Sleep state monitoring

ABSTRACT

A method for operating a security and/or automation system is described. A sensor may identify when a first person is in a sleep state. The sensor may detect a disturbance in the sleep state, and alert a second person when the detected disturbance satisfies one or more disturbance parameters.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 14/692,375, titled: “Sleep State Monitoring”, filed on Apr. 21,2015. The disclosure of which is incorporated by reference herein in itsentirety.

BACKGROUND

The present disclosure, for example, relates to security and/orautomation systems, and more particularly to monitoring a person,sometimes a child, in the home environment.

Security and automation systems are widely deployed to provide varioustypes of communication and functional features such as monitoring,communication, notification, and/or others. These systems may be capableof supporting communication with a user through a communicationconnection or a system management action.

Managing the status of a person in a household can be a complicatedprocess. Depending on the age of the person, multiple factors may needto be tracked and monitored for a second person to feel the first personis adequately safe and healthy. Additionally, monitoring systems may bestand-alone systems not integrated into a more holistic approach tomonitoring.

SUMMARY

Parents often wish to monitor their small children and create a healthyenvironment for their children. While monitors and other devices exist,the devices are stand alone and perform singular functions. The presentsystems and methods provide an overall monitoring system that may belinked to an automation system to provide a holistic approach tomonitoring another person (e.g., a baby, an elderly person, etc).

In one embodiment, a method for operating a security and/or automationsystem is described. The method may comprise identifying, via a sensor,when a first person is in a sleep state, detecting, via the sensor, adisturbance in the sleep state, and alerting a second person when thedetected disturbance satisfies one or more disturbance parameters.

In another embodiment, detecting a disturbance in the sleep state mayfurther comprise audibly detecting, via the sensor, an audible indicatorassociated with the first person and starting a timer based at least inpart on the audible detection. The time may be reset if the audibleindicator ceases for a predetermined time duration. The second personmay be alerted if the timer satisfies a predetermined time threshold.The method may further include determining when the audible indicatorsatisfies a predetermined decibel threshold and alerting the secondperson based at least in part on the determining.

In some embodiments, the method may include identifying a location ofthe first person and deactivating one or more household alerts based atleast in part on the identified location. The method may includeanalyzing an acoustic signature of sounds associated with the firstperson. A state of the first person may be evaluated based at least inpart on the analyzing. The second person may be alerted if the acousticsignature satisfies a signature parameter. The method may additionallyinclude recording video data and audio data of the first person when thesleep state is disrupted, saving the video data and the audio data, andanalyzing the video data and the audio data to identify a cause of thedisturbance.

In some embodiments, the method may include tracking vital signs of thefirst person while the first person is in the sleep state andimmediately alerting emergency personnel when at least one of the vitalsigns satisfies an emergency threshold. The method may include savingvideo data, audio data, and sensor information for a predetermined timeperiod, the predetermined time period comprising a first time periodbefore the emergency threshold is satisfied until a second time periodafter the emergency threshold is satisfied. In some instances, themethod may include activating a soothing mechanism proximate a locationof the first person when the sleep state is disturbed. Detecting adisturbance in the sleep state may further comprise detecting when acurrent state of the first person requires a change. The sensor maycomprise at least one of a bed sensor, an audio sensor, a video sensor,a motion sensor, a camera, a microphone, a light sensor, or acombination thereof.

In further embodiments, an apparatus for security and/or automationsystems is described. The apparatus may include a processor, memory inelectronic communication with the processor, and instructions stored inthe memory. The instructions may be executable by the processor toidentify, via a sensor, when a first person is in a sleep state, detect,via the sensor, a disturbance in the sleep state, and alert a secondperson when the detected disturbance satisfies one or more disturbanceparameters.

In still further embodiments, a non-transitory computer-readable mediumstoring computer-executable code is described. The code may beexecutable by a processor to identify, via a sensor, when a first personis in a sleep state, detect, via the sensor, a disturbance in the sleepstate, and alert a second person when the detected disturbance satisfiesone or more disturbance parameters.

The foregoing has outlined rather broadly the features and technicaladvantages of examples according to this disclosure so that thefollowing detailed description may be better understood. Additionalfeatures and advantages will be described below. The conception andspecific examples disclosed may be readily utilized as a basis formodifying or designing other structures for carrying out the samepurposes of the present disclosure. Such equivalent constructions do notdepart from the scope of the appended claims. Characteristics of theconcepts disclosed herein—including their organization and method ofoperation—together with associated advantages will be better understoodfrom the following description when considered in connection with theaccompanying figures. Each of the figures is provided for the purpose ofillustration and description only, and not as a definition of the limitsof the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of the presentdisclosure may be realized by reference to the following drawings. Inthe appended figures, similar components or features may have the samereference label. Further, various components of the same type may bedistinguished by following a first reference label with a dash and asecond label that may distinguish among the similar components. However,features discussed for various components—including those having a dashand a second reference label—apply to other similar components. If onlythe first reference label is used in the specification, the descriptionis applicable to any one of the similar components having the same firstreference label irrespective of the second reference label.

FIG. 1 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 2 shows a block diagram of a device relating to a security and/oran automation system, in accordance with various aspects of thisdisclosure;

FIG. 3 shows a block diagram of a device relating to a security and/oran automation system, in accordance with various aspects of thisdisclosure;

FIG. 4 shows a block diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure;

FIG. 5 shows a swim diagram relating to a security and/or an automationsystem, in accordance with various aspects of this disclosure

FIG. 6 is a flow chart illustrating an example of a method relating to asecurity and/or an automation system, in accordance with various aspectsof this disclosure;

FIG. 7 is a flow chart illustrating an example of a method relating to asecurity and/or an automation system, in accordance with various aspectsof this disclosure; and

FIG. 8 is a flow chart illustrating an example of a method relating to asecurity and/or an automation system, in accordance with various aspectsof this disclosure.

DETAILED DESCRIPTION

The methods and systems contained herein may be used to monitor otherpeople requiring extra care, such as a disabled person, elderly person,sick person, or the like. One or more sensors may be proximate theperson being monitored, either as a wearable device or proximate theirlocation, such as next to a sleeping location. The sensors may trackvarious biometric readings as well as environmental factors to monitor astate of the first person.

The following description provides examples and is not limiting of thescope, applicability, and/or examples set forth in the claims. Changesmay be made in the function and/or arrangement of elements discussedwithout departing from the scope of the disclosure. Various examples mayomit, substitute, and/or add various procedures and/or components asappropriate. For instance, the methods described may be performed in anorder different from that described, and/or various steps may be added,omitted, and/or combined. Also, features described with respect to someexamples may be combined in other examples.

FIG. 1 illustrates an example of a communications system 100 inaccordance with various aspects of the disclosure. The communicationssystem 100 may include control panels 105, devices 115, a network 130,and/or sensors 150. The network 130 may provide user authentication,encryption, access authorization, tracking, Internet Protocol (IP)connectivity, and other access, calculation, modification, and/orfunctions. The control panels 105 may interface with the network 130through a first set of wired and/or wireless communication links 132 tocommunicate with one or more remote servers 145. The control panels 105may perform communication configuration, adjustment, and/or schedulingfor communication with the devices 115, or may operate under the controlof a controller. In various examples, the control panels 105 maycommunicate—either directly or indirectly (e.g., through network130)—with each other over a second set of wired and/or wirelesscommunication links 134. Control panels 105 may communicate with a backend server (such as the remote servers 145)—directly and/orindirectly—using the first set of one or more communication links 132.

The control panels 105 may wirelessly communicate with the devices 115via one or more antennas. Each of the control panels 105 may providecommunication coverage for a respective geographic coverage area 110. Insome examples, control panels 105 may be referred to as a controldevice, a base transceiver station, a radio base station, an accesspoint, a radio transceiver, or some other suitable terminology. Thegeographic coverage area 110 for a control panel 105 may be divided intosectors making up only a portion of the coverage area. Thecommunications system 100 may include control panels 105 of differenttypes. There may be overlapping geographic coverage areas 110 for one ormore different parameters, including different technologies, features,subscriber preferences, hardware, software, technology, and/or methods.For example, each control panel 105 may be related to one or morediscrete structures (e.g., a home, a business) and each of the one morediscrete structures may be related to one or more discrete areas. Inother examples, multiple control panels 105 may be related to the sameone or more discrete structures (e.g., multiple control panels relatingto a home and/or a business complex).

The devices 115 may be dispersed throughout the communications system100 and each device 115 may be stationary and/or mobile. A device 115may include a cellular phone, a personal digital assistant (PDA), awireless modem, a wireless communication device, a handheld device, atablet computer, a laptop computer, a cordless phone, a wireless localloop (WLL) station, a display device (e.g., TVs, computer monitors,etc.), a printer, a camera, and/or the like. A device 115 may alsoinclude or be referred to by those skilled in the art as a user device,a smartphone, a BLUETOOTH® device, a Wi-Fi device, a mobile station, asubscriber station, a mobile unit, a subscriber unit, a wireless unit, aremote unit, a mobile device, a wireless device, a wirelesscommunications device, a remote device, an access terminal, a mobileterminal, a wireless terminal, a remote terminal, a handset, a useragent, a mobile client, a client, and/or some other suitableterminology.

The control panels 105 may wirelessly communicate with the sensors 150via one or more antennas. The sensors 150 may be dispersed throughoutthe communications system 100 and each sensor 150 may be stationaryand/or mobile. A sensor 150 may include and/or be one or more sensorsthat sense: proximity, motion, temperatures, humidity, sound level,smoke, structural features (e.g., glass breaking, window position, doorposition), time, light geo-location data of a user and/or a device,distance, biometrics, weight, speed, height, size, preferences, light,darkness, weather, time, system performance, and/or other inputs thatrelate to a security and/or an automation system. A device 115 and/or asensor 150 may be able to communicate through one or more wired and/orwireless connections with various components such as control panels,base stations, and/or network equipment (e.g., servers, wirelesscommunication points, etc.) and/or the like.

The communication links 125 shown in communications system 100 mayinclude uplink (UL) transmissions from a device 115 to a control panel105, and/or downlink (DL) transmissions, from a control panel 105 to adevice 115. The downlink transmissions may also be called forward linktransmissions while the uplink transmissions may also be called reverselink transmissions. Each communication link 125 may include one or morecarriers, where each carrier may be a signal made up of multiplesub-carriers (e.g., waveform signals of different frequencies) modulatedaccording to the various radio technologies. Each modulated signal maybe sent on a different sub-carrier and may carry control information(e.g., reference signals, control channels, etc.), overhead information,user data, etc. The communication links 125 may transmit bidirectionalcommunications and/or unidirectional communications. Communication links125 may include one or more connections, including but not limited to,345 MHz, Wi-Fi, BLUETOOTH®, BLUETOOTH® Low Energy, cellular, Z-WAVE®,802.11, peer-to-peer, LAN, WLAN, Ethernet, fire wire, fiber optic,and/or other connection types related to security and/or automationsystems.

In some embodiments, of communications system 100, control panels 105and/or devices 115 may include one or more antennas for employingantenna diversity schemes to improve communication quality andreliability between control panels 105 and devices 115. Additionally oralternatively, control panels 105 and/or devices 115 may employmultiple-input, multiple-output (MIMO) techniques that may takeadvantage of multi-path, mesh-type environments to transmit multiplespatial layers carrying the same or different coded data.

While the devices 115 may communicate with each other through thecontrol panel 105 using communication links 125, each device 115 mayalso communicate directly with one or more other devices via one or moredirect communication links 134. Two or more devices 115 may communicatevia a direct communication link 134 when both devices 115 are in thegeographic coverage area 110 or when one or neither devices 115 iswithin the geographic coverage area 110. Examples of directcommunication links 134 may include Wi-Fi Direct, BLUETOOTH®, wired,and/or, and other P2P group connections. The devices 115 in theseexamples may communicate according to the WLAN radio and basebandprotocol including physical and MAC layers from IEEE 802.11, and itsvarious versions including, but not limited to, 802.11b, 802.11g,802.11a, 802.11n, 802.11ac, 802.11ad, 802.11ah, etc. In otherimplementations, other peer-to-peer connections and/or ad hoc networksmay be implemented within communications system 100.

In some embodiments, the sensors 150 may be proximate a room for aperson to the be monitored. If the person is a small child, the sensors150 may be proximate a sleep location such as a crib.

FIG. 2 shows a block diagram 200 of an apparatus 205 for use inelectronic communication, in accordance with various aspects of thisdisclosure. The apparatus 205 may be an example of one or more aspectsof a control panel 105 described with reference to FIG. 1. The apparatus205 may include a receiver module 210, a monitoring module 215, and/or atransmitter module 220. The apparatus 205 may also be or include aprocessor. Each of these modules may be in communication with eachother—directly and/or indirectly.

The components of the apparatus 205 may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-Custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented—in whole or in part—with instructions embodied in memoryformatted to be executed by one or more general and/orapplication-specific processors.

The receiver module 210 may receive information such as packets, userdata, and/or control information associated with various informationchannels (e.g., control channels, data channels, etc.). The receivermodule 210 may be configured to receive information from sensorsproximate a first person. Information may be passed on to the monitoringmodule 215, and to other components of the apparatus 205.

The monitoring module 215 may monitor aspects of a person such as ayoung child. In some instances, the monitoring may occur while an adultor supervisory person is not within a predetermined proximity of theperson. In other embodiments, the monitoring may occur if one or moremonitoring parameters are satisfied. The monitoring parameters maycomprise location of child, monitoring set to an on position, potentialhealth hazards detected, and the like. The monitoring module 215 maymonitor the overall health and well-being of the child. For example, themonitoring module 215 may monitor breathing, defecating, feeding,temperature, distress state, and the like. One or more monitors may beproximate the child and/or a location associated with the child such asa crib, rocker, or the like. The sensors may detect information andsupply the information to the monitoring module 215. The monitoringmodule 215 may extract and analyze the information before analyzing anyactions to take based on the inputs received.

The transmitter module 220 may transmit the one or more signals receivedfrom other components of the apparatus 205. The transmitter module 220may transmit data from the baby module to an end user. In some examples,the transmitter module 220 may be collocated with the receiver module210 in a transceiver module.

FIG. 3 shows a block diagram 300 of an apparatus 205-a for use inwireless communication, in accordance with various examples. Theapparatus 205-a may be an example of one or more aspects of a controlpanel 105 described with reference to FIG. 1. It may also be an exampleof an apparatus 205 described with reference to FIG. 2. The apparatus205-a may include a receiver module 210-a, a monitoring module 215-a,and/or a transmitter module 220-a, which may be examples of thecorresponding modules of apparatus 205. The apparatus 205-a may alsoinclude a processor. Each of these components may be in communicationwith each other. The monitoring module 215-a may include a detectionmodule 305, an evaluation module 310, and an action module 315. Thereceiver module 210-a and the transmitter module 220-a may perform thefunctions of the receiver module 210 and the transmitter module 220, ofFIG. 2, respectively.

The components of the apparatus 205-a may, individually or collectively,be implemented using one or more application-specific integratedcircuits (ASICs) adapted to perform some or all of the applicablefunctions in hardware. Alternatively, the functions may be performed byone or more other processing units (or cores), on one or more integratedcircuits. In other examples, other types of integrated circuits may beused (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays(FPGAs), and other Semi-Custom ICs), which may be programmed in anymanner known in the art. The functions of each module may also beimplemented, in whole or in part, with instructions embodied in amemory, formatted to be executed by one or more general orapplication-specific processors.

The detection module 305 may use one or more sensors to detect thepresence and/or the state of a first person. The presence may be alocation of the first person such as a bassinet, crib, bed, and thelike. The first person may be under an age threshold. For example, thefirst person may be an infant, toddler, child, or the like. One or moresensors may be proximate a child's bed. The bed may be a crib or may bea toddler bed or some other sleeping arrangements for a person. Thesensors may comprise a microphone, video sensor, sleep sensor, biometricsensors, heart rate sensors, pulse sensors, bed sensor, audio sensor,motion sensor, light sensor, some combination thereof, and the like. Thesensors may detect various levels of activity concerning the person. Theaudio sensor, microphone, and video may provide an audiovisual link tothe person to allow a supervisory person to visually and audibly assessa situation.

The sensors may detect when a first person is in a sleep state. Thefirst person may be a child. The sleep state may be the beginning stagesof sleep or may be in a deep sleep. The sensors may determine the sleepstate by detecting motion, heart rate, breathing patterns, and the like.If a first person has a steady heart-rate, even breathing, and is notmoving, the detection module 305 may determine the first person is in asleep state. The detection module 305 may track other vital signs of thefirst person while the first person is in the sleep state. For example,in addition to the heart rate and breathing pattern, the detectionmodule 305 may track a pulse, brain activity, and the like.

The detection module 305 may monitor any disturbances in the sleepstate. For example, the detection module 305 may continue to monitor thesleep state indicators to determine if any changes in the sleep statearise. If the detection module 305 detects a disturbance in the sleepstate, the detection module 305 may record information prior to thedetected disturbance and for a period of time after the detecteddisturbance. The recording may comprise audio and/or video informationas well as sensor data pertinent to the first person.

The detection module 305 may audibly detect, via a sensor, an audibleindicator associated with the first person. For example, a sensor maydetect the first person is moving in the bed, crying, asking for help,and the like. The detection module 305 may continue to monitor thepresence of the audible indicator. In some embodiments, the audibleindicator may cease, indicating the first person has fallen back asleep.In another embodiment, the audible indicator may continue and, in someinstances, may increase in decibel level. Therefore, the detectionmodule 305 may determine when the audible indicator satisfies apredetermined decibel threshold. The predetermined decibel threshold mayindicate the first person's distress and need for attention. Thedetection module 305 may detect and transmit the acoustic signature ofsounds associated with the first person. The sounds may be similar tothe audible indicator. The sounds may be emanating from the firstperson, such as crying, asking for help, screaming, and the like.

The evaluation module 310 may review the information from the detectionmodule 305 to determine a potential state of the first person. Theevaluation module 310 may stream the information from the detectionmodule 305 into different software modules. The software modules mayanalyze the audiovisual data to discern different need states of thefirst person. The evaluation module 310 may be a learning module and mayanalyze acoustic signatures to discern different distress levels of aperson to determine if the person requires attention. Likewise, theevaluation module 310 may review video data to determine when parentalinteraction is needed. This may comprise discerning between hungrycries, awake cries, upset cries, and the like. The evaluation module 310may view video data and determine a child's legs have become tangled incrib slats and the child requires attention to disentangle. The videomay ascertain an infant has come undone from a swaddle and may be upset.The child may also require a change, such as a diaper change or clothingchange. The evaluation module 310 may additionally determine adiscrepancy in health monitoring such as a lower heart rate or lack ofbreathing and may trigger an emergency response.

The evaluation module 310 may record video and audio data of the firstperson in various states. For example, the evaluation module 310 mayrecord and save the audiovisual information when a sleep stated isdisrupted. The evaluation module 310 may then evaluate the data toidentify a cause of the disturbance. This may enable a caregiver toreduce potential disruptions to the first person's sleep state to ensurethe first person achieves a more restful state. If the first person is achild, it may ensure the child's nap goes uninterrupted.

Similarly, if the vital signs satisfy an emergency threshold, theevaluation module 310 may save video, audio, and sensor information fora predetermined time period to evaluate a cause. The predetermined timeperiod may comprise a first time period before the emergency thresholdis satisfied until a second time period after the emergency threshold issatisfied. The emergency threshold may comprise vital signs not beingwithin an acceptable range. For example, breathing, heart rate, and/orpulse may have slowed down or ceased. Brain activity may fall below anacceptable level. In some embodiments, extreme body temperatures mayresult in an emergency situation.

The action module 315 may take one or more actions based on theevaluation module 310. As mentioned, if the evaluation module 310detects an emergency such as a lack of breathing, lower or loweringheart rate, or the like, the action module 315 may immediately alertemergency personnel and a supervisory person such as a parent. The alertto emergency personnel may contain the recorded data on the child andrequest emergency personnel at the location immediately. The alert tothe supervisory personnel may include instructions of what to do withthe baby, such as CPR or chest compressions, notify the supervisorypersonnel of the emergency personnel. If the supervisory personnel isnot a parent, a parent may additionally be contacted. For example, theparents may be out and leave a caregiver to care for a child. Or theparents may be divorced and an alert may be sent to the parent notliving at the current location of the child, and the like.

If the evaluation module 310 detects a non-emergency situation, theaction module 315 may take different steps. If the person is a child andis stirring, the action module 315 may begin a timer and a decibelcounter. The action module 315 may activate a soothing mechanismproximate the location of the child to attempt to lull the child tosleep. If the child continues to stir and cry after a predeterminedperiod, an alert may be sent to a supervisory person. If the child'scries exceed a decibel threshold, the supervisory person mayadditionally be alerted. Alternatively, if the evaluation module 310determines a distress state of the person, the action module 315 maytake different actions. For example, the action module 315 may cause analert to be sent to a supervisory person regarding the state of theperson. The person, which may be a child, may require a feeding,detangling, may require more blankets or less blankets depending ontemperature, may require a diaper change, or the like.

FIG. 4 shows a system 400 for use in monitoring the sleep state ofpersons systems, in accordance with various examples. System 400 mayinclude an apparatus 205-b, which may be an example of the controlpanels 105 of FIG. 1. Apparatus 205-b may also be an example of one ormore aspects of apparatus 205 and/or 205-a of FIGS. 2 and 3.

Apparatus 205-b may also include components for bi-directional voice anddata communications including components for transmitting communicationsand components for receiving communications. For example, apparatus205-b may communicate bi-directionally with one or more of device 115-a,one or more sensors 150-a, remote storage 140, and/or remote server145-a, which may be an example of the remote server of FIG. 1. Thisbi-directional communication may be direct (e.g., apparatus 205-bcommunicating directly with remote storage 140) or indirect (e.g.,apparatus 205-b communicating indirectly with remote server 145-athrough remote storage 140).

Apparatus 205-b may also include a processor module 405, and memory 410(including software/firmware code (SW) 415), an input/output controllermodule 420, a user interface module 425, a transceiver module 430, andone or more antennas 435 each of which may communicate—directly orindirectly—with one another (e.g., via one or more buses 440). Thetransceiver module 430 may communicate bi-directionally—via the one ormore antennas 435, wired links, and/or wireless links—with one or morenetworks or remote devices as described above. For example, thetransceiver module 430 may communicate bi-directionally with one or moreof device 115-a, remote storage 140, and/or remote server 145-a. Thetransceiver module 430 may include a modem to modulate the packets andprovide the modulated packets to the one or more antennas 435 fortransmission, and to demodulate packets received from the one or moreantennas 435. While an apparatus (e.g., 205-b) may include a singleantenna 435, the apparatus may also have multiple antennas 435 capableof concurrently transmitting or receiving multiple wired and/or wirelesstransmissions. In some embodiments, one element of apparatus 205-b(e.g., one or more antennas 435, transceiver module 430, etc.) mayprovide a direct connection to a remote server 145-a via a directnetwork link to the Internet via a POP (point of presence). In someembodiments, one element of apparatus 205-b (e.g., one or more antennas435, transceiver module 430, etc.) may provide a connection usingwireless techniques, including digital cellular telephone connection,Cellular Digital Packet Data (CDPD) connection, digital satellite dataconnection, and/or another connection.

The signals associated with system 400 may include wirelesscommunication signals such as radio frequency, electromagnetics, localarea network (LAN), wide area network (WAN), virtual private network(VPN), wireless network (using 802.11, for example), 345 MHz, Z-WAVE®,cellular network (using 3G and/or LTE, for example), and/or othersignals. The one or more antennas 435 and/or transceiver module 430 mayinclude or be related to, but are not limited to, WWAN (GSM, CDMA, andWCDMA), WLAN (including BLUETOOTH® and Wi-Fi), WMAN (WiMAX), antennasfor mobile communications, antennas for Wireless Personal Area Network(WPAN) applications (including RFID and UWB). In some embodiments, eachantenna 435 may receive signals or information specific and/or exclusiveto itself. In other embodiments, each antenna 435 may receive signals orinformation not specific or exclusive to itself.

In some embodiments, one or more sensors 150-a (e.g., motion, proximity,smoke, light, glass break, door, window, carbon monoxide, and/or anothersensor) may connect to some element of system 400 via a network usingone or more wired and/or wireless connections.

In some embodiments, the user interface module 425 may include an audiodevice, such as an external speaker system, an external display devicesuch as a display screen, and/or an input device (e.g., remote controldevice interfaced with the user interface module 425 directly and/orthrough I/O controller module 420).

One or more buses 440 may allow data communication between one or moreelements of apparatus 205-b (e.g., processor module 405, memory 410, I/Ocontroller module 420, user interface module 425, etc.).

The memory 410 may include random access memory (RAM), read only memory(ROM), flash RAM, and/or other types. The memory 410 may storecomputer-readable, computer-executable software/firmware code 415including instructions that, when executed, cause the processor module405 to perform various functions described in this disclosure (e.g.,determine sleep state of a person, determine sleep disturbance of theperson, track health status of the person, etc.). Alternatively, thesoftware/firmware code 415 may not be directly executable by theprocessor module 405 but may cause a computer (e.g., when compiled andexecuted) to perform functions described herein. Alternatively, thecomputer-readable, computer-executable software/firmware code 415 maynot be directly executable by the processor module 405 but may beconfigured to cause a computer (e.g., when compiled and executed) toperform functions described herein. The processor module 405 may includean intelligent hardware device, e.g., a central processing unit (CPU), amicrocontroller, an application-specific integrated circuit (ASIC), etc.

In some embodiments, the memory 410 can contain, among other things, theBasic Input-Output system (BIOS) which may control basic hardware and/orsoftware operation such as the interaction with peripheral components ordevices. For example, the monitoring module 215-b to implement thepresent systems and methods may be stored within the system memory 410.Applications resident with system 400 are generally stored on andaccessed via a non-transitory computer readable medium, such as a harddisk drive or other storage medium. Additionally, applications can be inthe form of electronic signals modulated in accordance with theapplication and data communication technology when accessed via anetwork interface (e.g., transceiver module 430, one or more antennas435, etc.).

Many other devices and/or subsystems may be connected to one or may beincluded as one or more elements of system 400 (e.g., entertainmentsystem, computing device, remote cameras, wireless key fob, wall mounteduser interface device, cell radio module, battery, alarm siren, doorlock, lighting system, thermostat, home appliance monitor, utilityequipment monitor, heart rate monitor, breathing monitor, and so on). Insome embodiments, all of the elements shown in FIG. 4 need not bepresent to practice the present systems and methods. The devices andsubsystems can be interconnected in different ways from that shown inFIG. 4. In some embodiments, an aspect of some operation of a system,such as that shown in FIG. 4, may be readily known in the art and arenot discussed in detail in this application. Code to implement thepresent disclosure can be stored in a non-transitory computer-readablemedium such as one or more of system memory 410 or other memory. Theoperating system provided on I/O controller module 420 may be iOS®,ANDROID®, MS-DOS®, MS-WINDOWS®, OS/2®, UNIX®, LINUX®, or another knownoperating system.

The transceiver module 430 may include a modem configured to modulatethe packets and provide the modulated packets to the antennas 435 fortransmission and/or to demodulate packets received from the antennas435. While the control panel or control device (e.g., 205-b) may includea single antenna 435, the control panel or control device (e.g., 205-b)may have multiple antennas 435 capable of concurrently transmittingand/or receiving multiple wireless transmissions.

The apparatus 205-b may include a monitoring module 215-b, which mayperform the functions described above for the monitoring module 215,215-a of apparatus 205 of FIGS. 2 and 3.

FIG. 5 shows a swim diagram 500 for use in smart monitoring systems, inaccordance with various examples. The diagram 500 may include anapparatus 205-c, which may be an example of the control panels 105 ofFIG. 1. Apparatus 205-c may also be an example of one or more aspects ofapparatus 205, 205-a, and/or 205-b of FIGS. 2-4. The diagram 500 mayadditionally include a device 115-b, which may be an example of thedevice 115, 115-a and/or a sensor or group of sensors 150, 150-a ofFIGS. 1 and/or 4.

The device 115-b may detect a sleep state 505 of a person. The device115-b may determine the sleep state by detecting heart rate, breathingfunctions, and/or motion of a person in a sleeping apparatus such as acrib, bed, or the like. Once the device 115-b detects a sleep state, thedevice 115-b may monitor vital signs and environmental conditions of theperson. In some embodiments, the device 115-b may detect a disturbance510 in the sleep state status of the person. If a disturbance isdetected, the device 115-b may send the disturbance information to theapparatus 205-c. The apparatus 205-c may analyze the disturbanceinformation 520 to determine a state of the person. The state of theperson may be one of multiple states requiring attention. For example,the person, which may be a child, may be in an emergency state, thechild may require feeding, changing, comforting. A noise, such as a dogbarking, a car horn, or the like may have disturbed the sleep and thechild may require comforting. The child may be fussing in its sleep andmay require a moment or two to relax and self-soothe. Depending on thestate, the apparatus 205-c may take one or more actions 525. The actionsmay include notifying emergency personnel of an emergency situation,starting a timer, recording decibel level of crying, alerting asupervisory person, or the like.

FIG. 6 is a flow chart illustrating an example of a method 600 formonitoring sleep states of persons, in accordance with various aspectsof the present disclosure. For clarity, the method 600 is describedbelow with reference to aspects of one or more of the monitoring module215 described with reference to FIGS. 1-3, and/or aspects of one or moreof the apparatus 205 described with reference to FIGS. 1-5. In someexamples, an apparatus may execute one or more sets of codes to controlthe functional elements of the monitoring module 215 to perform thefunctions described below. Additionally or alternatively, the apparatusand/or control panel may perform one or more of the functions describedbelow using special-purpose hardware.

At block 605, the method 600 may include identifying, via a sensor, whena first person is in a sleep state. The sensor may be proximate thefirst person, which may be a child. For example, the sensor may be awearable device. The sensor may additionally be proximate a sleeplocation of the first person, such as a bassinet, bed, crib, mobilecrib, hammock, and the like. The sensor may be programmed to detectmultiple different modes such as motion, breathing, heart rate, brainfunctionality, noise, and the like. If the sensor detects steadybreathing, steady heart rate, lack of motion, and the like, the personmay be in a sleep state.

At block 610, the method 600 may include detecting, via the sensor, adisturbance in the sleep state. Once a person is determined to be in asleep state, the sensor may watch for disturbances in the sleep state.The disturbances may be external and/or internal. For example, externaldisruptions may include noise disruptions, light disruptions, motiondisruptions, and the like. The disturbances may also be internal to theperson, such as a dream, hunger or thirst, a soiled diaper, hot, cold,fussy, sick, teething, and the like.

The operation(s) at blocks 605 and 610 may be performed using thedetection module 305 described with reference to FIG. 3.

At block 615, the method 600 may include alerting a second person whenthe detected disturbance satisfies one or more disturbance parameters.The disturbance parameters may include emergency parameters, attentionminimums, predetermined time periods for crying or fussiness, bodytemperature (if the child is sick), and the like. The disturbanceparameters may be stated in the alert to the second person. The secondperson may be a parent, supervisory person, or caregiver. The alert mayconsist of a text message, audio message, an automation system alert,and the like. The alert may include a severity factor. The severityfactor may be listed in the body of the message or may be communicatedin the delivery medium. For example, an emergency situation may resultin a notification over a speaker system in the automation system. Themessage may additionally result in a phone call to a person who may beaway from the residence. The method 600 may continue to dial the personuntil an answer is achieved.

The operation(s) at block 615 may be performed using the action module315 described with reference to FIG. 3.

Thus, the method 600 may provide monitoring a sleep state of a personrelating to automation/security systems. It should be noted that themethod 600 is just one implementation and that the operations of themethod 600 may be rearranged or otherwise modified such that otherimplementations are possible.

FIG. 7 is a flow chart illustrating an example of a method 700 formonitoring sleep states of persons, in accordance with various aspectsof the present disclosure. For clarity, the method 700 is describedbelow with reference to aspects of one or more of the monitoring module215 described with reference to FIGS. 1-3, and/or aspects of one or moreof the apparatus 205 described with reference to FIGS. 1-5. In someexamples, an apparatus may execute one or more sets of codes to controlthe functional elements of the monitoring module 215 to perform thefunctions described below. Additionally or alternatively, the apparatusand/or control panel may perform one or more of the functions describedbelow using special-purpose hardware.

At block 705, the method 700 may include audibly detecting, via asensor, an audible indicator associated with the first person. Theaudible indicator may be a person crying, such as a small child. It mayalso consist of a person calling for help, screaming (as in a dreamstate), or the like.

The operation(s) at block 705 may be performed using the detectionmodule 305 described with reference to FIG. 3.

At block 710, the method 700 may include starting a timer based at leastin part on the detection of the audible indicator. The timer may beginat the moment the noise is detected. At block 715, the method 700 mayinclude resetting the timer if the audible indicator ceases for apredetermined time duration. For example, the child may have beendisturbed during a sleep state but may be self-soothing to return to asleep state. This may take a predetermine time period prior to alertinga caregiver, which may allow the child to return to the sleep state.Therefore, if the noise ceases for a predetermined time duration, it maybe concluded that the child returned to sleep.

At block 720, the method 700 may include alerting the second person ifthe timer satisfies a predetermined time threshold. In some instances,the child (e.g. first person) may not settle back into a sleep state.Instead, the child may continue to cry or audibly request assistance. Ifthe child continues after a predetermined time period, the child mayrequire adult assistance to return to a sleep state. This may result inthe second person, maybe an adult, being alerted to the status of thechild. The alert may contain information pertaining to a status of thechild, such as duration of the crying, decibel level of noise, predictedneeds of the child, and the like.

The operation(s) at blocks 710, 715 and 720 may be performed using theaction module 315 described with reference to FIG. 3.

Thus, the method 700 may provide for monitoring a sleep state of aperson relating to automation/security systems. It should be noted thatthe method 700 is just one implementation and that the operations of themethod 700 may be rearranged or otherwise modified such that otherimplementations are possible.

FIG. 8 is a flow chart illustrating an example of a method 800 formonitoring sleep states of persons, in accordance with various aspectsof the present disclosure. For clarity, the method 800 is describedbelow with reference to aspects of one or more of the monitoring module215 described with reference to FIGS. 1-3, and/or aspects of one or moreof the apparatus 205 described with reference to FIGS. 1-5. In someexamples, an apparatus may execute one or more sets of codes to controlthe functional elements of the monitoring module 215 to perform thefunctions described below. Additionally or alternatively, the apparatusand/or control panel may perform one or more of the functions describedbelow using special-purpose hardware.

At block 805, the method 800 may include analyzing an acoustic signatureof sounds associated with the first person. This may include recordingthe first person when the state of the first person is known. Forexample, analyzing the acoustic signature may include comparing theacoustic signature to known acoustic signatures of the first person. Forexample, an acoustic recording of the first person may be recorded whenthe person is identified as hungry, tired, fussy, in pain, distressed,and the like. If the method 800 detects an audible output from the firstperson, the method 800 may record the audible output and compare it toknown acoustic signatures.

At block 810, the method 800 may include evaluating a state of the firstperson based at least in part on the analyzing. By comparing theacoustic signatures, the method 800 may determine, with a nearcertainty, the state of the first person. In some instances, the method800 may use other information, in addition to an acoustic signature, todetermine and/or confirm a state of the first person. For example,additional sensor information may indicate a loud noise woke a sleepingchild, or that a person may be overheating or may be cold. Thisinformation may supplement and/or strengthen the evaluation.

The operation(s) at blocks 805, 810 may be performed using theevaluation module 310 described with reference to FIG. 3.

At block 815, the method 800 may include alerting the second person ifthe acoustic signature satisfies a signature parameter. For example, thesignature parameter may include acoustic signatures relating totemperature fluctuations, noise disturbances, hunger, pain, and thelike. If the signature parameter threshold is satisfied, the secondperson may receive an alert. The alert may detail the predicted state ofthe first person and actions which may be taken. In some embodiments, ifthe first person, e.g. a child, is merely fussy due to a dream and theacoustic signature has not reached a distress level, the second personmay not be notified.

The operation(s) at block 815 may be performed using the action module315 described with reference to FIG. 3.

Thus, the method 800 may provide for monitoring a sleep state of aperson relating to automation/security systems. It should be noted thatthe method 800 is just one implementation and that the operations of themethod 800 may be rearranged or otherwise modified such that otherimplementations are possible.

In some examples, aspects from two or more of the methods 600, 700, 800may be combined and/or separated. It should be noted that the methods600, 700, 800 are just example implementations, and that the operationsof the methods 600, 700, 800 may be rearranged or otherwise modifiedsuch that other implementations are possible.

The detailed description set forth above in connection with the appendeddrawings describes examples and does not represent the only instancesthat may be implemented or that are within the scope of the claims. Theterms “example” and “exemplary,” when used in this description, mean“serving as an example, instance, or illustration,” and not “preferred”or “advantageous over other examples.” The detailed description includesspecific details for the purpose of providing an understanding of thedescribed techniques. These techniques, however, may be practicedwithout these specific details. In some instances, known structures andapparatuses are shown in block diagram form in order to avoid obscuringthe concepts of the described examples.

Information and signals may be represented using any of a variety ofdifferent technologies and techniques. For example, data, instructions,commands, information, signals, bits, symbols, and chips that may bereferenced throughout the above description may be represented byvoltages, currents, electromagnetic waves, magnetic fields or particles,optical fields or particles, or any combination thereof.

The various illustrative blocks and components described in connectionwith this disclosure may be implemented or performed with ageneral-purpose processor, a digital signal processor (DSP), an ASIC, anFPGA or other programmable logic device, discrete gate or transistorlogic, discrete hardware components, or any combination thereof designedto perform the functions described herein. A general-purpose processormay be a microprocessor, but in the alternative, the processor may beany conventional processor, controller, microcontroller, and/or statemachine. A processor may also be implemented as a combination ofcomputing devices, e.g., a combination of a DSP and a microprocessor,multiple microprocessors, one or more microprocessors in conjunctionwith a DSP core, and/or any other such configuration.

The functions described herein may be implemented in hardware, softwareexecuted by a processor, firmware, or any combination thereof. Ifimplemented in software executed by a processor, the functions may bestored on or transmitted over as one or more instructions or code on acomputer-readable medium. Other examples and implementations are withinthe scope and spirit of the disclosure and appended claims. For example,due to the nature of software, functions described above can beimplemented using software executed by a processor, hardware, firmware,hardwiring, or combinations of any of these. Features implementingfunctions may also be physically located at various positions, includingbeing distributed such that portions of functions are implemented atdifferent physical locations.

As used herein, including in the claims, the term “and/or,” when used ina list of two or more items, means that any one of the listed items canbe employed by itself, or any combination of two or more of the listeditems can be employed. For example, if a composition is described ascontaining components A, B, and/or C, the composition can contain Aalone; B alone; C alone; A and B in combination; A and C in combination;B and C in combination; or A, B, and C in combination. Also, as usedherein, including in the claims, “or” as used in a list of items (forexample, a list of items prefaced by a phrase such as “at least one of”or “one or more of”) indicates a disjunctive list such that, forexample, a list of “at least one of A, B, or C” means A or B or C or ABor AC or BC or ABC (i.e., A and B and C).

In addition, any disclosure of components contained within othercomponents or separate from other components should be consideredexemplary because multiple other architectures may potentially beimplemented to achieve the same functionality, including incorporatingall, most, and/or some elements as part of one or more unitarystructures and/or separate structures.

Computer-readable media includes both computer storage media andcommunication media including any medium that facilitates transfer of acomputer program from one place to another. A storage medium may be anyavailable medium that can be accessed by a general purpose or specialpurpose computer. By way of example, and not limitation,computer-readable media can comprise RAM, ROM, EEPROM, flash memory,CD-ROM, DVD, or other optical disk storage, magnetic disk storage orother magnetic storage devices, or any other medium that can be used tocarry or store desired program code means in the form of instructions ordata structures and that can be accessed by a general-purpose orspecial-purpose computer, or a general-purpose or special-purposeprocessor. Also, any connection is properly termed a computer-readablemedium. For example, if the software is transmitted from a website,server, or other remote source using a coaxial cable, fiber optic cable,twisted pair, digital subscriber line (DSL), or wireless technologiessuch as infrared, radio, and microwave, then the coaxial cable, fiberoptic cable, twisted pair, DSL, or wireless technologies such asinfrared, radio, and microwave are included in the definition of medium.Disk and disc, as used herein, include compact disc (CD), laser disc,optical disc, digital versatile disc (DVD), floppy disk, and Blu-raydisc where disks usually reproduce data magnetically, while discsreproduce data optically with lasers. Combinations of the above are alsoincluded within the scope of computer-readable media.

The previous description of the disclosure is provided to enable aperson skilled in the art to make or use the disclosure. Variousmodifications to the disclosure will be readily apparent to thoseskilled in the art, and the generic principles defined herein may beapplied to other variations without departing from the scope of thedisclosure. Thus, the disclosure is not to be limited to the examplesand designs described herein but is to be accorded the broadest scopeconsistent with the principles and novel features disclosed.

This disclosure may specifically apply to security system applications.This disclosure may specifically apply to automation systemapplications. In some embodiments, the concepts, the technicaldescriptions, the features, the methods, the ideas, and/or thedescriptions may specifically apply to security and/or automation systemapplications. Distinct advantages of such systems for these specificapplications are apparent from this disclosure.

The process parameters, actions, and steps described and/or illustratedin this disclosure are given by way of example only and can be varied asdesired. For example, while the steps illustrated and/or described maybe shown or discussed in a particular order, these steps do notnecessarily need to be performed in the order illustrated or discussed.The various exemplary methods described and/or illustrated here may alsoomit one or more of the steps described or illustrated here or includeadditional steps in addition to those disclosed.

Furthermore, while various embodiments have been described and/orillustrated here in the context of fully functional computing systems,one or more of these exemplary embodiments may be distributed as aprogram product in a variety of forms, regardless of the particular typeof computer-readable media used to actually carry out the distribution.The embodiments disclosed herein may also be implemented using softwaremodules that perform certain tasks. These software modules may includescript, batch, or other executable files that may be stored on acomputer-readable storage medium or in a computing system. In someembodiments, these software modules may permit and/or instruct acomputing system to perform one or more of the exemplary embodimentsdisclosed here.

This description, for purposes of explanation, has been described withreference to specific embodiments. The illustrative discussions above,however, are not intended to be exhaustive or limit the present systemsand methods to the precise forms discussed. Many modifications andvariations are possible in view of the above teachings. The embodimentswere chosen and described in order to explain the principles of thepresent systems and methods and their practical applications, to enableothers skilled in the art to utilize the present systems, apparatus, andmethods and various embodiments with various modifications as may besuited to the particular use contemplated.

What is claimed is:
 1. A method for operating a security and/orautomation system, comprising: monitoring, via a sensor, a firstbehavioral state of a first person; detecting, via the sensor, adisturbance in the first behavioral state; analyzing the firstbehavioral state of the first person and the disturbance in the firstbehavioral state at a first time; initiating an action based at least inpart on the analyzing; initiating a timer and a decibel counter trackingthe disturbance based at least in part on initiating the action;detecting, in response to an expiration of the timer, the disturbance inthe first behavioral state at a second time; initiating a notificationbased at least in part on the detected disturbance in the firstbehavioral state at the second time, the expiration of the timer, thedecibel counter, and a characteristic of the disturbance of the firstbehavioral state; identifying a second person based at least in part onthe expiration of the timer and the characteristic of the disturbance ofthe first behavioral state; and transmitting the notification to thesecond person based at least in part on the identifying the secondperson.
 2. The method of claim 1, wherein monitoring the firstbehavioral state of the first person comprises: tracking a biometricparameter associated with the first person.
 3. The method of claim 1,further comprising: determining a monitor parameter is satisfied,wherein monitoring the first behavioral state of the first personfurther is based at least in part on the determining.
 4. The method ofclaim 3, wherein determining the monitoring parameter is satisfiedcomprises determining that a third person is located outside of apredetermined distance from the first person.
 5. The method of claim 4,wherein analyzing further comprises: identifying that the first personis in a sleep state; and determining that the first person is no longerin the sleep state due to the detected disturbance.
 6. The method ofclaim 1, wherein monitoring the first behavioral state of the firstperson further comprises: monitoring a sleep state, or a health state,or a combination thereof.
 7. The method of claim 1, wherein detectingthe disturbance in the first behavioral state further comprises:detecting a change in a breathing pattern, defecation, urination, achange in body temperature, an audible response, an indication ofhunger, an indication of distress, or a combination thereof.
 8. Themethod of claim 1, wherein analyzing the first behavioral statecomprises identifying that the first person is in a sleep state.
 9. Themethod of claim 1, wherein an age of the first person satisfies apredetermined age threshold and initiating the action is based at leastin part on the age of the first person satisfying the predetermined agethreshold.
 10. The method of claim 1, wherein initiating the actionfurther comprises: transmitting an alert to a device associated with athird person.
 11. The method of claim 1, wherein monitoring the firstbehavioral state of the first person further comprises: receiving afirst acoustic signature associated with the first person; receivingaudio data associated with the first person; and comparing the firstacoustic signature with the audio data, wherein detecting thedisturbance comprises determining a change in behavior based on thecomparing.
 12. The method of claim 10, further comprising: recordingdata associated with determining the disturbance, wherein transmittingthe alert to the third person further comprises transmitting therecorded data.
 13. The method of claim 12, wherein recording the datafurther comprises: recording data from a pre-determined time beforedetermining the disturbance until a pre-determined time afterdetermining the disturbance.
 14. An apparatus for security and/orautomation systems, comprising: a processor; memory in electroniccommunication with the processor; and instructions stored in the memory,the instructions being executable by the processor to cause theapparatus to: monitor, via a sensor, a first behavioral state of a firstperson; detect, via the sensor, a disturbance in the first behavioralstate; analyze the first behavioral state of the first person and thedisturbance in the first behavioral state at a first time; initiate anaction based at least in part on the analyzing; initiate a timer and adecibel counter tracking the disturbance based at least in part oninitiating the action; detect, in response to an expiration of thetimer, the disturbance in the first behavioral state at a second time;initiate a notification based at least in part on the detecteddisturbance in the first behavioral state at the second time, theexpiration of the timer, the decibel counter, and a characteristic ofthe disturbance of the first behavioral state; identify a second personbased at least in part on the expiration of the timer and thecharacteristic of the disturbance of the first behavioral state; andtransmit the notification to the second person based at least in part onthe identifying the second person.
 15. The apparatus of claim 14,wherein when the apparatus monitors, the instructions are furtherexecutable to: monitor a sleep state or a health state.
 16. Theapparatus of claim 14, wherein when the apparatus detects thedisturbance in the first behavioral state, the instructions are furtherexecutable to: detect a change in a breathing pattern, defecation,urination, a change in body temperature, an indication of hunger, anindication of distress, or a combination thereof.
 17. The apparatus ofclaim 14, wherein when the apparatus analyzes, the instructions arefurther executable to: identify that the first person is in a sleepstate; and determine that the first person is no longer in the sleepstate due to the detected disturbance.
 18. The apparatus of claim 14,wherein an age of the first person satisfies a predetermined agethreshold and initiating the action is based at least in part on the ageof the first person satisfying the predetermined age threshold.
 19. Theapparatus of claim 14, the instructions executable to: record dataassociated with monitoring the first behavioral state and withdetermining the disturbance; and transmit an alert including therecorded data to a third person.
 20. A non-transitory computer-readablemedium storing computer-executable code, the code executable by aprocessor to: monitor, via a sensor, a first behavioral state of a firstperson; detect, via the sensor, a disturbance in the first behavioralstate; analyze the first behavioral state of the first person and thedisturbance in the first behavioral state at a first time; initiate anaction based at least in part on the analyzing; initiate a timer and adecibel counter tracking the disturbance based at least in part oninitiating the action; detect, in response to an expiration of thetimer, the disturbance in the first behavioral state at a second time;initiate a notification based at least in part on the detecteddisturbance in the first behavioral state at the second time, theexpiration of the timer, the decibel counter, and a characteristic ofthe disturbance of the first behavioral state; identify a second personbased at least in part on the expiration of the timer and thecharacteristic of the disturbance of the first behavioral state; andtransmit the notification to the second person based at least in part onthe identifying the second person.