Light socket cameras

ABSTRACT

A security system can be used to detect adverse sounds. The security system can comprise a light socket camera that can be rotatably attached to a light socket of a building. The light socket camera can be used to detect the adverse sound, and in response to detecting the adverse sound, the light socket camera can notify a party, such as an emergency dispatcher.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/469,583; filed Aug.27, 2014; and entitled SMART LOCK SYSTEMS AND METHODS; the entirecontents of which are incorporated herein by reference. U.S.Nonprovisional patent application Ser. No. 14/469,583 claims the benefitof U.S. Provisional Patent Application No. 61/872,439; filed Aug. 30,2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference. U.S.Nonprovisional patent application Ser. No. 14/469,583 claims the benefitof and is a continuation-in-part of U.S. Nonprovisional patentapplication Ser. No. 14/099,888; filed Dec. 6, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS, which issued as U.S. Pat.No. 8,823,795 on Sep. 2, 2014; the entire contents of which areincorporated herein by reference. U.S. Nonprovisional patent applicationSer. No. 14/469,583 claims the benefit of and is a continuation-in-partof U.S. Nonprovisional patent application Ser. No. 14/142,839; filedDec. 28, 2013; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS,which issued as U.S. Pat. No. 8,842,180 on Sep. 23, 2014; the entirecontents of which are incorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/275,811; filed May12, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference. U.S.Nonprovisional patent application Ser. No. 14/275,811 claims the benefitof and is a continuation-in-part of U.S. Nonprovisional patentapplication Ser. No. 14/098,772; filed Dec. 6, 2013; and entitledDOORBELL COMMUNICATION SYSTEMS AND METHODS, which issued as U.S. Pat.No. 8,780,201 on Jul. 15, 2014; the entire contents of which areincorporated herein by reference. U.S. Nonprovisional patent applicationSer. No. 14/275,811 claims the benefit of U.S. Provisional PatentApplication No. 61/859,070; filed Jul. 26, 2013; and entitled DOORBELLCOMMUNICATION SYSTEMS AND METHODS; the entire contents of which areincorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/463,548; filed Aug.19, 2014; and entitled DOORBELL COMMUNICATION SYSTEMS AND METHODS; theentire contents of which are incorporated herein by reference.

This application claims the benefit of U.S. Provisional PatentApplication No. 62/039,394; filed Aug. 19, 2014; and entitled LIGHTSOCKET CAMERAS; and U.S. Provisional Patent Application No. 62/018,605;filed Jun. 29, 2014; and entitled LIGHT SOCKET CAMERAS; the entirecontents of which are incorporated herein by reference.

This application claims the benefit of and is a continuation-in-part ofU.S. Nonprovisional patent application Ser. No. 14/534,588; filed Nov.6, 2014; and entitled LIGHT SOCKET CAMERAS; the entire contents of whichare incorporated herein by reference.

BACKGROUND

1. Technical Field

Various embodiments disclosed herein relate to devices and methods thatenable people to observe remote locations. Certain embodiments relate tousing a computing device to see video taken by a remotely locatedcamera.

2. Description of Related Art

Video cameras can record images of various events that are viewable byremotely located people. Additionally, video cameras can be supported byobjects such as tripods. Furthermore, video cameras often requireelectrical power. Some video cameras receive electrical power frombatteries and/or power outlets.

SUMMARY

The disclosure describes methods for detecting an adverse sound. Themethods may include using a light socket camera to detect the adversesound. The light socket camera may be coupled to a building. The lightsocket camera may also include an outer housing comprising a proximalend, a distal end that is opposite the proximal end, and a sidewall thatextends between the proximal end and the distal end, a camera coupled tothe outer housing, whereby the camera is configured to record a video, aspeaker located within an internal portion of the outer housing, wherebythe speaker is configured to transmit an audible sound, a microphonelocated within an internal portion of the outer housing, whereby themicrophone is configured to receive an audible instruction, and a screwthread contact located adjacent the proximal end of the outer housing,whereby the screw thread contact is rotatably attached to a light socketof the building. In response to detecting the adverse sound, methods mayalso include using the light socket camera to notify a party.

In many embodiments the party is an emergency dispatcher. In someembodiments the party is a contact on a building user's contact list.

The adverse sound may be selected from the group consisting of agunshot, shouting, screaming, and breaking glass.

In response to detecting the adverse sound, methods may further includeusing the camera of the light socket camera to record one of an audioand video of an area adjacent the light socket camera. Methods mayfurther include transmitting one of the audio and video to a remotecomputing device.

In response to detecting the adverse sound, methods may further includeusing the speaker to sound an audible warning.

In response to detecting the adverse sound, methods may further includeusing the light socket camera to flash a warning light.

As well, in response to detecting the adverse sound, methods may furtherinclude using the light socket camera to determine a location of theadverse sound within the building. In response to determining thelocation of the adverse sound within the building, methods may furtherinclude transmitting a notification of the location of the adverse soundwithin the building to the party.

Methods may further include determining a type of the adverse sound. Aswell, methods may further include determining a time of day that theadverse sound was detected, and in response to determining the time ofday of the adverse sound, the method may include transmitting anotification of the time of day to the party. Methods may also includereceiving an audible message from the party and sounding, via thespeaker of the light socket camera, the audible message to an areaadjacent to the light socket camera.

The disclosure may also include a method for detecting an adverse sound.The method may include using a first light socket camera to detect asound. The first light socket camera may be coupled to a building. Thefirst light socket camera may include an outer housing comprising aproximal end, a distal end that is opposite the proximal end, and asidewall that extends between the proximal end and the distal end, acamera coupled to the outer housing, whereby the camera is configured torecord a video, a speaker located within an internal portion of theouter housing, whereby the speaker is configured to transmit an audiblesound, a microphone located within an internal portion of the outerhousing, whereby the microphone is configured to receive an audibleinstruction, and a screw thread contact located adjacent the proximalend of the outer housing, whereby the screw thread contact is rotatablyattached to a light socket. In response to detecting the adverse sound,methods may further include using the first light socket camera toinitiate an event at a second light socket camera communicativelycoupled to the first light socket camera.

As well, methods may include using the second light socket camera toemit an audible message through a speaker of the second light socketcamera and using the second light socket camera to flash a warning lightof the second light socket camera.

In response to using the second light socket camera to emit an audiblemessage and using the second light socket camera to flash the warninglight, methods may further include using a motion detector of the secondlight socket camera to detect a motion of a user within an area of thesecond light socket camera.

In some methods the event may be a first event. In response to detectingno motion via the motion detector of the second light socket camera,methods may further include using the first light socket camera toinitiate a second event at a third light socket camera communicativelycoupled to the first light socket camera.

Methods may further include determining a type of adverse sound. Aswell, some methods may include using the second light socket camera toemit an audible message through the speaker of the second light socketcamera. The audible message may include an identification of the type ofthe adverse sound.

Many methods may include determining whether the adverse sound is afirst sound or a second sound. In response to determining the adversesound is the first sound, methods may include using the first lightsocket camera to initiate a first event at the second light socketcamera. In response to determining the adverse sound is the secondsound, methods may include using the first light socket camera toinitiate a second event at the second light socket camera. The secondevent may be different than the first event.

In some methods the first event may comprise flashing a warning light ofthe second light socket camera, and the second event may comprisesounding an audible alarm.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features, aspects, and advantages are described belowwith reference to the drawings, which are intended to illustrate, butnot to limit, the invention. In the drawings, like reference charactersdenote corresponding features consistently throughout similarembodiments.

FIG. 1 a illustrates a front view of a communication system, accordingto some embodiments.

FIG. 1 b illustrates a front view of a security system, according tosome embodiments.

FIG. 2 illustrates a computing device running software, according tosome embodiments.

FIG. 3 illustrates an embodiment in which a security system is connectedto a building, according to some embodiments.

FIG. 4 illustrates a perspective view of a light socket, according tosome embodiments.

FIG. 5 illustrates a perspective view of a light bulb mechanically andelectrically coupled to a light socket, according to some embodiments.

FIG. 6 illustrates a perspective view of a security system prior to thesecurity system being mechanically and electrically coupled to the lightsocket, according to some embodiments.

FIG. 7 illustrates the security system mechanically and electricallycoupled to the light socket, according to some embodiments.

FIGS. 8 and 9 illustrate perspective views of security systems,according to some embodiments.

FIG. 10 illustrates a perspective view of electrical contacts, accordingto some embodiments.

FIG. 11 illustrates a side view of a security system with a cone-shapedmirror, according to some embodiments.

FIG. 12 illustrates a perspective view of the security system with acone-shaped mirror, according to some embodiments.

FIGS. 13 a, 13 b, 13 c, and 13 d illustrate side views of securitysystems with respective dome camera assembly, according to variousembodiments.

FIG. 13 e illustrates a top-down view of a security system with ahorizontal field of vision, according to some embodiments.

FIG. 14 illustrates a perspective view of a security system, accordingto some embodiments.

FIGS. 15 and 16 illustrate a user interface with an adjustable viewingorientation, according to some embodiments.

FIG. 17 illustrates a security system detecting a visitor, according tosome embodiments.

FIGS. 18-27 illustrate flow-charts of various methods of using asecurity system, according to various embodiments.

FIG. 28 a illustrates a security system detecting a sound, according toan embodiment.

FIGS. 28 b-28 f illustrate various responses to detecting the sound fromFIG. 28 a, according to various embodiments.

FIGS. 29 and 30 illustrate flow-charts of various methods of using asecurity system, according to various embodiments.

FIG. 31 a illustrates a security system detecting an audibleinstruction, according to an embodiment.

FIGS. 31 b-31 f illustrate various responses to detecting the audibleinstruction from FIG. 31 a, according to various embodiments.

FIGS. 32 a and 32 b illustrate various embodiments of a security system,first appliance and second appliance being located inside or outside abuilding, according to various embodiments.

FIGS. 33 a and 33 b illustrate various embodiments of a security systembeing connected to an appliance via a wireless connection and a wiredconnection, according to various embodiments.

FIG. 34 illustrates a flow-chart of a method of using a security system,according to an embodiment.

DETAILED DESCRIPTION

Although certain embodiments and examples are disclosed below, inventivesubject matter extends beyond the specifically disclosed embodiments toother alternative embodiments and/or uses, and to modifications andequivalents thereof. Thus, the scope of the claims appended hereto isnot limited by any of the particular embodiments described below. Forexample, in any method or process disclosed herein, the acts oroperations of the method or process may be performed in any suitablesequence and are not necessarily limited to any particular disclosedsequence. Various operations may be described as multiple discreteoperations in turn, in a manner that may be helpful in understandingcertain embodiments; however, the order of description should not beconstrued to imply that these operations are order dependent.Additionally, the structures, systems, and/or devices described hereinmay be embodied as integrated components or as separate components.

For purposes of comparing various embodiments, certain aspects andadvantages of these embodiments are described. Not necessarily all suchaspects or advantages are achieved by any particular embodiment. Thus,for example, various embodiments may be carried out in a manner thatachieves or optimizes one advantage or group of advantages as taughtherein without necessarily achieving other aspects or advantages as mayalso be taught or suggested herein.

System Embodiments

Communication systems can provide a secure and convenient way for aremotely located individual to see and/or communicate with a person whois within the field of vision of a camera and/or within the range of amicrophone. Communication systems can include a camera that is attachedto a light socket to couple the camera to a wall and to provideelectricity to the camera.

Some communication systems can allow an individual to hear, see, andtalk with visitors. For example, communication systems can use acomputing device to enable a remotely located person to see, hear,and/or talk with visitors. Computing devices can include computers,laptops, tablets, mobile devices, smartphones, cellular phones, andwireless devices (e.g., cars with wireless communication). Specifically,example computing devices include the iPhone, iPad, iMac, MacBook Air,and MacBook Pro made by Apple Inc. Communication between a remotelylocated person and a visitor can occur via the Internet, cellularnetworks, telecommunication networks, and wireless networks.

Referring now to FIG. 1 a, communication systems 200 can be a portion ofa smart home hub. Communication systems 200 can facilitate homeautomation. In some cases, cameras 208 are electrically coupled to alight socket of a building 300 and are integrated into a holistic homeautomation system and/or home security system. Various systems describedherein enable home surveillance and/or complete home automation. Cameras208 threadably screwed into an interior light socket can enable a remoteuser to see events inside of a building 300 (shown in FIG. 3). As well,cameras 208 threadably screwed into exterior light sockets can enable aremote user to see events outside of a building 300.

In some embodiments, the security system 202 c controls variouselectrical items in a home (e.g., lights, air conditioners, heaters,motion sensors, garage door openers, locks, televisions, computers,entertainment systems, appliances, pool monitors, elderly monitors, andthe like). In some embodiments, the computing device 204 controls thesecurity system 202 c and other electrical items in a home (e.g.,lights, air conditioners, heaters, motion sensors, garage door openers,locks, televisions, computers, entertainment systems, appliance, poolmonitors, elderly monitors, and the like).

FIG. 1 illustrates a front view of a communication system embodiment.The communication system 200 can include a security system 202 c (e.g.,a camera assembly) and a computing device 204. Although the illustratedsecurity system 202 c includes many components in one housing, severalsecurity system embodiments include components in separate housings. Thesecurity system 202 c can include a camera assembly 208. The cameraassembly 208 can include a video camera, which in some embodiments is awebcam. The camera assembly 208 can be configured to take videos of asurrounding area for viewing via the Internet. However, it should beappreciated that the camera assembly 208 can be a still camera, any typeof digital camera, virtual camera, and the like. Generally, it should beappreciated that the camera assembly 208 can be any type of camera oroptical instrument that records images that can be stored directly,transmitted to another location, or both.

Now with added reference to FIG. 1 b, the security system 202 c caninclude a proximal end 280 and a distal end 282 that is opposite theproximal end 280. The camera assembly 208 can be located at the distalend 282 of the security system 202 c. However, it should be appreciatedthat the camera assembly 208 can be positioned at any location on thesecurity system 202 c, such as the sidewall 680. The security system 202c can also include a foot contact 618 located at the proximal end 280 ofthe security system 202 c.

It should be appreciated that the security system 202 c can include morethan one camera assembly 208. For example, the security system 202 c mayinclude two cameras. In some embodiments, the security system 202 cincludes a first camera disposed at the distal end 282 of the securitysystem 202 c, and a second camera disposed along the sidewall 680 of thesecurity system 202 c. In this manner the second camera may faceperpendicular to the direction the first camera is facing. This mayallow the security system 202 c to have a larger field of vision of thearea to which the security system 202 c is monitoring.

Moreover, the security system 202 c can also include a third camera, afourth camera, and a fifth camera. The cameras can be mounted at anylocation along the security system 202 c to thereby expand the field ofvision of the security system 202 c. As well, the camera(s) 208 may beconfigured to move away from the security system 202 c and pivot alongat least two axes. The movement of the camera(s) 208 may be controlledvia manual manipulation by a person, a command from a remote computingdevice 204, automatically in response to the occurrence of an event, orthe like.

As shown in FIG. 1 a, the security system 202 c can include a diagnosticlight 216 and a power indicator light 220. In some embodiments, thediagnostic light 216 is a first color (e.g., blue) if the securitysystem 202 c and/or the communication system 200 is connected to awireless Internet network and is a second color (e.g., red) if thesecurity system 202 c and/or the communication system 200 is notconnected to a wireless Internet network. In some embodiments, the powerindicator 220 is a first color if the security system 202 c is connectedto a power source. The power source can be power supplied by thebuilding 300 to which the security system 202 c is attached. Thesecurity system 202 c can receive electricity via the light socket towhich the security system 202 c is attached. In some embodiments, thepower indicator 220 is a second color or does not emit light if thesecurity system 202 c is not connected to the power source.

The security system 202 c (e.g., a camera assembly) can include an outerhousing 634, which can be water resistant and/or waterproof. The outerhousing 634 can be made from metal or plastic, such as molded plasticwith a hardness of 60 Shore D. In some embodiments, the outer housing634 is made from brushed nickel or aluminum. The outer housing 634 canbe rigid.

Rubber seals can be used to make the outer housing 634 water resistantor waterproof. The security system 202 c can be electrically coupled toa power source, such as wires electrically connected to a building'selectrical power system. In some embodiments, the security system 202 cincludes a battery for backup and/or primary power.

As shown in FIG. 1, the security system 202 c can include a screw threadcontact 614 having a proximal end adjacent the foot contact 618 and adistal end that is opposite the proximal end. The distal end of thescrew thread contact 614 can be located adjacent the proximal end of theouter housing 634. The screw thread contact 614 can also include athreaded sidewall that extends between the proximal end and the distalend of the screw thread contact 614. In this manner, the threadedsidewall of the screw thread contact 614 can be configured to rotatablyattach to the light socket 650.

The security system can include lights 626, which can be LED lightsconfigured to illuminate a room and/or an outdoor area. In someembodiments, the lights 626 can provide at least 10 lumens, at least1,000 lumens, at least 4,000 lumens, and/or less than 40,000 lumens. Thelights 626 can be aligned such that the lights 626 are parallel to acentral axis 266 of a screw thread contact 614. The lights 626 can beoriented such that they face away from the foot contact 618.

As well, the security system 202 c can include lights 630, which can beinfrared lights. The lights 630 can illuminate an area in front of thecamera assembly's 208 field of vision to enable the camera assembly 208to capture easily viewable and high-quality video. In this regard, thelights 630 can be located at the distal end 282 of the security system202 c, adjacent to the camera assembly 208. Infrared light can besuitable for nighttime video recording. In some embodiments the securitysystem 202 c includes a photosensor and/or a photodetector to determinewhether the field of vision of the camera assembly 208 is illuminated.In response to determining that the field of vision is not illuminated,the security system 202 c can illuminate the light and use the cameraassembly 208 to record a video of the visitor. It should be appreciatedthat the security system 202 c can include any type of sensor configuredto determine an amount of light, such as a reverse-biased light emittingdiode (LED), photovoltaic cell, photodiode, ultraviolet light sensor,and the like.

The lights 626 and 630 can be controlled by any number of means. Forexample, the security system 202 c can be configured to receive a firstinstruction from the remote computing device 204. The first instructioncan include a command to illuminate either or both of the lights 626and/or 630. In response to receiving the first instruction from theremote computing device 204, the security system 202 c can illuminatethe lights 626 and/or 630. As well, the security system 202 c canreceive a second instruction from the remote computing device 204. Thesecond instruction can include a command to de-activate the lights 626and/or 630. Accordingly, in response to receiving the second instructionfrom the remote computing device 204, the security system 202 c cande-activate the lights 626 and/or 630.

The security system 202 c can also be configured to illuminate andde-activate the lights 626 and/or 630 in a number of different manners.For example, the security system 202 c can be configured to receive anaudible instruction via the microphone 234 of the security system 202 c.The audible instruction can be a spoken command by the visitor tothereby illuminate and/or de-activate the lights 626 and/or 630. Forexample, the audible instruction can be the visitor saying, “Turn lightson,” “Illuminate lights,” “Lights off,” “Dim lights,” and the like.Generally, the audible instruction can be any spoken command or noisefrom the visitor, which is thereby received by the security system 202 cto illuminate the lights. Accordingly, in response to receiving theaudible instruction from the visitor, the security system 202 c canilluminate or de-activate the lights 626 and/or 630.

As well, the security system 202 c can include a communication module262 configured to enable wireless communication with the computingdevice 204. The communication module 262 can include a WiFi antenna andcan be configured to enable the security system 202 c to connect to awireless network 308 of a building 300 (shown in FIG. 3).

Wireless communication 230 can enable the security system 202 c (e.g., acamera assembly) to communicate with the computing device 204.Accordingly, the security system 202 c may include a communicationmodule 262 located within an internal portion of the outer housing 634.The communication module 262 may be configured to connect to a wirelesscommunication network. Some embodiments enable communication viacellular and/or WiFi networks. Some embodiments enable communication viathe Internet. Several embodiments enable wired communication between thesecurity system 202 c and the computing device 204. The wirelesscommunication 230 can include the following communication means: radio,WiFi (e.g., wireless local area network), cellular, Internet, Bluetooth,telecommunication, electromagnetic, infrared, light, sonic, andmicrowave. Other communication means are used by some embodiments. Insome embodiments, such as embodiments that include telecommunication orcellular communication means, the security system 202 c can initiatevoice calls or transmit text messages to a computing device 204 (e.g., asmartphone, a desktop computer, a tablet computer, a laptop computer).

Several embodiments use near field communication (NFC) to communicatebetween the computing device 204 and the security system 202 c. Thesecurity system 202 c and/or the computing device 204 can include a NFCtag. Some NFC technologies include Bluetooth, radio-frequencyidentification, and QR codes.

Several embodiments include wireless charging (e.g., near fieldcharging, inductive charging) to supply power to and/or from thesecurity system 202 c and the computing device 204. Some embodiments useinductive charging (e.g., using an electromagnetic field to transferenergy between two objects).

Some embodiments include computer software (e.g., application software),which can be a mobile application designed to run on smartphones, tabletcomputers, and other mobile devices. Software of this nature issometimes referred to as “app” software. In some embodiments thecomputer software includes software designed to run on desktop computersand laptop computers.

The computing device 204 can run software with a graphical userinterface. The user interface can include icons or buttons. In someembodiments, the software is configured for use with a touch-screencomputing device such as a smartphone or tablet.

The security system 202 c can include a motion detector 218 configuredto detect the presence of people (e.g., in the outdoor area or room inwhich the security system 202 c is located) or objects. The securitysystem 202 c can also be placed outdoors to detect people or objectsoutside. The motion detector 218 can be an infrared motion detector.

As illustrated in FIGS. 6-10, the security system 202 c can be attachedto a light socket 650 to couple the security system 202 c to anelectrical power source (e.g., of a building 300 shown in FIG. 3). Thesecurity system 202 c can include a screw thread electrical contact 614,which can comprise a conductive metal. The security system 202 c canalso include a foot electrical contact 618, which can comprise aconductive metal. The screw thread contact 614 can be electricallyinsulated from the foot electrical contact 618 by insulation 638.

The security system 202 c can be coupled to the light socket 650 via anynumber of connection methods. For example, the screw thread contact 614of the security system 202 c can be rotatably attached to the lightsocket 650 to thereby couple the security system 202 c to the lightsocket 650. When the security system 202 c is coupled to the lightsocket 650, the foot contact 618 of the security system 202 c can beelectrically coupled to the foot contact 654 of the light socket 650, tothereby couple the security system 202 c to the electrical power source(i.e. to energize the security system 202 c).

A power converter 610 can be electrically coupled to the screw threadcontact 614 and the foot contact 618. The power converter 610 can beconfigured to convert electricity from the building 300 (shown in FIG.3) to a type of power that is more suitable for the security system 202c. In some embodiments, the power converter 610 converts an inputvoltage to a lower voltage and/or converts AC to DC power. Furthermore,it should be appreciated that the power converter 610 can be configuredto adapt to the input voltages of any country, and thereby convert theinput voltage to a voltage suited for the security system 202 c.

FIG. 2 illustrates a computing device 204 running software. The softwareincludes a user interface 240 displayed on a display screen 242. Theuser interface 240 can include a security system indicator 244, whichcan indicate the location of the security system that the user interfaceis displaying. For example, a person can use one computing device 204 tocontrol and/or interact with multiple security systems, such as onesecurity system located at a front door and another security systemlocated at a back door. Selecting the security system indicator 244 canallow the user to choose another security system (e.g., the back doorsecurity system rather than the front door security system).

The user interface 240 can include a connectivity indicator 248. In someembodiments, the connectivity indicator can indicate whether thecomputing device is in communication with a security system, theInternet, and/or a cellular network. The connectivity indicator 248 canalert the user if the computing device 204 has lost its connection withthe security system 202 c; the security system 202 c has been damaged;the security system 202 c has been stolen; the security system 202 c hasbeen removed from its mounting location; the security system 202 c haslost electrical power; and/or if the computing device 204 cannotcommunicate with the security system 202 c. In some embodiments, theconnectivity indicator 248 alerts the user of the computing device 204by flashing, emitting a sound, displaying a message, and/or displaying asymbol.

Referring now to FIG. 1 a, in some embodiments, if the security system202 c loses power, loses connectivity to the computing device 204, losesconnectivity to the Internet, and/or loses connectivity to a remoteserver, a remote server 206 transmits an alert (e.g., phone call, textmessage, image on the user interface 240) regarding the power and/orconnectivity issue. In several embodiments, the remote server 206 canmanage communication between the security system 202 c and the computingdevice 204. In some embodiments, information from the security system202 c is stored by the remote server 206. In several embodiments,information from the security system 202 c is stored by the remoteserver 206 until the information can be sent to the computing device204, uploaded to the computing device 204, and/or displayed to theremotely located person via the computing device 204. The remote server206 can be a computing device that stores information from the securitysystem 202 c and/or from the computing device 204. In some embodiments,the remote server 206 is located in a data center.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202 c. If thecomputing device 204 and/or the remote server 206 is unable tocommunicate with the security system 202 c, the computing device 204and/or the remote server 206 alerts the remotely located person via thesoftware, phone, text, a displayed message, and/or a website.

In some embodiments, the computing device 204 and/or the remote server206 attempts to communicate with the security system 202 c periodically;at least every five hours and/or less frequently than every 10 minutes;at least every 24 hours and/or less frequently than every 60 minutes; orat least every hour and/or less frequently than every second.

In some embodiments, the server 206 can initiate communication to thecomputer device 204 and/or to the security system 202 c. In severalembodiments, the server 206 can initiate, control, and/or blockcommunication between the computing device 204 and the security system202 c.

In several embodiments, a user can log in to an “app,” website, and/orsoftware on a computing device (e.g., mobile computing device,smartphone, tablet, desktop computer) to adjust the security systemsettings discussed herein.

In some embodiments, a computing device can enable a user to watch livevideo and/or hear live audio from a security system due to the user'srequest rather than due to actions of a visitor. Some embodimentsinclude a computing device initiating a live video feed (or a video feedthat is less than five minutes old).

Referring now to FIG. 2, in some embodiments, the user interface 240displays an image 252 such as a still image or a video of an area nearand/or in front of the security system 202 c. The image 252 can be takenby the camera assembly 208 and stored by the security system 202 c,server 206, and/or computing device 204. The user interface 240 caninclude a recording button 256 to enable a user to record images,videos, and/or sound from the camera assembly 208, microphone of thesecurity system 202 c, and/or microphone of the computing device 204.

In several embodiments, the user interface 240 includes a picture button260 to allow the user to take still pictures and/or videos of the areanear and/or in front of the security system 202 c. The user interface240 can also include a sound adjustment button 264 and a mute button268. The user interface 240 can include camera manipulation buttons suchas zoom, pan, and light adjustment buttons. In some embodiments, thecamera assembly 208 automatically adjusts between Day Mode and NightMode. Some embodiments include an infrared camera and/or infrared lightsto illuminate an area near the security system 202 c to enable thecamera assembly 208 to provide sufficient visibility (even at night).

In some embodiments, buttons include diverse means of selecting variousoptions, features, and functions. Buttons can be selected by mouseclicks, keyboard commands, or touching a touch screen. Many embodimentsinclude buttons that can be selected without touch screens.

In some embodiments, the user interface 240 includes a quality selectionbutton, which can allow a user to select the quality and/or amount ofdata transmitted from the security system 202 c to the computing device204 and/or from the computing device 204 to the security system 202 c.

In some embodiments, video can be sent to and/or received from thecomputing device 204 using video chat protocols such as FaceTime (byApple Inc.) or Skype (by Microsoft Corporation). In some embodiments,these videos are played by videoconferencing apps on the computingdevice 204 instead of being played by the user interface 240.

As shown in FIG. 2, the user interface 240 can include a terminationbutton 276 to end communication between the security system 202 c andthe computing device 204. In some embodiments, the termination button276 ends the ability of the person located near the security system 202c (i.e., the visitor) to hear and/or see the user of the computingdevice 204, but does not end the ability of the user of the computingdevice 204 to hear and/or see the person located near the securitysystem 202 c.

In some embodiments, a button 276 is both an answer button (to accept acommunication request from a visitor) and a termination button (to endcommunication between the security system 202 c and the computing device204). The button 276 can include the word “Answer” when the system isattempting to establish two-way communication between the visitor andthe user. Selecting the button 276 when the system is attempting toestablish two-way communication between the visitor and the user canstart two-way communication. The button 276 can include the words “EndCall” during two-way communication between the visitor and the user.Selecting the button 276 during two-way communication between thevisitor and the user can terminate two-way communication. In someembodiments, terminating two-way communication still enables the user tosee and hear the visitor. In some embodiments, terminating two-waycommunication causes the computing device 204 to stop showing video fromthe security system and to stop emitting sounds recorded by the securitysystem.

In some embodiments, the user interface 240 opens as soon as thesecurity system 202 c detects a visitor (e.g., senses indications of avisitor). Once the user interface 240 opens, the user can see and/orhear the visitor. The security system 202 c can include a microphone 234and a speaker 236 to enable the user to hear the visitor and to enablethe visitor to hear the user. In this regard, the speaker 236 may beconfigured to transmit an audible message to the visitor and themicrophone 234 may be configured to receive an audible message from thevisitor. In some embodiments the speaker 236 and microphone 234 arelocated within an internal portion of the outer housing 634. However, inother embodiments, the speaker 236 and microphone 234 are located alongan external surface of the outer housing 634. Thus, the security system202 c can enable the user to communicate with the visitor.

Some method embodiments include detecting a visitor with a securitysystem. The methods can include causing the user interface 240 (shown inFIG. 2) to display on a remote computing device 204 due to the detectionof the visitor (e.g., with or without user interaction). The methods caninclude displaying video from the security system and/or audio from thesecurity system.

In some embodiments, the software includes means to start the video feedon demand. For example, a user of the computing device might wonder whatis happening near the security system 202 c. The user can open thesoftware application on the computing device 204 and instruct theapplication to show live video and/or audio from the security device 202c even if no event near the security system 202 c has triggered thecommunication.

In several embodiments, the security device 202 c can be configured torecord video, images, and/or audio when the security device 202 cdetects movement and/or the presence of a person. The user of thecomputing device 204 can later review all video, image, and/or audiorecords when the security device 202 c detected movement and/or thepresence of a person.

Referring now to FIG. 1 a, in some embodiments, the server 206 controlscommunication between the computing device 204 and the security system202 c, which can include a camera, a microphone, and a speaker. Inseveral embodiments, the server 206 does not control communicationbetween the computing device 204 and the security system 202 c.

In some embodiments, data captured by the security system and/or thecomputing device 204 (such as videos, pictures, and audio) is stored byanother remote device such as the server 206. Cloud storage, enterprisestorage, and/or networked enterprise storage can be used to store video,pictures, and/or audio from the communication system 200 or from anypart of the communication system 200. The user can download and/orstream stored data and/or storage video, pictures, and/or audio. Forexample, a user can record visitors for a year and then later can reviewthe visits from the last year. In some embodiments, remote storage, theserver 206, the computing device 204, and/or the security system 202 ccan store information and statistics regarding visitors and usage.

The communication system 200 can include the security system 202 c, thecomputing device 204, and/or the server 206. Some communication systemsuse many systems to enable communication between the security system 202c and the computing device 204.

FIG. 3 illustrates an embodiment in which a security system 202 c isconnected to a building 300, which can include an entryway 310 that hasa door 254. Electrical wires 304 can electrically couple the securitysystem 202 c to the electrical system of the building 300 such that thesecurity system 202 c can receive electrical power from the building 300(e.g., via a light socket that is attached to the building 300).

A wireless network 308 can allow devices to wirelessly access theInternet. The security system 202 c can access the Internet via thewireless network 308. The wireless network 308 can transmit data fromthe security system 202 c to the Internet, which can transmit the datato remotely located computing devices 204. The Internet and wirelessnetworks can transmit data from remotely located computing devices 204to the security system 202 c. In some embodiments, a security system 202c connects to a home's WiFi.

As illustrated in FIG. 3, one computing device 204 (e.g., a laptop, asmartphone, a mobile computing device, a television) can communicatewith multiple security systems 202 c. In some embodiments, multiplecomputing devices 204 can communicate with one security system 202 c.

In some embodiments, the security system 202 c can communicate (e.g.,wirelessly 230) with a television 306, which can be a smart television.Users can view the television 306 to see a visitor and/or talk with thevisitor.

As well, in some embodiments, the visitor and user of the remotecomputing device 204 are able to talk with each other, via the securitysystem 202 c and the remote computing device 204. For example, thesecurity system 202 c may be configured to transmit a first audiblemessage to the visitor. The first audible message may be received by amicrophone in the remote computing device 204 and transmitted to thesecurity system 202 c. In this regard, the first audible message may beaudibly transmitted to the visitor via the speaker 236 in the securitysystem 202 c. As well, the security system may be configured to transmita second audible message to a user of the remote computing device 202 c.The second audible message may be received by the microphone 234 in thesecurity system 202 c and transmitted to the remote computing device. Inthis regard, the second audible message may audibly transmitted to theuser via a speaker in the remote computing device 204.

FIG. 4 illustrates a perspective view of a light socket 650. The lightsocket 650 can include a screw thread contact 652 configured tomechanically and electrically couple with the screw thread contact 614of the security system 202 c (shown in FIG. 1 a). The light socket 650can also include a foot contact 654 configured to electrically couplewith the foot contact 618 of the security system 202 c (shown in FIG. 1a). The foot contact 654 of the light socket 650 can be located at thedistal end of the light socket 650.

In some embodiments, the security system 202 c can be described ashaving a proximal end and a distal end that is opposite the proximalend. The camera assembly 208 can be located at the distal end of thesecurity system 202 c. The security system 202 c can include the footelectrical contact 618 located at the proximal end of the securitysystem 202 c. In order to energize the security system 202 c, thesecurity system 202 c can be oriented such that the foot electricalcontact 618 faces the foot contact 654 of the light socket 650. In thismanner the distal end of the security system 202 c faces away from thefoot contact 654 of the light socket 650. As well, the camera assembly608 can face away from the foot contact 654 of the light socket 650.Once the security system 202 c is oriented in this manner, the securitysystem 202 c can be attached to the light socket 650.

In some embodiments, the security system 202 c is rotated as it isattached to the light socket 650. As shown in FIG. 6, the securitysystem 202 c can be rotated in a direction of rotation 690 about a firstaxis 266 to thereby attach the security system 202 c to the light socket650. As such, the foot contact 654 of the light socket 650 can beelectrically coupled to the security system 202 c. Furthermore, in manyembodiments the foot contact 654 of the light socket 650 is electricallycoupled to a light switch (not shown). In this manner, the foot contact654 of the light socket 650, and the foot contact 618 of the securitysystem 202 c can be energized, when the light switch is activated (i.e.turned on).

FIG. 5 illustrates a perspective view of a light bulb 656 mechanicallyand electrically coupled to the light socket 650. The light bulb 656 canbe removed and replaced by a security system that comprises lights and acamera.

FIG. 6 illustrates a perspective view of the security system 202 c justbefore the security system 202 c is screwed into the light socket 650 tomechanically couple the security system 202 c to a wall and/or to abuilding 300. Screwing the security system 202 c into the light socket650 also enables the security system 202 c to receive electricity fromthe building 300 (shown in FIG. 3).

FIG. 7 a illustrates the security system 202 c screwed into the lightsocket 650. In this configuration, the security system 202 c iselectrically coupled to a power supply of the building 300. The lightsocket 650 can be located indoors or outdoors.

FIG. 8 illustrates a perspective view of the security system 202 c. Notall of the lights 626, 630 are labeled to clarify other features. Thecamera assembly 208 can be aligned with a central axis 266 of the screwthread contact 614. The camera assembly 208 can include a fisheye lens.The camera assembly 208 can also include a cone-shaped mirror to enableviewing 360 degrees around the camera and/or around the outer housing634. Software can be used to convert videos and/or pictures taken usingthe cone-shaped mirror into different formats (e.g., that are easier forusers to interpret and/or include less distortion).

FIGS. 9 and 10 illustrate a security system 202 d that can include anyof the features described in the context of the security system 202 cshown in FIGS. 1 a, 1 b and 3-8. The security system 202 d, as shown inFIG. 9, can also be configured to screw into the light socket 650. Inthis manner, the security system 202 d can be rotated in a direction ofrotation 690 about a first axis 266 to thereby attach the securitysystem 202 d to the light socket 650. The security system 202 d caninclude a camera assembly 208 d that faces a radial direction that isperpendicular to the first axis 266.

As shown in FIG. 9, the security system 202 d can include a motiondetector 218 d configured to detect visitors (e.g., people movingoutside of a building 300, people moving inside of a room). The motiondetector 218 d can be located at the distal end of the security system202 c such that the motion detector 218 d faces away from the footcontact 618 of the security system 202 c.

Furthermore, the security system 202 d can include a rotatable camerahousing 658. A camera assembly 208 d can be coupled to the rotatablecamera housing 658 such that the camera assembly 208 d rotates aroundthe perimeter of the outer housing 634 of the security system 202 d asthe camera housing 658 rotates around the perimeter of the outer housing634. The camera housing 658 can rotate around a central axis 266 of thescrew thread contact 614.

In some embodiments, the camera housing 658 can rotate in response to anevent, such as a person entering a room, outdoor area, or space adjacentto the security system 202 c. For example, the motion detector 218 d candetect the person(s), such as the visitor(s), and in response to themotion detector 218 d detecting the person(s), the security system 202 ccan cause the camera housing 658 to rotate to a position whereby thecamera assembly 208 can record an image and/or video of the person(s).

The camera housing 658 can be rotated via any number of rotationmethods. In some embodiments, the rotation of the camera housing 658 iscaused by a command from a remote computing device, such as a smartphone, tablet, or other cellular device. For example, a user of theremote computing device can input a command into an app that is run onthe remote computing device. The command can then be transmitted fromthe remote computing device to the security system 202 c, to therebyrotate the camera housing 658.

Describing the camera housing 658 differently, the sidewall 680 of thesecurity system 202 c can comprise a first portion, such as an outerhousing 634, and a second portion, such as a rotatable camera housing658, which is distal to the first portion. The second portion, orrotatable camera housing 658, can be rotatable about the first axis 266.The camera housing 658 can be manually rotated by the user. For example,the user can grip the camera housing 658 with his or her hand and rotatethe camera housing 658 to a desired position. As well, the camerahousing 658 can be rotated by the security system 202 c, such as, inresponse to an event. For example, when the security system 202 cdetects the visitor, via the motion detector 218 d, the security system202 c can then determine whether the visitor is located within a fieldof vision of the camera 208. Accordingly, in response to determiningthat the visitor is not located within the field of vision of the camera208, the security system 202 c can rotate the second portion, or camerahousing 658. Furthermore, the security system 202 c can rotate thecamera 208 about the first axis until 266 the visitor is within a fieldof vision of the camera 208.

Additionally, the security system 202 c may be configured to receive aninstruction from a remote computing device 204. The instruction mayinclude a command to rotate the second portion, or camera housing 658,to any location as determined by the user of the remote computing device204. Accordingly, in response to receiving the instruction from theremote computing device 204, the security system 202 c may be configuredto rotate the second portion such that the camera 208 rotates about thefirst axis 266. As such, the user of the remote computing device 204 maybe able to remotely rotate the camera housing 658 to thereby change thefield of vision of the camera 208.

The security system 202 d can use a microphone 234 to listen forvisitors. When the security system 202 d detects visitors (e.g., viamotion or sound), the security system 202 d can turn on LED lights 626,record sounds from the visitors, and/or take videos of the visitors. Insome embodiments, the security system 202 d records when visitors moveby the security system 202 d.

FIG. 10 illustrates a perspective view of electrical contacts.Connecting the security system 202 d to the light socket 650 can enablethe security system 202 d to be electrically connected to a powersupply.

FIG. 11 illustrates a side view of a security system 202 c with acone-shaped mirror 670. Supports 662 can extend from an end of thesecurity system 202 c that is opposite an end that includes the screwthread contacts 614 (labeled in FIG. 12).

FIG. 12 illustrates a perspective view of the security system with acone-shaped mirror 670. The camera assembly 208 can include a camerathat is oriented towards the cone-shaped mirror to enable the securitysystem 202 c to record visitors in many directions around the securitysystem 202 c. Software can be used by the security system 202 c, theremote computing device 204, and/or the server 206 to reduce and/oreliminate distortion in pictures taken using the security system 202 c.

FIG. 13 a illustrates a side view of a security system 202 e with a domecamera assembly 208 e. The dome camera assembly 208 e can have a shapethat is half of a sphere. In some embodiments, the dome camera assembly208 e includes an outer cover 228 that has a curved and/or sphericalshape (e.g., half of a sphere). The cover 228 can be a translucentmaterial such as plastic and/or polycarbonate.

The field of vision 238 of the dome camera assembly 208 e can includehalf of a sphere. In some embodiments, the field of vision 238 includesapproximately 360 degrees around the base of the cover 228 and/or arounda central axis 266 of the screw thread contacts 614. In severalembodiments, the field of vision 238 includes at least 330 degreesaround the base of the cover 228. In some embodiments, the field ofvision 238 is approximately 180 degrees in a plane that includes thecentral axis 266 of the screw thread contacts 614 (e.g., in the planerepresented by the page on which FIG. 13 a appears). In severalembodiments, the field of vision 238 is at least 140 degrees and/or lessthan 260 degrees in a plane that includes the central axis 266.

FIGS. 13 b-13 e further illustrate the field of vision in variousembodiments. With specific reference to FIG. 13 b, the field of vision238 g can be defined by a vertical field of vision 692 g and ahorizontal field of vision 694 g. The vertical field of vision 692 g canbe any angle less than 180 degrees (as shown by the distal plane 693),such as 140 degrees. Because FIGS. 13 b-13 e are side views, thehorizontal field of vision 692 g and the vertical field of vision 694 gare actually radial, meaning that they extend 360 degrees around theperimeter of the camera assembly 208 g. This 360 degree periphery isfurther illustrated in FIG. 13 e. FIG. 13 e is a top down view, lookingfrom above the security system (when it is mounted to the light socket650) to the ground below the security system. FIG. 13 e shows that thehorizontal field of vision 694, 694 g actually covers 360 degrees aroundthe perimeter of the security system and the axis 266. While thevertical field of vision is not illustrated in FIG. 13 e, the verticalfield of vision is also radial, in that it covers the 360 degree areaaround the security system.

The security system 202 h illustrated in FIG. 13 c may define a 180degree vertical field of vision, which means that the camera assembly208 h is able to see anything that is level with or below the distalplane 693.

Furthermore, as shown in FIG. 13 d, the security system 202 j may beconfigured to achieve a vertical field of vision 692 j that is greaterthan 180 degrees. For example, some embodiments may have a verticalfield of vision equal to at least 250 degrees, up to 250 degrees, up to280 degrees, and in some embodiments, up to 300 degrees. (It should beappreciated that in some embodiments that utilize multiple cameras, avertical field of vision of up to 360 degrees may be achieved.) In theembodiment shown in FIG. 13 d, to accomplish a vertical field of visiongreater than 180 degrees, the camera assembly 208 j may be configured tomove vertically downward. Specifically, the camera assembly 208 j may beconfigured to move along a camera assembly direction of movement 209 j,as shown in FIG. 13 d. In this regard, the camera assembly 208 j maythereby gain separation from the distal end of the security system 202j. This may allow the camera assembly 208 j to achieve a greater line ofsight past the sidewalls in the upward, or proximal, direction.

It should be appreciated that various methods may be used to retain thecamera assembly 208 h at various locations along the camera assemblydirection of movement 209 h. In some embodiments, the camera assembly208 h may be configured to engage mechanical latches to secure thecamera assembly 208 h at discrete locations along the direction ofmovement 209 h. In some embodiments, the camera assembly 208 h may beconfigured to be retained at any location along the direction ofmovement 209 h via friction. In some embodiments, the camera assembly208 h may be threadably engaged and disengaged at various locationsalong the direction of movement 209 h. As well, once the camera assembly208 h has been moved to its desired vertical position, the cameraassembly 208 h is still thereby mechanically and electrically coupled tothe security system.

As well, it should be appreciated that the camera assembly 208 h may bevertically moved along the direction of movement 209 h in response toany command or manual movement. For example, the camera assembly 208 hmay be moved in response to a command from a remote computing device204. As well, the camera assembly 208 h may be moved along the directionof movement 209 h in response to detecting a visitor. For example, thecamera assembly 208 h may be positioned in a retracted position, wherebythe camera assembly 208 h is located substantially within the securitysystem as shown in FIGS. 13 c and 13 d. Accordingly, in response to themotion detector 218 detecting a visitor, the camera assembly 208 h maythen move to an extended position (as shown in FIG. 13 d) to capture agreater vertical field of vision than in the retracted position.Moreover, the camera assembly 208 h may be manually moved by a user.

FIG. 14 illustrates a perspective view of the security system 202 e fromFIG. 13 a. The dome camera assembly 208 e can be used with any of thesecurity systems described herein. The security system 202 e can includelights (e.g., LEDs) on an end that is opposite the end that includes thescrew thread contacts 614.

Any of the security systems described herein can use the methods andsystems described in U.S. Nonprovisional patent application Ser. No.14/463,548; filed Aug. 19, 2014; and entitled DOORBELL COMMUNICATIONSYSTEMS AND METHODS; the entire contents of which are incorporatedherein by reference. For example, the grid sensor methods can be usedwith security systems 202 c, 202 d, and 202 e. The security systemembodiments described in U.S. Nonprovisional patent application Ser. No.14/463,548 can be replaced with security systems 202 c, 202 d, and 202e. Security systems 202 c, 202 d, and 202 e can be used in the contextof the security systems described in any of the patent applicationsincorporated by reference.

Viewing Perspective

Many of the camera assemblies described herein can be mounted in diverseorientations. The mounting orientations might not be ideal viewingorientations. Embodiments can include changing the viewing orientations(e.g., viewing angles) via software (e.g., an “app”) and/or via a userinterface 240 on a display screen 242 of a computing device 204 (seeFIG. 2).

Cameras can be mounted in a lamp, jutting out of a wall (e.g.,horizontally), and upside down (e.g., hanging down from a ceiling). Thesoftware and/or user interface 240 can enable users to select a buttonto adjust the viewing orientation a certain amount (e.g., 90 degrees).

FIG. 15 illustrates a user interface 240. The image 252 in FIG. 15 isoriented as a landscape, which can span entire viewing portion of thedisplay screen 242 of the remote computing device 204. The user canadjust the viewing orientation by selecting an orientation button (notshown), or simply by rotating the remote computing device 204 to theposition of the desired orientation (e.g. if you want to view portrait,just the remote computing device rotate by ninety degrees as shown inFIG. 16). Accordingly, in some embodiments, selecting the orientationbutton shifts the image 252 ninety degrees. FIG. 16 illustrates the neworientation of the image 252 after selecting the orientation button, orrotating the remote computing device 204 to the desired orientation.

In some embodiments, the security system automatically detects theorientation in which the camera is inserted into a light socket. Thesecurity system can then automatically adjust the viewing orientation inresponse to the detected orientation (e.g., so the image 252 appearsright-side up). The security system can detect the inserted orientationvia an accelerometer 274.

Visitor Identification Embodiments

Many embodiments may utilize the visitor identification abilities of theperson using the remote computing device 204 (shown in FIG. 1 a).Various technologies, however, can be used to help the user of theremote computing device 204 to identify the visitor. Some embodimentsuse automated visitor identification that does not rely on the user,some embodiments use various technologies to help the user identify thevisitor, and some embodiments display images and information (e.g., aguest name) to the user, but otherwise do not help the user identify thevisitor.

Referring now to FIG. 1 a, the camera assembly 208 can be configured tovisually identify visitors through machine vision and/or imagerecognition. For example, the camera assembly 208 can take an image ofthe visitor. Software run by any portion of the system can then compareselect facial features from the image to a facial database. In someembodiments, the select facial features include dimensions based onfacial landmarks. For example, the distance between a visitor's eyes;the triangular shape between the eyes and nose; and the width of themouth can be used to characterize a visitor and then to compare thevisitor's characterization to a database of characterization informationto match the visitor's characterization to an identity (e.g., anindividual's name, authorization status, and classification). Someembodiments use three-dimensional visitor identification methods.

Some embodiments include facial recognition such that the cameraassembly 208 waits until the camera assembly 208 has a good view of theperson located near the security system 202 c and then captures an imageof the person's face.

Several embodiments can establish a visitor's identity by detecting asignal from a device associated with the visitor (e.g., detecting thevisitor's smartphone). Examples of such a signal include Bluetooth,WiFi, RFID, NFC, and/or cellular telephone transmissions.

Furthermore, many embodiments can identify an identity of a visitor anddetermine whether the visitor is authorized to be located in apredetermined location. For example, the light socket 650 may be locatedin a room inside a building 300. The security system 202 c can determinewhether the visitor is authorized to be located in the room. In responseto determining that the visitor is not authorized to be located in theroom, the security system 202 c can transmit an alert to the remotecomputing device 204 to notify a user of the remote computing device 204that the visitor is not authorized to be located in the room.

In some embodiments, the security system 202 c may be located outside ofa building 300, for example, near a swimming pool. Accordingly, thesecurity system 202 c may be used to determine the identity of thevisitor and thereby determine whether the visitor is authorized to belocated near the swimming pool. This may allow the user to monitor theswimming pool to determine if small children and/or any otherunauthorized people approach the swimming pool. In effect, the securitysystem 202 c can be used as a safety monitor.

Furthermore, the security system 202 c can also sound an audible messageto warn the visitor that he or she is not authorized to be located inthe room or outdoor area (e.g. swimming pool). For example, in responseto determining that the visitor is not authorized to be located in theroom or outdoor area, the security system 202 c may broadcast apredetermined audible message, via the speaker 236 in the securitysystem 202 c, to notify the visitor that the visitor is not authorizedto be located in the room or outdoor area. The security system 202 c mayalso be configured to allow the user of the remote computing device 204to speak to the visitor that is not authorized to be located in the roomor outdoor area. For example, if the user's child has approached theswimming pool, the user may speak a message into the remote computingdevice 204, which may then be transmitted to the security system 202 cand sounded via the speaker in the security system 202 c (e.g. “Mitch,you are not allowed to be in the swimming pool after dark.”).

Embodiments of the security system 202 c, may also save a history oftimes when the visitor was detected in the room or outdoor area by thesecurity system 202 c. It should be appreciated that this may also beused for a variety of purposes. For example, the user may have a dogwalker walk the user's dog when the user is gone at work. In thismanner, the security system 202 c may be configured to save a history oftimes when the dog walker arrives at the building 300, which may allowthe user may be able to oversee and determine if the dog walker iswalking the user's dog as promised. This may be helpful when the userpays the dog walker's invoice. The user can review the history todetermine whether the dog walker's visits to the buildings match theinvoiced dates. The person of ordinary skill in the art will recognize avariety of situations to utilize this technology.

As well, the security system 202 c may take action in response todetermining that the visitor is authorized to be located in the room.For example, the security system 202 c may transmit a second alert tothe remote computing device 204, wherein the second alert notifies theuser of the remote computing device 204 that the visitor is located inthe room. In some embodiments, the second alert may also notify the userof the remote computing device 204 that the visitor is authorized to belocated in the room.

In order to determine the identity of the visitor, the security systemmay utilize any technology capable of identifying a person or a remotecomputing device, such as facial recognition of a visitor, near fieldcommunication of a remote computing device 204 (e.g. identifying aremote computing device 204 associated with the visitor via Bluetooth),and the like.

Methods of Detecting Visitors

It should be appreciated that this disclosure includes a variety ofmethods of using the security system to detect visitors, like thevisitor 1700 shown in FIG. 17. For example, as illustrated in FIG. 18,some methods include using the security system 202 to detect a visitor(at step 1800), and using the camera to take video of the visitor (atstep 1802). As well, some embodiments include transmitting the video toa remote computing device 204 (at step 1804) and displaying the video onthe remote computing device 204 (at step 1806). This may effectivelyallow a remote user to monitor the activity around the security system202.

As shown in FIG. 19, some methods may include orienting the securitysystem 202 such that the foot contact 618 of the security system 202faces a foot contact 654 of the light socket 650 (at step 1900). FIG. 19further illustrates a method that may include attaching the securitysystem 202 to the light socket 650 (at step 1902) and electricallycoupling foot contact 618 of the security system 202 to the foot contact654 of the light socket 650. This electrical coupling may therebyenergize the security system 202 to power all of the onboard components.

FIG. 20 shows a method that includes using the security system 202 todetermine whether the visitor is authorized to be located in a room orin a space that the security system 202 is monitoring (at step 2000). Inresponse to determining that the visitor is not authorized to be locatedin the room or the space, the method may further include using thesecurity system 202 to transmit an alert to a remote computing device204 (at step 2002). The alert may be a warning message, such as a textmessage or email, which warns the user that the unauthorized visitor islocated in the room or space. Accordingly, some methods may furtherinclude using the security system 202 to determine the identity of thevisitor, for example, via facial recognition or detecting a smart phonethrough NFC (at step 2004). As well, the identity of the visitor may beincluded in the alert that is sent to the remote user. For example, ifthe security system detects an unauthorized user, such as a toddler,near a swimming pool, the alert might say, “Timmy is located near thepool.”

As shown in FIG. 21, in response to determining that the visitor is notauthorized to be located in the room or space, such as near or in theswimming pool, some methods may further include using the securitysystem to broadcast a predetermined audible message (at step 2100).Using the example in the previous paragraph to further illustrate, whenthe security system 202 detects the toddler near the swimming pool, thesecurity system 202 might sound an audible message via the speaker 236,such as, “PLEASE MOVE AWAY FROM THE POOL!”

Various methods may enable the visitor and remote user to communicate toeach other through the security system 202. For example, some methodsmay include transmitting a first audible message to a visitor (at step2200). In execution, the first audible message may be received by amicrophone 234 in the remote computing device 204 and transmitted to thesecurity system 202. As well, the first audible message may be audiblytransmitted to the visitor via the speaker 236 in the security system202. As well, methods may include transmitting a second audible messageto a user of the remote computing device 204 (at step 2202). The secondaudible message may be received by the microphone 234 in the securitysystem 202 and transmitted to the remote computing device 204. Thesecond audible message may be audibly transmitted to the user via aspeaker 236 in the remote computing device 204.

As well, methods may include using the motion detector 218 to detect thevisitor (at step 2300) and using the security system 202 to determinewhether the field of vision of the camera is illuminated (at step 2302).In response to detecting the visitor and in response to determining thatthe field of vision is not illuminated, the method may further includeilluminating the light 626 and/or 630 and using the camera 208 to recorda video of the visitor (at step 2304).

As illustrated in FIG. 24, methods may include receiving a firstinstruction from the remote computing device (at step 2400). In responseto receiving the first instruction from the remote computing device 204,methods may include using the security system 202 to illuminate thelight (at step 2402). As well, some methods may include receiving asecond instruction from the remote computing device 204 (at step 2404).In response to receiving the second instruction from the remotecomputing device 204, methods may include using the security system 202to de-activate the light 626 and/or 630 (at step 2406). Methods may alsoinclude receiving a first audible instruction via the microphone 234 ofthe security system 202 (at step 2408), and in response to receiving thefirst audible instruction from the visitor, the method may include usingthe security system 202 to illuminate the light 626 and/or 630 (at step2410). As well, some methods may include receiving a second audibleinstruction via the microphone 234 of the security system 202 (at step2412) and in response to receiving the second audible instruction fromthe visitor, the method may include using the security system 202 tode-activate the light 626 and/or 630 (at step 2414).

FIG. 25 illustrates a method that includes orienting the security system202 such that the proximal end 280 of the security system 202 faces afoot contact 654 of a light socket 650 (at step 2500) and therebyrotating the security system 202 about a first axis 266 to therebyattach the security system 202 to the light socket 650 (at step 2502).The method may also include electrically coupling the foot contact 618of the security system 202 to the foot contact 654 of the light socket650 (at step 2504). Methods may include using the motion detector 218 todetect the visitor (at step 2506) and in response to detecting thevisitor, the methods may include using the security system 202 todetermine whether the visitor is located within a field of vision 238 ofthe camera 208 (at step 2508). In response to determining that thevisitor is not within the field of vision 238 of the camera 208, methodsmay include using the security system 202 to rotate the second portionsuch that the camera 208 rotates about the first axis 266 until thevisitor is within a field of vision 238 of the camera 208 (at step2510).

Furthermore, as shown in FIG. 26, methods may include using the securitysystem 202 to receive an instruction from a remote computing device 204(at step 2600). The instruction may comprise a command to rotate thesecond portion, or camera rotatable housing 658. In response toreceiving the instruction from the remote computing device 204, themethod may include using the security system 204 to rotate the secondportion such that the camera 208 rotates about the first axis 266 (atstep 2602). As well, as illustrated in FIG. 27, some methods may includea first and second camera, and the methods associated may therebyinclude pivoting the second camera along at least a first direction anda second direction that is perpendicular to the first direction (at step2700).

Detecting Adverse Sounds

The security system 202, or light socket camera, may also be configuredto monitor a space by audibly detecting various sounds within the space.The sounds may be adverse sounds, which may include breaking glass,gunshots, shouting, screaming, and the like. In response to detectingthe adverse sound(s) via the microphone 234, the security system 202 maybe configured to notify a party of the adverse sound(s). It should beappreciated that the adverse sound may comprise any type of sound toindicate that someone or something is in need of help, that a problemhas occurred, a crime is being committed, and the like.

As illustrated in FIGS. 28 a, 28 b, 29 and 30, the disclosure includes amethod for detecting an adverse sound 2800 (at step 2900). In responseto detecting 2801 the adverse sound 2800, the method may include usingthe security system 202 to notify a party 2804 (at step 2902). The party2804 to be notified may be any party that a user of the security system202 may wish to contact, such as the user herself, or any contact listedon the user's contact list, such as a contact list stored within theuser's remote computing device 204. As well, the party 2804 may be anemergency dispatcher, such as a 9-1-1 dispatcher (in the U.S.) or adispatcher who responds to any emergency (in the U.S. or any othercountry). Generally, it should be appreciated that the party 2804 may beany party who may be interested in the occurrence of the adverse sound2800.

The security system 202 may notify the party 2804 by sending anotification from the security system 202 to a computing device 204associated with the party 2804. The security system 202 may transmit thenotification through any wireless or wired technology. For example, thecomputing device 204 may receive the notification via a wirelesstechnology such as radio frequency, WiFi (e.g., wireless local areanetwork), cellular, Internet, Bluetooth, telecommunication,electromagnetic, infrared, light, sonic, and microwave. In this manner,the security system 202 may wirelessly communicate with the computingdevice 204 via the communication module 262 of the security system 202,which may be configured to connect to a wireless communication network.Furthermore, the security system 202 may transmit the notificationthrough a wired technology, such as through the copper wires within thebuilding 300, which may comprise a wired network. As well, the wiredtechnology may include fiber-optics, Ethernet, telephone (e.g. digitalsubscribe line “DSL”), cable, and the like.

As well, in response to detecting the adverse sound 2800, the method mayfurther include using the camera 208 of the security system 202 torecord one of an audio and video of an area adjacent the security system202. As shown in FIG. 28 c, upon the security system 202 detecting theadverse sound, the security system 202 may then capture a video or anaudio recording 2812 of an event 2814 in an area adjacent the adversesound 2800. The video and/or audio may be entered as evidence for acriminal investigation, or to determine liability in the event of apersonal injury lawsuit. Upon capturing one of the audio and/or video,the method may further include transmitting the audio and/or video tothe remote computing device 204.

Aside from documenting the area adjacent the adverse sound 2800, thesecurity system 202 may also audibly sound a warning message through thespeaker 236. The warning message may be an audible warning to alert anyperson or animal within the area of the adverse sound 2800 to leave thearea or perhaps that help is on the way. Once the warning message hasbeen sounded, two-way communication may be conducted between a user of aremote computing device 204, who is remotely located from the adversesound 2800, and a person or animal located nearby the adverse sound2800. In this manner, if a person is hurt on the ground near where theadverse sound was detected, the user may alert the hurt person that helpis en route. It should also be appreciated that in response to detectingthe adverse sound 2800, the security system 202 may perform any otherfunction such as flashing a warning light, perhaps to scare awayperpetrators.

The security system 202 may also be configured to determine logisticalinformation, which may be helpful to an emergency dispatcher. Forexample, in response to the adverse sound 2800, the security system 202may determine a location of the adverse sound 2800 with respect to itslocation inside or outside of the building 300. In response todetermining the location of the adverse sound 2800, the security system202 may transmit a notification of the location 2818 of the adversesound 2800 to the party 2804. This may be helpful to emergency personalin order to locate the site of the adverse sound 2800, which mayindicate the location of the victim, perpetrator, etc.

With reference to FIG. 28 e, the method may include determining a typeof the adverse sound 2800, such as determining whether the adverse sound2800 comprises a gunshot, scream, etc. In this regard, the securitysystem 202 may include an internal processor to digitally analyze theadverse sound 2800 to determine the type of adverse sound. In someembodiments, the security system 202 may transmit a digital signal,which represents the adverse sound 2800, to an external processor to bedigitally analyzed to determine the type of adverse sound. Upondetermining the type of adverse sound 2800, the type of adverse sound2800 may then be communicated to the party 2804, via the remotecomputing device 204. It should be appreciated that the notification assent to the remote computing device 204 may be a text message, a phonecall (such as a pre-recorded message), or any type of communication thatnotifies the party 2804 of the adverse sound 2800 and/or the type of theadverse sound.

As well, the security system 202 may also be configured to determineother biographical information such as a time of day that the adversesound 2800 was detected. In response to determining the time of day ofthe adverse sound 2800, transmitting a notification of the time of dayto the party 2804.

As illustrated in FIG. 28 f, methods may include interaction between twosecurity systems, whereby a first security system 202 notifies a secondsecurity system 203 of the adverse sound 2800. For example, in responseto detecting the adverse sound 2800, the method may include using thefirst security system 202 to initiate an event at a second securitysystem 203 communicatively coupled to the first security system 202.

The second security system 203 may perform any event that may beperformed by the first security system 202. For example, the secondsecurity system 203 may sound an audible message through a speaker 236of the second security system 203. As well, the second security system203 may flash a warning light, such as an LED, located on the secondsecurity system 203.

In response to either sounding the audible message or flashing thewarning light, the second security system 203 may also be configured touse a motion detector of the second security system 203 to detect amotion of a user within an area of the second security system 203. Inthis manner, the first security system 202, via the second securitysystem 203, may detect whether the user responds to the event ornotification of the adverse sound 2800 as detected by the first securitysystem 202. If the second security system 203 does not detect motion ofthe user, the first security system 202 may initiate other events, suchas an event at a third security system, not shown, or an event at aremote computing device 204, such as a text message at a remotecomputing device 204. The first security system 202 may continueinitiating events until the first security system 202 receivesconfirmation that a user is aware of the adverse sound 2800 as detectedby the first security system 202.

The second security system 203 may also audibly project, via the speaker236, specific information relating to the adverse sound 2800 as detectedby the first security system 202. As such, the first security system 202may be communicatively coupled to the second security system 203, andthe first security system 202 may communicate information to the secondsecurity system 203, such as the type of adverse sound 2800, thelocation of the sound, time, etc. For example, in response to a windowpane being broken at a back door, the second security system 203 mayproject a message, “Broken glass detected at the back door!” In thisregard, the second security system 203 may notify a user of the type ofadverse sound detected, and also the location of the adverse sound.

As well, because the first security system 202 may be configured todetermine and distinguish various types of sounds, the first securitysystem 202 may also initiate specific events in response to the type ofsound detected. For example, the security system 202 may determinewhether the adverse sound 2800 is a first sound or a second sound. Inresponse to determining the adverse sound 2800 is the first sound, thefirst security system 202 may be configured to initiate a first event atthe first security system 202 and/or the second security system 203. Inresponse to determining the adverse sound 2800 is the second sound, thefirst security system 202 may be configured to initiate a second eventat the first security system 202 and/or the second security system 203.It should be appreciated that the second event may be different than thefirst event. For example, the first sound may be a shouting noise andthe first event may comprise flashing a warning light of the firstsecurity system 202 and/or the second security system 203. As well, thesecond sound may be breaking glass and the second event may comprisesounding an audible alarm.

Generally, it should be appreciated that the first security system 202may be configured to perform specific events in response to specificadverse sounds, as well as instructing the second security system 203 toperform specific events in response to detecting specific adversesounds.

Moreover, in response to the first security system 202 detecting a firstadverse sound, such as crashing noise, the first security system 202 maytransmit a text message to the remote computing device 204 to notify theuser of the first adverse sound. In response to the first securitysystem 202 detecting a second adverse sound, such as a gunshot, thefirst security system 202 may notify an emergency dispatcher of thesecond adverse sound. Generally, in response to any type of adversesound 2800, the first security system 202 may be configured to performany of the actions described throughout this disclosure.

Triggering Appliances

With reference to FIG. 34, the security system 202, or light socketcamera, may further be configured to receive instructions from a user(at step 3400), such as an audible instruction, and thereby trigger anappliance to perform an operation. For example, the user may audiblyinstruct the security system 202 to turn on a television. In thismanner, the security system 202 may be configured to respond to apredetermined greeting, such as, “Hi Max” or “Hey Max,” or a evenpredetermined name, such as, “Max.” Audibly speaking the predeterminedgreeting or name can instruct the security system 202 to perform (viaitself) or transmit a command to another appliance (at step 3402) toperform anything stated after the predetermined greeting or name. Inresponse to transmitting the trigger command to the appliance, themethod can also include performing the operation via the appliance (atstep 3404). For example, if a user audibly says, “Hi Max, please unlockthe front door,” the security system 202 can transmit a command to afront door lock that is communicatively coupled to the security system202. In response to the command being transmitted to the door lock, thedoor lock can then move to the unlocked position, or if the door lock isalready in the unlocked position, the door lock can simply remain inthat position.

FIGS. 31 a-31 d illustrate just one of the many examples of how thesecurity system 202 may be used to receive an audible instruction 3102from a user 3100. As shown in FIGS. 31 a and 31 b, the user 3100 mayaudibly speak an instruction 3102, such as “Hi Max. Turn on entrywaylights and turn on TV and set it to channel 11.” The audible instruction3102 may be received by the security system 202, at which point it maytransmit commands to various appliances. For example, the deactivatedtelevision 3106 a may become activated (activated television 3106 b)through a command sent via a wireless or wired connection to thetelevision. Accordingly, the television 3106 b may set it's inputchannel to channel 11, in response to the user's audible instruction3102. As well, the deactivated light 3104 a light may become illuminated3104 b via the command. Accordingly, the security system 202 may alsodeactivate the television 3106 and light 3104 as shown in FIGS. 31 c and31 d.

Generally, it should be appreciated that the term “operation” can bebroadly defined. For example, the term “operation” can include activate,deactivate, illuminate, begin, stop, end, change, pause, record,identify, run, make, detect, and the like. In this regard, the securitysystem 202 can control any number of appliances to perform any type ofoperation that is within the normal use of the appliance.

Furthermore, the appliance can be any type of appliance that iscommunicatively coupled to the security system 202 via a wirelessconnection or a wired connection. For example, the appliance can be alight, lamp, shower, faucet, dishwasher, door lock, garage door opener,door, fan, ceiling fan, coffee maker, alarm clock, stereo, television,digital video recorder, cable box, digital video disc player, compactdisc player, toaster, oven, range, microwave, streaming media player(such as Apple TV), HVAC system (heating, ventilating and airconditioning system), telephone, fax machine, shredder, blender, juicer,space heater, thermostat, camera (such as a nanny camera), power tool(such as a table saw, drill, chain saw, etc.), smoke alarm, a secondsecurity system 202 (such as a second light socket camera, or a securitysystem that can be plugged directly into a wall outlet), and anyappliance that may be electrically coupled to a building or anyappliance that may be communicatively coupled to the security system202. Specific examples of appliance operations may include closingand/or opening a garage door, turning on and/or turning off atelevision, pausing a television, setting an input channel of atelevision to any desired station, changing television volume, making acup of coffee via a coffee maker, setting a thermostat to apredetermined temperature, unlocking and/or locking a door lock, and thelike.

As shown in FIGS. 31 e and 31 f, the security system 202 may triggerappliances located in different places throughout the house. Forexample, the security system 202 may receive a second audibleinstruction 3108, and in response to the instruction 3108, the securitysystem 202 may activate an appliance, such as a light on the securitysystem 202, within the same room, such as bedroom 3112, and also anotherappliance, such as living room light 3110, located in a different room.In this regard, the security system 202 may be configured to controlmultiple appliances simultaneously, all the while the appliances may belocated in the same location or different locations. As long as theappliances are communicatively coupled to the security system 202, thenthe appliance can be located anywhere.

With reference to FIGS. 32 a and 32 b, the security system 202 a may belocated within an enclosed interior portion 3210 or along an exteriorportion of the building 3212. In this manner, the security system 202may trigger appliances 3202, 3204 located within the interior portion3210 or exterior portion of the building 3212. As well, the securitysystem 202 itself may be located within the interior portion of thebuilding 300 or along the exterior portion of the building 300.Generally, and regardless of where the security system 202 is located,the security system 202 may be configured to simultaneously triggerappliances located inside the building, while also triggering otherappliances located outside of the building 300.

Some embodiments of the security system 202 can be configured to triggerappliances after predetermined period of time has passed. For example,the user may audibly instruct the security system 202 to make a cup ofcoffee in five minutes. Accordingly, the security system 202 may waitfive minutes before transmitting the command to the coffee maker. Aswell, some embodiments may be configured to determine how long it maytake to make the cup of coffee and if the it takes two minutes to makethe coffee, the security system 202 may transmit the command to thecoffee maker in three minutes, which added together with the two minutesto make the coffee will equal five minutes total. However, this is justone of the many examples, and generally, it should be appreciated thatthe security system 202 may be configured to trigger any appliance afterany amount of time and under any logical circumstances.

In some embodiments the security system 202 may be referred to as afirst security system 202. In this manner, some embodiments also includetriggering a second security system 202, such as a second light socketcamera, to determine if another person is present in a different part ofthe building 300. For example, the user may instruct the first securitysystem 202 to determine if another person is present in the kitchen. Inresponse to receiving the audible instruction, the first security system202 may to transmit a command to the second security system 202 todetermine whether someone is located within the kitchen. In response tothe command, the second security system 202 may use a camera to scan theroom and determine whether a person is present. As well, the user maywish to determine the identity of a person that may be present. Forexample, the audible instruction may further include an instruction todetermine an identity of the visitor. In response to determining thatthe visitor is located within the kitchen, the second security systemmay determine the identity of the visitor, via any identity detectiontechnology such as facial recognition, iris recognition, retinascanning, smart phone detection, and the like.

Accordingly, the first security system 202 may also be configured todetermine the identity of a user or visitor. This technology may beimplemented to prevent unauthorized users from activating specificappliances. For example, a parent may restrict a child from watchingtelevision. In this manner, the child may not be authorized to watchtelevision at specific hours or at any time of day. In effect, the childmay audibly instruct the security system 202 to activate a television.The security system 202 may then determine the identity of the child asbeing an unauthorized user, and in response to this determination, thesecurity system 202 may not activate the television in conformance withthe child's instruction. Alternatively, if an authorized user, such asan adult, were to audibly instruct the security system 202 to activatethe television, then upon determining that the adult is in fact anauthorized user, the security system 202 may transmit a command to thetelevision to thereby activate the television. It should be appreciatedthat this feature may be implemented with any desired appliance, such asdangerous appliances, like a power tool.

With reference to FIGS. 33 a and 33 b, the security system 202 maytransmit commands to any of the appliances 3300 a, 3300 b via a wireless230 or wired connection 304. For example, the security system 202 mayuse its communication module 262 to wirelessly 230 transmit the commandto the selected appliance via one of Wi-Fi, Bluetooth, radio frequency,Near Field Communication, infrared, and any other wireless technologydiscussed in this disclosure.

As shown in FIG. 33 b, security system 202 may use its communicationmodule 262 to transmit the command to the appliance 3300 a, 3300 b via awire 304 that is electrically and communicatively coupled to thesecurity system 202. For example, the wired connection may comprise acopper wire located within the building 300. The copper wire may anytype of traditional copper used for conducting electricity and WiFithroughout a building 300. However, it should be appreciated that thewired communication any type of wired technology as described in thisdisclosure, such as Ethernet, telephone, and the like.

In some embodiments the security system 202 may be communicativelycoupled, via the Internet, to a remote server. In this manner, thesecurity system 202 may communicate with the remote server to therebytransmit the desired command to the appliance via a media access controladdress (MAC address). In this manner, the remote server digitallyencodes the command and transmits the command to the appliance, wherebythe appliance performs the desired operation as audibly instructed bythe user. Sometimes the Internet connection may be unavailable and thesecurity system 202 may be unable to communicate with the remote server.Accordingly, the security system 202 may still communicate with thedesired appliance by transmitting the command from the security system202, to a WiFi router, and to the desired appliance. In this regard, thesecurity system 202 is able to communicate to the appliance whether ornot an Internet connection exists.

The situation may arise where the security system 202 is notcommunicatively coupled to the appliance within the building, or whenthe security system 202 is not electrically coupled to the building 300.In this regard, the security system 202 may perform a check to determinewhether connectivity or electricity is available, and in response todetermining the security system 202 is not electrically coupled to thebuilding 300 (or communicatively coupled to the appliance), the securitysystem 202 may illuminate a light on the security system 202 to therebyilluminate an area adjacent the light socket camera. The illumination ofthe light may be performed in response to the audible instruction fromthe user. However, in some embodiments the light on the security system202 may automatically be illuminated in response to losing connectivityand/or electricity. This may helpful in the event of a power outage whenpeople are trying to navigate their way around the building 300.

Combinations with Embodiments Incorporated by Reference

The embodiments described herein can be combined with any of theembodiments included in the applications incorporated by reference. Invarious embodiments, the security systems described herein can includefeatures and methods described in the context of security systems fromapplications incorporated by reference.

INTERPRETATION

None of the steps described herein is essential or indispensable. Any ofthe steps can be adjusted or modified. Other or additional steps can beused. Any portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in one embodiment, flowchart, orexample in this specification can be combined or used with or instead ofany other portion of any of the steps, processes, structures, and/ordevices disclosed or illustrated in a different embodiment, flowchart,or example. The embodiments and examples provided herein are notintended to be discrete and separate from each other.

The section headings and subheadings provided herein are nonlimiting.The section headings and subheadings do not represent or limit the fullscope of the embodiments described in the sections to which the headingsand subheadings pertain. For example, a section titled “Topic 1” mayinclude embodiments that do not pertain to Topic 1 and embodimentsdescribed in other sections may apply to and be combined withembodiments described within the “Topic 1” section.

Some of the devices, systems, embodiments, and processes use computers.Each of the routines, processes, methods, and algorithms described inthe preceding sections may be embodied in, and fully or partiallyautomated by, code modules executed by one or more computers, computerprocessors, or machines configured to execute computer instructions. Thecode modules may be stored on any type of non-transitorycomputer-readable storage medium or tangible computer storage device,such as hard drives, solid state memory, flash memory, optical disc,and/or the like. The processes and algorithms may be implementedpartially or wholly in application-specific circuitry. The results ofthe disclosed processes and process steps may be stored, persistently orotherwise, in any type of non-transitory computer storage such as, e.g.,volatile or non-volatile storage.

The various features and processes described above may be usedindependently of one another, or may be combined in various ways. Allpossible combinations and subcombinations are intended to fall withinthe scope of this disclosure. In addition, certain method, event, state,or process blocks may be omitted in some implementations. The methods,steps, and processes described herein are also not limited to anyparticular sequence, and the blocks, steps, or states relating theretocan be performed in other sequences that are appropriate. For example,described tasks or events may be performed in an order other than theorder specifically disclosed. Multiple steps may be combined in a singleblock or state. The example tasks or events may be performed in serial,in parallel, or in some other manner. Tasks or events may be added to orremoved from the disclosed example embodiments. The example systems andcomponents described herein may be configured differently thandescribed. For example, elements may be added to, removed from, orrearranged compared to the disclosed example embodiments.

Conditional language used herein, such as, among others, “can,” “could,”“might,” “may,” “e.g.,” and the like, unless specifically statedotherwise, or otherwise understood within the context as used, isgenerally intended to convey that certain embodiments include, whileother embodiments do not include, certain features, elements and/orsteps. Thus, such conditional language is not generally intended toimply that features, elements and/or steps are in any way required forone or more embodiments or that one or more embodiments necessarilyinclude logic for deciding, with or without author input or prompting,whether these features, elements and/or steps are included or are to beperformed in any particular embodiment. The terms “comprising,”“including,” “having,” and the like are synonymous and are usedinclusively, in an open-ended fashion, and do not exclude additionalelements, features, acts, operations and so forth. Also, the term “or”is used in its inclusive sense (and not in its exclusive sense) so thatwhen used, for example, to connect a list of elements, the term “or”means one, some, or all of the elements in the list. Conjunctivelanguage such as the phrase “at least one of X, Y, and Z,” unlessspecifically stated otherwise, is otherwise understood with the contextas used in general to convey that an item, term, etc. may be either X,Y, or Z. Thus, such conjunctive language is not generally intended toimply that certain embodiments require at least one of X, at least oneof Y, and at least one of Z to each be present.

The term “and/or” means that “and” applies to some embodiments and “or”applies to some embodiments. Thus, A, B, and/or C can be replaced withA, B, and C written in one sentence and A, B, or C written in anothersentence. A, B, and/or C means that some embodiments can include A andB, some embodiments can include A and C, some embodiments can include Band C, some embodiments can only include A, some embodiments can includeonly B, some embodiments can include only C, and some embodiments caninclude A, B, and C. The term “and/or” is used to avoid unnecessaryredundancy.

While certain example embodiments have been described, these embodimentshave been presented by way of example only, and are not intended tolimit the scope of the inventions disclosed herein. Thus, nothing in theforegoing description is intended to imply that any particular feature,characteristic, step, module, or block is necessary or indispensable.Indeed, the novel methods and systems described herein may be embodiedin a variety of other forms; furthermore, various omissions,substitutions, and changes in the form of the methods and systemsdescribed herein may be made without departing from the spirit of theinventions disclosed herein.

The following is claimed:
 1. A method of using a first light socketsurveillance system, wherein the first light socket surveillance systemincludes an outer housing, a camera coupled to the outer housing, aspeaker coupled to the outer housing, a microphone coupled to the outerhousing, and a screw thread contact coupled to the outer housing,whereby the screw thread contact is configurable to rotatably attach toa light socket, the method comprising: detecting an adverse sound withthe first light socket surveillance system; and in response to detectingthe adverse sound, initiating an event at a second light socketsurveillance system communicatively coupled to the first light socketsurveillance system.
 2. The method of claim 1, wherein initiating theevent at the second light socket surveillance system comprises at leastone of emitting a sound with a speaker of the second light socketsurveillance system and flashing a light of the second lightsurveillance system.
 3. The method of claim 2, wherein in response toinitiating the event at the second light socket surveillance system, themethod further comprising detecting, by a motion detector of the secondlight socket surveillance system, a motion within an area of the secondlight socket surveillance system.
 4. The method of claim 3, wherein theevent is a first event, and wherein in response to detecting no motion,by the motion detector of the second light socket surveillance system,the method further comprising initiating a second event at a third lightsocket surveillance system communicatively coupled to the first lightsocket surveillance system.
 5. The method of claim 1, furthercomprising: determining a type of the adverse sound; and emitting asound with a speaker of the second light socket surveillance system,wherein the sound comprises a message that includes the type of theadverse sound.
 6. The method of claim 1, further comprising: determiningwhether the adverse sound is a first sound or a second sound; inresponse to determining the adverse sound is the first sound, initiatinga first event at the second light socket surveillance system; and inresponse to determining the adverse sound is the second sound,initiating a second event at the second light socket surveillancesystem, wherein the second event is different from the first event. 7.The method of claim 6, wherein the first event comprises illuminating alight of the second light socket surveillance system, and wherein thesecond event comprises emitting a sound with a speaker of the secondlight socket surveillance system.
 8. A method of using a light socketsurveillance system, wherein the light socket surveillance systemincludes an outer housing, a camera coupled to the outer housing, aspeaker coupled to the outer housing, a microphone coupled to the outerhousing, and a screw thread contact coupled to the outer housing,whereby the screw thread contact is configurable to rotatably attach toa light socket, the method comprising: determining, by the light socketsurveillance system, whether an adverse sound comprises one of a firstadverse sound and a second adverse sound; in response to detecting theadverse sound comprises the first adverse sound, initiating, by thelight socket surveillance system, a first event; and in response todetecting the adverse sound comprises the second adverse sound,initiating, by the light socket surveillance system, a second event. 9.The method of claim 8, wherein initiating the first event comprises atleast one of initiating a communication session with a remote computingdevice and transmitting a notification to the remote computing device.10. The method of claim 9, wherein the communication session comprisesan identification of the first adverse sound, and wherein thenotification comprises the identification of the first adverse sound.11. The method of claim 9, wherein the remote computing device isoperated by a homeowner.
 12. The method of claim 8, wherein initiatingthe second event comprises at least one of emitting an audible questionwith the speaker, initiating a communication session with a remotecomputing, and initiating a notification to the remote computing device.13. The method of claim 8, wherein the first adverse sound comprises oneof a gunshot and breaking glass, and wherein the second adverse soundcomprises one of a scream and a shout.
 14. The method of claim 8,wherein initiating the first event comprises at least one of emitting anaudible message with a speaker of a light socket surveillance system andflashing a light of the light socket surveillance system.
 15. A methodof using a light socket surveillance system, wherein the light socketsurveillance system includes an outer housing, a camera coupled to theouter housing, a speaker coupled to the outer housing, a microphonecoupled to the outer housing, and a screw thread contact coupled to theouter housing, whereby the screw thread contact is configurable torotatably attach to a light socket, the method comprising: detecting anadverse sound with the light socket surveillance system; and in responseto detecting the adverse sound, transmitting a notification of alocation of the adverse sound to a remote computing device.
 16. Themethod of claim 15, further comprising determining a type of the adversesound.
 17. The method of claim 15, further comprising recording one ofaudio and video.
 18. The method of claim 17, wherein the transmissionfurther comprises at least one of the audio and video.
 19. A lightsocket surveillance system, comprising: an outer housing; a cameracoupled to the outer housing; a speaker coupled to the outer housing; amicrophone coupled to the outer housing; and a screw thread contactcoupled to the outer housing, wherein the screw thread contact isconfigurable to rotatably attach to a light socket, wherein the lightsocket surveillance system is configurable to detect an adverse sound,and the light socket surveillance system is further configurable totransmit a notification of a location of the adverse sound to a remotecomputing device.
 20. The light socket surveillance system of claim 19,further comprising a light coupled to the outer housing, wherein thelight is configurable to illuminate in response to the light socketsurveillance system detecting the adverse sound.
 21. The light socketsurveillance system of claim 19, wherein the speaker is configurable toemit a sound in response to the light socket surveillance systemdetecting the adverse sound.
 22. The light socket surveillance system ofclaim 19, wherein the adverse sound is a first adverse sound, and inresponse to detecting the first adverse sound, the light socketsurveillance system is configurable to initiate a first event, andwherein the light socket surveillance system is configurable to detect asecond adverse sound, and in response to detecting the second adversesound, the light socket surveillance system is configurable to initiatea second event.
 23. The light socket surveillance system of claim 19,wherein the light socket surveillance system is a first light socketsurveillance system, and wherein in response to detecting the adverse,the first light socket surveillance system is configurable to initiatean event at a second light socket surveillance system communicativelycoupled to the first light socket surveillance system.