition from thelow confidence level of occupancy state 215.

4. A lack of motion detection in the designated area, as happens whenthere are no identified occupants present in the designated area, and nomotion has occurred for a time period specified by the configurableparameter such as the sensitivity for no motion detection after exitparameter. The confidence level 210 is entered in this scenario at 252as a transition from the low confidence level of occupancy state 215.

The low confidence level of occupancy state 215 is selected when thedesignated area, or the one or more of a plurality of areas therein orportions thereof, is likely not occupied by one or more authenticatedusers. This confidence level is entered by one of the followingtransitions.

1. An exit from the designated area was detected and the designated areaappears empty, such as when an exterior door closes (regardless of thetime interval between opening and closing the door, or whether the opendoor event was detected), there are no identified users present, and nofurther motion is detected in the designated area for a minimumthreshold portion (e.g., 50%) of the time period specified by theconfigurable sensitivity for no motion detection after exit parameter.This confidence level may be entered at 256 from the highest confidencelevel of occupancy state 225, or entered at 254 from the high confidencelevel of occupancy state 220.

2. Motion has not been detected for an extended period of time, which ischaracterized by no identified occupants present in the designated area,and no motion detection has occurred for a minimum threshold of a timeperiod, e.g., 75% of the time period specified by a configurableparameter, referred to herein as the sensitivity for no motion detectionfor an extended period of time parameter. This confidence level may beentered at 254 from the high confidence level of occupancy state 220.

The high confidence level of occupancy state 220 is selected when thedesignated area, or the one or more of a plurality of areas therein orportions thereof, likely is occupied by one or more authenticated users.This confidence level is entered by the following transition: motion hasnot been detected for a moderate period of time, which is characterizedby no identified occupants present in the designated area, and, sincelast entering the highest confidence level of occupancy state 225, nomotion detection has occurred for a minimum threshold of a time period,e.g., 50% of the time period specified by the configurable sensitivityfor no motion detection for an extended period of time parameter. Thisconfidence level may be entered at 260 from the highest confidence levelof occupancy state 225.

The highest confidence level of occupancy state 225 is selected when thedesignated area, or the one or more of a plurality of areas therein orportions thereof, is occupied by one or more authenticated users. Thisconfidence level is entered by one of the following transitions.

1. A location for a mobile communications device indicates that anindividual is very close to, or in, the designated area, characterizedby a least one authenticated user's mobile communication device (e.g.,mobile phone) has been detected in the designated area, e.g., connectedto a home's local area wireless network, or connected via Bluetooth tothe monitoring and control system, and/or at least one user's mobilecommunications device reported entering a geofence erected around thedesignated area, e.g., a home's exterior, or a master bedroom. Thisconfidence level may be entered at 262 from the high confidence level ofoccupancy state, at 258 from the low confidence level of occupancy state215, or at 264 from the lowest confidence level of occupancy state 210.

2. Authentication by a user via a user interface for the monitoring andcontrol system, e.g., a display panel for the monitoring and controlsystem. For example, an authenticated user may enter an explicit commandat 268 via the user interface. In one embodiment, the authenticated userinputs a particular one or more rooms or portions of the designatedarea, or sensor(s) therein, so that the embodiment uses the sensor(s)therein as the input for a monitoring and control system for thedesignated area. For example, in one embodiment, the authenticated usermay input a particular one or more rooms or portions of the designatedarea, or temperature sensor(s) therein, so that the embodiment uses thetemperature sensor(s) therein to measure temperature for use as input toa temperature control system or one or more thermostats for thedesignated area. The user may be authenticated by a pin, fingerprintbiometrics, facial or gesture recognition detection. The confidencelevel 225 may be entered immediately or after a set time interval haselapsed. This confidence level may also be entered at 262 from the highconfidence level of occupancy state, at 258 from the low confidencelevel of occupancy state 215, or at 264 from the lowest confidence levelof occupancy state 210.

3. Recent motion is detected in the designated area, e.g., a house,characterized by, since last entering this state, motion being detectedwithin a minimum threshold of time, e.g., half of the time periodspecified by the configurable sensitivity for no motion for an extendedperiod of time parameter. This confidence level is entered at 266 fromthe highest confidence level of occupancy state, or at 262 from the highconfidence level of occupancy state 220.

One embodiment of the invention further contemplates tracking one ormore identified users (“identified user tracking”). For each useridentified in the designated area, or in the one or more of a pluralityof areas therein or portions thereof, the monitoring and control systemattempts to track their presence. According to one embodiment, differentusers can be given or configured with different priority or precedencesettings so that the monitoring and control system takes an action basedon the user or occupant with the highest precedence, or based on therelative precedence of multiple occupants. An identified user's presenceis set to “away” from the designated area when the monitoring andcontrol system transitions to the lowest confidence level of occupancystate 210 and presumes at least that individual is, or all individualsare, no longer on the designated premises (e.g., no longer in the house,or a room therein).

An identified user's presence may also be set to “away” from thedesignated area when the user's mobile communication device's locationexplicitly indicates the identified user is not in the designated area,including, for example, when the mobile communication device was, but nolonger is, connected to a local Wi-Fi or Bluetooth network within orencompassing the designated area, or the identified user's mobilecommunication device, since the time the identified user was detected asin the designated area, is now reporting live triangulation orgeolocation information that indicates the identified user is away fromthe designated area. An identified user's presence may also be set to“away” from the designated area when schedule guidance/inputs from anauthenticated user, e.g., a home owner, explicitly flag an identifieduser's mobile communications device as off line, powered off, orotherwise not reliable, or indicate the user has left the designatedarea. Finally, an identified user's presence may also be set to “away”from the designated area when the identified user has been authenticatedby another monitoring and control system that is physically separatefrom this monitoring and control system.

An identified user's presence is set to “present” in the designatedarea, or in one or more of a plurality of areas therein or portionsthereof, upon a successful authentication of the identified user at auser interface of the monitoring and control system, such as at a panelor keypad located inside or at the security perimeter of the designatedarea, or located at the one or more of a plurality of areas therein orportions thereof. Likewise, an identified user is marked as “present” inthe designated area when their mobile communication device'striangulation or geolocation information indicates the user is veryclose to, or within the designated area, such as when the mobilecommunication device is detected within the designated area, e.g.,connected to a local wireless network, or a Bluetooth radio connectionwith the monitoring and control system, or the mobile communicationdevice reports entering a geofence erected around the perimeter of thedesignated area (e.g., the exterior of a home).

Embodiments can further detect the presence of individuals in a buildingthrough detection of the interaction of individuals with radio frequency(RF) signals. RF signals can be used to detect the presence ofindividuals through distinguishing identifying characteristics, such asflesh or body mass composition versus other types of matter.Interference with moving bodies on RF fields can be used to detectmovement of individuals. When individuals are identified through RFfield analysis or other means, embodiments use other inputs to determineif the individuals are authorized or unauthorized occupants. When thesystem is indeterminate, it will challenge for authentication throughvarious means through direct system components (e.g., security panels)or known peripheral devices (e.g., smart mobile devices), including suchmeans as: biometric recognition (finger print, facial, retinal, etc.),verbal recognition (voice matching or phrase matching), patternrecognition (pin, gesture recognition, swipe pattern), etc.

In addition, where sensors used to monitor RF interference or organicmaterial presence are placed in one or more locations throughout thebuilding to determine the presence of individuals, these sensors can bemulti-purpose to include other functionality which are complimentary tothe system (thermal sensor, biometric readers, cameras,microphones/noise detection sensors, speaker, light detectors, humiditydetectors). Further, for such sensors which may be plugged into walloutlets, these can have pass-through outlets which are controlled by thesystem; for example, if an intruder is determined to be a room, theoutlet through which a lamp is connected can be turned on (to frightenthe intruder) or off (to confuse the intruder) as predetermined by thesystem.

With regard to the gesture recognition detection mentioned above, in oneembodiment, gesture recognition and authentication is enabled. Thegesture recognition system can be touch-based or visual (camera)-based.In addition, the system can use the gesture recognition capability ofmobile devices (e.g., smart phones and tablets) which are known to, andlinked to, the system. Gestures can be preset or user-defined, and userdefined gestures can be universal or individualized. The system isconfigured with a digital signal processor and memory component whichcontains a pre-programmed algorithm of user gestures to indicate variouscommand signals. For example, the digital signal processor may transmitan emergency message to request emergency response based on a particularuser gesture: one for medical distress, another for police response,etc. A particular gesture, either pre-set or user-defined, may be usedto authenticate an individual as a known person to the system.Personalized unique gestures can be used to authenticate specificindividuals in an authorization request. Specific gestures may also beused to as a method of user system control, either as a UI menunavigation methodology or as a preset commands, such as start displayinga photo album, put the system in a particular monitoring state, start orstop a siren, control ancillary connected devices such as securitylighting, locks, audio, etc.

Embodiments of the invention, when used to detect gestures commands,first detect human figures within a recorded image. If there are nohuman figures detected, a video camera continues to process frames ofrecorded video. However if a human figure is detected then theembodiments may further process sounds or outlines to determine if agesture was sensed. For example, when used for gesture recognition,embodiments may have a plurality of commands corresponding to a hostilegesture such as arm raised in the air. In conjunction with the outlinematching, an embodiment may have a band pass filter to filter specificsounds frequencies to determine if a hostile threat such as a loud voicefrom an undesignated user or gunfire is sensed.

In general, the gesture or voice recognition is defined by a thresholdlevel. In the context of a voice recognition, the threshold level may beset to only loud voices from undesignated users. In the context ofgesture recognition, the threshold level may be defined by the speed inwhich a designated user's hands are raised/lowered in the air or thelength of time they remain raised. The pre-defined actions may beprogrammed during a “learned mode” and specific to each designated user.These pre-defined actions may include overt gestures to provide a signof duress and cause an immediate condition. In a further example,embodiments may be programmed to recognize a weapon such as a pistol ora knife. Further, embodiments may provide a defined “threat value” todifferent gestures or objects. For example, one embodiment may determinethat an undesignated user is carrying a knife and provide a higherthreat value than if they were carrying tools or toys. Alternatively,one designated user may pre-define repetitive actions such as repeatedlyplacing their hands over their eyes or nose as their unique and overtact of gesturing duress.

In another context, such as biometrics, one embodiment may be configuredto recognize specific measurements within a designated user face orrecognize a specific heat signature. The biometric data may be assigneda threat value and if that value exceeds a specific threshold, cause acondition to the system such as an alarm. In another example, adesignated user may be approached by a stranger when trying to enter thehome and provide a pre-defined overt gesture.

With reference to FIGS. 1B and 4, one embodiment of the invention 125,400 receives additional input in the form of geofencing or geolocationinformation transmitted from one or more mobile communication devices465 within or around a particular user and/or the designated area. Inone embodiment, a geofencing software application executing on thecontroller 405 receives this additional input. In this embodiment, themonitoring and control system may select one of the confidence levelsregarding occupancy state of a user with regard to the designated area,that is, select a confidence level indicating whether the user ispresent in or away from the designated area, further based on thereceived additional input. In this embodiment, the monitoring andcontrol system receives input at 105 indicating the occupancy state ofthe user with regard to the designated area, as well as geolocationinformation input from one or more mobile communication devices at 106,which can inform which one or more particular authenticatedusers/occupants is in a designated area, or an area therein or portionthereof, or entering or exiting the same. For example, a particularmobile communications device may be known as belonging to, or associatedwith, a certain authenticated user/occupant, and thus, a stronginference can be drawn, based on geolocation information that identifiesthe location of a mobile communications device within the designatedarea, that the authenticated user/occupant within the designated area.Based on both of these inputs, the monitoring and control system mayselect, at 110, the confidence level. The monitoring and control systemreceives at 115 input regarding one or more sensed events from one ormore sensors 410 or mobile devices 465 situated within or around thedesignated area, such as sensing a user entering, or exiting adesignated area or area therein or portion thereof. The monitoring andcontrol system then selects at 120 an action to be taken based on theone or more of the sensed events, the occupancy state input received at105, and the mobile communications device(s) input at 106, or based onthe one or more of the sensed events and the confidence level selectedat 110. For example, the action to be taken may involve transmitting amessage to a particular authenticated user/occupant when in, or enteringor exiting, the designated area, or an area therein or portion thereof.The message may be transmitted to the user's mobile communicationsdevice or a display panel located near the user.

In one embodiment, the mobile communication devices are cellularcommunications capable mobile devices. In other embodiments, the devicesmay support or adhere to other wireless communication protocols orstandards such as an IEEE 801.11 Wi-Fi communications, Bluetoothwireless communications technology, and global positioning satellite(GPS) communications standards, and communicate triangulation orgeolocation information with a geofencing application 435 of themonitoring and control system 400.

Some embodiments on the invention provide a mountable responsive sensingdevice which may be configured to be releasably mounted to a wall orwithin an electrical outlet and provide continuous transmission to aremote thermostat or the monitoring and control system. The sensingdevice is configured to provide environmental sensing (e.g.,temperature, humidity etc.) within a pre-determined and geo-fencedlocation (e.g., a designated area or one or more areas therein orportions thereof) and, more specifically, regulate temperatures within“control zones” of the pre-determined, geo-fenced location. In oneembodiment, the sensing device incorporates both motion detection andtemperature sensing capabilities. Further, in one embodiment, thesensing device is configured to be used in conjunction with themonitoring and control system to provide continuous transmission ofsensed events (e.g., a measured ambient temperature) over a wired orwireless network using an integrated transceiver to the monitoring andcontrol system, which may then control an HVAC or environmental systemto reach a desired state (e.g., temperature, humidity, etc.) at thegeofenced locations, based, in one embodiment, on pre-programmedconditions. In one embodiment, accurate temperature regulation ispossible with the releasably mounted sensors positioned or situated invarious locations within a geo-fenced location. The sensors providehighly accurate temperature readings in each location in order for themonitoring and control system, either directly through a thermostat orthrough an intermediate control device, such as a home control hub oralarm panel, to adjust an HVAC set point until a specific temperature ata specific sensor is achieved. The location of the sensor with which thesystem is currently working can be varied based on a myriad ofpredefined conditions, such as time-of-day, occupancy sensing, and othersystem and non-system inputs into the thermostat or monitoring andcontrol system.

With reference to FIGS. 5, 6A-6D, a sensor 510, 610 is configured toreleasably mount to a wall or within an electrical wall outlet (i.e.,plug mounted) and form a geo-fence perimeter around a pre-determinedlocation of a designated area, such as a residential home or commercialoffice space. It is contemplated the wall mounted and wall plug mountedsensors are configured of a molded synthetic or semi-synthetic materialsuch as a plastic or polyurethane with an approximate height 612 of 3-4inches, width 614 of 2-3 inches, thickness 616 of ⅛-¼ of an inch. Thedevice 510, 610 may include an adhesive 618 with a waxed paper 620backing affixed to the adhesive portion 618. The waxed paper 620 isdesigned to be peeled away from the adhesive 618 before being secured toa wall.

Each of the sensors 510, 610 has a separate power or battery source anda piezoelectric alarm 622 to provide an audible signal when power isreceived. Alternatively, the sensor 510, 610 may be equipped with aLight Emitting Diode (LED) 623 to provide a visual indicator. Furtherillustrated in FIG. 6 is the plug mount sensor 610 having an elongatedbody 624 along the front face. The sensors have a plurality of internalconducts which provide a flexible “Y-shape” configuration. The housingof the sensor 626 further includes a thermistor 628 electricallyconnected in parallel to a transceiver 630 to provide a responsivesignal to at least a thermostat and/or the monitoring and control systemupon the detection of a heat source or upon measurement of the ambienttemperature. Further, it is contemplated the thermistor may be used todetect low or high temperatures and provide a signal over the wirelessnetwork to control the applicable thermostat.

The transceiver is configured to receive defined user inputs and controlsystem input signals from both the monitoring and control system and asmart mobile communications device. The sensor 510, 610 further enablesgeo-fencing and multi-zone proximity sensing which allows a defined orauthenticated user to move between “control zones” within the definedgeo-fenced location and experience a uniform programmed temperature.

The sensor 510 610 is further configured to continuously receivewireless data over at least Z-Wave, ZigBee, Wi-Fi, sub-GHz, BlueTooth,BlueTooth Mesh, etc. from the monitoring and control system, in oneembodiment, corresponding to defined user inputs. For example, thesensor 510, 610 may receive a signal from a first user's mobilecommunications device containing the first user's desired temperatureduring the day and at night. The sensor may then adjust the definedzones of the geo-fenced location to ensure the preferred daytime andnight time temperatures are maintained. Further sensor 510, 610 isconfigured to sense when a defined user has exited the definedgeo-fenced location to provide an “away” setting. Once the defineduser's temperature preference is received the transceiver is configuredto provide incremental adjustments at each of the zones of the definedgeo-fenced location.

Thus, embodiments of invention consist of a number of releasably mountedenvironmental sensing devices (temperature, humidity, etc.) whichmeasure current states in a geo-fenced area and communicate anysignificantly incremental change of state to a central monitoring andcontrol system, including, for example, a thermostat, security panel orhome automation hub. The central monitoring and control system cansubsequently control the environmental systems (HVAC, humidifier, etc.)to equilibrate environmental conditions to a user-desired set pointassociated with a specific geo-fenced area by continuously monitoringthe output of the sensor coexistent in that area. The system can varythe targeted area throughout a cycle period (such as during the courseof a day) based on user preferences or other system and non-systeminputs, such as time of day, area occupancy status, etc. If the centralmonitoring and control device is itself a thermostat, the thermostatitself would directly control the environmental systems (HVAC,humidifier, etc.). If the central monitoring and control system is anintermediate device which sits between the sensing devices and athermostat, the central monitoring and control system equilibrates tothe desired set point by directly altering the set points on thethermostat itself. Alternatively, the thermostat can itself be builtdirectly into the central monitoring and control device, such as a homeautomation hub or security panel. Note that the temperature sensingcapability on the thermostat is, itself, a default sensing device inthis embodiment.

With reference to FIGS. 1C and 4, one embodiment of the invention 130receives additional input (e.g., user input) or otherwise learns aboutinformation relevant to or about one or more users and/or the designatedarea (e.g., using machine learning) at 107, wherein the additional inputor learned information is, for example, one or more of: user inputselecting a particular one or more rooms, or areas, or portions of thedesignated area, or temperature sensor(s) therein (to the extent theuser knows or cares about particular temperature sensor(s) therein), sothat the embodiment uses the temperature sensor(s) therein as the inputfor measuring temperature for a temperature control system or one ormore thermostats for the designated area; learned occupancy schedule(work/school/other of various occupants, e.g., building servicepersonnel on-site patterns); pattern of where and/or when mobilecommunication devices are present (based on such devices being on theperson of an occupant within the designated area), in or absent from,the designated area; time of day; day of week; seasonal-, holiday-, orpersonal observances or patterns of various occupants; current weatherconditions; adverse and/or extreme weather conditions. This informationcould be explicitly input at one or more of user interfaces 430,received via sensors 410, or received via mobile communication devices465. In this embodiment, the monitoring and control system mayoptionally select one of the confidence levels regarding occupancy stateof a user with regard to the designated area further based on thereceived additional input. In this embodiment, the monitoring andcontrol system receives input at 105 indicating the occupancy state fora user with regard to the designated area, as well as receives inputregarding additional relevant information about the user and/ordesignated area, at 107. Based on these inputs, the monitoring andcontrol system may select, at 110, the confidence level. The monitoringand control system receives at 115 one or more sensed events from one ormore sensors 410 or mobile devices 465 situated within or around thedesignated area, such as a user entering or exiting the designated area,or otherwise detected as present in or away from the designated area.The monitoring and control system then selects at 120 an action to betaken based on the one or more sensed events, and the selectedconfidence level, or based on the one or more sensed events, theoccupancy state of one or more users, and the input regarding additionalrelevant information about the designated area from step 107. Forexample, the action taken may involve transmitting a message to one ormore users in, or away from, the designated area, based on the inputs.

The additional input about information relevant to or about one or moreusers and/or the designated area, or the one or more of a plurality ofareas therein or portions thereof, received at 107 can be thought of aslearned behavior qualifiers to the input received at 105, for example,from sensors 410. This information may be considered and provided as aweighting to the occupancy state of one or more users. Specifically, inone embodiment, the weighting that is applied to the occupancy state ofa user with regard to the designated area essentially is itself a levelof confidence that the occupancy of the user is expected, anticipated orotherwise behavior that has been learned by the system to be considerednormal (“Learned Behavior Confidence”, or “LBC”). The learned behaviorconfidence, in one embodiment, is a value that ranges from 0 to 100,where 0 represents no learned behavior confidence that the occupancystate of the user is expected, anticipated or otherwise normal, up towhere 100 represents that occupancy state of the user is completelyexpected, anticipated or otherwise normal.

An embodiment of the invention may consider the learned behaviorconfidence when selecting the confidence level at 110, if at all, andelevate or reduce the selected confidence level 110.

The following description enumerates learned behavior qualifiers and howeach may impact the value of the learned behavior confidence weighting:

Time of day: if the occupancy state of the user occurred and during thelast time period (e.g., 30 days—adjustable time period) there was asimilar occupancy state (same target and target area) during the sametime window (half hour before and after—adjustable window) then the LBCis weighted with the number of days this occurred out of the timeperiod.

Learned schedule (work/school/other): pattern of when mobilecommunication devices (respectively associated or assigned to particularoccupants) are present or absent from the designated area/day of week.If the indicated occupancy state of the user occurs while the confidencelevel regarding the occupancy state of the user is currently at itslowest confidence or low confidence level, and during the last timeperiod (30 days—adjustable time period) there were: one or more mobilecommunication devices present on at least three of the preceding sameday of the week, or confidence level regarding the occupancy state ofthe user for the designated area was at the highest level on at leastthree of the preceding same days of the week, then the LBC is set to thepercentage with the number of days that the behavior was present on thisspecific day of the week in the last preceding 6-month time window.

Service personnel patterns: this is handled in a manner similar to theabove described learned schedule.

Seasonal observances and/or holidays—discount the learned schedule. Inone embodiment, these items cause the learned schedule to not beapplied, or may reduce the weighting by it a certain percentage.

Adverse current weather conditions, extreme temperature: if theoccupancy state of a user occurs while the confidence level of theoccupancy state is currently at the lowest confidence level or lowconfidence level, and the current weather conditions are currentlyabnormal (tornado, blizzard, etc.) or the temperate can be consideredextreme for the area (either cold or hot extremes), then set LBC to 50percent on the assumption that individuals may be in the designated area(e.g., a house) that otherwise would be outside or working.

In the above described embodiments illustrated in the flow charts ofFIGS. 1A-1C, the step of receiving a sensed event from one or more of anumber of sensors at 115 contemplates using sensor inputs from thesensors monitoring the designated area to determine an event that isoccurring in, around or outside of the designated area at a currentpoint in time, such as an individual entering or exiting the designatedarea, or otherwise detected as being present in, or away from, thedesignated area. Events may be triggered through a single sensor input,or a more complex layering of events over a short period of time, whichmay be triggered repeatedly through a single sensor input, or multipletriggers caused by sensor input from different sensors. Further, in someembodiments, there may be more than one event under evaluation orconstruction at a point in time, though not all necessarily areconfirmed as actual events.

In one embodiment, events are not based on, and do not accept, userinput. Any user input is requested and handled in determining orselecting the action to be taken in response to the event and,optionally, the selected confidence level. After receiving andprocessing user input, some actions to take in response to one or moreevents may require additional clarification through waiting foradditional sensor data. It is contemplated that this process will behandled according to, and as part of, the particular action to be taken.

Embodiments of the invention are able to combine a number of sensors, orsensor inputs, typically in a progressive manner, to obtain a morenuanced view of the event. In one embodiment, as a baseline, themonitoring and control system monitors a single sensor, e.g., an alarmor security sensor, and/or a temperature sensor. In an alarm system,typically, this single sensor is a perimeter sensor, such as a door orwindow sensor. Given the binary nature of this sensor input, it is notpossible to further understand a sensed event, e.g., a potential alarmevent, in this situation other than as a singular open/close event.However, by combining multiple sensors, or sensor inputs, embodimentsare able to obtain a greater understanding of the potential alarm event.For example, combining an external motion sensor with a door or windowcontact may allow an embodiment to ascertain that there is a buildingenvelop penetration that originated from outside the building. With thisgreater understanding, more nuanced action(s) can be taken for thispotential alarm event. Further, it may be possible to deduce potentialalarm events when a primary sensor is either not present, unmonitored,or in an open or unknown state. As an example, it is common to leaveopen a window or door. Typically, it would not be possible to monitorentry of a person through the opening in this situation. However,combining exterior and interior motion detectors on either side of theopen window or door allows the monitoring and control system to followmotion from the outside, through the building envelop, and into theinterior. The monitoring and control system is then able to provide anuanced response in terms of the action to be taken, such as alerting ahome owner that someone may have entered the home through the openwindow.

As an example, with reference to FIG. 3, in one embodiment 300, adesignated area, in this case, the interior 315 of a building, is set upto be monitored for potential alarm events. Note that window or door 320is open. Typically, it is not possible to monitor entry of a personthrough this opening in this situation even though contact sensor 325 isinstalled, including both a sensor 325A on the door or window jamb, anda counterpart sensor 325B on the side or edge of the door or window.However, combining exterior sensor 330 (e.g., a motion detection sensoror video camera) and interior sensor 335 (e.g., a motion detectionsensor or video camera) on respective sides of the open window or doorallows the monitoring and control system to follow motion from theoutside, through the building envelop, and into the interior. Themonitoring and control system is then able to provide a nuanced responsein terms of the action to be taken, such as alerting a home owner thatsomeone may have entered the home through the open window.

Further in regard to the above described embodiments illustrated in theflow charts of FIGS. 1A-1C, the step of receiving a sensed event fromone or more of a number of sensors at 115 includes receivingnotification of one or more of the following enumerated potentialevents, including alarm events:

a typical entry door opened from inside,

a typical entry door opened from outside,

a typical entry door opened,

a non-typical entry door opened from inside,

a non-typical entry door opened from outside,

a non-typical entry door opened,

a non-used entry door opened from inside,

a non-used entry door opened from outside,

a non-used entry door opened,

a possible entry through closed window,

a possible entry through open door,

a window opened from inside,

a window opened from outside,

a window opened,

a possible entry through open window,

a cabinet or drawer opened,

a interior motion sensed,

an exterior motion sensed,

an exterior casing event detected,

a glass breaking detected,

a flood/water detected,

smoke detected,

CO2 gas detected,

a particular individual being tracked entering or exiting a designatedarea or area therein or portion thereof; and

a particular individual being sensed as present in, away from, adesignated area or area therein or portion thereof.

A brief description of each potential alarm event follows.

The typical entry door opened from inside: the criteria for detectingthis potential alarm event, with doorway (“Doorway”) limited to exteriordoorways that have been marked as typically utilized by the users forhome ingress or egress, includes motion being detected in an interiorarea (“Target Area”) that contains one or more Doorways, and within aperiod of time thereof (e.g., 2 minutes), in the Target Area, a doorcontact that is attached to a Doorway transitions from closed to open(“Target”).

The typical entry door opened from outside: the criteria for detectingthis potential alarm event, with doorway (“Doorway”) limited to exteriordoorways that have been marked as typically utilized by the users forhome ingress or egress, includes motion being detected in an exterior(“Target Area”) that is associated with one or more Doorways, and withina period of time thereof (e.g., 2 minutes), in the Target Area, a doorcontact that is attached to a Doorway transitions from closed to open(“Target”).

The typical entry door opened: the criteria for detecting this potentialalarm event, with doorway (“Doorway”) limited to exterior doorways thathave been marked as typically utilized by the users for home ingress oregress, a door contact that is attached to a Doorway transitions fromclosed to open (“Target”), and simultaneous to the Target activating, ifmotion is detected in an interior area (“Target Area”) that contains theTarget, then also note the Target Area but do not attempt to elevate theevent to Typical entry door opened from inside. This is due to thepotential of the door swinging open, or a person or object traversingthe doorway triggering the interior motion sensor. Note that neither“typical entry door opened from inside” or “typical entry door openedfrom outside” are in consideration in this event.

The non-typical entry door opened from inside: the criteria fordetecting this potential alarm event is the same as the “typical entrydoor opened from inside”, with doorway (“Doorway”) limited to exteriordoorways that have been marked as not typically or seldom utilized bythe users for home ingress or egress.

The non-typical entry door opened from outside: the criteria fordetecting this potential alarm event is the same as the “typical entrydoor opened from outside”, with doorway (“Doorway”) limited to exteriordoorways that have been marked as not typically or seldom utilized bythe users for home ingress or egress.

The non-typical entry door opened: the criteria for detecting thispotential alarm event is the same as the “typical entry door opened”,with doorway (“Doorway”) limited to exterior doorways that have beenmarked as not typically or seldom utilized by the users for home ingressor egress.

The non-used entry door opened from inside: the criteria for detectingthis potential alarm event is the same as the “typical entry door openedfrom inside”, with doorway (“Doorway”) limited to exterior doorways thathave been marked as not utilized by the users for home ingress oregress.

The non-used entry door opened from outside: the criteria for detectingthis potential alarm event is the same as the “typical entry door openedfrom outside”, with doorway (“Doorway”) limited to exterior doorwaysthat have been marked as not utilized by the users for home ingress oregress.

The non-used entry door opened: the criteria for detecting thispotential alarm event is the same as the “typical entry door opened”,with doorway (“Doorway”) limited to exterior doorways that have beenmarked as not utilized by the users for home ingress or egress.

The possible entry through open door: the criteria for detecting thispotential alarm event includes detecting motion in an exterior area(“Target Area”) that contains one or more exterior doors that arecurrently reporting back open, and within a period of time thereof,e.g., 30 seconds, in the Target Area, motion is detected in an interiorarea that contains the Target.

The window opened from inside: the criteria for detecting this potentialalarm event includes detecting motion in an interior area (“TargetArea”) that contains one or more exterior windows, and within a periodof time thereof, e.g., 2 minutes, in the Target Area, a window contactthat is attached to an exterior window transitions from closed to open(“Target”)

The window opened from outside: the criteria for detecting thispotential alarm event includes detecting motion in an exterior area(“Target Area”) that contains one or more exterior windows, and within aperiod of time thereof, e.g., 2 minutes, in the Target Area, a windowcontact that is attached to an exterior window transitions from closedto open (“Target”).

The window opened: the criteria for detecting this potential alarm eventincludes a window contact that is attached to an exterior windowtransitioning from closed to open (“Target”).

The possible entry through closed window: the criteria for detectingthis potential alarm event includes detecting motion in an exterior area(“Target Area”) that contains one or more exterior windows that arecurrently reporting back closed, and within a period of time thereof,e.g., 2 minutes, in the Target Area, a window contact that is attachedto an exterior window transitions from closed to open (“Target”), andwithin another period of time thereof, e.g., 30 seconds, in the TargetArea, motion is detected in an interior area that contains the Target.

The possible entry through open window: the criteria for detecting thispotential alarm event includes detecting motion in an exterior area(“Target Area”) that contains one or more exterior windows (“Target”)that are currently reporting back open, and within a period of timethereof, e.g., 30 seconds, in the Target Area, motion is detected in aninterior area that contains the Target.

The cabinet opened: the criteria for detecting this potential alarmevent includes a cabinet contact that is attached to a cabinettransitioning from closed to open (“Target”).

The interior motion detection sensed: the criteria for detecting thispotential alarm event involves detecting motion in an interior area(“Target Area”).

The exterior motion sensed: the criteria for detecting this potentialalarm event includes detecting motion in an exterior area (“TargetArea”).

The exterior casing: the criteria for detecting this potential alarmevent includes detecting motion in an exterior area (“Target Area”), andwithin a period of time thereof, e.g., 2 minutes of the last detectedTarget Area; motion is subsequently detected in another exterior areaimmediately adjacent to the Target Area; and at least 30%, or at least3, unique exterior motion sensors are triggered.

In one embodiment, with regard to the step of selecting an action to betaken responsive to the potential event and the occupancy state or theselected confidence level 120, the action to be taken represents theaction that could be taken by the monitoring and control system inresponse to the occurrence of a specific potential event or temperaturecontrol event in the designated area for a given occupancy state orconfidence level of an occupancy state. The action to be taken may rangefrom no action to be taken, through a simple, single-step response(e.g., send a signal to a temperature control system to turn on aheating/cooling system to adjust temperature in a room when the measuredtemperature in that room differs from a setpoint temperature configuredat one or more thermostats of the temperature control system, ortransmit a message to a particular authorized user upon detection of theuser entering or exiting the designated area), up to a multi-stepresponse that requires further interaction with multiple parties suchas, in the case of a security or alarm system, an unidentified person (apossible intruder), owner(s) of the designated area, or alarm eventresponders. In one embodiment, actions to be taken are ranked fromhighest to lowest priority. An action to be taken typically is atomic,meaning that it should be completed to its conclusion. The exception tothis is when a higher ranked actions is required by the monitoring andcontrol system, in which case a lower priority action may be suspendedin favor of the higher priority action.

Further with regard to the step of selecting an action to be takenresponsive to the potential alarm event and the occupancy state of auser with regard to a designated area, or the selected confidence level,one embodiment of the invention contemplates selecting one of thefollowing actions:

No response: the sensed event, e.g., a potential alarm event, is eitherconsidered a normal event in the designated area, or otherwise does notwarrant notification to or interaction with users. No action is to betaken.

Challenge an individual for authentication: an unknown or unidentifiedindividual has triggered a sensed event. This action challenges theindividual to identify themselves and elevate the action to be taken ifnecessary.

If the learned behavior confidence is at or exceeds some threshold,e.g., 80, then send a notification to all adult users of the monitoringand control system that the following LBC action, or actions arehappening and are going to auto-authenticate based on LBC details. Theadult users can then confirm or deny the LBC choice.

Broadcast on all connected display panels a request for the individualto identify themselves at a user interface to the monitoring and controlsystem, e.g., at a display panel.

Broadcast to all locally connected mobile communication deviceapplications a notification that an unidentified person may have enteredthe designated area, or one or more areas therein or portions thereof,and that authentication is required.

If unanswered after a timeout period, e.g., 20 seconds, repeat request.

If unanswered after 20 additional timeout period, then elevate theaction to be taken:

-   -   If the learned behavior confidence is above a moderate        threshold, e.g., 50 or above, then send a notification to all        adult users of the monitoring and control system that an        unidentified individual has entered the designated area, giving        the reason behind the LBC. An adult user can then confirm or        deny the LBC choice.    -   Otherwise, elevate the action to be taken to “raise an alarm”        and follow through on such actions.

Passively notify designated area (e.g., house) occupants: thecorresponding sensed event, e.g., a potential alarm event, while anormal event in the house, is at a high enough priority that it warrantsnotifying the occupants in a passive manner. For example, in a homewithout A/C or A/C turned off, when ambient temperature in a masterbedroom exceeds temperature outdoors, notify the occupants of such anevent. An occupant may elect at that time to open a window in the masterbedroom in an attempt to reduce ambient temperature.

Broadcast on all connected user display panels or local mobilecommunication device applications a passive notification that neitherrequires a user to respond nor interrupts any current user interfaceflow. The passive notification may be one of the following, depending onthe current settings of the user interface and each individual mobileapp: sound a chime; display a toast, or other like temporary textnotification, that contains the main event detail, or pulse the area onan avatar of the designated area where the sensed event occurred.

Notify the designated area (e.g., home) owner: the corresponding sensedevent, while a normal event in the house, is at a high enough prioritythat it warrants notifying only the owner (“target users”) of the sensedevent. The notification is delivered in a way that the information isavailable if needed, but doesn't impact the user's workflow. Typically,the notification needs to be acknowledged or dismissed by the user.

Broadcast on all connected panels a notification that doesn't requiresthe user's response: display a toast, or other like temporary textnotification, that contains the main event details; pulse the area onthe designated area avatar where the sensed event occurred.

Broadcast to all target users' mobile apps a notification. Typically,such notification would be delivered by the monitoring and controlsystem's push notification service 440. For example, a temperaturesensor or contact sensor for a deep freezer indicates defrosting willoccur at the current measured temperature, or the door is ajar for aminimum threshold period of time, e.g., 2 minutes. The monitoring andcontrol system in such a situation may broadcast to all target users'mobile apps a notification, using push notification service 440.

Notify the adult users of the designated area: this selected action tobe taken is the same as described herein for notifying the owner of thedesignated area (e.g., home owner) with the notifications delivered toall adult users of the house (“target users”).

Notify all users of the designated area: this selected action is thesame as described herein for notifying the owner of the designated area,with the notifications delivered to all users of the designated area(“target users”).

Send an alert to the trusted group: the corresponding sensed event is ata high enough priority that it warrants notifying a trusted group ofindividuals that the owner of the designated area has previouslyidentified (“target users”).

Note that the target users may not necessarily be users of themonitoring and control system, according to an embodiment. For example,one embodiment can bring a mobile app to the foreground with an alertmessage, potentially ringing as a telephony app. For all contact numbersnot associated with an active mobile app device, or for apps that do notconfirm that the app transitioned to the foreground, one embodiment mayinitiate a call to the target user's contact numbers.

Send an alert to the wider social neighborhood: the corresponding sensedevent is significant enough to warrant also notifying a wider socialgroup, either through the neighborhood-based software application orother third party services. Broadcast on all social groups connected tothe designated area an alert based on the sensed event. No response isrequired.

Raise an alarm: this action to be taken is a critical response to anactive threat situation, e.g., fire or intruder in the designated area,or area therein or portion thereof. Depending on the level of service,the following may be relevant:

-   -   if central station monitoring is subscribed, then send a threat        message to the appropriate central station;    -   if the confidence level of the occupancy state is at the lowest        level (e.g., homeowner input to UI that s/he is on vacation),        then raise an alarm to a delegated trusted group, if any;    -   raise an alarm to the designated area (home) owner;    -   if the home owner does not respond to the alarm, raise an alarm        to all other adult users of the designated area; and    -   sound the siren installed in the designated area.

Raising an alarm involves taking active steps to ensure that the targetusers are contacted, including causing a mobile app come to theforeground with an alert message, potentially ringing as a telephonyapp, and for all contact numbers not associated with an active mobileapp device, or for apps mentioned above that did not confirm that theapp transitioned to the foreground, an embodiment initiates a call tothe target user's contact numbers.

Transmit a message to an authorized user that has entered, or exited, adesignated area: when a user is detected entering or present in adesignated area, a message may be sent to the user, for example, at therequest of another use, or initiated by the monitoring and controlsystem. Likewise, when a user is detected leaving or way from adesignated area, a message may be sent to the user, for example, at therequest of another use, or initiated by the monitoring and controlsystem.

It is appreciated, as shown in the flow diagram of FIG. 1D, that theembodiments illustrated FIGS. 1A-1C can be optionally combined in anymanner. FIG. 1D further demonstrates an additional embodiment, in whichthe monitoring and control system receives input regarding a sensitivitylevel for the monitoring and control system at 111. Thus, the embodimentproceeds as generally described above: the monitoring and control systemreceives input at 105 indicating the occupancy state of, or for, a userwith regard to a designated area, the monitoring and control system thenoptionally selects one of the confidence levels regarding occupancystate of the user with regard to the designated area based on inputreceived at 105, optionally further based on the received geofencing orgeolocation information transmitted from one or more mobilecommunication devices 465 within or around the user and/or designatedarea at 106, and optionally further based on the received additionalinput about information relevant to or about the user or designated areaat 107. Based on one or more of these inputs, the monitoring and controlsystem optionally selects, at 110, the confidence level. The monitoringand control system receives at 115 one or more notifications of a sensedevent from one or more sensors 410 or mobile devices 465 situated withinor around the designated area, such as a user present in or away fromthe designated area, or the user entering or exiting the designatedarea. In this embodiment, some time prior to selecting the action to betaken responsive to the sensed event and, optionally, the selectedconfidence level, the monitoring and control system receives inputregarding the sensitivity level for the monitoring and control system at111. Then the system selects the action to be taken at 120 furtherresponsive to the received sensitivity level for the monitoring andcontrol system. In one embodiment, the monitoring and control systemreceiving input regarding the sensitivity level for the monitoring andcontrol system comprises receiving machine-learned input and/or userinput, for example, user input via the user interfaces described above,regarding the sensitivity level for the monitoring and control system.

It is appreciated that home owners will differ in the level of controlor action, e.g., communications or protection that they wish to receivefrom the system and in the aggressiveness of the controls, interactionsand actions provided in response to sensed events. The sensitivity levelof the monitoring and control system may either be explicitly set by orsolicited from a user, in one embodiment. The monitoring and controlsystem sensitivity levels vary from low to high, and may be enumerated,such as: low, moderate, and high.

With reference to FIG. 1E, one embodiment of the invention receivesadditional input at 112 relevant to or about a user and/or thedesignated area, or one or more areas therein or portions thereof, forexample, user input selecting a particular one or more rooms, or areas,or portions of the designated area, or temperature sensor(s) therein sothat the embodiment uses the temperature sensor(s) therein as the inputfor measuring temperature for a temperature control system or one ormore thermostats for the designated area; learned occupancy schedule ofa user (work/school/other of various occupants, e.g., building servicepersonnel on-site patterns); pattern of where and/or when mobilecommunication devices associated with the user are present (based onsuch devices being on the person of an occupant within the designatedarea), in or absent from, the designated area; time of day; day of week;seasonal-, holiday-, or personal observances of various occupants;current weather conditions; adverse and/or extreme weather conditions.In this regard, this step is similar to step 107 in which similarinformation is gathered either via user input, via sensors 410, or viamobile communication devices 465. However, in this embodiment, thisinformation, rather than being used by the monitoring and control systemto select one of the confidence levels regarding occupancy state of thedesignated area, is being used by the monitoring and control system toselect the action to be taken further responsive to the receivedadditional input. It is appreciated that this information being used insteps 107 and 112 need only be stored once, and the information can thenbe used by one or both steps. The information can be stored in adatabase 450, accessed and read into a local data store in memory 425and used by the monitoring and control system software application 420to perform steps 110 and/or 120.

The additional input about information relevant to or about a userand/or the designated area received at 107 or 112 can be thought of aslearned behavior qualifiers to the input received at 105, for example,from sensors 410. This information may be considered and provided as aweighting to the sensed events as discussed herein. Specifically, in oneembodiment, the weighting that is applied to the sensed event is a levelof confidence that the sensed event is expected, anticipated orotherwise behavior that has been learned by the system to be considerednormal (“Learned Behavior Confidence”, or “LBC”). The learned behaviorconfidence, in one embodiment, is a value that ranges from 0 to 100,where 0 represents no confidence that the sensed event is expected,anticipated or otherwise normal, up to where 100 represents that thesensed event is completely expected, anticipated or otherwise normal.

An embodiment of the invention can consider the learned behaviorconfidence when selecting the action to be taken at 120, and elevate orreduce the intensity of the action to be taken.

The following description enumerates learned behavior qualifiers and howeach may impact the value of the learned behavior confidence weighting:

Time of day: if the sensed event occurs and during the last time period(e.g., 30 days—adjustable time period) there was a similar sensed event(same target and target area) during the same time window (half hourbefore and after—adjustable window) then the LBC is weighted with thenumber of days this occurred out of the time period.

Learned schedule (work/school/other): pattern of when mobilecommunication devices are present or absent from the designated area/dayof week and/or learned pattern of occupancy establishment. If theindicated sensed event occurs while the confidence level regarding theoccupancy state is currently at its lowest confidence or low confidencelevel, and during the last time period (30 days—adjustable time period)there were: one or more mobile communication devices present on at leastthree of the preceding same day of the week, or confidence levelregarding the occupancy state for the designated area was at the highestlevel on at least three of the preceding same days of the week, then theLBC is set to the percentage with the number of days that the behaviorwas present on this specific day of the week in the last preceding6-month time window.

Service personnel patterns: this is handled in a manner similar to theabove described learned schedule.

Seasonal observances and/or holidays—discount the learned schedule. Inone embodiment, these items cause the learned schedule to not beapplied, or may reduce the weighting by it a certain percentage.

Adverse current weather conditions, e.g., extreme temperature: if theoccupancy state occurs while the confidence level of the occupancy stateis currently at the lowest confidence level or low confidence level, andthe current weather conditions are currently abnormal (tornado,blizzard, etc.) or the temperate can be considered extreme for the area(either cold or hot extremes), then set LBC to 50 percent on theassumption that individuals may be in the designated area (e.g., ahouse) that otherwise would be outside or working.

With regard to FIG. 1F, one embodiment of the invention receives inputselecting an occupancy state transition sensitivity level at 108. Themonitoring and control system then optionally selects the confidencelevel regarding occupancy state of the designated area further inresponse to the selected occupancy state transition sensitivity level.In one embodiment, the occupancy state transition sensitivity level maybe selected as one of the following: a lowest sensitivity level, a lowsensitivity level, a moderate sensitivity level, a high sensitivitylevel, and a highest sensitivity level. Thus, this embodiment mayproceed as generally described above, but further including the step ofthe monitoring and control system selecting one of the confidence levelsregarding occupancy state of a user with regard to the designated areabased on the selected occupancy state transition sensitivity level, inaddition to input received at 105 indicating the occupancy state for auser with regard to the designated area, optionally further based on thereceived geofencing or geolocation information transmitted from one ormore mobile communication devices 465 within or around the user and/orthe designated area at 106, and optionally further based on the receivedadditional input about information relevant to or about the user and/ordesignated area at 107.

In this embodiment, selecting the confidence level regarding occupancystate of the user with regard to the designated area further based onthe selected occupancy state transition sensitivity level affects thetime at which the monitoring and control system switches to the selectedconfidence level. To that end, each occupancy state transitionsensitivity level is associated with a schedule or period of time todelay or wait before transitioning to the selected confidence levelregarding occupancy state of the designated area. In this embodiment,the monitoring and control system optionally receives input regardinglearned behaviors of individuals that have occupied the designated area,and adjusts the associated schedule for transitioning to the selectedconfidence level regarding occupancy state of a user with regard to thedesignated area, based thereon. In such an embodiment, the confidencelevel is selected according to the adjusted associated schedule fortransitioning to the selected confidence level regarding occupancy stateof the designated area.

Ideally, the monitoring and control system transitions betweenconfidence levels of occupancy states with perfect and completeinformation and immediately following an occupant's actions or otherrelevant system input, sensor or otherwise. In practice, according toone embodiment, the monitoring and control system may delaytransitioning to a new occupancy state confidence level for a period oftime in order to gain confidence regarding an occupant's actions, withan appreciation that reducing the time required to transition from oneoccupancy state confidence level to another occupancy state confidencelevel is beneficial. In this embodiment, the sensitivity level of themonitoring and control system with respect to occupancy state confidencelevel transitions is first set through an occupancy state transitionsensitivity level which is either explicitly set by or solicited from auser. The occupancy state transition sensitivity levels vary from lowestto highest, as enumerated above. The selected occupancy state transitionsensitivity levels map to a timeout which this embodiment uses beforetransitioning to another occupancy state confidence level. Each specificuse of the occupancy state transition sensitivity level has its ownunique set of timeouts, tailored to the specific transition, and aredefined as set forth below.

In one embodiment, following an initial timeout value, there can be oneor more optional learned behaviors that the monitoring and controlsystem can calculate and use to reduce the timeout. Like the initialoccupancy state transition sensitivity level, these learned behaviorsreduce the timeout in a specific way for each unique use.

Occupancy State Transition Sensitivity Level for No Motion Detectionafter Exit

After a potential exit of an individual from the designated area hasbeen detected, the embodiment waits for a certain period of time beforetransitioning from the highest confidence level of occupancy state.Table 1, below, suggests the time period to wait parameter, according toan embodiment.

TABLE 1 Occupancy state transition sensitivity level for no motiondetection after exit Occupancy state transition sensitivity level Timeto wait after exit detected Lowest 8 hours Low 4 hours Moderate 1 hourHigh 30 minutes Highest 15 minutes

The following learned behaviors can be calculated and reduce the time towait value. A histogram of previous activity strongly suggests that allowners or managers of the designated area (e.g., home owners) are awayduring this time window. For example, over the past recent time period(e.g., 30-day history, current day of the week, 60-day history, orbi-weekly current day of week), the designated has been unoccupiedduring this same time window (plus or minus 15 minutes from the currenttime). In this situation, if the value of the time to wait parameter is:

greater than a first minimum threshold of time (e.g., 95%), then set thevalue of the time to wait parameter to the highest value; or greaterthan a second minimum threshold of the time (e.g., 80%) which is lessthan the first minimum threshold of time, then reduce the time to waitparameter to half of the current value.

The following learned behaviors can be calculated to increase orotherwise adjust the value of the time to wait parameter. A histogram ofprevious activity strongly suggests that the designated area is occupiedor likely occupied only by one or more unidentified occupants (forexample, people not positively tracked by identified user tracking asdescribed elsewhere herein). For example, over the past recent timeperiod (e.g., 30-day history, current day of the week, 60-day history,or bi-weekly current day of week), an exit event was detected duringthis same time window (plus or minus 15 minutes from the current time)and the designated area subsequently had an internal motion detectionevent (a “triggering motion event”) that caused a transition from aconfidence level of occupancy state of low confidence, high confidence,or highest confidence to the highest confidence level of occupancystate. In this situation, if the value of the time to wait parameter is:

-   -   greater than a first minimum threshold of the time (e.g., 95%)        then set the value of the time to wait parameter to an interval        of time between now and the average triggering motion event; or    -   greater than a second minimum threshold of time, which is less        than the first minimum threshold of time (e.g., 70%), then        increase the value of the time to wait parameter to an interval        of time between now and the average triggering motion event.

Occupancy State Transition Sensitivity Level for No Motion for ExtendedPeriod

After a long period of inactivity in the designated area, the monitoringand control system, according to one embodiment, may begin to build alevel of confidence that all occupants have left and the designated areais now empty. Table 2 below sets out the time period to wait.

TABLE 2 Occupancy Sensitivity Level for No Motion for Extended PeriodOccupancy state transition sensitivity level Time to wait for no motiondetection Lowest 24 hours Low 20 hours Moderate 18 hour High 16 hoursHighest 14 hours

The following learned behaviors can be calculated and reduce the valueof the time to wait parameter. A histogram of previous activity stronglysuggests that the owner(s) of the designated area (e.g., home owners)are away during this time window. For example, over the past recenttime-period (e.g., 30-day history, current day of the week, 60-dayhistory, bi-weekly current day of week), the designated area has becomeunoccupied during this same time window (plus or minus 15 minutes fromthe current time). In this situation, if the value of the time to waitparameter is greater than a first minimum threshold of time (e.g., 95%of the time), then set the value of the time to wait to the highestvalue, or greater than a second minimum threshold of time (e.g., 80% ofthe time), then reduce the value of the time to wait parameter to halfof the current value.

If minors are present in the designated area, set the value of the timeto wait parameter to at least the value associated with the highoccupancy state transition sensitivity level. If the last motiondetection ended in a particular area, such as a bedroom area, and nomotion was detected in the adjoining exit way, then a longer period ofwaiting is appropriate, in which case set the value of the time to waitparameter to the value associated with the low occupancy statetransition sensitivity level.

With reference to FIGS. 1G and 4, embodiments of the invention 100, 400cause a monitoring and control system to optionally receive input at 105indicating the occupancy state of, or for, a designated area, such as ahouse, one or more rooms or areas in the house, a building, one or morerooms or areas in the building, a gated community, a group of buildings,a campus, a public or private venue, a geo-fenced area defining anyportion or combination thereof, and any portions or combinationsthereof. This input helps inform the monitoring and control system ofthe likelihood that there are occupants in the designated area, or inone or more of a plurality of areas therein or portions thereof. Basedon this input, the monitoring and control system may, optionally,select, at 110, a confidence level of the occupancy state for thedesignated area, or one or more of a plurality of areas therein orportions thereof (boxes 105 and 110 in the flowchart of FIG. 1G areshown in a dashed line to indicate optional steps in embodiments of theinvention). In one embodiment, the confidence level is selected from oneof a number of confidence levels regarding occupancy state of thedesignated area, or regarding one or more of a plurality of areastherein or portions thereof.

With reference to the example 700 depicted in FIG. 7, the monitoring andcontrol system next receives input at block 115 in the form of one ormore sensed events, such as described above with reference to FIGS.1A-1F, e.g., events E1, E2 and E3. To illustrate by way of example,assume E1=detection of a glass break event at a particular location,say, a master bedroom window, occurring at a particular time, say, lateat night, e.g., 12:05 AM; E2=detection of a motion event at a nearbylocation, say, within the master bedroom, occurring at a particular timeimmediately thereafter, say, 12:06 AM; and E3=detection by a microphoneor noise sensor of a quick succession of loud noise events, say, shotsfired, in the same location, i.e., within the master bedroom, occurringat a particular time shortly thereafter, say, 12:10 AM.

Logic, according to embodiments of the invention, e.g., logic beingexecuted by system software application 420, can select one or more of aplurality of actions to take in response to one or more events takingplace over a period of time. In the above, straightforward, example, itcertainly appears that an intruder has broken and entered a home andfired a weapon successive times presumably at an occupant (indeed, theremay be another one or more events previously detected (earlier in theevening or concurrent with the events described in this example) thatsuggest with a high confidence level that the master bedroom isoccupied).

According to one embodiment, the logic identifies at block 116, for eachevent (e.g., events E1, E2, E3) taken independently, that is, by itselfand without regard to detection of other events possibly related basedon time or location of occurrence, if any, a probability, P, for takingeach of one or more possible actions in response to the event. Forexample, for event E1 (glass break detection), assume some number, n, ofpossible actions (A) may be taken, the first possible action (A1) beingturning on an alarm of some type at some location, e.g., a sound alarmon the premises in response to glass break detection, the secondpossible action (A2) being sending a communication to the home owner,e.g., sending a text message to the home owner's mobile device notifyingdate, time and location of glass break detection, and the nth possibleaction (An) being sending a communication to the police or 911 services,e.g., initiating a silent alarm to police services. In this example,there might be a high probability (P_A1) assigned to taking action A1,such as sounding an alarm on premises, and likewise a high probability(P_A2) assigned to taking action A2, such as sending a communication tothe homeowner, but less probability (P_An) assigned of taking action An,such as calling police or 911 services, since it's not entirely clearthat an emergency of such significance has occurred that police servicesshould be called.

However, according to embodiments of the invention, the probabilityidentified or assigned to taking any particular action in the occurrenceof an event may differ, dynamically, and in real time, based on manyfactors, such as the type of event, the sequence and timing of theoccurrence of the event in relation to the occurrence of other events(i.e., the age of an event relative to other events, a weight assigned(and that may change or decay over time) to the event based on theevent's absolute age or age relative to a weight assigned to otherevents based on their age), the location of the event in relation to thelocation of other events, the expiration of an event (as the event endsor as it is dropped due to its age), the type of action, and externalfactors as well, such as learned occupancy schedule, pattern of whereand/or when mobile communication devices are present in, or absent from,the designated area, time of day, day of week, seasonal-, holiday-, orpersonal-observances or patterns of various occupants, current weatherconditions, and adverse and/or extreme weather conditions. Informationabout events, including patterns regarding timing, location, andfrequency of occurrence, and information about external factors, and theextent to which they influence events based on the age of the externalfactors, may all be maintained in a database, e.g., database 450,accessible to the system software application 420. This information maybe gathered over time, and used as input to a machine learning algorithmthat calculates and identifies or assign a probability for taking anaction in response to an event using the gathered information.

Continuing with the example, for event E2 (motion detection), assume thesame possible actions may be taken, the first possible action (A1) beingturning on an alarm of some type at some location, e.g., a sound alarmon the premises in response to motion detection, the second possibleaction (A2) being sending a communication to the home owner, e.g.,sending a text message to the home owner's mobile device notifying date,time and location of motion detection, and the nth possible action (An)being sending a communication to the police or 911 services, e.g.,initiating a silent alarm to police services, in response to motiondetection. In this example, there might be a moderate or low probability(P_A1) of taking action A1, sounding an alarm on premises, based onevent E2 by itself (since, for example, a home owner may often timesarise during the night to relieve him or herself), and likewise amoderate or low probability (P_A2) of taking action A2, sending acommunication to the homeowner, and perhaps less probability (P_An) oftaking action An, calling police or 911 services, since it's not likelyan emergency of such significance has occurred that police servicesshould be called based on the occurrence of event E2 by itself. Note,too that, while this example contemplates identifying the same threepossible actions (A1, A2 and An) upon the occurrence of events E1 andE2, it is appreciated that there may be less or no overlap between thepossible actions to be taken upon the occurrence of one event versusanother event. For example, a first event (E1) may have associated withit or be responded to with possible actions A1, A2, A4, and A6, whateverthose actions are, whereas a second event (E2) may have associated withit possible actions A1, A3, A4 and A5.

Continuing further with the example, for event E3 (noise detection),again assume the same possible actions may be taken, the first possibleaction (A1) being turning on an alarm of some type at some location,e.g., a sound alarm on the premises in response to the noise detection,the second possible action (A2) being sending a communication to thehome owner, e.g., sending a text message to the home owner's mobiledevice notifying date, time and location of noise detection, and the nthpossible action (An) being sending a communication to the police or 911services, e.g., initiating a silent alarm to police services, inresponse to the noise detection. In this example, there might be a highprobability (P_A1) of taking action A1, sounding an alarm on premises,based on event E3 by itself, and likewise a high probability (P_A2) oftaking action A2, sending a communication to the homeowner, and perhapstoo a high probability (P_An) of taking action An, calling police or 911services.

At block 117, logic then calculates, for each of the possible actions,e.g., for each of possible actions A1—turning on an alarm of some typeat some location, A2—sending a communication to the home owner, andAn—sending a communication to the police or 911 services, an overallprobability (OP_A1, OP_A2, and OP_An) for taking the action based on theidentified probabilities for taking the action in response to theevents. Thus, according to the example, logic at block 117 calculates anoverall probability (OP_A1) for taking the first action A1, based on theidentified probability (P_A1) of taking the first action A1 in responseto event E1, the identified probability (P_A1) of taking the firstaction A1 in response to event E2, and the identified probability (P_A1)of taking the first action A1 in response to event E3. Likewise, logicat block 117 calculates an overall probability (OP_A2) for taking thesecond action A2, based on the identified probability (P_A2) of takingthe second action A2 in response to event E1, the identified probability(P_A2) of taking the second action A2 in response to event E2, and theidentified probability (P_A2) of taking the second action A2 in responseto event E3. Finally, logic at block 117 calculates an overallprobability (OP_An) for taking the nth action An, based on theidentified probability (P_An) of taking the nth action An in response toevent E1, the identified probability (P_An) of taking the nth action Anin response to event E2, and the identified probability (P_An) of takingthe nth action An in response to event E3.

There are any number of ways to calculate the overall probability OP fortaking an action based on the identified probabilities for taking theaction in response to one or more separate events. According to oneembodiment, the calculation may be accomplished using the followingequation:

P_An=1−(1−E1:P_An)*(1−E2:P_An)*(1−E3:P_An)

where n=a number associated with a particular action, such as n=1 toindicate a first possible action to be taken, n=2 to indicate a secondpossible action, etc. With this equation, the more events involved, evenif the probability for taking a particular action in the case of eachevent is modest or low, the probability increases to a value that canmore likely exceed the threshold beyond which the possible action willindeed be taken.

At block 120, logic then selects one or more of the possible actions(A1, A2 and An, in our example) to be taken in response to the events(E1, E2 and E3, in our example) and based on the calculated overallprobability for taking the action, for each of the one or more possibleactions, exceeding a respective threshold. Thus, in this example, logicselects action A1 in response to events E1, E2 and E3, based on thecalculated overall probability OP_A1 for taking action A1 exceeding arespective threshold T_OP_A1 (118), selects action A2 in response toevents E1, E2 and E3, based on the calculated overall probability OP_A2for taking action A2 exceeding a respective threshold T_OP_A2 (118), andselects action A3 in response to events E1, E2 and E2, based on thecalculated overall probability OP_A3 for taking action A3 exceeding arespective threshold T_OP_A3 (118). It is contemplated in theembodiments that, depending on the various threshold probability valuesset for taking each action, and the calculated overall probability fortaking each action, zero or more actions to be taken may actually beselected in a given set of circumstance.

In one embodiment, comparison of the threshold against the calculatedoverall probability for taking the action, for each of the one or morepossible actions, is performed instantaneously. In another embodiment,the threshold must be exceeded for a period of time before the selectedaction is taken. In one embodiment, the threshold is static, but inother embodiments, the threshold is dynamic, and the dynamic thresholdmust be exceeded for the entire duration of the period of time beforethe selected action is taken.

Just like the probability identified or assigned to taking anyparticular action in the occurrence of an event may differ, dynamically,and in real time, based on many factors, as described above, likewise,the threshold values against which the calculated overall probabilitiesfor taking action are compared, may be set to a value, dynamically, andin real time, based on many factors, such as the type of an event, thesequence and timing of the occurrence of the event in relation to theoccurrence of other events, the location of the event in relation to thelocation of other events, the type of action, and external factors aswell, such as learned occupancy schedule, pattern of where and/or whenmobile communication devices are present in, or absent from, thedesignated area, time of day, day of week, seasonal-, holiday-, orpersonal-observances or patterns of various occupants, current weatherconditions, and adverse and/or extreme weather conditions. Informationabout thresholds, and information about external factors that influencethresholds, may all be maintained in a database, e.g., database 450,accessible to the system software application 420. This information maybe gathered over time, and used as input to a machine learning algorithmthat assigns a threshold for a probability for taking an action inresponse to one or more events, using the gathered information.

The embodiment described above with respect to FIGS. 1G, 4 and 7, can bemodified according to other the embodiments described herein above withrespect to FIGS. 1A-1F. For example, with reference to FIG. 1H, theembodiment illustrated therein is modified relative to the embodimentdescribed above with respect to FIGS. 1G, 4 and 7. In particular, withreference to FIGS. 1H and 4, embodiments of the invention 100, 400 causea monitoring and control system to receive input at block 105 indicatingthe occupancy state of, or for, a designated area, such as a house, oneor more rooms or areas in the house, a building, one or more rooms orareas in the building, a gated community, a group of buildings, acampus, a public or private venue, a geo-fenced area defining anyportion or combination thereof, and any portions or combinationsthereof. This input helps inform the monitoring and control system ofthe likelihood that there are occupants in the designated area, or inone or more of a plurality of areas therein or portions thereof. Basedon this input, the monitoring and control system then selects, at block110, a confidence level of the occupancy state for the designated area,or one or more of a plurality of areas therein or portions thereof(boxes 105 and 110 in the flowchart of FIG. 1H are shown in a solid lineto indicate non-optional, or required, steps in embodiments of theinvention). In one embodiment, the confidence level is selected from oneof a number of confidence levels regarding occupancy state of thedesignated area, or regarding one or more of a plurality of areastherein or portions thereof.

Logic at blocks 115, 116 and 117 of FIG. 1H operate according to theembodiment described above with respect to FIG. 1G and so will not berepeated here. However, the monitoring and control system selects atblock 120 in FIG. 1H an action to be taken based on one or more of thesensed events, the occupancy state obtained at block 105 or the selectedconfidence level obtained at block 110, and in response to thecalculated overall probability for raking the action exceeding athreshold 118 as described above with respect to this component of block120 in FIG. 1G.

Likewise, the embodiments described above in connection with FIGS. 1G,1H, 4 and 7 may likewise be modified according to any one of theembodiments described above in connection with FIGS. 1B-1F. For example,to take advantage of the features available in the embodiment describedwith respect to FIG. 1B, the embodiments described above in connectionwith FIGS. 1G, 1H, 4 and 7 may be modified to receive input from mobilecommunications device at block 106, and the action selected at block 120takes in to account that input accordingly. As another example, to takeadvantage of the features available in the embodiment described withrespect to FIG. 1C, the embodiments described above in connection withFIGS. 1G, 1H, 4 and 7 may be modified to receive input regarding adesignated area at block 107, and the action selected at block 120 takesin to account that input accordingly. Similarly, to take advantage ofthe features available in the embodiment described with respect to FIG.1D, the embodiments described above in connection with FIGS. 1G, 1H, 4and 7 may be modified to receive system sensitivity level input at block111, and the action selected at block 120 takes in to account that inputaccordingly. To take advantage of the features available in theembodiment described with respect to FIG. 1E, the embodiments describedabove in connection with FIGS. 1G, 1H, 4 and 7 may be modified toreceive system sensitivity level input at block 111, and receive inputregarding a designated area at block 112, and the action selected atblock 120 takes in to account such input accordingly. Finally, thefeatures of the embodiment described with respect to FIG. 1E may beincorporated into the embodiments described above in connection withFIGS. 1G, 1H, 4 and 7 to receive input regarding occupancy statetransition sensitivity level at block 108, and the action selected atblock 120 takes in to account that input accordingly.

As described herein, embodiments of the invention provide for monitoringof individuals, and in particular, transmitting messages, such aspersonalized home productivity messages, to an individual, for example,when the individual enters or exits a designated area, or one or more ofa plurality of areas therein or portions thereof. To that end,embodiments of the invention may have a console, display panel, monitor,or other display device or user interface 430 located at typical, main,or major, exterior doors, or ingress/egress points for the one or moreareas therein or portions thereof. Any one of these devices may includeor be combined with components such as a display, touchpad, speaker,microphone, proximity sensor, camera, and connectivity andcommunications (wireless or wired) to couple the device to the system400. Such a device may use facial or gesture recognition to identifyindividuals which are in range of the device, and if the device detectsa known occupant or authenticated user, the device can present to, orreceive information from, the known occupant/authenticated user. Theinformation presented, whether in audible and visual form, or both, isdynamic and can be tailored by the system 400 for that particularindividual. For example, one occupant, a mother, may tell the system,either by way of input at this device or through a mobile communicationdevice 465 (for example, a smart phone) which is in communication withthe system, to transmit a message to another occupant, e.g., her son, toperform some task, e.g., unload the dishwasher, at some point in timeafter entering the designated area, e.g., upon the son coming home fromschool. In this example, when the son walks through an entry point tothe designated area, e.g., walks through the front door of a house, thesystem recognizes him through facial detection or via smart devicegeolocation and proximity. The system displays a visual notification onthe display screen of the device, and/or may provide an audibleannouncement, regarding the message received from the mom. The systemcan receive further input via the device or the son's mobilecommunication device confirming receipt of the message.

A messaging service according to this embodiment may also provide statusof a location of (i.e., location information for) a resident/occupant toother occupants or participants in the system, via a display device suchas user interface 430, or via an application executing on a mobilecommunications device 465. The service can provide detailed informationregarding when someone is in the designated area, or one or more of aplurality of areas therein or portions thereof, and when someone is awayfrom the designated area, or one or more of a plurality of areas thereinor portions thereof, as well as a history of when someone was located inor outside a designated area over a given period of time. If known, theservice can provide information as to the current (exact) location of anoccupant, and if someone is away from a designated area, when he or sheis expected to return (as discerned through mobile device geolocation orscheduling interpretation).

The user interface device 430, or the like, located at one or more mainexternal doors or ingress/egress points for a designated area, alongwith a display screen, camera and speaker, with facial recognitioncapability, provides for individually targeted messages upon someoneentering or exiting a designated area, e.g., a building. According toembodiments, individuals can sent messages about upcoming tasks, events,schedules, and reminders. such tasks, events, schedules, and reminderscan be geolocation-specific and combined with other inputs, such asoccupancy state information received at 105, selected confidence levelsregarding occupancy state at 110, sensed events at 115, mobilecommunications device input at 106, input received regarding adesignated area at 107 and at 112, input received regarding systemsensitivity level at 111, and input received regarding occupancy statetransition security level at 108, all of which as described above withreference to FIGS. 1A-1F. For example, embodiments of the invention canreview a long-term weather forecast indicating upcoming freezingtemperatures, initiate a reminder to have your exterior water pipesemptied of standing water before a freeze occurs. And even contact theservice provider through email or other messaging service to schedule aservice call.

Embodiments of the invention as described above also provide for agingin place for elderly residents, or similarly, attending to young personsin place. Embodiments of the invention, over time, collect baselinestatistics of the movement patterns of residents/occupants, and then candetect and issue one or alerts regarding deviations from the baseline.For example, embodiments can track when a specific resident/occupantusually arrives in a designated area, or one or more of a plurality ofareas therein or portions thereof, for example, in the morning, themovement patterns of the resident/occupant during the day (from room toroom, leaving and returning to the designated area during the day,etc.), and the time the resident/occupant leaves the designated area, orgoes to bed. Likewise, activity during the night can be monitored, suchas when a resident is getting up regularly during the night, and whetherthe resident sleeps soundly or rolls around in bed. Motion sensors bothin the bed itself, and in the bedroom in general, allow the system todetect quality of sleep in bed or someone pacing around the room duringthe night. Once captured and stored in database 450, these baselinepatterns can be shared with the resident/occupant, family members, oreven the resident's medical practitioners or therapists. Thisinformation may be used by such practitioners as indicative of changesin health, onset of dementia, or complications associated withmedications, as examples. The lack of movement during a period of time,or an obvious erratic movement pattern, can initiate emergencyescalations to a medical call center (rather than a security callcenter) or trusted individuals.

Embodiments can also provide protection for residents or occupants withdementia, developmental or mental disabilities, or similar conditions.People suffering with such afflictions have been known to wander awayfrom the residences, potentially with inadequate clothing, and oftenbecome lost without knowing their identity or address. Embodiments ofthe invention can identify when a particular occupant is passing throughan exit by raising an audible alert or alarm, and sending notificationsto appropriate personnel. Likewise, embodiments can also provideprotection for young residents or occupants, e.g., babies, toddlers,young children. Young people could walk away from the residences, orwalk through a door or gate to an area where there may be adverseconditions (e.g., exiting a house without proper clothing on a very hotor very cold day), or hazards, such as a pool, hot tub, or busy street.Embodiments of the invention can identify when a particular occupant ispassing through an exit by raising an audible alert or alarm, andsending notifications to appropriate personnel, whether the person himor herself, or to others on or off the premises.

Embodiments of the invention equipped with a sensor network whichdetects body position can determine if an occupant has fallen, and ifthe occupant has difficulty getting back up. If so, emergency alerts canbe generated and transmitted. Embodiments equipped with a sensor networkwhich detects vital signs (e.g., respiration, blood pressure, heartrate), the system can determine when an occupant may be in distress suchas when the vital signs change quickly, and/or appreciably, from abaseline, and generate and transmit appropriate emergency alerts. Inaddition, embodiments can compare vital signs measured before or when anoccupant left a designated area with vital signs measured after or whenthe occupant returned to the designated area and generate an alert thatindicates a change in health of the occupant while the occupant was outof the designated area.

Embodiments of the invention further provide for health and wellnessmonitoring. Goal tracking activity reminders and calculators caninteract with an occupant as the occupant enters or exits a designatedarea. The system can connect, via wireless or wired means, to smart pillholders, which can detect whether an occupant has taken medication atthe normal or prescribed time or not. The system can remind the occupantthat he or she needs to take medication, especially as the occupant isexiting the premises without his or her medication.

As mentioned above, embodiments of the invention may be linked tooutside service providers. As the system learns and recognizes thelikely schedules of occupants, the system can autonomously schedulerepair or service visits with a service provider who is part of atrusted network as the system knows when a homeowner is likely to behome. In addition, for systems which monitor movement in a building, thesystem can track a repair technician to monitor his or her movementswithin the building and can generate and transmit a message to an owneror generate an audible alarm when the technician ventures into areas ofthe building in which they have no need or authorization to go. Manyhome owners, due to scheduling constraints, leave service providersalone in a home or business. According to embodiments of the invention,however, a service provider such as a plumber working in a kitchen maybevirtually fenced by an owner to the kitchen, foyer and a connectedbathroom only. If the plumber wanders off, for example, toward thebedrooms, an alarm can be sounded or a message sent to the ownerregarding the change in status. For large renovations, often when ownerstemporarily move out of a building as it is being renovated, insurancemay require logging of the ingress and egress of service personnelworking on site. Embodiments of the invention can automatically log allingress and egress times which conforms to the requirements. Also, cityand utility services can send out alerts that service personnel forexample, a meter reader, will be at a residence at a certain time, togive notice to the building owner. A photo of the service personnel mayeven be shared for greater authentication.

In addition, embodiments of the invention provide for a messaging andwatch system for an entire designated area. If, for example, an unknownperson is tracked by the system knocking on more than one door in anapartment complex, the system can alert all tenants of the activity, andalert a particular unit's occupant before he or she answers the knock athis or her door.

FIG. 4 illustrates a computing environment in which an embodiment of theinvention may operate. The monitoring and control system softwareapplication 420 is a central component of the monitoring and controlsystem. It runs in a continual processing cycle on local controller 405in or proximate to the designated area, receiving and using a variety ofinputs as described herein with regard to FIGS. 1A-1F and 2. Theapplication's main loop receives input from the set of sensors 410coupled in communication with the controller 405. This may beaccomplished either through a notification push from a sensor orhardware interface, or via a polling mechanism. The application receivesnon-sensor inputs from components within or cooperating with themonitoring and control system, such as from user interface 430, clients470 (e.g., laptop or desktop computers, and software applicationsexecuting thereon, that may perform some or all of the same or similarfunctions as user interface 430, mobile communication devices,geofencing application 435, etc.), and mobile communication devices 465,and from non-monitoring and control system inputs, which may include:geo location data of mobile communication devices 465; geo fencing dataprovided by application 435; historical schedule information for knownusers stored in database 450 that is retrieved and stored in a localdata store of memory 425; facial identification or gesture recognitionof individuals by cameras either embedded in a console, display panel,monitor, or other display device or user interface 430, or a stand-alonecamera; explicitly provided user or occupant schedules; time of day; dayof week; time of year; current calendar information for known systemusers; sun rise and sunset times; weather; etc.

It is appreciated that the monitoring and control system softwareapplication 420, while described above as a software application whollyexecuting on local controller 405, could, in other embodiments, resideon and be executed by one or more application servers 460 in a cloudcomputing environment. In such an embodiment, functionality of themonitoring and control system software may be distributed across one ormore monitoring and control system application server(s) 460 and localmonitoring and control system software application 420. For example,monitoring and control system software application 420 may be littlemore than a web browser-based software application that gathersinformation and input from one or more of sensor software applications415, user interface 430, geofencing software application 435, and mobilecommunication devices 465, and then accesses the monitoring and controlsystem application server 460 via network interface and protocols 445.The monitoring and control system software application 420 may interactwith a corresponding monitoring and control system software applicationexecuting on system application server 460 via, for example, a webportal. In such an embodiment, the software 420 forwards suchinformation and input to application server 460, where the monitoringand control system software application executing on application server460, operating in conjunction with information stored in an associateddatabase 455, performs such steps as selecting a confidence level at110, or selecting an action to be taken 120. Monitoring and controlsystem software executing on application server software 460communicates any output to monitoring and control system software 420 inresponse thereto, and the monitoring and control system software 420, inturn, communicates with (e.g., provides output to be delivered to) oneor more of the sensor software applications 415, local datastore inmemory 425, user interface 430, geofencing software application 435, andmobile communication devices 465. Alternatively, some devices orapplications, such as geofencing software application 435, or mobilecommunication devices 465, may communicate directly with monitoring andcontrol system software executing on application server 460. In anotherexample, functionality of the monitoring and control system software maybe distributed across one or more monitoring and control systemapplication server(s) 460 and local monitoring and control systemsoftware application 420 in such manner that the monitoring and controlsystem software application executing on application server 460 performssome of the steps while the local monitoring and control system softwareapplication 420 performs other of the steps. The distribution of tasksmay be configured, or context sensitive, for example, based onprocessing needs and/or resources. For example, in the event of a timeout in communications between monitoring and control system applicationservers 460 and monitoring and control system software application 420,monitoring and control system software application can perform tasksthat software executing on the application server 460 otherwiseperforms.

Application 420 further pushes the received data to a main event storedatabase 450, and, optionally, to the local history, massage data toensure a consistent format, eliminate superfluous events, de-duplicatepolled sensor data and extend an existing entry's trigger time, timestamp normalization, etc.

Application 420 further maintains a list of occupancy state objects,event objects for both current sensed events as well as potential sensedevents that are under being evaluated. The objects encapsulate and trackthe criteria for each object type, including the starting/triggeringinput, all subsequent sensors that contribute to the potential sensedevent and any potential confidence weighting of the potential sensedevent.

Application 420 manages the occupancy state and sensed eventobjects—triggered on a timed-basis, or upon receipt of new data to:evaluate the under-consideration transitions of confidence levels ofoccupancy state and sensed event objects based on the triggers,conditions and rules described herein, specifically the enumeratedconfidence levels of occupancy states and enumerated potential alarmevents.

Application 420 also manages the action to be taken objects—triggered ona timed-basis or upon creation of new sensed event objects, includingcreating a new sensed event object as a result of the intersection ofnewly transitioned confidence level of occupancy state, sensed event,and monitoring and control system sensitivity objects, processing theon-going action to be taken object based on the rules outlined in theenumerated actions to be taken discussion, including actions such astransmitting mobile communication device push notifications toappropriate users, initiating various alarm conditions as appropriate,transmitting notifications to social media as appropriate, andchallenging an unknown user via a user interface console.

In this description, numerous specific details are set forth such asexamples of specific systems, languages, protocols, components, etc., inorder to provide a thorough understanding of the various embodiments. Itshould be apparent, however, to one skilled in the art that thesespecific details need not be employed to practice the embodimentsdisclosed herein. In other instances, well known materials or methodshave not been described in detail in order to avoid unnecessarilyobscuring the disclosed embodiments.

In addition to various hardware components depicted in the figures anddescribed herein, embodiments further include various operations asdescribed above. The operations described in accordance with suchembodiments may be performed by hardware components or may be embodiedin machine-executable instructions, which may be used to cause ageneral-purpose or special-purpose processor programmed with theinstructions to perform the operations. Alternatively, the operationsmay be performed by a combination of hardware and software.

Embodiments also relate to an apparatus for performing the operationsdisclosed herein. This apparatus may be specially constructed for therequired purposes, or it may be a general purpose computer selectivelyactivated or reconfigured by a computer program stored in the computer.Such a computer program may be stored in a computer readable storagemedium, such as, but not limited to, any type of disk including opticaldisks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs),random access memories (RAMs), EPROMs, EEPROMs, magnetic or opticalcards, or any type of media suitable for storing electronicinstructions, each coupled to a computer system bus.

The algorithms and displays presented herein are not inherently relatedto any particular computer or other apparatus. Various general purposesystems may be used with programs in accordance with the teachingsherein, or it may prove convenient to construct more specializedapparatus to perform the required method steps. The required structurefor a variety of these systems appears as set forth in the descriptionabove. In addition, embodiments are not described with reference to anyparticular programming language. It is appreciated that a variety ofprogramming languages may be used to implement the teachings of theembodiments as described herein.

Embodiments may be provided as a computer program product, or software,that may include a machine-readable medium having stored thereoninstructions, which may be used to program a computer system (or otherelectronic devices) to perform a process according to the disclosedembodiments. A machine-readable medium includes any mechanism forstoring or transmitting information in a form readable by a machine(e.g., a computer). For example, a machine-readable (e.g.,computer-readable) medium includes a machine (e.g., a computer) readablestorage medium (e.g., read only memory (“ROM”), random access memory(“RAM”), magnetic disk storage media, optical storage media, flashmemory devices, etc.), a machine (e.g., computer) readable transmissionmedium (electrical, optical, acoustical), etc.

Any of the disclosed embodiments may be used alone or together with oneanother in combination. Although various embodiments may have beenpartially motivated by deficiencies with conventional techniques andapproaches, some of which are described or alluded to within thespecification, the embodiments need not necessarily address or solve anyof these deficiencies, but rather, may address only some of thedeficiencies, address none of the deficiencies, or be directed towarddifferent deficiencies and problems which are not directly discussed.

Although the invention has been described and illustrated in theillustrative embodiments, it is understood that this disclosure has beenmade only by way of example, and that numerous changes in the details ofimplementation of embodiments of the invention can be made withoutdeparting from the spirit and scope of the invention, which is onlylimited by the claims that follow. Features of the disclosed embodimentscan be combined and rearranged in various ways.

1. A non-transitory computer readable storage media having instructionsstored thereon that, when executed by a processor of a monitoring andcontrol system, cause the monitoring and control system to performoperations comprising: receiving input indicating occupancy state of auser with regard to a designated area, or a plurality of areas thereinor portions thereof; receiving, from one or more of a plurality ofsensing capable devices of, or in communication with, the monitoring andcontrol system, input indicating a respective event involving the userentering or exiting the designated area, or an area therein or portionthereof, the sensing capable devices situated on or near the user,within the designated area, or in one or more of the plurality of areastherein, or portions thereof; selecting one of a plurality of confidencelevels regarding the occupancy state of the user with regard to thedesignated area, or one or more of the plurality of areas therein orportions thereof, responsive to the received input indicating occupancystate of the user with regard to the designated area; and transmitting amessage to the user responsive to the respective event involving theuser entering or exiting the designated area, the occupancy state of theuser with regard to the designated area, and the selected confidencelevel.
 2. The non-transitory computer readable storage media of claim 1,wherein receiving input indicating occupancy state of the user withregard to the designated area comprises receiving input from a userinterface, and/or a plurality of sensors, and/or one or more mobilecommunication devices, of, or in communication with, the user or themonitoring and control system, the input indicating occupancy state ofthe user with regard to the designated area.
 3. The non-transitorycomputer readable storage media of claim 2, wherein receiving input fromthe plurality of sensors indicating occupancy state of the user withregard to the designated area comprises receiving input from one or moresensors selected from a group consisting of: an occupancy sensor, analert sensor, an environmental sensor, a temperature-sensing capabledevice, and combinations thereof.
 4. The non-transitory computerreadable storage media of claim 2, wherein receiving input from the userinterface indicating occupancy state of the user with regard to thedesignated area comprises receiving input from the user via one or moreuser interfaces of the monitoring and control system or one or moremobile communication devices.
 5. (canceled)
 6. The non-transitorycomputer readable storage media of claim 1, further comprising receivingadditional input from one or more mobile communication devicesassociated with or around the user or the designated area, and whereinselecting one of the plurality of confidence levels regarding occupancystate of the user with regard to the designated area further comprisesselecting one of the plurality of confidence levels regarding occupancystate of the user with regard to the designated area responsive to thereceived additional input.
 7. The non-transitory computer readablestorage media of claim 1, further comprising receiving additional inputrelevant to or about the user with respect to the designated area, orone or more rooms therein or portions thereof, wherein the additionalinput is selected from a group consisting of: input from the user toselect a particular one or more rooms in or portions of the designatedarea, input from the user to select a sensor therein, learned occupancyschedule of the user, pattern of where and/or when mobile communicationdevices associated with the user are present in, or absent from, thedesignated area, time of day, day of week, seasonal-, holiday-, orpersonal observances of the user, current weather conditions, andadverse and/or extreme weather conditions; and wherein selecting one ofa plurality of confidence levels regarding occupancy state of the userwith regard to the designated area further comprises selecting one ofthe plurality of confidence levels regarding occupancy state of the userwith regard to the designated area responsive to the received additionalinput.
 8. The non-transitory computer readable storage media of claim 1,further comprising receiving input regarding a sensitivity level for themonitoring and control system, and wherein transmitting the message tothe user responsive to the respective event involving the user enteringor exiting the designated area, the occupancy state of the user withregard to the designated area, and the selected confidence level,comprises transmitting the message to the user further responsive to thesensitivity level for the monitoring and control system.
 9. Thenon-transitory computer readable storage media of claim 1, furthercomprising receiving additional input regarding the user with regard tothe designated area or thereabouts, selected from a group consisting of:time of day, learned occupancy schedule of the user, pattern of whereand/or when mobile communication devices associated with the user arepresent, in or absent from, the designated area, day of week, seasonal-,holiday-, or personal observances of the user, current weatherconditions, adverse and/or extreme weather conditions; and whereintransmitting the message to the user responsive to the respective eventinvolving the user entering or exiting the designated area, theoccupancy state of the user with regard to the designated area, and theselected confidence level, comprises transmitting the message to theuser further responsive to the received additional input.
 10. Thenon-transitory computer readable storage media of claim 1, furthercomprising receiving input selecting an occupancy state transitionsensitivity level, and wherein selecting one of a plurality ofconfidence levels regarding occupancy state of the user with regard tothe designated area responsive to the received input further comprisesselecting one of the plurality of confidence levels regarding occupancystate of the user with regard to the designated area further responsiveto the selected occupancy state transition sensitivity level.
 11. Amethod executed by a processor of a monitoring and control system, themethod comprising: receiving input indicating occupancy state of a userwith regard to a designated area, or a plurality of areas therein orportions thereof; receiving, from one or more of a plurality of sensingcapable devices of, or in communication with, the monitoring and controlsystem, input indicating a respective event involving the user enteringor exiting the designated area, or an area therein or portion thereof,the sensing capable devices situated on or near the user, within thedesignated area, or in one or more of the plurality of areas therein, orportions thereof; selecting one of a plurality of confidence levelsregarding the occupancy state of the user with regard to the designatedarea, or one or more of the plurality of areas therein or portionsthereof, responsive to the received input indicating occupancy state ofthe user with regard to the designated area; and transmitting a messageto the user responsive to the respective event involving the userentering or exiting the designated area, the occupancy state of the userwith regard to the designated area, and the selected confidence level.12. The method of claim 11, wherein receiving input indicating occupancystate of the user with regard to the designated area comprises receivinginput from a user interface, and/or a plurality of sensors, and/or oneor more mobile communication devices, of, or in communication with, theuser or the monitoring and control system, the input indicatingoccupancy state of the user with regard to the designated area.
 13. Themethod of claim 2, wherein receiving input from the plurality of sensorsindicating occupancy state of the user with regard to the designatedarea comprises receiving input from one or more sensors selected from agroup consisting of: an occupancy sensor, an alert sensor, anenvironmental sensor, a temperature-sensing capable device, andcombinations thereof.
 14. The method of claim 2, wherein receiving inputfrom the user interface indicating occupancy state of the user withregard to the designated area comprises receiving input from the uservia one or more user interfaces of the monitoring and control system orone or more mobile communication devices.
 15. (canceled)
 16. The methodof claim 11, further comprising receiving additional input from one ormore mobile communication devices associated with or around the user orthe designated area, and wherein selecting one of the plurality ofconfidence levels regarding occupancy state of the user with regard tothe designated area further comprises selecting one of the plurality ofconfidence levels regarding occupancy state of the user with regard tothe designated area responsive to the received additional input.
 17. Themethod of claim 11, further comprising receiving additional inputrelevant to or about the user with respect to the designated area, orone or more rooms therein or portions thereof, wherein the additionalinput is selected from a group consisting of: input from the user toselect a particular one or more rooms in or portions of the designatedarea, input from the user to select a sensor therein, learned occupancyschedule of the user, pattern of where and/or when mobile communicationdevices associated with the user are present in, or absent from, thedesignated area, time of day, day of week, seasonal-, holiday-, orpersonal observances of the user, current weather conditions, andadverse and/or extreme weather conditions; and wherein selecting one ofa plurality of confidence levels regarding occupancy state of the userwith regard to the designated area further comprises selecting one ofthe plurality of confidence levels regarding occupancy state of the userwith regard to the designated area responsive to the received additionalinput.
 18. The method of claim 11, further comprising receiving inputregarding a sensitivity level for the monitoring and control system, andwherein transmitting the message to the user responsive to therespective event involving the user entering or exiting the designatedarea, the occupancy state of the user with regard to the designatedarea, and the selected confidence level, comprises transmitting themessage to the user further responsive to the sensitivity level for themonitoring and control system.
 19. The method of claim 11, furthercomprising receiving additional input regarding the user with regard tothe designated area or thereabouts, selected from a group consisting of:time of day, learned occupancy schedule of the user, pattern of whereand/or when mobile communication devices associated with the user arepresent, in or absent from, the designated area, day of week, seasonal-,holiday-, or personal observances of the user, current weatherconditions, adverse and/or extreme weather conditions; and whereintransmitting the message to the user responsive to the respective eventinvolving the user entering or exiting the designated area, and theoccupancy state of the user with regard to the designated area, and theselected confidence level, comprises transmitting the message to theuser further responsive to the received additional input.
 20. The methodof claim 11, further comprising receiving input selecting an occupancystate transition sensitivity level, and wherein selecting one of aplurality of confidence levels regarding occupancy state of the userwith regard to the designated area responsive to the received inputfurther comprises selecting one of the plurality of confidence levelsregarding occupancy state of the user with regard to the designated areafurther responsive to the selected occupancy state transitionsensitivity level.