Leveraging neighborhood to handle potential visitor at a smart-home

ABSTRACT

This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of priority of U.S. Nonprovisionalpatent application Ser. No. 14/489,162, filed Sep. 17, 2014, P.C.T.Patent Application No. PCT/US2013/061021, filed Sep. 20, 2013, U.S.Nonprovisional patent application Ser. No. 13/830,795, filed Mar. 14,2013, and U.S. Provisional Patent Application No. 61/704,437, filed Sep.21, 2012, each of which is herein incorporated by reference in itsentirety for all purposes.

FIELD

This patent specification relates to apparatus, systems, methods, andrelated computer program products for providing home security/smart homeobjectives. More particularly, this patent specification relates to aplurality of devices, including intelligent, multi-sensing,network-connected devices, that communicate with each other and/or witha central server or a cloud-computing system to provide any of a varietyof useful home security/smart home objectives.

BACKGROUND

Some homes today are equipped with smart home networks to provideautomated control of devices, appliances and systems, such as heating,ventilation, and air conditioning (“HVAC”) systems, lighting systems,home theater and entertainment systems, as well as security systems.Smart home networks may include control panels that a person may use toinput settings, preferences, and scheduling information that the smarthome network uses to provide automated control of the various devices,appliances, and systems in the home.

BRIEF SUMMARY

Various techniques for providing home security/smart home objectives aredisclosed herein. Embodiments described herein are representativeexamples of devices, methods, systems, services, and/or computer programproducts that can be used in conjunction with an extensible devices andservices platform that, while being particularly applicable andadvantageous for providing security objectives in the smart homecontext, is generally applicable to any type of enclosure or group ofenclosures (e.g., offices, factories, retail stores), vessels (e.g.,automobiles, aircraft), or other resource-consuming physical systemsthat will be occupied by humans or with which humans will physically orlogically interact. Thus, although particular examples are set forth inthe context of a smart home, it is to be appreciated that the scope ofapplicability of the described extensible devices and services platformis not so limited.

For example, a method of potentially handling a visitor at a smartenvironment that includes at least one smart device may includereceiving, at a computing system, first visitor identification dataindicative of the visitor being detected at a first location at a firsttime, analyzing, using the computing system, at least a portion of thereceived first identification data to determine that the visitor is ofinterest, and automatically adjusting, using the computing system, afunctionality of the at least one smart device of the smart environmentbased on the analyzing. As another example, a system for potentiallyhandling a visitor at a smart environment may include at least one smartdevice at the smart environment and a computing system operative toreceive first visitor identification data indicative of the visitorbeing detected at a first location at a first time, analyze at least aportion of the received first identification data to determine that thevisitor is of interest, and, based on the determination that the visitoris of interest, adjust a functionality of the at least one smart device.As another example, a non-transitory computer readable medium mayinclude computer readable instructions recorded thereon for receiving,at a computing system, first visitor identification data indicative of avisitor being detected at a first location at a first time, analyzing,using the computing system, at least a portion of the received firstidentification data to determine that the visitor is of interest,processing, using the computing system, at least a portion of thereceived first identification data to determine that the first locationis within a predetermined distance of a smart environment, andautomatically adjusting, using the computing system, a functionality ofat least one smart device of a smart environment based on the analyzingand based on the processing.

For a more complete understanding of the nature and advantages ofembodiments of the present disclosure, reference should be made to theensuing detailed description and accompanying drawings. Other aspects,objects and advantages of the present disclosure will be apparent fromthe drawings and detailed description that follows. However, the scopeof the present disclosure will be fully apparent from the recitations ofthe claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example of a smart-home environment within whichone or more of the devices, methods, systems, services, and/or computerprogram products described further herein will be applicable, accordingto at least one embodiment.

FIG. 2 illustrates a network-level view of an extensible devices andservices platform with which the smart-home environment of FIG. 1 can beintegrated, according to at least one embodiment.

FIG. 3 illustrates an abstracted functional view of the extensibledevices and services platform of FIG. 2, with reference to a processingengine as well as devices of the smart-home environment of FIG. 1,according to at least one embodiment.

FIG. 4A is a simplified block diagram illustrating components of a wallswitch according to at least one embodiment.

FIGS. 4B-C illustrate example modular head units for the wall switch ofFIG. 4A, according to at least one embodiment.

FIG. 5 is a simplified block diagram illustrating components of anintelligent, multi-sensing, network-connected hazard detector, accordingto at least one embodiment.

FIGS. 6-7 are schematic diagrams illustrating a silence gesture forremotely deactivating an alarm, according to at least one embodiment.

FIGS. 8A-C are simplified block diagrams illustrating components of anintelligent, multi-sensing, network-connected entryway interface device,according to at least one embodiment.

FIG. 9 is a schematic diagram illustrating an intelligent,multi-sensing, network-connected wall plug, according to at least oneembodiment.

FIGS. 10A-C are schematic diagrams illustrating an intelligent,multi-sensing, network-connected thermostat, according to at least oneembodiment.

FIG. 11 is a block diagram of an example process for creatingneighborhood security networks (“neighborhoods”) and sendingsecurity-related notifications to homes in the created neighborhoods,according to at least one embodiment.

FIG. 12 is a block diagram of another example process for creatingneighborhood security networks (“neighborhoods”) and sendingsecurity-related notifications to homes in the created neighborhoods,according to at least one embodiment.

FIG. 13 provides an example process for calculating and reporting asecurity score for a smart-home environment, according to at least oneembodiment.

FIG. 14 is a schematic diagram illustrating an intelligent,multi-sensing, network-connected doorknob, according to at least oneembodiment.

FIG. 15 illustrates a block diagram of an embodiment of a computersystem, according to at least one embodiment.

FIG. 16 illustrates a block diagram of an embodiment of aspecial-purpose computer, according to at least one embodiment.

FIG. 17 is a schematic diagram illustrating example geo-fencing,according to at least one embodiment.

FIG. 18 provides an example process for generating a security score,according to at least one embodiment.

FIG. 19 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 20 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 21 provides an example process for enhancing delivery of a package,according to at least one embodiment.

FIG. 22 provides an example process for delivering a package, accordingto at least one embodiment.

FIG. 23 provides an example process for handling a delivery attempt of apackage, according to at least one embodiment.

FIG. 24 provides an example process for handling a delivery attempt of apackage, according to at least one embodiment.

FIG. 25 provides an example process for securely handling a delivery ofa package, according to at least one embodiment.

FIG. 26 provides an example process for tracking delivery of a package,according to at least one embodiment.

FIG. 27 provides an example process for tracking delivery of a package,according to at least one embodiment.

FIG. 28 provides an example process for handling a delivery attempt of apackage, according to at least one embodiment.

FIG. 29 provides an example process for managing a smart environment,according to at least one embodiment.

FIG. 30 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 31 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 32 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 33 provides an example process for handling a potential visit by avisitor at a smart environment, according to at least one embodiment.

FIG. 34 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 35 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 36 provides an example process for potentially handling a visitorat a smart environment, according to at least one embodiment.

FIG. 37 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 38 provides an example process for handling delivery of a package,according to at least one embodiment.

FIG. 39 provides an example process for handling an agent of aservice-provider entity, according to at least one embodiment.

FIG. 40 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 41 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 42 provides an example process for handling a visitor at a smartenvironment, according to at least one embodiment.

FIG. 43 provides an example process for controlling a smart environment,according to at least one embodiment.

FIG. 44 provides an example process for use with respect to a smart-homeenvironment, according to at least one embodiment.

DETAILED DESCRIPTION

Embodiments of the present disclosure generally relate to a plurality ofdevices, including intelligent, multi-sensing, network-connecteddevices, that communicate with each other and/or with a central serveror a cloud-computing system to provide any of a variety of homesecurity/smart home objectives.

Various aspects and possible implementations of providing homesecurity/smart home objectives are disclosed herein. Turning to thefigures, FIG. 1 illustrates an example of a smart-home environment 100within which one or more of the devices, methods, systems, services,and/or computer program products described further herein can beapplicable. The depicted smart-home environment 100 includes a structure150, which can include, e.g., a house, office building, garage, ormobile home. It should be appreciated that the smart-home environment100 includes areas outside the home, such as curtilage, the yard, andother nearby land. It will be appreciated that devices can also beintegrated into a smart-home environment 100 that does not include anentire structure 150, such as an apartment, condominium, or officespace. Further, the smart home environment can control and/or be coupledto devices outside of the actual structure 150. Indeed, several devicesin the smart home environment need not physically be within thestructure 150. For example, a device controlling an outdoor lightingsystem 114 or gated entry system 116 can be located outside of thestructure 150.

The depicted structure 150 includes a plurality of rooms 152, separatedat least partly from each other via walls 154. The walls 154 can includeinterior walls or exterior walls. Each room can further include a floor156 and a ceiling 158. Devices can be mounted on, integrated with and/orsupported by a wall 154, floor 156 or ceiling 158.

In some embodiments, the smart-home environment 100 of FIG. 1 includes aplurality of devices, including intelligent, multi-sensing,network-connected devices, that can integrate seamlessly with each otherand/or with a central server or a cloud-computing system to provide anyof a variety of useful home security and/or smart home objectives. Thesmart-home environment 100 may include one or more intelligent,multi-sensing, network-connected thermostats 102 (herein after referredto as “smart thermostats 102”), one or more intelligent,network-connected, multi-sensing hazard detection units 104 (hereinafter referred to as “smart hazard detectors 104”), and one or moreintelligent, multi-sensing, network-connected entryway interface devices106 (herein after referred to as “smart doorbells 106”). According toembodiments, the smart thermostat 102 detects ambient climatecharacteristics (e.g., temperature and/or humidity) and controls a HVACsystem 103 accordingly. The smart hazard detector 104 may detect thepresence of a hazardous substance or a substance indicative of ahazardous substance (e.g., smoke, fire, or carbon monoxide). The smartdoorbell 106 may control doorbell functionality, detect a person'sapproach to or departure from a location (e.g., an outer door), andannounce a person's approach or departure via audio or visual means, orcontrol settings on a security system (e.g., to activate or deactivate asecurity system when occupants go and come).

In some embodiments, the smart-home environment 100 of FIG. 1 furtherincludes one or more intelligent, multi-sensing, network-connected wallswitches 108 (herein after referred to as “smart wall switches 108”),along with one or more intelligent, multi-sensing, network-connectedwall plug interfaces 110 (herein after referred to as “smart wall plugs110”). The smart wall switches 108 may detect ambient lightingconditions, detect room-occupancy states, and control a power and/or dimstate of one or more lights. In some instances, smart wall switches 108may also control a power state or speed of a fan, such as a ceiling fan.The smart wall plugs 110 may detect occupancy of a room or enclosure andcontrol supply of power to one or more wall plugs (e.g., such that poweris not supplied to the plug if nobody is at home). In the illustratedexample, one of the smart wall plugs 110 controls supply of power to alamp 118, while another smart wall plug may control supply of power to athrough-wall air conditioning unit 142 or any other suitable componentof environment 100.

In some embodiments, the smart-home environment 100 of FIG. 1 furtherincludes one or more intelligent, multi-sensing, network-connected entrydetectors 112 (herein after referred to as “smart entry detector 112”).The illustrated smart entry detectors 112 are located at windows 182,doors 186, and other entry points of the smart-home environment 100 fordetecting when a window, door, or other entry point is opened, broken,or otherwise breached. According to embodiments, the smart entrydetectors 112 may include first and second parts. The first part isattached to a fixed part of the house structure, such as the windowsill,door sill, outer frame, side jamb, head jamb, etc. A second part isattached to part of the window or door that moves when opening andclosing, such as the upper or lower sash, top or bottom rail, sidestile, latch, handle, etc. The first and second parts of the smart entrydetectors 112 are in close proximity when the window or door is closed,and the first and second parts move apart from one another when thewindow or door opens. The smart entry detectors 112 generate acorresponding signal when a window or door is opened or closed, etc. Itshould be appreciated that, according to some embodiments, the smartentry detectors 112 can be any type of window, door, entryway alarmsensor known in the art for detecting when a window, door, or otherentry point is opened, broken, or otherwise breached, and that the knownalarm sensors become smart when connected to the central server orcloud-computing system 164. According to embodiments, the alarm systemof the home will not arm unless all smart entry detectors 112 of thehome indicate that all doors, windows, and other entryways are closedand/or that all smart entry detectors 112 are “armed”.

Still further, in some embodiments, the smart-home environment 100 ofFIG. 1 includes one or more intelligent, multi-sensing,network-connected appliances 113 (herein after referred to as “smartappliances 113”), such as refrigerators, stoves and/or ovens,televisions, washers, dryers, indoor or outdoor lighting, stereos,intercom systems, gated entries, garage-door openers, floor fans,ceiling fans, wall air conditioners, pool heaters, irrigation systems,security systems, safes, and so forth. According to embodiments, thenetwork-connected appliances 113 are made compatible with the smart-homeenvironment by cooperating with the respective manufacturers of theappliances. For example, the appliances can be space heaters, window airconditioning units, motorized duct vents, etc. When plugged in, anappliance can announce itself to the smart-home network, such as byindicating what type of appliance it is, and it can automaticallyintegrate with the controls of the smart-home. Such communication by theappliance to the smart home can be facilitated by any wired or wirelesscommunication protocols known by those having ordinary skill in the art.The smart home also can include one or more of a variety ofnon-communicating legacy appliances 140, such as old conventionalwasher/dryers, refrigerators, and the like, which can be controlled,albeit coarsely (ON/OFF), by virtue of the smart wall plugs 110. Thesmart-home environment 100 can further include one or more of a varietyof at least partially communicating legacy appliances 142, such asinfrared (“IR”) controlled wall air conditioners or other IR-controlleddevices, which can be controlled by IR signals provided by the smarthazard detectors 104 or the smart wall switches 108.

In some embodiments, the smart-home environment 100 of FIG. 1 furtherincludes one or more intelligent, multi-sensing, network-connecteddoorknobs 122 (herein after referred to as “smart doorknob 122”). Theillustrated smart doorknobs 122 are located on external doors 186 of thesmart-home environment 100. However, it should be appreciated that smartdoorknobs 122 can be provided on all doors of the smart-home environment100. As illustrated in FIG. 14, the smart doorknob includes a remotecontrolled electronic lock that locks a spindle 1404. This locks thedoor because it prevents the spindle from disengaging a latch 1406 ofthe doorknob from a strike plate 1410 of a door stop 1414. Accordingly,the smart doorknob is able to automatically unlock the door 186, withoutthe user having to touch the doorknob. For example, the smart doorbell106 can recognize a registered occupant approaching the door andinstruct the smart doorknob to automatically unlock. It should also beappreciated that occupants can use a registered mobile device 166 toremotely unlock the door. For example, if when inside the home, theoccupant receives notice from the smart doorbell 106 that a trustedneighbor is approaching the door, the occupant can use the mobile device166 to unlock the door so the neighbor can let himself or herself in.Alternatively, the occupant can speak an audible command instructing thesmart doorknob 122 to unlock. According to some embodiments, the smartdoorknob 122 includes a remote controlled electronic motor that turnsthe spindle 1404 to disengage the latch 1406 of the doorknob from thestrike plate 1410 of the door stop 1414. Accordingly, the smart doorknobis able to automatically open the door 186, without the user having totouch the doorknob.

According to embodiments, the smart thermostats 102, the smart hazarddetectors 104, the smart doorbells 106, the smart wall switches 108, thesmart wall plugs 110, the smart entry detectors 112, the smartappliances 113, the smart doorknobs 122, the keypads, and other devices(collectively referred herein to as “the network-connected smartdevices”) of the smart-home environment 100 are connected to each otherand to the central server or cloud-computing system 164 to accomplishhome security and/or smart home objectives for the smart homeenvironment. In addition to containing processing and sensingcapabilities, each of the network-connected smart devices is capable ofdata communications and information sharing with any other of thenetwork-connected smart devices, as well as to any central server orcloud-computing system 164 or any other device that is network-connectedanywhere in the world to accomplish home security and/or smart homeobjectives. The required data communications can be carried out usingany of a variety of custom or standard wireless protocols (Wi-Fi,ZigSee, 6LoWPAN, 3G/4G, etc.) and/or any of a variety of custom orstandard wired protocols (CAT6 Ethernet, HomePlug, etc.). In some cases,backup means of wireless communication (e.g., 3G/4G) is provided in theevent the primary means of communication (e.g., Wi-Fi) becomes disabled,such as due to power outage.

According to embodiments, all or some of the network-connected smartdevices can serve as wireless or wired repeaters. For example, a firstone of the network-connected smart devices can communicate with a secondone of the network-connected smart devices via a wireless router 160.The network-connected smart devices can further communicate with eachother via a connection to a network, such as the Internet 162. Throughthe Internet 162, the network-connected smart devices can communicatewith a central server or a cloud-computing system 164. The centralserver or cloud-computing system 164 can be associated with amanufacturer, support entity, or service provider, such as ahome-security provider, associated with the network-connected smartdevices. For one embodiment, a user may be able to contact local lawenforcement and other emergency or security personnel as well as contactcustomer support using one of the network-connected smart devices itselfrather than needing to use other communication means such as a telephoneor Internet-connected computer. Further, software updates and securityalerts can be automatically sent from the central server orcloud-computing system 164 to the network-connected smart devices (e.g.,when available, when purchased, at routine intervals, when emergencynews needs to be broadcasted throughout the home, when the securitysystem needs to be armed, and when the smart-home environment needs tobe put on lock down). In some embodiments, certain functionalities andcapabilities of environment 100 may be enabled without active access tothe Internet or remote servers or data sources. Instead, in someembodiments, the various smart devices of environment 100

(e.g., devices 102/104/106/108/110/112/113/114/116/122/166/168/170) maybe enabled to communicate with one another without active communicationwith Internet 162 and system 164, and data of those devices may beanalyzed, for example, in combination with rules-based inference enginesand/or artificial intelligence and/or any suitable smart environmentdata and/or any suitable rules or settings or inferences or modes thatmay be associated with environment 100, locally at environment 100 byany suitable computing system (e.g., at a dedicated central processingunit device or computing system of environment 100 or at one or moreprocessors of the various smart devices of environment 100) to dictatethe functionality of environment 100.

According to embodiments, the network-connected smart devices combine tocreate a mesh network of spokesman and low-power nodes in the smart-homeenvironment 100, where some of the network-connected smart devices are“spokesman” nodes and others are “low-powered” nodes. Spokesman nodesare sometimes referred to herein as “smart” nodes. It should beappreciated that non-smart devices may perform as lower-powered nodes.The spokesman and low-powered nodes are communicatively interconnectedand operate to accomplish a common objective or to achieve a common goalin the smart-home environment. In some embodiments, some or all of thespokesman and low-powered nodes perform one or more functions in acoordinated manner to accomplish the common objective. Example functionsand objectives include, but are not limited to, triggering an alarm forthe objective of securing the home, adjusting a thermostat setting forthe objective of making the home comfortable, and turning on and offlights for the objective of securing the home or for use by occupants.Other example objectives and functions are provided throughout thisdocument. Some of the network-connected smart devices in the smart-homeenvironment 100 are battery powered, while others have a regular andreliable power source, such as by connecting to wiring (e.g., to 120Vline voltage wires) behind the walls 154 of the smart-home environment100. The network-connected smart devices that have a regular andreliable power source are referred to as “spokesman” nodes. These nodesare equipped with the capability of using any wireless protocol ormanner to facilitate bidirectional communication with any of a varietyof the other devices in the smart-home environment 100 as well as withthe central server or cloud-computing system 164. On the other hand, thenetwork-connected smart devices that are battery powered are referred toas “low-power” nodes. These nodes tend to be smaller than spokesmannodes and communicate using wireless protocol that requires very littlepower, such as Zigbee, 6LoWPAN, etc. Further, some, but not all,low-power nodes are incapable of bidirectional communication. Theselow-power nodes send messages, but they are unable to “listen”. Thus,other network-connected smart devices in the smart-home environment 100,such as the spokesman nodes, cannot send information to these low-powernodes.

As described, the network-connected smart devices serve as low-power andspokesman nodes to create a mesh network in the smart-home environment100. Individual low-power nodes in the smart-home environment regularlysend out messages regarding what they are sensing, and the otherlow-powered nodes in the smart-home environment—in addition to sendingout their own messages—repeat the messages, thereby causing the messagesto travel from node to node (i.e., network-connected smart device tonetwork-connected smart device) throughout the smart-home environment100. The spokesman nodes in the smart-home environment 100 are able to“drop down” to low-powered communication protocols to receive thesemessages, translate the messages to other communication protocols, andsend the translated messages to other spokesman nodes and/or the centralserver or cloud-computing system 164. Thus, the low-powered nodes usinglow-power communication protocols are able to send messages across theentire smart-home environment 100 as well as over the Internet 162 tothe central server or cloud-computing system 164. According toembodiments, the mesh network enables the central server orcloud-computing system 164 to regularly receive data from all of thenetwork-connected smart devices in the smart-home environment, makeinferences based on the data, and send commands back to individualone(s) of the network-connected smart devices to accomplish some of thehome-security objectives descried herein. For example, in the event thehome-security system is armed and one of the nodes, either low- orhigh-power, detects movement, then the node can send a correspondingmessage through the mesh network to the central server orcloud-computing system 164, which processes the message and determinesthe appropriate response, such as contacting authorities and/or the homeowner as well as instructing the network-connected smart devices toenter an alarm mode, which may involve activating lights, soundingaudible alarms, etc.

As described, the spokesman nodes and some of the low-powered nodes arecapable of “listening”. Accordingly, users, other devices, and thecentral server or cloud-computing system 164 can communicate controls tothe low-powered nodes. For example, as discussed below, a user can usethe portable electronic device (e.g., a smartphone) 166 to send commandsover the Internet to the central server or cloud-computing system 164,which then relays the commands to the spokesman nodes in the smart-homeenvironment 100. The spokesman nodes drop down to a low-power protocolto communicate the commands to the low-power nodes throughout thesmart-home environment, as well as to other spokesman nodes that did notreceive the commands directly from the central server or cloud-computingsystem 164. In some embodiments, the low-powered nodes and the spokesmannodes are the same type of device (e.g., hazard detector, thermostat,wall plug, etc.). In some embodiments, the low-powered and spokesmannodes are identical. For example, in some embodiments, all of thelow-powered and spokesman nodes have the same stock-keeping unit (SKU)and/or are capable of performing any role, such as performing the roleof low-powered and/or spokesman node.

Examples of spokesman nodes include smart doorbells 106, smartthermostats 102, smart wall switches 108, smart wall plugs 110, keypads,doorknobs 122, etc. These devices 102, 106, 108, 110, and 122 are oftenlocated near and connected to a reliable power source, and therefore caninclude more power-consuming components, such as one or morecommunication chips capable of bidirectional communication in anyvariety of protocols.

An example of a low-powered node is a battery-operated version of thesmart entry detector 112. These smart entry detectors 112 are oftenlocated in an area without access to constant and reliable power, suchas in a window or door frame. According to embodiments, the smart entrydetector 112 includes a low-power wireless communication chip (e.g.,ZigBee chip) that sends instantaneous messages coincident with movementof the door or window or with detection of a nearby person, animal orobject. In some embodiments, the low-power wireless communication chipregularly sends messages regarding the position (open, closed, partiallyopen, etc.) of the relevant door or window. These messages may be sentwirelessly, using the mesh network, from node to node (i.e.,network-connected smart device to network-connected smart device) withinthe smart-home environment 100 as well as over the Internet 162 to thecentral server or cloud-computing system 164.

Another example of a low-power node is a smart nightlight 170. Accordingto embodiments, the nightlight 170 houses a light source having variableintensity. Further, according to embodiments, the color of the lightemitted from the nightlight 170 is changeable. In addition to housing alight source, the smart nightlight 170 houses an occupancy sensor, suchas an ultrasonic or passive IR sensor, and an ambient light sensor, suchas a photoresistor or a single-pixel sensor that measures light in theroom. In some embodiments, the smart nightlight 170 is configured toactivate the light source when its ambient light sensor detects that theroom is dark and/or when its occupancy sensor detects a person'spresence or movement. The smart nightlight 170, according toembodiments, is configured to adjust the color and intensity of thelight source. For example, the smart nightlight 170 adjusts theintensity of the light source in a manner where intensity is inverselyproportional to the amount of natural light detected in the environment.According to embodiments, the smart nightlight 170 includes a low-powerwireless communication chip (e.g., ZigBee chip) that regularly sends outmessages regarding the occupancy of the room and the amount of light inthe room, including instantaneous messages coincident with the occupancysensor detecting the presence of a person in the room. As mentionedabove, these messages may be sent wirelessly, using the mesh network,from node to node (i.e., network-connected smart device tonetwork-connected smart device) within the smart-home environment 100 aswell as over the Internet 162 to the central server or cloud-computingsystem 164.

Yet another example of a low-powered node is a battery-operated versionof the smart hazard detector 104. These smart hazard detectors 104 areoften located in an area without access to constant and reliable powerand, as discussed in detail below, may include any number and type ofsensors, such as smoke/fire/heat sensors, carbon monoxide/dioxidesensors, occupancy/motion sensors, ambient light sensors, temperaturesensors, humidity sensors, and the like. Furthermore, smart hazarddetectors 104, according to some embodiments, include a low-powerwireless communication chip (e.g., ZigBee chip) that regularly sendsmessages that correspond to each of the respective sensors to the othernetwork-connected smart devices and the central server orcloud-computing system 164, such as by using the mesh network asdescribed above.

According to embodiments, the network-connected devices (a.k.a. the low-and high-power nodes) of the smart-home environment 100 are capable ofenhancing home security. For example, as discussed, all or some of thenetwork-connected smart devices are equipped with motion sensing, heatsensing, pressure sensing, noise sensing, or other types of sensingcapabilities that combine with rules-based inference engines and/orartificial intelligence of the central server or cloud-computing system164 to detect the presence, movement, and/or identity of people,animals, and objects and trigger various alarms in the event a person,animal, or object is in the wrong place at the wrong time anywhereinside or in the curtilage of the smart-home environment 100.

By virtue of network connectivity, a user can remotely interact with oneor more of the network-connected smart devices. For example, a user cancommunicate with one or more of the network-connected smart devicesusing a computer (e.g., a desktop computer, laptop computer, or tablet)or other portable electronic device (e.g., a smartphone) 166. A webpageor app can be configured to receive communications from the user andcontrol the one or more of the network-connected smart devices based onthe communications and/or to present information about the device'soperation to the user. For example, the user can view, arm, or disarmthe security system of the home. The user can be in the structure duringthis remote communication or outside the structure.

As discussed, users can control one or more of the network-connectedsmart devices in the smart-home environment 100 using anetwork-connected computer or portable electronic device 166. In someexamples, some or all of the occupants (e.g., individuals who live inthe home) can register their mobile device 166 with the smart-homeenvironment 100. Such registration can be made at a central server toauthenticate the occupant and/or the mobile device 166 as beingassociated with the smart-home environment 100, and to give permissionto the occupant to use the mobile device 166 to control thenetwork-connected smart devices and the security system of thesmart-home environment 100. An occupant can use their registered mobiledevice 166 to remotely control the network-connected smart devices andsecurity system of the smart-home environment 100, such as when theoccupant is at work or on vacation. The occupant may also use theirregistered mobile device 166 to control the network-connected smartdevices when the occupant is actually located inside the smart-homeenvironment 100, such as when the occupant is sitting on a couch insidethe home or in a bedroom preparing for sleep.

It should be appreciated that instead of or in addition to registeringmobile devices 166, the smart-home environment 100 makes inferencesabout which individuals live in the home and are therefore occupants andwhich mobile devices 166 are associated with those individuals. As such,the smart-home environment “learns” who is an occupant and permits themobile devices 166 associated with those individuals to control thenetwork-connected smart devices of the smart-home environment 100. Asdescribed herein, various types of notices and other information areprovided to occupants via messages sent to the occupants' mobile devices166 and other electronic devices. It should be appreciated that thesemessages can be sent via email, short message service (SMS), multimediamessaging service (MMS), unstructured supplementary service data (USSD),as well as any other type of messaging services and/or communicationprotocols known in the art, including any type of push notificationservice.

In some instances, guests desire to control the smart devices. Forexample, the smart-home environment may receive communication from anunregistered mobile device of an individual inside of the home, wheresaid individual is not recognized as an occupant of the home. Further,for example, smart-home environment may receive communication from amobile device of an individual who is known to be or who is registeredas a guest.

According to embodiments, a guest-layer of controls can be provided toguests of the smart-home environment 100. The guest-layer of controlsgives guests access to basic controls (e.g., a judicially selectedsubset of features of the smart devices), such as temperatureadjustments, but it locks out other functionalities. The guest layer ofcontrols can be thought of as a “safe sandbox” in which guests havelimited controls, but they do not have access to more advanced controlsthat could fundamentally alter, undermine, damage, or otherwise impairthe occupant-desired operation of the smart devices. For example, theguest layer of controls won't permit the guest to adjust the heat-pumplockout temperature.

A use case example of this is when a guest in a smart home, the guestcould walk up to the thermostat and turn the dial manually, but theguest may not want to walk the house “hunting” for the thermostat,especially at night while the home is dark and others are sleeping.Further, the guest may not want to go through the hassle of downloadingthe necessary application to their device for remotely controlling thethermostat. In fact, the guest may not have access to the home owner'slogin credentials, etc., and therefore cannot remotely control thethermostat via such an application. Accordingly, according to at leastsome embodiments, the guest can open a mobile browser on their mobiledevice, type a keyword, such as “NEST” into the URL field and tap “Go”or “Search”, etc. In response the device presents with guest with a userinterface, such as Thermozilla UI, which allows the guest to move thetarget temperature between a limited range, such as 65 and 80 degreesFahrenheit. As discussed, the user interface provides a guest layer ofcontrols that are limited to basic functions. The guest cannot changethe target humidity, modes, or view energy history.

According to embodiments, to enable guests to access the user interfacethat provides the guest layer of controls, a local webserver is providedthat is accessible in the local area network (LAN). It does not requirea password, because physical presence inside the home is establishedreliably enough by the guest's presence on the LAN. In some embodiments,during installation of the smart device, such as the smart thermostat,the home owner is asked if they want to enable a Local Web App (LWA) onthe smart device. Business owners will likely say no; home owners willlikely say yes. When the LWA option is selected, the smart devicebroadcasts to the LAN that the above referenced keyword, such as “NEST”,is now a host alias for its local web server. Thus, no matter whose homea guest goes to, that same keyword (e.g., “NEST” is always the URL youuse to access the LWA, provided the smart device is purchased from thesame manufacturer. Further, according to embodiments, if there is morethan one smart device on the LAN, the second and subsequent smartdevices do not offer to set up another LWA. Instead, they registerthemselves as target candidates with the master LWA. And in this casethe LWA user would be asked which smart device they want to change thetemperature on before getting the simplified user interface, such asThermozilla UI, for the particular smart device they choose.

According to embodiments, a guest layer of controls may also be providedto users by means other than a device 166. For example, the smartdevice, such as the smart thermostat, may be equipped withwalkup-identification technology (e.g., face recognition, RFID,ultrasonic sensors) that “fingerprints” or creates a “signature” for theoccupants of the home. The walkup-identification technology can be thesame as or similar to the fingerprinting and signature creatingtechniques descripted in other sections of this application. Inoperation, when a person who does not live in the home or is otherwisenot registered with or whose fingerprint or signature is not recognizedby the smart home “walks up” to a smart device, the smart devicesprovides the guest with the guest layer of controls, rather than fullcontrols.

As described below, the smart thermostat and other smart devices “learn”by observing occupant behavior. For example, the smart thermostat learnsoccupants preferred temperature set-points for mornings and evenings,and it learns when the occupants are asleep or awake, as well as whenthe occupants are typically away or at home, for example. According toembodiments, when a guest controls the smart devices, such as the smartthermostat, the smart devices do not “learn” from the guest. Thisprevents the guest's adjustments and controls from affecting the learnedpreferences of the occupants.

According to some embodiments, a smart television remote control isprovided. The smart remote control recognizes occupants by thumbprint,visual identification, RFID, etc., and it recognizes users as guests oras someone belonging to a particular class having limited control andaccess (e.g., a child). Upon recognizing the user as a guest or someonebelonging to a limited class, the smart remote control only permits thatuser to view a subset of channels and to make limited adjustments to thesettings of the television and other devices. For example, a guestcannot adjust the digital video recorder (DVR) settings, and a child islimited to viewing child-appropriate programming.

According to some embodiments, similar controls are provided for otherinstruments, utilities, and devices in the house. For example, sinks,bathtubs, and showers can be controlled by smart spigots that recognizeusers as guests or as children and therefore prevents water fromexceeding a designated temperature that is considered safe.

According to embodiments, the network-connected smart devices of thesmart-home environment 100 are modular and can be incorporated intoolder and new houses. For example, the devices are designed around amodular platform consisting of two basic components: a head unit and abackplate, which is also referred to as a docking station. Multipleconfigurations of the docking station are provided so as to becompatible with any home, such as older and newer homes. However, all ofthe docking stations include a standard head-connection arrangement,such that any head unit can be removably attached to any dockingstation. Thus, in some embodiments, the docking stations are interfacesthat serve as physical connections to the structure and the voltagewiring of the homes, and the interchangeable head units contain all ofthe sensors, processors, user interfaces, the batteries, and otherfunctional components of the devices.

Many different commercial and functional possibilities for provisioning,maintenance, and upgrade are possible. For example, after years of usingany particular head unit, a user will be able to buy a new version ofthe head unit and simply plug it into the old docking station. There arealso many different versions for the head units, such as low-costversions with few features, and then a progression ofincreasingly-capable versions, up to and including extremely fancy headunits with a large number of features. Thus, it should be appreciatedthat the various versions of the head units can all be interchangeable,with any of them working when placed into any docking station. This canadvantageously encourage sharing and re-deployment of old head units—forexample, when an important high-capability head unit, such as a hazarddetector, is replaced by a new version of the head unit, then the oldhead unit can be re-deployed to a backroom or basement, etc. Accordingto embodiments, when first plugged into a docking station, the head unitcan ask the user (by 2D LCD display, 2D/3D holographic projection, voiceinteraction, etc.) a few simple questions such as, “Where am I” and theuser can indicate “living room”, “kitchen” and so forth.

According to embodiments, some of these modular smart devices havesecurity-enhancing features that trigger a notification or an alarm inthe event the head is removed from the docking station. For example, asdiscussed, some smart devices are capable of detecting motion andfunction as “tripwires” in the security system. Others provide livevideo feeds and function as security cameras. In the event an intruderattempts to disable a network-connected smart device and therefore avertdetection by removing the smart device's head unit from its dockingstation, an alarm or alert notification is triggered. For example, thesmart device sends a message indicating head unit removal to the centralserver or cloud-computing system 164. Responsive to receiving a messageindicating head unit removal, the central server or cloud-computingsystem 164, according to embodiments, sends a message to the homeowner's or other occupants' mobile device(s) 166, indicating the removaland asking whether the removal is authorized. If no response after atimeout period or if the response indicates that removal was notauthorized, then the central server or cloud-computing system 164triggers the alarm. In other embodiments, such as when the alarm isarmed (i.e., in security mode), the alarm is triggered immediately uponremoval of the head unit. The alarm may be local on the head unit itselfand therefore an alert sound is broadcasted from the head unit, or maybe centralized and controlled by the central server or cloud-computingsystem 164 and the other network-connected smart devices are instructedto broadcast an alert sound. In still other embodiments, upon removal,the head unit asks the person to verbally identify themselves and, ifthe voice is not recognized, then the alarm is triggered.

The smart-home environment 100 may also include communication withdevices outside of the smart-home environment 100 but within a proximategeographical range of the home, such as within the home's curtilage. Forexample, the smart-home environment 100 may include an outdoor lightingsystem 114 that communicates information through the mesh network ordirectly to the central server or cloud-computing system 164 regardingdetected movement and/or presence of people, animals, and any otherobjects and receives back commands for controlling the lightingaccordingly. The central server or cloud-computing system 164 cancontrol the outdoor lighting system 114 based on information receivedfrom the other network-connected smart devices in the smart-homeenvironment. For example, in the event any of the network-connectedsmart devices, such as smart wall plugs 110 located outdoors, detectmovement at night time, the central server or cloud-computing system 164can “turn on” the outdoor lighting system 114 as well as other lights inthe smart-home environment 100. This is advantageous over knownoutdoor-motion detecting lights because the motion-detection capabilityis not limited to just the motion sensor attached to the light itself,but extends across all the network-connected smart devices in thesmart-home environment 100.

The smart-home environment 100 may include a gated entry 116 thatcommunicates information through the mesh network or directly to thecentral server or cloud-computing system 164 regarding detected movementand/or presence of people, animals, and any other objects and receivesback instructions for controlling the gated entry such an opening,closing, locking, unlocking the gate. According to embodiments, analgorithm is provided for considering the geographic location of thesmart-home environment 100, such as based on the zone improvement plan(“ZIP”) code or geographic coordinates of the home. The geographicinformation is then used to obtain data helpful for determining optimaltimes for turning on/off or otherwise adjusting lighting as well asopening, closing, locking, unlocking gates or otherwise securing thesmart-home environment 100.

In some embodiments, these low-powered and spokesman nodes (e.g.,devices 102, 104, 106, 108, 110, 112, 113, and 170) can function as“tripwires” for an alarm system in the smart-home environment. Forexample, in the event a perpetrator circumvents detection by alarmsensors located at windows, doors, and other entry points of thesmart-home environment 100, the alarm could be triggered upon receivingan occupancy, motion, heat, sound, etc. message from one or more of thelow-powered and spokesman nodes in the mesh network. For example, uponreceiving a message from a smart nightlight 170 indicating the presenceof a person, the central server or cloud-computing system 164 or someother device could trigger an alarm, provided the alarm is arm at thetime of detection. Thus, the alarm system could be enhanced by variouslow-powered and spokesman nodes located throughout the smart-homeenvironment 100. In this example, a user could enhance the security ofthe smart-home environment 100 by buying and installing extra smartnightlights 170.

In some embodiments, the mesh network can be used to automatically turnon and off lights as a person transitions from room to room. Forexample, the low-powered and spokesman nodes (e.g., devices 102, 104,106, 108, 110, 112, 113, and 170) detect the person's movement throughthe smart-home environment and communicate corresponding messagesthrough the mesh network. Using the messages that indicate which roomsare occupied, the central server or cloud-computing system 164 or someother device activates and deactivates the smart wall switches 108 toautomatically provide light as the person moves from room to room in thesmart-home environment 100. Further, users may provide pre-configurationinformation that indicates which smart wall plugs 110 provide power tolamps and other light sources, such as the smart nightlight 170.Alternatively, this mapping of light sources to wall plugs 110 can bedone automatically (e.g., the smart wall plugs 110 detect when a lightsource is plugged into it, and it sends a corresponding message to thecentral server or cloud-computing system 164). Using this mappinginformation in combination with messages that indicate which rooms areoccupied, the central server or cloud-computing system 164 or some otherdevice activates and deactivates the smart wall plugs 110 that providepower to lamps and other light sources so as to track the person'smovement and provide light as the person moves from room to room.

In some embodiments, the mesh network of low-powered and spokesman nodescan be used to provide exit lighting in the event of an emergency, suchas an earthquake, a fire, a detected home invasion, dangerous CO levels,etc. In some instances, to facilitate this, users providepre-configuration information that indicates exit routes in thesmart-home environment 100. For example, for each room in the house, theuser provides a map of the best exit route. It should be appreciatedthat instead of a user providing this information, the central server orcloud-computing system 164 or some other device could automaticallydetermine the routes using uploaded maps, diagrams, architecturaldrawings of the smart-home environment, as well as using a map generatedbased on positional information obtained from the nodes of the meshnetwork (e.g., positional information from the devices is used toconstruct a map of the house). In operation, when an alarm is activated(e.g., when one or more of the smart hazard detector 104 detects smokeand activates an alarm), the central server or cloud-computing system164 or some other device uses occupancy information obtained from thelow-powered and spokesman nodes to determine which rooms are occupiedand then turns on lights (e.g., nightlights 170, wall switches 108, wallplugs 110 that power lamps, etc.) along the exit routes from theoccupied rooms so as to provide emergency exit lighting. It should alsobe appreciated that all or some of the network-connected smart devices,including the smart hazard detector 104 and the smart thermostat 102,include a light that is activated to help occupants evacuate the home.Additionally, in the event of an emergency, such as earthquake or fire,an audible alarm can be sounded in the home giving information about theevent. Also, a message, such as an SMS or MMS message, may be sent tothe mobile device of the occupants.

In some embodiments, the mesh network of low-powered and spokesman nodescan be used to provide security lighting in the event an unauthorizedoccupant is detected in the home. In such cases, all lights in and/oroutside of the home may be activated. Turning on all light will alertauthorized occupants to the danger and will likely cause theunauthorized occupants to flee.

In some embodiments, the smart home environment 100 may include a homesafe for storing valuables, such as jewels, money, rare coins, importantdocuments, etc. In the event an individual tampers with the safe, suchas if someone attempts to pick the lock, carry it away, or break itopen, the safe automatically sends out wireless alarms, SMS, notifiesthe authorities, etc. The safe also includes a location tracking device,such as a GPS device, so that in the event it is carried away, it cantransmit information about its location. In some embodiments, such asafe may be any suitable type of appliance 113, 140, and/or 142.

Further included and illustrated in the example smart-home environment100 of FIG. 1 are service robots 168 each configured to carry out, in anautonomous manner, any of a variety of household tasks. For someembodiments, the service robots 168 can be respectively configured toperform floor sweeping, floor washing, etc. in a manner similar to thatof known commercially available devices such as the ROOMBA® and SCOOBA®products sold by iRobot, Inc. of Bedford, Mass. Tasks such as floorsweeping and floor washing can be considered as “away” or “while-away”tasks for purposes of the instant description, as it is generally moredesirable for these tasks to be performed when the occupants are notpresent. For other embodiments, one or more of the service robots 168are configured to perform tasks such as playing music for an occupant,serving as a localized thermostat for an occupant, serving as alocalized air monitor/purifier for an occupant, serving as a localizedbaby monitor, serving as a localized hazard detector for an occupant,and so forth, it being generally more desirable for such tasks to becarried out in the immediate presence of the human occupant. Forpurposes of the instant description, such tasks can be considered as“human-facing” or “human-centric” tasks.

When serving as a localized thermostat for an occupant, a particular oneof the service robots 168 can be considered to be facilitating what canbe called a “personal comfort-area network” for the occupant, with theobjective being to keep the occupant's immediate space at a comfortabletemperature wherever that occupant may be located in the home. This canbe contrasted with conventional wall-mounted room thermostats, whichhave the more attenuated objective of keeping a statically-definedstructural space at a comfortable temperature. According to oneembodiment, the localized-thermostat service robot 168 is configured tomove itself into the immediate presence (e.g., within five feet) of aparticular occupant who has settled into a particular location in thehome (e.g., in the dining room to eat their breakfast and read thenews). The localized-thermostat service robot 168 includes a temperaturesensor, a processor, and wireless communication components configuredsuch that control communications with the HVAC system, either directlyor through a wall-mounted wirelessly communicating thermostat coupled tothe HVAC system, are maintained and such that the temperature in theimmediate vicinity of the occupant is maintained at their desired level.If the occupant then moves and settles into another location (e.g., tothe living room couch to watch television), the localized-thermostatservice robot 168 proceeds to move and park itself next to the couch andkeep that particular immediate space at a comfortable temperature.

Technologies by which the localized-thermostat service robot 168 (and/orthe larger smart-home system of FIG. 1) can identify and locate theoccupant whose personal-area space is to be kept at a comfortabletemperature can include, but are not limited to, RFID sensing (e.g.,person having an RFID bracelet, RFID necklace, or RFID key fob),synthetic vision techniques (e.g., video cameras and face recognitionprocessors), audio techniques (e.g., voice, sound pattern, vibrationpattern recognition), ultrasound sensing/imaging techniques, andinfrared or near-field communication (NFC) techniques (e.g., personwearing an infrared or NFC-capable smartphone), along with rules-basedinference engines or artificial intelligence techniques that draw usefulconclusions from the sensed information (e.g., if there is only a singleoccupant present in the home, then that is the person whose immediatespace should be kept at a comfortable temperature, and the selection ofthe desired comfortable temperature should correspond to that occupant'sparticular stored profile).

When serving as a localized air monitor/purifier for an occupant, aparticular service robot 168 can be considered to be facilitating whatcan be called a “personal health-area network” for the occupant, withthe objective being to keep the air quality in the occupant's immediatespace at healthy levels. Alternatively or in conjunction therewith,other health-related functions can be provided, such as monitoring thetemperature or heart rate of the occupant (e.g., using finely remotesensors, near-field communication with on-person monitors, etc.). Whenserving as a localized hazard detector for an occupant, a particularservice robot 168 can be considered to be facilitating what can becalled a “personal safety-area network” for the occupant, with theobjective being to ensure there is no excessive carbon monoxide, smoke,fire, etc. in the immediate space of the occupant. Methods analogous tothose described above for personal comfort-area networks in terms ofoccupant identifying and tracking are likewise applicable for personalhealth-area network and personal safety-area network embodiments.

According to some embodiments, the above-referenced facilitation ofpersonal comfort-area networks, personal health-area networks, personalsafety-area networks, and/or other such human-facing functionalities ofthe service robots 168, are further enhanced by logical integration withother smart sensors in the home according to rules-based inferencingtechniques or artificial intelligence techniques for achieving betterperformance of those human-facing functionalities and/or for achievingthose goals in energy-conserving or other resource-conserving ways.Thus, for one embodiment relating to personal health-area networks, theair monitor/purifier service robot 168 can be configured to detectwhether a household pet is moving toward the currently settled locationof the occupant (e.g., using on-board sensors and/or by datacommunications with other smart-home sensors along with rules-basedinferencing/artificial intelligence techniques), and if so, the airpurifying rate is immediately increased in preparation for the arrivalof more airborne pet dander. For another embodiment relating to personalsafety-area networks, the hazard detector service robot 168 can beadvised by other smart-home sensors that the temperature and humiditylevels are rising in the kitchen, which is nearby to the occupant'scurrent dining room location, and responsive to this advisory the hazarddetector service robot 168 will temporarily raise a hazard detectionthreshold, such as a smoke detection threshold, under an inference thatany small increases in ambient smoke levels will most likely be due tocooking activity and not due to a genuinely hazardous condition.

The above-described “human-facing” and “away” functionalities can beprovided, without limitation, by multiple distinct service robots 168having respective dedicated ones of such functionalities, by a singleservice robot 168 having an integration of two or more different ones ofsuch functionalities, and/or any combinations thereof (including theability for a single service robot 168 to have both “away” and “humanfacing” functionalities) without departing from the scope of the presentteachings. Electrical power can be provided by virtue of rechargeablebatteries or other rechargeable methods, with FIG. 1 illustrating anexample out-of-the-way docking station 169 to which the service robots168 will automatically dock and recharge its batteries (if needed)during periods of inactivity. Preferably, each service robot 168includes wireless communication components that facilitate datacommunications with one or more of the other wirelessly communicatingsmart-home sensors of FIG. 1 and/or with one or more other servicerobots 168 (e.g., using Wi-Fi, Zigbee, Z-Wave, 6LoWPAN, etc.), and oneor more of the smart-home devices of FIG. 1 can be in communication witha remote server over the Internet. Alternatively or in conjunctiontherewith, each service robot 168 can be configured to communicatedirectly with a remote server by virtue of cellular telephonecommunications, satellite communications, 3G/4G network datacommunications, or other direct communication method.

Provided according to some embodiments are systems and methods relatingto the integration of the service robot(s) 168 with home securitysensors and related functionalities of the smart home system. Theembodiments are particularly applicable and advantageous when appliedfor those service robots 168 that perform “away” functionalities or thatotherwise are desirable to be active when the home is unoccupied(hereinafter “away-service robots”). Included in the embodiments aremethods and systems for ensuring that home security systems, intrusiondetection systems, and/or occupancy-sensitive environmental controlsystems (for example, occupancy-sensitive automated setback thermostatsthat enter into a lower-energy-using condition when the home isunoccupied) are not erroneously triggered by the away-service robots.

Provided according to one embodiment is a home automation and securitysystem (e.g., as shown in FIG. 1) that is remotely monitored by amonitoring service by virtue of automated systems (e.g., cloud-basedservers or other central servers, hereinafter “central server”) that arein data communications with one or more network-connected elements ofthe home automation and security system. The away-service robots areconfigured to be in operative data communication with the centralserver, and are configured such that they remain in a non-away-servicestate (e.g., a dormant state at their docking station) unless permissionis granted from the central server (e.g., by virtue of an“away-service-OK” message from the central server) to commence theiraway-service activities. An away-state determination made by the system,which can be arrived at (i) exclusively by local on-premises smartdevice(s) based on occupancy sensor data, (ii) exclusively by thecentral server based on received occupancy sensor data and/or based onreceived proximity-related information such as GPS coordinates from usersmartphones or automobiles, or (iii) any combination of (i) and (ii),can then trigger the granting of away-service permission to theaway-service robots by the central server. During the course of theaway-service robot activity, during which the away-service robots maycontinuously detect and send their in-home location coordinates to thecentral server, the central server can readily filter signals from theoccupancy sensing devices to distinguish between the away-service robotactivity versus any unexpected intrusion activity, thereby avoiding afalse intrusion alarm condition while also ensuring that the home issecure. Alternatively or in conjunction therewith, the central servermay provide filtering data (such as an expected occupancy-sensingprofile triggered by the away-service robots) to the occupancy sensingnodes or associated processing nodes of the smart home, such that thefiltering is performed at the local level. Although somewhat lesssecure, it would also be within the scope of the present teachings forthe central server to temporarily disable the occupancy sensingequipment for the duration of the away-service robot activity.

According to another embodiment, functionality similar to that of thecentral server in the above example can be performed by an on-sitecomputing device such as a dedicated server computer, a “master” homeautomation console or panel, or as an adjunct function of one or more ofthe smart-home devices of FIG. 1. In such embodiment, there would be nodependency on a remote service provider to provide the “away-service-OK”permission to the away-service robots and the false-alarm-avoidancefiltering service or filter information for the sensed intrusiondetection signals.

According to other embodiments, there are provided methods and systemsfor implementing away-service robot functionality while avoiding falsehome security alarms and false occupancy-sensitive environmentalcontrols without the requirement of a single overall event orchestrator.For purposes of the simplicity in the present disclosure, the homesecurity systems and/or occupancy-sensitive environmental controls thatwould be triggered by the motion, noise, vibrations, or otherdisturbances of the away-service robot activity are referenced simply as“activity sensing systems,” and when so triggered will yield a“disturbance-detected” outcome representative of the false trigger (forexample, an alarm message to a security service, or an “arrival”determination for an automated setback thermostat that causes the hometo be heated or cooled to a more comfortable “occupied” setpointtemperature). According to one embodiment, the away-service robots areconfigured to emit a standard ultrasonic sound throughout the course oftheir away-service activity, the activity sensing systems are configuredto detect that standard ultrasonic sound, and the activity sensingsystems are further configured such that no disturbance-detected outcomewill occur for as long as that standard ultrasonic sound is detected.For other embodiments, the away-service robots are configured to emit astandard notification signal throughout the course of their away-serviceactivity, the activity sensing systems are configured to detect thatstandard notification signal, and the activity sensing systems arefurther configured such that no disturbance-detected outcome will occurfor as long as that standard notification signal is detected, whereinthe standard notification signal comprises one or more of: an opticalnotifying signal; an audible notifying signal; an infrared notifyingsignal; an infrasonic notifying signal; a wirelessly transmitted datanotification signal (e.g., an IP broadcast, multicast, or unicastnotification signal, or a notification message sent in a TCP/IP two-waycommunication session).

According to some embodiments, the notification signals sent by theaway-service robots to the activity sensing systems are authenticatedand encrypted such that the notifications cannot be learned andreplicated by a potential burglar. Any of a variety of knownencryption/authentication schemes can be used to ensure such datasecurity including, but not limited to, methods involving third partydata security services or certificate authorities. For some embodiments,a permission request-response model can be used, wherein any particularaway-service robot requests permission from each activity sensing systemin the home when it is ready to perform its away-service tasks, and doesnot initiate such activity until receiving a “yes” or “permissiongranted” message from each activity sensing system (or from a singleactivity sensing system serving as a “spokesman” for all of the activitysensing systems). One advantage of the described embodiments that do notrequire a central event orchestrator is that there can (optionally) bemore of an arms-length relationship between the supplier(s) of the homesecurity/environmental control equipment, on the one hand, and thesupplier(s) of the away-service robot(s), on the other hand, as it isonly required that there is the described standard one-way notificationprotocol or the described standard two-way request/permission protocolto be agreed upon by the respective suppliers.

According to still other embodiments, the activity sensing systems areconfigured to detect sounds, vibrations, RF emissions, or otherdetectable environmental signals or “signatures” that are intrinsicallyassociated with the away-service activity of each away-service robot,and are further configured such that no disturbance-detected outcomewill occur for as long as that particular detectable signal orenvironmental “signature” is detected. By way of example, a particularkind of vacuum-cleaning away-service robot may emit a specific sound orRF signature. For one embodiment, the away-service environmentalsignatures for each of a plurality of known away-service robots arestored in the memory of the activity sensing systems based onempirically collected data, the environmental signatures being suppliedwith the activity sensing systems and periodically updated by a remoteupdate server. For another embodiment, the activity sensing systems canbe placed into a “training mode” for the particular home in which theyare installed, wherein they “listen” and “learn” the particularenvironmental signatures of the away-service robots for that home duringthat training session, and thereafter will suppress disturbance-detectedoutcomes for intervals in which those environmental signatures areheard.

For still another embodiment, which is particularly useful when theactivity sensing system is associated with occupancy-sensitiveenvironmental control equipment rather than a home security system, theactivity sensing system is configured to automatically learn theenvironmental signatures for the away-service robots by virtue ofautomatically performing correlations over time between detectedenvironmental signatures and detected occupancy activity. By way ofexample, for one embodiment an intelligent automatednonoccupancy-triggered setback thermostat such as the Nest LearningThermostat can be configured to constantly monitor for audible and RFactivity as well as to perform infrared-based occupancy detection. Inparticular view of the fact that the environmental signature of theaway-service robot will remain relatively constant from event to event,and in view of the fact that the away-service events will likely either(a) themselves be triggered by some sort of nonoccupancy condition asmeasured by the away-service robots themselves, or (b) will occur atregular times of day, there will be patterns in the collected data bywhich the events themselves will become apparent and for which theenvironmental signatures can be readily learned. Generally speaking, forthis automatic-learning embodiment in which the environmental signaturesof the away-service robots are automatically learned without requiringuser interaction, it is more preferable that a certain number of falsetriggers be tolerable over the course of the learning process.Accordingly, this automatic-learning embodiment is more preferable forapplication in occupancy-sensitive environmental control equipment (suchas an automated setback thermostat) rather than home security systemsfor the reason that a few false occupancy determinations may cause a fewinstances of unnecessary heating or cooling, but will not otherwise haveany serious, whereas false home security alarms may have more seriousconsequences.

FIG. 2 illustrates a network-level view of an extensible devices andservices platform 200 with which a plurality of smart-home environments,such as the smart-home environment 100 of FIG. 1, can be integrated. Theextensible devices and services platform 200 includes remote servers orcloud computing architectures 164. Each of the network-connected smartdevices from FIG. 1 can communicate with the remote servers or cloudcomputing architectures 164. For example, a connection to the Internet162 can be established either directly (for example, using 3G/4Gconnectivity to a wireless carrier), through a hubbed network 212 (whichcan be a scheme ranging from a simple wireless router, for example, upto and including an intelligent, dedicated whole-home control node), orthrough any combination thereof.

Although in some examples provided herein, the devices and servicesplatform 200 communicates with and collects data from thenetwork-connected smart devices of smart-home environment 100 of FIG. 1,it should be appreciated that the devices and services platform 200communicates with and collects data from a plurality of smart-homeenvironments across the world. For example, the central server orcloud-computing system 164 can collect home data 202 from thenetwork-connected devices of one or more smart-home environments, wherethe network-connected devices can routinely transmit home data or cantransmit home data in specific instances (e.g., when a device queriesthe home data 202). Thus, the devices and services platform 200routinely collects data from homes across the world. As described, thecollected home data 202 includes, for example, security data, such as amap of the home and the respective network-connected smart devices andtheir capabilities in each room, alarm settings information, contactinformation for the registered occupants of the home, etc. The collectedhome data 202 may also include, for example, power consumption data,occupancy data, HVAC settings and usage data, carbon monoxide levelsdata, carbon dioxide levels data, volatile organic compounds levelsdata, sleeping schedule data, cooking schedule data, inside and outsidetemperature humidity data, television viewership data, inside andoutside noise level data, etc.

The central server or cloud-computing architecture 164 can furtherprovide one or more services 204, such as security related servicesdescribed herein. The services 204 can include software updates,customer support, remote access, remote or distributed control, usesuggestions (e.g., based on collected home data 202 to improveperformance, reduce utility cost, etc.), and/or sensor datacollection/logging, where sensor data and other data fromnetwork-connected smart devices of smart-home environments 100 iscollected and logged. For example, the data collected and logged mayinclude maps of homes, maps of users' in-home movements from room toroom as determined by network-connected smart devices equipped withmotion and/or identification technology, time spent in each room,intra-home occupancy maps that indicate which rooms are occupied and bywhom at different times (including in real time), fire-detectionincidents, false alarms, CO data, temperature data, humidity data, etc.According to embodiments, in the event the data collected from thenetwork-connected smart devices of a smart-home environment 100indicates that an alarm threshold for a particular home is beingapproached, the services 204 increases the frequency at which itcollects and logs data from network-connected devices in that home. Forexample, in the event the data collected from network-connected devicesindicates activity in a kitchen of a smart-home environment 100 whilethe occupants are asleep, then, instead of collecting data from thenetwork-connected smart devices of the home in thirty-second intervals,the services 204 collects data in ten-second intervals. According toembodiments, the data collected and logged may be provided toinvestigators after the occurrence of a crime, fire, etc., so that thedata may be used to solve the crime, determine the cause of the fire,etc.

The services 204 can further include, for example, remote access, remoteor distributed control, security improvement suggestions (e.g., providesuggestions for enhancing security of a home based on collected homedata 202, etc.), software updates, customer support, etc. Dataassociated with the services 204 can be stored and/or logged at thecentral server or cloud-computing system 164 and the central server orthe cloud-computing system 164 can retrieve and transmit the data at anappropriate time (e.g., at regular intervals, upon receiving requestfrom a user, etc.).

As illustrated in FIG. 2, an embodiment of the extensible devices andservices platform 200 includes a processing engine 206, which can beconcentrated at a single server or distributed among several differentcomputing entities without limitation. The processing engine 206 caninclude engines configured to receive data from network-connected smartdevices of smart-home environments (e.g., via the Internet or a hubbednetwork), to index the data, to analyze the data and/or to generatestatistics based on the analysis or as part of the analysis. Theanalyzed data can be stored as derived home data 208.

Results of the analysis or statistics can thereafter be transmitted backto the network-connected smart device(s) that provided home data used toderive the results, to other network-connected smart devices, to a usermobile device 166, to a server providing a webpage to the user's mobiledevice 166, or to other non-device entities. For example, patterns andstatistics summarizing data received from network-connected smartdevices can be generated by the processing engine 206 and transmitted.The results or statistics can be provided via the Internet 162. In thismanner, the processing engine 206 can be configured and programmed toderive a variety of useful information from the home data 202. A singleserver can include one or more engines.

The derived data can be highly beneficial at a variety of differentgranularities for a variety of useful purposes, ranging from explicitprogrammed control of network-connected smart devices on a per-home,per-neighborhood, or per-region basis (for example, demand-responseprograms for electrical utilities, security related statistics unique toparticular neighborhoods can be used to control particularnetwork-connected smart devices, etc.), to the generation of inferentialabstractions that can assist on a per-home basis (for example, aninference can be drawn that the homeowner has left for vacation and sosecurity detection equipment can be put on heightened sensitivity), tothe generation of statistics and associated inferential abstractionsthat can be used for government or charitable purposes. For example,processing engine 206 can generate statistics about network-connectedsmart device usage across a population of devices and send thestatistics to device users, service providers or other entities (e.g.,that have requested or may have provided monetary compensation for thestatistics).

In some embodiments, to encourage security-related innovation andresearch and to increase security-related and other products andservices available to users, the devices and services platform 200exposes a range of application programming interfaces (APIs) 210 tothird parties, such as law enforcement agencies 222 (e.g., police orpublic and/or private security entities), governmental entities 224(e.g., Health and Safety Agencies, such as the Food and DrugAdministration (FDA), the Environmental Protection Agency (EPA), etc.),academic institutions 226 (e.g., university researchers), businesses 228(e.g., private security businesses or charities or utility companies orcompanies that may provide device warranties or service to relatedequipment, targeting advertisers based on home data, etc.), emergencyresponse providers 230, such as fire and ambulance, and other thirdparties. The APIs 210 are coupled to and permit third-party systems tocommunicate with the central server or the cloud-computing system 164,including the services 204, the processing engine 206, the home data202, and the derived home data 208. For example, the APIs 210 allowapplications executed by the third parties to initiate specific dataprocessing tasks that are executed by the central server or thecloud-computing system 164, as well as to receive dynamic updates to thehome data 202 and the derived home data 208.

For example, third parties can develop programs and/or applications,such as web or mobile apps, that integrate with the central server orthe cloud-computing system 164 to provide services and information tousers. Such programs and applications may be, for example, designed tohelp users reduce energy consumption, to preemptively service faultyequipment, to prepare for high service demands, to track past serviceperformance, etc., or to secure their homes by performing any of avariety of beneficial functions or tasks now known or hereinafterdeveloped. Examples include providing users with local crime news,information and statistics, safety tips and check lists, such as tipsfor installing security lights, door and window locks, etc.

According to some embodiments, third-party applications make inferencesfrom the home data 202 and the derived home data 208, such inferencesmay include when are occupants home, when are they sleeping, when arethey in the den watching television, when they shower. The answers tothese questions may help third-parties benefit consumers by providingthem with interesting security-related information, products andservices, as well as with providing them with targeted advertisements.In one example, a private security company creates an application thatmakes inferences regarding when people are away from home. Theapplication uses the inferences to schedule private security officers tostop or drive by the home when people will most likely be away fromhome, the application may also put the user's network-connected smartdevices in alarm mode, notify trusted neighbors that the user is away,etc.

In one example, a business 228 may be a shipping company that may createan application that makes inferences regarding when people are at home.The application uses the inferences to schedule deliveries for timeswhen people will most likely be at home. The application can also builddelivery routes around these scheduled times. This reduces the number ofinstances where the shipping company has to make multiple attempts todeliver packages, and it reduces the number of times consumers have topick up their packages from the shipping company (e.g., as describedbelow with respect to FIG. 19).

In some embodiments, the devices and services platform 200 exposes APIs210 to third parties, such as businesses 228 in exchange for revenue,such as for a monthly fee, similar to a subscription service. In oneexample, the business 228 may be a retail store that sells consumerproducts and building and construction supplies and materials, includingthe network-connected smart devices described above with reference toFIG. 1. In one example, the retail store 228 agrees to sellnetwork-connected smart devices at discount in exchange for free ordiscounted access to the APIs 210. The retails store 228 can use theinformation from the APIs 210 to better target their customers andincrease sales. While the provider of the devices and services platform200 benefits from a proliferation of discounted network-connected smartdevices.

FIG. 3 illustrates an abstracted functional view of the extensibledevices and services platform 200 of FIG. 2, with particular referenceto the processing engine 206 as well as devices, such as thenetwork-connected smart devices of the smart-home environment 100 ofFIG. 1. Even though network-connected smart devices situated insmart-home environments will have an endless variety of differentindividual capabilities and limitations, they can all be thought of assharing common characteristics in that each of them is a data consumer302 (DC), a data source 304 (DS), a services consumer 306 (SC), and aservices source 308 (SS). Advantageously, in addition to providing theessential control information needed for the devices to achieve theirlocal and immediate objectives, the extensible devices and servicesplatform 200 can also be configured to harness the large amount of datathat is flowing out of these devices. In addition to enhancing oroptimizing the actual operation of the devices themselves with respectto their immediate functions, the extensible devices and servicesplatform 200 can be directed to “repurposing” that data in a variety ofautomated, extensible, flexible, and/or scalable ways to achieve avariety of useful home security/smart home objectives. These objectivesmay be predefined or adaptively identified based on, e.g., usagepatterns, device efficiency, and/or user input (e.g., requestingspecific functionality, manually inputting specific data).

For example, FIG. 3 shows processing engine 206 as including a number ofparadigms 310. Processing engine 206 can include a managed servicesparadigm 310 a that monitors and manages primary or secondary devicefunctions. The device functions can include ensuring proper operation ofa network-connected smart device given user inputs, detecting (e.g., andresponding to) an intruder that has entered or is attempted to enter adwelling (e.g., security), implementing or otherwise responding toenergy demand response events, detecting a failure of equipment coupledto a network-connected smart device (e.g., a light bulb having burnedout, passive IR sensor having gone bad, etc.), or alerting a user of acurrent event or predicted future events.

Processing engine 206 can further include an advertising/communicationparadigm 310 b that estimates characteristics (e.g., demographicinformation, time spent doing particular activities like cooking orwatching television), desires and/or products of interest of a userbased on device usage and/or data received from network-connected smartdevices. Services, promotions, products or upgrades can then be offeredor automatically provided to the user. Processing engine 206 can furtherinclude a social paradigm 310 c that uses information from a socialnetwork, provides information to a social network (e.g., based on deviceusage), and/or processes data associated with user and/or deviceinteractions with the social network platform. For example, a user'sstatus as reported to their trusted contacts on the social network couldbe updated to indicate when they are home or away based on lightdetection, security system inactivation or device usage detectors. Asanother example, a user may be able to share device-usage statisticswith other users. As yet another example, a user may share HVAC settingsthat result in low power bills and other users may download the HVACsettings to their smart thermostat 102 to reduce their power bills.

The processing engine 206 can include achallenges/rules/compliance/rewards paradigm 310 d that informs a userof challenges, competitions, rules, compliance regulations and/orrewards and/or that uses operation data to determine whether a challengehas been met, a rule or regulation has been complied with and/or areward has been earned. The challenges, rules or regulations can relateto efforts to conserve energy, improve security in the home (e.g.,regularly lock door, install adequate number of motion detectors oroutdoor lights, etc.), to live safely (e.g., reducing exposure to toxinsor carcinogens), to conserve money and/or equipment life, to improvehealth, etc. For example, one challenge may involve participants turningdown their thermostat by one degree for one week, or achieving a certain“security score” by properly equipping their home with security devicesand services and properly using and maintaining those devices. Thosethat successfully complete the challenge are rewarded, such as bycoupons, virtual currency, status, etc. Regarding compliance, an exampleinvolves a parent making a safety and security rule that children arenot permitted to leave the home alone after a specified curfew, such as9:00 PM. The network-connected smart devices in the home could track themovement of the various occupants and send alerts to the parent when achild leaves the home alone after the curfew or when the child is awayfrom home after the curfew. Regarding compliance, another exampleinvolves a rental-property owner making a rule that no renters arepermitted to access certain owner's rooms. The devices in the roomhaving occupancy sensors could send updates to the owner when the roomis accessed.

The processing engine 206 can integrate or otherwise utilize extrinsicinformation 316 from extrinsic sources (e.g., via the Internet, such asweather forecasts, prices of certain goods/services, neighborhood/homeinformation, etc.) to improve the functioning of one or more processingparadigms. Extrinsic information 316 can be used to interpret datareceived from a network-connected smart device, to determine acharacteristic of the environment near the device (e.g., outside astructure that the device is enclosed in), to determine services orproducts available to the user, to identify a social network orsocial-network information, to determine contact information of entities(e.g., public-service entities such as an emergency-response team, thepolice or a hospital) near the device, etc., to identify statistical orenvironmental conditions, trends or other information associated with ahome or neighborhood, and so forth.

An extraordinary range and variety of benefits can be brought about by,and fit within the scope of, the described extensible devices andservices platform 200, ranging from the ordinary to the profound. Thus,in one “ordinary” example, each bedroom of the smart-home environment100 can be provided with a smart wall switch 108, a smart wall plug 110,and/or smart hazard detectors 104, all or some of which include anoccupancy sensor, wherein the occupancy sensor is also capable ofinferring (e.g., by virtue of motion detection, facial recognition,audible sound patterns (e.g., voice detection), etc.) whether theoccupant is asleep or awake. If a home intruder is detected, the remotesecurity/monitoring service or police department is advised of how manyoccupants there are in each bedroom, and whether those occupants arestill asleep (or immobile), and the real time location of the intruderin the home. Further, video from the home can be broadcasted tovideo-capable devices of the nearest security personnel and police sothat the police can monitor the activity in the home while in route tothe home. By way of another example, the same data that is being usedfor home security can also be “repurposed” by the processing engine 206in the context of a social paradigm of neighborhood security. Thus, forexample, the same data discussed in the example above can be collectedand made available for processing (properly anonymized) in which thecrime patterns and home safety in a particular ZIP code can be tracked.If a serious fire event is sensed, the remote security/monitoringservice or fire department is advised of how many occupants there are ineach bedroom, and whether those occupants are still asleep (or immobile)or whether they have properly evacuated the bedroom. While this is, ofcourse, a very advantageous capability accommodated by the describedextensible devices and services platform, there can be substantiallymore “profound” examples that can truly illustrate the potential of alarger “intelligence” that can be made available. By way of perhaps amore “profound” example, the same data bedroom occupancy data that isbeing used for fire safety can also be “repurposed” by the processingengine 206 in the context of a social paradigm of neighborhood childdevelopment and education. Thus, for example, the same bedroom occupancyand motion data discussed in the “ordinary” example can be collected andmade available for processing (properly anonymized) in which the sleeppatterns of schoolchildren in a particular ZIP code can be identifiedand tracked. Localized variations in the sleeping patterns of theschoolchildren may be identified and correlated, for example, todifferent nutrition programs in local schools.

In some embodiments, the devices and services platform 200 provides ahome security services 205 into which users can enroll their smart-homeenvironments 100. The security services 205 can be offered on anon-commitment month-to-month basis. It should also be appreciated thatthe security services 205 can be offered year-to-year or for lifetime.For example, the security services 205 can provide multi-tieredofferings, including offer basic, plus, and premium services. Basicservices, for example, include basic intrusion detection and emergencypersonnel notification. For example, the basic security services 205monitor incoming data from the network-connected smart devices of thehome to determine when a possible intrusion is occurring, as indicatedby motion detection outside the home, information from the smart entrydetectors indicating that any one of the doors 186 or windows 182 of thehome have been opened, etc. Upon detection, the basic security services205 contact the occupants of the home and/or local law enforcement. Plussecurity services 205, for example, monitor dangerous conditions in thehome including smoke, CO, in addition to home invasion. Premium services205 include, for example, availing the home to the many benefits of“neighbor security networks” (described below), detecting whenindividuals in the home are in distress, mimicking user patterns ofturning on lights and appliances when the user is on vacation, providingusers with security scores and corresponding tips for improving thesecurity of their home, providing live video stream of activity in thehome to the user when the user is away and to local law enforcement,etc.

In some embodiments, pricing for the security services or any suitabletype of home insurance may vary depending on the security score of thehome. As described below, security score is based on information such ashaving adequate numbers and placement of network-connected smart devices(e.g., hazard detectors, entry detectors, etc.), percentage of smartdevices that have WiFi (rather than low-power communication protocols),percentage of smart devices that are wired (rather than batterypowered), number of strangers that visit the home, etc. The higher thesecurity score of the home, the more secure the home and the cheaper thesecurity services and/or insurance may be. The devices and servicesplatform 200, according to embodiments, provides suggestions regardinghow to improve security scores and, to incent users to improve theirhome's score, the platform 200 also indicates what discounts the userwill receive if the user's home achieves a particular score.

In some embodiments, upon receiving an enrollment request from a user,the devices and services platform 200 assess the capabilities of thenetwork-connected smart devices in the user's home, and determineswhether the requested services are appropriate for the user. Forexample, if the user requests a premium service, such as the capabilityto broadcast live video stream to law enforcement, but the user only hasbut a couple of video enabled smart devices and/or a limited WiFinetwork, then the devices and services platform 200 recommends that theuser upgrade the smart devices in the home or select more basicservices.

Examples of security-related objectives will now be provided withreference to FIGS. 1-3. In one security-related example, some or all ofthe network-connected smart devices function as “tripwires” in thesecurity system. In this example, in the event one of thenetwork-connected smart devices detects motion, heat, sound, etc., itsends a corresponding message through the mesh network (e.g., fromnetwork-connected smart device to network-connected smart-device) and,in some cases, over the Internet to the central server orcloud-computing system 164, which triggers an alarm if the securitysystem is armed (e.g., the occupants are away or asleep). In thisexample, a user could enhance the security of the smart-home environment100 by buying and installing extra network-connected smart devices, suchas smart motion detectors 112 and smart nightlights 170.

In another security-related example, some or all of thenetwork-connected smart devices are equipped with identificationtechnology (e.g., face recognition, RFID, ultrasonic sensors) that“fingerprints” or creates a “signature” for the people, animals, andobjects. The identification technology can be the same as or similar tothe fingerprinting and signature creating techniques described in othersections of this application. In this example, based on informationreceived from the network-connected smart devices, the central server orcloud-computing system 164 stores a list of registered occupants and/orguests of the home. When a person whose fingerprint or signature is notrecognized by the central server or cloud-computing system 164 as aregistered occupant or guest comes “within range” of, or otherwiseinteracts with, one of the network-connected smart devices of the home,the central server or cloud-computing system 164 logs that person'spresence and, if the security system is armed, activates an alarmindicating the presence of an intruder. Further, the central server orcloud-computing system 164 may reference maps of the smart-homeenvironment and schedules to whether the identified person, animal, orobject is permitted to be in a particular area (e.g., room of the house)at a particular time and trigger an alarm accordingly.

In yet another security-related example, occupant-location data (e.g.,GPS data, IPS data, etc.) is used to achieve home-security objectives.According to embodiments, the occupants of a home (e.g., the individualswho live in or frequently visit the home) register their respectivemobile devices 166 as being associated with the home, and the centralserver or cloud-computing system 164 tracks the occupants' movementinside and outside of the home based on occupant-location data receivedfrom the mobile devices 166. The central server or cloud-computingsystem 164 uses this tracking information to make inferences regardingthe current and future occupancy of the home and/or rooms, and tocontrol the network-connected smart devices inside the home in acorresponding manner. For example, outdoor lights 114 can be turned onwhen it is determined that an occupant is returning home, or the smartdoorknobs 122 can be locked and the security system can be armed whenthe occupant is leaving home. Also for example, the threshold fornotifying authorities of an emergency can be adjusted depending onwhether an occupant having a registered mobile device 166 is at home.For example, if the registered occupant is at home when an alarmcondition (e.g., fire, distressed person, home invasion) is detected, amessage can be sent to the occupant's mobile device 166 requestingconfirmation that everything is okay. The authorities will only benotified if the registered occupant responds confirming that there is anemergency or if the registered occupant does not respond within atimeout period. On the other hand, if an alarm condition is detected andthere are not registered occupants at home, then the authorities areimmediately notified and a concurrent message is sent to the mobiledevices 166 of the registered occupants.

In some instances the central server or cloud-computing system 164receives occupant-location data directly from the mobile devices,whereas in other instances the data is received from an intermediary,such as one of the network-connected smart devices in the home. Ininstances where occupant-location data is received directly from themobile device, the central server or cloud-computing system 164 candetermine if the occupant is “at home” or “away” based on whether thereceived occupant-location data corresponds with the location of thehome. What's more, in some embodiments, the central server orcloud-computing system 164 can use the occupant-location data receiveddirectly from the mobile devices to determine the occupant's actualroom-location (e.g., bedroom, kitchen, garage, etc.). To do so, forexample, the central server or cloud-computing system 164cross-references the received occupant-location data (e.g., GPS data,IPS data, etc.) with a map of the home. On the other hand, in instanceswhere occupant-location data is received from network-connected smartdevices, the central server or cloud-computing system 164 can infer thatthe occupant is in the room where the network-connected smart device islocated. Network-connected smart devices can detect mobile devices viaWiFi, Bluetooth, NFC, etc.

It should also be appreciated that passive RFID tags (rather than or inaddition to mobile devices) can be used to determine the room-locationof occupants (and pets). For example, an RFID is associated with each ofthe occupants (and pets) of the house, such as by including the tags inwallets, bracelets, wristbands, mobile devices, collars, etc. Thenetwork-connected smart devices in the various rooms detect the RFIDtags, and send that information to the central server or cloud-computingsystem 164.

According to an embodiment, the determined room location of an occupantis used determine which user controls to provide to the occupant'smobile device 166 when the occupant uses the mobile device 166 tocontrol the smart-home environment 100. In other words, a different menuis displayed to the occupant depending on the occupant's location in thehome. For example, if the occupant is located in the garage, then thedisplayed menu gives the occupant the option to turn up or downsensitivity of the smart entry detector 112 of the garage door. Also forexample, if the occupant is in the kitchen, then the displayed menugives the occupant the option to adjust the smoke-detection sensitivityof the smart hazard detector 104 in the kitchen. This might enable theoccupant to cook without triggering a smoke alarm condition. Further,for example, if the occupant is located in a bedroom, then the displayedmenu may give the occupant the option to lock the smart doorknob 122 andarm the alarm system.

In the event all occupants of the smart-home environment 100 registertheir mobile device 166 as being associated with the home, the centralserver and cloud-computing systems 164 can infer that strangers are inthe home when unknown mobile devices are detected. For example, if thenetwork-connected smart devices detected two people in the home, andboth of those people are associated with registered mobile devices 166,then it can be inferred that no strangers are in the home. However, ifthree people are detected in the home, but only two people areassociated with registered mobile devices 166, then it can be inferredthat there is one stranger in the home. A home may be considered lesssecure when there are unregistered mobile devices in the home and whenthere are more occupants than registered devices. For example, a homethat is undergoing a remodel and that has dozens of unregisteredconstruction workers with unregistered mobile devices coming and goingis less secure than a home where all occupants are associated withregistered mobile devices and where there are no unregistered mobiledevices in the home.

According to some embodiments, occupants can use their registered mobiledevices 166 to access the smart-home environment 100. For example, thesmart doorknob 122 and the mobile device 166 may be capable ofcommunicating via near field communication (NFC), BLUETOOTH, or someother short-ranger wireless protocol. To gain access to the home (e.g.,cause the smart doorknob 122 to unlock), the mobile device 166 of theuser may transmit an access code to the smart doorknob 122, which thenverifies with the server 164 that the person is a registered occupant.

Turning to another security-related example, the mesh network can beused to track a person's movement as the person transitions from room toroom. As such, the central server or cloud-computing system 164 knowswhich room in the smart-home environment is occupied and by whom (e.g.,using identification technology) at all times. For example, thelow-powered and spokesman nodes (e.g., network-connected smart devices102, 104, 106, 108, 110, 112, 122, and 170) detect the person's movementthrough the smart-home environment 100 and communicate correspondingmessages through the mesh network. Using the messages that indicatewhich rooms are occupied, the central server or cloud-computing system164 logs the information for later use and/or instructs various smartdevices in the home to perform certain operations, such as turn on andoff lights, lock the smart doorknobs 122, sound alarms, notify publicsafety authorities and the home owner, etc. as the person enters andexits rooms.

According to embodiments, the central server or cloud-computing system164 can review the logged information about the occupants' movement inthe home to detect signature patterns of movement unique to the variousoccupants. These signature patterns help the central server orcloud-computing system 164 detect strangers in the home. For example, ifan individual is quickly moving from room-to-room at a time whenoccupants typically are not at home and according to a pattern that isnot associated with any of the occupants, the central server orcloud-computing system 164 may infer that this individual is a burglarmoving from room to room searching for valuable items.

In yet another security-related example, some or all of thenetwork-connected smart devices are equipped with WiFi, BLUETOOTH, NFC,and/or other wireless communication capability. Accordingly, in theevent one or more burglars enter the home carrying on their person theirmobile devices (e.g., smart phones), the network-enabled smart homedevices, upon detecting the home-invasion condition, automatically“interrogate” a burglar's mobile device to try and extract as muchuseful information as possible about the burglar including, but notlimited to, the MAC address of their phone, their cell number, and/oranything else that their mobile device will divulge about itself or theburglar. In addition, an alarm message could be sent to the occupant'smobile device 166 and also to a security service (or police, etc.)containing some or all of this information. According to embodiments,the smart-home environment 100 and/or the security service that monitorsthe smart-home environment can automatically connect with a wirelesstelephone carrier to determine which mobile devices are currentlycommunicating with the cell tower(s) nearest the burglarized home. Thewireless telephone carriers could automatically generate a “suspectlist” that would necessarily include the burglar's mobile device.

According to embodiments, the smart-home environment includes a smallcellular base station, such as a picocell or microcell. Such cellularbase stations provide great LTE, 3G, 4G, etc. data rates in the homeand, in some cases, could replace or supplement WiFi. This base stationcould provide a cellular backup to call emergency personnel such asfire/police in the event of an emergency. Also, referring to thescenario above, in the event a burglar is inside the home, the basestation could capture all unique IDs (e.g., mac, imei, serial number)from the burglar's mobile device.

In another security-related example, some or all of thenetwork-connected smart devices are equipped with video cameras. In thiscase, the network-connected smart devices can transmit video to thecentral server and cloud-computing system 164, which can make the videoavailable to client devices, such as the user device 166, in the form ofa live or prerecorded video stream. An occupant, when away from thehome, can use their user device 166 to connect to the central server andcloud-computing system 164 to receive live or prerecorded video ofactivity occurring in the home. In some embodiments, central server andcloud-computing system 164 automatically provides video from thenetwork-connected smart device that is observing the most activity. Forexample, if there is an intruder in the house, the central server andcloud-computing system 164 can detect which room is experiencing themost activity (e.g., based on noise and motion), and provide video fromthat room. It should also be appreciated that the central server andcloud-computing system 164 can provide for display on the user device166 a grid of cameras in the home to choose from. In this case thecentral server and cloud-computing system 164 can highlight which camerais observing the most activity, so that the user knows that camera islikely the best one to select. It should also be appreciated that thenetwork-connected smart devices have a microphone and speaker and thattwo-way voice communication can be established between thenetwork-connected smart device and the user device 166. For example, thetwo-way voice communication can be over internet protocol. This allowsusers to see and talk to home occupants when the user is away from home.

According to an embodiment, in moments of distress, thenetwork-connected smart devices can broadcast a live video stream tonearby emergency personnel such as police and fire departments. Forexample, upon detecting an intruder or some other emergency occurring inthe home or upon someone pressing a panic button in the home, live videocan be broadcast to nearby emergency personnel, such as police, fire,medical, and other first responders. The video, for example, istransmitted from the room where the most activity is occurring or wherethe button was pressed. In some cases, the video is transmitted directlyto the police car that is responding to the call (e.g., the closestpolice car). It should be appreciated that, rather than broadcast, thevideo may be provided via a secure stream using secure sockets layer(SSL). It should also be appreciated that the security score of the homemay be adjusted based on whether the home has the requisite SSLcertificates in place to support the secure video stream to emergencypersonnel.

According to an embodiment, the network-connected smart devices functionas “nanny cams”. In one example, when the nearest network-connectedsmart device detects that a sleeping child has woken, it will turn onits camera and microphone/speaker. The network-connected smart devicewill then send a message to the user device 166 of the parent/homeoccupant, who can accept the message to establish live video of thechild and two-way audio communication. It should be appreciated thatlive two-way video communication can also be established. In the casethe network-connected smart device can project a video of the user,include a video screen for display of video of the parent, and/orcontrol a nearby television or monitor to display video of the user. Thenetwork-connected smart device can detect when the child goes back tosleep, and can automatically shut down the video and/or audio.

According to embodiments, some or all of the network-connected devicesare equipped with pressure sensors, such as digital air pressuresensors, digital barometric pressure sensors, etc. These pressuresensors may be, for example, resonant types that measure changes in airdensity, thermal types that measure changes in thermal conductivity ofair, ionization types that measure changes in the flow of ions in air,and/or force collector types (e.g., bellow, diaphragm, piston, etc.)that measure deflection. One example security-related application forthese pressure sensors to detect opening and closing of doors as well asoccupant movement in the house by sensing pressure variation patternsassociated with such activities. For example, when a door opens orcloses, the pressure sensors of the network-connected smart deviceswould record the associated pressure variation. The central server andcloud-computing system 164, upon reviewing the recorded pressurevariation, can determine the activity associated with the pressurevariation. For example, pressure variation in a first range may indicatethat an adult occupant walked through a doorway while transitioning fromone room to another, while pressure in a second range may indicate thata particular door, internal or external, opened or closed.

According to embodiments, the smart-home environment 100 learns overtime what activity corresponds with particular pressure variationsdetected by particular network-connected smart devices in the home. Forexample, a smart hazard detector 104 located in a foyer near the frontdoor of a home can learn that it is located near an external door. Forexample, during initial installation, the smart hazard detector 104 canask the installing user to indicate the room (e.g., kitchen, den, foyer,hallway, etc.) in which it is being installed and whether it isproximate to an external door. Later, when it senses a pressurevariation, a message can be sent to an occupant's user device 166asking, “Was the external door near the foyer just opened? [Yes/No]”,“Did an occupant just walk through the foyer? [Yes/No]”. After the smarthazard detector 104 “learns” which pressure differentials are associatedwith which activities, it can contribute to home security. For example,the smart-home environment 100 automatically goes into security modewhen it determines that all occupants are in bed for the night or thatall occupants are away from the home. When in this security mode, if thesmart hazard detector 104 in the foyer senses a pressure differentialthat indicates the external door has just been opened, it triggers thealarm.

According to embodiments, the occupants of the home can pre-program thesmart-home environment 100 to broadcast specific alarms in response tospecific detected conditions. For example, in the event of smokedetection, the smart-home environment 100 can broadcast via thenetwork-connected smart devices and/or the home appliances, such astelevision and stereos, a pre-recorded message from the occupantnotifying the occupants of a possible fire and providing emergency exitinstructions. In another example, in case of detected home invasion, thesmart-home environment 100 can broadcast a message to the intruders,notifying them that their presence has been detected, that the occupantspossess and are trained to use firearms to protect their home, that thepolice have been notified, etc.

According to embodiments, the thresholds for triggering these alarms canbe varied based on activities occurring in the home. More particularly,technologies including the sensors of the network-enabled smart devicesin combination with rules-based inference engines or artificialintelligence provided by the central server and cloud-computer system164 are used to vary alarm thresholds based on the occupants'activities. Inferences about the occupants' activities can be learnedbased on data received over time. For example, if the smart hazarddetector 104 located in the kitchen observes increased temperature,humidity, and motion in the kitchen, then an inference can be made thatone or more of the occupants are cooking (“cooking inference”). Thesedata inputs can be considered on a sliding scale based on time of dayand day of week. For example, only slight increases in temperature andhumidity may invoke the cooking inference at 5 pm on weekdays, whenhistory shows that is when the occupants typically cook. However, muchlarger increases are required to invoke the cooking inference at 10 amon a weekday, when the occupants are typically away at that time. Insome embodiments, the smoke-alarm threshold is varied when the cookinginference is made. For example, the smart hazard detector 104 in thekitchen becomes less sensitive when one of the occupants is cooking,whereas the hazard detectors 104 in other rooms remain in normaloperation.

In other embodiments, alarm thresholds are varied based on humanpopulation in the home. Inferences about human population in the homecan be made based on sensed changes in motion, temperature, CO, noise,air pressure differentials, frequency of door openings and closings,etc. According to one example, in the event of detecting a concurrentincrease in temperature, motion, noise, and CO, an inference can be madethan there is a higher than normal human population in the home (“highpopulation inference”). Certain alarm thresholds may be adjusted when ahigh population inference is made. For example, the alarm threshold forCO can be increased to account for the high number of CO-emitting humansin the home and to avoid triggering a false CO alarm. In anotherexample, the security system can be disarmed so that guests can freelytransition from room to room and in and out of external doors withouttriggering the alarm. On the other hand, the alarm threshold for smokedetection can be decreased so that the smoke detectors are moresensitive than usual. This is to protect the large number of people inthe home from fire. In other examples, the network-connected thermostatmay adjust the temperature of the home to a standard temperature that iscomfortable for most people. For example, if the occupants like thehouse to be cool and “teach” the network-connected thermostat tomaintain the home at a cooler temperature, then, in the event of ahigh-occupancy inference, the network-connected thermostat can adjust upto a temperature that is comfortable for most people. Similarly, forexample, if the occupants like the house to be warm and “teach” thenetwork-connected thermostat to maintain the home at a warmertemperature, then, in the event of a high-occupancy inference, thenetwork-connected thermostat can adjust down to a temperature that iscomfortable for most people.

According to embodiments, alarm thresholds can be varied based onproximity of law enforcement and other emergency personnel. For example,if a law enforcement office is nearby the threshold for the homeinvasion alarm condition can be increased. This may be applicable inapartments of buildings that have private security, including a doorman.

According to some embodiments, an “occupancy emulator” can be providedto emulate the occupants of a smart-home environment 100 when theoccupants are away, such as on vacation. For example, the smart wallswitches 108 and/or the smart wall plugs 110 can function as an“occupancy emulator” by learning the occupants' patterns of turning onand off lights, appliances, etc. and mimicking those patterns when theoccupants are away.

According to embodiments, the central server or cloud-computing system164 processes artificial intelligence algorithms capable of makingrules-based or learning-based inferences based on sensed patterns ofuser control of network-connected smart devices, optionally inconjunction with sensed home conditions or other sensed user behaviors.By way of example, for one embodiment, one or more of the smart wallswitches 108 is configured to process information acquired by homeoccupancy sensing devices in conjunction with information fromlight-switch-control behaviors of the user to produce a result in whichthe smart wall switches 108 are automatically self-programmed to helpthe user turn off and on lights according to a preferred schedule, andto mimic the user's patterns when the user is away. This automaticself-programming can also be applied to smart wall plugs 110, which canlearn when to turn on and off lamps 118 as well as appliances such astelevisions and stereos. Further, it should be appreciated that allnetwork-connected smart devices can automatically self-program.

In one example, the artificial intelligence algorithms can be configuredto sense whether there have been a threshold number of days over thepast month (or other evaluation period) for which, at roughly the sametime of day (“X o'clock”), the user has turned on or off the same orroughly the same set of smart wall switches 108 and/or smart wall plugs110 to turn on or off the same or roughly the same lights and/orappliances in the home. If such a pattern has been detected, the usercan be sent a message on their smartphone 166 allowing them to opt-in toa setting in which one or more the relevant smart wall switches 108and/or smart wall plugs 110 will be automatically turned on or off so asto turn on or off the relevant lights and/or appliances at aboutX-o'clock. It should be appreciated that the smart-home environmentcould learn and emulate other patterns. For example, it could learn whenthe dog barks, such as when a person is within 100 feet of the home orwhen an occupant returns home from work at about X o'clock, and thenrecord and play back barking sounds at appropriate times. It should alsolearn when to open and close the garage door to give the appearance thatthe occupant is going and coming to and from the home.

By way of example, the opt-in message can say, “When you are not athome, I can emulate your presence by automatically turning on the lightsand television in the den at about X o'clock on weekdays for about twohours, and at about Y o'clock on weekends for about three hours. Itmight better secure your home by deterring home invasions! Would youlike me to do this for you? ‘[YES/NO]’”. The user can then opt in tothis functionality and/or modify the schedule and opt in to the modifiedschedule. If the user's schedule changes, the artificial intelligencealgorithms can learn the new schedule and make the proper adjustments.Thus, in accordance with the described embodiment, the collection ofsmart-home sensors is configured to automatically learn selected userbehaviors, to emulate the user's patterns when the user is away, and toautomatically learn changes in the user's schedule and makecorresponding adjustments.

According to some embodiments, security of the smart-home environmentcan be further enhanced by predicting through inferences when the userintends to leave the home and raising away preparedness measures. Toaccomplish this, artificial intelligence algorithms are capable ofmaking rules-based or learning-based inferences about when the userintends to leave the home based on sensed patterns of user control ofsmart-home devices, optionally in conjunction with sensed homeconditions or other sensed user behaviors. By way of example, for oneembodiment, one or more of the light switches is configured to processinformation acquired by home occupancy sensing devices in conjunctionwith information from light switch control behaviors of the user topredict when the user intends to leave the home. More particularly, theartificial intelligence algorithms can be configured to sense whetherthere have been a threshold number of weekdays over the past month (orother evaluation period) for which, at roughly the same time of day (“Xo'clock”), (i) the user has turned off a same or roughly same set ofactive light switches in the home, including the front door lightswitch, over a five-minute period (or other pre-departure period), and(ii) this event was followed by an extended period of non-occupancy,such as at least one hour of non-occupancy. If such pattern has beendetected, the user can be sent a message on their smartphone allowingthem to opt-in to a setting in which, if the light switch near the frontdoor is turned off at about X-o'clock on a weekday, the set of activelight switches will be automatically turned off as well. By way ofexample, the opt-in message can say, “If you turn off the light switchnear the front door at about X o'clock on weekdays, I can automaticallyturn off the rest of the lights for you that you have been turning offmanually at about that time. It might save you a few steps! Would youlike me to do this for you? ‘[YES/NO]”’ The user can then opt in to thisfunctionality. If the user's schedule changes and they end up notwanting this functionality later on, the artificial intelligencealgorithms can readily ‘unlearn’ it by virtue of detecting a ‘punishing’or ‘undo’ action by the user in which, the next time the user turns offthe front door light switch, they simply walk to one of theautomatically-turned-on light switches and turn it off within fiveminutes (or other undo interval). Thus, in accordance with the describedembodiment, the collection of smart-home sensors is configured toautomatically learn selected user behaviors, to assist the user withcertain tasks when selected qualifying behaviors are observed, and toautomatically stop providing such assistance when one or morestraightforward undo actions are taken by the user. Additionally oralternatively, if such a pattern has been detected, the central serverand cloud-computing system 164 makes an inference that the user intendsto leave the home soon. Responsive to this inference, the sensitivity ofthe network-connected smart devices can be increased in anticipation ofthe user's imminent departure from the home. For example, the thresholdfor triggering an alarm indicating a home invasion can be reduced. Itshould be appreciated that the pattern of turning off lights is merelyan example, and that other patterns exist on which imminent-departureinferences can be made.

According to embodiments, technologies including the sensors of thesmart devices located in the mesh network of the smart-home environmentin combination with rules-based inference engines or artificialintelligence provided at the central server or cloud-computing system164 are used to provide a personal “smart alarm clock” for individualoccupants of the home. According to embodiments, the smart alarm clockis capable of monitoring weather and traffic data, and adjust the user'swakeup time to account for delays that could be caused by bad trafficand weather. For example, user-occupants can communicate with thecentral server or cloud-computing system 164 via their mobile devices166 to access an interface for the smart alarm clock. There, occupantscan turn on their “smart alarm clock” and input a wake time for the nextday and/or for additional days. In some embodiments, the occupant mayhave the option of setting a specific wake time for each day of theweek, as well as the option of setting some or all of the inputted waketimes to “repeat”. Artificial intelligence will be used to consider theoccupant's response to these alarms when they go off and make inferencesabout the user's preferred sleep patterns over time. In someembodiments, the occupant may have the option of setting a specific timeat which the user would like to arrive at a particular destination. Theuser may input information about the destination and its location, suchas its address. Artificial intelligence will be used to determine howlong it typically takes the occupant to wake up and get ready to leavethe home. This information will be considered in combination withtraffic on the route to the occupant's specified destination and weatherconditions to determine what time to wake the occupant so that theoccupant will arrive at the destination at the specified time.

According to embodiments, the network-connected smart device in thesmart-home environment 100 that happens to be closest to the occupantwhen the occupant falls asleep will be the device that transmitsmessages regarding when the occupant stopped moving, from which thecentral server or cloud-computing system 164 will make inferences aboutwhere and when the occupant prefers to sleep. This closestnetwork-connected smart device will be the device that sounds the alarmto wake the occupant in time to arrive at the specified destination,accounting for traffic and weather conditions and how long it typicallytakes the occupant to get ready in the mornings. In this manner, the“smart alarm clock” will follow the occupant throughout the house, bytracking the individual occupants based on their “unique signature”,which is determined based on data obtained from sensors located in thesmart devices. For example, the sensors include ultrasonic sensors,passive IR sensors, and the like. The unique signature is based on acombination of walking gate, patterns of movement, voice, height, size,etc. It should be appreciated that facial recognition may also be used.

According to embodiments, in the event of bad weather, such as rain,snow, sleet, ice, etc., the smart alarm clock can communicate via thecentral server and/or could computing system 164 with the occupantsautomobile and thereby instruct the automobile to automatically shiftinto all-wheel drive when the user starts up the automobile to drive tothe destination. It should also be appreciated that, in cold, winterconditions, the smart-home environment can instruct the automobile to“warm up” and defrost while the occupant is getting ready for work or toleave the home.

According to an embodiment, the wake times associated with the “smartalarm clock” are used by the smart thermostat 102 to control the HVAC inan efficient manner so as to pre-heat or cool the house to theoccupant's desired “sleeping” and “awake” temperature settings. Thepreferred settings can be learned over time, such as be observing whichtemperature the occupant sets the thermostat to before going to sleepand which temperature the occupant sets the thermostat to upon wakingup.

According to an embodiment, a device is positioned proximate to theoccupant's bed, such as on an adjacent nightstand, and collects data asthe occupant sleeps using noise sensors, motion sensors (e.g.,ultrasonic, IR, and optical), etc. Data may be obtained by the othersmart devices in the room as well. Such data may include the occupant'sbreathing patterns, heart rate, movement, etc. Inferences are made basedon this data in combination with data that indicates when the occupantactually wakes up. For example, if—on a regular basis—the occupant'sheart rate, breathing, and moving all increase by 5% to 10%, twenty tothirty minutes before the occupant wakes up each morning, thenpredictions can be made regarding when the occupant is going to wake.Other devices in the home can use these predictions to provide othersmart-home objectives, such as adjusting the smart thermostat 102 so asto pre-heat or cool the home to the occupant's desired setting beforethe occupant wakes up. Further, these predictions can be used to set the“smart alarm clock” for the occupant, to turn on lights, etc.

According to embodiments, technologies including the sensors of thesmart devices location through the smart-home environment in combinationwith rules-based inference engines or artificial intelligence providedat the central server or cloud-computing system 164 are used to detectoror monitor the progress of Alzheimer's Disease. For example, the uniquesignatures of the occupants are used to track the individual occupants'movement throughout the smart-home environment 100. This data can beaggregated and analyzed to identify patterns indicative of Alzheimer's.Oftentimes, individuals with Alzheimer's have distinctive patterns ofmigration in their homes. For example, a person will walk to the kitchenand stand there for a while, then to the living room and stand there fora while, and then back to the kitchen. This pattern will take aboutthirty minutes, and then the person will repeat the pattern. Accordingto embodiments, the remote servers or cloud computing architectures 164analyze the person's migration data collected by the mesh network of thesmart-home environment to identify such patterns.

“Mapping” the smart-home environment 100 provides a number ofadvantages. For example, informed by a map of the smart-home environment100, the central server and cloud-computing system 164 can determine adistressed occupant's or an intruder's location in the home and notifyemergency personnel regard the same. This enables emergency personnel toquickly find distressed people or intruders upon entering the home. Inother examples, the central server and cloud-computer system 164determines an emergency exit route for each room of the home. In theevent an alarm is activated (e.g., when one or more of the smart hazarddetectors 104 detects smoke and activates an alarm), the central serveror cloud-computing system 164 uses occupancy information obtained fromthe network-connected smart devices in the home to determine which roomsare occupied and then turns on lights (e.g., nightlights 170, wallswitches 108, wall plugs 110 that power lamps, etc.) along exit routesfrom the occupied rooms so as to provide emergency exit lighting. Theseare just a few example advantages of mapping the home, and it should beappreciated that there are an unlimited number of advantages.

According to embodiments, mapping of the home can be done automatically.For example, a map may be generated based on positional informationobtained from the nodes of the mesh network (e.g., positionalinformation from the network-connected smart devices is used toconstruct a map of the house). According to this example, the individualnetwork-smart devices obtain or determine their location upon beinginstalled or at some other time, and send the location information tothe central server or cloud computing system 164 or to a mappingapplication on the mobile device 166 of a user. For example, wheninstalled, a network-connected smart device can ask the user (by 2D LCDdisplay, 2D/3D holographic projection, voice interaction, etc.) a fewsimple questions such as, “Where am I” and the user can select “bedroom”or “living room” and so forth. In other examples, a smart device canprovide the user with instructions, such as “Press button once if I amin the kitchen, press twice if I am in the den, etc.” Also, for example,the smart devices may be capable of determining their GPS coordinatesand/or transmitting WiFi location or cellphone tower locationinformation. The central server or cloud computing system 164 or themapping application on the mobile device 166 uses this information toautomatically construct a map of the home. In some examples, a robot 168(discussed below in detail) ‘roams’ free in the house and sends mappinginformation to the application on the mobile device 166 or to thecentral server or cloud-computing system 164, which uses the mappinginformation to construct a map of the home. For example, the robot 168could be put into a ‘mapping’ mode where it obtains location data as itmoves along the walls of each room in the house, and then sends thelocation data to the application on the mobile device 166 or to thecentral server or cloud-computing system 164, which uses the mappinginformation to construct a map of the home.

According to other embodiments, an indoor positioning system (IPS) couldbe used to map the smart-home environment 100. For example, a user couldlaunch a mapping application on the mobile device 166 that uses IPS tocreate a map of the home. In this case the user would walk along thewalls of the home and the mobile device would collect locationinformation using IPS and/or other indoor localization techniques, anduse that information to construct a map of the home or send thecollected information to the central server or could-computer system164, which creates the map. It should be appreciated that instead of orin addition to using IPS and/or other indoor localization techniques,the application on the mobile device 166 could use the mobile device'sgyroscope, magnetometer, accelerometer, and altimeter to obtain locationinformation.

According to still other embodiments, RFID tags are used to map thesmart-home environment 100. For example, RFID tags are placed throughoutthe home. Upon placing the tag, the user could scan the tag using themobile device 166, which would launch an application, instructing theuser to input location information. Also for example, instead ofinstructing the user to input location information, the mobile devicecould determine its own location (e.g., using any techniques known tothose having skill in the art, such as GPS, at the time of the scan) andassociate that location information with the tag.

According to embodiments, in the event of an alarm condition, a map ofthe smart-home environment 100 is sent to emergency responders. Forexample, upon detecting the emergency event, such as an intruder or adistressed occupant, the central server and cloud-computing services 164sends a map (e.g., a map created as described above) of the smart-homeenvironment 100, along with an indication of where on the map theemergency event is occurring. This map can be displayed in the vehiclesor on mobile devices of emergency responders, so that they can reviewthe map in advance of entering the home. This will enable them toquickly find the appropriate location upon entering the home.

According to embodiments, smart-home environments can be grouped into“neighborhood security networks” and information can be shared amongsmart-home environments in the same “neighborhood.” For example, in theevent one smart-home environment experiences a fire, an intrusion, amissing child, a medical emergency or some other type of emergency ornotable event, notification is sent to other smart-home environments inthe same neighborhood. Such neighborhood security networks enablesmart-home environments to communicate with one another in real time, ornear real time, about emergencies and other important events happeningin the neighborhood. This real time communication enablesnetwork-connected smart devices in non-affected smart-home environmentsto make appropriate security- and safety-related responses that minimizeor eliminate impact from the emergency event, such as lock the smartdoorknob 122, arming security systems, turning on outdoor and indoorlights to deter home invasion, sounding alarms to wake up and warnsleeping occupants of a nearby fire, etc. In some cases, these responsescan even resolve or help resolve emergency events, such as by usingidentification technology to locate a missing child or turning onoutdoor lighting so that law enforcement can locate and apprehendfleeing criminals.

A number of different techniques may be used to create neighborhoodsecurity networks. According to some embodiments, the central server orcloud-computing architecture 164 automatically creates the“neighborhoods” based on a combination of “neighborhood criteriainformation”, such as geographic location of the homes, demographicinformation about occupants of the homes, and “opt-in” information aboutwhich types of alerts the homes wish to receive. Geographic locationinformation may include home address, ZIP code, GPS coordinates, WiFilocation information, cellular tower location information etc.Demographic information about the occupants may include age, gender,health, special needs, etc. Opt-in information may include fire alerts,home invasion alerts, missing children alerts, missing pets alerts,missing property alerts, earthquake alerts, etc. According toembodiments, the network-connected smart devices of smart-homeenvironments 100 provide the “neighborhood criteria information” to thecentral server or cloud-computing architecture 164 upon registrationand/or during ongoing use, and the central server or cloud-computingarchitecture 164 logs and stores the neighborhood criteria informationas the home data 202, the derived home data 208, and/or other data.

According to some embodiments, the central server or cloud-computerarchitecture 164 correlates network-connected smart devices using thegeographic location information and therefore creates the“neighborhoods” based on geo-proximity, such that homes in closeproximity to one another are grouped into the same neighborhood. It ispossible that each smart-home environment has its own neighborhood thatincludes other homes within a predefined radius. This way, each home isin the middle of its neighborhood and benefits from being surrounded byneighbors, rather than being on the edge of a neighborhood. Thegeographic reach of the neighborhood may vary based on the type of eventor emergency in question. For example, in the event a home experiences afire, the central server or cloud-computer architecture 164 creates aneighborhood that includes all homes within a one-mile radius, whereasif a child goes missing then the neighborhood can include all homeswithin a ten-mile radius or all homes in a particular ZIP code, city,county, etc.

According to some embodiments, the central server or cloud-computerarchitecture 164 creates neighborhoods based on demographic information.For example, in the event a teenage child of one smart-home environmentis out past his or her curfew, the created neighborhood consists ofnearby homes where teenagers are members of the household. This way,notice that the teenager is out past his or her curfew is sent to thehomes of the neighborhood, and the teenager can be located if he or sheis out visiting another teenager whose home is in the same“neighborhood”. In another example, in the event an occupant of aparticular home contracts the flu or some other communicable illness,the created neighborhood consists of nearby homes where small childrenor elderly adults live. In this example, a notice is sent to the otherhomes in the neighborhood so that precautionary measure can be taken tohelp prevent the young children and elderly adults from contracting theillness.

According to embodiments, the central server or cloud-computingarchitecture 164 automatically identifies smart homes within a radius ofthe home experiencing the emergency or event and sends an alarm to theidentified homes. In such instances, the other homes in the“neighborhood” do not have to sign up for or register to be a part of asafety network, but instead are notified of emergency or event based ontheir proximity to the location of the emergency or event. This createsrobust and evolving neighborhood security watch networks, such that ifone person's home is getting broken into, an alarm can be sent to nearbyhomes, such as by audio announcements via the smart devices located inthose homes.

However, it should be appreciated the “neighborhood security networks”can be “opt-in” services and that, in addition to or instead of thecentral server or cloud-computing architecture 164 selecting which homesto send alerts to, individuals can subscribe to participate in suchnetworks and individuals can specify which homes they want to receivealerts from and the types of alerts to be received. This can include,for example, the homes of family members who live in different cities,such that individuals can receive alerts when their loved ones in otherlocations are experiencing an emergency or other types of events. Insome examples, homes having children can subscribe or “opt in” to be apart of a “neighborhood” that sends alerts when children are missing orout past curfew. Further, homes having elderly people can subscribe or“opt in” to be a part of a “neighborhood” that sends alerts regardingtheir elderly peers and attempt to form a community that looks out forthe security, safety, and health of its members.

According to embodiments, before a smart-home environment 100 isincluded in a neighborhood security network, an opt-in message is sentto the home owner, such as via the home owner's mobile device 166. Thehome owner is provided with information about the other homes in the“neighborhood”, the basis on which the neighborhood security network wasformed (e.g., geographic location, family relationships, demographicinformation, etc.), the types of information that will be shared withother homes in the neighborhood security network (e.g., occupants awayon vacation, potential invasion, missing child, etc.).

As discussed, notification of an emergency or event occurring in onehome can trigger responses in other homes in the “neighborhood”. Forexample, in the event of a burglary in one home, the central server orcloud-computing architecture 164 instructs the network-connected smartdevices of the other smart-home environments 100 in the neighborhood toturn on outside lights, to lock the smart doorknob 122 and windowlatches, to arm the security system, etc. Also, for example, in theevent smoke is detected in one home in the neighborhood, the centralserver or cloud-computing architecture 164 can increase the sensitivityof the smoke-detecting components of other smart hazard detectors 104 inthe neighborhood. In this example, the neighborhood may include allunits in the same apartment or condominium building. Further, forexample, in the event a dog goes missing in one home, thenetwork-connected smart devices of other homes in the neighborhood canbe tuned to detect motions that indicate a dog. In this example, if adog is detected by an outdoor network-connected smart device that doesnot typically detect dogs, then a message can be sent to the home of themissing dog indicating that a stray dog was detected and providing thelocation of the detection. Further, in some examples, a RFID tag may beprovided on the dog's collar, and the network-connected smart device ofthe other homes in the neighborhood may locate the dog by “reading” theRFID tag and give the location of the dog upon request. RFID tags may beplaced on other property, too, such as bicycles such that other propertymay be located in a similar manner.

According to embodiments, individuals may manually broadcast messages toother homes in the “neighborhood”. For example, when a family is leavingfor vacation, they can cause the central server and cloud-computingsystem 164 to send a notification to a network of trusted neighbors.This network can be manually defined or inferred.

According to embodiments, the central server or cloud-computing system164 may obtain and store identifying information, such as facialrecognition data, for the occupants of the smart-home environments 100.In this case, when a “recognized” individual who is an occupant of oneof the smart-home environments 100 is approaching an external door, suchas the front door, of another smart-home environment, the smart doorbell106, via the processing capabilities of the central server orcloud-computing system 164, is able to recognize the approachingindividual and announce his presence. For example, the approachingindividual's name and/or status as being a neighbor may be announced, avideo of him approaching may be displayed, and/or his image (such as aphotograph taken from his social networking account) may be displayedinside the smart-home environment 100.

FIG. 11 provides an example process 1100 for creating neighborhoodsecurity networks (“neighborhoods”) and sending security-relatednotifications to homes in the created neighborhoods, according to atleast one embodiment. At 1102, the process 1100 generally begins whenthe central server and cloud-computing system 164 obtains geographiclocation data for a plurality of smart-home environments. In oneexample, the geographic location data is obtained from the home data202. At 1106, the central server and cloud-computing system 164 assignsthe smart-home environments into neighborhood security networks based atleast in part on the geographic locations of the homes. For example,homes in close proximity are grouped into the same “neighborhood”. Insome embodiments, when a home is assigned to a neighborhood, an “optout” or “opt in” message can be sent to the home, giving its occupantsthe option of not participating in the neighborhood or giving them theoption of participating. At 1110, the central server and cloud-computingsystem 164 monitors for security-related conditions. For example, thecentral server and cloud-computing system 164 analyzes data receivedfrom the network-connected smart devices of a plurality of smart-homeenvironments 100. For example, the security services 205 appliessecurity-related algorithms, logic, and artificial intelligence toreview data received from network-connected smart devices to detectsecurity related events, such as home invasions. At 1114, the centralserver and cloud-computing system 164 detects a security-relatedcondition in one of the smart-home environments. For example, thecentral server and cloud-computing system 164 may receive data from anentry detector 112 of a smart home environment 100 that a window 182 hasbeen opened while the occupants are asleep and the home's securitysystem is armed. At 1116, the central server and cloud-computing system164 sends a security-condition notice to network-connected smart devicesin other homes in the same neighborhood. For example, if the centralserver and cloud-computing system 164 infers that the opened window 182indicates that a home invasion is occurring, it sends a home-invasionalarm to the other houses in the neighborhood. At 1120, responsive todetecting the security-related event in the one of the homes and/orresponsive to sending the security-related notifications, the centralserver and cloud-processing system 164 adjusts one or more alarmconditions in the other homes in the neighborhood and/or invokesprecautionary responses in the other homes in the neighborhood. Forexample, the alarm conditions are adjusted to increase sensitivity fordetecting conditions related to the security notification. In oneexample, the security notification relates to a home invasion in onehome in the neighborhood, the central server and cloud-computing system164 increases the sensitivity of the smart entry detectors 112, turns onthe lighting systems 114, and locks the smart doorknobs 122 of otherhouses in the neighborhood.

FIG. 12 provides another example process 1200 for creating neighborhoodsecurity networks (“neighborhoods”) and sending security-relatednotifications to homes in the created neighborhoods, according to atleast one embodiment. At 1202, the process 1200 generally begins bydetecting a security event in a smart-home environment 100. For example,the central server and cloud-computing system 164 could detect a homeinvasion or fire or that a teenager is out past curfew. In otherexamples, at 1202, the central server and cloud-computing system 164 mayreceive notice of a security event (rather than detect) in one of thehomes. An example could be receiving notice that a child has gonemissing. At 1204, the process 1200 involves creating a neighborhoodsecurity network consisting of homes that would benefit from receivingnotification of the security event. At 1206, as part of creating theneighborhood, an appropriate radius for the neighborhood is determinedbased on the detected security event. For example, in the event of afire, the radius of the neighborhood can be fairly small, such as onemile or less. In this case, homes within a one-mile radius of the firewill be notified. Homes farther than one mile from the fire are not atrisk and therefore do not need to be notified. However, in the case of amissing child, the radius of the neighborhood can be much larger. Thisincreases the likelihood that the child will be located. At 1210, opt-ininformation is considered. As mentioned above, individual homes canopt-in to receive security-condition notifications. Thus, at 1210, thecentral server and cloud-computing system 164 determines which homeshave opted to receive the particular notice. At 1214, information aboutthe occupants of the homes is considered. For example, in the event thenotice relates to a teenager who is out past his or her curfew, thecentral server and cloud-computing system 164 will identify other homeswhere teenagers live. In other example, if the notice related to acontractible illness that is dangerous for young children and elderlyadults, then the central server and cloud-computing system 164 willidentify homes where young children and elderly adults live. At 1220,homes are assigned to the neighborhood. For example, at 1220, thecentral server and cloud-computing system 164 identifies the homes thatare within the radius, have opted-in to receive the relevant type ofnotification, and have occupants who would benefit from receiving thenotification. At 1224, the process 1200 involves sending thenotification to the homes that were assigned to the neighborhood.

According to embodiments, a security score may be calculated for asmart-home environment. In some examples, a security score for a home iscalculated by comparing the security features of the home against a listof security criterions to determine how many of the security criterionsare satisfied. Higher scores indicate that a home satisfies a highnumber of security criterions and is therefore relatively secure,whereas lower scores indicate that the home fails to satisfy many of thecriterions. According to embodiments, security scores can be normalizedand scaled so that occupants of a home can compare the security of theirhome to other homes. For example, a score of 0 to 100 can be used, where0 is the lowest possible score and 100 is the highest possible score.Further, for example, the central server or cloud-computing system 164may generate a report or log that lists the security criterions andprovides an indication of whether the home satisfies each of thecriterions. Occupants can review this list to determine which criterionsare not satisfied and then make the appropriate improvements to the homeso as to increase the home's security score. Additionally, the centralserver or cloud-computing system 164 can use this log to generate a listof suggestions for improving the home. It can prioritize the list basedon which criterions are associated with the most points, indicate whichcreation can be easily and cheaply satisfied with only minorimprovement, and indicate which unsatisfied criterions are typicallysatisfied in other homes. For example, the central server orcloud-computing system 164 can send the following message to anoccupant's electronic device 166: “We notice that you often leave thefront door unlocked. Most homes in your neighborhood keep the front doorlocked at all times. Locking your front door at night is an easy andinexpensive way to improve your home's security and to improve yoursecurity score.” Example security criterions for assessing the securityof and calculating a security score are discussed below. However, itshould be appreciated that any number and combination of securitycriterions can be used when assessing security and calculating asecurity score for a home.

One example security criterion is whether the home has a requisitenumber of network-connected smart devices, such as smart hazarddetectors 104, smart entry detectors 112, etc. The requisite number canbe determined based on the size of the home, the number of bedrooms inthe home, the configuration of the home (single story, two-story), thenumber of occupants living in the home, the laws, rules, and regulationsof the jurisdiction(s) where the home is located, etc. In some cases,this information can be automatically obtained from public real estatedatabases. For example, the central server and/or cloud-computingservices 164 can access a public real estate database(s) to obtain thesize, location, configuration, number of bedrooms/bathrooms, etc. Thecentral server and/or cloud-computing services 164 can also access thehome data 202 to determine how many network-connected smart devices arelocated in the home, and compare that number to the requisite number todetermine whether the criterion is satisfied.

Another example security criterion is whether the various types ofnetwork-connected smart devices are properly located in the home. Forexample, for this criterion, the central server and/or cloud-computingservices 164 can determine whether a smart-entry detector 112 is locatedat each window 182 and external door 186, whether a smart hazarddetector 104 with smoke and motion detecting capabilities is located inall of the appropriate locations, such as one in the kitchen and atleast one on each floor of the home, whether the doorbell of the home isa smart doorbell 106 with the security capabilities described herein,whether the wall switches are smart wall switches 108, whether the wallplugs are smart wall plugs 110, etc. The central server and/orcloud-computing services 164 can make these determinations by reviewingthe home data 202 to obtain information about the location andcapabilities of the various network-connected smart devices in the homeand comparing that information against a map of the home. The map can begenerated according to the example techniques described herein.

In some embodiments, a security criterion is whether the house has been“mapped”. As discussed elsewhere herein, maps of the homes can becreated and stored in the home data 202. Mapping improves security notonly because it enables the central server and/or cloud-computingservices 164 to determine whether the home has an adequate number ofappropriate located network-connected smart devices, but it also enablesthe central server and/or cloud-computing services 164 to pinpointwithin the home where a security event is taking place and to providethat information for emergency responders. Another example securitycriterion is the average amount of time it takes first responders to getto the home after an alarm has been triggered. This information can beaveraged based on data from nearby homes. If the response time is fast,then the security score of the home is increased.

Other example security criteria may be related to the capabilities andconfigurations of the respective network-connected smart devices in thehome. For example, the central server and/or cloud-computing services164 can access and review the home data 202 to determine whether thenetwork-connected smart devices are wired (rather than batteryoperated), whether the batteries are sufficiently charged, whether theyare WiFi enabled and connected to a strong and reliable WiFi network,whether the CO date codes of the smart hazard detectors 104 areup-to-date, whether there is cellular backup in the event WiFi goesdown, etc. Another example, criterion is whether the hub spokesman nodein the home is wired (rather than battery operated).

In some embodiments, the central server and/or cloud-computing services164 can review the security logs for the house provided in the home datato assess whether the occupants are keeping the home secure. Forexample, one security criterion that can be considered during thisreview is whether a door or window was left unlocked overnight. Anotherexample, criterion is the number of strangers that visit the house on aregular basis. This can be determined, per the discussion above, bydetecting strangers based on the number of unregistered mobile device166 and/or occupants in the home. The more strangers that visit, theless secure the home and the lower the security score. On the otherhand, if the home occupants regularly consist of just registeredoccupants, then the more secure the home and the higher the securityscore. Another example security criterion is the number of unregisteredmobile devices that come into contact with the home on a regular basis.This can be particularly relevant for apartments, condos, and homes indensely populated areas where strangers are frequently nearby. One waythe central server and/or cloud-computing services 164 can make thisdetermination is by reviewing the number of unrecognized mac addressesthat contact the router of the home's Win network. In some examples, forthose homes located in apartment and condo buildings and in denselypopulated areas, the mac addresses of the neighbors' mobile devices canbe factored out over time. For example, if the same mac address is seenon a regular basis, then it can be assumed that that device isassociated with a neighbor and will not be used to lower the securityscore of the home.

Other example security criteria involve how readily the occupants, ornon-resident individuals who are in a position to confirm whether analarm condition is false, can be contacted in the event of an alarmcondition. Here, for example, the central server and/or cloud-computingservices 164 considers whether the occupants of the home have verifiedtheir contact information. For example, this may include determiningwhether and which of the occupants have provided their emergency contactinformation (e.g., mobile telephone number) to the central server and/orcloud-computing services 164. The security score increases if theoccupants have verified their contact information because, in the eventof an alarm condition, the occupants can be contacted to verify whetherthe alarm is false and if not they can help resolve or otherwise addressthe emergency. The security score increases even more if every occupantof the home verifies their contact information.

Another example security criterion is the quality of “coverage” in thehome. For example, the central server and/or cloud-computing services164 determines whether the home has a comprehensive mesh network ofnodes that are capable of sensing conditions at all locations within thehome and communicating data regarding the sensed conditions through themesh network and to the central server and/or cloud-computing services164. According to one embodiment, to determine whether the home has acomprehensive mesh network, the central server and/or cloud-computingservices 164 tracks an occupant's movement through the home to identify“black spots”, which are areas in the home where the central serverand/or cloud-computing services 164 was unable to detect the occupant.The security score can be adjusted based on the extent of the blackspots in the home.

FIG. 13 provides an example process 1300 for calculating and reporting asecurity score for a smart-home environment, according to at least oneembodiment. At 1302, the process 1300 generally begins by obtainingsecurity criterions. For example, the central server and/orcloud-computing service 164 obtains a list of security criterions from adatabase. The list of security criterions may include all or some of theexample criterions discussed above. As discussed above, securitycriterions are used to assess the security of the home. For example,when a home satisfies a high number of applicable security criterionsthat home has a correspondingly high security score, and there is ahigher probability that the home is indeed secure. At 1306, the process1300 involves obtaining security data from the home. For example, thecentral server and/or cloud-computing service 164 obtain sensor data andother data from and related to the network-connected smart devices ofthe home. Such data may be included in the home data 202.

At 1310, the process 1300 involves comparing the security data of thehome against the obtained security criterions to determine which of thesecurity criterions are satisfied. Here, according to an embodiment, thecentral server and/or cloud-computing service 164 processes the obtainedhome data against the list of security criterions to determine which ofthe security criterions are satisfied. At 1314, the security score iscalculated. To do so, for example, the central server and/orcloud-computing service 164 determines a security score for the homebased on the number of security criterion that were satisfied. Thehigher the number of satisfied criterion, the higher the security score.At 1320, a security log is generated. For example, the central serverand/or cloud-computing service 164 generates a log that lists each ofthe security criterions and corresponding indications of whether therespective criterions were satisfied. This log can be outputted, forexample, by sending the log to the electronic devices 166 of theoccupants. In some embodiments, the log includes a written descriptionfor each of the security criterions so that occupants can review thedescriptions of the unsatisfied criterions to determine what they can doto improve the security of their home. In some examples, thecorresponding indications of whether the respective criterions aresatisfied are binary indicators, whereas in other examples thecorresponding indications are values indicative of a degree ofcompliance. For example, if the home has fifty percent of the requisitenumber of smart hazard devices 104, then the indication corresponding tothat criterion can indicate that it is fifty percent satisfied. Asdiscussed above, the security criterions can include a “proper sensorlocation” criterion, a “low sensor battery” criterion, a “low WiFisignal” criterion, a “door open” criterion, a “door closed” criterion, a“door locked” criterion, a “window open” criterion, and a “windowlocked” criterion.

According to some embodiments, “pre-alarm condition trend detection andnotification” services are provided to warn users of potential dangerousconditions. More particularly, technologies including the sensors of thenetwork-enabled smart devices in combination with rules-based inferenceengines or artificial intelligence provided by the central server andcloud-computer system 164 are used to make inferences about potentialsecurity conditions in the home. This may occur in situations where thesensor data is not “strong” enough to support an actual alarm condition,but it is enough to cause an inference that potentially dangerousactivity may be occurring in the home and that it is worth investigatingwhether such activity is indeed occurring.

For example, as discussed above the central server or cloud-computingsystem 164 can review the logged information about occupants' movementin the home to detect signature patterns of movement unique to theindividual occupants of the home. These signature patterns help thecentral server or cloud-computing system 164 detect strangers in thehome. For example, if an individual is quickly moving from room to roomat a time when occupants typically are not at home and in a pattern thatis not a signature pattern of any of the occupants, the central serveror cloud-computing system 164 may infer that this individual ispotentially a robber moving from room to room searching for valuableitems. While this inference may not rise to the level of a home-invasionalarm condition, it may be worth investigating. Thus, the central serveror cloud-computing system 164 sends a “pre-alarm” alert message to theregistered occupants' mobile device 166, informing the occupants of thedetected pattern that there may be suspicious activity occurring in thehome. The message may include an indication of where in the housesuspicious activity is occurring. The message may also request that theoccupant verify that this is a false alert or that an actualhome-invasion-condition exists.

In another example, the smart doorbell 106 may observe the same carparked on a street out front of the smart-home environment 100 over thecourse of several days. In particular, the smart doorbell 106, incombination with rules-based inference engines or artificialintelligence provided by the central server and cloud-computer system164, may infer that the comings and goings of the car are consistentwith burglars “casing” the home. Upon making this inference, rather thantriggering an alarm condition, the central server and cloud-computersystem 164 may send a “pre-alarm” message to the occupants' mobiledevices 166 and/or to local law enforcement, alerting them to thepotential casing and including a description of the car.

According to other embodiments, the pre-alarm condition trend detectionand notification can be applied to detect evaluated levels ofpotentially dangerous substances (e.g., CO, smoke, etc.) in thesmart-home environment 100. For example, an alarm condition may beestablished based at least in part on a predetermined amount of asubstance in an environment. The alarm condition may be stored locallyby a smart hazard detector or remotely by the central server andcloud-computer system 164. For example, once the concentration level ofCO in the air reaches a certain level, an alarm condition will betriggered. Additionally, a “pre-alarm condition” is established based atleast in part on a predetermined trend in the amount of the substance inthe environment. For example, the pre-determined trend can be at least atwenty-percent increase in the amount of the substance over at least atwo-week period. After establishing the alarm and the pre-alarmconditions, the central server and cloud-computer system 164, the smarthazard detector and/or other smart home devices receives sensor dataindicating the amount of the substance in the environment and analyzesthe sensor data to detect the presence of either the alarm or pre-alarmcondition. Responsive to detecting the pre-alarm condition but not thealarm condition, the central server and cloud-computer system 164, thesmart hazard detector and/or other smart home devices provides anotification of the pre-alarm condition. For example, the central serverand cloud-computer system 164 may send a message to the mobile device166 of the occupant stating, “The CO level in your home has increasedtwenty-percent in the last two weeks. You might consider having anexpert inspect your home to determine the cause.” Also for example, thesmart hazard detector and/or other devices in the home may make asimilar audible announcement or display a similar written message.

Additionally, the pre-alarm message may be sent to a repair contractoror a public safety agency, so that they can respond directly. Forexample, the repair contractor may call the owner to notify the owner ofthe problem and prepare a plan to repair the problem. According toembodiments, the pre-alarm message giving notification of the pre-alarmcondition is sent to a centralized bidding system that solicits bidsfrom repair contractors and selects one of the repair contractors toresolve the problem.

According to some embodiments, sound, vibration, and/or motion sensingcomponents of the smart devices are used to detect sound, vibration,and/or motion created by running water. Based on the detected sound,vibration, and/or motion, the central server or cloud-computingarchitecture 164 makes inferences about water usage in the home andprovides related services. For example, the central server orcloud-computing architecture 164 can run programs/algorithms thatrecognize what water sounds like and when it is running in the home.According to one embodiment, to map the various water sources of thehome, upon detecting running water, the central server orcloud-computing architecture 164 sends a message to an occupant's mobiledevice asking if water is currently running or if water has beenrecently run in the home and, if so, which room and whichwater-consumption appliance (e.g., sink, shower, toilet, etc.) was thesource of the water. This enables the central server or cloud-computingarchitecture 164 to determine the “signature” or “fingerprint” of eachwater source in the home. This is sometimes referred to herein as “audiofingerprinting water usage.”

In one illustrative example, the central server or cloud-computingarchitecture 164 creates a signature for the toilet in the masterbathroom, and whenever that toilet is flushed, the central server orcloud-computing architecture 164 will know that the water usage at thattime is associated with that toilet. Thus, the central server orcloud-computing architecture 164 can track the water usage of thattoilet as well as each water-consumption application in the home. Thisinformation can be correlated to water bills or smart water meters so asto provide users with a breakdown of their water usage.

According to some embodiments, sound, vibration, and/or motion sensingcomponents of the smart devices are used to detect sound, vibration,and/or motion created by mice and other rodents as well as by termites,cockroaches, and other insects (collectively referred to as “pests”).Based on the detected sound, vibration, and/or motion, the centralserver or cloud-computing architecture 164 makes inferences aboutpest-detection in the home and provides related services. For example,the central server or cloud-computing architecture 164 can runprograms/algorithms that recognize what certain pests sound like, howthey move, and/or the vibration they create, individually and/orcollectively. According to one embodiment, the central server orcloud-computing architecture 164 can determine the “signatures” ofparticular types of pests.

For example, in the event the central server or cloud-computingarchitecture 164 detects sounds that may be associated with pests, itnotifies the occupants of such sounds and suggests hiring a pest controlcompany. If it is confirmed that pests are indeed present, the occupantsinput to the central server or cloud-computing architecture 164confirmation that its detection was correct, along with detailsregarding the identified pests, such as name, type, description,location, quantity, etc. This enables the central server orcloud-computing architecture 164 to “tune” itself for better detectionand create “signatures” or “fingerprints” for specific types of pests.For example, the central server or cloud-computing architecture 164 canuse the tuning as well as the signatures and fingerprints to detectpests in other homes, such as nearby homes that may be experiencingproblems with the same pests. Further, for example, in the event thattwo or more homes in a “neighborhood” are experiencing problems with thesame or similar types of pests, the central server or cloud-computingarchitecture 164 can make inferences that nearby homes may also havesuch problems or may be susceptible to having such problems, and it cansend warning messages to those home to help facilitate early detectionand prevention.

According to some embodiments, sound, vibration, and/or motion sensingcomponents of the smart devices are used to detect sound, vibration,and/or motion created by intruders impermissibly entering the home.Based on the detected sound, vibration, and/or motion, the centralserver or cloud-computing architecture 164 makes inferences about homeinvasion and provides related services. For example, the central serveror cloud-computing architecture 164 can run programs/algorithms thatassess detected sounds, vibrations, and movement in view of whether thehome occupants are home or away, sleeping or awake, etc.

For example, in the event the central server or cloud-computingarchitecture 164 detects sounds proximate to windows, doors, and otherexternal entryways while concurrently receiving information that allregistered occupants are away from the home or are accounted for andasleep in their respective rooms, the central server or cloud-computingarchitecture 164 alerts the occupants to the possible invasion and/ordeters the intruders by turning on nearby lights, sounding audiblewarnings, etc. For example, the audible announcement could be anindication that an intrusion is occurring. This will alert the occupantsand hopefully scare away the intruder.

According to some embodiments, sound, vibration, and/or motion sensingcomponents of the smart devices are used to detect sound, vibration,and/or motion created when an occupant of the home is under distress,such as when an individual falls and cannot get up. Based on thedetected sound, vibration, and/or motion, the central server orcloud-computing architecture 164 makes inferences about the respectiveoccupants of the home and their patterns of movement. These inferencesmay be enhanced by providing the central server or cloud-computingarchitecture 164 with age, health, and other information about theindividual occupants. For example, the central server or cloud-computingarchitecture 164 can identify and track the movement through the home ofthe respective occupants using techniques described herein, such asbased on their “signature” or signals emitted from their trackingdevices (e.g., mobile phones), and activate a distress alarm when anoccupant's movement indicates distress. For example, an elderly occupantmay be in distress immediately after making a very swift movement orcauses a strong vibration that an elderly person would be incapable ofmaking unless that person were falling. A distress alarm may also beactivated when an occupant remains in one position, such as in bed or ina bath, for a period that exceeds a threshold. Further, a distress alarmmay be activated upon receiving a verbal command, such as “help”, froman occupant.

For example, in the event the central server or cloud-computingarchitecture 164 detects sounds proximate to windows, doors, and otherexternal entryways while concurrently receiving information that allregistered occupants are away from the home or are accounted for andasleep in their respective rooms, the central server or cloud-computingarchitecture 164 alerts the occupants to the possible invasion and/ordeters the intruders by turning on nearby lights, sounding audiblewarnings, etc.

Turning now to FIGS. 4A-C, illustrations are provided of exampleembodiments of the smart wall switch 108. According to embodiments, thewall switches 108 enhance the smart-home environment 100 by providing aretrofit wall light switch that, in addition to maintaining the basiccharacter and purpose of a light switch, incorporates a host of sensing,interface, and communications capabilities for enhancing occupantcomfort, convenience, and safety.

By virtue of being mounted in place of traditional wall switches, thewall switch 108 has access to plentiful electrical operating power, suchas by connecting to wiring (e.g., to 120V “hot” line voltage wires) thatis behind the walls 154 of the smart-home environment 100 and that ispresent at virtually all standard home wall light switches. Thisessentially unlimited power budget, the near-ubiquity of excellentinstallation locations throughout the home, and the reasonably amplephysical space on its face plate and in its housing to fit the necessarycomponents, combine to enable the wall switch 108 to accommodate a richand wide variety of sensing, interface, and communications capabilitiesfor the smart-home environment 100, as well as a general platform forthe provision of even newer sensing, interface, and communicationshardware as it becomes available over the coming decades.

A rich variety of new interactions are made possible between wall switch108 and other devices of the smart-home environment 100. Occupancysensing, for example, can be significantly enhanced by virtue of thegreat locations (usually right next to room doorways) of most wall lightswitches, allowing for easy tracking of occupants as they transitionbetween rooms, predictive occupancy algorithms, and so forth.

FIGS. 4A-C illustrate example user interfaces and hardware features ofthe wall switch 108. According to embodiments, at the core of the wallswitch 108 is powering circuitry, including a rechargeable battery, forextracting power as needed from the 120V “hot” line voltage wire. Therechargeable battery can either be used as a conventional back-up sourceor as a reservoir to supply excess DC power if needed for short periods.

As illustrated in FIG. 4A, according to some embodiments, the wallswitch 108 is split into two parts: a head unit 404 and a backplate 408.This bifurcation can increase the success and commercial longevity ofthe wall switches 108 by making them a modular platform consisting oftwo basic components. According to some embodiments, the backplate 408is a permanent interface box (sometimes referred to herein as “dockingstation 408”) that serves as a physical connection into the wall and tothe 120V line voltage wires or other wiring of the smart-homeenvironment 100, and that contains a AC-to-DC powering circuitry 410.When installed, the docking station 408 may resemble a conventionalone-gang or two-gang wall box, except no dangerous high-voltage wiresare exposed to the user. According to some embodiments, docking station408 also includes a cellular wireless interface.

According to some embodiments, the head unit 404 (sometimes referred toherein as “replacement module 404”) actually contains all of thesensors, processors, user interfaces, the rechargeable battery, and soforth. Users can plug and unplug the unit 404 in and out of the dockingstation 408. Many different commercial and functional possibilities forprovisioning, maintenance, and upgrade are possible. For example, afteryears of using any particular head unit 404, a user will be able to buya new version of the head unit 404 and simply plug it into the dockingstation 408. There are also many different versions for the head unit404, such as an extremely low-cost version that is nothing but amotion/occupancy detector and light switch, and then a progression ofincreasingly-capable versions, up to and including extremely fancy headunits 404 with small OLED televisions and high-fidelity mini-speakers.Thus, it should be appreciated that the various versions of the headunits 404 can all be interchangeable, with any of them working whenplaced into any docking station 408. This can advantageously encouragesharing and re-deployment of old head units 404—for example, when animportant high-capability head unit 404 (for the kitchen or living room,for example) can be replaced by a great new version of the head unit404, then the old head unit 404 can be re-deployed in a bedroom or abasement, etc. When first plugged into a docking station 408, the headunit 404 can ask the user (by 2D LCD display, 2D/3D holographicprojection, voice interaction, etc.) a few simple questions such as,“Where am I” and the user can select “bedroom” or “living room” and soforth. In other examples, the head unit 404 can provide instructions,such as “Press button once if I am in the kitchen, press twice if I amin the den, etc.”

According to some embodiments, the head unit 404 contains a mainprocessor 412, storage 416, display and user interface 424, audiospeaker 436, microphone 444, power converter 440, GPS receiver 450, RFIDlocator 454, and general physical module receiver 458. The head unit 404further contains wireless and wired networking 462. In view of the amplepower availability, a variety of communications capabilities can beprovided, including Wi-Fi, ZigBee, 3G/4G wireless, CAT6 wired Ethernet,and even optical fiber from the curb. Furthermore, because the wallswitch 108 can be connected to the home 120V system, a HomePlug or otherpowerline-communications capability can be provided.

Also included are sensors 428 such as temperature, humidity, occupancy,ambient light, fire, smoke, carbon monoxide, active proximity, passiveinfrared motion, ultrasound, CCD/video camera, etc. A rechargeablebattery 432 (or equivalently capable onboard power storage medium) isalso included. For example, the battery 432 can be a rechargeableLithium-Ion battery. In operation, the wall switch 108 charges thebattery 432 during time intervals in which the hardware power usage isless than what power stealing can safely provide, and that willdischarge to provide the needed extra electrical power during timeintervals in which the hardware power usage is greater than what powerstealing can safely provide.

The user interface 424 can include one or more visual displays (TFT,OLED, etc.), touchscreen and/or button input capabilities, the audiospeaker 436, and so forth. According to the embodiment illustrated inFIG. 4B, the module head unit 404 of smart wall switch 108 has aclick-and-rotate annular ring input 460. According to this embodiment,the click-and-rotate annular ring input 460 of the wall switch 108 canbe used as a dimming light switch. Further, the click-and-rotate annularring input 460 can provide menu-driven interfaces for user governance ofall its various capabilities. As illustrated in FIG. 4C, an optional 2Dimage and/or 3D holographic image projector 470, can also be provided sothat the effective dimension of the display is not just limited to thephysical size of the wall light switch. For example, in smart-homeenvironments 100 that also include smart doorbells 106, the combinationof the smart wall switches 108 and the smart doorbells 106 can bringabout new features. For example, if a visitor approaches the front dooror rings the doorbell 106, the camera in the doorbell 106 can transmittheir image to the smart wall switches 108, which can instantly show theimage on the dial of the light switch, or project the image in 2D or 3D(holographic) form. Further, for example, the image of the arrivingvisitor at the front door can be projected only from the smart wallswitches 108 of those rooms where occupancy is sensed.

According to one embodiment that is particularly appealing for alighting control functionality of the described wall switches 108, whichare temporarily simply termed ‘light switches’ for thislighting-control-related embodiment, the light switches in the home,such as the smart-home environment 100, are configured such that atleast one of them can be used to control (a) all of the light switchesin the home, (b) a single selectable one of the other light switches inthe home, and/or (c) one or more selectable groups or sub-groups of theother light switches in the home. This can be particularly convenient,for example, for a light switch that is near the front door (or otherentryway commonly used for ingress and egress) of the home. For such anexample scenario, an occupant who is the last person to leave the homecan simply turn off all lights at once by controlling the single lightswitch nearest the door. Similarly, a returning occupant can turn on aparticular subset of lights (for example, the lights corresponding to apathway from the front door to the kitchen) all at once by controllingthat single light switch. As another advantageous example, a lightswitch that is in an upstairs master bedroom of the home can be used bythe parents to control (a) the lights in all downstairs rooms in thehome, (b) the lights leading between the master bedroom and the kitchen,and/or (c) the lights in each of the children's bedrooms.

The above-described provision for mutually controllable or selectivelymutually controllable light switches can be extended in otherembodiments to similar mutual or selectively mutual control of anypopulation of smart-home controllers that are so amenable. Examples caninclude mutual or selectively mutual control of irrigation controllers,door opening/closing actuating controllers, entertainment devicecontrollers, computing device controllers, portable plug-in heatercontrollers, window opening/closing controllers, and so on.

In some embodiments a network-connected smart keypad is provided in thesmart home environment 100. According to embodiments, an importantunderlying functionality of the smart keypad is to control thefunctionality of security features of the smart-home environment 100. Itshould be appreciated that the smart keypad is enhanced with a varietyof multi-sensing capabilities that, while indeed enhancing home safetyand security in many ways, can provide additional functionalitiesrelating to controlling the other smart devices in the home, HVACcontrol, home energy conservation, intra-home communications,entertainment, etc.

According to embodiments, smart keypad includes powering circuitry,including a rechargeable battery, for extracting power as needed fromthe 120V “hot” line voltage wire. The rechargeable battery can either beused as a conventional back-up source or as a reservoir to supply excessDC power if needed for short periods.

According to some embodiments, like other smart home devices describedherein, the smart keypad is split into two parts: a head unit and abackplate. This bifurcation can increase the success and commerciallongevity of the smart keypads by making them a modular platformconsisting of two basic components. According to some embodiments, thebackplate is a permanent interface box (sometimes referred to herein as“docking station”) that serves as a physical connection into the walland to the 120V line voltage wires or other wiring of the smart-homeenvironment 100, and that contains AC-to-DC powering circuitry. Wheninstalled, the docking station may resemble a conventional one-gang ortwo-gang wall box, except no dangerous high-voltage wires are exposed tothe user. According to some embodiments, the docking station alsoincludes a cellular wireless interface.

According to some embodiments, the head unit (sometimes referred toherein as “replacement module”) actually contains all of the sensors,processors, user interfaces, the rechargeable battery, and so forth.Users can plug and unplug the unit in and out of the docking station.Many different commercial and functional possibilities for provisioning,maintenance, and upgrade are possible. For example, after years of usingany particular head unit, a user will be able to buy a new version ofthe head unit and simply plug it into the docking station. There arealso many different versions for the head unit, such as an extremelylow-cost version that is nothing but a user interface, and then aprogression of increasingly-capable versions, up to and includingextremely fancy head units with small OLED televisions and high-fidelitymini-speakers. Thus, it should be appreciated that the various versionsof the head units of the smart keypads and other smart devices can allbe interchangeable, with any of them working when placed into anydocking station. This can advantageously encourage sharing andre-deployment of old head units—for example, when an importanthigh-capability head unit (for the kitchen or living room, for example)can replaced by a great new version of the head unit, then the old headunit can be re-deployed in a bedroom or a basement, etc. When firstplugged into a docking station, the head unit can ask the user (by 2DLCD display, 2D/3D holographic projection, voice interaction, etc.) afew simple questions such as, “Where am I” and the user can select“bedroom” or “living room” and so forth. In other examples, the headunit can provide instructions, such as “Press button once if I am in thekitchen, press twice if I am in the den, etc.”

According to some embodiments, the smart keypad contains a mainprocessor, storage, display and user interface, audio speaker,microphone, power converter, GPS receiver, RFID locator, and generalphysical module receiver. The smart keypad further contains wireless andwired networking. In view of the ample power availability, a variety ofcommunications capabilities can be provided, including Wi-Fi, ZigBee,3G/4G wireless, CAT6 wired Ethernet, and even optical fiber from thecurb. Furthermore, because the smart keypad can be connected to the home120V system, a HomePlug or other powerline-communications capability canbe provided. Accordingly, the smart keypad can be connected to andcommunicate with the other smart home devices of the smart-homeenvironment 100 and to the central server or cloud-computing system 164.

The smart keypad can include any of the components (e.g., temperaturesensor, humidity sensor, occupancy sensor, ambient light sensor,communication equipment, processors, memory, etc.) that are included inany of the other smart home devices (e.g., smart doorbells 106, smartthermostats 102, smart wall switches 108, smart wall plugs 110, etc.)described herein. In some embodiments, the smart keypad is hardwiredwith a battery backup. In some embodiments, the smart keypad isincorporated into the wall switch 108, whereas in other embodiments thesmart keypad can be its own device.

The smart keypad also includes sensors such as temperature, humidity,occupancy, ambient light, fire, smoke, carbon monoxide, activeproximity, passive infrared motion, ultrasound, CCD/video camera, etc.As mentioned above, a rechargeable battery is also included (orequivalently capable onboard power storage medium). For example, thebattery can be a rechargeable Lithium-Ion battery. In operation, thesmart keypad charges the battery during time intervals in which thehardware power usage is less than what power stealing can safelyprovide, and that will discharge to provide the needed extra electricalpower during time intervals in which the hardware power usage is greaterthan what power stealing can safely provide.

The user interface of the smart keypad can include one or more visualdisplays (TFT, OLED, etc.), touchscreen and/or button inputcapabilities, the audio speaker, and so forth. According to embodiments,an optional 2D image and/or 3D holographic image projector can also beprovided so that the effective dimension of the display is not justlimited to the physical size of the smart keypad. The user interface canbe user customized by the home occupants.

The smart keypad can be secured by a user-determined passcode. In someembodiments, the passcode can be a PIN comprising any number andcombination of letters and/or numbers. In other embodiments, thepasscode can be a phrase. In yet other embodiments, the passcode can bea gesture, which the smart keypad senses using ultrasonic sensors, PIRsensors, etc. In still other embodiments, the passcode is in the form ofa unique connect-the-dot pattern, where the user interface displays aplurality of dots (e.g., a grid of dots) and the user moves his or herfinger from dot to dot in a unique pattern. Any one of these forms ofthe passcode, including the gesture and the connect-the-dots pattern,can provide users with a quick and easy way to arm and disarm the alarmsystem of the home. For example when leaving the home, the user can walkup to the smart keypad and make the unique gesture or input theconnect-the-dots pattern to arm the alarm. According to someembodiments, the smart keypad manages a user list, which includes a listof users and corresponding times they can control the keypad toarm/disarm the security system and to control other functions of thesmart home. In some cases, the various users may identify themselves tothe smart keypad using unique identification numbers and access codes,including the passcodes described above. Further, in some cases, thesmart keypad may be capable of recognizing a user based on the user's“digital fingerprint”, such as by wirelessly identifying the user'smobile electronic device 166.

According to embodiments, the smart keypad includes a “light your path”feature, whereby the smart keypad activates a light when it senses thata user is approaching in darkness or near darkness. For example, in theevent the user approaches the smart keypad in the middle of the night,the smart keypad may activate nearby lights in the home or a lightincorporated in the smart keypad itself (e.g., LED) to provide a lightedpathway for the user. In one example, the smart keypad is incorporatedin a wall light switch, and the smart keypad activates the lightassociated with the wall switch when a user is approaching the smartkeypad. In some examples, upon detecting an approaching user when thesecurity system is armed, the smart keypad or other devices of the homeor the server 164 can send notification to the occupants' mobile devicesor other electronic devices. Also, for example, the smart keypad cansend a notification message to the occupants' mobile devices any timethe alarm system is armed or disarmed by a user.

According to embodiments, the smart keypad is “smash and bash”resistant. For example, in the event the home's alarm system is armedand the smart keypad is smash (e.g., by an intruder attempting to disarmthe alarm by bashing the keypad), the alarm remains armed. In somecases, upon being smashed, the smart keypad triggers the alarm andexecutes pre-configured actions, such as notifying police and/or otheremergency personnel.

According to embodiments, the smart keypad or other devices in the homeare capable of assigning user-defined gestures to actions or sets ofactions. For example, the user may program the smart keypad with a“panic gesture” that causes the smart keypad, other devices in the smarthome, or the server 164 to notify authorities, such as by calling orotherwise notifying medical, police, etc. Such a panic gesture may be,for example, the user quickly waving his or her hands in the air. Theuser may also program the smart keypad or other devices in the home withan audible panic command. For example, when the user yells “help”, thenmedical, police, etc. may be called or otherwise notified. In otherexamples, the smart keypad can include a panic button that the user canpress to call the police, medical, etc.

According to embodiments, the smart keypad or any of the othersmart-home devices have the ability to display customer messages, suchas via a display on the device itself or by projection. For example, inthe event a child is sleeping, the smart doorbell 106 may display, “Babyis sleeping. Do not ring.” In other embodiments, the smart keypads andother devices are capable of projecting or displaying messages. Forexample, when a person is at the front door, the keypads may project amessage, such as “Someone's at the door”. This would be good forsituations where the users have deactivated, or the smart home hasautomatically deactivated, the doorbell and/or other audiblenotifications because some or all of the occupants are sleeping. Thesemessages would also be useful for hearing impaired occupants. The smartkeypads and other devices could also project or display warningmessages, such as “Evacuate” due to possible intruder, fire, CO, etc.The message could be projected in large font on walls, floors, ceilings,etc. And the message could provide additional information. For example,the message could be “Intruder detected in den”, “Fire detected inkitchen”, etc.

According to embodiments, the smart keypad and the other smart devicesare used as a platform for running home applications. For example, thesmart keypad has the capability of downloading and/or executingapplications that enable users to control their smart homes. Forexample, the user could install a “thermostat” app that can be accessedand controlled from any of the smart devices in the home, including thesmart keypads, to control the home's HVAC. The user could also install a“security” app, for example. It should be appreciated that the numberand type of apps that could be download and installed are endless.

Turning now to FIG. 5, an illustration is provided of an exampleembodiment of the smart hazard detector 104. According to embodiments,an important underlying functionality of each smart hazard detector 104is for smoke detection, fire detection, and carbon monoxide detection(more generally, “hazard detection”) and associated audible alarming,via a speaker 504 and a buzzer 508. However, it should be appreciatedthat the smart hazard detector 104 is further enhanced withnetwork-connectedness and a variety of multi-sensing capabilities that,while indeed enhancing home safety and security in many ways, canprovide additional functionalities relating to HVAC control, home energyconservation, intra-home communications, and entertainment. In someembodiments, the smart hazard detector 104 complies with the standardsas required by Underwriter Laboratories (UL) for detecting smoke, heat,and carbon monoxide. For example, the smart hazard detector meets thealarm response time requirements of UL standard 2034, which are asfollows: at 70 PPM, the detector 104 must alarm within 60-240 minutes;at 150 PPM, the detector 104 must alarm within 10-50 minutes; and at 400PPM, the detector 104 must alarm within 4 to 15 minutes.

According to embodiments, the smart hazard detector 104 is a retrofitdesigned to replace older hazard detectors. Although not shown in thefigures, the smart hazard detector 104 may comprise two primarycomponents: a head unit 404 and a backplate or docking station 408. Thehead unit comprises the sensors, battery, processor, storage, and othercomponents, while the docking station serves as a physical connectioninto the wall and, if applicable, to the 120V line voltage wires orother wiring of the smart-home environment 100. When installed, thedocking station may resemble a conventional backplate for a traditionhazard detector. Users can plug and unplug the head unit in and out ofthe docking station. Thus, many different commercial and functionalpossibilities for provisioning, maintenance, and upgrade are possible.For example, after years of using any particular head unit, a user willbe able to buy a new version of the head unit and simply plug it intothe docking station. There are also many different versions for the headunit 404, such as an extremely low-cost version that is nothing but asmoke detector, and then a progression of increasingly-capable versions,up to and including extremely fancy head units. Thus, it should beappreciated that the various versions of the head units can all beinterchangeable, with any of them working when placed into any dockingstation. This can advantageously encourage sharing and re-deployment ofold head units—for example, when an important high-capability head unit(for detecting hazards in the kitchen, for example) can replaced by anewer version, then the old head unit can be re-deployed in a bedroom ora basement, etc. When first plugged into a docking station, the headunit can ask the user (by 2D LCD display, 2D/3D holographic projection,voice interaction, etc.) a few simple questions such as, “Where am I”and the user can select “bedroom” or “living room” and so forth.

There can be substantial overlap between the smart hazard detector 104and the wall switch 108, as well as the other devices of the smart-homeenvironment 100 with respect to processing, sensing, user interface, andcommunications capabilities. The smart hazard detector 104 may be alow-power consuming device that is powered by battery 512 and thatincludes a low-power communication chip (such as a ZigBee chip) and mayparticipate as a low-power node in the mesh network of the smart-homeenvironment 100 by generating and transmitting messages, relay messagesfrom other devices, as well as by “listen” and sometimes making acorresponding response. However, it should be appreciated that insteadof or in addition to being battery powered, the smart hazard detector104 may be powered by AC voltage from the home. In some embodiments, thesmart hazard detector 104 includes a WiFi chipset that enable it tocommunicate its status to other devices in the smart-home environment100, to user mobile devices 166, to the central server orcloud-computing system 164, as well as to external managed securityservices. It should be appreciated that smart hazard detector 104 ismicroprocessor driven and that the WiFi chip may contain extraprocessing capacity for controlling all or some operations of the smarthazard detector 104. In some embodiments, a separate processor isprovided.

According to the illustrated embodiment, the smart hazard detector 104includes a smoke detector 516, which comprises a smoke photodiode, adetector, and a smoke chamber. The smoke photodiode may be, for example,an IR LED. Alternatively, instead of IR, a visible light LED or a lasermay be provided. In some embodiments, the detector may be a photonsilicon photomultiplier chip. The smoke photodiode and the detector maybe programmed to execute a duty cycle every ten seconds, or so. Forexample, every ten seconds the photodiode and the detector will do anX-axes microsecond smoke test. The photodiode and the detector alsoexecute self-calibration tests at predetermined intervals.

Further, the smart hazard detector 104 includes a carbon monoxide sensor520, which can be either an electrochemical sensor or a metal oxidesemiconductor. Additionally, the smart hazard detector 104 may include atemperature sensor, a humidity sensor for reducing false alarmsassociated with showering and cooking, and an ambient light sensor, suchas a single pixel that measures the brightness of the room.

The smart hazard detector 104 may be provided with occupancy detectingcapabilities. According to an embodiment, one or more ultrasonic sensors524 are provided for motion detecting. However, it should be appreciatedthat in addition to or instead of the ultrasonic sensors 524, one ormore passive IR (PIR) sensors 528 are provided for occupancy sensing.Having multiple ultrasonic sensor 524 and/or passive IR sensors 528enhance the occupancy sensing capabilities of the detector. Because theyare typically mounted in unobstructed locations, high on walls ofoften-occupied rooms, smart hazard detectors 104 are particularly wellsuited for occupancy detection, such as by the use of RFID, ultrasonicsensors, etc. The smart hazard detector 104 may also include athermopile 534 for flame-heat detection. As it is well known in the art,the thermopile or thereto-camera 534 is a group of thermo couples thattake infrared light and correlate that to flame heat. In some instances,this is advantageous because the thermo-camera looks into the room andgives advanced warning of heat. Thus, the thermo-camera 534 is able to“see” heat before the heat actually makes its way to the smart hazarddetector 104. In some embodiments, a PIR sensor 528 may be replaced withan optical CCD sensor. In some embodiments, a Fresnel lens may beprovided within detector 104 as a true optical imaging lens for light inthe visible spectrum. The CCD sensor may provide optical pictures and/orvideo of individuals and/or objects within the room and within the fieldof view of the CCD sensor. The lens may also serve as a user-pressablebutton. In other embodiments, a PIR sensor 528, a Fresnel lens, and/orCCD sensor may be incorporated in any of a variety of differentsmart-home devices, such as security cameras, doorbells, garage dooropeners, entertainment devices, and so forth. Essentially, thesecomponents may be incorporated into any device where an occupancydetecting function of a PIR sensor and/or CCD sensor might be usefuland/or where there is a need for a front selectable button.

According to embodiments, technologies including the sensors of thesmart hazard detector 104 in combination with rules-based inferenceengines or artificial intelligence provided at a central server such as164 are used to reduce the number of false alarms. For example,inferences about the occupants' activities can be learned based on datareceived over time. For example, if the smart hazard detector 104located in the kitchen observes increased temperature, humidity, andmotion in the kitchen, then an inference can be made that one or more ofthe occupants are cooking (“cooking inference”). These data inputs canbe considered on a sliding scale based on time of day and day of week.For example, only slight increases temperature and humidity may invokethe cooking inference at 5 pm on weekdays, when history shows that whenthe occupants typically cook. However, much larger increases arerequired to invoke the cooking inference at 10 am on a weekday, when theoccupants are typically away at that time. In some embodiments, when thecooking inference is made, the smart hazard detector 104 in the kitchenbecomes less sensitive, whereas the hazard detectors 104 in other roomremain in normal operation.

In some embodiments, the smart hazard detector 104 is equipped with oneor more air quality sensors 538. For example, the air quality sensors538 may “sniff” for volatile organic compounds (VOCs) that may bepresent in the house. Thus, the smart hazard detector 104 can warn userswhen there are toxins in the user's home, such as when the user isburning a paraffin wax candle. Paraffin is a by-product of petroleum andhas been shown to release an alarming range of (VOCs), such as tolueneand benzene. Also, for example, the air quality sensors 538 can “sniff”for gas leaks in the house, such as by detecting methane, which iscommonly added to natural gas so as to make natural gas detectable. This“sniffing” capability is not only good for houses, but also for schoolsand hospitals. Individuals will find peace of mind knowing suchdetection is in widespread use. Further, as houses get more and moresealed, air quality detection will grow in importance. Further, the airquality sensors 538 can measure levels of particulate, dust, pollen,mold, etc. for detection.

In addition to measuring air quality and detecting harmful VOCs, thesmart hazard detector 104 is capable of transmitting this information tothe other devices in the home as well as the central server orcloud-computing system 164. For example, in some embodiments, when thereare elevated levels of patent harmful gases, particulate, dust, pollen,mold, etc. in the home, the smart hazard detector 104 can transmit thisinformation to the central server or cloud-computing system 164, whichcommunicates with other nodes in the home and just outside of the home,such as the smart doorbell 106, and assess whether the inside air or theoutside air is purer. If the outside air is purer, then the centralserver or cloud-computing system 164 instructs the smart thermostat 102to open a vent to permit fresh air into the home, otherwise it instructsthe thermostat 102 to recirculate air in the home and to not draw inoutside air. Furthermore, the central server or cloud-computing system164, upon receiving the air quality information from the hazard device104, can send detailed information about the air quality to the mobiledevice 166 of user. For example, the air quality information mayidentify the specific types of toxins, particulate, dust, pollen, mold,etc. in the air. This can help the user identify which pollen, etc. theuser is allergic to. Further, the central server or cloud-computingsystem 164 can use the air quality information to provide the user withmedication recommendations (e.g., be sure to take you allergy pillstoday). Furthermore, the central server or cloud-computing system 164can aggregate data received from multiple homes in various geographiclocations and provide, for example, smog alerts, pollen warnings, etc.

According to some embodiments, the smart hazard detector 104 may includea carbon dioxide (CO₂) sensor for fire detection, where the detectorincludes a passive IR detector from lead selenide. Fire produces CO,CO₂, and infrared light. The intensity of the infrared light emitted bythe flame is pretty constant, until it passes through the layer of CO₂produced by the fire. However, the frequency of light having awavelength of 4.26 μ excites CO₂ molecules when the light contacts theCO₂. In response, the CO₂ absorbs the infrared light having a wavelengthof 4.26μ, thereby decreasing the intensity of the light at thiswavelength. Thus, to detect fire, a narrow optical bandpass filter isplaced in front of the lead selenide IR detector to permit only lighthaving a wavelength 4.26μ to pass through to the lead selenide IRdetector. In the event of fire, the lead selenide detects the decreasein intensity of light at a wavelength of 4.26μ and triggers the firealarm.

According to embodiments, technologies including the sensors of thesmart hazard detector 104 in combination with rules-based inferenceengines or artificial intelligence provided at a central server such as164 are used to warn occupants of dangerous conditions in the home. Forexample, an inference can be made that an occupant is burning a candlebased of the qualities (e.g., intensity, wavelength, frequency, etc.) ofthe light and/or the toxins begin released into the air. Further, aninference can be made that the occupant in the room has fallen asleepwhen the occupant is in the room and has not moved for a predeterminedperiod of time. In situations where a candle is burning and the occupanthas fallen asleep, the smart hazard detector 104 in that room will soundan alarm to wake up the occupant. In other example, the smart hazarddetector 104 can sound an alarm or send an alert text or email messagewhen it detects dangerous conditions in unoccupied rooms, such as whenthe stove is left on in the kitchen.

In the event a fire does occur in the home, technologies including thesensors of the hazard detectors 104 in combination with rules-basedinference engines or artificial intelligence provided at a centralserver such as 164 are used to determine the cause. For example, thesmart hazard detector 104 can detect that the fire started in thekitchen, and the smart hazard detector 104 can detect an active stove,candle, etc. was left unattended in the kitchen just before the firestarted. Additionally, a central server such as 164 can aggregate datafrom multiple homes that experienced a fire, analyze the data to findpatterns and reconstruct what caused the fires, and share thisinformation with fire departments.

In some embodiments, the smart hazard detector 104 is mounted in alocation that is out-of-reach of the occupants, such as high on a wallor on a ceiling. Thus, in the event of a false alarm, the occupantscannot reach the smart hazard detector 104 to press a button thatdeactivates the alarm. Accordingly, embodiments of the smart hazarddetector 104 allow for occupants to deactivate the alarm using “silencegestures”. For example, the smart hazard detector 104 detects aparticular “silence gesture” from one of the occupants and, in response,deactivates the alarm.

According to embodiments, the one or more ultrasonic sensors 524 of thesmart hazard detector 104 are used to detect the “silence gesture” ofthe occupant. In some embodiments, each of the ultrasonic sensors 524may contain multiple piezos so as to make the sensor “omni-directional”and to make it easier to detect when an occupant is making a silencegesture. Using ultrasonic sensors 524 in battery-powered versions of thesmart hazard detector 104 is particularly advantageous becauseultrasonic sensors 524 consume very little power. The ultrasonic sensors524 work by sending out pulses and then calculate the time intervalbetween sending the pulse and receiving the echo to determine thedistance to an object. In some embodiments, a single piezo of theultrasonic sensor sends the pulse and receives the echo. In otherembodiments, separate piezos send pulses and receive echoes.

During normal operation, the ultrasonic sensors 524 of the smart hazarddetector 104 are merely performing occupancy sensing functions. Forexample, they are determining whether the room is occupied. Whenperforming this function, the ultrasonic sensors 524 have a ping rate ofabout one hertz. This low ping rate is designed to preserve batterypower, while still effectively perform occupancy detection. However,when one of the other sensors, such as the smoke, fire, or carbonmonoxide sensors, activates the alarm, the smart hazard detector 104increases the ping rate, such as up to twenty hertz. The increased pingrate better enables detection of “silence gestures”, which are only madewhen the alarm is activated. When detecting a “silence gesture”, theultrasonic sensors 524 are “looking for” an object, such as a humanhand, to remain within in a predefined distance from the smart hazarddetector 104 for a specified period.

An example “silence gesture” will be described with references to FIGS.6 and 7. As shown in FIG. 6 at block 604, an occupant is standing inroom 612 while an alarm in hazard detector 104 is active and making a“BEEP” sound. A light 610, such as an LED, is provided on an outerportion of the smart hazard detector 104, such that the occupant 608 cansee the light 610 when it is turned on. The operation of the light 610will be described with reference to FIG. 7. Suffice to say for FIG. 6,the light is turned off in blocks 604 through 624. As shown at block616, the occupant 608 has walked to a position closer to the smarthazard detector 104, which is mounted out of reach on the ceiling of theroom. As shown at block 620, the occupant 608 walked to a position evencloser to the smart hazard detector 104, such that the occupant 608 isalmost directly under the smart hazard detector 104. As shown at arrow628 of block 624, the occupant 608, while standing almost directly underthe smart hazard detector 104, is beginning to extend an arm upward,toward the smart hazard detector 104.

Referring now to block 630 of FIG. 7, the arm of the occupant 608 isextended upward, toward the smart hazard detector 104, while theoccupant is standing almost directly under the smart hazard detector104. After an alarm sounds and the pulse rate increases, the ultrasonicsensor of the smart hazard detector 104 “looks” for a trigger to the“silence gesture” period, which is the amount of time the “silencegesture” must be maintained to deactivate the alarm. According to someembodiments, the trigger is a distance change from a baseline, and todeactivate the alarm the distance change must be maintained for theentire “silence gesture” period (e.g., three seconds). For example, ifthe baseline is a distance between the sensor and the floor of the room,then the sensor is looking for an object to come in between it and thefloor, thereby changing the distance measured by the pulse. In someembodiments, the distance change must be significant enough to ensurethat someone is close and likely intends to silence the alarm. Forexample, if the distance to the floor is ten feet, then the requisitedistance change could be eight feet or eighty percent of the originaldistance. As such, the object would be required to be within two feet ofthe sensor to trigger the “silence gesture” period, and to deactivatethe alarm the object must remain there for the duration of the period.The requisite distance change can be configured based on the height ofthe ceiling and based on the height of the occupants, among otherthings.

Referring still to block 630, the light 610 is turned on when theoccupant 608 successfully triggers the “silence gesture” period, therebysignaling to the occupant 608 to remain in the position for therequisite period, such as three seconds. Here, the hand of the occupant608 triggered the “silence gesture” period. A tolerance is built in suchthat if the occupant 608 slightly moves and loses but quickly regainsthe signal, the “silence gesture” period will continue without having tostart over. As shown in block 634, the occupant kept the hand in withinthe requisite distance of the sensor for the duration of the “silencegesture” period and, thus the alarm has been deactivated, the “BEEP” hasstopped, and the light 610 has turned off. As shown at blocks 638 and642, the occupant 608 can walk away from the smart hazard detector 104and resume normal activity.

It should be appreciated that, in the event the smart hazard detector104 is of a design that receives reliable power from the wiring of thehome (rather than being battery powered), a CCD chip could be used todetect the “silence gesture”. However, such an arrangement is notsuitable for battery-powered hazard detectors 104 because the CCD chipsand associated processing consume a large amount of power and wouldquickly drain the battery. Other possible alternatives to ultrasonicsensors 524 include passive IR sensors, thermopile (e.g.,thermo-cameras), laser-distance measuring, laser and a cameracombination because a camera looks for dot instead of time of arrival(doppler shift), and a full on camera and image processing system.

According to some embodiments, to enhance the reliability andeffectiveness of the silence gesture, the ultrasonic sensor 524 couldwork in concert with one or more optical sensors to make the sensingeven better. For example, when an occupant attempts to silence byplacing a hand in field, the optical sensor will sense the presence ofthe occupant's hand, and thereby trigger the “silence gesture” period.The ultrasonic sensor 524 could also work in concert with the opticalsensor after the “silence gesture” period has been triggered, where theultrasonic sensor detects the occupant's changing hand distance, and theoptical sensor detects the occupant's changing hand distance usingproximity and heat techniques.

According to some embodiments, the ultrasonic sensor 524 could work inconcert with the passive IR sensor. For example, when an occupantattempts to silence by placing a hand in field, the passive IR willsense this, and thereby trigger the “silence gesture” period. Theultrasonic sensor 524 could also work in concert with the thermopile(e.g., thermo-camera), where both distance change and heat are used todetect the silence gesture. For example, the thermo-camera detects whena human hand is nearby and triggers the “silence gesture” period.Further, the ultrasonic sensor 524 could work in concert with theambient light sensor. For example, when the occupant places a hand inthe field and blocks light, then the ambient light sensor know theoccupant is nearby and thus triggers the “silence gesture” period.

It should be appreciated that, according to embodiments, similar“gesture” controls can be applied to other smart devices in the home,such as to the smart thermostat, the smart wall switches, etc. Forexample, there can be gestures for increasing or decreasing temperaturecontrols, for turning on and off lights, HVAC, etc.

Turning now to FIGS. 8A-8C, illustrations are provided of an exampleembodiment of a smart doorbell 106. According to embodiments, animportant underlying functionality of the smart doorbell 106 is to serveas a home entryway interface unit, providing a doorbell functionality(or other visitor arrival functionality), audio/visual visitorannouncement functionality, and like functionalities. Like the smarthazard detector 104 described above with reference to FIGS. 5-7, thesmart doorbell 106 is further enhanced with network-connectedness and avariety of multi-sensing capabilities to accommodate additionalfunctionalities, and there can be substantial overlap/integration amongthe smart doorbell 106, the smart hazard detector 104, the smart wallswitch 108, and the smart wall plug 110 that leverages their combinedprocessing, sensing, and communications capabilities, as well as theiraccess to cloud-based control and intelligence.

In some embodiments, the smart doorbell 106 is connected to the wiringof the smart-home environment 100. For example, as is common in manyhomes, a 24V low voltage wire is provided at the outer entry points ofthe home, such as at the front, back, and side doors. The smart doorbell106 can be connected to this 24V low voltage wire to obtain steady andreliable power. However, it should be appreciated that the smartdoorbell could include a battery for the purpose of replacing orsupplementing power obtained from the home wiring. In some embodiments,the battery could be a rechargeable battery, such as a rechargeableLithium-Ion battery, for extracting power as needed from the housewiring (e.g., 24V low voltage wire). For example, the smart doorbell 106could charge the battery during time intervals in which the doorbell'spower usage is less than what the 24V low voltage wire can safelyprovide, and that will discharge to provide the needed extra electricalpower during time intervals in which the hardware power usage is greaterthan what the 24V low voltage wire can safely provide. Thus, therechargeable battery could be used as a conventional back-up source oras a reservoir to supply excess DC power if needed for short periods.

As illustrated in FIG. 8B, according to some embodiments, the smartdoorbell 106 includes two parts: a head unit 804 and a backplate 808,which is also referred to as a docking station 808. This bifurcation canincrease the success and commercial longevity of the doorbells 106 bymaking them a modular platform consisting of two basic components. Aswith the wall switches 108 and the hazard detectors 104, thisbifurcation can increase the success and commercial longevity of thesmart doorbells 106 by making them a modular platform. The dockingstation 808 is a permanent interface box that serves as a physicalconnection into an area near the entry way, such as a doorframe or outerwall of the home, and to the voltage wires of the home. According tosome embodiments, the head unit 804 (sometimes referred to herein as“replacement module 804”) actually contains all of the sensors,processors, user interfaces, the rechargeable battery, and so forth.Users can plug and unplug the unit 804 in and out of the docking station808. Many different commercial and functional possibilities forprovisioning, maintenance, and upgrade are possible. For example, afteryears of using any particular head unit 804, a user will be able to buya new version of the head unit 804 and simply plug it into the dockingstation 808. There are also many different versions for the head unit804, such as low-cost versions with few features, and then a progressionof increasingly-capable versions, up to and including extremely fancyhead units 804 with a large number of features. Thus, it should beappreciated that the various versions of the head units 804 can all beinterchangeable, with any of them working when placed into any dockingstation 808. This can advantageously encourage sharing and re-deploymentof old head units 804—for example, when an important high-capabilityhead unit 804 (for the front door, for example) can be replaced by agreat new version of the head unit 804, then the old head unit 804 canbe re-deployed to a back or basement door, etc. When first plugged intoa docking station 808, the head unit 804 can ask the user (by 2D LCDdisplay, 2D/3D holographic projection, voice interaction, etc.) a fewsimple questions such as, “Where am I” and the user can select “frontdoor” or “back door” and so forth.

Sensor devices such as temperature, humidity, occupancy, ambient light,fire, smoke, carbon monoxide, active proximity, passive infrared motion,any other suitable motion sensing component, ultrasound, CCD/videocamera, bar code scanner, etc., as well as I/O devices such as speakers,user interfaces, 2D/3D projectors, etc., are provided in the head unit804. The sensors and I/O devices are generally represented at 828.

According to embodiments, technologies including the sensors 828 incombination with rules-based inference engines or artificialintelligence provided at a central server such as 164 are used to detectwhen packages are delivered to the door of the smart-home environment100, and to take a variety of automated actions in response. Accordingto some embodiments, the sensors 828 can “see” the uniform of thedelivery person approaching the door or the truck of the deliveryperson, or the sensors can “hear” the truck in combination with a personapproaching the door within a period after hearing the truck. Once theperson is with a predetermined distance from the door, the smartdoorbell 106, using its speaker, asks the person if he or she is adelivery person, to which that person can reply with an audible responseor by indicating as such on the user interface of the doorbell. If theperson is making a delivery, the doorbell can instruct the person toplace the package in a location proximate the doorbell 106 such that itsscanner can scan the bar code or other type of identifying tag affixedto or associated with the package being delivered.

According to embodiments, a central server, such as server 164, can usethe bar code to obtain information about the package, such as thesender, recipient, a description of the item therein, whether signatureis required, etc. Based on this information the rules-based inferencesengines or artificial intelligence can make inference regarding whichaction to take next. For example, if occupants or more particularly ifthe specified recipient or recipients are in the home and the package isfrom a sender or contains an item that is of particular interest to theone or more occupants, an announcement can be made in the home,indicating the package is currently being dropped off and providingdetails about the package. On the other hand, if the sender or item isnot of particular interest to one of the occupants based on theoccupants past responses to receiving such deliveries, then noannouncement will be made and the occupants can discover the package indue course. Similarly, if no occupants are home but an inference is madethat the package is of particular interest to one of the occupants, atext message, email, phone call, etc. can be made (e.g., by server 164)to the one or more identified occupants, indicating that the package inbeing delivered.

According to embodiments, in the event signature is required for thepackage but none of the occupants are home an inference is made to notdisturb the occupants, the smart doorbell can provide authorization toleave the package. For example, the doorbell 106 presents anauthorization code (either in plain text, barcode, or encrypted forms)on its user interface and prompts the delivery person to use his or herhandheld device to record, scan, photograph, or otherwise acquire theauthorization code. Once the authorization code has been acquired by thedelivery person, the doorbell 106 can then instruct the delivery personregarding where to leave the package, such as at the front door, aroundthe back of the house in a discrete location, etc.

According to embodiments, technologies including the sensors 828, suchas noise, motion, and/or facial recognition detection, in combinationwith rules-based inference engines or artificial intelligence providedat a central server, such as server 164, are used to detect when one ormore unknown individuals are approaching the home. A number of learnedinferences can be made in this situation. For example, during lateevening hours, an alarm will be sounded in the house, giving notice ofthe approaching person and/or the doorbell 106 may audibly announce tothe individual that he or she is being monitored by a home securitysystem. Further, in the event the person attempts to enter a door,window, or other access point to the home, a message will be sent tolocal law enforcement. However, during day time hours when one or moreoccupants are at home, a learned inference can be made to take noaction, such as when a meter reader, mail carrier, garbage collector,etc. is approaching the house as per a reasonably predictable andlearned schedule.

According to embodiments, the smart doorbell 106 provides acontext-based entry keypad. In some examples, the entry keypad can beprojected, such as via a 2D/3D holographic projection. In otherexamples, the entry keypad can be rendered on a display such as a 2D LCDdisplay. Persons standing proximate to the smart doorbell 106 can entera code into the keypad to obtain access to the smart-home environment100. According to embodiments, the occupants of the home getcontext-based keypads and/or access codes. For example, the parents geta more sophisticated keypad that provides a variety of controls, whereaschildren get a simple keypad into which they can enter their accesscode. Further, non-occupants get context-based keypads, too. Forexample, a delivery person gets one keypad, whereas uncategorizedindividuals get another keypad. According to some embodiments, thekeypad can vary based on factors such as time of day, current news(e.g., any recent crime in the neighborhood?), proximity of securityguards and other law enforcement personnel, and which, if any, occupantsare currently at home. For example, if there is a nearby security guard,then the keypad requests a three-digit access code or no access code atall, rather than the usual ten-digit access code. In another example, ifno one is home or if only children or elderly people are at home, then aten-digit code is required. However, if the parents of the children orthe adult children of the elderly are at home then no access code isrequired or only a three-digit code is required. If the approachingperson is identified as a guest, then the keypad prompts the guest toenter the guest access code assigned to him or her. It should also beappreciated that individuals are prompted to input their access code asthey leave the home, too. This way the codes of the guests, theoccupants, and recognized categories of strangers (e.g., a deliveryperson) can be used to track the goings and comings of those people. Itshould be appreciated that this keypad can be provided on any smartdevice in the home, such as the wall switch 108, the thermostat 102,hazard detector 104, and the wall plug 110.

According to embodiments, when the central server such as server 164,based on information received from the doorbell 106, such as noise andmotion data, determines that the street adjacent to the home has athreshold level of traffic, the inferences are made regarding the safetyof the children residing at the home. For example, an alarm can betriggered in the home in the event one or more of the children aredetected by the occupancy sensing to be outside of the home. This alertenables the parents or other caretakers to quickly take actions toprotect the child from the traffic. Further, for example, automaticadjustments are made to audio equipment in the home to account for theincreased traffic noise, such as by increasing the volume aproportionate amount.

As discussed, the sensors 828 may include temperature and humiditysensors, the data from which may be used for a number of usefulservices. For example, the outside humidity and temperature data isconsidered by the thermostat 102 when controlling the HVAC to bestaccomplish the occupants' desired comfort preferences. Further, forexample, this information may be presented to the occupants through anumber of user interfaces, such as a user interface associated withanother one of the devices located inside of the home, the television,mobile and other computing devices, or audibly. In some instances, acentral server such as server 164 collects this information from aplurality of smart homes across a plurality of geographic locations.This aggregated data may be sold to weather services or may be used toprovide weather data to smart home occupants.

According to embodiments, the smart doorbell 106 includes a button 812that, upon being touched, depressed, or otherwise activated, causes anaudible, visual, or otherwise detectable audible notification to bebroadcasted within the home or a message to be sent to user interfacesof devices within the home or to a mobile device associated withoccupants of the home. Learned inferences can be made regarding theappropriate response to activation of the button 812. For example, theaudible notification is only broadcast in occupied rooms, or roomsoccupied by one or more occupants who have a relationship with theperson at the door, or no alarm is sounded in rooms where occupants,such as small children, are determined to be sleeping. Also, forexample, the occupant-selected songs, such as uploaded MP3's, may bebroadcast in the home, where different songs may be broadcast fordifferent occupants at home at the time or based on the identity of theperson at the door. Further, for example, technologies and sensors atthe smart doorbell 106 may identify the person based on facialrecognition or based on other characteristics such as the manner inwhich the person approached the door. For example over time, based oninput received from the smart doorbell 106, a central server can buildup an address book of profile data about people who approach the door,such as some identifying biometric data. For example, the address bookcan be built over time using low-resolution data such as ultrasonic,passive IR, etc. to create a unique signature for individuals. Thiscombined data from different domains becomes almost like a fingerprintregarding how that person approaches the house. In some instances, whena “familiar” person approaches the door, the smart doorbell 106 “asks”the person if he is “John Doe”, to which the person can verbally orphysically respond. Upon obtaining this information John Doe's name orimage can be announced or projected on device in the home and/or JohnDoe will be given certain access rights to the home, such as for examplethe door will automatically unlock as he approaches. Further, inaddition to or instead of identification based on these unique“signatures”, individuals may enable their mobile devices to communicatewith the smart doorbell 106, such as via BLUETOOTH, NFC, or otherwireless protocols. Also, for example, individuals may “swipe” theirsmart phones in front of the smart doorbell's RFID scanner. Uponidentifying the individual, the smart doorbell may give the individualcertain access right to the home, such as by automatically unlocking thedoor.

According to embodiments, technologies including the sensors 828 incombination with rules-based inference engines or artificialintelligence provided at a central server, such as server 164, also makelearned decisions.

According to embodiments, a home monitoring and control system isprovided that may include one or more hazard detectors with wirelesscapability and occupancy detectors and audio speakers, and a doorbellhaving a processor and wireless capability. A doorbell-ringing event maytrigger the processor to cause the doorbell to wirelessly communicatewith one or more of the hazard detectors to cause the audio speakers toalert occupants of a visitor at the door. In some embodiments, eachhazard detector can be configured with a do-not-disturb setting suchthat it will remain silent under one or more pre-determined conditions.According to embodiments, the pre-determined conditions may include oneor more of an occupant determined to be sleeping proximate to the hazarddetector, room location of hazard detector is unoccupied, hazarddetector is located in an occupied bedroom, and hazard detector islocated in a kid's bedroom.

Turning now to FIG. 9, an illustration is provided of an exampleembodiment of a smart wall plug 110. According to embodiments, the smartwall plugs 110 enhance the smart-home environment 100 by providing aretrofit wall plug that, in addition to maintaining the basic characterand purpose of a wall plug, incorporates a host of sensing andcommunication capabilities for enhancing occupant comfort, convenience,and safety. Much like the smart wall switches 108, by virtue of beingmounting in place of traditional wall plugs, the smart wall plugs 110have access to plentiful electrical operating power, such as byconnecting to wiring (e.g., to 120V “hot” line voltage wires) that islocated behind the walls 154 of the smart-home environment 100 and thatis present at virtually all standard home wall plugs. This unlimitedpower budget, the numerous installation locations throughout the home,and the reasonably ample physical space in its housing to fit thenecessary components, combine to enable the smart wall plugs 110 toaccommodate a rich and wide variety of sensing and communicationscapabilities for the smart-home environment 100, as well as a generalplatform for the provision of even newer sensing and communicationshardware as it becomes available. In addition to numerous installationlocations inside the home, there are numerous outdoor locations outsideof the home, too. For example, smart wall plugs may 110 may be mountedon the outside surface of external walls of the smart-home environment,and thereby may connect to the same wiring (e.g., to 120V “hot” linevoltage wires) as do the indoor wall plugs.

A rich variety of new interactions are made possible between the smartwall plugs 110 and other devices of the smart-home environment 100.Occupancy, motion, or presence sensing, for example, can be enhanced byvirtue of the numerous installation locations of wall plugs inside andoutside of the home, albeit some of these locations are hidden behindfurniture or in locations where people are unlikely to go. According toembodiments, the smart wall plugs 110 can include all or some of thecomponents that are included in the wall switch 108, as illustrated inFIGS. 4A-C. For example, the smart wall plugs 110 can be comprised oftwo primary parts: a head unit 908 and a docking station 904, which is apermanent interface box that serves as a physical connection into thewall and to the 120V line voltage wires or other wiring of thesmart-home environment 100. This bifurcation can increase the successand commercial longevity of the smart wall plugs 110 by making them amodular platform consisting of two basic components. According toembodiments, the head unit 908 contains the sensors, processors, the I/Odevices and receptacles, and so forth. Users can upgrade and/orredistribute wall plug functionality throughout the home by plugging andunplugging head units of varying capabilities in and out of the dockingstations in various locations throughout the home. For example, toenhance security of the smart-home environment 100, head units 908having advanced motion sensing capabilities can be plugged into dockingstations located in areas having clear lines of sight to entry points,such as doorways and windows. Further, these head units 908 can beplugged into docking stations location in areas having clear lines ofsight in commonly occupied rooms, rather than behind furniture in orunused rooms. As discussed, these head units may be capable ofwirelessly communicating detected motion and can therefore serve as a“tripwire” for the home security system, either inside the home oroutside the home. For example, smart wall plugs 110 located outside thehome, such as on external walls near windows and doors provide outdoortripwires that alert the central server or cloud-computing system 164 tothe presence of intruders before unwelcome entry into the home evenoccurs. Also, for example, head units having advance communicationcapabilities are plugged into docking stations associated withhigh-energy consuming appliances, such as a clothes dryer. As discussed,these head units may be capable of wirelessly communicating with smartmeters and corresponding providing power to the clothes dryer atoff-peak hours. Because this head unit may be located behind a clothesdryer in a rarely-occupied laundry room, it is unnecessary for this headunit to include advanced occupancy sensors, for example.

According to some embodiments, the head unit 908 includes a standardduplex receptacle 960 having upper and lower outlets, each having threeslots. The head unit 908 further contains some or all of a mainprocessor, storage, audio speaker, microphone, power converter. GPSreceiver, RFID locator, etc. Additionally, the head unit 908 may includewireless and wired networking. In view of the ample power availability,a variety of communications capabilities can be provided, includingWi-Fi, ZigBee, 3G/4G wireless, CAT6 wired Ethernet, and even opticalfiber from the curb. According to embodiments, the smart wall plugs 110are spokesman nodes in the mesh network described above. For example,the smart wall plugs 110 regularly send out messages regarding what theyare sensing and, in addition to sending out their own messages, thesmart wall plugs 110 repeat messages from other smart devices in themesh network, thereby causing the messages to travel from node to node(i.e., smart device to smart device) throughout the smart-homeenvironment 100. As spokesman nodes in the smart-home environment 100,the smart wall plugs 110 are able to “drop down” to low-poweredcommunication protocols to receive messages from low-power nodes,translate the messages to other communication protocols, and send thetranslated messages to other spokesman nodes and/or the central serveror cloud-computing system 164. Thus, the smart-wall plugs 110 enable thelow-powered nodes using low-power communication protocols to sendmessages across the entire smart-home environment 100 as well as overthe Internet 162 to the central server or cloud-computing system 164.For example, battery operated smart hazard detectors 104 are able topreserve their limited power resource, yet also communicate with theenteral server or could-computing system 164 in real time or near realtime by sending messages in low-power protocols to the wall plugs 110which repeat the messages in high-power protocols, which are transmittedto the central server or cloud-computing system 164. According toembodiments, the mesh network enables the central server orcloud-computing system 164 to regularly receive data from all of thesmart devices in the home, make inferences based on the data, and sendcommands back to individual one of the smart devices to accomplish someof the smart-home objectives descried herein.

Furthermore, because the smart wall plug 110 can be connected to thehome 120V system, a HomePlug or other powerline-communicationscapability can be provided (See FIGS. 4A-C for example illustrations ofsuch components being provided on a wall switch 108). It should also beappreciated that the smart wall plugs 110 may include sensors 928 suchas temperature, humidity, occupancy, ambient light, fire, smoke, carbonmonoxide, active proximity, passive infrared motion, ultrasound,CCD/video camera, an ambient light sensor, such as a photoresistor or asingle-pixel sensor that measures light in the room, etc.

In some examples, the wall plug 110 may include or be associated with alight source having variable intensity and color, and can thereforefunction in a manner similar to the smart nightlight 170 describedabove. In some embodiments, the light source of the wall plug 110 isconfigured to activate when the ambient light sensor detects that theroom is dark and/or when the occupancy sensor detects a person'spresence or movement. The color and intensity of the light source can beadjusted based on information received from sensor of the wall plug 110or from other smart devices in the smart-home environment. For example,in the event the central server or cloud-computing system 164 triggersan alarm indicating unauthorized intrusion (e.g., based on motiondetection data received from smart devices in the home), the lightsource associated with the smart wall plugs 110 can be activated. Inthis example, the light sources associated with the wall plugs 110 canemit a high-intensity red-colored light to indicate that an emergency isoccurring and to cause any intruder to leave the home.

According to embodiments, the smart wall plugs 110 wirelesslycommunicate with smart meters, which are electrical meters that recordconsumption of electric energy in time intervals and then transmits thatinformation a local radio receiver, which forward the information toutility companies. Utility companies use this data to charge varyingrates. For example, power used midday during peak hours is moreexpensive than energy used at night during off-peak hours. The smartwall plugs 110 communicate with the smart meter of the home to obtainpower-usage data. This data can be forwarded to a central server such asserver 164. Rules-based inference engines or artificial intelligenceprovided at a central server such as 164 to make decisions regarding howto efficiently operate certain appliances in the home, so as to reduceenergy costs, yet also satisfy the occupants' preferences. For example,decisions are made regarding use appliances for non-essential tasks atnight (e.g., wash dishes at night), and to permit essential tasks whennecessary (e.g., allow refrigerator compressor to turn on mid-day).

According to other embodiments, the smart wall plugs 110 wirelesslycommunicate with a central server such as server 164. Rules-basedinference engines or artificial intelligence provided at a centralserver such as 164 make security-related decisions based on datareceived from the smart wall plugs 110. For example, decisions are maderegarding when to trigger an alarm, when to turn on lights, when to senda warning to the owner's mobile device or to the neighborhood network.Furthermore, the intelligence of the central process can be used forsafety. For example, the central server can be programmed with safeoperating parameters for each application in the smart home, and canshutoff power to the appropriate wall plug 110 when the correspondingapplication deviates from its safe operating parameters. Also forexample, in the event data from an occupancy sensor on a particular wallplug 110 indicates that a small child is really close to the wall plug,the central server may shut off power to that plug. Further, users canremotely control, such as by use of their mobile device, the outlets inthe home. For example, a parent may want to shutoff power to all wallplugs 110 in their child's room, or that are outside of the home andthere is some risk that a child may be attracted to the plug.

Turning now to FIGS. 10A-B, illustrations of a smart thermostat 102 areprovided, according to some embodiments. Unlike many prior artthermostats, smart thermostat 102 preferably has a sleek, simple,uncluttered and elegant design that does not detract from homedecoration, and indeed can serve as a visually pleasing centerpiece forthe immediate location in which it is installed. Moreover, userinteraction with smart thermostat 102 is facilitated and greatlyenhanced over known conventional thermostats by the design of smartthermostat 102. The smart thermostat 102 includes control circuitry andis electrically connected to an HVAC system, such as is shown with unit102 in FIG. 1. Smart thermostat 102 is wall mounted, is circular inshape, and has an outer rotatable ring 1012 for receiving user input.Smart thermostat 102 is circular in shape in that it appears as agenerally disk-like circular object when mounted on the wall. Smartthermostat 102 has a large front face lying inside the outer ring 1012.According to some embodiments, smart thermostat 102 is approximately 100mm in diameter.

The outer rotatable ring 1012 allows the user to make adjustments, suchas selecting a new target temperature. For example, by rotating theouter ring 1012 clockwise, the target temperature can be increased, andby rotating the outer ring 1012 counter-clockwise, the targettemperature can be decreased. The smart thermostat 102 may be configuredto receive a plurality of types of inputs by virtue of the rotatablering 1012, such as a scrolling input and a selection input. For example,a rotation of the ring may allow a user to scroll through an array ofselection options, and inwards pressure exerted on the ring (inwardclick) may allow a user to select one of the options (e.g.,corresponding to a particular scroll position).

The outer rotatable ring 1012 may include a component that may bephysically rotated, or, in other embodiments, a static component thatmay sense a user's virtual rotation of the ring. For some embodiments,the outer rotatable ring 1012 may include a touch pad configured totrack arcuate motion of a user's finger on the touch pad. The touch padmay comprise, e.g., a ring-shaped or circular area. In some instances,the touch pad includes multiple portions (e.g., to detect arcuate motionin a first ring-shaped area and to detect tapping in a second innercircular area). Boundaries of a touch pad area may be identified to auser using, e.g., visual or tactile cues. For example, a ring-shapedtouchpad area may be indented compared to neighboring areas on the smartthermostat 102, or the area may be a different color than neighboringareas.

For preferred embodiments such as those of FIG. 10A in which the outerring 1012 is a continuous loop without fiducial markers, one or moreadvantages are brought about. Thus, a user may physically rotate thering (in embodiments in which the ring is configured to be physicallyrotatable) regardless of a starting position of the ring. Further, auser may select, e.g., a value of a variable (e.g., select a particularmenu, a particular setpoint temperature value, etc.) by rotating thering multiple times. This feature may be particularly advantageous asthe user does not need not to worry about precise rotations in order toselect a desired option.

The front face of the smart thermostat 102 comprises a clear cover 1014that according to some embodiments is polycarbonate, and a metallicportion 1024 preferably having a number of slots formed therein asshown. According to some embodiments, the surface of cover 1014 andmetallic portion 1024 form a common outward arc or spherical shapegently arcing outward, and this gentle arcing shape is continued by theouter ring 1012.

Although being formed from a single lens-like piece of material such aspolycarbonate, the cover 1014 has two different regions or portionsincluding an outer portion 1014 o and a central portion 1014 i.According to some embodiments, the cover 1014 is painted or smokedaround the outer portion 1014 o, but leaves the central portion 1014 ivisibly clear so as to facilitate viewing of an electronic display 1016disposed thereunderneath. According to some embodiments, the curvedcover 1014 acts as a lens that tends to magnify the information beingdisplayed in electronic display 1016 to users. According to someembodiments the central electronic display 1016 is a dot-matrix layout(individually addressable) such that arbitrary shapes can be generated,rather than being a segmented layout. According to some embodiments, acombination of dot-matrix layout and segmented layout is employed.According to some embodiments, central display 1016 is a backlit colorliquid crystal display (LCD). An example of information displayed on theelectronic display 1016 is illustrated in FIG. 10A, and includes centralnumerals 1020 that are representative of a current setpoint temperature.

Particular presentations displayed on the electronic display 1016 maydepend on detected user input. For example, one of a plurality ofvariables (e.g., current setpoint temperature versus learning status) orvariable values (e.g., 65 degrees versus 75 degrees) may be displayed.The one being displayed may depend on a user's rotation of the outerrotatable ring 1012. Thus, for example, when the device is configured todisplay a current setpoint temperature, the value being displayed maygradually increase as the user rotates the ring in a clockwisedirection. The sign of the change in the displayed temperature maydepend on whether the user is rotating the ring in a clockwise orcounterclockwise direction. The speed at which the displayed temperatureis changing may depend (e.g., in a linear manner) on the speed at whichthe user is rotating the ring.

As described above, a displayed characteristic may vary depending onreceived user input. For example, a displayed temperature may increaseas a user rotates the outer rotatable ring 1012 clockwise, or ahighlighted indicator may progress across a list of displayed options asthe user rotates the ring 1012. Further, or additionally, user inputsmay cause the appearance of new types of information. For example, if auser is viewing setpoint-temperature options, a dramatic clockwiserotation may cause a flashing red symbol (to convey ananti-environmental message). Thus, a relationship may exist between asingle type of user input (e.g., ring rotation) and a change in anactive variable (e.g., setpoint temperature changes), and relationshipsmay further exist between the single type of user input and an inactivevariable (e.g., an environmental warning flag). The latter relationshipmay be indirect and depend on a value or change in values of the activevariable.

The presentations on the electronic display 1016 may depend on one ormore types of user input. For example, the display may change in a firstmanner (e.g., to show a varying selection option) as a user rotates theouter rotatable ring 1012 and may change in a second manner (e.g., toconfirm a selection or default to a menu screen) as the user exertsinwards pressure on the outer rotatable ring 1012.

According to some embodiments, metallic portion 1024 has a number ofslot-like openings so as to facilitate the use of a passive infraredmotion sensor 1030 mounted therebeneath. The metallic portion 1024 canalternatively be termed a metallic front grille portion. Furtherdescription of the metallic portion/front grille portion is provided inthe commonly assigned U.S. Ser. No. 13/199,108 (U.S. Pat. No. 8,727,611,issued May 20, 2014). The design of the metallic portion 1024compliments the sleek, simple, uncluttered and elegant design of smartthermostat 102 while facilitating the integration and operation ofsensors located within a housing of the thermostat. In theimplementation as illustrated, smart thermostat 102 is enclosed byhousing with a forward-facing surface including the cover 1014 and themetallic portion 1024. Some implementations of the housing include aback plate and a head unit. The housing provides an attractive anddurable configuration for one or more integrated sensors used by smartthermostat 102 and contained therein. In some implementations, themetallic portion 1024 may be flush-mounted with the cover 1014 on theforward-facing surface of housing. Together the metallic portion 1024 asincorporated in housing does not detract from home or commercial decor,and indeed can serve as a visually pleasing centerpiece for theimmediate location in which it is located.

The metallic portion 1024 is designed to conceal sensors from viewpromoting a visually pleasing quality of the thermostat yet permittingthem to receive their respective signals. Openings in the metallicportion 1024 along the forward-facing surface of the housing allowsignals to pass through that would otherwise not pass through the cover1014. For example, glass, polycarbonate or other similar materials usedfor cover 1014 are capable of transmitting visible light but are highlyattenuating to infrared energy having longer wavelengths in the range of10 microns, which is the radiation band of operation for many passiveinfrared (PIR) occupancy sensors. Notably, included in the smartthermostat 102, according to some preferred implementations, is anambient light sensor (not shown) and an active proximity sensor (notshown) positioned near the top of the thermostat just behind the cover1014. Unlike PIR sensors, the ambient light sensor and active proximitysensor are configured to detect electromagnetic energy in the visibleand shorter-infrared spectrum bands having wavelengths less than 1micron, for which the glass or polycarbonate materials of the cover 1014are not highly attenuating. In some implementations, the metallicportion 1024 includes openings in accordance with one or moreimplementations that allow the longer-wavelength infrared radiation topass through the openings towards a passive infrared (PIR) motion sensor1030 as illustrated. Because the metallic portion 1024 is mounted overthe radiation receiving surface of PIR motion sensor 1030, PIR motionsensor 1030 continues to receive the longer wavelength infraredradiation through the openings and detect occupancy in an enclosure.

Additional implementations of the metallic portion 1024 also facilitateadditional sensors to detect other environmental conditions. Themetallic portion may at least partly conceal and/or protect one or moresuch sensors. In some implementations, the metallic portion 1024 helps atemperature sensor situated inside of the thermostat's housing measurethe ambient temperature of air. Openings in the metallic portion 1024promote air flow towards a temperature sensor located below the metallicportion 1024 thus conveying outside temperatures to the interior of thehousing. In further implementations, the metallic portion 1024 may bethermally coupled to a temperature sensor promoting a transfer of heatfrom outside the housing.

The smart thermostat 102 is preferably constructed such that theelectronic display 1016 is at a fixed orientation and does not rotatewith the outer ring 1012, so that the electronic display 1016 remainseasily read by the user. For some embodiments, the cover 1014 andmetallic portion 1024 also remain at a fixed orientation and do notrotate with the outer ring 1012. According to one embodiment in whichthe diameter of the smart thermostat 102 is about 80 mm, the diameter ofthe electronic display 1016 is about 45 mm. According to someembodiments an LED indicator 1080 is positioned beneath portion 1024 toact as a low-power-consuming indicator of certain status conditions.For, example the LED indicator 1080 can be used to display blinking redwhen a rechargeable battery of the thermostat is very low and is beingrecharged. More generally, the LED indicator 1080 can be used forcommunicating one or more status codes or error codes by virtue of redcolor, green color, various combinations of red and green, variousdifferent blinking rates, and so forth, which can be useful fortroubleshooting purposes.

Motion sensing as well as other techniques can be used in the detectionand/or prediction of occupancy, as it is described further in thecommonly assigned U.S. Ser. No. 12/881,430, supra (U.S. Pat. No.8,510,255, issued Aug. 13, 2013). According to some embodiments,occupancy information is used in generating an effective and efficientscheduled program. Preferably, an active proximity sensor 1070A isprovided to detect an approaching user by infrared light reflection, andan ambient light sensor 1070B is provided to sense visible light. Theproximity sensor 1070A can be used to detect proximity in the range ofabout one meter so that the smart thermostat 102 can initiate “wakingup” when the user is approaching the thermostat and prior to the usertouching the thermostat. Such use of proximity sensing is useful forenhancing the user experience by being “ready” for interaction as soonas, or very soon after the user is ready to interact with thethermostat. Further, the wake-up-on-proximity functionality also allowsfor energy savings within the thermostat by “sleeping” when no userinteraction is taking place or about to take place. The ambient lightsensor 1070B can be used for a variety of intelligence-gatheringpurposes, such as for facilitating confirmation of occupancy when sharprising or falling edges are detected (because it is likely that thereare occupants who are turning the lights on and off), and such as fordetecting long term (e.g., 24-hour) patterns of ambient light intensityfor confirming and/or automatically establishing the time of day.

According to some embodiments, for the combined purposes of inspiringuser confidence and further promoting visual and functional elegance,the smart thermostat 102 is controlled by only two types of user input,the first being a rotation of the outer ring 1012 as shown in FIG. 10A(referenced hereafter as a “rotate ring” or “ring rotation” input), andthe second being an inward push on an outer cap 1008 (see FIG. 10B)until an audible and/or tactile “click” occurs (referenced hereafter asan “inward click” or simply “click” input). For the embodiment of FIGS.10A-10B, the outer cap 1008 is an assembly that includes all of theouter ring 1012, cover 1014, electronic display 1016, and metallicportion 1024. When pressed inwardly by the user, the outer cap 1008travels inwardly by a small amount, such as 0.5 mm, against an interiormetallic dome switch (not shown), and then springably travels backoutwardly by that same amount when the inward pressure is released,providing a satisfying tactile “click” sensation to the user's hand,along with a corresponding gentle audible clicking sound. Thus, for theembodiment of FIGS. 10A-10B, an inward click can be achieved by directpressing on the outer ring 1012 itself, or by indirect pressing of theouter ring by virtue of providing inward pressure on the cover 1014,metallic portion 1024, or by various combinations thereof. For otherembodiments, the smart thermostat 102 can be mechanically configuredsuch that only the outer ring 1012 travels inwardly for the inward clickinput, while the cover 1014 and metallic portion 1024 remain motionless.It is to be appreciated that a variety of different selections andcombinations of the particular mechanical elements that will travelinwardly to achieve the “inward click” input are within the scope of thepresent teachings, whether it be the outer ring 1012 itself, some partof the cover 1014, or some combination thereof. However, it has beenfound particularly advantageous to provide the user with an ability toquickly go back and forth between registering “ring rotations” and“inward clicks” with a single hand and with minimal amount of time andeffort involved, and so the ability to provide an inward click directlyby pressing the outer ring 1012 has been found particularlyadvantageous, since the user's fingers do not need to be lifted out ofcontact with the device, or slid along its surface, in order to gobetween ring rotations and inward clicks. Moreover, by virtue of thestrategic placement of the electronic display 1016 centrally inside therotatable ring 1012, a further advantage is provided in that the usercan naturally focus their attention on the electronic display throughoutthe input process, right in the middle of where their hand is performingits functions. The combination of intuitive outer ring rotation,especially as applied to (but not limited to) the changing of athermostat's setpoint temperature, conveniently folded together with thesatisfying physical sensation of inward clicking, together withaccommodating natural focus on the electronic display in the centralmidst of their fingers' activity, adds significantly to an intuitive,seamless, and downright fun user experience. Further descriptions ofadvantageous mechanical user-interfaces and related designs, which areemployed according to some embodiments, can be found in U.S. Ser. No.13/033,573, supra (U.S. Patent Application Publication No.2012/0130546), U.S. Ser. No. 29/386,021, supra (U.S. Design Pat. No.D660,732, issued May 29, 2012), and U.S. Ser. No. 13/199,108 (U.S. Pat.No. 8,727,611, issued May 20, 2014).

FIG. 10C illustrates a cross-sectional view of a shell portion 1009 of aframe of the thermostat of FIGS. 10A-B, which has been found to providea particularly pleasing and adaptable visual appearance of the overallsmart thermostat 102 when viewed against a variety of different wallcolors and wall textures in a variety of different home environments andhome settings. While the thermostat itself will functionally adapt tothe user's schedule as described herein and in one or more of thecommonly assigned incorporated applications, supra, the outer shellportion 1009 is specially configured to convey a “chameleon” quality orcharacteristic such that the overall device appears to naturally blendin, in a visual and decorative sense, with many of the most common wallcolors and wall textures found in home and business environments, atleast in part because it will appear to assume the surrounding colorsand textures even when viewed from many different angles. The shellportion 1009 has the shape of a frustum that is gently curved whenviewed in cross-section, and comprises a sidewall 1076 that is made of aclear solid material, such as polycarbonate plastic. The sidewall 1076is backpainted with a substantially flat silver- or nickel-coloredpaint, the paint being applied to an inside surface 1078 of the sidewall1076 but not to an outside surface 1077 thereof. The outside surface1077 is smooth and glossy but is not painted. The sidewall 1076 can havea thickness T of about 1.5 mm, a diameter d1 of about 78.8 mm at a firstend that is nearer to the wall when mounted, and a diameter d2 of about81.2 mm at a second end that is farther from the wall when mounted, thediameter change taking place across an outward width dimension “h” ofabout 22.5 mm, the diameter change taking place in either a linearfashion or, more preferably, a slightly nonlinear fashion withincreasing outward distance to form a slightly curved shape when viewedin profile, as shown in FIG. 10C. The outer ring 1012 of outer cap 1008is preferably constructed to match the diameter d2 where disposed nearthe second end of the shell portion 1009 across a modestly sized gap g1therefrom, and then to gently arc back inwardly to meet the cover 1014across a small gap g2. It is to be appreciated, of course, that FIG. 10Conly illustrates the outer shell portion 1009 of the smart thermostat102, and that there are many electronic components internal thereto thatare omitted from FIG. 10C for clarity of presentation, such electroniccomponents being described further hereinbelow and/or in other ones ofthe commonly assigned incorporated applications, such as U.S. Ser. No.13/199,108 (U.S. Pat. No. 8,727,611, issued May 20, 2014).

According to some embodiments, the smart thermostat 102 includes aprocessing system 1060, display driver 1064 and a wirelesscommunications system 1066. The processing system 1060 may be disposedwithin a housing of smart thermostat 102, coupled to one or moretemperature sensors of smart thermostat 102 and/or coupled to rotatablering 1012. The processing system 1060 may be configured to dynamicallyidentify user input via rotatable ring 1012, dynamically identifying avariable value (e.g., a setpoint temperature value), and/or dynamicallyidentify an HVAC-control-related property. The processing system 1060may be configured and programmed to provide an interactive thermostatmenuing system on display area 1016 responsive to an inward pressing ofrotatable ring 1012 (e.g., such as for asking questions or otherwiseobtaining data from users during interactive information-exchangesessions, as described in commonly-assigned U.S. patent application Ser.No. 13/440,910 (now U.S. Patent Application Publication No.2013/0268125), which is hereby incorporated by reference herein in itsentirety) and/or to provide user navigation within the interactivethermostat menuing system based on rotation of rotatable ring 1012 andinward pressing of rotatable ring 1012 (e.g., such as is described inrelation to FIG. 5). The processing system 1060 may be adapted to causethe display driver 1064 and display area 1016 to display information tothe user and/or to receive user input via the rotatable ring 1012.

For example, an active variable (e.g., variable-value selection,setpoint selection, ZIP-code selection) may be determined based on adefault state, smart logic or previously received user input. Arelationship between the variable and user input may be identified. Therelationship may be, e.g., linear or non-linear, continuous or discrete,and/or saturating or non-saturating. Such relationships may bepre-defined and stored within the thermostat. User input may bedetected. Analysis of the user input may include, e.g., identifying: atype of user input (tapping versus rotation), a degree of input (e.g., adegree of rotation); a final input position (e.g., a final angularposition of the rotatable ring); an input location (e.g., a position ofa tapping); and/or a speed of input (e.g., a speed of rotation). Usingthe relationship, the processing system 1060 may then determine adisplay indicator, such as a digital numerical value representative ofan identified value of a variable (e.g., a setpoint temperature). Thedisplay indicator may be displayed on display area 1016. For example, adigital numerical value representative of a setpoint temperature to bedisplayed may be determined based on a prior setpoint value and asaturating and continuous relationship between rotation input and thetemperature. The displayed value may be, e.g., numeric, textual orgraphical.

The processing system 1060 may further set a variable value inaccordance with a user selection. For example, a particular type of userinput (e.g., inwards pressure exertion) may be detected. A value of aselected variable may be determined based on, e.g., a prior ringrotation, displayed variable value, etc. The variable may then be set tothis value.

The processing system 1060, according to some embodiments, is capable ofcarrying out the governance of the operation of smart thermostat 102including the user interface features described herein. The processingsystem 1060 is further programmed and configured to carry out otheroperations as described further hereinbelow and/or in other ones of thecommonly assigned incorporated applications. For example, processingsystem 1060 is further programmed and configured to maintain and updatea thermodynamic model for the enclosure in which the HVAC system isinstalled, such as described in U.S. Ser. No. 12/881,463 (U.S. Pat. No.8,606,374, issued Dec. 10, 2013). According to some embodiments, thewireless communications system 1066 is used to communicate with devicessuch as personal computers and/or other thermostats or HVAC systemcomponents, which can be peer-to-peer communications, communicationsthrough one or more servers located on a private network, and/orcommunications through a cloud-based service.

It should be appreciated that the smart thermostat 102 could be equippedwith a tactile mechanical feedback feature for providingsoftware-triggered mechanical feedback to encourage energy efficientuser behavior. For example, in the event a user attempts to input anill-advised temperature setting (e.g., a setting that consumes a largeamount of energy), the tactile mechanical feedback features provide theuser with negative mechanical feedback, such as by vibrating, making thering hard or impossible to turn.

Further, it should be appreciated that any of the smart devicesdescribed herein, such as the smart hazard detector, the smartthermostat, the smart wall switch, the smart doorbell, etc., could havemeans for self-generating power and optionally storing the generatedpower in a local battery. For example, in some embodiments, the smartdevices include a Peltier Junction for generating power. In theseembodiments, for example, the Peltier Junction generates electricityfrom heat differentials created between the smart device and itsmounting location, such as when the smart device gets hot from use. Inother embodiments, the smart devices are equipped with generators, suchas piezoelectric devices that generate electricity when the device isphysically used, such as when a user turns the ring on the smartthermostat. While piezoelectric devices are used in this example, itshould be appreciated that any generator devices known to those havingskill in the art could be used.

Referring next to FIG. 15, an example environment with which embodimentsmay be implemented is shown with a computer system 1500 that can be usedby a user 1504 to remotely control, for example, one or more of thesensor-equipped, network-connected smart-home devices according to oneor more of the embodiments. The computer system 1510 can alternativelybe used for carrying out one or more of the server-based processingparadigms described hereinabove, can be used as a processing device in alarger distributed virtualized computing scheme for carrying out thedescribed processing paradigms, or for any of a variety of otherpurposes consistent with the present teachings. The computer system 1500can include a computer 1502, keyboard 1522, a network router 1512, aprinter 1508, and a monitor 1506. The monitor 1506, processor 1502 andkeyboard 1522 are part of a computer system 1526, which can be a laptopcomputer, desktop computer, handheld computer, mainframe computer, etc.The monitor 1506 can be a CRT, flat screen, etc.

A user 1504 can input commands into the computer 1502 using variousinput devices, such as a mouse, keyboard, track ball, touch screen,scanner, sensing component, etc. If the computer system 1500 comprises amainframe, a designer 1504 can access the computer 1502 using, forexample, a terminal or terminal interface. Additionally, the computersystem 1526 may be connected to a printer 1508 and a server 1510 using anetwork router 1512, which may connect to the Internet 1518 or a WAN.

The server 1510 may, for example, be used to store additional softwareprograms and data. In one embodiment, software implementing the systemsand methods described herein can be stored on a storage medium in theserver 1510. Thus, the software can be run from the storage medium inthe server 1510. In another embodiment, software implementing thesystems and methods described herein can be stored on a storage mediumin the computer 1502. Thus, the software can be run from the storagemedium in the computer system 1526. Therefore, in this embodiment, thesoftware can be used whether or not computer 1502 is connected tonetwork router 1512. Printer 1508 may be connected directly to computer1502, in which case, the computer system 1526 can print whether or notit is connected to network router 1512.

With reference to FIG. 16, an embodiment of a special-purpose computersystem 1600 is shown. The above methods may be implemented bycomputer-program products that direct a computer system to perform theactions of the above-described methods and components. Each suchcomputer-program product may comprise sets of instructions (codes)embodied on a computer-readable medium that directs the processor of acomputer system to perform corresponding actions. The instructions maybe configured to run in sequential order, or in parallel (such as underdifferent processing threads), or in a combination thereof. Afterloading the computer-program products on a general purpose computersystem 1526, it is transformed into the special-purpose computer system1600.

Special-purpose computer system 1600 comprises a computer 1502, amonitor 1506 coupled to computer 1502, one or more additional useroutput devices 1630 (optional) coupled to computer 1502, one or moreuser input devices 1640 (e.g., keyboard, mouse, track ball, touchscreen, scanner, sensing component, etc.) coupled to computer 1502, anoptional communications interface 1650 coupled to computer 1502 and/or acommunication network 1695, a computer-program product 1605 stored in atangible computer-readable memory in computer 1502. Computer-programproduct 1605 directs system 1600 to perform the above-described methods.Computer 1502 may include one or more processors 1660 that communicatewith a number of peripheral devices via a bus subsystem 1690. Theseperipheral devices may include user output device(s) 1630, user inputdevice(s) 1640, communications interface 1650, and a storage subsystem,such as random access memory (RAM) 1670 and non-volatile storage drive1680 (e.g., disk drive, optical drive, solid state drive), which areforms of tangible computer-readable memory.

Computer-program product 1605 may be stored in non-volatile storagedrive 1680 or another computer-readable medium accessible to computer1502 and loaded into memory 1670. Each processor 1660 may comprise amicroprocessor, such as a microprocessor from Intel® or Advanced MicroDevices, Inc.®, or the like. To support computer-program product 1605,the computer 1502 runs an operating system that handles thecommunications of product 1605 with the above-noted components, as wellas the communications between the above-noted components in support ofthe computer-program product 1605. Example operating systems includeWindows® or the like from Microsoft Corporation, Solaris® from SunMicrosystems, LINUX, UNIX, and the like.

User input devices 1640 include all possible types of devices andmechanisms to input information to computer system 1502. These mayinclude a keyboard, a keypad, a mouse, a scanner, a digital drawing pad,a touch screen incorporated into the display, audio input devices suchas voice recognition systems, microphones, scanners, any other sensingcomponents, and other types of input devices. In various embodiments,user input devices 1640 are typically embodied as a computer mouse, atrackball, a track pad, a joystick, wireless remote, a drawing tablet, avoice command system. User input devices 1640 typically allow a user toselect objects, icons, text and the like that appear on the monitor 1506via a command such as a click of a button or the like. User outputdevices 1630 include all possible types of devices and mechanisms tooutput information from computer 1502. These may include a display(e.g., monitor 1506), printers, non-visual displays such as audio outputdevices, etc.

Communications interface 1650 provides an interface to othercommunication networks and devices and may serve as an interface toreceive data from and transmit data to other systems, WANs and/or theInternet 1518. Embodiments of communications interface 1650 typicallyinclude an Ethernet card, a modern (telephone, satellite, cable, ISDN),a (asynchronous) digital subscriber line (DSL) unit, a FireWire®interface, a USB® interface, a wireless network adapter, and the like.For example, communications interface 1650 may be coupled to a computernetwork, to a FireWire® bus, or the like. In other embodiments,communications interface 1650 may be physically integrated on themotherboard of computer 1502, and/or may be a software program, or thelike.

RAM 1670 and non-volatile storage drive 1680 are examples of tangiblecomputer-readable media configured to store data such ascomputer-program product embodiments of the present disclosure,including executable computer code, human-readable code, or the like.Other types of tangible computer-readable media include floppy disks,removable hard disks, optical storage media such as CD-ROMs, DVDs, barcodes, semiconductor memories such as flash memories, read-only-memories(ROMs), battery-backed volatile memories, networked storage devices, andthe like. RAM 1670 and non-volatile storage drive 1680 may be configuredto store the basic programming and data constructs that provide thefunctionality of various embodiments of the present disclosure, asdescribed above.

Software instruction sets that provide the functionality of the presentdisclosure may be stored in RAM 1670 and non-volatile storage drive1680. These instruction sets or code may be executed by the processor(s)1660. RAM 1670 and non-volatile storage drive 1680 may also provide arepository to store data and data structures used in accordance with thepresent disclosure. RAM 1670 and non-volatile storage drive 1680 mayinclude a number of memories including a main random access memory (RAM)to store of instructions and data during program execution and aread-only memory (ROM) in which fixed instructions are stored. RAM 1670and non-volatile storage drive 1680 may include a file storage subsystemproviding persistent (non-volatile) storage of program and/or datafiles. RAM 1670 and non-volatile storage drive 1680 may also includeremovable storage systems, such as removable flash memory.

Bus subsystem 1690 provides a mechanism to allow the various componentsand subsystems of computer 1502 to communicate with each other asintended. Although bus subsystem 1690 is shown schematically as a singlebus, alternative embodiments of the bus subsystem may utilize multiplebusses or communication paths within the computer 1502.

For a firmware and/or software implementation, the methodologies may beimplemented with modules (e.g., procedures, functions, and so on) thatperform the functions described herein. Any machine-readable mediumtangibly embodying instructions may be used in implementing themethodologies described herein. For example, software codes may bestored in a memory. Memory may be implemented within the processor orexternal to the processor. As used herein the term “memory” refers toany type of long term, short term, volatile, nonvolatile, or otherstorage medium and is not to be limited to any particular type of memoryor number of memories, or type of media upon which memory is stored.

Moreover, as disclosed herein, the term “storage medium” may representone or more memories for storing data, including read only memory (ROM),random access memory (RAM), magnetic RAM, core memory, magnetic diskstorage mediums, optical storage mediums, flash memory devices and/orother machine readable mediums for storing information. The term“machine-readable medium” includes, but is not limited to portable orfixed storage devices, optical storage devices, wireless channels,and/or various other storage mediums capable of storing that contain orcarry instruction(s) and/or data. According to embodiments, storagemedia and computer readable media for containing code, or portions ofcode, may include any appropriate media known or used in the art,including storage media and communication media, such as but not limitedto volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information such as computer readable instructions, data structures,program modules, or other data, including RAM, ROM, EEPROM, flash memoryor other memory technology, CD-ROM, digital versatile disk (DVD) orother optical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which maybe utilized to store the desired information and which may be accessedby the a system device. Program modules, program components and/orprogrammatic objects may include computer-readable and/orcomputer-executable instructions of and/or corresponding to any suitablecomputer programming language. In at least one embodiment, eachcomputer-readable medium may be tangible. In at least one embodiment,each computer-readable medium may be non-transitory in time. Based onthe disclosure and teachings provided herein, a person of ordinary skillin the art will appreciate other ways and/or methods to implement thevarious embodiments.

Referring now to FIG. 17, provided according to some embodiments aresystems and methods for achieving smart-home objectives usingoccupant-location data (e.g., GPS data). According to embodiments,occupant-location data—in addition to other data obtained from smarthome devices—is provided to the central server or cloud-computing system164, which uses the data to make inferences regarding the current andfuture occupancy of the home and/or rooms, and to control the smartdevices in the home or otherwise associated with the home in acorresponding manner. Further, according to embodiments, provided aresystems and methods for conflict sensing and resolution foraccommodating multiple occupants in the smart-home environment 100,which has occupant-location based controls of the smart home devices,such as temperature adjustments via the smart thermostat. For example,as described below, the systems and methods identify conflicts in thepreferences (e.g., preferred temperature settings) of the occupants ofthe home and resolves the conflicts based on prescribed or learnedrules, such has giving priority to the preferences of some occupants.

According to embodiments, the central server or cloud-computing system164 obtains occupant-location data, such as GPS data, from the mobiledevices 166 of the occupants. For example, the occupants of a home(e.g., the individuals who live in or frequently visit the home)register their respective mobile devices 166 as being associated withthe home.

In some instances the central server or cloud-computing system 164receives occupant-location data directly from the mobile devices,whereas in others the data is received from an intermediary, such as oneof the smart devices in the home.

In instances where occupant-location data is received directly from themobile device, the central server or cloud-computing system 164 candetermine if the occupant is “at home” or “away”, as explained below.When an occupant is at home, the central server or cloud-computingsystem 164 can determine the occupant's actual room-location (e.g.,bedroom, kitchen, garage, etc.). To do, for example, the central serveror cloud-computing system 164 cross-references the occupant-location(e.g., GPS coordinates) with a map of the home.

In instances where occupant-location data is received from smartdevices, the central server or cloud-computing system 164 can infer thatthe occupant is inside the home. Further, the room-location of theoccupants can be determined. For example, the smart wall switches, thesmart wall plugs, the smart doorbells, and other smart devices in thesmart-home environment 100 detect the presence of the mobile device 166and transmit corresponding data to the central server or cloud-computingsystem 164. Such detection of mobile devices can be accomplished usingWiFi, Bluetooth, NFC, etc. It should also be appreciated that passiveRFID tags can be used to determine the room-location of occupants (andpets). For example, an RFID is associated with each of the occupants(and pets) of the house, such as by including the tags in wallets,bracelets, wristbands, mobile devices, collars, etc. The smart devicesin the various rooms detect the RFID tags, and send that information tothe central server or cloud-computing system 164. It should beappreciated that, because they are typical mounted in unobstructedlocations, high on walls of often-occupied rooms, smart hazard detectors104 are particularly well suited for RFID sensors.

In the illustrated example, the occupants include Wife 1714, Husband1718, and Child 1722, all of whom have registered their mobile device166 with the central server or cloud-computing system 164 as beingassociated with the smart-home environment 100. Further, twogeo-location boundaries or “geo-fences” 1730, 1734 of any suitable area1700 are registered as being associated with the smart-home environment100. In some embodiments, the occupants of the home define and registerthe geo-fences, while in other embodiments the central server orcloud-computing system 164 auto-generates the geo-fences for the home.

Inner geo-fence 1730 defines the perimeter of living area of the home.The area within the inner-geo fence includes not only the home but alsothe land immediately surrounding the house, including any closelyassociated structures, such as garages or sheds (“the curtilage”). Outergeo-fence 1734 defines an outer perimeter, which is sometimes miles fromthe home. The outer geo-fence 1734 is adjustable and extends well beyondthe curtilage. For example, the perimeter defined by the outer geo-fence1734 may have a radius of two to three miles in some embodiments, whilein other embodiments the radius is larger or smaller.

According to embodiments, the central server or cloud-computing system164 infers that an occupant is “at home” when inside the inner geo-fence1730 and that the occupant is “away” when outside of the inner geo-fence1730. Further, the central server or cloud-computing system 164 infersan occupant is going home when the occupant moves (e.g., travels by car)from outside to inside the outer geo-fence 1734. As such, the centralserver or cloud-computing system 164 uses the inner geo-fence 1730 todetermine when occupants leave the home, and it uses the outer geo-fence1734 to determine when occupants are heading home.

Several example smart-home objectives will now be described withreference to FIG. 17. In one example, the central server orcloud-computing system 164 predicts that Wife 1714 is going home, andmakes adjustments in the smart-home environment 100 in anticipation ofher arrival. In this example, Wife 1714 travels from outside to insidethe outer geo-fence 1734, thereby triggering an indication that Wife1714 is heading home. The Wife's speed and the distance between thefence and the home 100 is used to predict the Wife's time of arrival.Using this information central server or cloud-computing system 164 canprepare for Wife's arrival, such as by pre-heating or cooling some orall of the rooms in the home 100 to Wife's preferred temperature.Time-to-temperature calculations can be used to make the pre-cooling orheading as efficient as possible, and to ensure Wife's preferredtemperature is achieved before she arrives. In the event neither Husband1718 nor Child 1722 is home, all rooms are pre-heated or cooled.However, if either or both Husband 1718 and Child 1722 are home, roomsassociated with Wife can be pre-heated or cooled to Wife's desiredtemperature, while other rooms are set to temperatures based thepreferences of Husband 1718 and/or Child 1722. Rooms associated withWife can be inferred by the central server or cloud-computing system 164based on historical occupancy and usage data, as well as based on a setof rules provided by the occupants (see below).

In another example, the central server or cloud-computing system 164determines that the home 100 is vacant because all occupants (Wife 1714,Husband 1718, and Child 1722) are outside of the inner geo-fence 1730.In this case, the central server or cloud-computing system 164 placesthe smart devices in their “away” settings. For example, the lights areturned off, the HVAC is set to a temperature that requires little or noheating or cooling, the alarm is armed, the doors are locked,electronics and appliances (e.g., televisions, stoves, space heaters,etc.) are turned off, etc. In the event, all occupants' mobile devicesare outside of the inner geo-fence 1730 and movement is detected in thehouse, the central server or cloud-computing system 164 can infer themovement is the family dog and can apply the dog's smart devicessettings.

In yet another example, Wife 1714, Husband 1718, and Child 1722 are allinside the inner geo-fence 1720. Applying the techniques describedabove, the central server or cloud-computing system 164 knows that Wife1714 is in the master bedroom and that Husband 1718 and Child 1722 areboth in the den (see discussion regarding “room-occupancy detection”).Accordingly, the central server or cloud-computing system 164 adjuststhe temperature in the master bedroom to Wife's preferred setting, andit applies a set of rules to determine whether to set the den to theHusband's or the Child's preferred setting. The set of rule, for eachroom of the home, provide a prioritized list of occupants and theirrespective settings. For example, for the den, Wife's settings arehighest priority, then Husband's, and then the Child's. Thus, in thiscase, Husband's setting are applied in the den because his setting arehigher priority than Child's. However, if Wife were to later join themin the den, her setting would be applied instead of Husband's.

In still another example, Wife 1714, Husband 1718, and Child 1722 areall inside the inner geo-fence 1730. Wife and Husband are in the den,but Child is in the yard playing. The central server or cloud-computingsystem 164 applies the above-described techniques to determine that Wifeand Husband are in the den. However, Child is unaccounted for in any ofthe rooms. In this example, Child was detected in the den earlier thatday, and none of the occupants have traveled outside of the inner-fence1730 that day. Using this information, the central server orcloud-computing system 164 infers that Child is in the yard, playing.Alternatively, the central server or cloud-computing system 164 infersthat Child is in the yard because it received data from the smartdoorbell that the child exited the house, yet it is also receiving datafrom Child's mobile device that Child is inside of the inner geo-fence1730. Because the Child is in the yard, the central server orcloud-computing system 164 prevents the irrigation system from turningon and it broadcasts occasional reminders to Husband and Wife viaspeakers provided in the smart devices, for example.

As described above (e.g., with respect to process 1300 of FIG. 13), asecurity score may be calculated for a smart-home environment. In someembodiments, a computing system may be configured to receive home datafrom one or more network-connected smart devices of a smart-homeenvironment, process the received home data, and generate a securityscore based on the processed home data. For example, a computing system,such as central server or cloud-computing system 164, may be configuredto receive home data 202 from one or more network-connected smartdevices, such as one or more of devices102/104/106/108/110/112/114/116/122/166/168/170 of a smart-homeenvironment 100, process the received home data 202 as derived home data208 (e.g., with a processing engine 206 and/or services 204/205 and/orthird party sources 222/224/226/228/230 and/or paradigms 310 a/310 b/310c/310 d and/or extrinsic information 316 and/or any other suitableinformation/services), and generate a security score (e.g., as asecurity service 205) based on the processed home data 208. The securityscore may be generated based on processed home data that may include atleast one of various types of data, including, but not limited to,capability data, opportunity data, and environmental data.

Capability data may include any suitable data that may be indicative ofat least one capability of at least one network-connected smart deviceof the one or more network-connected smart devices of the smart-homeenvironment for which a security score is being calculated or otherwisegenerated. Such capability data may be indicative of any suitablecapability or capabilities of any suitable smart device or smartdevices, where each capability may be independent of any or allpotential external influences. For example, certain capability data maybe “device capability data”, which may be any suitable data that may beindicative of at least one capability of a particular network-connectedsmart device of the smart-home environment, where each capability may beindependent of any or all potential external influences on that smartdevice (e.g., as if the particular smart device were placed in a vacuumand not affected by any external influences, such as by an active useror by other characteristic(s) of the smart-home environment in which thesmart device may currently exist). Such device capability data mayinclude, but is not limited to, data that may be indicative of one ormore of the following capabilities of a particular smart device: (i)current charge level of a battery of the device; (ii) maximum potentialcharge capacity of a battery of the device; (iii) any other current orpotential capability of a battery or other power source of the device(e.g., estimated length of use possible if no external power source wereto be provided for the device); (iv) currently enabled communicationprotocol(s) of the device; (v) all communication protocols available tothe device; (vi) any other currently enabled or available communicationcapability of the device (e.g., bidirectional communication capability);(vii) currently enabled security features of the device; (viii) allsecurity features available to the device; (ix) any other currentlyenabled or available security capability of the device (e.g., userauthentication capabilities, data encryption capabilities, etc.); (x)currently enabled sensing features of the device; (xi) all sensingfeatures available to the device; (xii) any other currently enabled oravailable sensing capabilities of the device (e.g., the number and typesand quality of each sensor available to the device, the remaininglifespan/need to replace a worn down part of the device, etc.); (xiii)currently enabled processing features of the device; (xiv) allprocessing features available to the device; (xv) any other currentlyenabled or available processing capabilities of the device (e.g., thedata processing speed and/or data processing power available to thedevice); (xvi) currently enabled output features of the device; (xvii)all output features available to the device; (xviii) any other currentlyenabled or available output capabilities of the device (e.g., the numberand types and quality of each output component available to the device);(xix) any other suitable capabilities; and (xx) any combinationsthereof. For example, this may enable the security score to be based ona determination of whether or not the capabilities of a particular smartdevice of the smart-home environment are outdated/insufficient,sufficient, or top-notch (e.g., as compared to all available smartdevices that may be readily available in the current market, which maybe determined via extrinsic information 316 accessible to processingsystem 206), thereby enabling a security score and/or associatedsuggestions to reflect the ability of a user to upgrade one or moreaspects of one or more smart devices of the smart-home environment(e.g., if an upgradeable head unit or software is available). Suchdevice capability data may be processed by a computing system 164 usingdata from one or more particular smart devices of the environment (e.g.,based on information available to/detectable by the device andcommunicated by the device to the computing system) and/or usinginformation from other sources accessible to the computing system 164(e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.)that may be used to supplement the processing of any data received fromthe smart device(s) for enabling processed home data 208 of the devicecapability type.

As another example, certain capability data may be “network capabilitydata”, which may be any suitable data that may be indicative of at leastone capability of a network of two or more networked smart devices ofthe smart-home environment, where each capability may be independent ofany or all potential external influences on that network of smartdevices (e.g., as if the particular network of smart devices were placedin a vacuum and not affected by any external influences, such as anactive user or characteristic(s) of the smart-home environment in whichthe network of smart devices may currently exist). Such networkcapability data may include, but is not limited to, data that may beindicative of one or more of the following capabilities of a particularnetwork of two or more smart devices: (i) distance between any two smartdevices of the network; (ii) shared communication protocol(s) betweenany two smart devices of the network; (iii) combined sensingcapabilities of the network; (iv) mesh/spokesman/node relationshipbetween any two or all smart devices of the network; (v) any othersuitable capabilities; and (vi) any combinations thereof. For example,this may enable the security score to be based on a determination ofwhether or not the capabilities of the network of the smart-homeenvironment enable proper networked communication between devices of thenetwork, whether each one of various desired sensing capabilities and/oroutput capabilities for the environment are provided by at least one ofthe devices of the network, and the like. Such network capability datamay be processed by a computing system 164 using data from the varioussmart devices of the network itself (e.g., based on informationavailable to/detectable by the network and communicated by the networkto the computing system) and/or using information from other sourcesaccessible to the computing system 164 (e.g., extrinsic information 316,paradigms 310, entities 222-230, etc.) that may be used to supplementthe processing of any data received from the network for enablingprocessed home data 208 of the network capability type.

Opportunity data may include any suitable data that may be indicative ofat least one opportunity afforded to at least one network-connectedsmart device by at least one influencer of the smart-home environment inwhich the at least one network-connected smart device is provided. Suchopportunity data may be indicative of any suitable opportunity oropportunities afforded to any suitable smart device or smart devices,where each opportunity may be afforded by at least one influencer of thesmart-home environment in which each of the at least one smart device isprovided. That is, opportunity data may be indicative of theeffectiveness or ineffectiveness of smart device(s) and/or the abilityor inability of smart device(s) to succeed based on any or all potentialexternal factors capable of influencing the smart device(s). Forexample, certain opportunity data may be “device opportunity data”,which may be any suitable data that may be indicative of at least oneopportunity afforded to a particular network-connected smart device ofthe smart-home environment, where each opportunity may be based on anyor all potential external factors capable of influencing that smartdevice (e.g., any external influences by an active user orcharacteristic(s) of the smart-home environment in which the smartdevice may currently exist). Such device opportunity data may include,but is not limited to, data that may be indicative of one or more of thefollowing opportunities afforded to a particular smart device by theparticular environment: (i) type and/or reliability of any environmentalpower source provided for the device (e.g., whether a fixed powersource, such as a 120V line voltage wires of a structure 150 ofenvironment 100, is powering the device); (ii) position and/or use ofthe device with respect to the environment (e.g., what type of room thedevice is provided in (e.g., kitchen or bedroom), what type of elementthe device is proximate/coupled to (e.g., HVAC 103, lamp 118, window182, door 186, etc.), etc.); (iii) proximity of device to anyenvironmental influencers that may have an undesired or desired effecton the performance of the device (e.g., a PIR sensor of a device beingpositioned in the direct path of an HVAC vent whereby the air flow fromthe vent may alter a characteristic of the sensor to increase thelikelihood of triggering a false reading or preventing an accuratereading, a smoke detector being provided inside a fireplace therebyincreasing the likelihood of triggering false alarms, a smoke detectorbeing provided directly next to an open window thereby decreasing thelikelihood of an accurate reading for the interior of the environment, asensor of a smart device positioned next to a “dog bed” or otherinfluencer of the environment where a considerable amount of dander orother uncommon particles may exist and undesirably influence theoperation/effectiveness of that sensor, etc.); (iv) exposure to anyenvironmental influencers that may have an undesired or desired effecton the security of the device (e.g., a large number of authenticationcodes being active for the device may indicate unnecessary exposure to asecurity breach, an authentication code for the device being tooshort/untrustworthy, how many occupants have had their contactinformation verified for use in response to an alarm condition of thedevice, responsiveness of a user/occupant to previous alarm conditionsor other actions of the device (e.g., how quickly a user/occupantresponded to an actual alarm or a “test alarm” that may be randomlygenerated by the device for testing the responsiveness of the user),etc.); (v) currently enabled/disabled communication protocol(s) of thedevice (e.g., as set by a user of the environment); (vi) currentlyenabled/disabled security feature(s) of the device (e.g., as set by auser of the environment); (vii) currently enabled/disabled sensingfeature(s) of the device (e.g., thresholds or otherwise as set by a userof the environment); (viii) currently enabled/disabled processingfeature(s) of the device (e.g., timers or otherwise as set by a user ofthe environment); (ix) currently enabled/disabled output features of thedevice (e.g., as set by a user of the environment); (x) any othersuitable device opportunities; and (xi) any combinations thereof. Forexample, this may enable the security score to be based on adetermination of whether or not the capabilities of a particular smartdevice of the smart-home environment are promoted or inhibited orjeopardized by one or more external influencers (e.g., by a user orother characteristic(s)) of the smart-home environment in which thesmart device may currently exist, thereby enabling a security scoreand/or associated suggestions to reflect the ability of a user to makeadjustments with respect to such external influencers on the smartdevice (e.g., a suggestion to move the smart device away from the vent,to increase a sensing threshold of a sensor, to turn on a device optionsuch that the device may mimic the user's patterns when the user isaway, etc.). Such device opportunity data may be processed by acomputing system 164 using data from one or more particular smartdevices of the environment (e.g., based on any information availableto/detectable by the device and communicated by the device to thecomputing system) and/or using information from other sources accessibleto the computing system 164 (e.g., extrinsic information 316, paradigms310, entities 222-230, etc.) that may be used to supplement theprocessing of any data received from the smart device(s) for enablingprocessed home data 208 of the device opportunity type. Following justone particular example, a smart device with a PIR sensor may alsoinclude a camera or thermometer to detect data indicative of the devicebeing positioned too close to a vent. Following another example, asensor may continuously detect a high level of a particular particle(e.g., pet dander) and determine that an influencer of the environmentmay be causing such detection.

As another example, certain opportunity data may be “network opportunitydata”, which may be any suitable data that may be indicative of at leastone opportunity afforded to a network of two or more networked smartdevices of the smart-home environment, where each opportunity may bebased on any or all potential external factors capable of influencingthat network of smart devices (e.g., any external influences by anactive user or characteristic(s) of the smart-home environment in whichthe network of smart devices may currently exist). Such networkopportunity data may include, but is not limited to, data that may beindicative of one or more of the following opportunities afforded to aparticular network of two or more smart devices: (i) environmentalimpediments to a communication channel/pathway between any two smartdevices of the network (e.g., a concrete wall between two adjacentdevices that may degrade/inhibit data communicated amongst the devices);(ii) environmental impediments to a communication channel/pathwaybetween the network and communication system (e.g., reliability of theenvironment's wireless router 160 or connection to internet 162 forcommunicatively coupling the network of smart devices to computingsystem 164, availability of requisite/trusted SSL certificates forsupporting secure video streaming with emergency personnel, etc.); (iii)type and/or reliability of any environmental power source provided forparticular devices of the network (e.g., whether a fixed power source,such as a 120V line voltage wires of a structure 150 of environment 100,is powering at least one spokesman node of the network); (iv)availability/detectability of a “map” of the environment (e.g., qualityof the map, positional information of the network with respect to theexpanse or specific features of the environment); (v) network coverageof the environment (e.g., amount/locations of detected “black spots”,percentage of doors 186 of environment 100 associated with a particularsmart device (e.g., smart entry detector 112 and/or smart doorknob 122and/or smart doorbell 106), percentage of overall interior volume ofstructure 150 of environment 100 monitored/sensed by hazard detectors104 or any other smart device sensor type, percentage of overallexterior area of environment 100 covered by outdoor lighting system 114or any other smart device output type, etc.); (vi) exposure to anyenvironmental influencers that may have an undesired or desired effecton the security of the network (e.g., a large number of authenticationcodes being active for the network may indicate exposure to a securitybreach; an authentication code for the network being tooshort/untrustworthy, current security measures of an occupant's webbrowser or mobile app (e.g., on a device 166); how many occupants havehad their contact information verified for use in response to an alarmcondition of the network, responsiveness of a user/occupant to previousalarm conditions or other actions of the network (e.g., how quickly auser/occupant responded to an actual alarm or a “test alarm” that may berandomly generated by the network for testing the responsiveness of theuser), etc.); (vii) currently enabled/disabled communication protocol(s)of the network (e.g., as set by a user of the environment); (viii)currently enabled/disabled security feature(s) of the network (e.g., asset by a user of the environment); (ix) currently enabled/disabledsensing feature(s) of the network (e.g., thresholds or otherwise as setby a user of the environment); (x) currently enabled/disabled processingfeature(s) of the network (e.g., timers or otherwise as set by a user ofthe environment); (xi) currently enabled/disabled output features of thenetwork (e.g., as set by a user of the environment); (xii) any othersuitable network opportunities; and (xiii) any combinations thereof. Forexample, this may enable the security score to be based on adetermination of whether or not the capabilities of a network of smartdevices of the smart-home environment are promoted or inhibited orjeopardized by one or more external influencers (e.g., by a user orother characteristic(s)) of the smart-home environment in which thenetwork may currently exist, thereby enabling a security score and/orassociated suggestions to reflect the ability of a user to makeadjustments with respect to external influencers on the network (e.g., asuggestion to move at least one of two adjacent smart devices such thata direct path between the two devices avoids a concrete wall, or todecrease the number of active authentication codes for the network, orto turn on a network option such that one or more devices of the networkmay work in tandem to mimic the user's patterns when the user is away,etc.). Such network opportunity data may be processed by a computingsystem 164 using data from the various smart devices of the networkitself (e.g., based on information available to/detectable by thenetwork and communicated by the network to the computing system) and/orinformation from other sources accessible to the computing system 164(e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.)that may be used to supplement the processing of any data received fromthe network for enabling processed home data 208 of the networkopportunity type.

Environmental data may include any suitable data that may be indicativeof at least one behavioral characteristic of the smart-home environmentin which at least one network-connected smart device is provided. Suchenvironmental data may be indicative of any suitable behavioralcharacteristic or characteristics of the smart-home environment in whichany suitable smart device or smart devices is provided, where eachbehavioral characteristic may be indicative of at least one securityinfluencer of the smart-home environment in which each of the at leastone smart device is provided. For example, certain environmental datamay be “micro-environmental data”, which may be any suitable data thatmay be indicative of at least one behavioral characteristic of theparticular smart-home environment in which each of the at least onesmart device is provided (e.g., on a micro-level independent of othersmart-home environments or any other environments beyond the scope ofthe particular smart-home environment that may be in the sameneighborhood or share similar traits with the particular smart-homeenvironment). Such micro-environmental data may include, but is notlimited to, data that may be indicative of one or more of the followingbehavioral characteristics of the particular smart-home environment inwhich each of the at least one smart device is provided: (i) exposure ofenvironmental objects with respect to public view (e.g., an expensiveitem, such as a large television, being visible through a window 182 ofa structure 150 of the environment may increase the target of thatenvironment and the likelihood of an attempted robbery, while acrime-deterring item, such as a guard dog or a label identifying thesecurity features of the environment being made apparent to a would bethief may decrease the target of that environment and the likelihood ofan attempted robbery); (ii) a potentially dangerous object not beingsecured (e.g., a gun detected outside of a suitable receptacle, such asa home safe smart device as described above); (iii) features of aningress or of any other vulnerability of a structure of the environment(e.g., the size of a window being too small to enable a criminal toenter therethrough and/or a window being protected by security bars forpreventing a criminal to enter through the window, thereby reducing thesecurity risk of such a window, or the distance of a window above theexternal ground/earth being less than a certain threshold for enabling acriminal on foot to access the window, thereby increasing the securityrisk of such a window); (iv) occupant/personal device recognition (e.g.,the number of occupants/personal devices at the environment that areknown/verified or unknown/unverified to the smart device(s)/computingsystem, thereby increasing or decreasing the security of theenvironment); (v) activities/habits of the environment, such as (v.a)tendencies for a user to remember to lock a door and/or turn off alight/appliance after use, as may be detected by any suitable smartdevice as described above, which may increase a security score due toingresses being locked and/or potentially dangerous environment elementsbeing shut down after use, (v.b) certain types of food preparation inthe environment may tend to be considered dangerous (e.g., deep frying,as may be detected through examination of particle size sensed by a blueIR sensor or any other suitable sensor of a smart device, may beconsidered more dangerous than making a bowl of cereal and may decreasea security score), (v.c) recreational smoking in the environment maynegatively affect a security score (e.g., tobacco smoking or even use ofa fire place that emits certain smoke that may be detectable by anysuitable sensor of any suitable smart device may be dangerous orincrease risk of fire), (v.d) nocturnal behaviors may increase asecurity score by discouraging a would be night-thief (e.g., occupantsthat are detected to be awake and active and/or using lights at nightmay reduce the size of a target of the environment for theft, ratherthan occupants that are either asleep or away from the environment atnight such that a thief under the cover of darkness may be tempted toburglarize an inactive environment), and/or (v.e) irrational/carelessbehavior may decrease a security score by increasing the likelihood of adangerous situation (e.g., as may be detected through analysis of theage/mental state of an occupant, such as an occupant that is sleepdeprived or otherwise compromised (e.g., intoxicated, forgetful,immature, etc.), as may be detected by any suitable sensor of anysuitable smart device), etc.; (vi) user-provided answers to securityquestions (e.g., “Do you hide a key to the environment under a doormat?”, “When is the last time you practiced a fire drill?”, “Is yourenvironment provided with a back-up power generator in case of a powergrid power outage?”, etc.), as may be generated/proposed by one or moresmart devices during interactive information-exchange sessions, asdescribed in commonly-assigned U.S. patent application Ser. No.13/440,910 (now U.S. Patent Application Publication No. 2013/0268125),which is hereby incorporated by reference herein in its entirety, wheresuch answers may increase or decrease the security score; (vii) anyother suitable micro-environmental data; and (viii) any combinationsthereof. For example, this may enable the security score to be based ona determination of whether or not the behaviors exhibited at theenvironment on a micro-level promote or inhibit or jeopardize thesecurity of the environment, thereby enabling a security score and/orassociated suggestions to reflect the ability of a user to makeadjustments with respect to such behaviors (e.g., a suggestion to stopdeep frying inside a structure 150 of the environment or to move theexpensive television away from the see-through window 182, etc.). Suchmicro-environmental data may be processed by a computing system 164using data from one or more particular smart devices of the environment(e.g., based on any information available to/detectable by the device(s)and communicated by the device(s) to the computing system) and/orinformation from other sources accessible to the computing system 164(e.g., extrinsic information 316, paradigms 310, entities 222-230, etc.)that may be used to supplement the processing of any data received fromthe smart device(s) for enabling processed home data 208 of themicro-environmental type. Following just one particular example, asingle smart device or a combination of adjacent smart devices mayinclude one or more cameras or other suitable sensors for identifying anexpensive object within the environment that may be within a thresholddistance of an uncovered window, or for detecting the presence of a petthat barks whenever a sound over a certain threshold is made, and thelike. Following another particular example, a smart device may include acamera for identifying a window as well as an altimeter for identifyingthe altitude or height of that window above the ground. As yet anotherexample, a smart device may identify a window and a proximate userdevice 166 and then poll that device 166 for its altimeter data. Asanother example, a smart device may include a camera configured todetect a window as well as security bars that may be protecting thatwindow. As yet another example, a smart device may identify a window andthen propose questions to a user about that window, such as “What is theheight of this window above the earth?”, or “What is the cross-sectionalarea of this window?”, or “Are there any security bars protecting thiswindow?”, etc.

As another example, certain environmental data may be“macro-environmental data”, which may be any suitable data that may beindicative of at least one behavioral characteristic of the environmentsurrounding or otherwise associated with the particular smart-homeenvironment in which each of the at least one smart device is provided(e.g., on a macro-level related to other environments beyond the scopeof the particular smart-home environment that may be in the sameneighborhood as or share similar traits with the particular smart-homeenvironment). Such macro-environmental data may include, but is notlimited to, data that may be indicative of one or more of the followingbehavioral characteristics of environment(s) related to the particularsmart-home environment in which each of the at least one smart device isprovided: (i) accessibility of the particular environment to securityagencies (e.g., the distance or travel time between the particularsmart-home environment and an emergency response entity, such as thepolice, fire department, etc., where increased distance/travel time maydecrease the security score, and where such travel time may vary bytaking into account current weather/travel conditions); (ii) ambientenvironmental conditions (e.g., weather, acts of nature, traffic,construction, service status, entities (e.g., nuclear power plants),etc. existing at/around the particular smart-home environment that mayimpact the security of the particular smart-home environment, such aswhere a current drought or nearby forest fires or a firefighter strikemay negatively impact the security score); (iii) historical dataregarding the macro-environment (e.g., crime rates for the neighborhoodof the particular smart-home environment, frequency and average durationof power outages in the neighborhood, etc., which may negatively orpositively impact a security score); (iv) accessible security networks(e.g., number and size of “neighborhood security networks” accessible toor otherwise in communication with the particular smart-homeenvironment, as described above, whereby the greater the amount of othersmart device equipped environments a particular smart-home environmentmay synergize with, the higher the security score for that particularsmart-home environment may be); (v) any other suitablemacro-environmental data (e.g., security data related to other floors orthe entrance of an apartment building if the particular smart-homeenvironment is a single apartment or floor in a larger apartmentcomplex, where such data may include the secureness of the ingress tothe entire apartment complex, the crime rate for that building, thesecurity features of the building that are not directly associated withthe particular smart-home environment (e.g., fire escape available onthe roof of the complex and the distance to the roof from the particularsmart-home environment, etc.); and (vi) any combinations thereof. Forexample, this may enable the security score to be based on adetermination of whether or not the behaviors exhibited at theenvironment on a macro-level promote or inhibit or jeopardize thesecurity of the environment, thereby enabling a security score and/orassociated suggestions to reflect the ability of a user to makeadjustments with respect to such behaviors (e.g., a suggestion to enablecommunication with more neighborhood security networks, or to buy abackup power generator, etc.). Such macro-environmental data may beprocessed by a computing system 164 using data from one or moreparticular smart devices of the environment (e.g., based on anyinformation available to/detectable by the device(s) and communicated bythe device(s) to the computing system) and/or information from othersources accessible to the computing system 164 (e.g., extrinsicinformation 316, paradigms 310, entities 222-230, etc.) that may be usedto supplement the processing of any data received from the smartdevice(s) for enabling processed home data 208 of themacro-environmental type. Following just one particular example, a smartdevice may include a GPS device for identifying the current geographicallocation of the device and, thus, the particular smart-home environment,while extrinsic information 316 or law enforcement 222 may provide crimedata for that geographical location. As another example, a smart devicemay include a weather sensor that may be configured to calculate totalrainfall or snowfall at that device for any given historical timeperiod.

As mentioned above, a security score for a particular smart-homeenvironment may be calculated by comparing home data from one or moresmart devices of the particular smart-home environment against a list ofsecurity criterions to determine how many of the security criterions aresatisfied (e.g., through processed capability data, opportunity data,and/or environmental data). Higher scores may indicate that a particularsmart-home environment satisfies a high number of security criterionsand is therefore relatively secure, whereas lower scores indicate thatthe particular smart-home environment fails to satisfy many of thecriterions. According to embodiments, security scores can be normalizedand scaled so that occupants of a particular smart-home environment cancompare the security of their particular smart-home environment to otherparticular smart-home environments. For example, a score of 0 to 100 canbe used, where 0 is the lowest possible score and 100 is the highestpossible score. Further, for example, the central server orcloud-computing system 164 may generate a report or log that may listthe security criterions and/or provide an indication of whether theparticular smart-home environment satisfies each of the criterions.Occupants can review this list to determine which criterions are notsatisfied and then make the appropriate improvements to the particularsmart-home environment so as to increase the security score of theparticular smart-home environment. Additionally, the central server orcloud-computing system 164 can use this log to generate a list ofsuggestions for improving the particular smart-home environment. It mayprioritize the list based on which criterions are associated with themost points, indicate which creation can be easily and cheaply satisfiedwith only minor improvement, and/or indicate which unsatisfiedcriterions are typically satisfied in other smart-home environments. Forexample, the central server or cloud-computing system 164 can send thefollowing message to an occupant (e.g., to an occupant's personalelectronic smart device 166: “We notice that you often leave the frontdoor unlocked. Most homes in your neighborhood keep the front doorlocked at all times. Locking your front door at night is an easy andinexpensive way to improve your home's security and to improve yoursecurity score.” While certain security criterions for assessing thesecurity of and/or calculating a security score have been discussedherein, it should be appreciated that any number and combination ofsecurity criterions can be used when assessing security and/orcalculating a security score for a particular smart-home environment.

FIG. 18 is a flowchart of an illustrative process 1800 for generating asecurity score. At step 1802, process 1800 may include receiving, at acomputing system, home data from network-connected smart devices of asmart-home environment. For example, as described above, computingsystem 164 may receive home data 202 from one or more network-connectedsmart devices 102/104/106/108/110/112/114/116/122/166/168/170 of asmart-home environment 100. Next, at step 1804, process 1800 may includeprocessing, with the computing system, the home data received from thenetwork-connected smart devices of the smart-home environment. Forexample, as described above, computing system 164 may process thereceived home data 202 as derived home data 208 (e.g., with a processingengine 206 and/or services 204/205 and/or third party sources222/224/226/228/230 and/or paradigms 310 a/310 b/310 c/310 d and/orextrinsic information 316). Next, at step 1806, process 1800 may includegenerating, with the computing system, a security score based on theprocessed home data, wherein the processed home data includes at leastone of capability data indicative of at least one capability of at leastone network-connected smart device of the network-connected smartdevices, opportunity data indicative of at least one opportunityafforded to at least one network-connected smart device of thenetwork-connected smart devices by at least one influencer of thesmart-home environment, and environmental data indicative of at leastone behavioral characteristic of the smart-home environment. Forexample, as described above, computing system 164 may generate asecurity score (e.g., as a security service 205) based on the processedhome data 208 that may include at least one of various types of data,including capability data, opportunity data, and environmental data.

It is understood that the steps shown in process 1800 of FIG. 18 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Various capabilities of smart doorbell 106 may provide a smart and atleast partially automated interface between a resident of smart-homeenvironment 100 and any potential visitor at smart-home environment 100,including delivery services, friends, solicitors, strangers, andwould-be-thieves. Smart doorbell 106 may be leveraged with one or moreother network-connected smart devices of environment 100, such as one ormore of devices 102, 104, 106, 108, 110, 112, 113, 114, 116, 122, 166,168, and/or 170, and/or with services platform 200, such that smartdoorbell 106 may serve as a trusted and effective liaison between asystem user associated with environment 100 (e.g., a resident, owner,occupant, etc.) and a visitor that may approach an entry point ofenvironment 100 at which smart doorbell 106 may be provided, whether ornot the system user is currently at environment 100. For example, smartdoorbell 106 may be a visitor interface or entryway interface deviceoperative to detect and react to the approach to and/or departure from alocation (e.g., an outer door 186 of structure 150 of environment 100)by a person or any other suitable visitor entity, announce such anapproach or departure, enhance conventional doorbell functionality forboth system users and visitors, control settings on a security system,increase the convenience and efficiency of package delivery, increasethe traceability of package delivery, enable secure package delivery,detect environmental data and other useful data for environment 100 andsystem 164, and the like.

By virtue of potentially being mounted in place of a traditionaldoorbell or other conventional entryway interface (e.g., at outerstructure door 186, at gated entry 116, at a lobby of a sharedresidence, such as a condominium or apartment building, at the frontdoor of an individual residence at such a building, etc.), smartdoorbell 106 may have access to plentiful electrical operating power,such as by coupling to wiring (e.g., to 120V “hot” line voltage wires)that may be behind walls 154 of smart-home environment 100 and that maybe present at virtually all standard wired areas. Such an essentiallyunlimited power budget, the near-ubiquity of excellent installationlocations throughout an environment 100, and the reasonably amplephysical space on its face plate and in its housing to fit the necessarycomponents, may combine to enable smart doorbell 106 to accommodate arich and wide variety of sensing, interface, and communicationscapabilities for smart-home environment 100, as well as a generalplatform for the provision of even newer sensing, interface, andcommunications hardware as it becomes available over the coming decades.A rich variety of new interactions may be made possible between smartdoorbell 106 and other devices of the smart-home environment 100.Occupancy sensing, for example, can be significantly enhanced by virtueof the great locations (e.g., usually right next to entryways) of mostvisitor or entryway interfaces, which may thereby allow for easytracking of entities (e.g., system users, visitors, etc.) as theyapproach and/or enter and/or depart and/or exit entryways of environment100, predictive occupancy algorithms, and so forth.

FIGS. 1 and 8A-8C illustrate example user interfaces and hardwarefeatures of a smart doorbell 106 that may incorporate or otherwise haveaccess to a host of sensing, interface, and communications capabilitiesfor enhancing comfort, convenience, and safety of its users. As shown,according to some embodiments, smart doorbell 106 may be split into atleast two parts: a head unit 804 and a backplate 808. This bifurcationcan increase the success and commercial longevity of smart doorbell 106by making it a modular platform that may include at least two basiccomponents. According to some embodiments, backplate 808 may be apermanent interface box (sometimes referred to herein as “dockingstation 808”) that may serve as a physical connection into a wall orother suitable stable element of environment 100 and to the 120V linevoltage wires or other wiring of the smart-home environment 100, andthat may contain AC-to-DC powering circuitry 810. When installed,docking station 808 may resemble a conventional one-gang or two-gangwall box, except no dangerous high-voltage wires may be exposed to theuser. According to some embodiments, docking station 808 may alsoinclude a cellular wireless interface or any other suitablecommunications interface circuitry 811.

According to some embodiments, head unit 804 (sometimes referred toherein as “replacement module 804”) may actually at least partiallycontain or otherwise provide some or all of the sensors, processors,user interfaces, the rechargeable battery, and so forth of smartdoorbell 106. Users can plug and unplug or otherwise removably coupleunit 804 in and out of docking station 808. Many different commercialand functional possibilities for provisioning, maintenance, and upgradeare possible. For example, after years of using any particular head unit804, a user may be able to acquire a new version of head unit 804 andsimply plug it into the docking station 808. There are also manydifferent versions for head unit 804, such as an extremely low-costversion that is nothing but a motion/occupancy detector and conventionaldoorbell, and then a progression of increasingly-capable versions, up toand including extremely fancy head units 804 with a large number offeatures. Thus, it should be appreciated that the various versions ofhead units 804 can all be interchangeable, with any of them working whenplaced into any docking station 808. This can advantageously encouragesharing and re-deployment of old head units 804—for example, when animportant high-capability head unit 804 (for the front door, forexample) can be replaced by a great new version of the head unit 804,then the old head unit 804 can be re-deployed to a back or basementdoor, etc. When first plugged into a particular docking station 808, aparticular head unit 804 may be configured to ask the user via anysuitable interface (e.g., 2D LCD display, 2D/3D holographic projection,voice interaction, etc.) a few simple questions, such as “Where am I?”and the user can select “front door” or “garage door” or “back door” or“front gate” and so forth. In other examples, head unit 804 can provideinstructions, such as “Press button once if I am at the front door,press twice if I am at the back door,” etc.

According to some embodiments, head unit 804 may include one or more ofa main processor 814, storage 816, button and/or touch screen displayand/or any other suitable user interface 812 (e.g., keyboard, trackball,switch, slide, 3-dimensional user input devices/user interfaces, etc.),audio speaker 836, microphone 844, power converter 840, globalpositioning system (GPS) component 850 (e.g., GPS receiver), radiofrequency identification (RFID) locator 854, and general physical modulereceiver 858. Head unit 804 may additionally or alternatively includeone or more types of a wireless and/or wired networking component 862.In view of the ample power availability, a variety of any suitablecommunications capabilities can be provided by networking component 862to smart doorbell 106, including Bluetooth, Wi-Fi, ZigBee, 3G/4Gwireless, CAT6 wired Ethernet, and even optical fiber from the curb.Furthermore, because smart doorbell 106 may be coupled to a home 120Vsystem or any other suitable wired or wireless power system, a HomePlugor other powerline-communications capability can be provided bynetworking component 862. Such communication capabilities may enablesmart doorbell 106 to communicate with any other smart device ofenvironment 100 and/or with any suitable element of platform 200.

Head unit 804 of smart doorbell 106 may additionally or alternativelyinclude any number of any suitable sensor components 828, such as anysuitable temperature sensor, any suitable humidity sensor, any suitableoccupancy sensor, any suitable ambient light sensor (ALS), any suitablefire sensor, any suitable smoke sensor, any suitable carbon monoxide(CO) sensor, any suitable proximity sensor, any suitable passiveinfrared (PIR) or other motion sensor, any suitable ultrasound sensor,any suitable still or video camera or scanner (e.g., a charge-coupleddevice (CCD) camera, a complementary metal-oxide-semiconductor (CMOS)camera, or any suitable scanner (e.g., a barcode scanner or any othersuitable scanner that may obtain identifying information from a code,such as a linear barcode, a two-dimensional or matrix barcode (e.g., aquick response (“QR”) code), a three-dimensional barcode, or the like),any suitable near-field communication (NFC) technique sensor (e.g., forsensing an entity wearing an infrared or NFC-capable smartphone or othersuitable element), any suitable RFID technique sensor (e.g., for sensingan entity wearing an RFID bracelet, RFID necklace, RFID key fob, orother suitable element), any suitable audio sensor (e.g., a microphone,which may operate in conjunction with an audio-processing applicationthat may be accessible to doorbell 106 (e.g., at environment 100, system164, or other accessible component(s) of platform 200), which mayidentify a particular voice or other specific audio data forauthenticating a user or for any other suitable purpose)), any suitablebiometric sensor (e.g., a fingerprint reader or heart rate sensor orfacial recognition sensor or any other feature recognition sensor, whichmay operate in conjunction with a feature-processing application thatmay be accessible to doorbell 106 (e.g., at environment 100, system 164,or other accessible component(s) of platform 200), for authenticating auser or for any other suitable purpose), and the like. A rechargeablebattery 832 or any equivalently capable onboard power storage medium mayalso be provided by head unit 804. For example, battery 832 can be arechargeable Lithium-Ion battery. In operation, smart doorbell 106 maycharge battery 832 during time intervals in which the hardware powerusage is less than what power stealing can safely provide, and maydischarge to provide any needed extra electrical power during timeintervals in which the hardware power usage is greater than what powerstealing can safely provide, which may thereby extract power as neededfrom the 120V “hot” line voltage wire or other suitable power source.Battery 832 may be used as a conventional back-up source or as areservoir to supply excess DC power if needed for short periods.

User interface 812 may include one or more visual displays (e.g., thinfilm transistor (TFT), organic light-emitting diode (OLED), or any othersuitable display), touchscreen, and/or button input capabilities, audiospeaker 836, microphone 844, and the like. In some embodiments, (e.g.,as may be shown in FIGS. 8A and 8B), a particular head unit 804 of smartdoorbell 106 may include user interface 812 with a click-and-rotateannular ring input button. According to such embodiments, theclick-and-rotate annular ring input button may be used by a visitor tosimply “ring” a doorbell (e.g., for a visitor to attempt to announceitself). Furthermore, in some embodiments, such a click-and-rotateannular ring input button may be operative to provide menu-driveninterfaces for user governance of some or all of the variouscapabilities of doorbell 106. User interface 812 may additionally oralternatively be configured to take a variety of forms, including, butnot limited to, a touch pad, dial, click wheel, scroll wheel, touchscreen, 3-dimensional input and/or output interface, one or more buttons(e.g., a single conventional doorbell-like button or multiple buttons ofa keyboard), mouse, joy stick, track ball, and the like. Moreover, oneor more of sensor components 828 may also be at least partially used asan input component (e.g., by sensing data from a user (e.g., as amicrophone, camera, scanner, biometric sensor, and the like)) and/or maybe at least partially integrated into user interface 812 (e.g., userinterface 812 may include a biometric fingerprint scanner to identifythe fingerprint of an entity that may touch user interface 812). As maybe shown in FIGS. 8A-8C, a 2D image and/or 3D holographic imageprojector 830 may also be provided so that the effective dimension ofthe display is not just limited to the physical size of a face of headunit 804. For example, as described below (e.g., with respect to FIG.8C), if a package is to be deposited by a visitor, smart doorbell 106may leverage projector 830 to project a defined drop-off area for thepackage (e.g., area AL of FIG. 1, as described below in more detail).When button 812 is depressed, touched, or otherwise selectivelyinteracted with and/or utilized by a visitor, doorbell 106 may beoperative to generate and transmit a signal (e.g., via any suitablewired or wireless communication path) to a user-communicative componentfor alerting a user that a visitor is at doorbell 106, where such auser-communicative component may be any suitable smart component ofsmart environment 100 (e.g., an output component of a hazard device 104or a communication mechanism available to a user device 166) or anyconventional component of a user environment (e.g., a chime of aconventional doorbell and/or an emergency light of a home).

Smart doorbell 106 of environment 100 may be configured to include anysuitable combination of any of the components described above withrespect to any component of platform 200 so as to appropriately interactwith other smart devices of environment 100 and services platform 200and any other suitable entity, such as system users registered with orassociated with environment 100 (e.g., owners, occupants, etc.) and/orvisitor entities that may visit environment 100 (e.g., packagedeliverers, friends, solicitors, strangers, would-be-thieves, etc.).Such a smart doorbell 106 may be a visitor interface or entrywayinterface device operative to control and detect a visitor's approach toand/or departure from a location (e.g., an outer door 186 of structure150 of environment 100), announce such an approach or departure, enhanceconventional doorbell functionality for both system users and visitors,control settings on a security system, increase the convenience andefficiency of package delivery, increase the traceability of packagedelivery, enable secure package delivery, detect environmental data andother useful data for environment 100 and system 164, and the like.Doorbell 106, on behalf of smart environment 100 and platform 200 (e.g.,system 164), may act as a custodian to environment 100 with respect toany visitors that may approach environment 100.

One or more sensors 828 of doorbell 106, alone or in combination withother smart devices and/or rules-based inference engines and/orartificial intelligence and/or any other processing capabilitiesprovided at environment 100 and/or otherwise by services platform 200,may be operative to detect when a package is attempted to be deliveredto smart-home environment 100, and then doorbell 106 may be operative totake one or more of a variety of automated actions in response to suchdetection. For example, as shown in FIG. 1, if a visitor entity ordeliverer DL (e.g., a human courier or a drone or otherwise) isattempting to deliver a package PL to a portion of environment 100, suchas to structure 150 at an entryway 186 provided with a smart doorbell106, doorbell 106 may be operative to access certain packageidentification information associated with package PL. In someembodiments, doorbell 106 may be operative to receive certain packageidentification information from deliverer DL, such as by deliverer DLactively physically communicating such package identificationinformation to doorbell 106 (e.g., audibly to an sensing component 828of doorbell 106) and/or by deliverer DL electronically communicatingsuch package identification information to a networking communicationcomponent 862 of doorbell 106 (e.g., by communicating digital data froma deliverer's mobile device 266, which may be similar to a user device166) using any suitable communications protocol (e.g., via acommunication path 107). In some embodiments, doorbell 106 may beoperative to access certain package identification information directlyfrom package PL, such as by a scanner sensing component 828 of doorbell106 scanning information (e.g., code information) from a label ID (e.g.,a shipping label or delivery label) coupled to or otherwise associatedwith package PL (e.g., via a communication path 105). In response todetecting such package identification information of package PL,platform 200 (e.g., doorbell 106, alone or in combination with othersmart devices and/or rules-based inference engines and/or artificialintelligence provided at environment 100 and/or services platform 200)may be operative to access additional information based on that detectedpackage identification information (e.g., the sender, recipient, adescription of the contents of package PL, whether signature is requiredto complete the delivery, etc.) and/or to take one or more of a varietyof automated actions based on that detected package identificationinformation and/or additionally accessed information.

Such package identification information that may be associated with apackage (e.g., package PL) may be generated by any suitable entity orcombination of entities using any suitable data. In some embodiments,certain package identification information that may be associated withpackage PL may uniquely identify a particular smart-home environment 100and/or a system user registered with or otherwise associated withenvironment 100 (e.g., a resident of environment 100) and/or a modesetting thereof, such that an entity with access to such packageidentification information may be able to access additional informationassociated with that environment 100 or user of environment 100. Forexample, a delivery entity (e.g., a courier service such as FederalExpress) that may be in the process of delivering package PL toenvironment 100 may use certain package identification information toaccess any suitable smart environment data (e.g., dynamic data)regarding environment 100 or a user thereof that may be identifiable bythat package identification information for increasing the convenienceand efficiency of package delivery. Such smart environment data may beindicative of a status of environment 100 or of a particular user ofenvironment 100 (e.g., the availability of someone at environment 100 toreceive package PL), whereby a delivery entity may be able to leveragesuch smart environment data for more efficiently attempting to deliverpackage PL.

FIG. 19 is a flowchart of an illustrative process 1900 for enhancingvisitor handling (e.g., package delivery). At step 1902, process 1900may include placing an order for delivery of content in a package to arecipient at a location. Such an order may be made by any suitableordering entity using any suitable communication technique, includingvia the telephone, the Internet (e.g., via a web browser or a mobileapplication), a local “in-person” order, and the like, with respect toany suitable facilitator entity. For example, the ordering entity may bethe same as or different than the recipient (e.g., the order may be madeby the intended recipient or by another party (e.g., when ordering agift for the recipient)). As just one example, a mobile device, such asa mobile device 166, may be used by any suitable person to place theorder. Any suitable fulfillment entity or combination of fulfillmententities may facilitate the placement of the order, such as a clerk at astore or a telephonic call center, an online server running code thatmay enable the ordering entity to place the order (e.g., Amazon.com orSeamless.com or any other suitable online vendor), or any other orderfacilitator. The content to be delivered in the package of the placedorder may be any suitable content (e.g., goods or services) that may bephysically transported and/or eventually provided at a particularphysical location. The package may or may not include wrapping or acovering to securely contain the content during delivery. Instead, thecontent (e.g., the goods or services desired to be delivered) may not bewrapped in a “physical” package but may be delivered as is (e.g., a newcar may be ordered for delivery where the car may not be bound in anypackage when delivered but the car may be considered both the contentand the package, a cable repairman may be ordered for delivery (e.g., tofix a cable connection at the environment 100) where the repairman maybe considered both the content and the package, while a set of glasswaremay be ordered as content for delivery where the glassware may bewrapped in protective bubble wrap and enclosed in a cardboard box aspackaging for the glassware content when delivered). The location may beany physical location to which content may be delivered, such as anysuitable mailing address, post office box, or the like. A recipient mayor may not be identified when the order is placed at step 1902. In someembodiments, one or more particular recipients may be identified whenthe order is placed (e.g., “John Doe” or “John and Jane Doe” or “Rex theDog” or “Nest Labs, Inc.”). Alternatively, no recipient may beidentified and the order may be placed while only identifying a locationat which the package should be delivered (e.g., 1 Main Street, Gotham,U.S.A.). Alternatively, no location may be identified and the order maybe placed while only identifying a recipient to which the package shouldbe delivered (e.g., John and Jane Doe).

Next, at step 1904, process 1900 may include accessing smart environmentdata that may be associated with at least one of the recipient and thelocation of the order of step 1902. Such smart environment data mayinclude any suitable data indicative of a particular smart homeenvironment 100 and/or user (e.g., user UL or UR of FIG. 1) that may beregistered or otherwise associated with platform 200 (e.g., a smartentity). For example, any smart environment 100 (e.g., smart home orother environment equipped with one or more smart devices) that may beintegrated with platform 200 may be associated with any suitableenvironment platform-identifier (e.g., via address, geographiccoordinates, unique environment ID, etc.) that platform 200 may use touniquely identify environment 100 in any suitable way. Additionally oralternatively, any system user (e.g., person, animal, etc.) that may beregistered or otherwise associated with platform 200 may be associatedwith any suitable user platform-identifier (e.g., via name, address,facial detection, a registered personal mobile device 166, unique userID, etc.) that platform 200 may use to uniquely identify that user inany suitable way. In some embodiments, by leveraging the identificationof the recipient and/or location provided during placement of the orderat step 1902, certain smart environment data may be accessed that may beassociated with that recipient and/or location (e.g., any suitable userplatform-identifier of platform 200 associated with that recipient as aknown user of platform 200 and/or any suitable environmentplatform-identifier of platform 200 associated with that location as aknown environment of platform 200). For example, a facilitator entity,such as a fulfillment entity that may facilitate the placement of theorder and/or a delivery entity that may facilitate the delivery of theorder, may communicate with platform 200 in order to attempt to accesssuch smart environment data (e.g., if the recipient or location of theorder matches any known user or environment of platform 200). As justone example, such a facilitator entity may be a fulfillment entity(e.g., Amazon.com) or a delivery entity (e.g., Federal Express) and maybe a business 228 that may be operative to communicate with any othersuitable portion of platform 200 (e.g., system 164 via one or more APIs210) to access such smart environment data that may be associated withthe recipient and/or location of the order. As another example, afulfillment entity may also be a delivery entity (e.g., a restaurantthat receives an order, prepares the meal content, and then delivers(e.g., on foot or bicycle or car) the meal content in a package (e.g.,brown bag) to environment 100). Alternatively or additionally, theordering entity that placed the order of step 1902 may provide thefacilitator entity with suitable smart environment data (e.g., a userplatform-identifier of platform 200 associated with the recipient and/oran environment platform-identifier of platform 200 associated with thelocation may be known to and shared by the ordering entity with afacilitator entity, either during or after placement of the order atstep 1902). Alternatively or additionally, the order placed at step 1902may be at least partially enabled by a component or subsystem ofplatform 200 (e.g., of system 164) that may be operative to provide thefacilitator entity (e.g., fulfillment entity and/or delivery entity)with suitable smart environment data associated with the order (e.g., auser platform-identifier of platform 200 associated with the recipientand/or an environment platform-identifier of platform 200 associatedwith the location of the order may be known to and shared by system 164with a facilitator entity (e.g., via API 210), either during or afterplacement of the order at step 1902).

At step 1906, process 1900 may include generating unique packageidentification information (e.g., unique invitation identificationinformation) based on the accessed smart environment data and at leastone of the content, the recipient, and the location of the orderedpackage and/or a facilitator of the ordered package. For example, if asmart environment 100 and/or a user of platform 200 (e.g., a smartsystem entity) is associated with the location and/or recipient of theordered package such that smart environment data indicative of thatsmart environment and/or user may be accessed at step 1904, uniquepackage identification information may be generated at step 1906 thatmay identify that smart environment and/or that user of platform 200(e.g., using the smart environment data) and/or at least one identifierof the ordered package (e.g., the content, the recipient, the location,and/or a facilitator/fulfiller/deliverer entity that may be at leastpartially responsible for delivering the package, etc.). Such uniquepackage identification information may be generated by any suitableentity, such as by system 164 and/or a business facilitator entity 228,and may be shared with any other suitable entity or entities (e.g., withsystem 164 by facilitator entity 228 and/or with facilitator entity 228by system 164). For example, in some embodiments, system 164 mayassociate smart environment data of a smart system entity (e.g., anenvironment 100 and/or user U) with at least one of a recipient orlocation of a placed order and may generate unique packageidentification information for that order using the smart environmentdata and any suitable identifier(s) of that order, and then may sharethat unique package identification information with a facilitator 228 ofthe order (e.g., a delivery entity charged with delivering the orderedpackage). Alternatively, in some embodiments, a business 228 that mayfacilitate the order (e.g., a retail entity or a delivery entity) mayaccess smart environment data when at least one of the recipient andlocation of an order is associated with a smart system entity of system164 and then business 228 may generate unique package identificationinformation for that order using the smart environment data and/or anysuitable identifier(s) of that order (e.g., recipient, deliverer,orderer, contents, location, etc.), where such unique packageidentification information may be shared by facilitator business 228with system 164 or any other suitable portion of platform 200 (e.g., aconfirmation number generated by such a facilitator entity for aspecific order (e.g., a unique order confirmation number) may beleveraged as such unique package identification information).

Process 1900 may include a facilitator obtaining, at step 1908, acurrent status or mode setting of a smart system entity (e.g., anenvironment 100 and/or user U) of the smart environment data that may beassociated with the unique identification information of the orderedpackage and then, at step 1910, altering delivery of the ordered packagebased on the obtained status. That is, when a smart environment 100and/or a user U of system 164 (e.g., a smart system entity) may beassociated with a placed order (e.g., as a location and/or recipient ofthe order) such that unique package identification information may begenerated that links that environment or user with the placed order, thehandling of that order may be affected by any suitable characteristic ofthat environment or user. For example, after an order for a package isplaced (e.g., at step 1902) but before that ordered package is delivered(e.g., at step 1910), a current status or characteristic of at least onesmart system entity associated with the ordered package, as may bedetermined through leveraging platform 200 and unique packageidentification information (e.g., at step 1908), may be obtained by afacilitator for altering the delivery of the package.

As just one example, when a facilitator delivery entity is about todeliver the ordered package (e.g., when the ordered package is receivedat a distribution center proximal to the location from a remoteoriginating distribution center), the delivery entity may leverage theunique package identification information of the package to obtaincurrent status information of a smart system entity associated with thepackage (e.g., associated with the unique package identificationinformation) from platform 200 (e.g., system 164) in order to determinehow to most efficiently deliver the package. In some embodiments (e.g.,after step 1906 and/or prior to step 1908), the unique packageidentification information may be incorporated into data (e.g., codedata or NFC data) of a shipping label that may be affixed to orotherwise associated with the package (e.g., label ID of package PL ofFIG. 1), and such a label may be scanned by the delivery entity inadvance of an actual delivery attempt of the ordered package (e.g., atstep 1908) so as to enable the delivery entity to obtain current statusinformation about the ordered package from platform 200. Such statusinformation may be dynamic and change over time (e.g., after step 1906but before step 1908), such that the facilitator entity may obtaincurrent status information before attempting to deliver the package inorder to efficiently deliver the package based on the most useful statusinformation. For example, a deliverer of delivery entity business 228may first access and leverage the unique package identificationinformation of a package to obtain current status information prior to adeliverer of delivery entity business 228 arriving at environment 100with the package. As shown in FIG. 1, for example, a deliverer agent DRat a dispatch center DC of business 228 remote from location LU ofenvironment 100 may utilize label ID of package PL to access andleverage the unique package identification information of package PL toobtain current status information prior to business 228 instructingdeliverer agent DL of FIG. 1 to arrive at door 186 of environment 100with package PL.

Status information regarding a smart system entity (e.g., a smartenvironment 100 or user U) may be any suitable information generated byor inferred from any suitable data of platform 200 (e.g., of sensors ofenvironment 100 and/or from user U). As just one particular example, asmentioned above, system 164 may use tracking information to makeinferences regarding the current and/or future occupancy of homeenvironment 100 and/or the current and/or future location of a user U(e.g., at environment 100, like user UL of FIG. 1 and Husband 1718 ofFIG. 17, or away from environment 100, like user UR of FIG. 1 and Wife1714 of FIG. 17), where such current and/or future occupancy inferencesmay be obtained as current status information and then may be leveragedby a facilitator to affect the delivery of the package (e.g., to delaydelivery until a time when environment 100 may be occupied by therecipient to receive the delivery). As another example, system 164 maybe configured to enable a user U to access information about any orderedpackages that may be associated with that user (e.g., packages to bedelivered to that user as a recipient or to that user's smartenvironment as a location), which may be determined through identifyingany unique package identification information that may be associatedwith that user or an environment of that user (e.g., with an applicablesmart system entity), such that the user may manually update anysettings that he or she may wish to have be associated with any suchordered package (e.g., for affecting its delivery). For example, using adevice 166, a user may interface with any suitable user interface thatmay be provided by any suitable entity of platform 200 (e.g., system164) to dictate and/or edit any status information that may beassociated with an ordered package and then used by a facilitatorbusiness 228 for efficiently delivering that package, such as alteringthe delivery location (e.g., target) at which the package ought to bedelivered or defining a particular time during which the delivery shouldor should not be made to the location, and the like. Therefore, thestatus information that may be obtained by a facilitator (e.g., adeliverer at step 1908) may be indicative of the actual current statusof a smart system entity (e.g., a smart environment 100 or user U) atthat moment and/or of a future status of that smart system entity (e.g.,during what future times environment 100 is expected to be occupied andduring what future times environment 100 is expected to not be occupied,etc.), and such status information may be based on inferences or otherprocessing that may be automatically carried out by platform 200 (e.g.,system 164) based on any suitable sensed data with respect to any smartsystem entity (e.g., by any smart sensing devices of environment 100)and/or based on any manual instructions or settings defined or otherwiseprovided by a system user to platform 200 (e.g., to a smart deviceand/or to system 164).

A do-not-disturb mode may be set for a particular environment 100 or atleast a portion thereof for any suitable length of time that may startat a current or future moment. Such a mode may indicate that environment100 may not be willing or able to accept at least certain packagedeliveries (e.g., deliveries requiring a confirmation of receipt usersignature by a particular user or any user). Such a mode may be manuallyset by an appropriate user (e.g., a user with appropriate managementrights for environment 100 using any suitable device 166 or interactionwith any other suitable smart device of environment 100 or any othersuitable component of system 164 of platform 200) for any suitablereason, such as when the user does not want to greet a visitor (e.g., ifthe user is feeling under the weather or going to sleep) or when theuser will not be at environment 100 (e.g., when the user is going onvacation or leaving a babysitter at home with a child). Alternatively,platform 200 may be operative to collect any suitable information fromone or more smart devices of environment 100 and may make inferences inorder to automatically set a do-not-disturb mode for environment 100(e.g., based on sensed occupancy data and sensed movement data).

Information indicative of when environment 100 may be associated withsuch a mode may be a type of current status information that may beassociated by platform 200 with unique package identificationinformation and shared with or otherwise made accessible to afacilitator entity (e.g., a delivery business 228) for increasing theefficiency of package delivery and/or of any other activity that mayinclude a visitor interacting with environment 100. Such information maybe handled with sensitivity so as to not be leveraged for sinisterpurposes (e.g., for a third party to detect when an environment 100 isin a do-not-disturb mode so as to assume no one is home and attempt arobbery of the premises). System 164 may be configured to shareinformation about a do-not-disturb mode of an environment 100 or anyother suitable status information of environment 100 or a user thereofwith a third party, such as a facilitator of a package delivery, onlywhen certain data is accessible to that third party. For example, system164 may only share such status information when a facilitator entityqueries system 164 with respect to particular unique packageidentification information (e.g., such information as may be generatedat step 1906 and linked with a particular ordered package). Certainfacilitator entities (e.g., Federal Express) may be trusted and enabledby platform 200 to interpret such unique package identificationinformation for appropriately querying system 164 about such statusinformation, and whereby system 164 may be configured to only share suchstatus information when queried by a trusted entity (e.g., when theunique package identification information is known by or otherwiseleveraged by an entity (e.g., a deliverer entity) trusted by system 164and not just when any entity has access to the recipient and/or locationdata of the ordered package).

Status information of a smart system entity associated with uniquepackage identification information of an ordered package may includevarious types of information that may be obtained and leveraged (e.g.,at steps 1908/1910) by a facilitator entity for delivering the packagein a manner that may be more efficient for the facilitator entity and/orthat may be more convenient for environment 100 or a user thereof. Forexample, such status information may include information indicative ofwhen to allow delivery to a particular location (e.g., after 4:00 PM onMondays and Wednesdays only at environment 100), information indicativeof preferred alternate delivery methods (e.g., do not deliver toenvironment 100 but rather hold a particular package at a particulardeliverer pick up location for manual pick-up by a particular user, ordeliver to another recipient and/or to another location other than therecipient and/or location initially defined at step 1902), informationindicative of authorization to deliver without signed confirmation ofreceipt of delivery (e.g., a particular authenticated user of the systemhereby authorizes deliverer to deliver a particular package to aparticular location and leave next to the front door of that locationwithout a human user signing for that delivery), and/or any othersuitable information indicative of any other suitable deliverypreferences or delivery instructions. For example, in response toreceiving status information indicative of authorization to deliver toanother location, the facilitator may be operative to obtain statusinformation associated with a smart environment of that other location(e.g., for repeating one or more steps of process 1900 with respect tothat smart environment).

In some embodiments, status information may be provided to a facilitatoron a macro-level in addition to or as an alternative to providing statusinformation with respect to just one particular environment 100 and/oruser thereof. For example, status information may be made available to afacilitator entity business 228 that may be generally indicative of astatus or trend of a particular group of smart system entities (e.g., aneighborhood or ZIP code that may include multiple smart environments100) that may include a smart system entity identified based on certainpackage information. As just one example, such status information may beindicative of certain days of the week or other suitable current orfuture periods when a majority or any suitable threshold amount ofenvironments of a group of environments including an environmentassociated with certain package information are not available to receivepackages, and such information may be leveraged by the facilitatorentity to avoid scheduling deliveries to that entire group (e.g.,neighborhood) of environments during those days. Any suitable groupingof environments or users or other suitable smart system entities of anysuitable size and type may be used to generate group or macro-levelstatus information that may be made available to a facilitator entityfor more efficiently handling business (e.g., deliveries) associatedwith that group. By grouping smart system entities and only sharingstatus data at a group-level with third parties, such as facilitatorentities, platform 200 may protect the privacy and/or security ofcertain environments by not sharing status information associatedspecifically with only a particular single environment 100 (e.g., topreserve at least some anonymity about the status of a particular smartenvironment).

By accessing certain status information of a smart environment 100 orother suitable smart system entity of platform 200, as may be detectedor inferred by system 164, a facilitator entity business 228 may beconfigured to optimize package delivery. For example, data indicative ofwhen a particular location may and may not be able to receive a packagedelivery may be processed by any suitable distribution system to dictatewhen certain packages are dispatched for maximizing the likelihood of asuccessful physical delivery. In some embodiments, when statusinformation is obtained at step 1908 indicative of current availabilityof a target environment 100 to receive a package (e.g., availability forthe next 4 hours), facilitator 228 may immediately deliver the packageto environment 100, yet, in other embodiments, when status informationis obtained at step 1908 indicative of no current availability of atarget environment 100 to receive a package (e.g., not available for atleast the next 4 hours), facilitator 228 may delay the delivery of thepackage to environment 100 (e.g., until new status information may beobtained at a later use of step 1908). As another example, in someembodiments, when status information is obtained at step 1908 indicativeof an instruction to deliver a package to an initial target environment100 that is currently available to receive the package (e.g.,availability for the next 4 hours), facilitator 228 may immediatelydeliver the package to environment 100, yet, in other embodiments, whenstatus information is obtained at step 1908 indicative of an instructionto deliver a package to a new target environment 100 a rather than aninitial target environment 100, facilitator 228 may repeat one or moreof steps 1904-1910 with respect to smart environment data associatedwith that new target environment 100 a. This may reduce overhead costsfor a delivery entity (e.g., reduce fuel prices and wasted man hours bylimiting the number of failed delivery attempts) and/or may reduceinsurance costs by limiting the exposure of perishable contents fromunnecessary and degrading delivery effects.

One, some, or all of steps 1902, 1904, 1906, 1908, and 1910 may be atleast partially or completely automated using one or more computersystems (e.g., computer system 1500 and/or computer system 1600) thatmay be leveraged by one or more of environment 100, system 164,facilitator entity business 228, and the like for automaticallyassociating a smart system entity of system 164 with an ordered packageand then sharing certain status information of that smart system entitywith a deliverer or other facilitator entity at any suitable time forpositively affecting the delivery of the package. A user of system 164may actively and manually define certain preferences or instructions tobe shared with facilitator entity businesses 228 for affecting thedelivery of a particular ordered package currently associated with thatuser or for affecting the delivery of any package that may be associatedwith that user in the future. Alternatively or additionally, thedelivery of ordered packages associated with a user or environment maybe based on inferences made by system 164 and selectively shared withfacilitator entity businesses 228 (e.g., without any active manualpreferences made by the user but instead done transparently to a user).Therefore, in some embodiments, once an order is placed at step 1902,one, some, or all of steps 1904-1910 may be carried out transparently toa system user (e.g., to a recipient of package PL) by platform 200 basedon any status information that may be determined automatically by system164 and/or based on previously defined settings made by a system user.

It is understood that the steps shown in process 1900 of FIG. 19 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

When delivery of an ordered package is actually attempted at a smartenvironment 100, whether or not in accordance with process 1900, one ormore smart devices of environment 100 may be leveraged to at leastpartially automate the handling of the delivery attempt, which mayincrease the efficiency of the delivery attempt and/or to minimize anyinconvenience to a user of environment 100 that such a delivery attemptmay cause. For example, an entryway interface device, such as a smartdoorbell 106, may be provided at a suitable entryway of a suitableportion of a smart environment 100 for initiating or otherwisefacilitating interaction between a delivery entity and smart environment100 that may efficiently handle a package delivery attempt (e.g., toreduce delivery failures, to increase user satisfaction and convenience,and/or to minimize risk of package theft).

According to some embodiments, one or more sensing components 828 orother suitable components of doorbell 106 in combination withrules-based inference engines or artificial intelligence or any othersuitable processing components of platform 200 provided at a centralserver such as system 164 or otherwise may be used to detect when apackage is attempted to be delivered to smart-home environment 100 andto take a variety of automated actions in response. For example, sensingcomponents 828 may be operative to “see” the uniform of a deliveryperson approaching doorbell 106 or the truck of the delivery person, orthe sensors can “hear” a delivery drone or hear a delivery truck incombination with footsteps of a delivery person approaching the doorwithin a period after hearing the truck. Once the deliverer is within apredetermined distance from the door or entry point 186 that may beassociated with smart doorbell 106, doorbell 106 may be configured toask the suspected deliverer (e.g., using speaker 838) if he or she is adelivery person, to which that person can reply with an audible responseor by indicating as such on user interface 812 of doorbell 106. If theperson is making a delivery, doorbell 106 can be configured to instructthe person to place the package in a suitable location proximatedoorbell 106 such that its scanner or any other suitable sensingcomponent 828 can scan the bar code or other type of identifying tagaffixed to or associated with the package being delivered for detectingsuitable package identification information.

According to embodiments, a central server, such as system 164, can usethe bar code or any suitable data detected directly from the delivereror local package to obtain information about the package, such as thesender, recipient, a description of the item therein, whether signatureis required, etc. Based on this information, rules-based inferencesengines or artificial intelligence or otherwise of platform 200 may beoperative to make one or more inferences regarding any action to takenext. For example, if occupants or, more particularly, if a specifiedrecipient or recipients are in the home and the package is from a senderor contains an item that is of particular interest to the one or moreoccupants, an announcement can be made in the home, indicating thepackage is currently being dropped off and providing details about thepackage. On the other hand, if the sender or item is not of particularinterest to one of the occupants based on the occupants past responsesto receiving such deliveries, then no announcement may be made and theoccupants can discover the package in due course. Similarly, if nooccupants are home but an inference is made that the package is ofparticular interest to one of the occupants, a text message, e-mail,telephone call, or any other suitable contact attempt can be made to theone or more identified occupants, indicating that the package is beingdelivered.

According to embodiments, in the event a signature may be required forthe package but none of the occupants are home or available to interfacewith the deliverer to provide such a signature, an inference may be madenot to disturb the occupants and doorbell 106 can be configured toprovide authorization to the deliverer to leave the package. Forexample, doorbell 106 may be operative to present an authorization code(e.g., in plain text, barcode, or encrypted forms) via any suitableoutput component of doorbell 106 and may prompt the deliverer to use adeliverer device to record, scan, photograph, or otherwise acquire theauthorization code. Once the authorization code has been acquired by thedeliverer, doorbell 106 can then instruct the deliverer regarding how toproperly leave the package at environment 100, such as at the frontdoor, around the back of the house in a discrete location, etc.

FIG. 20 is a flowchart of an illustrative process 2000 for enhancingvisitor handling (e.g., package delivery). At step 2002, process 2000may include detecting visitor information of a visitor at an entrywayinterface device of a smart environment, where such a visitor may be adeliverer and such visitor information may be package informationassociated with a package provided by the deliverer at the entrywayinterface device of the smart environment. For example, as shown in FIG.1, when a deliverer DL arrives with a package PL at a portion ofenvironment 100 (e.g., at a door entry point 186 of structure 150 ofenvironment 100), smart doorbell 106 may be configured to detect anysuitable package information associated with package PL. In someembodiments, doorbell 106 may be operative to receive certain packageidentification information from deliverer DL, such as by deliverer DLactively physically communicating such package identificationinformation to doorbell 106 (e.g., audibly to an audio sensor 828 ofdoorbell 106) and/or by deliverer DL electronically communicating suchpackage identification information to a networking communicationcomponent 868 or scanner sensor 828 of doorbell 106 (e.g., bycommunicating digital data from a deliverer's mobile device 266, whichmay be similar to a user device 166) using any suitable communicationsprotocol or code delivery technique (e.g., via a data path 107).Additionally or alternatively, in some embodiments, doorbell 106 may beoperative to access certain package identification information directlyfrom package PL, such as by a scanner sensor 828 of doorbell 106scanning information (e.g., code information or simple printedrecipient/location/deliverer information) from a label ID (e.g., ashipping label or delivery label) affixed to or otherwise associatedwith package PL (e.g., via a data communication path 105). Such detectedpackage identification information may include any suitable informationthat may identify any suitable characteristic of the package or of itsattempted delivery, such as an identity of an orderer of the package(e.g., the entity that placed an order for the package at step 1902 ofprocess 1900), an identity of a facilitator of the package (e.g., afulfillment entity that may have processed the order for the package atstep 1902 of process 1900, a deliverer entity that may be responsiblefor deliverer DL bringing package PL to environment 100, etc.), anidentity of the time and data of the currently attempted delivery, anidentity of an intended recipient of the package (e.g., the recipientindicated during placement of the order by the orderer or an updatedrecipient as may be defined by updated status information generated by asmart system entity (e.g., during process 1900 as described above)), anidentity of an intended delivery location of the package (e.g., thedelivery location indicated during placement of the order by the ordereror an updated delivery location as may be defined by updated statusinformation generated by a smart system entity (e.g., during process1900 as described above)), an identity of the content of the package(e.g., a description of the specific content or any suitable informationdescribing certain attributes of the content (e.g., perishable, heavy,must be refrigerated, etc.)), an identity of any suitable deliveryrequirements for the package (e.g., a requirement that a particular useror a particular type of user (e.g., an adult) must sign for the packageto enable delivery, etc.), and the like.

Such detected package identification information of step 2002 may beunique package identification information that may be initiallygenerated or at least partially defined by system 164 of platform 200based on smart environment data of a smart system entity associated withthe package prior to the delivery attempt (e.g., as described above withrespect to step 1906 of process 1900), where such “smart” unique packageidentification information may be detected by doorbell 106 directly fromdeliverer DL or device 266 of deliverer DL and/or from package PL (e.g.,from label ID). Alternatively, such detected package identificationinformation of step 2002 may be conventional package identificationinformation, such as handwritten addressee information that may bemanually entered on a shipping label ID of the package by a human or anyother conventional delivery shipping label information. In someembodiments, the delivery attempt may be for a package that does notinclude any shipping label ID at all. For example, package PL may simplybe a plate of cookies that a friendly neighbor has made and isattempting to deliver as deliverer DL to an occupant of environment 100.In such embodiments, the information associated with the package thatmay be detected by doorbell 106 may be captured image data of delivererDL and/or package PL (e.g., as may be captured by a camera sensingcomponent 828 of doorbell 106), spoken word data as may be provided bydeliverer DL describing the delivery of package PL (e.g., as may becaptured by an audio sensing component 844 of doorbell 106), textualdata as may be entered by deliverer DL describing the delivery ofpackage PL (e.g., as may be captured by a keyboard user interface inputcomponent 812 of doorbell 106), or any other suitable data that may bedetected by doorbell 106 via any suitable data path regarding delivererDL and/or package PL.

Doorbell 106 may be configured to detect any suitable packageidentification information at step 2002 in any suitable way, such as byinstructing a detected deliverer DL to share such information (e.g., byinstructing deliverer DL to position an appropriate portion of packagePL (e.g., label ID) in an appropriate location (e.g., using any suitableoutput component of doorbell 106 or other smart device) such that asensing component 828 of doorbell 106 may be able to access informationtherefrom), or doorbell 106 may be configured to automatically detectany suitable package identification information without requiring anyspecific activity on behalf of the deliverer DL (e.g., doorbell 106 mayautomatically detect suitable package identification informationwhenever a deliverer DL arrives with package PL within a particulardistance of doorbell 106 (e.g., via NFC or RFID or Bluetoothtechnology)). When deliverer DL or package PL is detected by doorbell106, either in response to a deliverer actively identifying itself orthe package to doorbell 106, or in response to doorbell 106automatically identifying the deliverer and/or the package, certaintypes of information may be accessed for analysis by environment 100(e.g., time and date of attempted delivery, identification of deliverer,recipient, content of package, any delivery requirements, etc.).

At step 2004, process 2000 may include analyzing the detected visitorinformation (e.g., the detected package identification information) ofstep 2002 (e.g., in conjunction with any other suitable data availableto platform 200, such as settings of a current mode of environment 100or of a user). For example, in response to detecting such packageidentification information at step 2002 with respect to deliverer DLand/or package PL, doorbell 106, alone or in combination with othersmart devices and/or rules-based inference engines and/or artificialintelligence provided locally at environment 100 and/or in conjunctionwith system 164 and/or any other component(s) of services platform 200(e.g., business 228), may be operative, at step 2004, to access anysuitable additional information based on that detected packageidentification information that may be useful (e.g., identification ofthe sender, intended recipient, intended delivery location, deliverer,description of the contents of package PL, whether signature is requiredto complete the delivery, etc.) and/or any other suitable data availableto platform 200 (e.g., setting information of a current mode ofenvironment 100 and/or of a system user), and then to analyze all suchavailable information for determining whether or not to take one or moreof a variety of automated actions based on that detected packageidentification information and/or any additionally accessed information.

Certain package identification information may be directly determined bydoorbell 106 from any suitable initial data provided by deliverer DLand/or package PL (e.g., via data communication paths 105 or 107) whileother package identification information may be accessed by doorbell 106from other sources based on such initial data (e.g., from service 164and or business 228 via service 164). For example, a unique code thatmay be scanned by doorbell 106 from label ID at package PL may be aunique identifier that doorbell 106 may share with service 164 such thatservice 164 may access particular types of data associated with thatidentifier (e.g., recipient, content, etc.) from facilitator business228. Alternatively, such particular recipient and content data may belocally obtained by doorbell 106 directly from package PL or delivererDL (e.g., via path 107 from device 266, which may or may not beaccessing such data from server data of business 228 via internet 162).

Current status information of a smart system entity associated with thepackage delivery, which may be similar to the status information thatmay be obtained by a deliverer at step 1908, may be obtained andanalyzed at step 2004. Whether or not a facilitator entity 228 may beconfigured to or otherwise allowed to obtain current status informationof a smart system entity associated with package PL (e.g., at step1908), environment 100 (e.g., in conjunction with system 164) may beconfigured to obtain and utilize such current status information at step2004 in response to detecting certain package identification informationat step 2002, where such status information may have been activelydefined by a user of system 164 or inferred or artificially generated bysystem 164 for all deliveries generally or for a specific packagedelivery.

Any rules or instructions that may be obtained, generated, or otherwisedetermined by platform 200 (e.g., environment 100 and/or system 164) atstep 2004 based on the detected package identification information ofstep 2002 may be leveraged in any suitable way for positively affectingthe delivery attempt of package PL. Once all available and accessiblepackage data associated with the package delivery attempt has beenobtained by environment 100 (e.g., package information obtained directlyby doorbell 106 from package PL and/or deliverer DL, and/or anyadditional package information obtained via system 164 based on anyinitial package information obtained by doorbell 106), environment 100(e.g., in combination with system 164) may analyze that package data incombination with any suitable smart environment data or rules orsettings or inferences or modes that may be associated with environment100 or any user or other smart system entity that may be associated withthe package data and/or with environment 100 so as to determine one ormore ways in which to efficiently handle the delivery attempt of packagePL at doorbell 106. Such smart environment data that may be analyzed orprocessed in conjunction with any package data and/or visitor/delivererdata may include any suitable data associated with a smart environmentuser (e.g., a user that has been identified as an intended recipient ofthe package or any other user associated with environment 100) and/orany suitable data associated with the smart environment itself, such asthe current and/or anticipated future location of the smart environmentuser (e.g., location within environment 100 or outside of environment100, such as with respect to geo-fences 1730/1734 (e.g., the user iscurrently driving towards environment 100 and will arrive at environment100 within 2 minutes, so as to receive the package)), the current and/oranticipated future status or mode of a smart environment user (e.g.,sleeping, busy, on the telephone, etc.), the current and/or anticipatedfuture mode of the environment or user (e.g., a do-not-disturb mode,etc.), and the like. Any suitable smart environment data describedherein with respect to any smart device of environment 100 or inconjunction with any other feature of platform 200 (e.g., system 164and/or third parties 222-230 and/or extrinsic information 316 and/orprocessing paradigms 310) may be analyzed or otherwise processed at step2004 in conjunction with any package information that may be associatedin any way with a package delivery attempt detected at step 2002 inorder to initiate or otherwise prompt (e.g., with doorbell 106 and/orother suitable components of environment 100 and/or platform 200) anysuitable action(s) for positively affecting the handling of a visitor(e.g., the delivery attempt of package PL (e.g., at one or more of steps2005-2012 of process 2000)). In some embodiments, as soon as a delivererDL is detected, doorbell 106 may be operative to indicate to delivererDL that doorbell button 812 is disabled (e.g., to prevent deliverer DLfrom even bothering to try to contact an occupant through interactionwith button 812). In some particular embodiments, as described below inmore detail, doorbell 106 may be operative to indicate that doorbellbutton 812 is disabled in order to prevent any visitor from evenbothering to try to contact an occupant through interaction with button812, at least until certain visitor detection and analysis has beencompleted by system 164.

At step 2005, process 2000 may include adjusting the functionality of atleast one smart device of environment 100 based on the analysis of step2004 or even based solely on the detection of step 2002. As just oneexample, when a visitor is detected at step 2002, smart environment 100may be operative to turn on a light (e.g., outdoor lighting 114) toincrease the safety of the visitor and/or to increase the security ofenvironment 100. As another example, when a visitor is detected at step2002, smart environment 100 may be operative to emit any suitable sound(e.g., a dog bark or a greeting) from any suitable smart device (e.g.,from audio speaker 836 of doorbell 106) to increase the awareness of thevisitor with respect to environment 100. As another example, when avisitor is detected at step 2002, smart environment 100 may be operativeto lock any unlocked entry ways to structure 150 (e.g., by locking smartdoorknob 122) to increase the security of environment 100.

At step 2006, process 2000 may include communicating with a userassociated with the smart environment based on the analysis of step2004. As just one example, when the analysis of step 2004 determinesthat an intended recipient of package PL is a user that is currentlylocated at environment 100 and is in an active and available state(e.g., not sleeping, on the telephone, or in any another do-not-disturbstate, as may be determined by smart environment 100), smart environment100 may be operative to communicate information indicative of thecurrent package delivery attempt to that user in any suitable way atstep 2006 (e.g., by audibly announcing any suitable information relatedto the delivery attempt of the particular package via an audio speakerof a smart device that may be located most proximal to the currentlocation of that user within environment 100). As another example, whenthe analysis of step 2004 determines that an intended recipient ofpackage PL is a user that is not currently located at environment 100,smart environment 100 may be operative to communicate informationindicative of the current package delivery attempt to that user viasystem 164 in any suitable way at step 2006 (e.g., by transmitting anelectronic message to a personal device 166 associated with that user).

In response to such communication by environment 100 to a user, the usermay communicate in any suitable way a response back to environment 100(e.g., via any suitable smart device (e.g., hazard device 104 or device166) to any suitable component of environment 100 or system 164, wheresuch communication may be indicative of how the user would likeenvironment 100 to handle the detected delivery attempt. For example,the user may instruct any suitable device of environment 100 that theuser does not wish to directly interface with the deliverer but that thedelivery should be completed or carried out in some particular automatedmanner by environment 100 and the deliverer. As another example, theuser may communicate to environment 100 that the user will interfacewith the deliverer locally, whereby the user may move towards entrypoint 186 for physically interacting with deliverer DL to receivepackage PL. As yet another example, the user may communicate toenvironment 100 that the user will interface with the deliverer remotelyvia one or more devices of environment 100 or system 164, wherebyenvironment 100 may enable the user to communicate via a first smartdevice (e.g., a hazard device 104 of environment 100 that may beproximate to user UL local to environment 100 or a personal device 166of user UL or UR whether the user is local to or remote from environment100) and whereby environment 100 may enable deliverer DL to communicatevia a second smart device (e.g., doorbell 106 or other suitable deviceof environment 100), such that the interconnectivity of those devices ofenvironment 100 may facilitate effective communication between the userand the deliverer. In certain embodiments, by facilitating communicationwith an appropriate user via environment 100 and system 164 rather thanrequiring a deliverer to attempt to contact a user independently (e.g.,via a telephone number that may be associated with the ordered package(e.g., at step 1902), process 2000 may reduce the burden of thedeliverer while also retaining certain privacy of the user by utilizingsystem 164 as an intermediary between the user and the deliverer suchthat certain types of contact information or ways of communicating withthe user are guarded and protected by system 164 and not necessarilyshared with the deliverer while still enabling communication between thedeliverer and the user via such ways of communication. That is, whetheror not a user is local to environment 100, system 164 may enablecommunication between the user and the deliverer without sharing thewhereabouts or contact information of the user with the deliverer. Auser may communicate with system 164 via any suitable communicationenabled by a smart device of environment 100 when the user (e.g., userUL) is local to environment 100 (e.g., via gestures, as may be describedabove with respect to smart device 104, via touch input via a touch userinterface, audible spoken commands, etc.) and/or via any suitablecommunication enabled by a system 164 when the user is local to orremote from (e.g., user UR) environment 100 (e.g., via a user device166).

At step 2008, process 2000 may include providing the visitor (e.g., thedeliverer) with feedback based on at least one of the analysis of step2004 and any communication of step 2006. As just one example, when theanalysis of step 2004 determines that there are currently no occupantslocal to environment 100 or otherwise in an active and available state,and/or when no user response is received for any communication attemptof step 2006, system 164 may be operative to determine that smartenvironment 100 may handle the attempted delivery without active userinput and doorbell 106 may provide the deliverer at step 2008 withinstructions or other suitable feedback on how to proceed with thedelivery. Alternatively, when the analysis of step 2004 determines thatthere is a user local to environment 100 that is in an active andavailable state, and/or when a user response is received for anycommunication attempt of step 2006, system 164 may be operative todetermine that a user of smart environment 100 may at least partiallyhandle the attempted delivery and doorbell 106 may provide the delivererat step 2008 with instructions or other suitable feedback on how toproceed with the delivery. The type of feedback that may be provided viadoorbell 106 to the deliverer at step 2008 may vary based on theanalysis of step 2004 and/or any communication of step 2006. Forexample, the feedback may include active communication from the user tothe deliverer via doorbell 106 (e.g., audio and/or visual or othersuitable information may be conveyed to the deliverer by doorbell 106,where such information may be generated and transmitted by or otherwiseunder the control of the user via another smart device that the user maydirectly interface with and that may be communicatively coupled todoorbell 106). Alternatively, the feedback may include automatedinstructions generated by system 164 for communication to the deliverervia doorbell 106 (e.g., a message that may communicate that “a user isnot currently able to actively receive the package right now, please dothe following to complete the delivery . . . ”, etc.). Additionally oralternatively, the feedback may include providing certain environmentaccess to the deliverer, such as by opening door 186 by unlockingdoorknob 122 for a certain amount of time (e.g., if deliverer DL isapproved by system 164 as an expected and/or authorized deliverer (e.g.,through analysis of a label ID), door 186 may be unlocked such thatdeliverer DL may be enabled to enter structure 150 for deliveringpackage PL within structure 150). In some embodiments, a delivererdevice 266 may be operative to be communicatively coupled with a smartdevice of environment 100 and feedback may be communicated by such asmart device to deliverer device 266 for receipt by the deliverer via anoutput of deliverer device 266 (e.g., device 266 may be communicativelycoupled with a communication component 862 via path 107 (e.g., pairedvia BlueTooth or any other suitable protocol) and such feedback may becommunicated via path 107 and then provided to the deliverer via anysuitable output component of device 266).

At step 2010, process 2000 may include detecting an act of the visitor(e.g., an act of the deliverer with the package) based on the providedfeedback of step 2008 (e.g., an act performed by the visitor in responseto the provided feedback). Doorbell 106 and/or any other smart device ofenvironment 100 may be configured to detect an action of deliverer DLand/or package PL at step 2010 in response to system 164 providingdeliverer DL with feedback at step 2008, where that action may be anysuitable action indicative of deliverer handling package PL in aparticular way. As just one example, in response to instructingdeliverer DL to leave package PL at a particular location (e.g., withina detection range of a sensing component 828 of doorbell 106) at step2008, doorbell 106 may detect such placement of package PL at step 2010.As another example, in response to requesting that deliverer DL deliverpackage PL to a neighboring environment (e.g., to a next door neighborof environment 100 that may also be equipped with a smart doorbell) atstep 2008, doorbell 106 of environment 100 may detect a confirmatoryresponse provided by deliverer DL that the request will be followed(e.g., directly from deliverer DL at a user interface component 812/844of doorbell 106 or from deliverer device 266 via path 107 at acommunications component 862 of doorbell 106) or a confirmatorycommunication by a smart device of the neighboring environment that mayconfirm receipt of the package). Any suitable action of deliverer DLand/or of package PL may be detected or otherwise received by anysuitable component of environment 100 and/or of system 164 at step 2010,where such detection may enable system 164 to update system-informationabout the status of the attempted delivery (e.g., successfully deliveredat front door 186, successfully delivered to neighbor ABC, to bere-delivered at time XYZ, etc.). Alternatively or additionally, adeliverer DL may communicate with system 164 at step 2010 via anysuitable communication enabled by a smart device of environment 100accessible by deliverer DL (e.g., via gestures at doorbell 106, as maybe described above with respect to smart device 104, via touch input viaa touch user interface, audible spoken commands, etc.) and/or via anysuitable communication enabled by system 164 and deliverer device 266.

At step 2012, process 2000 may include communicating with at least oneof the user and the visitor (e.g., the deliver) based on the detectedact of step 2010. Doorbell 106 and/or any other smart device ofenvironment 100 may be configured to confirm detection of an action ofdeliverer DL and/or package PL with deliverer DL (e.g., by communicatingany suitable confirmation information directly to deliverer DL or todelivery device 266 via doorbell 106 or to delivery business 228 viasystem 164 of platform 200). Alternatively or additionally, doorbell 106and/or any other component of environment 100 and/or system 164 may beconfigured to confirm detection of an action of deliverer DL and/orpackage PL with a user of environment 100 (e.g., by communicating anysuitable confirmation information to the user via any suitable smartdevice or personal device of the user, similarly to any communication ofstep 2006). This may enable deliverer DL and/or the user to remainupdated with respect to the current status of the attempted delivery asdetermined by environment 100 of system 164 (e.g., successfullydelivered at front door 186, successfully delivered to neighbor ABC, tobe re-delivered at time XYZ, etc.). Such communication of step 2012 mayenable deliverer DL to know whether or not any action performed at step2010 was successfully detected by system 164, thereby removing any doubtabout the status of the delivery. This may also create an electronicreceipt or trail of the attempted delivery, not only for the particulardeliverer DL and/or a user of environment 100, but also any otherinterested party, such as a management system of a delivery entity orfulfillment entity business 228. By such confirmation of delivery statusbeing electronically or otherwise generated by system 164 rather than bydelivery entity business 228, the confirmation may be considered evenmore reliable or leveraged in combination with any similar confirmationdata that may be generated by delivery business 228 (e.g., based onmanual entry into delivery device 266 by deliverer DL) to ensureaccurate delivery status is available to platform 200. By providingconfirmation data indicative of a detected delivery action to delivererDL (e.g., via doorbell 106) and/or to delivery entity business 228(e.g., via an API 210 of platform 200), system 164 may serve as asecondary or impartial source of information regarding the delivery ofpackages carried out by delivery entity business 228. This may increasethe efficiency and/or effectiveness of delivery entity business 228and/or may lower overhead costs (e.g., insurance costs) of deliveryentity business 228, as system 164 may provide a new source of accurateand real-time electronic data that may be made available to deliveryentity business 228 for use in managing its package delivery tasks whilealso not being as dependent on delivery data provided by its owndeliverers DL. Moreover, by providing confirmation data indicative of adetected delivery action to a user of environment 100 (e.g., via anysuitable system-user communication capability of platform 200), a usermay be able to have access to an up-to-date status of a package deliverywhile also being enabled to virtually communicate with a delivererduring a delivery attempt in a manner that is convenient and secure forthe user and the deliverer.

One or more of steps 2002-2012 of process 2000 may be repeated for aparticular delivery attempt of a particular package or for any othervisitor handling. For example, in response to analysis at step 2004 ofany package delivery information detected at step 2002, a user maycommunicate with the smart environment at step 2006 and that usercommunication may be shared with deliverer DL at step 2008, in responseto which an action of deliverer DL may be detected by the smartenvironment at step 2010 and that detected action may be communicatedback to the user at step 2012, in response to which the user may onceagain communicate with the smart environment at step 2006 based on thatcommunicated detected action, thereby repeating at least part of process2000. Therefore, process 2000 may support a virtual conversation betweendeliverer DL and a user or service 164 as an automated agent of theuser.

It is understood that the steps shown in process 2000 of FIG. 20 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

In some embodiments, communication of certain package information to auser at step 2006 may equip the user with the ability to decide how theuser may want the delivery attempt to be handled. For example, the usermay decide to go meet the deliverer at door 186 for personally receivingthe package, or the user may remotely instruct the deliverer to leavethe package at a certain location via a communication path supported byenvironment 100 (e.g., via doorbell 106 and any other suitable device)such that the user may actively determine at least a portion of thefeedback that may be provided to the deliverer at step 2008.Alternatively, communication of certain package information to a user atstep 2006 may not be successfully received by a user in time for theuser to effectively respond for immediate use by system 164, or suchcommunication may not even be attempted (e.g., if the user is known bysystem 164 to be on vacation or otherwise or otherwise in ado-not-disturb mode where system 164 may determine not to contact theuser). In such embodiments, system 164 may be configured to determineand generate the feedback provided to the deliverer at step 2008 withoutany active input from the user. Such feedback may instead beautomatically determined based on inferences or rules of platform 200(e.g., system 164) and/or any restrictions that may be applicable to theparticular delivery (e.g., user signature required). For example,feedback provided at step 2008 may include an instruction for delivererDL to simply leave package PL at door 186 or to deliver package PL to aneighbor or to re-attempt the delivery at another time that may bespecified (e.g., a time that may be determined by system 164 as when anappropriate system user is expected to be available at environment 100for receiving a delivery). However, if a signature or any other suitabletype of acknowledgment of receipt of the package is required in order tocomplete delivery (e.g., as may be detected through the packageinformation detected and analyzed at steps 2002 and 2004), feedbackprovided at step 2008 by doorbell 106 may include certain data that maysatisfy that receipt acknowledgment requirement. For example, system 164may have access to any suitable trusted security information that mayalso be known by or validated by delivery business 228, whereby use ofsuch information by system 164 within feedback provided to deliverer DLat step 2008 may be received and confirmed by delivery business 228 asan acceptable form of waiver of responsibility or acknowledgment suchthat deliverer DL may be able to leave package PL at environment 100without actively receiving a signature of a user. For example, doorbell106 may present an authorization code (e.g., in plain text, as anysuitable code, or encrypted forms) on a user interface (e.g., on adisplay 830) as at least a portion of feedback at step 2008 and mayprompt deliverer DL to use deliverer device 266 to record, scan,photograph, or otherwise acquire the authorization code forauthentication and acceptance (e.g., as a detectable act at step 2010).Once the authorization code has been acquired and accepted by delivererDL, doorbell 106 may be operative to then instruct deliverer DL withrespect to where to leave package PL.

Communication between deliverer DL and a system user of system 164 mayinclude various types of conversation types. For example, in someembodiments, deliverer DL may specifically dictate when and how packagePL will be delivered. As just one such example, in response to system164 providing feedback to deliverer DL at step 2008 indicative of thefact that a user of environment 100 is not available to activelycommunicate with deliverer DL for facilitating completion of thedelivery, deliverer DL may communicate information to system 164 (e.g.,via doorbell 106) at step 2010 that may be indicative of the fact thatdeliverer DL is going to return package PL to a suitable pick-uplocation (e.g., distribution center DC of business 228) and that packagePL will be available at that location for pick-up by the user at acertain time. In response to such a communication from deliverer DL,system 164 may confirm receipt of that information to deliverer DLand/or may share such information with a user at step 2012. Such asituation may enable the user to be informed of the pick-up status ofthe package PL in real-time or as soon as the user is able to receivesuch a communication from system 164, thereby allowing the user toconveniently swing by that pick-up location to retrieve package PL onthe user's way home to environment 100. As opposed to conventionalpractice where a deliverer leaves a paper notice on a user's front doorindicating that the user missed the delivery attempt and that the usermust bring that paper notice to the pick-up center to retrieve thepackage, system 164 may immediately and automatically share suchnotification information with a user electronically (e.g., via e-mail ortext messaging or any other suitable system communication with the user)such that the user need not waste time by driving home to receive apaper notice only to turn right around and drive to the pick-up locationto retrieve the package). Such interaction between deliverer DL andsystem 164 (e.g., via doorbell 106) and such interaction between system164 and a system user may not only increase the convenience for theuser, but may also increase the efficiency of deliverer DL (e.g., bysaving paper notices and removing doubt as to whether the notice will bereceived by the user). Moreover, the automated communication of suchnotice information may be provided to a system user without requiring oreven allowing direct communication between deliverer DL and the user,thereby enabling system 164 to remain a custodian of certain contactinformation and whereabouts information of the user.

As another example, communication between deliverer DL and a system userof system 164 may include two-way communication. As mentioned, areal-time virtual two-way conversation between a user and a deliverer DLat doorbell 106 may be enabled by system 164. For example, a user maycommunicate a request to system 164 at step 2006 (e.g., “I am unable tocome to the door to sign for the package, what are my options?”) thatmay then be provided by system 164 to deliverer DL at step 2008 (e.g.,relayed as audio data from an audio sensing device at the user to audiooutput data from doorbell 106), in response to which deliverer DL mayprovide a response with one or more options for the user (e.g., “you cansign for the package at a designated pick-up location after 5 pm todayor a neighbor can sign for the package now on your behalf”) that may bedetected by system 164 (e.g., doorbell 106) at step 2010 and relayed tothe user at step 2012, after which the user may again communicate todeliverer DL with his decision.

Alternatively, a delayed response virtual conversation between a userand a deliverer DL may be enabled by system 164. For example, system 164may communicate to deliverer DL (e.g., via doorbell 106) at step 2008that a user of environment 100 is not available to actively communicatewith deliverer DL for facilitating completion of the delivery. Inresponse to such feedback, deliverer DL may communicate information tosystem 164 (e.g., via doorbell 106) at step 2010 that may be indicativeof the fact that deliverer DL will re-attempt to deliver package PL atenvironment 100 tomorrow. In response to detection of such acommunication from deliverer DL, system 164 may confirm receipt of thatinformation to deliverer DL and may share such information with a userat step 2012 (e.g., automatically or immediately after such detection).However, at some later time that same day (e.g., after deliverer DL andpackage PL have left environment 100), a system user may actually digestthat information as shared with it by system 164. In response thereto,as opposed to allowing deliverer DL to re-attempt delivery of package PLat environment 100 the following day as currently planned, the user maywish to retrieve package PL from delivery business 228 that evening atdispatch center DC or the user may wish for deliverer DL to deliverpackage PL to the user's office rather than to environment 100 or anyother suitable change to the currently planned delivery strategy.Therefore, system 164 may be configured to enable the user to share sucha desire with delivery business 228 for systematically altering thedelivery strategy. For example, system 164 may be operative to providean intuitive application or user interface (e.g., on the user's device166 or via any smart device of environment 100) that may enable a userto select from any available options for altering the delivery strategy,where such options may be known or otherwise determined by system 164based on the package information detected at steps 2002/2004 and/orbased on any other suitable information that may be made available tosystem 164 (e.g., from delivery business 228 via an API 210 orotherwise)). A user-selected option may then be automaticallycommunicated from system 164 to delivery business 228 for updating theplanned delivery strategy of package PL, thereby increasing theefficiency and/or convenience of the delivery process.

Various types of feedback may be provided to deliverer DL by system 164(e.g., via doorbell 106) at step 2008 and, responsive thereto, delivererDL may commit various types of acts that may be detected by system 164(e.g., via doorbell 106) at step 2010 for advancing the attempteddelivery of package PL. In some embodiments, platform 200 (e.g.,environment 100 and/or system 164) may be configured to enable securedrop-off of package PL by deliverer DL at environment 100 when a systemuser is unable to physically receive package PL from deliverer DL atenvironment 100 (e.g., when no user is at environment 100 or when a useris at environment 100 but currently unavailable for active packagereceipt (e.g., when the user is sleeping or otherwise pre-occupied orotherwise unfit to meet deliverer DL)). Certain steps may be taken bysystem 164 and/or certain features of environment 100 may be enabled soas to increase the security and reliability of such an “unsupervised”drop-off, otherwise such a drop-off may not be approved by deliverybusiness 228 (e.g., such an act may not meet insurance standards ofbusiness 228) or may not be of interest to a user (e.g., such an act maynot meet the security interests of the user). For example, platform 200(e.g., system 164 in conjunction with environment 100) may be configuredto enable a secure drop-off of a package, confirm such a drop-off,secure the package after such a drop-off, remind a user of the securedpackage, enable authorized recovery of the secured package, and confirmsuch authorized recovery for completing the delivery process.

In some embodiments, an unsupervised drop-off may be enabled whenenvironment 100 is configured with an ability to receive and retainpackage PL in a secure location that may be trusted by both deliverer DLand a system user. For example, a certain secure area of environment 100may be temporarily made accessibly by system 164 to deliverer DL (e.g.,by feedback at step 2008) such that deliverer DL may deposit package PLwithin that secure area (e.g., at step 2010) for later retrieval by atrusted system user (e.g., the intended recipient). Any suitable securearea may be provided by environment 100 for this purpose. As oneexample, structure 150 may include a lobby (not shown) just beyond entrypoint door 186 that itself may be separated by the remainder ofstructure 150 by another locked door, and system 164 may be configuredto temporarily unlock door 186 (e.g., via smart doorknob 122) forgranting deliverer DL temporary access to that lobby for depositingpackage PL therein. Such a lobby may be a shared lobby amongst multipledistinct tenants (e.g., a shared lobby of a multi-residence apartmentbuilding). In such embodiments, the lobby may include an area that mayotherwise be selectively accessible to mailmen (e.g., via a shared keythat Postal Service workers often times are equipped with in urban areaswhere large apartment buildings are common). Such temporary access asmay be granted by system 164 in response to suitable detection andanalysis (e.g., at steps 2002 and 2004) may overcome the need forcertain deliverers to carry around one or more master keys for certainneighborhoods or apartment buildings, which may also reduce securityconcerns for the building while increasing the efficiency andeffectiveness of deliverers to securely deposit packages in areas of anenvironment 100 that have at least a certain amount of security providedto it (e.g., due to a front door of a lobby that is generally accessibleonly by trusted occupants of the building and not by any visitorattempting to gain access to the building). As another example, a smartsafe (e.g., a smart appliance 113) may be provided by environment 100adjacent doorbell 106 external to structure 150 (e.g., smart appliance113 a), the interior of which may be selectively and temporarily madeaccessible to deliverer DL (e.g., via any suitable control signals ofsystem 164 or environment 100 (e.g., via doorbell 106)) for enablingplacement of package PL therein. Any such secure area (e.g., a lobby, asafe, etc.) of environment 100 that may be made temporarily accessibleto deliverer DL by system 164 (e.g., automatically through systemprocessing and control) may be securely monitored by platform 200 duringsuch temporary access in order to ensure that deliverer DL positionspackage PL in that area and/or to ensure that nothing is removed fromthat area during the period of that temporary access. One or moresensing components 828 of doorbell 106 or of any other smart device ofenvironment 100 may be configured to at least partially carry out suchmonitoring (e.g., a sensing component within the secure area or externalto the secure area but that may sense activity within the secure areaand/or at the temporarily accessible opening to the secure area may beactivated and/or enhanced (e.g., by platform 200) during such temporaryaccessibility for securely monitoring the activity of deliverer DLduring that accessibility). Additionally or alternatively, one or moreoutput components of doorbell 106 or of any other smart device ofenvironment 100 may be configured to at least partially indicate todeliverer DL where and how to deposit the package securely.

System 164 may require that a certain level of trust be achieved betweenplatform 200 (e.g., environment 100 and/or system 164) and deliverer DLbefore enabling such temporary access to such a secure area ofenvironment 100. For example, certain package delivery data may beretrieved and analyzed at steps 2002 and 2004 prior to enabling such an“unsupervised” drop-off, such as specific identification data of theparticular deliverer DL and/or of the particular package PL at doorbell106 that system 164 may be able to confirm or cross-check with a trusteddelivery business 228 (e.g., via an API 210 of platform 200 betweensystem 164 and business 228). Therefore, system 164 may confirm theidentity of deliverer DL and/or package PL based not only onidentification data that may be provided to system 164 locally atenvironment 100 (e.g., via doorbell 106) but also on data that may beprovided to system 164 from business 228 remotely from environment 100(e.g., via an API 210), such that a visitor may not attempt to gainaccess to a secure area of environment 100 by fraudulently purporting tobe a deliverer associated with a trusted delivery entity business 228.Such confirmation by cross-referencing locally-obtaineddeliverer/package identification data with known or expected whereaboutsstatus data for a particular deliverer/package may be utilized by system164 for any suitable situation at steps 2002/2004 in order to improvethe security of an attempted package delivery.

Once a suitable level of trust is determined by system 164 for delivererDL and/or package PL such that system 164 may be configured to enable anunsupervised drop-off, system 164 may be operative to instruct delivererDL (e.g., via doorbell 106) how to carry out such an unsuperviseddrop-off. For example, doorbell 106 may be configured to audiblyinstruct deliverer DL as to where to find a secure drop-off area thatmay be made temporarily accessible to the deliverer for securing packagePL (e.g., via audio speaker 836 that may provide any suitable audiooutput, such as a verbal instruction to “open the safe just to the rightof the front door, place the package therein, and then close the safe”).Alternatively or additionally, doorbell 106 may be configured tovisually instruct deliverer DL as to where to find a secure drop-offarea that may be made temporarily accessible to the deliverer forsecuring package PL (e.g., via user interface 812 and/orprojector/display 830). During such instructing, system 164 may alsocontrol the secure area for enabling deliverer DL to have access thereto(e.g., by unlocking a door to a safe).

Once deliverer DL is instructed how/where to access a secure area andsuch a secure area is made temporarily accessible to deliverer DL (e.g.,at step 2008), system 164 may be configured to securely monitor thatsecure area during the period when the secure area is made accessible(e.g., by leveraging any suitable monitor sensing components 828 ofdoorbell 106 and/or any suitable sensing components of the secure areaitself or otherwise (e.g., any cameras that may be provided by a smartsafe appliance, etc.)). Such monitoring may be leveraged not only toconfirm that a particular package PL is secured within the secure areabut also to confirm that nothing is removed from the secure area. Forexample, one or more sensors of environment 100 may be configured todetect label ID or any other suitable identifier of package PLintermittently and/or continuously during the process of placing packagePL within the secure area such that system 164 may detect and confirmthat package PL has been positioned with the secure area (e.g., steps2010 and 2012). Additionally or alternatively, one or more sensors ofenvironment 100 may be configured to monitor the access point of such asecure area continuously during the process of placing package PL withinthe secure area such that system 164 may confirm that nothing is removedfrom the secure area. Such confirmation of proper drop-off of package PLmay be shared with delivery entity business 228 by system 164 (e.g., viaAPI 210) and/or with deliverer DL (e.g., via doorbell 106) and/or with asystem user (e.g., via a user device 166 or any suitable smart device).Once the positioning of package PL has been confirmed within the securearea, system 164 may be configured to terminate the accessibility to thesecure area (e.g., by locking the door to the safe).

If no physically distinct secure area (e.g., safe or lobby) is availableto environment 100, system 164 may enable proper drop-off of package PLby designating a certain area of environment 100 as an area at whichpackage PL may be left and adequately securely monitored by system 164(e.g., doorbell 106). For example, at step 2008, rather than instructingdeliverer DL towards a safe or lobby that may be temporarily madeaccessible to deliverer DL for depositing package PL, system 164 mayleverage doorbell 106 or any other suitable smart device of environment100 to instruct deliverer DL towards an open area at which deliverer DLmay deposit package PL. As shown in FIG. 1, one or more components ofdoorbell 106 (e.g., projector 830) may be operative to generate anddisplay to deliverer DL a suitable deposit area AL at which package PLmay be dropped-off (e.g., light from projector 830 may shine to identifyarea AL on any suitable surface, or instructions provided on a displayuser interface 812 or audible instructions via audio speaker 836 mayotherwise enable deliverer DL to identify the location of area AL). AreaAL may be on a portion of a stoop or sidewalk or any other suitableportion of environment 100 adjacent door 186 or otherwise easilyaccessible to deliverer DL that may be securely monitored by environment100 (e.g., by one or more sensing components 828 of doorbell 106). Forexample, area AL may be within a sensing range of an NFC or RFID orcamera or any other suitable sensing component 828 of doorbell 106, suchthat when package PL may be positioned within area AL by deliverer DL,package PL may be securely monitored by one or more smart devices ofenvironment 100, which may ensure secure drop-off of package PL. Asanother example, area AL may not be proximate doorbell 106 but may be anarea that may be monitored by another smart device of environment 100(e.g., a smart device that may be coupled to outdoor lighting 114, whichmay be around a corner of structure 150 from front door 186, such thatother visitors to front door 186 may not obviously notice package PLthat has been deposited by deliverer DL for secure monitoring byenvironment 100). As with the deposit of package PL within any othersuitable secure area (e.g., a safe or lobby), system 164 may beconfigured to monitor and confirm the adequate deposit of package PL atarea AL with deliverer DL and/or delivery entity business 228 forfurthering the delivery attempt (e.g., such that deliverer DL mayconfidently leave package PL at environment 100). Any suitable smartdevice of environment 100 may provide and/or monitor such an area AL orany other secure area for use in unsupervised drop-off and monitoring ofa package PL.

Alternatively or additionally, system 164 may enable proper drop-off ofpackage PL by providing an accessory device that may be coupled topackage PL for enabling secure monitoring of package PL by system 164(e.g., doorbell 106). For example, at step 2008, rather than instructingdeliverer DL towards a safe or lobby that may be temporarily madeaccessible to deliverer DL for depositing package PL, system 164 mayleverage doorbell 106 or any other suitable smart device of environment100 to instruct deliverer DL to couple an accessory component 890 (e.g.,of doorbell 106 of FIGS. 8A-8C) to package PL and then to leave packagePL with accessory component 890 near doorbell 106 for secure monitoring.As shown in FIG. 1, accessory component 890 of doorbell 106 may becoupled to package PL (e.g., fastened, adhered, affixed, snapped, tiedto, rest on, or otherwise attached), where accessory component 890 maybe operative to communicate with or be detected by any othercomponent(s) of doorbell 106 (e.g., communications component 862 (e.g.,Bluetooth) and/or sensor component 828) or any other suitable componentsof environment 100 or platform 200 when coupled to package PL such thatplatform 200 may monitor the location and/or any other suitablecharacteristic(s) of package PL (e.g., based on the monitored locationand/or any other suitable characteristic(s) of accessory component 890).For example, accessory component 890 may be configured to include anysuitable sensing components (e.g., motion sensing components or anyother suitable sensing components as described above with respect tosensing components 828) that may detect movement or any other suitablecharacteristic of accessory component 890 and, thus, package PL whencoupled thereto, and such sensed characteristics may be communicated toor otherwise detected by any other component(s) of doorbell 106 and/orany other suitable smart device of environment 100 and, thus, system164. Alternatively or additionally, doorbell 106 and/or any othersuitable smart device of environment 100 may be operative to detect thelocation of accessory component 890 such that if package PL is movedafter deliverer DL leaves package PL (e.g., by an animal or wind orotherwise), doorbell 106 and/or any other suitable smart device ofenvironment 100 may be operative to track such movement for use infinding package PL for recovery. Such a physical coupling of package PLto a component of environment 100 (e.g., accessory 890 of doorbell 106)may increase the ability and/or effectiveness of system 164 to securelymonitor a package during and after an unsupervised drop-off. Accessorycomponent 890 may be reusable anytime a new package is to be depositedfor secure monitoring by doorbell 106 and/or any other suitable smartdevice of environment 100. As just one example, accessory component 890may be an RFID tag that may be communicatively coupled or otherwiseknown by another component of doorbell 106. Any movement of package PL(e.g., as may be detected through leveraging accessory component 890) atall or above a certain threshold may trigger one or more additionalsensing components of doorbell 106 or otherwise of environment 100 tomonitor package PL/component 890 so as to heighten the secure monitoringof package PL. Accessory component 890 may be operative to wirelesslycommunicate with other components of doorbell 106 and/or any othersuitable smart device of environment 100 and/or may communicate via awire 892 that may extend between accessory component 890 and othercomponents of doorbell 106. If wire 892 is cut or otherwise disrupted,additional heightened security may be enacted by system 164 to trackpackage PL. In some embodiments, a holder 891 of doorbell 106 and/or anyother suitable smart device of environment 100 may be selectively openedand closed (e.g., through electronic control of system 164) forselectively enabling accessory component 890 to be removed from theremainder of doorbell 106 and/or any other suitable smart device ofenvironment 100 for attachment to package PL.

Once package PL has been disposed in a secure area of environment 100 orotherwise disposed for secure monitoring (e.g., using accessorycomponent 890) by deliverer DL, system 164 may continue tointermittently or continuously monitor package PL and/or the secure area(e.g., area AL) to maintain the security of the dropped-off package. Asone example, environment 100 may be configured to continuously orintermittently monitor the position of dropped-off package PL, such asby detecting status data from accessory component 890 coupled to packagePL or by sensing package PL within area AL or by confirming that asecure area (e.g., a lobby or safe) has remained inaccessible sincedisposal of package PL therein. After any suitable monitoring period ofany suitable length during which the security of package PL has beenconfirmed by environment 100, system 164 may be configured tocommunicate such security status with any suitable entity, such asdelivery entity business 228 and/or any suitable user of environment 100(e.g., an intended recipient of package PL). However, if at any timeafter secure disposal of package PL by deliverer DL, environment 100detects any type of change in the status of package PL or of a securearea or component with which environment 100 may be securing package PL,any suitable sensing functionality of environment 100 may be activatedor enhanced and/or any suitable alarm or notification functionality maybe activated. For example, if any movement of package PL is detected byenvironment 100 (e.g., by a motion sensing component 828 of doorbell106), additional sensing components of environment 100 (e.g., a camerasensor 828 of doorbell 106) and/or other helpful components ofenvironment 100 (e.g., outdoor lighting 114) may be activated to senseadditional information about the status of package PL and/or itssurroundings (e.g., whether an animal or other entity may be movingpackage PL). Alternatively or additionally, in such instances, an alarmmay be activated and communicated within structure 150 (e.g., if anyoccupancy currently exists within structure 150) and/or outside ofenvironment 100 (e.g., at doorbell 106 and/or to any suitable lawenforcement entities 222 or delivery entity business 228 or users ofenvironment 100 for aid in securing package PL). When a package PL hasbeen deposited by deliverer DL for secure monitoring by environment 100,any suitable events may be monitored for enhancing the protection ofpackage DL, including, for example, detecting when any unknown user orvisitor may come within a certain distance of a secure area at whichpackage PL has been deposited. For example, doorbell 106 or any othersuitable portion of smart environment 100 that may be able to monitorpackage PL may be equipped with walkup-identification technology (e.g.,face recognition, RFID, ultrasonic sensors) that may “fingerprint” orcreate or otherwise have access to a “signature” for known users ofenvironment 100, such that, in operation, when a person who does notlive in the home or is otherwise not registered with the smart home orwhose fingerprint or signature is not recognized by the smart home“walks up” to package PL, environment 100 may provide an alarm and/ormay increase the protection of package PL by activating a new form ofpackage monitoring/securing (e.g., a more sensitive movement sensor withrespect to package PL).

As mentioned, when a package PL has been left by a deliverer DL atenvironment 100, system 164 may be configured to communicate informationindicative of that package deposit to any suitable entity (e.g., asystem user of environment 100 and/or delivery entity business 228 andthe like). Additionally or alternatively, system 164 may be configuredto send any suitable reminders at any suitable moment to a system useror delivery entity or other suitable entity that may keep such an entitymindful of the status of a package that has been left at environment 100but that has not yet been claimed by a system user. Such reminders maybe achieved via any suitable communication technique, such as e-mail,telephone, text message, alert via any suitable smart device (e.g., viaa user interface of a hazard device 104 within structure 150 or via auser interface 812 of doorbell 106 that may be easily identified by auser of environment 100 upon waking up within structure 150 or arrivingto door 186 of structure 150). As just one example, when a known systemuser of environment 100 arrives at structure 150 (e.g., at door 186),doorbell 106 may be operative to detect that arrival and, responsivethereto, communicate to that user that package PL has been recently leftby deliverer DL for user retrieval (e.g., an audible or textual messagevia an output component of doorbell 106 that may state “welcome homeuser X, a package PL was delivered by delivered by deliverer DL at timeY and is currently secured at location Z awaiting your retrieval”).Alternatively, a simple blinking light may be provided by doorbell 106(e.g., projector 830) when a package is awaiting user retrieval.

When a previously-deposited package PL is awaiting user retrieval (e.g.,from a secure area being monitored by environment 100), environment 100may be configured in various suitable ways for enabling secure retrievalof the package. In some embodiments, certain particular users may bedesignated by system 164 as authorized to retrieve a securely monitoredpackage PL. For example, an appropriately credentialed system userassociated with environment 100 generally and/or package PL specificallymay be enabled by system 164 to identify one or more particular peoplethat environment 100 may allow to retrieve package PL. In suchcircumstances, facial detection or other suitable “fingerprint” or“signature” detection capabilities of a smart device of environment 100may be leveraged to detect a particular user that system 164 may beconfigured to determine has been authorized (e.g., automatically or byrules-based inferencing techniques or by specific user designation,etc.) to securely retrieve package PL. Alternatively, certain entitiesmay be provided with a particular security PIN or other suitable codethat may be received by environment 100 (e.g., by doorbell 106) andconfirmed by system 164 as a trusted pass for securely retrievingpackage PL. For example, if an intended recipient of package PL is aknown system-user of environment 100 and that user receives acommunication (e.g., at step 2012) that deliverer DL has successfullyperformed a secure unsupervised drop-off of package PL in a secure areaof environment 100, that user may interface with system 164 (e.g., viapersonal device 166) in any suitable way for enabling another entity(e.g., a neighbor) to retrieve that package PL on his or her behalf(e.g., that communication received by the user may include a codegenerated by platform 200, whereby the user may share that code with anyentity for use by that entity at environment 100 for re-enablingaccessibility to the secure area of the smart environment for collectingthe disposed package). As one example, the user may create a securityclearance within system 164 (e.g., by sharing the identity of thatentity with system 164), such that when the entity is detected atenvironment 100 (e.g., at doorbell 106), environment 100 may beconfigured to share the location of the secured package PL with theentity and to at least temporarily grant access to that secured area forpackage retrieval. As another example, the user may instruct system 164to generate a security code that may enable access to the securelymonitored package, and the user may then share that security code withthe entity to retrieve the package (e.g., by e-mailing or otherwisecommunicating that code to the entity (e.g., via communicationtechniques of system 164)). As another example, system 164 may beoperative to define a particular period of time during which thesecurely monitored package may be accessible for retrieval by anyentity. For example, a system user may interface with system 164 (e.g.,via personal device 166) in any suitable way for defining a future timeperiod (e.g., between 5:00 and 5:15 pm this afternoon) during whichsystem 164 may be operative to alter certain security monitoringtechniques that may enable any entity to effectively retrieve thepackage PL. As just one example, although camera monitoring of thesecure area at which package PL has been deposited may continue throughthe defined time-period, an alarm or other security features may bedisabled during that time such that an entity may successfully retrievethe package without triggering any unnecessary enhanced security.Alternatively or additionally, automatic deduction may be utilized bysystem 164 for enabling environment 100 to safely allow retrieval of amonitored package PL when certain situations arise. For example, when aknown system user is detected by environment 100 within a thresholddistance of package PL and then package PL is concurrently moved fromthe secure area, then system 164 may not sound any alarms but may simplyallow the package to be retrieved and may communicate confirmation ofsuch retrieval along with any other suitable information (e.g., time anddate of the retrieval, identity of the detected system user associatedwith that retrieval, etc.) to any suitable entity (e.g., to therecipient user associated with package PL, deliverer entity business228, etc.) via any suitable communication capability of system 164. Asanother example, even if no entity is specifically detected when thepackage is retrieved, if door 186 is legitimately opened within acertain duration of time prior to or after such retrieval, then no alarmmay be generated and the retrieval may be communicated by system 164 toany appropriate target.

When a package PL is retrieved at environment 100 after being securelymonitored, system 164 may be configured to obtain any suitableinformation in order to confirm user receipt of the package and/or tootherwise appropriately complete the delivery process of that package.For example, depending on any delivery requirements for a particularpackage, as may be determined by system 164 during data detection and/oranalysis of steps 2002/2004, various data may be obtained by system 164during retrieval of package PL. In some embodiments, when packageretrieval is enabled, any suitable signature or confirmation of receiptaction may be collected or otherwise detected by system 164 from theretrieving entity (e.g., the intended recipient system user or aneighbor granted retrieval rights, as described above). For example,environment 100 may instruct the retrieving entity to communicate itsidentity to environment 100 (e.g., via a sensing component 828 or userinterface 812 of doorbell 106) or otherwise environment 100 may indicatethat an alarm will be sound. As another example, environment 100 mayrequire that a retrieving entity present the retrieved package at asuitable smart device of environment 100 or to any other suitablecomponent of system 164 within a suitable period of time after retrievalotherwise environment 100 may indicate that an alarm will be sound. Insuch embodiments, the retrieving entity may position the retrievedpackage PL in functional view of a sensing component of a smart deviceof system 164 (e.g., position label ID within a sensing area of asensing component 828 of doorbell 106 or within a sensing area of asensing component of any other smart device other than doorbell 106(e.g., a hazard device 104 of structure 150 or a personal device 166 orsmart environment device of the retrieving entity, which may be a userof a neighboring environment that is not environment 100 but that isalso a part of system 164)), such that system 164 may confirm thatpackage PL has been retrieved at a certain time and/or by a certainentity that may be in communication with system 164. Such sensedinformation by system 164 may be leveraged by system 164 to achieve acertain amount of trust with respect to the security of the retrievedpackage such that a confirmation communication may be sent (e.g., at aniteration of step 2012) to one or more suitable parties (e.g., anintended recipient system user and/or delivery entity business 228) toconfirm successful retrieval of package PL from a securely monitoredarea of environment 100, thereby enabling closure of that delivery. Suchdata may be invaluable to a delivery entity that may otherwise neverdetermine if/when a package left at a particular location was actuallyreceived by a trusted entity.

One, some, or all of the various sub-processes described above withrespect to enabling a secure delivery of a package by a deliverer to asystem user of environment 100 may provide for enhanced security data tobe collected and shared throughout the delivery. For example, at any oneor more of step 2002 (e.g., where information related to a packagedelivery attempt may be detected by environment 100), step 2004 (e.g.,where additional system information related to the delivery may beacquired and analyzed), step 2006 (e.g., where any suitable data may becommunicated between system 164 and any suitable system user to furtheran attempted package delivery), step 2008 (e.g., where any suitablefeedback or instructions may be communicated by system 164 to adeliverer of the package or to a potential retriever of the package, orany other suitable visitor (e.g., at doorbell 106)), step 2010 (e.g.,where any suitable action or characteristic of the package or of adeliverer or of any other suitable visitor may be detected during anattempted package delivery), and/or step 2012 (e.g., where any suitableconfirmation of a detected action may be communicated by system 164 toan entity at environment 100 (e.g., at doorbell 106) or to any othersuitable entity (e.g., a system user and/or a delivery entity business228) during an attempted package delivery) of process 2000, any suitabledata may be collected, stored, processed, or otherwise analyzed byplatform 200 (e.g., by environment 100 and/or system 164) and sharedwith any suitable entity for enhancing the security and/or convenienceof an attempted package delivery.

Time stamps, specific identification of packages and/or visitors (e.g.,deliverers) and retrievers, specific actions of packages and/or ofvisitors (e.g., deliverers) and/or of retrievers, and the like may besensed, collected, stored, and shared by environment 100 and/or system164 with any suitable entities, such as system users, other smartenvironments, trusted third party entities (e.g., businesses 228), andany other suitable data targets. Such data collection and sharing mayreduce any insurance liability previously held by a delivery entitybusiness 228 that may otherwise have had to attempt delivery of apackage multiple times due to an environment being unable to securelyreceive the package during an initial attempt and/or have left a packageat an environment in an insecure fashion (e.g., on a front stoop of auser without any smart devices of the environment being operative tosecurely monitor the package until it was appropriately retrieved,etc.). As another example, such data collection and sharing may enablebetter tracking of the handling of a package (e.g., in order todetermine when during the delivery process the package may have beenruined (e.g., for fragile package contents)), where one or more sensorsof environment 100 may, for example, continuously or intermittentlymonitor and share movement data of a package as the package is depositedat environment 100 by deliverer DL, as the package is secured prior toretrieval, and/or as the package is retrieved. This also may enableaccurate location and time tracking of deliverer DL and package PL bydetecting and logging data at environment 100 (e.g., by enablingdeliverer DL to “check-in” to environment 100 and/or “check-out” fromenvironment 100). Moreover, rather than relying on delivery informationgenerated and reported by deliverer DL (e.g., via data entered intodelivery device 266 by deliverer DL during an attempted delivery),system 164 may generate and report its own data that may be compared toand/or relied on by delivery entity business 228 instead of any datagenerated by deliverer DL, as system data 164 (e.g., as may be generatedby doorbell 106) may be trustworthy as an impartial data source (e.g.,as compared to a deliverer who may enter incorrect data to inflate hisefficiency and/or hide his inefficiencies).

By enabling communication between system 164 and delivery entitybusiness 228, status information about deliverer DL known to deliveryentity business 228 may be shared with system 164, whereby system 164may leverage a known status of environment 100 (e.g., modes,current/future occupancy data, current functionality of certain smartdevices, etc.) in combination with the shared status information aboutdeliverer DL to enhance the handling of a potential delivery atenvironment 100 by deliverer DL. As one example, delivery entitybusiness 228 may communicate to system 164 an estimated time of arrivalfor deliverer DL at environment 100 such that system 164 may communicatewith smart environment 100 in order to accommodate the arrival ofdeliverer DL (e.g., by turning on outdoor lighting 114 to enable safeand easy access to door 186 by deliverer DL and/or by turning off anysprinkler system smart device (not shown) that may otherwise impair thedeliverer's ability to easily bring package PL to door 186 (e.g., toprevent package PL from getting wet)). Additionally or alternatively, asanother example, delivery entity business 228 may communicate to system164 information identifying the deliverer DL in order to improve theability of environment 100 to detect the expected deliverer (e.g., byenhancing certain sensing functionality of one or more smart devices(e.g., pre-loading a picture of the expected deliverer to increaseefficiency of facial detection or turning on additional sensors that mayspecifically attempt to detect characteristics of the expected visitor,etc.)). Additionally or alternatively, as another example, deliveryentity business 228 may communicate to system 164 informationidentifying the contents of package PL (e.g., contents requiring a coldenvironment to stay fresh) in order to improve the ability ofenvironment 100 to appropriately receive the expected package (e.g., byturning on a cooling feature of a secure area (e.g., an air conditionerwithin the safe area of safe appliance 113 a)). Such communication mayalso enhance convenience of the delivery process for a recipient user orany other suitable user of environment 100, as system 164 may beoperative to continuously keep that user up-to-date with respect to thedelivery status and security of package PL while enabling that usercontrol over how that package may be delivered, deposited, and/orretrieved. For example, in response to system 164 receiving statusinformation from delivery entity business 228 about an upcoming planneddelivery to environment 100, system 164 may be operative to analyze thatstatus information (e.g., in combination with any current modes or otherinformation associated with environment 100) and may then automaticallycommunicate certain information to a system user about that planneddelivery (e.g., via any suitable smart device or personal user device),such that the system user may update any suitable mode settings ordefine a new mode or otherwise provide instructions to system 164 forhandling the planned delivery once the deliverer and/or package arephysically detected at environment 100. Additionally or alternatively,by enabling communication between system 164 and delivery entitybusiness 228, status information about environment 100 and/or systemusers associated therewith known to system 164 may be shared withdelivery entity business 228 and/or deliverer DL. As mentioned above(e.g., with respect to FIG. 19), a status of environment 100 indicativethat environment 100 is in a do-not-disturb mode for times X, Y, and Z,as may be shared by system 164 with delivery entity business 228 (e.g.,after status information about deliverer DL known to delivery entitybusiness 228 may be shared with system 164), may enable delivery entitybusiness 228 to more efficiently schedule attempted deliveries toenvironment 100 (e.g., to adjust a planned and/or current deliveryattempt). As another example, a status of environment 100 indicative ofthe ability of smart environment 100 to securely monitor a packageduring an “unsupervised” drop-off, as may be shared by system 164 withdelivery entity business 228 (e.g., after status information aboutdeliverer DL known to delivery entity business 228 may be shared withsystem 164), may enable delivery entity business 228 to more confidentlydeliver a package to environment 100 even if a do-not-disturb status ofenvironment 100 may not be known.

FIG. 21 is a flowchart of an illustrative process 2100 for handling avisitor. For example, process 2100 may be for enhancing delivery of apackage by a delivery service-provider entity, which may include adelivery computing system, to at least one smart environment, which mayinclude at least one smart device. At step 2102, process 2100 mayinclude determining, at a server, environment status data of the atleast one smart environment based on sensor data collected from the atleast one smart device located in the at least one smart environment. Atstep 2104, process 2100 may include exposing, by the server, at leastone application program interface for access by the delivery computingsystem of the delivery service-provider entity to identify at least aportion of the determined environment status data for the purpose ofenhancing the delivery of the package by the delivery service-providerentity to the at least one smart environment.

It is understood that the steps shown in process 2100 of FIG. 21 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 22 is a flowchart of an illustrative process 2200 for handling avisitor. For example, process 2200 may be for delivering a package. Atstep 2202, process 2200 may include acquiring, at a server, packageidentification information associated with the package. Then, at step2204, process 2200 may include accessing, at the server using theacquired package identification information, status informationassociated with a smart environment. Then, at step 2206, process 2200may include affecting, with the server, the delivery of the packagebased on the accessed status information.

It is understood that the steps shown in process 2200 of FIG. 22 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 23 is a flowchart of an illustrative process 2300 for handling avisitor. For example, process 2300 may be for handling a deliveryattempt of a package provided by a deliverer at a smart environment thatincludes a number of smart devices. At step 2302, process 2300 mayinclude detecting package information associated with the packageprovided by the deliverer at the smart environment using an entrywayinterface smart device of the smart devices. At step 2304, process 2300may include analyzing the detected package information using a computingsystem that is communicatively coupled to the entryway interface smartdevice. Process 2300 may also include at least one of step 2306 and step2308. Step 2306 may include automatically communicating with a firstsmart device of the smart devices using the computing system based onthe analyzing. Step 2308 may include automatically providing feedbackfrom the computing system to the deliverer via a second smart device ofthe smart devices based on at least one of the analyzing and thecommunicating.

It is understood that the steps shown in process 2300 of FIG. 23 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 24 is a flowchart of an illustrative process 2400 for handling avisitor. For example, process 2400 may be for handling a deliveryattempt of a package provided by a deliverer at a smart environment thatincludes a number of smart devices. At step 2402, process 2400 mayinclude detecting package information associated with the packageprovided by the deliverer at the smart environment using an entrywayinterface smart device of the smart devices. At step 2404, process 2400may include, in response to the detecting, determining a current mode ofthe smart environment using a computing system that is communicativelycoupled to the entryway interface smart device. At step 2406, process2400 may include analyzing the detected package information incombination with at least one setting of the determined current modeusing the computing system. At step 2408, process 2400 may include, inresponse to the analyzing, automatically using the computing system forone of communicating delivery information indicative of the package to asystem user associated with the smart environment via a first smartdevice of the smart devices and communicating feedback information tothe deliverer via a second smart device of the smart devices.

It is understood that the steps shown in process 2400 of FIG. 24 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 25 is a flowchart of an illustrative process 2500 for handling avisitor. For example, process 2500 may be for securely handling adelivery of a package by a deliverer at a smart environment thatincludes a number of smart devices. At step 2502, process 2500 mayinclude detecting delivery information associated with at least one ofthe package and the deliverer at the smart environment using at least anentryway interface smart device of the smart devices. At step 2504,process 2500 may include analyzing the detected delivery informationusing a computing system that is communicatively coupled to at least theentryway interface smart device of the smart devices. At step 2506,process 2500 may include, in response to the analyzing the detecteddelivery information, automatically providing drop-off feedback from thecomputing system to the deliverer via at least a first smart device ofthe smart devices, wherein the providing the drop-off feedback mayinclude enabling accessibility to a secure area of the smartenvironment. At step 2508, process 2500 may include, in response to theproviding the drop-off feedback, detecting a drop-off action using atleast a second smart device of the smart devices. At step 2510, process2500 may include analyzing the detected drop-off action using thecomputing system. At step 2512, process 2500 may include, in response tothe analyzing the detected drop-off action, disabling the accessibilityto the secure area.

It is understood that the steps shown in process 2500 of FIG. 25 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 26 is a flowchart of an illustrative process 2600 for trackingdelivery of a package by a delivery service-provider entity thatincludes a delivery computing system to a smart environment thatincludes at least one smart device. At step 2602, process 2600 mayinclude obtaining, at a server from the at least one smart devicelocated at the smart environment, delivery data collected from the smartenvironment by at least one sensor of the at least one smart device,wherein the delivery data is associated with the delivery of thepackage. At step 2604, process 2600 may include sharing, by the serverwith the delivery computing system of the delivery service-providerentity, at least a portion of the delivery data for the purpose oftracking the delivery of the package.

It is understood that the steps shown in process 2600 of FIG. 26 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 27 is a flowchart of an illustrative process 2700 for trackingdelivery of a package by a delivery service-provider entity to a smartenvironment that includes at least one smart device. At step 2702,process 2700 may include obtaining, at a delivery computing system ofthe delivery service-provider entity, deliverer data from a personaldevice of a particular deliverer of the delivery service-providerentity, wherein the deliverer data is associated with the delivery ofthe package. At step 2704, process 2700 may include obtaining, at thedelivery computing system of the delivery service-provider, deliverydata from the at least one smart device of the smart environment,wherein the delivery data is associated with the delivery of thepackage. At step 2704, process 2700 may include analyzing, with thedelivery computing system of the delivery service-provider, at least aportion of the obtained deliverer data in combination with at least aportion of the obtained delivery data for the purpose of tracking thedelivery of the package.

It is understood that the steps shown in process 2700 of FIG. 27 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 28 is a flowchart of an illustrative process 2800 for handling avisitor. For example, process 2800 may be for handling a deliveryattempt of a package at a smart environment that includes a number ofsmart devices by a deliverer of a delivery service-provider entity thatincludes a delivery computing system. At step 2802, process 2800 mayinclude obtaining, at an environment computing system from the deliverycomputing system, deliverer data associated with the status of thedelivery attempt. At step 2804, process 2800 may include obtaining, atthe environment computing system from at least one sensor of at least afirst smart device of the smart devices, environment data associatedwith the status of the smart environment. At step 2806, process 2800 mayinclude analyzing, with the environment computing system, at least aportion of the obtained deliverer data in combination with at least aportion of the obtained environment data. Process 2800 may also includeat least one of step 2808 and step 2810. At step 2808, process 2800 mayinclude automatically instructing the delivery computing system toadjust the delivery attempt using the environment computing system basedon the analyzing. At step 2810, process 2800 may include automaticallyadjusting the functionality of a particular smart device of the smartdevices using the environment computing system based on the analyzing.

It is understood that the steps shown in process 2800 of FIG. 28 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Smart doorbell 106 of environment 100 may be configured to include anysuitable combination of any of the components described above so as toappropriately interact with other smart devices of environment 100 andservices platform 200 and any suitable user thereof, such as usersregistered with or associated with environment 100 (e.g., owners,occupants, etc.) and/or users visiting environment 100 (e.g., packagedeliverers, friends, solicitors, strangers, and would-be-thieves). Inaddition to or as an alternative to increasing the convenience andefficiency of package delivery, increasing the traceability of packagedelivery, and/or enabling secure package delivery, such a smart doorbell106 may be a visitor interface or entryway interface device that may beoperative to detect and control or otherwise handle a person's approachto or departure from a location (e.g., an outer door 186 of structure150 of environment 100), announce such an approach or departure, enhanceconventional doorbell functionality for both residents and visitors,control settings on a security system, detect environmental data andother useful data for environment 100 and system 164, and the like.Therefore, doorbell 106, on behalf of smart environment 100 and system164 and users associated therewith, may act as a security custodian toenvironment 100 with respect to any visitors that may approachenvironment 100, where the behavior of such custodial action may bebased on any suitable information of system 164, including any suitablemodes or settings of any suitable portion or entirety of smartenvironment 100 and/or of a user of such a smart environment.

Any suitable type of mode, such as a “do-not-disturb mode,” may be setfor a particular system user U, for a particular environment 100, and/orfor at least a particular portion of a particular environment 100,indefinitely or for any suitable length of time that may start at acurrent or future moment. Such a mode may be determined based on anysuitable information generated by or inferred from any suitable data ofenvironment 100 and/or user U available to platform 200. As just oneparticular example, as mentioned above, system 164 may use trackinginformation to make inferences regarding the current and/or futureoccupancy of home environment 100 and/or the current and/or futurelocation of a user U (e.g., at environment 100, like user UL of FIG. 1and Husband 1718 of FIG. 17, or away from environment 100, like user URof FIG. 1 and Wife 1714 of FIG. 17), where such inferences may be usedto define a current or future mode of environment 100 and/or of a userU. As another example, platform 200 may leverage sensed data from one ormore sensors of one or more smart devices of environment 100 to at leastpartially define a particular current or future mode for environment 100(e.g., programs/algorithms may assess detected sounds, vibrations, andmovements to determine whether the home occupants are home or away,sleeping or awake, etc.). Alternatively or additionally, a user U mayactively select or otherwise at least partially define a particularcurrent or future mode for environment 100 or a system user by manuallycommunicating mode selection data to system 164 (e.g., via direct userinteraction with a user device 166 and/or any suitable smart device ofsystem 164 accessible by the user). Various determinations of variousfactors may combine to enable a particular mode for a particular systemuser and/or a particular system environment or specific portion thereof(e.g., no occupancy within environment 100, lack of user movement withina darkened bedroom, etc.), and various settings may be enabled or madeavailable during that enabled mode (e.g., turn on lights withinenvironment 100 at a certain time of day to mimic occupancy, preventdisruptive communication of an attempted delivery at environment 100 toa darkened room thereof, etc.).

For example, a do-not-disturb mode for environment 100 generally mayindicate that environment 100 may not be willing or able to accept atleast certain package deliveries (e.g., deliveries requiring aconfirmation of receipt user signature by a particular user or anyuser). Such a mode may be manually set by an appropriate user (e.g., auser with appropriate management rights for environment 100 using anysuitable device 166 or interaction with any other suitable smart deviceof environment 100) for any suitable reason, such as when the user doesnot want to greet a visitor (e.g., if the user is feeling under theweather or going to sleep) or when the user will not be at environment100 (e.g., when the user is going on vacation or leaving a babysitter athome with a child). Alternatively, platform 200 may be operative tocollect any suitable information from one or more smart devices ofenvironment 100 and may make inferences in order to automatically set ado-not-disturb mode for environment 100 (e.g., based on sensed occupancydata and sensed movement data). When a current mode of environment 100is set to a “do-not-disturb” mode, various suitable settings may beapplied by system 164 in response to various suitable detectedactivities. As just one example, in response to a visitor (e.g.,deliverer DL with or without a package PL) being detected by doorbell106 of environment 100 when environment 100 is in a do-not-disturb mode,system 164 may be operative to automatically initiate a particularaction, such as communicating to the detected visitor (e.g., via userinterface 812 or audio speaker 836 of doorbell 106) that it is not anappropriate time to visit environment 100 and to come back at a latertime. Additionally or alternatively, as mentioned above, informationindicative of when environment 100 may be associated with ado-not-disturb mode may be a type of current status information that maybe shared with or otherwise made accessible to a facilitator entity(e.g., a delivery business 228) for increasing the efficiency of packagedelivery (e.g., delaying delivery until after a do-not-disturb mode isover) and/or of any other activity that may include a visitorinteracting with environment 100. Such information may be handled withsensitivity so as to not be leveraged for sinister purposes (e.g., for athird party to detect when an environment 100 is in a do-not-disturbmode so as to assume no one is home and attempt a robbery of thepremises). For example, communication to a detected visitor of such amode may simply indicate that an occupant of environment 100 isotherwise preoccupied at the moment (e.g., “on an important telephonecall” or “putting the baby to sleep”) and does not wish to interact withthe detected visitor, whether or not there is in fact an occupantcurrently at environment 100, where such a communication may beautomatically updated or selected by system 164 as may be appropriatefor a particular time of day (e.g., communicate that an occupant is“sleeping” if after 10:00 pm or that an occupant is “in an importantmeeting” if during regular business hours, etc.) or for a particularvisitor (e.g., communicate that an occupant is “not available” when aknown visitor is detected or “on an important telephone call” when anunknown visitor is detected, etc.). As another example, system 164 maybe configured to share information about a do-not-disturb mode of anenvironment 100 or any other suitable status information of environment100 or a user thereof with a third party, such as a facilitator of apackage delivery, only when certain data is accessible to that thirdparty. For example, system 164 may only share such status informationwhen a facilitator entity queries system 164 with respect to particularunique package identification information (e.g., such information as maybe generated at step 1906 and linked with a particular ordered package).Certain facilitator entities (e.g., Federal Express) may be trusted andenabled by platform 200 to interpret such unique package identificationinformation for appropriately querying system 164 about such statusinformation, and whereby system 164 may be configured to only share suchstatus information when queried by a trusted entity (e.g., when theunique package identification information is leveraged by an entitytrusted by system 164 and not just when any entity has access to therecipient and/or location data of the ordered package).

Various types of data may be detected and analyzed for potentiallyaffecting a current or future mode of a system user and/or at least aportion of a smart environment. For example, user location informationwith respect to the boundaries of environment 100 or a portion thereof(e.g., with respect to a particular room of structure 150) may beleveraged for determining a system mode. If no user is detected within aparticular room of environment 100, then that room may be put into ado-not-disturb mode such that no information is fruitlessly attempted tobe communicated to an occupant of that room (e.g., via any smart devicesof that room). As another example, if an occupant is detected within aparticular room of environment 100, but that occupant is detected tohave not moved more than a particular threshold amount in a particularamount of time and/or a brightness value of light is below a particularthreshold in that room, then it may be inferred that the occupant isasleep and that room may be put into a do-not-disturb mode such that noinformation is communicated to an occupant of that room (e.g., via anysmart devices of that room) to prevent the occupant from being awoken.Additionally or alternatively, any other suitable activity of a user maybe detected by one or more smart devices for at least partiallydetermining a mode of the user and/or environment 100. For example,platform 200 may determine that a user is conducting a video conferencecall with business partners (e.g., by analyzing certain movements andactions of the user in conjunction with detected operation of one ormore appliances or electronic devices of environment 100 (e.g., a videoconferencing machine or television or user device) and may utilize thatinformation to infer that the user should not be bothered during thatactivity. In certain embodiments, calendar data may be accessible andanalyzed for determining a system mode. For example, a calendarapplication for a particular user (e.g., as may be accessible by aprocessing component of platform 200 from a user device 166) may beaccessed and analyzed (e.g., independently or in combination with otherdetected data) to determine a current or future activity of the user(e.g., leveraging calendar data indicative of an “important telephonecall with client X” at a current time in combination with detection ofthe user being on the telephone may be used to enable a do-not-disturbmode for that user during the duration of that telephone call).

Additionally or alternatively, a user may affirmatively provide platform200 with information that may be leveraged to at least partiallydetermine one or more modes to be enabled. For example, a user maycommunicate any suitable information to platform 200 via any suitabledevice of environment 100 to define any suitable characteristic that maybe analyzed for enabling a mode and/or to specifically enable aparticular mode. In some embodiments, a user may communicate to platform200 (e.g., via a user device 166 and/or any suitable user interface ofany suitable smart device of environment 100) a particular activity thatthe user is currently performing or will be performing at a future time,such as “putting my baby down for a nap” or “conducting an importantbusiness call” or “reading an important work document” or “feeling underthe weather” or the like. Such information may be verbally communicatedby the user to platform 200 or may be manually entered by interfacingwith a graphical user interface or any other suitable user interface ofplatform 200. Such information may be communicated to platform 200 by auser from any suitable location, whether or not the user is local to aparticular environment for affecting a mode of that environment. Forexample, a user that may have recently left environment 100 via car mayutilize its personal device 166 for communicating to platform 200 thatthe user wishes for a do-not-disturb mode to be enabled for environment100. In some embodiments, a particular mode may be set manually by auser (e.g., to override any alternative mode that might be enabled basedon current detected data, such as to enter a do-not-disturb mode for theentirety of environment 100 despite a child and a babysitter currentlyactively occupying environment 100).

Each one of multiple different system users can be associated with itsown distinct mode. For example, a first user occupant of environment 100may be in a do-not-disturb mode (e.g., when on an important telephonecall or simply when wishing to not be disturbed) and a second useroccupant of environment 100 may not be in a do-not-disturb mode, wherebyplatform 200 may be operative to balance the settings of each enabledmode of the various occupants of environment 100 when responding to anevent (e.g., when a visitor is detected (e.g., at step 2002), platform200 may communicate with a personal device associated with the seconduser (e.g., at step 2006) while platform 200 may avoid any communicationwith devices of environment 100 that may disturb the first user). As oneexample, platform 200 may be operative to communicate silently with auser device 166 of a first “available” user via a smart device that isproximate to a first “available” user (e.g., with silent blinking lightsor text message on a user interface of such a smart device) but not tocommunicate in any manner that may disturb a “not available” user thatmay be sleeping next to the available user (e.g., not with an audiblemessage via a smart device proximate both users). Additionally oralternatively, each one of multiple different zones or areas ofenvironment 100 can be associated with its own distinct mode. Forexample, a first room of environment 100 may be in a do-not-disturb mode(e.g., a bedroom when one or more occupants may be resting therein) anda second room of environment 100 may not be in a do-not-disturb mode(e.g., a living room where one or more occupants may be casuallywatching television), whereby platform 200 may be operative detect suchmodes and to balance the settings of each enabled mode of the variousrooms of environment 100 when responding to an event (e.g., when avisitor is detected (e.g., at step 2002), platform 200 may communicatewith one or more smart devices located within the second room (e.g., atstep 2006) while platform 200 may avoid any communication with anydevices of the first room that may disturb the occupant(s) therein).

Any particular data or combination of various types of data accessibleby platform 200, which may be detected or otherwise received by one ormore of devices 102/104/106/108/110/112/113/114/116/122/166/168/170 of asmart-home environment 100, may be processed by platform 200 (e.g., witha processing engine 206 and/or services 204/205 and/or third partysources 222/224/226/228/230 and/or paradigms 310 a/310 b/310 c/310 dand/or extrinsic information 316 and/or any other suitableinformation/services, for example, in combination with rules-basedinference engines and/or artificial intelligence) as received home data202 (e.g., for generating derived home data 208), and that data may beanalyzed or otherwise used to define and enable a particular mode for aparticular user and/or for at least a particular portion of anenvironment 100. Such a mode may be associated with an entireenvironment 100 or only a portion thereof. For example, a particularwing of structure 150 may be utilized at a certain time as an exhibitionarea for a performance or a meeting, such that that area should be in ado-not-disturb mode at that time such that information may not becommunicated to that area by platform 200 for specific events (e.g., fordetection of a deliverer DL with a package PL). Additionally oralternatively, such a mode may be associated with a particular user,whether or not the user is local to environment 100 (e.g., user UL) orremote from environment 100 (e.g., user UR). For example, a particularuser may be associated with an enabled do-not-disturb mode when animportant business call is being conducted by that user, regardless ofwhether that user is conducting the call within environment 100 orremotely from environment 100 (e.g., while driving away from environment100), such that that user may not be communicated to by platform 200 ina disturbing manner for alerting that user of a specific event (e.g.,for detection of a deliverer DL with a package PL, such as at step2006).

When a current mode is enabled for a particular environment or user,various suitable settings may be followed by platform 200 for that modein response to particular events being detected. For example, when avisitor is detected at environment 100 (e.g., at step 2002), differenttype(s) of communication may be conducted by platform 200 with one ormore users depending on whether or not environment 100 is in aparticular do-not-disturb mode (e.g., at step 2006) and/or differenttype(s) of feedback may be provided by platform 200 to the visitordepending on whether or not environment 100 is in a particulardo-not-disturb mode (e.g., at step 2008). When environment 100 is in aparticular type of do-not-disturb mode, for example, platform 200 may beoperative not to communicate the detection of a visitor using anydevices within environment 100 according to communication settings ofthat mode (e.g., so as not to wake any sleeping occupants or so as notto fruitlessly attempt to communicate with non-existent occupants), yet,when environment 100 is not in a do-not-disturb mode, platform 200 maybe operative to communicate such detection of a visitor using one ormore devices within environment 100 (e.g., so as to alert the occupantsof the visitor).

In some embodiments, certain settings of a particular mode may varybased on certain characteristics of a particular event being detected.For example, when a first particular visitor is detected at environment100 (e.g., at step 2002), a first particular communication operation maybe conducted by platform 200 with a user when environment 100 is in aparticular do-not-disturb mode (e.g., at step 2006) and/or a firstparticular feedback may be provided by platform 200 to the visitor whenenvironment 100 is in a particular do-not-disturb mode (e.g., at step2008), yet, when a second particular visitor is detected at environment100 (e.g., at step 2002), a second particular communication operationmay be conducted by platform 200 with a user when environment 100 is inthat same particular do-not-disturb mode (e.g., at step 2006) and/or asecond particular feedback may be provided by platform 200 to thevisitor when environment 100 is in that same particular do-not-disturbmode (e.g., at step 2008). For example, when a particular do-not-disturbmode has been enabled for environment 100 (e.g., because the user istaking a nap), most visitors detected by environment 100 may be providedby platform 200 with feedback instructing the visitor to return at alater time as the occupants are currently unavailable and nocommunication may be provided by platform 200 to an occupant that mightwake the occupant, yet a particular important visitor (e.g., a delivererDL with a highly anticipated or desired package PL) detected byenvironment 100 may be provided by platform 200 with feedback (e.g., atstep 2008) instructing the visitor to wait for an occupant to come tothe door and appropriate communication may be provided by platform 200(e.g., at step 2006) to the napping occupant (e.g., to wake the occupantand instruct the occupant to further the desired delivery process).

Various settings of a particular mode for an environment or system usermay dictate the functionality of one or more devices (e.g., one or moresmart devices of environment 100). In some embodiments, certain modesettings may dictate such functionality in a time-based fashion. Forexample, lighting of environment 100 (e.g., one or more lamps 118 oroutdoor lighting 114) may be automatically turned on 30 minutes beforesunset (e.g., at 5:00 pm) by platform 200 when environment 100 is in ado-not-disturb mode, which may mimic occupant interaction withenvironment lighting such that environment 100 may appear occupied.Additionally or alternatively, in some embodiments, certain modesettings may dictate such functionality based on detection of anyvisitor or a particular visitor. For example, lighting of environment100 (e.g., one or more lamps 118 or outdoor lighting 114) may beautomatically turned on when a visitor is detected by platform 200(e.g., at doorbell 106) when environment 100 is in a do-not-disturbmode, which may mimic occupant interaction with environment lightingwhen a visitor is detected such that environment 100 may appearoccupied. As another example, certain audio (e.g., a dog barking) may beautomatically output (e.g., by audio speaker 836 of doorbell 106) whenan unknown visitor is detected by platform 200 (e.g., at doorbell 106)when environment 100 is in a do-not-disturb mode, which may mimicoccupant interaction with environment lighting when a visitor isdetected such that environment 100 may appear occupied or otherwise moreprepared to thwart a would-be-thief.

As yet another example, certain settings of a mode may dictate thatplatform 200 automatically provides certain feedback with environment100 when a particular event is detected while that mode is enabled forenvironment 100 or a user thereof. For example, certain settings of ado-not-disturb mode may be operative to cause certain feedback (e.g., avisual indicator or audible message) to be automatically output byenvironment 100 (e.g., by projector 830, user interface 812, and/oraudio speaker 836 of doorbell 106) when a known visitor or any visitoris detected by platform 200 (e.g., by doorbell 106) at environment 100when such a do-not-disturb mode is enabled for environment 100 or for auser thereof. Such feedback may be provided (e.g., at step 2008) toindicate to the visitor detected (e.g., at step 2002) that no occupantof environment 100 is currently available to interact with the visitor.For example, such feedback may convey to the detected visitor that“occupant X is currently on an important telephone call right now andcannot be bothered” or “occupant X is currently nursing the baby, pleasecome back at another time” or the like, which may in some way alert thevisitor not to bother interacting any further with environment 100(e.g., not to bother depressing or otherwise interacting with button 812of doorbell 106) when the visitor is detected such that environment 100may appear occupied but unable to accommodate occupant interaction withthe visitor. As another example, such feedback may be provided as asimple indication of the mode on or with respect to user interfacedoorbell button 812 or any other suitable component of doorbell 106 orother smart device of environment 100 that a visitor would usuallyinteract with to reach an occupant (e.g., doorbell button 812 may beprovided with a blinking red light or text message reading “doorbelldeactivated, please come back at another time”), whereby a visitor mayeasily determine that any active visitor interaction with environment100 would not be worthwhile. In some such embodiments, such feedback maybe provided at an initial entry point to environment 100 (e.g., at afront gate at the border of the curtilage of environment 100), which maythereby indicate the do-not-disturb mode to the visitor at an initialdetection of the visitor at environment 100 rather than after thevisitor has fruitlessly advanced to the front door 186 of structure 150.This may save valuable time for the visitor (e.g., obviating the needfor a deliverer DL to get out of a delivery truck with package PL forapproaching door 186) and/or may prevent more intimate visitorinteraction with portions of environment 100 that may disturb anoccupant (e.g., visitor interaction with front door 186 may needlesslyrile up an occupant dog on the interior side of door 186). In someembodiments, in addition to or as an alternative to providing suchfeedback to a detected visitor, certain settings of a do-not-disturbmode may be operative to adjust certain functionalities of certaindevices of environment 100 when a known visitor or any visitor isdetected by platform 200 (e.g., by doorbell 106) at environment 100 whensuch a do-not-disturb mode is enabled for environment 100 or for a userthereof. Such functionality adjustment may include, for example,deactivating the functionality of platform 200 to communicate aninteraction of a visitor with doorbell button 812 to a system user ofenvironment 100 when a particular mode is enabled for environment 100 ora user thereof. That is, the conventional functionality of doorbellbutton 812 may be at least partially deactivated when a particular modeis enabled.

Various levels of detailed information regarding the mode may becommunicated in such feedback dependent upon the type of visitordetected. For example, if a deliverer DL of a trusted third partydeliverer entity 228 is detected (e.g., at step 2002), then platform 200may be operative to provide feedback (e.g., at step 2008) that mayindicate when the current do-not-disturb mode will be over (e.g., “noone is currently available to receive you, but please return between3:00 pm and 5:00 pm when an occupant will be ready to greet you”).However, if an unknown visitor is detected, then less detailed feedbackmay be provided, such as “no one is currently available to receive you,please leave the premises immediately”. In certain embodiments, platform200 may be configured to provide visitor-specific messages to specificvisitors that may be detected during specific modes. For example, whenan occupant is set to take a nap and instructs platform 200 to enable ado-not-disturb mode for the user and/or at least a portion ofenvironment 100 but that occupant wishes to leave a message for aparticular visitor if that visitor is detected during that mode (e.g.,“Hi visitor Y, I am sorry to miss you, but I had to take a nap, I leftyour backpack next to the mailbox for you”), the occupant may providespecific instructions for associating such a message with that mode andthat message may be communicated to such a visitor if that visitor isdetected by platform 200 (e.g., at doorbell 106) when environment 100 isin such a do-not-disturb mode. Such messages or other suitablecustomizable settings of a mode may be defined by a user when local toenvironment 100 (e.g., via any suitable smart device of environment 100)or when remote from environment 100 (e.g., via a user device 166, suchas, for example, when the user is currently on vacation but would liketo leave a customized note for a visitor that is expected to arrive atenvironment 100 while the user is still on vacation and environment 100is in a do-not-disturb mode).

Certain current mode information and/or future mode information of anenvironment or user may be shared with one or more suitable outsideservice providers. For example, as mentioned above with respect to FIG.19, current status information (e.g., mode) of an environment or usermay be obtained by a delivery facilitator business entity 228 (e.g., atstep 1908) to affect the delivery of a package (e.g., to delay deliveryuntil a time when environment 100 may be occupied by the recipient toreceive the delivery). As another example, current status information(e.g., mode) of an environment or user may be obtained by a lawenforcement agency 222 and/or suitable emergency response entity 230 orother suitable security entity or neighboring environment to affectprotection of the environment or its users (e.g., to increase securityfrom thieves of environment 100 in a do-not-disturb mode until an activeoccupant is within environment 100). Mode status information of a smartsystem entity may include various types of information that may beobtained and leveraged (e.g., at steps 1908/1910) by a third party formore efficiently delivering a package and/or for protecting anenvironment entity that may be accomplished in a more convenient mannerfor environment 100 or for a user thereof. For example, such statusinformation may include information indicative of when to allow deliveryto a particular location (e.g., after 4:00 PM on Mondays and Wednesdaysonly), information indicative of preferred alternate delivery methods(e.g., do not deliver to environment 100 but rather hold a particularpackage at a particular deliverer pick up location for manual pick-up bya particular user, or deliver to another recipient and/or to anotherlocation other than the recipient and/or location initially defined atstep 1902), information indicative of authorization to deliver withoutsigned confirmation of receipt of delivery (e.g., a particularauthenticated user of the system hereby authorizes deliverer to delivera particular package to a particular location and leave next to thefront door of that location without a human user signing for thatdelivery), and/or any other suitable information indicative of any othersuitable delivery preferences or delivery instructions. As anotherexample, such status information may include information indicative ofwhen an environment is more susceptible to certain security breaches(e.g., no occupants will be alert at environment 100 after 11:00 PM onMondays and at all on Wednesdays), information indicative of currentoccupancy on a room by room basis (e.g., one child in room A, two adultsin room B, etc., which may be leveraged for increasing the ability ofsecurity personnel to handle a situation (e.g., a fire)), informationindicative of last detected movement on a room by room basis (e.g.,movement detected within room A 10 minutes ago, movement detected fromroom B into room C 5 seconds ago, etc., which may be leveraged forincreasing the ability of security personnel to handle a situation(e.g., a robbery)), information indicative of authorization to accessenvironment 100 without real-time user approval (e.g., informationindicative of user authorization of a particular authenticated securityentity (e.g., an authenticated firefighter) to access at least certainportions of environment 100 without a human user authorizing such accessin real-time, which may be leveraged for increasing the ability ofsecurity personnel to handle a situation (e.g., a fire)), and/or anyother suitable information indicative of any other suitable securitypreferences or security instructions.

In some embodiments, mode status information may be provided to adelivery facilitator and/or a security facilitator on a macro-level inaddition to or as an alternative to providing mode status informationwith respect to just one particular environment 100 and/or user thereof.For example, mode status information may be made available to afacilitator entity 222/228/230 that may be generally indicative of amode status or mode trend of a particular group of smart system entities(e.g., a neighborhood or ZIP code that may include multiple smartenvironments 100). As just one example, such mode status information maybe indicative of certain days of the week when a majority of suchenvironments of the group are in a do-not-disturb mode and/or areotherwise not available to receive packages, and such information may beleveraged by the facilitator entity to increase security to that entiregroup (e.g., neighborhood) of environments during those days and/or toavoid scheduling deliveries to that entire group (e.g., neighborhood) ofenvironments during those days. Any suitable grouping of environments orusers or other suitable smart system entities of any suitable size andtype may be used to generate group or macro-level mode statusinformation that may be made available to a facilitator entity for moreefficiently handling the purpose (e.g., security and/or deliveries)associated with that group. By grouping smart system entities and onlysharing mode status data at a group-level with third parties, such asdelivery facilitator entities, the privacy and/or security of certainenvironments may be protected by platform 200 by not sharing mode statusinformation associated specifically with only a particular singleenvironment 100 or user (e.g., to preserve at least some anonymity aboutthe status of a particular smart environment or user).

By accessing certain mode status information of a smart environment 100or other suitable smart system entity of platform 200, as may bedetected or inferred by system 164, a facilitator entity may beconfigured to optimize package delivery or environment security. Forexample, data indicative of when a particular location may and may notbe able to receive a package delivery may be processed by any suitabledistribution system to dictate when certain packages are dispatched formaximizing the likelihood of a successful physical delivery. This mayreduce overhead costs for a delivery entity (e.g., reduce fuel pricesand wasted man hours by limiting the number of failed delivery attempts)and/or may reduce insurance costs by limiting the exposure of perishablecontents from unnecessary and degrading delivery effects. As anotherexample, data indicative of when a particular location may and may notbe actively occupied may be processed by any suitable security system todictate when certain security measures are dispatched for increasing thesecurity of the environment. This may reduce overhead costs for asecurity entity (e.g., reduce fuel prices and wasted man hours bylimiting the number of unnecessary visits by a security officer to alocation that is currently actively occupied) and/or may reduceinsurance costs by limiting the exposure of environments to less thansecure conditions. For example, one, some, or all of steps 1902, 1904,1906, 1908, and 1910 may be at least partially or completely automatedusing one or more computer systems (e.g., computer system 1500 and/orcomputer system 1600) that may be leveraged by each one of environment100, system 164, facilitator entity 222/228/230, and the like forassociating a smart system entity of system 164 with a mode and thensharing certain mode status information of that smart system entity witha deliverer or other entity at any suitable time for positivelyaffecting the delivery of a package or the security of the environmentor user. A user of system 164 may actively and manually define certainpreferences or instructions to be shared with such a facilitator entity.Alternatively or additionally, the delivery of packages and/orthird-party security of a user or environment by a facilitator entitymay be based on inferences made by system 164 or other suitableprocessing component(s) of platform 200 (e.g., at environment 100 orremote therefrom) and selectively shared with such a facilitator entity(e.g., without any active manual preferences made by a user but insteaddone transparently to a user).

FIG. 29 is a flowchart of an illustrative process 2900 for managing asmart environment that comprises a number of smart devices. At step2902, process 2900 may include obtaining, at an environment computingsystem from at least one sensor of at least a first smart device of thesmart devices, environment data associated with the occupancy of thesmart environment. At step 2904, process 2900 may include analyzing,with the environment computing system, at least a portion of theobtained environment data. At step 2906, process 2900 may includedetermining, with the environment computing system, a status of at leasta portion of the smart environment based on the analyzing. At step 2908,process 2900 may include enabling, with the environment computingsystem, a do-not-disturb mode for the at least a portion of the smartenvironment based on the determining. Process 2900 may also include atleast one of step 2910 and step 2912. At step 2910, process 2900 mayinclude, based on the enabling, automatically sharing, by theenvironment computing system with a remote entity, status informationindicative of the determined status. At step 2912, process 2900 mayinclude, based on the enabling, automatically adjusting, using theenvironment computing system, the functionality of a particular smartdevice of the smart devices.

It is understood that the steps shown in process 2900 of FIG. 29 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Smart doorbell 106 of environment 100 may be configured to include anysuitable component or combination of components described above so as toeffectively interact with other smart devices of environment 100 and ofservices platform 200 and with any suitable users thereof, such as usersregistered with or associated with environment 100 (e.g., owners,occupants, etc.) and/or users visiting environment 100 (e.g., packagedeliverers, friends, solicitors, strangers, and would-be-thieves), forincreasing the security of environment 100 and/or for increasing theconvenience of users of environment 100. For example, doorbell 106 maybe operative to initially detect a visitor at environment 100, analyzevisitor information based on the initial detection (e.g., in light ofany applicable enabled modes), adjust a functionality of one or moresmart devices of environment 100 based on such analysis, communicatewith a user of environment 100 based on such analysis, provide feedbackto the visitor based on such analysis and/or based on suchcommunication, detect at least one act performed by the visitor inresponse to the provided feedback, and/or communicate with at least oneof the user and the visitor based on the detected act. A firstadjustment of the functionality of a smart device may be performed basedon analysis of initial visitor detection information (e.g., based on thedetection of a visitor generally), while a second adjustment of thefunctionality of a smart device may be later performed based on analysisof additional visitor detection information (e.g., based on thedetection of an act of a visitor, where detection and analysis of suchan act may identify a class of the visitor or that may identify thevisitor specifically). Certain adjustment of the functionality of asmart device may enable the visitor to access at least a portion ofenvironment 100 (e.g., unlocking of doorknob 122 of door 186 forenabling a visitor to enter structure 150). Such access may be grantedbased on analysis of visitor information revealing a trusted invitee(e.g., a guest to a party at a specifically designated time) or atrusted security service entity (e.g., a fireman during a detectedemergency situation). The granted access may be limited in one or moreways based on the identity of the visitor and/or based on any othersuitable data available for analysis. Various additional data may beleveraged during the analysis of any suitable detected visitorinformation, including data from a neighborhood security network of oneor more additional smart environments associated (e.g., physically) withenvironment 100. Each one of these various security features that may beprovided by doorbell 106 and platform 200 for enhancing visitor handlingat environment 100 is described below in more detail.

As described above, at step 2002 of process 2000 for enhancing visitorhandling, visitor information of a visitor may be detected at anentryway interface device of a smart environment. For example, one ormore sensing components 828 of doorbell 106 may be operative to detectany suitable visitor information when any suitable visitor comes withina suitable sensing range of doorbell 106. Such a visitor may be anysuitable entity, such as a package deliverer (e.g., deliverer DL of FIG.1, which may be a human or a drone or otherwise), security entities(e.g., firemen, policemen, security system agents, etc.), any othersuitable agents of any third party entities known to platform 200 (e.g.,entities 222-230), friends of one or more users of environment 100 thatmay or may not be known to platform 200, solicitors, strangers,would-be-thieves, and the like. At step 2002, first visitoridentification information may be detected when a visitor is initiallysensed by platform 200 at environment 100 (e.g., by doorbell 106). Suchinitial first visitor identification information may be any suitabledetectable data that may then be analyzed by platform 200 (e.g., at step2004) in order to determine that a visitor may be present at environment100. For example, simple motion data (e.g., as may be sensed by a motionsensing component 828 of doorbell 106) may be adequate for analysis byplatform 200 (e.g., by doorbell 106 alone, in combination with otherprocessing components of environment 100, and/or in combination withother processing components of platform 200, such as system 164) todetermine that a visitor is present at doorbell 106. Alternatively, moreadvanced sensing may be performed at step 2002 for initially detectingthe presence of a visitor at step 2002 (e.g., motion sensing, audiosensing, camera sensing, PIR sensing, ambient light sensing, ultrasonicsensing, and/or any other suitable sensing capabilities of doorbell 106or of environment 100 generally (e.g., sensing capabilities of one ormore other smart devices)). As just one example, audio sensing of afingerprint or signature matching a delivery truck or any other suitablevehicle that may be generally associated with a visitor may be initiallydetected and analyzed, which may result in additional visitor sensingfunctionality being enhanced for further detection and analysis (e.g.,video sensing and/or motion sensing).

At step 2004, process 2000 may include analyzing the detected visitorinformation of step 2002 (e.g., in conjunction with any other suitabledata available to platform 200, such as settings of a current mode ofenvironment 100 or of a user), for determining the presence of a visitorat environment 100 and how to initially respond to such a determination.For example, in response to detecting such visitor information at step2002, doorbell 106, alone or in combination with other processingcomponents of other smart devices and/or rules-based inference enginesand/or artificial intelligence provided locally at environment 100and/or at or in conjunction with system 164 and/or at or in conjunctionwith any other component(s) of services platform 200, may be operative,at step 2004, to access any suitable additional information that may beuseful for interpreting the detected visitor information (e.g., motionsensing thresholds, visitor “signatures” or “fingerprints”, and/or anyother suitable data that may help to make a determination about thepresence of a visitor in light of the detected visitor information)and/or additional information that may be useful for determining how toproceed if the presence of a visitor is determined (e.g., current modesettings of environment 100, etc.), and then to analyze all suchavailable information for determining whether or not a visitor ispresent and, if so, whether to take one or more of a variety ofautomated actions based on that detected visitor presence.

At step 2005, process 2000 may include adjusting the functionality of atleast one smart device of environment 100 based on the analysis of step2004 or even based solely on the detection of step 2002. As just oneexample, when any potential visitor information is detected at step2002, smart environment 100 may be operative to turn on a light (e.g.,outdoor lighting 114 or projector 830 of doorbell 106) at step 2005 toincrease the safety of the potential visitor and/or to increase thesecurity of environment 100. As another example, when any potentialvisitor information is detected at step 2002, smart environment 100 maybe operative to increase the sensing functionality of one or more smartdevices of environment 100 at step 2005 (e.g., by increasing thesampling rate of a sensing component, by increasing or varying thesensing area covered by a sensing component, by turning on one or moreadditional sensing components (e.g., of doorbell 106) that may havepreviously been turned off for power conservancy, etc.) to increase thesecurity of environment 100 (e.g., by enhancing the ability ofenvironment 100 to monitor any potential visitor activity). As anotherexample, when any potential visitor information is detected at step2002, smart environment 100 may be operative to generate certainactivity at step 2005 that may mimic occupancy at environment 100detectable by the visitor to increase the security of environment 100,such as by turning on a lamp 118 within structure 150 and/or byoutputting audio data from an audio output component of any smart devicewithin structure 150 that may resemble a dog barking or any othersuitable noises or activity that may lead a visitor to believe that anactive occupant is at environment 100. In some embodiments, such audiodata may be output by an audio output component of a device locatedwithin structure 150 but adjacent to door 186, such that the outputtedaudio (e.g., a played-back recording of a dog barking) may realisticallysound like occupancy within structure 150. In other embodiments, such aswhen an actual dog is known to be within structure 150, audio data thatis only audible to a dog may be output by an audio output component ofenvironment 100, which may prompt the actual dog to bark for increasingthe security of environment 100. As yet another example, when anypotential visitor information is detected at step 2002, smartenvironment 100 may be operative to output a general message at step2005 that may instruct the visitor how to initially interface withenvironment (e.g., by outputting audio data from audio speaker 836 orvisual data from projector 830 of doorbell 106 or any other suitabledata from any other suitable smart device of environment 100 that may bereceived by the detected visitor), where such a message may include anysuitable instruction such as “Please identify yourself and yourintention” or “Please align any identification information with asensing component of the doorbell” or the like, to increase the securityof environment 100 and further the visitor handling of process 2000. Asanother example, when any potential visitor information is detected atstep 2002, smart environment 100 may be operative to lock any unlockedentry ways to structure 150 (e.g., by locking smart doorknob 122) atstep 2005 to increase the security of environment 100, whereby, in suchembodiments, the previous locked/unlocked condition of such entry waysmay be restored once the visitor is no longer detected or has beenotherwise securely dealt with.

Such adjusting of the functionality of one or more smart devices ofenvironment 100 at step 2005 may be based on the analysis of step 2004.For example, such adjusting may be done automatically in response to adetermination that the presence of a visitor has been detected.Additionally or alternatively, such adjusting may be done automaticallynot only in response to a determination that the presence of a visitorhas been detected but also in response to analysis of any applicablemode settings, rules, inferences, or other suitable informationavailable to platform 200 that may be processed for determining the wayor ways in which certain smart device functionality ought to be adjustedin response to the determined visitor presence (e.g., time of day,current functionality of certain smart devices, current mode ofenvironment 100, current occupancy of environment 100, and/or any othersuitable information). Such adjusting may also be performed whether ornot the detected visitor presence has been determined with respect to aparticular visitor (e.g., next door neighbor John Doe), with respect toa particular visitor type (e.g., a delivery drone or a gas utilityservice man or security agent or firefighter, etc.), or with respect toa visitor generally (e.g., a human or drone or any other suitable entitythat may be handled by platform 200 as a potential visitor toenvironment, even including an animal such as a cat that may bedetectable as an unknown stray or detectable as the neighbor's missingpet (e.g., via an NFC chip coupled to the cat and NFC sensing component828), whereby process 2000 may enable proper detection of the cat andcommunication of its presence to appropriate users/authorities). Suchinitial detection of the presence of a visitor may be determined basedon analysis of initial detected visitor information that may be compiledwithout active communication by the visitor of its intent to environment100. Instead, in some embodiments, the presence may be initiallydetermined when the analysis of the visitor information determines thatthe shape and/or motion and/or any other suitable characteristic of apotential visitor (e.g., generically or specifically) has been detected.Such initial adjusting of the functionality of one or more smart devicesat step 2005 in response to initial detection of the presence of avisitor may automatically increase the security of environment 100and/or increase the safety or convenience of the detected visitor thatmay be potentially attempting to interact with environment 100 for anysuitable purpose (e.g., for communicating with an occupant, fordelivering a package, for fetching an item, etc.).

FIG. 30 is a flowchart of an illustrative process 3000 for handling avisitor at a smart environment that includes a number of smart devices.At step 3002, process 3000 may include detecting visitor informationassociated with the visitor at the smart environment using an entrywayinterface smart device of the smart devices. At step 3004, process 3000may include analyzing the detected visitor information using a computingsystem that is communicatively coupled to the entryway interface smartdevice. At step 3006, process 3000 may include, based on the analyzing,automatically adjusting a functionality of a particular smart device ofthe smart devices using the computing system.

It is understood that the steps shown in process 3000 of FIG. 30 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

As described above, at step 2006, process 2000 may include communicatingwith a user associated with the smart environment based on the analysisof step 2004. As just one example, when the analysis of step 2004determines that the presence of a visitor has been initially detected atenvironment 100 and that a mode of environment 100 or of a system useris such that communication may be attempted, smart environment 100 maybe operative to communicate the determined visitor presence to anappropriate system user or portion of environment 100 in any suitableway at step 2006 (e.g., by audibly announcing any suitable informationrelated to the visitor presence via an audio speaker of a smart devicethat may be located most proximal to the current location of a userwithin environment 100). As another example, when the analysis of step2004 determines that no appropriate user is available within environment100, smart environment 100 may be operative to communicate the visitorpresence to a system user or appropriate third party via platform 200 inany suitable way at step 2006 (e.g., by transmitting an electronicmessage to a personal device 166 associated with a remote user UR or bytransmitting an electronic message to a trusted third party securityentity 222-230 associated with environment 100). For example, in someembodiments, a video (e.g., a recorded loop or a live stream of thedetected visitor) or still image or any other suitable detected visitorinformation (e.g., as detected at step 2002) may be communicated at step2006 to such a user or third party automatically or in response to arequest relayed from such a user or third party after being notified ofthe detected visitor, whereby such communicated visitor information datamay be utilized by such a user or third party in any suitable way (e.g.,to actively monitor the visitor's activity and/or to attempt tospecifically identify the identity of the visitor or at least the typeof the identified visitor).

At step 2008, process 2000 may include providing the visitor withfeedback based on at least one of the analysis of step 2004 and/or anycommunication of step 2006. As just one example, when the analysis ofstep 2004 determines that there are currently no occupants local toenvironment 100 or otherwise in an active and available state forappropriately being told of the detected visitor, and/or when no userresponse is received for any communication attempt of step 2006 withrespect to a detected visitor, platform 200 may be operative todetermine that smart environment 100 may proceed with handling thedetected visitor without active user input and doorbell 106 may providethe visitor at step 2008 with instructions or other suitable feedback onhow to proceed. Alternatively, when the analysis of step 2004 determinesthat there is a user local to environment 100 that is in an active andavailable state for appropriately being told of the detected visitor,and/or when a user or third party response is received for anycommunication attempt of step 2006 with respect to a detected visitor,platform 200 may be operative to determine that a user or third partyprivy to smart environment 100 may at least partially handle the visitorand doorbell 106 may provide the visitor at step 2008 with instructionsor other suitable feedback on how to proceed. The type of feedback thatmay be provided via doorbell 106 and/or via any other suitable smartdevice of environment 100 to the visitor at step 2008 may vary based onthe analysis of step 2004 and/or any communication of step 2006. Forexample, the feedback may include active communication from the user orthird party to the visitor via doorbell 106 (e.g., audible and/or visualinformation and/or any other suitable information may be conveyed to thevisitor by doorbell 106, where such information may be generated andtransmitted by or otherwise under the control of the user via anothersmart device that the user may directly interface with and that may becommunicatively coupled to doorbell 106). This may enable a virtualconversation between the user and the visitor via platform 200 (e.g., byrepeating one or more of steps 2002-2012, as described above withrespect to a deliverer visitor). Alternatively, the feedback may includeautomated messages or instructions generated by system 164 forcommunication to the visitor via doorbell 106 (e.g., a message that maycommunicate that “a user is not currently able to actively interact withyou right now, please proceed as follows . . . ”, etc.). Additionally oralternatively, the feedback may include providing certain environmentaccess to the visitor, such as by opening door 186 by unlocking doorknob122 for a certain amount of time (e.g., if the visitor is approved bysystem 164 as an expected and/or authorized visitor, door 186 may beunlocked such that the visitor may be enabled to enter structure 150).

In some embodiments, feedback provided by platform 200 at step 2008 toan initially detected visitor may convey a request for the detectedvisitor to provide more and/or specific information about the visitor'sidentity and/or the visitor's intent using any suitable output componentof doorbell 106 or any other smart device of environment 100 that may bedetected by the visitor. For example, such feedback may include anysuitable audible and/or visual request for the visitor to physicallycommunicate with environment 100, such as a request to “please stateyour full name and your intent”. As another example, such feedback mayinclude any suitable request for the visitor to avail at least aspecific portion of the visitor to environment 100 for being properlysensed by environment 100 (e.g., within a detection range of a sensingcomponent 828 of doorbell 106), such as a request to “please align yourface with the doorbell's camera” or “please present a form ofidentification to the doorbell's scanner” or any other suitableinstructions for facilitating the detection of any specific visitoridentification information and/or visitor intent information. Label IDmay be any suitable form of visitor identification, such as a label ofpackage PL or a driver's license of the visitor or an identification tagof a delivery drone or an RFID tag of a pet or personal property, etc.,that may be properly sensed by environment 100.

At step 2010, process 2000 may include detecting an act of the visitorbased on the provided feedback of step 2008 (e.g., an act performed bythe visitor in response to the provided feedback). Doorbell 106 and/orany other smart device of environment 100 may be configured to detect anaction of the visitor at step 2010 in response to platform 200 providingthe visitor with feedback at step 2008, where that action may be anysuitable action indicative of the visitor interacting with environment100 (e.g., doorbell 106) in a particular way. As just one example, inresponse to instructing the visitor to provide specific informationabout its identity and/or its intent or otherwise to avail at least aspecific portion of the visitor (e.g., its face or a label ID) tosensing by environment 100 for detection of such specific identificationinformation (e.g., within a detection range of a sensing component 828of doorbell 106) at step 2008, doorbell 106 may detect such additionalvisitor identification/intent information at step 2010. Any suitableaction of the visitor may be detected or otherwise received by anysuitable component of environment 100 and/or otherwise of platform 200at step 2010, where such detection may enable platform 200 to updatesystem-information about the detected visitor, such as with respect tothe specific identity of the visitor (e.g., neighbor Billy Bob), thespecific type of visitor (e.g., Federal Express deliverer, child,firefighter), the specific intent of the visitor (e.g., visitor wants tosay hi to occupant X, visitor wants to deliver package PL, visitor wantsto pick up an item it accidently left at environment 100, etc.), and/orthe like. For example, a visitor may communicate with platform 200 atstep 2010 via any suitable communication enabled by a smart device ofenvironment 100 accessible by the visitor and/or via any suitablecommunication enabled by platform 200 and a visitor device 266. In someembodiments, suitable visitor identification data may be communicatedwith platform 200 by the visitor at step 2010 via visitor gesturestowards doorbell 106, as may be described above with respect to smartdevice 104, via visitor touch input via a touch user interface 812, viavisitor audible spoken information via microphone 844, and/or the like.A visitor may scan a driver's license or other suitable identificationsuch as the visitor's face or fingerprint (e.g., at a scanner sensingcomponent 828 of doorbell 106). Additionally or alternatively, platform200 may be configured to automatically detect such additional visitoridentification/intent information at step 2010 without prompting thevisitor to do so at step 2008. For example, label ID may beautomatically detected by a sensing component 828 of doorbell 106 when avisitor is present within a specific distance of doorbell 106 and not inresponse to a specific act of the visitor done in response to a specificfeedback request of platform 200.

Specific visitor identification/intent information detected (e.g., atstep 2010 or initially at step 2002) may then be analyzed by platform200 for more specifically identifying the visitor or its intent (e.g.,by repeating step 2004). For example, platform 200 may be operative toanalyze such detected visitor information by running any suitable facialdetection or fingerprint or other biometric sensing algorithms or anyother suitable entity identification algorithms or comparisons using anyavailable databases or processing paradigms or extrinsic information,such as social network contact information of various entities known bythe various occupants of environment 100 or known agent information ofvarious business/emergency response entities or known sex offenders orcriminals or missing person/pet identification databases of lawenforcement agencies in order to detect or confirm the identity of thevisitor. One or more iterations of detecting visitor information,analyzing detected visitor information, providing the visitor withfeedback, and/or detecting an act of the visitor of process 2000 may beconducted by platform 200 (e.g., via doorbell 106, any other smartdevices of environment 100, and/or any other processing capabilities ofplatform 200), with or without any active communication from a systemuser or third party, in order to determine the identity and/or intent ofa detected visitor with any suitable amount of clarity, confidence,accuracy, and/or specificity for effectively handling the visitor.

At step 2012, process 2000 may include communicating with at least oneof the user and the visitor based on the detected identity and/or intentof the visitor. Doorbell 106 and/or any other smart device ofenvironment 100 may be configured to confirm detection of an identityand/or intent of the visitor with the visitor (e.g., by communicatingany suitable confirmation information directly to the visitor viadoorbell 106). Alternatively or additionally, doorbell 106 and/or anyother component of environment 100 and/or system 164 may be configuredto confirm detection of an identity and/or intent of the visitor with auser of environment 100 (e.g., by communicating any suitableconfirmation information to the user via any suitable smart device ofenvironment 100 or personal device 166 of the user, similarly to anycommunication of step 2006). This may enable the visitor and/or the userto remain updated with respect to the current status of the handling ofthe visitor by platform 200.

One or more of steps 2002-2012 of process 2000 may be repeated for anysuitable visitor handling. For example, in response to analysis at step2004 of any visitor information detected at step 2002, feedbackrequesting additional visitor identification information may be providedto the visitor at step 2008, in response to which an action of thevisitor attempting to provide additional visitor information may bedetected by the smart environment at step 2010 and any additionalvisitor information of that detected action may be analyzed at step2004, in response to which one or more of steps 2005-2012 may againfollow. Therefore, process 2000 may support a virtual interactionbetween a visitor and platform 200 (e.g., environment 100 or service 164as an automated agent of a system user).

It is understood that the steps shown in process 2000 of FIG. 20 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Platform 200 may be operative to enable certain functionality ofdoorbell 106 to being utilized by a visitor whether or not certainvisitor identification information and/or certain visitor intentinformation has been confirmed. For example, platform 200 may beoperative to enable the visitor to leave any suitable message for asystem user of environment 100 for eventual receipt by that user (e.g.,an audio message, a video message, a text message, etc. that may beobtained by one or more sensing components 828 of doorbell 106). Thevisitor may simply wish to leave a “voicemail” message for environment100 and doorbell 106 may be operative to enable the visitor to recordsuch a message (e.g., via microphone 844), whereby such a message maythen be eventually communicated to a system user of environment 100(e.g., according to any applicable rules or inferences or modesettings). For example, at step 2008, doorbell 106 may be operative toprovide feedback to the visitor indicative of the ability of doorbell106 to receive such a message (e.g., via audio speaker 836 or projector830 communicating such a possibility to the visitor, such as byconveying a message like “leave a voicemail for a user of environment100 by pressing button 812 now”), and in response the visitor maycommunicate such a message to doorbell 106 at step 2010. This mayencourage certain types of visitors to interact with environment 100 ina manner that may not unnecessarily bother a user of environment 100,whether or not a do-not-disturb mode Is enabled for environment 100 orthat user. For example, a neighbor visitor may be swinging byenvironment 100 to return a mitten that was accidently left by a systemuser at the neighbor's home, and such a visitor may simply provide amessage for capture by platform 200 at step 2010 (e.g., “Hi, this isneighbor Billy Bob, I am leaving your mitten at your doorstep”), andplatform 200 may then share that message with a system user at a timeconvenient to the user at step 2012.

Platform 200 may be operative to prevent certain functionality ofdoorbell 106 from being utilized by a visitor until certain visitoridentification information and/or certain visitor intent information hasbeen confirmed. For example, user interface button 812 of doorbell 106may be disabled or presented to the visitor as non-functional (e.g., bydisplaying a “disabled” message on the button) until any suitablecondition has been confirmed by platform 200. By seemingly presentingthe visitor with no ability to “ring” the bell to beckon an occupant,doorbell 106 may encourage a visitor to interact with platform 200 in acooperative manner (e.g., to provide appropriate visitor information atstep 2008). This may dissuade a visitor from incessantly pressing button812 or otherwise interacting with doorbell 106 in an unproductivemanner. In such embodiments, the actual functionality of doorbell button812 may be enabled or disabled based on any suitable settings ofplatform 200 (e.g., if a visitor presses doorbell button 812 despitebeing presented to the visitor as non-functional, such a visitorinteraction may be detected by platform 200 and handled in any suitableway, such as by outputting an audible tone at one or more smart devicesof environment 100 for alerting an occupant of the visitor and/or bystoring data indicative of that visitor interaction for later use (e.g.,for security profiling and/or user review as described below)).

When platform 200 may attempt to analyze certain system data (e.g., atstep 2004) and/or to communicate with a system user during process 2000(e.g., at step 2006), such as for enabling a user to decide actively howplatform 200 may proceed with handling a detected visitor, platform 200may also be operative to simultaneously communicate certain informationto the detected visitor while such analysis and/or user communication isattempted. For example, certain feedback may be provided by environment100 (e.g., by doorbell 106) to a detected visitor at step 2008 whileplatform 200 may also be at least attempting to analyze data at step2004 and/or to communicate with a user at step 2006. Such feedback maybe provided for maintaining the visitor's attention and/or for providingsecurity to environment 100. As one example, such feedback may be acommunication instructing the visitor to wait for further instructions(e.g., by playing “hold music” or “hold video” (e.g., an advertisement)or telling the visitor “please wait a moment”), which may maintain thevisitor's attention and/or ensure the visitor that their arrival isbeing handled. Any other suitable message, which may be customizable bya system user and utilized by platform 200 based on current modesettings or otherwise, may be provided to a detected visitor (e.g., “ifyou are a solicitor, please leave this property immediately otherwiseyou are hereby agreeing to pay the system user $50”). As anotherexample, such feedback may be a communication that may convey to thevisitor that some active occupancy exists at environment 100 (e.g., byoutputting audio of a dog barking from within structure 150, as alsodescribed above with respect to step 2005), which may increase thesecurity of environment 100 rather than having the visitor wait forinstructions amidst silence that may lead the visitor to assume that noone is home, whether or not that assumption is correct. The type of suchfeedback may vary based on the identity and/or intent of the visitor asmay be already determined by platform 200. For example, if the visitorhas been determined to be somewhat trusted (e.g., a known acquaintanceof a system user or a deliverer of a trusted delivery entity business,etc.), then pleasant hold music may be provided as such feedback.However, if the identity of the visitor has not yet been determined orhas been determined to be a stranger or otherwise suspect, then dogbarking or other security-enhancing feedback may be provided.

Similarly, the type of attempted communication with a user (e.g., atstep 2006, which may be carried out at least partially simultaneouslywith such feedback to the visitor at step 2008) may vary based on theidentity and/or intent of the visitor as may be already determined byplatform 200 (e.g., at step 2002/2004). For example, if the visitor hasbeen determined to be somewhat trusted (e.g., a known acquaintance of asystem user or a deliverer of a trusted delivery entity business, etc.),then attempted communication with the user may be conducted by platform200 through indicating as much (e.g., communication conveying “youracquaintance Billy Bob is here” or “a Federal Express deliverer ishere”). However, if the identity of the visitor has not yet beendetermined or has been determined to be a stranger or otherwise suspect,then attempted communication with the user may be conducted by platform200 through indicating as much (e.g., communication conveying “anunknown visitor is here”). As another example, if the identity of thevisitor has not yet been determined or has been determined to be astranger or otherwise suspect, then an attempted communication may becarried out using a communication technique that may prompt a pet dog tobark loudly (e.g., emitting a high-pitched “dog whistle” typecommunication from an output component of a smart device of environment100), thereby not only putting any human user occupants on notice of theunknown visitor's detected presence but also increasing the security ofenvironment 100 by making the visitor aware of the presence of thebarking dog, but, if the identity of the visitor has been determined tobe somewhat trusted, then an attempted communication may be carried outusing a communication technique that may not prompt a pet dog to barkloudly (e.g., emitting a communication (e.g., visual information and/oran audio communication) that may not excite a dog from an outputcomponent of a smart device of environment 100), thereby putting anyhuman user occupants on notice of the trusted visitor's detectedpresence while not unnecessarily riling up a pet.

Platform 200 may be configured to selectively enable a conventionaldoorbell interface to the visitor at step 2008 (e.g., based on anysuitable analysis at step 2004). For example, when any visitor isdetected at environment 100 or when a specific type of visitor isdetected at environment 100 during any mode or during a particular modeof environment 100 (e.g., at steps 2002/2004), platform 200 may beoperative to provide feedback to the visitor at step 2008 that may beindicative of a visitor's option to interact with doorbell button 812 ofdoorbell 106 for attempting to announce the visitor's presence to anoccupant of environment 100. In such embodiments, doorbell 106 may beoperative to communicate to the visitor via any suitable communicationmechanism (e.g., via projector 830, speaker 836, or an indicator onbutton 812 itself) any suitable feedback indicating that button 812 hasbeen enabled for optional visitor interaction (e.g., feedback conveyinga message along the lines of “the visitor may ring doorbell button 812to attempt to alert an occupant of your presence”). For example, thismay be enabled by platform 200 if a current occupant of environment 100is not in a do-not-disturb mode but is willing to be notified ofvisitors in response to a visitor's active interaction with a doorbellbutton. This may also provide the visitor with some sense of control inthe process. As another example, such feedback may be more specificbased on current active occupancy or mode of environment 100. As justone specific example, if a first user A (e.g., Husband 1718) is anactive and available occupant at environment 100 but a second user B(e.g., Wife 1714) is currently unavailable at environment 100 (e.g., asmay be determined through analysis at step 2004), doorbell 106 may beoperative to communicate to the visitor via any suitable communicationmechanism (e.g., via projector 830, speaker 836, or an indicator onbutton 812 itself) any suitable feedback indicating that button 812 hasbeen enabled for optional visitor interaction for attempting to alertonly first user A but not second user B of the visitor's presence.Therefore, platform 200 may be operative to provide the visitor with theoption to choose whether or not to “ring” doorbell button 812 forattempting to alert occupant user A of the visitor's presence, which mayincrease the convenience of not only the visitor but also of occupantuser A, for example, when the visitor may choose to walk away fromenvironment 100 without ringing the bell if the visitor only wanted tosee user B but not user A. This too may provide the visitor with somesense of control in the process. In response to such feedback, thevisitor may choose to interact with button 812 of doorbell 106 foralerting the available occupant(s) of its presence at step 2010. If twoor more occupants are available to be notified of the visitor'spresence, such availability may be communicated to the visitor (e.g., atstep 2008) and doorbell 106 may provide the visitor with the ability toselectively choose which of the available occupants may be notified ofthe visitor's presence (e.g., at step 2010). For example, a firstportion of button 812 may indicate that visitor interaction therewithmay notify a first available occupant of the visitor's presence (e.g.,using an output component of a first smart device proximate the firstoccupant), while a second portion of button 812 may indicate thatvisitor interaction therewith may notify a second available occupant ofthe visitor's presence (e.g., using an output component of a secondsmart device proximate the second occupant), and while a third portionof button 812 may indicate that visitor interaction therewith may notifyboth the first available occupant and the second available occupant ofthe visitor's presence.

FIG. 31 is a flowchart of an illustrative process 3100 for handling avisitor at a smart environment that includes a number of smart devices.At step 3102, process 3100 may include detecting visitor informationassociated with the visitor at the smart environment using a first smartdevice of the smart devices. At step 3104, process 3100 may includeanalyzing the detected visitor information using a computing system thatis communicatively coupled to the first smart device. At step 3106,process 3100 may include, based on the analyzing, providing feedbackfrom the computing system to the visitor via a second smart device ofthe smart devices, wherein the feedback includes an option messageindicative of at least one option available to the visitor.

It is understood that the steps shown in process 3100 of FIG. 31 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

When any suitable level of clarity, confidence, accuracy, and/orspecificity has been achieved by platform 200 with respect to thepresence, identity, and/or intent of a detected visitor, such visitoridentity and/or intent may be analyzed (e.g., at step 2004/2006) inconjunction with any other suitable data (e.g., occupancy data oravailability data or settings of a mode of environment 100 or of asystem user, inferences, rules, user input, neighboring smartenvironments, third party entities, time of day, etc.) and then variouspotential types of specific feedback may be provided to the visitorbased on that analysis (e.g., at step 2008) and/or variousfunctionalities of smart devices of environment 100 may be adjustedbased on that analysis (e.g., at step 2005). Therefore, in response todetermining any visitor identification information and/or visitorintention information, platform 200 may be operative to take particularaction (e.g., automatically) based on various factors of the particularsituation for controlling doorbell 106 and/or any other suitable smartdevices of environment 100 to increase the security of environment 100,increase the efficiency of the visitor's intentions, increase theconvenience of a system user with respect to the handling of thevisitor, and the like.

When a general class of visitor has been determined, various actions maybe taken by platform 200. For example, when a deliverer visitor of aknown delivery business entity has been detected, platform 200 may beoperative to communicate any suitable delivery instructions to thevisitor, as described above. As another example, when a firefightervisitor has been detected, platform 200 may be operative to grant accessto structure 150 in all situations or only in certain situations (e.g.,if a hazard detector 104 has detected a specific type of hazard withinstructure 150 and no occupant activity has been detected within acertain duration of time). As another example, if a solicitor visitorhas been detected (e.g., an entity with an identified intention tosolicit something from a system user of environment 100), platform 200may be operative to communicate any suitable message to the solicitor(e.g., “please leave this property immediately or you will be subject toarrest” or “please kindly leave a message with doorbell 106 and yoursolicitation will be considered at a later time”).

When a specific visitor has been identified, various actions may betaken by platform 200. For example, when a trusted friend visitor of asystem user has been detected, platform 200 may be operative tocommunicate any suitable status information of that system user to thevisitor, where such status information may indicate that the user iscurrently napping, that the user is currently putting the baby down fora nap but will be available in a few minutes, that the user is currentlyaway from but driving towards environment 100 with an expected arrivaltime in a few minutes, that the user is currently at the grocery store,or any other suitable status information that may be determined byplatform 200. Platform 200 may enable a system user (e.g., via anapplication on a user device 166) to define different sharing thresholdsfor different visitors, such that a user may enable platform 200 toshare only particular status information with particular visitors atparticular times as the user desires. For example, a system user maydefine a mode setting that instructs platform 200 to convey a particularmessage if a particular visitor is detected at environment 100 at aparticular time, such as “Hi neighbor Billy, I am currently napping butI left your sunglasses hidden next to the large oak tree in the backyardfor your own retrieval”. In some embodiments, platform 200 may beoperative to adjust a functionality of a smart device in conjunctionwith conveying such a message to a particular detected visitor, such asby conveying the message “Hi Uncle Nick, I am sorry I am running late, Iwill be home in 10 minutes, please go inside and make yourselfcomfortable” with doorbell 106 while also temporarily unlocking door 186with doorknob 122. Therefore, a do-not-disturb mode that may be enabledby a system user when he is napping may include conditional settingsthat may be operative to instruct platform 200 to interact with mostdetected visitors by conveying a message to the visitor that “theoccupant is currently unavailable at this time, please try again later”,but that may be operative to instruct platform 200 to interact with aparticular detected visitor (e.g., a highly anticipated visitor) byconveying a unique message “the occupant will be with you in just amoment” to the visitor and to immediately alert the napping user of theparticular detected visitor (e.g., via any suitable smart devicecommunication that may be suitable to wake the napping user and conveythe presence of the particular detected visitor). Based on any suitableanalysis in response to a particular visitor being detected, anysuitable message may be conveyed and/or any suitable smart devicefunctionality may be adjusted by platform 200.

Platform 200 may be operative to remind system users of certain expectedvisitors in order to enable adjustment of certain mode settings. Forexample, platform 200 may leverage any suitable data, such as usercalendar event data, deliverer entity business shipping schedule data,and the like to identify certain periods of time during which a visitoris expected at environment 100, and platform 200 may enable adjustmentof certain mode settings for handling such visitors in advance of thatmode being enabled for execution by platform 200. As just one example,delivery entity business 228 (e.g., Federal Express) may share a planneddelivery time for a package PL at environment 100 with system 164 (e.g.,via API 210) and platform 200 may utilize such information to alert asystem user of that expected delivery time if it may coincide with atime frame of a particular mode to be enabled at environment 100. Thatis, if user UL interacts with platform 200 to enable a do-not-disturbmode for the next 3 hours because that user is about to take a nap,platform 200 may identify that the delivery of package PL is planned forwithin that 3 hour time period, communicate as much to the user, and mayenable user-adjustment of certain mode settings of the do-not-disturbmode that may affect the handling of the delivery of that particularpackage PL. For example, the do-not-disturb mode may initially includemode settings operative to instruct platform 200 to tell any detectedvisitor to come back at a later time, but the expected delivery ofpackage PL may require a physical user signature in order to completethe delivery, whereby platform 200 may be operative to analyze such dataand ask the user whether it would like to adjust a setting of thedo-not-disturb mode for the handling of that particular delivery visitor(e.g., “would you like to update the settings to alert you if thisparticular package is attempted to be delivered during thedo-not-disturb mode?”), such that the user may update the mode settingsof the do-not-disturb mode to instruct platform 200 to wake up thenapping user if the delivery of package PL is actually detected byenvironment 100 at doorbell 106 while that do-not-disturb mode isenabled.

As another particular example, a calendar application for a particularuser (e.g., as may be accessible from a user device 166) may be accessedand analyzed (e.g., independently or in combination with other detecteddata) by platform 200 to determine an expected arrival time of anexpected visitor at environment 100 (e.g., leveraging calendar dataindicative of “repair man coming to environment 100 at 3:00 pm to fixbackyard swimming pool”) and platform 200 may utilize such informationto alert a system user of that expected visitor time if it may coincidewith a time frame of a particular mode to be enabled or recently enabledat environment 100. That is, if a system user interacts with platform200 to enable a do-not-disturb mode indefinitely (e.g., if user Husband1718 and Child 1722 are detected by platform 200 to leave environment100 and exit inner geo-fence 1730 at 2:30 pm, thereby leavingenvironment 100 unoccupied and thereby automatically enabling aparticular do-not-disturb mode for environment 100), platform 200 mayautomatically identify that the time frame of the expected visitor mayoverlap with the enablement time frame of the do-not-disturb mode, maycommunicate this identified overlap to the user, and may enable the userto adjust one or more mode settings of that enabled mode in order toaffect the handling of that expected visit. For example, thedo-not-disturb mode may initially include mode settings operative tolock gated entry 116 and to convey a message to any detected visitor atgated entry 116 (e.g., via a doorbell 106 at gated entry 116) that “noone is available at this time, please come back again later”, howeversuch visitor handling may prevent an expected pool repairman fromservicing a pool of environment 100 beyond gated entry 116, wherebyplatform 200 may be operative to analyze such data and ask the userwhether it would like to adjust a setting of the do-not-disturb mode forthe handling of that particular repairman visitor (e.g., “would you liketo update the settings to enable access to the outdoor pool if a visitby this particular repairman is detected during the do-not-disturbmode?”), such that the user may update the mode settings of thedo-not-disturb mode to instruct platform 200 to temporarily unlock gatedentry 116 if the pool repairman is actually detected by environment 100.Therefore, platform 200 may be operative to analyze expected visitorinformation in combination with mode settings of any modes to be enabledduring expected visits and may be operative to either automaticallyupdate certain mode settings or automatically suggest certain modesetting updates to a system user based on that analysis. This may add anadditional layer of convenience to a system user with respect to thehandling of visitors at environment 100 by platform 200.

FIG. 32 is a flowchart of an illustrative process 3200 for handling avisitor at a smart environment that includes a number of smart devices.At step 3202, process 3200 may include detecting visitor informationassociated with the visitor at the smart environment using a first smartdevice of the smart devices. At step 3204, process 3200 may includeanalyzing the detected visitor information using a computing system thatis communicatively coupled to the first smart device. At step 3206,process 3200 may include, based on the analyzing, providing feedbackfrom the computing system to the visitor via a second smart device ofthe smart devices, wherein the feedback includes at least one of apre-recorded system message from the computing system to the visitor anda user message from a user of the smart environment to the visitor.

It is understood that the steps shown in process 3200 of FIG. 32 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 33 is a flowchart of an illustrative process 3300 for handling apotential visit by a visitor at a smart environment that includes anumber of smart devices. At step 3302, process 3300 may includeobtaining, at an environment computing system, potential visit dataassociated with the status of a potential visit. At step 3304, process3300 may include obtaining, at the environment computing system from atleast one sensor of at least one smart device of the smart devices,environment data associated with the status of the smart environment. Atstep 3306, process 3300 may include analyzing, with the environmentcomputing system, at least a portion of the obtained potential visitdata in combination with at least a portion of the obtained environmentdata. At step 3308, process 3300 may include adjusting, with theenvironment computing system, a setting of a do-not-disturb mode of thesmart environment based on the analyzing.

It is understood that the steps shown in process 3300 of FIG. 33 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Platform 200 may be operative to detect any suitable type of behavior ofa visitor, in addition to or as an alternative to merely the presence,identification, and/or intent of the visitor, and platform 200 may beoperative to analyze such detected visitor behavior for increasing theeffectiveness of platform 200 to secure environment 100 and/or to handlea visitor. For example, certain detected behavior of a visitor may beanalyzed and deemed suspicious, in response to which one or moresecurity features of platform 200 may be leveraged for increasing thesecurity of environment 100. Additionally or alternatively, certaindetected behavior of a visitor may be analyzed and deemed informativefor use in strengthening any suitable inferences that may be made by anysuitable component(s) of platform 200. Any suitable behavior of avisitor at environment 100, including any visitor interaction withstructure 150 or with any other suitable portion of environment 100, maybe detected by any suitable portion of platform 200, including anysensing component(s) of doorbell 106, entry detector 112, doorknob 122,and/or any other suitable smart device of environment 100.

Certain visitor behavior may be detected as suspicious and leveraged toincrease the security of environment 100 in one or more ways. Forexample, platform 200 may be operative to detect if/when a visitorattempts to open a door or other entry point to a portion of environment100 before platform 200 has granted that visitor access to such an entrypoint, in response to which platform 200 may be operative to leveragethe detection of such suspicious visitor behavior to adjust certainsecurity mechanisms of environment 100. For example, one or more sensingcomponents of doorbell 106 (e.g., a camera) or of entry detector 112 atdoor 186 may be operative to detect when a visitor touches doorknob 122and/or otherwise attempts to gain access to structure 150 through aclosed door 186. As another example, as shown in FIG. 14, smart doorknob122 may include one or more sensing components 1428, which may includeany suitable sensing components similar to those described above withrespect to sensing components 828, and which may be operative to detectwhen a visitor twists, grabs, pulls, or at least touches doorknob 122and/or otherwise attempts to gain access through door 186. For example,one or more of sensing components 1428 may be positioned within a handleportion 1401 of doorknob 122 that may be accessible to a visitor beyondan external side 186 e of door 186, where an internal side 186 i of door186 may face an interior of structure 150 when door 186 is closed forpreventing entry of the visitor into structure 150, and at least onesensing component 1428 may be operative to detect visitor touching,rotation, pulling, grabbing, or any other suitable visitor interactionwith doorknob handle 1401 or with any other suitable portion of doorknob122. For example, one doorknob sensing component 1428 may include anaccelerometer or any other suitable motion sensing component fordetecting certain visitor interaction with doorknob 122. Additionally oralternatively, a doorknob sensing component 1428 may include a biometricsensing component, such as a fingerprint detector, that may be operativeto detect certain specific identification information of a visitorinteracting with doorknob 122 (e.g., for use in determining visitortrust and/or unlocking doorknob 122). Any other suitable visitorbehavior may be detected and deemed suspicious by platform 200 forinitiating enhanced security features other than visitor interactionwith doorknob 122 prior to being granted access through closed door 186.For example, platform 200 may be operative to analyze detectedinformation (e.g., at steps 2002/2004) to deem any one of the followingor any combination of the following visitor interactions to besuspicious: any suitable unauthorized interaction with doorknob 122(e.g., physically touching, grabbing, twisting, pulling, etc.); anysuitable unauthorized interaction with structure 150 (e.g., visitorphysically knocking on door 186 or opening a mail slot or other featureof door 186); one or more failed attempts by the visitor to supply acorrect access code or other suitable authentication for entry throughclosed door 186; interaction with user interface/button 812 of doorbell106 in an unauthorized manner (e.g., a visitor pressing button 812 whenbutton 812 is presented as disabled); any inappropriate visitorinteraction with one or more components of a smart device (e.g., avisitor blocking a camera sensing component 828 of doorbell 812); anyvisitor behavior that prevents or inhibits visitor identification (e.g.,a visitor detected to be wearing a mask); and the like.

In response to platform 200 detecting a visitor interacting withdoorknob 122, with doorbell 106, with any other smart device associatedwith door 186, and/or with any suitable portion of closed door 186itself in any particular manner that may be deemed suspicious orotherwise, for example, prior to platform 200 or an authorized userthereof granting the visitor access through door 186, platform 200 maybe operative to adjust a functionality of environment 100 to increasethe security thereof. For example, a first or additional lock (e.g., alock of doorknob 122) may be enabled by platform 200 to more securelyretain door 186 in its closed position. As another example, an alarm orany other suitable message may be conveyed by platform 200 to (i) thevisitor (e.g., by doorbell 106) for instructing the visitor to stopattempting to open door 186 but rather interact only with doorbell 106and/or (ii) to a system user (e.g., by personal device 166) for alertingthe user of the detected suspicious behavior and/or (iii) to anappropriate trusted third party (e.g., law enforcement 222) for raisinga threat level of environment 100. As another example, platform 200 maybe operative to increase the sensing functionality of one or more smartdevices of environment 100 in response to detecting suspicious visitorbehavior, such as, by increasing the sampling rate of a sensingcomponent, by increasing or varying the sensing area covered by asensing component, by turning on one or more additional sensingcomponents (e.g., biometric/fingerprint scanner of doorknob 122, etc.)that may have previously been turned off for power conservancy, etc. toincrease the security of environment 100 (e.g., by enhancing the abilityof environment 100 to monitor any additional potential visitor activityor identify the visitor in any suitable way).

Certain visitor behavior may be detected as informative and leveragedfor use in strengthening any suitable inferences that may be made by anysuitable component(s) of platform 200. For example, platform 200 may beoperative to detect when a visitor is granted access through door 186 oris not granted access through door 186 and may update anyplatform-information based on that treatment of the visitor and anyother interaction that visitor had with environment 100. For example, ifa detected visitor (e.g., as detected at one or more iterations of step2002) is granted authorized access through door 186 (e.g., through anysuitable workings of platform 200, such as a system user interactingwith platform 200 for authorizing the opening of door 186 for thatvisitor or that visitor successfully providing an authorized access codefor electronically opening door 186), any suitable visitor informationgathered about that visitor (e.g., pictures, fingerprints, voicesamples, identification card information, visitor interaction withdoorbell 106 or doorknob 112 or any other portion of environment 100prior to the visitor's authorized access, etc.) may then be leveraged inany suitable way by platform 200 for associating that visitorinformation with a “trusted” entity of environment 100. On the otherhand, if a detected visitor is not granted authorized access throughdoor 186 (e.g., through any suitable workings of platform 200, such as asystem user interacting with platform 200 for forbidding the opening ofdoor 186 for that visitor or that visitor unsuccessfully providing anauthorized access code for electronically opening door 186), anysuitable visitor information gathered about that visitor (e.g.,pictures, fingerprints, voice samples, identification card information,visitor interaction with doorbell 106 or doorknob 112 or any otherportion of environment 100 prior to the visitor's access being declined,etc.) may then be leveraged in any suitable way by platform 200 forassociating that visitor information with an “untrusted” entity ofenvironment 100. An association of detected visitor information withdetermined visitor accessibility treatment for a given visitorinteraction with environment 100 may be leveraged by platform 200 asdata for informing the processing/analysis of any suitable operation orsetting or inference or rule of platform 200, including any futureattempt to detect the identity of a visitor and/or the level of trust tobe afforded to such a visitor. Therefore, if a particular visitor gainsauthorized access through door 186, then any or all visitor informationdetected by doorbell 106 or otherwise by environment 100 about theidentification of that visitor and/or its interaction with environment100 may be leveraged in the future for any suitable purpose by platform200, such as for increasing the efficiency with which platform 200 mayhandle a later visit by that particular visitor at environment 100 orany other environment of platform 200 (e.g., by using that data for morequickly identifying the visitor or for more reliably classifying thevisitor as a trusted or untrusted visitor for use in determining howplatform 200 may handle that later visit). For example, if analysis(e.g., at step 2004) of detected visitor information is not able toreveal the specific identity of a detected visitor currently atenvironment 100 but such analysis is able to reveal that the detectedvisitor was previously granted access to environment 100 five daysearlier (e.g., by leveraging previously collected visitor informationduring such analysis), platform 200 may be operative to classify thedetected visitor as a “trusted” entity and may utilize thatclassification for enhancing the current handling of that visitor (e.g.,by sharing that trusted classification and any other suitableinformation, such as the fact that the same visitor was granted accessfive days ago, with a system user of environment during the currentvisitor handling (e.g., at step 2006)). Similarly, if analysis (e.g., atstep 2004) of detected visitor information is not able to reveal thespecific identity of a detected visitor currently at environment 100 butsuch analysis is able to reveal that the detected visitor was previouslydenied access to environment 100 five days earlier (e.g., by leveragingpreviously collected visitor information during such analysis), platform200 may be operative to classify the detected visitor as an “untrusted”entity and may utilize that classification for enhancing the currenthandling of that visitor (e.g., by sharing that untrusted classificationand any other suitable information, such as the fact that the samevisitor was denied access five days ago, with a system user ofenvironment during the current visitor handling (e.g., at step 2006) orby more securely locking door 186 (e.g., at step 2005)).

FIG. 34 is a flowchart of an illustrative process 3400 for handling avisitor at a smart environment that includes a number of smart devices.At step 3402, process 3400 may include detecting visitor behaviorinformation indicative of particular behavior of the visitor at thesmart environment using a first smart device of the smart devices. Atstep 3404, process 3400 may include analyzing the detected visitorbehavior information using a computing system that is communicativelycoupled to the first smart device. At step 3406, process 3400 mayinclude, based on the analyzing, determining, using the computingsystem, that the particular behavior of the visitor is suspicious. Atstep 3408, process 3400 may include based on the determining, adjusting,using the computing system, a functionality of a second smart device ofthe smart devices.

It is understood that the steps shown in process 3400 of FIG. 34 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 35 is a flowchart of an illustrative process 3500 for handling avisitor at a smart environment that includes a number of smart devices.At step 3502, process 3500 may include detecting visitor behaviorinformation indicative of particular behavior of the visitor at thesmart environment using a first smart device of the smart devices. Atstep 3504, process 3500 may include detecting visitor identityinformation associated with the identity of the visitor at the smartenvironment using a second smart device of the smart devices. At step3506, process 3500 may include analyzing the detected visitor behaviorinformation using a computing system that is communicatively coupled tothe first smart device. At step 3508, process 3500 may include, based onthe analyzing, determining, using the computing system, that theparticular behavior of the visitor is indicative of a determination ofaccessibility of the visitor to a secure area of the smart environment.At step 3510, process 3500 may include, based on the determining and thedetected visitor identity information, adjusting, using the computingsystem, at least a portion of an inference available to the computingsystem.

It is understood that the steps shown in process 3500 of FIG. 35 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Platform 200 may be operative to leverage data collected by one or morevarious other smart environments and/or entities 222-230 and/or othersuitable data sources of platform 200 for increasing the security of aparticular environment 100 during a visitor interaction at environment100 and/or for enhancing the efficiency/convenience of how that visitorinteraction is handled at environment 100. For example, data collectedby smart environments or other entities that are within a suitablethreshold distance of environment 100 may be leveraged by platform 200for adjusting the functionality of smart devices of environment 100and/or analyzing data associated with smart environment 100. Thethreshold distance defining the relationship between such remote datacollection sources and environment 100 may vary based on the purpose ofleveraging the data from such remote data sources.

Data indicative of a particular visitor being detected by one or moresmart environments other than environment 100 or by one or more thirdparty entities 222-230 or by any other detection source of platform 200may be leveraged by platform 200 for affecting the operation of smartenvironment 100 with respect to handling the potential arrival of thatparticular visitor at environment 100. For example, if a particular“visitor” is detected at a first location LA by a first environment 100a of platform 200 (e.g., by one or more smart devices of thatenvironment 100 a) at a first time A and platform 200 determines throughany suitable processing/analysis that the detected visitor is “ofinterest” for any suitable reason, then platform 200 may leverage anysuitable information about that detected visitor for any suitable use atother environments or entities of platform 200, such as at one or moreentities 222-230 associated with environment 100 a/location LA and/or atsmart environment 100 b at location LB and smart environment 100 c atlocation LC and smart environment 100 at location LU, each of which maybe within a particular distance DD of detecting environment 100 a.Platform 200 may be operative to determine that a particular visitor ofinterest has been detected at any suitable location, not only fromvisitor information detected at a smart environment of platform 200(e.g., at one or more of environments 100, 100 a, 100 b, 100 c, etc.)but also from visitor information detected by any suitable entity ofplatform 200 whether or not that entity is local to a smart environment(e.g., by a personal device 166 of user UR or Wife 1714 remote fromenvironment 100, or by a device 266 of any agent of any entity 222-230,or by any other device capable of sensing visitor information at anyparticular location and sharing such detected visitor information withany suitable component of platform 200). As mentioned above, a “visitor”that may be detected by platform 200 may be any suitable entity that canbe identified in any suitable way by one or more sensing components ordata sources of platform 200. Such a detectable visitor may be a human(e.g., a deliveryman or delivery woman of firefighter or security guardor any other suitable human agent of an entity 222-230 of platform 200,a system user/occupant associated with a smart environment, afriend/neighbor/acquaintance of a system user, a solicitor, a stranger,would-be-thieves, etc.), a vehicle of such a human (e.g., a car of asystem user or delivery truck of a deliverer), a drone (e.g., a deliverydrone or a security drone or any other unmanned vehicle or robot thatmay carry out certain tasks), an animal (e.g., a pet or stray animal orwild animal that may be detected via facial recognition or any othersuitable detection methods such as RFID tag detection, etc.), or anyother property or entity that may be detectable in any suitable manner(e.g., a briefcase that may include an RFID tag or any other suitabledetectable identity).

As a particular example, if a particular visitor detected at environment100 a is determined to be a suspected criminal (e.g., by detecting thatvisitor interact suspiciously with environment 100 a or by comparingvisitor information detected by environment 100 a with a wanted personsdatabase of law enforcement entity 222), platform 200 may be operativeto increase the security of neighboring environments 100 b, 100 c, and100 in any suitable way. For example, in response to detecting asuspected criminal at neighboring environment 100 a, platform 200 mayinform law enforcement entity 222 and/or may adjust the functionality ofone or more smart devices of environment 100 by activating outdoorlighting 114 of environment 100, locking all entry points to environment100, increasing the sensing capabilities of certain sensing componentsof environment 100 (e.g., components 828 of doorbell 106), prioritizingthe use of that suspected criminal's identification information whenattempting to identify a detected visitor at environment 100 (e.g., atsteps 2002/2004), warning users/occupants of environment 100 to be extracautions/on the look-out for that suspected criminal (e.g., bycommunicating identification information of that suspect (e.g., a photo,last known whereabouts, etc.) via smart devices of environment 100 toits users), enabling a particular mode for environment 100 (e.g., acriminal high alert mode), and the like.

Other types of detected visitors may be determined to be of interest byplatform 200 for various other reasons than for being a suspectedcriminal and such detection may be leveraged by platform 200 foraffecting the operation of neighboring environments accordingly inrespective various ways. For example, based on the detection of amissing child or a missing pet or a missing briefcase at a firstlocation nearby environment 100 (e.g., within distance DD of environment100), platform 200 may inform law enforcement entity 222 and/or mayadjust the functionality of one or more smart devices of environment 100for increasing the likelihood that such a visitor of interest may bedetected at environment 100 (e.g., turn on outdoor lights 114, increasesensing functionality of one or more smart devices at environment 100 atleast with respect to detecting the visitor of interest, etc.). As aparticular example, in the event Child 1722 goes missing fromenvironment 100, that event may be reported to system 164 or any othercomponent(s) of platform 200 distinct from environment 100 (e.g., byHusband 1718 of environment 100 when he realizes the child is missingfrom environment 100, or automatically by one or more smart devices ofenvironment 100 that may automatically detect when the child is nolonger an occupant of environment 100, or otherwise when Child 1722moves outside of geo-fence 1730), such that certain modes or operationsor functionalities of various other smart environments of platform 200within a particular distance of environment 100 (e.g., environments inthe neighborhood) may be adjusted to increase the ability of platform200 to safely locate the missing child. As another particular example,in the event a dog goes missing from one home environment, platform 200can leverage data indicative of that event such that thenetwork-connected smart devices of other home environments in theneighborhood can be tuned to detect motions that indicate the presenceof a dog. In this example, if a dog is detected by an outdoornetwork-connected smart device (e.g., doorbell 106) of a homeenvironment that does not typically detect dogs, then a message can besent therefrom to the home environment of the missing dog indicatingthat a stray dog was detected and providing the location of thedetection. Further, in some examples, any suitable specificidentification information may be detected for a lost entity, such aspet, when any suitable identification component is coupled thereto. Forexample, an RFID tag may be provided on the dog's collar and anetwork-connected smart device of other home environments in theneighborhood may locate the dog by “reading” the RFID tag and sharingthe location of the dog upon request (e.g., automatically by platform200 when a located entity is known to be missing or otherwise ofinterest by platform 200 (e.g., by system 164 or the environment 100that is missing the entity). RFID tags may be placed on other property,too, such as bicycles such that other property may be located in asimilar manner.

As another example, based on the detection of a deliverer at a firstlocation nearby environment 100, platform 200 may inform delivererentity business 228 that may track such a deliverer and/or may adjustthe functionality of one or more smart devices of environment 100 forhandling a potential arrival of that deliverer (e.g., by turning off asprinkler system of environment 100, alerting a system user ofenvironment 100 that a deliverer is nearby and may be attempting thedelivery of a package to environment 100 shortly, etc.). As yet anotherexample, based on the detection of a solicitor at a first locationnearby environment 100, platform 200 may inform academic institution 226that may track such solicitors and/or may adjust the functionality ofone or more smart devices of environment 100 for preventing thatsolicitor from bothering any occupants of environment 100 (e.g., bypreventing access of the solicitor through gated entry 116, enabling ado-not-disturb mode for environment 100 for a period of time withinwhich platform 200 may estimate the solicitor may arrive at environment100, etc.). Therefore, detection of a particular type of visitor at aparticular location within a particular distance of smart environment100 may be leveraged by platform 200 to automatically pre-emptivelyprepare smart environment 100 for handling that visitor if it were toarrive at environment 100 (e.g., in accordance with any settings orpreferences of that particular environment 100 (e.g., based on thesystem preferences of a user of environment 100 to interact or notinteract with a solicitor)).

Platform 200 may be operative to monitor detected visitor identificationdata from all available data sources over time for tracking the pathtraveled by particular visitors and/or predicting a future path of suchvisitors. Platform 200 may leverage such a tracked path of travel fordynamically updating the operation of a certain smart environment basedon the calculated likelihood that the tracked path of travel will alignwith the location of that smart environment. Additionally oralternatively, platform 200 may leverage data about such a tracked pathof travel for sharing with or selling to interested entities, such aslaw enforcement agencies 222 (e.g., for tracked paths of suspectedcriminals or missing persons), animal control agencies (e.g., fortracked paths of certain animals that may be tagged or otherwisedetectable by sensing components of platform 200), academic institutionentities 226 (e.g., for tracked paths of certain solicitors, such asduring election cycles for studying certain trends), delivery businessentities 228 (e.g., for tracked paths of deliverers), emergency responseentities 230 (e.g., for tracked paths of emergency risks and oremergency responders), and the like. This may enable platform 200 toleverage a wide net of visitor sensing components (e.g., sensingcomponents 828 of smart doorbells 106) that may be provided at effectivelocations (e.g., at various smart environment entry points, such as atdoor 186 and/or gated entry 116, etc.) at various environments (e.g.,environments 100, 100 a, 100 b, 100 c, 100 d, 100 e, 100 f, etc.) thatmay be spread out across various geographical locations across aneighborhood, city, state, country, or globe, for tracking various typesof visitor entities and/or specific visitor entities not only toincrease the security and efficiency of those environments 100 but alsoto increase the effectiveness of various third party entities (e.g.,entities 222-230) and paradigms (e.g., paradigms 310) of platform 200that may have a specific interest in such detected visitors.

Platform 200 may be operative to analyze a tracked path of a visitor formaking inferences regarding the likelihood of a predicted future pathfor that visitor, and to adjust functionalities of a smart environmentbased on such tracking and predicting. For example, in response todetecting a suspected criminal at environment 100 a at a first locationLA at a first time, platform 200 may inform law enforcement entity 222of the specifics of that detection and/or may adjust the functionalityof one or more environments within a certain distance DD of location LA,such as environment 100 b at location LB and environment 100 c atlocation LC and environment 100 at location LU (e.g., by increasing asecurity level of one or more smart devices of environment 100), but notremote environments 100 d, 100 e, or 100 f that may be beyond distanceDD of detecting location LA. However, if the next time that samesuspected criminal is detected by platform 200 is at environment 100 cat location LC at a second time, then platform 200 may be operative todetermine that the tracked path of the suspected criminal (e.g., thedirection of tracked path TPA) is moving farther away from location LUof environment 100 and, in response to that determination, platform 200may be operative to once again adjust the functionality of environment100, but this time by reverting the functionality back to its previoussettings (e.g., by reducing a security level of one or more smartdevices of environment 100). Alternatively, however, if the next timethat same suspected criminal is detected by platform 200 is atenvironment 100 b at location LB at a second time, then platform 200 maybe operative to determine that the tracked path of the suspectedcriminal (e.g., the direction of tracked path TPB) is moving closertowards location LU of environment 100 and, in response to thatdetermination, platform 200 may be operative to once again adjust thefunctionality of environment 100, but this time by increasing a securitylevel of one or more smart devices of environment 100 to an even higherlevel or by putting environment 100 on even higher alert as analysis byplatform 200 of the tracked path of the suspected criminal from locationLA to location LB may predict a predicted future path of that criminal(e.g., the direction of predicted path PTPB) that may be determined topose an increased likelihood that the criminal may arrive at location LUof environment 100. Similarly, analysis of a tracked path of a deliverervisitor (e.g., deliverer DL) may enable platform 200 to dynamicallyadjust a predicted potential deliverer arrival time at environment 100and utilize that prediction to update modes or settings of environment100 for preparing environment 100 and/or its users accordingly.Moreover, such tracking and prediction of a deliverer by platform 200may be shared with a delivery entity business 228 for providing trusted(impartial) tracking data of its deliverer.

Platform 200 may be operative to detect and track the path of aneighborhood security guard or any other suitable entity amongst varioussmart environments that the guard may be tasked with monitoring. Asdescribed above with respect to tracking a deliverer DL, platform 200may be operative to track a security guard or any other suitable entityas it visits various smart environments. For example, doorbell 106 orany other suitable smart device of smart environment 100 that may beaccessible to a security guard as it inspects the security ofenvironment 100 may be leveraged for enabling accurate location and timetracking of such a security guard by detecting and logging data at eachinspected environment 100 (e.g., by enabling the guard to “check-in” atenvironment 100 prior to inspecting environment 100 and “check-out” fromenvironment 100 after inspecting environment 100). For example, when asecurity guard is initially detected at environment 100 (e.g., via anysuitable sensing component 828 of doorbell 106 or of any other suitablesmart device of environment 100), the identity of that guard isauthenticated and the time of that detection is collected by platform200. The security guard may guarantee such detection by affirmativelyusing a guard identification card at doorbell 106 when initiallyarriving at environment 100. Then, environment 100 may be operative toactivate or otherwise utilize one or more additional sensing componentsof environment 100 for tracking any action of the guard at environment100 (e.g., for detecting the movements of the guard about certainportions of environment 100 for confirming that the guard actuallycarried out certain security duties (e.g., for confirming the guardinvestigated each applicable area of environment 100 over a sufficientlength of time)). Then, when finished inspecting the security ofenvironment 100, the security guard may be enabled to check-out fromenvironment 100 by once again authenticating its identification atdoorbell 106 or elsewhere at environment 100 before leaving environment100.

Therefore, rather than relying on inspection information generated andreported by a security guard itself during or after an inspection of anenvironment 100 or multiple environments within a neighborhood as aneighborhood watch guard (e.g., via data entered into a personal deviceof the guard, which may be similar to delivery device 266 of delivererDL), system 164 may be operative to generate and report its own trackingdata that may be compared to and/or relied on by a security agencyentity (e.g., a security business 228) instead of any data generated bythe guard, as data generated by system 164 (e.g., as may be generated bydoorbell 106 and/or other smart devices of environment 100) may betrustworthy as an impartial data source (e.g., as compared to a guardwho may enter incorrect data to inflate his efficiency and/or hide hisinefficiencies and/or forget to enter data at all). By leveraging itsvisitor identity and activity sensing capabilities at one or more smartenvironments, platform 200 may be operative to effectively confirm theappearance and activity of any suitable entity not only at a singleparticular environment 100 but also to track such appearance andactivity at multiple other environments for ensuring that the entityfulfills its particular obligations or for at least providing someoversight for motivating the same. While certain above examples maydescribe multiple smart environments in the context of distinct lots ofneighboring properties (e.g., various distinct smart home environmentson different plots of land within the same neighborhood or ZIP code),various other arrangements of neighboring environments may be operativeto enable the various concepts of this disclosure, such as various smartenvironments being associated with various residential apartment unitsin the same condominium building structure or in various condominiumbuilding structures, or with various commercial office suites in thesame commercial office building structure or in various commercialoffice building structures.

FIG. 36 is a flowchart of an illustrative process 3600 for potentiallyhandling a visitor at a smart environment that includes at least onesmart device. At step 3602, process 3600 may include receiving, at acomputing system, first visitor identification data indicative of thevisitor being detected at a first location at a first time. At step3604, process 3600 may include analyzing, using the computing system, atleast a portion of the received first identification data to determinethat the visitor is of interest. At step 3606, process 3600 may includeautomatically adjusting, using the computing system, a functionality ofthe at least one smart device of the smart environment based on theanalyzing.

It is understood that the steps shown in process 3600 of FIG. 36 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Platform 200 may be operative to enable at least partial or limitedaccess to at least certain portions of smart environment 100 by anysuitable entity, whether or not that entity is known by platform 200(e.g., known by any smart environment or service entity 222-230 orprocessing paradigm 310 or extrinsic information 316 or otherwise (e.g.,at system 164)). Such access may be provided to any particular entity asan invitee by generating a smart invitation that may be associated witha particular type of access to a smart environment. While process 1900of FIG. 19 has previously been described with respect to placing anorder for delivery of content in a package to a recipient at a location,where unique package identification information may be generated basedon one or more attributes of the order and on smart environment dataassociated with the order, and where such unique package identificationinformation may be integrated into data of a label ID that may beaffixed to the package and later leveraged by a deliverer and/or thesmart environment for facilitating the delivery of that package by thedeliverer to the environment, one or more steps of process 1900 may beutilized with respect to inviting an invitee (e.g., a person or othersuitable entity) to be a trusted visitor at a smart environment, whereunique invitation identification information may be generated based onone or more attributes of the invitation (e.g., invitation time,invitee, etc.) and/or smart environment data associated with the smartenvironment, and where such unique invitation identification informationmay be integrated into data of a smart invitation (e.g., label ID) thatmay be leveraged by the invitee and/or the smart environment forfacilitating the accessibility of that smart environment by the invitee.While the following may describe the generation and use of a smartinvitation in the context of an invitee's access to a social gatheringat a smart environment, it is to be understood that such a smartinvitation concept may be leveraged for any suitable situation,including the above-described package delivery context (e.g., a FederalExpress package delivery or a local restaurant food delivery).

When a system user of environment 100 (e.g., a user with managementauthority to grant access to environment 100) wishes to enable access toenvironment 100 by a visitor entity at a future time, the user may beenabled by platform 200 to define one or more parameters or rules orsettings for environment 100 that may be satisfied by a visitor entityupon arrival at environment 100 (e.g., via doorbell 106 and/or any othersuitable smart device) for gaining access to environment 100 (e.g.,through gated entry 116 into environment 100 generally or through door186 into structure 150 of environment 100). In some embodiments, asdescribed above, a system user may define a mode setting that mayinstruct platform 200 to adjust a functionality of a smart device ofenvironment 100 in conjunction with conveying a particular message if aparticular visitor is detected at environment 100 at a particular time,such as by conveying the message “Hi Uncle Nick, I am sorry I am runninglate, I will be home in 10 minutes, please go inside and make yourselfcomfortable” with doorbell 106 while also temporarily unlocking door 186with doorknob 122 for enabling access by that particular detectedvisitor to structure 150 through door 186. This setting may be definedby the system user interacting with platform 200 in any suitable way.For example, the system user may interact with any suitable userinterface of any suitable environment smart device or user personaldevice for conveying to platform 200 the identity of the particularvisitor to be granted access along with any suitable conditions for thataccess besides that visitor being detected at environment 100 (e.g.,accessibility to be limited to only a portion of environment 100,accessibility to be granted only if the visitor is detected during acertain time (e.g., between 2:00 pm and 5:00 pm on Monday), etc.). Insome embodiments, platform 200 may only require that the system userconvey the name or even a nickname (e.g., “Uncle Nick”) of theparticular visitor, as platform 200 may already have access to at leastsome identification record data for an entity with that name that mayhave been previously associated with environment 100 in any suitable way(e.g., as a previously detected visitor at environment 100 or as asocial connection to the system user on a social network withphotographs or other identification made available to platform 200(e.g., at social paradigm 310 c), etc.), such that platform 200 may beautomatically enabled to adequately confirm the identity of that namedparticular visitor when its presence may be detected at environment 100for carrying out the accessibility setting made by the system user.

In other embodiments, platform 200 may not be pre-equipped to detect theidentity of a particular visitor at environment 100 for association witha particular accessibility setting being made by the system user forthat particular visitor. Instead, some identification information forthe particular visitor may need to be provided to platform 200 (e.g., bythe system user) such that platform 200 may leverage that identificationinformation for later confirming the presence of the particular visitorat environment 100 for carrying out the accessibility setting made bythe system user. For example, the system user may communicate uniqueidentifying feature data of the visitor to platform 200 for later use inidentifying the presence of that visitor at environment 100. In suchembodiments, such unique identifying feature data may include aphotograph of the visitor's face or any other visually identifiablefeature, a voice sample of the visitor, a fingerprint of the visitor(e.g., if the visitor is a human), an RFID code (e.g., a unique ID codethat may be associated with the visitor), or the like, which may besensed by environment 100 if that visitor arrives at environment 100. Insuch embodiments, the visitor may not be aware of the accessibilitysetting enabled by environment 100 prior to the visitor being grantedsuch access, but instead environment 100 may be operative to detect thevisitor identification information needed by platform 200 toauthenticate the visitor's identity solely due to the visitor's presenceat environment 100 (e.g., due to the visitor being within a sensingrange of a sensing component 828 of doorbell 106).

In other embodiments, not only may platform 200 not be pre-equipped todetect the identity of a particular visitor at environment 100 forassociation with a particular accessibility setting being made by asystem user for that particular visitor, but also the system user maynot be able to communicate unique identifying feature data of thevisitor to platform 200 for later use in identifying the presence ofthat visitor at environment 100 (e.g., the system user may not haveaccess to a proper photograph of the visitor that may be made availableto platform 200 for enabling detection of that visitor at environment100). In such embodiments or otherwise, unique invitation identificationinformation may be generated based on a system user's decision togenerate a smart invitation for an invitee visitor with respect toenvironment 100, and such unique invitation identification informationmay be shared with both the invitee visitor and platform 200 for lateruse in identifying the presence of that invitee visitor at environment100 to authorize carrying out an accessibility setting made by thesystem user for that invitee visitor to environment 100. Such uniqueinvitation identification information may be made available to bothplatform 200 and the invitee visitor without specific physicalidentifying feature data of the invitee being known by the system user(e.g., without the system user having access to a photograph or RFIDcode or other unique identifying feature of the invitee), which mayincrease the security and/or privacy of the invitee. Instead, the uniqueinvitation identification information generated and provided to platform200 and the invitee visitor may be uniquely created for a particularsmart invitation that might be configured to be useful one time only.While the following may describe the generation and use of such a smartinvitation and unique invitation identification information in thecontext of an invitee visitor's access to a social gathering at a smartenvironment, it is to be understood that such a smart invitation conceptmay be leveraged for any suitable situation, including theabove-described package delivery context (e.g., a Federal Expresspackage delivery or a local restaurant food delivery). For example, suchunique invitation identification information of such a smart invitationmay be similar to the unique package identification information of labelID described above with respect to a package delivery process of FIG.19, whereby such an invitee visitor may be the facilitator (e.g., adeliverer entity or fulfillment entity).

FIG. 37 is a flowchart of an illustrative process 3700 for enhancingvisitor handling using a smart invitation. At step 3702, process 3700may include acquiring unique invitation identification information for asmart invitation. When a system user wishes to define a setting forenabling certain accessibility to environment 100 to an invitee visitorthrough the generation of a smart invitation with unique invitationidentification information for sharing with both the invitee visitor andplatform 200 for later use in identifying the presence of that inviteevisitor at environment 100 to authorize carrying out such anaccessibility setting, the system user may generate a request to createsuch unique invitation identification information. This may be enabledin any suitable context. For example, a system user may request that anysuitable unique invitation identification information be generated byany suitable entity for use as at least a portion of a smart invitation.Such unique invitation identification information may be any suitabledata that may be sensed by a sensing component of environment 100 (e.g.,by a sensing component 828 of doorbell 106) but that may preferably notbe easily guessed by an entity not privy to the unique invitationidentification information. For example, such unique invitationidentification information may be any suitable password (e.g., a word orstring of characters) of any suitable length of any suitable combinationof numbers, letters, symbols, and the like (e.g.,“XASJCDCFNKWE7821DNDKN” or “CLAM CHOWDER”, etc.) that may be generatedin any suitable way but also easily shared with an invitee (e.g.,physically via mail, digitally via e-mail, orally via telephone or inperson, etc.) and sensed by a sensing component of environment 100(e.g., received at a keypad user interface sensing component 812 ofdoorbell 106 when manually typed in by a visitor, received at an audiosensing component 828 or at a microphone sensing component 844 ofdoorbell 106 when orally spoken by a visitor or at a camera sensingcomponent 828 of doorbell 106 when presented for scanning by thevisitor, etc.). As another example, such unique invitationidentification information may be any suitable code, such as a linearbarcode, a two-dimensional or matrix barcode (e.g., a quick response(“QR”) code), a three-dimensional barcode, or the like, that may beuniquely generated but also easily shared with an invitee (e.g.,physically via mail, digitally via e-mail, etc.) and sensed by a sensingcomponent of environment 100 (e.g., read by a scanner sensing component828 of doorbell 106). As another example, such unique invitationidentification information may be any electronically stored information,such as such information stored on an RFID or NFC device or any othersuitable component from which such electronically stored information maybe obtained (e.g., electromagnetically or through electromagneticinduction), where such unique invitation identification information maybe uniquely generated and stored on such a component and then sharedwith an invitee (e.g., physically via mail, etc.) and sensed by asensing component of environment 100 (e.g., read by an NFC sensingcomponent or RFID sensing component 828 or other electromagnetic sensingcomponent of doorbell 106). In some embodiments, the system user maygenerate the unique invitation identification information itself (e.g.,by simply making one up in its head). In other embodiments, any suitablecomponent of platform 200 (e.g., system 164) may generate the uniqueinvitation identification information on behalf of the system user. Inother embodiments, a third party entity may generate the uniqueinvitation identification information on behalf of the system user(e.g., an order facilitator entity, such as a restaurant with which asystem user is placing a food order for delivery to environment 100,where such unique invitation identification information may be aconfirmation code for that specific order, etc.).

Next, at step 3704, process 3700 may include sharing the acquired uniqueinvitation identification information with an invitee (e.g., as at leasta portion of a smart invitation). For example, once particular uniqueinvitation identification information has been generated or otherwiseacquired (e.g., at step 3702), such unique invitation identificationinformation may be shared by the system user with a particular inviteewith which the system user may wish to associate a particularaccessibility setting at environment 100. The system user may create asmart invitation including the unique invitation identificationinformation and may communicate the smart invitation to the inviteeusing any suitable communication mechanism. If the unique invitationidentification information is a password that may be manually entered byan invitee at environment 100, the system user may simply call a humaninvitee on the telephone and orally share the password with the inviteeas part of a smart invitation (e.g., “your password is ‘XSG27HT’”) alongwith any other suitable information that may help the invitee use thepassword, such as the reason for the password (e.g., “Use your passwordto access my birthday party”), the address of environment 100 (e.g.,“Present your password to the smart doorbell adjacent the front door at123 Main Street”), the time at which the invitee should use the password(e.g., “anytime between 7:00 pm and 11:00 pm this Saturday”), and/or anyspecial or additional instructions (e.g., “You must wear red to begranted access as we will be celebrating Valentine's Day”). Similarly,the user may physically mail or e-mail a written message conveyingsimilar information as a smart invitation to the invitee. As anotherexample, if the unique invitation identification information is a codethat may be presented by an invitee for scanning at environment 100, thesystem user may physically mail a print out of the code or e-mail orotherwise communicate a digital copy of the code (e.g., that may beprinted by the invitee for use or presented in its digital form by theinvitee for use) along with any other suitable information descriptiveof the intended use of the code to the invitee as a smart invitation.The unique invitation identification information for a particular smartinvitation may be provided in a physical tag, such as an RFID tag or NFCelement that may be mailed to the invitee or otherwise made accessibleto the invitee for use at environment 100. In certain embodiments, ifplatform 200 generates the unique invitation identification informationon behalf of the system user or if platform 200 is provided with theunique invitation identification information by the user or any otherentity, platform 200 may be operative to generate a complete smartinvitation for the system user and communicate that smart invitation toan invitee on behalf of the system user for making the entire processeasier for the system user. In such embodiments, for example, the systemuser may simply have to communicate to platform 200 a communicationaddress for the invitee (e.g., an e-mail address of the invitee) and anyother suitable information that the user may wish to include in thesmart invitation (e.g., the time of the party, dress code, location ofenvironment 100 at which the party may be held, etc.), and platform 200may be operative to automatically generate and transmit to the invitee asmart invitation that may include not only the unique invitationidentification information but also the other information describing theinvitation. A web browser or a mobile application may be operative toprovide such a service to a system user for generating unique invitationidentification information and/or communicating to a user-designatedinvitee particular unique invitation identification information incombination with any additional user-designated invitation informationas a smart invitation, where such a service may be provided by platform200 (e.g., system 164) or a third party entity (e.g., an onlineinvitation/e-card company business 228). As yet another example, athird-party order facilitator entity may generate unique invitationidentification information when taking an order for a package from thesystem user (e.g., as a confirmation code for that order), where thefacilitator entity may share such unique invitation identificationinformation with the system user and/or directly with platform 200.

Process 3700 may also include defining a mode setting at step 3706 basedon the unique invitation identification information acquired at step3702. Before, during, or after sharing particular unique invitationidentification information with a particular invitee at step 3704, thatparticular unique invitation identification information may also beprovided to platform 200 (e.g., at step 3706) for use in defining anysuitable mode setting that may instruct platform 200 how to handledetection of that particular unique invitation identificationinformation by environment 100 (e.g., when presented by the particularinvitee at a sensing component of doorbell 106 or any other suitablesmart device of environment 100). Platform 200 may be operative toenable a system user to interact with platform 200 in any suitablemanner for at least partially defining such a mode setting (e.g., via apersonal device 166 or any suitable smart device of environment 100).Any environment 100 that the system user may have authorization tocontrol may be associated with such a mode setting and any suitableplatform action(s) by any suitable component(s) of platform 200 may beselectively associated with that environment 100 and the particularunique invitation identification information in such a defined modesetting, whereby platform 200 may be operative to carry out suchaction(s) when the particular unique invitation identificationinformation of that mode setting is detected at environment 100. Such aplatform action may include enabling access to a portion of environment100 (e.g., via door 186 by controlling smart doorknob 122), conveying aparticular message at an entryway of environment 100 where theparticular unique invitation identification information may be detected(e.g., via an output component of doorbell 106 to the invitee, such as“Welcome to the party—head through this door and straight back throughthe kitchen to the back patio”), conveying a particular message to thesystem user (e.g., via user device 166 or any suitable smart devicelocal to the user, such as “Invitee John Doe has just arrived and isbeing let in to the party”), conveying a particular message to a socialnetwork (e.g., via social paradigm 310 c, such as “Invitee John Doearrived at System User's party at 9:08 pm”), and/or any other possibleplatform action available to platform 200. As one particular example, amessage to be conveyed to a visitor as a platform action of a modesetting may be at least partially defined by dynamic information, suchas the current location of the system user within environment 100, suchthat a particular message conveyed to the visitor at an entryway ofenvironment 100 (e.g., via doorbell 106) may be “Welcome to theparty—head through this door and straight back through the kitchen tothe back patio to find your party host” if the system user is currentlylocated on the back patio at the time the platform action is to becarried out (e.g., as may be determined by platform 200 through anysuitable tracking capabilities as may be described herein) or may be“Welcome to the party—head through this door and up the master staircase to the library to find your party host” if the system user iscurrently located in the library at the time the platform action is tobe carried out. Such a platform action for conveying a message to avisitor may be communicated by platform 200 via any suitable smartdevice (e.g., via an output component 812, 830, and/or 836 of doorbell106) or to a personal device 266 of the visitor (e.g., via acommunications component 862 of doorbell 106) as may be sensed by asmart device of environment 100 or otherwise determined by platform 200.

Along with one or more platform actions, one or more conditions may alsobe selectively associated with a particular unique invitationidentification information in such a defined mode setting, wherebyplatform 200 may be operative to carry out the one or more associatedplatform actions when the particular unique invitation identificationinformation of that mode setting is detected at environment 100 whileany associated conditions are satisfied. As one example, such acondition may include a particular time frame during which the modesetting may be active (e.g., 7:00 pm to 11:00 pm, such that if theparticular unique invitation identification information of that modesetting is detected at environment 100 before 7:00 pm or after 11:00 pmthen the one or more associated platform actions of that mode settingmay not be carried out by platform 200). As another example, such acondition may include a particular maximum threshold occupancy ofenvironment 100 under which the mode setting may be active (e.g., 75people, such that if the particular unique invitation identificationinformation of that mode setting is detected at environment 100 while 75or more people are currently detected within environment 100 then theone or more associated platform actions of that mode setting may not becarried out by platform 200). As another example, such a condition mayinclude general visitor identification information that must besatisfied for the mode setting to be active (e.g., detected visitorwearing red, such that if the particular unique invitationidentification information of that mode setting is detected atenvironment 100 when presented by a visitor that is not wearing any redclothing (e.g., as may be detectable by a camera sensing component ofdoorbell 106) then the one or more associated platform actions of thatmode setting may not be carried out by platform 200 (e.g., for strictlyenforcing a dress code requirement for a Valentine's Day party)). As yetanother example, such a condition may include particular visitoridentification information that must be satisfied for the mode settingto be active (e.g., detected visitor satisfies a particular facialdetection operation, such that if the particular unique invitationidentification information of that mode setting is detected atenvironment 100 when presented by a visitor whose face does notsuccessfully match a particular facial detection operation (e.g., as maybe detectable by a camera sensing component of doorbell 106 incombination with a facial recognition process that may compare detectedvisitor facial data with a photograph of the intended invitee that maybe provided to platform 200 (e.g., by the system user) or otherwiseaccessible to platform 200 (e.g., via querying pictures of a socialnetwork database in conjunction with a name associated with theinvitation, etc.) for defining such a condition of the defined modesetting) then the one or more associated platform actions of that modesetting may not be carried out by platform 200 (e.g., for ensuring thatthe invitee visitor to whom the smart invitation was sent is the actualvisitor presenting the particular visitor identification information atenvironment 100)).

Multiple mode settings may be associated with a single event, and eachmode setting may be edited independently and/or certain characteristics(e.g., platform actions and/or conditions) of multiple mode settings maybe edited simultaneously. For example, each guest invited to aparticular event (e.g., a Valentine's day party at a system user'senvironment 100) may receive its own smart invitation that may beassociated with its own particular mode setting defined at platform 200.However, platform 200 may be operative to enable a system user to edit acertain condition of all such mode settings for that particular event atthe same time (e.g., through a single instruction provided to platform200). For example, the system user may decide that a time framecondition for each mode setting defined for each smart invitation for anevent should be increased from 4 hours to 6 hours (e.g., instead of from7:00 pm to 11:00 pm, now each smart invitation to that event should beactive from 7:00 pm to 1:00 am). Alternatively, different mode settingsfor different smart invitations for the same event may be editedindependently. For example, the system user may edit a general visitoridentification information condition of the mode setting associated witha particular smart invitation to a particular user (e.g., to not requirethat the specific invitee of that invitation be wearing red to begranted access). If any characteristic of any mode setting of a smartinvitation has been edited after the smart invitation has been sharedwith an invitee, platform 200 may be operative to automatically send anupdated invitation to that invitee alerting the invitee of the changemade to its invitation (e.g., a simple e-mail or text message alertingthe invitee that a condition or other characteristic of the invitationhas changed), which may or may not include generating and sharing newparticular unique invitation identification information to be associatedwith that invitation, as the initially acquired and shared uniqueinvitation identification information that is also associated with amode setting need not change when a condition of that mode setting islater edited.

Process 3700 may also include receiving invitation identification datathat includes the unique invitation identification information from asmart environment as detected by a smart device of the smart environmentat step 3708, and then analyzing the unique invitation identificationinformation of the received invitation identification data from thesmart environment to identify the defined mode setting associated withthat smart environment at step 3710. Once a mode setting has beendefined for a particular unique invitation identification informationwith smart environment 100 and one or more associated platform tasks andany suitable conditions (e.g., at step 3706), platform 200 may beoperative to analyze that particular unique invitation identificationinformation when detected at that smart environment using any suitablesensing component(s) of smart environment 100. In response to detectingthat particular unique invitation identification information of thedefined mode setting at environment 100, platform 200 may be operativeto analyze that detected unique invitation identification information incombination with any appropriate defined mode setting(s) of that uniqueinvitation identification information, for example, to confirm that anysuitable conditions of that defined mode setting are also satisfied(e.g., by analyzing any suitable data available to platform 200 (e.g.,via one or more sensing components of one or more smart devices atenvironment 100 and/or any additional data otherwise accessible to acomputing system of platform 200 (e.g., system 164 or a computing systemlocal to environment 100)). In some embodiments, platform 200 may beoperative to communicate with the visitor (e.g., via doorbell 106)and/or adjust sensing capabilities of environment 100 (e.g., sensingcomponents 828 of doorbell 106) in any suitable manner as describedherein, for enabling platform 200 to properly determine whether or not acondition has been satisfied (e.g., by conveying a message to thevisitor to “present your invitation to the scanner just above thedoorbell button” or “please align your uncovered face with the camerajust above the doorbell button”, etc.). If all such conditions areconfirmed to be satisfied, then platform 200 may be operative to carryout any platform tasks of that defined mode setting. For example,process 3700 may also include carrying out at least one platform actionof a mode setting identified as associated with the detected uniqueinvitation identification information and the smart environment at step3712. At any point after the mode setting has been defined (e.g., atstep 3706) but before the particular unique invitation identificationinformation of the defined mode setting has been detected at environment100 (e.g., at step 3708), platform 200 may be operative to enable anyappropriate system user to edit one or more characteristics of thedefined mode setting (e.g., any associated platform tasks and/or anyassociated conditions and/or even the associated smart environment thatis to detect the particular unique invitation identification informationof the defined mode setting). Therefore, at any point after the smartinvitation has been shared by the user with the invitee (e.g., at step3704) but before the smart invitation has been used at a smartenvironment of the user (e.g., at step 3708), the functionality of thesmart invitation may be altered in any suitable way(s) (e.g., at step3706).

It is understood that the steps shown in process 3700 of FIG. 37 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

In some embodiments, platform 200 may be operative to enable anysuitable entity to edit or define certain characteristics of such adefined mode setting, where that entity may be the invitee (e.g., as maygain access to editing capabilities on platform 200 through use of thesmart invitation (e.g., in an online user interface provided by platform200)) or any other suitable entity that may be enabled by the systemuser or platform 200, and where that entity may or may not be any userof any component of platform 200, let alone the system user that mayhave initiated the smart invitation process and that may have managementcontrol of the associated smart environment. For example, if aparticular platform task associated with the mode setting is a messageto be conveyed to the system user when the smart invitation is used atsmart environment 100, the invitee may be enabled to at least partiallydefine what that message might be. As just one example, such a platformtask may be to communicate a particular message throughout every portionof environment 100 that is occupied at the time when the smartinvitation is used (e.g., as a party-wide announcement letting all thecurrent party attendees know that the invitee associated with the smartinvitation has just arrived). Therefore, the invitee may be enabled toupload an audio recording to platform 200 (e.g., via an invitee visitordevice 266 to system 164) in advance of the use of the smart invitationat environment 100, such that platform 200 may be operative to accessand playback that audio recording throughout environment 100 (e.g., viaaudio output components of each smart device within environment 100)when the invitee uses the smart invitation to access the party (e.g.,audio recording may be the invitee's catch phrase or favorite song orany other suitable information). Alternatively, platform 200 may enablethe invitee to provide such a message to platform 200 at the same timeas when the invitee presents the smart invitation to smart environment100. For example, once a smart invitation has been presented by theinvitee visitor and detected by environment 100, platform 200 (e.g., viadoorbell 106) may prompt the invitee visitor to convey certaininformation to platform 200 for use as the invitee enters environment100 (e.g., a request for the invitee to state the name by which itshould be introduced to the party (e.g., “John the Party Animal Doe ishere”) and/or the name of an intro song via microphone 844 of doorbell106, or providing multiple options for an intro song to the visitor fromwhich the visitor may select one via a touch screen user interface 812of doorbell 106, where such options may be at least partially defined byany suitable data available to platform 200, such as songs queued in aparty playlist being played-back at environment 100 (e.g., by a smartdevice 166 of environment 100)). Any suitable options determined in anysuitable manner may be presented to the visitor for selection, inresponse to which one or more suitable platform actions may be carriedout, such as options for music to be played, options for an interactivegame being played, and the like.

In some embodiments, a platform action of a mode setting of a smartinvitation may require that platform 200 only enable accessibility toenvironment 100 by a single human in response to detection of that smartenvironment (e.g., to prevent “piggybacking” such that each invitationmay only be used by a single visitor). For example, in response todetecting a smart invitation at doorbell 106 of door 186, a mode settingassociated with that invitation may instruct platform 200 to carry out aplatform action that may unlock doorknob 122 for enabling access throughdoor 186 while also enabling and/or otherwise monitoring data from acamera or motion sensor or any other suitable sensing componentfunctionally positioned at door 186 for detecting movement through door186 (e.g., a sensing component 828 of doorbell 106 or a sensingcomponent 1428 of doorknob 122) such that an alarm may be triggered ifmore than one person is detected passing through door 186 in response tounlocking door 186 for that detected invitation. Additionally oralternatively, a platform action of a mode setting of a smart invitationmay require that platform 200 only enable accessibility to environment100 one time only in response to detection of that smart environment(e.g., to prevent a particular invitation from being used more thanonce, thereby preventing re-admittance to an event and/or preventing asmart invitation from being passed on to other entities for unauthorizeduse of a single invitation). For example, in response to detecting aparticular smart invitation at environment 100 and carrying out anyassociated platform actions (e.g., enabling accessibility to environment100 through door 186), a condition of the mode setting for thatinvitation may instruct platform 200 to prevent such platform actionsfrom being carried out a second time for that invitation, although thereare various other suitable ways for defining a mode setting or otherwiseconfiguring platform 200 to carry out a certain platform action no morethan a certain amount of times (e.g., once) per detection of aparticular smart invitation.

After a system user has shared a smart invitation with an invitee and anassociated mode setting has been defined with platform 200 (e.g., atsteps 3702-3706), the later handling of the smart invitation may occurtransparent to the user (e.g., at steps 3708-3712). That is, a smartinvitation with unique invitation identification information may bepresented by an invitee visitor at environment 100, detected andanalyzed by platform 200, and any suitable actions handled automaticallyby platform 200 based on an associated defined mode setting without anyfurther system user interaction. This may enable a system user to focuson enjoying the party without having to worry about whether or not a newguest is at door 186 (e.g., can the host hear the door bell ringing overthe noise of the party) and if such a guest needs to be let in (e.g.,does the host need to greet the guest and tell it where to go). Instead,the host system user can enjoy the party knowing that platform 200 hasbeen enabled to automatically and securely and conveniently interactwith any new guests that may arrive at environment 100.

This may be particularly useful for shared environments, such asapartment buildings, where a system user may not be able to leave door186 unlocked during an event like a system user of a suburban home mightfeel more comfortable doing. For example, structure 150 may be an urbanapartment building, where door 186 may be a front door to a lobby thatmay be shared by each individual apartment resident. In suchembodiments, mode settings of a smart invitation presented at doorbell106 of door 186 may enable door 186 (e.g., via doorknob 122) to beaccessible for 10 seconds after detection of the smart invitation andmay convey a message to the visitor (e.g., “Please take the elevator tothe 6^(th) floor, then take a left as you exit the elevator and presentyour invitation to the doorbell at the front door of Apartment 6A”),whereby the same invitation may then be presented to and detected by asecond smart device of environment 100 for executing additionaloperations of the mode settings associated with that smart invitation(e.g., for providing access to the actual apartment of the system user).Certain conditions of a mode setting associated with a particular smartinvitation may be analyzed for satisfaction at a particular one ofmultiple presentation points of the smart invitation. For example, meredetection of the unique invitation identification information of aninvitation at a first smart device of environment 100 may enableaccessibility to a front door of a lobby of an apartment building, yet amaximum threshold occupancy condition may only be analyzed forsatisfaction at a second smart device of environment 100 prior toenabling accessibility to a front door of a specific apartment of theapartment building.

A smart invitation may enable access to only a certain portion ofenvironment 100 (e.g., via a platform action of an associated modesetting (e.g., as carried out at step 3712)). For example, continuingwith the circumstances of an apartment building that may have a frontlobby shared by multiple residents as well as a particular residentialunit of a particular system user of platform 200, a mode setting definedfor a smart invitation may include a platform action that enables avisitor access to only that shared lobby in response to detection ofthat invitation at a smart device of environment 100. This may enable adeliverer with a particular smart invitation (e.g., a package label IDcontaining unique invitation identification information) to drop-off apackage in a lobby of a building without platform 200 granting thatdeliverer access to any particular residence of that building, therebymaintaining certain security of that residence while also providingcertain security for that package (e.g., that the package is held withina secure area of environment 100 not accessible to untrusted entities(e.g., members of the general public that are not able to access thatlobby)). Such limited accessibility may satisfy certain deliveryrequirements of a deliverer business entity 228 (e.g., drop-offrequirements generally or even “signed recipient receipt” requirementsif that lobby is deemed secure enough (e.g., a lobby of a singleresidence home to which no non-system trusted entities may haveaccessibility)). As another example, a platform action associated with aparticular smart invitation may enable temporary accessibility to asmart safe (e.g., a smart appliance 113) that may be provided byenvironment 100 adjacent doorbell 106 external to structure 150 (e.g.,smart appliance 113 a), the interior of which may be selectively andtemporarily made accessible to deliverer DL (e.g., via any suitablecontrol signals of system 164) by platform 200 for enabling placement ofpackage PL therein in response to detection of the smart invitation(e.g., package label ID) at doorbell 106. Any such secure area (e.g., alobby, a safe, etc.) of environment 100 that may be made temporarilyaccessible to an invitee visitor (e.g., deliverer DL) by platform 200(e.g., automatically through system processing and control of modesettings of a smart invitation in response to presentation and detectionof that smart invitation) may be securely monitored by system 164 duringsuch temporary access in order to ensure that deliverer DL positionspackage PL in that area and/or to ensure that nothing is removed fromthat area during the period of that temporary access. One or moresensing components 828 of doorbell 106 or of any other smart device ofenvironment 100 may be configured to at least partially carry out suchmonitoring. Additionally or alternatively, one or more output componentsof doorbell 106 or of any other smart device of environment 100 may beconfigured to at least partially indicate to deliverer DL where and howto deposit the package securely.

A platform action of a mode setting associated with a particular smartinvitation for a particular smart environment may be at least partiallydefined by one or more characteristics defining the details of the smartinvitation. For example, if a smart invitation is generated in responseto an order being placed for delivery of contents (e.g., whereby theunique invitation identification information of the invitation may bebased on a confirmation number of that order or otherwise generatedbased on that order), certain information detailing that order (e.g., adescription of the contents, the time the order was placed, the intendedrecipient of the order, the facilitator of the order, etc.) may beautomatically associated with the mode setting of that smart invitation(e.g., through information sharing from an order facilitator business228 and system 164 via an API 210). For example, such information may beautomatically leveraged by platform 200 for defining certaincharacteristics of certain platform actions of the mode setting, such asa platform action to convey a particular message to occupant(s) ofenvironment 100 (e.g., via any/all suitable smart devices of environment100, such as only those in rooms currently occupied within structure150) when the smart invitation is detected at environment 100 (e.g., atdoorbell 106), for example, where such a message may convey “Thedelivery of the food order placed at restaurant X by occupant Y at timeZ is currently being attempted at door 186”. Therefore, not only may asmart invitation be automatically made accessible to the facilitator ofan order at the time the order is placed (e.g., as may be provided bysystem 164 to the facilitator or generated by the facilitator and sharedwith system 164), but one or more suitable platform actions of a modesetting associated with that smart invitation may be at least partiallyautomatically defined by platform 200 based on information associatedwith that order. This may increase the efficiency with which environment100 may handle an invitee visitor in response to that visitor presentinga specific smart invitation at environment 100 (e.g., if there aremultiple people at environment 100 that may have made different foodorders and that are currently awaiting the delivery thereof). This maynot only increase the convenience of the occupant users by beinginformed what delivery attempt is currently being detected, but this mayalso increase the convenience of the deliverer by not having to manuallyannounce the particulars of the attempted delivery (e.g., “Hello, thisis a delivery for occupant Y by restaurant X”) but instead by onlyhaving to present its smart invitation (e.g., a delivery receiptcontaining the confirmation number (i.e., the unique invitationidentification information), such as of a label ID) to environment 100(e.g., doorbell 106) for automatic detection/analysis/handling byplatform 200.

Smart invitations may be useful to a system user when managingaccessibility to environment 100 during times when that system user maynot be present at environment 100. For example, when a smart invitationis generated to provide environment accessibility to a somewhat trustedentity (e.g., a temporary tenant, as may be prevalent in the popularhome-sharing/swapping context), a system user may wish to providecertain constraints on the use of the environment by that entity. Asjust one example, total occupancy conditions for such a smart invitationmode setting may be useful to prevent a temporary tenant from hostinglarge gatherings at environment 100. If detected occupancy withinstructure 150 is equal to a certain number, a mode setting may preventadditional access to structure 150 through use of a smart invitation. Insome embodiments, a system user may define a do-not-disturb mode forenvironment 100 when environment 100 has been made temporarilyaccessible to entities that have only limited trust, such thatdeliveries or other types of visitor handling may be suspended orhandled in a special way when a temporary tenant has accessibilityrights, thereby preventing platform 200 from enabling a temporary tenantto receive a package from a deliverer. As mentioned, various platformactions may be edited for a smart invitation at any moment by anauthorized system user, such that a temporary tenant's rights withrespect to environment 100 may be varied remotely (e.g., by a remotesystem user UR via system 164) when a situation warrants. For example, asystem user may be notified by platform 200 that a package has been leftwithin a safe 113 a, and that system user may then choose to granttemporary accessibility rights to safe 113 a to a temporary tenant thatmay currently have accessibility rights to certain areas of environment100 but not to safe 113 a via a particular smart invitation by editing amode setting of that smart invitation to now allow accessibility to thatsafe 113 a via use of that smart invitation (e.g., if the system userwishes for the package to be moved by the temporary tenant to a coolerclimate (e.g., a refrigerator)).

A smart invitation may be leveraged in any suitable context forincreasing the security of environment 100. For example, particularunique invitation identification information of a smart invitation maybe associated with a particular security entity (e.g., an emergencyresponse entity 230) and a mode setting for that smart invitation may bemanaged for defining the various ways in which that smart invitation maybe used by that security entity for interacting with environment 100. Asjust one example, a fire department may have access to a particularsmart invitation with particular unique invitation identificationinformation that may be associated with a mode setting for environment100, such that a system user may edit that mode setting for varying theaccessibility rights that the fire department may have with respect toenvironment 100. In some embodiments, such a mode setting may be definedto instruct platform 200 to enable the fire department to access allportions of environment 100 at any time the smart invitation of the firedepartment is detected by environment 100 (e.g., if a system useroccupant of environment 100 is elderly and implicitly trusts the firedepartment in all situations at all times). Alternatively, such a modesetting may be defined to instruct platform 200 to enable the firedepartment to access environment 100 only if no active occupants aredetected at environment 100 and a specific hazard is detected atenvironment 100 when the smart invitation of the fire department isdetected by environment 100 (e.g., if a system user wishes to allow thefire department to enter environment 100 if no one is home or ifeveryone is sleeping/motionless and at least one smart hazard detector104 or other smart device of environment 100 detects smoke).Additionally or alternatively to determining physical accessibility toenvironment 100 as a platform action (e.g., via unlocking door 186 withsmart doorknob 122), such a mode setting may be defined to instructplatform 200 to convey certain information to the fire department whenthe smart invitation of the fire department is detected by environment100 as a platform action (e.g., via any suitable output component ofdoorbell 106), such as the current occupancy of environment 100 and/orthe specific location of each occupant within environment 100 and/or amap of environment 100 and/or a listing of hazards detected by varioushazard detectors 104 of environment 100, such that the fire departmentmay be adequately informed when handling a potential emergency event atenvironment 100. Different conditions may be associated with differentplatform actions of a particular mode setting of a particular smartinvitation. For example, when a fire department smart invitation isdetected at environment 100, a mode setting may instruct platform 200 toenable access through door 186 only if a particular hazard has beendetected by environment 100 and no occupancy motion has been detected byenvironment 100, whereas that same mode setting may instruct platform200 to convey detected occupancy status information and/or environmentmap information and/or detected hazard information of environment 100with the fire department visitor (e.g., via doorbell 106) at all timesor only when no current occupancy is detected.

In some embodiments, the particular unique invitation identificationinformation of such a smart invitation available to the fire departmentmay be generated by the fire department and shared with any appropriatecomponent(s) of platform 200 (e.g., system 164) for enabling a modesetting to be defined for that particular unique invitationidentification information with respect to various particular smartenvironments. Therefore, the same particular unique invitationidentification information of a smart invitation available to the firedepartment may be used by multiple different system users of platform200 for defining multiple different mode settings for multiple differentsmart environments that are to be associated with that particular uniqueinvitation identification information of the fire department, which mayenable the fire department to use only a single smart invitation withthat same particular unique invitation identification information atevery smart environment the fire department may potentially visit. Thismay obviate the need for the fire department to carry around multipletypes of skeleton keys or otherwise worry about having to interact withvarious smart environments in different ways, but instead may enable thefire department to present the same smart invitation with the sameparticular unique invitation identification information at every smartenvironment, and the mode settings for that smart invitation withrespect to any particular smart environment may vary based on thedesires of the system user of that smart environment. Therefore, asystem user may be provided with the ability to control and edit thevarious ways in which platform 200 may handle a fire department when thepresence of the fire department is authenticated at environment 100,while the fire department may only need one smart invitation for usewith multiple smart environments. The same may be true for any othersuitable entity, such as a package delivery entity (e.g., FederalExpress or the local U.S. Postal Service) that may have access to asingle smart invitation that may be presented at each smart environment(e.g., within a particular delivery area covered by that entity) anddifferent system users of different environments may define differentmode settings for handling that smart invitation. For example, aparticular entity may be responsible for (e.g., provide service to) theentirety of the locations within a ZIP Code, and the particular entitymay share the particular unique invitation identification information ofits smart invitation as well as its responsible ZIP Code with platform200 (e.g., with system 164 via API 210), and platform 200 may beoperative to define a distinct mode setting based on the particularunique invitation identification information of that smart invitationwith each smart environment within that ZIP Code.

FIG. 38 is a flowchart of an illustrative process 3800 for handlingdelivery of a package by a deliverer of a delivery service-providerentity that includes a delivery computing system to a smart environmentthat includes at least one smart device. At step 3802, process 3800 mayinclude facilitating at least a portion of a placement of an order by anorderer for the delivery of the package to the smart environment usingthe delivery computing system. At step 3804, process 3800 may includegenerating unique invitation identification information for the orderusing the delivery computing system. At step 3806, process 3800 mayinclude acquiring, at an environment computing system, the uniqueinvitation identification information and additional order informationfrom the delivery computing system. At step 3808, process 3800 mayinclude, based on the acquiring, automatically defining, using theenvironment computing system, at least a portion of a mode setting thatis associated with the acquired unique invitation identificationinformation and the smart environment and that includes at least oneplatform action. In some embodiments, process 3800 may also include,after the defining, receiving, at the environment computing system fromthe smart environment, invitation identification data detected by the atleast one smart device from the deliverer, wherein the receivedinvitation identification data includes the unique invitationidentification information, then analyzing, using the environmentcomputing system, the unique invitation identification information ofthe received invitation identification data from the smart environmentto identify the defined mode setting associated with the uniqueinvitation identification information and the smart environment, andthen automatically carrying out, using the environment computing system,the at least one platform action of the identified defined mode settingbased on the analyzing.

It is understood that the steps shown in process 3800 of FIG. 38 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 39 is a flowchart of an illustrative process 3900 for handling anagent of a service-provider entity that includes a service computingsystem at a smart environment that includes at least one smart device.At step 3902, process 3900 may include sharing unique invitationidentification information associated with the service-provider entitybetween the service computing system and an environment computingsystem. At step 3904, process 3900 may include receiving responsibilityinformation at the environment computing system, wherein theresponsibility information is indicative of a characteristic of a numberof environments that the service-provider entity services, and whereinthe number of environments includes the smart environment. At step 3906,process 3900 may include, based on the sharing and the receiving,automatically defining, using the environment computing system, at leasta portion of a mode setting that is associated with the shared uniqueinvitation identification information and the smart environment and thatincludes at least one platform action. In some embodiments, process 3900may also include, after the defining, obtaining, at the environmentcomputing system from the smart environment, invitation identificationdata detected by the at least one smart device from the agent, whereinthe received invitation identification data includes the uniqueinvitation identification information, then analyzing, using theenvironment computing system, the unique invitation identificationinformation of the received invitation identification data from thesmart environment to identify the defined mode setting associated withthe unique invitation identification information and the smartenvironment, and then automatically carrying out, using the environmentcomputing system, the at least one platform action of the identifieddefined mode setting based on the analyzing.

It is understood that the steps shown in process 3900 of FIG. 39 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

If handling of a detected visitor at environment 100 enables an attemptto communicate with a system user of environment 100, platform 200 maybe operative to provide different feedback to the visitor (e.g., atdoorbell 106) and to the system user (e.g., via a user device 166 or anyother suitable smart device of environment 100 proximate the user).Enabling different feedback to be provided to a system user and to adetected visitor may independently enhance the experience of the userand visitor in various ways.

Any suitable handling of the detection of any suitable visitor orinvitation at environment 100 may include any suitable communicationattempt to a system user associated with environment 100. For example,after initial detection of any visitor generally (e.g., at steps2002/2004) and/or after detecting a specific act of a visitor (e.g., atstep 2010), platform 200 may be operative to attempt to communicate anysuitable information indicative of that detection to a system user(e.g., at step 2006 and/or step 2012), whether or not that system useris local to environment 100 (e.g., user UL via communication at apersonal device 166 of the user and/or via communication at any suitablesmart device of environment 100) or remote from environment 100 (e.g.,user UR via communication at a personal device 166 of the user). Thecontent of such a communication to a system user and the manner in whichsuch a communication may be attempted by platform 200 may vary based onany suitable data available to platform 200, such as any suitableinformation relating to the identification and/or intent of the detectedvisitor, the intended user the visitor is attempting to communicatewith, any mode setting of environment 100, the occupancy status ofenvironment 100, information provided by any third party entity (e.g.,one or more of entities 222-230), paradigms 310 a-310 d, and the like.In certain situations, the content and/or manner of a communication to asystem user may vary as more time elapses without receiving a userresponse.

For example, when a particular system user is identified as a target ofthe communication, platform 200 may first attempt to communicate (e.g.,at step 2006 and/or step 2012) just with that particular system user(e.g., by communicating with a personal user device 166 associated withthat specific user and/or with one or smart devices determined to belocal to that specific user (e.g., hazard device 104 a proximate userUL)). However, if no user response or other suitable indication isreceived by platform 200 suggesting that the communication was receivedby the user (e.g., within a particular amount of time or after aparticular amount of attempts), platform 200 may be operative to adjustthe communication attempt by varying a characteristic of the outputcomponent(s) with which a smart device may attempt to facilitate thecommunication (e.g., by increasing the volume of an audibly conveyedmessage and/or by switching to or also using a visual output component(e.g., a flickering light) of the smart device) and/or by communicatingwith additional smart devices (e.g., by communicating with additional orall suitable smart devices of environment 100 (e.g., with any hazarddetectors 104 of environment 100 not specifically associated with ado-not-disturb mode (e.g., not in a sleeping baby's room) or all hazarddetectors 104 of environment 100 or all smart devices of environment100) and/or by changing the message of the communication attempt (e.g.,from “User UR, there is someone at the door for you” to “Occupants,there is someone at the door”)). Therefore, platform 200 may beoperative to target one or more specific devices associated with one ormore specific users and/or one or more specific areas of environment 100with an initial output characteristic when initially attempting tocommunicate with a user before expanding that communication attempt toother output characteristics and/or other devices and/or otherenvironment areas, which may limit the amount that such an attemptedcommunication may disturb environment 100 while also maximizing thelikelihood of eventually contacting an appropriate occupant.Additionally or alternatively, platform 200 may be operative to craft atargeted message for one or more specific users when initiallyattempting to communicate with a user before expanding the breadth ofthat message to incite a response from other users, which may limit theamount that such an attempted communication may disturb environment 100while also maximizing the likelihood of eventually contacting anappropriate occupant. After an initial attempt, an additional attemptmay not only include the use of additional output characteristics ordevices or messages but may also continue to employ the characteristicsof the initial attempt. Alternatively, after an initial attempt, anadditional attempt may only include the use of additional outputcharacteristics or devices or messages but may not continue to employthe characteristics of the initial attempt (e.g., to discontinue apotential disturbance to a user who is unable or unwilling to respond tothe initial attempt).

FIG. 40 is a flowchart of an illustrative process 4000 for handling avisitor at a smart environment that includes a number of smart devices.At step 4002, process 4000 may include detecting visitor informationindicative of the visitor at the smart environment using a first smartdevice of the smart devices. At step 4004, process 4000 may includeanalyzing the detected visitor information using a computing system thatis communicatively coupled to the first smart device. At step 4006,process 4000 may include, based on the analyzing, communicating, usingthe computing system, a first environment notification to the smartenvironment via a second smart device of the smart devices. At step4008, process 4000 may include determining, using the computing system,whether a system response is generated based on the communicated firstenvironment notification. At step 4010, process 4000 may include, whenit is determined that no system response is generated based on thecommunicated first environment notification, communicating, using thecomputing system, a second environment notification to the smartenvironment.

It is understood that the steps shown in process 4000 of FIG. 40 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

If handling of a detected visitor by platform 200 enables a visitor tointeract with environment 100 (e.g., doorbell 106) for activelyattempting to communicate with a system user of environment 100 (e.g.,at step 2010), platform 200 may be operative to provide differentfeedback to the visitor (e.g., at doorbell 106) and to the system user(e.g., via a user device 166 or any other suitable smart device ofenvironment 100 proximate the user). For example, at any suitable time avisitor may actively interact with (e.g., depress) a doorbell button orother suitable doorbell user interface 812 of doorbell 106 forattempting to communicate with a system user of environment 100 (e.g.,whether or not such interface 812 may be indicative of being enabled ordisabled for such use), platform 200 may be operative to communicateinformation indicative of that visitor interaction with a system user inany suitable manner. In some embodiments, such communication to a systemuser may be based on an adjusted version of that visitor interactionsuch that certain characteristics of that visitor interaction may befiltered or otherwise processed in order to limit the annoyance of sucha communication to the system user and/or to otherwise make such acommunication as effective as possible.

Platform 200 may be operative to communicate any number of visitorinteractions within a certain period of time as a single communicationtype to a system user. For example, if a visitor presses doorbell button812 ten times within a single ten second period of time or only one timewithin a single ten second period, platform 200 may be operative togenerate the same communication for a system user (e.g., a single buzzersound emitted from one or more smart devices within environment 100and/or a single message conveyed within environment 100 (e.g., “avisitor has rung the doorbell”), rather than doing so ten times). Thismay limit the disturbance caused to any system user by platform 200 whencommunicating such a visitor interaction.

Additionally or alternatively, platform 200 may be operative tocommunicate any length of a visitor interaction within a certain periodof time as a single communication type to a system user. For example, ifa visitor presses and then holds doorbell button 812 for ten secondsstraight within a single ten second period of time or presses and thenholds doorbell button 812 for only one second within a single ten secondperiod, platform 200 may be operative to generate the same communicationfor a system user (e.g., a single buzzer sound emitted for a singlesecond length of time from one or more smart devices within environment100, rather than doing so for a ten second length of time). This maylimit the disturbance caused to any system user by platform 200 whencommunicating such a visitor interaction.

Platform 200 may be configured in any suitable way (e.g., by a systemuser or automatically through heuristics or rules or inferences or anyother suitable data or controlling entity of platform 200) to define theperiod of time within which one or more visitor interactions may resultin a single communication to a system user and/or the length of timeduring which a single visitor interaction may last that may result in asingle communication to a system user. This may enable various modeswhereby a certain type of visitor interaction may result in differentcommunications to a system user depending on various factors (e.g.,environment mode, occupancy status, visitor identification, etc. and/oruser customized settings for how defining particular visitor interactiontypes may be handled and communicated to that user). In someembodiments, a pattern of two or more visitor interactions and/or asingle interaction of at least a specific length may result in aparticular type of communication to a system user. For example, if morethan a certain amount of visitor interactions are detected within aparticular amount of time and/or if a single visitor interaction is heldfor more than a certain amount of time and/or any other suitable type ofvisitor interaction is detected (e.g., a specific pattern of multiplevisitor interactions of specific types), platform 200 may be operativeto communicate a respective particular type of alert to a system user(e.g., to indicate an “urgent” visitor disposition or a “unique” visitorinteraction (e.g., a specific 7-note “shave and a haircut—two bits”rhythmic interaction by a visitor with a smart device input componentmay be detected and operative to generate a melodic version of that same“shave and a haircut—two bits” riff as a communication to a system uservia a smart device output component)). This may enable a certain type ofvisitor interaction to override certain standard response settings ofplatform 200 so as to enable a visitor to communicate to a system useran urgent communication or an otherwise unique communication. Therefore,while ten visitor depressions of doorbell button 812 within ten secondsmay result in the same user communication attempt as one visitordepression within ten seconds (e.g., a single buzzer sound emitted fromone or more smart devices within environment 100 and/or a single messageconveyed within environment 100 (e.g., “a visitor has rung thedoorbell”) so as to not annoy or otherwise disturb a system user byproviding ten distinct user communication attempts (e.g., ten distinctbuzzer sounds)), eleven visitor depressions of doorbell button 812within ten seconds may result in a different (e.g., more urgent) usercommunication attempt (e.g., multiple buzzer sounds emitted from one ormore smart devices within environment 100 and/or a single but strongermessage conveyed within environment 100 (e.g., “a visitor has URGENTLYrung the doorbell”)). Therefore, while platform 200 may be operative tofilter down certain “annoying” visitor interaction types for providing amore palatable alert to a system user, platform 200 may also beoperative to determine certain visitor interaction types to be urgent orotherwise unique in nature for providing a more urgent or otherwiseunique alert to a system user. While visitor interactions withenvironment 100 have been described with respect to visitor“depressions” or other suitable interactions with a doorbell button 812,which may be similar to some conventional visitor interactions withconventional doorbells/intercoms (e.g., for “ringing a doorbell”), anysuitable visitor interaction type with respect to any suitable inputcomponent(s) and/or sensing component(s) of any suitable smart device ordevices of environment 100 (e.g., a visitor's audible communication viaa microphone 844 of doorbell 106 or selection of an option on atouchscreen user interface 812 of doorbell 812 via touching thattouchscreen) may be processed and handled in any suitable manner byplatform 200 for filtering any undesirable or otherwise annoying visitorinteractions while also appropriately detecting certain visitorinteractions that maybe leveraged for adjusting the urgency oruniqueness or any other suitable tone of an attempted communication byplatform 200 to a system user in response to such detecting.

As described above, platform 200 may be operative to disable afunctionality of a user interface or doorbell button input component 812of a smart doorbell 106 for any suitable reason (e.g., based on anysuitable settings or inferences, etc.). For example, a message may beconveyed to the visitor that the doorbell input component has beendisabled, thereby discouraging the visitor from even attempting tofunctionally interact with the doorbell input component (e.g., throughthe visitor depressing or “ringing” the doorbell). Alternatively oradditionally, whether or not it is conveyed to the visitor that afunctionality of a doorbell input component is disabled, platform 200may be operative to prevent contacting a system user in certain mannersor at all in response to an interaction of any visitor with thatdoorbell input component under certain system circumstances (e.g., ifthe visitor interacts with the doorbell input component before providingthe smart environment with any requested visitor identificationinformation and/or visitor intent information). This may be considered“whitelisting”, as platform 200 may be operative to require that certainrequirements be met before enabling the functionality of the doorbellinput component for a visitor generally (e.g., before platform 200 maybe operative to generate any system user notifications in response toany visitor interaction with that doorbell input component), such asdetermining a specific identification of the visitor and/or at leastdetermining whether the visitor is trusted or untrusted.

Alternatively or additionally, platform 200 may be operative to preventcontacting a system user in certain manners or at all in response to aninteraction of a particular visitor with that doorbell input component(e.g., if a particular visitor has been determined to interact withenvironment 100 (e.g., doorbell 106) in a manner that is undesirable toa system user. This may be considered “blacklisting”, as platform 200may be operative to prevent certain visitor interaction by a certainvisitor from being communicated as system user notification, which maybe done whether the certain visitor is determined to be trusted oruntrusted. Therefore, platform 200 may be operative to enable a systemuser to easily “blacklist” a particular visitor during a particular modeof smart environment 100 (e.g., by defining a mode setting) such thatcertain or all interactions by that particular visitor with environment100 (e.g., with doorbell button 812) may not result in a system usernotification that might otherwise be generated by platform 200 for anon-blacklisted visitor interacting in the same manner. A blacklistedvisitor may be detected like any other suitable visitor (e.g., asdescribed above with respect to steps 2002/2004). For example, anysuitable fingerprint or signature of a visitor may be identified (e.g.,through facial recognition, receipt of affirmatively provided visitoridentification, detection of an NFC or RFID tag for that particularvisitor, Wi-Fi pairing signals or any other suitable signals that may bedetected from a visitor personal device 266 and analyzed by platform200, etc.).

Platform 200 may be operative to blacklist a visitor or at least certainvisitor interactions of a visitor in any suitable way (e.g., based oninferences or system user instructions). For example, in someembodiments, platform 200 may be operative to record a log (e.g., ashome data 202) that may include a listing of the identity (e.g., generalor specific) of some or all of the visitors detected each day atenvironment 100 as well as a listing of any interaction each visitor mayhave had with environment 100 (e.g., “Visitor A pressed doorbell button812 of doorbell 106 at front door 186 five times within a ten secondperiod starting at 3:45:15 PM on Tuesday”). Platform 200 may beoperative to provide such a log for review by a system user ofenvironment 100 such that the system user may select certain visitors orcertain interactions of certain visitors to be added to a blacklist,whereby, going forward, platform 200 may be operative to prevent suchvisitors or such interactions of such visitors from resulting in thegeneration of system user notifications (e.g., via a smart device outputcomponent proximate the system user). Once a particular visitor (e.g.,all interactions by “Visitor A”) and/or a particular visitor interaction(e.g., an interaction by “Visitor A” that includes pressing doorbellbutton 812 more than once within a ten second period) has beenblacklisted, platform 200 may be operative to handle such a blacklistingin any suitable manner when detected. For example, in response todetecting a blacklisted interaction, platform 200 may be operative toconvey a message to the visitor (e.g., via speaker 836 or projector 830or otherwise) that such an interaction will not be recognized by asystem user and that discourages such behavior going forward. Themessage may include a customized message from the system user as to whythe interaction has been blacklisted and what may be a preferablealternative.

As just one real-world example, there may be an overly enthusiasticmailman deliverer DL that always presses doorbell button 812 when he orshe delivers the mail each day, despite a system user's requests to thecontrary (e.g., because user notifications provided in response to suchdoorbell presses inevitably wake up a napping child within environment100). After 2-3 days of this same activity, platform 200 may beoperative to recognize (e.g., at steps 2002/2004) that the same Wi-Fipairing signal is sensed when doorbell button 812 is pressed each day,and platform 200 may be operative to store such data in a suitable logby identifying different interactions on different days as beingprovided by the same visitor. Later, after the third day or so, theangry homeowner system user may be enabled by platform 200 to reviewthat log and realize that this same visitor was the doorbell ringer atthese offending times, and then “blacklist” that visitor. Notably, inone embodiment, the actual identity of the “blacklisted” may not bespecifically established or revealed by platform 200 in the log, andsuch a visitor may simply be identified in the log as “Visitor A” or“Visitor whose Wi-Fi beacon is XYZ”. However, in other embodiments, theactual identity of one or more visitors may be provided in such a log(e.g., through any suitable technique described herein, such ascomparing any detected visitor signature data to one or more databasesavailable to platform 200).

Such a log may be leveraged by platform 200 for any suitable purpose.For example, rather than identifying a particular visitor or aparticular visitor interaction in the log for blacklisting that visitoror interaction for preventing future system user notifications inresponse thereto, platform 200 may be operative to assign a particulartype of system user notification to a particular visitor or particularvisitor interaction identified via a log or otherwise such that such aparticular type of system user notification may be utilized by platform200 in the future in response to detecting such a particular visitor orparticular visitor interaction. For example, platform 200 may beoperative to enable a certain audible message type (e.g., a particular“ringtones”) to be provided by platform 200 as at least a portion of asystem user notification in response to a future detection of aparticular visitor or a particular visitor interaction (e.g., toassociate a melodic version of the “shave and a haircut—two bits” riffwith a particular rhythmic interaction by a visitor of that same “shaveand a haircut—two bits” riff.

FIG. 41 is a flowchart of an illustrative process 4100 for handling avisitor at a smart environment that includes a number of smart devices.At step 4102, process 4100 may include detecting visitor interactioninformation indicative of a particular interaction of the visitor withthe smart environment using a first smart device of the smart devices.At step 4104, process 4100 may include analyzing the detected visitorinteraction information using a computing system that is communicativelycoupled to the first smart device. At step 4106, process 4100 mayinclude, based on the analyzing, determining, using the computingsystem, that the particular interaction of the visitor matches apre-defined interaction type. At step 4108, process 4100 may include,based on the determining, communicating, using the computing system, aparticular user notification associated with the pre-defined interactiontype to a user of the smart environment.

It is understood that the steps shown in process 4100 of FIG. 41 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Platform 200 may be operative to provide any suitable feedback to avisitor in response to any suitable visitor interaction with environment100, where such feedback provided to the visitor in response to thevisitor interaction may or may not be similar to any communicationattempt provided to a system user in response to the visitorinteraction. In some embodiments, when no audible communication attemptis provided to a system user within environment 100 (e.g., when such acommunication attempt is done electronically as a text message to asystem user device or as a visual only blinking light communicationattempt via a smart device within environment 100 (e.g., when the systemuser may be putting a baby down for a nap or is on a telephone call))and/or when no communication attempt is provided within environment 100whatsoever (e.g., when platform 200 has determined that there is nooccupancy within environment 100 and/or each occupant is in ado-not-disturb mode), platform 200 may still be operative to generateaudible feedback or any other suitable form of feedback to the visitor,which may provide the visitor with some sort of confidence that itsinteraction is being handled by environment 100. As just one example, ifplatform 200 determined that environment 100 is in a do-not-disturb modewhereby no audible communication attempt to a system user is generatedin response to a visitor interaction (e.g., if platform 200 instead onlygenerates a silent communication within environment 100 to a system userthat may be attempting to put a baby down for a nap in response to avisitor interaction), platform 200 may still be operative to generatevisitor feedback that may be audible by the visitor (e.g., external tostructure 150 outside door 186) in response to a visitor interaction.Such visitor feedback may be sensed and interpreted by the visitor as ifit is hearing the same audible output that is being provided to a systemuser within environment 100 (e.g., internal to structure 150), whetheror not such an audible output is being provided to a system user withinenvironment 100. For example, such an audible output may be provided bydoorbell 106 (e.g., audio speaker 836) and/or by an audio speaker ofanother smart device that may be positioned within structure 150 justadjacent internal side 186i of door 186 (e.g., within a user handleportion 1409 of doorknob 122) where such an audible output may notdisturb any system user within structure 150. As another example, anaudible output may be generated by platform 200 that may be sensed andinterpreted by the visitor as if a dog is barking from withinenvironment 100 in response to the visitor interaction and any attempteduser communication. For example, if a real dog may be present withinenvironment 100, platform 200 may be operative to generate any suitableoutput that may instigate such a dog to bark (e.g., by generating a dogwhistle high pitch sound that may not be detectable by any system useror the visitor but that may excite a dog to bark). Alternatively, asound may be generated and output by any suitable device of environment100 that may mimic a dog bark.

Platform 200 may be operative to provide different visitor feedbackbased on occupancy status and/or visitor type. For example, if platform200 attempts to communicate with a system user local to or remote fromenvironment 100 in response to a visitor interaction with environment100, platform 200 may be operative to provide different feedback to thevisitor dependent upon whether or not the visitor has been detected as aknown or unknown visitor. If the visitor is currently unknown toplatform 200 or is otherwise considered a stranger with respect toenvironment 100 or is otherwise to be treated with a heightened form ofsecurity, platform 200 may be operative to generate visitor feedbackthat may be sensed or otherwise interpreted by the visitor as indicativeof some form of occupancy at environment 100 (e.g., turning on a light118 within structure 150 or outdoor lighting 114 external to structure150 or generating an audible dog bark or other suitable noise, etc.). Bygenerating such visitor feedback in response to such an “unknown”visitor interacting with environment 100 (e.g., “ringing” doorbellbutton 812), platform 200 may be operative to increase the security ofenvironment 100 by making environment 100 seem occupied in some way tothe visitor, even if environment 100 may currently be unoccupied or in ado-not-disturb mode. As mentioned above, platform 200 may be operativeto provide such security-enhancing feedback in response to any suitablevisitor interaction with environment 100 and not just in response to avisitor interaction with a doorbell button of doorbell 106. For example,in some embodiments, platform 200 may be operative to turn on a lightwithin or outside of structure 150 or adjust the functionality of anyother suitable device of environment 100 for enhancing the security ofenvironment 150 when any potential visitor (e.g., known or unknown) isat least initially detected at environment 100 (e.g., when environmentis in a do-not-disturb mode or otherwise). Alternatively, suchsecurity-enhancing functionality of platform 200 may be carried out inresponse to a visitor being detected but then not actively interactingwith environment 100 (e.g., when the presence of a visitor is detectedbut then that visitor does not provide requested information to doorbell106 or otherwise interact with a user interface of doorbell 106),whereby platform 200 may be operative to deem such visitornon-interaction as suspicious. As another example, suchsecurity-enhancing functionality of platform 200 may be carried out inresponse to a visitor actively interacting with environment 100 in anunapproved manner (e.g., in response to a visitor attempting to opendoor 186 through interaction with doorknob 122 before platform 200 hasgranted such access), whereby platform 200 may be operative to deem suchvisitor interaction as suspicious.

However, if the visitor is currently known to platform 200 or otherwisemeets any suitable trust threshold with respect to environment 100 or isotherwise not to be treated with a heightened form of security, platform200 may be operative to generate visitor feedback that may be sensed orotherwise interpreted by the visitor as indicative of the fact thatplatform 200 is currently attempting to contact a system user withoutnecessarily implying occupancy at environment 100 (e.g., by conveying avisitor feedback message like “please wait while user contact isattempted” or “please enjoy this hold music as a user is notified ofyour presence”). By generating such visitor feedback in response to sucha “known” visitor interacting with environment 100 (e.g., “ringing”doorbell button 812), platform 200 may be operative to share with thevisitor the actual current status of the attempted communication betweenplatform 200 and a system user rather than generating a decoy feedbackthat may not fool a visitor familiar with environment 100 (e.g., whetheror not environment 100 would include a barking dog).

FIG. 42 is a flowchart of an illustrative process 4200 for handling avisitor at a smart environment that includes a number of smart devices.At step 4202, process 4200 may include detecting visitor informationassociated with the visitor at the smart environment using a first smartdevice of the smart devices. At step 4204, process 4200 may includeanalyzing the detected visitor information using a computing system thatis communicatively coupled to the first smart device. At step 4206,process 4200 may include, based on the analyzing, providing feedbackfrom the computing system to the visitor via a second smart device ofthe smart devices, wherein the feedback includes a status messageindicative of an occupant of the smart environment being notified of thevisitor's presence at the smart environment.

It is understood that the steps shown in process 4200 of FIG. 42 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

Platform 200 may be operative to leverage any suitable data that may besensed by any suitable smart device of environment 100 for enhancing thesecurity or convenience of environment 100. Additionally oralternatively to sensing data that may be indicative of the physicalpresence, identity, and/or intent of a visitor and/or a smart invitationor package label at environment 100, one or more sensing components ofone or more smart devices of environment 100 (e.g., doorbell 106) may beoperative to sense any other suitable data that may be utilized byplatform 200 in enhancing the security and/or convenience of systemusers of environment 100 in any suitable ways.

Doorbell 106 and/or any other smart device of environment 100 (e.g.,outdoor lighting 114, gated entry 116, doorknob 122, safe appliance 113a, entry detectors 112, etc.) may include one or more sensing componentsthat may be operative to measure one or more characteristics fordetermining the quality of the air or any other similar detectableentity of the external environment of environment 100 (e.g., external tostructure 150). For example, one or more sensing components 828 ofdoorbell 106 positioned external to structure 150 may be similar to anysuitable sensing component of a hazard detector device 104 positionedwithin structure 150 or otherwise for measuring air quality and/ordetecting harmful VOCs and/or patent harmful gases, particulate, dust,pollen, mold, or the like of the environment external to structure 150.Such external environment data sensed by doorbell 106 or any othersuitable smart device or by any other data source of platform 200 (e.g.,a third party air quality business 228) may be leveraged by platform 200in combination with any other suitable data for adjusting a platformfunctionality (e.g., a functionality of a smart device of environment100 or for reporting to any suitable entity for analysis). For example,the detected air purity within a particular area or the entirety ofstructure 150 (e.g., as may be sensed by one or more hazard detectordevices 104) may be compared by platform 200 (e.g., by system 164 or anysuitable processing component local to environment 100) with thedetected air purity outside of structure 150 (e.g., as may be sensed bydoorbell 106 or otherwise) to control a functionality of a smart deviceof environment 100. As a particular example, if the outside air is purerthan the inside air, then platform 200 may be operative to instruct asmart thermostat device 102 to open a vent to permit fresh air intostructure 150, otherwise platform 200 may be operative to instruct athermostat device 102 to recirculate air within structure 150 and to notdraw in outside air. Additionally or alternatively, as anotherparticular example, platform 200 may be operative to send detailedinformation about the air quality within and external to structure 150to a mobile personal device user device 166 or other suitable smartdevice of a user, which may help the user identify which pollen or otherair impurity may be the culprit of any allergies that the user may beexperiencing. As one other example, platform 200 may be operative tosend an alert to a system user when cigarette smoke is detected by anysuitable external sensor (e.g., to catch a child attempting to sneak acigarette outside front door 186). As another example, platform 200 maybe operative to aggregate air quality data received from multipleenvironments in various geographic locations or other suitable groupingsand to provide, for example, smog alerts, pollen warnings, etc. of thosegroupings to any suitable entity (e.g., weather reporting businessentities 228). As another example, platform 200 may be operative tocompare detected external and/or internal air quality of different areasof environment 100 with one another at a specific time or historically(e.g., by time of day, day of week, season of year, etc.) foridentifying certain areas that may have issues to be addressed (e.g., acorner of structure 150 that is exposed to significantly more pollenthan other portions of environment 100 during the Spring and may benefitfrom additional filtration or inspection of flora and fauna near thatarea at that time). As another example, platform 200 may be operative tocompare detected external and/or internal air quality of environment 100with other smart environments. Any one or more of such comparisons ordata aggregations with respect to air quality of one or more internal orexternal areas of environment 100 may be stored for and/or shared withcertain entities, such as prospective buyers of environment 100 (e.g.,at real estate business entity 228), for determining whether suchqualities of environment 100 are suitable. Additionally oralternatively, any other weather phenomena or characteristic of the airquality (e.g., temperature, humidity, wind levels (e.g., strength/speedof the movement of the air), wind direction (e.g., direction of themovement of the air), etc.) may be detected (e.g., by any sensingcomponent(s) doorbell 106) at environment 100 (e.g., internal to and/orambient of structure 150) and utilized similarly to any air puritylevels described above. For example, the outside humidity andtemperature data may be compared with or considered by a thermostat 102when controlling the HVAC to best accomplish the occupants' desiredcomfort preferences. Further, for example, this information may bepresented to the occupants through a number of user interfaces, such asa user interface associated with another one of the devices locatedinside of the home, the television, mobile and other computing devices,or audibly. In some instances, platform 200 (e.g., system 164) maycollect such weather data from multiple smart environments across aplurality of geographic locations or other suitable groupings, and suchaggregated weather data may be sold or otherwise provided to weatherservices (e.g., any suitable business entity 228) or may be used toprovide weather data to smart home occupants or potential buyers.

Doorbell 106 and/or any other smart device of environment 100 (e.g.,outdoor lighting 114, gated entry 116, doorknob 122, safe appliance 113a, entry detectors 112, etc.) may include one or more sensing componentsthat may be operative to measure one or more characteristics fordetermining noise of the external environment of environment 100 (e.g.,external to structure 150). For example, one or more sensing components828 of doorbell 106 (e.g., microphone 844) may be positioned external tostructure 150 for sensing any suitable noise external to structure 150.Such ambient noise data sensed by doorbell 106 or any other suitablesmart device or by any other data source of platform 200 (e.g., a thirdparty noise detection business 228) may be leveraged by platform 200 incombination with any other suitable data for adjusting a platformfunctionality (e.g., a functionality of a smart device of environment100 or for reporting to any suitable entity for analysis). For example,the detected noise levels within a particular area or the entirety ofstructure 150 (e.g., as may be sensed by one or more hazard detectors104) may be compared by platform 200 (e.g., by system 164 or anysuitable processing component local to environment 100) with the noiselevels outside of structure 150 (e.g., as may be sensed by doorbell 106or otherwise) to control a functionality of a smart device ofenvironment 100. As a particular example, if the noise level outside ofstructure 150 significantly spikes (e.g., due to a helicopter hoveringoverhead), then platform 200 may be operative to instruct a smartappliance 113 (e.g., a television) or smart hazard detector device 104or any other suitable smart device to increase its volume output levelto overcome or otherwise compensate for the additional ambient noisepollution (e.g., so a system user may still hear important warnings orother communications from such smart devices). As another example,platform 200 may be operative to analyze ambient noise detected atenvironment 100 (e.g., by doorbell 106) to determine that a streetadjacent to structure 150 may meet a threshold level of traffic, wheresuch a determination may result in one or more inferences being made byplatform 200 about the safety of any children currently occupyingenvironment 100 (e.g., Child 1722 playing outside of structure 150 atenvironment 100 of FIG. 17). For example, platform 200 may be operativeto trigger any suitable alarm (e.g., at environment 100, such as with ahazard detector 104 within structure 150) in the event one or more ofthe children are detected by the occupancy sensing to be outside of thehome during such a detected traffic event. Such an alert may enable aparent or other caretaker at environment 100 (e.g., Husband 1718 withinstructure 150) to quickly take action to protect the child from thedetected traffic (of course, other suitable environment detectors, suchas a camera and/or motion detector alone or in combination with such anoise sensor may also enable platform 200 to facilitate such a securityfeature). Additionally or alternatively, as another particular example,platform 200 may be operative to send detailed information about thenoise levels within and external to structure 150 to a mobile personaldevice user device 166 or other suitable smart device of a user, whichmay help the user identify which areas of environment may beexperiencing more problematic noise issues. As another example, platform200 may be operative to aggregate noise data received from multipleenvironments in various geographic locations or other suitable groupingsand to provide, for example, noise pollution reports of those groupingsto any suitable entity (e.g., law enforcement entities 222). As anotherexample, platform 200 may be operative to compare detected externaland/or internal noise levels of different areas of environment 100 withone another at a specific time or historically (e.g., by time of day,day of week, season of year, etc.) for identifying certain areas thatmay have issues to be addressed (e.g., a corner of structure 150 that isexposed to significantly more noise than other portions of environment100 at certain times of day and may benefit from additional soundproofing or noise filtration or other accommodations). As anotherexample, platform 200 may be operative to compare detected externaland/or noise levels of environment 100 with other smart environments.Any one or more of such comparisons or data aggregations with respect tonoise levels of one or more internal or external areas of environment100 may be stored for and/or shared with certain entities, such asprospective buyers of environment 100 (e.g., at a real estate agentbusiness 228), for determining whether such qualities of environment 100are suitable. Additionally or alternatively, any motion levels or othersuitable activity may be detected (e.g., by any sensing component(s)doorbell 106) at environment 100 (e.g., internal to and ambient ofstructure 150) and utilized similarly to any noise levels describedabove (e.g., a combination of detected motion and noise levels may beleveraged to detect a traffic threshold for enabling platform 200 toinitiate an alarm for protecting any children of environment 100, ormotion levels may be detected to indicate a stranger casing environment100 for potential theft or an animal wandering in the backyard, etc.).Additionally or alternatively, any ambient light levels or othersuitable ambient conditions may be detected (e.g., by any sensingcomponent(s) doorbell 106) at environment 100 (e.g., internal to andambient of structure 150) and utilized similarly to any noise levelsdescribed above.

As described above (e.g., with respect to detected air quality), anysuitable data indicative of any suitable characteristic or phenomenaexternal to structure 150 (e.g., noise levels, activity levels, ambientlight levels, weather, etc.) that may be detectable by doorbell 106 orany other suitable data source of platform 200 may be analyzed in anysuitable manner (e.g., with respect to any other suitable data) forleveraging in any suitable way. As one particular example, any suitabledetected ambient data of structure 150 may be compared with any suitableinternal data of environment 100 or analyzed on its own or with respectto any other suitable data for adjusting a platform functionality, suchas for adjusting a functionality of a smart device and/or for adjustinga mode or mode setting enabled or to be enabled (e.g., ambient detectednoise (e.g., by a microphone sensing component 844 of doorbell 106) maybe leveraged to adjust the volume level of audio output by a smartdevice within structure 150 (e.g., from a smart hazard detector device104 or any suitable controllable device such as a stereo) fordynamically tuning such internal volume to overcome any ambient noisesources). Additionally or alternatively, as another particular example,platform 200 may be operative to send detailed information about thedetected value of certain ambient conditions of environment 100 to amobile personal device user device 166 or other suitable smart device ofa user, which may help the user identify when and where certain noisesare coming from. As another example, platform 200 may be operative toaggregate ambient data received from multiple environments in variousgeographic locations or other suitable groupings and to provide, forexample, air pollution reports of those groupings to any suitable entity(e.g., law enforcement entities 222). As another example, platform 200may be operative to compare detected external and/or internal phenomenafrom different areas of environment 100 with one another at a specifictime or historically (e.g., by time of day, day of week, season of year,etc.) for identifying certain areas that may have issues to be addressed(e.g., a corner of structure 150 that is exposed to significantly morenoise pollution than other portions of environment 100 at a specifictime of day and may benefit from additional sound proofing). As anotherexample, platform 200 may be operative to compare detected externaland/or internal phenomena of environment 100 with other smartenvironments. Any one or more of such comparisons or data aggregationswith respect to detected phenomena (e.g., air quality, noise levels,activity (e.g., motion) levels, ambient light levels, weather, etc.) ofone or more internal or external areas of environment 100 may be storedfor and/or shared with certain entities, such as prospective buyers ofenvironment 100, for determining whether such qualities of environment100 are suitable.

FIG. 43 is a flowchart of an illustrative process 4300 for controlling asmart environment that includes a number of smart devices at asmart-home environment that includes a structure. At step 4302, process4300 may include obtaining, at a computing system from a first smartdevice of the smart devices that is positioned at least partiallyoutside the structure, a condition of a first phenomenon outside thestructure detected by the first smart device. At step 4304, process 4300may include obtaining, at the computing system from a second smartdevice of the smart devices that is positioned at least partially insidethe structure, a condition of a second phenomenon inside the structuredetected by the second smart device. At step 4306, process 4300 mayinclude analyzing, with the computing system, the detected condition ofthe first phenomenon obtained from the first smart device in combinationwith the detected condition of the second phenomenon obtained from thesecond smart device. At step 4308, process 4300 may includeautomatically adjusting the functionality of at least one smart deviceof the smart devices using the computing system based on the analyzing.

It is understood that the steps shown in process 4300 of FIG. 43 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

FIG. 44 is a flowchart of an illustrative process 4400 for use withrespect to a smart-home environment that includes a structure and adoorbell smart device positioned at least partially outside thestructure. At step 4402, process 4400 may include obtaining, at acomputing system from the doorbell smart device, a condition of aphenomenon outside the structure detected by the doorbell smart device.At step 4404, process 4400 may include analyzing, with the computingsystem, the detected condition of the phenomenon obtained from thedoorbell smart device in combination with another detected condition ofthe phenomenon. At step 4406, process 4400 may include automaticallygenerating a report using the computing system based on the analyzing.

It is understood that the steps shown in process 4400 of FIG. 44 aremerely illustrative and that existing steps may be modified or omitted,additional steps may be added, and the order of certain steps may bealtered.

A computing system or processing system or any other suitable dataanalysis component of platform 200 may be provided by any suitableelement of platform 200 or any suitable combination of multiple elementsof platform 200. One or more smart devices of environment 100 (e.g.,doorbell smart device 106 and/or a hazard detector smart device 104,etc.) may each include a processor that may be operative to conduct anysuitable processing, analyzing, or computing functions of platform 200.Additionally or alternatively, one or more dedicated computing devicesmay be provided at environment 100 for locally conducting any suitableprocessing, analyzing, or computing functions of platform 200 atenvironment 100. Additionally or alternatively, server/system 164 may beoperative to conduct any suitable processing, analyzing, or computingfunctions of platform 200. System 164 may include or otherwise provide acomputing system that may be similar to computing system 1500 and/orcomputing system 1600 for performing any suitable functionalitydescribed above, at least partially automatically. Alternatively oradditionally, one, some, or all of entities 222-230 may include orotherwise provide a computing system that may be similar to computingsystem 1500 and/or computing system 1600 for performing any suitablefunctionality described above, at least partially automatically.

Any portion of platform 200 may be operative to store, generate, orotherwise define any suitable message, feedback, communication, music,video, and/or the like for any suitable purpose as described above. Anymessage, feedback, communication, music, video, or other informativemechanism to be output to a user or visitor may be at least partiallyautomatically generated or compiled or pre-stored and retrieved forconveyance to such a user or visitor via any suitable output componentof any suitable device by any suitable processing component orcomponents of platform 200. Each smart device or user device describedabove may be configured to include any component of any smart device oruser device described above. As just one particular example, any sensingcomponent 828 of doorbell smart device 106 may also be provided as asensing component of any other suitable smart device, such as a sensingcomponent of a safe smart appliance 113 a.

It is appreciated that the previous description of the disclosedexamples is provided to enable any person skilled in the art to make oruse the present disclosure. Various modifications to these examples willbe readily apparent to those skilled in the art, and the genericprinciples defined herein may be applied to other examples withoutdeparting from the spirit or scope of the disclosure. Thus, the presentdisclosure is not intended to be limited to the examples shown hereinbut is to be accorded the widest scope consistent with the principlesand novel features disclosed herein.

What is claimed is:
 1. A method of potentially handling a visitor in asystem comprising a computing system communicatively coupled to a firstsmart environment and a second smart environment, wherein the firstsmart environment comprises a first smart device and a first structurelocated at a first location, wherein the first structure is operative toshelter a first user, wherein the first smart device is operative toprovide at least one security objective for the first structure, whereinthe second smart environment comprises a second smart device and asecond structure located at a second location distinct from the firstlocation, wherein the second structure is operative to shelter a seconduser, and wherein the second smart device is operative to provide atleast one security objective for the second structure, the methodcomprising: receiving, at the computing system, first visitoridentification data generated by the first smart device that isindicative of the visitor being detected at the first location at afirst time; analyzing, using the computing system, at least a firstportion of the received first identification data to determine that thevisitor is one of the following types of visitor: a suspected criminal;a solicitor; a missing person; a missing pet; a missing item; and apackage deliverer; processing, using the computing system, at least asecond portion of the received first identification data to determinethat the first location is within a particular distance of the secondlocation; and automatically adjusting, using the computing system, afunctionality of the second smart device of the second smart environmentbased on the analyzing and based on the processing.
 2. The method ofclaim 1, wherein the adjusting the functionality of the second smartdevice comprises one of the following: turning on a light at the secondsmart environment; and outputting a sound at the second smartenvironment.
 3. The method of claim 1, wherein the adjusting thefunctionality of the second smart device comprises disabling at least aportion of a functionality of a doorbell smart device.
 4. The method ofclaim 1, wherein the adjusting the functionality of the second smartdevice comprises conveying information via an entryway interface smartdevice of the second smart environment that a doorbell user interface ofthe entryway interface smart device is disabled.
 5. The method of claim1, wherein: the second smart device comprises a smart doorknob device ofa door at an entry point to a portion of the second smart environment;and the adjusting comprises locking the door with the smart doorknobdevice.
 6. The method of claim 1, wherein the adjusting comprisesincreasing the security of the second smart environment.
 7. The methodof claim 1, wherein the adjusting comprises increasing the ability ofthe second smart device to detect visitor information associated withthe visitor when the visitor is at the second smart environment.
 8. Themethod of claim 7, wherein the second smart device comprises a sensingcomponent, and wherein the increasing the ability of the second smartdevice to detect visitor information associated with the visitor whenthe visitor is at the second smart environment comprises one of thefollowing: increasing a sampling rate of the sensing component of thesecond smart device; increasing a sensing range of the sensing componentof the second smart device; and activating the sensing component of thesecond smart device.
 9. The method of claim 8, wherein: the second smartdevice comprises a smart doorbell device positioned proximate to a doorat an entry point to a portion of the second smart environment; and thesmart doorbell device comprises a doorbell component operative to beinteracted with for generating a request to contact an occupant of thesecond smart environment.
 10. The method of claim 1, wherein theanalyzing comprises determining a particular behavior of the visitorwith respect to the first location.
 11. The method of claim 1, whereinthe analyzing comprises determining the identification of the visitor.12. The method of claim 1, further comprising, automaticallycommunicating, using the computing system, information indicative of thereceived first visitor identification data to a remote entity based onthe analyzing, wherein the remote entity comprises one of: a socialnetwork entity; a law enforcement entity; a package delivery entity; anda security entity.
 13. The method of claim 1, wherein: the firstlocation is a first plot of land within a neighborhood; and the secondlocation is a second plot of land within the neighborhood that isdistinct from the first plot of land.
 14. The method of claim 1,wherein: the analyzing comprises determining the identification of thevisitor; the method further comprises, prior to the adjusting, sharinginformation indicative of the identification of the visitor from thecomputing system to the second smart system; and the adjusting comprisesprioritizing the use of the shared information indicative of theidentification of the visitor by the second smart device to attempt toidentify the visitor at the second location.
 15. The method of claim 1,wherein: the first smart device of the first smart environment comprisesa smart doorbell device positioned proximate to a door at an entry pointto a portion of the first smart environment; and the smart doorbelldevice comprises: a doorbell component operative to be interacted withfor generating a request to contact an occupant of the first smartenvironment; and at least one sensing component operative to detect thefirst visitor identification data.
 16. The method of claim 1, wherein:the method further comprises, prior to the receiving, detecting secondvisitor identification data using a portable electronic device of a userassociated with the first smart environment in communication with thecomputing system; the receiving further comprises receiving the secondvisitor identification data at the computing system from the portableelectronic device; and the analyzing comprises analyzing, using thecomputing system, at least a portion of the second visitoridentification data and the at least a first portion of the receivedfirst identification data.
 17. The method of claim 1, furthercomprising: after the adjusting, receiving, at the computing system,second visitor identification data indicative of the visitor beingdetected at a third location time that is after the first time; andprocessing, using the computing system, the received firstidentification data in combination with the received secondidentification data to track a known path of the visitor.
 18. The methodof claim 17, further comprising automatically communicating, using thecomputing system, information indicative of the tracked known path to aremote entity based on the processing, wherein the remote entitycomprises one of: an academic entity; a law enforcement entity; apackage delivery entity; and a security entity.
 19. The method of claim17, further comprising automatically predicting, using the computingsystem based on the tracked known path, the likelihood that a futurepath of the visitor will reach the second smart environment.
 20. Themethod of claim 19, further comprising automatically updating, using thecomputing system, a functionality of at least one other smart device ofthe second smart environment based on the predicting.
 21. A systemcomprising: a first smart environment comprising: a first structurelocated at a first location, wherein the first structure is operative toshelter a first user; and a first smart device located at the firstlocation, wherein the first smart device is operative to: provide atleast one security objective for the first structure; detect a visitorat the first location; and generate visitor identification dataindicative of the visitor being detected at the first location; a secondsmart environment comprising: a second structure located at a secondlocation distinct from the first location, wherein the second structureis operative to shelter a second user; and a second smart device locatedat the second location, wherein the second smart device is operative toprovide at least one security objective for the second structure; and acomputing system operative to: receive the generated visitoridentification data from the first smart device; analyze at least aportion of the received identification data to determine that thevisitor is of interest to the computing system; and based on thedetermination that the visitor is of interest, adjust a functionality ofthe second smart device.
 22. The system of claim 21, wherein thecomputing system is operative to analyze the at least a portion of thereceived identification data to determine that the visitor is ofinterest to the computing system by determining that the visitor is oneof the following types of visitor: a suspected criminal; a solicitor; amissing person; a missing pet; a missing item; and a package deliverer.23. The system of claim 21, wherein the first smart device is anentryway interface smart device positioned at an entryway to a portionof the first smart environment; and the entryway interface smart devicecomprises: a doorbell component operative to be interacted with forgenerating a request to contact an occupant of the first smartenvironment; and at least one sensing component operative to detect thevisitor.
 24. A non-transitory computer readable medium comprisingcomputer readable instructions recorded thereon for: receiving, at acomputing system, first visitor identification data indicative of avisitor being detected at a first location at a first time; analyzing,using the computing system, at least a portion of the received firstidentification data to determine that the visitor is of interest to asmart environment, wherein: the smart environment comprises: a structurelocated at a second location distinct from the first location; and atleast one smart device located at the second location; the structure isoperative to shelter at least one user; the at least one smart device iscommunicatively coupled to the computing system and operative to provideat least one security objective for the structure; and the analyzingdetermines that the visitor is of interest to the smart environment bydetermining that the visitor is one of the following types of visitor: asuspected criminal; a solicitor; a missing person; a missing pet; amissing item; and a package deliverer; processing, using the computingsystem, at least a portion of the received first identification data todetermine that the first location is within a predetermined distance ofthe second location; and automatically adjusting, using the computingsystem, a functionality of the at least one smart device of the smartenvironment based on the analyzing and based on the processing.