Virtual enhancement of security monitoring

ABSTRACT

Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one aspect, a system includes a virtual reality headset, a plurality of cameras, a plurality of sensors that includes a first sensor, a control unit, wherein the control unit includes a network interface, a processor, a storage device that includes instructions to perform operations that comprise receiving data from the first sensor that is indicative of an alarm event, determining a location of the first sensor, identifying a set of one or more cameras from the plurality of cameras that are associated with the first sensor, selecting a particular camera from the identified set of one or more cameras; and transmitting one or more instructions to the particular camera that command the particular camera to stream a live video feed to a user interface of the virtual reality headset.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation (and claims the benefit of priorityunder 35 USC 120) of U.S. application Ser. No. 15/609,381, filed May 31,2017, which is a continuation of U.S. application Ser. No. 15/069,611,filed Mar. 14, 2016, and issued as U.S. Pat. No. 9,672,707 on Jun. 6,2017, which claims the benefit of U.S. Provisional Application Ser. No.62/132,496 filed Mar. 12, 2015 and entitled “Virtual Enhancement ofSecurity Monitoring.” All of these prior applications are incorporatedherein by reference in their entirety.

BACKGROUND

Security and surveillance systems have been utilized for years for bothresidential and commercial properties. Such systems may utilize acentral monitoring system to detect when an alleged intrusion hasoccurred. For instance, the central monitoring system may be alertedwhen a motion sensor that has been mounted at a particular portion ofthe property detects motion. In some instances, the central monitoringsystem may transmit an alert to an operator's call center, or even locallaw enforcement that indicates that there may be a break-in at theproperty from which the alert originated.

Though such security and surveillance systems have certain advantages,such security and surveillance systems necessarily require a humanelement. That is, in response to the detection of an alert from asensor, a human is required to respond to, and investigate, the reasonwhy a sensor triggered an alert. This may put a person such as, forexample, a property owner, a property custodian, a law enforcementofficer, and/or the like at risk of harm.

SUMMARY

Techniques are described for enhancing a security monitoring systemusing virtual reality components and/or holograms. In someimplementations, a user may utilize a virtual reality headset toinvestigate portions of a property from the safety of a secure room. Inthe same, or other implementations, one or more holograms may bedisplayed in order to deter an intruder from proceeding with a homeinvasion.

According to at least one aspect of the subject matter disclosed by thisspecification, a method, system, and apparatus, including computerprograms encoded on storage devices, are disclosed for monitoring,security, and surveillance of a property. In some aspects, the subjectmatter in this specification may be embodied in a system that includes avirtual reality headset, a plurality of cameras, a plurality of sensorslocated at different locations throughout a property, wherein theplurality of sensors include a first sensor, and a monitoring controlunit. The monitoring control unit may include a network interface, oneor more processors, and one or more storage devices that includeinstructions that are operable, when executed by the one or moreprocessors, to cause the one or more processors to perform operationsthat include receiving data from the first sensor that is indicative ofan alarm event, determining a location of the first sensor, identifyinga set of one or more cameras from the plurality of cameras that areassociated with the first sensor, selecting a particular camera from theidentified set of one or more cameras and transmitting one or moreinstructions to the particular camera that command the particular camerato stream a live video feed to a user interface of the virtual realityheadset.

These, and other versions, may optionally include one or more of thefollowing features. For instance, the operations may also includenotifying a user that an alarm event has been detected. Alternatively,or in addition, the operations may also include transmitting one or moreinstructions to the particular camera to command the particular camerato sync with the virtual reality headset. Alternatively, or in addition,the operations may also include providing a graphical icon for displayon the user interface of the virtual reality headset, wherein thegraphical icon is indicative of a detected alarm event that isassociated with a second sensor, receiving a selection of the graphicalicon, and transmitting one or more instructions to a camera that isassociated with the second sensor to stream a live video feed to theuser interface of the virtual reality headset. In these, or other,implementations, selecting a particular camera from the set of one ormore cameras may include selecting the particular camera that is closestin proximity to the first sensor.

In another aspect, the subject matter in this specification may beembodied in a system that includes a virtual reality headset, aplurality of cameras, a monitoring control unit, wherein the monitoringcontrol unit includes a network interface, one or more processors, andone or more storage devices that include instructions that are operable,when executed by the one or more processors, to cause the one or moreprocessors to perform operations that include receiving a request fromthe virtual reality headset to access one of the plurality of cameras,providing for display on a user interface of the virtual reality headseta set of one or more graphical icons that each correspond to aparticular camera of the plurality of cameras, receiving a selectionfrom a user of a particular graphical icon from the set of one or moregraphical icons, and transmitting one or more instructions to a camerathat is associated with the particular graphical icon to stream a livevideo feed to the user interface of the virtual reality headset.

These, and other versions, may optionally include one or more of thefollowing features. For instance, the operations may further comprisetransmitting a prompt to the virtual reality headset requesting that theuser of the virtual reality headset input authentication information,and receiving authentication information from the user. Alternatively,or in addition, the operations may further comprise transmitting one ormore instructions to the camera that is associated with the particulargraphical icon that command the camera to sync with the virtual realityheadset.

In one implementation, the system may further include a plurality ofsensors located at different locations throughout a property, whereinthe plurality of sensors include a first sensor, wherein the operationsfurther comprise receiving data from the first sensor that is indicativeof an alarm event, and notifying a user that an alarm event has beendetected. In this, or other implementations, the plurality of camerasmay include at least one camera that is coupled to a robotic device.

In another aspect, the subject matter in this specification may beembodied in a system that includes a plurality of holographicprojectors, a plurality of sensors located at different locationsthroughout a property, wherein the plurality of sensors include a firstsensor, a monitoring control unit, wherein the monitoring control unitincludes a network interface, one or more processors, and one or morestorage devices that include instructions that are operable, whenexecuted by the one or more processors, to cause the one or moreprocessors to perform operations that include receiving data from thefirst sensor that is indicative of an alarm event; determining alocation of the first sensor, identifying a subset of one or moreholographic projectors, from the plurality of holographic projectors,that are associated with the first sensor, selecting a particularhologram from multiple stored holograms, and transmitting one or moreinstructions to at least one of the identified holographic projectors todisplay the particular hologram.

These, and other versions, may optionally include one or more of thefollowing features. For instance, in one implementation, the particularhologram is a three dimensional hologram. In this, or other,implementations, at least one of the one or more holographic projectorsis configured to display a moving hologram.

The one or more instructions may further include an instruction that theat least one of the one or more holographic projectors to display ahologram of a human being that moves from a first room to a second room.Alternatively, or in addition, the system may further comprise alighting unit in the second room, a control module associated with thelighting unit, wherein the operations further include transmitting oneor more instructions to the control module to toggle the lighting unitfrom off to on when the moving hologram crosses a threshold that existsbetween the first room and the second room.

In these, or other, implementations, selecting a particular hologramfrom multiple stored holograms includes selecting a particular hologramfrom multiple stored holograms based on the threat level that isassociated with the alarm event, wherein the threat level of the alarmevent may include an intermediate alarm event or a severe alarm event.

In these, or other, implementations, the operations may further includedetermining that the alarm event is associated with an intermediatelevel of severity, and, in response to determining that the alarm eventis associated with an intermediate level of severity, selecting ahologram that is representative of a human being.

Alternatively, or in addition, the operations may further includedetermining that the alarm event is associated with a severe threatlevel, and in response to determining that the alarm event is associatedwith a severe threat level, selecting a hologram that is representativeof a barking dog. In addition, the identified holographic projector maybe associated with a speaker.

In these, or other implementations, the operations may further comprisetransmitting one or more instructions to at least two of the identifiedholographic projectors to display the particular hologram.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a contextual diagram showing features of an example of asecurity monitoring system employed in a property that has beenaugmented using virtual reality components and holographic projectors.

FIG. 2 is an example of a user interface that may be provided via thedisplay of a virtual realty headset.

FIG. 3 is an example of a user interface that may be provided on thedisplay of a virtual reality headset.

FIG. 4 is a block diagram of an example of a security monitoring systemthat may utilize virtual reality components and holograms.

FIG. 5 is a flowchart of an example of a process for using a virtualreality headset to investigate an alarm event that was detected by thesecurity monitoring system.

FIG. 6 is a flowchart of an example of a process for receiving alarmevent notifications via a virtual reality headset from the securitymonitoring system.

FIG. 7. is a flowchart of an example of a process for using a virtualreality headset to interact with aspects of a property that is monitoredby the security monitoring system.

FIG. 8 is a flowchart of an example of a process for using a hologram asa component of the security monitoring system.

FIG. 9 is a contextual diagram of an example of a remote userinteracting with the security monitoring system using a virtual realityheadset.

FIG. 10 is a flowchart of a process that facilitates remote userinteraction with a security monitoring system utilizing a virtualreality headset.

FIG. 11 is a contextual diagram of an example of a user interacting withthe security monitoring system using a virtual reality headset toinvestigate a loud noise in the middle of the night.

DETAILED DESCRIPTION

According to at least one aspect of the subject matter disclosed by thisspecification, a method, system, and a computer program are disclosedthat may provide for security, monitoring, and surveillance of aproperty using virtual reality components and/or holograms.

In one aspect, a user may utilize one or more virtual reality componentsin order to investigate a detected alarm event. The alarm event may bedetected by one, or multiple, sensors that may be strategically placedthroughout a property. The virtual reality components may include, forexample, a virtual reality headset that is configured to receive datafrom, and send data to, one or more components of a security monitoringsystem. For instance, the virtual reality headset may be configured toreceive streaming video from one or more cameras associated with aproperty. The virtual reality headset may allow a user to explore aproperty in order to investigate an alarm event from the safety of alocked room that may be within the property itself, or remote from theproperty. In some instances, an interactive model of the property may beprovided to the user via the virtual reality headset. The model may begenerated from one, or multiple, cameras that may be configured tocapture images of the property.

In addition, or alternatively, other aspects may utilize one or moreprojectors to display images and/or holograms in response to an alarmevent in order to deter a menacing intruder from further encroachmentinto a property. For instance, the security monitoring system mayinstruct one or more projectors to project a 2-dimensional image onto asurface such as a wall of the property. Alternatively, or in addition,the security monitoring system may instruct one or more projectors toproject a hologram into a nearby space that appears to bethree-dimensional to a viewer. Each projector may be capable ofdisplaying multiple different types of holograms. In someimplementations, a projector may be configured to project a particularhologram that is selected from multiple candidate holograms based on adetected alarm event.

FIG. 1 is a contextual diagram showing features of an example of asecurity monitoring system 100 employed in a property 101 that has beenaugmented using virtual reality components and holographic projectors.

The security monitoring system 100 employed by property 101 may include,for example, central monitor control unit 102, multiple sensors 104 a,104 b, 104 c, 104 d, 104 e, 104 f, 104 g, multiple cameras 106 a, 106 b,106 c, 106 d, 106 e, 106 f, multiple holographic projectors 108 a, 108b, 108 c, multiple robotic devices 110 a, 110 b, 110 c, 110 d, 110 e,110 f, 110 g, multiple robotic device charging stations 112 a, 112 b,112 c, a mobile device 152 and/or a virtual reality headset 154.Features of security monitoring system 100 may be described within thecontext of a property invasion being attempted by multiple burglars 140a, 140 b, 140 c, 140 d.

The security monitoring system 100 may facilitate networkedcommunication between each component of security monitoring system 100including, for example, the central monitor control unit 102, sensors104 a, 104 b, . . . 104 g, cameras 106 a, 106 b, . . . 106 f,holographic projectors 108 a, 108 b, 108 c, robotic devices 110 a, 110b, . . . 110 g, robotic device charging stations 112 a, 112 b, 112 c,mobile device 152, and/or the virtual reality headset 154 via network111. The network 111 may include, for example, any type of wired orwireless network that facilitates communication between the componentsof the security monitoring system 100 including a local area network, awide area network, or multiple networks working together including, butnot limited to, the Internet.

One or more the components of security monitoring system 100 may includea data capture device. Such components may transmit the captured datavia one or more data feeds to the central monitor control unit 102 vianetwork 111. The data feeds may be transmitted continuously,periodically, and/or upon request. The data feed may include one or morediscrete pieces of data collected by a data capture device such as, forexample, a single digital photograph. Alternatively, or in addition, thedata feed may include a consistent stream of data that is beingcaptured, and relayed to central monitor control unit 102, in real timesuch as, for example, a live video feed. Alternatively, or in addition,the data feed may include real-time readings from one or more sensors.

In one implementation, the central monitor control unit 102 may providean instruction to one or more components of security monitoring system100 instructing the one or more components to direct the one or morecomponent's data feed to another component of security monitoring system100. For instance, the central monitor control unit 102 may transmit aninstruction to a camera 106 a that instructs camera 106 a to transmit alive video feed to the user's 150 virtual reality headset 154.Alternatively, or in addition, the user 150 may make a direct request tocamera 106 a to provide a live video feed to the user's 150 virtualreality headset 154.

The components of security monitoring system 100 that may include one ormore data capture devices are sensors 104 a, 104 b, . . . 104 g, cameras106 a, 106 b, . . . 106 f, robotic devices 110 a, 110 b, . . . 110 g,and/or the like. For instance, the sensors 104 a, 104, . . . 104 f maybe configured to capture data related to aspects of the property 101 inthe vicinity of the sensor such as, for example, data indicative ofmovement on a staircase, data indicative of the force applied to awindow, data indicative of a temperature, data indicative of thepresence of water, and/or the like. Separately, cameras 106 a, 106 b, .. . 106 f may capture, and transmit, real time video feeds and/ordigital photographs. Alternatively, or in addition, cameras 106 a, 106b, 106 f may also be associated with a microphone that may capture anyaudible noises that may be detected in the vicinity of the microphone.Cameras and/or microphones may also be mounted on a robotic device suchas, for example, robotic device 110 a, 110 b, . . . 110 g. Camera and/ormicrophone equipped robotic devices such as, for example, robotic device110 a that is coupled to a camera 117 a may also capture video and/oraudio that may be transmitted to central monitor control unit 102 vianetwork 111, or another component of security monitoring system 100, asa real time data feed. The central monitor control unit 102 may analyzethe received feeds, store the received feeds, transmit the feeds to asystem operator, transmit the feeds to local law enforcement, transmitthe feeds to a lawful property occupant's 150 mobile device 152,transmit the feeds to a lawful property occupant's 150 virtual realityheadset 154, or the like. Alternatively, or in addition, one or more ofaforementioned data feeds, and/or other data feeds, may be transmitteddirectly to the lawful property occupant's 150 virtual reality headset154 via network 111 without being first transmitted through the centralmonitor control unit 102. For instance, upon the detection of an alarmevent, the central monitor control unit 102 may instruct one or morecameras 106 a, 106 b, . . . 106 f to transmit a live video feed to thedisplay of a user's virtual reality headset 154.

Based on the analysis of the received feeds, or in response to a requestfrom a user 150, the central monitor control unit 102 may transmit aninstruction to one or more holographic projectors 108 a, 108 b, 108 c.The instruction may instruct one or more of the holographic projectors108 a, 108 b, 108 c to display a hologram such as holograms 109 a, 109b, 109 c, respectively. Alternatively, or in addition, central monitorcontrol unit 102 may also deploy one or more robotic devices 110 a, 110b, . . . 110 g based on the analysis of the received data feeds.

The central monitor control unit 102 may be configured to receivenotifications of alarm events from each sensor 104 a, 104 b, . . . 104 fthat is installed on the inside, or on the outside, of a particularproperty 101. Sensors 104 a, 104 b, . . . 104 f may include any type ofsensor or detector that may monitor a property to identify an alarmevent. For instance, sensors 104 a, 104 b, . . . 104 f may include, forexample, a contact sensor, a motion sensor, a glass break sensor, or anyother sensors that may be configured to detect a potential propertyinvasion by an intruder such as, for example, burglar 140 a, 104 b, 140c, 140 d. However, sensors 104 a, 104 b, 104 f may also includeenvironmental sensors, health sensors, or the like. The sensors 104 a,104 b, . . . 104 f may broadcast notifications of potential alarm eventsthat may be received by central monitor control unit 102 using a networkconnection 111. The central monitor control unit 102 may instruct one ormore holographic projectors 108 a, 108 b, 108 c to display a hologrambased on the received alarm event notification. In some implementations,the central monitor control unit 102 may select a particular holographicprojector to display a particular hologram based on proximity of theholographic projector to the location associated with a detected alarmevent. However, other factors may be considered by central monitorcontrol unit 102 in determining the particular holographic projectorthat should be used to display a particular hologram.

The holographic projectors such as holographic projectors 108 b, 108 cmay be stationary units that may be placed in particular locations of aproperty. For example, one or more holographic projectors such as, forexample holographic projector 108 b may be placed in Room A of aproperty 101 and another holographic projector 108 c may be placed inRoom D of property 101. Placement of one or more holographic projectors108 b, 108 c may be strategic. For example, holographic projectors maybe placed in particular locations of property 101 that may deter aburglar 140 a from entering the property 101. Such particular locationsmay include, for example, inside portions of property 101 that may beseen from outside areas surrounding the property 101. For instance, oneor more holographic projectors may be placed near windows, doors, or thelike in a manner that allows the holograms projected by one or more ofthe holographic projectors to be seen from outside the property 101.

Alternatively, or in addition, such locations may include, for example,points within a property 101 that may be associated with a transitionfrom a first room to another room. For instance, a holographic projector108 c may be positioned in Room D at the top of a set of stairs, aroundthe corner of an intersection of two or more hallways, or the like. Theplacement of a holographic projector in areas of transition within aproperty 101 may provide the illusion that a first room of a propertysuch as, for example, Room D is occupied, even though another room ofthe property such as, for example, Room A is unoccupied. The purpose ofsuch an illusion may be to try to frighten away an intruder such as, forexample, burglar 140 d that has already entered into the property. Sucha burglar 140 d present on the staircase may be frightened, and decideto flee the property 101 if the burglar 140 d thinks that Room D isoccupied by a property 101 owner, a property 101 occupant, a pet of theproperty 101 owner/occupant, or the like.

The holographic projectors 108 b, 108 c are generally depicted in FIG. 1as being stationary. However, the subject matter of this specificationneed not be so limited. In one implementation, it is considered that theholographic projectors may not be stationary. For instance, aholographic projector 108 a may be coupled to a robotic device that ismobile. The mobile robotic device may include one or more wheels. Suchmobile holographic projectors may be remotely deployed and controlled bycentral monitor control unit 102, mobile device 152, and/or userinteraction with a virtual reality model of one or more aspects ofproperty 101 that is viewed via a virtual reality headset 154. One ormore mobile holographic projectors may help to produce the illusion thatan occupant of the property 101 is present by, for example, moving adisplayed hologram throughout the property from one room to anotherroom. Such movement may be dynamically control by the central monitorcontrol unit 102, user 150 using a mobile device 152, and/or userinteraction with a virtual reality model using a virtual reality headset154.

FIG. 1 provides an example where each of the holographic projectors 108a, 108 b, 108 c are a single unit projector, and positioned at, or near,the floor of their corresponding rooms. However, the present disclosureneed not be so limited. Instead, each holographic projector 108 a, 108b, 108 c may be comprised of one or multiple projectors. Alternatively,or in addition, holographic projectors 108 a, 108 b, 108 c may bemounted on any surface including, for example, the floor, ceiling,and/or walls. In some implementations, multiple holographic projectorsmay be required to generate any one particular two-dimensional image orthree-dimensional hologram.

Each holographic projector may be configured to display one or moreholograms such as, for example, hologram 109 a, hologram 109 b, and/orhologram 109 c. The holograms 109 a, 109 b, 109 c may be representativeof any three-dimensional object such as, for example, a person, ananimal, or the like. The three-dimensional object may be associated witha high definition, or greater (e.g., 4K UHD), resolution that providesthe appearance of a life-like object. In some instances, thethree-dimensional object may be a custom, holographic representationthat looks substantially similar to a particular person. For instance,one or more holographic projectors utilized by the security monitoringsystem 100 may be configured to display a hologram into the air of anopen space of property 101 that looks like the user 150, who may be alegal occupant of the property 101. Alternatively, or in addition, aholographic projector may display a hologram 109 c in the air of an openspace of property 101 that looks like an animal such as, for example, avicious, barking dog 109 c. Other types of holograms depicting any otherknown object may also be displayed by a holographic projector utilizedby security monitoring system 100. The type of hologram that isprojected may be determined, for example, based on the severity of adetected alarm event.

Alternatively, or in addition, one or more of the holographic projectorsmay display a two-dimensional image. For instance, one or moreholographic projectors may project a two-dimensional image of any knownobject onto a surface associated with property 101. The two-dimensionalimage may be, for example, a high definition, or greater (e.g., 4K UHD),resolution image that provides the substantially life-like image of anobject such as a person, an animal, or the like. In some instances, thetwo-dimensional object may be a custom image that looks substantiallysimilar to a particular person. For instance, one or more holographicprojectors utilized by the security monitoring system 100 may beconfigured to display an image onto a surface associated with a property101 that looks like user 150, who may be a legal occupant of theproperty 101. Alternatively, or in addition, a holographic projector maydisplay an image onto a surface associated with a property 101 that maylook like an animal such as, for example, a vicious, barking dog. Othertypes of images depicting any other known object may also be displayedby a holographic projector utilized by security monitoring system 100.

The robotic devices 110 a, 110 b, . . . 110 g of security monitoringsystem 100 are depicted as flying devices such as, quad-copters.However, other types of robotic devices may be used with securitymonitoring system 100. For instance, rolling helicopter type roboticdevices, and land based robotic devices may also be used. The roboticdevices 110 a, 110 b, 110 g may be equipped with a variety of differenttools to assist with security management and surveillance of aparticular property. Such tools may vary in scope and may serve one orpurposes such as, for example, deterring a burglar 140 a, 140 b, 140 c,140 d from following through with an attempted home invasion. Forinstance, a robotic device such as, for example, robotic device 110 bmay be equipped with a holographic projector 114 b. The holographicprojector 114 b may be configured to display a two-dimensional image ora three-dimensional hologram in the same manner as described withrespect to holographic projectors 108 a, 108 b, 108 c. For example, theholographic projector 114 b may display a hologram of a person 109 d.Robotic devices equipped with a holographic projector such as, forexample, robotic device 110 b, provide flexibility in the placement ofthe display of a two-dimensional image or three-dimensional hologram.For example, robotic devices coupled with a holographic projector 114 ballow a central monitor control unit 102, or a user 150, to dynamicallyconfigure placement of two-dimensional images and/or three dimensionalholograms in real-time during a home invasion, or an attempted homeinvasion, in an effort to prevent, interrupt, or deter an attempted homeinvasion by one or more burglars 140 a, 140 b, 140 c, 140 d. Suchdynamic configuration of two-dimensional images and/or three dimensionalholograms may be based on data that was received as part of one or morealarm event notifications.

In some aspects, central monitor control unit 102 may storepredetermined configurations of holograms. A predetermined configurationof holograms may provide for a particular arrangement of holographicprojectors 108 a, 108 b, 108 c, 114 b. In some instance, a predeterminedconfiguration may include data that identifies a particular subset ofholographic projectors from a set of available holographic projectors108 a, 108 b, 108 c, 114 b. Alternatively, or in addition, apredetermined configuration may include one or more navigation paths tobe executed by one or more robotic devices that are coupled to aholographic projector. The particular navigation path may be anavigation path that is followed by a robotic device as the roboticdevice travels to a particular location associated with a detected alarmevent. Alternatively, or in addition, the particular navigation path mayalso be a navigation path that is followed by a robotic device after therobotic device reaches a portion of the property 101 that is associatedwith an alarm event. For instance, a navigation path may include adisplayed hologram 109 a moving back and forth in view of a window 105a. A predetermined configuration may also include a particular order ofdisplay of one or more holograms 109 a, 109 b, 109 c, 109 d.Alternatively, or in addition, a predetermined configuration may alsoinclude a particular image or hologram, or sequence of images orholograms, to be displayed by one or more particular holographicprojectors. Alternatively, or in addition, a predetermined configurationmay also include one or more sounds that should be played back by anoutput speaker associated with a holographic projector. For example, ahologram of a vicious, barking dog 109 c may also be accompanied bysounds 113 c of a dog barking using a speaker that is associated withthe holographic projector 108 c, regardless of whether the speaker isactually coupled to the holographic projector 108 c. For instance, thespeaker may be connected to the holographic projector 108 c usingBluetooth. Alternatively, the security monitoring system 100 may utilizea home's surround sound speakers to output sounds 113 c.

A predetermined configuration may be associated with a particular threatlevel. For instance, a first particular predetermined configuration maybe associated with a low threat level. Such a particular predeterminedconfiguration may be designed to deter a burglar 140 a from attemptingto enter a property 101. For example, a predetermined configurationassociated with a low threat level may include activating one or moreholographic projectors to project one or more holograms of one or morepeople moving around inside the property 101. Alternatively, or inaddition, such a predetermined configuration for a low threat level mayinclude synchronizing the lights with the one or more holograms so thatlights turn on when a hologram enters a room, and subsequently turn offwhen the user leaves the room.

Alternatively, a second particular predetermined configuration may be,for example, associated with a high threat level. Such particularconfiguration may be designed to frighten away a particular burglar 140d who has entered the property 101. For example, a predeterminedconfiguration associated with a high threat level may include activatingone or more holographic projectors to display a vicious, barking dog.Alternatively, or in addition, a predetermined configuration associatedwith a high threat level may include projecting a hologram of the user150 with a gun. One or more of the aforementioned holograms may have theeffect of frightening away a burglar 140 d who has already entered theproperty 101.

The charging stations 112 a, 112 b, 112 c may each provide a platformfor recharging each of the robotic devices 110 a, 110 b, . . . 110 g.The charging stations 112 a, 112 b, 112 c may include contact-basedcharging systems, or wireless charging systems. The robotic devices 110a, 110 b, . . . 110 g may be configured to drive onto, land on, or flynear, the charging stations in order to recharge the battery that powerseach respective robotic device. Each robotic device 110 a, 110 b, . . .110 g may be assigned to a particular charging station 112 a, 112 b, 112c. Alternatively, or in addition, a security monitoring system 100 maynot utilize any predetermined charging station assignments. Forinstance, a charging station 110 b may communicate its occupancy statusto a central monitor control unit 102. Then, each of the robotic devices110 a, 110 b, . . . 110 g may communicate with the central monitorcontrol unit 102 to request a charging station when the robotic device'sbattery falls below a predetermined threshold. The central monitorcontrol unit 102 may command the robotic device to navigate to aparticular charging station based on consideration of at least thecharging station's occupancy status and location. In someimplementations, a particular robotic device 110 a, 110 b, . . . 110 gmay be able to directly communicate with a particular charging stationvia network 111 in order to determine the charging station's occupancystatus and/or location.

A user 150 may utilize a virtual reality headset 154 to observe aspectsof property 101. In one implementation, a user may receive a usernotification that an alarm event notification has been received by acentral monitor control unit 102. The user 150 may put on the virtualreality headset 154 in response to receiving the user notification. Theuser 150 or central monitor control unit 102 may select one or morevideo feeds to be displayed on the virtual reality headset's 154 userinterface from one or more cameras 106 a, 106 b, . . . 106 f and/orrobotic device cameras 117 a, 117 d, 117 f, 117 g. The virtual realityheadset 154 may allow the user to switch between the aforementionedfeeds. As result, a user 150 can use the virtual reality headset 154during a home invasion by one or more burglars 140 a, 140 b, 140 c, 140d to view one or more rooms of a property 101 in order to find a routeto safety that exits the property without running into a burglar 140 a,140 b, 140 c, 140 d.

The virtual reality headset 154 may be used to create an interactiveaugmented reality environment that allows a user to interact withcomponents of the security monitoring system 100 and/or the property102. The augmented reality environment may be created by generating amodel based on the integration of multiple image and/or video feedsobtained for a particular room of property 101. For example, anaugmented reality model for Room A or property 101 may be created bygenerating a model based on images and/or video feeds obtained fromcamera 106 a, camera 106 b, camera 117 a, and camera 116. A user mayinteract with the augmented reality environment by, for example, movinga virtual table that corresponds to table 120 in order to see if thereis a burglar, or other intruder, hiding behind the table 120.

In another aspect, operation of one or more controls associated with auser's property 101 may become interactive via the augmented realitymodel. For example, a property's lighting system may be integrated intothe augmented reality model. In such a model, a user 150 may selectvirtual light switch that corresponds to light switch 118 in order toturn on light 119 in Room A. Alternatively, or in addition, a user 150may be able to interact with a virtual model of a sound system in orderto initiate playback of the user's surround sound system in Room A. Byinteracting with the augmented reality environment, a user 150 may beable to create the appearance that property 101 is occupied, andtherefore deter a potential burglar 140 a from following through on ahome invasion into property 101.

In another aspect, a user may interact with the augmented realityenvironment to create one or more predetermined configurations ofholograms. For example, while wearing the virtual reality headset 154,and viewing an augmented reality model of property 101, the user 150 mayidentify a particular place where the user 150 wants a particularhologram to be displayed. In response to the user's request submittedthrough the augmented reality environment, one or more holographicprojectors 108 a, 108 b, 108 c may adjust the direction of theirrespective projectors in order to display the hologram in the particularlocation identified by the user 150 in the augmented reality model.

Components of the security monitoring system 100 may work together inresponse to a home invasion by one or more burglars 140 a, 140 b, 140 c,140 d as illustrated with respect to Room A of property 101. Forinstance, sensor 104 a may detect that a burglar 140 a has attempted tobreak-in to the property 101 via a window 105 a. In response to theburglar's 140 a jostling of the window 105 a, the sensor 104 a maybroadcast a notification of an alarm event via network 111. The centralmonitor control unit 102 may receive the broadcasted alarm eventnotification, and instruct a holographic projector such as, for example,mobile holographic projector 108 a to display a three dimensionalhologram. The mobile holographic projector 108 a may realisticallyintroduce the hologram 109 a in a manner that appears organic. Forinstance, the hologram 109 a that is being projected by the mobileholographic projector 108 a may be used to provide the appearance thatthe hologram 109 a walked into the Room A from another Room B.

Alternatively, or in addition, the security monitoring system 100 may beconfigured to synchronize the lighting system of Room A with one or moreholographic projectors such as, for example, mobile holographicprojector 108 a such that the light 119 turns on when the hologram 109 a(or mobile holographic projector 108 a) enters Room A. The entrance ofhologram 108 a into Room A and the turning on of light 119 may providethe illusion that property 101 is occupied, and therefore deter burglar140 a from entering the property. Such organic introduction of hologram109 a may be beneficial when an alarm event detects the presence of aburglar 140 a at a window 105 a.

Alternatively, or in addition, the central monitor control unit 102 mayalso dispatch one or more robotic devices 110 a, 110 b to the locationof the property 101 that is associated with the alarm event. Forinstance, a robotic device 110 a may be dispatched in order to provideanother camera 117 a that can be used to investigate aspects of Room Athat are outside of the line of sight of camera 106 a, 106 b.Alternatively, or in addition, for example, a robotic device 110 b maybe provided in order to introduce another hologram 109 d into Room A inan effort to provide a greater sense of occupancy. The robotic device110 b may realistically introduce the hologram 109 d into Room A in amanner that seems organic. For instance, hologram 109 d can be displayedin a manner that shows the hologram 109 d walking into Room A from RoomB.

Alternatively, there may exists certain scenarios where an organicintroduction of holograms 109 a, 109 b is not necessary. For instance,property 101 may have one or more sensors 104 f that are scatteredaround the perimeter of the property 101. The sensor 104 f may be amotion sensor, weight sensor, or the like that detects the presence ofan object such as, for example, burglars 140 b, 140 c. In response tothe detection of one or more objects by sensors 104 f, the sensor maybroadcast an alarm event notification that is detected by centralmonitor control unit 102. In response to the alarm event notification,the central monitor control unit 102 may instruct one or moreholographic projectors 108 a, 108 b, 114 b to display one or moreholograms 109 a, 109 b, 109 d, respectively. Since burglars 140 b, 140 care outside the property in the driveway, holograms 109 a, 109 b, 109 dneed not be displayed organically. In some implementations, suchinorganic display of holograms may also be utilized as part of atime-based security system. For instance, central monitor control unit102 may be programmed to instruct one or more holographic projectors todisplay holograms 109 a, 109 b, 109 d on a set time schedule such as,for example, every night at 7:30 pm EST, weekdays after dark, or thelike.

Holograms 109 a, 109 b, 109 d depicted in FIG. 1 may be displayed inresponse to an intermediate level threat. The threat is determined to bean intermediate level threat because, for instance, the burglars 140 a,140 b, 140 c are still outside the property. As a result, centralmonitor control unit 102 may determine that humanoid holograms should bedisplayed to create the illusion that property 101 is occupied in aneffort to deter the burglars 140 a, 140 b, 140 c from entering theproperty 101. In one implementation, the humanoid holograms may bephoto-realistic representations of the user 150, who may be a lawfuloccupant of the property 101. The humanoid holograms displayed inresponse to an intermediate threat may show the user 150 performing dayto day tasks such as, for example, watching TV, reading a book, talkingon a mobile phone, or the like. However, the central monitor controlunit 102 may instruct a holographic projector to display differentholograms based on the detection of a more severe threat.

For instance, a burglar 140 d may have entered into the property 101,and begun to further invade the property 101 by running up the stairsconnecting Room A to Room D. A sensor 104 b may detect motion, weight,or the like that is indicative of the presence of burglar 140 d. Inresponse to the detection of burglar 140 d by sensor 104 b, the sensor104 b may broadcast an alarm event notification that is detected bycentral monitor control unit 102. In response to the alarm eventnotification, the central monitor control unit 102 may instruct one ormore holographic projectors such as holographic projector 108 c todisplay a hologram 109 c. In this instance, since burglar 140 b isdetected as being inside property 101, central monitor control unit 102has determined to employ a more aggressive hologram 109 c that takes theform a vicious, barking dog. The holographic projector 108 c may useassociated speakers to output audio signals 113 c that mimic the soundof a dog barking. The visual and audio appearance of the vicious,barking dog hologram 109 c may frighten away burglar 140 d.

Though a vicious, barking dog hologram 109 c is used in this example,other types of holograms may be displayed in response to threats thatthe central monitor control unit 102 perceives as severe. For instance,a holographic projector such as, holographic projector 108 c may beconfigured to display a hologram of a person with a shotgun, or othertype of weapon. The hologram of the person with the shotgun may, forexample, show the person using a pump action shotgun to chamber a round.In addition, the holographic projector's associated speaker may outputthe distinct sound of a round being chambered in a pump action shotgun.The combination of the hologram of a person with the shotgun, andassociated sounds, may frighten burglar 140 d, and convince the burglar140 d to flee property 101.

A user 150, who may be a lawful occupant of the property 101, may benotified by a central monitor control unit 102 when an alarm eventnotification is detected. The user 150 may receive the notification fromthe central monitor control unit 102 via the user's mobile device 152.The user's mobile device 152 may include, for example, a mobile phone,smart phone, tablet, smart watch, laptop, or the like. Alternatively, orin addition, the user 150 may be notified of an alarm event by one ormore visual or audio messages transmitted through property 101 such as,for example, flashing lights, sirens, audio messages warning of anintruder, or the like. Facing potentially dangerous circumstances, theuser 150 may run to a room in the property 101 that is safe such as, forexample, Room C. Once in Room C, the user 150 may put on virtual realityheadset 154.

Virtual reality headset 154 may allow a user 150 to investigate eachalarm event detected by the central monitor control unit 102 and/or oneor more sensors 104 a, 104 b, . . . 104 g. For example, the virtualreality headset 154 may be configured to receive one or more video feedsfrom one or more cameras associated with property 101. The video feedsmay come from a stationary camera such as, for example, 106 a, 106 b, .. . 106 f Alternatively, or in addition, the video feeds may come fromcameras coupled to one or more robotic devices 110 a, 110 f.Alternatively, or in addition, the video feeds may come from one or morecameras 116 that may be associated with one or more consumer electronicsdevices that are integrated with the security monitoring system 100 suchas, for example the laptop 115. To the extent there is one or moreaspects of property 101 that the user cannot see via one or moreavailable cameras, a user may deploy a robotic device such as roboticdevice 110 f that is equipped with a camera 117 f The user 150 maydirect the robotic device 110 f to the blind spot via the virtualreality environment created via the virtual reality headset 154.Accordingly, the user 150 can use the virtual reality environmentprovided by the virtual reality headset 154 to investigate each aspectof the property during a home invasion.

The user 150 may utilize the virtual reality headset 154 to plan a routeto safety. For instance, the user can switch between camera feeds anddetermine that there are burglars 140 b, 140 c at the front door, aburglar 140 a in the window 105 a in Room A, and a burglar coming up thestairs to Room D. However, user 150 may view the video feeds from camera106 f, camera 106 d, and camera 106 e to determine that there is a pathto safety that exists down the steps from Room D to Room B, and out theback door. Alternatively, or in addition, the user 150 may use thevirtual reality headset 154 and/or a mobile device 152 to instruct arobotic device 110 g with a camera 117 g to traverse the path to safety,and provide the video feed to the virtual reality headset 154 vianetwork 111, to ensure there are no burglars on the proposed path. Theuser 150 may use the virtual reality headset 154 and/or the mobiledevice 152 to activate holographic projector 108 c to provide a displayof a vicious, barking dog hologram 109 c. The vicious, barking doghologram 109 c may frighten away, or at least startle, the burglar 140d, and allow the user 150 to run down the back stairs, and out the backdoor to safety. Video streams from one or more cameras may be fed to thevirtual reality headset 154 and/or the user's mobile device 152 as theuser exits the property 101.

FIG. 2 is an example of a user interface 200 that may be provided viathe display of a virtual realty headset 154.

The display of the virtual reality headset 154 may be configured toprovide a live video feed from one or more cameras 106 a, 106 b, . . .106 f associated with the security monitoring system 100. In the exampleof FIG. 2, the live video feed 210 of Room A is being streamed to theuser interface 200 of the virtual reality headset 154 display.Alternatively, or in addition, the virtual reality headset 154 userinterface may provide an alarm event management center 220.

The alarm event management center 220 may include an alarm eventnotifications section 222, a no alarm event detected section 224, and acameras section 226. The alarm event notifications section 222 mayprovide one or more graphical icons 222 a, 222 b, 222 c that are eachassociated an active alarm event that has been detected by centralmonitor control unit 102. An alarm event may be detected by the centralmonitor control unit 102 receiving an alarm event notification from oneor more sensors associated with the security monitoring system 100. Eachgraphical icon 222 a, 222 b, 222 c provided in the alarm eventnotifications section may be associated with an indication of theseverity of the alarm event that is associated with the graphical icon222 a, 222 b, 222 c. For instance, the graphical icons 222 a and 222 cthat correspond to the alarm events in Room A and the Driveway,respectively, are indicated as being intermediate. The alarm events thatare associated with Room A and the Driveway may be categorized asintermediate because, for example, the alarm events are based on datafrom sensors 104 a, 104 f that indicate that the burglars 140 a, 140 b,140 c have not yet entered into property 101.

As another example, the graphical icon 222 b that corresponds to thealarm event on the Stairs is indicated as severe. The alarm event thatis associated with the Staircase 222 b may be categorized as severebecause, for example, the alarm event is based on data from sensor 104 bthat indicates that the burglar 140 d is inside the property 101. Theseverity of an alarm event may be indicated with text words thatinclude, for example, negligible, intermediate, severe, or the like.Alternatively, or in addition, the severity of an alarm event may beindicated with the use of colors. For example, a negligible alarm eventmay be displayed in green text, an intermediate alarm event may bedisplayed in yellow text, a severe alarm may be displayed in red text,or the like. The negligible alarm event indicator may indicate a lowlevel of threat that is associated with the alarm event. Theintermediate alarm event indicator may indicate a moderate level ofthreat that is associated with the alarm event. The severe alarm eventindicator may indicate a high level of threat that is associated withthe alarm event.

Each of the graphical icons 222 a, 222 b, 222 c associated with an alarmevent may be interactive. For instance, a user may select one or more ofthe graphical icons 222 a, 222 b, 222 c in order to switch to a livevideo feed from a camera that is associated with the alarm event thatcorresponds to the selected graphical icon. A user may select one ormore of the graphical icons 222 a, 222 b, 222 c by gazing at the icon.The virtual reality headset 154 may detect the user's gaze focused onthe graphical icon and receive it as a selection. Alternatively, or inaddition, the user may utter a voice command that instructs the virtualreality headset to select a particular graphical icon. For example, auser 150 may instruct the virtual reality headset to “display videoassociated with the alarm event in Room A,” or the like. The virtualreality headset may be equipped with one or more microphones and aspeech recognizer to process such instructions. Graphical iconsassociated with other aspects of alarm event management center 220 maybe selected in a similar manner.

In one implementation, for example, selection of a graphical icon 222 a,222 b, 222 c in the alarm events notifications 222 section may select adefault camera that is associated with the location of the alarm event.Live video from the default camera may then be streamed to the userinterface 200 of the virtual reality headset 154. If a camera thatcorresponds to the selected location is not available, then the centralmonitor control unit 102 may instruct a robotic device such as roboticdevice 110 a that is equipped with a camera to navigate to theidentified location and return a live video feed associated with thelocation to the user's 150 virtual reality headset 154 via network 111.

Alternatively, or in addition, the alarm event management center 220 mayinclude a no alarm event detected section 224. The no alarm eventdetected section 224 may provide one or more graphical icons 224 a, 224b, 224 c, 224 d that are each associated with a sensor that has notdetected an alarm event and/or has not transmitted an alarm eventnotification. Alternatively, or in addition, the graphical icons 224 a,224 b, 224 c, 224 d may be associated with a sensor that has transmittedan alarm event notification in the past but is no longer detecting thepresence of an object. Notifying the user 150 that the sensors have not,or are no longer, reporting an alarm event may help the user 150 plan anescape route from the property 101. A user 150 may select one or more ofthe graphical icons 224 a, 224 b, 224 c, 224 d in order to switch to alive video feed of a portion of property 101 that is associated with thesensor that corresponds to the selected graphical icon. In oneimplementation, for example, selection of a graphical icon 224 a, 224 b,224 c in the no alarm events detected section 224 may select a defaultcamera that is associated with the sensor that corresponds to theselected graphical icon. Live video from the default camera may then bestreamed to the user interface 200 of the virtual reality headset 154.If a camera that corresponds to the selected location is not available,then the central monitor control unit 102 may instruct a robotic devicesuch as robotic device 110 a that is equipped with a camera to navigateto the identified location and return a live video feed associated withthe location to the user's 150 virtual reality headset 154 via network111.

Alternatively, or in addition, the alarm event management center 220 mayinclude a cameras section 224. The cameras section 226 may provide oneor more graphical icons 226 a, 226 b, 226 c, 226 d, 226 e, 226 f, 226 g,226 h, 226 i, 226 j, 226 k that are each associated with a particularcamera that can be accessed to provide a live video feed to the user's150 virtual reality headset 154. The camera section 224 may includegraphical icons that are each associated a particular camera beingemployed by the security monitoring system 100 including for example,cameras 106 a, 106 b, . . . 106 f, robotic device cameras 117 a, 117 f,117 d, 117 g, and laptop camera 116. A user 150 may select one or moreof the graphical icons 226 a, 226 b, 226 c, 226 d, 226 e, 226 f, 226 g,226 h, 226 i, 226 j, 226 k in order to switch to a live video feed thatis associated with the camera that corresponds to the selected graphicalicon. The camera section 224 may thus allow user 150 to select aparticular video feed that corresponds to the specific camera that isselected. Live video from the selected camera may be streamed to theuser interface 200 of the virtual reality headset 154 in response to theselection of a particular graphical icon 226 a, 226 b, 226 c, 226 d, 226e, 226 f, 226 g, 226 h, 226 i, 226 j, 226 k.

FIG. 3 is an example of a user interface 300 that may be provided on thedisplay of a virtual reality headset 154.

The display of the virtual reality headset 154 may be configured as asplit-screen that provides two or more live video feeds from two or morecameras 106 a, 106 b, . . . 106 f associated with the securitymonitoring system 100. In the example of FIG. 3, different portions 310,320, 330, 340, 350 of the user interface 300 may each be associated witha different live video feed. Alternatively, or in addition, at least aportion 360 of the display may be used to provide an alarm eventmanagement center 370 that is the same, or substantially similar to, thealarm event management center 220 described with reference to FIG. 2.The split screen-arrangement of the user interface 300 may provide theuser with opportunity to investigate multiple locations of the property101 that are each associated with an alarm event at the same time.Real-time video feeds of multiple different portions of the property 101at the same time may assist a user 150 in planning an escape route tosafety using the virtual reality headset 150.

FIG. 4 is a block diagram of an example of a security monitoring system400 that may utilize virtual reality components and holograms.

A security system is augmented with virtual reality components. Avirtual reality headset allows a user to explore sensed attributes of aproperty in virtual environment such that the user may be guided throughan installation process and investigate an entirety of a home from anupstairs bedroom. In addition, hologram devices display holograms toenhance security by simulating human presence at a property in responseto sensed events.

FIG. 4 illustrates an example of an electronic system 400 configured toprovide surveillance and reporting. The electronic system 400 includes anetwork 405, a monitoring system control unit 410, one or more userdevices 440, 450, a monitoring application server 460, and a centralalarm station server 470. In some examples, the network 405 facilitatescommunications between the monitoring system control unit 410, the oneor more user devices 440, 450, the monitoring application server 460,and the central alarm station server 470.

The network 405 is configured to enable exchange of electroniccommunications between devices connected to the network 405. Forexample, the network 405 may be configured to enable exchange ofelectronic communications between the monitoring system control unit410, the one or more user devices 440, 450, the monitoring applicationserver 460, and the central alarm station server 470. The network 405may include, for example, one or more of the Internet, Wide AreaNetworks (WANs), Local Area Networks (LANs), analog or digital wired andwireless telephone networks (e.g., a public switched telephone network(PSTN), Integrated Services Digital Network (ISDN), a cellular network,and Digital Subscriber Line (DSL)), radio, television, cable, satellite,or any other delivery or tunneling mechanism for carrying data. Network405 may include multiple networks or subnetworks, each of which mayinclude, for example, a wired or wireless data pathway. The network 405may include a circuit-switched network, a packet-switched data network,or any other network able to carry electronic communications (e.g., dataor voice communications). For example, the network 405 may includenetworks based on the Internet protocol (IP), asynchronous transfer mode(ATM), the PSTN, packet-switched networks based on IP, X.25, or FrameRelay, or other comparable technologies and may support voice using, forexample, VoIP, or other comparable protocols used for voicecommunications. The network 405 may include one or more networks thatinclude wireless data channels and wireless voice channels. The network405 may be a wireless network, a broadband network, or a combination ofnetworks including a wireless network and a broadband network.

The monitoring system control unit 410 includes a controller 412 and anetwork module 414. The controller 412 is configured to control amonitoring system (e.g., a home alarm or security system) that includesthe monitoring system control unit 410. In some examples, the controller412 may include a processor or other control circuitry configured toexecute instructions of a program that controls operation of an alarmsystem. In these examples, the controller 412 may be configured toreceive input from sensors, detectors, or other devices included in thealarm system and control operations of devices included in the alarmsystem or other household devices (e.g., a thermostat, an appliance,lights, etc.). For example, the controller 412 may be configured tocontrol operation of the network module 414 included in the monitoringsystem control unit 410.

The network module 414 is a communication device configured to exchangecommunications over the network 405. The network module 414 may be awireless communication module configured to exchange wirelesscommunications over the network 405. For example, the network module 414may be a wireless communication device configured to exchangecommunications over a wireless data channel and a wireless voicechannel. In this example, the network module 414 may transmit alarm dataover a wireless data channel and establish a two-way voice communicationsession over a wireless voice channel. The wireless communication devicemay include one or more of a LTE module, a GSM module, a radio modem,cellular transmission module, or any type of module configured toexchange communications in one of the following formats: LTE, GSM orGPRS, CDMA, EDGE or EGPRS, EV-DO or EVDO, UMTS, or IP.

The network module 414 also may be a wired communication moduleconfigured to exchange communications over the network 405 using a wiredconnection. For instance, the network module 414 may be a modem, anetwork interface card, or another type of network interface device. Thenetwork module 414 may be an Ethernet network card configured to enablethe monitoring system control unit 410 to communicate over a local areanetwork and/or the Internet. The network module 414 also may be avoiceband modem configured to enable the alarm panel to communicate overthe telephone lines of Plain Old Telephone Systems (POTS).

The monitoring system that includes the monitoring system control unit410 includes one or more sensors or detectors. For example, themonitoring system may include multiple sensors 420. The sensors 420 mayinclude a contact sensor, a motion sensor, a glass break sensor, or anyother type of sensor included in an alarm system or security system. Thesensors 420 also may include an environmental sensor, such as atemperature sensor, a water sensor, a rain sensor, a wind sensor, alight sensor, a smoke detector, a carbon monoxide detector, an airquality sensor, etc. The sensors 420 further may include a healthmonitoring sensor, such as a prescription bottle sensor that monitorstaking of prescriptions, a blood pressure sensor, a blood sugar sensor,a bed mat configured to sense presence of liquid (e.g., bodily fluids)on the bed mat, etc. In some examples, the sensors 420 may include aradio-frequency identification (RFID) sensor that identifies aparticular article that includes a pre-assigned RFID tag.

The monitoring system control unit 410 communicates with the module 422and the camera 430 to perform surveillance or monitoring. The module 422is connected to one or more devices that enable home automation control.For instance, the module 422 may be connected to one or more lightingsystems and may be configured to control operation of the one or morelighting systems. Also, the module 422 may be connected to one or moreelectronic locks at the property and may be configured to controloperation of the one or more electronic locks (e.g., control Z-Wavelocks using wireless communications in the Z-Wave protocol. Further, themodule 422 may be connected to one or more appliances at the propertyand may be configured to control operation of the one or moreappliances. The module 422 may include multiple modules that are eachspecific to the type of device being controlled in an automated manner.The module 422 may control the one or more devices based on commandsreceived from the monitoring system control unit 410. For instance, themodule 422 may cause a lighting system to illuminate an area to providea better image of the area when captured by a camera 430.

The camera 430 may be a video/photographic camera or other type ofoptical sensing device configured to capture images. For instance, thecamera 430 may be configured to capture images of an area within abuilding monitored by the monitoring system control unit 410. The camera430 may be configured to capture single, static images of the area andalso video images of the area in which multiple images of the area arecaptured at a relatively high frequency (e.g., thirty images persecond). The camera 430 may be controlled based on commands receivedfrom the monitoring system control unit 410.

The camera 430 may be triggered by several different types oftechniques. For instance, a Passive Infra Red (PIR) motion sensor may bebuilt into the camera 430 and used to trigger the camera 430 to captureone or more images when motion is detected. The camera 430 also mayinclude a microwave motion sensor built into the camera and used totrigger the camera 430 to capture one or more images when motion isdetected. The camera 430 may have a “normally open” or “normally closed”digital input that can trigger capture of one or more images whenexternal sensors (e.g., the sensors 420, PIR, door/window, etc.) detectmotion or other events. In some implementations, the camera 430 receivesa command to capture an image when external devices detect motion oranother potential alarm event. The camera 430 may receive the commandfrom the controller 412 or directly from one of the sensors 420.

In some examples, the camera 430 triggers integrated or externalilluminators (e.g., Infra Red, Z-wave controlled “white” lights, lightscontrolled by the module 422, etc.) to improve image quality when thescene is dark. An integrated or separate light sensor may be used todetermine if illumination is desired and may result in increased imagequality.

The camera 430 may be programmed with any combination of time/dayschedules, system “arming state”, or other variables to determinewhether images should be captured or not when triggers occur. The camera430 may enter a low-power mode when not capturing images. In this case,the camera 430 may wake periodically to check for inbound messages fromthe controller 412. The camera 430 may be powered by internal,replaceable batteries if located remotely from the monitoring controlunit 410. The camera 430 may employ a small solar cell to recharge thebattery when light is available. Alternatively, the camera 430 may bepowered by the controller's 412 power supply if the camera 430 isco-located with the controller 412.

In some implementations, the camera 430 communicates directly with themonitoring application server 460 over the Internet. In theseimplementations, image data captured by the camera 430 does not passthrough the monitoring system control unit 410 and the camera 430receives commands related to operation from the monitoring applicationserver 460.

The system 400 also includes thermostat 434 to perform dynamicenvironmental control at the property. The thermostat 434 is configuredto monitor temperature and/or energy consumption of an HVAC systemassociated with the thermostat 434, and is further configured to providecontrol of environmental (e.g., temperature) settings. In someimplementations, the thermostat 434 can additionally or alternativelyreceive data relating to activity at a property and/or environmentaldata at a property, e.g., at various locations indoors and outdoors atthe property. The thermostat 434 can directly measure energy consumptionof the HVAC system associated with the thermostat, or can estimateenergy consumption of the HVAC system associated with the thermostat434, for example, based on detected usage of one or more components ofthe HVAC system associated with the thermostat 434. The thermostat 434can communicate temperature and/or energy monitoring information to orfrom the monitoring system control unit 410 and can control theenvironmental (e.g., temperature) settings based on commands receivedfrom the monitoring system control unit 410.

In some implementations, the thermostat 434 is a dynamicallyprogrammable thermostat and can be integrated with the monitoring systemcontrol unit 410. For example, the dynamically programmable thermostat434 can include the monitoring system control unit 410, e.g., as aninternal component to the dynamically programmable thermostat 434. Inaddition, the monitoring system control unit 410 can be a gateway devicethat communicates with the dynamically programmable thermostat 434.

A module 437 is connected to one or more components of an HVAC systemassociated with a property, and is configured to control operation ofthe one or more components of the HVAC system. In some implementations,the module 437 is also configured to monitor energy consumption of theHVAC system components, for example, by directly measuring the energyconsumption of the HVAC system components or by estimating the energyusage of the one or more HVAC system components based on detecting usageof components of the HVAC system. The module 437 can communicate energymonitoring information and the state of the HVAC system components tothe thermostat 434 and can control the one or more components of theHVAC system based on commands received from the thermostat 434.

In some examples, the system 400 further includes one or more roboticdevices. The robotic devices may be any type of robots that are capableof moving and taking actions that assist in security monitoring. Forexample, the robotic devices may include drones that are capable ofmoving throughout a property based on automated control technologyand/or user input control provided by a user. In this example, thedrones may be able to fly, roll, walk, or otherwise move about theproperty. The drones may include helicopter type devices (e.g., quadcopters), rolling helicopter type devices (e.g., roller copter devicesthat can fly and also roll along the ground, walls, or ceiling) and landvehicle type devices (e.g., automated cars that drive around aproperty). In some cases, the robotic devices may be robotic devicesthat are intended for other purposes and merely associated with themonitoring system 400 for use in appropriate circumstances. Forinstance, a robotic vacuum cleaner device may be associated with themonitoring system 400 as one of the robotic devices and may becontrolled to take action responsive to monitoring system events.

In some examples, the robotic devices automatically navigate within aproperty. In these examples, the robotic devices include sensors andcontrol processors that guide movement of the robotic devices within theproperty. For instance, the robotic devices may navigate within theproperty using one or more cameras, one or more proximity sensors, oneor more gyroscopes, one or more accelerometers, one or moremagnetometers, a global positioning system (GPS) unit, an altimeter, oneor more sonar or laser sensors, and/or any other types of sensors thataid in navigation about a space. The robotic devices may include controlprocessors that process output from the various sensors and control therobotic devices to move along a path that reaches the desireddestination and avoids obstacles. In this regard, the control processorsdetect walls or other obstacles in the property and guide movement ofthe robotic devices in a manner that avoids the walls and otherobstacles.

In addition, the robotic devices may store data that describesattributes of the property. For instance, the robotic devices may storea floorplan and/or a three-dimensional model of the property thatenables the robotic devices to navigate the property. During initialconfiguration, the robotic devices may receive the data describingattributes of the property, determine a frame of reference to the data(e.g., a home or reference location in the property), and navigate theproperty based on the frame of reference and the data describingattributes of the property. Further, initial configuration of therobotic devices also may include learning of one or more navigationpatterns in which a user provides input to control the robotic devicesto perform a specific navigation action (e.g., fly to an upstairsbedroom and spin around while capturing video and then return to a homecharging base). In this regard, the robotic devices may learn and storethe navigation patterns such that the robotic devices may automaticallyrepeat the specific navigation actions upon a later request.

In some examples, the robotic devices may include data capture andrecording devices. In these examples, the robotic devices may includeone or more cameras, one or more motion sensors, one or moremicrophones, one or more biometric data collection tools, one or moretemperature sensors, one or more humidity sensors, one or more air flowsensors, and/or any other types of sensors that may be useful incapturing monitoring data related to the property and users in theproperty. The one or more biometric data collection tools may beconfigured to collect biometric samples of a person in the home with orwithout contact of the person. For instance, the biometric datacollection tools may include a fingerprint scanner, a hair samplecollection tool, a skin cell collection tool, and/or any other tool thatallows the robotic devices to take and store a biometric sample that canbe used to identify the person (e.g., a biometric sample with DNA thatcan be used for DNA testing).

In some implementations, the robotic devices may include output devices.In these implementations, the robotic devices may include one or moredisplays, one or more speakers, one or more projectors, and/or any typeof output devices that allow the robotic devices to communicateinformation to a nearby user. The one or more projectors may includeprojectors that project a two-dimensional image onto a surface (e.g.,wall, floor, or ceiling) and/or holographic projectors that projectthree-dimensional holograms into a nearby space.

The robotic devices also may include a communication module that enablesthe robotic devices to communicate with the monitoring system controlunit 410, each other, and/or other devices. The communication module maybe a wireless communication module that allows the robotic devices tocommunicate wirelessly. For instance, the communication module may be aWi-Fi module that enables the robotic devices to communicate over alocal wireless network at the property. The communication module furthermay be a 900 MHz wireless communication module that enables the roboticdevices to communicate directly with the monitoring system control unit410. Other types of short-range wireless communication protocols, suchas Bluetooth, Bluetooth LE, Zwave, Zigbee, etc., may be used to allowthe robotic devices to communicate with other devices in the property.

The robotic devices further may include processor and storagecapabilities. The robotic devices may include any suitable processingdevices that enable the robotic devices to operate applications andperform the actions described throughout this disclosure. In addition,the robotic devices may include solid state electronic storage thatenables the robotic devices to store applications, configuration data,collected sensor data, and/or any other type of information available tothe robotic devices.

The robotic devices are associated with one or more charging stations.The charging stations may be located at predefined home base orreference locations in the property. The robotic devices may beconfigured to navigate to the charging stations after completion oftasks needed to be performed for the monitoring system 400. Forinstance, after completion of a monitoring operation or upon instructionby the monitoring system control unit 410, the robotic devices may beconfigured to automatically fly to and land on one of the chargingstations. In this regard, the robotic devices may automatically maintaina fully charged battery in a state in which the robotic devices areready for use by the monitoring system 400.

The charging stations may be contact based charging stations and/orwireless charging stations. For contact based charging stations, therobotic devices may have readily accessible points of contact that therobotic devices are capable of positioning and mating with acorresponding contact on the charging station. For instance, ahelicopter type robotic device may have an electronic contact on aportion of its landing gear that rests on and mates with an electronicpad of a charging station when the helicopter type robotic device landson the charging station. The electronic contact on the robotic devicemay include a cover that opens to expose the electronic contact when therobotic device is charging and closes to cover and insulate theelectronic contact when the robotic device is in operation.

For wireless charging stations, the robotic devices may charge through awireless exchange of power. In these cases, the robotic devices needonly locate themselves closely enough to the wireless charging stationsfor the wireless exchange of power to occur. In this regard, thepositioning needed to land at a predefined home base or referencelocation in the property may be less precise than with a contact basedcharging station. Based on the robotic devices landing at a wirelesscharging station, the wireless charging station outputs a wirelesssignal that the robotic devices receive and convert to a power signalthat charges a battery maintained on the robotic devices.

In some implementations, each of the robotic devices has a correspondingand assigned charging station such that the number of robotic devicesequals the number of charging stations. In these implementations, therobotic devices always navigate to the specific charging stationassigned to that robotic device. For instance, the robotic device mayalways use changing station and the robotic device may always usechanging station.

In some examples, the robotic devices may share charging stations. Forinstance, the robotic devices may use one or more community chargingstations that are capable of charging multiple robotic devices. Thecommunity charging station may be configured to charge multiple roboticdevices in parallel. The community charging station may be configured tocharge multiple robotic devices in serial such that the multiple roboticdevices take turns charging and, when fully charged, return to apredefined home base or reference location in the property that is notassociated with a charger. The number of community charging stations maybe less than the number of robotic devices.

Also, the charging stations may not be assigned to specific roboticdevices and may be capable of charging any of the robotic devices. Inthis regard, the robotic devices may use any suitable, unoccupiedcharging station when not in use. For instance, when one of the roboticdevices has completed an operation or is in need of battery charge, themonitoring system control unit 410 references a stored table of theoccupancy status of each charging station and instructs the roboticdevice to navigate to the nearest charging station that is unoccupied.

The system 400 further includes one or more virtual reality devices 480.The one or more virtual reality devices 480 may include any type ofdevice allowing a user to immerse themselves in an environment thatsimulates a physical presence in one or more places. For instance, theone or more virtual reality devices 480 may include an input/outputinterface that allows a user to interact with the environment. The oneor more virtual reality devices 480 may include output devices forproviding sensory experience to the user, such as displays and speakers,and input devices for controlling one or more aspects of the experiencebased on user input, such as sensors and mechanical controls (e.g.,buttons). For example, the one or more virtual reality devices 480 mayinclude one or more wearable virtual reality head-mounted displays orheadsets that may be worn by a user.

In some implementations, the one or more virtual reality devices 480 maysimulate a physical presence in one or more places located within oraround a property monitored by system 400. The one or more virtualreality devices 480 may provide a user with this experience bycommunicating with one or more components of system 400, such as sensors420, module 422, and camera 430. For instance, a user may be able toview a live feed from camera 430 on a display of a virtual realityheadset 480 worn by the user. In some implementations, the virtualreality headset 480 may monitor data from one or more accelerometersincluded in the virtual reality headset 480 and control panning,tilting, and/or zooming functions of camera 430 based on the user's headmovements. This may allow for synchronous movement of camera 430 and thevirtual reality headset 480 as positioned on the user's head, which mayprovide the user with the sensation of physical presence within the areamonitored by camera 430. The virtual reality headset 480 may provide oneor more control signals to camera 430 such that it tilts and pans withmovement of the user's head. Zoom functions of camera 430 may becontrolled in accordance with leaning movements of the user's head. Insome implementations, the virtual reality headset 480 may determine apositioning of the user's head in three-dimensional space and controlmovement of camera 430 along each axis in accordance withDenavit-Hartenberg parameters.

In some implementations, the virtual reality headset 480 may controlzoom functions of camera 430 based on the user's eye movements asdetected by a camera integral with the virtual reality headset 480. Inthese implementations, the virtual reality headset 480 may determinethat the user's eyes are focused on a particular portion of its displayand/or object depicted in an image of its display and, in response,provide camera 430 with the control signals necessary to zoom into theuser's area of interest. In these implementations, the virtual realitydevice 480 may “lock-onto” an object included in images provided bycamera 430 in response to determining that the user has shown arelatively high degree of interest in the object. For instance, thevirtual reality device 480 may identify one or more objects included inthe images of camera 430 and track the user's gaze to determine if theuser's eyes have consistently followed one of the identified objects.The virtual reality headset 480 may control camera 430 such that itcontinuously tracks these objects of interest.

In some examples, the one or more virtual reality devices 480 maysimulate a physical navigation of one or more places located within oraround the property monitored by system 400. For instance, if theproperty includes multiple cameras 430, a virtual reality headset 480may seamlessly transition from feed-to-feed to simulate a traversal ofan area monitored by a series of cameras 430. The user may be able topan, tilt, and zoom each camera 430, as described above, as well as“walk” through the environment using one or more directional controlsprovided by head movement or tactile input, for example. That is, thevirtual reality headset 480 may coordinate movements of cameras 430 andthe feed provided for display for the user, based on the user'smovements, directional input, and the location of each camera 430, tosimulate movement and translate the user's vantage point. For example,this may allow a user to investigate a potential threat on theirproperty from a remote location. When utilized in combination with the“lock-on” feature described above, a user may be able to follow a movingobject located within or around the property.

In some implementations, the system 400 includes one or morethree-dimensional scanners or one or more depth sensors. In theseimplementations, the one or more virtual reality devices 480 may be ableto provide the user with a three-dimensional simulation of one or moreareas of their property. When utilized in combination with thetechniques described above in association with cameras 430, the user maybe able to interact with three-dimensional renderings of objects on theproperty. In some implementations, data from the one or morethree-dimensional scanners or one or more depth sensors may be utilizedto model an environment, while data from one or more cameras 430 may beutilized to texturize the models generated. This may provide the userwith a very realistic experience, allowing them to quickly andaccurately identify and assess threats. In some implementations, thethree-dimensional or depth information is gleaned from data provided byone or more sensors 420 and/or cameras 430.

The one or more virtual reality devices 480 may also provide virtualinstructions to the user. For instance, the one or more virtual realitydevices 480 may help guide the user through one or more installationprocesses associated with system 400. The one or more virtual realitydevices 480 may communicate with a remotely-located technician, who willbe able to receive a view of the user's home and provide instructionaccordingly. For example, a technician may be able to see what the useris seeing and augment the display of their virtual reality headset 480with one or more images to provide a demonstration for the user andassist with system configuration, installation, and/or maintenance.

The one or more virtual reality devices 480 may include one or morecameras, one or more proximity sensors, one or more gyroscopes, one ormore accelerometers, one or more magnetometers, a global positioningsystem (GPS) unit, an altimeter, one or more sonar or laser sensors, oneor more motion sensors, one or more accelerometers, one or more buttonsor other mechanical controls, one or more microphones, and/or any othertypes of sensors. Furthermore, the one or more virtual reality devices480 may receive input from any of sensors 420.

The system 400 further includes one or more holographic projectors 482.The one or more holographic projectors 482 may include any devicecapable of projecting an image that appears three-dimensional to aviewer. This may include projection systems that modify a projectedimage as the position and orientation of a viewer of the system changes,such that an object included in the projected image consistently appearsthree-dimensional from the perspective of the viewer. The one or moreholographic projectors 482 may be configured to project images into oneor more nearby spaces within or around the property. For example, one ormore holographic projectors 482 may be utilized to project holographicimages as deterrents. In these examples, the one or more holographicprojectors 482 may project images of various objects in response to analarm event to create the appearance that the property of system 400 isoccupied. For example, in response to an alarm event detecting anintruder using one or more of sensors 420, the system 400 may command aholographic projector 482 to project an image of a person onto a wall ofan upstairs bedroom. In another example, the holographic projector 482may project an image of a ferocious dog onto an area adjacent to adoorway. The one or more holographic projectors 482 may operate inconjunction with cameras 430 in order to track a potential threat (e.g.,intruder, burglar, etc.) and tailor renderings of holographicprojections according to their estimated vantage point. In someimplementations, the holographic images produced by one or moreholographic projectors 482 may be animated.

A user may be able to control operation of the one or more holographicprojectors 482. For instance, the user may be able to select images,locations of projections, and the various criteria associated withtriggering projections. In some implementations, the one or moreholographic projectors 482 may operate in coordination with module 422or be controlled by module 422. For instance, module 422 may controloperation of one or more holographic projectors 482 and one or morelighting systems, to create a greater sense of occupancy. In someexamples, the module 422 may activate a lighting system as a holographicprojector 482 projects images of a person walking into the room. In someimplementations, a user may be able to control one or more holographicprojectors 482, in a manner similar to that which has been describedabove, using one or more virtual reality devices 480.

In some implementations, the one or more virtual reality devices 480 mayprovide the user with an “augmented reality” by which they can visualizea configuration of images produced by one or more holographic projectors482. For example, as a user wearing a virtual reality headset 480 walksabout their property, the virtual reality headset may augment theirenvironment with renderings of the holographic images that the one ormore holographic projectors 482 may be configured to project. This maygive the user an opportunity to preview a holographic projectionconfiguration and make modifications. In some implementations, the usermay be able to make all of these modifications with the virtual realitydevice 480. The user may also be able to utilize one or more virtualreality devices 480 to configure and/or activate holographic projectionson-the-fly. For example, while following an intruder around a propertyusing the virtual reality headset 480 in a manner similar to that whichhas been described above, the user may be able to decide to place aholographic image of a person in an area that will soon be visible tothe intruder. In this example, a video feed provided by one or morecameras 430 and viewed by the user through the virtual reality headset480 may be augmented with indicia to allow the user to configure aholographic projection.

In some implementations, a wearable virtual reality device 480, such asa headset, may help train the holographic projectors 482, or a systemfor controlling the holographic projectors 482 (e.g., module 422). Forexample, sensor data reflective of a user's movements may be monitoredas the user walks around their house and later used to create morerealistic renderings for the one or more holographic projectors 482 toproduce. For instance, the holographic projectors 482 may be able toproject images of people walking through the home in a manner similar tothat of the user. In some implementations, the one or more holographicprojectors 482 may be mounted on a robot device, such as a drone. Inthese implementations, the one or more robot devices may move or flyaround a property and project holographic images as needed.

The sensors 420, the module 422, the camera 430, the thermostat 434, thevirtual reality devices 480, and the holographic projectors 482communicate with the controller 412 over communication links 424, 426,428, 432, 484, and 486. The communication links 424, 426, 428, 432, 484,and 486 may be a wired or wireless data pathway configured to transmitsignals from the sensors 420, the module 422, the camera 430, thethermostat 434, the virtual reality devices 480, and the holographicprojectors 482 to the controller 412. The sensors 420, the module 422,the camera 430, the thermostat 434, the virtual reality devices 480, andthe holographic projectors 482 may continuously transmit sensed valuesto the controller 412, periodically transmit sensed values to thecontroller 412, or transmit sensed values to the controller 412 inresponse to a change in a sensed value.

The communication links 424, 426, 428, 432, 484, and 486 may include alocal network. The sensors 420, the module 422, the camera 430, thethermostat 434, the virtual reality devices 480, and the holographicprojectors 482 and the controller 412 may exchange data and commandsover the local network. The local network may include 802.11 “WiFi”wireless Ethernet (e.g., using low-power WiFi chipsets), Z-Wave, Zigbee,Bluetooth, “Homeplug” or other “Powerline” networks that operate over ACwiring, and a Category 5 (CAT5) or Category 6 (CAT6) wired Ethernetnetwork. The local network may be a mesh network constructed based onthe devices connected to the mesh network.

The monitoring application server 460 is an electronic device configuredto provide monitoring services by exchanging electronic communicationswith the monitoring system control unit 410, the one or more userdevices 440, 450, and the central alarm station server 470 over thenetwork 405. For example, the monitoring application server 460 may beconfigured to monitor events (e.g., alarm events) generated by themonitoring system control unit 410. In this example, the monitoringapplication server 460 may exchange electronic communications with thenetwork module 414 included in the monitoring system control unit 410 toreceive information regarding events (e.g., alarm events) detected bythe monitoring system control unit 110. The monitoring applicationserver 460 also may receive information regarding events (e.g., alarmevents) from the one or more user devices 440, 450.

In some examples, the monitoring application server 460 may route alarmdata received from the network module 414 or the one or more userdevices 440, 450 to the central alarm station server 470. For example,the monitoring application server 460 may transmit the alarm data to thecentral alarm station server 470 over the network 405.

The monitoring application server 460 may store sensor and image datareceived from the monitoring system and perform analysis of sensor andimage data received from the monitoring system. Based on the analysis,the monitoring application server 460 may communicate with and controlaspects of the monitoring system control unit 410 or the one or moreuser devices 440, 450.

The central alarm station server 470 is an electronic device configuredto provide alarm monitoring service by exchanging communications withthe monitoring system control unit 410, the one or more mobile devices440, 450, and the monitoring application server 460 over the network405. For example, the central alarm station server 470 may be configuredto monitor alarm events generated by the monitoring system control unit410. In this example, the central alarm station server 470 may exchangecommunications with the network module 414 included in the monitoringsystem control unit 410 to receive information regarding alarm eventsdetected by the monitoring system control unit 410. The central alarmstation server 470 also may receive information regarding alarm eventsfrom the one or more mobile devices 440, 450 and/or the monitoringapplication server 460.

The central alarm station server 470 is connected to multiple terminals472 and 474. The terminals 472 and 474 may be used by operators toprocess alarm events. For example, the central alarm station server 470may route alarm data to the terminals 472 and 474 to enable an operatorto process the alarm data. The terminals 472 and 474 may includegeneral-purpose computers (e.g., desktop personal computers,workstations, or laptop computers) that are configured to receive alarmdata from a server in the central alarm station server 470 and render adisplay of information based on the alarm data. For instance, thecontroller 412 may control the network module 414 to transmit, to thecentral alarm station server 470, alarm data indicating that a sensor420 detected a door opening when the monitoring system was armed. Thecentral alarm station server 470 may receive the alarm data and routethe alarm data to the terminal 472 for processing by an operatorassociated with the terminal 472. The terminal 472 may render a displayto the operator that includes information associated with the alarmevent (e.g., the name of the user of the alarm system, the address ofthe building the alarm system is monitoring, the type of alarm event,etc.) and the operator may handle the alarm event based on the displayedinformation.

In some implementations, the terminals 472 and 474 may be mobile devicesor devices designed for a specific function. Although FIG. 4 illustratestwo terminals for brevity, actual implementations may include more (and,perhaps, many more) terminals.

The one or more user devices 440, 450 are devices that host and displayuser interfaces. For instance, the user device 440 is a mobile devicethat hosts one or more native applications (e.g., the nativesurveillance application 442). The user device 440 may be a cellularphone or a non-cellular locally networked device with a display. Theuser device 440 may include a cell phone, a smart phone, a tablet PC, apersonal digital assistant (“PDA”), or any other portable deviceconfigured to communicate over a network and display information. Forexample, implementations may also include Blackberry-type devices (e.g.,as provided by Research in Motion), electronic organizers, iPhone-typedevices (e.g., as provided by Apple), iPod devices (e.g., as provided byApple) or other portable music players, other communication devices, andhandheld or portable electronic devices for gaming, communications,and/or data organization. The user device 440 may perform functionsunrelated to the monitoring system, such as placing personal telephonecalls, playing music, playing video, displaying pictures, browsing theInternet, maintaining an electronic calendar, etc.

The user device 440 includes a native surveillance application 442. Thenative surveillance application 442 refers to a software/firmwareprogram running on the corresponding mobile device that enables the userinterface and features described throughout. The user device 440 mayload or install the native surveillance application 442 based on datareceived over a network or data received from local media. The nativesurveillance application 442 runs on mobile devices platforms, such asiPhone, iPod touch, Blackberry, Google Android, Windows Mobile, etc. Thenative surveillance application 442 enables the user device 440 toreceive and process image and sensor data from the monitoring system.

The user device 450 may be a general-purpose computer (e.g., a desktoppersonal computer, a workstation, or a laptop computer) that isconfigured to communicate with the monitoring application server 460and/or the monitoring system control unit 410 over the network 405. Theuser device 450 may be configured to display a surveillance monitoringuser interface 452 that is generated by the user device 450 or generatedby the monitoring application server 460. For example, the user device450 may be configured to display a user interface (e.g., a web page)provided by the monitoring application server 460 that enables a user toperceive images captured by the camera 430 and/or reports related to themonitoring system. Although FIG. 4 illustrates two user devices forbrevity, actual implementations may include more (and, perhaps, manymore) or fewer user devices.

In some implementations, the one or more user devices 440, 450communicate with and receive monitoring system data from the monitoringsystem control unit 410 using the communication link 438. For instance,the one or more user devices 440, 450 may communicate with themonitoring system control unit 410 using various local wirelessprotocols such as wifi, Bluetooth, zwave, zigbee, HomePlug (ethernetover powerline), or wired protocols such as Ethernet and USB, to connectthe one or more user devices 440, 450 to local security and automationequipment. The one or more user devices 440, 450 may connect locally tothe monitoring system and its sensors and other devices. The localconnection may improve the speed of status and control communicationsbecause communicating through the network 405 with a remote server(e.g., the monitoring application server 460) may be significantlyslower.

Although the one or more user devices 440, 450 are shown ascommunicating with the monitoring system control unit 410, the one ormore user devices 440, 450 may communicate directly with the sensors andother devices controlled by the monitoring system control unit 410. Insome implementations, the one or more user devices 440, 450 replace themonitoring system control unit 410 and perform the functions of themonitoring system control unit 410 for local monitoring and longrange/offsite communication.

In other implementations, the one or more user devices 440, 450 receivemonitoring system data captured by the monitoring system control unit410 through the network 405. The one or more user devices 440, 450 mayreceive the data from the monitoring system control unit 410 through thenetwork 405 or the monitoring application server 460 may relay datareceived from the monitoring system control unit 410 to the one or moreuser devices 440, 450 through the network 405. In this regard, themonitoring application server 460 may facilitate communication betweenthe one or more user devices 440, 450 and the monitoring system.

In some implementations, the one or more user devices 440, 450 may beconfigured to switch whether the one or more user devices 440, 450communicate with the monitoring system control unit 410 directly (e.g.,through link 438) or through the monitoring application server 460(e.g., through network 405) based on a location of the one or more userdevices 440, 450. For instance, when the one or more user devices 440,450 are located close to the monitoring system control unit 410 and inrange to communicate directly with the monitoring system control unit410, the one or more user devices 440, 450 use direct communication.When the one or more user devices 440, 450 are located far from themonitoring system control unit 410 and not in range to communicatedirectly with the monitoring system control unit 410, the one or moreuser devices 440, 450 use communication through the monitoringapplication server 460.

Although the one or more user devices 440, 450 are shown as beingconnected to the network 405, in some implementations, the one or moreuser devices 440, 450 are not connected to the network 405. In theseimplementations, the one or more user devices 440, 450 communicatedirectly with one or more of the monitoring system components and nonetwork (e.g., Internet) connection or reliance on remote servers isneeded.

In some implementations, the one or more user devices 440, 450 are usedin conjunction with only local sensors and/or local devices in a house.In these implementations, the system 400 only includes the one or moreuser devices 440, 450, the sensors 420, the module 422, the camera 430,and the robotic devices. The one or more user devices 440, 450 receivedata directly from the sensors 420, the module 422, the camera 430, andthe robotic devices and sends data directly to the sensors 420, themodule 422, the camera 430, and the robotic devices. The one or moreuser devices 440, 450 provide the appropriate interfaces/processing toprovide visual surveillance and reporting.

In other implementations, the system 400 further includes network 405and the sensors 420, the module 422, the camera 430, the thermostat 434,and the robotic devices are configured to communicate sensor and imagedata to the one or more user devices 440, 450 over network 405 (e.g.,the Internet, cellular network, etc.). In yet another implementation,the sensors 420, the module 422, the camera 430, the thermostat 434, andthe robotic devices (or a component, such as a bridge/router) areintelligent enough to change the communication pathway from a directlocal pathway when the one or more user devices 440, 450 are in closephysical proximity to the sensors 420, the module 422, the camera 430,the thermostat 434, and the robotic devices to a pathway over network405 when the one or more user devices 440, 450 are farther from thesensors 420, the module 422, the camera 430, the thermostat 434, and therobotic devices. In some examples, the system leverages GPS informationfrom the one or more user devices 440, 450 to determine whether the oneor more user devices 440, 450 are close enough to the sensors 420, themodule 422, the camera 430, the thermostat 434, and the robotic devicesto use the direct local pathway or whether the one or more user devices440, 450 are far enough from the sensors 420, the module 422, the camera430, the thermostat 434, and the robotic devices that the pathway overnetwork 405 is required. In other examples, the system leverages statuscommunications (e.g., pinging) between the one or more user devices 440,450 and the sensors 420, the module 422, the camera 430, the thermostat434, and the robotic devices to determine whether communication usingthe direct local pathway is possible. If communication using the directlocal pathway is possible, the one or more user devices 440, 450communicate with the sensors 420, the module 422, the camera 430, thethermostat 434, and the robotic devices using the direct local pathway.If communication using the direct local pathway is not possible, the oneor more user devices 440, 450 communicate with the sensors 420, themodule 422, the camera 430, the thermostat 434, and the robotic devicesusing the pathway over network 405.

In some implementations, the system 400 provides end users with accessto images captured by the camera 430 to aid in decision making. Thesystem 400 may transmit the images captured by the camera 430 over awireless WAN network to the user devices 440, 450. Because transmissionover a wireless WAN network may be relatively expensive, the system 400uses several techniques to reduce costs while providing access tosignificant levels of useful visual information.

In some implementations, a state of the monitoring system and otherevents sensed by the monitoring system may be used to enable/disablevideo/image recording devices (e.g., the camera 430). In theseimplementations, the camera 430 may be set to capture images on aperiodic basis when the alarm system is armed in an “Away” state, butset not to capture images when the alarm system is armed in a “Stay”state or disarmed. In addition, the camera 430 may be triggered to begincapturing images when the alarm system detects an event, such as analarm event, a door opening event for a door that leads to an areawithin a field of view of the camera 430, or motion in the area withinthe field of view of the camera 430. In other implementations, thecamera 430 may capture images continuously, but the captured images maybe stored or transmitted over a network when needed.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus implementing thesetechniques may include appropriate input and output devices, a computerprocessor, and a computer program product tangibly embodied in amachine-readable storage device for execution by a programmableprocessor. A process implementing these techniques may be performed by aprogrammable processor executing a program of instructions to performdesired functions by operating on input data and generating appropriateoutput. The techniques may be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device. Each computerprogram may be implemented in a high-level procedural or object-orientedprogramming language, or in assembly or machine language if desired; andin any case, the language may be a compiled or interpreted language.Suitable processors include, by way of example, both general and specialpurpose microprocessors. Generally, a processor will receiveinstructions and data from a read-only memory and/or a random accessmemory. Storage devices suitable for tangibly embodying computer programinstructions and data include all forms of non-volatile memory,including by way of example semiconductor memory devices, such asErasable Programmable Read-Only Memory (EPROM), Electrically ErasableProgrammable Read-Only Memory (EEPROM), and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Anyof the foregoing may be supplemented by, or incorporated in,specially-designed ASICs (application-specific integrated circuits).

It will be understood that various modifications may be made. Forexample, other useful implementations could be achieved if steps of thedisclosed techniques were performed in a different order and/or ifcomponents in the disclosed systems were combined in a different mannerand/or replaced or supplemented by other components. Accordingly, otherimplementations are within the scope of the disclosure.

FIG. 5 is a flowchart of an example of a process 500 for using a virtualreality headset 154 to investigate an alarm event that was detected bythe security monitoring system 400.

The process 500 may begin at 510 when a monitoring system control unit410 receives data from one or more sensors 420 that may be indicative ofan alarm event. The data may include an alarm event notification thatcomprises, for example, an identifier of the sensor 420 that broadcastedthe alarm event notification. In some implementations, the alarm eventnotification may also include the location of the sensor 420. The alarmevent notification may also include information regarding the severityof the alarm event. For instance, a sensor 420 may be able to measurethe force with which a window was broken. Alternatively, or in addition,for example, the sensor 420 may be able to determine the number ofobjects moving in the vicinity of the sensor 420. The alarm eventnotification may include raw data that may be indicative of the severityof the alarm event, or a scaled score on a rating scale (e.g., 1 through10) that may be indicative of the severity of the alarm event.

The monitoring system control unit 410 may analyze the data received at510. For instance, the monitoring system control unit 410 may analyzethe data received at 510 to determine 520 the location associated withthe sensor 420 that detected the alarm event. The monitoring systemcontrol unit 410 may determine the location of the sensor 420 by, forexample, obtaining the location of the sensor 420 from the data receivedat 510. Alternatively, the monitoring system control unit 410 may accessstored sensor information that the monitor control unit 410, or othercomponent of system 400, maintains. The stored sensor information mayinclude a table of sensor 420 locations organized by sensor identifiers.In some implementations, the monitoring system control unit 410 may beable to map a received sensor identifier to a sensor location using thedata maintained in the table of sensor locations. The table of sensor420 locations may be populated at the time each sensor 420 is installed.The table of sensor 420 locations may also be updated in the event thata particular sensor 420 is moved, replaced, or the like. In someimplementations, the sensor information may be stored, or otherwisemaintained, in a database that is remote to the monitoring systemcontrol unit 420, but still accessible by the monitoring system controlunit 420 via one or more networks 405.

The monitoring system control unit 410 may notify 530 a user that analarm event has been detected. The user notification may be transmittedto the user's mobile device 450. The user's mobile device 450 mayinclude, for example, a mobile phone, smart phone, tablet, smart watch,laptop, or the like. The user notification may inform the user that analarm event has been detected. Alternatively, or in addition, the usernotification may include the location associated with the detected alarmevent. Alternatively, or in addition, the user notification may instructthe user to migrate to a room in the property 101 that is safe.Alternatively, or in addition, the user notification may instruct theuser to obtain a virtual reality headset 480 that the user can utilizeto investigate the alarm event. However, the monitoring system controlunit 410 need not transmit a notification to a user's mobile device inorder to notify the user of an alarm event. For instance, the monitoringsystem control unit 410 may initiate the output of one or more visual oraudio messages that may be communicated throughout a property 101 suchas, for example, flashing lights, sirens, audio messages warning of anintruder, or the like. In response to receiving a user notification, andfacing potentially dangerous circumstances, the user may migrate to aroom in the property 101 that is safe and put on virtual reality headset480.

The monitoring system control unit 410 may identify 540 one or morecameras that are associated with an alarm event. For instance, themonitoring system control unit 410 may determine the set of one or morecameras 430 that may be located in the vicinity of the alarm event.Referencing the example of FIG. 1, the set of one or more camerasavailable for a Room A may include camera 106 a, 106 b, 117 a, and/or116. The monitoring system control unit 410 may store a table thatindicates the locations of each camera in a property 101. Alternatively,or in addition, the monitoring system control unit 410 may be able toaccess a table that indicates the locations of each camera in a property101. The monitoring system control unit 410 may use the locationassociated with the detected alarm event to search the table indicatingcamera locations in order to identify the set of one or more camerasthat are located in the same vicinity as the detected alarm event.

The monitoring system control unit 410 may then select 550 a particularcamera from the set of one or more cameras. The monitoring systemcontrol unit 410 may select the particular camera based on its proximityto the sensor 420 that broadcast the alarm event notification.Alternatively, or in addition, the monitoring system control unit 410may select the particular camera 430 based on a determination that theparticular camera 430 is currently sensing movement. Alternatively, orin addition, the particular camera 430 may be selected based on thecamera's capabilities. For instance, the particular camera may beselected because the particular camera supports the streaming ofhigh-definition video to the virtual reality headset 480. Alternatively,or in addition, a particular camera may be selected because the camerasupports thermal vision, night vision, and/or the like. Alternatively,or in addition, a particular camera may be selected because the camerais mobile (e.g., a camera mounted to a robotic device). Other ways ofselecting a particular camera from a set of cameras may also fall withthe scope of the present disclosure.

The table storing information related to each camera's location, oranother table, may store information related to each camera'scapabilities that may be accessed, and searched, in order to select aparticular camera in response to a detected alarm event. Informationcontained within, or obtained after the receipt of, the alarm eventnotification may be used to select a particular camera. For instance,information such as the location of the sensor, information associatedwith the sensor's location (e.g., whether the sensor's location haspower), or the like may be used to select a particular camera from theset of one or more cameras.

The monitoring system control unit 410 may transmit 560 one or moreinstructions to the particular camera 430 that was selected from the setof one or more cameras. The one or more instructions may command theparticular camera 430 to stream a live video feed to the user's virtualreality headset 480. Alternatively, or in addition, the monitoringsystem control unit 410 may transmit one or more instructions to thevirtual reality headset 480 that command the virtual reality headset 480to begin streaming video from the particular camera that was identifiedby the monitoring system control unit 410. The user of the virtualreality headset 480 may view the video feed via a user interfaceprovided by the display of the virtual reality headset 480. The userinterface provided by the display of the virtual reality headset 480 mayinclude one or more of the features of user interfaces 200, 300described above in the examples of FIGS. 2 and 3, respectively.

The one or more instructions transmitted by the monitoring systemcontrol unit 410 may also include an instruction to command theparticular camera 430 to sync with the virtual reality headset 480.Synching a particular camera 430 to the virtual reality headset 480 mayallow the user of the virtual reality headset 480 to remotely controlthe camera 430. For instance, in some implementations, the virtualreality headset 480 may include circuitry to allow for synchronousmovement of camera 430 and the virtual reality headset 480. Forinstance, movements of the user's head, while wearing the virtualreality headset 480, may also move the synced camera 430 a proportionalamount. Alternatively, or in addition, zoom functions of camera 430 maybe controlled in accordance with leaning movements of the user's head.In the same, or other, implementations, syncing the particular camera430 with the virtual reality headset 480 may also enable a user tocontrol zoom functions of camera 430 based on the user's eye movementsas detected by a camera integral with the virtual reality headset 480.In other implementations, the user of the virtual reality headset maysubmit a request to initiate syncing of the user's virtual realityheadset 480 with one or more cameras 430. Such a user request may beprocessed, and executed by, the central monitoring control unit 410and/or one or more cameras 430.

FIG. 6 is a flowchart of an example of a process 600 for receiving alarmevent notifications via a virtual reality headset from the securitymonitoring system 400.

The process 600 may begin at 610 when a monitoring system control unit410 receives data from one or more sensors 420 that may be indicative ofan alarm event. The received data may include, for example, an alarmevent notification, as previously described herein. At 620, themonitoring system control unit 410 may determine the location associatedwith a sensor 420 that detected the alarm event.

The process may continue at 630 with the monitoring system control unit410 providing prompt for output on the display of a user's virtualreality headset 480. The prompt may be associated with a detected alarmevent. For instance, in one implementation, while a user isinvestigating a previously detected alarm event using the virtualreality headset 480, the virtual reality headset 480 may receive, anddisplay (or otherwise output), a prompt regarding a different alarmevent in another aspect of property 101. The prompt may include one ormore selectable icons and/or request one or more types of responses fromthe user. The one or more selectable icons may be similar to, ordifferent than, the graphical icons displayed in the alarm eventmanagement center shown in the examples of FIG. 2 and/or FIG. 3.Alternatively, or in addition, the prompt may be an audio prompt outputto the user via one or more speakers of the virtual reality headset 480.

The user may provide an input in response to the prompt. For instance,the user may decide to select one or more of the selectable iconsdisplayed in association with the prompt. Selecting a particularselectable icon may change the display on the user's virtual realityheadset 480 to a different live video feed. The different live videofeed may be from a camera located at a portion of property 101 that isassociated with the alarm event identified in the prompt. Alternatively,or in addition, the user may provide an input that requests that thedifferent live video feed may be displayed in a split screen using thedisplay of the user's virtual reality headset 480. Alternatively, or inaddition, the user may be able provide an input that forwards thedifferent video feed to a law enforcement agency, central operator, orthe like. Alternatively, or in addition, the user may provide adifferent input that provides an indication to ignore the prompt. Theuser's input may be in the form of a gaze at a particular icon, anuttered voice command, an input on a user device 450, or the like.

The prompt may provide one or more indications regarding the severity ofthe threat. For instance, the prompt may indicate whether the differentalarm event is a negligible threat, intermediate threat, or a severethreat. The prompt may be color coded and/or animated. For instance, anegligible threat may be provided in green text on the display of thevirtual reality headset 480. Other threats, such as, for example, asevere threat may be provided in red flashing text that may be morelikely to catch a user's attention. Other types of formatting may beused to stress the severity of a particular prompt that may be displayedon the user's virtual reality headset 480.

The monitoring system control unit 410 may receive 640 data that isindicative of the user's input in response to the prompt. The monitoringcontrol unit 410 may process the user's input in order to identify aparticular camera that is associated with the prompt. In oneimplementation, the user's input in response to the prompt may identifya particular camera of the multiple cameras. Alternatively, or inaddition, the monitoring system control unit 410 may map the data thatis indicative of the user's response to the prompt to a particularcamera of the one or more cameras associated with the particularproperty 101. Alternatively, or in addition, the monitoring systemcontrol unit 410 may select a camera in the same, or similar, way asdescribed with reference to FIG. 5, 550 above based on the user'sresponse to the prompt.

The monitoring system control unit 410 may transmit 660 one or moreinstructions to the particular camera that commands the camera to streama live video stream to the user's virtual reality headset 480.Alternatively, or in addition, the monitoring system control unit 410may transmit one or more instructions to the virtual reality headset 480that commands the virtual reality headset 480 to begin streaming videofrom the particular camera that was identified by the monitoring systemcontrol unit 410.

The process 600 may be described by way of example. For instance, a usermay be monitoring the live feed from camera 106 a that is associatedwith an alarm event in Room A. While viewing the feed from camera 106 a,monitoring system control unit 410 may transmit data indicative of aprompt that is received by the virtual reality headset 480. The promptmay include a selectable icon indicating that that an alarm event isoccurring in the Driveway, and the selectable icon may be output via thedisplay of the virtual reality headset 480. In one instance, the usermay provide an input that selects the selectable icon indicating thatthere is an alarm event occurring in the Driveway. The monitoring systemcontrol unit 410 may receive data indicative of the user's selection,map the data indicative of the user's selection to camera 106 c, andthen instruct camera 106 c to begin streaming a live video feed to theuser's virtual reality headset 154. Alternatively, or in addition, thecentral system monitoring unit may instruct the virtual reality headset154 to request a live video feed from the camera 106 c.

FIG. 7. is a flowchart of an example of a process 700 for using avirtual reality headset 480 to interact with aspects of a property thatis monitored by the security monitoring system 400.

In one aspect, a server such as the monitoring application server, adedicated three dimensional modeling server, or the like may be used toimplement process 700 to create an interactive augmented realityenvironment. The interactive augmented reality environment may allow auser to interact with one or more aspects of a virtual model of aproperty such as, for example a property 101. In some instances, suchinteractions may result in a modification to one or more features of thereal world property 101 (e.g., changes in lighting, positioning ofholograms, or the like).

The process 700 may begin with the server receiving one or more inputdata feeds associated with a property 101. The input data feeds mayinclude one or more image and/or video feeds. The input data feeds maybe provided by multiple cameras, from multiple angles. The use ofmultiple cameras may provide the advantages such as, for example, asecond camera capturing a feature of property 101 that is within thesecond camera's line of sight even though the feature may be outside ofthe line of sight of a first camera. The input data feed may be providedby one or more cameras 430 that are associated with a property 101, oneor more three-dimensional scanners, one or more depth sensors, or thelike.

The server may generate 720 an interactive augmented reality model basedon the received input data feeds. For instance, the server may use oneor more input data feeds from the three-dimensional scanners and/or thedepth sensors in order to generate a model that captures the particularfeatures of a particular portion (e.g., Room A) of property 101.Alternatively, or in addition, the server may use high-definition, orgreater, resolution images and/or video captured by one or more cameras430 in order to texturize the generated model.

A user may interact with the generated augmented reality model. Suchinteractions may allow a user to safely investigate portions of aproperty 101 from a safe place during an alarm event. Such aninteractive augmented reality model differs from a conventional securitysystem that may simply utilize one or more cameras because suchconventional systems may include multiple blind spots. Such blind spotsmay create danger for the user who looks at the video feed of thecamera, thinks the room is clear, and then the user migrates to the roomonly to come face-to-face with an intruder who was hiding in thecamera's blind spot. The subject matter of the present disclosure,however, may provide an opportunity for a user to investigate a room ofa property that is associated with an alarm event while eliminating theproblem posed by blind spots.

By way of example, the server may instruct one or more cameras 106 a,106 b, 117 a, 116 to capture live video and/or image feeds of Room A inproperty 101. Alternatively, or in addition, the server may instruct oneor more three dimensional scanners and/or depth scanners in order tocapture detailed scans of Room A from multiple different angles. In oneimplementation, the cameras 106 a, 106 b, 117 a, 116, the threedimensional scanners, and/or the depth scanners may be configured at thetime of installation so that they can capture multiple aspects of Room Afrom multiple different angles, while eliminating, or substantiallyminimizing, the existence of blind spots. The images, videos, and/orscans of Room A obtained using the cameras and/or scanners may betransmitted to the server, and used to generate an interactive augmentedreality model.

Once generated, a user may view the interactive augmented reality modelvia the display of the virtual reality headset 480. Using the virtualreality headset 480, and one or more articles of clothing equipped withsensors that enable the user's movements to be detected by the virtualreality model, the user may interact with the interactive augmentedvirtual reality model. For instance, by way of example, the user mayinteract with an interactive augmented reality model of Room A by“grabbing” a generated model of table 120, and “moving” the table asideto see if an intruder such as, for example, a burglar is hidingunderneath the table. The server may receive 730 data indicative of theuser's attempt to “grab,” and “move” the table 120 based on readings ofmovement associated with sensors on the user's clothing. In response tothe data indicative of the user's attempt to “grab,” and “move” thetable 120 the server may execute instructions that alter the interactiveaugmented reality model to be responsive to the user's input to “grab”and “move” the table 120, and reveal a rendering of the space of Room Athat exists underneath table 120. Thus, the interactive augmentedreality environment may allow a user to investigate aspects of theuser's property during what may be a hostile home invasion by one ormore intruders from the safety of a user's bedroom, or other safe room,using the virtual reality headset 480. Though a user may interact with,and “move,” the table 120 in the augmented reality model, the physicaltable 120 in the actual Room A is not moved.

Though the user's interaction with the table 120 in the augmentedreality model is solely an interaction with a virtual table, and not thereal world table 120, the interaction provides a real world benefit ofexamining a rendering of what is underneath the table based on one ormore images captured by the cameras and/or scanners used to generate theaugmented reality model. However, other interactions with the augmentedreality model may provide for changes in certain properties of realworld Room A. For instance, the augmented reality model may beconfigured to transmit commands to control modules integrated withsecurity monitoring system 100 based on user interactions with theaugmented reality model. Such control modules may be able to togglelighting elements, audio systems, or the like based on user interactionswith light switches, audio systems, or the like in the augmented realitymodel. A user may also use the augmented reality model to position thelocation of a particular hologram. Once positioned, the server providingthe augmented reality model may capture coordinates associated with thehologram's location, and transmit the coordinates to a correspondingholographic projector. The holographic projector may then generateholograms in the designated area, when instructed by a monitoring systemcontrol unit 410 to display a hologram.

FIG. 8 is a flowchart of an example of a process for using a hologram asa component of the security monitoring system 400.

The process 800 may begin at 810 when a monitoring system control unit410 receives data from one or more sensors 420 that may be indicative ofan alarm event. The received data may include, for example, an alarmevent notification, as previously described herein. At 820, themonitoring system control unit 410 may determine the location associatedwith a sensor 420 that detected the alarm event.

The monitoring system control unit 410 may identify 830 one or moreholographic projectors 482 that may be associated with the detectedalarm event. For instance, the monitoring system control unit 410 maydetermine the set of one or more holographic projectors 482 that may belocated in the vicinity of the alarm event. Referencing the example ofFIG. 1, the set of one or more holographic projectors available for aRoom A may include holographic projectors 108 a, 108 b, and/or 114 b.The monitoring system control unit 410 may store a table that indicatesthe locations of each holographic projector in a property 101.Alternatively, or in addition, the monitoring system control unit 410may be able to access a table that indicates the locations of eachholographic projector in a property 101. The monitoring system controlunit 410 may use the location associated with the detected alarm eventto search the table indicating holographic projector locations in orderto identify the set of one or more holographic projectors that arelocated in the same vicinity as the detected alarm event.

The monitoring system control unit 410 may then select 840 one or moreparticular holographic projectors 482 from the set of one or moreholographic projectors 482. The monitoring system control unit 410 mayselect the particular one or more holographic projectors 482 based oneach holographic projector's proximity to the sensor 420 that broadcastthe alarm event notification. Alternatively, or in addition, theparticular camera 430 may be selected based on the capabilities of eachrespective holographic projector. For instance, a particular holographicprojector 482 may be selected because the particular holographicprojector 482 is mobile. Such a holographic projector 482 may beselected in response to an intermediate threat alarm event. A mobileholographic projector 482 may be selected in response to an intermediatethreat alarm event in order to organically introduce a hologram intoparticular room. Alternatively, or in addition, a particular hologramprojector 482 may be selected because the holographic projector 482includes a speaker. Such a holographic projector 482 be selected inresponse to a severe threat alarm event because an intruder may bepresent in the property 101, and one or more audible sounds may beneeded to be output to add effect and/or context to more threateninghologram. It should be considered that mobile holographic projectors mayalso be selected in response to severe threat alarm events andholographic projectors with speakers may also be selected in response tointermediate alarm events, as necessary. The monitoring system controlunit 410, or other component of security system 400, may storeholographic projector capability information that the monitoring systemcontrol unit 410 may analyze when determining the appropriate particularholographic projector to select. Other ways of selecting a particularholographic projector 482 from a set of available holographic projectors482 may also fall with the scope of the present disclosure.

The monitoring system control unit 410 may select a particular hologramto be displayed by the selected holographic projector(s) 482 from a setof available holograms. In one implementation, the monitoring systemcontrol unit 410 may select a particular hologram based on the severityof the alarm event. For instance, a broadcasted alarm event notificationmay include data regarding the severity of the alarm event. This mayinclude, for example, data indicating the amount of force with which awindow was broken, as measured by a sensor 420. Alternatively, or inaddition, for example, the broadcast alarm event notification mayinclude data indicating the number of objects moving in the vicinity ofa particular sensor 420, as measured by the sensor 420. The alarm eventnotification may include raw data that may be indicative of the severityof the alarm event, or a scaled score on a rating scale (e.g., 1 through10) that may be indicative of the severity of the alarm event.

The monitoring system control unit 410 may determine whether theseverity of an alarm event exceeds a predetermined threshold. Forinstance, the monitor control unit 410 may determine, based on the forceapplied to a window, that the window was merely jostled, and not broken.In such an instance, the alarm event may be treated as an intermediatethreat, and the monitoring system control unit 410 may select thehologram of a person to be displayed by the identified holographicprojector 482. Alternatively, or in addition, a response to anintermediate threat may include a hologram of person walking into theroom associated with an alarm event from another room of the property101.

Other alarm events may be determined to be more severe. For instance, analarm event may be categorized as severe when one or more sensors 420identifies an intruder within a property 101. In such instances, themonitoring system control unit 410 may select a more threateninghologram for display via the selected holographic projector(s) 482. Morethreatening holograms may include, for example, a vicious, barking dog,a man with a pump action shotgun, or the like. Such holograms may alsobe accompanied by audio signals such as, for example, a dog barking, adistinct sound of a shotgun round being moved into the barrel of a pumpaction shot gun, or the like.

The monitoring system control unit 410 may transmit one or moreinstructions to the selected holographic projector(s) 482 that thecommand the selected holographic projector(s) to display the selectedhologram(s). In one implementation, the monitoring system control unit410 may transmit instructions to display holograms to two or moreholographic projectors 482. Such instructions may be associated with atiming sequence that triggers the display of a first hologram prior to asecond hologram. For instance, in response to an intermediate alarmevent, the monitoring system control unit 410 may transmit instructionsto a set of two holographic projectors. In response to the receivedinstruction, the first mobile holographic projector may display ahologram of a woman walking into a room. Then, after a predeterminedtime expires, a second mobile holographic projector may display ahologram of a man walking into the room and talking to the woman. Suchorganic behavior of the displayed holograms may help to create theillusion that a particular property 101 is occupied. Such an illusionmay frighten away an intruder before an intruder completes the homeinvasion.

It is also contemplated that moving holograms may be displayed without amobile holographic projector. For instance, one or more holographicprojectors may be mounted on a swivel on a surface of property 101 suchas, a floor, wall, and/or ceiling. The one or more holographicprojectors may project the hologram, while rotating about the swivel, inorder to produce a moving hologram. Other types of mounts may be used bya holographic projector in order to provide the necessary type ofprojector movement necessary to create the display of a moving hologram.

FIG. 9 is a contextual diagram of an example of a remote user 950interacting with the security monitoring system using a virtual realityheadset 954.

The security monitoring system 900 may be used to monitor, surveil, andprotect property 901 in the same, or substantially similar, manner asthe security monitoring system 100 may be used to monitor, surveil, andprotect property 101. For instance, the central monitoring control unit102, sensors 104 a, 104 b, . . . 104 g, cameras 106 a, 106 b, . . . 106f, holographic projectors 108 a, 108 b, 108 c, robotic devices 110 a,110 b, . . . 110 g, and/or the wireless charging stations 112 a, 112 b,112 c may each function in the same, or substantially similar, manner asdescribed with respect to the security monitoring system 100.

System 900 is different in at least one respect from system 100. Forinstance, system 900 may facilitate access to one or more of the centralmonitoring control unit 102, multiple sensors 104 a, 104 b, . . . 104 g,cameras 106 a, 106 b, . . . 106 f, holographic projectors 108 a, 108 b,108 c, robotic devices 110 a, 110 b, . . . 110 g, and/or wirelesscharging stations 112 a, 112 b, 112 c by a user residing at a remotelocation 910. The remote user 950 may be a central station operator, alaw enforcement officer, or a lawful occupant of property 901 who may beat work, on vacation, or the like. Other types of users may also be ableto access components of system 901 in the same, or substantiallysimilar, manner as remote user 950.

For instance, a remote user 950 may be able to utilize an applicationprovided via a virtual reality headset 954 to submit a request to accessone or more components of system 900. The request may be directed to thecentral monitoring control unit 102 via a network 960. A local network911 and one or more wired or wireless communications links 962 may beutilized in order to connect the user's 950 virtual reality headset 954to the network 960 and network 111 that hosts the central monitorcontrol unit 102.

The network 960 may include, for example, one or more of the Internet,Wide Area Networks (WANs), Local Area Networks (LANs), analog or digitalwired and wireless telephone networks (e.g., a public switched telephonenetwork (PSTN), Integrated Services Digital Network (ISDN), a cellularnetwork, and Digital Subscriber Line (DSL)), radio, television, cable,satellite, or any other delivery or tunneling mechanism for carryingdata. Network 960 may include multiple networks or subnetworks, each ofwhich may include, for example, a wired or wireless data pathway. Thenetwork 960 may include a circuit-switched network, a packet-switcheddata network, or any other network able to carry electroniccommunications (e.g., data or voice communications). For example, thenetwork 960 may include networks based on the Internet protocol (IP),asynchronous transfer mode (ATM), the PSTN, packet-switched networksbased on IP, X.25, or Frame Relay, or other comparable technologies andmay support voice using, for example, VoIP, or other comparableprotocols used for voice communications. The network 960 may include oneor more networks that include wireless data channels and wireless voicechannels. The network 960 may be a wireless network, a broadbandnetwork, or a combination of networks including a wireless network and abroadband network.

In one aspect, the application provided via the virtual reality headset954 may require user authentication prior to providing the user withaccess to one or more components of system 900. For instance, when theuser 950 is a lawful occupant of the property 901, the applicationprovided by the virtual reality headset 954 may merely require the userto enter authenticating credentials for the user's account. In oneimplementation, the authentication credentials may include a usernameand password. Other types of authentication procedures may also beemployed to prevent unauthorized access to security monitoring system900 by a remote user 950. For instance, a user may be required to submitto one or more types of biometric data such as, for example, a retinascan, a facial recognition scan, voice verification, or the like priorto using application provided via the virtual reality headset 954 toaccess the security monitoring system 900. Alternatively, or inaddition, a user may be required to enter a dynamically changingpersonal identification number that is generated by a personalidentification number generation unit in the possession of the user.Such a dynamically changing personal identification number may beprovided in addition to a user name and password, and must match acorresponding dynamically changing identifier generated by the system900 before the system 900 will grant access to the user 950.

Other users may request authorization to use a virtual reality headset954 to access one or more components of security monitoring system 900that are not lawful occupants of the property 901. Such users may haveto satisfy one or more additional layers of authentication screening.For instance, in addition to input of a username and password, biometricdata, and/or a dynamically changing personal identification number,users who are not lawful occupants of the property 901 may need to seekpermission to access one or more components of system 900 from a lawfuloccupant of property 901. Such permission may be granted withoutrestriction by the lawful occupant of property 901. Alternatively, suchaccess may be conditionally granted by the lawful occupant of property901. For instance, a lawful occupant of property 901 may indicate thatthe central operator, law enforcement officer, and/or other user mayaccess one portions of the property 901 such as, for example the livingroom, but not, for example the bedroom. Such an additional layer ofauthentication for users such as central operators and/or lawenforcement officers, who are not lawful occupants of the property, maybe implemented to protect the privacy of the lawful occupants of theproperty 901 that may reside within the property 901.

In one implementation, a user 950 may be able to receive alarm eventnotifications via the user's 950 mobile device 952. In response to suchan alarm event notification, and once fully authenticated, the remoteuser 950 may use the application provided via the virtual realityheadset 954 to request access to a video feed from a particular camerasuch as camera 106 a, 106 b, 106 c, 106 d, 106 e, 106 f The video feedmay be streamed to the user's 950 virtual reality headset 954. The user950 may be able to control one or more of the cameras 106 a, 106 b, 106c, 106 d, 106 e, 106 f to alter the field of view one or more of thecameras using the virtual reality headset 954, which may be synced toone or more cameras. Thus, the user 952 may be able to monitor a homeinvasion, as it occurs in real-time. Though a user may determine to usea virtual reality headset 954 to access network 950 in order to monitora home invasion in response to the receipt of an alarm eventnotification, the present disclosure need to be so limited. Instead, theuser 950 may be able to utilize the virtual reality headset 954 toconnect to the network 900 at any time, and for any reason, in order toaccess one or more cameras 106 a, 106 b, 106 c, 106 d, 106 e, 106 f.

Per the example of FIG. 9, a remote user 950, once authenticated, mayuse the virtual reality headset 954 to connect to the network 900 inorder to access one or more cameras 106 a, 106 b, . . . 106 fAlternatively, or in addition, the user 950 may use the virtual realityheadset 954 to access a camera 117 a, 117 f, 117 g associated with oneor more robotic devices 110 a, 110 f, 110 g, respectively. The remoteuser 950 may use the access to one or more video feeds associated withone or more of the aforementioned cameras in order to guide the user 960out of the property 901 to safety during a home invasion For instance,the user 950 may use the virtual reality headset 954 to access the videofeeds associated with cameras 117 d, 106 f, 106 d, and 106 e in order todetermine that the user may safely exit down the back steps in room B,and out the back door without encountering any burglars 140 a, 140 b,140 c, 140 d.

Alternatively, or in addition, the remote user 950 may be able to accessone or more holographic projectors 108 a, 108 b, 108 c in order toassist the user's 962 escape. For instance, the user 950 may utilize thedisplay of the virtual reality headset 954 to provide a three-way splitscreen. The three-way split screen may include a live video feed fromcamera 106 a, camera 106 f, and camera 106 d. Thus, the user 950 canmonitor the burglar 140 d, as the burglar 140 d climbs the stairs usingthe video feed from camera 106 a. While the user climbs the stairs, theuser 950 can simultaneously monitor the video feed from camera 106 d toensure the back steps remain clear. Simultaneously, the user may alsomonitor camera 106 f to determine when the burglar 140 d is reaching thetop of the staircase. As the burglar 140 d reaches the top of thestaircase, the user 950 may submit a command via the virtual realityheadset 954 to instruct the holographic projector 108 c to display avicious, barking dog hologram 109 c. The vicious, barking dog hologrammay be introduced organically by, for example, instructing one or moreholographic projectors to display a vicious, barking dog running fromthe edge of Room D towards the top of the stairs. The hologram of thevicious, barking dog may startle the burglar 140 d just enough so thatthe user 962 that was hiding in Room C may exit the property 901 downthe back stairs in Room B, and out the back door.

FIG. 10 is a flowchart of a process 1000 that facilitates remote userinteraction with a security monitoring system utilizing a virtualreality headset.

The process 1000 may begin at 1010 when the central monitoring controlunit 102, or other component of system 900, receives a request from auser's virtual reality headset 954 to access one or more components ofsystem 900. The request may include, for example, a request to controlone or more cameras 106 a, 106 b, . . . 106 f.

The central monitor control unit 102 may implement a firewall, and/orother security measures that may prohibit outside devices from gainingunauthorized access to security monitoring system 900. For instance, thecentral monitor control unit 102 may provide 1020 a request to the userto input authentication information before granting the user 950 accessto one or more cameras 106 a, 106 b, . . . 106 f. In someimplementations, the user 950 may need to only provide a username andpassword in order to be authenticated. Alternatively, a user 950 mayalso be required to provide one or more types of biometric data, adynamically generated personal identification number, or the like inresponse to a request for authentication information.

However, in some instances, additional measures may need to be takenbefore a user 950 is fully authenticated. For instance, if the user 950is an operator, law enforcement officer, or any user that is not alawful occupant of property 901, the user 950 may also seek the approvalof a lawful occupant of the property 901. Such approval may be sought bythe operator, law enforcement officer, or the like sending a request forpermission to access the security monitoring system 900 to a mobiledevice utilized by a lawful occupant of the property. The lawfuloccupant of the property may accept, or deny, access to the third partyoperator, law enforcement operator, or the like.

Once the central monitor control unit 102 receives 1030 the user's 950authentication information, and fully authenticates the user 950, thecentral monitor control unit 102 may provide 1040 a response to theuser's 950 request to control one or more cameras 106 a, 106 b, 160 f.The response may include, for example, the central monitoring controlunit 102 providing, for display on the user interface of the user's 950virtual reality headset 954, one or more graphical icons that eachcorresponds to a particular camera 106 a, 106 b, . . . 106 f. The one ormore graphical icons that each correspond to a particular camera 106 a,106 b, . . . 106 f may be selectable. The displayed graphical icons maybe presented in the same, or similar, manner as the alarm eventmanagement center described in reference to FIG. 2 and FIG. 3.Alternatively, or in addition, the display of graphical icons may alsoinclude any cameras that are coupled to a robotic device such cameras117 a, 117 d, 117 f, 117 g.

The user may interact with the user interface of the virtual realityheadset 954 to select one or more cameras. For instance, the user 950may select one or more graphical icons that correspond to a particularcamera(s) from the set of multiple available cameras. Data indicative ofthe user's selection may be received 1050 by the central monitor controlunit 102. The central monitor control unit 102 may transmit one or moreinstructions 1060 to the camera(s) that correspond to the user'sselection to command the cameras to transmit a live video feed to theuser's virtual reality headset 954 from the camera(s) selected by theuser. To the extent the user selects two or more cameras, the live videofeed from the two or more cameras may be provided for display via theuser interface of the virtual reality headset 954 using a split-screenformat. The one or more instructions transmitted from the centralmonitor control unit 102 to the one or more cameras may include aninstruction to sync with virtual reality headset 954 to the one or morecameras.

The graphical icons may continue to be displayed as the user 950investigates aspects of the property via the video feeds provided fromthe selected camera(s). Accordingly, the user may continue to navigatethe property 901 by selecting one or more different video feeds.

FIG. 11 is a contextual diagram of an example of a user interacting withthe security monitoring system 1100 using a virtual reality headset 154to investigate a loud noise in the middle of the night.

In some instances, the virtual reality headset 154 may be used toinvestigate portions of a property 1101 absent the detection of an alarmevent. For instance, a user 154 may be awakened in the middle the nightby a loud noise that came from Room A. In this example, the user 154 mayget out of bed, and obtain the virtual reality headset 154. The user 154may transmit a request to access one or more cameras 106 a, 106 b, 106c, 106 d, 106 e, 106 f, 117 a to the central monitor control unit 102 sothat the user 150 may determine the source of the noise. In response tothe user's 154 request, the user 154 may be provided with a display ofgraphical icons that each correspond to a particular camera that isassociated with the property 1101. The cameras associated with theproperty 1101 may include cameras 106 a, 106 b, . . . 106 f and/orcameras 117 a that are equipped to a robotic device 110 a.

A user 154 may select a graphical icon that corresponds to camera 106 bfrom the list of multiple graphical icons associated with the cameras ofproperty 1101. In response to the user's 154 selection, the centralmonitoring control unit 102 may instruct the camera 106 b to provide alive video feed to the user's virtual reality headset 154.Alternatively, or in addition, the central monitoring control unit 154may instruct the camera 106 b to sync with the user's 150 virtualreality headset 154. When synced, movements of the user's 150 virtualreality headset 154 may also move 1105 the camera 106 b. For instance,the user 150 may move 1105 the camera 106 b around to view differentaspects of Room A. Using the virtual reality headset 154, the user maydiscover that the source of the crash that caused the user 150 to awakenin the middle of the night was merely a vase 1110 that had fallen off ashelf and shattered.

Alternatively, or in addition, the user 150 may interact with the userinterface of the virtual reality headset 154 to instruct a roboticdevice 110 a with a camera 117 a to further investigate the crash inRoom A. The camera 117 a of robotic device 110 a may similarly be syncedto the movements of the virtual reality headset 154. The user 150 maydirect the camera of the robotic device 110 a to focus on the shatteredpieces of the vase 1110 on the floor of Room A. Thus, the user canconfirm, from the safety of the user's 150 bedroom that the property1101 is clear of intruders.

The term “data processing apparatus” encompasses all kinds of apparatus,devices, and machines for processing data, including by way of example aprogrammable processor, a computer, or multiple processors or computers.The apparatus can include special purpose logic circuitry, e.g., an FPGA(field programmable gate array) or an ASIC (application specificintegrated circuit). The apparatus can also include, in addition tohardware, code that creates an execution environment for the computerprogram in question, e.g., code that constitutes processor firmware, aprotocol stack, a database management system, an operating system, or acombination of one or more of them.

A computer program (which may also be referred to or described as aprogram, software, a software application, a module, a software module,a script, or code) can be written in any form of programming language,including compiled or interpreted languages, or declarative orprocedural languages, and it can be deployed in any form, including as astandalone program or as a module, component, subroutine, or other unitsuitable for use in a computing environment. A computer program may, butneed not, correspond to a file in a file system. A program can be storedin a portion of a file that holds other programs or data (e.g., one ormore scripts stored in a markup language document), in a single filededicated to the program in question, or in multiple coordinated files(e.g., files that store one or more modules, sub programs, or portionsof code). A computer program can be deployed to be executed on onecomputer or on multiple computers that are located at one site ordistributed across multiple sites and interconnected by a communicationnetwork.

The processes and logic flows described in this specification can beperformed by one or more programmable computers executing one or morecomputer programs to perform functions by operating on input data andgenerating output. The processes and logic flows can also be performedby, and apparatus can also be implemented as, special purpose logiccircuitry, e.g., an FPGA (field programmable gate array) or an ASIC(application specific integrated circuit).

Computers suitable for the execution of a computer program include, byway of example, can be based on general or special purposemicroprocessors or both, or any other kind of central processing unit.Generally, a central processing unit will receive instructions and datafrom a read-only memory or a random access memory or both. The essentialelements of a computer are a central processing unit for performing orexecuting instructions and one or more memory devices for storinginstructions and data. Generally, a computer will also include, or beoperatively coupled to receive data from or transfer data to, or both,one or more mass storage devices for storing data, e.g., magnetic,magneto optical disks, or optical disks. However, a computer need nothave such devices. Moreover, a computer can be embedded in anotherdevice, e.g., a mobile telephone, a personal digital assistant (PDA), amobile audio or video player, a game console, a Global PositioningSystem (GPS) receiver, or a portable storage device (e.g., a universalserial bus (USB) flash drive), to name just a few.

Computer readable media suitable for storing computer programinstructions and data include all forms of nonvolatile memory, media andmemory devices, including by way of example semiconductor memorydevices, e.g., EPROM, EEPROM, and flash memory devices; magnetic disks,e.g., internal hard disks or removable disks; magneto optical disks; andCD-ROM and DVD-ROM disks. The processor and the memory can besupplemented by, or incorporated in, special purpose logic circuitry.

To provide for interaction with a user, embodiments of the subjectmatter described in this specification can be implemented on a computerhaving a display device, e.g., a CRT (cathode ray tube) or LCD (liquidcrystal display) monitor, for displaying information to the user and akeyboard and a pointing device, e.g., a mouse or a trackball, by whichthe user can provide input to the computer. Other kinds of devices canbe used to provide for interaction with a user as well; for example,feedback provided to the user can be any form of sensory feedback, e.g.,visual feedback, auditory feedback, or tactile feedback; and input fromthe user can be received in any form, including acoustic, speech, ortactile input. In addition, a computer can interact with a user bysending documents to and receiving documents from a device that is usedby the user; for example, by sending web pages to a web browser on auser's client device in response to requests received from the webbrowser.

Embodiments of the subject matter described in this specification can beimplemented in a computing system that includes a back end component,e.g., as a data server, or that includes a middleware component, e.g.,an application server, or that includes a front end component, e.g., aclient computer having a graphical user interface or a Web browserthrough which a user can interact with an implementation of the subjectmatter described in this specification, or any combination of one ormore such back end, middleware, or front end components. The componentsof the system can be interconnected by any form or medium of digitaldata communication, e.g., a communication network. Examples ofcommunication networks include a local area network (“LAN”) and a widearea network (“WAN”), e.g., the Internet.

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other.

While this specification contains many specific implementation details,these should not be construed as limitations on the scope of what may beclaimed, but rather as descriptions of features that may be specific toparticular embodiments. Certain features that are described in thisspecification in the context of separate embodiments can also beimplemented in combination in a single embodiment. Conversely, variousfeatures that are described in the context of a single embodiment canalso be implemented in multiple embodiments separately or in anysuitable subcombination. Moreover, although features may be describedabove as acting in certain combinations and even initially claimed assuch, one or more features from a claimed combination can in some casesbe excised from the combination, and the claimed combination may bedirected to a subcombination or variation of a subcombination.

Similarly, while operations are depicted in the drawings in a particularorder, this should not be understood as requiring that such operationsbe performed in the particular order shown or in sequential order, orthat all illustrated operations be performed, to achieve desirableresults. In certain circumstances, multitasking and parallel processingmay be advantageous. Moreover, the separation of various systemcomponents in the embodiments described above should not be understoodas requiring such separation in all embodiments, and it should beunderstood that the described program components and systems cangenerally be integrated together in a single software product orpackaged into multiple software products.

Particular embodiments of the subject matter have been described. Otherembodiments are within the scope of the following claims. For example,the actions recited in the claims can be performed in a different orderand still achieve desirable results. As one example, the processesdepicted in the accompanying figures do not necessarily require theparticular order shown, or sequential order, to achieve desirableresults. In certain implementations, multitasking and parallelprocessing may be advantageous. Other steps may be provided, or stepsmay be eliminated, from the described processes. Accordingly, otherimplementations are within the scope of the following claims.

1. A system, comprising: a virtual reality headset; a plurality ofcameras; a plurality of sensors located at different locationsthroughout a property, wherein the plurality of sensors include a firstsensor; a monitoring control unit, wherein the monitoring control unitincludes: a network interface; one or more processors; and one or morestorage devices that include instructions that are operable, whenexecuted by the one or more processors, to cause the one or moreprocessors to perform operations comprising: receiving data from thefirst sensor that is indicative of an alarm event; determining alocation of the first sensor; identifying a set of one or more camerasfrom the plurality of cameras that are associated with the first sensor;selecting a particular camera from the identified set of one or morecameras; and transmitting one or more instructions to the particularcamera that command the particular camera to stream a live video feed toa user interface of the virtual reality headset.