Customizable intrusion zones associated with security systems

ABSTRACT

The present application is directed to creating intrusion zones for security systems. For example, a network device may store data associated with an intrusion zone for an audio/video (A/V) recording and communication device, the data indicating at least a conditional setting associated with the intrusion zone and at least one action that a security system is to perform based on the A/V recording and communication device detecting motion within the intrusion zone and the conditional setting being satisfied. The network device may then receive motion data from the A/V recording and communication device, the motion data indicating that the A/V recording and communication device detected the motion within the intrusion zone. Based on receiving the motion data, the network device may determine that the conditional setting for the intrusion zone is satisfied and determine that the conditional setting for the intrusion zone is satisfied. Based on the determinations, the network device may cause the security system to perform the at least one action, such as activating an alarm.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a continuation-in-part of application Ser. No.15/794,001 filed Oct. 26, 2017, which claims priority to provisionalapplication Ser. No. 62/413,378, filed on Oct. 26, 2016, the entirecontents of which are hereby incorporated by reference.

TECHNICAL FIELD

The present embodiments relate to audio/video (A/V) recording andcommunication devices, including A/V recording and communicationdoorbell systems. In particular, the present embodiments relate toimprovements in the functionality of A/V recording and communicationdevices that enable customization of intrusion zones, therebystrengthening the ability of such devices to reduce crime and enhancepublic safety.

BACKGROUND

Home security is a concern for many homeowners and renters. Thoseseeking to protect or monitor their homes often wish to have video andaudio communications with visitors, for example, those visiting anexternal door or entryway. Audio/Video (A/V) recording and communicationdevices, such as doorbells, provide this functionality, and can also aidin crime detection and prevention. For example, audio and/or videocaptured by an A/V recording and communication device can be uploaded tothe cloud and recorded on a remote server. Subsequent review of the A/Vfootage can aid law enforcement in capturing perpetrators of homeburglaries and other crimes. Further, the presence of one or more A/Vrecording and communication devices on the exterior of a home, such as adoorbell unit at the entrance to the home, acts as a powerful deterrentagainst would-be burglars.

SUMMARY

The various embodiments of the present customizable intrusion zonesassociated with security systems have several features, no single one ofwhich is solely responsible for their desirable attributes. Withoutlimiting the scope of the present embodiments as expressed by the claimsthat follow, their more prominent features now will be discussedbriefly. After considering this discussion, and particularly afterreading the section entitled “Detailed Description,” one will understandhow the features of the present embodiments provide the advantagesdescribed herein.

One aspect of the present embodiments includes the realization thatsometimes motion detected by an A/V recording and communication devicemay be indicative of a threat, such as an intruder, and other times themotion may be benign, such as motion caused by an invited visitor, aparcel delivery carrier, a neighbor, an animal, or a passing vehicle. Itwould be advantageous, therefore, if the functionality of A/V recordingand communication devices could be enhanced in one or more ways todistinguish between various types of motion within the field of view ofthe A/V recording and communication device. Such enhancements couldincrease the effectiveness of A/V recording and communication devices byproviding a warning to the user when it is likely that detected motionis associated with a threat, while also possibly suppressing warnings tothe user when it is unlikely that detected motion is associated with athreat. The user would thus be less likely to suffer alert fatigue dueto persistent false alarms, thereby making it more likely that the userwill respond to warnings that are associated with actual threats. Thepresent embodiments provide these advantages and enhancements, asdescribed below.

Another aspect of the present embodiments includes the realization that,when motion is detected by an A/V recording and communication device, auser may want a security system to perform one or more actions, and/orrefrain from performing one or more actions, based on whether the motionwas caused by a threat and/or if the motion was unlikely caused by athreat. However, security systems, other than those described by thecurrent embodiments, may only be configured to activate an alarm whenmotion is detected, whether or not the motion was caused by a threat. Insome circumstances, however, based on the location of where the motionis detected and/or based on the activation mode in which the securitysystem is operating, the user of the security system may not want thesecurity system to activate the alarm, as the motion may not be causedby a threat. For example, if the motion detected by the A/V recordingand communication device occurred a great distance from the user'sproperty, and/or the motion was detected during daylight hours when aninvited visitor may enter the user's property, the user may not want thesecurity system to activate the alarm, as the motion may not be causedby a threat. If the security system continuously activates the alarmbased on motion that is not caused by a threat, the user may begin toignore alerts that indicate that the security system has activated thealarm, which may cause the user to miss alerts of actual threats.

The current embodiments solve this problem by providing a user with theability to configure a security system to perform one or more actions,and/or refrain from performing one or more actions, based onparameter(s) that the user sets for motion that is detected by an A/Vrecording and communication device. For example, the user may createintrusion zone(s) for the A/V recording and communication device. Eachintrusion zone may be associated with a motion zone of the A/V recordingand communication device, a conditional setting, an activation mode forthe security system, and/or an action that the security system is toperform. Based on the A/V recording and communication device detectingmotion within the intrusion zone, a network device may determine thatthe security system is operating in the activation mode and/or that theconditional setting is satisfied. In response, the network device maycause the security system to perform the action. As such, and as aresult of using intrusion zones, the security system may perform afunction, such as activating an alarm, at times when it is more likelythat motion is caused by a threat. Additionally, the user may beprovided with alerts that indicate actual threats, such that the userwill not suffer from alert fatigue. Therefore, the user will more likelyrespond to warnings of actual threats detected by the security system.The present embodiments further provide these advantages andenhancements, as described below.

In a first aspect, a computer program product, embodied in codeexecutable by a processor, which when executed causes the processor toperform operations comprising: causing a graphical user interface (GUI)to be displayed on a display, the GUI configured for creating anintrusion zone for an audio/video (A/V) recording and communicationdevice, the intrusion zone being associated with a security system;causing one or more motion zones to be displayed on the GUI, the one ormore motion zones being associated with a field of view of the A/Vrecording and communication device; receiving a first input selecting amotion zone from the one or more motion zones, at least a portion of themotion zone being associated with the intrusion zone; receiving a secondinput for setting a conditional setting for the intrusion zone;receiving a third input selecting an activation mode of the securitysystem to associate with the intrusion zone; receiving a fourth inputfor saving the intrusion zone; and in response to the receiving of thefourth input, transmitting, to at least one of a network device and theA/V recording and communication device, a control signal that isconfigured to cause the at least one of the network device and the A/Vrecording and communication device to save the intrusion zone.

In an embodiment of the first aspect, the conditional setting comprisesat least one of a time of day, a level of ambient light, a location ofmotion detection, a direction of movement, a speed of movement, a lengthof time that an object is within the motion zone, a level of reflectinglight intensity, and a body posture of a person within the motion zone.

In another embodiment of the first aspect, the activation mode comprisesat least one of an armed stay mode, an armed away mode, an armedvacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the first aspect, the operations furthercomprising: receiving a fifth input indicating at least one action toassociate with the intrusion zone, the security system is to perform theat least one action based on the A/V recording and communication devicedetecting motion within the intrusion zone, the conditional settingbeing satisfied, and the security system operating in the activationmode.

In another embodiment of the first aspect, the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device.

In another embodiment of the first aspect, the operations furthercomprising: receiving a fifth input indicating at least one action toassociate with the intrusion zone, the A/V recording and communicationdevice is to perform the at least one action based on the A/V recordingand communication device detecting motion within the intrusion zone, theconditional setting being satisfied, and the security system operatingin the activation mode.

In another embodiment of the first aspect, the at least one actioncomprises at least one of recording image data, activating a light,outputting a warning sound, transmitting a user alert to a clientdevice, and transmitting a user alert to a network device.

In another embodiment of the first aspect, the intrusion zone is a firstintrusion zone, the motion zone is a first motion zone, the conditionalsetting is a first conditional setting, the activation mode is a firstactivation mode, and the control signal is a first control signal, andthe operations further comprise: receiving a fifth input selecting asecond motion zone associated with the A/V recording and communicationdevice, at least a portion of the second motion zone being associatedwith a second intrusion zone; receiving a sixth input for setting asecond conditional setting for the second intrusion zone; receiving aseventh input selecting a second activation mode of the security systemto associate with the second intrusion zone; receiving an eighth inputfor saving the second intrusion zone; and in response to the receivingof the eighth input, transmitting, to at least one of the network deviceand the A/V recording and communication device, a second control signalthat is configured to cause the at least one of the network device andthe A/V recording and communication device to save the second intrusionzone.

In another embodiment of the first aspect, the GUI includes a diagram ofthe field of view of the A/V recording and communication device, thediagram indicating the one or more motion zones within the field of viewof the A/V recording and communication device.

In another embodiment of the first aspect, the one or more motion zonesincludes at least a first motion zone and a second motion zone, and themotion zone includes the first motion zone.

In another embodiment of the first aspect, the operations furthercomprising: receiving a fifth input indicating the at least the portionof the motion zone to associated with the intrusion zone.

In a second aspect, a method is implemented by a client device thatincludes a display, a communication module, and a processor, the methodcomprising: causing, by the processor, a graphical user interface (GUI)to be displayed on the display, the GUI configured for creating anintrusion zone for an audio/video (A/V) recording and communicationdevice, the intrusion zone being associated with a security system;causing, by the processor, one or more motion zones to be displayed onthe GUI, the one or more motion zones being associated with at least oneof a field of view of a camera of the A/V recording and communicationdevice and a field of view of a motion sensor of the A/V recording andcommunication device; receiving, by the processor, a first inputselecting a motion zone from the one or more motion zones, at least aportion of the motion zone being associated with the intrusion zone;receiving, by the processor, a second input for setting a conditionalsetting for the intrusion zone; receiving, by the processor, a thirdinput indicating at least one action that the security system is toperform based on the A/V recording and communication device detectingmotion within the intrusion zone and the conditional setting beingsatisfied; receiving, by the processor, a fourth input for saving theintrusion zone; and in response to the receiving of the fourth input,transmitting, by the processor and using the communication module, acontrol signal to at least one of a network device and the A/V recordingand communication device, the control signal is configured to cause theat least one of the network device and the A/V recording andcommunication device to store the intrusion zone.

In an embedment of the second aspect, the conditional setting comprisesat least one of a time of day, a level of ambient light, a location ofmotion detection, a direction of movement, a speed of movement, a lengthof time that an object is within the motion zone, a level of reflectinglight intensity, and a body posture of a person within the motion zone.

In another embodiment of the second aspect, the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device,

In another embodiment of the second aspect, the method furthercomprising: receiving, by the processor, a fifth input selecting anactivation mode of the security system to associate with the intrusionzone, the security system is to perform the at least one action furtherbased on the security system operating in the activation mode.

In another embodiment of the second aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the second aspect, the at least one action isat least one first action, and the method further comprises: receiving,by the processor, a fifth input indicating at least one second actionthat the A/V recording and communication device is to perform based onthe A/V recording and communication device detecting the motion withinthe intrusion zone and the conditional setting being satisfied.

In another embodiment of the second aspect, the at least one secondaction comprises at least one of recording image data, activating alight, outputting a warning sound, transmitting a user alert to a clientdevice, and transmitting a user alert to a network device.

In another embodiment of the second aspect, the intrusion zone is afirst intrusion zone, the motion zone is a first motion zone, theconditional setting is a first conditional setting, the at least oneaction is at least one first action, the motion is first motion, and thecontrol signal is a first control signal, and the method furthercomprises: receiving, by the processor, a fifth input selecting a secondmotion zone associated with the A/V recording and communication device,at least a portion of the second motion zone being associated with asecond intrusion zone; receiving, by the processor, a sixth input forsetting a second conditional setting for the second intrusion zone;receiving, by the processor, a seventh input indicating at least onesecond action that the security system is to perform based on the A/Vrecording and communication device detecting second motion within thesecond intrusion zone and the second conditional setting beingsatisfied; receiving, by the processor, an eighth input for saving thesecond intrusion zone; and in response to the receiving of the eighthinput, transmitting, by the processor and using the communicationmodule, a second control signal to at least one of the network deviceand the A/V recording and communication device, the second controlsignal is configured to cause the at least one of the network device andthe A/V recording and communication device to store the second intrusionzone.

In another embodiment of the second aspect, the GUI includes a diagramof the at least one of field of view of the camera and the field of viewof the motion sensor, the diagram indicating the one or more motionzones within at least one of the field of view of the camera and thefield of view of the motion sensor.

In another embodiment of the second aspect, the one or more motion zonesincludes at least a first motion zone and a second motion zone, and themotion zone includes the first motion zone.

In another embodiment of the second aspect, the method furthercomprising: receiving, by the processor, a fifth input indicating the atleast the portion of the motion zone to associated with the intrusionzone.

In a third aspect, a computer program product, embodied in codeexecutable by a processor, which when executed causes the processor toperform operations comprising: causing a graphical user interface (GUI)to be displayed on a display, the GUI configured for creating anintrusion zone for an audio/video (A/V) recording and communicationdevice; receiving a first input selecting a motion zone associated witha field of view of the A/V recording and communication device, at leasta portion of the motion zone being associated with the intrusion zone;receiving a second input for associating the intrusion zone with anactivation mode of a security system; and transmitting, to at least oneof a network device and the A/V recording and communication device, dataassociated with the intrusion zone.

In an embodiment of the third aspect, the operations further comprising:receiving a third input for setting a conditional setting for theintrusion zone.

In another embodiment of the third aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the third aspect, the activation mode comprisesat least one of an armed stay mode, an armed away mode, an armedvacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the third aspect, the operations furthercomprising: receiving a third input indicating at least one actionassociated with the security system, the security system is to performthe at least one action based the A/V recording and communication devicedetecting motion within the intrusion zone while the security system isoperating in the activation mode.

In another embodiment of the third aspect, the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device.

In another embodiment of the third aspect, the operations furthercomprising: receiving a third input indicating at least one actionassociated with the intrusion zone, the A/V recording and communicationdevice is to perform the at least one action based on the A/V recordingand communication device detecting motion within the intrusion zonewhile the security system is operating in the activation mode.

In another embodiment of the third aspect, the at least one actioncomprises at least one of recording image data, activating a light,outputting a warning sound, transmitting a user alert to a clientdevice, and transmitting a user alert to a network device.

In another embodiment of the third aspect, the GUI includes a diagram ofthe field of view of the A/V recording and communication device, thediagram indicating the one or more motion zones within the field of viewof the A/V recording and communication device.

In another embodiment of the third aspect, the operations furthercomprising: causing at least a first motion zone and a second motion tobe displayed on the GUI, the first motion zone and the second motionzone being associated with the field of view of the A/V recording andcommunication device, the receiving of the first input selecting themotion zone associated with the field of view of the A/V recording andcommunication device comprises receiving the first input selecting thefirst motion associated with the field of view of the A/V recording andcommunication device.

In another embodiment of the third aspect, the intrusion zone is a firstintrusion zone, the motion zone is a first motion zone, the activationmode is a first activation mode, and the data is first data, and theoperations further comprise: receiving a third input selecting a secondmotion zone associated with the field of view of the A/V recording andcommunication device, at least a portion of the second motion zone beingassociated with a second intrusion zone; receiving a fourth input forassociating the second intrusion zone with a second activation mode ofthe security system; and transmitting, to at least one of the networkdevice and the A/V recording and communication device, second dataassociated with the second intrusion zone.

In another embodiment of the third aspect, the operations furthercomprising: receiving a third input indicating the at least the portionof the motion zone to associated with the intrusion zone.

In another embodiment of the third aspect, the operations furthercomprising: receiving a third input for saving the intrusion zone.

In a fourth aspect, a method is implemented by a client device thatincludes a display, a communication module, and a processor, the methodcomprising: causing, by the processor, a graphical user interface (GUI)to be displayed on the display, the GUI configured for creating anintrusion zone for an audio/video (A/V) recording and communicationdevice; receiving, by the processor, a first input selecting a motionzone associated with a field of view of the A/V recording andcommunication device, at least a portion of the motion zone beingassociated with the intrusion zone; receiving, by the processor, asecond input indicating at least one action that a security system is toperform based on the A/V recording and communication device detectingmotion within the intrusion zone; and transmitting, by the processor andusing the communication module, data associated with the intrusion zoneto at least one of a network device and the A/V recording andcommunication device.

In an embodiment of the fourth aspect, the method further comprising:receiving, by the processor, a third input for setting a conditionalsetting for the intrusion zone.

In another embodiment of the fourth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone, and the security system is to perform the atleast one action further based on the conditional setting beingsatisfied.

In another embodiment of the fourth aspect, the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device.

In another embodiment of the fourth aspect, the method furthercomprising: receiving, by the processor, a third input selecting anactivation mode of the security system to associate with the intrusionzone, the security system is to perform the at least one action furtherbased on the security system operating in the activation mode.

In another embodiment of the fourth aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the fourth aspect, the at least one action isat least one first action, and the method further comprises: receiving,by the processor, a third input indicating at least one second actionthat the A/V recording and communication device is to perform based onthe A/V recording and communication device detecting the motion withinthe intrusion zone while the security system operates in the activationmode.

In another embodiment of the fourth aspect, the at least one secondaction comprises at least one of recording image data, activating alight, outputting a warning sound, transmitting a user alert to a clientdevice, and transmitting a user alert to a network device.

In another embodiment of the fourth aspect, the GUI includes a diagramof the field of view of the A/V recording and communication device, thediagram indicating the one or more motion zones within the field of viewof the A/V recording and communication device.

In another embodiment of the fourth aspect, the method furthercomprising: causing, by the processor, at least a first motion zone anda second motion to be displayed on the GUI, the first motion zone andthe second motion zone being associated with the field of view of theA/V recording and communication device, the receiving of the first inputselecting the motion zone associated with the field of view of the A/Vrecording and communication device comprises receiving, by theprocessor, the first input selecting the first motion associated withthe field of view of the A/V recording and communication device.

In another embodiment of the fourth aspect, the intrusion zone is afirst intrusion zone, the motion zone is a first motion zone, the atleast one action is at least one first action, the motion is firstmotion, and the data is first data, and the method further comprises:receiving, by the processor, a third input selecting a second motionzone associated with the field of view of the A/V recording andcommunication device, at least a portion of the second motion zone beingassociated with a second intrusion zone; receiving, by the processor, afourth input indicating at least one second action that the securitysystem is to perform based on the A/V recording and communication devicedetecting second motion within the second intrusion zone; andtransmitting, by the processor and using the communication module,second data associated with the second intrusion zone to at least one ofthe network device and the A/V recording and communication device.

In another embodiment of the fourth aspect, the method furthercomprising: receiving, by the processor, a third input indicating the atleast the portion of the motion zone to associated with the intrusionzone.

In another embodiment of the fourth aspect, the method furthercomprising: receiving, by the processor, a third input for saving theintrusion zone.

In a fifth aspect, a network device comprises: a communication module;one or more processors; and a non-transitory machine-readable memorystoring a program, the program executable by at least one of the one ormore processors, the program comprising instructions for: receiving,using the communication module, first data from a client deviceassociated with an audio/video (A/V) recording and communication device,the first data including: a conditional setting for an intrusion zoneassociated with the A/V recording and communication device; and anactivation mode of a security system; storing second data thatassociates the conditional setting and the activation mode with theintrusion zone; generating a control signal that is configured to causethe A/V recording and communication device to save the conditionalsetting for the intrusion zone; and transmitting, using thecommunication module, the control signal to the A/V recording andcommunication device.

In an embodiment of the fifth aspect, the conditional setting comprisesat least one of a time of day, a level of ambient light, a location ofmotion detection, a direction of movement, a speed of movement, a lengthof time that an object is within the motion zone, a level of reflectinglight intensity, and a body posture of a person within the motion zone.

In another embodiment of the fifth aspect, the activation mode comprisesat least one of an armed stay mode, an armed away mode, an armedvacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the fifth aspect, the conditional setting is afirst conditional setting, the intrusion zone is a first intrusion zone,the activation mode is a first activation mode, and the control signalis a first control signal, and the program further comprisesinstructions for: receiving, using the communication module, third datafrom the client device associated with the A/V recording andcommunication device, the third data including: a second conditionalsetting for a second intrusion zone associated with the A/V recordingand communication device; and a second activation mode of the securitysystem; storing fourth data that associates the second conditionalsetting and the second activation mode with the intrusion zone;generating a second control signal that is configured to cause the A/Vrecording and communication device to save the second conditionalsetting for the second intrusion zone; and transmitting, using thecommunication module, the second control signal to the A/V recording andcommunication device.

In another embodiment of the fifth aspect, the program further comprisesinstructions for: causing the security system to operate in theactivation mode; receiving, using the communication module, motion datafrom the A/V recording and communication device, the motion dataindicating that the A/V recording and communication device detectedmotion within the intrusion zone; based on the receiving of the motiondata: determining that the security system is operating in theactivation mode; and determining that the conditional setting for theintrusion zone is satisfied; and based on the determining that thesecurity system is operating in the activation mode and the determiningthat the conditional setting for the intrusion zone is satisfied,causing an alarm of the security system to activate.

In another embodiment of the fifth aspect, the program further comprisesinstructions for: receiving, using the communication module, third dataindicating at least action that the security system is to perform whileoperating in the activation mode, the security system is to perform theat least one action based on the A/V recording and communication devicedetecting motion within the intrusion zone and the conditional settingbeing satisfied.

In another embodiment of the fifth aspect, the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device.

In another embodiment of the fifth aspect, the program further comprisesinstructions for: receiving, using the communication module, third dataindicating at least action that the A/V recording and communicationdevice is to perform based on the A/V recording and communication devicedetecting motion within the intrusion zone, the conditional settingbeing satisfied, and the security system operating in the activationmode, the control signal is further configured to cause the A/Vrecording and communication device to save the at least one action.

In another embodiment of the fifth aspect, the at least one actioncomprises at least one of recording image data, activating a light,outputting a warning sound, transmitting a user alert to a clientdevice, and transmitting a user alert to a network device.

In a sixth aspect, a method for a network device communicatively coupledto an audio/video (A/V) recording and communication device, the networkdevice including a processor and a communication module, the methodcomprising: receiving, by the processor and using the communicationmodule, first data from a client device associated with the A/Vrecording and communication device, the first data including: aconditional setting for an intrusion zone associated with the A/Vrecording and communication device; and at least one action that asecurity system is to take based on the A/V recording and communicationdevice detecting motion within the intrusion zone and the conditionalsetting being satisfied; storing, by the processor, second data thatassociates the conditional setting and the at least one action with theinstruction zone; generating, by the processor, a control signal that isconfigured to cause the A/V recording and communication device to savethe conditional setting for the intrusion zone; and transmitting, by theprocessor and using the communication module, the control signal to theA/V recording and communication device.

In an embodiment of the sixth aspect, the conditional setting comprisesat least one of a time of day, a level of ambient light, a location ofmotion detection, a direction of movement, a speed of movement, a lengthof time that an object is within the motion zone, a level of reflectinglight intensity, and a body posture of a person within the motion zone.

In another embodiment of the sixth aspect, the first data furtherincludes an activation mode associated with the security system, and thesecurity system is to take the at least one action further based on thesecurity system operating in the activation mode.

In another embodiment of the sixth aspect, the activation mode comprisesat least one of an armed stay mode, an armed away mode, an armedvacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the sixth aspect, the conditional setting is afirst conditional setting, the intrusion zone is a first intrusion zone,the at least one action is at least one first action, the motion isfirst motion, and the control signal is a first control signal, and themethod further comprises: receiving, by the processor and using thecommunication module, third data from the client device associated withthe A/V recording and communication device, the third data including: asecond conditional setting for a second intrusion zone associated withthe A/V recording and communication device; and at least one secondaction that the security system is to take based on the A/V recordingand communication device detecting second motion within the secondintrusion zone and the second conditional setting being satisfied;storing, by the processor, fourth data that associates the secondconditional setting and the at least one second action with the secondinstruction zone; generating, by the processor, a second control signalthat is configured to cause the A/V recording and communication deviceto save the second conditional setting for the second intrusion zone;and transmitting, by the processor and using the communication module,the second control signal to the A/V recording and communication device.

In another embodiment of the sixth aspect, the method furthercomprising: receiving, by the processor and using the communicationmodule, motion data from the A/V recording and communication device, themotion data indicating that the A/V recording and communication devicedetected the motion within the intrusion zone; based on the receiving ofthe motion data, determining, by the processor, that the conditionalsetting for the intrusion zone is satisfied; and based on thedetermining that the conditional setting for the intrusion zone issatisfied, causing, by the processor, the security system to perform theat least one action.

In another embodiment of the sixth aspect, the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device.

In another embodiment of the sixth aspect, the at least one action is atleast one first action, and the method further comprises: receiving, bythe processor and using the communication module, third data indicatingat least one second action that the A/V recording and communicationdevice is to perform based on the A/V recording and communication devicedetecting the motion within the intrusion zone and the conditionalsetting being satisfied, the control signal is further configured tocause the A/V recording and communication device to save the at leastone second action.

In another embodiment of the sixth aspect, the at least one secondaction comprises at least one of recording image data, activating alight, outputting a warning sound, transmitting a user alert to a clientdevice, and transmitting a user alert to a network device.

In a seventh aspect, a network device comprises: a communication module;one or more processors; and a non-transitory machine-readable memorystoring a program, the program executable by at least one of the one ormore processors, the program comprising instructions for: receiving,using the communication module, first data from a client deviceassociated with an audio/video (A/V) recording and communication device,the first data indicating: a conditional setting for an intrusion zoneassociated with the A/V recording and communication device; and anactivation mode of a security system; and storing second data thatassociates the conditional setting and the activation mode with theintrusion zone.

In an embodiment of the seventh aspect, the program further comprisesinstructions for: generating a control signal that is configured tocause the A/V recording and communication device to save the conditionalsetting for the intrusion zone; and transmitting, using thecommunication module, the control signal to the A/V recording andcommunication device.

In another embodiment of the seventh aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the seventh aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the seventh aspect, the conditional setting isa first conditional setting, the intrusion zone is a first intrusionzone, and the activation mode is a first activation mode, and theprogram further comprises instructions for: receiving, using thecommunication module, third data from the client device associated withthe A/V recording and communication device, the third data including: asecond conditional setting for a second intrusion zone associated withthe A/V recording and communication device; and a second activation modeof the security system; and storing fourth data that associates thesecond conditional setting and the second activation mode with theintrusion zone.

In another embodiment of the seventh aspect, the program furthercomprises instructions for: causing the security system to operate inthe activation mode; receiving, using the communication module, motiondata from the A/V recording and communication device, the motion dataindicating that the A/V recording and communication device detectedmotion within the intrusion zone; based on the receiving of the motiondata: determining that the security system is operating in theactivation mode; and determining that the conditional setting for theintrusion zone is satisfied; and based on the determining that thesecurity system is operating in the activation mode and the determiningthat the conditional setting for the intrusion zone is satisfied,causing an alarm of the security system to activate.

In another embodiment of the seventh aspect, the program furthercomprises instructions for: receiving, using the communication module,third data indicating at least action that the security system is toperform while operating in the activation mode, the security system isto perform the at least one action based on the A/V recording andcommunication device detecting motion within the intrusion zone and theconditional setting being satisfied.

In another embodiment of the seventh aspect, the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device.

In another embodiment of the seventh aspect, the program furthercomprises instructions for: receiving, using the communication module,third data indicating at least action that the A/V recording andcommunication device is to perform based on the A/V recording andcommunication device detecting motion within the intrusion zone, theconditional setting being satisfied, and the security system operatingin the activation mode; and storing fourth data that associated the atleast one action with the intrusion zone.

In another embodiment of the seventh aspect, the at least one actioncomprises at least one of recording image data, activating a light,outputting a warning sound, transmitting a user alert to a clientdevice, and transmitting a user alert to a network device.

In an eighth aspect, a method for a network device communicativelycoupled to an audio/video (A/V) recording and communication device, thenetwork device including a processor and a communication module, themethod comprising: receiving, by the processor and using thecommunication module, first data from a client device associated withthe audio/video (A/V) recording and communication device, the first dataindicating: a conditional setting for an intrusion zone associated withthe A/V recording and communication device; and at least one action thata security system is to take based on the A/V recording andcommunication device detecting motion within the intrusion zone and theconditional setting being satisfied; and storing, by the processor,second data that associates the conditional setting and the at least oneaction with the intrusion zone.

In an embodiment of the eighth aspect, the method further comprising:generating, by the processor, a control signal that is configured tocause the A/V recording and communication device to save the conditionalsetting for the intrusion zone; and transmitting, by the processor andusing the communication module, the control signal to the A/V recordingand communication device.

In another embodiment of the eighth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the eighth aspect, the first data furtherincludes an activation mode associated with the security system, and thesecurity system is to take the at least one action further based on thesecurity system operating in the activation mode.

In another embodiment of the eighth aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the eighth aspect, the conditional setting is afirst conditional setting, the intrusion zone is a first intrusion zone,the at least one action is at least one first action, and the motion isfirst motion, and the method further comprises: receiving, by theprocessor and using the communication module, third data from the clientdevice associated with the A/V recording and communication device, thethird data including: a second conditional setting for a secondintrusion zone associated with the A/V recording and communicationdevice; and at least one second action that the security system is totake based on the A/V recording and communication device detectingsecond motion within the second intrusion zone and the secondconditional setting being satisfied; and storing, by the processor,fourth data that associates the second conditional setting and the atleast one second action with the second instruction zone.

In another embodiment of the eighth aspect, the method furthercomprising: receiving, by the processor and using the communicationmodule, motion data from the A/V recording and communication device, themotion data indicating that the A/V recording and communication devicedetected the motion within the intrusion zone; based on the receiving ofthe motion data, determining, by the processor, that the conditionalsetting for the intrusion zone is satisfied; and based on thedetermining that the conditional setting for the intrusion zone issatisfied, causing, by the processor, the security system to perform theat least one action.

In another embodiment of the eighth aspect, the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device.

In another embodiment of the eighth aspect, the at least one action isat least one first action, and the method further comprises: receiving,by the processor and using the communication module, third dataindicating at least one second action that the A/V recording andcommunication device is to perform based on the A/V recording andcommunication device detecting the motion within the intrusion zone andthe conditional setting being satisfied; generating, by the processor, acontrol signal that is configured to cause the A/V recording andcommunication device to perform the at least one second action based onthe A/V recording and communication device detecting the motion withinthe intrusion zone and the conditional setting being satisfied; andtransmitting, by the processor and using the communication module, thecontrol signal to the A/V recording and communication device.

In another embodiment of the eighth aspect, the at least one secondaction comprises at least one of recording image data, activating alight, outputting a warning sound, transmitting a user alert to a clientdevice, and transmitting a user alert to a network device.

In a ninth aspect, a network device comprising: a communication module;one or more processors; and a non-transitory machine-readable memorystoring a program, the program executable by at least one of the one ormore processors, the program comprising instructions for: storing dataassociated with an intrusion zone for an audio/video (A/V) recording andcommunication device, the data indicating at least: a conditionalsetting associated with the intrusion zone; and an activation mode for asecurity system; causing the security system to operate in theactivation mode; receiving, using the communication module, motion datafrom the A/V recording and communication device, the motion dataindicating that the A/V recording and communication device detectedmotion within the intrusion zone; based on the receiving of the motiondata: determining that the security system is operating in theactivation mode; and determining that the conditional setting for theintrusion zone is satisfied; and based on the determining that thesecurity system is operating in the activation mode and the determiningthat the conditional setting for the intrusion zone is satisfied,causing an alarm of the security system to activate.

In an embodiment of the ninth aspect, the program further comprisesinstructions for: receiving, using the communication module, the datafrom a client device associated with the A/V recording and communicationdevice.

In another embodiment of the ninth aspect, the program further comprisesinstructions for: generating a user alert that indicates that the A/Vrecording and communication device detected the motion within theintrusion zone; and transmitting, using the communication module, theuser alert to a client device associated with the A/V recording andcommunication device.

In another embodiment of the ninth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the ninth aspect, the activation mode comprisesat least one of an armed stay mode, an armed away mode, an armedvacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the ninth aspect, the data is first data, theintrusion zone is a first intrusion zone, the conditional setting is afirst conditional setting, and the activation mode is a first activationmode, and the program further comprises instructions for: storing seconddata associated with a second intrusion zone for the A/V recording andcommunication device, the second data indicating at least: a secondconditional setting associated with the intrusion zone; and a secondactivation mode for the security system.

In another embodiment of the ninth aspect, the motion data is firstmotion data, the motion is first motion, and the intrusion zone is afirst intrusion zone, and the program further comprises instructionsfor: prior to the receiving of the first motion data, receiving, usingthe communication module, second motion data from the A/V recording andcommunication device, the second motion data indicating that the A/Vrecording and communication device detected second motion within asecond intrusion zone; determining that the A/V recording andcommunication device detected the second motion in the second motionzone; and based on the determining that the A/V recording andcommunication device detected the second motion in the second motionzone, refraining from causing the alarm of the security system toactivate.

In another embodiment of the ninth aspect, the motion data is firstmotion data and the motion is first motion, and the program furthercomprises instructions for: prior to the receiving of the first motiondata, receiving, using the communication module, second motion data fromthe A/V recording and communication device, the second motion dataindicating that the A/V recording and communication device detectedsecond motion within the intrusion zone; based on the receiving of thesecond motion data: determining that the security system is operating inthe activation mode; and determining that the conditional setting forthe intrusion zone is not satisfied; and based on the determining thatthe conditional setting for the intrusion zone is not satisfied,refraining from causing the alarm of the security system to activate.

In a tenth aspect, a method for a network device communicatively coupledto an audio/video (A/V) recording and communication device, the networkdevice including a processor and a communication module, the methodcomprising: storing, by the processor, data associated with an intrusionzone for the A/V recording and communication device, the data indicatingat least: a conditional setting associated with the intrusion zone; andat least one action that a security system is to perform based on theA/V recording and communication device detecting motion within theintrusion zone and the conditional setting being satisfied; receiving,by the processor and using the communication module, motion data fromthe A/V recording and communication device, the motion data indicatingthat the A/V recording and communication device detected the motionwithin the intrusion zone; based on the receiving of the motion data,determining, by the processor, that the conditional setting for theintrusion zone is satisfied; based on the determining that theconditional setting for the intrusion zone is satisfied, causing, by theprocessor, the security system to perform the at least one action.

In an embodiment of the tenth aspect, the at least one action comprisesat least one of activating an alarm, outputting a warning sound,transmitting a user alert to a client device, and changing a power stateof at least one automation device

In another embodiment of the tenth aspect, the method furthercomprising: receiving, by the processor and using the communicationmodule, the data from a client device associated with the A/V recordingand communication device.

In another embodiment of the tenth aspect, the method furthercomprising: generating, by the processor, a user alert that indicatesthat the A/V recording and communication device detected the motionwithin the intrusion zone; and transmitting, by the processor and usingthe communication module, the user alert to a client device associatedwith the A/V recording and communication device.

In another embodiment of the tenth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the tenth aspect, the data further indicates anactivation mode associated with the security system, and the securitysystem is configured to perform the at least one action further based onthe security system operating in the activation mode.

In another embodiment of the tenth aspect, the activation mode comprisesat least one of an armed stay mode, an armed away mode, an armedvacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the tenth aspect, the data is first data, theintrusion zone is a first intrusion zone, the conditional setting is afirst conditional setting, the activation mode is a first activationmode, the at least one action is at least one first action, and themotion is first motion, and the method further comprises: storing, bythe processor, second data associated with a second intrusion zone forthe A/V recording and communication device, the second data indicatingat least: a second conditional setting associated with the secondintrusion zone; and at least one second action that the security systemis to perform based on the A/V recording and communication devicedetecting second motion within the second intrusion zone and the secondconditional setting being satisfied.

In another embodiment of the tenth aspect, the motion data is firstmotion data, the motion is first motion, and the intrusion zone is afirst intrusion zone, and the method further comprises: prior to thereceiving of the first motion data, receiving, by the processor andusing the communication module, second motion data from the A/Vrecording and communication device, the second motion data indicatingthat the A/V recording and communication device detected second motionwithin a second intrusion zone; determining, by the processor, that theA/V recording and communication device detected the second motion in thesecond motion zone; and based on the determining that the A/V recordingand communication device detected the second motion in the second motionzone, refraining, by the processor, from causing the security system toperform the at least one action.

In another embodiment of the tenth aspect, the motion data is firstmotion data and the motion is first motion, and the method furthercomprises: prior to the receiving of the first motion data, receiving,by the processor and using the communication module, second motion datafrom the A/V recording and communication device, the second motion dataindicating that the A/V recording and communication device detectedsecond motion within the intrusion zone; based on the receiving of thesecond motion data, determining, by the processor, that the conditionalsetting for the intrusion zone is not satisfied; and based on thedetermining that the conditional setting for the intrusion zone is notsatisfied, refraining, by the processor, from causing the securitysystem to perform the at least one action.

In an eleventh aspect, a network device comprises: a communicationmodule; one or more processors; and a non-transitory machine-readablememory storing a program, the program executable by at least one of theone or more processors, the program comprising instructions for:creating an intrusion zone for an audio/video (A/V) recording andcommunication device, the intrusion zone being associated with a motionzone for the A/V recording and communication device and an activationmode of a security system; receiving, using the communication module,motion data from the A/V recording and communication device, the motiondata indicating that the A/V recording and communication device detectedmotion within the intrusion zone; based on the receiving of the motiondata, determining that the security system is operating in theactivation mode; and based on the determining that the security systemis operating in the activation mode, causing an alarm of the securitysystem to activate.

In an embodiment of the eleventh aspect, the program further comprisesinstructions for: causing the security system to operate in theactivation mode.

In another embodiment of the eleventh aspect, the program furthercomprises instructions for: receiving, using the communication module,data from a client device associated with the A/V recording andcommunication device, the data indicating at least: the motion zone toassociate with the intrusion zone; and the activation mode for thesecurity system, the creating of the intrusion zone is based on thereceiving of the data.

In another embodiment of the eleventh aspect, the program furthercomprises instructions for: generating a user alert that indicates thatthe A/V recording and communication device detected the motion withinthe intrusion zone; and transmitting, using the communication module,the user alert to a client device associated with the A/V recording andcommunication device.

In another embodiment of the eleventh aspect, the intrusion zone isfurther associated with a conditional setting, and the program furthercomprises instructions for: based on the receiving of the motion data,determining that the conditional setting is satisfied, the causing thealarm of the security system to activate is further based on thedetermining that the conditional setting is satisfied.

In another embodiment of the eleventh aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the eleventh aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the eleventh aspect, the intrusion zone is afirst intrusion zone, the motion zone is a first motion zone, and theactivation mode is a first activation mode, and the program furthercomprises instructions for: creating a second intrusion zone for the A/Vrecording and communication device, the second intrusion zone beingassociated with a second motion zone for the A/V recording andcommunication device and a second activation mode of the securitysystem.

In another embodiment of the eleventh aspect, the intrusion zone is afirst intrusion zone, the motion data is first motion data, and themotion is first motion, and the program further comprises instructionsfor: prior to the receiving of the first motion data, receiving, usingthe communication module, second motion data from the A/V recording andcommunication device, the second motion data indicating that the A/Vrecording and communication device detected second motion within asecond intrusion zone; determining that the A/V recording andcommunication device detected the second motion in the second motionzone; and based on the determining that A/V recording and communicationdevice detected the second motion in the second motion zone, refrainingfrom causing the alarm of the security system to activate.

In another embodiment of the eleventh aspect, the activation mode is afirst activation mode, the motion data is first motion data, and themotion is first motion, and the program further comprises instructionsfor: prior to the receiving of the first motion data, receiving, usingthe communication module, second motion data from the A/V recording andcommunication device, the second motion data indicating that the A/Vrecording and communication device detected second motion within theintrusion zone; based on the receiving of the second motion data,determining that the security system is operating in a second activationmode; and based on the determining that the security system is operatingin the second activation mode, refraining from causing the alarm of thesecurity system to activate.

In a twelfth aspect, a method for a network device communicativelycoupled to an audio/video (A/V) recording and communication device, thenetwork device including a processor and a communication module, themethod comprising: creating, by the processor, an intrusion zone for theA/V recording and communication device, the intrusion zone beingassociated with: a motion zone for the A/V recording and communicationdevice; and at least one action that a security system is to perform;receiving, by the processor and using the communication module, motiondata from the A/V recording and communication device, the motion dataindicating that the A/V recording and communication device detectedmotion within the intrusion zone; and based on the receiving of themotion data, causing, by the processor, the security system to performthe at least one action.

In an embodiment of the twelfth aspect, the method further comprising:receiving, by the processor and using the communication module, datafrom a client device associated with the A/V recording and communicationdevice, the data indicating at least: the motion zone to associate withthe A/V recording and communication device; and the at least one actionthat the security system is to perform, the creating of the intrusionzone is based on the receiving of the data.

In another embodiment of the twelfth aspect, the method furthercomprising: generating, by the processor, a user alert that indicatesthat the A/V recording and communication device detected the motionwithin the intrusion zone; and transmitting, by the processor and usingthe communication module, the user alert to a client device associatedwith the A/V recording and communication device.

In another embodiment of the twelfth aspect, the intrusion zone isfurther associated with a conditional setting, and the method furthercomprises: based on the receiving of the motion data, determining, bythe processor, that the conditional setting is satisfied, the causingthe security system to perform that least one action is further based onthe determining that the conditional setting is satisfied.

In another embodiment of the twelfth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the twelfth aspect, the intrusion zone isfurther associated with an activation mode of the security system, andthe method further comprises: based on the receiving of the motion data,determining, by the processor, that the security system is operating inthe activation mode, the causing the security system to perform thatleast one action is further based on the determining that the securitysystem is operating in the activation mode.

In another embodiment of the twelfth aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the twelfth aspect, the intrusion zone is afirst intrusion zone, the motion zone is a first motion zone, and the atleast one action is at least one first action, and the method furthercomprises: creating, by the processor, a second intrusion zone for theA/V recording and communication device, the second intrusion zone beingassociated with: a second motion zone for the A/V recording andcommunication device; and at least one second action that the securitysystem is to perform.

In another embodiment of the twelfth aspect, the intrusion zone is afirst intrusion zone, the motion data is first motion data, and themotion is first motion, and the method further comprises: prior to thereceiving of the first motion data, receiving, by the processor andusing the communication module, second motion data from the A/Vrecording and communication device, the second motion data indicatingthat the A/V recording and communication device detected second motionwithin a second intrusion zone; determining, by the processor, that theA/V recording and communication device detected the second motion withinthe second intrusion zone; and based on the determining that the A/Vrecording and communication device detected the second motion within thesecond intrusion zone, refraining, by the processor, from causing thesecurity system to perform the at least one action.

In a thirteenth aspect, an audio/video (A/V) recording and communicationdevice comprises: a camera; a communication module; one or moreprocessors; and a non-transitory machine-readable memory storing aprogram, the program executable by at least one of the one or moreprocessors, the program comprising instructions for: receiving, usingthe communication module, data from a network device associated with asecurity system, the data indicating: a conditional setting for anintrusion zone associated with the A/V recording and communicationdevice; and an activation mode associated with the security system;receiving, using the communication module and from the network device,an indication that the security system is operating in the activationmode; while the security system is operating in the activation mode,detecting, using at least one of the camera and a motion sensor, motionwithin the intrusion zone; based on the detecting of the motion withinthe intrusion zone, determining that the conditional setting for theintrusion zone is satisfied; based on the determining that theconditional setting for the intrusion zone is satisfied, generating auser alert indicating that that the A/V recording and communicationdevice detected the motion within the intrusion zone; and transmitting,using the communication module, the user alert to at least one of thenetwork device and a client device associated with the A/V recording andcommunication device.

In an embodiment of the thirteenth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the thirteenth aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the thirteenth aspect, the A/V recording andcommunication device detects motion within at least a first motion zoneand a second motion zone, and the intrusion zone is associated with thefirst motion zone.

In another embodiment of the thirteenth aspect, the data furtherindicates at least one action to be performed by the A/V recording andcommunication device based on the A/V recording and communication devicedetecting the motion within the intrusion zone and the conditionalsetting being satisfied, and the program further comprises instructionsfor: based on the determining that the conditional setting for theintrusion zone is satisfied, causing the A/V recording and communicationdevice to perform the at least one action.

In another embodiment of the thirteenth aspect, the at least one actioncomprises at least one of recording image data using the camera,activating a light, and outputting a warning sound.

In another embodiment of the thirteenth aspect, the motion is firstmotion and the user alert is a first user alert, and the program furthercomprises instructions for: while the security system is operating inthe activation mode, detecting, using the at least one of the camera andthe motion sensor, second motion within the intrusion zone; based on thedetecting of the second motion within the intrusion zone, determiningthat the conditional setting for the intrusion zone is not satisfied;and based on the determining that the conditional setting for theintrusion zone is not satisfied, refraining from generating a seconduser alert.

In another embodiment of the thirteenth aspect, the motion is firstmotion, the intrusion zone is a first intrusion zone, and the user alertis a first user alert, and the program further comprises instructionsfor: while the security system is operating in the activation mode,detecting, using the at least one of the camera and the motion sensor,second motion within a second intrusion zone; and based on the detectingof the second motion within the second intrusion zone, refraining fromgenerating a second user alert.

In another embodiment of the thirteenth aspect, the activation mode is afirst activation mode, the motion is first motion, and the user alert isa first user alert, and the program further comprises instructions for:receiving, using the communication module and from the network device,an indication that the security system is operating in a secondactivation mode; while the security system is operating in the secondactivation mode, detecting, using the at least one of the camera and themotion sensor, second motion within the intrusion zone; and based on thesecurity system operating in the second activation mode, refraining fromgenerating a second user alert.

In a fourteenth aspect, a method for an audio/video (A/V) recording andcommunication device, the A/V recording and communication deviceincluding a camera, a communication module, and a processor, the methodcomprising: receiving, by the processor and using the communicationmodule, data from a network device associated with a security system,the data indicating: a conditional setting for an intrusion zoneassociated with the A/V recording and communication device; anactivation mode associated with the security system; and at least oneaction to be performed by the A/V recording and communication device;receiving, by the processor and using the communication module, from thenetwork device, an indication that the security system is operating inthe activation mode; while the security system is operating theactivation mode, detecting, by the processor and using at least one ofthe camera and a motion sensor, motion within the intrusion zone; basedon the detecting of the motion within the intrusion zone, determining,by the processor, that the conditional setting for the intrusion zone issatisfied; and based on the determining that the conditional setting forthe intrusion zone is satisfied, causing, by the processor, the A/Vrecording and communication device to perform the at least one action.

In an embodiment of the fourteenth aspect, the at least one actioncomprises at least one of recording image data using the camera,activating a light, outputting a warning sound, transmitting a useralert to a client device, and transmitting a user alert to a networkdevice.

In another embodiment of the fourteenth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the fourteenth aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the fourteenth aspect, the A/V recording andcommunication device detects motion within at least a first motion zoneand a second motion zone, and the intrusion zone is associated with thefirst motion zone.

In another embodiment of the fourteenth aspect, the motion is firstmotion, and the method further comprises: while the security system isoperating in the activation mode, detecting, by the processor and usingthe at least one of the camera and the motion sensor, second motionwithin the intrusion zone; based on the detecting of the second motionwithin the intrusion zone, determining, by the processor, that theconditional setting for the intrusion zone is not satisfied; and basedon the determining that the conditional setting for the intrusion zoneis not satisfied, refraining, by the processor, from causing the A/Vrecording and communication device to perform the at least one action.

In another embodiment of the fourteenth aspect, the intrusion zone is afirst intrusion zone and the motion is first motion, and the methodfurther comprises: while the security system is operating in theactivation mode, detecting, by the processor and using the at least oneof the camera and the motion sensor, second motion within a secondintrusion zone; and based on the detecting of the second motion withinthe second intrusion zone, refraining, by the processor, from causingthe A/V recording and communication device to perform the at least oneaction.

In another embodiment of the fourteenth aspect, the activation mode is afirst activation mode and the motion is first motion, and the methodfurther comprises: receiving, by the processor and using thecommunication module, from the network device, an indication that thesecurity system is operating in a second activation mode; while thesecurity system is operating in the second activation mode, detecting,by the processor and using the at least one of the camera and the motionsensor, second motion within the intrusion zone; and based on thesecurity system operating in the second activation mode, refraining, bythe processor, from causing the A/V recording and communication deviceto perform the at least one action.

In a fifteenth aspect, an audio/video (A/V) recording and communicationdevice comprises: a camera; a communication module; one or moreprocessors; and a non-transitory machine-readable memory storing aprogram, the program executable by at least one of the one or moreprocessors, the program comprising instructions for: receiving, usingthe communication module, updated motion settings from a network device,the updated motion settings including an intrusion zone for the A/Vrecording and communication device, the intrusion zone being associatedwith a motion zone for the A/V recording and communication device and anactivation mode of a security system; in response to receiving theupdated motion settings, updating existing motion settings of the A/Vrecording and communication device to the updated motion settings;detecting, using at least one of the camera and a motion sensor andbased on the updated motion settings, motion within the intrusion zone;based on the detecting of the motion within the intrusion zone,determining that the security system is operating in the activationmode; and based on the determining that the security system is operatingin the activation mode, transmitting, using the communication module, auser alert to at least one of the network device and a client deviceassociated with the A/V recording and communication device.

In an embodiment of the fifteenth aspect, the intrusion zone is furtherassociated with a conditional setting, and the program further comprisesinstructions for: based on the detecting of the motion within theintrusion zone, determining that the conditional setting for theintrusion zone is satisfied, the transmitting of the user alert isfurther based on the determining that the conditional setting for theintrusion zone is satisfied.

In another embodiment of the fifteenth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the fifteenth aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the fifteenth aspect, the A/V recording andcommunication device detects motion within at least a first motion zoneand a second motion zone, and the intrusion zone is associated with thefirst motion zone.

In another embodiment of the fifteenth aspect, the updated settingsfurther include at least one action to be performed by the A/V recordingand communication device based on the A/V recording and communicationdevice detecting the motion within the intrusion zone while the securitysystem is operating in the activation mode, and the program furthercomprises instructions for: based on the determining that the securitysystem is operating in the activation mode, causing the A/V recordingand communication device to perform the at least one action.

In another embodiment of the fifteenth aspect, the at least one actioncomprises at least one of recording image data using the camera,activating a light, and outputting a warning sound.

In another embodiment of the fifteenth aspect, the motion is firstmotion, the intrusion zone is a first intrusion zone, and the user alertis a first user alert, and the program further comprises instructionsfor: detecting, using the at least one of the camera and the motionsensor, second motion within a second intrusion zone; and based on thedetecting of the second motion within the second intrusion zone,refraining from transmitting a second user alert.

In another embodiment of the fifteenth aspect, the motion is firstmotion, the activation mode is a first activation mode, and the useralert is a first user alert, and the program further comprisesinstructions for: detecting, using at least one of the camera and themotion sensor, second motion within the intrusion zone; based on thedetecting of the second motion within the intrusion zone, determiningthat the security system is operating in a second activation mode; andbased on the determining that the security system is operating in thesecond activation mode, refraining from transmitting a second useralert.

In a sixteenth aspect, a method for an audio/video (A/V) recording andcommunication device, the A/V recording and communication deviceincluding a camera and a processor, the method comprising: updating, bythe processor, motion settings of the A/V recording and communicationdevice to include an intrusion zone, the intrusion zone being associatedwith: a motion zone of the A/V recording and communication device; anactivation mode of a security system; and at least one action;detecting, by the processor and using at least one of the camera and amotion sensor, motion within the intrusion zone; based on the detectingof the motion within the intrusion zone, determining, by the processor,that the security system is operating in the activation mode; and basedon the determining that the security system is operating in theactivation mode, causing, by the processor, the A/V recording andcommunication device to perform the at least one action.

In an embodiment of the sixteenth aspect, the at least one actioncomprises at least one of recording image data using the camera,activating a light, outputting a warning sound, transmitting a useralert to a client device, and transmitting a user alert to a networkdevice.

In another embodiment of the sixteenth aspect, the intrusion zone isfurther associated with a conditional setting, and the method furthercomprises: based on the detecting of the motion within the intrusionzone, determining, by the processor, that the conditional setting forthe intrusion zone is satisfied, the causing of the A/V recording andcommunication device to perform the at least one action is further basedon the determining that the conditional setting for the intrusion zoneis satisfied.

In another embodiment of the sixteenth aspect, the conditional settingcomprises at least one of a time of day, a level of ambient light, alocation of motion detection, a direction of movement, a speed ofmovement, a length of time that an object is within the motion zone, alevel of reflecting light intensity, and a body posture of a personwithin the motion zone.

In another embodiment of the sixteenth aspect, the activation modecomprises at least one of an armed stay mode, an armed away mode, anarmed vacation mode, a disarmed mode, and a custom armed mode.

In another embodiment of the sixteenth aspect, the A/V recording andcommunication device detects motion within at least a first motion zoneand a second motion zone, and the intrusion zone is associated with thefirst motion zone.

In another embodiment of the sixteenth aspect, the motion is firstmotion and the intrusion zone is a first intrusion zone, and the methodfurther comprises: detecting, by the processor and using the at leastone of the camera and the motion sensor, second motion within a secondintrusion zone; and based on the detecting of the second motion withinthe second intrusion zone, refraining, by the processor, from causingthe A/V recording and communication device to perform the at least oneaction.

In another embodiment of the sixteenth aspect, the activation mode is afirst activation mode and the motion is first motion, and the methodfurther comprises: detecting, by the processor and using the at leastone of the camera and the motion sensor, second motion within theintrusion zone; based on the detecting of the second motion within theintrusion zone, determining, by the processor, that the security systemis operating in a second activation mode and based on the securitysystem operating in the second activation mode, refraining, by theprocessor, from causing the A/V recording and communication device toperform the at least one action.

BRIEF DESCRIPTION OF THE DRAWINGS

The various embodiments of the present customizable intrusion zonesassociated with security systems now will be discussed in detail with anemphasis on highlighting the advantageous features. These embodimentsdepict the novel and non-obvious customizable intrusion zones associatedwith security systems shown in the accompanying drawings, which are forillustrative purposes only. These drawings include the followingfigures, in which like numerals indicate like parts:

FIG. 1 is a functional block diagram illustrating a system for streamingand storing A/V content captured by an audio/video (A/V) recording andcommunication device according to various aspects of the presentdisclosure;

FIG. 2 is a flowchart illustrating a process for streaming and storingA/V content from an A/V recording and communication device according tovarious aspects of the present disclosure;

FIG. 3 is a front view of an A/V recording and communication deviceaccording to various aspects of the present disclosure;

FIG. 4 is a rear view of the A/V recording and communication device ofFIG. 3;

FIG. 5 is a left side view of the A/V recording and communication deviceof FIG. 3 attached to a mounting bracket according to various aspects ofthe present disclosure;

FIG. 6 is cross-sectional right side view of the A/V recording andcommunication device of FIG. 3;

FIG. 7 is an exploded view of the A/V recording and communication deviceand the mounting bracket of FIG. 5;

FIG. 8 is a rear view of the mounting bracket of FIG. 5;

FIGS. 9 and 10 are top and bottom views, respectively, of the A/Vrecording and communication device and the mounting bracket of FIG. 5;

FIGS. 11 and 12 are top and front views, respectively, of a passiveinfrared sensor holder of the A/V recording and communication device ofFIG. 3;

FIGS. 13 and 14 are top and front views, respectively, of a passiveinfrared sensor holder assembly of the A/V recording and communicationdevice of FIG. 3;

FIG. 15 is a top view of the passive infrared sensor assembly of FIG. 11and a field of view thereof according to an aspect of the presentdisclosure;

FIG. 16 a functional block diagram of the components of the A/Vrecording and communication device of FIG. 3;

FIG. 17 is an upper front perspective view of an example A/V recordingand communication security camera according to various aspects of thepresent disclosure;

FIG. 18 is a functional block diagram of example components of the A/Vrecording and communication security camera of FIG. 17;

FIG. 19 is a functional block diagram of example components of afloodlight controller with A/V recording and communication featuresaccording to various aspects of the present disclosure;

FIG. 20 is an upper front perspective view of an example floodlightcontroller with A/V recording and communication features according tovarious aspects of the present disclosure;

FIG. 21 is a front elevation view of the example floodlight controllerwith A/V recording and communication features of FIG. 20 in combinationwith a floodlight device according to various aspects of the presentdisclosure;

FIG. 22 is a functional block diagram illustrating an example system forcommunicating in a network according to various aspects of the presentdisclosure;

FIG. 23 is a functional block diagram illustrating one exampleembodiment of an A/V recording and communication device according tovarious aspects of the present disclosure;

FIG. 24 is a functional block diagram illustrating one exampleembodiment of a hub device according to various aspects of the presentdisclosure;

FIG. 25 is a functional block diagram illustrating one exampleembodiment of a backend server according to various aspects of thepresent disclosure;

FIG. 26 is a functional block diagram illustrating one exampleembodiment of a client device according to various aspects of thepresent disclosure;

FIGS. 27-33 are screenshots of a graphical user interface for use in atechnique for creating and/or customizing intrusion zones for an A/Vrecording and communication device according to various aspects of thepresent disclosure;

FIG. 34 is a flowchart illustrating a process for creating and/orcustomizing intrusion zones for an A/V recording and communicationdevice according to various aspects of the present disclosure;

FIG. 35A is a first schematic diagram of a technique for creating and/orcustomizing intrusion zones for an A/V recording and communicationdevice according to various aspects of the present disclosure;

FIG. 35B is a second schematic diagram of a technique for creatingand/or customizing intrusion zones for an A/V recording andcommunication device according to various aspects of the presentdisclosure;

FIG. 36 is a flowchart illustrating a process for monitoring anintrusion zone using at least one conditional setting of an A/Vrecording and communication device according to various aspects of thepresent disclosure;

FIG. 37 is a flowchart illustrating a process for setting one or morenew conditional settings and/or changing one or more existingconditional settings for intrusion zone(s) of an A/V recording andcommunication device according to various aspects of the presentdisclosure;

FIG. 38 is a flowchart illustrating a process for taking an action basedupon a conditional setting for an intrusion zone of an A/V recording andcommunication device according to various aspects of the presentdisclosure;

FIGS. 39-41 are sequence diagrams illustrating embodiments of processesfor monitoring an intrusion zone using at least one conditional settingof an A/V recording and communication device according to variousaspects of the present disclosure;

FIG. 42 is a functional block diagram illustrating a system formonitoring an intrusion zone using at least one conditional setting ofan A/V recording and communication device according to various aspectsof the present disclosure;

FIG. 43 is a flowchart illustrating a process for creating an intrusionzone for an A/V recording and communication device, where the intrusionzone is associated with a security system, according to various aspectsof the present disclosure;

FIG. 44 is a flowchart illustrating an example process for receiving andstoring data representing an intrusion zone for an A/V recording andcommunication device, where the intrusion zone is associated with asecurity system, according to various aspects of the present disclosure;

FIG. 45 is a flowchart illustrating an example process for utilizing anintrusion zone for an A/V recording and communication device, where theintrusion zone is associated with a security system, according tovarious aspects of the present disclosure;

FIG. 46 is a flowchart illustrating a first example process formonitoring an intrusion zone for an A/V recording and communicationdevice, where the intrusion zone is associated with a security system,according to various aspects of the present disclosure;

FIG. 47 is a flowchart illustrating a second example process formonitoring an intrusion zone for an A/V recording and communicationdevice, where the intrusion zone is associated with a security system,according to various aspects of the present disclosure;

FIG. 48 is a functional block diagram of a client device on which thepresent embodiments may be implemented according to various aspects ofthe present disclosure; and

FIG. 49 is a functional block diagram of a general-purpose computingsystem on which the present embodiments may be implemented according tovarious aspects of present disclosure.

DETAILED DESCRIPTION

The following detailed description describes the present embodimentswith reference to the drawings. In the drawings, reference numbers labelelements of the present embodiments. These reference numbers arereproduced below in connection with the discussion of the correspondingdrawing features.

As described herein, receiving may include obtaining, receiving, and/orretrieving. For example, by describing that a first device receives data(e.g., image data, audio data, other data, signals, information, etc.),the first device may obtain the data, receive the data, and/or retrievethe data (e.g., from a local storage, from a second device, from abackend device, etc.). In some examples, the first device may receive,obtain, and/or retrieve the data based on sending a request for the datato the second device. Additionally, or alternatively, in some examples,the device may receive, obtain, and/or retrieve the data without sendinga request for the data to the second device. For example, the seconddevice may transmit the data to the first device in response toreceiving, obtaining, retrieving, generating, creating, and/or storingthe data by the second device.

In some embodiments, this disclosure may include the language, forexample, “at least one of [element A] and [element B]”. This languagemay refer to one or more of the elements. For example, “at least one ofA and B” may refer to “A”, “B”, or “A and B”. In other words, “at leastone of A and B” may refer to “at least one of A and at least one of B,”or “at least of either A or B.” Additionally, this disclosure mayinclude the language, for example, “[first element], [second element],and/or [third element].” This language may refer to one or more of theelements. For example, “A, B, and/or C” may refer to “A”, “B”, “C”, “Aand B” “A and C”, “B and C”, or “A, B, and C”.

The embodiments of the present customizable intrusion zones foraudio/video (A/V) recording and communication devices, which may beassociated with a security system, are described below with reference tothe figures. These figures, and their written descriptions, indicatethat certain components of the apparatus are formed integrally, andcertain other components are formed as separate pieces. Those ofordinary skill in the art will appreciate that components shown anddescribed herein as being formed integrally may in alternativeembodiments be formed as separate pieces. Those of ordinary skill in theart will further appreciate that components shown and described hereinas being formed as separate pieces may in alternative embodiments beformed integrally. Further, as used herein the term integral describes asingle unitary piece.

With reference to FIG. 1, the present embodiments include an audio/video(A/V) recording and communication device 100. While the presentdisclosure provides numerous examples of methods and systems includingA/V recording and communication doorbells, the present embodiments areequally applicable for A/V recording and communication devices otherthan doorbells. For example, the present embodiments may include one ormore A/V recording and communication security cameras instead of, or inaddition to, one or more A/V recording and communication doorbells. Anexample A/V recording and communication security camera may includesubstantially all of the structure and/or functionality of the doorbellsdescribed herein, but without the front button and related components.

The A/V recording and communication device 100 may be located near theentrance to a structure (not shown), such as a dwelling, a business, astorage facility, etc. The A/V recording and communication device 100includes a camera 102, a microphone 104, and a speaker 106. The camera102 may comprise, for example, a high definition (HD) video camera, suchas one capable of capturing video images at an image-display resolutionof 720p or better. While not shown, the A/V recording and communicationdevice 100 may also include other hardware and/or components, such as ahousing, a communication module (which may facilitate wired and/orwireless communication with other devices), one or more motion sensors(and/or other types of sensors), a button, etc. The A/V recording andcommunication device 100 may further include similar componentry and/orfunctionality as the wireless communication doorbells described in USPatent Application Publication Nos. 2015/0022620 (application Ser. No.14/499,828) and 2015/0022618 (application Ser. No. 14/334,922), both ofwhich are incorporated herein by reference in their entireties as iffully set forth.

With further reference to FIG. 1, the A/V recording and communicationdevice 100 communicates with a user's network 110, which may be forexample a wired and/or wireless network. If the user's network 110 iswireless, or includes a wireless component, the network 110 may be aWi-Fi network compatible with the IEEE 802.11 standard and/or otherwireless communication standard(s). The user's network 110 is connectedto another network 112, which may comprise, for example, the Internetand/or a public switched telephone network (PSTN). As described below,the A/V recording and communication device 100 may communicate with theuser's client device 114 via the home network 110 and the network 112(Internet/PSTN). The user's client device 114 may comprise, for example,a mobile telephone (may also be referred to as a cellular telephone),such as a smartphone, a personal digital assistant (PDA), or anothercommunication and/or computing device. The user's client device 114comprises a display (not shown) and related components capable ofdisplaying streaming and/or recorded video images. The user's clientdevice 114 may also comprise a speaker and related components capable ofbroadcasting streaming and/or recorded audio, and may also comprise amicrophone. The A/V recording and communication device 100 may alsocommunicate with one or more remote storage device(s) 116 (may bereferred to interchangeably as “cloud storage device(s)”), one or moreservers 118, and/or a backend API (application programming interface)120 via the home network 110 and the network 112 (Internet/PSTN). WhileFIG. 1 illustrates the storage device 116, the server 118, and thebackend API 120 as components separate from the network 112, it is to beunderstood that the storage device 116, the server 118, and/or thebackend API 120 may be considered to be components of the network 112.

The network 112 may be any wireless network or any wired network, or acombination thereof, configured to operatively couple theabove-mentioned modules, devices, and systems as shown in FIG. 1. Forexample, the network 112 may include one or more of the following: aPSTN (public switched telephone network), the Internet, a localintranet, a PAN (Personal Area Network), a LAN (Local Area Network), aWAN (Wide Area Network), a MAN (Metropolitan Area Network), a virtualprivate network (VPN), a storage area network (SAN), a frame relayconnection, an Advanced Intelligent Network (AIN) connection, asynchronous optical network (SONET) connection, a digital T1, T3, E1 orE3 line, a Digital Data Service (DDS) connection, a DSL (DigitalSubscriber Line) connection, an Ethernet connection, an ISDN (IntegratedServices Digital Network) line, a dial-up port such as a V.90, V.34, orV.34bis analog modem connection, a cable modem, an ATM (AsynchronousTransfer Mode) connection, or an FDDI (Fiber Distributed Data Interface)or CDDI (Copper Distributed Data Interface) connection. Furthermore,communications may also include links to any of a variety of wirelessnetworks, including WAP (Wireless Application Protocol), GPRS (GeneralPacket Radio Service), GSM (Global System for Mobile Communication),LTE, VoLTE, LoRaWAN, LPWAN, RPMA, LTE, Cat-“X” (e.g. LTE Cat 1, LTE Cat0, LTE CatM1, LTE Cat NB1), CDMA (Code Division Multiple Access), TDMA(Time Division Multiple Access), FDMA (Frequency Division MultipleAccess), and/or OFDMA (Orthogonal Frequency Division Multiple Access)cellular phone networks, GPS, CDPD (cellular digital packet data), RIM(Research in Motion, Limited) duplex paging network, Bluetooth radio, oran IEEE 802.11-based radio frequency network. The network can furtherinclude or interface with any one or more of the following: RS-232serial connection, IEEE-1394 (Firewire) connection, Fibre Channelconnection, IrDA (infrared) port, SCSI (Small Computer SystemsInterface) connection, USB (Universal Serial Bus) connection, or otherwired or wireless, digital or analog, interface or connection, mesh orDigi® networking.

According to one or more aspects of the present embodiments, when aperson (may be referred to interchangeably as “visitor”) arrives at theA/V recording and communication device 100, the A/V recording andcommunication device 100 detects the visitor's presence and beginscapturing video images within a field of view of the camera 102. The A/Vcommunication device 100 may also capture audio through the microphone104. The A/V recording and communication device 100 may detect thevisitor's presence by detecting motion using the camera 102 and/or amotion sensor, and/or by detecting that the visitor has pressed a frontbutton of the A/V recording and communication device 100 (if the A/Vrecording and communication device 100 is a doorbell).

In response to the detection of the visitor, the A/V recording andcommunication device 100 sends an alert to the user's client device 114(FIG. 1) via the user's home network 110 and the network 112. The A/Vrecording and communication device 100 also sends streaming video, andmay also send streaming audio, to the user's client device 114. If theuser answers the alert, two-way audio communication may then occurbetween the visitor and the user through the A/V recording andcommunication device 100 and the user's client device 114. The user mayview the visitor throughout the duration of the call, but the visitorcannot see the user (unless the A/V recording and communication device100 includes a display, which it may in some embodiments).

The video images captured by the camera 102 of the A/V recording andcommunication device 100 (and the audio captured by the microphone 104)may be uploaded to the cloud and recorded on the remote storage device116 (FIG. 1). In some embodiments, the video and/or audio may berecorded on the remote storage device 116 even if the user chooses toignore the alert sent to his or her client device 114.

With further reference to FIG. 1, the system may further comprise abackend API 120 including one or more components. A backend API(application programming interface) may comprise, for example, a server(e.g. a real server, or a virtual machine, or a machine running in acloud infrastructure as a service), or multiple servers networkedtogether, exposing at least one API to client(s) accessing it. Theseservers may include components such as application servers (e.g.software servers), depending upon what other components are included,such as a caching layer, or database layers, or other components. Abackend API may, for example, comprise many such applications, each ofwhich communicate with one another using their public APIs. In someembodiments, the API backend may hold the bulk of the user data andoffer the user management capabilities, leaving the clients to have verylimited state.

The backend API 120 illustrated FIG. 1 may include one or more APIs. AnAPI is a set of routines, protocols, and tools for building software andapplications. An API expresses a software component in terms of itsoperations, inputs, outputs, and underlying types, definingfunctionalities that are independent of their respectiveimplementations, which allows definitions and implementations to varywithout compromising the interface. Advantageously, an API may provide aprogrammer with access to an application's functionality without theprogrammer needing to modify the application itself, or even understandhow the application works. An API may be for a web-based system, anoperating system, or a database system, and it provides facilities todevelop applications for that system using a given programming language.In addition to accessing databases or computer hardware like hard diskdrives or video cards, an API can ease the work of programming GUIcomponents. For example, an API can facilitate integration of newfeatures into existing applications (a so-called “plug-in API”). An APIcan also assist otherwise distinct applications with sharing data, whichcan help to integrate and enhance the functionalities of theapplications.

The backend API 120 illustrated in FIG. 1 may further include one ormore services (also referred to as network services). A network serviceis an application that provides data storage, manipulation,presentation, communication, and/or other capability. Network servicesare often implemented using a client-server architecture based onapplication-layer network protocols. Each service may be provided by aserver component running on one or more computers (such as a dedicatedserver computer offering multiple services) and accessed via a networkby client components running on other devices. However, the client andserver components can both be run on the same machine. Clients andservers may have a user interface, and sometimes other hardwareassociated with them.

FIG. 2 is a flowchart illustrating a process for streaming and storingA/V content from the A/V recording and communication device 100according to various aspects of the present disclosure. At block B200,the A/V recording and communication device 100 detects the visitor'spresence and captures video images within a field of view of the camera102. The A/V recording and communication device 100 may also captureaudio through the microphone 104. As described above, the A/V recordingand communication device 100 may detect the visitor's presence bydetecting motion using the camera 102 and/or a motion sensor, and/or bydetecting that the visitor has pressed a front button of the A/Vrecording and communication device 100 (if the A/V recording andcommunication device 100 is a doorbell). Also as described above, thevideo recording/capture may begin when the visitor is detected, or maybegin earlier, as described below.

At block B202, a communication module of the A/V recording andcommunication device 100 sends a request, via the user's network 110 andthe network 112, to a device in the network 112. For example, thenetwork device to which the request is sent may be a server such as theserver 118. The server 118 may comprise a computer program and/or amachine that waits for requests from other machines or software(clients) and responds to them. A server typically processes data. Onepurpose of a server is to share data and/or hardware and/or softwareresources among clients. This architecture is called the client-servermodel. The clients may run on the same computer or may connect to theserver over a network. Examples of computing servers include databaseservers, file servers, mail servers, print servers, web servers, gameservers, and application servers. The term server may be construedbroadly to include any computerized process that shares a resource toone or more client processes. In another example, the network device towhich the request is sent may be an API such as the backend API 120,which is described above.

In response to the request, at block B204 the network device may connectthe A/V recording and communication device 100 to the user's clientdevice 114 through the user's network 110 and the network 112. At blockB206, the A/V recording and communication device 100 may recordavailable audio and/or video data using the camera 102, the microphone104, and/or any other device/sensor available. At block B208, the audioand/or video data is transmitted (streamed) from the A/V recording andcommunication device 100 to the user's client device 114 via the user'snetwork 110 and the network 112. At block B210, the user may receive anotification on his or her client device 114 with a prompt to eitheraccept or deny the call.

At block B212, the process determines whether the user has accepted ordenied the call. If the user denies the notification, then the processadvances to block B214, where the audio and/or video data is recordedand stored at a cloud server. The session then ends at block B216 andthe connection between the A/V recording and communication device 100and the user's client device 114 is terminated. If, however, the useraccepts the notification, then at block B218 the user communicates withthe visitor through the user's client device 114 while audio and/orvideo data captured by the camera 102, the microphone 104, and/or otherdevices/sensors is streamed to the user's client device 114. At the endof the call, the user may terminate the connection between the user'sclient device 114 and the A/V recording and communication device 100 andthe session ends at block B216. In some embodiments, the audio and/orvideo data may be recorded and stored at a cloud server (block B214)even if the user accepts the notification and communicates with thevisitor through the user's client device 114.

FIGS. 3-5 illustrate an audio/video (A/V) recording and communicationdoorbell 130 (alternatively referred to as the “doorbell 130”) accordingto an aspect of the present embodiments. The A/V recording andcommunication doorbell 130 may be used in any of the processes describedherein. FIG. 3 is a front view, FIG. 4 is a rear view, and FIG. 5 is aleft side view of the doorbell 130 coupled with a mounting bracket 137.The doorbell 130 includes a faceplate 135 mounted to a back plate 139(FIG. 4). With reference to FIG. 5, the faceplate 135 has asubstantially flat profile. The faceplate 135 may comprise any suitablematerial, including, without limitation, metals, such as brushedaluminum or stainless steel, metal alloys, or plastics. The faceplate135 protects the internal contents of the doorbell 130 and serves as anexterior front surface of the doorbell 130.

With reference to FIG. 3, the faceplate 135 includes a button 133 and alight pipe 136. The button 133 and the light pipe 136 may have variousprofiles that may or may not match the profile of the faceplate 135. Thelight pipe 136 may comprise any suitable material, including, withoutlimitation, transparent plastic, that is capable of allowing lightproduced within the doorbell 130 to pass through. The light may beproduced by one or more light-emitting components, such aslight-emitting diodes (LED's), contained within the doorbell 130, asfurther described below. The button 133 may make contact with a buttonactuator (not shown) located within the doorbell 130 when the button 133is pressed by a visitor. When pressed, the button 133 may trigger one ormore functions of the doorbell 130, as further described below.

With reference to FIGS. 3 and 5, the doorbell 130 further includes anenclosure 131 that engages the faceplate 135. In the illustratedembodiment, the enclosure 131 abuts an upper edge 135T (FIG. 3) of thefaceplate 135, but in alternative embodiments one or more gaps betweenthe enclosure 131 and the faceplate 135 may facilitate the passage ofsound and/or light through the doorbell 130. The enclosure 131 maycomprise any suitable material, but in some embodiments the material ofthe enclosure 131 preferably permits infrared light to pass through frominside the doorbell 130 to the environment and vice versa. The doorbell130 further includes a lens 132. In some embodiments, the lens maycomprise a Fresnel lens, which may be patterned to deflect incominglight into one or more infrared sensors located within the doorbell 130.The doorbell 130 further includes a camera 134, which captures videodata when activated, as described below.

FIG. 4 is a rear view of the doorbell 130, according to an aspect of thepresent embodiments. As illustrated, the enclosure 131 may extend fromthe front of the doorbell 130 around to the back thereof and may fitsnugly around a lip of the back plate 139. The back plate 139 maycomprise any suitable material, including, without limitation, metals,such as brushed aluminum or stainless steel, metal alloys, or plastics.The back plate 139 protects the internal contents of the doorbell 130and serves as an exterior rear surface of the doorbell 130. Thefaceplate 135 may extend from the front of the doorbell 130 and at leastpartially wrap around the back plate 139, thereby allowing a coupledconnection between the faceplate 135 and the back plate 139. The backplate 139 may have indentations in its structure to facilitate thecoupling.

With further reference to FIG. 4, spring contacts 140 may provide powerto the doorbell 130 when mated with other conductive contacts connectedto a power source. The spring contacts 140 may comprise any suitableconductive material, including, without limitation, copper, and may becapable of deflecting when contacted by an inward force, for example theinsertion of a mating element. The doorbell 130 further comprises aconnector 160, such as a micro-USB or other connector, whereby powerand/or data may be supplied to and from the components within thedoorbell 130. A reset button 159 may be located on the back plate 139,and may make contact with a button actuator (not shown) located withinthe doorbell 130 when the reset button 159 is pressed. When the resetbutton 159 is pressed, it may trigger one or more functions, asdescribed below.

FIG. 5 is a left side profile view of the doorbell 130 coupled to themounting bracket 137, according to an aspect of the present embodiments.The mounting bracket 137 facilitates mounting the doorbell 130 to asurface, such as the exterior of a building, such as a home or office.As illustrated in FIG. 5, the faceplate 135 may extend from the bottomof the doorbell 130 up to just below the camera 134, and connect to theback plate 139 as described above. The lens 132 may extend and curlpartially around the side of the doorbell 130. The enclosure 131 mayextend and curl around the side and top of the doorbell 130, and may becoupled to the back plate 139 as described above. The camera 134 mayprotrude slightly through the enclosure 131, thereby giving it a widerfield of view. The mounting bracket 137 may couple with the back plate139 such that they contact each other at various points in a commonplane of contact, thereby creating an assembly including the doorbell130 and the mounting bracket 137. The couplings described in thisparagraph, and elsewhere, may be secured by, for example and withoutlimitation, screws, interference fittings, adhesives, or otherfasteners. Interference fittings may refer to a type of connection wherea material relies on pressure and/or gravity coupled with the material'sphysical strength to support a connection to a different element.

FIG. 6 is a right side cross-sectional view of the doorbell 130 withoutthe mounting bracket 137. In the illustrated embodiment, the lens 132 issubstantially coplanar with the front surface 131F of the enclosure 131.In alternative embodiments, the lens 132 may be recessed within theenclosure 131 or may protrude outward from the enclosure 131. The camera134 is coupled to a camera printed circuit board (PCB) 147, and a lens134 a of the camera 134 protrudes through an opening in the enclosure131. The camera lens 134 a may be a lens capable of focusing light intothe camera 134 so that clear images may be taken.

The camera PCB 147 may be secured within the doorbell with any suitablefasteners, such as screws, or interference connections, adhesives, etc.The camera PCB 147 comprises various components that enable thefunctionality of the camera 134 of the doorbell 130, as described below.Infrared light-emitting components, such as infrared LED's 168, arecoupled to the camera PCB 147 and may be triggered to activate when alight sensor detects a low level of ambient light. When activated, theinfrared LED's 168 may emit infrared light through the enclosure 131and/or the camera 134 out into the ambient environment. The camera 134,which may be configured to detect infrared light, may then capture thelight emitted by the infrared LED's 168 as it reflects off objectswithin the camera's 134 field of view, so that the doorbell 130 canclearly capture images at night (may be referred to as “night vision”).

With continued reference to FIG. 6, the doorbell 130 further comprises afront PCB 146, which in the illustrated embodiment resides in a lowerportion of the doorbell 130 adjacent a battery 166. The front PCB 146may be secured within the doorbell 130 with any suitable fasteners, suchas screws, or interference connections, adhesives, etc. The front PCB146 comprises various components that enable the functionality of theaudio and light components, as further described below. The battery 166may provide power to the doorbell 130 components while receiving powerfrom the spring contacts 140, thereby engaging in a trickle-chargemethod of power consumption and supply. Alternatively, the doorbell 130may draw power directly from the spring contacts 140 while relying onthe battery 166 only when the spring contacts 140 are not providing thepower necessary for all functions. Still further, the battery 166 maycomprise the sole source of power for the doorbell 130. In suchembodiments, the spring contacts 140 may not be connected to a source ofpower. When the battery 166 is depleted of its charge, it may berecharged, such as by connecting a power source to the connector 160.

With continued reference to FIG. 6, the doorbell 130 further comprises apower PCB 148, which in the illustrated embodiment resides behind thecamera PCB 147. The power PCB 148 may be secured within the doorbell 130with any suitable fasteners, such as screws, or interferenceconnections, adhesives, etc. The power PCB 148 comprises variouscomponents that enable the functionality of the power and device-controlcomponents, as further described below.

With continued reference to FIG. 6, the doorbell 130 further comprises acommunication module 164 coupled to the power PCB 148. The communicationmodule 164 facilitates communication with client devices in one or moreremote locations, as further described below. The connector 160 mayprotrude outward from the power PCB 148 and extend through a hole in theback plate 139. The doorbell 130 further comprises passive infrared(PIR) sensors 144, which are secured on or within a PIR sensor holder143, and the assembly resides behind the lens 132. In some embodiments,the doorbell 130 may comprise three PIR sensors 144, as furtherdescribed below, but in other embodiments any number of PIR sensors 144may be provided. The PIR sensor holder 143 may be secured to thedoorbell 130 with any suitable fasteners, such as screws, orinterference connections, adhesives, etc. The PIR sensors 144 may be anytype of sensor capable of detecting and communicating the presence of aheat source within their field of view. Further, alternative embodimentsmay comprise one or more motion sensors either in place of or inaddition to the PIR sensors 144. The motion sensors may be configured todetect motion using any methodology, such as a methodology that does notrely on detecting the presence of a heat source within a field of view.

FIG. 7 is an exploded view of the doorbell 130 and the mounting bracket137 according to an aspect of the present embodiments. The mountingbracket 137 is configured to be mounted to a mounting surface (notshown) of a structure, such as a home or an office. FIG. 7 shows thefront side 137F of the mounting bracket 137. The mounting bracket 137 isconfigured to be mounted to the mounting surface such that the back side137B thereof faces the mounting surface. In certain embodiments themounting bracket 137 may be mounted to surfaces of various composition,including, without limitation, wood, concrete, stucco, brick, vinylsiding, aluminum siding, etc., with any suitable fasteners, such asscrews, or interference connections, adhesives, etc. The doorbell 130may be coupled to the mounting bracket 137 with any suitable fasteners,such as screws, or interference connections, adhesives, etc.

With continued reference to FIG. 7, the illustrated embodiment of themounting bracket 137 includes the terminal screws 138. The terminalscrews 138 are configured to receive electrical wires adjacent themounting surface of the structure upon which the mounting bracket 137 ismounted, so that the doorbell 130 may receive electrical power from thestructure's electrical system. The terminal screws 138 are electricallyconnected to electrical contacts 177 of the mounting bracket. If poweris supplied to the terminal screws 138, then the electrical contacts 177also receive power through the terminal screws 138. The electricalcontacts 177 may comprise any suitable conductive material, including,without limitation, copper, and may protrude slightly from the face ofthe mounting bracket 137 so that they may mate with the spring contacts140 located on the back plate 139.

With reference to FIGS. 7 and 8 (which is a rear view of the mountingbracket 137), the mounting bracket 137 further comprises a bracket PCB149. With reference to FIG. 8, the bracket PCB 149 is situated outsidethe doorbell 130, and is therefore configured for various sensors thatmeasure ambient conditions, such as an accelerometer 150, a barometer151, a humidity sensor 152, and a temperature sensor 153. The functionsof these components are discussed in more detail below. The bracket PCB149 may be secured to the mounting bracket 137 with any suitablefasteners, such as screws, or interference connections, adhesives, etc.

FIGS. 9 and 10 are top and bottom views, respectively, of the doorbell130. As described above, the enclosure 131 may extend from the frontface 131F of the doorbell 130 to the back, where it contacts and snuglysurrounds the back plate 139. The camera 134 may protrude slightlybeyond the front face 131F of the enclosure 131, thereby giving thecamera 134 a wider field of view. The mounting bracket 137 may include asubstantially flat rear surface 137R, such that the doorbell 130 and themounting bracket 137 assembly may sit flush against the surface to whichthey are mounted. With reference to FIG. 10, the lower end of theenclosure 131 may include security screw apertures 141 configured toreceive screws or other fasteners.

FIG. 11 is a top view of the PIR sensor holder 143. The PIR sensorholder 143 may comprise any suitable material, including, withoutlimitation, metals, metal alloys, or plastics. The PIR sensor holder 143is configured to mount the PIR sensors 144 behind the lens 132 such thatthe PIR sensors 144 face out through the lens 132 at varying angles,thereby creating a wide field of view for the PIR sensors 144, anddividing the field of view into zones, as further described below. Withfurther reference to FIG. 11, the PIR sensor holder 143 includes one ormore faces 178 within or on which the PIR sensors 144 may be mounted. Inthe illustrated embodiment, the PIR sensor holder 143 includes threefaces 178, with each of two outer faces 178 angled at 55° with respectto a center one of the faces 178. In alternative embodiments, the angleformed by adjacent ones of the faces 178 may be increased or decreasedas desired to alter the field of view of the PIR sensors 144.

FIG. 12 is a front view of the PIR sensor holder 143. In the illustratedembodiment, each of the faces 178 includes a through hole 180 in whichthe PIR sensors 144 may be mounted. First and second brackets 182,spaced from one another, extend transversely across the PIR sensorholder 143. Each of the brackets 182 includes notches 184 at either end.The brackets 182 may be used to secure the PIR sensor holder 143 withinthe doorbell 130. In alternative embodiments, the through holes 180 inthe faces 178 may be omitted. For example, the PIR sensors 144 may bemounted directly to the faces 178 without the through holes 180.Generally, the faces 178 may comprise any structure configured to locateand secure the PIR sensors 144 in place.

FIGS. 13 and 14 are top and front views, respectively, of a PIR sensorassembly 179, including the PIR sensor holder 143, the lens 132, and aflexible power circuit 145. The PIR sensor holder 143 may be secured toa rear face 132R of the lens 132, as shown, with the brackets 182abutting the rear face 132R of the lens 132. The flexible power circuit145, which may be any material or component capable of delivering powerand/or data to and from the PIR sensors 144, is secured to a rear face143R of the PIR sensor holder 143, and may be contoured to match theangular shape of the PIR sensor holder 143. The flexible power circuit145 may connect to, draw power from, and/or transmit data to and/orfrom, the power PCB 148 (FIG. 6).

FIG. 15 is a top view of the PIR sensor assembly 179 illustrating thefields of view of the PIR sensors 144. Each PIR sensor 144 includes afield of view, referred to as a “zone,” that traces an angle extendingoutward from the respective PIR sensor 144. Zone 1 is the area that isvisible only to passive infrared sensor 144-1. Zone 2 is the area thatis visible only to the PIR sensors 144-1 and 144-2. Zone 3 is the areathat is visible only to passive infrared sensor 144-2. Zone 4 is thearea that is visible only to the PIR sensors 144-2 and 144-3. Zone 5 isthe area that is visible only to passive infrared sensor 144-3. Thedoorbell 130 may be capable of determining the direction that an objectis moving based upon which zones are triggered in a time sequence. Inthe illustrated embodiment, each zone extends across an angle of 110°.In alternative embodiments, each zone may extend across a differentangle, such as one greater than or less than 110°.

FIG. 16 is a functional block diagram of the components within or incommunication with the doorbell 130, according to an aspect of thepresent embodiments. As described above, the bracket PCB 149 maycomprise an accelerometer 150, a barometer 151, a humidity sensor 152,and a temperature sensor 153. The accelerometer 150 may be one or moresensors capable of sensing motion and/or acceleration. The barometer 151may be one or more sensors capable of determining the atmosphericpressure of the surrounding environment in which the bracket PCB 149 maybe located. The humidity sensor 152 may be one or more sensors capableof determining the amount of moisture present in the atmosphericenvironment in which the bracket PCB 149 may be located. The temperaturesensor 153 may be one or more sensors capable of determining thetemperature of the ambient environment in which the bracket PCB 149 maybe located. As described above, the bracket PCB 149 may be locatedoutside the housing of the doorbell 130 so as to reduce interferencefrom heat, pressure, moisture, and/or other stimuli generated by theinternal components of the doorbell 130.

With further reference to FIG. 16, the bracket PCB 149 may furthercomprise terminal screw inserts 154, which may be configured to receivethe terminal screws 138 and transmit power to the electrical contacts177 on the mounting bracket 137 (FIG. 7). The bracket PCB 149 may beelectrically and/or mechanically coupled to the power PCB 148 throughthe terminal screws 138, the terminal screw inserts 154, the springcontacts 140, and the electrical contacts 177. The terminal screws 138may receive electrical wires located at the surface to which thedoorbell 130 is mounted, such as the wall of a building, so that thedoorbell can receive electrical power from the building's electricalsystem. Upon the terminal screws 138 being secured within the terminalscrew inserts 154, power may be transferred to the bracket PCB 149, andto all of the components associated therewith, including the electricalcontacts 177. The electrical contacts 177 may transfer electrical powerto the power PCB 148 by mating with the spring contacts 140.

With further reference to FIG. 16, the front PCB 146 may comprise alight sensor 155, one or more light-emitting components, such as LED's156, one or more speakers 157, and a microphone 158. The light sensor155 may be one or more sensors capable of detecting the level of ambientlight of the surrounding environment in which the doorbell 130 may belocated. LED's 156 may be one or more light-emitting diodes capable ofproducing visible light when supplied with power. The speakers 157 maybe any electromechanical device capable of producing sound in responseto an electrical signal input. The microphone 158 may be anacoustic-to-electric transducer or sensor capable of converting soundwaves into an electrical signal. When activated, the LED's 156 mayilluminate the light pipe 136 (FIG. 3). The front PCB 146 and allcomponents thereof may be electrically coupled to the power PCB 148,thereby allowing data and/or power to be transferred to and from thepower PCB 148 and the front PCB 146.

The speakers 157 and the microphone 158 may be coupled to the cameraprocessor 170 through an audio CODEC 161. For example, the transfer ofdigital audio from the user's client device 114 and the speakers 157 andthe microphone 158 may be compressed and decompressed using the audioCODEC 161, coupled to the camera processor 170. Once compressed by audioCODEC 161, digital audio data may be sent through the communicationmodule 164 to the network 112, routed by one or more servers 118, anddelivered to the user's client device 114. When the user speaks, afterbeing transferred through the network 112, digital audio data isdecompressed by audio CODEC 161 and emitted to the visitor via thespeakers 157.

With further reference to FIG. 16, the power PCB 148 may comprise apower management module 162, a microcontroller 163 (may also be referredto as “processor,” “CPU,” or “controller”), the communication module164, and power PCB non-volatile memory 165. In certain embodiments, thepower management module 162 may comprise an integrated circuit capableof arbitrating between multiple voltage rails, thereby selecting thesource of power for the doorbell 130. The battery 166, the springcontacts 140, and/or the connector 160 may each provide power to thepower management module 162. The power management module 162 may haveseparate power rails dedicated to the battery 166, the spring contacts140, and the connector 160. In one aspect of the present disclosure, thepower management module 162 may continuously draw power from the battery166 to power the doorbell 130, while at the same time routing power fromthe spring contacts 140 and/or the connector 160 to the battery 166,thereby allowing the battery 166 to maintain a substantially constantlevel of charge. Alternatively, the power management module 162 maycontinuously draw power from the spring contacts 140 and/or theconnector 160 to power the doorbell 130, while only drawing from thebattery 166 when the power from the spring contacts 140 and/or theconnector 160 is low or insufficient. The power management module 162may also serve as a conduit for data between the connector 160 and themicrocontroller 163. Still further, the battery 166 may comprise thesole source of power for the doorbell 130. In such embodiments, thespring contacts 140 may not be connected to a source of power. When thebattery 166 is depleted of its charge, it may be recharged, such as byconnecting a power source to the connector 160.

With further reference to FIG. 16, in certain embodiments themicrocontroller 163 may comprise an integrated circuit including aprocessor core, memory, and programmable input/output peripherals. Themicrocontroller 163 may receive input signals, such as data and/orpower, from the PIR sensors 144, the bracket PCB 149, the powermanagement module 162, the light sensor 155, the microphone 158, and/orthe communication module 164, and may perform various functions asfurther described below. When the microcontroller 163 is triggered bythe PIR sensors 144, the microcontroller 163 may be triggered to performone or more functions. When the light sensor 155 detects a low level ofambient light, the light sensor 155 may trigger the microcontroller 163to enable “night vision,” as further described below. Themicrocontroller 163 may also act as a conduit for data communicatedbetween various components and the communication module 164.

With further reference to FIG. 16, the communication module 164 maycomprise an integrated circuit including a processor core, memory, andprogrammable input/output peripherals. The communication module 164 mayalso be configured to transmit data wirelessly to a remote networkdevice, and may include one or more transceivers (not shown). Thewireless communication may comprise one or more wireless networks, suchas, without limitation, Wi-Fi, cellular, Bluetooth, and/or satellitenetworks. The communication module 164 may receive inputs, such as powerand/or data, from the camera PCB 147, the microcontroller 163, thebutton 133, the reset button 159, and/or the power PCB non-volatilememory 165. When the button 133 is pressed, the communication module 164may be triggered to perform one or more functions. When the reset button159 is pressed, the communication module 164 may be triggered to eraseany data stored at the power PCB non-volatile memory 165 and/or at thecamera PCB memory 169. The communication module 164 may also act as aconduit for data communicated between various components and themicrocontroller 163. The power PCB non-volatile memory 165 may compriseflash memory configured to store and/or transmit data. For example, incertain embodiments the power PCB non-volatile memory 165 may compriseserial peripheral interface (SPI) flash memory.

With further reference to FIG. 16, the camera PCB 147 may comprisecomponents that facilitate the operation of the camera 134. For example,an imager 171 may comprise a video recording sensor and/or a camerachip. In one aspect of the present disclosure, the imager 171 maycomprise a complementary metal-oxide semiconductor (CMOS) array, and maybe capable of recording high definition (e.g., 720p or better) videofiles. A camera processor 170 may comprise an encoding and compressionchip. In some embodiments, the camera processor 170 may comprise abridge processor. The camera processor 170 may process video recorded bythe imager 171 and audio recorded by the microphone 158, and maytransform this data into a form suitable for wireless transfer by thecommunication module 164 to a network. The camera PCB memory 169 maycomprise volatile memory that may be used when data is being buffered orencoded by the camera processor 170. For example, in certain embodimentsthe camera PCB memory 169 may comprise synchronous dynamic random accessmemory (SD RAM). IR LED's 168 may comprise light-emitting diodes capableof radiating infrared light. IR cut filter 167 may comprise a systemthat, when triggered, configures the imager 171 to see primarilyinfrared light as opposed to visible light. When the light sensor 155detects a low level of ambient light (which may comprise a level thatimpedes the performance of the imager 171 in the visible spectrum), theIR LED's 168 may shine infrared light through the doorbell 130 enclosureout to the environment, and the IR cut filter 167 may enable the imager171 to see this infrared light as it is reflected or refracted off ofobjects within the field of view of the doorbell. This process mayprovide the doorbell 130 with the “night vision” function mentionedabove.

FIGS. 17 and 18 illustrate an example A/V recording and communicationsecurity camera according to various aspects of the present embodiments.With reference to FIG. 17, the security camera 1702, similar to thevideo doorbell 130, includes a faceplate 1704 that is mounted to a backplate 1706 and an enclosure 1708 that engages the faceplate 1704.Collectively, the faceplate 1704, the back plate 1706, and the enclosure1708 form a housing that contains and protects the inner components ofthe security camera 1702. However, unlike the video doorbell 130, thesecurity camera 1702 does not include any front button 133 foractivating the doorbell. The faceplate 1704 may comprise any suitablematerial, including, without limitation, metals, such as brushedaluminum or stainless steel, metal alloys, or plastics. The faceplate1704 protects the internal contents of the security camera 1702 andserves as an exterior front surface of the security camera 1702.

With continued reference to FIG. 17, the enclosure 1708 engages thefaceplate 1704 and abuts an upper edge 1710 of the faceplate 1704. Asdiscussed above with reference to FIG. 3, in alternative embodiments,one or more gaps between the enclosure 1708 and the faceplate 1704 mayfacilitate the passage of sound and/or light through the security camera1702. The enclosure 1708 may comprise any suitable material, but in someembodiments the material of the enclosure 1708 preferably permitsinfrared light to pass through from inside the security camera 1702 tothe environment and vice versa. The security camera 1702 furtherincludes a lens 1712. Again, similar to the video doorbell 130, in someembodiments, the lens may comprise a Fresnel lens, which may bepatterned to deflect incoming light into one or more infrared sensorslocated within the security camera 1702. The security camera 1702further includes a camera 1714, which captures video data whenactivated, as described above and below.

With further reference to FIG. 17, the enclosure 1708 may extend fromthe front of the security camera 1702 around to the back thereof and mayfit snugly around a lip (not shown) of the back plate 1706. The backplate 1706 may comprise any suitable material, including, withoutlimitation, metals, such as brushed aluminum or stainless steel, metalalloys, or plastics. The back plate 1706 protects the internal contentsof the security camera 1702 and serves as an exterior rear surface ofthe security camera 1702. The faceplate 1704 may extend from the frontof the security camera 1702 and at least partially wrap around the backplate 1706, thereby allowing a coupled connection between the faceplate1704 and the back plate 1706. The back plate 1706 may have indentations(not shown) in its structure to facilitate the coupling.

With continued reference to FIG. 17, the security camera 1702 furthercomprises a mounting apparatus 1716. The mounting apparatus 1716facilitates mounting the security camera 1702 to a surface, such as aninterior or exterior wall of a building, such as a home or office. Thefaceplate 1704 may extend from the bottom of the security camera 1702 upto just below the camera 1714, and connect to the back plate 1706 asdescribed above. The lens 1712 may extend and curl partially around theside of the security camera 1702. The enclosure 1708 may extend and curlaround the side and top of the security camera 1702, and may be coupledto the back plate 1706 as described above. The camera 1714 may protrudefrom the enclosure 1708, thereby giving it a wider field of view. Themounting apparatus 1716 may couple with the back plate 1706, therebycreating an assembly including the security camera 1702 and the mountingapparatus 1716. The couplings described in this paragraph, andelsewhere, may be secured by, for example and without limitation,screws, interference fittings, adhesives, or other fasteners.Interference fittings may refer to a type of connection where a materialrelies on pressure and/or gravity coupled with the material's physicalstrength to support a connection to a different element.

FIG. 18 is a functional block diagram of the components of the A/Vrecording and communication security camera of FIG. 17. With referenceto FIG. 18, the interior of the wireless security camera 1702 comprisesa plurality of printed circuit boards, including a front PCB 1802, acamera PCB 1804, and a power PCB 1806, each of which is described below.The camera PCB 1804 comprises various components that enable thefunctionality of the camera 1714 of the security camera 1702, asdescribed below. Infrared light-emitting components, such as infraredLED's 1808, are coupled to the camera PCB 1804 and may be triggered toactivate when a light sensor detects a low level of ambient light. Whenactivated, the infrared LED's 1808 may emit infrared light through theenclosure 1708 and/or the camera 1714 out into the ambient environment.The camera 1714, which may be configured to detect infrared light, maythen capture the light emitted by the infrared LED's 1808 as it reflectsoff objects within the camera's 1714 field of view, so that the securitycamera 1702 may clearly capture images at night (may be referred to as“night vision”).

The front PCB 1802 comprises various components that enable thefunctionality of the audio and light components, including a lightsensor 1810, LED's 1812, one or more speakers 1814, and a microphone1816. The light sensor 1810 may be one or more sensors capable ofdetecting the level of ambient light of the surrounding environment inwhich the security camera 1702 may be located. The speakers 1814 may beany electromechanical device capable of producing sound in response toan electrical signal input. The microphone 1816 may be anacoustic-to-electric transducer or sensor capable of converting soundwaves into an electrical signal. The front PCB 1802 and all componentsthereof may be electrically coupled to the power PCB 1806, therebyallowing data and/or power to be transferred to and from the power PCB1806 and the front PCB 1802.

The speakers 1814 and the microphone 1816 may be coupled to a cameraprocessor 1818 on the camera PCB 1804 through an audio CODEC 1820. Forexample, the transfer of digital audio from the user's client device 114and the speakers 1814 and the microphone 1816 may be compressed anddecompressed using the audio CODEC 1820, coupled to the camera processor1818. Once compressed by audio CODEC 1820, digital audio data may besent through the communication module 1822 to the network 112, routed byone or more servers 118, and delivered to the user's client device 114.When the user speaks, after being transferred through the network 112,digital audio data is decompressed by audio CODEC 1820 and emitted tothe visitor via the speakers 1814.

With continued reference to FIG. 18, the power PCB 1806 comprisesvarious components that enable the functionality of the power anddevice-control components, including a power management module 1824, aprocessor 1826 a communication module 1822, and power PCB non-volatilememory 1828. In certain embodiments, the power management module 1824may comprise an integrated circuit capable of arbitrating betweenmultiple voltage rails, thereby selecting the source of power for thesecurity camera 1702. The battery 1830 and/or the connector 1832 mayeach provide power to the power management module 1824. The powermanagement module 1824 (which may be similar to connector 1832) may haveseparate power rails dedicated to the battery 1830 and the connector1832. The power management module 1824 may control charging of thebattery 1830 when the connector 1832 is connected to an external sourceof power, and may also serve as a conduit for data between the connector1832 and the processor 1826.

With further reference to FIG. 18, in certain embodiments the processor1826 may comprise an integrated circuit including a processor core,memory, and programmable input/output peripherals. The processor 1826may receive input signals, such as data and/or power, from the PIRsensors 1834, the power management module 1824, the light sensor 1810,the microphone 1816, and/or the communication module 1822, and mayperform various functions as further described below. When the processor1826 is triggered by the PIR sensors 1834, the processor 1826 may betriggered to perform one or more functions, such as initiating recordingof video images via the camera 1714. When the light sensor 1810 detectsa low level of ambient light, the light sensor 1810 may trigger theprocessor 1826 to enable “night vision,” as further described below. Theprocessor 1826 may also act as a conduit for data communicated betweenvarious components and the communication module 1822.

With further reference to FIG. 18, the security camera 1702 furthercomprises a communication module 1822 coupled to the power PCB 1806. Thecommunication module 1822 facilitates communication with devices in oneor more remote locations, as further described below. The communicationmodule 1822 may comprise an integrated circuit including a processorcore, memory, and programmable input/output peripherals. Thecommunication module 1822 may also be configured to transmit datawirelessly to a remote network device, such as the user's client device114, the remote storage device 116, and/or the remote server 118, andmay include one or more transceivers (not shown). The wirelesscommunication may comprise one or more wireless networks, such as,without limitation, Wi-Fi, cellular, Bluetooth, and/or satellitenetworks. The communication module 1822 may receive inputs, such aspower and/or data, from the camera PCB 1804, the processor 1826, thereset button 1836 (which may be similar to the reset button 408), and/orthe power PCB non-volatile memory 1828. When the reset button 1836 ispressed, the communication module 1822 may be triggered to erase anydata stored at the power PCB non-volatile memory 1828 and/or at thecamera PCB memory 1838. The communication module 1822 may also act as aconduit for data communicated between various components and theprocessor 1826. The power PCB non-volatile memory 1828 may compriseflash memory configured to store and/or transmit data. For example, incertain embodiments the power PCB non-volatile memory 1828 may compriseserial peripheral interface (SPI) flash memory.

With continued reference to FIG. 18, the power PCB 1806 furthercomprises the connector 1832 described above and a battery 1830. Theconnector 1832 may protrude outward from the power PCB 1806 and extendthrough a hole in the back plate 1706. The battery 1830, which may be arechargeable battery, may provide power to the components of thesecurity camera 1702.

With continued reference to FIG. 18, the power PCB 1806 furthercomprises passive infrared (PIR) sensors 1834, which may be secured onor within a PIR sensor holder (not shown) that resides behind the lens1712 (FIG. 17). The PIR sensors 1834 may be any type of sensor capableof detecting and communicating the presence of a heat source withintheir field of view. Further, alternative embodiments may comprise oneor more motion sensors either in place of or in addition to the PIRsensors 1834. The motion sensors may be configured to detect motionusing any methodology, such as a methodology that does not rely ondetecting the presence of a heat source within a field of view.

With further reference to FIG. 18, the camera PCB 1804 may comprisecomponents that facilitate the operation of the camera 1714. Forexample, an imager 1840 may comprise a video recording sensor and/or acamera chip. In one aspect of the present disclosure, the imager 1840may comprise a complementary metal-oxide semiconductor (CMOS) array, andmay be capable of recording high definition (e.g., 1822 p or better)video files. A camera processor 1818 may comprise an encoding andcompression chip. In some embodiments, the camera processor 1818 maycomprise a bridge processor. The camera processor 1818 may process videorecorded by the imager 1840 and audio recorded by the microphone 1816,and may transform this data into a form suitable for wireless transferby the communication module 1822 to a network. The camera PCB memory1838 may comprise volatile memory that may be used when data is beingbuffered or encoded by the camera processor 1818. For example, incertain embodiments the camera PCB memory 1838 may comprise synchronousdynamic random access memory (SD RAM). IR LED's 1808 may compriselight-emitting diodes capable of radiating infrared light. IR cut filter1842 may comprise a system that, when triggered, configures the imager1840 to see primarily infrared light as opposed to visible light. Whenthe light sensor 1810 detects a low level of ambient light (which maycomprise a level that impedes the performance of the imager 1840 in thevisible spectrum), the IR LED's 1808 may shine infrared light throughthe security camera 1702 enclosure out to the environment, and the IRcut filter 1842 may enable the imager 1840 to see this infrared light asit is reflected or refracted off of objects within the field of view ofthe security camera 1702. This process may provide the security camera1702 with the “night vision” function mentioned above.

The camera PCB 1804 further includes a computer vision module 1844.Functionality of the computer vision module 1844 is described in greaterdetail below.

As discussed above, the present disclosure provides numerous examples ofmethods and systems including A/V recording and communication doorbells,but the present embodiments are equally applicable for A/V recording andcommunication devices other than doorbells. For example, the presentembodiments may include one or more A/V recording and communicationfloodlight controllers instead of, or in addition to, one or more A/Vrecording and communication doorbells. FIGS. 19-21 illustrate an exampleA/V recording and communication floodlight controller according tovarious aspects of the present embodiments. FIG. 19 is a functionalblock diagram illustrating various components of the floodlightcontroller 1902 and their relationships to one another. For example, thefloodlight controller 1902 comprises an AC/DC adapter 1904. Thefloodlight controller 1902 is thus configured to be connected to asource of external AC (alternating-current) power, such as a householdAC power supply (may also be referred to as AC mains). The AC power mayhave a voltage in the range of 110-220 VAC, for example. The incoming ACpower may be received by the AC/DC adapter 1904, which may convert theincoming AC power to DC (direct-current) and may step down the voltagefrom 110-220 VAC to a lower output voltage of about 12 VDC and an outputcurrent of about 2 A, for example. In various embodiments, the output ofthe AC/DC adapter 1904 may be in a range of from about 9 V to about 15V, for example, and in a range of from about 0.5 A to about 5 A, forexample. These voltages and currents are only examples provided forillustration and are not limiting in any way.

With further reference to FIG. 19, the floodlight controller 1902further comprises other components, including a processor 1906 (may alsobe referred to as a controller), a photosensor 1908, an audio CODEC(coder-decoder) 1910, at least one speaker 1912 (which may be similar tospeaker 106), the at least one microphone 1914 (which may be similar tomicrophone 104), at least one motion sensor 1916, an infrared (IR) lightsource 1918, an IR cut filter 1920, an image sensor 1922 (may be acomponent of the camera 102, and may be referred to interchangeably asthe camera 102), volatile memory 1924, non-volatile memory 1926, acommunication module 1928, a button 1930, a switch 1932 for controllingone or more floodlights, and a plurality of light indicators 1934. Eachof these components is described in detail below.

With further reference to FIG. 19, the processor 1906 may perform dataprocessing and various other functions, as described below. Theprocessor 1906 may comprise an integrated circuit including a processorcore, the volatile memory 1924, the non-volatile memory 1926, and/orprogrammable input/output peripherals (not shown). The volatile memory1924 may comprise, for example, DDR3 SDRAM (double data rate type threesynchronous dynamic random-access memory). The non-volatile memory 1926may comprise, for example, NAND flash memory. In the embodimentillustrated in FIG. 19, the volatile memory 1924 and the non-volatilememory 1926 are illustrated outside the box representing the processor1906. The embodiment illustrated in FIG. 19 is, however, merely anexample, and in some embodiments the volatile memory 1924 and/or thenon-volatile memory 1926 may be physically incorporated with theprocessor 1906, such as on the same chip. The volatile memory 1924and/or the non-volatile memory 1926, regardless of their physicallocation, may be shared by one or more other components (in addition tothe processor 1906) of the present floodlight controller 1902.

With further reference to FIG. 19, the image sensor 1922 (camera 102),the IR light source 1918, the IR cut filter 1920, and the photosensor1908 are all operatively coupled to the processor 1906. As described indetail below, the IR light source 1918 and the IR cut filter 1920facilitate “night vision” functionality of the image sensor 1922. Forexample, the photosensor 1908 is configured to detect the level ofambient light about the floodlight controller 1902. The processor 1906uses the input from the photosensor 1908 to control the states of the IRlight source 1918 and the IR cut filter 1920 to activate and deactivatenight vision, as described below. In some embodiments, the image sensor1922 may comprise a video recording sensor or a camera chip. In someembodiments, the IR light source 1918 may comprise one or more IRlight-emitting diodes (LEDs).

With further reference to FIG. 19, the at least one speaker 1912 and theat least one microphone 1914 are operatively coupled to the audio CODEC1910, which is operatively coupled to the processor 1906. The transferof digital audio between the user and a visitor (or intruder) may becompressed and decompressed using the audio CODEC 1910, as describedbelow. The motion sensor(s) 1916 is also operatively coupled to theprocessor 1906. The motion sensor(s) 1916 may comprise, for example,passive infrared (PIR) sensors, or any other type of sensor capable ofdetecting and communicating to the processor 1906 the presence and/ormotion of an object within its field of view. When the processor 1906 istriggered by the motion sensor(s) 1916, the processor 1906 may performone or more functions, as described below.

With further reference to FIG. 19, the communication module 1928 isoperatively coupled to the processor 1906. The communication module1928, which includes at least one antenna 1936, is configured to handlecommunication links between the floodlight controller 1902 and other,external devices or receivers, and to route incoming/outgoing dataappropriately. For example, inbound data from the antenna(s) 1936 may berouted through the communication module 1928 before being directed tothe processor 1906, and outbound data from the processor 1906 may berouted through the communication module 1928 before being directed tothe antenna(s) 1936. The communication module 1928 may include one ormore transceiver modules capable of transmitting and receiving data, andusing, for example, one or more protocols and/or technologies, such asGSM, UMTS (3GSM), IS-95 (CDMA one), IS-2000 (CDMA 2000), LTE, FDMA,TDMA, W-CDMA, CDMA, OFDMA, Wi-Fi, WiMAX, Bluetooth, or any otherprotocol and/or technology. In the illustrated embodiment, thecommunication module 1928 includes a Wi-Fi chip 1938 and a Bluetoothchip 1940, but these components are merely examples and are notlimiting. Further, while the Wi-Fi chip 1938 and the Bluetooth chip 1940are illustrated within the box representing the communication module1928, the embodiment illustrated in FIG. 19 is merely an example, and insome embodiments the Wi-Fi chip 1938 and/or the Bluetooth chip 1940 arenot necessarily physically incorporated with the communication module1928.

In some embodiments, the communication module 1928 may further comprisea wireless repeater (not shown, may also be referred to as a wirelessrange extender). The wireless repeater is configured to receive awireless signal from a wireless router (or another network device) inthe user's network 110 and rebroadcast the signal. Wireless devices thatare not within the broadcast range of the wireless router, or that onlyweakly receive the wireless signal from the wireless router, may receivethe rebroadcast signal from the wireless repeater of the communicationmodule 1928, and may thus connect to the user's network 110 through thefloodlight controller 1902. In some embodiments, the wireless repeatermay include one or more transceiver modules (not shown) capable oftransmitting and receiving data, and using, for example, one or moreprotocols and/or technologies, such as Wi-Fi (IEEE 1902.11), WiMAX (IEEE1902.16), or any other protocol and/or technology.

With further reference to FIG. 19, when a visitor (or intruder) who ispresent in the area about the floodlight controller 1902 speaks, audiofrom the visitor (or intruder) is received by the microphones 1914 andcompressed by the audio CODEC 1910. Digital audio data is then sentthrough the communication module 1928 to the network 112 (FIG. 1) viathe user's network 110, routed by the server 118 and/or the API 120, anddelivered to the user's client device 114. When the user speaks, afterbeing transferred through the network 112, the user's network 110, andthe communication module 1928, the digital audio data from the user isdecompressed by the audio CODEC 1910 and emitted to the visitor throughthe speaker 1912, which may be driven by a speaker driver (not shown).

With further reference to FIG. 19, the button 1930 is operativelycoupled to the processor 1906. The button 1930 may have one or morefunctions, such as changing an operating mode of the floodlightcontroller 1902 and/or triggering a reset of the floodlight controller1902. For example, when the button 1930 is pressed and released, it maycause the communication module 1928 of the floodlight controller 1902 toenter access point (AP) mode, which may facilitate connecting thefloodlight controller 1902 to the user's network 110. Alternatively, orin addition, when the button 1930 is pressed and held down for at leasta threshold amount of time, it may trigger the erasing of any datastored at the volatile memory 1924 and/or at the non-volatile memory1926, and/or may trigger a reboot of the processor 1906.

With reference to FIG. 20, the floodlight controller 1902 comprises ahousing 2002 for containing and protecting the interior components ofthe floodlight controller 1902. The housing 2002 includes a front wall2004, a rear wall 2006, opposing side walls 2008, 2010, an upper wall2012, and a tapered lower portion 2014. The front wall 2004 includes acentral opening that receives an upper shield 2016 and a lower grill2018. In the illustrated embodiment, front surfaces of the upper shield2016 and the lower grill 2018 are substantially flush with a frontsurface of the front wall 2004, but in alternative embodiments thesesurfaces may not be flush with one another. The upper shield 2016 issubstantially rectangular, and includes a semicircular indentation 2020along its lower edge 2022. The lower grill 2018 is substantiallyrectangular, and includes a semicircular indentation 2024 along itsupper edge 2026. Together, the semicircular indentations 2020, 2024 inthe upper shield 2016 and the lower grill 2018 form a circular opening2028 that accommodates a light pipe 2030. A cover extends across andcloses an outer open end of the light pipe 2030. The upper shield 2016,the lower grill 2018, the light pipe 2030, and the cover are alldescribed in further detail below. The camera (not shown) is located inthe circular opening 2028 formed by the upper shield 2016 and the lowergrill 2018, behind the cover, and is surrounded by the light pipe 2030.

With reference to FIG. 19, the floodlight controller 1902 furthercomprises the microphones 1914. In the illustrated embodiment, a firstone of the microphones 1914 is located along the front of the floodlightcontroller 1902 behind the upper shield 2016 (FIG. 20) and a second oneof the microphones 1914 is located along the left side of the floodlightcontroller 1902 behind the left-side wall 2010 (FIG. 20) of the housing2002. Including two microphones that are spaced from one another andlocated on different sides of the floodlight controller 1902 providesthe illustrated embodiment of the floodlight controller 1902 withadvantageous noise cancelling and/or echo cancelling for clearer audio.The illustrated embodiment is, however, just one example and is notlimiting. Alternative embodiments may only include one microphone 1914,or include two microphones 1914 in different locations than asillustrated in FIG. 19.

With reference to FIG. 20, the upper shield 2016 may include a firstmicrophone opening 2032 located in front of the first microphone 1914 tofacilitate the passage of sound through the upper shield 2016 so thatsounds from the area about the floodlight controller 1902 may reach thefirst microphone 1914. The left-side wall 2010 of the housing 2002 mayinclude a second microphone opening (not shown) located in front of thesecond microphone 1914 that facilitates the passage of sound through theleft-side wall 2010 of the housing 2002 so that sounds from the areaabout the floodlight controller 1902 may reach the second microphone1914.

With further reference to FIG. 20, the floodlight controller 1902 mayfurther comprise a light barrier 2034 surrounding inner and outersurfaces of the light pipe 2030. The light barrier 2034 may comprise asubstantially opaque material that prevents the light generated by thelight indicators 1934 from bleeding into the interior spaces of thefloodlight controller 1902 around the light pipe 2030. The light barrier2034 may comprise a resilient material, such as a plastic, which mayalso advantageously provide moisture sealing at the junctures betweenthe light pipe 2030 and the upper shield 2016 and the lower grill 2018.Portions of the light barrier 2034 may also extend between the juncturesbetween the upper shield 2016 and the lower grill 2018.

With further reference to FIG. 19, the floodlight controller 1902further comprises connecting hardware configured for connecting thefloodlight controller 1902 to a floodlight device 2102 (FIG. 21) and apower source (not shown). The floodlight controller 1902 furthercomprises a plurality of wires for connecting the floodlight controller1902 to the power supply and to the floodlight(s) 2104 (FIG. 21) of thefloodlight device 2102 (for enabling the floodlight controller 1902 toturn the floodlight(s) 2104 on and off). In the illustrated embodiment,three wires may be used, but the illustrated embodiment is merely oneexample and is not limiting. In alternative embodiments, any number ofwires may be provided.

Some of the present embodiments may comprise computer vision for one ormore aspects, such as object and/or facial recognition. Computer visionincludes methods for acquiring, processing, analyzing, and understandingimages and, in general, high-dimensional data from the real world inorder to produce numerical or symbolic information, e.g., in the form ofdecisions. Computer vision seeks to duplicate the abilities of humanvision by electronically perceiving and understanding an image.Understanding in this context means the transformation of visual images(the input of the retina) into descriptions of the world that mayinterface with other thought processes and elicit appropriate action.This image understanding may be seen as the disentangling of symbolicinformation from image data using models constructed with the aid ofgeometry, physics, statistics, and learning theory. Computer vision hasalso been described as the enterprise of automating and integrating awide range of processes and representations for vision perception. As ascientific discipline, computer vision is concerned with the theorybehind artificial systems that extract information from images. Theimage data may take many forms, such as video sequences, views frommultiple cameras, or multi-dimensional data from a scanner. As atechnological discipline, computer vision seeks to apply its theoriesand models for the construction of computer vision systems.

One aspect of computer vision comprises determining whether or not theimage data contains some specific object, feature, or activity.Different varieties of computer vision recognition include: ObjectRecognition (also called object classification)—One or severalpre-specified or learned objects or object classes may be recognized,usually together with their 2D positions in the image or 3D poses in thescene. Identification—An individual instance of an object is recognized.Examples include identification of a specific person's face orfingerprint, identification of handwritten digits, or identification ofa specific vehicle. Detection—The image data are scanned for a specificcondition. Examples include detection of possible abnormal cells ortissues in medical images or detection of a vehicle in an automatic roadtoll system. Detection based on relatively simple and fast computationsis sometimes used for finding smaller regions of interesting image datathat may be further analyzed by more computationally demandingtechniques to produce a correct interpretation.

Several specialized tasks based on computer vision recognition exist,such as: Optical Character Recognition (OCR)—Identifying characters inimages of printed or handwritten text, usually with a view to encodingthe text in a format more amenable to editing or indexing (e.g., ASCII).2D Code Reading—Reading of 2D codes such as data matrix and QR codes.Facial Recognition. Shape Recognition Technology (SRT)—Differentiatinghuman beings (e.g., head and shoulder patterns) from objects.

Typical functions and components (e.g., hardware) found in many computervision systems are described in the following paragraphs. The presentembodiments may include at least some of these aspects. For example,embodiments of the present A/V recording and communication doorbell 130may include a computer vision module (not shown). In addition,embodiments of the present security camera 1702 may include a computervision module 1844. The computer vision module 1844 may include any ofthe components (e.g., hardware) and/or functionality described hereinwith respect to computer vision, including, without limitation, one ormore cameras, sensors, and/or processors. In some of the presentembodiments, with reference to FIGS. 3-16, the microphone 158, thecamera 134, and/or the imager 171 may be components of the computervision module.

Image acquisition—A digital image is produced by one or several imagesensors, which, besides various types of light-sensitive cameras, mayinclude range sensors, tomography devices, radar, ultra-sonic cameras,etc. Depending on the type of sensor, the resulting image data may be a2D image, a 3D volume, or an image sequence. The pixel values maycorrespond to light intensity in one or several spectral bands (grayimages or color images), but may also be related to various physicalmeasures, such as depth, absorption or reflectance of sonic orelectromagnetic waves, or nuclear magnetic resonance.

Pre-processing—Before a computer vision method may be applied to imagedata in order to extract some specific piece of information, it isusually beneficial to process the data in order to assure that itsatisfies certain assumptions implied by the method. Examples ofpre-processing include, but are not limited to re-sampling in order toassure that the image coordinate system is correct, noise reduction inorder to assure that sensor noise does not introduce false information,contrast enhancement to assure that relevant information may bedetected, and scale space representation to enhance image structures atlocally appropriate scales.

Feature extraction—Image features at various levels of complexity areextracted from the image data. Typical examples of such features are:Lines, edges, and ridges; Localized interest points such as corners,blobs, or points; More complex features may be related to texture,shape, or motion.

Detection/segmentation—At some point in the processing a decision may bemade about which image points or regions of the image are relevant forfurther processing. Examples are: Selection of a specific set ofinterest points; Segmentation of one or multiple image regions thatcontain a specific object of interest; Segmentation of the image intonested scene architecture comprising foreground, object groups, singleobjects, or salient object parts (also referred to as spatial-taxonscene hierarchy).

High-level processing—At this step, the input may be a small set ofdata, for example a set of points or an image region that is assumed tocontain a specific object. The remaining processing may comprise, forexample: Verification that the data satisfy model-based andapplication-specific assumptions; Estimation of application-specificparameters, such as object pose or object size; Imagerecognition—classifying a detected object into different categories;Image registration—comparing and combining two different views of thesame object.

Decision making—Making the final decision required for the application,for example match/no-match in recognition applications.

One or more of the present embodiments may include a vision processingunit (not shown separately, but may be a component of the computervision module). A vision processing unit is an emerging class ofmicroprocessor; it is a specific type of AI (artificial intelligence)accelerator designed to accelerate machine vision tasks. Visionprocessing units are distinct from video processing units (which arespecialized for video encoding and decoding) in their suitability forrunning machine vision algorithms such as convolutional neural networks,SIFT, etc. Vision processing units may include direct interfaces to takedata from cameras (bypassing any off-chip buffers), and may have agreater emphasis on on-chip dataflow between many parallel executionunits with scratchpad memory, like a many core DSP (digital signalprocessor). But, like video processing units, vision processing unitsmay have a focus on low precision fixed-point arithmetic for imageprocessing.

Some of the present embodiments may use facial recognition hardwareand/or software, as a part of the computer vision system. Various typesof facial recognition exist, some or all of which may be used in thepresent embodiments.

Some face recognition identifies facial features by extractinglandmarks, or features, from an image of the subject's face. Forexample, an algorithm may analyze the relative position, size, and/orshape of the eyes, nose, cheekbones, and jaw. These features are thenused to search for other images with matching features. Other algorithmsprobes a gallery of face images and then compress the face data, onlysaving the data in the image that is useful for face recognition. Aprobe image is then compared with the face data. One of the earliestsuccessful systems is based on template matching techniques applied to aset of salient facial features, providing a sort of compressed facerepresentation.

Recognition algorithms may be divided into two main approaches,geometric, which looks at distinguishing features, or photometric, whichis a statistical approach that distills an image into values andcompares the values with templates to eliminate variances.

Popular recognition algorithms include principal component analysisusing eigenfaces, linear discriminant analysis, elastic bunch graphmatching using the Fisherface algorithm, the hidden Markov model, themultilinear subspace learning using tensor representation, and theneuronal motivated dynamic link matching.

Further, a newly emerging trend, claimed to achieve improved accuracy,is three-dimensional face recognition. This technique uses 3D sensors tocapture information about the shape of a face. This information is thenused to identify distinctive features on the surface of a face, such asthe contour of the eye sockets, nose, and chin.

One advantage of 3D face recognition is that it is not affected bychanges in lighting like other techniques. It may also identify a facefrom a range of viewing angles, including a profile view.Three-dimensional data points from a face vastly improve the precisionof face recognition. 3D research is enhanced by the development ofsophisticated sensors that do a better job of capturing 3D face imagery.The sensors work by projecting structured light onto the face. Up to adozen or more of these image sensors may be placed on the same CMOSchip—each sensor captures a different part of the spectrum.

Another variation is to capture a 3D picture by using three trackingcameras that point at different angles; one camera pointing at the frontof the subject, a second one to the side, and a third one at an angle.All these cameras work together to track a subject's face in real timeand be able to face detect and recognize.

Another emerging trend uses the visual details of the skin, as capturedin standard digital images or scanned images, for example. Thistechnique, called skin texture analysis, turns the unique lines,patterns, and spots apparent in a person's skin into a mathematicalspace.

Another form of taking input data for face recognition is by usingthermal cameras, which may only detect the shape of the head and ignorethe subject accessories such as glasses, hats, or make up.

Further examples of automatic identification and data capture (AIDC)and/or computer vision that may be used in the present embodiments toverify the identity and/or authorization of a person include, withoutlimitation, biometrics. Biometrics refers to metrics related to humancharacteristics. Biometrics authentication (or realistic authentication)is used in various forms of identification and access control. Biometricidentifiers are the distinctive, measurable characteristics used tolabel and describe individuals. Biometric identifiers may bephysiological characteristics and/or behavioral characteristics.Physiological characteristics may be related to the shape of the body.Examples include, but are not limited to, fingerprints, palm veins,facial recognition, three-dimensional facial recognition, skin textureanalysis, DNA, palm prints, hand geometry, iris recognition, retinarecognition, and odor/scent recognition. Behavioral characteristics maybe related to the pattern of behavior of a person, including, but notlimited to, typing rhythm, gait, and voice recognition.

As discussed above, the present disclosure provides numerous examples ofmethods and systems including A/V recording and communication doorbells,but the present embodiments are equally applicable for A/V recording andcommunication devices other than doorbells. For example, the presentembodiments may include one or more A/V recording and communicationsecurity cameras (e.g., security camera 1702 of FIGS. 17-18, thefloodlight controller 1902 of FIGS. 19-21, etc.) instead of, or inaddition to, one or more A/V recording and communication doorbells. Anexample A/V recording and communication security camera may includesubstantially all of the structure and functionality of the doorbell130, but without the front button 133, the button actuator, and/or thelight pipe 136. An example A/V recording and communication securitycamera may further omit other components, such as, for example, thebracket PCB 149 and its components.

As described above, the present embodiments advantageously leverage thefunctionality of A/V recording and communication devices to selectivelymonitor one or more intrusion zones. For example, an A/V recording andcommunication device may be configured to detect motion within its fieldof view and determine whether at least one conditional setting issatisfied. In various embodiments, conditional settings may include (butare not limited to) a time of day, a level of ambient light, a directionof movement, a speed of movement, a length of time an object is withinan intrusion zone, a level of reflecting light intensity, and/or a bodyposture of a person within an intrusion zone. In some embodiments, whenmotion is detected in the intrusion zone while the at least oneconditional setting is satisfied, an intrusion action may be determinedand executed. By selectively monitoring intrusions using conditionalsettings, A/V recording and communication device resources may bepreserved, and unwarranted intrusion alerts may be avoided.

In certain embodiments according to the present disclosure, the user mayremotely modify settings of an A/V recording and communication device,such as (but not limited to) the A/V recording and communication device100 (FIG. 1), the A/V recording and communication doorbell 130 (FIGS.3-16), the security camera 1702 (FIG. 17-18), and/or the floodlightcontroller 1902 (FIGS. 19-21). For example, the user may toggle one ormore zones (areas of the fields of view of the passive infrared sensors144, FIG. 15) ON and OFF. In another example, the user may increase anddecrease the range (or sensitivity) of the passive infrared sensors.Changes to the settings of the A/V recording and communication devicemay affect the notifications that the user receives from the A/Vrecording and communication device. For example, the user may turn offselected zones and/or decrease the range of the passive infrared sensorsto reduce “false alarm” alerts, such as those generated by passing cars.

As discussed above, one aspect of the present embodiments includes therealization that sometimes motion detected by an A/V recording andcommunication device may be indicative of a threat, such as an intruder,and other times the motion may be benign, such as motion caused by aninvited visitor, a parcel delivery carrier, a neighbor, an animal, or apassing vehicle. It would be advantageous, therefore, if thefunctionality of A/V recording and communication devices could beenhanced in one or more ways to distinguish between various types ofmotion within the field of view of the A/V recording and communicationdevice. Such enhancements could increase the effectiveness of A/Vrecording and communication devices by providing a warning to the userwhen it is likely that detected motion is associated with a threat,while also possibly suppressing warnings to the user when it is unlikelythat detected motion is associated with a threat. The user would thus beless likely to suffer alert fatigue due to persistent false alarms,thereby making it more likely that the user will respond to warningsthat are associated with actual threats. The present embodiments providethese advantages and enhancements, as described below.

Another aspect of the present embodiments includes the realization that,when motion is detected by an A/V recording and communication device, auser may want a security system to perform one or more actions, and/orrefrain from performing one or more actions, based on whether the motionwas caused by a threat and/or if the motion was unlikely caused by athreat. However, security systems, other than those described by thecurrent embodiments, may only be configured to activate an alarm whenmotion is detected, whether or not the motion was caused by a threat. Insome circumstances, however, based on the location of where the motionis detected and/or based on the activation mode in which the securitysystem is operating, the user of the security system may not want thesecurity system to activate the alarm, as the motion may not be causedby a threat. For example, if the motion detected by the A/V recordingand communication device occurred a great distance from the user'sproperty, and/or the motion was detected during daylight hours when aninvited visitor may enter the user's property, the user may not want thesecurity system to activate the alarm, as the motion may not be causedby a threat. If the security system continuously activates the alarmbased on motion that is not caused by a threat, the user may begin toignore alerts that indicate that the security system has activated thealarm, which may cause the user to miss alerts of actual threats.

The current embodiments solve this problem by providing a user with theability to configure a security system to perform one or more actions,and/or refrain from performing one or more actions, based onparameter(s) that the user sets for motion that is detected by an A/Vrecording and communication device. For example, the user may createintrusion zone(s) for the A/V recording and communication device. Eachintrusion zone may be associated with a motion zone of the A/V recordingand communication device, a conditional setting, an activation mode forthe security system, and/or an action that the security system is toperform. Based on the A/V recording and communication device detectingmotion within the intrusion zone, a network device may determine thatthe security system is operating in the activation mode and that theconditional setting is satisfied. In response, the network device maycause the security system to perform the action. As such, and as aresult of using intrusion zones, the security system may perform afunction, such as activating an alarm, at times when it is more likelythat motion is caused by a threat. Additionally, the user may beprovided with alerts that indicate actual threats, such that the userwill not suffer from alert fatigue. Therefore, the user will more likelyrespond to warnings of actual threats detected by the security system.The present embodiments further provide these advantages andenhancements, as described below.

FIG. 22 is a functional block diagram illustrating a system 2200 forcommunicating in a network according to various aspects of the presentdisclosure. The system 2200 may include one or more A/V recording andcommunication devices 2202 configured to access a user's network 2204(which may correspond to the user's network 110) to connect to a network(Internet/PSTN) 2206 (in some embodiments, the devices 2202 may beconfigured to connect directly to the network (Internet/PSTN) 2206, suchas over a cellular connection). The one or more A/V recording andcommunication devices 2202 may include any or all of the componentsand/or functionality of the A/V recording and communication device 100(FIGS. 1-2), the A/V recording and communication doorbell 130 (FIGS.3-16), the security camera 1702 (FIGS. 17-18), and/or the floodlightcontroller 1902 (FIGS. 19-21).

The user's network 2204 may include any or all of the components and/orfunctionality of the user's network 110 described herein.

The system 2200 may further include a smart-home hub device 2212 (whichmay alternatively be referred to herein as the hub device 2212)connected to the user's network 2204. The smart-home hub device 2212(also known as a home automation hub, gateway device, etc.), maycomprise any device that facilitates communication with and control ofthe sensors 2214, automation devices 2216, and/or the one or more A/Vrecording and communication devices 2202. For example, the smart-homehub device 2212 may be a component of a home automation system installedat a property. In some embodiments, the A/V recording and communicationdevices 2202, the sensors 2214, and/or the automation devices 2216 maycommunicate with the smart-home hub device 2212 directly and/orindirectly via the user's network 2204 and/or the network(Internet/PSTN) 2206. In some of the present embodiments, the A/Vrecording and communication devices 2202, the sensors 2214, and/or theautomation devices 2216 may, in addition to or in lieu of communicatingwith the smart-home hub device 2212, communicate with the client devices2208, 2210 and/or one or more of the components of the network ofservers/backend devices 2218 directly and/or indirectly via the user'snetwork 2204 and/or the network (Internet/PSTN) 2206.

Home automation, or smart home, is building automation for the home. Itinvolves the control and automation of various devices and/or systems,such as lighting, heating (such as smart thermostats), ventilation, airconditioning (HVAC), blinds/shades, and security, as well as homeappliances, such as washers/dryers, ovens, or refrigerators/freezers.Wi-Fi is often used for remote monitoring and control. Smart homedevices (e.g., the hub device 2212, the sensors 2214, the automationdevices 2216, the A/V recording and communication devices 2202, etc.),when remotely monitored and controlled via the network (Internet/PSTN)2206, may be considered to be components of the Internet of Things.Smart home systems may include switches and/or sensors (e.g., thesensors 2214) connected to a central hub such as the smart-home hubdevice 2212, sometimes called a gateway, from which the system may becontrolled with a user interface. The user interface may include any orall of a wall-mounted terminal (e.g., a keypad, a touchscreen, etc.),software installed on the client devices 2208, 2210 (e.g., a mobileapplication), a tablet computer or a web interface, often but not alwaysvia Internet cloud services. The home automation system may use one ormore communication protocols, including either or both of wired andwireless protocols, including but not limited to Wi-Fi, X10, Ethernet,RS-485, 6LoWPAN, Bluetooth LE (BTLE), ZigBee, and Z-Wave.

The one or more sensors 2214 may include, for example, at least one of adoor sensor, a window sensor, a contact sensor, a tilt sensor, atemperature sensor, a carbon monoxide sensor, a smoke detector, a lightsensor, a glass break sensor, a motion sensor, and/or other sensors thatmay provide the user/owner of a security system 2228 a notification of asecurity event at his or her property.

The one or more automation devices 2216 may include, for example, atleast one of an outdoor lighting system, an indoor lighting system, andindoor/outdoor lighting system, a temperature control system (e.g., athermostat), a shade/blind control system, a locking control system(e.g., door lock, window lock, etc.), a home entertainment automationsystem (e.g., TV control, sound system control, etc.), an irrigationcontrol system, and/or other automation devices.

As described herein, in some of the present embodiments, some or all ofthe user's network 2204, the client devices 2208, 2210, the A/Vrecording and communication device 2202, the smart-home hub device 2212,the sensors 2214, the automation devices 2216, and an alarm 2230 may bereferred to as the security system 2228, which may be installed at aproperty or premises.

With further reference to FIG. 22, the system 2200 may also includevarious backend devices such as (but not limited to) storage devices2220, backend server 2222, and backend APIs 2224 that may be in networkcommunication (e.g., over the user's network 2204 and/or the network(Internet/PSTN) 2206) with the A/V recording and communication devices2202, the hub device 2212, the client devices 2208, 2210, the sensors2214, and/or the automation devices 2216. In some embodiments, thestorage devices 2220 may be a separate device from the backend server2222 (as illustrated) or may be an integral component of the backendserver 2222. The storage devices 2220 may be similar in structure and/orfunction to the storage device 228 (FIG. 1). In addition, in someembodiments, the backend server 2222 and backend APIs 2224 may besimilar in structure and/or function to the server 120 and the backendAPI 122 (FIG. 1), respectively.

With further reference to FIG. 22, the system 2200 may also include asecurity monitoring service 2226. The security monitoring service 2226may be operated by the same company that manufactures, sells, and/ordistributes the A/V recording and communication devices 2202, the hubdevice 2212, the sensors 2214, and/or the automation devices 2216. Inother embodiments, the security monitoring service 2226 may be operatedby a third-party company (e.g., a different company than the one thatmanufactured, sold, and/or distributed the A/V recording andcommunication devices 2202, the hub device 2212, the sensors 2214,and/or the automation devices 2216). In any of the present embodiments,the security monitoring service 2226 may have control of at least someof the features and components of the security system 2228 (e.g., thesecurity monitoring service 2226 may be able to arm and/or disarm thesecurity system 2228, lock and/or unlock doors, activate and/ordeactivate one or more of the sensors 2214 and/or the automation devices2216, etc.). For example, the security monitoring service 2226 mayoperate and control their own client devices and/or network ofservers/backend devices for monitoring and/or controlling securitysystems 2228. In such an example, the A/V recording and communicationdevices 2202, the hub device 2212, the sensors 2214, and/or theautomation devices 2216 may communicate with the client devices and/orone or more components of the network of servers/backend devices of thesecurity monitoring service 2226 over the network (Internet/PSTN) 2206(in some embodiments, via one or more of the components of the networkof backend servers/backend devices 2218).

The system 2200 may also include one or more client devices 2208, 2210,which in various embodiments may be configured to be in networkcommunication and/or associated with the A/V recording and communicationdevice 2202. The client devices 2208, 2210 may comprise, for example, amobile phone such as a smartphone, or a computing device such as atablet computer, a laptop computer, a desktop computer, etc. The clientdevices 2208, 2210 may include any or all of the components and/orfunctionality of the client device 100 (FIG. 1) and/or the client device800 (FIG. 48) described herein. In some embodiments, one or more of theclient devices 2208, 2210 may not be associated with the A/V recordingand communication device 2202.

With further reference to FIG. 22, the security system 2228 may includean alarm 2230 that outputs sound, such as when the security system 2228is triggered. In some examples, the alarm 2230 may be separate from theother components of the security system 2228. In some examples, thealarm 22230 may include a component (e.g., installed within) of the hubdevice 2212.

FIG. 23 is a functional block diagram illustrating an embodiment of anA/V recording and communication device 2202 according to various aspectsof the present disclosure. In some embodiments, the A/V recording andcommunication device 2202 may represent, and further include one or moreof the components from, the A/V recording and communication doorbell130, the A/V recording and communication security camera 1702, and/orthe floodlight controller 1902. Additionally, in some embodiments, theA/V recording and communication device 2202 may omit one or more of thecomponents shown in FIG. 23 and/or may include one or more additionalcomponents not shown in FIG. 23.

The A/V recording and communication device 2202 may comprise aprocessing module 2302 that is operatively connected to a camera 2304,microphone(s) 2306, a motion sensor 2308, a speaker 2310, acommunication module 2312, and a button 2314 (in embodiments where theA/V recording and communication device 2202 is a doorbell, such as theA/V recording and communication doorbell 130). The processing module2302 may comprise a processor 2316, volatile memory 2318, andnon-volatile memory 2320, which includes a device application 2322. Invarious embodiments, the device application 2322 may configure theprocessor 2316 to capture image data 2324 using the camera 2304, audiodata 2326 using the microphone(s) 2306, input data 2328 using the button2314 (and/or the camera 2304 and/or the motion sensor 2308, depending onthe embodiment), and/or motion data 2330 using the camera 2304 and/orthe motion sensor 2308. In some embodiments, the device application 2322may also configure the processor 2316 to generate text data 2332describing the image data 2324, the audio data 2326, and/or the inputdata 2328, such as in the form of metadata, for example.

In addition, the device application 2322 may configure the processor2316 to transmit the image data 2324, the audio data 2326, the motiondata 2330, the input data 2328, the text data 2332, and/or a user alert2334 to the client devices 2208, 2210, the hub device 2212, and/or thebackend server 2222 using the communication module 2312. In variousembodiments, the device application 2322 may also configure theprocessor 2316 to generate and transmit an output signal 2336 that mayinclude the image data 2324, the audio data 2326, the text data 2332,the input data 2328, and/or the motion data 2330. In some of the presentembodiments, the output signal 2336 may be transmitted to the backendserver 2222 and/or the hub device 2212 using the communication module2312, and the backend server 2222 and/or the hub device 2212 maytransmit (or forward) the output signal 2336 to the client devices 2208,2210 and/or the backend server 2222 may transmit the output signal 2336to the hub device 2212. In other embodiments, the output signal 2336 maybe transmitted directly to the client devices 2208, 2210 and/or the hubdevice 2212.

In further reference to FIG. 23, the image data 2324 may comprise imagesensor data such as (but not limited to) exposure values and dataregarding pixel values for a particular sized grid. The image data 2324may include still images, live video, and/or pre-recorded images and/orvideo. The image data 2324 may be recorded by the camera 2304 in a fieldof view of the camera 2304.

In further reference to FIG. 23, the motion data 2330 may comprisemotion sensor data generated in response to motion events. For example,the motion data 2330 may include an amount or level of a data typegenerated by the motion sensor 2308 (e.g., the voltage level output bythe motion sensor 2308 when the motion sensor 2308 is a PIR type motionsensor (e.g., PIRs 144)). In some of the present embodiments, such asthose where the A/V recording and communication device 2202 does notinclude the motion sensor 2308, the motion data 2330 may be generated bythe camera 2304. In such embodiments, based on a frame by framecomparison of changes in the pixels from the image data 2324, it may bedetermined that motion is present.

The input data 2328 may include that data generated in response to aninput to the button 2314. The button 2314 (which may include similardesign and functionality to that of the front button 133 (FIG. 3)) mayreceive an input (e.g., a press, a touch, a series of touches and/orpresses, etc.) and may generate the input data 2328 in response that isindicative of the type of input. In embodiments where the A/V recordingand communication device 2202 is not a doorbell, the A/V recording andcommunication device 2202 may not include the button 2314, and in suchembodiments, the A/V recording and communication device 2202 may notgenerate the input data 2328 and/or the input data 2328 may be generatedby another component of the A/V recording and communication device 2202(e.g., the camera 2304).

With further reference to FIG. 23, a user alert 2334 may be generated bythe processor 2316 and transmitted, using the communication module 2312,to the client devices 2208, 2210, the hub device 2212, and/or thebackend server 2222. For example, in response to detecting motion usingthe camera 2304 and/or the motion sensor 2308, the A/V recording andcommunication device 2202 may generate and transmit the user alert 2334.In some of the present embodiments, the user alert 2334 may include atleast the image data 2324, the audio data 2326, the text data 2332,and/or the motion data 2330. Upon receiving the user alert 2334, theuser of the client device 2208, 2210 may be able to share the user alert2334 (or at least some of the contents of the user alert 2334, such asthe image data 2324) with a geographic area network.

As described herein, at least some of the processes of the hub device2212, the backend server 2222, and/or the client device 2208, 2210 maybe executed by the A/V recording and communication device 2202. Forexample, the device application 2322 may configure the processor 2316 toreceive, using the communication module 2312, control signals 2338 fromthe client device 2208, 2210, the hub device 2212, and/or the backendserver 2222, where the control signal 2338 are configured to cause theA/V recording and communication device 2202 to save intrusion zone(s)2340 and/or monitor intrusion zone(s) 2340. For example, the controlsignals 2338 may include, and/or the processor 2316 of the A/V recordingand communication device 2202 may separately receive, using thecommunication module 2312, data representing the intrusion zone(s) 2340.

As described above, the A/V recording and communication device 2202 maymonitor one or more intrusion zone(s) 2340 to determine when motion isdetected within the one or more intrusion zone(s) 2340. As shown, eachintrusion zone 2340 may include and/or be associated with motion zone(s)2342, conditional setting(s) 2344, activation mode(s) 2346, and/oraction(s) 2348. The motion zone(s) 2342 may include one or more of themotion zones 2350 associated with a field of view of the A/V recordingand communication device 2202, which are illustrated in FIGS. 27-33. Forexample, and without limitation, the A/V recording and communicationdevice 2202 may include five separate motion zones 2350. As such, anintrusion zone 2340 may be associated with one of the five motion zones2350, such as the third motion zone 2350 (which is represented by motionzone 2342). Conditional setting(s) 2344 may include, but are not limitedto, a time of day, a level of ambient light, a direction of movement, aspeed of movement, a length of time an object is within an intrusionzone, a level of reflecting light intensity, and/or a body posture of aperson within an intrusion zone.

Activation mode(s) 2346 may include one or more activation modesassociated with the security system 2228. The one or more activationmodes associated with the security system 2228 may include, but are notlimited to, an armed stay mode, an armed away mode, an armed vacationmode, a disarmed mode, and a custom armed mode. For example, in thearmed stay mode, the sensors 2214 inside the property (e.g., the motionsensors) may be disarmed, while the sensors 2214 (e.g., the doorsensors, the window sensors, etc.) outside and along a perimeter of theproperty and/or the A/V recording and communication devices 2202 may bearmed. Additionally, during the armed stay mode, at least one of theautomation devices 2216 (e.g., an exterior automation system) may beactivated between certain hours, such as, but not limited to, 6:00 p.m.and 4:00 a.m.

In the armed away mode, the sensors 2214 inside the property, thesensors 2214 outside and along the perimeter of the property, and/or theA/V recording and communication devices 2202 may be armed. Additionally,during the armed away mode, at least one of the automation devices 2216(e.g., an interior and/or exterior automation system) may be activatedbetween certain hours, such as, but not limited to, 6:00 p.m. and 4:00a.m. In the armed vacation mode, the sensors 2214, the automationdevices 2216, and/or the first A/V recording and communication devices2202 may be armed and disarmed similar to the armed away mode, however,any alerts and security events may additionally or alternatively be sentto neighbors and/or law enforcement.

In the disarmed mode, all of the sensors 2214 and/or the automationdevices 2216 may be disarmed. However, in the disarmed mode, one or moreA/V recording and communication devices 2202 (e.g., security cameras1702, floodlight cameras 1902, video doorbells 130, etc.) may be in anactive state for detecting motion and/or recording image data 2324 inthe field of view of the one or more first A/V recording andcommunication devices 2202. In the custom mode, the user/owner of thesecurity system 2228 may configure each of the sensors 2214, theautomation devices 2216, and/or the A/V recording and communicationdevices 2202. For example, in the custom mode, “Summer,” the user/ownermay arm each of the door sensors but disable the window sensors (e.g.,where windows may be left open for air flow). In addition, theuser/owner may activate each of the A/V recording and communicationdevices 2202 in the back yard to record image data 1224 between 8:00 amand 5:00 p.m. (e.g., because the kids may regularly play in the backyard during the Summer months).

The action(s) 2348 may include one or more actions that the A/Vrecording and communication device 2202 is to perform and/or one oractions that the security system 2228 (e.g., the hub device 2212, thebackend server 2222, etc.) is to perform based on the A/V recording andcommunication device 2202 detecting motion within the intrusion zone2340, the conditional setting(s) 2344 being satisfied, and/or thesecurity system 2228 operating in the activation mode(s) 2346. Forexample, the one or more actions that the A/V recording andcommunication device 2202 is to perform may include, but are not limitedto, recording image data 2324 using the camera 2304, activating a light(e.g., floodlight(s) 2104, a light of a lighting automation system ofthe automation devices 1116, etc.), outputting a warning sound using thespeaker 2310 and/or a siren, and/or transmitting a user alert 2334 to atleast one of the client device 2208, 2210, the hub device 2212, and thebackend server 2222. The one or more actions that the security system2228 is to perform may include, but are not limited to, activating thealarm 2230 of the security system 2228, outputting a warning sound(e.g., using the speaker of the hub device 2212), transmitting a useralert 2334 to the client device 2208, 2210 and/or the securitymonitoring server 2226, and/or changing a state of at least oneautomation device 2216 (e.g., locking a lock, powering on a light,locking a window, etc.).

The device application 2322 may configure the processor 2316 to monitorthe intrusion zone(s) 2340. For example, to monitor an intrusion zone2340, the processor 2316 of the A/V recording and communication device2202 may detect, using the motion data 2330 and/or the image data 2324,motion within the intrusion zone 2340. In response, the processor 2316of the A/V recording and communication device 2202 may determine whetherthe conditional setting(s) 2344 associated with the intrusion zone 2340are satisfied. If the processor 2316 of the A/V recording andcommunication device 2202 determines that the conditional setting(s)2344 associated with the intrusion zone 2340 are not satisfied, then theprocessor 2316 of the A/V recording and communication device 2202 mayrefrain from performing the action(s) 2348. However, if the processor2316 of the A/V recording and communication device 2202 determines thatthe conditional setting(s) 2344 associated with the intrusion zone 2340are satisfied, then the processor 2316 of the A/V recording andcommunication device 2202 may determine if the security system 2228 isoperating in one of the activation mode(s) 2346 associated with theintrusion zone 2340.

In some examples, to determine if the security system 2228 is operatingin one of the activation mode(s) 2346, the processor 2316 of the A/Vrecording and communication device 2202 may receive, using thecommunication module 2312, mode data 2352 from the client device 2208,2210, the hub device 2212, and/or the backend server 2222. The mode data2352 may indicate the current activation mode in which the securitysystem 2228 is operating. In some examples, the processor 2316 of theA/V recording and communication device 2202 may receive the mode data2352 in response to transmitting, using the communication module 2312, arequest for the mode data 2352 to the client device 2208, 2210, the hubdevice 2212, and/or the backend server 2222. In some examples, theprocessor 2316 of the A/V recording and communication device 2202 mayreceive the mode data 2352 each time the security system 2228 switchesfrom an activation mode to a new activation mode.

In either of the examples above, the processor 2316 of the A/V recordingand communication device 2202 may use the current activation mode, asindicated by the mode data 2352, to determine whether the securitysystem 2228 is operating in one of the activation mode(s) 2346associated with the intrusion zone 2340. If the processor 2316 of theA/V recording and communication device 2202 determines that the securitysystem 2228 is not operating in one of the activation mode(s) 2346, thenthe processor 2316 of the A/V recording and communication device 2202may refrain from performing the action(s) 2348. However, if theprocessor 2316 of the A/V recording and communication device 2202determines that the security system 2228 is operating in one of theactivation mode(s) 2346, then the processor 2316 of the A/V recordingand communication device 2202 may cause the A/V recording andcommunication device 2202 to perform one or more of the action(s) 2348.

In some of the present embodiments, one or more of the intrusion zone(s)2340 may not include motion zone(s) 2342, conditional setting(s) 2344,and/or activation mode(s) 2346. For example, to monitor an intrusionzone 2340 that includes motion zone(s) 2342 and activation mode(s) 2346,the processor 2316 of the A/V recording and communication device 2202may detect, using the motion data 2330 and/or the image data 2324,motion within the intrusion zone 2340. In response, the processor 2316of the A/V recording and communication device 2202 may determine whetherthe security system 2228 is operating in one of the activation mode(s)2346. If the processor 2316 of the A/V recording and communicationdevice 2202 determines that the security system 2228 is not operating inone of the activation mode(s) 2346, then the processor 2316 of the A/Vrecording and communication device 2202 may refrain from performing theaction(s) 2348 associated with the intrusion zone 2340. However, if theprocessor 2316 of the A/V recording and communication device 2202determines that the security system 2228 is operating in one of theactivation mode(s) 2346, then the processor 2316 of the A/V recordingand communication device 2202 may cause the A/V recording andcommunication device 2202 to perform one or more of the action(s) 2348associated with the intrusion zone 2340.

FIG. 24 is a functional block diagram illustrating an example of thesmart-home hub device 2212 (alternatively referred to herein as the hubdevice 2212) according to various aspects of the present disclosure. Thehub device 2212 may be, for example, one or more of a Wi-Fi hub, asmart-home hub, a hub of a home security/alarm system, a gateway device,a hub for a legacy security/alarm system (e.g., a hub for connecting apre-existing security/alarm system to the network (Internet/PSTN) 2206for enabling remote control of the hub device 2212), and/or anothersimilar device. The hub device 2212 may comprise a processing module2402 that is operatively connected to a communication module 2404. Insome examples, the hub device 2212 may comprise one or more of a camera(not shown), a microphone (not shown), a speaker (not shown), and thealarm 2230. The processing module 2402 may comprise volatile memory2406, a processor 2408, and non-volatile memory 2410, which includes asmart-home hub application 2412.

In various embodiments, the smart-home hub application 2412 mayconfigure the processor 2408 to receive sensor data from the sensors2214 and/or the automation devices 2216. For example, the sensor datamay include a current state (e.g., opened/closed for door and windowsensors, motion detected for motion sensors, living room lights on/offfor a lighting automation system, etc.) of each of the sensors 2214and/or the automation devices 2216. In some examples, the sensor datamay be received in response to sensor triggers. The sensor triggers maybe a door opening/closing, a window opening/closing, lights being turnedon/off, blinds being opened/closed, etc. As such, the sensor data mayinclude the current state of the sensors 2214 and/or the automationdevices 2216 as well as any updates to the current state based on sensortriggers.

With further reference to FIG. 24, the smart-home hub application 2412may configure the processor 2408 to receive the audio data 2326, thetext data 2332, the image data 2324, the motion data 2330, the inputdata 2328, and/or the user alerts 2334 from the A/V recording andcommunication device 2202 (in some embodiments, via the backend server2222 and/or the client devices 2208, 2210) using the communicationmodule 2404. For example, the hub device 2212 may receive and/orretrieve (e.g., after receiving a signal from the A/V recording andcommunication device 2202 that the A/V recording and communicationdevice 2202 has been activated) the image data 2324, the input data2328, and/or the motion data 2330 from the A/V recording andcommunication device 2202 and/or the backend server 2222 in response tomotion being detected by the A/V recording and communication device2202. Additionally, the smart-home hub application 2412 may configurethe processor 2408 to transmit, using the communication module 2404, theaudio data 2326, the text data 2332, the image data 2324, the motiondata 2330, the input data 2328, and/or the user alerts 2334 to theclient devices 2208, 2210 and/or the backend server 2222.

Additionally, the smart-home hub application 2412 may configure theprocessor 2408 to receive, using the communication module 2404, thecontrol signal(s) 2338, the mode data 2352, and/or the data representingthe intrusion zone(s) 2340 (which may be included in the controlsignal(s) 2338) from the A/V recording and communication device 2202,the client device 2208, 2210, and/or the backend server 2222.Furthermore, the smart-home hub application 2412 may configure theprocessor 2408 to transmit, using the communication module 2404, thecontrol signal(s) 2338, the mode data 2352, and/or the data representingthe intrusion zone(s) 2340 (which may be included in the controlsignal(s) 2338) to the A/V recording and communication device 2202, theclient device 2208, 2210, and/or the backend server 2222.

As described herein, at least some of the processes of the A/V recordingand communication device 2202, the backend server 2222, and/or theclient device 2208, 2210 may be executed by the hub device 2212. Forexample, the smart-hub application 2412 may configure the processor 2408to monitor the intrusion zone(s) 2340 associated with the A/V recordingand communication device 2202 using the motion data 2330 and/or theimage data 2324. Based on determining that motion is detected in anintrusion zone 2340, one or more of the conditional setting(s) 2344 issatisfied, and/or the security system 2228 is operating in one of theactivation mode(s) 2346, the smart-hub application 2412 may configurethe processor 2408 to perform one or more of the actions(s) 2348. Forexample, the processor 2408 of the hub device 2212 may activate thealarm 2230 of the security system 2228, output a warning sound (e.g.,using the speaker of the hub device 2212), transmit a user alert 2334 tothe client device 2208, 2210, the security monitoring server 2226,and/or the backend server 2222, and/or change a state of at least oneautomation device 2216.

In some embodiments, the smart-hub application 2412 may furtherconfigure the processor 2408 to cause the security system 2228 to switchbetween activation modes 2414, which are described above. In someexamples, the processor 2408 of the hub device 2212 may cause thesecurity system 2228 to switch from a first activation mode 2414 to asecond activation mode 2414 in response to receiving, using thecommunication module 2404, a control signal 233 from the client device2208, 2210 and/or the backend server 2222. In some examples, theprocessor 2408 of the hub device 2212 may cause the security system 2228to switch from a first activation mode 2414 to a second activation mode2414 in response to receiving input using an input device (e.g., keypad,display, etc.) associated with the hub device 2212 (not shown).

FIG. 25 is a functional block diagram illustrating one embodiment of thebackend server 2222 according to various aspects of the presentdisclosure. The backend server 2222 may comprise a communication module2502 and a processing module 2504, which includes a processor 2506,volatile memory 2508, and non-volatile memory 2510. The communicationmodule 2502 may allow the backend server 2222 to access and communicatewith devices connected to the network (Internet/PSTN) 2206 (e.g., theA/V recording and communication device 2202, the hub device 2212, theclient devices 2208, 2210, and/or a device controlled by the securitymonitoring service 2226). The non-volatile memory 2510 may include aserver application 2512 that configures the processor 2506 to receiveand/or retrieve, using the communication module 2502, the audio data2326, the text data 2332, the input data 2328, the user alerts 2334, theimage data 2324, and/or the motion data 2330 from the A/V recording andcommunication device 2202 (e.g., in the output signal 2336) and/or thehub device 2212. The server application 2512 may also configure theprocessor 2506 to transmit (and/or forward) the audio data 2326, thetext data 2332, the input data 2328, the user alerts 2334, the imagedata 2324, and/or the motion data 2330 to the client devices 2208, 2210and/or the hub device 2212 using the communication module 2502.

Additionally, the server application 2512 may configure the processor2506 to receive, using the communication module 2502, the controlsignal(s) 2338, the mode data 2352, and/or the data representing theintrusion zone(s) 2340 (which may be included in the control signal(s)2338) from the A/V recording and communication device 2202, clientdevice 2208, 2210, and/or the hub device 2212. The server application2512 may also configure the processor 2506 to transmit, using thecommunication module 2502, the control signal(s) 2338, the mode data2352, and/or the data representing the intrusion zone(s) 2340 (which maybe included in the control signal(s) 2338) to the A/V recording andcommunication device 2202, client device 2208, 2210, and/or the hubdevice 2212.

In further reference to FIG. 25, the non-volatile memory 2510 may alsoinclude source identifying data 2514 that may be used to identify theA/V recording and communication device 2202, the hub device 2212, theclient devices 2208, 2210, and/or the security system 2228. In addition,the source identifying data 2514 may be used by the processor 2506 ofthe backend server 2222 to determine that the client devices 2208, 2210is associated with the A/V recording and communication device 2202 andthe hub device 2212 (and, in some examples, the security system 2228).

In some embodiments, the server application 2512 may further configurethe processor 2506 to generate and transmit a report signal (not shown)to a third-party client device (not shown) using the communicationmodule 2502, which may be associated with a law enforcement agency orthe security monitoring service, for example. The report signal, whichmay be the user alert 2334, in some examples, may include the image data2324, the audio data 2326, and/or the text data 2332. In suchembodiments, an operator of the third-party client device may be able toview the image data 2324 and/or the text data 2332 to help in monitoringthe security system 2228.

As described herein, at least some of the processes of the A/V recordingand communication device 2202, the hub device 2212, and/or the clientdevice 2208, 2210 may be executed by the backend server 2222. Forexample, the server application 2512 may configure the processor 2506 tomonitor the intrusion zone(s) 2340 associated with the A/V recording andcommunication device 2202 using at least the motion data 2330 and/or theimage data 2324. Based on determining that motion is detected in anintrusion zone 2340, one or more of the conditional setting(s) 2344 issatisfied, and/or the security system 2228 is operating in one of theactivation mode(s) 2346, the server application 2512 configure theprocessor 2506 to perform one or more of the actions(s) 2348. Forexample, the processor 2506 of the backend server 2222 may activate thealarm 2230 of the security system 2228, cause a warning sound to beoutput, transmit a user alert 2334 to the client device 2208, 2210and/or the security monitoring server 2226, and/or cause a state of atleast one automation device 2216 to change.

In some examples, the processor 2506 of the backend server 2222 mayperform one or more of the action(s) 2230 by transmitting, using thecommunication module 2502, control signal(s) 2338 to the hub device2212. In response to receiving the control signal(s) 2338, the processor2408 of the hub device 2212 may perform the one or more of the action(s)2348. For example, to activate the alarm 2230 of the security system2228, the processor 2506 of the backend server 222 may generate acontrol signal 2338 that is configured to cause the alarm 2230 to beactivated. The processor 2506 of the backend server 2222 may thentransmit, using the communication module 2502, the control signal 2338to the hub device 2212. In response to receiving the control signal2338, the processor 2408 of the hub device 2212 may activate the alarm2230.

FIG. 26 is a functional block diagram illustrating one embodiment of aclient device 2208, 2210 according to various aspects of the presentdisclosure. The client device 2208, 2210 may comprise a processingmodule 2602 that is operatively connected to an input interface 2604,microphone(s) 2606, speaker(s) 2608, and a communication module 2610.The client device 2208, 2210 may further comprise a camera (not shown)operatively connected to the processing module 2602. The processingmodule 2602 may comprise a processor 2612, volatile memory 2614, andnon-volatile memory 2616, which includes a device application 2618. Invarious embodiments, the device application 2618 may configure theprocessor 2612 to receive input(s) to the input interface 2604, forexample.

In addition, the device application 2618 may configure the processor2612 to receive, using the communication module 2610, the input data2328, the image data 2324, the audio data 2326, the output signal 2336,and/or the user alerts 2334 from one or more of the A/V recording andcommunication device 2202, the hub device 2212, or the backend server2222. Furthermore, the device application 2618 may configure theprocessor 2612 to transmit, using the communication module 2610, theinput data 2328, the image data 2324, the audio data 2326, the outputsignal 2336, the user alerts 2334 and/or control signals 2338 to one ormore of the hub device 2212 or the backend server 2222.

With further reference to FIG. 26, the input interface 2604 may includea display 2620. The display 2620 may include a touchscreen, such thatthe user of the client device 2208, 2210 may provide inputs directly tothe display 2620. In some embodiments, the client device 2208, 2210 maynot include a touchscreen. In such embodiments, the user may provide aninput using any input device, such as, without limitation, a mouse, atrackball, a touchpad, a joystick, a pointing stick, a stylus, etc.

In some examples, based at least in part on receiving a user alert 2334,the device application 2618 may configure the processor 2612 to causethe display 2620 to display the user alert 2334. While displaying theuser alert 2334, the user interface 2604 may receive input from the userto answer the user alert 2334. In response, the device application 2618may configure the processor 2612 to display the received image data 2324using the display 2620. Additionally, the device application 2618 mayconfigure the processor 2612 to output audio represented by the audiodata 2326 using the speaker 2608.

In some examples, the device application 2618 may further configure theprocessor 2612 to display graphical user interface(s) (GUI(s)) 2622using the display 2620. The GUI(s) 2622 may allow the user to createintrusions zones for A/V recording and communication devices, such asthe intrusion zone(s) 2340 for the A/V recording and communicationdevice 2202. For example, to create an intrusion zone 2340, the GUI(s)2622 may allow the user to select one or more motion zones 2342 toassociate with the intrusion zone 2340, which is illustrated in theexamples of FIGS. 27-33. In addition, in some embodiments, to create anintrusion zone 2340, the user may create a custom intrusion zone thatmay not include or be defined by an existing motion zone 2342 (e.g., theuser may create a polygon shape, a square, a rectangle, a triangle, acircle, or another shape that within the GUI(s) 2622 that define theintrusion zone 2340. In some embodiments, the motion zones 2342 may becustomized by the user, and the intrusion zones 2340 may include one ormore of the motion zones 2342. As such, in some embodiments, a portionof the field of view of the camera 2304 and/or the field of view of themotion sensor 2308 may include a motion zone 2342 and not include anintrusion zone 2340, and/or a portion of the field of view of the camera2304 and/or the field of view of the motion sensor 2308 may not includea motion zone 2342 and may include an intrusion zone 2340. Additionally,GUI(s) 2622 may allow the user to select one or more conditionalsettings 2344 to associate with the intrusion zone 2340. Furthermore,the GUI(s) 2622 may allow the user to select one or more activationmodes 2346 to associate with the intrusion zone 2340. Moreover, theGUI(s) 2622 may allow the user to select one or more actions 2348 toassociate with the intrusion zone 2340.

After receiving the selections, the processor 2612 of the client device2208, 2210 may receive, using the input interface 2604, input associatedwith saving the intrusion zone 2340. In response, the processor 2612 ofthe client device 2208, 2210 may generate a control signal 2338 that isconfigured to cause the A/V recording and communication device 2202, thehub device 2212, and/or the backend server 2222 to save the intrusionzone 2340 and/or monitor the intrusion zone 2340. The processor 2612 ofthe client device 2208, 2210 may then transmit, using the communicationmodule 2610, the control signal 2338, along with data representing theintrusion zone 2340 (which may be part of the control signal 2338) tothe A/V recording and communication device 2202, the hub device 2212,and/or the backend server 2222.

FIGS. 27-33 are screenshots of one example of a graphical user interface(GUI) 250 (which may include one of the GUI(s) 2622) for modifyingsettings of the A/V recording and communication device 2202 according toan aspect of the present disclosure. In one example, the user may modifysettings by selecting a menu choice from within a software application(e.g., the device application 2618) installed on the user's computer ormobile device. With reference to FIG. 27, upon selecting the menu choicefor modifying settings of the A/V recording and communication device2202, the software application may display, on a display (e.g., thedisplay 2620) of the user's computer or mobile device, a diagram 252 ofthe field of view about the A/V recording and communication device 2202.The diagram 252 may indicate the motion zones within the field of view,with each zone delineated by boundary lines 254 and enumerated with aunique zone identifier, such as a number (Zones 1-6). In the embodimentillustrated in FIG. 27, the zone diagram 252 is a top view, but inalternative embodiments the zone diagram 252 may be presented from adifferent perspective, such as a front view or a side view.

With further reference to FIG. 27, the zone diagram 252 further includesan ON/OFF indicator 256 for each zone. In the configuration of FIG. 27,Zones 1-6 are all ON. The user may toggle selected ones of the zones ONand OFF by individually selecting each zone. For example, if the displayof the user's computer or mobile device is a touchscreen, the user maytoggle a selected zone by touching that area of the touchscreen. Inanother example, the user may select zones to toggle ON/OFF by clickingon those zones in the GUI 250 using a pointing device such as a mouse ora trackball. If conditional settings, which are described below, are notused, then zones that are ON will trigger motion alerts when movement isdetected in those zones, while no motion alerts will be triggered forany zones that are OFF. However, if conditional settings are used, zonesthat are ON will trigger motion alerts when movement is detected inthose zones and at least one conditional setting is satisfied, asfurther discussed below.

In certain of the present embodiments, the user may toggle individualzones ON and OFF independently of the other zones, such that anycombination of zones may be ON at any given time. For example, FIGS.28-31 illustrate some possible combinations. With reference to FIG. 28,Zones 1, 3, and 5 are OFF, while Zones 2, 4, and 6 are ON. Withreference to FIG. 29, Zones 4 and 5 are OFF, while Zones 1-3 and 6 areON. With reference to FIG. 30, Zones 2-4 are OFF, while Zones 1, 5, and6 are ON. With reference to FIG. 31, Zones 1 and 5 are OFF, while Zones2-4 and 6 are ON. With reference to FIG. 27, the GUI 250 furtherincludes a SAVE button 258. When the user has set a desired zoneconfiguration by toggling selected ones of the zones ON and OFF, he orshe selects the SAVE button 258 to update the zone configuration settingfor the A/V recording and communication device 2202. The user may thenclose the zone diagram 252 by selecting the BACK button 260, which mayreturn the user to a previous screen (not shown) within the softwareapplication.

With further reference to FIG. 27, the GUI 250 may further include arange adjustment component 262 that enables the user to remotely modifythe range of motion sensors (e.g., the passive infrared sensors 144,1834). In the illustrated embodiment, the range adjustment component 262comprises a slider widget. A first end 264, or lower end, of the rangeof the slider widget 262 corresponds to a minimum range of the motionsensors (e.g., the passive infrared sensors 144, 1834), and a second end266, or upper end, of the range of the slider widget 262 corresponds toa maximum range of the motion sensors (e.g., the passive infraredsensors 144, 1834). The first and second ends 264, 266 of the sliderwidget 262 may include text indicating the distance corresponding to theminimum and maximum ranges of the motion sensors (e.g., the passiveinfrared sensors 144, 1834). In the illustrated embodiment, the minimumrange is indicated as approximately five feet, while the maximum rangeis indicated as approximately thirty feet. These ranges are merelyexamples, and are not limiting. In fact, in certain embodiments thetextual indicators of the minimum and maximum ranges may not be providedat all.

With further reference to FIG. 27, the current setting of the range ofthe motion sensors (e.g., the passive infrared sensors 144, 1834) isindicated on the zone diagram 252 by contrasting colors or shades of thesame color, with a darker area 268 indicating the area where the motionsensors (e.g., the passive infrared sensors 144, 1834) will triggermotion alerts (the ON area 268), and a lighter area 270 indicating thearea where the motion sensors (e.g., the passive infrared sensors 144,1834) will not trigger motion alerts (the OFF area 270). A transitionarea 272 between the ON area 268 and the OFF area 270 is indicated by acolor/shade between the darker area 268 and the lighter area 270, withthe color of the transition area 272 fading gradually toward the OFFarea 270. In certain embodiments, the transition area 272 is part of theON area 268, such that the motion sensors (e.g., the passive infraredsensors 144, 1834) will trigger motion alerts in the transition area272, but in other embodiments the transition area 272 may be part of theOFF area 270, such that the motion sensors (e.g., the passive infraredsensors 144, 1834) will not trigger motion alerts in the transition area272.

In the configuration of FIG. 27, the range of the motion sensors (e.g.,the passive infrared sensors 144, 1834) is set roughly halfway betweenthe minimum and maximum settings. By contrast, in the configuration ofFIG. 32, the range of the motion sensors (e.g., the passive infraredsensors 144, 1834) is set to the minimum (slider widget 262 at first end264), and in the configuration of FIG. 33, the range of the motionsensors (e.g., the passive infrared sensors 144, 1834) is set to themaximum (slider widget 262 at second end 266). When the user has set adesired range for the motion sensors (e.g., the passive infrared sensors144, 1834), he or she selects the SAVE button 258 to update the rangesetting for the A/V recording and communication device 2202. The usermay then close the zone diagram 252 by selecting the BACK button 260,which may return the user to a previous screen (not shown) within thesoftware application. In the illustrated embodiment, the ranges of themotion sensors (e.g., the passive infrared sensors 144, 1834) may not beadjusted individually. That is, any movement of the slider widget 262simultaneously adjusts the range of all of the motion sensors (e.g., thepassive infrared sensors 144, 1834). However, alternative embodimentsmay enable the ranges of the motion sensors (e.g., the passive infraredsensors 144, 1834) to be adjusted individually.

In certain of the present embodiments, if the user closes the zonediagram 252 (whether by selecting the BACK button 260, or exiting theapplication, or by any other action) without selecting the SAVE button258, then any changes that the user may have made to the settings forthe motion sensors (e.g., the passive infrared sensors 144, 1834), suchas toggling one or more of the motion sensors (e.g., the passiveinfrared sensors 144, 1834) ON or OFF, or adjusting a range of one ormore of the motion sensors (e.g., the passive infrared sensors 144,1834), will not be saved and will not be sent to the A/V recording andcommunication device 2202.

FIG. 34 is a flowchart showing an embodiment of a process according tothe present disclosure. According to the process shown in FIG. 34, auser may remotely modify the settings of the A/V recording andcommunication device 2202. Referring to FIGS. 27 and 34, at block B500 adiagram 252 of the field of view about the A/V recording andcommunication device 2202 is displayed on a display of the user'scomputer or mobile device (e.g., the client device 2208, 2210). Thediagram 252 facilitates modifying the zone and range settings of the A/Vrecording and communication device 2202. For example, the user maytoggle selected ones of the zones ON and OFF and/or increase anddecrease a range (or sensitivity) of the motion sensors (e.g., thepassive infrared sensors 144, 1834), as described above with referenceto FIGS. 27-33. The displaying of the diagram 252 on the display of theuser's computer or mobile device may be performed by software executingon the user's computer or mobile device, for example.

With further reference to FIG. 34, at block B502 the process determineswhether an input has been received to toggle a selected zone ON or OFF.The input may come from the user, for example according to the processdescribed above with reference to FIGS. 27-33. If at least one input isreceived to toggle a selected zone ON or OFF, then the process moves toblock B504, where the selected zone(s) is/are toggled ON or OFF. If,however, no input is received to toggle a selected zone ON or OFF, thenthe process moves to block B506.

At block B506, the process determines whether an input has been receivedto adjust the range of the motion sensors (e.g., the passive infraredsensors 144, 1834). The input may come from the user, for exampleaccording to the process described above with reference to FIGS. 27, 32,and 33. If an input is received to adjust the range of the motionsensors (e.g., the passive infrared sensors 144, 1834), then the processmoves to block B508, where the range of the motion sensors (e.g., thepassive infrared sensors 144, 1834) is increased or decreased. If,however, no input is received to adjust the range of the motion sensors(e.g., the passive infrared sensors 144, 1834), then the process movesto block B510.

At block B510, the process determines whether an input has been receivedto save any settings that may have been changed at either or both ofblock B502 and block B506. The input may come from the user, for exampleaccording to the processes described above with reference to FIGS.27-33. If an input is received to save any changed settings, then theprocess moves to block B512, where the changed settings are saved, afterwhich the process ends at block B514. If, however, no input is receivedto save any changed settings, then the process ends at block B514.

In certain embodiments, saving any changed settings may further comprisesending the changed settings to a server, such as (but not limited to)the server 118 (FIG. 1), the backend server 2222 (FIG. 22), or theserver 900C (FIG. 49), from which the A/V recording and communicationdevice 2202 may subsequently download the changed settings. For example,to implement the new conditional settings in the A/V recording andcommunication device 2202, the server 118/2222/900C may communicate withthe A/V recording and communication device 2202. In the process of thecommunication, the server 118/2222/900C may provide the updated usersettings and instruct the A/V recording and communication device 2202 tooverwrite any previous conditional settings. This process may beperformed in various ways. For example, and without limitation, the usermay press the button 2314 on the A/V recording and communication device2202, thereby causing the communication to occur, or the A/V recordingand communication device 2202 may detect motion and then initiate thecommunication with the server 118/2222/900C, or a regular “check in”communication between the server 118/2222/900C and the A/V recording andcommunication device 2202 may be implemented. In one aspect of thepresent disclosure, the changed settings may be compiled into a singlecommunication to the A/V recording and communication device 2202containing instructions for all zones, instead of sending numerouscommunications, piecemeal, for each zone.

After the settings of the A/V recording and communication device 2202are changed, as described above, the user may then receive notificationsconsistent with the changed settings. In one aspect of the presentdisclosure, the system of the present disclosure may implement thesettings by running software capable of analyzing the inputs from themotion sensors (e.g., the passive infrared sensors 144, 1834), and thenchecking to see if the input is in accordance with the preferredsettings. For example, assume the user modifies Zone 5, as shown in FIG.27, so that no motion alerts are generated for any movement farther thanten feet away from the A/V recording and communication device 2202 inZone 5. Also assume for purposes of this example that passive infraredsensor 144-3, which is responsible for Zone 5, has a maximum range offifty feet, and thus can detect movement up to fifty feet away. The A/Vrecording and communication device 2202 may analyze movement based onthe input from passive infrared sensor 144-3, and may determine thedistance of the movement from the A/V recording and communication device2202. If the A/V recording and communication device 2202 determines thatthe distance of the movement from the A/V recording and communicationdevice 2202 is greater than ten feet, the A/V recording andcommunication device 2202 may ignore or filter out the movement and notinitiate a communication with the system network (and the user will thusnot receive a motion alert). The A/V recording and communication device2202 may apply these principles to all zones and settings, and may alsoprovide features that take into account possible false positivetriggers, such as certain temperature conditions, light conditions,and/or moisture conditions, and determine whether a given input is afalse detection. Whether or not false detections are ignored or filteredout may be governed by the preferred settings saved by the user.

In another aspect of the present disclosure, the user may manipulatephysical controls, such as switches, sliders, or dials (not shown),located on the A/V recording and communication device 2202, in lieu ofdoing so with a remote software application.

As discussed above, in some embodiments, an aspect of the presentdisclosure comprises GUI 2622 displayed on a display 2620 of clientdevice 2208, 2210 for enabling modification of motion zones for a A/Vrecording and communication device 2202. The GUI 2622 may comprise adiagram of a field of view about the A/V recording and communicationdevice 2202, the diagram including a plurality of motion zones 2350within the field of view, with each motion zone 2350 delineated byboundary lines and enumerated with a unique motion zone identifier,wherein the zone diagram further includes an ON/OFF indicator for eachmotion zone 2650. In some embodiments, each unique zone identifier maycomprise a number. In some embodiments, the zone diagram may be a topview. Some embodiments may further comprise a range adjustment componentthat enables a range of each of the motion zones 2350 to be modified. Insome embodiments, the range adjustment component may comprise a sliderwidget. In some embodiments, contrasting colors or shades of the samecolor may indicate areas where motion alerts will be triggered and areaswhere motion alerts will not be triggered. In some embodiments, theareas where motion alerts will be triggered may be indicated by a darkcolor or shade and the areas where motion alerts will not be triggeredmay be indicated by a light color or shade. Some embodiments may furthercomprise a transition area between the dark areas and the light areas,with the transition area having a gradually changing color or shade.

Although a plurality of motion sensors and motion zones 2350 areillustrated and discussed above with respect to FIGS. 27-34, inalternative embodiments a single motion sensor and/or motion zone 2350may be used to satisfy the requirements of a specific implementation.Further, customization of motion settings could be performed withoutdisplaying a graphic of the field of view, e.g., a user could specifythat any motion detected during certain hours is a red flag regardlessof where the detected motion occurred. In addition, although specificembodiments for setting motion zones 2350 using A/V recording andcommunication devices 2202 are discussed above with respect to FIGS.27-34, any of a variety of A/V recording and communication devices 2202as appropriate to the requirements of a specific application may be usedin accordance with embodiments of the present disclosure.

Some of the present embodiments provide advantageous motion detectionprocesses and techniques. For example, during an initial setup process,or at any time after the A/V recording and communication device 2202 hasbeen set up, the user may designate one or more zones within the fieldof view of the camera as motion zones of interest. For example, andusing FIG. 35A as a reference, when configuring the camera 134's motiondetection, a configuration process may present the user with a visualrepresentation of the field of view 400 of the camera 134. For example,an application executing on the user's client device 800, such as asmartphone, may show a live view from the camera 134 of the user's A/Vrecording and communication device 2202 on the display 806 of the user'sclient device 114/800 (FIGS. 1 and 32). The configuration process mayprompt the user to designate one or more motion zones of interest 402 byselecting areas on the display 806 of the user's client device 800. Forexample, the user may draw one or more polygons 404, 406, 408 on thedisplay 806 to designate the motion zone(s) of interest 402. If thedisplay 806 of the user's client device 800 is a touchscreen, the usermay designate the motion zone(s) 402 by tracing the polygon(s) 404, 406,408 on the display 806 with his or her finger. The configuration processmay enable the user to designate motion zone(s) 402 having any shapeand/or number of sides. For example, the motion zone(s) 402 may beregular polygons such as the square 404, rectangle 406, and hexagon 408shown in FIG. 35A, or any other type of regular polygon such as circles,pentagons, octagons, decagons, etc., or any type of irregular polygons.The configuration process may allow the user to designate any number ofmotion zones 402, such as one zone 402, two motion zones 402, threemotion zones 402, etc. When all desired motion zones 402 have beencreated, the configuration process may prompt the user to save themotion zones 402, after which the created motion zones 402 may be sentfrom the user's client device 800 to a device in the network, such as aserver 118/900C (FIGS. 1 and 33), and to the user's A/V recording andcommunication device 2202 via the user's network 110 (FIG. 1).

After one or more motion zones of interest 402 have been designated,embodiments of the present motion detection processes and techniques mayincorporate those motion zones 402. For example, the camera 134, whichmay be powered on at all times, may continuously monitor motion withinthe field of view 400. The A/V recording and communication device 2202,however, may not begin recording and/or streaming video to the user'sclient device 114/800 unless and until a moving object enters one of themotion zones 402. The recording and/or streaming may continue until themoving object exits the motion zone 402 it earlier entered. Further, ifthe moving object stops moving, but remains in the motion zone 402, therecording and/or streaming may continue while the object remainsstationary within the motion zone 402. This aspect of the presentembodiments creates an advantage over systems that rely on other typesof motion sensors, such as passive IR sensors, that typically onlydetect moving objects, and therefore do not typically record and/orstream stationary objects. The object may, of course, be a person.

FIG. 35B illustrates another technique for creating and/or customizingintrusion zones for the A/V recording and communication device 2202. Forexample, the client device 2208 may be displaying a field of view 3502of the camera 2204 of the A/V recording and communication device 2202.While displaying the field of view 3502, a user may designate at least afirst motion zone of interest 3504 and a second motion zone of interest3506, such as by selecting areas on the display of the client device2208 (described herein). In some examples, the user may have previouslydesignated the first motion zone of interest 3504 and/or the secondmotion zone of interest 3506, and the client device 1108 may have saveddata representing the first motion zone of interest 3504 and/or thesecond motion zone of interest 3506. In some examples, the user may havepreviously created intrusion zone(s) 2340 for the first motion zone ofinterest 3504 and/or the second motion zone of interest 3506, where theclient device 1108 saved the intrusion zone(s) 2340. In such examples,the user may later associate the intrusion zone(s) 2340 with thesecurity system 2228. Still, in some examples, the user designates thefirst motion zone of interest 3506 and/or the second motion zone ofinterest 3506 when creating intrusion zone(s) 2340.

After creating the first motion zone of interest 3504 and/or the secondmotion zone of interest 3506, the user may then turn at least the firstmotion zone of interest 3504 ON, as represented by 3508. Additionally,the user may select activation mode(s) 2346 to associate with the firstmotion zone of interest 3604, conditional setting(s) 2344 to associatedwith the first motion zone of interest 3504 (such as if conditionalsetting(s) 2344 were not already selected), and/or action(s) 2348 toassociate with the first motion zone of interest 3604. The client device1108 may then create an intrusion zone 2340 associated with the firstmotion zone of interest 3504 (e.g., which may then represent a motionzone 2342 for the intrusion zone 2340).

In some examples, although not illustrated in the example of FIG. 35B,the user may also turn the second motion zone of interest 3506 ON, butwithout associating the second motion zone of interest 3506 withconditional setting(s) 2344, activation mode(s) 2346, and/or action(s)2348. In such an example, the second motion zone of interest 3506 may beconfigured such that the A/V recording and communication device 2202,the hub device 2212, and/or the backend server 1122 generates a useralert 2334 whenever motion is detected in the second motion zone ofinterest 3506 (e.g., without requiring conditional setting(s) 2344and/or activation mode(s) 2346 to be satisfied).

In some embodiments, the A/V recording and communication device 2202 maynot begin recording and/or streaming video to the user's client device114/800 until a moving object enters one of the motion zones 402 and aconditional setting is satisfied, as further discussed below. Forexample, FIG. 36 is a flowchart illustrating a process for monitoring anintrusion zone using at least one conditional setting of the A/Vrecording and communication device 130 according to various aspects ofthe present disclosure. The process may include receiving (block B600)data regarding the at least one motion zone. In some embodiments, the atleast one motion zone may include one or more preset zones in the fieldof view of the A/V recording and communication device 2202, such asdescribed above with respect to FIGS. 27-34. In other embodiments, theat least one motion zone may include one or more motion zones ofinterest, such as described above with respect to FIG. 35A. For example,the at least one motion zone may comprise one or more shapes, such as(but not limited to) the shapes 404, 406, 408 illustrated in FIG. 35A.The data regarding the at least one motion zone (may be referred to asmotion zone data) may include (but is not limited to) one or more userpreferences regarding the area(s) within the A/V recording andcommunication device 2202's field of view that the user desires forintrusion monitoring. As discussed above, the motion zone data may bereceived by displaying on a display of a computing device a userinterface for creating and/or customizing at least one intrusion zone,where the at least one intrusion zone includes at least one motion zonewithin the field of view of the A/V recording and communication devicecoupled with at least one conditional setting of the at least one motionzone, as further described below.

In further reference to FIG. 36, the process may also include receiving(block B602) data regarding at least one conditional setting (may alsobe referred to as conditional setting data), as further described below.In various embodiments, conditional settings may be used to customizethe user's preferences for monitoring the at least one motion zone. Invarious embodiments, a motion zone may be referred to as an intrusionzone when such motion zone is coupled with one or more conditionalsettings. For example, a conditional setting may include a time of day,e.g. if the detected motion occurs during a designated interval, such asbetween sunset and sunrise, or between midnight and 6:00 AM, then it maybe indicative of a threat. In this case, if the conditional setting issatisfied (i.e. if the detected motion occurs during the designatedinterval), then one or more actions may be initiated, as describedbelow. Other examples of conditional settings may include (but are notlimited to) a level of ambient light (e.g. if the detected motion occursduring a period of low light, such as between sunset and sunrise, thenit may be indicative of a threat), a location where the motion wasdetected (e.g. if the detected motion was inside the home (or in thefront yard, or the back yard, or along the side of the home, etc.), thenit may be indicative of a threat), a direction of movement of theperson/object that caused the detected motion (e.g. if the person thatcaused the motion detection is moving toward the A/V recording andcommunication device, then it may be indicative of a threat), a speed ofmovement of the person/object that caused the detected motion (e.g. ifthe person that caused the motion detection is moving rapidly, then itmay be indicative of a threat), a length of time that a person/object iswithin a motion zone (e.g. if the person that caused the motiondetection remains in the motion zone for longer than a preset length oftime, then it may be indicative of a threat), a level of reflectinglight intensity (e.g. a metallic object carried by an intruder, such asa firearm, a knife, etc., might reflect light at an intensity higherthan the surroundings and, therefore, if reflected light is above athreshold intensity then it may be indicative of a threat), and/or abody posture of a person within the motion zone (e.g. if the person thatcaused the motion detection is crouching, or laying prone, or assuminganother posture that may indicate an intent to evade detection, then itmay be indicative of a threat).

The process may also include monitoring (block B604) the at least oneintrusion zone of the A/V recording and communication device 2202 todetect motion using processes and hardware as described above. Duringmonitoring, the process may include determining (block B606) whethermotion is detected in the at least one intrusion zone while satisfyingat least one conditional setting. If motion is detected, but at leastone conditional setting is not satisfied, then the process may continueto monitor (block B604) the at least one intrusion zone of the A/Vrecording and communication device 2202. However, in some embodiments,upon a determination that motion is detected and at least oneconditional setting is satisfied, the process may include determining anintrusion zone action and executing the intrusion zone action, asfurther described below. For example, if motion is detected and at leastone conditional setting is satisfied, then the process may includegenerating (block B608) at least one intrusion alert and transmitting(block B610) the at least one intrusion alert to a client device114/800, a server 118/900C, and/or a social media network (not shown),as further described below.

FIG. 37 is a flowchart illustrating a process for setting one or morenew conditional settings and/or changing one or more existingconditional settings for intrusion zone(s) of an A/V recording andcommunication device 130 according to various aspects of the presentdisclosure. The process may include displaying (block B650) a userinterface for creating and/or customizing at least one intrusion zone onthe display 806 of the client device 800 (FIG. 42). In variousembodiments, the user interface may be configured to present options forthe user to indicate preferences for conditional settings, such as (butnot limited to) a time of day, a level of ambient light, a direction ofmovement (of the person/object that caused the detected motion), a speedof movement (of the person/object), a length of time that aperson/object is within a motion zone, a level of reflecting lightintensity, and/or a body posture of a person within the motion zone. Asdiscussed above, the user interface may include at least one area withinthe field of view of the A/V recording and communication device formonitoring, such as (but not limited to) the zones discussed above withrespect to FIGS. 27-35. For example, the user interface may include adiagram that includes at least one motion zone within the field of viewof the A/V recording and communication device. If the diagram indicatesa plurality of motion zones, each of the plurality of motion zones maybe delineated by boundary lines, and each of the motion zones may beenumerated with a unique zone number. In some embodiments, the processmay include receiving motion zone data, such as (but not limited to) aselection of the at least one motion zone, where the selection indicatesthe user's preference for one or more areas within the field of view ofthe A/V recording and communication device for intrusion detection.

In further reference to FIG. 37, the process may further includereceiving (block B652) conditional setting data, such as (but notlimited to) input of new conditional settings and/or changed conditionalsettings for at least one intrusion zone. If such inputs are notreceived, then the process may end (block B658). However, if such inputsare received, then the process may include receiving (block B654) inputto save the new conditional settings and/or to save the changedconditional settings for the intrusion zone(s). If inputs to savesettings are not received, then the process may end (block B658).However, if inputs to save settings are received, then the process mayinclude saving (block B656) the new conditional settings and/or changedconditional settings for the at least one intrusion zone. In someembodiments, the saving of the new conditional settings and/or changedconditional settings may include transmitting a setting save signal tothe server 118/900C.

FIG. 38 is a flowchart illustrating a process for taking an action basedupon a conditional setting for an intrusion zone of an A/V recording andcommunication device according to various aspects of the presentdisclosure. The process may include monitoring and detecting (blockB670) motion in at least one motion zone of the A/V recording andcommunication device, such as (but not limited to) the A/V recording andcommunication device 2202. In some embodiments, motion may be detectedusing the PIR sensors 144 and/or the camera 102/134, as described above.Upon detecting motion, the process may include determining (block B672)whether at least one intrusion zone conditional setting is satisfied.For example, if a conditional setting of the at least one intrusion zonecomprises a time of day, then the process may compare a current time toa set time interval to determine whether the detected motion occurredduring the set time interval. In another example, if a conditionalsetting of the at least one intrusion zone comprises a level of ambientlight, then the process may compare a current level of ambient light toa set level of ambient light to determine whether the detected motionoccurred during a period of low ambient light. In another example, if aconditional setting of the at least one intrusion zone comprises alocation where the motion was detected, then the process may determineif the location where the motion was detected matches one or more presetlocations. In another example, if a conditional setting of the at leastone intrusion zone comprises a direction of movement, then the processmay determine a direction of movement of the person/object that causedthe detected motion to determine whether the detected direction ofmovement matches the set direction of movement. In another example, if aconditional setting of the at least one intrusion zone comprises a speedof movement, then the process may compare a speed of movement of theperson/object that caused the detected motion to a set threshold speedto determine whether the detected speed of movement is above or belowthe set threshold speed. In another example, if a conditional setting ofthe at least one intrusion zone comprises a length of time that aperson/object remains within a motion zone, then the process may comparea length of time that a person/object remains within a motion zone to aset threshold time to determine whether the detected length of time isabove or below the set threshold length of time. In another example, ifa conditional setting of the at least one intrusion zone comprises alevel of reflecting light intensity, then the process may compare adetected level of reflecting light intensity to a set thresholdintensity to determine whether the detected level of reflecting lightintensity is above or below the set threshold intensity. In anotherexample, if a conditional setting of the at least one intrusion zonecomprises a body posture of a person within the motion zone, then theprocess may compare a detected body posture of a person within themotion zone to one or more preset body postures to determine whether thedetected body posture of a person within the motion zone matches the oneor more preset body postures.

In further reference to FIG. 38, if no conditional setting is satisfied,the process may end (block B678). However, if at least one conditionalsetting is satisfied, then the process may include determining (blockB674) and executing (block 676) at least one intrusion zone action. Insome embodiments, the intrusion zone action may include generating anintrusion alert and transmitting it to a client device 114/800. Invarious embodiments, the intrusion alert may be transmitted to theclient device 114/800 even when motion alerts are inactive for the atleast one motion zone where the motion was detected. For example, ifmotion is detected but motion alerts are inactive for the at least onemotion zone where the motion was detected, then no alert may be sentunless at least one conditional setting is also satisfied. Further, theintrusion alert may include a notification about a type of alert basedon the particular conditional setting that was satisfied. For example,if the particular conditional setting that was satisfied comprises alocation of motion detection, then the intrusion alert may include anotification that identifies where the motion was detected (e.g., insidethe home, or in the front yard, or in the backyard, or along the side ofthe home, etc.). The intrusion alert may further include an indicationof the at least one motion zone where the motion was detected.

In further reference to FIG. 38, the intrusion action may include avariety of actions to combat an unwanted presence of an intruder. Forexample, in some embodiments, the intrusion action may includeactivating at least one lighting device to illuminate the areasurrounding the A/V recording and communication device 2202. In furtherembodiments, the intrusion action may include transmitting an intrusionalert to the server 118/900C for providing a warning message about thedetected motion to at least one social network 122 (FIG. 42). The socialnetwork 122 may include any social media service or platform that usescomputer-mediated tools that allow participants to create, share, and/orexchange information in virtual communities and/or networks, such as(but not limited to) social networking websites and/or applicationsrunning on participant devices. Non-limiting examples of social networksinclude Facebook, Twitter, Snapchat, and Nextdoor. The intrusion actionmay also include transmitting an intrusion alert to a client device orset of client devices that differs from a second client device or set ofclient devices, where the second client device or set of client devicesmay have been designated to receive an alert when motion is detected butno conditional settings were satisfied. Further, the intrusion actionmay include activating an intruder intervention module configured tointervene with a person that may have caused the detected motion. Suchintervention may include emitting a warning sound and/or a recordedwarning message using the speaker 157 of the A/V recording andcommunication device 2202.

FIGS. 39-41 are sequence diagrams illustrating embodiments of processesfor monitoring an intrusion zone using at least one conditional settingaccording to various aspects of the present disclosure. With referenceto FIG. 39, the process may include a client device 114, an A/Vrecording and communication device 100, and at least one social network122 (FIG. 42). In such embodiments, at a time T₁, the client device 114may transmit motion zone data and conditional setting data 710 (may alsobe referred to as “first signal 710”) to the A/V recording andcommunication device 100. Prior to transmitting the first signal 710,the client device 114 may be configured to receive motion zone data andconditional setting data from a user, as discussed above. In variousembodiments, the A/V recording and communication device 100 receives themotion zone data and conditional setting data 710 and may be configuredto monitor at least one intrusion zone comprising at least one motionzone coupled with at least one conditional setting, as discussed above.Upon detecting motion in the at least one intrusion zone whilesatisfying at least one conditional setting, the A/V recording andcommunication device 100 may generate and transmit an intrusion alert712 back to the client device 114 and/or to at least one social network122 at a time T₂, and the at least one social network 122 and/or theclient device 114 may receive the transmitted intrusion alert 712 fromthe A/V recording and communication device 100. In various embodiments,the intrusion alert 712 may be transmitted to, and received by, at leastone other client device 114 in addition to, or instead of, the clientdevice 114 that transmitted the motion zone data and the conditionalsetting data 710 to the A/V recording and communication device 100.

In reference to FIG. 40, the process may include a client device 114, anA/V recording and communication device 100, a server 118, and at leastone social network 122. In such embodiments, at a time T₁, the clientdevice 114 may transmit motion zone data and conditional setting data720 (may also be referred to as “first signal 720”) to the server 118.Prior to transmitting the first signal 720 to the server 118, the clientdevice 114 may be configured to receive motion zone data and conditionalzone data input from a user, as discussed above. At a time T₂, the A/Vrecording and communication device 100 may transmit a second signal 722comprising data related to motion (may be referred to as motion data)captured using its camera 102, PIR sensor(s) 144, and/or any othersuitable motion detecting sensor or device. In some embodiments, time T₂may be after time T₁, while in other embodiments time T₂ maysubstantially coincide with time T₁ (e.g., the first signal 720 and thesecond signal 722 may be transmitted at substantially the same time).Upon receiving the first and second signals 720, 722, the server 118 maytransmit an intrusion alert 724 to at least one social network 122and/or to the client device 114 at a time T₃. Likewise, the at least onesocial network 122 and/or the client device 114 may receive thetransmitted intrusion alert 724 from the server 118. In variousembodiments, the intrusion alert 724 may be transmitted to, and receivedby, at least one other client device 114 in addition to, or instead of,the client device 114 that transmitted the motion zone data and theconditional setting data 720 to the server 118.

In reference to FIG. 41, the process may include a client device 114, anA/V recording and communication device 100, a server 118, and at leastone social network 122. In such embodiments, at a time T₁, the clientdevice 114 may transmit motion zone data and conditional setting data730 to the A/V recording and communication device 100. Prior totransmitting the motion zone data and the conditional setting data 730,the client device 114 may be configured to receive motion zone data andconditional zone data input from a user, as discussed above. At a latertime T₂, the A/V recording and communication device 100 may transmit acombined signal 732 to the server 118, the combined signal 732comprising the motion zone data and the conditional setting data 730received from the client device 114 along with motion data captured bythe A/V recording and communication device 100. Prior to transmittingthe combined signal 732 to the server 118, the A/V recording andcommunication device 100 may capture the motion data using its camera102, PIR sensor(s) 144, and/or any other suitable motion detectingsensor or device. Upon receiving the transmitted combined signal 732from the A/V recording and communication device 100, the server 118 maytransmit an intrusion alert 734 to the at least one social network 122and/or the client device 114 at a time T₃, and the at least one socialnetwork 122 and/or the client device 114 may receive the transmittedintrusion alert 734 from the server 118. In various embodiments, theintrusion alert 734 may be transmitted to, and received by, at least oneother client device 114 in addition to, or instead of, the client device114 that transmitted the motion zone data and the conditional settingdata 730 to the server 118.

Each of the processes described herein, including at least the processes4300, 4400, 4500, 4600, and 4700 are illustrated as a collection ofblocks in a logical flow graph, which represent a sequence of operationsthat may be implemented in hardware, software, or a combination thereof.In the context of software, the blocks represent computer-executableinstructions stored on one or more computer-readable storage media that,when executed by one or more processors, perform the recited operations.Generally, computer-executable instructions include routines, programs,objects, components, data structures, and the like that performparticular functions or implement particular abstract data types. Theorder in which the operations are described is not intended to beconstrued as a limitation, and any number of the described blocks may becombined in any order and/or in parallel to implement the processes.Additionally, any number of the described blocks may be optional andeliminated to implement the processes.

FIG. 43 is a flowchart illustrating a process 4300 for creating anintrusion zone for an A/V recording and communication device, where theintrusion zone is associated with a security system, according tovarious aspects of the present disclosure. The process 4300, at blockB4302, displays a graphical user interface (GUI), the GUI configured forcreating an intrusion zone associated with an audio/video (A/V)recording and communication device. For example, the processor 2612 ofthe client device 2208, 2210 may cause a GUI 2622 to be displayed usingthe display 2620. As discussed above, the GUI 2622 may be configured tofor creating an intrusion zone 2340 associated with the A/V recordingand communication device 2202. In some examples, the intrusion zone 2340is associated with the security system 2228.

The processor 4300, at block B4304, displays one or more motion zones onthe GUI, the one or more motion zones being associated with a field ofview of the A/V recording and communication device. For example, theprocessor 2612 of the client device 2208, 2210 may cause one or moremotion zones 2350 to be displayed on the GUI 2622. The one or moremotion zones 2350 may be associated with a field of view of the A/Vrecording and communication device 2202. In some examples, the processor2612 of the client device 2208, 2210 may cause six motion zones 2350 tobe displayed on the GUI 2622. In other example, the processor 2612 ofthe client device 2208, 2210 may cause any other number of motion zones2350 to be displayed on the GUI 2622. In some embodiments, the clientdevice 2208, 2210 may enable the user to create a motion zone 2350and/or an intrusion zone 2342, such as by overlaying or otherwisecreating a rectangle, circle, triangle, or a polygon over the field ofview of the camera 2304 and/or over the field of view of the motionsensor 2308.

The processor 4300, at block B4306, receives a first input selecting amotion zone from the one or more motion zones, at least a portion of themotion zone being associated with the intrusion zone. For example, theprocessor 2612 of the client device 2208, 2210 may receive, using theinput interface 2604, the first input selecting a motion zone 2342 fromthe one or more motion zones 2350. At least a portion of the motion zone2342 may be associated with the intrusion zone 2340. For instance, insome examples, the processor 2612 of the client device 2208, 2210 mayfurther receive, using the input interface 2604, input that indicates arange at which the A/V recording and communication device 2202 detectsmotion within the motion zone 2342. In such examples, the range maycorrespond to the at least the portion of the motion zone 2342 that isassociated with the intrusion zone 2340.

The process 4300, at block B4308, receives a second input selecting aconditional setting for the intrusion zone. For example, the processor2612 of the client device 2208, 2210 may receive, using the inputinterface 2604, the second input selecting a conditional setting 2344for the intrusion zone 2340. As discussed above, the conditional setting2344 may include, but is not limited to, a time of day, a level ofambient light, a direction of movement, a speed of movement, a length oftime an object is within an intrusion zone, a level of reflecting lightintensity, and/or a body posture of a person within an intrusion zone.In some examples, the processor 2612 of the client device 2208, 2210 mayreceive, using the input interface 2604, input selecting more than oneconditional setting 2344. In some examples, such as when the intrusionzone 2340 is not associated with a conditional setting 2344, the process4300 may not include block B4308.

The process 4300, at block B4310, receives a third input for selectingan activation mode of a security system to associate with the intrusionzone. For example, the processor 2612 of the client device 2208, 2210may receive, using the input interface 2604, the third input selectingthe activation mode 2346 of the security system 2228 to associate withthe intrusion zone 2340. As discussed above, the activation mode 2346 ofthe security system 2228 may include, but is not limited to, an armedstay mode, an armed away mode, an armed vacation mode, a disarmed mode,and a custom armed mode. In some examples, the processor 2612 of theclient device 2208, 2210 may receive, using the input interface 2604,input selecting more than one activation mode 2340 to associate with theintrusion zone 2340.

The process 4300, at block B4312, receives a fourth input indicating atleast one action that the security system is to perform. For example,the processor 2612 of the client device 2208, 2210 may receive, usingthe input interface 2604, the fourth input indicating at least oneaction 2348 that the security system 2228 is to perform based on the A/Vrecording and communication device 2202 detecting motion within theintrusion zone 2340 and, in some examples, the conditional setting 2344being satisfied (e.g., examples where the conditional setting 2344 isselected at block B4308). As discussed above, the at least one action2348 may include, but is not limited to, activating the alarm 2230 ofthe security system 2228, outputting a warning sound (e.g., using thespeaker of the hub device 2212), transmitting a user alert 2334 to theclient device 2208, 2210 and/or the security monitoring server 2226,and/or changing a state of at least one automation device 2216 (e.g.,locking a lock, powering on a light, locking a window, etc.).

In some examples, the processor 2612 of the client device 2208, 2210 mayalso receive, using the input interface 2604, an input indicating atleast one action 2348 that the A/V recording and communication device2202 is to perform based on the A/V recording and communication device2202 detecting motion within the intrusion zone 2340 and, in someexamples, the conditional setting 2344 being satisfied (e.g., exampleswhere the conditional setting 2344 is selected at block B4308). The atleast one action 2348 that the A/V recording and communication device2202 is to perform may include, but is not limited to, recording imagedata 2324 using the camera 2304, activating a light (e.g., floodlight(s)2104), outputting a warning sound using the speaker 2310 and/or a siren,and/or transmitting a user alert 2334 to at least one of the clientdevice 2208, 2210, the hub device 2212, and the backend server 2222.

The process 4300, at block B4314, receives a fifth input for saving theintrusion zone. For example, the processor 2612 of the client device2208, 2210 may receive, using the input interface 2604, the fifth inputfor saving the intrusion zone 2340. In some examples, based on receivingthe fifth input, the processor 2612 of the client device 2208, 2210 maygenerate a control 2338 that is configured to cause at least one of theA/V recording and communication device 2202 and the security system 2228to save the intrusion zone 2340 and/or monitor the intrusion zone 2340.

The process 4300, at block B4216, transmits a control signal that isconfigured to cause at least one of the A/V recording and communicationdevice and a network device to save the intrusion zone. For example, theprocessor 2612 of the client device 2208, 2210 may transmit, using thecommunication module 2610, the control signal 2338 that is configured tocause the at least one of the A/V recording and communication device2202 and the security system 2228 to save the intrusion zone 2340. Insome examples, the processor 2612 of the client device 2208, 2210transmits the control signal 2338 to the network device (e.g., the hubdevice 2212 and/or the backend server 2222), which then transmits thecontrol signal 2338 (and/or an additional control signal 2338) to theA/V recording and communication device 2202. In some examples, when thecontrol signal 2338 does not include data representing the intrusionzone 2340, the processor 2612 of the client device 2208, 2210 mayfurther transmit, using the communication module 2610, the datarepresenting the intrusion zone 2340.

In some examples, the example process 4300 of FIG. 43 may be repeatedfor one or more additional intrusion zones 2340 for the A/V recordingand communication device 2202, where the one or more additionalintrusion zones 2340 may be associated with the security system 2228.For example, at least two intrusion zones 2340 may be created for theA/V recording and communication device 2202, where each of the intrusionzones 2340 may be associated with a respective motion zone 2342, arespective conditional setting 2344, a respective activation mode 2346,and/or at least one respective action 2348. As such, in some examples,the network device (e.g., the hub device 2212 and/or the backend server2222) may cause the security system 2228 to perform different actions2348 based on if the A/V recording and communication device 2202 detectsfirst motion within a first intrusion zone 2340 or second motion withina second intrusion zone 2340.

The process 4300 of FIG. 43 may be implemented in a variety ofembodiments, including those discussed above. However, thebelow-detailed embodiments are not intended to be limiting, and areprovided merely as example embodiments of the present disclosure. Otherembodiments similar to those outlined herein may also fall within thescope of the present disclosure.

For example, a user of the client device 2208 may want to create a newintrusion zone 2340 to associate with the security system 2228 installedat the user's property, where the user's property further includes theA/V recording and communication device 2202. As such, the processor 2612of the client device 2208 may display the GUI 2522 that is configured tocreate the intrusion zone 2340 (e.g., block B4302). Additionally, afterselecting the A/V recording and communication device 2202 to associatewith the intrusion zone 2340, the processor 2612 of the client device2208 may display the motion zones 2350 (and/or may allow the user tocreate motion zones 2350) associated with the field of view of the A/Vrecording and communication device 2202 on the GUI 2522, which may besimilar to the example shown in FIG. 27 (e.g., block B4304).

While displaying the GUI 2522, the processor 2612 of the client device2208 may receive, using the input interface 2604, the first inputselecting the motion zone 2342 from the motion zones 2350 (e.g., blockB4306). For example, the user may select the motion zone 2342 thatincludes the front door of the property. The processor 2612 of theclient device 2208 may then receive, using the input interface 2604, thesecond input selecting the conditional setting 2344 (e.g., block B4308).For example, the user may select the conditional setting 2344 to includea time of day, such as hours of the day that correspond to nighttime(e.g., 8:00 p.m. to 8:00 a.m.). Additionally, the processor 2612 of theclient device 2208 may receive, using the input interface 2604, thethird input selecting the activation mode 2346 of the security system2228 (e.g., block B4310). For example, the user may select the armedstay mode. Furthermore, the processor 2612 of the client device 2208 mayreceive, using the input interface 2604, the fourth input selecting theat least one activity 2348 that the security system 2228 is to perform(e.g., block B4312). For example, the user may select that the securitysystem 2228 activates the alarm 2230.

Next, when the user is finished, the processor 2612 of the client device2208 may receive, using the input interface 2604, the fifth input forsaving the intrusion zone 2340 (e.g., block B4314). In response, theprocessor 2612 of the client device 2208 may transmit, using thecommunication module 2610, the control signal 2338 that is configured tocause at least one of the A/V recording and communication device 2202and the security system 2228 to save the intrusion zone 2340 (e.g.,block B4316). By saving the intrusion zone 2340, the security system2228 may activate the alarm 2230 when motion is detected by the A/Vrecording and communication device 2202 within the intrusion zone 2340and the conditional setting 2344 is satisfied.

FIG. 44 is a flowchart illustrating an example process 4400 forreceiving and storing data representing an intrusion zone for an A/Vrecording and communication device, where the intrusion zone isassociated with a security system, according to various aspects of thepresent disclosure. In some examples, the example process 4400 of FIG.44 may occur after block B4316 of the example process 4300 of FIG. 43.

The process 4400, at block B4402, receives first data indicating one ormore parameters associated with an intrusion zone of an audio/video(A/V) recording and communication device, the intrusion zone beingassociated with a security system. For example, the processor 2506 ofthe backend server 2222 may receive, using the communication module 2502(and/or the processor 2408 of the hub device 2212 may receive, using thecommunication module 2404), the first data (e.g., a control signal 2338,data representing the intrusion zone 2340, etc.) associated with theintrusion zone 2340 of the A/V recording and communication device 2202.The first data may include one or more parameters, such as, but notlimited to, motion zone(s) 2342, conditional setting(s) 2344, activationmode(s) 2346, and action(s) 2348. In some examples, the processor 2506of the backend server 2222 may receive, using the communication module2502 (and/or the processor 2408 of the hub device 2212 may receive,using the communication module 2404), the first data from the clientdevice 2208, 22210. In some example, the processor 2408 of the hubdevice 2212 may receive, using the communication module 2404, the firstdata from the backend server 2222.

The process 4400, at block B4404, stores second data that associates theintrusion zone with the A/V recording and communication device. Forexample, the processor 2506 of the backend server 2222 (and/or theprocessor 2408 of the hub device 2212) may store second data thatassociates the intrusion zone 2340 with the A/V recording andcommunication device 2202. In some examples, the processor 2506 of thebackend server 2222 (and/or the processor 2408 of the hub device 2212)may further store data that associates the intrusion zone 2340 with thesecurity system 2228.

The process 4400, at block B4406, generates a control signal that isconfigured to cause the A/V recording and communication device to savethe intrusion zone. For example, the processor 2506 of the backendserver 2222 (and/or the processor 2408 of the hub device 2212) maygenerate the control signal 2338 that is configured to cause the A/Vrecording and communication device 2202 to save the intrusion zone 2340.

The process 4400, at block B4408, transmits the control signal to theA/V recording and communication device. For example, the processor 2506of the backend server 2222 may transmit, using the communication module2502 (and/or the processor 2408 of the hub device 2212 may transmit,using the communication module 2404), the control signal 2338 to the A/Vrecording and communication device 2202. In some examples, the processor2506 of the backend server 2222 may transmit, using the communicationmodule 2502, the control signal 2338 to the hub device 2212 which thentransmits the control signal 2338 (and/or an additional control signal2338) to the A/V recording and communication device 2202.

FIG. 45 is a flowchart illustrating an example process 4500 forutilizing an intrusion zone for an A/V recording and communicationdevice, where the intrusion zone is associated with a security system,according to various aspects of the present disclosure. The process4500, at block B4502, causes a security system to operate in anactivation mode. For example, the processor 2506 of the backend server2222 (and/or the processor 2408 of the hub device 2212) may cause thesecurity system 2228 to operate in the activation mode 2346. In someexamples, the processor 2506 of the backend server 2222 may cause thesecurity system 2228 to operate in the activation mode 2346 bytransmitting, using the communication module 2502, a control signal 2338to the hub device 2212, where the hub device 2212 causes the securitysystem 2228 to enter the activation mode 2346 in response to receivingthe control signal 2338.

The process 4500, at block B4504, receives motion data generated by anaudio/video (A/V) recording and communication device, the motion dataindicating that motion was detected in an intrusion zone. For example,the processor 2506 of the backend server 2222 may receive, using thecommunication module 2502 (and/or the processor 2408 of the hub device2212 may receive, using the communication module 2404), the motion data2330 generated by the A/V recording and communication device 2202. Themotion data 2330 may indicate that the A/V recording and communicationdevice 2202 detected motion within the intrusion zone 2340, such aswithin the motion zone(s) 2342 associated with the intrusion zone 2340.In some examples, the processor 2506 of the backend server 2222 mayreceive, using the communication module 2502, the motion data 2330 fromthe A/V recording and communication device 2202 and/or the hub device2212.

The process 4500, at block B4506, determines that the security system isoperating in the activation mode. For example, based on receiving themotion data 2330, the processor 2506 of the backend server 2222 (and/orthe processor 2408 of the hub device 2212) may determine that thesecurity system 2228 is operating in the activation mode 2346 associatedwith the intrusion zone 2340. In some examples, the processor 2506 ofthe backend server 2222 may transmit, using the communication module2502, a request to the hub device 2212, where the request is for thecurrent activation mode 2346 in which the security system 2228 isoperating. In response, the processor 2506 of the backend server 2222may receive, using the communication module 2502, mode data 2352 fromthe hub device 2212 that indicates the activation mode 2346.

The processor 4500, at block B4508, determines that a conditionalsetting for the intrusion zone is satisfied. For example, the processor2506 of the backend server 2222 (and/or the processor 2408 of the hubdevice 2212) may determine that the conditional setting 2344 for theintrusion zone 2340 is satisfied. In some examples, the processor 2506of the backend server 2222 may determine that the conditional setting2344 is satisfied by receiving, using the communication module 2502(and/or the processor 2408 of the hub device 2212 may determine that theconditional setting 2344 is satisfied by receiving, using thecommunication module 2404), data from the A/V recording andcommunication device 2202 that indicates that the conditional setting2344 is satisfied. In some examples, the processor 2506 of the backendserver 2222 (and/or the processor 2408 of the hub device 2212) maydetermine that the conditional setting 2344 for the intrusion zone 2340is satisfied by analyzing the conditional setting 2344 with respect tocurrent conditions, such as the current time, current amount of ambientlight, and/or the like. In some examples, the processor 2506 of thebackend server 2222 (and/or the processor 2408 of the hub device 2212)may determine that the conditional setting 2344 for the intrusion zone2340 is satisfied by analyzing the motion data 2330, such as todetermine a direction of motion, a speed of motion, a length of time anobject is within the intrusion zone 2340, a body posture of a personwithin the intrusion zone 2340, and/or the like.

The process 4500, at block B4508, causes the security system to performone or more actions. For example, the processor 2506 of the backendserver 2222 (and/or the processor 2408 of the hub device 2212) may causethe security system 2228 to perform one or more actions 2348 based onthe A/V recording and communication device detecting the motion withinthe intrusion zone 2340, the security system 2228 operating in theactivation mode 2346, and/or the conditional setting 2344 beingsatisfied. As discussed above, the one or more actions 2348 may include,but are not limited to, activating the alarm 2230 of the security system2228, outputting a warning sound (e.g., using the speaker of the hubdevice 2212, using a speaker of a wireless speaker in communication withthe hub device 2212, and/or using a speaker of an automation device2216), transmitting a user alert 2334 to the client device 2208, 2210and/or the security monitoring service 2226, and/or changing a state ofat least one automation device 2216 (e.g., locking a lock, powering on alight, locking a window, etc.). In some examples, the processor 2506 ofthe backend server 2222 may cause the security system 2228 to performthe one or more actions 2348 by transmitting, using the communicationmodule 2502, a control signal 2338 to the hub device 2212. In responseto receiving the control signal 2338, the processor 2408 of the hubdevice 2212 may then cause the security system 2228 to perform the oneor more actions 2348.

In some examples, block B4504 through block B4510 of the example process4500 of FIG. 45 may be repeated as the processor 2506 of the backendserver 2222 (and/or the processor 2408 of the hub device 2212) continuesto monitor the intrusion zone 2340. Additionally, in some examples,while monitoring the intrusion zone 2340, the processor 2506 of thebackend server 2222 (and/or the processor 2408 of the hub device 2212)may refrain from causing the security system 2228 to perform the one ormore actions 2348 based on determining that the security system 2228 isnot operating in the activation mode 2346 (at block B4506) and/ordetermining that the conditional setting 2344 is not satisfied (at blockB4508).

The process 4500 of FIG. 45 may be implemented in a variety ofembodiments, including those discussed above. However, thebelow-detailed embodiments are not intended to be limiting, and areprovided merely as example embodiments of the present disclosure. Otherembodiments similar to those outlined herein may also fall within thescope of the present disclosure.

For example, the processor 2408 of the hub device 2212 may receive,using the communication module 2404, a control signal 2338 from theclient device 2208, 2210 and/or the backend server 2222. Based onreceiving the control signal 2338, the processor 2408 of the hub device2212 may cause the security system 2228 to operate in an activation mode2346, such as the armed stay mode (e.g., block B4502). While operatingin the armed stay mode, the processor 2408 of the hub device 2212 mayreceive, using the communication module 2404, motion data 2330 from theA/V recording and communication device 2202 that indicates that motionwas detected within an intrusion zone 2340 (e.g., block B4504). Based onreceiving the motion data 2330, the processor 2408 of the hub device2212 may analyze the intrusion zone 2340 to determine that the intrusionzone 2340 is associated with the armed stay mode and/or determine thatthe intrusion zone 2340 is associated with a conditional setting 2344,such as hours between 8:00 p.m. and 8:00 a.m. each day.

The processor 2408 of the hub device 2212 may then determine that thesecurity system 2228 is operating in the armed stay mode (e.g., blockB4506). Additionally, the processor 2408 of the hub device 2212 maydetermine that a current time is between 8:00 p.m. and 8:00 a.m. and, assuch, the conditional setting 2344 associated with the security system2228 is satisfied (e.g., block B4508). In response to determining thatthe security system 2228 is operating in the armed stay mode anddetermining that the conditional setting 2344 is satisfied, theprocessor 2408 of the hub device 2212 may cause the security system 2228to perform one or more actions 2348 (e.g., block B4510). For a firstexample, the processor 2408 of the hub device 2212 may cause thesecurity system 2228 to activate the alarm 2230. For a second example,the processor 2408 of the hub device 2212 may transmit, using thecommunication module 2404, a user alert 2334 to the client device 2208,2210 and/or the backend server 2222, where the user alert 2334 indicatesthat the A/V recording and communication device 2202 detected motionwithin the intrusion zone 2340. For a third example, the processor 2408of the hub device 2212 may transmit, using the communication module2408, a control signal 2338 to the A/V recording and communicationdevice 2202 that is configured to cause the A/V recording andcommunication device 2202 to capture image data 2324 using the camera2304.

FIG. 46 is a flowchart illustrating a first example process 4600 formonitoring an intrusion zone for an A/V recording and communicationdevice, where the intrusion zone is associated with a security system,according to various aspects of the present disclosure. The process4600, at block B4602, receives data indicating a conditional setting foran intrusion zone associated with an audio/video (A/V) recording andcommunication device and an activation mode associated with a securitysystem. For example, the processor 2316 of the A/V recording andcommunication device 2202 may receive, using the communication module2312, data (e.g., a control signal 2338, data representing the intrusionzone 2340, etc.) indicating the conditional setting 2344 associated withthe intrusion zone 2340 and the activation mode 2346 associated with thesecurity system 2228. In some examples, the processor 2316 of the A/Vrecording and communication device 2202 may receive, using thecommunication module 2312, the data from the client device 2208, 2210,the hub device 2212, and/or the backend server 2222.

The process 4600, at block B4604, receives an indication that thesecurity system is operating in the activation mode. For example, theprocessor 2316 of the A/V recording and communication device 2202 mayreceive, using the communication module 2312, mode data 1352 indicatingthat the security system 2228 is operating in the activation mode 2346associated with the intrusion zone 2340. In some examples, based onreceiving the mode data 2352, the processor 2316 of the A/V recordingand communication device 2202 may begin monitoring the intrusion zone2340 for motion.

The process 4600, at block B4606, detects motion within the intrusionzone. For example, the processor 2316 of the A/V recording andcommunication device 2202 may detect, using at least one of the camera2304 and the motion sensor 2308, motion within the intrusion zone 2340.In some examples, the processor 2316 of the A/V recording andcommunication device 2202 may further detect a direction of the motion,a speed of the motion, a length of time that an object is within theintrusion zone 2340, a body posture of a person within the intrusionzone 2340, and/or the like.

The process 4600, at block B4608, determines that the conditionalsetting is satisfied. For example, the processor 2316 of the A/Vrecording and communication device 2202 may determine that theconditional setting 2344 for the intrusion zone 2340 is satisfied. Insome examples, the processor 2316 of the A/V recording and communicationdevice 2202 may determine that the conditional setting 2344 for theintrusion zone 2340 is satisfied by analyzing the conditional setting2344 with respect to current conditions, such as the current time,current amount of ambient light, and/or the like. In some examples, theprocessor 2316 of the A/V recording and communication device 2202 maydetermine that the conditional setting 2344 for the intrusion zone 2340is satisfied based on the direction of motion, the speed of motion, thelength of time the object is within the intrusion zone 2340, the bodyposture of a person within the intrusion zone 2340, and/or the like.

The process 4600, at block B4610, generates a user alert indicating thatthe A/V recording and communication device detected the motion withinthe intrusion zone. For example, based on detecting the motion withinthe intrusion zone 2340 and/or determining that the conditional setting2344 is satisfied, the processor 2316 of the A/V recording andcommunication device 2202 may generate the user alert 2334 indicatingthat the A/V recording and communication device 2202 detected the motionwithin the intrusion zone 2340.

The process 4600, at block B4612, transmits the user alert. For example,the processor 2316 of the A/V recording and communication device 2202may transmit, using the communication module 2312, the user alert 2334to the client device 2208, 2210, the hub device 2212, and/or the backendserver 2222. Additionally, in some examples, the processor 2316 of theA/V recording and communication device 2202 may perform one or moreadditional actions 2348, such as, but not limited to, recording theimage data 2324 using the camera 2304, activating a light (e.g.,floodlight(s) 2104), and/or outputting a warning sound using the speaker2310 and/or a siren.

In some examples, block B4604 through block B4612 of the example process4600 of FIG. 46 may be repeated as the processor 2316 of the A/Vrecording and communication device 2202 continues to monitor theintrusion zone 2340. Additionally, in some examples, while monitoringthe intrusion zone 2340, the processor 2316 of the A/V recording andcommunication device 2202 may refrain from generating and/ortransmitting a user alert 2334 based on determining that the securitysystem 2228 is not operating in the activation mode 2346 and/ordetermining that the conditional setting 2344 is not satisfied (at blockB4608).

FIG. 47 is a flowchart illustrating a second example process 4700 formonitoring an intrusion zone for an A/V recording and communicationdevice, where the intrusion zone is associated with a security system,according to various aspects of the present disclosure. The process4700, at block B4702, receives data representing an intrusion zoneassociated with an audio/video (A/V) recording and communication device.For example, the processor 2316 of the A/V recording and communicationdevice 2202 may receive, using the communication module 2312, data(e.g., a control signal 2338, data representing the intrusion zone 2340,etc.) representing the intrusion zone 2340 associated with the A/Vrecording and communication device 2202. In some examples, the processor2316 of the A/V recording and communication device 2202 may receive,using the communication module 2312, the data from the client device2208, 2210, the hub device 2212, and/or the backend server 2222.

The process 4700, at block B4704, receives an indication that a securitysystem is operating in an activation mode. For example, the processor2316 of the A/V recording and communication device 2202 may receive,using the communication module 2312, mode data 2352 indicating that thesecurity system 2228 is operating in the activation mode 2346 associatedwith the intrusion zone 2340. In some examples, based on receiving themode data 2352, the processor 2316 of the A/V recording andcommunication device 2202 may begin monitoring the intrusion zone 2340for motion.

The process 4700, at block B4706, detects motion within the intrusionzone. For example, the processor 2316 of the A/V recording andcommunication device 2202 may detect, using at least one of the camera2304 and the motion sensor 2308, motion within the intrusion zone 2340.In some examples, the processor 2316 of the A/V recording andcommunication device 2202 may further detect a direction of the motion,a speed of the motion, a length of time that an object is within theintrusion zone 2340, a body posture of a person within the intrusionzone 2340, and/or the like.

The process 4700, at block B4708, performs one or more actions. Forexample, based on detecting the motion within the intrusion zone 2340and/or the security system 2228 operating in the activation mode 2346associated with the intrusion zone 2340, the processor 2316 of the A/Vrecording and communication device 2202 may perform one or more actions2348. As discussed above, the one or more actions 2348 may include, butare not limited to, recording image data 2324 using the camera 2304,activating a light (e.g., floodlight(s) 2104), outputting a warningsound using the speaker 2310 and/or a siren, and/or transmitting a useralert 2334 to at least one of the client device 2208, 2210, the hubdevice 2212, and the backend server 2222.

The processes described herein enable a user to configure an A/Vrecording and communication device 2202 and/or a security system 2228such that the security system 2228 performs one or more actions 2348 attimes when motion detected by the A/V recording and communication device2202 is likely a threat to a user. For example, the user may createintrusion zone(s) 2340 for the A/V recording and communication device2202. Each intrusion zone 2340 may be associated with motion zone(s)2342 of the A/V recording and communication device 2202, conditionalsetting(s) 2344, activation mode(s) 2346 for the security system 2228,and/or action(s) 2348 that the security system 2228 is to perform. Basedon the A/V recording and communication device detecting motion 2202within the intrusion zone, a network device may determine that thesecurity system 2228 is operating in one of the activation mode(s) 2346and/or that at least one of the conditional setting(s) 2344 is satisfiedbefore causing the security system 2228 to perform the action(s) 2348.As a result, the security system 2228 may perform the action(s) 2348,such as activating the alarm 2230 and/or transmitting a user alert 2334,in response to motion that is more likely to have been caused by anactual threat. Therefore, the user will more likely respond to warningsdetected by the security system 2228.

FIG. 48 is a functional block diagram of a client device 800 on whichthe present embodiments may be implemented according to various aspectsof the present disclosure. The user's client device 114 described withreference to FIG. 1 may include some or all of the components and/orfunctionality of the client device 800. The client device 800 maycomprise, for example, a smartphone.

With reference to FIG. 48, the client device 800 includes a processor802, a memory 804, a user interface 806, a communication module 808, anda dataport 810. These components are communicatively coupled together byan interconnect bus 812. The processor 802 may include any processorused in smartphones and/or portable computing devices, such as an ARMprocessor (a processor based on the RISC (reduced instruction setcomputer) architecture developed by Advancesd RISC Machines (ARM)). Insome embodiments, the processor 802 may include one or more otherprocessors, such as one or more conventional microprocessors, and/or oneor more supplementary co-processors, such as math co-processors.

The memory 804 may include both operating memory, such as random accessmemory (RAM), as well as data storage, such as read-only memory (ROM),hard drives, flash memory, or any other suitable memory/storage element.The memory 804 may include removable memory elements, such as aCompactFlash card, a MultiMediaCard (MMC), and/or a Secure Digital (SD)card. In some embodiments, the memory 804 may comprise a combination ofmagnetic, optical, and/or semiconductor memory, and may include, forexample, RAM, ROM, flash drive, and/or a hard disk or drive. Theprocessor 802 and the memory 804 each may be, for example, locatedentirely within a single device, or may be connected to each other by acommunication medium, such as a USB port, a serial port cable, a coaxialcable, an Ethernet-type cable, a telephone line, a radio frequencytransceiver, or other similar wireless or wired medium or combination ofthe foregoing. For example, the processor 802 may be connected to thememory 804 via the dataport 810.

The user interface 806 may include any user interface or presentationelements suitable for a smartphone and/or a portable computing device,such as a keypad, a display screen, a touchscreen, a microphone, and aspeaker. The communication module 808 is configured to handlecommunication links between the client device 800 and other externaldevices or receivers, and to route incoming/outgoing data appropriately.For example, inbound data from the dataport 810 may be routed throughthe communication module 808 before being directed to the processor 802,and outbound data from the processor 802 may be routed through thecommunication module 808 before being directed to the dataport 810. Thecommunication module 808 may include one or more transceiver modulescapable of transmitting and receiving data, and using, for example, oneor more protocols and/or technologies, such as GSM, UMTS (3GSM), IS-95(CDMA one), IS-2000 (CDMA 2000), LTE, FDMA, TDMA, W-CDMA, CDMA, OFDMA,Wi-Fi, WiMAX, or any other protocol and/or technology.

The dataport 810 may be any type of connector used for physicallyinterfacing with a smartphone and/or a portable computing device, suchas a mini-USB port or an IPHONE®/IPOD® 30-pin connector or LIGHTNING®connector. In other embodiments, the dataport 810 may include multiplecommunication channels for simultaneous communication with, for example,other processors, servers, and/or client terminals.

The memory 804 may store instructions for communicating with othersystems, such as a computer. The memory 804 may store, for example, aprogram (e.g., computer program code) adapted to direct the processor802 in accordance with the present embodiments. The instructions alsomay include program elements, such as an operating system. Whileexecution of sequences of instructions in the program causes theprocessor 802 to perform the process steps described herein, hard-wiredcircuitry may be used in place of, or in combination with,software/firmware instructions for implementation of the processes ofthe present embodiments. Thus, the present embodiments are not limitedto any specific combination of hardware and software.

FIG. 49 is a functional block diagram of a general-purpose computingsystem on which the present embodiments may be implemented according tovarious aspects of the present disclosure. The computer system 900 maybe embodied in at least one of a personal computer (also referred to asa desktop computer) 900A, a portable computer (also referred to as alaptop or notebook computer) 900B, and/or a server 900C. A server is acomputer program and/or a machine that waits for requests from othermachines or software (clients) and responds to them. A server typicallyprocesses data. The purpose of a server is to share data and/or hardwareand/or software resources among clients. This architecture is called theclient-server model. The clients may run on the same computer or mayconnect to the server over a network. Examples of computing serversinclude database servers, file servers, mail servers, print servers, webservers, game servers, and application servers. The term server may beconstrued broadly to include any computerized process that shares aresource to one or more client processes.

The computer system 900 may execute at least some of the operationsdescribed above. The computer system 900 may include at least oneprocessor 910, memory 920, at least one storage device 930, andinput/output (I/O) devices 940. Some or all of the components 910, 920,930, 940 may be interconnected via a system bus 950. The processor 910may be single- or multi-threaded and may have one or more cores. Theprocessor 910 may execute instructions, such as those stored in thememory 920 and/or in the storage device 930. Information may be receivedand output using one or more I/O devices 940.

The memory 920 may store information, and may be a computer-readablemedium, such as volatile or non-volatile memory. The storage device(s)930 may provide storage for the system 900, and may be acomputer-readable medium. In various aspects, the storage device(s) 930may be a flash memory device, a hard disk device, an optical diskdevice, a tape device, or any other type of storage device.

The I/O devices 940 may provide input/output operations for the system900. The I/O devices 940 may include a keyboard, a pointing device,and/or a microphone. The I/O devices 940 may further include a displayunit for displaying graphical user interfaces, a speaker, and/or aprinter. External data may be stored in one or more accessible externaldatabases 960.

The features of the present embodiments described herein may beimplemented in digital electronic circuitry, and/or in computerhardware, firmware, software, and/or in combinations thereof. Featuresof the present embodiments may be implemented in a computer programproduct tangibly embodied in an information carrier, such as amachine-readable storage device, and/or in a propagated signal, forexecution by a programmable processor. Embodiments of the present methodsteps may be performed by a programmable processor executing a programof instructions to perform functions of the described implementations byoperating on input data and generating output.

The features of the present embodiments described herein may beimplemented in one or more computer programs that are executable on aprogrammable system including at least one programmable processorcoupled to receive data and/or instructions from, and to transmit dataand/or instructions to, a data storage system, at least one inputdevice, and at least one output device. A computer program may include aset of instructions that may be used, directly or indirectly, in acomputer to perform a certain activity or bring about a certain result.A computer program may be written in any form of programming language,including compiled or interpreted languages, and it may be deployed inany form, including as a stand-alone program or as a module, component,subroutine, or other unit suitable for use in a computing environment.

Suitable processors for the execution of a program of instructions mayinclude, for example, both general and special purpose processors,and/or the sole processor or one of multiple processors of any kind ofcomputer. Generally, a processor may receive instructions and/or datafrom a read only memory (ROM), or a random access memory (RAM), or both.Such a computer may include a processor for executing instructions andone or more memories for storing instructions and/or data.

Generally, a computer may also include, or be operatively coupled tocommunicate with, one or more mass storage devices for storing datafiles. Such devices include magnetic disks, such as internal hard disksand/or removable disks, magneto-optical disks, and/or optical disks.Storage devices suitable for tangibly embodying computer programinstructions and/or data may include all forms of non-volatile memory,including for example semiconductor memory devices, such as EPROM,EEPROM, and flash memory devices, magnetic disks such as internal harddisks and removable disks, magneto-optical disks, and CD-ROM and DVD-ROMdisks. The processor and the memory may be supplemented by, orincorporated in, one or more ASICs (application-specific integratedcircuits).

To provide for interaction with a user, the features of the presentembodiments may be implemented on a computer having a display device,such as an LCD (liquid crystal display) monitor, for displayinginformation to the user. The computer may further include a keyboard, apointing device, such as a mouse or a trackball, and/or a touchscreen bywhich the user may provide input to the computer.

The features of the present embodiments may be implemented in a computersystem that includes a back-end component, such as a data server, and/orthat includes a middleware component, such as an application server oran Internet server, and/or that includes a front-end component, such asa client computer having a graphical user interface (GUI) and/or anInternet browser, or any combination of these. The components of thesystem may be connected by any form or medium of digital datacommunication, such as a communication network. Examples ofcommunication networks may include, for example, a LAN (local areanetwork), a WAN (wide area network), and/or the computers and networksforming the Internet.

The computer system may include clients and servers. A client and servermay be remote from each other and interact through a network, such asthose described herein. The relationship of client and server may ariseby virtue of computer programs running on the respective computers andhaving a client-server relationship to each other.

The above description presents the best mode contemplated for carryingout the present embodiments, and of the manner and process of practicingthem, in such full, clear, concise, and exact terms as to enable anyperson skilled in the art to which they pertain to practice theseembodiments. The present embodiments are, however, susceptible tomodifications and alternate constructions from those discussed abovethat are fully equivalent. Consequently, the present invention is notlimited to the particular embodiments disclosed. On the contrary, thepresent invention covers all modifications and alternate constructionscoming within the spirit and scope of the present disclosure. Forexample, the steps in the processes described herein need not beperformed in the same order as they have been presented, and may beperformed in any order(s). Further, steps that have been presented asbeing performed separately may in alternative embodiments be performedconcurrently. Likewise, steps that have been presented as beingperformed concurrently may in alternative embodiments be performedseparately.

What is claimed is:
 1. A method comprising: storing, by a networkdevice, intrusion zone data representing an intrusion zone for anaudio/video recording and communication device (A/V device), theintrusion zone being associated with at least: a motion zone from aplurality of motion zones associated with the A/V device, the motionzone representing a portion of a field of view (FOV) of the A/V device;a conditional setting; and at least one action that a security system isto perform based at least in part on the A/V device detecting motionwithin the motion zone and the conditional setting being satisfied;receiving, by the network device, motion data from the A/V device, themotion data indicating that the A/V device detected motion within themotion zone; determining, by the network device, that the conditionalsetting for the intrusion zone is satisfied; and after receiving themotion data from the A/V device, and after determining that theconditional setting for the intrusion zone is satisfied, determining, bythe network device, to cause the security system to perform the at leastone action.
 2. The method of claim 1, wherein the at least one actioncomprises at least one of activating an alarm, outputting a warningsound, transmitting a user alert to a client device, and changing apower state of at least one automation device.
 3. The method of claim 1,further comprising: receiving, by the network device, the intrusion zonedata from a client device associated with the A/V device.
 4. The methodof claim 1, wherein the conditional setting comprises at least one of atime of day, a level of ambient light, a location of motion detection, adirection of movement, a speed of movement, a length of time that anobject is within the motion zone, a level of reflecting light intensity,and a body posture of a person within the motion zone.
 5. The method ofclaim 1, wherein: the intrusion zone is further associated with anactivation mode associated with the security system, the activation modebeing associated with motion detection by one or more sensors of thesecurity system; and the security system is configured to perform the atleast one action further based at least in part on the security systemoperating in the activation mode.
 6. The method of claim 1, wherein theintrusion zone data is first data, the intrusion zone is a firstintrusion zone, the motion zone is a first motion zone, the portion is afirst portion, the conditional setting is a first conditional setting,the at least one action is at least one first action, and the motion isfirst motion, and wherein the method further comprises: storing, by thenetwork device, second data representing a second intrusion zone for theA/V device, the second intrusion zone being associated with at least: asecond motion zone from the plurality of motion zones, the second motionzone representing a second portion of the FOV; a second conditionalsetting; and at least one second action that the security system is toperform based at least in part on the A/V device detecting second motionwithin the second motion zone and the second conditional setting beingsatisfied.
 7. The method of claim 1, wherein the motion data is firstmotion data, the motion is first motion, and the motion zone is a firstmotion zone, and wherein the method further comprises: prior toreceiving the first motion data, receiving, by the network device,second motion data from the A/V device, the second motion dataindicating that the A/V device detected second motion within a secondmotion zone; determining, by the network device, that the A/V devicedetected the second motion in the second motion zone; and afterdetermining that the A/V device detected the second motion in the secondmotion zone, determining, by the network device, not to cause thesecurity system to perform the at least one action.
 8. The method ofclaim 1, wherein the motion data is first motion data and the motion isfirst motion, and wherein the method further comprises: prior toreceiving the first motion data, receiving, by the network device,second motion data from the A/V device, the second motion dataindicating that the A/V device detected second motion within the motionzone; determining, by the network device, that the conditional settingfor the intrusion zone is not satisfied; and after receiving the secondmotion data from the A/V device, and after determining that theconditional setting for the intrusion zone is not satisfied,determining, by the network device, not to cause the security system toperform the at least one action.
 9. A method comprising: creating, bythe network device, an intrusion zone for an audio/video recording andcommunication device (A/V device), the intrusion zone being associatedwith: a motion zone from a plurality of motions zones for the A/Vdevice, the motion zone being associated with a portion of a field ofview (FOV) of the A/V device; and at least one action that a securitysystem is to perform; receiving, by the network device, motion data fromthe A/V device, the motion data indicating that the A/V device detectedmotion within the motion zone; and after receiving the motion data,determining, by the network device, to cause the security system toperform the at least one action.
 10. The method of claim 9, furthercomprising: receiving, by the network device, intrusion zone data from aclient device associated with the A/V device, the intrusion zone dataindicating at least: the motion zone to associate with the intrusionzone; and the at least one action that the security system is toperform, wherein creating the intrusion zone is based at least in parton receiving the intrusion zone data.
 11. The method of claim 9, whereinthe intrusion zone is further associated with a conditional setting, andwherein the method further comprises: determining, by the networkdevice, that the conditional setting is satisfied, wherein determiningto cause the security system to perform the at least one action furtheroccurs after determining that the conditional setting is satisfied. 12.The method of claim 9, wherein the intrusion zone is further associatedwith an activation mode of the security system, and wherein the methodfurther comprises: determining, by the network device, that the securitysystem is operating in the activation mode, wherein determining to causethe security system to perform the at least one action further occursafter determining that the security system is operating in theactivation mode.
 13. The method of claim 9, wherein the intrusion zoneis a first intrusion zone, the motion zone is a first motion zone, themotion data is first motion data, and the motion is first motion, andwherein the method further comprises: prior to receiving the firstmotion data, receiving, by the network device, second motion data fromthe A/V device, the second motion data indicating that the A/V devicedetected second motion within a second motion zone associated with asecond intrusion zone; determining, by the network device, that the A/Vdevice detected the second motion within the second motion zone; andafter determining that the A/V device detected the second motion withinthe second motion zone, determining, by the network device, not to causethe security system to perform the at least one action.
 14. Anaudio/video recording and communication device (A/V device) comprising:a camera; a communication component; one or more processors; and anon-transitory machine-readable memory storing a program, the programexecutable by at least one of the one or more processors, the programcomprising instructions for: receiving, using the communicationcomponent and from a network device, first data representing anintrusion zone for the A/V device, the intrusion zone being associatedwith a motion zone from a plurality of motion zones for the A/V deviceand an activation mode of a security system; after receiving the firstdata, storing second data representing the intrusion zone; detecting,using at least one of the camera and a motion sensor, motion within themotion zone; determining that the security system is operating in theactivation mode; and after detecting the motion within the motion zone,and after determining that the security system is operating in theactivation mode, transmitting, using the communication component, a useralert to at least one of the network device and a client deviceassociated with the A/V device.
 15. The A/V device of claim 14, whereinthe intrusion zone is further associated with a conditional setting, andwherein the program further comprises instructions for: determining thatthe conditional setting for the intrusion zone is satisfied, whereintransmitting the user alert further occurs after determining that theconditional setting for the intrusion zone is satisfied.
 16. The A/Vdevice of claim 15, wherein the conditional setting comprises at leastone of a time of day, a level of ambient light, a location of motiondetection, a direction of movement, a speed of movement, a length oftime that an object is within the motion zone, a level of reflectinglight intensity, and a body posture of a person within the motion zone.17. The A/V device of claim 14, wherein intrusion zone is furtherassociated with at least one action to be performed by the A/V deviceafter detecting the motion within the motion zone while the securitysystem is operating in the activation mode, and wherein the programfurther comprises instructions for: after determining that the securitysystem is operating in the activation mode, determining to cause the A/Vdevice to perform the at least one action.
 18. The A/V device of claim14, wherein the motion is first motion, the intrusion zone is a firstintrusion zone, the motion zone is a first motion zone, and the useralert is a first user alert, and wherein the program further comprisesinstructions for: detecting, using the at least one of the camera andthe motion sensor, second motion within a second motion zone associatedwith a second intrusion zone; and after detecting the second motionwithin the second motion zone, determining not to transmit a second useralert.
 19. The A/V device of claim 14, wherein the motion is firstmotion, the activation mode is a first activation mode, and the useralert is a first user alert, and wherein the program further comprisesinstructions for: detecting, using at least one of the camera and themotion sensor, second motion within the motion zone; determining thatthe security system is operating in a second activation mode; and afterdetermining that the security system is operating in the secondactivation mode, determining not to transmit a second user alert. 20.The method of claim 9, wherein the motion zone is a first motion zone,and wherein the method further comprises: sending, by the networkdevice, first data to a client device, the first data representing atleast the first motion zone and a second motion zone from the pluralityof motion zones, the first motion zone being associated with at least afirst motion detector of the A/V device and the second motion zone beingassociated with at least a second motion detector of the A/V device; andreceiving, by the network device, second data from the client device,the second data representing the intrusion zone.
 21. The method of claim1, wherein the intrusion zone data includes at least: first datarepresenting the motion zone; second data representing the conditionalsetting; and third data representing the at least one action.
 22. Themethod of claim 9, wherein: the portion of the FOV represents a firstphysical space of an environment in which the A/V device is located; andan additional motion zone of the plurality of motion zones represents anadditional portion of the FOV of the A/V device, the additional portionof the FOV representing a second physical space of the environment.