Enhanced property access with video analytics

ABSTRACT

Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for enhanced property access with video analytics. In some implementations, images of a first area captured by a camera are obtained. A number of persons in the first area is determined from the images. Data indicating one or more unique identifications is received. A number of persons who are authorized to access a second area are determined. Access is provided to the second area.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional Application No.63/014,994, filed Apr. 24, 2020, and titled “ENHANCED PROPERTY ACCESSWITH VIDEO ANALYTICS,” which is incorporated by reference in itsentirety.

TECHNICAL FIELD

The present specification relates to access control systems.

BACKGROUND

Typical access control systems of residential buildings suffer fromunauthorized persons gaining entrance to the residential buildings bytailgating authorized persons through access control points.

SUMMARY

In some implementations, a system can leverage video analytics todetermine the number of persons near an access control point of aproperty. Based on the number of persons, the system can determine anumber of unique identifications that are required for the accesscontrol point to be unlocked. The number of unique identifications canbe the same as the number of persons near the access control point. Thenumber of unique identifications can be less than the number of personsnear the access control point. The system can keep the access controlpoint locked until it receives the threshold number of uniqueauthentications.

In some implementations, the system uses a virtual fence to determinethe number of persons near the access control point of the property. Forexample, the virtual fence can define an area adjacent to or includingthe access control point. The system can determine that the persons nearthe access control point are those persons within the area, e.g., in thevirtual fence. The system can leverage video analytics to determine thenumber of persons in the virtual fence.

In some implementations, the system uses a virtual fence in determiningwhether to unlock the access control point. For example, even if thesystem receives a threshold number of unique identifications, the systemcan keep the access control point locked until it determines that theunauthorized persons, e.g., those persons that did not provide a uniqueidentification, are outside of a virtual fence that is adjacent to orthat includes the access control point.

In some implementations, the access control point of the property is anentrance of the property, an entrance to a particular part of theproperty, or an elevator of the property. For example, the accesscontrol point can be an internal entrance to a residential part of theproperty. The property can include multiple access control points.

In some implementations, a unique identification can be anidentification code assigned to a particular resident or visitor of theproperty.

In some implementations, the system receives the unique authenticationsthrough an RFID reader, an NFC reader, a Bluetooth receiver, and/or akeypad.

In one general aspect, a method performed includes obtaining images of afirst area of a property captured by a camera; determining a number ofpersons located in the first area from the images; receiving dataindicating one or more unique identifications; based on the one or moreunique identifications, determining a number of persons who areauthorized to access a second area of the property; and providing accessto the second area.

In some implementations, obtaining images of the first area capturedincludes obtaining images of an area defined by a virtual fence; anddetermining the number of persons located in the first area includesdetermining a number of persons located inside boundaries of the virtualfence.

In some implementations, the method includes: detecting a change in theproperty; and based on the change in the property, adjusting a size ofthe virtual fence, where obtaining images of the area defined by thevirtual fence includes obtaining images of the area defined by thevirtual fence after the adjustment to the size of the virtual fence, andwhere determining the number of persons located inside the boundaries ofthe virtual fence includes determining the number of persons locatedinside the boundaries of the virtual fence after the adjustment to thesize of the virtual fence.

In some implementations, detecting the change in the property includesreceiving data indicating that an entrance of the property is open; andadjusting the size of the virtual fence includes reducing the size ofthe virtual fence based on the entrance of the property being open.

In some implementations, detecting the change in the property includesdetermining that a current time meets (i) a first time range or (ii) asecond time range; and adjusting the size of the virtual fence includes(i) reducing the size of the virtual fence based on the current timemeeting the first time range or (ii) increasing the size of the virtualfence based on the current time meeting the second time range.

In some implementations, the first time range is a time range within atwenty-four hour period; the second time range is a time range withinthe twenty-four hour period; and the first time range is earlier in thetwenty-four hour period than the second time range.

In some implementations, the first time range is a time range (i) withina twenty-four hour period and (ii) that corresponds to a first amount ofexpected foot traffic in the property; the second time range is a timerange (i) within the twenty-four hour period and (ii) that correspondsto a second amount of expected foot traffic in the property; and thefirst amount of expected foot traffic is greater than the second amountof expected foot traffic.

In some implementations, detecting the change in the property includesdetermining that a number of persons in a third area of the propertymeets a threshold number of persons; and adjusting the size of thevirtual fence includes (i) reducing the size of the virtual fence or(ii) increasing the size of the virtual fence.

In some implementations, determining that the number of persons in thesecond area meets the threshold number of persons includes determining anumber of persons located in the third area from the images.

In some implementations, determining that the number of persons in thethird area meets the threshold number of persons includes: receivingdata indicating a number of persons that have entered the third areafrom at least one of an entrance of the property or an access controlsystem of the property; receiving data indicating a number of personsthat have exited the third area from at least one of an entrance of theproperty or an access control system of the property; determining acurrent number of persons in the third area using the number of personsthat have entered the third area and the number of persons that haveexited the third area; and comparing the current number of persons inthe third area to the threshold number of persons.

In some implementations, providing access to the second area includes:generating instructions for an access control system that is configuredto (i) permit access to the second area from the first area in a firstmode and (ii) prevent access to the second area from the first area in asecond mode, where the instructions include instructions to place theaccess control system in the first mode to permit access to the secondarea from the first area; and transmitting the instructions to theaccess control system.

In some implementations, the method includes determining that a numberof the one or more unique identifications meets a threshold number ofunique identifications, where providing access to the second areaincludes providing access to the second area based on the determinationthat the number of the one or more unique identifications meets thethreshold number of unique identifications.

In some implementations, determining that the number of the one or moreunique identifications meets the threshold number of uniqueidentifications includes: calculating the threshold number of uniqueidentifications from the number of persons located in the first area;and determining that the number of the one or more uniqueidentifications is greater than or equal to the threshold number ofunique identifications.

In some implementations, calculating a threshold number of uniqueidentifications includes applying a predetermined percentage to thenumber of persons located in the first area.

In some implementations, applying the predetermined percentage includesselecting the predetermined percentage from multiple percentages basedon at least one of (i) a time of day, (ii) a number of persons in thefirst area, (iii) a number of persons traveling through the first area,and (iv) a type of entry to the second area from the first area.

In some implementations, calculating the threshold number of uniqueidentifications includes: providing the number of persons located in thefirst area as input to an algorithm; and receiving an output of thealgorithm, where the output is or indicates the threshold number ofunique identifications.

In some implementations, calculating the threshold number of uniqueidentifications includes providing at least one of (i) a time of day,(ii) a number of persons in the first area, (iii) a number of personstraveling through the first area, and (iv) a type of entry to the secondarea from the first area as input to the algorithm, where the output ofthe algorithm is based on the number of persons located in the firstarea and at least one of (i) the time of day, (ii) the number of personsin the first area, (iii) the number of persons traveling through thefirst area, and (iv) the type of entry to the second area from the firstarea as input to the algorithm.

In some implementations, calculating the threshold number of uniqueidentifications includes providing at least one of (i) a time of day,(ii) a number of persons in the first area, (iii) a number of personstraveling through the first area, and (iv) a type of entry to the secondarea from the first area as input to the algorithm, where the output ofthe algorithm is based on the number of persons located in the firstarea and at least one of (i) the time of day, (ii) the number of personsin the first area, (iii) the number of persons traveling through thefirst area, and (iv) the type of entry to the second area from the firstarea as input to the algorithm.

Other embodiments of these and other aspects disclosed herein includecorresponding systems, apparatus, and computer programs encoded oncomputer storage devices, configured to perform the actions of themethods. A system of one or more computers can be so configured byvirtue of software, firmware, hardware, or a combination of theminstalled on the system that, in operation, cause the system to performthe actions. One or more computer programs can be so configured byvirtue having instructions that, when executed by data processingapparatus, cause the apparatus to perform the actions.

The details of one or more embodiments of the invention are set forth inthe accompanying drawings and the description below. Other features andadvantages of the invention will become apparent from the description,the drawings, and the claims

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram showing an example of a system for enhanced propertyaccess with video analytics.

FIG. 2 is a diagram showing an example of using a system for enhancedproperty access with a virtual fence.

FIG. 3 is a flowchart of an example process for providing enhancedproperty access with video analytics.

FIG. 4 is a block diagram illustrating an example security monitoringsystem.

Like reference numbers and designations in the various drawings indicatelike elements.

DETAILED DESCRIPTION

FIG. 1 is a diagram showing an example of a system 100 for enhancedproperty access with video analytics. The system 100 is an accesscontrol system for a property 120. The system 100 includes a managementsystem 102, an access control point 128, a tag reader 130, and cameras132 a-132 d. The system 100 can include one or more additional securitydevices in addition to the tag reader 130 and the cameras 132 a-132 d.For example, the system 100 can include one or more motion detectors,and/or one or more magnetic door or window sensors. The variouscomponents of the system 100 can communicate over the network 150, overa wired connection, or over a combination of the network 150 and a wiredconnection.

Using image data collected by the cameras 132 a-132 d, the system 100can leverage video analytics to determine the number of persons near theaccess control point 128 of the property 120. Based on the determinednumber of people, the system 100 can determine a number of uniqueidentifications that are required for the access control point to beunlocked. The number of unique identifications can be the same as thenumber of persons near the access control point. The number of uniqueidentifications can be less than the number of persons near the accesscontrol point. For example, the system 100 may determine the number ofunique identifications is half, rounding up, the number of persons nearthe access control point. The system 100 can keep the access controlpoint locked until it receives the threshold number of uniqueauthentications.

FIG. 1 also illustrates various events, shown as stages (A) to (D), witheach representing a step in an example process for enhanced propertyaccess with video analytics. Stages (A) to (C) can occur in theillustrated sequence, or in a sequence that is different from theillustrated sequence. For example, some of the stages can occurconcurrently.

The property 120 can be any residential or commercial building such asan apartment complex, a condominium, a hotel, an office building, etc.For example, as shown, the property 120 is an apartment complex, acondominium, or hotel having a residential area 122, a lobby area 124,and an entrance 126 a (e.g., an external entrance of the property 120).As shown, the access control point 128 separates the residential area122 from the lobby area 124. The residential area 122 may be in area towhich access is controlled by the access control point 128. The lobbyarea 124 may be an area inside a building of the property to whichaccess is not controlled by the access control point 128. The entrance126 a (e.g., the external entrance of the property 120) may be anentrance between a building and outside the building.

The access control point 128 can be used to increase the security of theproperty 120, e.g., to increase the security of residents of theproperty 120 living in the residential area 122 of the property 120. Theaccess control point 128 can be an entrance of the property 120, anentrance to a particular part of the property 120, or one or moreelevators of the property 120. For example, as shown, the access controlpoint 128 is an internal entrance to the residential area 122 of theproperty 120. The access control point can include the tag reader 130.The state of the access control point 128 can be controlled by themanagement system 102. For example, the access control point 128 canhave a default locked state that prevents persons from entering theresidential area 122 from the lobby area 124 (though it may still letpersons enter the lobby area 124 from the residential area 122). Theproperty 120 can include multiple access control points.

In more detail, the access control point 128 can be or include one ormore doors having an electronic lock, e.g., when the access controlpoint 128 is an entrance of the property 120. The state of theelectronic lock, e.g., locked state or unlocked state, can be controlledby the management system 102. As an example, when the access controlpoint 128 is in a locked state, the electronic lock can be in a lockedstate. Similarly, when the access control point 128 is in an unlockedstate, the electronic lock can be in an unlocked state. Where the accesscontrol point 128 includes one or more doors, the access control point128 can also include one or more magnetic door sensors and/or one ormore motion detectors.

Additionally or alternatively, the access control point 128 can be orinclude one or more elevators. Each of the one or more elevators caninclude a tag reader. The floors that are unlocked, e.g., the floorsthat the one or more elevators are permitted to travel to, can becontrolled by the management system 102. As an example, when the accesscontrol point 128 is in a locked state, the one or more elevators may beauthorized only to travel to and/or open for the lobby floor. Similarly,when the access control point 128 is in an unlocked state, the one ormore elevators can be authorized to travel to all floors, to only thosefloors that correspond to the unique identifications received, or to aparticular set of floors while requiring further authentication forunlocking floors outside of the particular set (e.g., can requirefurther authentication to unlock the penthouse floor, the top twofloors, a rooftop floor, a basement floor, etc.).

In some implementations, the access control point 128 includes acombination of the one or more doors having an electronic lock and theone or more elevators.

The tag reader 130 can be part of the access control point 128. The tagreader 130 can be an RFID reader, an NFC reader, a Bluetooth receiver,etc. In some implementations, a keypad is used in place of the tagreader 130. In some implementations, the tag reader 130 includes akeypad through which persons can enter an identification or an alternateidentification, e.g., if they don't have their RFID device (e.g., fob,card, smartphone, etc.) having an RFID tag, NFC device (e.g., fob, card,smartphone, etc.) having an NFC tag, Bluetooth device (e.g., having adigital ID), etc.

The cameras 132 a-132 d can include one or more visible light camerasand/or one or more infrared (IR) cameras. For example, an IR camera canbe used to quickly locate persons in the lobby area. Multiple visiblelight cameras can then be used to obtain images of the face of each ofthe persons. The cameras 132 a-132 d can each be a visible light camera.The cameras 132 a-132 d can each be an IR camera.

The management system 102 can include one or more computing devices. Themanagement system 102 can also include one or more data storage devices.The data storage devices may be able to store (e.g., temporarily for aset period of time) images of residents of the property 120, guests ofthe property 120, persons who are not permitted on the property 120,and/or other persons in the property 120, such as persons in the lobbyarea 124 of the property 120. The data storage devices can also includeaccess control settings.

The access control settings can indicate a number of valid, uniqueidentifications that are needed to produce unlock instructions. Forexample, the access control settings can indicate the number of valid,unique identifications that are needed for a given number of personsnear the access control point 128, for a given number of persons in thelobby area 124, for a given number of persons in virtual fence, etc.

The access control settings can indicate the time out period until themanagement system 102 requires previously unique identifications to beentered again. For example, the time out period can be fifteen seconds,thirty seconds, one minute, etc. After a time out period has elapsed(e.g., after thirty seconds has passed since an occupant had theiraccess key scanned by the tag reader 130 of the access control point128), the access control point 128 can automatically relock. The accesscontrol settings can indicate the length of time that the access controlpoint 128 should be unlocked for after it receives unlock instructionsfrom the management system 102. The access control settings can indicatethe size and/or location of a virtual fence. The access control settingscan indicate one or more alternative sizes and/or locations of thevirtual fence. The access control settings can include controls for adynamic virtual fence. The access control settings can indicate whatfloors of an elevator should be unlocked when the management system 102determines that unlock instructions should be sent to the elevator,e.g., based on the one or more unique identifications that themanagement system 102 receives. The access control settings can includeresident and guest profiles. These profiles can indicate the amount oftime that the resident or guest is permitted to access the property 120(e.g., can include a lease end date, a check out date, etc.).

The management system 102 can communicate with the access control point128 and/or the tag reader 130, e.g., over the network 150. Themanagement system 102 can also communicate with other devices such as,for example, a magnetic door sensor of the entrance 126 a, a motiondetector of the entrance 126 a, a magnetic door sensor of the accesscontrol point 128, a motion detector of the access control point 128,etc. The management system 102 can communicate with mobile devices ofpersons, such as mobile devices of residents and guests. The managementsystem 102 can receive entry requests through a mobile applicationrunning on the mobile devices. The management system 102 can communicatewith management or administrative devices. The management system 102 canreceive new access control settings from the management/administrativedevices, and/or modifications to the access control settings from themanagement/administrative devices.

The management system 102 can communicate with mobile devices ofemployees and contractors, such as mobile devices of leasing agents,doormen, security, or the like. The management system 102 can sendnotifications to these mobile devices when it determines that one ormore persons in the lobby area 124 do not have valid identifications,have attempted to gain entrance through the access control point 128,have improperly gained entrance through the access control point 128,and/or have been in the lobby area 124 greater than a threshold amountof time (e.g., ten minutes, thirty minutes, one hour, etc.). In someimplementations, the management system 102 is the monitoring server 460shown in FIG. 4 .

As an example, residents may be able to send requests for temporaryidentifications for guests to the management system 102 over the network150. Similarly, guests may be able to send requests for temporaryidentifications to the management system 102 over the network 150. Therequests can be sent through a mobile application running on theresident devices and/or guest devices. A request can include aphotograph of the corresponding guest such as a recently takenphotograph (e.g., a photograph taken in the last five minutes, lastthirty minutes, last hour, etc.). A request can include personalinformation of the corresponding guest such as a name of the guest, anaddress of the guest, a birth date of the guest, etc. A request caninclude an image of an identification of the guest, such as an image ofthe guest's driver's license. A request can be a request for entry formultiple guests. A request can include an indication of the number ofguests seeking entrance.

The network 140 can include public and/or private networks and caninclude the Internet.

The techniques disclosed in this document can be used to improve accesscontrol systems by reducing the likelihood of unauthorized access and,therefore, improve the safety of residents and guests. The system 100can improve access control systems by dynamically adjusting therequirements to unlock an access control point of a property to ensurethat there is a low likelihood or a sufficiently low likelihood of anunauthorized person entering a protected part of a property, such as aresidential area of a property. In determining the requirements, thesystem 100 can take into account the number of persons in a monitoredarea of the property, doors of the property that are open, the time ofday, among other factors. Through these dynamic adjustments to thelock/unlock requirements, the system 100 can improve the securityafforded to occupants (e.g., when occupants are more at risk), improvethe convenience afforded to occupants (e.g., when occupants are less atrisk), and/or balance the needs of occupant safety and convenience.

The system 100 can make improvements access control systems using othertechniques. For example, the system 100 can make other types of dynamicadjustments to improve the security afforded to occupants, improve theconvenience afforded to occupants, and/or balance the needs of occupantsafety and convenience. As an example, the system 100 can use a virtualfence to set, directly or indirectly, requirements for unlocking orlocking an access control point. Using various factors, the system 100can dynamically adjust the size, shape, and/or location of the virtualfence to balance the needs of occupant safety with occupant convenience.As a result, the system 100 can provide a secure access control systemthat remains practical to use.

In stage A, the management system 102 receives unique identifications110. As shown, the unique identifications 110 includes two uniqueidentifications that correspond to two of the persons in the lobby area124 of the property 120. These unique identifications 110 can includeidentifications read by the tag reader 130. The management system 102can receive the unique identifications 110 from the tag reader 130. Themanagement system 102 can receive the unique identifications 110 fromthe access control point 128, e.g., when the tag reader 130 is part ofthe access control point 128. Each of the identifications in the uniqueidentifications 110 can correspond to one particular persons.

The unique identifications 110 can include a unique name or username, aunique ID number or alphanumeric ID, a near-field communication tag UID,a radio frequency identification tag UID, a serial number (e.g.,assigned to a particular person or preprogrammed in a tag of a devicethat belongs to a particular person), etc.

As an example, the unique identifications 110 can include a uniqueidentification for the person 140 a and a unique identification for theperson 140 b. This indicates that the tag reader 130 has read a tagbelonging to the person 140 a and a tag belonging to the person 140 b,e.g., within a threshold amount of time.

In stage B, the cameras 132 a-132 d collect images 112 and send theimages 112 to the management system 102. The images 112 can be imagedata or video data. The images 112 can be of the lobby area 124 of theproperty 120. In some implementations, the images 112 can include imagescollected from other monitored parts of the property 120, e.g., by oneor more other cameras.

In stage C, the management system 102 determines the number of personsin the monitored area of the property 120 using the images 112. Forexample, the management system 102 can use the images 112 to determinethat there are four persons in the lobby area 124 of the property 120,e.g., where the monitored area includes the entirety of the lobby area124. As another example, as will be discussed in more detail withrespect FIG. 2 , the management system 102 can determine that there arethree persons near the access control point 128, e.g., where themonitored area is an area within the lobby area 124 that includes or isadjacent to the access control point 128. As will be discussed in moredetail with respect FIG. 2 , the monitored area can be defined using avirtual fence.

The management system 102 can use the number of persons in the monitoredarea to determine a threshold number of unique identifications requiredto unlock the access control point 128. The threshold number can beequal to or less than the number of persons detected in the monitoredarea of the property 120. For example, if there are four detectedpersons in the monitored area, the management system 102 can determinethat a threshold of three unique identifications is required to unlockthe access control point 128. The threshold number can depend on thenumber of persons detected in the monitored area of the property 120.For example, the threshold number can be calculated using a formula thatincludes as a variable the number of persons detected in the monitoredarea of the property 120. For example, the threshold number can be oneless than the number of persons detected in the monitored area of theproperty 120, e.g., when there are more than two persons in themonitored area of the property 120. Accordingly, where the monitoredarea is the lobby area 124, the threshold number would be three uniqueidentifications.

In some implementations, the threshold number can be dependent on one ormore other factors. The threshold number can depend on the time of day.For example, the threshold number may be less during high travel timesof the day in order to provide greater convenience and may be higherduring low travel times of the data in order to provide greatersecurity. Specifically, the management system 102 can determine that thethreshold number is two less than the number of persons detected in themonitored area (e.g., when there are more than two persons in themonitored area) between the hours of 8:01 am and 8:00 pm, and that thethreshold number is equal to the number of persons detected in themonitored area between the hours of 8:01 pm and 8:00 am.

The threshold number can depend on the type of access control point thatthe access control point 128 is. For example, where the access controlpoint 128 is or includes an elevator, the threshold number may always beequal to the number of persons detected in the elevator. The managementsystem 102 can use, for example, one or more cameras in the elevator todetermine the number of persons in the elevator. The images 112 caninclude images from cameras in the elevator. The tag reader 130 can beinstalled in the elevator. Alternatively, the elevator can include aseparate tag reader. If the management system 102 determines that thenumber of unique identifications that it receives as part of the uniqueidentifications 110 is less than a detected number of persons in theelevator, the management system 102 can send instructions to theelevator preventing the elevator from operating, preventing the elevatordoor from closing, causing the elevator door to open, and/or preventingthe elevator from traveling to any floor but the lobby floor.

The management system 102 can compare the of unique identifications inthe unique identifications 110 to the threshold number of uniqueidentifications in determining if the access control point 128 should beunlocked. For example, where the threshold number of uniqueidentifications is determined to be three based on there being fourpersons in the lobby area 124 and where the unique identifications 110includes two unique identifications, the management system 102 candetermine that the access control point 128 should remain locked.

In stage D, the management system 102 sends instructions 114 denyingaccess through the access control point 128. In some implementations,where the access control point 128 defaults to a locked state, themanagement system 102 instead determines not to send any instructions tothe access control point 128. In some implementations, the instructions114 denying access are only sent to the access control point 128 if theaccess control point 128 is currently in an unlocked state. For example,if conditions at the property 120 change (e.g., if the entrance 126 a isopened, if another person enters the lobby area 124, etc.), themanagement system 102 can send the instructions 114 denying accessthrough the access control point 128 in order to lock the access controlpoint, e.g., lock the access control point 128 before it would haveautomatically locked itself.

Based on determining that access control point 128 should not beunlocked and/or based on there being one or more persons in the lobbyarea 124 that are permitted to enter the residential area 122, themanagement system 102 can generate and send one or more notifications.These notifications can be generated and sent to a computing device ofthe manager of the property 120, to one or more devices of employees orcontractors of the property 120 (e.g., to security personnel), toresidents of the property 120, to guests of the property 120, etc. Forexample, the management system 102 can generate and send a notificationto the persons 140 a-140 b after determining that they are bothauthorized to access the residential area 122, e.g., that they areresidents of the property 120, explaining that there are too many peoplein the lobby area 124 and/or near the access control point 128, that anemployee has been notified and is on the way to provide them access,that security has been alerted to remove the persons 140 c-140 d fromthe lobby area 124, etc.

In some implementations, the management system 102 can use the images112 to reduce the threshold number of unique identifications required tounlock the access control point 128. The management system 102 canperform facial recognition using the images 112 to identify one or moreof the persons 140 a-140 d in the lobby area 124. In identifying one ormore of the persons 140 a-140 d, the management system 102 can comparethe images 112 to one or more stored images, e.g., stored images ofresidents and/or guests of the property. The management system 102 candetermine if any of the identified persons correspond to the uniqueidentifications 110. If any of the identified persons do not correspondto any of the unique identifications 110, the management system 102 canreduce the threshold number of unique identifications required to unlockthe access control point 128.

As an example, if the unique identifications 110 correspond to thepersons 140 a-140 b and if the management system 102 uses the images 112to determine that three of the persons 140 a-140 d in the lobby area 124are authorized to enter the residential area 122, the management system102 can reduce the threshold number of unique identifications requiredto unlock the access control point 128 from three unique identificationsto two unique identifications. Accordingly, due to having received twounique identifications of the unique identifications 110, the managementsystem 102 would send unlock instructions to the access control point128.

As example, if the unique identifications 110 correspond to the persons140 a-140 b and if the management system 102 uses the images 112 todetermine that the person 140 c in the lobby area 124 is authorized toenter the residential area 122, the management system 102 can reduce thethreshold number of unique identifications required to unlock the accesscontrol point 128 from three unique identifications to two uniqueidentifications. Accordingly, due to having received two uniqueidentifications of the unique identifications 110, the management system102 would send unlock instructions to the access control point 128.

As example, if the unique identifications 110 correspond to the persons140 a-140 b and if the management system 102 uses the images 112 todetermine that the person 140 d in the lobby area 124 is authorized toenter the residential area 122 and/or that the person 140 c is notauthorized to enter the residential area 122, the management system 102can maintain the threshold number of unique identifications required tounlock the access control point 128 due to the person 140 d beingrelatively far away from the access control point 128, due to the person140 c being relatively close to the access control point 128, and/or dueto the person 140 d being farther away from the access control point 128than the person 140 c. Accordingly, due to having received only twounique identifications of the unique identifications 110, the managementsystem 102 would still send the instructions 114 denying access throughthe access control point 128.

Similarly, in some implementations, the management system 102 can usethe images 112 to increase the number of unique identificationsdetected. The management system 102 can perform facial recognition usingthe images 112 to identify one or more of the persons 140 a-140 d in thelobby area 124. In identifying one or more of the persons 140 a-140 d,the management system 102 can compare the images 112 to one or morestored images, e.g., stored images of residents and/or guests of theproperty. The management system 102 can determine if any of theidentified persons correspond to the unique identifications 110. If anyof the identified persons do not correspond to any of the uniqueidentifications 110, the management system 102 can look up theidentifications of those persons. The management system 102 can usethese identifications along with the unique identifications 110 indetermining if a threshold number of identifications to unlock requiredto unlock the access control point 128 has been met.

As an example, if the unique identifications 110 correspond to thepersons 140 a-140 b and if the management system 102 uses the images 112to determine that three of the persons 140 a-140 d in the lobby area 124are authorized to enter the residential area 122, the management system102 can identify the person whose identification was not receivedthrough the tag reader 130 and can add their correspondingidentification to the list of detected unique identifications. Themanagement system 102 can, therefore, determine that it has detectedthree unique identifications. Accordingly, due to having detected threeunique identifications and due to the threshold number of uniqueidentifications being three unique identifications, the managementsystem 102 would send unlock instructions to the access control point128.

As example, if the unique identifications 110 correspond to the persons140 a-140 b and if the management system 102 uses the images 112 todetermine that the person 140 c in the lobby area 124 is authorized toenter the residential area 122, the management system 102 can look up anidentification corresponding to the person 140 c and add theidentification to the list of detected unique identifications. Themanagement system 102 can, therefore, determine that it has detectedthree unique identifications. Accordingly, due to having detected threeunique identifications and due to the threshold number of uniqueidentifications being three unique identifications, the managementsystem 102 would send unlock instructions to the access control point128.

As example, if the unique identifications 110 correspond to the persons140 a-140 b and if the management system 102 uses the images 112 todetermine that the person 140 d in the lobby area 124 is authorized toenter the residential area 122 and/or that the person 140 c is notauthorized to enter the residential area 122, the management system 102can increase the threshold number of unique identifications required tounlock the access control point 128 (e.g., from three to four uniqueidentifications) or can choose to not add the identificationcorresponding to the person 140 d to the list of detected uniqueidentifications due to the person 140 d being relatively far away fromthe access control point 128, due to the person 140 c being relativelyclose to the access control point 128, and/or due to the person 140 dbeing farther away from the access control point 128 than the person 140c. Accordingly, the management system 102 would still send theinstructions 114 denying access to the access control point 128.

FIG. 2 is a diagram showing an example of using the system 100 forenhanced property access with a virtual fence 202.

The virtual fence 202 can indicate the area of the property 120 beingmonitored. That is, the virtual fence 202 can define the area that themanagement system 102 uses to determine a number of persons in themonitored area. In turn, the management system 102 can use thisdetermination to calculate a threshold number of unique identificationsrequired to unlock the access control point 128.

The size and/or shape of the virtual fence 202 can be dynamic. Forexample, the size and/or shape of the virtual fence 202 can depend on atime of day (e.g., if it is a time of day that is associated with hightraffic, if it is a time of day that is associated with low traffic, ifit is at night where greater security is needed, etc.), on whether theentrance 126 a of the property 120 is open, and/or on the number ofpersons in the lobby area 124. As an example, the size of the virtualfence can be dynamically reduced in size during times when higher foottraffic is expected (e.g., based on the time of day) or detected (e.g.,using the cameras 132 a-132 d, using one or more motion detectors of theentrance 126 a, using one or more magnetic door sensors of the entrance126 a, using one or more motion detectors of the access control point128, using one or more magnetic door sensors of the access control point128, etc.).

As shown, the virtual fence 202 a has a first size when the entrance 126a is closed. With respect to FIG. 1 , the management system 102 candetermine based on the images 112 that there are three persons in thevirtual fence 202 a. Based on the number of persons in the virtual fence202 a, the management system 102 can determine a threshold number ofrequired unique identifications. For example, the management system 102can determine that the threshold number of required uniqueidentifications is two (e.g., one less than the number of persons in thevirtual fence 202 a, or two-thirds the number of persons in the virtualfence 202 a) or three (e.g., equal to the number of persons in thevirtual fence 202 a). If the threshold number of required uniqueidentifications is two, based on there being two unique identificationsin the unique identifications 110, the management system 102 can sendunlock instructions to the access control point 128. If the thresholdnumber of required unique identifications is three, based on there beingtwo unique identifications in the unique identifications 110, themanagement system 102 can send the instructions 114 denying access tothe access control point 128.

However, when the entrance 126 b is opened, the system 100 (e.g., themanagement system 102) increases the size of the virtual fence 202 b toinclude the entirety of the lobby area 124. This size increase can bemade in anticipation of and to account for additional persons cominginto the lobby area 124, and/or in anticipation of someone runningthrough the entrance 126 b towards the access control point 128. Withrespect to FIG. 1 , the management system 102 can determine based on theimages 112 that there are now four persons in the virtual fence 202 b.Based on the number of persons in the virtual fence 202 b, themanagement system 102 can determine that the threshold number ofrequired unique identifications is now three (e.g., one less than thenumber of persons in the virtual fence 202 a, or two-thirds the numberof persons in the virtual fence 202 a rounded to the nearest wholenumber) or four (e.g., equal to the number of persons in the virtualfence 202 a). Based on there being only two unique identifications inthe unique identifications 110, the management system 102 can sendinstructions 114 denying access through the access control point 128.Accordingly, if the access control point 128 was unlocked in response tothe previously sent instructions and if no one opened the access controlpoint 128, the access control point 128 will be locked, preventing thepersons 140 a-140 d from accessing the residential area 122 until anadditional unique identification is received.

The size of the virtual fence 202 b can be increased by the managementsystem 102 in response to the management system 102 detecting that theentrance 126 b is open. For example, the management system 102 candetect that the entrance 126 b is open based on sensor data it receives,e.g., sensor data from one or more motion detectors of the entrance 126b and/or sensor data from one or more magnetic doors sensors of theentrance 126 b.

In some implementations, where the access control point 128 is orincludes an elevator, if a person comes in to the elevator after theelevator door has started to close, the door will open again and won'toperate until a unique identification is received for the new person oruntil an additional unique identification is received. If the persondoes not have a valid unique identification, the management system 102will require that the person exit the elevator and step away from theelevator door in order for the elevator to operate.

The virtual fence 202 can be used with the elevator. For example, theelevator itself can form an initial monitored area used by themanagement system 102 in determining a threshold number of uniqueidentifications required. However, once the management system 102 hasdetermined that a person in the elevator is not authorized (e.g., hasnot provided a unique identification and/or cannot be verified adifferent way), the management system 102 can use or generate thevirtual fence 202 that is adjacent to or includes the elevator. Themanagement system 102 can refrain from sending unlock instructions tothe elevator, e.g., such that the elevator door does not close and/orthe elevator does not operate, until the management system 102determines that the person is no longer in the virtual fence 202. Thesize of the virtual fence 202 can be selected such that the distancefrom its perimeter to the elevator door would be such that a personwalking an average speed (e.g., 3 MPH, 3.5 MPH, 4 MPH, etc.) could notreach the elevator before the elevator door closed if the elevator doorstarted to close when the person entered the virtual fence. For example,if the elevator doors closes in two seconds, the size and/or shape ofthe virtual fence 202 can be selected such that every point of thevirtual fence 202 (except for those points that come into contact with awall or the elevator) is 11.73 feet away from the elevator to accountfor people walking 4 MPH or slower towards the elevator.

In some implementations, where the access control point 128 is orincludes an elevator, the size and/or shape of the virtual fence 202 candepend on percentage that the elevator door is open. The size and/orshape of the virtual fence 202 can be calculated as an equation of thepercentage that the elevator door is open. For example if the elevatordoor is 100% open, the management system 102 can increase the sizeand/or change the shape of the virtual fence 202 or can keep the virtualfence 202 at its maximum size, e.g., such that it covers the lobby area124 entirely and/or such that every point of the virtual fence exceptfor those points that come into contact with a wall or the elevator istwenty feet away from the elevator. If the management system 102determines that the elevator door is closing and is about 50% open, themanagement system 102 can decrease the size and/or change the shape ofthe virtual fence 202, e.g., such that it covers half of the lobby area124 and/or such that every point of the virtual fence expect for thosepoints that come into contact with a wall or the elevator is ten feetaway from the elevator. If the management system 102 determines that theelevator door is closed (0% open), the management system 102 cantemporarily remove the virtual fence 202.

In some implementations, the management system 102 can instruct devicesof the system 100 to enter or exit a low-power consumption mode. Thedevices can include the cameras 132 a-132 d. As an example, anadministrator can provide instructions to the management system 102specifying that the management system 102 should set a low-powerconsumption mode for the video analytic cameras of the property 120 (ora particular portion of the property 120). In this mode, all or aportion of the video analytics cameras may only be enabled (e.g., by themanagement system 102) when at least one door or window of the property120 is opened (e.g., the entrance 126). That is, the managements system102 can assume based on the doors and/or windows of the property beingclosed that the number of occupants in the property 120, or a certainportion of the property 120, will not change. As such, the system 100can conserve resources when additional image data would provide no orlimited security benefits.

As an example, in response to receiving instructions from anadministrator specifying that the cameras of the property 120 shouldenter a low-power consumption mode and based on the entrance 126 a beingclosed, the management system 102 may generate and transmit instructionsto the cameras 132 c-132 d to enter a sleep mode. However, the cameras132 a-132 b may remain in an active mode since they are monitoring theportion of the property 120 bounded by the virtual fence 202 a and willcontinue to monitor this portion of the property 120 to determine if anyof the persons 140 a-140 c step outside the bounds of the virtual fence202 a or if any other occupants (e.g., person 140 d) enter the virtualfence 202 a.

Additionally or alternatively, in this low-power consumption mode, videoanalytics cameras may only be enabled (e.g., by the management system102) when the authentication process is started at the access controlpoint 128 to determine if the access control point 128 should be opened.For example, if each of the persons 140 a-140 d are located outside thebounds of the virtual fence 202 a when the monitoring system 102receives instructions, the management system 102 can generate andtransmit instructions to each of the cameras 132 a-132 d to enter asleep mode. However, when an occupant brings a tag sufficiently close tothe tag reader 130 for the tag reader 130 to detect and/or acquireinformation from the tag, all or a portion of the cameras 132 a-132 d(e.g., the cameras 132 a-132 b) may be enabled and start activelymonitoring the portion of the property 120 defined by the virtual fence202 a. As an example, the management system 102 may, in response toreceiving a unique ID acquired by the tag reader 130, generate andtransmit instructions to the camera 132 a and the camera 132 b to enableboth cameras. As another example, the cameras 132 a-132 b may beactivated in response to directly receiving sensor data such as datafrom a motion sensor installed at the access control point 128 thatindicates that motion has been detected near the access control point128.

In some implementations, entering a low-power consumption mode includesdisabling only the cameras that are not monitoring an entrance of aproperty. For example, in response to determining that a low-powerconsumption mode should be entered, the management system 102 may sendinstructions only to the cameras 132 a-132 b to enter a low-power sleepmode.

In some implementations, entering a low-power consumption mode includesdisabling only the cameras that are not monitoring a virtual fence foran access control point of the property. For example, in response todetermining that a low-power consumption mode should be entered, themanagement system 102 may send instructions only to the cameras 132c-132 d to enter a low-power sleep mode.

When not enabled, the video analytic cameras may be turned off or be ina standby/sleep/low-power mode or an otherwise suspended state. Forexample, in response to receiving the instructions for a low-powerconsumption mode, the management system 102 can transmit instructions tothe cameras 132 a-132 d to enter a standby mode. After a certain amountof time passes and in response to detecting that the entrance 126 hasbeen opened, the management system 102 can transmit new instructions tothe cameras 132 a-132 d to wake from the standby mode, start collectingimage data, and/or transmitting image data to the management system 102.

In some implementations, the management system 102 or one or more othercomponents of the system 100 enters the low-power consumption modeautomatically. One or more factors may be used by the management system102 or the other components to determine when the low-power consumptionmode should be entered. These factors can include a time dimension suchas a time lapse, and/or an event dimensions such as door or windowopening event. For example, in response to determining that the entrance126 has not been opened for five minutes, the managements system 102 caninstruct all or a subset of the cameras 132 a-132 d to enter a sleepmode. Similarly, in response to receiving data indicating that theentrance 126 is closed and the access control point 128 is closed, thecameras 132 a-132 d can automatically enter a low-power mode.

As another example, after the management system 102 has completedanalyzing the image data collected by the cameras 132 a-132 d todetermine the number of people in the lobby area 124 when the entrance126 is closed, the management system 102 can generate instructions todisable the cameras 132 a-132 d until the entrance 126 is opened andtransmit the instructions to the cameras 132 a-132 d (or to amicrocontroller for the cameras 132 a-132 d).

In some implementations, the cameras 132 a-132 d are able to wakethemselves from a low-power consumption mode. For example, the cameras132 a-132 d may be configured to receive data directly from one or moreother sensors that acts as a triggering mechanism to wake the cameras132 a-132 d from standby or suspension. In more detail, the cameras 132a-132 d may receive data from a motion sensor installed at the entrance126 that detects when the entrance 126 is opened and/or when a personpasses through the entrance 126. In response to receiving sensor dataindicating that the entrance 126 has been opened and/or a person haspassed through the entrance 126, the cameras 132 a-132 d may wake fromtheir standby or suspension, start collecting image data, andtransmitting the image data to the management system 102.

In some implementations, the cameras 132 a-132 d can be wakened from alow-power mode within a few seconds. For example, the camera 132 a canwaken within one, two, or three seconds of receiving wake instructionsfrom the management system 102.

Entering a low-power consumption mode can save significant resources.For example, not only is power saved by having potentially multiplecameras turned off or in a low-power mode, but various types of computerresources can be conserved as well. For example, the amount of CPUhours, RAM, and memory spent on having to collect, store, and/or processimage data is reduced as result of disabling cameras. Other types ofresources can also be conserved when devices such as cameras enter thislow-power consumption mode. These other resources can include networkingresources such as bandwidth.

FIG. 3 is a flowchart of an example process for providing enhancedproperty access with video analytics. The process 300 can be performed,at least in part, using the system 100 described in FIG. 1 or themonitoring system 400 described in FIG. 4 . For example, the process 300can be performed by the management system 102.

The process 300 includes obtaining images of a first area captured by acamera (302). For example, as shown in FIG. 1 , the management system102 can use the cameras 132 a-132 d to acquire images 112 of the lobbyarea 124 in the property 120. The images 112 can be transmitted to themanagement system 102 as, for example, multiple static images files orone or more video files.

The first area can be a specific part of a property. For example, withrespect to FIG. 1 , the first area can be the lobby area 124. The firstarea may be selected automatically by the management system 102 or maybe selected manually by a user. For example, an administrator may selectthe lobby area 124 for monitoring to control the access control point128.

The first area may not be limited to a specific size or specific portionof a property. For example, the first area may have a dynamic size,shape, and/or location based on one or more factors discussed above withrespect to FIG. 2 and in more detail below. With respect to FIG. 2 , thefirst area can be defined by the virtual fence 202. The size and/orlocation of the virtual fence 202 can be based on one or more factors,such as a time of day, a detected number of unique individuals locatedin the property 120 or the lobby area 124 of the property, a detectednumber of individuals that have passed through the entrance 126 and/orthe access control point 128, an indication whether the entrance 126 isin an open or closed state, a detected number of unique individualslocated within the lobby area 124, a detected number of uniqueindividuals located within the lobby area 124 and a threshold distancefrom the access control point, a detected number of unique individualslocated within the lobby area 124 and a number of unique tags detectedby the tag reader 130, a detected number of unique individuals withinthe boundaries of the virtual fence, etc.

The size, shape, and/or location of the virtual fence may be dynamicallyadjusted using one or more factors to balance occupant convenience andsafety. For example, the management system 102 may adjust the size,shape, and/or location of the virtual fence based on the time of day,the detected amount of foot traffic in the property, and/or an expectedamount of foot traffic in the property (e.g., based on patterns of foottraffic corresponding to different times, days of the week, times of theyear, events, etc.).

As an example, the management system 102 can refer to a schedule forcontrolling the access control point 128. The schedule may include, forexample, various times or time ranges that correspond to differentvirtual fence sizes and/or locations. The schedule may indicate, forexample, that during the day (e.g., between the hours of 8:01 am and8:00 pm) when there is likely to be more persons physically located inthe lobby area 124, the management system 102 can reduce the size of thevirtual fence 202 and, thereby, improve convenience of personsattempting to pass through the access control point 128. By reducing thesize of the virtual fence 202 (e.g., from the size of the virtual fence202 b to the size of the virtual fence 202 a), the number of unique tagsrequired by the management system 102 to provide access through theaccess control point 128 can be lowered due to the increased likelihoodof there being less people located within the virtual fence 202.Accordingly, users attempting to pass through the access control point128 during the day are less likely to be denied entry by the managementsystem 102.

However, the schedule may indicate that at night (e.g., between thehours of 8:01 pm and 8:00 am), when security is prioritized overconvenience, the management system 102 is to increase the size of thevirtual fence 202. Security may be prioritized over convenience duringspecific times or time ranges based on an expected number of persons inthe lobby area 124, an expected amount of foot traffic in the property120 and/or through the access control point 128, and/or safety factors(e.g., more burglaries or break-ins expected to happen at night). Byincreasing the size of the virtual fence 202 (e.g., from the size of thevirtual fence 202 a to the size of the virtual fence 202 b), the numberof unique tags required by the management system 102 to provide accessthrough the access control point 128 can be increased due to theincreased likelihood of there being more people located within thevirtual fence 202. Accordingly, users attempting to pass through theaccess control point 128 during the night are more likely to be deniedentry by the management system 102. However, this also has the effect ofreducing unauthorized access to the residential area 122, therebyimproving safety afforded to occupants of the property 120.

When referring to a schedule, the management system 102 can determinethat a current time meets a particular time or a particular time range.The particular time or time range can correspond to an event for themanagement system 102 to adjust the virtual fence in a particular way,such as by adjusting the size, shape, and/or location of the virtualfence. For example, the schedule for a particular day may include afirst time range that corresponds to the virtual fence 202 a and asecond time range that corresponds to the virtual fence 202 b. Upondetecting that the current time crosses into the first time range, themanagement system 102 can decrease the size of the virtual fence to meetparticular, e.g., predetermined, dimensions. Similarly, upon detectingthat the current time crosses into the second time range, the managementsystem 102 can increase the size of the virtual fence to meetparticular, e.g., predetermined, dimensions. The first time range can bea time range within 24-hour period and the second time range can also bea time range within that 24-hour period. Here, the first time range canbe earlier in the 24-hour period than the second time range.

Continuing this example, the first time range can, in addition tooccurring within the 24-hour period, also correspond to first level offoot traffic that is expected in the property 120 or in a particularportion of the property 120 during the first time range. Similarly, thesecond time range can, in addition to occurring within the 24-hourperiod, also correspond to second level of foot traffic that isdifferent from the first level. The second level of foot traffic may bean amount of foot traffic expected (e.g., based on trends among historicdata) in the property 120 or in a particular portion of the property 120(e.g., the lobby area 124) during the second time range. As an example,the first level of foot traffic corresponding to the first time rangecan be greater than the second level of foot traffic corresponding tothe second time range, indicating that more foot traffic is expectedduring the first time range earlier in the day.

In some implementations, the dimensions of a virtual fence used forcontrolling one or more access points is not predetermined. For example,the management system 102 may determine dimensions using an algorithm(e.g., static algorithm, machine learning algorithm, or hybridalgorithm) and one or more input factors to determine the dimensions forthe virtual fence.

In some implementations, security is prioritized over convenience, orconvenience is prioritized over security based on one or more factors.The management system 102 may select settings for the virtual fencebased on whether security or convenience is presently prioritized. Forexample, as discussed above, the size and/or location of the virtualfence 202 a can correspond to a virtual fence state when convenience isprioritized over security. Similarly, the size and/or location of thevirtual fence 202 b can correspond to a virtual fence state whensecurity is prioritized over convenience.

In some implementations, the management system 102 uses one or morefactors to calculate a security score and a convenience score. Forexample, the management system 102 may use the time of day, the day ofthe week, and the expected level of foot traffic to calculate aconvenience score. Similarly, the management system 102 may use the timeof day and the day of the week to calculate a security score. Themanagement system 102 can use both the security score and theconvenience score to adjust the size and location of the virtual fence202. For example, the virtual fence 202 a can correspond to when themanagement system 102 calculates a convenience score of 0.5 and securityscore of 0.5. Similarly, the virtual fence 202 b can correspond to whenthe management system 102 calculates a convenience score of 0.1 and asecurity score of 0.9. The management system 102 may use one or morestatic or machine learning algorithms to determine the convenience scoreand/or security score.

In some implementations, the management system 102 uses at least onealgorithm to determine the size and/or location of virtual fences formanaging an access control point. For example, the management system 102may provide as input information indicating a time and date, whether theentrance 126 is open, and the detected number of individuals in thelobby area 124 as input to a machine learning model. The machinelearning model may be trained using past authorized/unauthorized accessrates, and/or occupant feedback. For example, the machine learning modelmay be a regression model trained to reduce unauthorized access rates(e.g., indicative of a level of security) and negative occupant feedback(e.g., indicative of a level of convenience). The machine learning modelmay generate an output that the management system 102 can interpret to aparticular size and/or location for the virtual fence. The managementsystem 102 can proceed to adjust the size and/or location of the virtualfence in accordance with the output of the machine learning model.

In some implementations, the size and/or location of the virtual fencecorresponds to a distance at which tags can be detected by the tagreader 130. For example, the minimum virtual fence size, the virtualfence location, and/or the virtual fence shape may correspond to thelocation of the tag reader 130 and the maximum distance that the tagreader 130 can detect tags.

The process 300 optionally includes detecting a change in the propertyand, based on the change, adjusting a size, shape, and/or location ofthe virtual fence. For example, in response to detecting that theentrance 126 of the property 120 has been opened, the management system102 can increase the size of the virtual fence 202 a. Similarly, inresponse to detecting that the entrance 126 of the property 120 hasclosed, the management system 102 can decrease the size of the virtualfence 202 b.

As another example, detecting a change in the property can includedetermining that a number of persons in a third area of the propertymeets a threshold number of persons. For example, the third area may bedefined by the lobby area 124. The management system 102 may use theimages 112 to determine the number of individuals within the lobby area124 and, based on this determination, adjust the size, shape, and/orlocation of the virtual fence 202. As shown in FIG. 2 , the virtualfence 202 can be located within the lobby area 124.

Continuing the example, the management system 102 may use otherinformation to determine the number of people located in the third area.For example, the management system 102 can receive data indicating anumber of persons that have entered the lobby area 124 from at least oneof an entrance 126 of the property 120 or an access control system ofthe property 120 (e.g., data indicating the number of persons that havepassed through the access control point 128 into the residential area122), and receive data indicating a number of persons that have exitedthe lobby area 124 from at least one of an entrance 126 or the accesscontrol system of the property e.g., data indicating the number ofpersons that have passed through the access control point 128 into thelobby area 124). The management system 102 can determine the currentnumber of persons in the lobby area 124 by taking the difference betweenthe number of persons that have entered the lobby area 124 and thenumber of persons that have exited the third area. The management system102 can compare the current number of persons in the lobby area 124 tothe threshold number of persons.

In some implementations, obtaining images of the first area capturedincludes obtaining images of an area defined by a virtual fence. Forexample, with respect to FIG. 2 , the management system 102 can use thecameras 132 a-132 d to capture images of a portion of the property 120defined by the virtual fence 202 a. As an example, if the managementsystem 102 adjusts the size, shape, and/or location of the virtual fence202, the management system 102 may send instructions to a subset of thecameras 132 a-132 d to adjust camera settings for that cameras in thesubset to better capture the portion of the property 120 defined by theadjusted virtual fence. For example, if the management system 102dynamically increases the size of the virtual fence 202, the managementsystem 102 may send instructions to each of the cameras 132 a-132 d towiden their aperture. As another example, if the management system 102dynamically moves or decreases the size of the virtual fence 202, themanagement system 102 may send instructions to a subset of the cameras132 a-132 d to adjust their position so that they are better aimed atthe adjusted virtual fence 202.

After adjusting the size, shape, and/or location of a virtual fence, themanagement system 102 can capture images of the portion of a propertydefined by the boundaries of the virtual fence (e.g., periodically or inresponse to particular events, such as the entrance 126 opening ormotion being detected) using one or more cameras or other sensors. Forexample, after increasing the size of the virtual fence 202 from thatdepicted by the virtual fence 202 b to that depicted by the virtualfence 202 a, the management system 102 may use the cameras 132 a-132 dto capture images of only the portion of the lobby area 124 locatedclosest to the access control point 128. As will be described in moredetail below, the management system 102 may proceed to use these imagesto determine the number of persons located within the boundaries of thevirtual fence 202 a.

The process 300 includes determining a number of persons in the firstarea from the images (304). For example, as shown in FIG. 1 , themanagement system 102 can use the images 112 to determine the number ofpersons located in the lobby area 124. Similarly, with respect to FIG. 2, the management system 102 can use the images 112 to determine thenumber of persons within the virtual fence 202 a and the virtual fence202 b.

In determining a number of persons in the first area from the images,the management system 102 can use one or more imaging techniques toidentify individual persons in the first area from the images. Forexample, the management system 102 can perform facial detection on theimages to determine a number of persons in the first area. Similarly,the management system 102 can perform facial recognition on the imagesto identify unique faces present in the first area and/or to identifypreviously identified persons present in the first area. For example,where there are two people located in the first area, the managementsystem 102 may perform facial recognition on the images that includerepresentations of the two people and extract two sets of facial featuredata as a result of performing the facial recognition. Based on thedetection of two faces or of two unique faces having different (e.g.,non-matching) facial features, the management system 102 can determinethat there are two people currently located in the first area.

Continuing the last example, the management system 102 can proceed tocompare the extracted feature data to stored feature data correspondingto previously identified persons, such as persons who have previouslyentered the first area. The management system 102 may identify a featurematch for the first person but fail to identify a feature match for thesecond person. In response, the management system 102 can determine thatthe second person has not been previously identified and can create aprofile for the second person that includes, for example, theircorresponding set of extracted features and/or images that include arepresentation of the second person.

Similarly, the management system 102 identify previously identifiedpersons from the images. For example, the management system 102 mayrefer to a database that store profiles for previously identifiedpersons. These profiles can include one or more images for each uniqueperson that has been detected (e.g., within a particular area, as havingpassed through the access control point 128, as having passed throughthe entrance 126 of the property 120, etc.). Additionally oralternatively, these profiles can include feature data such as extractedfacial feature data for each unique person that has been detected.

The process 300 optionally includes determining a threshold number ofunique identifications required based on the determined number ofpersons in the first area. For example, as shown in FIG. 1 , thethreshold number of unique identifications can the number of uniqueidentification required by the management system 102 to unlock theaccess control point 128. The threshold number can be, for example, 75%of the determined number of persons rounded up to the nearest person,60% of the determined number of persons rounded up to the nearestperson, 80% of the determined number of persons rounded up to thenearest person, equal to the determined number of persons, one less thanthe determine number of persons when there are at least two persons, twoless than the determined number of persons when there are at least fourpersons, equal to one when the determined number of persons is two orless, etc. The threshold number can also or alternatively depend on thetime of day, the detected foot traffic in the property, on whether theaccess control point includes a door or an elevator, etc.

The process 300 includes receiving data indicating one or more uniqueidentifications (306). For example, as shown in FIG. 1 , the data can bethe unique identifications 110. The unique identifications can eachcorrespond to a particular persons. A unique identification can beassigned to a person, such as to a resident of a property or to a guestof the property. The unique identification can be read by the tag reader130 shown in FIG. 1 reading a tag of a person using NFC, RFID,Bluetooth, or other type of wireless communication.

As an example, the management system 102 may receive NFC uniqueidentifications (UID) from NFC tags belonging to persons located in thelobby area 124 of the property 120. The management system 102 may havepreviously assigned the detected NFC tags to occupants of the property120. The tag reader 130 may detect the NFC tags present within athreshold distance from the NFC tag reader 130 and receive, from the NFCtags, UID for the NFC tags. The tag reader 130 can proceed to transmitthese UIDs to the management system 102.

In response to receiving the UIDs 110, the management system 102 cantake one or more actions. For example, the management system 102 maysimply compare the number of UIDs received to the detected number ofpersons located within the lobby area 124 or the virtual fence 202.Additionally or alternatively, the management system 102 may use theUIDs 110 to access profiles corresponding to different persons.

In some implementations, a UID can be used to look up a profile of acorresponding person. After accessing a profile, the management system102 can retrieve information from the profile that the management system102 can use to verify an identity of the person and/or can use todetermine whether to grant access through the access control point 128.For example, the management system 102 can use facial recognitiontechniques with the images 112 to verify that a person located in in thevirtual fence 202 that provided the UID has facial features that matchfacial features stored with a profile corresponding to the particularUID. This may be used to prevent unauthorized persons from gainingaccess through the access control point 128 who have stolen or otherwiseimpermissibly acquired a tag of a different person who is permitted totravel through the access control point 128.

As another an example, the management system 102 may compare the numberof UIDs in the UIDs 110 to the number of persons located in the virtualfence 202 a to determine whether it should generate instructions toprovide access to persons through the access control point 128. However,the management system 102 may also use the UIDs 110 to lookupcorresponding profiles to determine if any persons in the lobby area 124are not permitted to gain access. For example, a profile for a personmay indicate that they have been prohibited from entering the property120. Upon receiving a UID that corresponds to this prohibited person,the management system 102 may (i) generate instructions for the accesscontrol point 128 to deny access or (ii) delay transmitting instructionsto provide access through the access control point 128 until the tagreader 130 stops detecting the particular UID. The management system 102may also generate and transmit a notification, e.g., to a securitysystem, indicating that a prohibited persons is located in the property120.

In some implementations, the management system 102 does not look upprofiles in response to receiving UIDs.

The process 300 includes determining a number of persons who areauthorized to access a second area (308). For example, with respect toFIG. 1 , determining a number of persons who are authorized to access asecond area can include the management system 102 determining a numberof persons who are authorized to access a second area based on the dataindicating one or more unique identifications. For example, uponreceiving the UIDs 110, the management system 102 may first determinethe number of unique IDs among the UIDs 110. This number may representthe number of persons who are authorized to access the second area. Forexample, if the management system 102 determines that there two UIDs inthe UIDs 110, the management system 102 may determine that two personsare permitted to access the residential area 122 through the accesscontrol point 128.

As another example, the management system 102 may use the determinednumber of unique IDs to calculate a number of persons who are authorizedto access the second area. That is, the number of unique IDs may serveas a variable in an algorithm used and/or selected by the managementsystem 102 to calculate the number of persons who are authorized toaccess the second area. The algorithm can include other variables thatcorrespond to other factors, such as the date, the time of day, thenumber of users located in the first area, the expected amount of foottraffic, etc. Alternatively, the management system 102 can select analgorithm abased on the data, the time of day, the number users locatedin the first area, the expected amount of foot traffic, etc.

The management system 102 can use these one or more algorithms toimprove the occupant convenience and security. For example, an algorithmused to calculate the number of persons who are permitted to passthrough the access control point 128 can include two variables, onevariable for the number of UIDs in the UIDs 110 and a second variablefor the time of day. When the time is 2:00 pm and the number of UIDs istwo, the algorithm may output a value of “4” indicating that fourpersons are permitted to access the residential area 122. The outputvalue being larger than the number of UIDs may be to account for a timeof day when (i) visitors are common and/or (ii) when there is asufficiently low likelihood of a security event (e.g., theft, burglary,assault, etc.). When the time is 1:00 am and the number of UIDs is two,the algorithm may output a value of “2” indicating that two persons arepermitted to access the residential area 122. The output value beingequal to the number of UIDs may be to account for a time of day when (i)visitors are less common and/or (ii) when there is a sufficiently lowlikelihood of a security event.

The process 300 optionally includes comparing the number of authorizedpersons with the number of persons in the first area. For example, withrespect to FIG. 1 , determining a number of persons who are authorizedto access a second area can include the management system 102 comparingthe number of authorized persons with the total number of persons in thelobby area 124. Similarly, with respect to FIG. 2 , determining a numberof persons who are authorized to access a second area can include themanagement system 102 comparing the number of authorized persons withthe total number of persons in the virtual fence 202. The managementsystem 102 can determine to provide access through the access controlpoint 128 if the number of authorized persons is equal to the number ofpersons in the first area, and/or if the number of authorized personsmeets a threshold number of persons. The threshold number of persons canbe the same as the threshold number of unique identifications requiredto provide access through the access control point 128. Accordingly,comparing the number of authorized persons with the number of persons inthe first area can include the management system 102 comparing thenumber of unique identifications with a determined threshold number ofunique identifications required to provide access through the accesscontrol point 128.

The process 300 includes providing access to the second area (310). Forexample, management system 102 can generate and send instructions to theaccess control point 128 to unlock the access control point 128.Unlocking the access control point 128 can include the management system102 unlocking one or more doors of the access control point 128, e.g.,for a predetermined amount of time such as one second, two seconds, fiveseconds, etc. Unlocking the access control point 128 can include themanagement system 102 permitting an elevator of the access control point128 to operate, allowing an elevator door of the elevator to close,unlocking one or more floors other than the lobby floor, etc. The accesscontrol point 128 can automatically relock after a predetermined amountof time has passed, e.g., after one second, after two seconds, afterfive seconds, etc.

In some implementations, the access control point 128 is a door andproviding access to the second area includes the management system 102providing instructions to the access control point 128 to unlock and/oropen the door. The door may be a revolving door, a sliding door, or atraditional door or set of doors.

In some implementations, the access control point 128 is a turnstile andproviding access to the second area includes the management system 102providing instructions to the access control point 128 to unlock theturnstile (e.g., for a predetermined number of turns). The turnstile maybe a waist-height turnstile or a full-height turnstile. The turnstilemay be an optical turnstile.

In some implementations, access to the second area is provided inresponse to determining that number of authorized persons meets athreshold number of persons. For example, with respect to FIG. 1 , themanagement system 102 can determine based on there being four persons140 a-140 d in the lobby area 124 that a threshold number of persons(e.g., a threshold number of required unique identifications) is three.Accordingly, if the management system 102 receives three uniqueidentifications from the tag reader 130 (e.g., with a threshold amountof time), the management system 102 can send instructions to the accesscontrol point 128 to unlock the access control point 128.

In some implementations, providing access to the second area includesgenerating instructions for an access control system that is configuredto (i) permit access to the second area from the first area in a firstmode and (ii) prevent access to the second area from the first area in asecond mode, and transmitting the instructions to the access controlsystem. The instructions can include instructions to place the accesscontrol system in the first mode to permit access to the second areafrom the first area. For example, the first mode can be an unlock modeor state, and the second mode can be a locked mode or state.

In some implementations, providing access to the second area includesproviding access to a set number of persons. For example, the accesscontrol point 128 can include one or more sensors for detecting thenumber of persons traveling through the access control point 128. Aftera set number of persons have traveled through the access control point128, the access control point 128 can automatically change a mode orstate. For example, the access control point 128 may receiveinstructions from the management system 102 specifying that threepersons are permitted to enter the residential area 122. Afterdetecting, e.g., using a motion sensor, three persons entering theelevator, the access control point 128 may take one or more actions. Forexample, the access control point 128 may close the elevator doors. Ifmore than three persons are detected entering the elevator, the accesscontrol point 128 may prevent the doors of the elevator from beingclosed and/or prevent the elevator from moving to a different flooruntil at least one person gets off the elevator.

The process 300 optionally includes determining that a number of the oneor more unique identifications meets a threshold number of uniqueidentifications. Here, providing access to the second area can includeproviding access to the second area based on the determination that thenumber of the one or more unique identifications meets the thresholdnumber of unique identifications. The threshold number of uniqueidentifications can dynamically depend on the number of persons detectedin the first area. For example, if there are four people in the virtualfence 202, the management system 102 may determine that a threshold ofthree UIDs is required to provide access through the access controlpoint 128. If two persons move out of the virtual fence 202, themanagement system 102 can update the threshold to two UIDs required toprovide access through the access control point 128.

In some implementations, determining that the number of the one or moreunique identifications meets the threshold number of uniqueidentifications includes calculating the threshold number of uniqueidentifications from the number of persons located in the first area,and determining that the number of the one or more uniqueidentifications is greater than or equal to the threshold number ofunique identifications. For example, if the management system 102receives two UIDs from tags located within the virtual fence 202, themanagement system 102 may determine that the threshold number of UIDsrequired is met and generate instructions to provide access through theaccess control point 128.

In some implementations, calculating a threshold number of uniqueidentifications includes applying a predetermined percentage to thenumber of persons located in the first area. For example, the managementsystem 102 may apply a percentage of 70% to determine the minimum numberof UIDs required from a group located within the virtual fence 202 toallow access to the residential area 122. The management system 102 mayround up and/or round down (e.g., may depend on the number of personsdetected in the first area). For example, if there are five personslocated within the virtual fence 202, the management system 102 mayapply the 70% and round down to determine that three UIDs are requiredto provide access. If the number drops to two persons located within thevirtual fence 202, the management system 102 may reapply the 70% butround up to determine that two UIDs are required to provide access.

In some implementations, applying the predetermined percentage includesselecting the predetermined percentage from multiple percentages basedon at least one of (i) the time of day, (ii) the number of persons inthe first area, (iii) the number of persons traveling through the firstarea, and (iv) a type of entry to the second area from the first area.For example, the number of persons traveling through the first area maybe the number of persons that the management system 102 has detected astraveling through the first area, or, alternatively, the number ofpersons that the management system 102 expects to travel through thefirst area based on trends in historic foot traffic records. As anotherexample, a type of entry to the second area from the first area caninclude, for example, an occupant entry (e.g., entry by an occupant thathas a tag), a visitor entry (e.g., entry by a person without a tag afteran occupant has indicated that a visitor is in the first area), or anemergency entry (e.g., entry by emergency personal after a manager oroccupant has indicated that an emergency is occurring, entry by anoccupant that indicates that they are experiencing an emergency, etc.).

In some implementations, calculating the threshold number of uniqueidentifications includes providing the number of persons located in thefirst area as input to an algorithm, and receiving an output of thealgorithm. For example, as discussed above, the management system 102may use one or more static or machine learning algorithms to dynamicallydetermine the threshold number of UIDs required to provide accessthrough the access control point 128. The output of the one or morealgorithms can be based on input that includes the number of personscurrently located in the lobby area 124 or in the virtual fence 202. Theoutput of the one or more algorithms can be based on other input aswell, such as the time of day, day of week, time of year, events takingplace, etc. The output of the one or more algorithms can be thethreshold number of UIDs or can be interpreted by the management system102 to determine the threshold number of UIDs. For example, themanagement system 102 can provide as input to an algorithm a first inputindicating that three persons are detected within the virtual fence 202,a second input indicating the date, and a third input indicating thetime. Based on there being three persons in the virtual fence, the dateindicating that the current day is a Saturday, and the time being 2:00am, the output of the algorithm can indicate that three UIDs arerequired to gain access through the access control point 128.

In some implementations, calculating the threshold number of uniqueidentifications includes providing at least one of (i) the time of day,(ii) the number of persons in the first area, (iii) the number ofpersons traveling through the first area, and (iv) a type of entry tothe second area from the first area as input to the algorithm. Theoutput of the algorithm can be based on the number of persons located inthe first area and at least one of (i) the time of day, (ii) the numberof persons in the first area, (iii) the number of persons travelingthrough the first area, and (iv) a type of entry to the second area fromthe first area as input to the algorithm.

FIG. 4 is a block diagram illustrating an example of a home monitoringsystem 400. The monitoring system 400 includes a network 405, a controlunit 410, one or more user devices 440 and 450, a monitoring server 460,and a central alarm station server 470. In some examples, the network405 facilitates communications between the control unit 410, the one ormore user devices 440 and 450, the monitoring server 460, and thecentral alarm station server 470.

The network 405 is configured to enable exchange of electroniccommunications between devices connected to the network 405. Forexample, the network 405 may be configured to enable exchange ofelectronic communications between the control unit 410, the one or moreuser devices 440 and 450, the monitoring server 460, and the centralalarm station server 470. The network 405 may include, for example, oneor more of the Internet, Wide Area Networks (WANs), Local Area Networks(LANs), analog or digital wired and wireless telephone networks (e.g., apublic switched telephone network (PSTN), Integrated Services DigitalNetwork (ISDN), a cellular network, and Digital Subscriber Line (DSL)),radio, television, cable, satellite, or any other delivery or tunnelingmechanism for carrying data. Network 405 may include multiple networksor subnetworks, each of which may include, for example, a wired orwireless data pathway. The network 405 may include a circuit-switchednetwork, a packet-switched data network, or any other network able tocarry electronic communications (e.g., data or voice communications).For example, the network 405 may include networks based on the Internetprotocol (IP), asynchronous transfer mode (ATM), the PSTN,packet-switched networks based on IP, X.25, or Frame Relay, or othercomparable technologies and may support voice using, for example, VoIP,or other comparable protocols used for voice communications. The network405 may include one or more networks that include wireless data channelsand wireless voice channels. The network 405 may be a wireless network,a broadband network, or a combination of networks including a wirelessnetwork and a broadband network.

The control unit 410 includes a controller 412 and a network module 414.The controller 412 is configured to control a control unit monitoringsystem (e.g., a control unit system) that includes the control unit 410.In some examples, the controller 412 may include a processor or othercontrol circuitry configured to execute instructions of a program thatcontrols operation of a control unit system. In these examples, thecontroller 412 may be configured to receive input from sensors, flowmeters, or other devices included in the control unit system and controloperations of devices included in the household (e.g., speakers, lights,doors, etc.). For example, the controller 412 may be configured tocontrol operation of the network module 414 included in the control unit410.

The network module 414 is a communication device configured to exchangecommunications over the network 405. The network module 414 may be awireless communication module configured to exchange wirelesscommunications over the network 405. For example, the network module 414may be a wireless communication device configured to exchangecommunications over a wireless data channel and a wireless voicechannel. In this example, the network module 414 may transmit alarm dataover a wireless data channel and establish a two-way voice communicationsession over a wireless voice channel. The wireless communication devicemay include one or more of a LTE module, a GSM module, a radio modem,cellular transmission module, or any type of module configured toexchange communications in one of the following formats: LTE, GSM orGPRS, CDMA, EDGE or EGPRS, EV-DO or EVDO, UMTS, or IP.

The network module 414 also may be a wired communication moduleconfigured to exchange communications over the network 405 using a wiredconnection. For instance, the network module 414 may be a modem, anetwork interface card, or another type of network interface device. Thenetwork module 414 may be an Ethernet network card configured to enablethe control unit 410 to communicate over a local area network and/or theInternet. The network module 414 also may be a voice band modemconfigured to enable the alarm panel to communicate over the telephonelines of Plain Old Telephone Systems (POTS).

The control unit system that includes the control unit 410 includes oneor more sensors. For example, the monitoring system may include multiplesensors 420. The sensors 420 may include a lock sensor, a contactsensor, a motion sensor, or any other type of sensor included in acontrol unit system. The sensors 420 also may include an environmentalsensor, such as a temperature sensor, a water sensor, a rain sensor, awind sensor, a light sensor, a smoke detector, a carbon monoxidedetector, an air quality sensor, etc. The sensors 420 further mayinclude a health monitoring sensor, such as a prescription bottle sensorthat monitors taking of prescriptions, a blood pressure sensor, a bloodsugar sensor, a bed mat configured to sense presence of liquid (e.g.,bodily fluids) on the bed mat, etc. In some examples, thehealth-monitoring sensor can be a wearable sensor that attaches to auser in the home. The health-monitoring sensor can collect varioushealth data, including pulse, heart rate, respiration rate, sugar orglucose level, bodily temperature, or motion data.

The sensors 420 can also include a radio-frequency identification (RFID)sensor that identifies a particular article that includes a pre-assignedRFID tag.

The control unit 410 communicates with the home automation controls 422and a camera 430 to perform monitoring. The home automation controls 422are connected to one or more devices that enable automation of actionsin the home. For instance, the home automation controls 422 may beconnected to one or more lighting systems and may be configured tocontrol operation of the one or more lighting systems. In addition, thehome automation controls 422 may be connected to one or more electroniclocks at the home and may be configured to control operation of the oneor more electronic locks (e.g., control Z-Wave locks using wirelesscommunications in the Z-Wave protocol). Further, the home automationcontrols 422 may be connected to one or more appliances at the home andmay be configured to control operation of the one or more appliances.The home automation controls 422 may include multiple modules that areeach specific to the type of device being controlled in an automatedmanner. The home automation controls 422 may control the one or moredevices based on commands received from the control unit 410. Forinstance, the home automation controls 422 may cause a lighting systemto illuminate an area to provide a better image of the area whencaptured by a camera 430.

The camera 430 may be a video/photographic camera or other type ofoptical sensing device configured to capture images. For instance, thecamera 430 may be configured to capture images of an area within abuilding or home monitored by the control unit 410. The camera 430 maybe configured to capture single, static images of the area and alsovideo images of the area in which multiple images of the area arecaptured at a relatively high frequency (e.g., thirty images persecond). The camera 430 may be controlled based on commands receivedfrom the control unit 410.

The camera 430 may be triggered by several different types oftechniques. For instance, a Passive Infra-Red (PIR) motion sensor may bebuilt into the camera 430 and used to trigger the camera 430 to captureone or more images when motion is detected. The camera 430 also mayinclude a microwave motion sensor built into the camera and used totrigger the camera 430 to capture one or more images when motion isdetected. The camera 430 may have a “normally open” or “normally closed”digital input that can trigger capture of one or more images whenexternal sensors (e.g., the sensors 420, PIR, door/window, etc.) detectmotion or other events. In some implementations, the camera 430 receivesa command to capture an image when external devices detect motion oranother potential alarm event. The camera 430 may receive the commandfrom the controller 412 or directly from one of the sensors 420.

In some examples, the camera 430 triggers integrated or externalilluminators (e.g., Infra-Red, Z-wave controlled “white” lights, lightscontrolled by the home automation controls 422, etc.) to improve imagequality when the scene is dark. An integrated or separate light sensormay be used to determine if illumination is desired and may result inincreased image quality.

The camera 430 may be programmed with any combination of time/dayschedules, system “arming state”, or other variables to determinewhether images should be captured or not when triggers occur. The camera430 may enter a low-power mode when not capturing images. In this case,the camera 430 may wake periodically to check for inbound messages fromthe controller 412. The camera 430 may be powered by internal,replaceable batteries if located remotely from the control unit 410. Thecamera 430 may employ a small solar cell to recharge the battery whenlight is available. Alternatively, the camera 430 may be powered by thecontroller 412's power supply if the camera 430 is co-located with thecontroller 412.

In some implementations, the camera 430 communicates directly with themonitoring server 460 over the Internet. In these implementations, imagedata captured by the camera 430 does not pass through the control unit410 and the camera 430 receives commands related to operation from themonitoring server 460.

The system 400 also includes thermostat 434 to perform dynamicenvironmental control at the home. The thermostat 434 is configured tomonitor temperature and/or energy consumption of an HVAC systemassociated with the thermostat 434, and is further configured to providecontrol of environmental (e.g., temperature) settings. In someimplementations, the thermostat 434 can additionally or alternativelyreceive data relating to activity at a home and/or environmental data ata home, e.g., at various locations indoors and outdoors at the home. Thethermostat 434 can directly measure energy consumption of the HVACsystem associated with the thermostat, or can estimate energyconsumption of the HVAC system associated with the thermostat 434, forexample, based on detected usage of one or more components of the HVACsystem associated with the thermostat 434. The thermostat 434 cancommunicate temperature and/or energy monitoring information to or fromthe control unit 410 and can control the environmental (e.g.,temperature) settings based on commands received from the control unit410.

In some implementations, the thermostat 434 is a dynamicallyprogrammable thermostat and can be integrated with the control unit 410.For example, the dynamically programmable thermostat 434 can include thecontrol unit 410, e.g., as an internal component to the dynamicallyprogrammable thermostat 434. In addition, the control unit 410 can be agateway device that communicates with the dynamically programmablethermostat 434. In some implementations, the thermostat 434 iscontrolled via one or more home automation controls 422.

A module 437 is connected to one or more components of an HVAC systemassociated with a home, and is configured to control operation of theone or more components of the HVAC system. In some implementations, themodule 437 is also configured to monitor energy consumption of the HVACsystem components, for example, by directly measuring the energyconsumption of the HVAC system components or by estimating the energyusage of the one or more HVAC system components based on detecting usageof components of the HVAC system. The module 437 can communicate energymonitoring information and the state of the HVAC system components tothe thermostat 434 and can control the one or more components of theHVAC system based on commands received from the thermostat 434.

In some examples, the system 400 further includes one or more roboticdevices 490. The robotic devices 490 may be any type of robots that arecapable of moving and taking actions that assist in home monitoring. Forexample, the robotic devices 490 may include drones that are capable ofmoving throughout a home based on automated control technology and/oruser input control provided by a user. In this example, the drones maybe able to fly, roll, walk, or otherwise move about the home. The dronesmay include helicopter type devices (e.g., quad copters), rollinghelicopter type devices (e.g., roller copter devices that can fly androll along the ground, walls, or ceiling) and land vehicle type devices(e.g., automated cars that drive around a home). In some cases, therobotic devices 490 may be devices that are intended for other purposesand merely associated with the system 400 for use in appropriatecircumstances. For instance, a robotic vacuum cleaner device may beassociated with the monitoring system 400 as one of the robotic devices490 and may be controlled to take action responsive to monitoring systemevents.

In some examples, the robotic devices 490 automatically navigate withina home. In these examples, the robotic devices 490 include sensors andcontrol processors that guide movement of the robotic devices 490 withinthe home. For instance, the robotic devices 490 may navigate within thehome using one or more cameras, one or more proximity sensors, one ormore gyroscopes, one or more accelerometers, one or more magnetometers,a global positioning system (GPS) unit, an altimeter, one or more sonaror laser sensors, and/or any other types of sensors that aid innavigation about a space. The robotic devices 490 may include controlprocessors that process output from the various sensors and control therobotic devices 490 to move along a path that reaches the desireddestination and avoids obstacles. In this regard, the control processorsdetect walls or other obstacles in the home and guide movement of therobotic devices 490 in a manner that avoids the walls and otherobstacles.

In addition, the robotic devices 490 may store data that describesattributes of the home. For instance, the robotic devices 490 may storea floorplan and/or a three-dimensional model of the home that enablesthe robotic devices 490 to navigate the home. During initialconfiguration, the robotic devices 490 may receive the data describingattributes of the home, determine a frame of reference to the data(e.g., a home or reference location in the home), and navigate the homebased on the frame of reference and the data describing attributes ofthe home. Further, initial configuration of the robotic devices 490 alsomay include learning of one or more navigation patterns in which a userprovides input to control the robotic devices 490 to perform a specificnavigation action (e.g., fly to an upstairs bedroom and spin aroundwhile capturing video and then return to a home charging base). In thisregard, the robotic devices 490 may learn and store the navigationpatterns such that the robotic devices 490 may automatically repeat thespecific navigation actions upon a later request.

In some examples, the robotic devices 490 may include data capture andrecording devices. In these examples, the robotic devices 490 mayinclude one or more cameras, one or more motion sensors, one or moremicrophones, one or more biometric data collection tools, one or moretemperature sensors, one or more humidity sensors, one or more air flowsensors, and/or any other types of sensors that may be useful incapturing monitoring data related to the home and users in the home. Theone or more biometric data collection tools may be configured to collectbiometric samples of a person in the home with or without contact of theperson. For instance, the biometric data collection tools may include afingerprint scanner, a hair sample collection tool, a skin cellcollection tool, and/or any other tool that allows the robotic devices490 to take and store a biometric sample that can be used to identifythe person (e.g., a biometric sample with DNA that can be used for DNAtesting).

In some implementations, the robotic devices 490 may include outputdevices. In these implementations, the robotic devices 490 may includeone or more displays, one or more speakers, and/or any type of outputdevices that allow the robotic devices 490 to communicate information toa nearby user.

The robotic devices 490 also may include a communication module thatenables the robotic devices 490 to communicate with the control unit410, each other, and/or other devices. The communication module may be awireless communication module that allows the robotic devices 490 tocommunicate wirelessly. For instance, the communication module may be aWi-Fi module that enables the robotic devices 490 to communicate over alocal wireless network at the home. The communication module further maybe a 900 MHz wireless communication module that enables the roboticdevices 490 to communicate directly with the control unit 410. Othertypes of short-range wireless communication protocols, such asBluetooth, Bluetooth LE, Z-wave, Zigbee, etc., may be used to allow therobotic devices 490 to communicate with other devices in the home. Insome implementations, the robotic devices 490 may communicate with eachother or with other devices of the system 400 through the network 405.

The robotic devices 490 further may include processor and storagecapabilities. The robotic devices 490 may include any suitableprocessing devices that enable the robotic devices 490 to operateapplications and perform the actions described throughout thisdisclosure. In addition, the robotic devices 490 may include solid-stateelectronic storage that enables the robotic devices 490 to storeapplications, configuration data, collected sensor data, and/or anyother type of information available to the robotic devices 490.

The robotic devices 490 are associated with one or more chargingstations. The charging stations may be located at predefined home baseor reference locations in the home. The robotic devices 490 may beconfigured to navigate to the charging stations after completion oftasks needed to be performed for the monitoring system 400. Forinstance, after completion of a monitoring operation or upon instructionby the control unit 410, the robotic devices 490 may be configured toautomatically fly to and land on one of the charging stations. In thisregard, the robotic devices 490 may automatically maintain a fullycharged battery in a state in which the robotic devices 490 are readyfor use by the monitoring system 400.

The charging stations may be contact based charging stations and/orwireless charging stations. For contact based charging stations, therobotic devices 490 may have readily accessible points of contact thatthe robotic devices 490 are capable of positioning and mating with acorresponding contact on the charging station. For instance, ahelicopter type robotic device may have an electronic contact on aportion of its landing gear that rests on and mates with an electronicpad of a charging station when the helicopter type robotic device landson the charging station. The electronic contact on the robotic devicemay include a cover that opens to expose the electronic contact when therobotic device is charging and closes to cover and insulate theelectronic contact when the robotic device is in operation.

For wireless charging stations, the robotic devices 490 may chargethrough a wireless exchange of power. In these cases, the roboticdevices 490 need only locate themselves closely enough to the wirelesscharging stations for the wireless exchange of power to occur. In thisregard, the positioning needed to land at a predefined home base orreference location in the home may be less precise than with a contactbased charging station. Based on the robotic devices 490 landing at awireless charging station, the wireless charging station outputs awireless signal that the robotic devices 490 receive and convert to apower signal that charges a battery maintained on the robotic devices490.

In some implementations, each of the robotic devices 490 has acorresponding and assigned charging station such that the number ofrobotic devices 490 equals the number of charging stations. In theseimplementations, the robotic devices 490 always navigate to the specificcharging station assigned to that robotic device. For instance, a firstrobotic device may always use a first charging station and a secondrobotic device may always use a second charging station.

In some examples, the robotic devices 490 may share charging stations.For instance, the robotic devices 490 may use one or more communitycharging stations that are capable of charging multiple robotic devices490. The community charging station may be configured to charge multiplerobotic devices 490 in parallel. The community charging station may beconfigured to charge multiple robotic devices 490 in serial such thatthe multiple robotic devices 490 take turns charging and, when fullycharged, return to a predefined home base or reference location in thehome that is not associated with a charger. The number of communitycharging stations may be less than the number of robotic devices 490.

In addition, the charging stations may not be assigned to specificrobotic devices 490 and may be capable of charging any of the roboticdevices 490. In this regard, the robotic devices 490 may use anysuitable, unoccupied charging station when not in use. For instance,when one of the robotic devices 490 has completed an operation or is inneed of battery charge, the control unit 410 references a stored tableof the occupancy status of each charging station and instructs therobotic device to navigate to the nearest charging station that isunoccupied.

The system 400 further includes one or more integrated security devices480. The one or more integrated security devices may include any type ofdevice used to provide alerts based on received sensor data. Forinstance, the one or more control units 410 may provide one or morealerts to the one or more integrated security input/output devices 480.Additionally, the one or more control units 410 may receive one or moresensor data from the sensors 420 and determine whether to provide analert to the one or more integrated security input/output devices 480.

The sensors 420, the home automation controls 422, the camera 430, thethermostat 434, and the integrated security devices 480 may communicatewith the controller 412 over communication links 424, 426, 428, 432,438, and 484. The communication links 424, 426, 428, 432, 438, and 484may be a wired or wireless data pathway configured to transmit signalsfrom the sensors 420, the home automation controls 422, the camera 430,the thermostat 434, and the integrated security devices 480 to thecontroller 412. The sensors 420, the home automation controls 422, thecamera 430, the thermostat 434, and the integrated security devices 480may continuously transmit sensed values to the controller 412,periodically transmit sensed values to the controller 412, or transmitsensed values to the controller 412 in response to a change in a sensedvalue.

The communication links 424, 426, 428, 432, 438, and 484 may include alocal network. The sensors 420, the home automation controls 422, thecamera 430, the thermostat 434, and the integrated security devices 480,and the controller 412 may exchange data and commands over the localnetwork. The local network may include 802.11 “Wi-Fi” wireless Ethernet(e.g., using low-power Wi-Fi chipsets), Z-Wave, Zigbee, Bluetooth,“Homeplug” or other “Powerline” networks that operate over AC wiring,and a Category 5 (CAT5) or Category 6 (CAT6) wired Ethernet network. Thelocal network may be a mesh network constructed based on the devicesconnected to the mesh network.

The monitoring server 460 is an electronic device configured to providemonitoring services by exchanging electronic communications with thecontrol unit 410, the one or more user devices 440 and 450, and thecentral alarm station server 470 over the network 405. For example, themonitoring server 460 may be configured to monitor events generated bythe control unit 410. In this example, the monitoring server 460 mayexchange electronic communications with the network module 414 includedin the control unit 410 to receive information regarding events detectedby the control unit 410. The monitoring server 460 also may receiveinformation regarding events from the one or more user devices 440 and450.

In some examples, the monitoring server 460 may route alert datareceived from the network module 414 or the one or more user devices 440and 450 to the central alarm station server 470. For example, themonitoring server 460 may transmit the alert data to the central alarmstation server 470 over the network 405.

The monitoring server 460 may store sensor and image data received fromthe monitoring system and perform analysis of sensor and image datareceived from the monitoring system. Based on the analysis, themonitoring server 460 may communicate with and control aspects of thecontrol unit 410 or the one or more user devices 440 and 450.

The monitoring server 460 may provide various monitoring services to thesystem 400. For example, the monitoring server 460 may analyze thesensor, image, and other data to determine an activity pattern of aresident of the home monitored by the system 400. In someimplementations, the monitoring server 460 may analyze the data foralarm conditions or may determine and perform actions at the home byissuing commands to one or more of the controls 422, possibly throughthe control unit 410.

The monitoring server 460 can be configured to provide information(e.g., activity patterns) related to one or more residents of the homemonitored by the system 400. For example, one or more of the sensors420, the home automation controls 422, the camera 430, the thermostat434, and the integrated security devices 480 can collect data related toa resident including location information (e.g., if the resident is homeor is not home) and provide location information to the thermostat 434.

The central alarm station server 470 is an electronic device configuredto provide alarm monitoring service by exchanging communications withthe control unit 410, the one or more user devices 440 and 450, and themonitoring server 460 over the network 405. For example, the centralalarm station server 470 may be configured to monitor alerting eventsgenerated by the control unit 410. In this example, the central alarmstation server 470 may exchange communications with the network module414 included in the control unit 410 to receive information regardingalerting events detected by the control unit 410. The central alarmstation server 470 also may receive information regarding alertingevents from the one or more user devices 440 and 450 and/or themonitoring server 460.

The central alarm station server 470 is connected to multiple terminals472 and 474. The terminals 472 and 474 may be used by operators toprocess alerting events. For example, the central alarm station server470 may route alerting data to the terminals 472 and 474 to enable anoperator to process the alerting data. The terminals 472 and 474 mayinclude general-purpose computers (e.g., desktop personal computers,workstations, or laptop computers) that are configured to receivealerting data from a server in the central alarm station server 470 andrender a display of information based on the alerting data. Forinstance, the controller 412 may control the network module 414 totransmit, to the central alarm station server 470, alerting dataindicating that a sensor 420 detected motion from a motion sensor viathe sensors 420. The central alarm station server 470 may receive thealerting data and route the alerting data to the terminal 472 forprocessing by an operator associated with the terminal 472. The terminal472 may render a display to the operator that includes informationassociated with the alerting event (e.g., the lock sensor data, themotion sensor data, the contact sensor data, etc.) and the operator mayhandle the alerting event based on the displayed information.

In some implementations, the terminals 472 and 474 may be mobile devicesor devices designed for a specific function. Although FIG. 4 illustratestwo terminals for brevity, actual implementations may include more (and,perhaps, many more) terminals.

The one or more authorized user devices 440 and 450 are devices thathost and display user interfaces. For instance, the user device 440 is amobile device that hosts or runs one or more native applications (e.g.,the home monitoring application 442). The user device 440 may be acellular phone or a non-cellular locally networked device with adisplay. The user device 440 may include a cell phone, a smart phone, atablet PC, a personal digital assistant (“PDA”), or any other portabledevice configured to communicate over a network and display information.For example, implementations may also include Blackberry-type devices(e.g., as provided by Research in Motion), electronic organizers,iPhone-type devices (e.g., as provided by Apple), iPod devices (e.g., asprovided by Apple) or other portable music players, other communicationdevices, and handheld or portable electronic devices for gaming,communications, and/or data organization. The user device 440 mayperform functions unrelated to the monitoring system, such as placingpersonal telephone calls, playing music, playing video, displayingpictures, browsing the Internet, maintaining an electronic calendar,etc.

The user device 440 includes a home monitoring application 452. The homemonitoring application 442 refers to a software/firmware program runningon the corresponding mobile device that enables the user interface andfeatures described throughout. The user device 440 may load or installthe home monitoring application 442 based on data received over anetwork or data received from local media. The home monitoringapplication 442 runs on mobile devices platforms, such as iPhone, iPodtouch, Blackberry, Google Android, Windows Mobile, etc. The homemonitoring application 442 enables the user device 440 to receive andprocess image and sensor data from the monitoring system.

The user device 440 may be a general-purpose computer (e.g., a desktoppersonal computer, a workstation, or a laptop computer) that isconfigured to communicate with the monitoring server 460 and/or thecontrol unit 410 over the network 405. The user device 440 may beconfigured to display a smart home user interface 452 that is generatedby the user device 440 or generated by the monitoring server 460. Forexample, the user device 440 may be configured to display a userinterface (e.g., a web page) provided by the monitoring server 460 thatenables a user to perceive images captured by the camera 430 and/orreports related to the monitoring system. Although FIG. 4 illustratestwo user devices for brevity, actual implementations may include more(and, perhaps, many more) or fewer user devices.

In some implementations, the one or more user devices 440 and 450communicate with and receive monitoring system data from the controlunit 410 using the communication link 438. For instance, the one or moreuser devices 440 and 450 may communicate with the control unit 410 usingvarious local wireless protocols such as Wi-Fi, Bluetooth, Z-wave,Zigbee, HomePlug (ethernet over power line), or wired protocols such asEthernet and USB, to connect the one or more user devices 440 and 450 tolocal security and automation equipment. The one or more user devices440 and 450 may connect locally to the monitoring system and its sensorsand other devices. The local connection may improve the speed of statusand control communications because communicating through the network 405with a remote server (e.g., the monitoring server 460) may besignificantly slower.

Although the one or more user devices 440 and 450 are shown ascommunicating with the control unit 410, the one or more user devices440 and 450 may communicate directly with the sensors and other devicescontrolled by the control unit 410. In some implementations, the one ormore user devices 440 and 450 replace the control unit 410 and performthe functions of the control unit 410 for local monitoring and longrange/offsite communication.

In other implementations, the one or more user devices 440 and 450receive monitoring system data captured by the control unit 410 throughthe network 405. The one or more user devices 440, 450 may receive thedata from the control unit 410 through the network 405 or the monitoringserver 460 may relay data received from the control unit 410 to the oneor more user devices 440 and 450 through the network 405. In thisregard, the monitoring server 460 may facilitate communication betweenthe one or more user devices 440 and 450 and the monitoring system.

In some implementations, the one or more user devices 440 and 450 may beconfigured to switch whether the one or more user devices 440 and 450communicate with the control unit 410 directly (e.g., through link 438)or through the monitoring server 460 (e.g., through network 405) basedon a location of the one or more user devices 440 and 450. For instance,when the one or more user devices 440 and 450 are located close to thecontrol unit 410 and in range to communicate directly with the controlunit 410, the one or more user devices 440 and 450 use directcommunication. When the one or more user devices 440 and 450 are locatedfar from the control unit 410 and not in range to communicate directlywith the control unit 410, the one or more user devices 440 and 450 usecommunication through the monitoring server 460.

Although the one or more user devices 440 and 450 are shown as beingconnected to the network 405, in some implementations, the one or moreuser devices 440 and 450 are not connected to the network 405. In theseimplementations, the one or more user devices 440 and 450 communicatedirectly with one or more of the monitoring system components and nonetwork (e.g., Internet) connection or reliance on remote servers isneeded.

In some implementations, the one or more user devices 440 and 450 areused in conjunction with only local sensors and/or local devices in ahouse. In these implementations, the system 400 includes the one or moreuser devices 440 and 450, the sensors 420, the home automation controls422, the camera 430, and the robotic devices 490. The one or more userdevices 440 and 450 receive data directly from the sensors 420, the homeautomation controls 422, the camera 430, and the robotic devices 490,and sends data directly to the sensors 420, the home automation controls422, the camera 430, and the robotic devices 490. The one or more userdevices 440, 450 provide the appropriate interfaces/processing toprovide visual surveillance and reporting.

In other implementations, the system 400 further includes network 405and the sensors 420, the home automation controls 422, the camera 430,the thermostat 434, and the robotic devices 490, and are configured tocommunicate sensor and image data to the one or more user devices 440and 450 over network 405 (e.g., the Internet, cellular network, etc.).In yet another implementation, the sensors 420, the home automationcontrols 422, the camera 430, the thermostat 434, and the roboticdevices 490 (or a component, such as a bridge/router) are intelligentenough to change the communication pathway from a direct local pathwaywhen the one or more user devices 440 and 450 are in close physicalproximity to the sensors 420, the home automation controls 422, thecamera 430, the thermostat 434, and the robotic devices 490 to a pathwayover network 405 when the one or more user devices 440 and 450 arefarther from the sensors 420, the home automation controls 422, thecamera 430, the thermostat 434, and the robotic devices 490.

In some examples, the system leverages GPS information from the one ormore user devices 440 and 450 to determine whether the one or more userdevices 440 and 450 are close enough to the sensors 420, the homeautomation controls 422, the camera 430, the thermostat 434, and therobotic devices 490 to use the direct local pathway or whether the oneor more user devices 440 and 450 are far enough from the sensors 420,the home automation controls 422, the camera 430, the thermostat 434,and the robotic devices 490 that the pathway over network 405 isrequired.

In other examples, the system leverages status communications (e.g.,pinging) between the one or more user devices 440 and 450 and thesensors 420, the home automation controls 422, the camera 430, thethermostat 434, and the robotic devices 490 to determine whethercommunication using the direct local pathway is possible. Ifcommunication using the direct local pathway is possible, the one ormore user devices 440 and 450 communicate with the sensors 420, the homeautomation controls 422, the camera 430, the thermostat 434, and therobotic devices 490 using the direct local pathway. If communicationusing the direct local pathway is not possible, the one or more userdevices 440 and 450 communicate with the sensors 420, the homeautomation controls 422, the camera 430, the thermostat 434, and therobotic devices 490 using the pathway over network 405.

In some implementations, the system 400 provides end users with accessto images captured by the camera 430 to aid in decision making. Thesystem 400 may transmit the images captured by the camera 430 over awireless WAN network to the user devices 440 and 450. Becausetransmission over a wireless WAN network may be relatively expensive,the system 400 can use several techniques to reduce costs whileproviding access to significant levels of useful visual information(e.g., compressing data, down-sampling data, sending data only overinexpensive LAN connections, or other techniques).

In some implementations, a state of the monitoring system and otherevents sensed by the monitoring system may be used to enable/disablevideo/image recording devices (e.g., the camera 430). In theseimplementations, the camera 430 may be set to capture images on aperiodic basis when the alarm system is armed in an “away” state, butset not to capture images when the alarm system is armed in a “home”state or disarmed. In addition, the camera 430 may be triggered to begincapturing images when the alarm system detects an event, such as analarm event, a door-opening event for a door that leads to an areawithin a field of view of the camera 430, or motion in the area withinthe field of view of the camera 430. In other implementations, thecamera 430 may capture images continuously, but the captured images maybe stored or transmitted over a network when needed.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus implementing thesetechniques may include appropriate input and output devices, a computerprocessor, and a computer program product tangibly embodied in amachine-readable storage device for execution by a programmableprocessor. A process implementing these techniques may be performed by aprogrammable processor executing a program of instructions to performdesired functions by operating on input data and generating appropriateoutput. The techniques may be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device.

Each computer program may be implemented in a high-level procedural orobject-oriented programming language, or in assembly or machine languageif desired; and in any case, the language may be a compiled orinterpreted language. Suitable processors include, by way of example,both general and special purpose microprocessors. Generally, a processorwill receive instructions and data from a read-only memory and/or arandom access memory. Storage devices suitable for tangibly embodyingcomputer program instructions and data include all forms of non-volatilememory, including by way of example semiconductor memory devices, suchas Erasable Programmable Read-Only Memory (EPROM), Electrically ErasableProgrammable Read-Only Memory (EEPROM), and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Anyof the foregoing may be supplemented by, or incorporated in, speciallydesigned ASICs (application-specific integrated circuits).

It will be understood that various modifications may be made. Forexample, other useful implementations could be achieved if steps of thedisclosed techniques were performed in a different order and/or ifcomponents in the disclosed systems were combined in a different mannerand/or replaced or supplemented by other components. Accordingly, otherimplementations are within the scope of the disclosure.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus implementing thesetechniques may include appropriate input and output devices, a computerprocessor, and a computer program product tangibly embodied in amachine-readable storage device for execution by a programmableprocessor. A process implementing these techniques may be performed by aprogrammable processor executing a program of instructions to performdesired functions by operating on input data and generating appropriateoutput. The techniques may be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device.

Each computer program may be implemented in a high-level procedural orobject-oriented programming language, or in assembly or machine languageif desired; and in any case, the language may be a compiled orinterpreted language. Suitable processors include, by way of example,both general and special purpose microprocessors. Generally, a processorwill receive instructions and data from a read-only memory and/or arandom access memory. Storage devices suitable for tangibly embodyingcomputer program instructions and data include all forms of non-volatilememory, including by way of example semiconductor memory devices, suchas Erasable Programmable Read-Only Memory (EPROM), Electrically ErasableProgrammable Read-Only Memory (EEPROM), and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Anyof the foregoing may be supplemented by, or incorporated in, speciallydesigned ASICs (application-specific integrated circuits).

It will be understood that various modifications may be made. Forexample, other useful implementations could be achieved if steps of thedisclosed techniques were performed in a different order and/or ifcomponents in the disclosed systems were combined in a different mannerand/or replaced or supplemented by other components. Accordingly, otherimplementations are within the scope of the disclosure.

What is claimed is:
 1. A computer-implemented method comprising:determining a quantity of one or more unique identifications, whereineach unique identification of the one or more unique identificationscorresponds to a person of a number of persons located at a property;calculating a threshold quantity of unique identifications from thenumber of persons located at the property, wherein calculating thethreshold quantity of unique identifications comprises applying apredetermined percentage to the number of persons located at theproperty; determining that the quantity of the one or more uniqueidentifications satisfies the threshold quantity of uniqueidentifications for providing access to an area of the property; and inresponse to determining the quantity of the one or more uniqueidentifications satisfies the threshold quantity of uniqueidentifications for providing access to the area of the property,providing access to the area of the property.
 2. Thecomputer-implemented method of claim 1, comprising: obtaining images ofan area defined by a virtual fence; and determining the number ofpersons located at the property comprises determining a number ofpersons located inside boundaries of the virtual fence.
 3. Thecomputer-implemented method of claim 2, comprising: detecting a changein the property; and based on the change in the property, adjusting asize of the virtual fence, wherein obtaining images of the area definedby the virtual fence comprises obtaining images of the area defined bythe virtual fence after the adjustment to the size of the virtual fence,and wherein determining the number of persons located inside theboundaries of the virtual fence comprises determining the number ofpersons located inside the boundaries of the virtual fence after theadjustment to the size of the virtual fence.
 4. The computer-implementedmethod of claim 3, wherein: detecting the change in the propertycomprises receiving data indicating that an entrance of the property isopen; and adjusting the size of the virtual fence comprises reducing thesize of the virtual fence based on the entrance of the property beingopen.
 5. The computer-implemented method of claim 3, wherein: detectingthe change in the property comprises determining that a current timemeets (i) a first time range or (ii) a second time range; and adjustingthe size of the virtual fence comprises (i) reducing the size of thevirtual fence based on the current time meeting the first time range or(ii) increasing the size of the virtual fence based on the current timemeeting the second time range.
 6. The computer-implemented method ofclaim 5, wherein: the first time range is a time range within atwenty-four hour period; the second time range is a time range withinthe twenty-four hour period; and the first time range is earlier in thetwenty-four hour period than the second time range.
 7. Thecomputer-implemented method of claim 5, wherein: the first time range isa time range (i) within a twenty-four hour period and (ii) thatcorresponds to a first amount of expected foot traffic in the property;the second time range is a time range (i) within the twenty-four hourperiod and (ii) that corresponds to a second amount of expected foottraffic in the property; and the first amount of expected foot trafficis greater than the second amount of expected foot traffic.
 8. Thecomputer-implemented method of claim 3, wherein detecting the change inthe property comprises determining that a number of persons in a secondarea of the property meets a threshold number of persons; and adjustingthe size of the virtual fence comprises (i) reducing the size of thevirtual fence or (ii) increasing the size of the virtual fence.
 9. Thecomputer-implemented method of claim 8, wherein the number of persons inthe second area include one or more of the number of persons located atthe property.
 10. The computer-implemented method of claim 8, whereindetermining that the number of persons in the second area meets thethreshold number of persons comprises determining a number of personslocated in the second area from the images.
 11. The computer-implementedmethod of claim 8, wherein determining that the number of persons in thesecond area meets the threshold number of persons comprises: receivingdata indicating a number of persons that have entered the second areafrom at least one of an entrance of the property or an access controlsystem of the property; receiving data indicating a number of personsthat have exited the second area from at least one of an entrance of theproperty or an access control system of the property; determining acurrent number of persons in the second area using the number of personsthat have entered the second area and the number of persons that haveexited the second area; and comparing the current number of persons inthe second area to the threshold number of persons.
 12. Thecomputer-implemented method of claim 1, wherein providing access to thearea of the property comprises: generating instructions for an accesscontrol system that is configured to (i) permit access to the area ofthe property in a first mode and (ii) prevent access to the area of theproperty in a second mode, wherein the instructions include instructionsto place the access control system in the first mode to permit access tothe area of the property; and transmitting the instructions to theaccess control system.
 13. The computer-implemented method of claim 1,wherein applying the predetermined percentage to the number of personslocated at the property to, in part, calculate the threshold quantity ofunique identifications from the number of persons located at theproperty comprises: adjusting the threshold quantity of uniqueidentifications using the number of persons located at the property,wherein adjusting includes one or more of (i) rounding up to a nearestwhole number of persons or (ii) rounding down to a nearest whole numberof persons.
 14. The computer-implemented method of claim 1, whereindetermining that the quantity of the one or more unique identificationssatisfies the threshold quantity of unique identifications for providingaccess to the area of the property comprises: determining that thequantity of the one or more unique identifications is greater than orequal to the threshold quantity of unique identifications.
 15. Thecomputer-implemented method of claim 1, wherein calculating thethreshold quantity of unique identifications comprises determining oneor more persons of the number of persons located at the property areauthorized to enter the area of the property.
 16. Thecomputer-implemented method of claim 1, wherein applying thepredetermined percentage comprises selecting the predeterminedpercentage from multiple percentages based on at least one of (i) a timeof day, (ii) the number of persons at the property, (iii) a number ofpersons traveling through a second area of the property, and (iv) a typeof entry to the area of the property.
 17. The computer-implementedmethod of claim 1, wherein calculating the threshold quantity of uniqueidentifications comprises: providing the number of persons located atthe property as input to an algorithm; and receiving an output of thealgorithm, wherein the output indicates the threshold quantity of uniqueidentifications.
 18. The computer-implemented method of claim 17,wherein calculating the threshold quantity of unique identificationscomprises providing at least one of (i) a time of day, (ii) the numberof persons at the property, (iii) a number of persons traveling througha second area of the property, and (iv) a type of entry to the area ofthe property as input to the algorithm, wherein the output of thealgorithm is based on the number of persons located at the property andat least one of (i) the time of day, (ii) the number of personstraveling through the second area of the property, and (iii) the type ofentry to the area of the property as input to the algorithm.
 19. Asystem comprising: one or more computers; and one or morecomputer-readable media storing instructions that, when executed, causethe one or more computers to perform operations comprising: determininga quantity of one or more unique identifications, wherein each uniqueidentification of the one or more unique identifications corresponds toa person of a number of persons located at a property; calculating athreshold quantity of unique identifications from the number of personslocated at the property, wherein calculating the threshold quantity ofunique identifications comprises applying a predetermined percentage tothe number of persons located at the property; determining that thequantity of the one or more unique identifications satisfies thethreshold quantity of unique identifications for providing access to anarea of the property; and in response to determining the quantity of theone or more unique identifications satisfies the threshold quantity ofunique identifications for providing access to the area of the property,providing access to the area of the property.
 20. One or morenon-transitory computer-readable media storing instructions that, whenexecuted by one or more computers, cause the one or more computers toperform operations comprising: determining a quantity of one or moreunique identifications, wherein each unique identification of the one ormore unique identifications corresponds to a person of a number ofpersons located at a property; calculating a threshold quantity ofunique identifications from the number of persons located at theproperty, wherein calculating the threshold quantity of uniqueidentifications comprises applying a predetermined percentage to thenumber of persons located at the property; determining that the quantityof the one or more unique identifications satisfies the thresholdquantity of unique identifications for providing access to an area ofthe property; and in response to determining the quantity of the one ormore unique identifications satisfies the threshold quantity of uniqueidentifications for providing access to the area of the property,providing access to the area of the property.