Security camera privacy shutter

ABSTRACT

A method for improving privacy of security cameras is described. In one embodiment, predetermined events are monitored via a security camera. The security camera may include an optical barrier. At least one of the predetermined events is detected via the security camera. Based on detecting at least one of the predetermined events, the optical barrier is repositioned, via the security camera, in relation to a camera lens of the security camera.

BACKGROUND

Advancements in media delivery systems and media-related technologiescontinue to increase at a rapid pace. Increasing demand for media hasinfluenced the advances made to media-related technologies. Computersystems have increasingly become an integral part of the media-relatedtechnologies. Computer systems may be used to carry out severalmedia-related functions. The wide-spread access to media has beenaccelerated by the increased use of computer networks, including theInternet and cloud networking.

Many homes and businesses use one or more computer networks to generate,deliver, and receive data and information between the various computersconnected to computer networks. Users of computer technologies continueto demand increased access to information and an increase in theefficiency of these technologies. Improving the efficiency of computertechnologies is desirable to those who use and rely on computers.

With the wide-spread use of computers and mobile devices has come anincreased presence of premises automation and security products. Theseproducts include internal security cameras. An occupant of a home oroffice may install a security camera within an area of a home or officeand record images of the area via the security camera. An occupant maynot know, however, when the security camera is active and capturingimages. As a result, benefits may be realized by providing systems andmethods for security camera privacy.

SUMMARY

According to at least one embodiment, a method for improving privacy ofsecurity cameras is described. In one embodiment, predetermined eventsmay be monitored via a security camera. The security camera may includean optical barrier. At least one of the predetermined events may bedetected via the security camera. Based on detecting at least one of thepredetermined events, the optical barrier may be repositioned, via thesecurity camera, in relation to a camera lens of the security camera.

In one embodiment, upon detecting at least one of the predeterminedevents, the optical barrier may be repositioned to obstruct a field ofview of the security camera. In some cases, the optical barrier may beconfigured to be visible within a predetermined distance from thesecurity camera when the optical barrier is obstructing the securitycamera's field of view. The method may include activating a first visualindicator upon repositioning the optical barrier to obstruct thesecurity camera's field of view. In one configuration, the first visualindicator may be located on the optical barrier.

In one embodiment, the method may include deactivating the first visualindicator upon repositioning the optical barrier to uncover the cameraslens. In some embodiments, a second visual indicator may be activatedupon repositioning the optical barrier to uncover the cameras lens. Insome cases, the method may include generating a notification uponrepositioning the optical barrier.

In one embodiment, detecting the predetermined events may includereceiving a remote request to activate the camera, verifying an identityassociated with the remote request, and upon verifying the identity,implementing a notification and activating the camera. In some cases,detecting the predetermined events may include detecting a voice commandfrom an occupant of a premises where the security camera is located. Inone embodiment, detecting the predetermined events may include detectinginitiation of communications between an occupant of a premises where thesecurity camera is located and an administrator associated with thesecurity camera.

A computing device configured for security camera privacy is alsodescribed. The device may include a processor and memory in electroniccommunication with the processor. The memory may store instructions thatmay be executable by the processor to monitor for predetermined events,the security camera comprising an optical barrier, detect at least oneof the predetermined events, and based on detecting at least one of thepredetermined events, reposition the optical barrier in relation to acamera lens of the security camera.

A computer-program product for security camera privacy is alsodescribed. The computer-program product may include a non-transitorycomputer-readable medium that stores instructions. The instructions maybe executable by the processor to monitor for predetermined events, thesecurity camera comprising an optical barrier, detect at least one ofthe predetermined events, and based on detecting at least one of thepredetermined events, reposition the optical barrier in relation to acamera lens of the security camera.

Features from any of the above-mentioned embodiments may be used incombination with one another in accordance with the general principlesdescribed herein. These and other embodiments, features, and advantageswill be more fully understood upon reading the following detaileddescription in conjunction with the accompanying drawings and claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings illustrate a number of exemplary embodimentsand are a part of the specification. Together with the followingdescription, these drawings demonstrate and explain various principlesof the instant disclosure.

FIG. 1 is a block diagram illustrating one embodiment of an environmentin which the present systems and methods may be implemented;

FIG. 2 is a block diagram illustrating one example of a privacy module;

FIG. 3 is a block diagram illustrating an environment depicting a oneexample of side-view of a security camera in which the present systemsand methods may be implemented;

FIG. 4 is a block diagram illustrating another example of side-view of asecurity camera in which the present systems and methods may beimplemented;

FIG. 5 is a flow diagram illustrating one embodiment of a method forsecurity camera privacy;

FIG. 6 is a flow diagram illustrating one embodiment of a method forimproving privacy associated with a security camera; and

FIG. 7 depicts a block diagram of a computer system suitable forimplementing the present systems and methods.

While the embodiments described herein are susceptible to variousmodifications and alternative forms, specific embodiments have beenshown by way of example in the drawings and will be described in detailherein. However, the exemplary embodiments described herein are notintended to be limited to the particular forms disclosed. Rather, theinstant disclosure covers all modifications, equivalents, andalternatives falling within the scope of the appended claims.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS

The following relates generally to improving the privacy of homesecurity cameras. The typical home security camera includes a camerasensor and camera lens housed within a camera body, which may include astand and/or mounting hardware. Such a home security camera may beconfigured to record only upon detecting motion. If the camera is notdetecting motion, then the camera may be inactive. Nevertheless, thecamera sensor and camera lens of the typical security camera remainvisible at all times. This visibility may be a cause of apprehension forcertain occupants of a home or office. Some occupants may feeluncomfortable never really knowing whether the internal security camerais active and capturing images or in an inactive state. Accordingly, toaddress such concerns, the systems and methods described herein improvethe assurance of privacy in relation to internal security cameras.

Currently, the camera lens of a security camera is exposed whether thesecurity camera is recording. In some cases, a security camera mayactivate a recording indicator (e.g., a light) to indicate that thecamera is currently recording. In some cases, a hacker may gain controlof the security camera. The hacker may configure the camera to recordwithout activating the light. Thus, an occupant may be recorded withoutany indication they are being recorded. Some security cameras may notinclude any indicators that the camera is active and recording.Moreover, in some cases, the occupant may want the security camera withindicators to record without providing any indication that images arebeing captured. For example, parents may want a security camera tocapture images of a babysitter watching their child without the securitycamera giving any indication that recording is occurring. The sameparents, however, may not want the security camera to record while theyare at home such as when they are watching a movie in a family room,etc. Thus, occupants of the home may feel apprehension with the camerafacing them (e.g., while watching a movie at home, etc.), never reallyknowing whether the camera is presently capturing images.

Accordingly, one aspect of the invention relates to systems, methods andrelated devices for improving the privacy of home security cameras. Inone embodiment, predetermined events may be monitored in relation to asecurity camera. The security camera may include an optical barrier. Theoptical barrier may be configured to block the security camera fromcapturing an image of an area that the security camera is positioned toview. For example, the security camera may be mounted on one end of anoffice area or in the corner of a great room of a house where the greatroom includes a kitchen area and an adjoining family room area. Takingthe great room example, when the optical barrier is covering the lens ofthe camera, the camera sensor may be at least partially blocked fromcapturing an image of the great room. In some embodiments, if the camerasensor were to capture an image with the optical barrier positioned toobstruct the camera lens, the camera sensor may be able to detect onlythe interior side of the optical barrier that faces the camera lens. Inany case, at least a portion of the field of view of the security camerais obstructed via the optical barrier being positioned to cover at leasta portion of the camera lens. Even in those cases where the securitycamera may be positioned remotely, if the optical barrier is positionedto obstruct the camera sensor, the security camera's field of viewremains obstructed even when the security camera's position is adjusted.

In some embodiments, the optical barrier may be configured to be visibleto a human within a predetermined distance from the security camera whenthe optical barrier is blocking the camera lens from view. Taking thegreat room example again, with the security camera mounted at one end ofthe great room, such as in a corner of the family room, the opticalbarrier may be configured to be viewed by an occupant even when theoccupant is at the opposite end of the great room, such as in thekitchen area. Benefits may be realized by the abovementioned systems andmethods. These benefits include providing an assurance of privacyrelated to indoor security cameras while maintaining a level of securityat least equivalent to existing security cameras.

FIG. 1 is a block diagram illustrating one embodiment of an environment100 in which the present systems and methods may be implemented. In someembodiments, the systems and methods described herein may be performedon a device (e.g., device 105). The environment 100 may include device105, a server 110, a sensor 125, a mobile computing device 130, anautomation controller 135, and a network 115 that allows the device 105,the server 110, the mobile computing device 130, automation controller135, and sensor 125 to communicate with one another.

Examples of the device 105 may include a security camera (e.g., aninternal security camera), a mobile computing device, a smart phone, apersonal computing device, a computer, server, etc. Examples of theserver 110 may include an application server, a network server, acatalog server, a communications server, a database server, a fileserver, a home server, a mail server, a name server, a proxy server, aweb server, a virtual server, a server administered by a premisesautomation and/or security company, and the like. Accordingly, in someembodiments, environment 100 includes connections to two or more servers(e.g., a connection to database server and a connection to a premisessecurity company server, etc.). Examples of the automation controller135 may include a dedicated premises automation computing device (e.g.,wall-mounted controller), a personal computing device (e.g., laptop,desktop, etc.), a mobile computing device (e.g., tablet computingdevice, smart phone, etc.), and the like.

Examples of sensor 125 include a camera sensor, audio sensor, forcedentry sensor, shock sensor, proximity sensor, boundary sensor, lightbeam sensor, three-dimensional (3-D) sensor, motion sensor, smokesensor, glass break sensor, door sensor, window sensor, carbon monoxidesensor, accelerometer, global positioning system (GPS) sensor, Wi-Fipositioning system sensor, capacitance sensor, radio frequency sensor,near-field sensor, temperature sensor, heartbeat sensor, breathingsensor, oxygen sensor, carbon dioxide sensor, brain wave sensor,movement sensor, voice sensor, other types of sensors, actuators, orcombinations thereof. Sensor 125 may represent one or more separatesensors or a combination of two or more sensors in a single device. Forexample, sensor 125 may represent one or more camera sensors and one ormore motion sensors connected to environment 100. Sensor 125 may beintegrated with a facial recognition system. Although sensor 125 isdepicted as connecting to device 105 over network 115, in someembodiments, sensor 125 may connect directly to or within device 105.

Additionally, or alternatively, sensor 125 may be integrated with a homeappliance or fixture such as a light bulb fixture. Sensor 125 mayinclude an accelerometer to enable sensor 125 to detect a movement. Forexample, sensor 125 may be carried by an occupant. Sensor 125 mayinclude a wireless communication sensor 125 configured to send andreceive data and/or information to and from one or more devices inenvironment 100. Additionally, or alternatively, sensor 125 may includea GPS sensor to enable sensor 125 to track a location of sensor 125attached to an occupant and/or a device. Sensor 125 may include aproximity sensor to enable sensor to detect a proximity of a personrelative to an object to which the sensor is attached and/or associated.In some embodiments, sensor 125 may include a forced entry sensor (e.g.,shock sensor, glass break sensor, etc.) to enable sensor 125 to detectan attempt to enter an area by force. Sensor 125 may include a siren toemit one or more frequencies of sound (e.g., an alarm).

In some configurations, the device 105 may include a privacy module 140,a camera sensor 145, a camera lens 150, and an optical barrier 155.Although the components of the device 105 are depicted as being internalto the device 105, it is understood that one or more of the componentsmay be external to the device 105 and connect to device 105 throughwired and/or wireless connections. In some embodiments, an applicationmay be installed on mobile computing device 130, the applicationenabling a user to interface with a function of device 105, privacymodule 140, automation controller 135, and/or server 110.

In some embodiments, device 105 may communicate with server 110 vianetwork 115. Example of networks 115 include cloud networks, local areanetworks (LAN), wide area networks (WAN), virtual private networks(VPN), wireless networks (using 802.11, for example), cellular networks(using 3G and/or LTE, for example), etc. In some configurations, thenetwork 115 may include the internet. It is noted that in someembodiments, the device 105 may not include a privacy module 140. Forexample, device 105 may include logic and/or executable instructionsthat enables device 105 to interface with automation controller 135,mobile computing device 130, and/or server 110. In some embodiments,device 105, mobile computing device 130, automation controller 135, andserver 110 may include a privacy module 140 where at least a portion ofthe functions of privacy module 140 are performed separately and/orconcurrently on device 105, mobile computing device 130, automationcontroller 135, and/or server 110. Likewise, in some embodiments, a usermay access the functions of device 105 and/or automation controller 135(directly or through device 105 via privacy module 140) from mobilecomputing device 130. For example, in some embodiments, mobile computingdevice 130 includes a mobile application that interfaces with one ormore functions of device 105, automation controller 135, privacy module140, and/or server 110.

In some embodiments, server 110 may be coupled to database 120. Database120 may include privacy settings 160. For example, device 105 may accessprivacy settings 160 in database 120 over network 115 via server 110.Database 120 may be internal or external to the server 110. In oneexample, device 105 may be coupled directly to database 120, database120 being internal or external to device 105. Thus, although database120 is depicted as being connected to server 110, embodiments includethe database 120 being connected to connected or being within device105, mobile computing device 130, and/or automation controller 135.

In one embodiment, device 105 may include one or more communicationdevices. Device 105 may communicate with one or more computing devicesand/or an automation/security control panel, through wired and/orwireless communication means. For instance, device 105 may implementcommunications based on Z-Wave, Zigbee, BLUETOOTH® low energy,near-field communication (NFC), universal serial bus (USB) wireless, 345MHz wireless, an IEEE 802 wireless standard, etc. In some cases, thedevice 105 may use a low-powered wireless protocol (BLUETOOTH® lowenergy, Z-Wave, Zigbee, NFC, 345 MHz, etc.) to communicate with one ormore devices. In some cases, the device 105 may recognize the identityof one or more devices. For example, the device 105 may recognize anoccupant based on an identifier communicated by a smart phone carried bythe occupant or based on a smart collar worn by a pet, and so forth.

In some embodiments, privacy module 140 may reposition optical barrier155 based on one or more events. For example, device 105 may detect thepresence of devices associated with known occupants of a home. In somecases, upon detecting the presence of an unknown occupant, privacymodule 140 may reposition the optical barrier 155 to unblock the view ofcamera lens 150 and activate the camera sensor 145 to capture one ormore images (e.g., photographic and/or video images). The device 105 maybe configured to detect unknown occupants by detecting the presence of ahuman and/or pet within the home and determining whether the humanand/or pet is associated with a known device via low-powered wirelesscommunication. Upon determining the human and/or pet are not associatedwith a known device (e.g., not carrying a device that emits anidentifier recognized by device 105), the privacy module 140 mayconfigure device 105 to capture one or more images of the unknownoccupant. Further details regarding the privacy module 140 are discussedbelow.

FIG. 2 is a block diagram illustrating one example of a privacy module140-a. Privacy module 140-a may be one example of privacy module 140depicted in FIG. 1. As depicted, privacy module 140-a may includemonitoring module 205, detection module 210, optical barrier module 215,and notification module 220.

In one embodiment, privacy module 140-a may be configured to protect theprivacy of occupants of a premises in relation to a security cameralocated in the premises. As described above, the security camera mayinclude an optical barrier (e.g., optical barrier 155 of FIG. 1). In oneembodiment, monitoring module 205 may monitor for predetermined events.In some cases, detection module 210 may detect at least one of thepredetermined events. In some embodiments, the monitoring module 205and/or detection module 210 may operate in conjunction with one or moresensors (e.g., sensor 125). The one or more sensors may be configured tomonitor and/or detect one or more of the predetermined events.

Based on detecting at least one of the predetermined events, the opticalbarrier module 215 may reposition the optical barrier in relation to acamera lens of the security camera. The optical barrier may include oneor more objects configured to obstruct and/or scatter light. In oneexample, the optical barrier may include an opaque material thatobstructs the transmission of light. Additionally, or alternatively, theoptical barrier may include an obscuring material that scatters and/ordistorts the transmission of light. In one configuration, the opticalbarrier module 215 may position the optical barrier to uncover thecamera lens, allowing light to reach the camera lens unobstructed, andthus permitting light captured by the camera lens to reach a camerasensor of the security camera. In another configuration, the opticalbarrier module 215 may position the optical barrier to cover the cameralens, thus obstructing light from reaching the camera lens. Accordingly,upon detecting at least one of the predetermined events via thedetection module 210, optical barrier module 215 may reposition theoptical barrier to obstruct the transmission of light in relation to thecameras lens. In some cases, detection module 210 may detect an eventtriggering optical barrier module 215 to uncover the camera lens. Forexample, upon detecting motion that triggers an alarm, optical barriermodule 215 may position the optical barrier to uncover the camera lens.In some cases, the optical barrier module 215 may determine the positionof the optical barrier. The optical barrier module 215 may repositionthe optical barrier to automatically uncover the camera lens when asecurity system is activated, such as when the security system is set to“away” (e.g., the premises is unoccupied) or when the security system isset to “sleep” (e.g., occupants retire to bed for the evening).

In one embodiment, the optical barrier may include one or more opaqueand/or light-obscuring physical objects. For example, the opticalbarrier may include one or more non-transparent objects. Additionally,or alternatively, the optical barrier may include one or more objectsconfigured to diffuse or scatter light. Accordingly, light that wouldhave entered the camera lens unimpeded would be scattered and diffusedwith the optical barrier positioned to obstruct the camera lens. In oneconfiguration, the optical barrier may connect to one or more motors.Thus, the positioning of the optical barrier by the optical barriermodule 215 may be automated upon the detection module 210 detecting oneor more events. In one embodiment, the one or more events may bedetected by the detection module 210 at the security camera.Additionally, or alternatively, the one or more events may detected bythe detection module 210 at a control panel that is communicativelyconnected to the security camera. Based on the detection of one or moreevents, the optical barrier module 215, without human intervention, mayreposition the optical barrier in relation to a camera lens of thesecurity camera. Thus, in conjunction with privacy module 140-a, thesecurity camera may be enabled to position the optical barrier toobstruct the camera lens upon detecting certain events, and the securitycamera may be enabled to position the optical barrier to uncover thecamera lens upon detecting certain events.

Examples of detectable events include triggering of a time of daysetting, a triggering of a day of the week setting, detecting a sleepmode, detecting an away mode, detecting activation of a security system,detecting a triggering of the active security system such as detecting apotential intruder, detecting a pet, detecting a command initiated froman authorized user, and the like. A command from an authorized user mayinclude a voice command from a user located within a predetermined rangeof the security camera. Thus, in some cases, detection module 210 maydetect a voice command from an occupant of a premises where the securitycamera is located. For example, the detection module 210 may detect theoccupant giving a voice command to cover the camera lens with theoptical barrier. Additionally, or alternatively, the detection module210 may detect a command from the authorized user that is sent remotely.For example, an authorized user may send, via a mobile computing device(e.g., mobile computing device 130), a request to capture one or moreimages while the optical barrier is covering the camera lens. Uponauthorizing the user, the optical barrier may be moved to uncover thecamera lens, one or more images may be captured based on a remotecommand sent by the authorized user, and the one or more captured imagesmay be stored in a storage device and/or sent to a destination providedby the authorized user (e.g., an email address, etc.). In some cases,the authorized user may receive a live view captured by the securitycamera. In such cases, notification may be provided at the premiseswhere the security camera is located such as an audible tone generatedby the notification module 220, alerting occupants of the premises thatthe optical barrier is being repositioned to uncover the camera lens.

In one embodiment, the optical barrier may be configured to be visiblewithin a predetermined distance from the security camera when theoptical barrier is obstructing the security camera's field of view. Theoutward, visible side of the optical barrier may configured to include acolor that makes the optical barrier relatively easy to view from apredetermined distance. The outward, visible side of the optical barriermay include any combination of colors and/or patterns to make theoptical barrier relatively more visible from a predetermined distance.In some cases, the security camera may activate a first visual indicatorupon repositioning the optical barrier to obstruct the cameras lens fromview. In one configuration, the security camera may deactivate the firstvisual indicator upon repositioning the optical barrier to uncover thecameras lens. In some cases, the security camera may activate a secondvisual indicator upon repositioning the optical barrier to uncover thecameras lens. In one embodiment, the outward, visible side of theoptical barrier may include one or more lights (e.g., light-emittingdiodes (LEDs), etc.). In one embodiment, the notification module 220 mayconfigure the lights to emit light when the optical barrier ispositioned to obstruct the camera lens. In some cases, the notificationmodule 220 may configure the lights to stop emitting light when theoptical barrier is positioned to uncover the camera lens.

In some embodiments, notification module 220 may activate a first visualindicator upon repositioning the optical barrier to obstruct thesecurity camera's field of view. In some configurations, the firstvisual indicator may be located on the outward, visible side of theoptical barrier. For example, one or more LEDs may be attached to theoptical barrier such that the LEDs are visible when the optical barrieris positioned to obstruct the security camera from capturing images bycovering the camera lens. With the optical barrier covering the cameralens, the LEDs may be activated. The LEDs may be activated for apredetermined time period. In some cases, the LEDs may be on the entiretime the optical barrier covers the camera lens. In one embodiment, theLEDs may be flash for a certain time after the optical barrier isrepositioned to cover the camera lens and then stop flashing and turnoff while the optical barrier remains covering the camera lens. In somecases, the LEDs may flash in a preset pattern. As one example, the LEDsmay flash every five seconds while the optical barrier is in a positionthat obstructs the camera lens from admitting light to the camerasensor. In some embodiments, a second visual indicator may be triggeredupon repositioning the optical barrier to uncover the cameras lens. Forexample, one or more other LEDs may flash for a predetermined timeperiod while the optical barrier uncovers the camera lens and/or afterthe camera lens is uncovered. In some cases, one or more LEDs may turnon when the security camera is capturing one or more images (e.g.,photographic images and/or video images). Accordingly, the visibility ofthe optical barrier may be increased via one or more lights operating inconjunction with the optical barrier. Thus, an occupant may instantlydetermine whether the camera is capable of capturing an image by simplylooking in the direction of the security camera, visually determiningwhether the optical barrier is in place (e.g., obstructing the cameralens) or whether the optical barrier is not in place (e.g., the cameralens is not being obstructed). In some embodiments, notification module220 may generate a notification upon detecting the optical barrier beingrepositioned to cover and/or to uncover the cameras lens.

In one embodiment, notification module 220 may deactivate the firstvisual indicator upon repositioning the optical barrier to uncover thecameras lens. Notification module 220 may activate a second visualindicator upon repositioning the optical barrier to uncover the cameraslens. In some cases, notification module 220 may generate a textualnotification upon repositioning the optical barrier. For example,notification module 220 may generate an email, a text message, a socialmedia message (e.g., FACEBOOK® private message, etc.), upon detectingthe optical barrier being repositioned. In some cases, notificationmodule 220 may generate an audible alert. For example, the notificationmodule 220 may generate a tone or chime that is uniquely associated withthe positioning of the optical barrier such that an occupant hearingthis tone may recognize it being associated with an operation of thepositioning of the optical barrier. For example, a first tone mayindicate the optical barrier covering the camera lens, and a second tonemay indicate the optical barrier uncovering the camera lens. In somecases, the notification module 220 may provide a text-to-voice alertindicating a positioning of the optical barrier (e.g., “the camera lensis being obstructed,” etc.).

In one embodiment, the detection module 210 may receive a remote requestto activate the camera and verify an identity associated with the remoterequest. In some cases, upon verifying the identity, notification module220 may implement a notification. Thus, the privacy module 140-a mayallow the security camera to be activated remotely such that thesecurity camera is able to capture one or more images (e.g.,photographic and/or video images). In some embodiments, an occupant mayconfigure the notification module 220 to not provide notificationregarding the remote operation of the security camera. For example,parents of children being babysat may want to capture one or more imageswithout providing any indication to the babysitter that images are beingcaptured.

In some embodiments, detection module 210 may detect initiation ofcommunications between an occupant of a premises where the securitycamera is located and an administrator associated with the securitycamera. For example, the security camera may be associated with asecurity system and/or automation system. The security/automation systemmay be configured to be monitored by a security monitoring company.Thus, as one example, the security camera may be located in a home witha security/automation system monitored by VIVINT®. Thus, when thedetection module 210 detects initiation of communications between anoccupant of the home and a VIVINT® representative, detection module 210may determine whether the optical barrier is positioned to obstruct thecamera lens. In some configurations, upon detecting initiation of theindicated communications and that, the detection module 210 may instructthe optical barrier module 215 to position the optical barrier touncover the camera lens according to user settings. Accordingly, theoccupant of the home may communicate with the VIVINT® representative viaa phone and/or a speaker/microphone associated with thesecurity/automation system. Additionally, with the camera lensuncovered, the VIVINT® representative may be authorized to receive alive view captured by the security camera, which may include theoccupant in the field of view of the security camera. In some cases thesecurity company may visually confirm the identity of an occupant byrequesting the occupant stand within the field of view of the securitycamera.

FIG. 3 is a block diagram illustrating an environment 300 depicting aone example of side-view of a security camera 305 in which the presentsystems and methods may be implemented. Security camera 305 may be oneexample of device 105 from FIG. 1. As depicted, security camera 305 mayinclude a security sensor 310, a camera lens 315, and an optical barrier320.

Although the body of the security camera 305 is depicted with a certainshape (e.g., rectangular), it is understood that embodiments of the bodyof security camera 305 include a variety of shapes and configurations.As illustrated, the optical barrier 320 may include a single opaqueobject that may block light from entering the security camera 305. Asdepicted, the optical barrier 320 may be attached to a lever arm and amotor assembly coupled to the security camera 320. In some embodiments,the optical barrier 320 may include one or more opaque and/orlight-diffusing objects that are configured to obstruct light fromentering the body of security camera 305. Optical barrier 320 may beconfigured to be visibly noticeable within a predetermined distance ofsecurity camera 305. Although the optical barrier 320 is depicted asbeing attached to a lever on an outer surface of security camera 305,embodiments of optical barrier 320 and the security camera 305 includeany variety of internal and external connections between the opticalbarrier 320 and security camera 305. For example, optical barrier 320may include an object relatively the same size as lens 315 that sitsparallel to lens 315. For example, optical barrier 320 may be a roundobject that sits out of the way of lens 315 in a plane that is parallelto the plane of the front of security camera 305. In this embodiment,optical barrier 320 may be may be spring loaded and configured to pivoton an attachment point. Actuating a lever may release the spring,allowing optical barrier to pivot into a position that obstructs lens315. In some cases, the optical barrier 320 may include an opaque objectthat slides from side to side or top to bottom in order to cover anduncover the camera lens 315.

Although the optical barrier 320 is depicted as being one piece, it isunderstood that the optical barrier 320 may include two or more piecesthat may be moved to cover the lens and block the camera view. Forexample, the optical barrier may include multiple spring-loaded opaqueobjects that may spring into a position that together form an opticalbarrier. Thus, in some cases, optical barrier 320 may include multipleobjects that are spring loaded, that when released, slide into placesuch that camera lens 315 is obstructed. Accordingly, optical barrier320 may be configured to obstruct camera sensor 310 from capturingimages of one or more rooms the camera 305 is situated to otherwiseview, obstructing the field of view of camera sensor 310.

In some cases, the camera lens 315 itself may pivot. For example, thecamera lens 315 may include optics that, when aligned with the camerasensor 310, focuses light onto the camera sensor 310, enabling thecamera sensor 310 to capture images within the field of view of thesensor 310. The camera lens 315 may be configured as a barrel-like,cylindrical object. The optics of the camera lens may be containedwithin the barrel-like object. The cylindrical walls of the barrelcamera lens may be opaque, allowing no light to escape out of the sidesof the barrel camera lens, but allowing light only to enter and escapefrom the back and front of the barrel camera lens. Thus, the front ofthe barrel camera lens may include a lens that captures light andtransmits the captured light through the barrel camera lens, and theback of the barrel camera lens may include a lens to focus the capturedlight onto the camera sensor. In some cases, the front and back lens maybe the same lens. In some embodiments, the barrel camera lens mayinclude a front lens, a back lens in addition to the front lens, and oneor more interior lenses in addition to the front and back lenses. Theouter cylindrical sidewalls of the surface of the barrel camera lens mayinclude one or more pivot points. The one or more pivot points mayenable the security camera to automatically pivot the barrel camera lensto align the optics with the camera sensor 310, as well as to pivot thebarrel camera lens so that the optics do not align with the camerasensor 310, but instead, the opaque sidewalls of the barrel camera lensalign with the camera sensor 310. Thus, the opaque sidewalls of thebarrel camera lens may be the optical barrier that obstructs light fromthe camera sensor 310.

Environment 300 depicts three phases in relation to the positioning ofoptical barrier 320. Phase I depicts the optical barrier 320 in awithdrawn state. With the optical barrier 320 in the withdrawn state,the camera lens 315 is left unobstructed, allowing the camera sensor 310to capture images based on the field of view of the camera 305. Phase IIdepicts the optical barrier 320 in a transitional state. In oneembodiment, phase II depicts the optical barrier 320 being repositionedfrom the withdrawn state of phase I to a position in which the opticalbarrier 320 is obstructed. In one embodiment, phase II depicts theoptical barrier 320 being repositioned from the position in which theoptical barrier 320 is obstructed to the withdrawn state of phase I.Phase III depicts the optical barrier positioned in an obstructingstate. With the optical barrier 320 in the obstructing state, operationof the camera lens 315 is impeded, the optical barrier 320 obstructingthe camera sensor 310 from capturing meaningful images. Moreover, withthe optical barrier 320 positioned in the obstructing state, an occupantof the premises where the security camera 305 is located may be enabledto visually determine with a mere glance that the security camera 305 isobstructed from capturing images.

FIG. 4 is a block diagram illustrating another example of environment400 depicting a side-view of a security camera 305 in which the presentsystems and methods may be implemented. Environment 400 depicts camera305 with an optical barrier 320 in the obstructing state, similar tophase III of FIG. 3. As illustrated, the optical barrier 320 may includea visual indicator 405. The visual indicator 405 may include a color, apattern, light, or any combination of colors, patterns, and lights. Insome embodiments, the visual indicator 405 may include one or more LEDsconfigured to emit light when the optical barrier 320 is positioned inthe obstructing state.

FIG. 5 is a flow diagram illustrating one embodiment of a method 500 forsecurity camera privacy. In some configurations, the method 500 may beimplemented by the privacy module 140 illustrated in FIG. 1 or 2. Insome configurations, the method 500 may be implemented in conjunctionwith an application and/or the user interface associated with one ormore devices depicted in FIG. 1.

At block 505, a security camera may monitor for predetermined events.The security camera may include an optical barrier. At block 510, atleast one of the predetermined events may be detected at the securitycamera. At block 515, based on detecting at least one of thepredetermined events, the optical barrier may be repositioned by thesecurity camera in relation to a camera lens of the security camera.

FIG. 6 is a flow diagram illustrating one embodiment of a method 600 forimproving privacy associated with a security camera. In someconfigurations, the method 600 may be implemented by the privacy module140 illustrated in FIG. 1 or 2. In some configurations, the method 600may be implemented in conjunction with an application and/or the userinterface associated with one or more devices depicted in FIG. 1.

At block 605, a security camera may monitor for predetermined events.The security camera may include an optical barrier. At block 610, upondetecting at least one of the predetermined events, the optical barriermay be repositioned to obstruct a transmission of light in relation tothe cameras lens. With the camera lens obstructed the security camera isphysically blocked from capturing images of an area within the securitycamera's configured field of view. In some cases, the optical barrier isconfigured to be visible within a predetermined distance from thesecurity camera when the optical barrier is blocking the camera lensfrom view. Accordingly, with the optical barrier in the way of thecamera lens and the optical barrier configured to be visible within apredetermined distance of the camera, an occupant of the premises wherethe security camera is located may be enabled to visually verify thatthe security camera is blocked from capturing images. At block 615, afirst visual indicator may be activated upon repositioning the opticalbarrier to obstruct the cameras lens. In some cases, the first visualindicator may be located on the optical barrier.

FIG. 7 depicts a block diagram of a controller 700 suitable forimplementing the present systems and methods. The controller 700 may bean example of the set top box device 105, mobile computing device 130,and/or automation controller 135 illustrated in FIG. 1. In oneconfiguration, controller 700 includes a bus 705 which interconnectsmajor subsystems of controller 700, such as a central processor 710, asystem memory 715 (typically RAM, but which may also include ROM, flashRAM, or the like), an input/output controller 720, an external audiodevice, such as a speaker system 725 via an audio output interface 730,an external device, such as a display screen 735 via display adapter740, an input device 745 (e.g., remote control device interfaced with aninput controller 750), one or more USB devices 765 (interfaced with aUSB controller 770), and a storage interface 780. Also included are atleast one sensor 755 connected to bus 705 through a sensor controller760 and a network interface 785 (coupled directly to bus 705).

Bus 705 allows data communication between central processor 710 andsystem memory 715, which may include read-only memory (ROM) or flashmemory (neither shown), and random access memory (RAM) (not shown), aspreviously noted. The RAM is generally the main memory into which theoperating system and application programs are loaded. The ROM or flashmemory can contain, among other code, the Basic Input-Output system(BIOS) which controls basic hardware operation such as the interactionwith peripheral components or devices. For example, the privacy module140-b to implement the present systems and methods may be stored withinthe system memory 715. Applications resident with controller 700 aregenerally stored on and accessed via a non-transitory computer readablemedium, such as a hard disk drive (e.g., fixed disk 775) or otherstorage medium. Additionally, applications can be in the form ofelectronic signals modulated in accordance with the application and datacommunication technology when accessed via interface 785.

Storage interface 780, as with the other storage interfaces ofcontroller 700, can connect to a standard computer readable medium forstorage and/or retrieval of information, such as a fixed disk drive 775.Fixed disk drive 775 may be a part of controller 700 or may be separateand accessed through other interface systems. Network interface 785 mayprovide a direct connection to a remote server via a direct network linkto the Internet via a POP (point of presence). Network interface 785 mayprovide such connection using wireless techniques, including digitalcellular telephone connection, Cellular Digital Packet Data (CDPD)connection, digital satellite data connection, or the like. In someembodiments, one or more sensors (e.g., motion sensor, smoke sensor,glass break sensor, door sensor, window sensor, carbon monoxide sensor,and the like) connect to controller 700 wirelessly via network interface785.

Many other devices or subsystems (not shown) may be connected in asimilar manner (e.g., entertainment system, computing device, remotecameras, wireless key fob, wall mounted user interface device, cellradio module, battery, alarm siren, door lock, lighting system,thermostat, home appliance monitor, utility equipment monitor, and soon). Conversely, all of the devices shown in FIG. 7 need not be presentto practice the present systems and methods. The devices and subsystemscan be interconnected in different ways from that shown in FIG. 7. Theaspect of some operations of a system such as that shown in FIG. 7 arereadily known in the art and are not discussed in detail in thisapplication. Code to implement the present disclosure can be stored in anon-transitory computer-readable medium such as one or more of systemmemory 715 or fixed disk 775. The operating system provided oncontroller 700 may be iOS®, ANDROID®, MS-DOS®, MS-WINDOWS®, OS/2®,UNIX®, LINUX® or another known operating system.

Moreover, regarding the signals described herein, those skilled in theart will recognize that a signal can be directly transmitted from afirst block to a second block, or a signal can be modified (e.g.,amplified, attenuated, delayed, latched, buffered, inverted, filtered,or otherwise modified) between the blocks. Although the signals of theabove described embodiment are characterized as transmitted from oneblock to the next, other embodiments of the present systems and methodsmay include modified signals in place of such directly transmittedsignals as long as the informational and/or functional aspect of thesignal is transmitted between blocks. To some extent, a signal input ata second block can be conceptualized as a second signal derived from afirst signal output from a first block due to physical limitations ofthe circuitry involved (e.g., there will inevitably be some attenuationand delay). Therefore, as used herein, a second signal derived from afirst signal includes the first signal or any modifications to the firstsignal, whether due to circuit limitations or due to passage throughother circuit elements which do not change the informational and/orfinal functional aspect of the first signal.

While the foregoing disclosure sets forth various embodiments usingspecific block diagrams, flowcharts, and examples, each block diagramcomponent, flowchart step, operation, and/or component described and/orillustrated herein may be implemented, individually and/or collectively,using a wide range of hardware, software, or firmware (or anycombination thereof) configurations. In addition, any disclosure ofcomponents contained within other components should be consideredexemplary in nature since many other architectures can be implemented toachieve the same functionality.

The process parameters and sequence of steps described and/orillustrated herein are given by way of example only and can be varied asdesired. For example, while the steps illustrated and/or describedherein may be shown or discussed in a particular order, these steps donot necessarily need to be performed in the order illustrated ordiscussed. The various exemplary methods described and/or illustratedherein may also omit one or more of the steps described or illustratedherein or include additional steps in addition to those disclosed.

Furthermore, while various embodiments have been described and/orillustrated herein in the context of fully functional computing systems,one or more of these exemplary embodiments may be distributed as aprogram product in a variety of forms, regardless of the particular typeof computer-readable media used to actually carry out the distribution.The embodiments disclosed herein may also be implemented using softwaremodules that perform certain tasks. These software modules may includescript, batch, or other executable files that may be stored on acomputer-readable storage medium or in a computing system. In someembodiments, these software modules may configure a computing system toperform one or more of the exemplary embodiments disclosed herein.

The foregoing description, for purpose of explanation, has beendescribed with reference to specific embodiments. However, theillustrative discussions above are not intended to be exhaustive or tolimit the invention to the precise forms disclosed. Many modificationsand variations are possible in view of the above teachings. Theembodiments were chosen and described in order to best explain theprinciples of the present systems and methods and their practicalapplications, to thereby enable others skilled in the art to bestutilize the present systems and methods and various embodiments withvarious modifications as may be suited to the particular usecontemplated.

Unless otherwise noted, the terms “a” or “an,” as used in thespecification and claims, are to be construed as meaning “at least oneof.” In addition, for ease of use, the words “including” and “having,”as used in the specification and claims, are interchangeable with andhave the same meaning as the word “comprising.” In addition, the term“based on” as used in the specification and the claims is to beconstrued as meaning “based at least upon.”

What is claimed is:
 1. A method for improving privacy of securitycameras, comprising: monitoring, via a security camera, forpredetermined events, the security camera comprising an optical barrier;detecting, via the security camera, at least one of the predeterminedevents; and based on detecting at least one of the predetermined events,repositioning, via the security camera, the optical barrier in relationto a camera lens of the security camera.
 2. The method of claim 1,further comprising: upon detecting at least one of the predeterminedevents, repositioning the optical barrier to obstruct a field of view ofthe security camera.
 3. The method of claim 2, wherein the opticalbarrier is configured to be visible within a predetermined distance fromthe security camera when the optical barrier is obstructing the securitycamera's field of view.
 4. The method of claim 2, further comprising:activating a first visual indicator upon repositioning the opticalbarrier to obstruct the security camera's field of view, wherein thefirst visual indicator is located on the optical barrier.
 5. The methodof claim 4, further comprising: deactivating the first visual indicatorupon repositioning the optical barrier to uncover the cameras lens. 6.The method of claim 2, further comprising: activating a second visualindicator upon repositioning the optical barrier to uncover the cameraslens.
 7. The method of claim 2, further comprising: generating anotification upon repositioning the optical barrier.
 8. The method ofclaim 1, wherein detecting the predetermined events comprises: receivinga remote request to activate the camera; verifying an identityassociated with the remote request; and upon verifying the identity,implementing a notification and activating the camera.
 9. The method ofclaim 1, wherein detecting the predetermined events comprises: detectinga voice command from an occupant of a premises where the security camerais located.
 10. The method of claim 1, wherein detecting thepredetermined events comprises: detecting initiation of communicationsbetween an occupant of a premises where the security camera is locatedand an administrator associated with the security camera.
 11. Acomputing device configured for improving privacy of security cameras,comprising: a processor; memory in electronic communication with theprocessor; instructions stored in the memory, the instructions beingexecutable by the processor to: monitor for predetermined events, thesecurity camera comprising an optical barrier; detect at least one ofthe predetermined events; and based on detecting at least one of thepredetermined events, reposition the optical barrier in relation to acamera lens of the security camera.
 12. The computing device of claim11, wherein the instructions are executable by the processor to: upondetecting at least one of the predetermined events, repositioning theoptical barrier to obstruct a field of view of the security camera. 13.The computing device of claim 12, wherein the optical barrier isconfigured to be visible within a predetermined distance from thesecurity camera when the optical barrier is obstructing the securitycamera's field of view.
 14. The computing device of claim 12, furthercomprising: activating a first visual indicator upon repositioning theoptical barrier to obstruct the security camera's field of view, whereinthe first visual indicator is located on the optical barrier.
 15. Thecomputing device of claim 14, wherein the instructions are executable bythe processor to: deactivate the first visual indicator uponrepositioning the optical barrier to uncover the cameras lens.
 16. Thecomputing device of claim 12, wherein the instructions are executable bythe processor to: activate a second visual indicator upon repositioningthe optical barrier to uncover the cameras lens.
 17. The computingdevice of claim 12, wherein the instructions are executable by theprocessor to: generate a notification upon repositioning the opticalbarrier.
 18. The computing device of claim 11, wherein the instructionsare executable by the processor to: receive a remote request to activatethe camera; verify an identity associated with the remote request; andupon verifying the identity, implement a notification and activate thecamera.
 19. A computer-program product for improving privacy of securitycameras, the computer-program product comprising a non-transitorycomputer-readable medium storing instructions thereon, the instructionsbeing executable by a processor to: monitor for predetermined events,the security camera comprising an optical barrier; detect at least oneof the predetermined events; and based on detecting at least one of thepredetermined events, reposition the optical barrier in relation to acamera lens of the security camera.
 20. The computer-program product ofclaim 19, wherein the instructions are executable by the processor to:upon detecting at least one of the predetermined events, reposition theoptical barrier to obstruct a field of view of the security camera.