Point-to-point visual communications in a security monitoring system

ABSTRACT

A monitoring system includes a doorbell unit that includes a camera and a display and that is configured to receive a request to access the property. The monitoring system includes a monitor control unit that is configured to determine an authentication protocol for determining whether to grant the visitor access to the property. The monitor control unit generates a first image and transmits authentication data to a computing device. The monitor control unit provides the first image and instructions to output the first image on the display of the doorbell unit. The monitor control unit receives a second image captured by the camera of the doorbell unit. The monitor control unit determines whether the second image includes a representation of data that is based on processing the first image in combination with the authentication data. The monitor control unit grants or denies the visitor access to the property.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/852,000, filed Apr. 17, 2020, now allowed, which is a continuation ofU.S. application Ser. No. 16/131,268, filed Sep. 14, 2018, now U.S. Pat.No. 10,638,096, issued Apr. 28, 2020, which claims the benefit of U.S.Application No. 62/558,386, filed Sep. 14, 2017. The completedisclosures of all of the above patent applications are herebyincorporated by reference in their entirety for all purposes.

TECHNICAL FIELD

This specification generally relates to monitoring systems.

BACKGROUND

Many people equip homes and businesses with monitoring systems toprovide increased security for the monitored property.

SUMMARY

Many people equip homes and businesses with monitoring systems toprovide increased security for the monitored property. Many of thesesystems integrate devices that possess both a camera and a displayscreen, for instance, a doorbell unit with a camera and display screenplaced at an entry point or an interface panel with camera and displayscreen used to electronically access a monitoring system control unit.The presence of both a camera and a display screen in a monitoringsystem unit enables point-to-point visual communications between thatunit and another device, such as a mobile phone, that is also equippedwith a camera and a display screen. These point-to-point visualcommunications can be used to accomplish various monitoring systemfunctions, such as visitor authentication, system reconfiguration, andsoftware upgrade. Visitor authentication may be useful when individualsother than the owner may need to access a monitored property,particularly when the owner is absent from the property. The subjectmatter of the present disclosure is related to systems and techniquesfor using point-to-point visual communications in a monitoring system.

According to an innovative aspect of the subject matter described inthis specification, a monitoring system that is configured to monitormay use point-to-point visual communication. The monitoring systemincludes a doorbell unit that includes a camera and a display and thatis configured to receive, from a visitor, a request to access theproperty; and a monitor control unit that is configured to, in responseto the request to access the property and based on an armed status ofthe monitoring system, determine, from among multiple authenticationprotocols, an authentication protocol for determining whether to grantthe visitor access to the property; based on the authenticationprotocol, generate a first image and transmit authentication data to acomputing device; provide, to the doorbell unit, the first image andinstructions to output the first image on the display of the doorbellunit; receive, from the doorbell unit, a second image captured by thecamera of the doorbell unit; determine whether the second image includesa representation of data that is based on processing the first image incombination with the authentication data; and based on determiningwhether the second image includes the representation of data that isbased on processing the first image in combination with theauthentication data, grant or deny the visitor access to the property.

These and other implementations can each optionally include one or moreof the following features. The monitor control unit is configured toreceive, from the doorbell unit, the request to access the property. Themonitor control unit is configured to determine whether the second imageincludes a representation of data that is based on processing the firstimage in combination with the authentication data by determining thatthe second image includes the representation of data that is based onprocessing the first image in combination with the authentication data;and grant or deny the visitor access to the property by granting thevisitor access to the property based on determining that the secondimage includes the representation of data that is based on processingthe first image in combination with the authentication data. The monitorcontrol unit is configured to determine whether the second imageincludes a representation of data that is based on processing the firstimage in combination with the authentication data by determining thatthe second image does not include the representation of data that isbased on processing the first image in combination with theauthentication data; and grant or deny the visitor access to theproperty by denying the visitor access to the property based ondetermining that the second image does not include the representation ofdata that is based on processing the first image in combination with theauthentication data.

The computing device is configured to process the first image incombination with the authentication data and output the second image ona display of the computing device. The monitor control unit isconfigured to, in response to the request to access the property,identify an expected visitor who is expected to visit the property; and,based on identifying the expected visitor who is expected to visit theproperty, identify, from among multiple computing devices, the computingdevice of the expected visitor. The doorbell unit is configured toreceive, from an additional visitor, an additional request to access theproperty. The monitor control unit is configured to, in response to theadditional request to access the property and based on a different armedstatus of the monitoring system, determine, from among the multipleauthentication protocols, a different authentication protocol fordetermining whether to grant the additional visitor access to theproperty; based on the authentication protocol, receive, from thedoorbell unit, a third image captured by the camera of the doorbellunit; determine whether the third image includes an additionalrepresentation of data that authenticates the additional visitor; and,based on determining whether the third image includes the additionalrepresentation of data that authenticates the additional visitor, grantor deny the additional visitor access to the property.

The third image includes data output on a display of a differentcomputing device of the additional visitor. The armed status of themonitoring system is armed away or armed stay. The different armedstatus of the monitoring system is unarmed. The monitor control unit isconfigured to determine whether the third image includes an additionalrepresentation of data that authenticates the additional visitor bydetermining that the third image includes the additional representationof data that authenticates the additional visitor; and grant or deny theadditional visitor access to the property by granting the additionalvisitor access to the property based on determining that the third imageincludes the additional representation of data that authenticates theadditional visitor.

The monitor control unit is configured to determine whether the thirdimage includes an additional representation of data that authenticatesthe additional visitor by determining that the third image does notinclude the additional representation of data that authenticates theadditional visitor; and grant or deny the additional visitor access tothe property by denying the additional visitor access to the propertybased on determining that the third image does not include theadditional representation of data that authenticates the additionalvisitor. The first image and the second image are QR codes. The doorbellunit and the computing device communicate wirelessly usingpoint-to-point visual communication. The monitoring system includes asensor that is located in a vicinity of the doorbell unit and that isconfigured to collect biometric data. The doorbell unit is configured toreceive, from an additional visitor, an additional request to access theproperty.

The monitor control unit is configured to, in response to the additionalrequest to access the property and based on a different armed status ofthe monitoring system, determine, from among the multiple authenticationprotocols, a different authentication protocol for determining whetherto grant the additional visitor access to the property; based on theauthentication protocol, obtain, from the sensor, the biometric data ofthe additional visitor; based on the different authentication protocol,generate a third image and transmit additional authentication data to acomputing device; provide, to the doorbell unit, the third image andadditional instructions to output the third image on the display of thedoorbell unit; receive, from the doorbell unit, a fourth image capturedby the camera of the doorbell unit; determine whether the fourth imageincludes an additional representation of data that is based onprocessing the third image in combination with the additionalauthentication data; and, based on determining whether the fourth imageincludes the additional representation of data that is based onprocessing the third image in combination with the additionalauthentication data and based on the biometric data of the additionalvisitor, grant or deny the additional visitor access to the property.The monitor control unit is configured to, in response to the additionalrequest to access the property, identify an additional expected visitorwho is expected to visit the property; access biometric data of theadditional expected visitor; compare the biometric data of theadditional expected visitor to the biometric data of the additionalvisitor; and grant or deny the additional access to the property basedfurther on comparing the biometric data of the additional expectedvisitor to the biometric data of the additional visitor. The armedstatus of the monitoring system is armed stay. The different armedstatus of the monitoring system is armed away.

Other embodiments of this aspect include corresponding systems,apparatus, and computer programs recorded on computer storage devices,each configured to perform the operations of the methods.

According to an innovative aspect of the subject matter described inthis specification, a method for using point-to-point visualcommunication includes the actions of receiving, from a visitor and by amonitoring system that is configured to monitor a property and thatincludes a doorbell unit that includes a camera and a display, a requestto access the property; in response to the request to access theproperty and based on an armed status of the monitoring system,determining, by the monitoring system and from among multipleauthentication protocols, an authentication protocol for determiningwhether to grant the visitor access to the property; based on theauthentication protocol, generating, by the monitoring system, a firstimage and transmit authentication data to a computing device; providing,to the doorbell unit of the monitoring system, the first image andinstructions to output the first image on the display of the doorbellunit; receiving, from the doorbell unit of the monitoring system, asecond image captured by the camera of the doorbell unit; determining,by the monitoring system, whether the second image includes arepresentation of data that is based on processing the first image incombination with the authentication data; and, based on determiningwhether the second image includes the representation of data that isbased on processing the first image in combination with theauthentication data, granting or denying, by the monitoring system, thevisitor access to the property.

These and other implementations can each optionally include one or moreof the following features. The computing device is configured to processthe first image in combination with the authentication data and outputthe second image on a display of the computing device. The actionsinclude, in response to the request to access the property, identifyingan expected visitor who is expected to visit the property; and, based onidentifying the expected visitor who is expected to visit the property,identifying, from among multiple computing devices, the computing deviceof the expected visitor. The first image and the second image are QRcodes. The doorbell unit and the computing device communicate wirelesslyusing point-to-point visual communication.

Other embodiments of this aspect include corresponding systems,apparatus, and computer programs recorded on computer storage devices,each configured to perform the operations of the methods.

Particular embodiments of the subject matter described in thisspecification can be implemented so as to realize one or more of thefollowing advantages. A resident of a property may be able to use themonitoring system to authenticate a visitor when the resident is not atthe property. The monitoring system may be able to user differentauthentication schemes depending on the armed state of the property.

The details of one or more implementations of the subject matterdescribed in this specification are set forth in the accompanyingdrawings and the description below. Other features, aspects, andadvantages of the subject matter will become apparent from thedescription, the drawings, and the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram illustrating an example system for accessing aproperty using point-to-point visual communications in a securitymonitoring system.

FIG. 2 is a diagram illustrating an example system for non-intrusivesystem service using point-to-point visual communications in amonitoring system.

FIG. 3 is a flowchart illustrating an example process for accessing aproperty using point-to-point visual communications in a securitymonitoring system.

FIG. 4 is a flowchart illustrating an example process for performingnon-intrusive system service using point-to-point visual communicationsin a monitoring system.

FIG. 5 is a block diagram of an example security monitoring system.

Like reference numbers and designations in the various drawings indicatelike elements.

DETAILED DESCRIPTION

FIG. 1 is a diagram illustrating an example system 100 for accessing aproperty using point-to-point visual communications in a securitymonitoring system. In system 100, a visitor requests access to aproperty via point-to-point visual communications between the visitor'smobile device and a doorbell unit. Upon receipt of the request, amonitoring system control unit determines the authentication protocolthat will be applied to authenticate the visitor's identity. The controlunit may determine the authentication protocol based on a variety ofinputs, including an alarm status, the location of the entry request(e.g. at front door or a side gate), information provided by an owner ora monitor server, data from one or more sensors, or other inputs. Afterthe control unit determines the authentication protocol, the doorbellunit performs the authentication protocol via point-to-point visualcommunications and determines whether to grant the visitor access. FIG.1 includes stages (A) through (D) which depict an example processimplemented by system 100.

In stage (A), a visitor 102, is visiting a property 104 (e.g. a home orbusiness) that is monitored by a monitoring system. The visitor 102 maybe a service provider, such as a technician, renovator, cleaner, repairperson, or dog-walker; a first-responder, such as police or firepersonnel; or another individual who desires access to the property.

To enter the property 104, the visitor 102 approaches an entry pointequipped with an adjacent doorbell unit 106. The entry point may belocated within the property 104 (e.g. a door to a house), on theperimeter of the property 104 (e.g. a gate at the driveway entrance), oroutside the property 104 (e.g. a gate outside of the property). Thedoorbell unit 106 is equipped with a display screen 108, which can, forinstance, comprise a liquid crystal display (LCD), a cathode ray tube(CRT) device, an organic light-emitting diode (OLED) panel, a thin filmtransistor (TFT) device, or other means for displaying visualinformation. The doorbell unit 106 is further equipped with a camera110. The camera 110 may be integrated into the doorbell unit 106 or maybe a separate device that is located in near proximity to the doorbellunit 106.

The visitor 102 has in her possession a mobile device 112, for instancea mobile phone, which is equipped with a display screen 114 and a camera116. The display screen 114 may be a LCD, an OLED display, a TFTdisplay, a touch screen device, or other means for visually displayinginformation. The camera 116 may be situated on the same side of thedevice as the display screen 114.

In stage (B), as depicted in inset 118, the visitor 102 requests accessto the property 104. In some implementations, the visitor 102 mayrequest access by placing the mobile device 112 in near proximity to thedoorbell unit 106 such that the mobile device display screen 114 isvisible to the doorbell unit camera 110. The mobile device 112 presentson its display screen 114 an optical code or codes that can be observedand captured by the doorbell unit camera 110, where information isencoded into the optical code. Here, the information encoded into theoptical code is a request for access to the property 104. For instance,this optical code can be any one or combination of images, QuickResponse (QR) codes, alphanumeric text, or other visual means ofrepresenting information. In some implementations, the optical code maybe generated on the mobile device display screen 114 when the visitor102 opens an application on her mobile device 112 or when she inputs acommand to her mobile device 112. The optical code captured by thedoorbell unit camera 110 is then processed by the doorbell unit 106 orthe control unit 120 to extract the information encoded into the opticalcode. In this way, the visitor 102 submits a request for access to theproperty 104.

Capture of the optical code by the doorbell unit camera 110 can beinitiated automatically, for instance where the doorbell unit camera 110monitors its field of view for a recognized code. Alternatively, thecapture can be initiated on-demand, for instance when the visitor 102actuates a button on the doorbell unit 106 or otherwise communicatesthat an optical code is displayed for capture.

Communication of this sort, in which optical information presented on adisplay screen of a first device is captured by a camera of a seconddevice is referred to herein as “point-to-point visual communication.”The communication link formed between the camera and screen of a firstdevice and the camera and screen of a second device in near proximity,where optically-encoded data can be exchanged via point-to-point visualcommunication, is referred to herein as a “point-to-point visualcommunication channel.”

The visitor 102 may also request access to the property 104 by othermethods. For example, the visitor 102 may ring a doorbell, press abutton on the doorbell unit 106, or enter a code into the doorbell unit106.

In some implementations, the doorbell unit 106 may similarly transmitinformation to the mobile device 112 over the point-to-point visualcommunication channel 115. For example, the doorbell unit 106 maypresent an optical code or codes on the doorbell unit display screen 108that are captured by the mobile device camera 116. To capture the codepresent on the doorbell unit display screen 108, the mobile devicecamera 116 is placed in near proximity to the doorbell unit 106 in adirection facing the doorbell unit display screen 108. The mobile device112 then processes the optical code to extract information encoded intothe optical code.

Following receipt of the access request in stage (B), the doorbell unit106 communicates the access request to a monitoring system control unit120. The doorbell unit 106 communicates with the control unit 120 over ashort-range, possibly through a network 130. The network 130 may bewired or wireless and may comprise a local area network (LAN), theInternet, WiFi, Bluetooth, or other means for short-range electroniccommunications.

As shown in inset 140, during stage (C), the control unit 120 determinesthe authentication protocol that will be used to determine whether togrant the visitor 102 access. The authentication protocols identified bythe control unit 120 may be classified based on the level of confidencein the identity of the visitor 102 that is required. For instance, anauthentication protocol may be classified as “standard security,”“elevated security,” or “high security,” where a standard securityprotocol requires a moderate level of confidence in the identity of thevisitor 102, an elevated security protocol requires a higher level ofconfidence in the identity of the visitor 102, and a high securityprotocol requires the highest level of confidence in the identity ofvisitor 102. Authentication protocols with other security levels orother protocol designations are also possible.

The authentication protocol determined by the control unit 120 mayspecify what type of authentication method will be used, how manyauthentication methods will be used, and other details of theauthentication process. For instance, the authentication protocol mayrequire that the identity of the visitor 102 be authenticated throughoptical access code verification, challenge/response, image comparison,or any combination of techniques. A variety of authentication protocolsspanning different security levels are possible.

One example of a standard security authentication protocol is opticalaccess code verification, where the doorbell unit 106 reads an opticalaccess code presented by the mobile device 112. Based on that opticalaccess code, the doorbell unit 106 or the control unit 120 determineswhether to grant access to the visitor 102.

For example, the mobile device 112 may transmit an optical access codeto the doorbell unit 106 via the point-to-point visual communicationchannel 115. Here, the mobile device 112 presents an optical access codeon the mobile device display screen 114 in view of the doorbell unitcamera 110. The optical access code could be, for instance, a QR code orother passcode, and the point-to-point visual communication is one-way,from the mobile device 112 to the doorbell unit 106. The optical accesscode may be stored on the mobile device 112 in advance of the accessrequest, or it may be generated by the mobile device 112, for instance,when the visitor 102 initiates an action, such as opening a softwareapplication. The optical access code may also be communicated to themobile device 112 by the authentication server 152 or other computersystem. The doorbell unit camera 110 captures the optical access codepresented by the mobile device display screen 114 and communicates thecode to the control unit 120 or processes the captured code beforecommunicating with the control unit 120. If the control unit 120 or thedoorbell unit 106 determines that the optical access code corresponds toan authorized access code, the visitor 102 is granted access.

In this example, the mobile device 112 may have been preregistered withan authentication server 152. The authentication server 152 may providethe mobile device 112 with an authorized access code or with theinformation that the mobile device 112 needs to generate an authorizedaccess code. The authentication server 152 may also communicate with themonitor server 150 to register the mobile device 112 as a deviceauthorized to enter property 104. The monitor server 150 is remote fromthe property 104 and communicates with the control unit 120 over along-range wired or wireless connection. The monitor server 150 mayperiodically provide the control unit 120 with an updated set of opticalcodes associated with authorized visitors.

While optical access code verification ensures only a visitor inpossession of an authorized code may be granted access, any visitor 102who holds an object that displays an authorized access code could begranted access to the property 104. The object could be the mobiledevice 112, a different mobile device, a sheet of paper, etc. Whenadditional authentication of the visitor 102 or the mobile device 112 isdesired, the control unit 120 may determine that an elevated or highsecurity authentication protocol should be used.

One example of an elevated security authentication protocol ischallenge/response, where the doorbell unit 106 presents a challenge tothe mobile device 112 that requires a response from the mobile device112. Based on the response from the mobile device 112, the control unit120 determines whether to grant access to the visitor 102. The responseprovided by the mobile device 112 may verify the identity of the mobiledevice 112 and/or the identity of the visitor 102. Inchallenge/response, communication between the doorbell unit 106 and themobile device 112 is two-way and takes place over the point-to-pointvisual communication channel 115.

For example, the doorbell unit screen 108 may present an optical codethat, when captured by the mobile device camera 116, prompts the mobiledevice 112 to display a response code on the mobile device displayscreen 114. To generate the response code the mobile device 112 maycommunicate with the authentication server 152. For instance, theauthentication server 152 may verify the identity and/or location of themobile device 112 and provide the mobile device 112 with the informationnecessary to generate an authorized response code. Generating theresponse code may also require the visitor 102 to input data to mobiledevice 112. For example, the visitor 102 may have to enter a passwordinto the mobile device 112 in order to generate an authorized responsecode. Once the mobile device 112 presents the optical response code, thedoorbell unit camera 110 captures the optical response code via thepoint-to-point visual communication channel 115 and may communicate thecode to the control unit 120. If the control unit 120 or the doorbellunit 106 recognizes the optical response code as an authorized responsecode, the visitor 102 is granted access to the property 104.

When additional verification of the identity of visitor 102 is desired,the control unit 120 may require that a high security authenticationprotocol be used. One example of a high security authentication protocolis where the control unit 120 requires an image comparisonauthentication, such as facial recognition, in addition tochallenge/response. For example, after successfully performingchallenge/response with the visitor mobile device 112 via thepoint-to-point visual communication channel 115, the doorbell unit 106may capture an image of visitor 102 using the doorbell unit camera 110.The doorbell unit 106 or the control unit 120 then compares the capturedimage to one or more images of authorized visitors. The authenticationprotocol may specify a level of confidence that will be applied to theimage comparison. For example, the authentication protocol may specifythat the captured image of visitor 102 must match an image of anauthorized visitor with 98% confidence in order to grant access to thevisitor 102. If the control unit 120 or the doorbell unit 106 determinesthat the captured image of visitor 102 matches the image of anauthorized visitor with at least the specified level of confidence, thevisitor 102 may be granted access to the property 104.

As shown in inset 140, the control unit 120 may determine theauthentication protocol to be used based on the alarm status 122 andother inputs. An alarm status may be set by the owner of the property104 and can be one of multiple alarm states. The alarm status mayindicate whether the owner is present on property 104 and/or the levelof security required by the monitoring system 100. For example, an alarmstatus may be “disarmed,” “home, armed,” or “away, armed.”

In addition to the alarm status 122, the control unit 120 may use one ormore inputs to determine the authentication protocol that will be used.One example of an input that the control unit 120 may use is the entrylocation at which the visitor 102 requests access. For example, if thevisitor 102 requests access to the yard of the property 104 at a gate,the control unit 102 may determine that a standard authenticationprotocol will be used. Alternatively, if the visitor 102 requests accessto a house on the property 104 at a front door, the control unit 102 maydetermine that an elevated security authentication protocol must beused.

Another example of an input that the control unit 120 may use isinformation provided by the owner of the property 104 or by a monitorserver 150. The information provided to the control unit 120 by theowner or by the monitor server 150 may include, for instance, whether avisitor is expected at the property 104. For example, if the ownerschedules a repair person to visit the property 104 while the owner isabsent from the property 104, the owner may indicate to the control unit120 that a visitor is expected. If a visitor is expected, the controlunit 120 may determine that a standard security authentication protocolwill be used to determine whether to grant access to the visitor 102.Alternatively, if the owner has not indicated to the control unit 120that a visitor is expected, the control unit 120 may determine that anelevated security authentication protocol will be used.

The control unit 120 may use any one or combination of inputs todetermine the authentication protocol that will be used to determinewhether to grant access to visitor 102.

As an example, if the visitor 102 requests access to the yard of theproperty 104 at a gate and the alarm status 122 is “disarmed,” thecontrol unit 120 may determine that a standard security authenticationprotocol, which requires a moderate level of confidence in the identityof the visitor 102, will be used. If the standard securityauthentication protocol required only optical access code verification,the visitor 102 would be required to display an authorized opticalaccess code on their mobile device 112 to access the property 104.

Alternatively, if the visitor 102 requests access to the yard of theproperty 104 at a gate but the alarm status 122 is “home, armed,” thecontrol unit 120 may determine that an elevated security authenticationprotocol, which requires a higher level of confidence in the identity ofvisitor 102, will be used. In this example, the elevated securityauthentication protocol may require a challenge/response from the mobiledevice 112 in order to grant the visitor 102 access to the property 104.

As another example, if the alarm status 122 is “away, armed” and theowner has indicated to the control unit 120 that a visitor expected, thecontrol unit 120 may determine that an elevated security authenticationprotocol, which requires a challenge/response from the mobile device112, will be used to authenticate the visitor 102. Alternatively, if thealarm status 122 is “away, armed” and the owner has not indicated to thecontrol unit 120 that a visitor is expected, the control unit 120 maydetermine that a high security authentication protocol, which requiresthe highest level of confidence in the identity of the visitor 102, willbe used. Here, the high security authentication protocol may requirefacial recognition of the visitor 102.

In stage (D), the doorbell unit performs the authentication protocoldetermined by the control unit 120. Through the authentication protocol,if the control unit 120 determines that the visitor 102 is authorized toenter, the control unit can grant visitor 102 access to the property104.

The diagram of FIG. 1 illustrates an example where stages (A) through(D) are performed sequentially to determine whether the visitor 102 canaccess the property 104. Here, the visitor 102 approaches the doorbellunit 106 (A), the visitor 102 requests access to the property 104 (B),the control unit 120 determines the authentication protocol to be used(C), and the doorbell unit 106 authenticates the visitor 102 via thedetermined protocol (D). Other implementations may order the stagesdifferently, may omit stages, or may add stages.

For example, in some implementations, the control unit 120 may determinethe authentication protocol (C) before the visitor 102 requests access(B). For instance, if the alarm status is “away, armed” and the ownerhas not indicated that a visitor is expected, the control unit 120 maydetermine that any visitor at any entry point will be subject to a highsecurity authentication protocol. As another example, someimplementations may not require the visitor to request access (B). Forinstance, the doorbell unit 106 may automatically detect the presence ofa visitor, possibly through the doorbell unit camera 110 or other sensor124. In some implementations, any actions performed by any of thecontrol unit 120, the doorbell unit 106, monitoring server 150, theauthentication server 152, or the mobile device 112 can be performed byany of the control unit 120, the doorbell unit 106, monitoring server150, the authentication server 152, or the mobile device 112.

Using point-to-point visual communications in security monitoringsystems to determine access provides advantages relative to othertechniques. Point-to-point visual authentication is more convenient thanother methods because it uses a mobile device that the visitor is likelyto already be carrying, rather than requiring her to carry an additionalfob, key, card, or other authentication component. Because they do notrequire any physical contact between the visitor and the entry point,point-to-point visual authentication methods are less susceptible todegradation from wear than techniques that require inserting a key orswiping a card. Additionally, point-to-point visual authentication canprovide greater certainty in visitor identity, as it naturally supportsfacial recognition and other image comparison-based authenticationmethods that provide high-confidence identity verification.

Point-to-point visual authentication methods can also be more securethan other techniques. As communication is entirely visual, there are noelectronic transmissions that can be intercepted by a third party, andinterference, such as intentionally blocking the visual communicationschannel, is easily detected. The point-to-point visual communicationchannel is limited to a short distance and narrow field of view definedby the characteristics of the cameras and display screens of thecommunicating devices, making it difficult for a third party to observeoptical codes exchanged between the devices. The optical access codespresented by the devices can be updated frequently and even issued atthe time of the access request, preventing use of stale codes byunauthorized visitors.

Point-to-point visual communications can also be used in monitoringsystems to accomplish functions other than visitor authentication forproperty access. FIG. 2 is a diagram illustrating an example of a system200 for non-intrusive system service using point-to-point visualcommunications in a monitoring system. In FIG. 2, an authorized servicerpresent at a property is able to implement a service task on the controlunit of a property monitoring system by communicating with that controlunit via point-to-point visual communications. A service task may be,for instance, updating firmware on the control unit or recoveringsoftware on the control unit after malfunction. A service task mayinclude any operation applied to software, firmware, hardware, or othercomponent of the control unit or property monitoring system. Bycommunicating with the control unit via point-to-point visualcommunications, the authorized servicer does not require a networkconnection or physical connection to the control unit in order toimplement service process. FIG. 2 includes stages (A) through (E) whichdepict an example of a service task implemented by system 200.

The system 200 includes a control unit interface 206 and a control unit220 that are part of a property monitoring system. The propertymonitoring system may be located at a residence, a place of business, oranother property. The control unit interface 206 possess both a displayscreen 208 and a camera 210. The display screen 208 may include, forinstance, a LCD, a CRT, an OLED panel, a TFT display, or other means fordisplaying visual information. The control unit interface 206communicates electronically over a short range with a control unit 220.The control unit interface 212 may communicate with the control unit 220through a network 230. The network 230 may be wired or wireless and maycomprise a LAN, the Internet, WiFi, Bluetooth, or other means forshort-range electronic communications.

The mobile device 212 is used by the authorized servicer to communicatewith the control unit interface 206 via a point-to-point visualcommunication channel 215. The mobile device 212 possesses both adisplay screen 214 and a camera 216. The mobile device 212 may be, forinstance, a mobile phone or a tablet computing device. The displayscreen 214 may be a LCD, an OLED display, a TFT display, a touch screendevice, or other means for displaying visual information. The camera 216may be situated on the same side of the mobile device 212 as the displayscreen 214. The authorized servicer may carry the mobile device 212 tothe monitored property or the mobile device 212 may be resident at themonitored property.

In some implementations, the mobile device 212 and/or the control unit220 authenticates the authorized servicer on site at the monitoredproperty to allow the performance of service tasks via point-to-pointvisual communication with the control unit 220. For example, the mobiledevice 212 may require the authorized servicer to input a password tothe mobile device 212. The mobile device 212 may also authenticate theauthorized servicer by other means, including using biometricparameters, such as a finger print or facial recognition.

The control unit 220 may also require authentication of the authorizedservicer prior to allowing the performance of service tasks. In someimplementations, the control unit 220 may authenticate the authorizedservicer using an authentication protocol such as those used by system100 of FIG. 1. For example, if the authorized servicer is from themonitoring system company, the control unit 220 may require a standardsecurity authentication protocol, where the authorized servicer mustpresent an authorized optical access code on his mobile device 212 inorder to perform the service tasks. Alternatively, if the authorizedservicer is not from the monitoring system company but from a thirdparty company, the control unit 220 may require the a high securityauthentication protocol, where the authorized servicer must beauthenticated through challenge/response and facial recognition.

The authorized servicer can transmit information from the mobile device212 to the control unit interface 206 via the point-to-point visualcommunication channel 215 between the mobile device 212 and the controlunit interface 206. For example, the authorized servicer can place themobile device 212 in near proximity to the control unit interface 206such that the mobile device display screen 214 is visible to the controlunit interface camera 210. The mobile device 212 presents on its displayscreen 214 an optical code or codes that can be captured by the controlunit interface camera 210. For example, this optical code can be anycombination of one or more images, QR codes, alphanumeric text, or othervisual means of representing information. In some implementations, theoptical code may be generated on the mobile device display screen 214when the authorized servicer opens an application on the mobile device212 or inputs a command to the mobile device 212. The control unitinterface camera 210 captures the optical code presented on the mobiledevice display screen 214. The control unit interface 206 or the controlunit 220 processes the code to extract information encoded into theoptical code. In this way information is transmitted from the mobiledevice 212 to the control unit interface 206 and/or the control unit 220over the point-to-point visual communication channel 215. Capture of theoptical code by the control unit interface camera 210 can be initiatedautomatically, for instance where the control unit interface camera 210monitors its field of view for a recognized code. Alternatively, thecapture can be initiated on-demand, for instance when the authorizedservicer presses a button on the control unit interface 206 or otherwiseindicates that an optical code is displayed for capture.

In some implementations, the control unit interface 206 may similarlytransmit information to the mobile device 212 over the point-to-pointvisual communication channel 215. For example, the control unitinterface 206 may present an optical code or codes on the control unitinterface display screen 208 that are captured by the mobile devicecamera 216, where the mobile device 212 is placed in near proximity tothe control unit interface 206 such that the mobile device camera 216 isfacing the control unit interface display screen 108.

The information transmitted by the mobile device 212 to the control unitinterface 206 may include authentication information, data, commands,queries, replies to queries, and other information. Likewise,information transmitted by the control unit interface 206 to the mobiledevice 212 may include authentication information, data, commands,queries, replies to queries, and other information. Information may betransmitted concurrently, for example, where a set of several codesappear simultaneously on the mobile device display screen 214 and theset of code are captured simultaneously by the control unit interfacecamera 210. Information may also be transmitted sequentially, forexample, where a series of codes or sets of codes appear one-at-a-timeon the mobile device display screen 214 and each code or set of codes iscaptured by the control unit interface camera 210 in the sequence inwhich it appears.

By communicating information via the point-to-point visual communicationchannel 215 between the mobile device 212 and the control unit interface206, the authorized servicer can implement service tasks on the propertymonitoring system control unit 220. An example of system 200implementing a service task via the point-to-point visual communicationchannel 215 is depicted in stages (A) through (E) in FIG. 2.

In stage (A), the mobile device 212 displays one or more optical codesrepresenting servicing queries or commands on the mobile device displayscreen 214. For example, the codes may represent a query for informationon the current version of software contained within the control unit220. As another example, the codes may represent a series of commandsthat instruct the control unit 220 to update certain software within thecontrol unit 220. The codes may also represent commands and data thatinstruct the control unit 220 how to update certain software. The mobiledevice display screen 214 may display the one or more codes concurrentlyor sequentially. The mobile device 212 may also generate the one or moreoptical codes when prompted by input to the mobile device 212 by theauthorized servicer. When displaying the one or more codes, the mobiledevice 212 is in near proximity to the control unit interface 206, suchthat the mobile device display screen 214 is visible to the control unitinterface camera 210.

In stage (B), the control unit interface camera 210 captures the one ormore optical codes displayed on the mobile device display screen 214.The control unit interface camera 210 may capture the one or more codessequentially or concurrently. The control unit interface 206 thentransmits the codes, or a decoded version of the codes, to the controlunit 220, possibly via the network 230.

In stage (C), the control unit 220 may perform one or more operations inresponse to the optical codes displayed by the mobile device 212. Forexample, if the optical codes displayed by the mobile device 212represent a query for the current version of software installed oncontrol unit 220, the control unit 220 may send information to thecontrol unit interface 206 indicating the current version of software.As another example, if the optical codes displayed by the mobile device212 represent commands to update software installed on control unit 220,the control unit 220 may perform the necessary operations to update thesoftware as commanded.

In stage (D), the control unit interface 206 may transmit information tothe mobile device 212 via the point-to-point visual communicationchannel 215 by displaying one or more optical response codes on thecontrol unit interface display screen 208. For example, the control unitinterface display screen 208 may display a response code that representsa reply to a query, for instance, that software version 2.0 is currentlyinstalled. As another example, the control unit display screen 208 maydisplay a response code that indicates an operation is complete, forinstance, that the control unit 220 has completed updating its software.As a third example, the control unit display screen 208 may display aresponse code that indicates it was unable to capture or decode theprevious code presented to it.

In stage (E), the mobile device camera 216 reads the one or more opticalresponse codes displayed by the control unit interface display screen208. The mobile device 212 may perform an operation based on the one ormore optical response codes. For example, if the optical response codeindicates that the installed software version is out-of-date, the mobiledevice 212 may display one or more optical codes that instruct thecontrol unit 220 to update its software. As another example, if theoptical response code indicates that the control unit 220 has completedthe commanded operation, the mobile device 212 may cease visualtransmission of data across the point-to-point visual communicationchannel 215. As a third example, if the optical response code indicatesthat the control unit was unable to decode an optical code, the mobiledevice 212 may resend an optical code by displaying it again on themobile device display screen 214.

The process described by stages (A) through (E) may be repeated one ormore times as necessary to complete one or multiple service tasks.

The system 200 for non-intrusive system service using point-to-pointvisual communications in a monitoring system has several advantages overalternative approaches for system service. One common method to performservice tasks is to physically connect an external device to the controlunit through a USB port on the control unit interface. Once connected,the external device communicates with the control unit to perform thedesired service task. The external device can be, for instance, a laptopcomputer or a USB memory device. Physically connecting an externaldevice to the control unit or control unit interface through a USB portcan pose severe security risks to the control unit. For example, the USBfirmware of the external device can be modified to surreptitiouslyinstall malicious software on the control unit, even if the control unitis running anti-malware software. Alternatively, in system 200, becauseinformation is exchanged via point-to-point visual communications, thereis no physical connection between the mobile device and the controlunit, preventing surreptitious installation of malicious software viaUSB-type connections.

Another common method to perform service tasks is to connect an externaldevice to the control unit through a network connection. Once connected,the external device, which may be a computer or a server, communicateswith the control unit to perform the desired service task. However, ifthe network communication between the external device and the controlunit over is disrupted, the service task may not complete. Networkcommunication may be disrupted by a variety of causes, including failureof a specific network hardware component such as a router, a networksecurity attack, a failed upgrade, a power-outage, or a physical breachin the network. Alternatively, because system 200 does not rely on anetwork for communications between the mobile device and the controlunit, service tasks can be completed even in the case of networkdisruption or failure.

The use of point-to-point visual communications is not limited tomonitoring systems, but can be applied more broadly to systems requiringinformation transfer between two devices, where at least one devicepossesses a camera and the second device possesses a display screen.Data can be encoded into optical codes that are transmitted over avisual point-to-point communication channel between the devices. Opticalcodes can include images, videos, or any other visual representation ofdata. Data communication in a point-to-point visual communication systemcan be one-way, where the display screen of one device presents opticalcodes that are captured by the camera of a second device. If bothdevices possess a camera and a display screen, data communication canalso be two-way, where both devices capture and displayoptically-encoded information. Two-way communication can be half-duplex,where at a given time a device either displays an optical code on itsdisplay screen or captures an optical code with its camera. Two-waycommunication can also be full-duplex, where at a given time a deviceboth displays an optical code on its display screen and captures anoptical code with its camera.

For example, point-to-point visual communications can be used to enabledata transfer between a desktop computer and a mobile device, where themobile device is held in near proximity to the computer such that thedisplay screen of each is visible to the camera of the other.Point-to-point visual communications can also be used to support datasharing between two mobile devices, where the mobile devices are heldfacing one another, such that the display screen of each is visible tothe camera of the other.

Using point-to-point visual communications for data transfer betweendevices offers several advantages over conventional methods for dataexchange. Point-to-point visual methods do not require a physicalconnection between the devices, eliminating the need for wires,connectors, or other physical equipment that can fail or damage adevice. Point-to-point visual communication methods are also moreconvenient, as no additional equipment, such as adapters, connectors, orcords, are required to exchange data. Furthermore, point-to-point visualcommunication methods are more secure than many conventional datatransfer techniques. With no physical connection between the devices,the risk of malicious software installation or virus infectiondecreases, while the short-range nature of the point-to-point visualcommunication channel makes transmissions more difficult for a thirdparty to intercept or block.

FIG. 3 is a flowchart illustrating an example process 300 for accessinga property using point-to-point visual communications in a securitymonitoring system. Through process 300, a monitoring system determinesand applies an authentication protocol to a visitor visiting a property,where the authentication protocol uses point-to-point visualcommunications. Based on the outcome of the authentication protocol, themonitoring system determines whether to grant the visitor access to theproperty. In some implementations, the monitoring system includes adoorbell unit, which possess both a camera and a display screen.

In process 300, the monitoring system receives, from a computing deviceof a visitor, a request to access a property (302). The visitor'scomputing device may be, for example, a mobile phone, tablet computer,or other mobile computing device that is equipped with a camera and adisplay screen. The visitor may request access to the property throughpoint-to-point visual communications between the visitor's computingdevice and the doorbell unit. The visitor may also request access to theproperty by ringing a doorbell or entering a code into the doorbellunit. The monitoring system may also receive an access request bydetecting the presence of the visitor, for example, through imagescaptured by a monitoring system camera or motion detected by amonitoring system sensor.

Based on the monitoring system alarm status and other inputs, themonitoring system determines the authentication protocol for grantingthe visitor access to the property (304). For example, if the alarmstatus is “home, disarmed,” the monitoring system may determine that astandard security authentication protocol, which requires a moderatelevel of confidence in the identity of the visitor, will be applied. Asanother example, if the alarm status is “away, disarmed”, the monitoringsystem may determine that an elevated security authentication protocol,which requires a higher level of confidence in the identity of thevisitor, will be applied. The monitoring system may determine theauthentication protocol before or after receiving the access requestfrom the visitor.

According to the authentication protocol, the monitoring systemcommunicates with the computing device of the visitor usingpoint-to-point visual communication (306). For example, the monitoringsystem may determine that an elevated security authentication protocolrequiring an optical challenge/response will be used. The doorbell unitof the monitoring system then communicates a challenge to the visitor'scomputing device by displaying an optical code on the doorbell unitdisplay screen, which is captured by the camera of the visitor'scomputing device. The visitor's computing device processes the code andpresents an optical response code on its display screen. The doorbellunit camera then captures the optical response code displayed on thedisplay screen of the visitor's computing device.

Based on communicating with the computing device of the visitor usingpoint-to-point visual communication, the monitoring system determineswhether to grant the visitor access to the property (308). In theexample of the challenge/response authentication protocol above, if themonitoring system determines that the optical response code displayed bythe visitor's computing device is an authorized response code, themonitoring system may grant the visitor access to the property. If themonitoring system determines that the optical response code displayed bythe visitor's computing device is not an authorized response code, themonitoring system may deny the visitor access to the property.

FIG. 4 is a flowchart illustrating an example process 400 for performingnon-intrusive system service using point-to-point visual communicationsin a monitoring system. In process 400, the monitoring system exchangesdata with a computing device using point-to-point visual communicationsand, based on that data, performs system operations that may includeupdating software, reconfiguring settings, or other functions. In someimplementations, the monitoring system includes a control unit, as wellas a control unit interface, where the control unit interface possessesboth a camera and a display screen. The control unit interface enables acomputing device to exchange data with the monitoring system throughpoint-to-point visual communications.

In process 400, the monitoring system receives a request to communicatewith a computing device using point-to-point visual communication (402).The computing device may be, for instance, a mobile phone, a tabletcomputer, a laptop computer, or other computing device that containsboth a camera and a display screen. The communication request may beindicated through point-to-point visual communications between thecomputing device and the control unit interface. The communicationrequest may also be indicated by pressing a button on the control unitinterface or entering a code into the control unit interface.

The monitoring system then receives, from a first image capture device,an image displayed on the computing device (404). The first imagecapture device may be, for instance, a camera integrated into thecontrol unit interface. The first image capture device may also be acamera separate from the control unit interface, but located in nearproximity to it. The image displayed on the computing device may be anoptical code, such as a QR code, alphanumeric text, an image, or othermeans of visually encoding information. For example, the computingdevice may display an optical code that represents a command to themonitoring system to update its software.

After receiving the image, the monitoring system extracts data byprocessing the image received by the capture device (406). The image maybe processed by the control unit or by another computer within themonitoring system. The data extracted by processing the image mayinclude commands, queries, or other information.

Based on the data extracted from the image, the monitoring systemperforms an operation (408). For example, if the data extracted from theimage represents a command to update software, the monitoring system maythen perform the indicated software update.

Based on the operation performed, the monitoring system may displayadditional data that is captured by a second image capture device of thecomputing device (410). The monitoring system may display the additionaldata as an image on a display screen associated with the monitoringsystem, for instance, on the display screen of the control unitinterface. The second image capture device may be, for example, a cameraintegrated into the computing device. The image displayed by themonitoring system may be an optical code or codes, alphanumeric text, orother image containing the data to be communicated to the computingdevice.

Some or all of the stages (402) through (410) may repeat until therequired monitoring system operation or operations are complete.

The process 400 can be “half-duplex” point-to-point visualcommunication, where display and capture of optical codes alternatesbetween the two parties. For example, at a given time, one party maydisplay a first optical code on its display screen while a second partycaptures that optical code with its camera. At some time after capture,the second party displays a second optical code on its display screenwhile the first party captures that optical code with its camera. Inhalf-duplex point-to-point visual communication, a given party eitherdisplays or captures at a given time. In addition, the process 400 canbe “full-duplex” point-to-point visual communication, where each partyboth displays and captures optical codes simultaneously. For example, ata given time, one party may display a first optical code on its displayscreen while a second party captures that optical code with its camera.At the same time, the second party displays a second optical code on itsdisplay screen while the first party captures that optical code with itscamera. In full-duplex point-to-point visual communication, a givenparty both displays and captures at a given time.

Even though the point-to-point visual communication requires a shortdistance between two communicating parties, the ambient light conditionsvary dramatically in field environments, which may impact the ability ofa camera to capture an optical code. Moreover, cameras and displayscreens are of different qualities. Even under identical ambient lightconditions, different pairs of cameras and display screens may requiredifferent settings to transfer data reliably via the point-to-pointvisual communication channel.

In order to maximize reliable data transfer between two parties, at thebeginning of and/or throughout the course of communication, thepoint-to-point visual communication process 400 may allow parties toadapt camera parameters for a given camera-display screen pair andenvironment. For example, the process 400 may allow the parties to altercamera parameters including, but not limited to, focal length,mechanical/electronic shutter speed, aperture, and exposure to maximizereliable data transfer via the point-to-point visual communicationchannel.

In addition, different optical codes may have different characteristicsthat impact how reliably data encoded into the optical code istransferred via the point-to-point visual communication channel. Forexample, an optical code or image may encode information based onfeatures that vary in pattern, color, and density. Particularly, opticalcodes or images with more colors or denser features can potentiallyencode a larger amount of information. However, for a givencamera-display screen pair, a more colorful denser optical code may bemore susceptible to error than a less colorful, less dense optical codethat encodes a lesser amount of information.

In order to maximize reliable data transfer between two parties, at thebeginning of and/or throughout the course of communication, thepoint-to-point visual communication process 400 may also allow theparties to adapt or modify the characteristics of the optical code,image, alphanumeric text, or other visual representation of information.One example of a way to adapt optical codes or images to a particularcamera-display screen pair and environment is to start with a reliablecommunication process at a low data rate using optical codes comprisedof low density black-white patterns. The data rate can then be graduallyincreased by incrementally reducing pattern size, increasing featuredensity, or increasing the number of colors contained within the opticalcode, so that each optical code encodes more information than the last.The optical code can gradually be modified in this way until a certainerror criteria is reached and reliable data transfer via thepoint-to-point visual communication channel has been maximized.

FIG. 5 is a block diagram of an example security monitoring system 500.The electronic system 500 includes a network 505, a control unit 510,one or more user devices 540 and 550, a monitoring application server560, and a central alarm station server 570. In some examples, thenetwork 505 facilitates communications between the control unit 510, theone or more user devices 540 and 550, the monitoring application server560, and the central alarm station server 570.

The network 505 is configured to enable exchange of electroniccommunications between devices connected to the network 505. Forexample, the network 505 may be configured to enable exchange ofelectronic communications between the control unit 510, the one or moreuser devices 540 and 550, the monitoring application server 560, and thecentral alarm station server 570. The network 505 may include, forexample, one or more of the Internet, Wide Area Networks (WANs), LocalArea Networks (LANs), analog or digital wired and wireless telephonenetworks (e.g., a public switched telephone network (PSTN), IntegratedServices Digital Network (ISDN), a cellular network, and DigitalSubscriber Line (DSL)), radio, television, cable, satellite, or anyother delivery or tunneling mechanism for carrying data. Network 505 mayinclude multiple networks or subnetworks, each of which may include, forexample, a wired or wireless data pathway. The network 505 may include acircuit-switched network, a packet-switched data network, or any othernetwork able to carry electronic communications (e.g., data or voicecommunications). For example, the network 505 may include networks basedon the Internet protocol (IP), asynchronous transfer mode (ATM), thePSTN, packet-switched networks based on IP, X.25, or Frame Relay, orother comparable technologies and may support voice using, for example,VoIP, or other comparable protocols used for voice communications. Thenetwork 505 may include one or more networks that include wireless datachannels and wireless voice channels. The network 505 may be a wirelessnetwork, a broadband network, or a combination of networks including awireless network and a broadband network.

The control unit 510 includes a controller 512 and a network module 514.The controller 512 is configured to control a control unit monitoringsystem (e.g., a control unit system) that includes the control unit 510.In some examples, the controller 512 may include a processor or othercontrol circuitry configured to execute instructions of a program thatcontrols operation of a control unit system. In these examples, thecontroller 512 may be configured to receive input from sensors, flowmeters, or other devices included in the control unit system and controloperations of devices included in the household (e.g., speakers, lights,doors, etc.). For example, the controller 512 may be configured tocontrol operation of the network module 514 included in the control unit510.

The network module 514 is a communication device configured to exchangecommunications over the network 505. The network module 514 may be awireless communication module configured to exchange wirelesscommunications over the network 505. For example, the network module 514may be a wireless communication device configured to exchangecommunications over a wireless data channel and a wireless voicechannel. In this example, the network module 514 may transmit alarm dataover a wireless data channel and establish a two-way voice communicationsession over a wireless voice channel. The wireless communication devicemay include one or more of a LTE module, a GSM module, a radio modem,cellular transmission module, or any type of module configured toexchange communications in one of the following formats: LTE, GSM orGPRS, CDMA, EDGE or EGPRS, EV-DO or EVDO, UMTS, or IP.

The network module 514 also may be a wired communication moduleconfigured to exchange communications over the network 505 using a wiredconnection. For instance, the network module 514 may be a modem, anetwork interface card, or another type of network interface device. Thenetwork module 514 may be an Ethernet network card configured to enablethe control unit 510 to communicate over a local area network and/or theInternet. The network module 514 also may be a voiceband modemconfigured to enable the alarm panel to communicate over the telephonelines of Plain Old Telephone Systems (POTS).

The control unit system that includes the control unit 510 includes oneor more sensors. For example, the monitoring system may include multiplesensors 520. The sensors 520 may include a lock sensor, a contactsensor, a motion sensor, or any other type of sensor included in acontrol unit system. The sensors 520 also may include an environmentalsensor, such as a temperature sensor, a water sensor, a rain sensor, awind sensor, a light sensor, a smoke detector, a carbon monoxidedetector, an air quality sensor, etc. The sensors 520 further mayinclude a health monitoring sensor, such as a prescription bottle sensorthat monitors taking of prescriptions, a blood pressure sensor, a bloodsugar sensor, a bed mat configured to sense presence of liquid (e.g.,bodily fluids) on the bed mat, etc. In some examples, the sensors 520may include a radio-frequency identification (RFID) sensor thatidentifies a particular article that includes a pre-assigned RFID tag.

The control unit 510 communicates with the module 522 and the camera 530to perform monitoring. The module 522 is connected to one or moredevices that enable home automation control. For instance, the module522 may be connected to one or more lighting systems and may beconfigured to control operation of the one or more lighting systems.Also, the module 522 may be connected to one or more electronic locks atthe property and may be configured to control operation of the one ormore electronic locks (e.g., control Z-Wave locks using wirelesscommunications in the Z-Wave protocol. Further, the module 522 may beconnected to one or more appliances at the property and may beconfigured to control operation of the one or more appliances. Themodule 522 may include multiple modules that are each specific to thetype of device being controlled in an automated manner. The module 522may control the one or more devices based on commands received from thecontrol unit 510. For instance, the module 522 may cause a lightingsystem to illuminate an area to provide a better image of the area whencaptured by a camera 530.

The camera 530 may be a video/photographic camera or other type ofoptical sensing device configured to capture images. For instance, thecamera 530 may be configured to capture images of an area within abuilding or within a residential facility 102-A monitored by the controlunit 510. The camera 530 may be configured to capture single, staticimages of the area and also video images of the area in which multipleimages of the area are captured at a relatively high frequency (e.g.,thirty images per second). The camera 530 may be controlled based oncommands received from the control unit 510.

The camera 530 may be triggered by several different types oftechniques. For instance, a Passive Infra-Red (PIR) motion sensor may bebuilt into the camera 530 and used to trigger the camera 530 to captureone or more images when motion is detected. The camera 530 also mayinclude a microwave motion sensor built into the camera and used totrigger the camera 530 to capture one or more images when motion isdetected. The camera 530 may have a “normally open” or “normally closed”digital input that can trigger capture of one or more images whenexternal sensors (e.g., the sensors 520, PIR, door/window, etc.) detectmotion or other events. In some implementations, the camera 530 receivesa command to capture an image when external devices detect motion oranother potential alarm event. The camera 530 may receive the commandfrom the controller 512 or directly from one of the sensors 520.

In some examples, the camera 530 triggers integrated or externalilluminators (e.g., Infra-Red, Z-wave controlled “white” lights, lightscontrolled by the module 522, etc.) to improve image quality when thescene is dark. An integrated or separate light sensor may be used todetermine if illumination is desired and may result in increased imagequality.

The camera 530 may be programmed with any combination of time/dayschedules, system “arming state”, or other variables to determinewhether images should be captured or not when triggers occur. The camera530 may enter a low-power mode when not capturing images. In this case,the camera 530 may wake periodically to check for inbound messages fromthe controller 512. The camera 530 may be powered by internal,replaceable batteries if located remotely from the control unit 510. Thecamera 530 may employ a small solar cell to recharge the battery whenlight is available. Alternatively, the camera 530 may be powered by thecontroller's 512 power supply if the camera 530 is co-located with thecontroller 512.

In some implementations, the camera 530 communicates directly with themonitoring application server 560 over the Internet. In theseimplementations, image data captured by the camera 530 does not passthrough the control unit 510 and the camera 530 receives commandsrelated to operation from the monitoring application server 560.

The system 500 also includes thermostat 534 to perform dynamicenvironmental control at the property. The thermostat 534 is configuredto monitor temperature and/or energy consumption of an HVAC systemassociated with the thermostat 534, and is further configured to providecontrol of environmental (e.g., temperature) settings. In someimplementations, the thermostat 534 can additionally or alternativelyreceive data relating to activity at a property and/or environmentaldata at a property, e.g., at various locations indoors and outdoors atthe property. The thermostat 534 can directly measure energy consumptionof the HVAC system associated with the thermostat, or can estimateenergy consumption of the HVAC system associated with the thermostat534, for example, based on detected usage of one or more components ofthe HVAC system associated with the thermostat 534. The thermostat 534can communicate temperature and/or energy monitoring information to orfrom the control unit 510 and can control the environmental (e.g.,temperature) settings based on commands received from the control unit510.

In some implementations, the thermostat 534 is a dynamicallyprogrammable thermostat and can be integrated with the control unit 510.For example, the dynamically programmable thermostat 534 can include thecontrol unit 510, e.g., as an internal component to the dynamicallyprogrammable thermostat 534. In addition, the control unit 510 can be agateway device that communicates with the dynamically programmablethermostat 534.

A module 537 is connected to one or more components of an HVAC systemassociated with a property, and is configured to control operation ofthe one or more components of the HVAC system. In some implementations,the module 537 is also configured to monitor energy consumption of theHVAC system components, for example, by directly measuring the energyconsumption of the HVAC system components or by estimating the energyusage of the one or more HVAC system components based on detecting usageof components of the HVAC system. The module 537 can communicate energymonitoring information and the state of the HVAC system components tothe thermostat 534 and can control the one or more components of theHVAC system based on commands received from the thermostat 534.

In some examples, the system 500 further includes one or more roboticdevices. The robotic devices may be any type of robots that are capableof moving and taking actions that assist in security monitoring. Forexample, the robotic devices may include drones that are capable ofmoving throughout a property based on automated control technologyand/or user input control provided by a user. In this example, thedrones may be able to fly, roll, walk, or otherwise move about theproperty. The drones may include helicopter type devices (e.g., quadcopters), rolling helicopter type devices (e.g., roller copter devicesthat can fly and also roll along the ground, walls, or ceiling) and landvehicle type devices (e.g., automated cars that drive around aproperty). In some cases, the robotic devices may be robotic devicesthat are intended for other purposes and merely associated with thesystem 500 for use in appropriate circumstances. For instance, a roboticvacuum cleaner device may be associated with the monitoring system 500as one of the robotic devices and may be controlled to take actionresponsive to monitoring system events.

In some examples, the robotic devices automatically navigate within aproperty. In these examples, the robotic devices include sensors andcontrol processors that guide movement of the robotic devices within theproperty. For instance, the robotic devices may navigate within theproperty using one or more cameras, one or more proximity sensors, oneor more gyroscopes, one or more accelerometers, one or moremagnetometers, a global positioning system (GPS) unit, an altimeter, oneor more sonar or laser sensors, and/or any other types of sensors thataid in navigation about a space. The robotic devices may include controlprocessors that process output from the various sensors and control therobotic devices to move along a path that reaches the desireddestination and avoids obstacles. In this regard, the control processorsdetect walls or other obstacles in the property and guide movement ofthe robotic devices in a manner that avoids the walls and otherobstacles.

In addition, the robotic devices may store data that describesattributes of the property. For instance, the robotic devices may storea floorplan and/or a three-dimensional model of the property thatenables the robotic devices to navigate the property. During initialconfiguration, the robotic devices may receive the data describingattributes of the property, determine a frame of reference to the data(e.g., a home or reference location in the property), and navigate theproperty based on the frame of reference and the data describingattributes of the property. Further, initial configuration of therobotic devices also may include learning of one or more navigationpatterns in which a user provides input to control the robotic devicesto perform a specific navigation action (e.g., fly to an upstairsbedroom and spin around while capturing video and then return to a homecharging base). In this regard, the robotic devices may learn and storethe navigation patterns such that the robotic devices may automaticallyrepeat the specific navigation actions upon a later request.

In some examples, the robotic devices may include data capture andrecording devices. In these examples, the robotic devices may includeone or more cameras, one or more motion sensors, one or moremicrophones, one or more biometric data collection tools, one or moretemperature sensors, one or more humidity sensors, one or more air flowsensors, and/or any other types of sensors that may be useful incapturing monitoring data related to the property and users in theproperty. The one or more biometric data collection tools may beconfigured to collect biometric samples of a person in the home with orwithout contact of the person. For instance, the biometric datacollection tools may include a fingerprint scanner, a hair samplecollection tool, a skin cell collection tool, and/or any other tool thatallows the robotic devices to take and store a biometric sample that canbe used to identify the person (e.g., a biometric sample with DNA thatcan be used for DNA testing).

In some implementations, the robotic devices may include output devices.In these implementations, the robotic devices may include one or moredisplays, one or more speakers, and/or any type of output devices thatallow the robotic devices to communicate information to a nearby user.

The robotic devices also may include a communication module that enablesthe robotic devices to communicate with the control unit 510, eachother, and/or other devices. The communication module may be a wirelesscommunication module that allows the robotic devices to communicatewirelessly. For instance, the communication module may be a Wi-Fi modulethat enables the robotic devices to communicate over a local wirelessnetwork at the property. The communication module further may be a 900MHz wireless communication module that enables the robotic devices tocommunicate directly with the control unit 510. Other types ofshort-range wireless communication protocols, such as Bluetooth,Bluetooth LE, Zwave, Zigbee, etc., may be used to allow the roboticdevices to communicate with other devices in the property.

The robotic devices further may include processor and storagecapabilities. The robotic devices may include any suitable processingdevices that enable the robotic devices to operate applications andperform the actions described throughout this disclosure. In addition,the robotic devices may include solid state electronic storage thatenables the robotic devices to store applications, configuration data,collected sensor data, and/or any other type of information available tothe robotic devices.

The robotic devices are associated with one or more charging stations.The charging stations may be located at predefined home base orreference locations in the property. The robotic devices may beconfigured to navigate to the charging stations after completion oftasks needed to be performed for the monitoring system 500. Forinstance, after completion of a monitoring operation or upon instructionby the control unit 510, the robotic devices may be configured toautomatically fly to and land on one of the charging stations. In thisregard, the robotic devices may automatically maintain a fully chargedbattery in a state in which the robotic devices are ready for use by themonitoring system 500.

The charging stations may be contact based charging stations and/orwireless charging stations. For contact based charging stations, therobotic devices may have readily accessible points of contact that therobotic devices are capable of positioning and mating with acorresponding contact on the charging station. For instance, ahelicopter type robotic device may have an electronic contact on aportion of its landing gear that rests on and mates with an electronicpad of a charging station when the helicopter type robotic device landson the charging station. The electronic contact on the robotic devicemay include a cover that opens to expose the electronic contact when therobotic device is charging and closes to cover and insulate theelectronic contact when the robotic device is in operation.

For wireless charging stations, the robotic devices may charge through awireless exchange of power. In these cases, the robotic devices needonly locate themselves closely enough to the wireless charging stationsfor the wireless exchange of power to occur. In this regard, thepositioning needed to land at a predefined home base or referencelocation in the property may be less precise than with a contact basedcharging station. Based on the robotic devices landing at a wirelesscharging station, the wireless charging station outputs a wirelesssignal that the robotic devices receive and convert to a power signalthat charges a battery maintained on the robotic devices.

In some implementations, each of the robotic devices has a correspondingand assigned charging station such that the number of robotic devicesequals the number of charging stations. In these implementations, therobotic devices always navigate to the specific charging stationassigned to that robotic device. For instance, a first robotic devicemay always use a first charging station and a second robotic device mayalways use a second charging station.

In some examples, the robotic devices may share charging stations. Forinstance, the robotic devices may use one or more community chargingstations that are capable of charging multiple robotic devices. Thecommunity charging station may be configured to charge multiple roboticdevices in parallel. The community charging station may be configured tocharge multiple robotic devices in serial such that the multiple roboticdevices take turns charging and, when fully charged, return to apredefined home base or reference location in the property that is notassociated with a charger. The number of community charging stations maybe less than the number of robotic devices.

Also, the charging stations may not be assigned to specific roboticdevices and may be capable of charging any of the robotic devices. Inthis regard, the robotic devices may use any suitable, unoccupiedcharging station when not in use. For instance, when one of the roboticdevices has completed an operation or is in need of battery charge, thecontrol unit 510 references a stored table of the occupancy status ofeach charging station and instructs the robotic device to navigate tothe nearest charging station that is unoccupied.

The system 500 further includes one or more integrated security devices580. The one or more integrated security devices may include any type ofdevice used to provide alerts based on received sensor data. Forinstance, the one or more control units 510 may provide one or morealerts to the one or more integrated security input/output devices.Additionally, the one or more control units 510 may receive one or moresensor data from the sensors 520 and determine whether to provide analert to the one or more integrated security input/output devices 580.

The sensors 520, the module 522, the camera 530, the thermostat 534, andthe integrated security devices 580 communicate with the controller 512over communication links 524, 526, 528, 532, 584, and 586. Thecommunication links 524, 526, 528, 532, 584, and 586 may be a wired orwireless data pathway configured to transmit signals from the sensors520, the module 522, the camera 530, the thermostat 534, and theintegrated security devices 580 to the controller 512. The sensors 520,the module 522, the camera 530, the thermostat 534, and the integratedsecurity devices 580 may continuously transmit sensed values to thecontroller 512, periodically transmit sensed values to the controller512, or transmit sensed values to the controller 512 in response to achange in a sensed value.

The communication links 524, 526, 528, 532, 584, and 586 may include alocal network. The sensors 520, the module 522, the camera 530, thethermostat 534, and the integrated security devices 580, and thecontroller 512 may exchange data and commands over the local network.The local network may include 802.11 “Wi-Fi” wireless Ethernet (e.g.,using low-power Wi-Fi chipsets), Z-Wave, Zigbee, Bluetooth, “Homeplug”or other “Powerline” networks that operate over AC wiring, and aCategory 5 (CATS) or Category 6 (CAT6) wired Ethernet network. The localnetwork may be a mesh network constructed based on the devices connectedto the mesh network.

The monitoring application server 560 is an electronic device configuredto provide monitoring services by exchanging electronic communicationswith the control unit 510, the one or more user devices 540 and 550, andthe central alarm station server 570 over the network 505. For example,the monitoring application server 560 may be configured to monitorevents (e.g., alarm events) generated by the control unit 610. In thisexample, the monitoring application server 560 may exchange electroniccommunications with the network module 514 included in the control unit510 to receive information regarding events (e.g., alerts) detected bythe control unit 510. The monitoring application server 560 also mayreceive information regarding events (e.g., alerts) from the one or moreuser devices 540 and 550.

In some examples, the monitoring application server 560 may route alertdata received from the network module 514 or the one or more userdevices 540 and 550 to the central alarm station server 570. Forexample, the monitoring application server 560 may transmit the alertdata to the central alarm station server 570 over the network 505.

The monitoring application server 560 may store sensor and image datareceived from the monitoring system and perform analysis of sensor andimage data received from the monitoring system. Based on the analysis,the monitoring application server 560 may communicate with and controlaspects of the control unit 510 or the one or more user devices 540 and550.

The central alarm station server 570 is an electronic device configuredto provide alarm monitoring service by exchanging communications withthe control unit 510, the one or more mobile devices 540 and 550, andthe monitoring application server 560 over the network 505. For example,the central alarm station server 570 may be configured to monitoralerting events generated by the control unit 510. In this example, thecentral alarm station server 570 may exchange communications with thenetwork module 514 included in the control unit 510 to receiveinformation regarding alerting events detected by the control unit 510.The central alarm station server 570 also may receive informationregarding alerting events from the one or more mobile devices 540 and550 and/or the monitoring application server 560.

The central alarm station server 570 is connected to multiple terminals572 and 574. The terminals 572 and 574 may be used by operators toprocess alerting events. For example, the central alarm station server570 may route alerting data to the terminals 572 and 574 to enable anoperator to process the alerting data. The terminals 572 and 574 mayinclude general-purpose computers (e.g., desktop personal computers,workstations, or laptop computers) that are configured to receivealerting data from a server in the central alarm station server 570 andrender a display of information based on the alerting data. Forinstance, the controller 512 may control the network module 514 totransmit, to the central alarm station server 570, alerting dataindicating that a sensor 520 detected motion from a motion sensor viathe sensors 520. The central alarm station server 570 may receive thealerting data and route the alerting data to the terminal 572 forprocessing by an operator associated with the terminal 572. The terminal572 may render a display to the operator that includes informationassociated with the alerting event (e.g., the lock sensor data, themotion sensor data, the contact sensor data, etc.) and the operator mayhandle the alerting event based on the displayed information.

In some implementations, the terminals 572 and 574 may be mobile devicesor devices designed for a specific function. Although FIG. 5 illustratestwo terminals for brevity, actual implementations may include more (and,perhaps, many more) terminals.

The one or more user devices 540 and 550 are devices that host anddisplay user interfaces. For instance, the user device 540 is a mobiledevice that hosts one or more native applications (e.g., the smart homeapplication 542). The user device 540 may be a cellular phone or anon-cellular locally networked device with a display. The user device540 may include a cell phone, a smart phone, a tablet PC, a personaldigital assistant (“PDA”), or any other portable device configured tocommunicate over a network and display information. For example,implementations may also include Blackberry-type devices (e.g., asprovided by Research in Motion), electronic organizers, iPhone-typedevices (e.g., as provided by Apple), iPod devices (e.g., as provided byApple) or other portable music players, other communication devices, andhandheld or portable electronic devices for gaming, communications,and/or data organization. The user device 540 may perform functionsunrelated to the monitoring system, such as placing personal telephonecalls, playing music, playing video, displaying pictures, browsing theInternet, maintaining an electronic calendar, etc.

The user device 540 includes a smart home application 542. The smarthome application 542 refers to a software/firmware program running onthe corresponding mobile device that enables the user interface andfeatures described throughout. The user device 540 may load or installthe smart home application 542 based on data received over a network ordata received from local media. The smart home application 542 runs onmobile devices platforms, such as iPhone, iPod touch, Blackberry, GoogleAndroid, Windows Mobile, etc. The smart home application 542 enables theuser device 540 to receive and process image and sensor data from themonitoring system.

The user device 550 may be a general-purpose computer (e.g., a desktoppersonal computer, a workstation, or a laptop computer) that isconfigured to communicate with the monitoring application server 560and/or the control unit 510 over the network 505. The user device 550may be configured to display a smart home user interface 552 that isgenerated by the user device 550 or generated by the monitoringapplication server 560. For example, the user device 550 may beconfigured to display a user interface (e.g., a web page) provided bythe monitoring application server 560 that enables a user to perceiveimages captured by the camera 530 and/or reports related to themonitoring system. Although FIG. 5 illustrates two user devices forbrevity, actual implementations may include more (and, perhaps, manymore) or fewer user devices.

In some implementations, the one or more user devices 540 and 550communicate with and receive monitoring system data from the controlunit 510 using the communication link 538. For instance, the one or moreuser devices 540 and 550 may communicate with the control unit 510 usingvarious local wireless protocols such as Wi-Fi, Bluetooth, Z-wave,Zigbee, HomePlug (Ethernet over powerline), or wired protocols such asEthernet and USB, to connect the one or more user devices 540 and 550 tolocal security and automation equipment. The one or more user devices540 and 550 may connect locally to the monitoring system and its sensorsand other devices. The local connection may improve the speed of statusand control communications because communicating through the network 505with a remote server (e.g., the monitoring application server 560) maybe significantly slower.

Although the one or more user devices 540 and 550 are shown ascommunicating with the control unit 510, the one or more user devices540 and 550 may communicate directly with the sensors and other devicescontrolled by the control unit 510. In some implementations, the one ormore user devices 540 and 550 replace the control unit 510 and performthe functions of the control unit 510 for local monitoring and longrange/offsite communication.

In other implementations, the one or more user devices 540 and 550receive monitoring system data captured by the control unit 510 throughthe network 505. The one or more user devices 540, 550 may receive thedata from the control unit 510 through the network 505 or the monitoringapplication server 560 may relay data received from the control unit 510to the one or more user devices 540 and 550 through the network 505. Inthis regard, the monitoring application server 560 may facilitatecommunication between the one or more user devices 540 and 550 and themonitoring system.

In some implementations, the one or more user devices 540 and 550 may beconfigured to switch whether the one or more user devices 540 and 550communicate with the control unit 510 directly (e.g., through link 538)or through the monitoring application server 560 (e.g., through network505) based on a location of the one or more user devices 540 and 550.For instance, when the one or more user devices 540 and 550 are locatedclose to the control unit 510 and in range to communicate directly withthe control unit 510, the one or more user devices 540 and 550 usedirect communication. When the one or more user devices 540 and 550 arelocated far from the control unit 510 and not in range to communicatedirectly with the control unit 510, the one or more user devices 540 and550 use communication through the monitoring application server 560.

Although the one or more user devices 540 and 550 are shown as beingconnected to the network 505, in some implementations, the one or moreuser devices 540 and 550 are not connected to the network 505. In theseimplementations, the one or more user devices 540 and 550 communicatedirectly with one or more of the monitoring system components and nonetwork (e.g., Internet) connection or reliance on remote servers isneeded.

In some implementations, the one or more user devices 540 and 550 areused in conjunction with only local sensors and/or local devices in ahouse. In these implementations, the system 500 only includes the one ormore user devices 540 and 550, the sensors 520, the module 522, thecamera 530, and the robotic devices. The one or more user devices 540and 550 receive data directly from the sensors 520, the module 522, thecamera 530, and the robotic devices and sends data directly to thesensors 520, the module 522, the camera 530, and the robotic devices.The one or more user devices 540, 550 provide the appropriateinterfaces/processing to provide visual surveillance and reporting.

In other implementations, the system 500 further includes network 505and the sensors 520, the module 522, the camera 530, the thermostat 534,and the robotic devices are configured to communicate sensor and imagedata to the one or more user devices 540 and 550 over network 505 (e.g.,the Internet, cellular network, etc.). In yet another implementation,the sensors 520, the module 522, the camera 530, the thermostat 534, andthe robotic devices (or a component, such as a bridge/router) areintelligent enough to change the communication pathway from a directlocal pathway when the one or more user devices 540 and 550 are in closephysical proximity to the sensors 520, the module 522, the camera 530,the thermostat 534, and the robotic devices to a pathway over network505 when the one or more user devices 540 and 550 are farther from thesensors 520, the module 522, the camera 530, the thermostat 534, and therobotic devices. In some examples, the system leverages GPS informationfrom the one or more user devices 540 and 550 to determine whether theone or more user devices 540 and 550 are close enough to the sensors520, the module 522, the camera 530, the thermostat 534, and the roboticdevices to use the direct local pathway or whether the one or more userdevices 540 and 550 are far enough from the sensors 520, the module 522,the camera 530, the thermostat 534, and the robotic devices that thepathway over network 505 is required. In other examples, the systemleverages status communications (e.g., pinging) between the one or moreuser devices 540 and 550 and the sensors 520, the module 522, the camera530, the thermostat 534, and the robotic devices to determine whethercommunication using the direct local pathway is possible. Ifcommunication using the direct local pathway is possible, the one ormore user devices 540 and 550 communicate with the sensors 520, themodule 522, the camera 530, the thermostat 534, and the robotic devicesusing the direct local pathway. If communication using the direct localpathway is not possible, the one or more user devices 540 and 550communicate with the sensors 520, the module 522, the camera 530, thethermostat 534, and the robotic devices using the pathway over network505.

In some implementations, the system 500 provides end users with accessto images captured by the camera 530 to aid in decision making. Thesystem 500 may transmit the images captured by the camera 530 over awireless WAN network to the user devices 540 and 550. Becausetransmission over a wireless WAN network may be relatively expensive,the system 500 uses several techniques to reduce costs while providingaccess to significant levels of useful visual information.

In some implementations, a state of the monitoring system and otherevents sensed by the monitoring system may be used to enable/disablevideo/image recording devices (e.g., the camera 530). In theseimplementations, the camera 530 may be set to capture images on aperiodic basis when the alarm system is armed in an “Away” state, butset not to capture images when the alarm system is armed in a “Stay”state or disarmed. In addition, the camera 530 may be triggered to begincapturing images when the alarm system detects an event, such as analarm event, a door-opening event for a door that leads to an areawithin a field of view of the camera 530, or motion in the area withinthe field of view of the camera 530. In other implementations, thecamera 530 may capture images continuously, but the captured images maybe stored or transmitted over a network when needed.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus implementing thesetechniques may include appropriate input and output devices, a computerprocessor, and a computer program product tangibly embodied in amachine-readable storage device for execution by a programmableprocessor. A process implementing these techniques may be performed by aprogrammable processor executing a program of instructions to performdesired functions by operating on input data and generating appropriateoutput. The techniques may be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device. Each computerprogram may be implemented in a high-level procedural or object-orientedprogramming language, or in assembly or machine language if desired; andin any case, the language may be a compiled or interpreted language.Suitable processors include, by way of example, both general and specialpurpose microprocessors. Generally, a processor will receiveinstructions and data from a read-only memory and/or a random accessmemory. Storage devices suitable for tangibly embodying computer programinstructions and data include all forms of non-volatile memory,including by way of example semiconductor memory devices, such asErasable Programmable Read-Only Memory (EPROM), Electrically ErasableProgrammable Read-Only Memory (EEPROM), and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Anyof the foregoing may be supplemented by, or incorporated in, speciallydesigned ASICs (application-specific integrated circuits).

It will be understood that various modifications may be made. Forexample, other useful implementations could be achieved if steps of thedisclosed techniques were performed in a different order and/or ifcomponents in the disclosed systems were combined in a different mannerand/or replaced or supplemented by other components. Accordingly, otherimplementations are within the scope of the disclosure.

What is claimed is:
 1. A monitoring system that is configured to monitora property, the monitoring system comprising: a doorbell unit thatincludes a camera and a display and that is configured to receive, froma visitor, a request to access the property; and a monitor control unitthat is configured to: in response to the request to access the propertyand based on an armed status of the monitoring system, determine, fromamong multiple authentication protocols, an authentication protocol fordetermining whether to grant the visitor access to the property; basedon the authentication protocol, generate a first image and transmitauthentication data to a computing device; provide, to the doorbellunit, the first image and instructions to output the first image on thedisplay of the doorbell unit; receive, from the doorbell unit, a secondimage captured by the camera of the doorbell unit; determine whether thesecond image includes a representation of data that is based onprocessing the first image in combination with the authentication data;and based on determining whether the second image includes therepresentation of data that is based on processing the first image incombination with the authentication data, grant or deny the visitoraccess to the property.