Detection of authorized user presence and handling of unauthenticated monitoring system commands

ABSTRACT

Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of U.S. Provisional PatentApplication No. 62/426,015 filed on Nov. 23, 2016, which is incorporatedherein by reference in its entirety.

TECHNICAL FIELD

This disclosure application relates generally to property monitoringtechnology.

BACKGROUND

A property monitoring system may perform actions based on input usercommands. In some cases, the input command may not includeauthentication information.

SUMMARY

Techniques are described for detecting and handling unauthenticatedcommands in a property monitoring system. In some implementations, amonitoring system may include one or more sensors that are locatedthroughout a property, where those sensors may include cameras, motiondetectors, and other sensing devices. The monitoring system may alsoinclude a monitoring control unit, where the monitoring control unit isconfigured to receive data collected by the sensors and generateproperty state information based on the received data. The monitoringsystem may further include an input device, such as a microphone orsmart speaker system, which may detect an input command, where the inputcommand does not include authentication information. In some examples,the monitoring control unit may be receive the unauthenticated inputcommand, or data identifying the unauthenticated input command, from theinput device. The monitoring control unit may then analyze the propertystate information and the input command against one or more rules thatare related to authorizing unauthenticated input commands. Based on thisanalysis, the monitoring control unit may determine whether to performthe action corresponding to the input command or perform another actionthat is different than the action that corresponds to the input command.

The action that is different than the action that corresponds to theinput command may be, for example, generating a notification, generatingan authorization request, or providing the notification or authorizationrequest to a user's computing device. In some cases, the action that isdifferent the action corresponding to the input command may begenerating an alarm condition.

In some implementations, the monitoring system may be in an armed state,the property state information may indicate that an expected number ofoccupants are located in a particular area of the property, and theinput command, which is provided from a location outside of theparticular area of the property, requests to disarm the monitoringsystem. In some cases, the property state information may also indicatethat the particular are of the property in which the occupants arelocated is dark. Based on analyzing the property state information andthe input command against the one or more rules, the monitoring controlunit may determine that the command to disarm the monitoring system isnot authorized and generate an alarm condition.

In some implementations, the property state information may indicatethat a user is located inside the property, the data collected by thesensors includes an image of the user, and the input command is a voicecommand uttered by the user. Here, the monitoring control unit mayanalyze the image of the user, determine that the user is an authorizeduser, and determine that the voice command is authorized. As a result,the monitoring control unit may determine to perform the action thatcorresponds to the input command based on determining that the voicecommand is authorized.

In some implementations, the input command may be a voice commanduttered by a user located inside the property, where the property stateinformation indicates that the user is located inside a bedroom of theproperty and that the user was likely sleeping before uttering the voicecommand. Here, the monitoring control unit may determine that the voicecommand is authorized and determine to perform the action thatcorresponds to the input command. In some cases, the monitoring controlunit may perform one or more actions, including disarming the monitoringsystem, activating one or more lights that are located in the property,raising one or more window coverings that are located in the property,and activating an appliance that is located in the property.

In some implementations, the property state information may indicatethat a resident of the property is outside of the property and theunauthenticated input command comprises a command to adjust a device ofthe property. The monitoring control unit may be configured to determinea security impact of the command to adjust the device of the property.In some examples, the security impact of the unauthenticated command maybe determined by the device referenced by the command. For example, anunauthenticated command to adjust a thermostat, lights, blinds or asprinkler system may be determined to have a low security impact,whereas an unauthenticated command to adjust the status of themonitoring system (e.g., arm or disarm) or door locks may be determinedto have a high security impact. In some cases, the security impact ofthe command may depend on the action commanded. For example, anunauthenticated command to raise the security level of the property(e.g., to arm the monitoring system or lock the doors) may have a lowersecurity impact than an unauthenticated command to lower the securitylevel of the property (e.g., to disarm the monitoring system or unlockthe doors).

Based on analyzing the property state information, the security impactof the command, and the command to adjust the device against the one ormore rules, the monitoring control unit may generate an authorizationrequest to adjust the device and provide that request to a computingdevice of a resident of the property. If the monitoring control unitreceives from the computing device authorization to adjust the device ofthe property, the control unit may adjust the device according to theinput command. In some implementations, the command to adjust the devicemay be received locally at the device while the property stateinformation indicates that the resident of the property is outside ofthe property. Here, the monitoring control unit may generate anauthorization request to adjust the device of the property and providethe request to the computing device of the resident.

In some implementations, the monitoring control unit may receiveadditional data collected by the sensors during a period of time beforereceiving the input command. Based on the additional data, themonitoring control unit may determine an activity pattern of persons inthe property and update the property state information based on theactivity pattern. The monitoring control unit may then analyze theupdated property state information and the input command against the oneor more rules and, based on the analysis, determine whether to performthe action corresponding to the input command or to perform anotheraction that is different than the action corresponding to the inputcommand.

In some implementations, the monitoring control unit may be configuredto determine the energy consumption of the property and conditions in ornear a property, where those conditions may include weather, daylightlevel, air quality, and other environmental conditions. Based on theenergy consumption of the property, at least one user-specified setting,and the conditions, the monitoring control unit may generate the one ormore rules related to authorizing unauthenticated input commands.

In some implementations, the property state information may indicatethat a resident is leaving the property and the input command is a voicecommand uttered by the resident. Here, the monitoring control unit maydetermine that the resident is an authorized user and that the voicecommand is authorized. As a result, the monitoring control unit mayperform the actions corresponding to the input command by performing oneor more of: arming the monitoring system, deactivating one or morelights of the property, locking one or more doors of the property, andadjusting a thermostat of the property.

In some implementations, the property state information may indicatethat a resident is arriving at the property and the input command is avoice command uttered by the resident. Here, the monitoring control unitmay determine that the resident is an authorized user and that the voicecommand is authorized. As a result, the monitoring control unit mayperform the actions corresponding to the input command by performing oneor more of: disarming the monitoring system, activating one or morelights of the property, opening one or more doors of the property,adjusting a thermostat of the property, and activating an applicantlocated in the property.

Implementations of the described techniques may include hardware, amethod or process implemented at least partially in hardware, or acomputer-readable storage medium encoded with executable instructionsthat, when executed by a processor, perform operations. The details ofone or more implementations are set forth in the accompanying drawingsand the description below. Other features will be apparent from thedescription and drawings, and from the claims.

DESCRIPTION OF DRAWINGS

FIGS. 1-2 illustrate example systems that integrate scenes in amonitoring system using detection of authorized user presence andunauthenticated commands.

FIGS. 3A-3B are flow charts of example processes of taking action in amonitoring system based on commands provided without authenticationinformation.

FIGS. 4A-4F illustrate example scenes that are integrated withmonitoring systems.

DETAILED DESCRIPTION

Techniques are described for taking action in a monitoring system basedon commands provided without authentication information. For example,commands provided without authentication information may enable seamlessintegration of scenes, or various configurations of home automation orsettings of systems within the home, and/or actions, with monitoringsystems. A system uses sensor data collected from a monitoring system ofa property, including motion sensor data, microphones, cameras, networkconnectivity data, etc., to determine the current state of the home. Insome implementations, based on the determined current state of the home,the monitoring system may take action based on commands provided withoutauthentication information.

FIG. 1 illustrates a diagram of an example of an integrated system 100associated with a property 101. In some examples, the system can be usedto control systems and appliances of the property 101 based on the stateof the property 101. While the following description is drafted in thecontext of a home, it is understood that the disclosure can be directedto various types of property, such as office buildings, publicbuildings, etc. Additionally, while the following disclosure is directedto a monitoring system that controls devices communicably coupled to themonitoring system, it is understood that the disclosure can be directedto monitoring systems or security systems that do not control devicescommunicably coupled to the monitoring system. For example, thedisclosure may be applicable to monitoring systems that include sensorsand cameras and do not include controllable heating, ventilation and airconditioning (HVAC) units.

In some examples, the system 100 validates homeowner presence beforeallowing commands with which no authentication information was providedto a monitoring system. The system 100 can integrate a state of theproperty 101 into home monitoring and automation by allowing, forexample, simple commands or voice commands to be provided with reducedor no authentication based on the state of the property 101.

The property 101 may include various monitoring devices. For example,the property 101 may include cameras, sensors, and other devices thatprovide monitoring data associated with devices and areas of theproperty 101. Cameras located on the property 101 may provide video,still images, or other monitoring data, and may provide data via a livefeed, transmit data to be stored in a remote location, store datalocally for review at a later time, etc. Sensors located on the property101 may include motion sensors, heat sensors, pressure sensors,resistive sensors, etc. Sensors may communicate with the monitoringcontrol unit 110 and transmit monitoring data for processing to themonitoring control unit 110. In some examples, sensors located on theproperty 101 may store collected data locally or transmit monitoringdata to be stored in a remote location.

The system 100 may include a monitoring control unit 110, one or morecameras 120, one or more sensors 122, one or more appliances 124, aproperty management server 130 that manages monitoring system datareceived from the monitoring control unit, and an authorized user device140. The server 130 may maintain data that defines which users areauthorized users 104, which devices are authorized user devices 140, andwhat actions related to a monitoring system of the property 101 to takebased on received data. An individual may provide an input command forthe monitoring system with which no authentication information wasincluded 102. In some examples, the individual 102 is not the same asthe authorized user 104, and is unauthorized. In some examples, theindividual 102 is the same as the authorized user 104, and has notprovided authentication information.

The monitoring control unit 110 includes a controller and a networkmodule. The controller is configured to control a monitoring system(e.g., a home alarm or security system) that includes the monitoringcontrol unit 110. In some examples, the controller may include aprocessor or other control circuitry configured to execute instructionsof a program that controls operation of an alarm system. In theseexamples, the controller may be configured to receive input fromsensors, detectors, or other devices included in the alarm system andcontrol operations of devices included in the alarm system or otherhousehold devices (e.g., a thermostat, an appliance, lights, etc.). Forexample, the controller may be configured to control operation of thenetwork module included in the monitoring control unit 110.

The network module is a communication device configured to exchangecommunications over a network 105. The network module may be a wirelesscommunication module configured to exchange wireless communications overthe network 105. For example, the network module may be a wirelesscommunication device configured to exchange communications over awireless data channel and a wireless voice channel. In this example, thenetwork module may transmit alarm data over a wireless data channel andestablish a two-way voice communication session over a wireless voicechannel. The wireless communication device may include one or more of aLTE module, a GSM module, a radio modem, cellular transmission module,or any type of module configured to exchange communications in one ofthe following formats: LTE, GSM or GPRS, CDMA, EDGE or EGPRS, EV-DO orEVDO, UMTS, or IP.

The network module may also be a wired communication module configuredto exchange communications over the network 105 using a wiredconnection. For instance, the network module may be a modem, a networkinterface card, or another type of network interface device. The networkmodule may be an Ethernet network card configured to enable themonitoring control unit 110 to communicate over a local area networkand/or the Internet. The network module also may be a voice-band modemconfigured to enable the alarm panel to communicate over the telephonelines of Plain Old Telephone Systems (POTS).

In some examples, the monitoring control unit 110 may include datacapture and recording devices. In these examples, the monitoring controlunit 110 may include the cameras 120, one or more motion sensors, one ormore microphones, one or more biometric data collection tools, one ormore temperature sensors, one or more humidity sensors, one or more airflow sensors, and/or any other types of sensors that may be useful incapturing monitoring data related to the property 101 and users in theproperty.

The monitoring control unit 110 may be configured to communicate withthe cameras 120, the sensors 122, the appliances 124, and other devicesand systems of the property 101 through a network 105. In some examples,the monitoring control unit 110 may communicate with the cameras 120,the sensors 122, the appliances 124, and other devices and systems ofthe property 101 directly. For example, the monitoring control unit 110may directly receive data from the sensors 122, send control signals tothe appliances 124, etc. The monitoring control unit 110 may beconfigured to communicate with the server 130. In some examples, themonitoring control unit 110 may be configured to communicate with theserver 130 through the network 105. In some examples, the monitoringcontrol unit 110 may be configured to communicate with the server 130directly.

The monitoring control unit 110 also may include a communication modulethat enables the monitoring control unit 110 to communicate otherdevices of the system 100. The communication module may be a wirelesscommunication module that allows the monitoring control unit 110 tocommunicate wirelessly. For instance, the communication module may be aWi-Fi module that enables the monitoring control unit 110 to communicateover a local wireless network at the property 101. The communicationmodule further may be a 900 MHz wireless communication module thatenables the monitoring control unit 110 to communicate directly with amonitoring control unit. Other types of short-range wirelesscommunication protocols, such as Bluetooth, Bluetooth LE, Z-Wave,ZigBee, etc., may be used to allow the monitoring control unit 110 tocommunicate with other devices in the property 101.

The monitoring control unit 110 further may include processor andstorage capabilities. The monitoring control unit 110 may include anysuitable processing devices that enable the monitoring control unit 110to operate applications and perform the actions described throughoutthis disclosure. In addition, the monitoring control unit 110 mayinclude solid state electronic storage that enables the monitoringcontrol unit 110 to store applications, configuration data, collectedsensor data, and/or any other type of information available to themonitoring control unit 110.

The monitoring control unit 110 may exchange communications with thesensors 122, the appliances 124, the cameras 120, and the propertymanagement server 130 using multiple communication links. The multiplecommunication links may be a wired or wireless data pathway configuredto transmit signals from sensors 122, the appliances 124, the cameras120, and the property management server 130 to the controller. Thesensors 122, the appliances 124, the cameras 120, and the propertymanagement server 130 may continuously transmit sensed values to thecontroller, periodically transmit sensed values to the monitoringcontrol unit 110, or transmit sensed values to the monitoring controlunit 110 in response to a change in a sensed value.

The multiple communication links may include a local network. Thesensors 122, the appliances 124, the cameras 120, and the propertymanagement server 130 and the monitoring control unit 110 may exchangedata and commands over the local network. The local network may include802.11 “Wi-Fi” wireless Ethernet (e.g., using low-power Wi-Fi chipsets),Z-Wave, ZigBee, Bluetooth, “Homeplug” or other “Powerline” networks thatoperate over AC wiring, and a Category 5 (CAT5) or Category 6 (CAT6)wired Ethernet network. The local network may be a mesh networkconstructed based on the devices connected to the mesh network.

In some implementations, the monitoring control unit 110 mayadditionally be used to perform routine surveillance operations on aproperty. For instance, the monitoring control unit 110 may be assignedto one or more particular properties within a geographic location andmay routinely collect surveillance footage during specified time periods(e.g., after dark), which may then be transmitted to the propertymanagement server 130 for transmitting back to each particular propertyowner. In such implementations, the property owner may receive thesurveillance footage over the network 105 as a part of a serviceprovided by a security provider that operates the property managementserver 130. For example, transmissions of the surveillance footagecollected by the monitoring control unit 110 may be part of a premiumsecurity service package provided by a security provider in addition tothe routine drone emergency response service.

In some implementations, the monitoring control unit 110 may monitor theoperation of the electronic devices of the system 100 such as sensors122, the appliances 124, the cameras 120, and the property managementserver 130. For instance, the monitoring control unit 110 may enable ordisable the devices of the system 100 based on a set of rules associatedwith energy consumption, user-specified settings, and/or otherinformation associated with the conditions near or within the property101 where the system 100 is located. In some examples, the monitoringcontrol unit 110 may be used as a replacement to a traditional securitypanel (or monitoring control unit) that is used to monitor and controlthe operations of the system 100. In other examples, the monitoringcontrol unit 110 may coordinate monitoring operations with a separatesecurity panel of the system 100. In such examples, the monitoringcontrol unit 110 may monitor particular activities of the devices of thesystem 100 that are not monitored by the security panel, or monitor theoperation of particular devices that are not monitoring by the securitypanel.

In some examples, a monitoring system may not be used. In theseexamples, the systems and devices within the property 101 (e.g., thecameras 120, the sensors 122, the appliances 124, etc.) communicatedirectly with the server 130 over a long-range communication protocol.

The network 105 is configured to enable exchange of electroniccommunications between devices connected to the network 105. Forexample, the network 105 may be configured to enable exchange ofelectronic communications between the monitoring control unit 110, thesensors 122, the appliances 124, the cameras 120, and the propertymanagement server 130. The network 105 may include, for example, one ormore of the Internet, Wide Area Networks (WANs), Local Area Networks(LANs), analog or digital wired and wireless telephone networks (e.g., apublic switched telephone network (PSTN), Integrated Services DigitalNetwork (ISDN), a cellular network, and Digital Subscriber Line (DSL)),radio, television, cable, satellite, or any other delivery or tunnelingmechanism for carrying data. The network 105 may include multiplenetworks or subnetworks, each of which may include, for example, a wiredor wireless data pathway. The network 105 may also include acircuit-switched network, a packet-switched data network, or any othernetwork able to carry electronic communications (e.g., data or voicecommunications). For example, the network 105 may include networks basedon the Internet protocol (IP), asynchronous transfer mode (ATM), thePSTN, packet-switched networks based on IP, X.25, or Frame Relay, orother comparable technologies and may support voice using, for example,VoIP, or other comparable protocols used for voice communications. Thenetwork 105 may include one or more networks that include wireless datachannels and wireless voice channels. The network 105 may be a wirelessnetwork, a broadband network, or a combination of networks including awireless network and a broadband network.

The system 100 includes one or more cameras 120. In some examples, thecameras 120 are part of the monitoring system for the property 101. Thecameras 120 may be video/photographic cameras or other type of opticalsensing devices configured to capture images. For instance, the cameras120 may be configured to capture images of an area within a buildingmonitored by the monitoring control unit 110. The cameras 120 may beconfigured to capture single, static images of the area and also videoimages of the area in which multiple images of the area are captured ata relatively high frequency (e.g., thirty images per second). Thecameras 120 may be controlled based on commands received from themonitoring control unit 110.

The cameras 120 may be triggered by several different types oftechniques. For instance, a Passive Infra Red (PIR) motion sensor may bebuilt into the cameras 120 and used to trigger the cameras 120 tocapture one or more images when motion is detected. The cameras 120 alsomay include a microwave motion sensor built into the camera and used totrigger the cameras 120 to capture one or more images when motion isdetected. The cameras 120 may have a “normally open” or “normallyclosed” digital input that can trigger capture of one or more imageswhen external sensors (e.g., the sensors 122, PIR, door/window, etc.)detect motion or other events. In some implementations, the cameras 120receives a command to capture an image when external devices detectmotion or another potential alarm event. The cameras 120 may receive thecommand from the controller or directly from one of the sensors 122.

In some examples, the cameras 120 trigger integrated or externalilluminators (e.g., Infra Red, Z-wave controlled “white” lights, etc.)to improve image quality when the image is dark. An integrated orseparate light sensor may be used to determine if illumination isdesired and may result in increased image quality.

The cameras 120 may be programmed with any combination of time/dayschedules, system “arming state”, or other variables to determinewhether images should be captured or not when triggers occur. Thecameras 120 may enter a low-power mode when not capturing images. Inthis case, the cameras 120 may wake periodically to check for inboundmessages from the controller. The cameras 120 may be powered byinternal, replaceable batteries if located remotely from the monitoringcontrol unit 110. The cameras 120 may employ a small solar cell torecharge the battery when light is available. Alternatively, the cameras120 may be powered by the monitoring control unit 110's power supply ifthe cameras 120 is co-located with the controller.

In some implementations, the cameras 120 communicates directly with theproperty management server 130 over the Internet. In theseimplementations, image data captured by the cameras 120 does not passthrough the monitoring control unit 110 and the cameras 120 receivescommands related to operation from the property management server 130.

The system 100 also includes one or more sensors or detectors. Forexample, the monitoring system may include multiple sensors 122. Thesensors 122 may include a contact sensor, a motion sensor, a glass breaksensor, or any other type of sensor included in an alarm system orsecurity system. The sensors 122 also may include an environmentalsensor, such as a temperature sensor, a water sensor, a rain sensor, awind sensor, a light sensor, a smoke detector, a carbon monoxidedetector, an air quality sensor, etc. The sensors 122 further mayinclude a health monitoring sensor, such as a prescription bottle sensorthat monitors taking of prescriptions, a blood pressure sensor, a bloodsugar sensor, a bed mat configured to sense presence of liquid (e.g.,bodily fluids) on the bed mat, etc. In some examples, the sensors 122may include a radio-frequency identification (RFID) sensor thatidentifies a particular article that includes a pre-assigned RFID tag.

The authorized device 140 can include a native surveillance application.In some examples, the native surveillance application is associated withthe monitoring system for the property 101. The native surveillanceapplication may be a software/firmware program configured to run onvarious devices that enables the user interface and features describedthroughout. The authorized device 140 may load or install the nativesurveillance application based on data received over a network (e.g.,the network 105) or data received from local media. The nativesurveillance application runs on mobile devices platforms. The nativesurveillance application also enables the authorized device 140 toreceive and process image and sensor data from the monitoring system.

In some implementations, the authorized device 140 communicate with andreceive monitoring system data from the monitoring control unit 110using a communication link. For instance, the authorized device 140 maycommunicate with the monitoring control unit 110 using various localwireless protocols such as Wi-Fi, Bluetooth, Z-Wave, ZigBee, HomePlug(Ethernet over powerline), or wired protocols such as Ethernet and USB,to connect the authorized device 140 to local security and automationequipment. The authorized device 140 may connect locally to themonitoring system and sensors 122 and other devices. The localconnection may improve the speed of status and control communicationsbecause communicating through a network, such as the Internet or thenetwork 105 with a remote server (e.g., the property management server130) may be significantly slower.

Although the authorized device 140 is shown as communicating with theproperty management server 130, the authorized device 140 may alsocommunicate directly with the monitoring control unit 110, the cameras120, the sensors 122, the appliances 124, and other devices controlledby the monitoring control unit 110 when the authorized device 140 isnear the property 101. For example, the authorized device 140 mayexchange communications with the devices of the system 100 over thenetwork 105.

In some implementations, the authorized device 140 receives monitoringsystem data captured by the monitoring control unit 110 through thenetwork 105. The authorized device 140 may receive the data from themonitoring control unit 110 through the network 105 or the propertymanagement server 130 may relay data received from the monitoringcontrol unit 110 to the authorized device 140 through the network 105.In this regard, the property management server 130 may facilitatecommunication between the authorized device 140 and the monitoringsystem.

Although FIG. 1 illustrates one property for brevity, the server 130 maymanage monitoring systems and monitoring control units for many moreproperties and/or structures. For example, the system 100 may includeseveral monitoring systems each associated with a respective multiple,different properties and the server 130 may manage actions, users, anddevices for each of the different properties. The multiple, differentproperties may be owned by the same entity. For example, a single personmay own all of the properties. In some examples, the multiple, differentproperties may be operated by different entities (e.g., owned bydifferent entities) with single entities operating groups of properties.For example, each property may be a rental property owned by a differentperson, and a single property management company may be managing all ofthe rental properties using the system. In some examples, the property101 is a commercial or industrial property, such as a restaurant or afactory.

The appliances 124 may be home automation devices connected to thenetwork 105 that are configured to exchange electronic communicationswith other devices of the system 100. The appliances 124 may include,for example, connected kitchen appliances, controllable light sources,safety and security devices, energy management devices, and/or othertypes of electronic devices capable of exchanging electroniccommunications over the network 105. In some examples, the appliances124 may include kitchen appliances, such as stoves, ranges, exhaustfans, ovens, etc. In some instances, the appliances 124 may periodicallytransmit information and/or generated data to the monitoring controlunit 110 such that the monitoring control unit 110 can automaticallycontrol the operation of the appliances 124 based on the exchangedcommunications. For example, the monitoring control unit 110 may operateone or more of the appliances 124 based on a fixed schedule specified bythe user. In another example, the monitoring control unit 110 may enableor disable one or more of the appliances 124 based on received sensordata from the sensors 122.

The property management server 130 is an electronic device configured toprovide monitoring services by exchanging electronic communications withthe monitoring control unit 110 and the authorized device 140 over anetwork, such as the Internet, a LAN, etc. In some examples, the networkis the network 105. For example, the property management server 130 maybe configured to monitor events (e.g., events that are used to determinethe state of the property 101) generated by the monitoring control unit110. In this example, the property management server 130 may exchangeelectronic communications with the network module included in themonitoring control unit 110 to receive information regarding events(e.g., alarm events) detected by the monitoring control unit 110. Theproperty management server 130 also may receive information regardingevents from the authorized device 140.

In some implementations, the property management server 130 may routealarm data received from the network module or the authorized device 140to a central alarm station server that is maintained by a third-partysecurity provider. The alarm data can include captured video footage ofthe detected individual within a specific area of the property 101,which is processed by the third-party security provider to requestemergency assistance to the property 101. For example, the alarm datacan be transmitted to law enforcement to indicate a potential securitybreach within the property 101. In some instances, the alarm data canalso include metadata identified by the monitoring control unit 110within the captured video footage (e.g., gender of the individual,suspected identity of the individual, key physical attributes, etc.). Inthese examples, the alarm data can either be transmitted to lawenforcement after requesting confirmation from the user, orautomatically transmitted without intervention from the user.

The property management server 130 may store sensor and image datareceived from the monitoring control unit 110 and perform analysis ofthe sensor and image data. Based on the analysis, the propertymanagement server 130 may communicate with and control aspects of themonitoring control unit 110 or the authorized device 140.

The operations performed by the system 100 may enhance safety when usingkitchen appliances. In some examples, the server 130 receives stateinformation for the property 101. The state information may be used todetermine a scene to be applied to the property 101 or an action oractions to be performed. For example, if it is night time and occupancyis detected in bedrooms of the house, but no motion is detected, thescene may be a “Good night” scene in which the owners of the property101 are home, but are asleep. The server 130 may provide a web interfacethat enables users (e.g., residents of the property 101, monitoringsystem operators, authorized users, etc.) to manage alerts,notifications, and monitoring system actions (e.g., contacting emergencyresponders, controlling appliances 124 in the property 101, analyzingmonitoring system data collected by the monitoring control unit 110,etc.). In these implementations, the server 130 further receives datarelated to settings for the monitoring system controlled by themonitoring control unit 110.

The server 130 may provide a web interface that enables a user to defineoperational settings for the property 101 (e.g., alert profiles, energymanagement profiles, thermostat profiles, rules related to use of theappliances 124, etc.). In some examples, the individual inputting acommand for the monitoring system with which no authenticationinformation is provided 102 may define and update settings forappliances, devices, and systems of the property 101. In some examples,the authorized user 104 may make changes to settings and profiles forappliances, devices, and systems of the property 101 through theauthorized device 140.

In general, the system 100 can be configured to respond to a commandwith which no authentication information was provided and input by theuser 102. For example, the individual 102 can input a command bypressing a button on a thermostat of the property 101 to change thetemperature of the property 101.

The server 130 may include actions 132 available in response to commandswith which no authentication information was provided and input by theuser 102. For example, in response to data received from the monitoringcontrol unit 110 indicating that the user 102 provided a voice commandto open a garage door of the property 101, the server 130 may access theavailable actions 132 and determine that it is necessary to transmit analert to the authorized device 140. In some examples, the server 130 maytransmit the alert directly to the authorized device 140. In someexamples, the server 130 may transmit instructions to the monitoringcontrol unit 110 to send the alert to the authorized device 140. In someexamples, the server 130 may transmit instructions to the monitoringcontrol unit 110 to perform an action related to the monitoring systemof the property 101. In some examples, the server 130 may transmitcontrol signals directly to a system or device of the monitoring system.

In the example depicted in FIG. 1, the monitor control unit 110 receivesproperty state information from the various appliances and systemswithin the property 101, such as the sensors 122, the appliances 124,the cameras 120, etc. The property state information may include datasuch as occupancy data, a state of the monitoring system of the property101, image data from the cameras 120, etc., and can be used to determinevarious scenes for the property 101. For example, if it is day time anda security system of the property 101 is armed, the server 130 maydetermine that an “Away at work” scene should be applied to the property101, and that actions 132 are determined based on the “Away at work”scene. The monitor control unit 110 then receives a command with whichno authentication information was provided and input by the user 102.

In this particular example, the monitor control unit 110 may thenanalyze the property state information against rules for the “Away atwork” scene related to the command input by the user 102. Afteranalyzing the property state information, the server 130 accesses theavailable actions 132 to determine an appropriate action to be performedbased on the “Away at work” scene. After determining an appropriateaction to be performed, the property management server 130 transmitsinstructions to perform the action to be performed to the monitoringcontrol unit 110, which then transmits corresponding signals to one ormore of the cameras 120, sensors 122, or the appliances 124. In someinstances, the action to be performed may include transmitting an eventnotification indicating the command input by the user 102 and otherassociated data to the authorized device 140 of the authorized user 104.

The server 130 may maintain a database that stores property stateinformation (e.g., typical patterns of property usage data (e.g.,appliance 124 usage data, occupancy data, thermostat usage data, etc.).In some examples, the server 130 or the monitoring control unit 110maintains the property usage data. The server 130 may analyze theproperty usage data to provide alerts/reports based on both eventsrelated to the command input by the user 102 and property usage data.For example, the server 130 may monitor the cameras 120 of the property101 to determine whether the user 102 is an authorized user.

The server 130 may communicate with the monitoring control unit 110 tocontrol operations of devices and systems located on the property 101.For example, if the command input by the user 102 is to disarm thesecurity system of the property 101, and the current state of theproperty 101 will allow disarming the security system withoutauthentication, the monitor control unit 110 may disarm the securitysystem.

The authorized device 140 may be an electronic device associated with aproperty owner or an occupant that exchange network communications overa network, such as the Internet or the network 105. For example, theauthorized device 140 may be smartphones, tablets, personal computers(PCs), network-enabled media players, home entertainment systems, cloudstorage devices, and other types of network devices. In some examples,the authorized device 140 may be a smart speaker or an electronic homeassistant. The authorized device 140 may access a service made availableby the property management server 130 on the network 105, such as amobile application. The data generated by the authorized device 140 mayinclude over the network 105, which may be monitored by the monitoringcontrol unit 110.

The system 100 intelligently leverages the property state informationand the monitoring control unit 110 to aid in security monitoring andproperty automation. For example, the monitoring control unit 110 mayaid in investigating alarm events detected at the property 101 throughan analysis of property state information against one or more rulesrelated to the command input by the user 102. In this example, theproperty state information may indicate that it is night time and allauthorized occupants of the property 101 are asleep, and that a windowin the kitchen has been opened with no activity from inside the kitchendetected. The sensors 122 for that particular kitchen window maytransmit the data to the monitoring control unit 110, which may thentransmit the information to the server 130. The server 130 may use theavailable actions 132 to determine that the police department needs tobe notified.

Examples of implementations of the system 100 can use various types ofdata captured devices within the property 101 (e.g., the cameras 120,the sensors 122, the appliances 124, etc.) to perform different actionsbased on the present conditions of the property 101. In some instances,the notifications transmitted by the server 130 may be based on theproperty state information of the property 101. For example, the server130 may transmit a notification to all users and devices associated withthe property 101 in response to data from the monitor control unit 110indicating a button press to open the garage door when the securitysystem is armed (e.g., no one is home, everyone is asleep, etc.),whereas the server 130 may transmit a notification only to anadministrator user in response to property state data indicating abreach within the property 101 when the security system is unarmed. Inother examples, the server 130 may transmit a high-priority alert for ifthe security status of the property 101 is set to an “Alarmed” mode. Forexample, if a pet in the property 101 has opened a door while owners ofthe property 101 are at work, the monitoring control unit 110 mayreceive data indicating the door open event, and may transmits the datato the server 130. The server 130 can transmit an image taken by acamera 120 within the property 101 along with a high-priority alert.

In some implementations, the property management server 130 can transmitinstructions to the monitoring control unit 110 to adjust one or moresettings associated with the devices within the property 101. Forinstance, in response to the door open event, the monitoring controlunit 110 may receive instructions from the server 130 to close the doorand send an alert to the owners of the property 101. In such instances,the particular instructions received by the monitoring control unit 110can be varied based on the current state of the property 101. Forexample, John may prefer that the door be locked after it is closed,whereas Susan may simply want the door to be closed.

In some implementations, where the property management server 130transmits notifications to the authorized device 140, the particularnotification transmitted can be based on the location of the authorizeddevice 140. For example, a notification can be prevented from beingtransmitted if the authorized device 140 is near or with the property101. In other examples, the property management server 130 can transmitnotifications to another remote user if the authorized device 140 islocated within the property 101.

In some implementations, the server 130 determines the particular actionto be performed in response to a command input by the user 102 based onmonitoring one or more parameters indicated by the data transmitted fromthe monitoring control unit 110. For instance, as described moreparticularly with respect to FIGS. 2-4, the available actions 132 canspecify different actions to be performed based on the current state ofthe property 101 and at least one of: occupancy information gathered bythe devices within the property 101, the security status indicated by asecurity system of the property 101, etc. In some implementations, theavailable actions 132 are defined by a scene applied to the property101. In some implementations, the available actions 132 are defined bythe server 130. More particular descriptions related to the componentsof the system 100 are provided below.

FIG. 2 illustrates a diagram of an example of an integrated system 200.In some examples, the system 200 is an example of the system 100. Thesystem 200 may include a network 205, a monitoring control unit 210, oneor more sensors 222, one or more mobile devices 230, one or morewearable devices 240, one or more beacons 250, one or more drone devices260, an application server 270, and one or more non-mobile devices 280.The network 205 may be configured to enable electronic communicationsbetween devices connected to the network 205. For example, the network205 may be configured to enable exchange of electronic communicationsbetween the monitoring control unit 210, the sensors 222, the appliances224, the cameras 226, the mobile device 230, the wearable devices 240,the beacons 250, the drone devices 260, the application server 270, andthe non-mobile device 280. The network 205 may be similar to the network105 described with respect to FIG. 1.

The monitoring control unit 210 may include a controller 212 and anetwork module 214. The controller 212 may be similar to the controllerof the monitoring control unit 110 as described with respect to FIG. 1.The network module 214 may be similar to the network module of themonitoring control unit 110 as described with respect to FIG. 1.

The sensors 222 may be similar to the sensors 122 as described withrespect to FIG. 1. The sensors 222 may include cameras, pressuresensors, temperature sensors, motion sensors, occupancy sensors, ordevice sensors that may communicate with the monitoring control unit 210over the communication link 220. For example, the sensors 222 mayprovide the monitoring control unit 210 sensor data indicating whenusers left a home, when users arrived home, what users are home, whatusers were doing before they left the home and an appearance of userswhen they left the home.

In other implementations, the sensors 222 may include motion sensors,pressure sensors, or other sensors that determine occupancy and usage ofappliances/features within the property. For example, in one instance,motion and temperature sensors may be placed on the walls within a roomto determine if a person is currently occupying or not occupying theroom. In another instance, the sensors 222 may be placed on particularobjects and/or appliances to monitor user activity and user safetywithin a property. For example, touch sensors may be placed on commonappliances such as, for e.g., an oven, a stove, a blender, a spaceheater, which may cause personal injuries to users. In someimplementations, the sensors 222 within the property may collect useractivity data based on proximity with the wearable devices 240 to trackuser movement within the property. In another example, the sensors 222may only collect user activity data when the user is located withinproperty based on location data transmitted from the wearable devices240 indicating that the user is within a particular distance (e.g., 5meters) from the sensors 222.

The one or more mobile devices 230 may be devices that host one or morenative applications, e.g., the native control application 232. Themobile devices 230 may be similar to the authorized device 140 asdescribed with respect to FIG. 1. The mobile devices 230 may be cellularphones or non-cellular locally networked devices. The mobile devices 230may include a cell phone, a smart phone, a tablet PC, a personal digitalassistant (“PDA”), or any other portable device configured tocommunicate over a network. For example, implementations also mayinclude portable music players, other communication devices, andhandheld or portable electronic devices for gaming, communications,and/or data organization. The mobile devices 230 may be the same or mayinclude mobile devices of different types. The mobile devices 230 mayperform functions unrelated to the monitoring platform 200, such asplacing personal telephone calls, playing music, playing video,displaying pictures, browsing the Internet, maintaining an electroniccalendar, etc.

The one or more non-mobile devices 280 may be devices that host one ormore native applications, e.g., the native control application 282. Thenon-mobile devices 280 may be laptop computers, desktop computers,speakers, voice-activated control systems, wired telephone systems, orany other non-mobile device configured to communicate over a network.For example, implementations also may include gaming systems, othercommunication devices, and non-mobile electronic devices for gaming,communications, and/or data organization. The non-mobile devices 280 maybe the same or may include non-mobile devices of different types. Thenon-mobile devices 280 may perform functions unrelated to the monitoringplatform 200, such as placing personal telephone calls, playing music,playing video, displaying pictures, browsing the Internet, maintainingan electronic calendar, etc.

In some implementations, the devices 230, 280 may communicate with andreceive data from the monitoring control unit 210 using thecommunication links 228, 288. For instance, the devices 230, 280 maycommunicate with the monitoring control unit 210 using various localwireless protocols, such as Wi-Fi, Bluetooth, Z-Wave, ZigBee, HomePlug(Ethernet over power line), or wired protocols such as Ethernet, USB,and other wired protocols based on the RS232, RS485, and/or RS422standards. The devices 230, 280 may connect locally to the monitoringplatform 200, its sensors, and other devices. The local connection mayimprove the speed of communications because communicating through thenetwork 205 with a remote server, e.g., the application server 270, maybe slower.

Although the devices 230, 280 are shown communicating with themonitoring control unit 210, the devices 230, 280 may communicatedirectly with the sensors 222, the appliances 224, the cameras 226, thewearable devices 240, the beacons 250, the drone devices 260, and otherdevices controlled by the monitoring control unit 210. In someimplementations, t the devices 230, 280 may replace the monitoringcontrol unit 210 and perform the functions of the monitoring controlunit 210 for local control and long range or offsite communication.

In other implementations, the devices 230, 280 may receive data capturedby the monitoring control unit 210 through the network 205. The devices230, 280 may receive the data from the monitoring control unit 210through the network 205 or the application server 270 and may relay datareceived from the monitoring control unit 210 to the devices 230, 280through the network 205. In this regard, the application server 270 mayfacilitate communications between the devices 230, 280 and themonitoring control unit 210.

Although the devices 230, 280 are shown in FIG. 2 as being connected tothe network 205, in some implementations, the devices 230, 280 are notconnected to the network 205. In these implementations, the devices 230,280 may communicate directly with one or more of the monitoring platform200 components and no network connection, e.g., connection to theInternet, or reliance on remote servers is needed.

In some implementations, the devices 230, 280 may be able to determine ageographic location associated with the devices 230, 280, and maycommunicate information identifying a geographic location associatedwith the devices 230, 280 to the sensors 222 or the wearable devices240. For example, the devices 230, 280 may determine the currentgeographic location of the devices 230, 280 by using global positioningsystem (GPS) capabilities. In other implementations, a geographiclocation associated with the devices 230, 280 may be determined usingother methods, for example, by using Wi-Fi access point triangulationdata, cellular network triangulation data, or IP address information,when the devices 230, 280 have network connectivity. The devices 230,280 may additionally or alternatively transmit data identifying thegeographic location of the devices 230, 280 over the network 205 to theapplication server 270, or to the monitoring control unit 210.

The devices 230, 280 may each include a native application 232, 282respectively. The native applications 232, 282 refer to asoftware/firmware program running on the corresponding mobile devicesthat enables the safety monitoring features described within thisdisclosure. The devices 230, 280 may load or install the nativeapplications 232, 282 based on data received over a network or datareceived from local media. The native monitoring applications 232, 282may run on mobile devices' platforms, such as Apple iOS, iPhone, iPodtouch, Blackberry, Google Android, Windows Mobile, etc.

The native applications 232, 282 identify and display user data such as,for e.g., a geographic location associated with the devices 230, 280 andcommunicate information identifying the geographic location to variousdevices within the monitoring platform 200 such the sensors 222, thewearable devices 240, or the monitoring control unit 210. In someinstances, the native application 232 may also transmit user data to theapplication server 270. For example, the devices 230, 280 having thenative applications 232, 282 may determine a geographic location of thedevices 230, 280 using GPS capabilities, and may communicate dataidentifying the geographic location to the application server 270. Insome instances, the native applications 232, 282 may check the locationof the devices 230, 280 periodically and may automatically detect when auser associated with the devices 230, 280 is going toward or away from aproperty.

The wearable devices 240 may be portable electronic devices that may beincorporated into items of clothing and accessories worn by a user. Thewearable devices 240 may be activity trackers, smartwatches, smartglasses, handhelds, bracelets, necklace pendants, or any wearable deviceconfigured to communicate over a network. The wearable devices 240 mayinclude devices of different types. The wearable devices 240 may performfunctions unrelated to the monitoring platform 200, such as monitoringuser activity data such as, for e.g., biometric data, fitness data,sleep data, user-inputted data, and any other type of quantitative data.

In some implementations, the wearable devices 240 may include anintegrated panic button that a user may push to have the wearabledevices 240 transmit a distress signal indicating that the user requiresemergency assistance to the application server 270 or an emergencyresponder, such as a 911 dispatch center.

In some implementations, the wearable devices 240 may include embeddedsensors that measure various biometric data such as, for e.g., heartrate or rhythm, breathing rate, blood oxygen level, blood pressure, skintemperature, skin moisture. In some implementations, the wearabledevices 240 may include hardware components such as an accelerometer, agyroscope, a microphone, a camera, image sensors, video sensors, soundsensors, and/or an automated speech recognizer.

The wearable devices 240 may constantly monitor and process datatransmitted between the components of the monitoring platform 200 suchas, e.g., the monitoring control unit 210, the sensors 222, or themobile devices 230.

In some implementations, the wearable devices 240 may functionindependently of the components of the monitoring platform 200 andinclude a separate network module that enables the wearable devices 240to connect to the components of the monitoring platform 200 byexchanging wireless communications over the network 205. For instance,the wearable devices 240 may include one or more GSM modules, a radiomodem, a cellular transmission mode, or any type of module configured toexchange communications in the following formats: LTE, GSM or GPRS,CDMA, EDGE, EGPRS, EV-DO or EVDO, UMTS, or IP. In other instances, thewearable devices may be capable of using various local wirelessprotocols, such as Wi-Fi, ANT, Bluetooth, Z-Wave, ZigBee, HomePlug(Ethernet over powerline), or wired protocols such as Ethernet, USB, andother wired protocols based on the RS232, RS485, and/or RS422 standards.For example, the wearable devices 240 may transmit measured data to themobile devices 230 over a local wireless protocol and the mobile devices230 may then transmit the data received by the wearable devices 240 tothe application server 270.

The one or more wireless sensor beacons 250 can be devices capable ofemitting and/or receiving information over a wireless communicationchannel. For example, the wireless sensor beacons 250 may utilizeBluetooth Low Energy (BLE), also known as Bluetooth Smart, or otherwireless technologies such as, for e.g., Wi-Fi, near-fieldcommunications (NFC), or other wireless technologies, to communicatewith the devices connected over the network 205. The wireless sensorbeacons 250 may be commercially available beacon devices or other typesof beacon devices. The wireless sensor beacons 250 may communicate withthe devices of the monitoring platform 205 by emitting messages (e.g.,pings) that include information identifying the wireless sensor beacons250.

In some implementations, devices of the monitoring platform 200 such asthe mobile devices 230, and the wearable devices 240 may communicatewith the wireless sensor beacons 250 by receiving message from the oneor more wireless sensor beacons 250 identifying one or more of thewireless sensor beacons 250. For example, each of the one or morewireless sensor beacons 250 may be associated with a unique universalidentifier (UUID) that identifies a particular wireless sensor beaconwithin a group of two or more wireless sensor beacons within aparticular geographic location, for e.g., a shopping complex.

In some implementations, a particular wireless sensor beacon 250 may beassociated with particular regions within a geographic location, fore.g., particular floors or individual shops within a shopping complex,to monitor user data by exchanging communications with nearby one ormore mobile devices 230, 280 or wearable devices 240. For example, oneor more wireless sensor beacons 250 may be placed within multiple floorsof a shopping complex, each with different UUIDs and a particular set oflatitude and longitude coordinates that are associated with a definedregion (e.g., a section within a store, an outdoor area, a building, avenue or other space).

Each of the one or more wireless sensor beacons 250 may broadcastinformation to allow the devices of the monitoring platform 200 torecognize the one or more of the wireless sensor beacons 250. In someinstances, the one or more wireless sensor beacons 250 broadcast theirinformation periodically for particular periods of time (e.g., everysecond, every millisecond). The one or more wireless sensor beacons 250may broadcast this information using wireless communications protocolssuch as, for e.g., BLE. In some implementations, information broadcastedby the one or more wireless sensor beacons 250 may also be broadcastedon particular frequencies or power levels to control the types ofdevices on the monitoring platform 200 that receive the information. Forexample, the one or more wireless sensor beacons 250 may transmitinformation to the mobile devices 230 and the wearable devices 240, ondifferent frequencies, respectively.

In some implementations, the one or more wireless sensor beacons 250 maybe placed in common regions that experience high user traffic volumessuch as, for e.g., a public park, a tourist attraction, a publictransportation station, a commercial complex, or other types of highlypopulated locations. In such implementations, the one or more wirelesssensor beacons 250 may be configured with third-party electronictransportation or safety platforms to transmit information to thedevices connected to the monitoring platform 200. For example, the oneor more wireless sensor beacons 250 may detect a hazardous condition ona subway line based on receiving safety signals from the transportationauthority and in response, transmit this information to the mobiledevices 230 or the wearable devices 240.

In some implementations, the one or more wireless sensor beacons 250 maybe configured to operate with a particular mobile application that isinstalled on the devices connected to the monitoring platform 200. Forexample, the particular mobile application may include a softwaredevelopment kit (SDK) that enables the devices connected to themonitoring platform to exchange communications with the one or morewireless sensor beacons 250. For instance, the different devicesconnected to the monitoring platform 200 may independently exchangecommunications with the one or more wireless sensor beacons 250. In suchinstances, a wearable device 240 may be able to transmit a distresssignal including user data to the one or more wireless sensor beaconswithout the user having his/her mobile device with him. In otherinstances, the one or more wireless beacons 250 may receive redundantsignal transmissions from the different devices connected to themonitoring platform 200 to ensure that distress signal is adequatelytransmitted to the application server 270 when one or more of thedevices connected to the monitoring platform 200 malfunctions. Forexample, if a user is involved in a car crash that destroys his/herwearable device and mobile device, the monitoring platform 200 maydetermine that these devices are unable to transmit the distress signaland instead transmit a distress signal including cached data stored onother devices connected to the monitoring platform 200 such as the oneor more wireless sensor beacon 250 or the drone devices 260.

In some implementations, the one or more wireless sensor beacons 250 maybe connected to emergency call booths that enable the one or morewireless sensor beacons 250 to identify devices within a particulardistance (e.g., 30 meters) when the devices transmit a distress signalto the monitoring platform 200. For example, the emergency call boothsmay monitor a particular frequency that includes the frequency of theoutgoing distress signals transmitted by nearby devices. In response todetecting that a nearby device has transmitted a distress signal withina particular time period (e.g., 5 minutes), the particular wirelesssensor beacon 250 that is connected to the emergency call may thentransmit a signal including location information to the applicationserver 270 or to an emergency responder, such as a fire departmentdispatch center.

The drone devices 260 may be unmanned devices that are capable ofmovement. For example, the drone devices 260 may be capable of movingthroughout a location based on automated control technology and/or userinput control provided by either the user or by the devices connected tothe monitoring platform 200. In this example, the drone devices 260 maybe able to fly, roll, walk, or otherwise move about a location. Thedrone devices 260 may include helicopter type devices (e.g., quadcopters), rolling helicopter type devices (e.g., roller copter devicesthat can fly and also roll along the grounds, walls, or ceiling), landvehicle type devices (e.g., automated cars that drive around aproperty), and plane type devices (e.g., unmanned aircraft).

In some implementations, the drone devices 260 may be dispatched inresponse to an incident signal indicating that a user may requireemergency assistance. For example, if a user has been injured during aknown running route, the wearable device 240 may transmit data to theapplication server 270 from which the application server 270 maydetermine there is a likely safety incident, and in response, transmitan incident signal and a location of the user to an emergency responderand also transmit a dispatch instruction with the user location to thedrone devices 260. The application server 270 may determine the locationof the user during an incident based on comparing current data collectedby the sensors 222, one or more mobile devices 230, 280, the wearabledevice 240, or the one or more wireless sensor beacons 250 to historicalinformation about the user or user activity. In such examples, themonitoring platform 200 may deploy the drone devices 260 to thedetermined location. In some instances, the drone devices 260 may beequipped with a broadband connection that allows the drone devices 260to connect with the network 205.

In some implementations, the drone devices 260 may include data captureand recording devices. In some instance, the drone devices 260 mayinclude one or more cameras, one or more motion sensors, one or moremicrophones, one or more biometric collection tools, one or moretemperature sensors, one or more humidity sensors, one or more airflowsensors, and/or other types of sensors that may be useful in capturingmonitoring data related to user safety. For example, once dispatched toa location where the user may require emergency assistance, the dronedevices 260 may capture a video feed of the user showing the extent ofinjury and transmit the video feed to either the application server 270or directly to an emergency responder to alert them about the user'scondition. In other examples, the drone devices 260 may be outfittedwith thermal-imaging cameras capable of identifying locations, people,or pets through structural features of a location. For example, thedrone devices 260 may be deployed to a property in which a user islocated and may use the thermal-imaging cameras to determine aparticular location within the property where the user may be trappedinside the property. In such examples, the drone devices 260 maytransmit the captured thermal video footage to an emergency responder,such as a nearby fire station.

In some implementations, the drone devices 260 may also include outputdevices. In such implementations, the drone devices 260 may include oneor more displays, one or more speakers, one or more projectors, and/orany type of output devices that allow the drone devices 260 tocommunicate information to nearby emergency contacts. For example, if auser is physically disabled as the result of an incident and unable touse wearable devices 240 or mobile devices, the user may record adistress message or video using the drone devices 260, which may thentransmit the message or video to the application server 270.

In some implementations, the drone devices 260 may be configured torecord visual verifications and/or identify perpetrator identificationfor particular types of incidents. For example, in response to safetyincidents determined by the application server 270, the applicationserver 270 may deploy the drone devices 260 to record video footage. Insome instances, the drone devices 260 may be configured to operatewithin certain geographic regions (e.g., a gated residential community).The drone devices 260 may be centrally operated by a security providersuch as an alarm security company providing security services to aparticular geographic region. In such instances, the drone devices 260may be stored in a central home base with a charging and control stationand deployed as a mobile solution in response to an incident signals forusers.

In some implementations, the drone devices 260 may be delivery drones(e.g., a parcelcopter) that may be utilized by the monitoring platform200 to provide supplies or other equipment to a user in response to theapplication server 270 detecting the occurrence of an incident. Forinstance, the drone devices 260 that are delivery drones may be used todispatch first aid kits and/or other emergency medical equipment (e.g.,gauze, bandages, braces, epi pens, tourniquets, etc.). In suchinstances, the drone devices 260 may delivery particular supplies basedon the classification of the incident by the application server 270.

In some implementations, after the application server 270 determines anincident, the application server 270 may select the particular dronedevice 260 to deploy to the incident from a set of drone devices 260based on particular attributes such as, for e.g., charge levels,location of the incident, and the direction of user movement. Forexample, the set of drone devices 260 may include various drone devices260 with varying battery capacities, aerial speeds, and/or devicefeatures. In such examples, the monitoring platform 200 may choose theparticular drone device 260 to be deployed that can get to the locationof the incident the fastest and has enough battery to monitor the userfor a reasonable amount of time (e.g., fifteen minutes).

In some implementations, multiple drone devices from the set of dronedevices 260 may be deployed based on the particular nature of the safetyincident. For example, the application server 270 may deploy multipledrone devices if the received user data indicates the safety incident isa life-critical incident (e.g., a house fire) that causes a loss oflife. In some instances, the multiple drone devices may be deployedsequentially to maximize response time and conserve resources. Forexample, the multiple drones may include a diagnostic drone device,which is deployed initially to minimize response time, and a supportdrone device that provide the user with emergency supplies to help withthe emergency event. In another example, an initial drone device may bedeployed to minimize response time while a secondary drone is deployedas a backup if the battery of the initial drone runs out.

The application server 270 may be an electronic device configured toprocess data from the monitoring control unit 210. In some examples, theapplication server 270 is similar to the property management server 130as described with respect to FIG. 1. For example, the application server270 may determine from received sensor data whether the user is injuredor in danger. To make the determination, the application server 270 mayprovide control services by exchanging electronic communications withthe monitoring control unit 210 and the mobile devices 230 over thenetwork 205. For example, the application server 270 may be configuredto monitor user data generated by the devices connected to themonitoring platform 200 such as the sensors 222, the devices 230, 280,the wearable devices 240, the one or more wireless sensor beacons 250,and the drone devices 260. In this example, the application server 270may exchange electronic communications over the network 205 to sendand/or receive information regarding user activity such as biometricdata, activity data, location data and health data. The applicationserver 270 also may receive information regarding activity within orexternal to the property from the devices 230, 280 or the wearabledevices 240.

In some implementations, the application server 270 may store a userprofile with user data transmitted from the devices connected to themonitoring platform 200. For instance, the devices connected to themonitoring platform 200 may periodically transmit various types of userdata to the application server 270. The application server 270 mayaggregate the different types of user data such as personal data,biometric data, activity data, and historical data into a user profile.In some instances, the application server 270 may use the user profileto learn normal usage patterns such as activity patterns (e.g., commonexercise routines) and normal biometric measurements (e.g., restingheart rate, baseline blood pressure, normal skin temperature, baselinebreathing rate). For example, the application server 270 mayperiodically receive user data collected by the devices connected to themonitoring platform 200 such as, for e.g., the devices 230, 280, or thewearable devices 240, and log the user data into the user profile. Theapplication server 270 may then aggregate the received user data overparticular time periods (e.g., six months) and perform trend analyses todetermine normal biometric measurements for the user. In anotherexample, the application server 270 may receive user activity data(e.g., steps taken, calories burnt) and compare the activity data withlocation data to determine usage patterns such as exercise locations,exercise routines, and other activity patterns.

In some implementations, the application server 270 may determineincidents and generate incident reports indicating that a user requiresemergency assistance. For example, an incident may be any type of safetyincident that is detected by the application server 270 based on theuser data collected by the devices of the monitoring platform 200. Forexample, the application server 270 may determine that a user may behaving a heart attack based on the particular wearable device 240 thatmeasures heart rate data that the current heart rate is too highcompared to a reference measurement. In response, the application server270 may transmit an incident report to an emergency responder, such asan ambulance dispatch center, that includes various types of user datasuch as, for e.g., heart rate measurements, user activity dataindicating prior physical activity, historical measurements of heartrates hours prior to the incident.

In another example, the application server 270 may determine fromreceived sensor data that a user was running along a trip route saved ina user's profile and mid-way between the route, the user's breathingpattern and heart rate corresponded to those when the user isunconscious or asleep and that the user is still moving. In response,the application server 270 may determine that there is a safety issue.For example, the application server 270 may determine from data fromcameras 226 that the user may have been kidnapped. If the applicationserver's 270 confidence that the user has been kidnapped is high, theapplication server 270 may immediately notify emergency personnel. Ifthe application server's 270 confidence that the user has been kidnappedis moderate, the application server 270 may display a prompt and anaudio alert on the user's mobile device, wearable device or heads updisplay indicating that the application server 270 has determined thatthe user may be in danger and how the application server 270 made thedetermination, and a countdown indicating that emergency personnel willbe notified if the user does not verify that there is no safety issuewithin a specific period of time (e.g., thirty seconds). The applicationserver 270 may require that the user enter a passcode on the user'smobile device to verify that no notification should be made.

In some instances, the application server 270 may be configured todetermine particular duress codes sent by the user in the event of anemergency incident. For instance, the user may enter a pre-determined orcustomized duress code it appears as if the user has cancelled the alarmbut actually transmits a duress signal to the application server 270.For example, the user may enter the duress code during a robbery.

In yet another example, the application server 270 may receive anindication that a user has activated a panic button on a necklace wornby the user, sensor data indicating that the user was traveling at ahigh speed corresponding to a car and is no longer moving, and sensordata indicating that the user's car airbags have deployed. In response,the application server 270 may determine that the user has been in a caraccident and is seriously injured and may notify emergency personnelaccordingly.

In some instances, the application server 270 may monitor the userlocation of the user when he/she is close to or inside the property todetermine how to process an incident signal. For example, if the user isinvolved in an incident outside the property, the application server 270may transmit the incident signal to emergency responders and if the useris involved in an incident inside the property, the application server270 may instruct the monitoring control unit 210 to transmit theincident signal to the home security provider for the home.

In some implementations, the application server 270 may determine theoccurrence of an incident based on comparing extrinsic data surroundingthe user location and the user data collected by the devices connectedto the monitoring platform 200. For instance, the application server 270may monitor current weather, daylight level, air quality, and/or otherexternal conditions to determine whether the user data indicatessuspicious conditions. For example, if the current weather indicates athunderstorm, then the application server 270 may determine that theuser location indicating that the user is stationary outside may besuspicious, e.g., the user may have been struck by lightning or the useris being forced to stay stationary outside. In another example, if it isnight time, the application server 270 may determine that the user ismore likely to be performing night time activities, e.g., stargazing,walking, jogging as opposed to football or basketball, and determinewhether there is likely to be a safety incident based on the types ofnight time activities in which the user might have been engaged. In yetanother example, if it is night time but the user data indicates thatthe user is currently performing activities outside that are bettersuited for sunlight, e.g., football or basketball, the monitoringplatform 200 may also determine that this may be suspicious. In anotherexample, if the user medical history in the application server 270indicates that the user may have asthma but that the user is located inan area with low air quality, the application server 270 may predictthat the user may likely have an asthma attack or may determine that theuser is likely suffering an asthma attack.

In some implementations, the application server 270 may aggregate userdata collected by devices of multiple users that are all connected tothe monitoring platform 200 to gather data surrounding mass casualtyincidents. For example, if there is a large-scale emergency within aparticular location (e.g., earthquake, terror attack, public evacuation,etc.), the application server 270 may determine the presence of such anemergency based on aggregating suspicious data from multiple deviceswithin the particular location. The application server 270 may comparethe aggregated data to other types of environmental data (e.g., seismicactivity, electromagnetic pulses, or radiation) that are be collectedfrom sensors located nearby or within the particular location wherethere may be abnormal activity.

In some implementations, the monitoring platform 200 may additionally oralternatively include various features. For example, the monitoringplatform 200 may include a peer-to-peer location sharing feature thatenables users to send location information collected from the mobiledevices 230 or the wearable devices 240 to emergency contacts. Inanother example, the monitoring platform 200 may include a distresssignal forwarding feature that enables a user to transmit a distresssignal including user location information from either the mobiledevices 230 or the wearable devices 240 to an emergency responder suchas, for example, a fire station, an emergency medical services facility,or a police station. In another example, the monitoring platform 200 mayinclude mobile applications that use the location data collected by thedevices 230, 280 and the wearable devices 240 to determine the nearbyauthorities having jurisdiction (AHJ) or the public safety access points(PSAP) in case of an emergency incident within the user location.

The monitoring platform 200 as described within this disclosure may beadapted to function with a variety of wearable devices, communicationdevices, and networks with long-term extensibility. For example, newwearable devices and applications may be adapted to operate with themonitoring platform 200 by adapting the new wearable devices to runmobile applications that are capable of exchanging communications withthe devices connected to the monitoring platform 200. In some instances,the monitoring platform 200 may include a mobile application ecosystemthat includes customized mobile applications that are built forparticular mobile devices, wearable devices, communication devices,safety sensors, drone devices, and wireless sensor beacons such thatthese devices may exchange communications over the network 205 withemergency responders. For instance, particular examples of wearablesdevice may include a smart motorcycle helmet or a smart skiing helmetthat can transmit speed and crash information to emergency medicalresponders, including the location on the helmet of the impact(s) andthe number of impacts(s). In another instance, vehicles such as cars,motorcycles, and public transportation may include smart sensors thattransmit distress signals to nearby emergency responders in response toa vehicular crash. In other instances, wearable devices may includeminiaturized personal health devices used to monitor the movement ofpatients with chronic diseases such as, for e.g., Parkinson's disease.

FIG. 3A illustrates an example of a process 300 of taking action relatedto a monitoring system based on commands provided without authenticationinformation. Briefly, the process 300 may include generating propertystate information based on sensor data (310), detecting input of acommand for the monitoring system with which no authenticationinformation was provided (320), analyzing the property state informationagainst one or more rules related to commands input withoutauthentication information (330), and based on the analysis, determiningwhether to perform the action corresponding to the input command orwhether to take another action that is different than the actioncorresponding to the input command.(340).

In more detail, the process 300 includes generating property stateinformation based on sensor data (310). In some examples, the systems100 and 200 can perform the process 300. For example, the propertymanagement server 130 can receive sensor information from the appliances124. In some examples, the server 130 can receive the data through themonitoring control unit 110. Based on the received sensor information,the server 130 can generate property state information, such as movementin a particular area of the property, occupancy of the property,identification of activity patterns of the occupants of the property, orother property state information.

The server 130 can receive various types of data through the monitoringcontrol unit 110. The server 130 may receive data from the sensors 122,the appliances 124, the cameras 120, etc., that indicate an occupancy ofthe property 101. For example, the server 130 may receive data from thesensors 122 indicating motion data within the property 101. In someexamples, the server 130 may receive motion data from a bedroom, thenthe hallway, then stairs, then the kitchen. In some examples, the server130 may analyze or process motion data received to detect an activitypattern. In the above example, the server 130 may determine that themotion data indicates that a person within the property 101 is wakingup, and is heading to the kitchen to make coffee.

In some examples, the server 130 may receive audio data that is analyzedfor an activity pattern. For example, the server 130 may receive audiodata that indicates that a person is moving from the garage to the mudroom and is heading down the hall to the restroom. In this example, theserver 130 may use pattern detection and historical data to determinethat the person is likely John, an owner of the property 101, whousually returns from work at the current time, and generally headsstraight for the restroom after taking off his coat and hanging it up inthe mud room.

The server 130 is able to detect occupancy through various data inputs.Data inputs used to determine occupancy may include various and multipletypes of sensors 122, such as light sensors, infrared sensors, audiosensors, appliance-specific sensors (e.g., toilet flush, stove knob, TVon, etc.), cameras 120, etc. In some examples, the server 130 cancombine data from the various and multiple types of sensors 122 todetect occupancy and/or activity patterns. For example, the server 130may determine from a light turned on upstairs, video from a camera inthe front entrance, and audio sensors, that an occupant of the property101 is coming to open the door for a guest.

In some examples, the server 130 may detect occupancy of the property101 or the entrance or exit of a user associated with a particularmobile device 230. For example, the server 130 may receive data over thenetwork 105 indicating a network connectivity of a mobile device 230. Inthis particular example, the server 130 may receive data indicating thata user's phone 230 is connected to the WiFi of the property 101. Theserver 130 may then determine that the user associated with the phone230 is within the property 101.

In some examples, the server 130 may receive data over a communicationlink 228, such as Bluetooth, Zigbee, etc. For example, the server 130may receive data indicating that the monitor control unit 110 isconnected with a mobile device 230 of a user over a communication link228. The server 130 may then determine that the user associated with themobile device 230 is within the property 101. In some examples, theserver 130 may receive data indicating that the mobile device 230 isconnected with an appliance 124 or a non-mobile device 280 over acommunication link 228. For example, the server 130 may determine thatthe mobile device 230 is connected with a non-mobile device 280, such asa voice-activated home automation unit, over the communication link 228.The server 130 may then determine that a user associated with the mobiledevice 230 is within the property 101.

In some examples, the server 130 may receive location data, such aslongitudinal, latitudinal, and altitude coordinates, a directionalheading, etc. For example, the server 130 may receive GPS dataindicating that the mobile device 230 is within the property 130. Theserver 130 may then receive GPS data indicating that the mobile device230 has left the property 130. The server 130 may receive GPS dataindicating a user is climbing up the stairs and is heading for theirbedroom. In some examples, the server 130 may access pre-existing log ofelectronic identifiers to determine the identity of devices entering orexiting the property 101.

The process 300 may include detecting input of a command for themonitoring system with which no authentication information was provided(320). A command provided without authentication information can be acommand provided by an authenticated user without authenticationinformation. In some examples, a command provided without authenticationinformation can be an unauthenticated command provided by anunauthenticated user. Commands can be input through various methods,such as through voice commands, through a button or switch, throughgestures, through a vibration or knocking pattern, through video/imagefacial recognition, etc.

For example, a command can be input to the monitoring system by speaking“Unlock the door.” In some examples, the command can be input to themonitoring system by pressing a button or turning a dial, such as thedial of a thermostat. In some examples, the command can be input to themonitoring system by gesturing. For example, a user can draw a circlewith their hand in front of a camera 120, a sensor 122, an appliance124, etc., to provide a command to start up an air conditioning systemof the property 101. In some examples, the command can be input to themonitoring system by inputting a pattern. For example, a user may knockthree times on their bedside table that is equipped with a vibrationsensor to apply a scene to the monitoring system of the property 101.

In some examples, the command can be input through facial recognition.For example, a particular user can select a preferred scene or action,and the server 130 can select that preferred scene or perform thepreferred action when the particular user is detected within theproperty 101. In some examples, the preferences of a particular user cantake precedence over the preferences of another user. For example, thepreferred scene of a father in the property 101 may take precedence overthe preference of his son.

In some examples, the scene can be changed based on specific inputs. Forexample, a user can request the “Wake up” scene or the “Going to work”scene. In some examples, the scenes can be arranged in a particularorder, and a user may cycle through the scenes. For example, if a userpresses a button, the system may switch to the next scene.

In some examples, the system may have a threshold level of certaintyregarding whether the system should execute a particular action. Forexample, the system may not be above a threshold level of certainty thatthere is occupancy within the property 101, that an authenticated useris within the property 101, etc. In these examples, the server 130 maydetermine that the appropriate action 132 to take is to wait foradditional data to confirm. For example, the server 130 may wait toreceive additional data from the same sensors 122. In some examples, theserver 130 may wait to receive different data from different sensors122, appliances 124, cameras 120, etc.

In some examples, the server 130 may transmit a notification to anauthorized user. The server 130 may transmit the notification to theauthorized user 104 through the authorized mobile device 140. In someexamples, the server 130 may provide the notification to the user 102who input the command. In some examples, the notification may ask theuser 104 to explicitly confirm the authorization of the command providedby the user 102 without authentication information. In some examples,the server 130 may transmit the notification as a push notification, anSMS, an email, etc. The server 130 may transmit the notification to theuser 104 through various devices and methods, such as through network105, over communication link 228, through devices 230, 280, throughappliances 124, through the monitor control unit 110, etc.

In some examples, the server 130 may ask the user 102 who input acommand with which no authentication information was provided to provideadditional information. In some examples, the server 130 may ask theauthorized user 104 to provide additional information. For example, theserver 130 may ask the users 102, 104 through various devices andmethods, such as a voice prompt, to say their code or password. In someexamples, the server 130 may ask the users 102, 104 to simply sayanything, and the server 130 may use voice recognition to analyze theadditional input. In some examples, the user 102 who input a commandwith which no authentication information was provided and the authorizeduser 104 are the same person.

In some examples, the server 130 may ask the users 102, 104 to provideadditional information through various devices and methods, such asfacial recognition, gesture passwords, etc. For example, the server 130may ask the users 102, 104 to stand in front of a camera 120 so that theserver 130 may use facial recognition to authenticate the user. In someexamples, the server 130 may ask the users 102, 104 to provide a gesturepassword to a camera 120.

The process 300 may include analyzing the property state informationagainst one or more rules related to commands input withoutauthentication information (330). For example, the server 130 canreceive monitoring system data from the monitoring control unit 110. Themonitoring system data can include data from devices such as the cameras120, the sensors 122, other appliances 124, and other devices andsystems under the purview of the monitoring system for the property 101.

Based on the analysis, the server 130 may determine whether to performthe action corresponding to the input command or whether to performanother action that is different than the action corresponding to theinput command (340). For example, the server 130 may determine, based onthe property state information received, a scene to be applied to theproperty 101 or an action to be performed. Scenes are a set of actionsor monitoring statuses that can be applied to the home automation systemor property. For example, a scene may be applied to the property 101based on an occupancy of the property 101, the time of day, the historyof actions taken, etc. The server 130 may automatically determine thescene to be applied to the property 101 or the action to be performed.The server 130 may dynamically alter the scene to be applied to theproperty 101 or the action to be performed. For example, the server 130may continually receive updated property state information, and mayselect a different scene or action based on the updated information. Insome examples, the server 130 may automatically select scenes or actionsto be applied to the property 101 based on historical data or patternsof activity. For example, if the owners of the property 101 usually goto bed at 10:30 p.m., at 10:25 p.m. the server 130 may begintransitioning to a “Good night” scene that controls settings of themonitoring system and connected devices to a nighttime setting.

In some examples, the server 130 may determine, based on the state ofthe property 101, that a command provided by the user 102 withoutauthentication information may be executed. In some examples, thecommands allowed by the server 130 may be determined based on the typeof command. For example, if the motion sensor in a room with avoice-activated control device is active, and the monitoring system isnot in a pre-alarm state, the server 130 may allow the monitor controlunit 110 to perform voice commands. In some examples, the commandsallowed by the server 130 may be determined based on the effect of thecommand. For example, if the camera 120 has performed facial recognitionin the room in which a voice command is being issued and the user 102has been confirmed as an authorized user 104, the server 130 may allowcommands that lower the state of security of the property 101. Forexample, the server 130 may allow a command to disarm the securitysystem to be executed without authentication information.

Based on analyzing the property state information and the input commandagainst one or more rules, the server 130 may also determine to performvarious other actions that are different than the action correspondingto the input command. For example, the server 130 may determine togenerate and send a notification to a user's computing device. In someexamples, the server 130 may determine to generate and send anauthorization request to a user's computing device. In some cases, theserver 130 may generate an alarm condition.

In some examples, the commands allowed by the server 130 depend on thelocation from which the command is given. For example, if a buttoninside the property 101 is pressed and the system is not in pre-alarm,no authentication is needed to make the property 101 less secure.

In some examples, the server 130 may determine whether to perform theaction corresponding to the unauthenticated input command based on thesecurity impact of the command. The security impact of the command maydepend, for instance, on the device implicated in the command or theaction commanded. For example, the server 130 may determine that aninput command to adjust a device of the property that is not importantto security (e.g., a thermostat, lights, blinds, a sprinkler system,etc.) may have a low security impact, whereas an input command to adjusta device of the property that is important to security (e.g., monitoringsystem status, door or window locks, etc.) has a higher security impact.As another example, the server may determine that an input command toincrease the security of the property (e.g., arm the monitoring system,lock the doors) has a lower security impact than an input command todecrease the security of the property (e.g., disarm the monitoringsystem, unlock the doors).

The server 130 may determine the security impact by accessing a table ofinput commands. Each input command may correspond to a differentsecurity impact score. The security impact of adjusting a light may beone. The security impact of disarming the monitoring system may be five.In this case, the range of security impact scores may be between one andfive. In some implementations, a resident of the property may adjust thesecurity impact scores to reflect a specific security impact that may beparticular to the property. In some implementations, the server 130 mayupdate the security impact score table using machine learning. Forexample, a resident who may not authorize any unauthenticatedadjustments to the thermostat may cause the sever 130 to increase thesecurity impact score of adjusting the thermostat.

The server 130 may analyze the property state information, the securityimpact of the command, and the input command itself against one or morerules to determine whether to perform the action corresponding to theunauthenticated input command or whether to perform another action. Forexample, the server 130 may determine that an unauthenticated command toadjust the thermostat has a low security impact and that, as a result,the server 130 may adjust the thermostat as requested by the command.Alternatively, the server 130 may determine that an unauthenticatedcommand to lower the security of the property by disarming themonitoring system has a high security impact. As a result, the server130 may determine that it will generate and provide an authorizationrequest to the computing device of a user.

The server 130 may limit each scene or action to be performed byhistorical data, activity patterns, etc. For example, if a command isbeing input without authentication information at a time of day when theowners are normally at work, the server 130 may ask the user 102 toprovide further authentication information. In some examples, if acommand is being input without authentication information around dinnertime and the server 130 has determined from data provided by the cameras120 that guests that have previously been inside the property 101 arearrive, the server 130 may allow a user to provide an “Open door”command without authentication information.

In some examples, the server 130 is integrated with data not associatedwith the property 101 or the monitoring system. For example, the server130 may be granted access to calendars, schedules, contacts, etc. ofusers 102, 104. The server 130 may determine that the owners of theproperty 101 are going on vacation, and may automatically select a“Long-term away” scene to apply to the property 101. In some examples,the server 130 may determine that the owners of the property 101 arehosting an event at the property 101, and may access the owners'contacts to use facial recognition and allow commands to be inputwithout authentication information by the guests. The server 130 mayrevoke command access by the guests once they leave, even if they arerecognized users.

In some examples, the server 130 updates a scene to be applied to theproperty 101 or an action to be performed based on property stateinformation collected at the time the command is given by the user 102.For example, if the user 102 walks into the living room, flips on thelights, and says “turn on the TV to BBC,” the server 130 may determine,using data from the cameras 120, that the user 102 is the homeowner, andallow the command without authentication information.

In some examples, the server 130 allows commands based on sensedbehavioral activity. For example, the server 130 may use patterns ofbehavior that indicate that the user 102 providing the command withoutauthentication information has good intentions. For example, if the user102 is requesting to lock the doors at nighttime or turn on the securitysystem from the garage, the server 130 may determine that the actionsare increasing the security of the home, and that the commands arenormally given by the homeowner of the property 101, and allow thecommands.

The server 130 may prevent commands from being executed or requireauthentication under certain circumstances and states of the property.For example, if a “Good night” scene is applied to the property 101 anda user 102 attempts to provide a voice command to disarm the securitysystem by yelling it through the door, the server 130 may prevent thecommand from being executed, and may issue a notification to anauthorized user 104.

The server 130 may use multiple mechanisms to prevent harmful commandsfrom being provided. For example, the server 130 may use a combinationof a valid detected presence of a homeowner or authorized user of somesort and multiple factors that either do or do not suggest the commandis validly being given. For example, if the server 130 determines thatan authorized user 104 is active within the property 101, but that theuser is upstairs in the study and a command is being input withoutauthorization in the basement, the server 130 may prevent the commandfrom being executed or may require authorization.

An authorized user 104 or homeowner may have total control over theextent of authentication required, the types of commands allowed, theusers that are authenticated, etc. In some examples, the user 104 mayspecify the exact criteria that trigger the lowering of authenticationstandards. For example, the user 104 may provide settings to the server130 that instruct the server 130 to only apply a certain scene or toperform a certain action when an explicit set of events occur.

In some examples, the server 130 may allow a user to opt-in to a fuzzylearning process through which the server 130 may learn a user's typicalbehavior and update settings, criteria, etc. for scenes to be applied tothe property 101 or for actions to be performed. For example, the server130 can store historical data and access the data to determine whether acommand or an action taken is typical of an identified user. In someexamples, the user may specify a certain threshold of certainty orconfidence needed to allow a command to be executed withoutauthentication information, or with less authentication information. Forexample, the user 104 may specify that unless voice recognition is atleast 80% certain that the user 102 providing the command withoutauthentication information is a homeowner or authorized user, the server130 will not allow the command to be executed. In some examples, theserver 130 can determine that a second factor of authentication isneeded. For example, the server 130 may request facial recognition data,a password, etc. as described above.

In some examples, the server 130 can change the level of authenticationneeded to provide a command. For example, the server 130 can allowcommands to be provided without authentication information. In someexamples, the server 130 can reduce the level of authenticationrequired. For example, the server 130 can require that only the 4-digitPIN is required to disarm the security system, instead of the15-character password. In some examples, the server 130 can increase thelevel of authentication required. For example, the server 130 canrequire that a physical button press be provided in addition to a voicecommand.

In some examples, the server 130 can determine the level ofauthentication or level of automation to provide based on the thresholdof certainty. For example, if the server 130 is at or above its highestthreshold of certainty, the server 130 may apply a scene thatautomatically performs commands without any input required orautomatically perform actions on behalf of a user without any inputrequired. In this example, if the server 130 is between its highestthreshold of certainty and a high threshold, the server 130 may apply ascene that performs commands upon input without additionalauthentication information. If the server 130 is between its highthreshold and its medium-high threshold, the server 130 may apply ascene that allows commands to be executed upon input with single-factorauthentication. If the server 130 is between its medium-high thresholdand its medium threshold, the server 130 may apply a scene to theproperty 101 that allows commands to be executed upon input withmulti-factor authentication. In some examples, if the server is at orbelow a very low threshold of certainty, the server 130 may apply ascene that denies the input and requires central station authenticationto perform the command. For example, the server 130 may require a workerat a central station associated with the monitoring system of theproperty 101 to confirm that the user 102 is an authorized user.

In some examples, a user's preferences and scenes may be stored on theserver 130 and may be transmitted to other properties 101 and othermonitoring systems. For example, if a user goes on vacation to a beachhouse, the user may apply their scene settings to the beach house. Insome examples, if the user owns multiple properties, or if the user is aproperty management company, the user can control scenes for multipleproperties by changing the settings of their scenes.

FIG. 3B illustrates an example of a process 350 of automatically takingaction related to a monitoring system based on commands provided withoutauthentication information. In some examples, the process 350 includesperforming actions based on the state of the property and automaticallytaking action. Briefly, the process 300 may include generating propertystate information based on senor data (360), analyzing the propertystate information against one or more rules related to commands inputwithout authentication information (370), and based on the analysis,determining whether to perform the action corresponding to the inputcommand or whether to perform a different action (380).

In more detail, the process 350 includes generating property stateinformation based on sensor data (360). The process 350 may be similarto the process 300. In some examples, the system may behave in similarways in process 300 and process 350. For example, the system may behavein a similar manner in process 350 as in process 300 at 310 and 360.

The process 350 may include analyzing the property state informationagainst one or more rules related to commands input withoutauthentication information (370).

In some examples, the server 130 can determine the level ofauthentication or level of automation to provide based on the thresholdof certainty. For example, if the server 130 is at or above its highestthreshold of certainty, the server 130 may apply a scene thatautomatically performs commands without any input required. In thisexample, if the server 130 is between its highest threshold of certaintyand a high threshold, the server 130 may apply a scene that performscommands upon input without additional authentication information.

In some examples, a user's preferences and scenes may be stored on theserver 130 and may be transmitted to other properties 101 and othermonitoring systems. For example, if a user goes on vacation to a beachhouse, the user may apply their scene settings to the beach house. Insome examples, if the user owns multiple properties, or if the user is aproperty management company, the user can control scenes for multipleproperties by changing the settings of their scenes. In some examples,scenes for multiple properties can be controlled automatically. Forexample, scenes can be controlled based on external data such as theweather, the occupancy, an expected occupancy, etc.

In some examples, scenes may be modified based on the threshold ofcertainty that the server 130 has. For example, if the server 130 isless than 60% confident that a user has woken up and that it is time toapply the “Wake up” scene or to perform an action or set of actionsdefined by the “Wake up” scene, the server 130 may allow certainautomatic actions, such as turning on the lights and starting the coffeemaker, without allowing other automatic options, such as disarming thesecurity system.

The process 350 may include determining whether to perform an actioncorresponding to the input command or to perform a different action(380). For example, if the server 130 determines that the property 101is in a secure state (e.g., the server 130 has received data indicatinga “Secure” scene should be applied to the property 101 and the server130 has confirmed that an authorized user 104 is within the property101) the server 130 may allow commands to be executed automaticallywithout requiring authentication.

In some examples, if it is early in the morning, around when anauthorized user 104 typically wakes up, and the security system is notin an alarm state, if the monitor control unit 110 provides the server130 with information that aligns with the user 104's typical routine,the server 130 may apply a “Wake up” scene to the property 101 andperform a sequence of actions associated with the “Wake up” scene with alower level of authentication required. For example, if the server 130receives data from the monitor control unit 110 indicating that thesecurity system is in an armed stay mode and data from the sensors 122that indicate motion in the upstairs bedroom, vibration in the hall,light turned on at the stairs, and then motion in kitchen, the server130 may determine that this pattern of property state information andsensor events aligns with the homeowner's typical morning routine, sothe server 130 applies a “Wake up” scene with a lower level ofauthentication to the property 101. In some examples, if the server 130has a threshold level of certainty, the server 130 may automaticallyperform actions associated with the “Wake up” scene (e.g., starting thecoffee maker, opening the blinds, etc.).

In some examples, if the server 130 detects an abnormality in the stateof the property 101, the server 130 may require additionalauthentication information. For example, the server 130 may require avoice command to apply the “Wake up” scene to the property 101 to beprovided before automatically performing the actions associated with thescene. In some implementations, the server 130 may require a voicecommand to begin performing actions associated with the “Wake up” scene.

In some examples, the server 130 may determine to generate anotification, an authorization request, or an alarm condition inresponse to its analysis of the property state information.

FIG. 4A illustrates a diagram of an example scenario 400 in which a“Good night” scene is applied to the property 101, and a user (in thiscase, a thief) provides a command without authorization information. Inthis particular example, it is nighttime, and the security system of theproperty 101 is armed. The scene applied to the property 101 may be anyscene that arms the security system. In some examples, the thief mayattempt to disarm the security system by pressing the disarm button.

In this example, the server 130 receives state information indicatingthat all authorized users in the property 101 are upstairs in bed andhave not moved in two hours. The server 130 receives the button press atthe security system interface, and compares the command with the sceneapplied to the property 101 and various other property stateinformation. In this particular example, the property 101 has anighttime scene, such as a “Good night” scene which involves locking thedoors, arming the security system in a stay mode, monitoring the doorsand windows, rejecting commands provided without authenticationinformation, and sending a notification to authorized users when anabnormal event, such as a command provided without authenticationinformation, is detected.

The server 130 may determine that it is nighttime, that no movement wasdetected from the upstairs bedrooms to the security system where thebutton was pressed. The server 130 may also receive data from thesensors 122 that a window on the first floor was opened. In someexamples, the server 130 may compare the button press withoutauthentication information with the rules associated with the “Goodnight” scene and determine that an alert or notification is to be sentto authorized users notifying them of the attempted disarm event. Insome examples, the server 130 may determine that an alarm condition isto be generated.

In some examples, nighttime scenes may include actions such as armingthe security system, turning off all interior lights and turning onexterior lights, locking doors, turning off appliances, etc.

FIG. 4B illustrates a diagram of an example scenario 420 in which a userprovides a command. In this particular example, the user is inside ofthe property 101, and the user is shown coming down the stairs andproviding a voice command to a monitor control unit 110 on the firstlevel. The user provides a voice command to “Unlock the door.” In someexamples, there is only one door that is unlockable in the property 101.In some examples, the server 130 is able to determine which door theuser is referring to, based on the user's location within the property101 and where the command is being given. For example, the user is shownheading down the stairs toward the front door, and the monitor controlunit 110 that receives voice commands is also downstairs. The server 130may then determine that the “Unlock” command is directed to the frontdoor.

In some examples, the server 130 may have a low level of certainty andmay request addition authentication information. For example, the usermay be moving down the stairs too quickly and the server 130 may nothave a clear image to perform facial recognition on to determine thatthe user is authorized. In some examples, a scene is applied to theproperty 101 or an action is performed that allows commands to beexecuted without authentication information.

In some examples, the server 130 uses the current state to determinewhether applying a scene or changing settings requires additional orless authentication. In some examples, the server 130 applies scenesbased on input from a user. For example, the server 130 can determinethat a user has pressed a button programmed to apply the “I'm home forthe night” scene to the property 101.

In some examples, the server 130 applies the scenes or performs actionsbased on the user. For example, the server 130 may maintain data onmultiple valid users. In some examples, the server 130 can determine,from sensor data, that more than one valid user is present. For example,if a person is coming down the stairs with their child, the server 130may require further authentication when a command is given by the child.In some examples, the server 130 may always require furtherauthentication when a child (or other unauthorized user) is present.

In some examples, the server 130 detects different users throughdifferent data. For example, the server 130 may be set to only allowcommands from a child if the child's face is detected. In some examples,the server 130 detects a particular user through a particular method.For example, the server 130 may only set a high confidence level if anowner of the house is detected through voice recognition and deviceconnectivity with the network.

FIG. 4C illustrates a diagram of an example scenario 440 in which a userprovides an input to apply a specific scene to the property 101. In thisparticular example, the user has just woken up and says “‘GOOD MORNING’house!” In some examples, the server 130 can use speech recognition toparse a user's words for certain command words. For example, “GOODMORNING” can be a command to apply the “Wake up” scene to the propertyor to initiate performance of actions defined by the “Wake up” scene. Insome examples, the user can change these command words.

In some examples, a “Wake up” scene can perform a number of actionsrelevant to waking up, such as disarming the security system, turning onthe lights, opening the blinds, starting the coffee maker, etc. In someexamples, the user can trigger the “Wake up” scene through variousmethods, such as a voice input, gestures, etc. For example, the user mayknock three times on their bedside table, which contains a sensor, toinitiate the “Wake up” scene. In some examples, the user can simplypress a button that applies the “Wake up” scene or that initiatesperformance of a set of actions associated with the “Wake up” scene.

In some examples, the server 130 receives property state informationthat allows it to determine when a user is waking up, and whether toapply the “Wake up” scene or to perform actions related to the “Wake up”scene. In some examples, if the server 130 is below a certaintythreshold, the server 130 may wait for input from the user tospecifically request initiation of the “Wake up” scene.

FIG. 4D illustrates a diagram of an example scenario 460 in which aguest, or a non-authenticated user, attempts to provide a command to themonitoring system of the property 101. In some examples, the guest is ahouse guest, or a guest who is staying in the property 101 for anextended period of time. In some examples, the guest is a worker or someother kind of guest who will only remain in the property for a shortperiod of time.

In this example, the guest is attempting to change the temperature ofthe property 101 through a button press without authenticationinformation. The server 130 detects that the scene applied to theproperty 101 includes notifying an authorized user of the guest'sattempted actions. In some examples, the notification includes theguest's name. In some examples, the notification includes a promptallowing the authorized user to allow or deny executing the commandprovided by the guest.

In some examples, if the server 130 knows there is a guest within theproperty 101 or detects a guest, the server 130 may lower certaintythresholds required before additional authentication is required, modifybehavior models and activity patterns to account for the presence of theguest, etc. For example, a homeowner can provide input to the server 130indicating that guest is staying within the property 101. The server 130can then react to the input. For example, if the guest is staying in thebasement, motion in the basement by the guest does not impact the “Wakeup” scene invocation or any actions to be performed. In some examples,the user may allow the guest to trigger routine scenes. In someexamples, the user may input preferences to temporarily alter actionsassociated with scenes for the duration of the guest's stay.

In some examples, the server 130 can automatically apply a “Guest” sceneto the property 101 or perform a set of actions related to the “Guest”scene based on facial recognition, social media or calendar information,etc. provided by the user, or various other data. In someimplementations, each guest may have their own personalized scenes orset of actions. For example, the server 130 can determine from Sarah'scalendar that her sister Claire is visiting for the weekend, and canprepare to transition to the “Claire-Guest” scene.

In some examples, the property 101 is a rental property, and the guestsare patrons. In these examples, the guests may be limited in thesettings they are able to alter. In some examples, the guests may beable to bring scenes from their own homes to the property 101. Guestscenes can be activated for a scheduled period of time, and access maybe revoked after that period of time, even if the guests are recurring.

In some examples, the guests are workers, such as repairmen or acleaning service. In some examples, the cleaners may come to clean theproperty every week. A “Cleaners-Guest” scene may be applied to theproperty 101 by the server 130 for the scheduled time period that thecleaners are to visit. For example, the “Cleaners-Guest” scene mayinclude unlocking the door upon facial recognition at the front door,allowing access to the rooms, unlocking windows, etc. In some examples,once the cleaners leave, the server 130 will determine that there is noguest occupancy and automatically apply an “Unoccupied” scene or performa set of actions associated with an “Unoccupied” scene. In someexamples, the worker guests are held a higher authentication level, andare required to enter a code, such as a guest user code. In someexamples, worker guests must be let into the property 101. For example,an authorized user 104 may receive video data from the cameras 120 toverify the identity of the workers before unlocking the doors. In someexamples, worker guests must be allowed into the property 101 by a userfrom inside the property 101.

In some examples, behavior and activity data collected by the monitoringsystem while the guests or workers are in the property 101 or after aguest scene is applied to the property 101 may be used as input to theserver 130. The server 130 may use the data to determine abnormalbehavior or detect abnormal events. The data can be used to adjustactions and settings of certain scenes. For example, patterns ofbehavior can be adjusted while the “Worker-Guest” scene is applied.While a command may come from inside the property 101 while a user isdetected in the same room as the monitor control unit 110, the certaintythreshold that must be reached without requiring additionalauthentication data may be raised. For example, a certainty thresholdthat a user is authenticated may be raised from 70% to 90% when a guestis in the property 101.

FIG. 4E illustrates a diagram of an example scenario 480 in which theuser 102 commands the server 130 to apply a scene or action thatincludes arming the system for the daytime. For example, the server 130may apply an “Off to work” scene to the property 101 to adjust thethermostat to conserve energy, turn off certain lights, and open thegarage door, allowing the user to leave the house quickly. The “Off towork” scene can include other actions such as locking the windows,turning off all appliances, etc.

In some implementations, the user 102 is not inside of the building onthe property 101. For example, the user 102 may be on the perimeter ofthe property 101, or in the yard or parking lot of the property 101. Inthe example scenario 480, the user 102 is on the steps outside of thehome on property 101 and, from outside the home, commands the server 130to apply the “Off to work” scene. In some implementations, the server130 may analyze the property state against a different set of rulesdepending upon whether the user 102 is inside of or outside of theproperty 101.

FIG. 4F illustrates a diagram of an example scenario 490 in which theserver 130 applies a scene or action when the user 102 is not inside ofthe property 101. For example, the user 102 may be returning home fromwork. In some examples, the server 130 may apply a scene or perform anaction that includes readying the property 101 for occupancy. In examplescenario 490, the server 130 applies an “Arriving home” scene to theproperty 101 to readjust the thermostat for the homeowners' preferences,turn on the lights, open the garage door, and start the oven for dinner.The “Arriving home” scene can include other actions, such as opening theblinds.

In some examples, the server 130 determines that a user is on their wayhome. For example, the server 130 may receive GPS data indicating that auser has left their place of work and is travelling in the direction ofthe property 101. The server 130 may determine that a user is on theirway home through various methods, such as using GPS data, using networkconnectivity data, using communication link 228, 288, etc. For example,the server 130 may determine that the user 102 is right outside of theproperty 101 based on detecting that a mobile device of the user 102 isconnected to a WiFi network of the property 101.

In some examples, the server 130 may allow the user 102 to provideunauthenticated commands within a predetermined distance of the property101. For example, the server 130 may allow the user 102 to provide anunauthenticated command to open the garage door of the property 101 whenthey are within one mile of the property 101. The server 130 may allowthe user 102 to provide an unauthenticated command to turn on exteriorlights of the property 101 or disarm the security system of the property101 when the user 102 is determined to be less than half of a mile fromthe property 101. In some examples, the predetermined distance isdetermined by the users 102 or 104. In some examples, the predetermineddistance is determined by the server 130. In some examples, the user 102may provide the unauthenticated command to the server 130 through avoice link of the user's car. In some examples, the server 130 mayreceive data from other sensors of the user's car (e.g., through anOBDII sensor) and, based on that data, determine whether to apply ascene to the property 101.

In some examples, the server 130 may prompt the user 102 to provide anunauthenticated command when the user 102 is within a predetermineddistance of the property 101. For example, if the user 102 is detectedto be within a quarter of a mile of the property 101, the server 130 mayprompt the user to provide a command to open the garage door. In someexamples, the server 130 may ask a user if they wish to allow a commandto be performed. For example, the server 130 may ask the users 102, 104to confirm that they would like to disarm the security system and openthe garage door.

In some examples, the server 130 may allow unauthenticated commands whena user is detected near the property 101 and a second form ofauthentication is confirmed. For example, if the user's mobile device ispaired to the user's vehicle through a short-range communication link,such as Bluetooth, the server 130 may allow the user 102 to provide anunauthenticated command to open the garage door.

In some examples, the server 130 may allow unauthenticated commands whena user parks on the street near the property 101. For example, if theuser 102 and/or their car is detected within a predetermined distance ofthe property 101, the server 130 may allow the user to provide commandsto unlock the front door and/or disarm the security system. In someexamples, the server 130 may allow the user 102 to provideunauthenticated commands for a short period of time once their car isdetected within a predetermined distance of the property 101. Forexample, if the user 102 arrives home from work and parks on the street,their car may send a notification to the server 130 announcing that theuser 102 has arrived at the property 101. In some examples, the server130 may allow the user 102 to provide unauthenticated commands within ashort, predetermined period of time (e.g., five minutes, thirty seconds,etc.) of their car sending the server 130 a notification that the carhas been parked and turned off. In some examples, the server 130 maydetermine that the user's car has been turned off by determining that ashort-range communication link between the car and the user's mobiledevice has been lost. For example, the server 130 may determine that theuser's car has been turned off by detecting that the Bluetooth pairingbetween the user's car and the user's mobile device has beendisconnected.

While examples have been given that describe scenarios in which usersare arriving at the property 101, it is contemplated that the server 130may allow unauthenticated commands to be provided in the same mannerwhen a user is departing the property 101. For example, if a user isdetected within 50 feet of the property 101, the server may allow theuser to provide an unauthenticated command to close the garage door. Insome examples, the server 130 may prompt the user to provide anunauthenticated command or to confirm that an action or set of actionsis to be taken upon their departure from the property 101. For example,the server 130 may ask the user whether they would like to arm thesecurity system, lock the front door, and close the garage door once thesystem detects that the user is leaving (e.g., by detecting no occupancyof the property 101, by detecting the opening and closing of the sidedoor and the loss of connection between the user's mobile device and anetwork within the property 101, etc.).

In some examples, the server 130 applies the scenes or performs actionsautomatically based on the user's history and preferences. For example,if a user is detected to be arriving home, and the user has arrived homewithin an hour of that time every day for the past two weeks, the server130 may allow the user to provide an unauthenticated command. In someexamples, the range of time within which the user has arrived home maybe determined by the server 130. In some examples, the range of timewithin which the user has arrived home may be determined by the users102, 104. In some examples, the user may commute weekly, and the time atwhich the user typically arrives home is a particular day of the week.

Other arrangements and distribution of processing is possible andcontemplated within the present disclosure.

The described systems, methods, and techniques may be implemented indigital electronic circuitry, computer hardware, firmware, software, orin combinations of these elements. Apparatus implementing thesetechniques may include appropriate input and output devices, a computerprocessor, and a computer program product tangibly embodied in amachine-readable storage device for execution by a programmableprocessor. A process implementing these techniques may be performed by aprogrammable processor executing a program of instructions to performdesired functions by operating on input data and generating appropriateoutput. The techniques may be implemented in one or more computerprograms that are executable on a programmable system including at leastone programmable processor coupled to receive data and instructionsfrom, and to transmit data and instructions to, a data storage system,at least one input device, and at least one output device. Each computerprogram may be implemented in a high-level procedural or object-orientedprogramming language, or in assembly or machine language if desired; andin any case, the language may be a compiled or interpreted language.Suitable processors include, by way of example, both general and specialpurpose microprocessors. Generally, a processor will receiveinstructions and data from a read-only memory and/or a random accessmemory. Storage devices suitable for tangibly embodying computer programinstructions and data include all forms of non-volatile memory,including by way of example semiconductor memory devices, such asErasable Programmable Read-Only Memory (EPROM), Electrically ErasableProgrammable Read-Only Memory (EEPROM), and flash memory devices;magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and Compact Disc Read-Only Memory (CD-ROM). Anyof the foregoing may be supplemented by, or incorporated in, speciallydesigned application-specific integrated circuits (ASICs).

It will be understood that various modifications may be made. Forexample, other useful implementations could be achieved if steps of thedisclosed techniques were performed in a different order and/or ifcomponents in the disclosed systems were combined in a different mannerand/or replaced or supplemented by other components. Accordingly, otherimplementations are within the scope of the disclosure.

What is claimed is:
 1. A monitoring system comprising: one or moresensors that are located throughout a property; a monitoring controlunit that is configured to: receive data collected by the one or moresensors located throughout the property; and generate property stateinformation based on the data collected by the one or more sensors; andan input device that is configured to: detect an input command to adjustan electronic device, wherein the input command does not includeauthentication information for the monitoring control unit toauthenticate the input command before adjusting the electronic device,wherein the monitoring control unit is further configured to: receive,from the input device, data identifying the input command that does notinclude the authentication information for the monitoring control unitto authenticate the input command before adjusting the electronicdevice; analyze the property state information and the input commandagainst one or more rules that are related to authorizing additionalinput commands that are received by the monitoring system without theauthentication information; and based on analyzing the property stateinformation and the input command against the one or more rules,determine whether to adjust the electronic device or generate (i) analarm condition or (ii) a notification.
 2. The monitoring system ofclaim 1, wherein: the monitoring system is in an armed state, theproperty state information indicates that an expected number ofoccupants are located in a particular area of the property, the inputcommand comprises a command to disarm the monitoring system providedfrom a location outside of the particular area of the property, and themonitoring control unit is further configured to: based on analyzing theproperty state information and the input command against the one or morerules, determine that the command to disarm the monitoring system is notauthorized; and determine whether to adjust the electronic device orgenerate (i) the alarm condition or (ii) the notification by determiningto generate the alarm condition based on determining that the command todisarm the monitoring system is not authorized.
 3. The monitoring systemof claim 1, wherein: the property state information indicates that auser is located inside the property, the data collected by the one ormore sensors located throughout the property includes an image of theuser, the input command comprises a voice command uttered by the userlocated inside the property, and the monitoring control unit is furtherconfigured to: based on analyzing the property state information and theinput command against the one or more rules, determine whether to adjustthe electronic device or generate (i) the alarm condition or (ii) thenotification by: analyzing an image of the user captured by themonitoring system; based on analyzing the image of the user, determiningthat the user is an authorized user; and based on determining that theuser is an authorized user, determining that the voice command isauthorized; and determining to adjust the electronic device based ondetermining that the voice command is authorized.
 4. The monitoringsystem of claim 1, wherein: the input command comprises a voice commanduttered by a user located inside the property, the property stateinformation indicates that the user is located inside a bedroom of theproperty and that the user was likely sleeping before uttering the voicecommand, and the monitoring control unit is further configured to: basedon analyzing the property state information and the input commandagainst the one or more rules, determining that the voice command isauthorized; and determine whether to adjust the electronic device orgenerate (i) the alarm condition or (ii) the notification by determiningto adjust the electronic device based on determining that the voicecommand is authorized.
 5. The monitoring system of claim 4, wherein: themonitoring control unit is further configured to adjust the electronicdevice based on determining that the voice command is authorized byperforming one or more of: disarming the monitoring system; activatingone or more lights that are located in the property; raising one or morewindow coverings that are located in the property; and activating anappliance that is located in the property.
 6. The monitoring system ofclaim 1, wherein: the property state information indicates that aresident of the property is outside of the property, the electronicdevice is located at the property, the monitoring control unit isfurther configured to: determine a security impact of the input commandto adjust the electronic device of the property; based on (i) analyzingthe property state information that indicates that the resident of theproperty is outside of the property, (ii) the security impact of theinput command to adjust the electronic device of the property, and (iii)the input command to adjust the electronic device of the propertyagainst the one or more rules, generate an authorization request toadjust the electronic device of the property; provide, to a computingdevice of the resident of the property, the authorization request toadjust the electronic device of the property; receive, from thecomputing device of the resident of the property, authorization toadjust the electronic device of the property; and determine whether toadjust the electronic device or generate (i) the alarm condition or (ii)the notification by determining to adjust the electronic device based onreceiving the authorization to adjust the electronic device of theproperty.
 7. The monitoring system of claim 6, wherein: the command toadjust the electronic device of the property was received locally at theelectronic device, and the monitoring control unit is further configuredto: based on (i) analyzing the property state information that indicatesthat the resident of the property is outside of the property, (ii) thesecurity impact of the input command to adjust the electronic device ofthe property, and (iii) the local command to adjust the electronicdevice of the property against the one or more rules, generate anauthorization request to adjust the electronic device of the property.8. The monitoring system of claim 1, wherein the monitoring control unitis further configured to: receive additional data collected by the oneor more sensors during a period of time before detecting the inputcommand; determine an activity pattern of persons in the property basedon the additional data collected by the one or more sensors during theperiod of time before detecting the input command; update the propertystate information based on the activity pattern of persons in theproperty; analyze the property state information and the input commandagainst the one or more rules that are related to authorizing theadditional input commands that are received by the monitoring systemwithout authentication information by analyzing the updated propertystate information and the input command against one or more rules thatare related to authorizing the additional input commands that arereceived by the monitoring system without authentication information;and based on analyzing the property state information and the inputcommand against the one or more rules, determine whether to adjust theelectronic device or generate (i) the alarm condition or (ii) thenotification by determining whether to adjust the electronic device orgenerate (i) the alarm condition or (ii) the notification based onanalyzing the updated property state information and the input commandagainst the one or more rules.
 9. The monitoring system of claim 1,wherein the monitoring control unit is further configured to: determinean energy consumption of the property and conditions in or near aproperty; and based on the energy consumption of the property, at leastone user-specified setting, and the conditions in or near the property,generate the one or more rules that are related to authorizing theadditional input commands that are received by the monitoring systemwithout authentication information.
 10. The system of claim 9, whereinthe conditions in or near the property include weather, daylight level,air quality, and other environmental conditions.
 11. The monitoringsystem of claim 1, wherein: the property state information indicatesthat a resident is leaving the property, the input command comprises avoice command uttered by the resident while leaving the property, andthe monitoring control unit is further configured to: based on analyzingthe property state information and the input command against the one ormore rules, determine whether to adjust the electronic device orgenerate (i) the alarm condition or (ii) the notification by: based onanalyzing the property state information indicating that the resident isleaving the property and the voice command uttered by the resident whileleaving the property, determining that the user is an authorized user;and based on determining that the user is an authorized user,determining that the voice command is authorized; and determining toadjust the electronic device based on determining that the voice commandis authorized by performing one or more of: arming the monitoringsystem; deactivating one or more lights of the property; locking one ormore doors of the property; and adjusting a thermostat of the property.12. The monitoring system of claim 1, wherein: the property stateinformation indicates that a resident is arriving at the property, theinput command comprises a voice command uttered by the resident whilearriving at the property, and the monitoring control unit is furtherconfigured to: based on analyzing the property state information and theinput command against the one or more rules, determine whether to adjustthe electronic device or generate (i) the alarm condition or (ii) thenotification by: based on analyzing the property state informationindicating that the resident is arriving at the property and the voicecommand uttered by the resident while arriving at the property,determining that the user is an authorized user; based on determiningthat the user is an authorized user, determining that the voice commandis authorized; and determining to adjust the electronic device based ondetermining that the voice command is authorized by performing one ormore of: disarming the monitoring system; activating one or more lightsof the property; opening one or more doors of the property; adjusting athermostat of the property; and activating an applicant located in theproperty.
 13. A computer-implemented method, comprising: receiving, by amonitoring system that is configured to monitor a property, propertystate information that includes data collected by one or more sensorslocated throughout the property; receiving, by the monitoring system, aninput command to adjust an electronic device does not includeauthentication information for the monitoring system to authenticate theinput command before performing adjusting the electronic device;analyzing, by the monitoring system, the property state information andthe input command against one or more rules that are related toauthorizing additional input commands that are received by themonitoring system without authentication information; and based onanalyzing the property state information and the input command againstthe one or more rules, determining, by the monitoring system, whether toadjust the electronic device or generate (i) an alarm condition or (ii)a notification.
 14. The method of claim 13, wherein: the monitoringsystem is in an armed state, the property state information indicatesthat an expected number of occupants are located in a particular area ofthe property, the input command comprises a command to disarm themonitoring system provided from a location outside of the particulararea of the property, and the method further comprises: based onanalyzing the property state information and the input command againstthe one or more rules, determining that the command to disarm themonitoring system is not authorized; and determining whether to adjustthe electronic device or generate (i) the alarm condition or (ii) thenotification comprises determining to generate the alarm condition basedon determining that the command to disarm the monitoring system is notauthorized.
 15. The method of claim 13, wherein: the property stateinformation indicates that a user is located inside the property, thedata collected by the one or more sensors located throughout theproperty includes an image of the user, the input command comprises avoice command uttered by the user located inside the property, themethod further comprises: based on analyzing the property stateinformation and the input command against the one or more rules,determining, by the monitoring system, whether to adjust the electronicdevice or generate (i) the alarm condition or (ii) the notificationcomprises: analyzing an image of the user captured by the monitoringsystem; based on analyzing the image of the user, determining that theuser is an authorized user; and based on determining that the user is anauthorized user, determining that the voice command is authorized, anddetermining to adjust the electronic device based on determining thatthe voice command is authorized.
 16. The method of claim 13, wherein:the input command comprises a voice command uttered by a user locatedinside the property, the property state information indicates that theuser is located inside a bedroom of the property and that the user waslikely sleeping before uttering the voice command, the method furthercomprises: based on analyzing the property state information and theinput command against the one or more rules, determining that the voicecommand is authorized, and determining whether to adjust the electronicdevice or generate (i) the alarm condition or (ii) the notificationcomprises determining to adjust the electronic device based ondetermining that the voice command is authorized.
 17. The method ofclaim 16, wherein: determining to adjust the electronic device based ondetermining that the voice command is authorized comprises performingone or more of: disarming the monitoring system; activating one or morelights that are located in the property; raising one or more windowcoverings that are located in the property; and activating an appliancethat is located in the property.
 18. The method of claim 13, wherein:the property state information indicates that a resident of the propertyis outside of the property, the electronic device is located at theproperty, the method further comprises: determining a security impact ofthe input command to adjust the electronic device of the property; basedon (i) analyzing the property state information that indicates that aresident of the property is outside of the property, (ii) the securityimpact of the input command to adjust the electronic device of theproperty, and (iii) the input command to adjust the electronic device ofthe property against the one or more rules, generating an authorizationrequest to adjust the electronic device of the property; providing, to acomputing device of the resident of the property, the authorizationrequest to adjust the electronic device of the property; and receiving,from the computing device of the resident of the property, authorizationto adjust the electronic device of the property, and determining whetherto adjust the electronic device or generate (i) the alarm condition or(ii) the notification comprises determining to adjust the electronicdevice based on receiving the authorization to adjust the electronicdevice of the property.
 19. The method of claim 13, further comprising:receiving, by the monitoring system, additional data collected by theone or more sensors during a period of time before detecting the inputcommand; determining an activity pattern of persons in the propertybased on the additional data collected by the one or more sensors duringthe period of time before detecting the input command; updating theproperty state information based on the activity pattern of persons inthe property; analyzing the property state information and the inputcommand against the one or more rules that are related to authorizingthe additional input commands that are received by the monitoring systemwithout authentication information by analyzing the updated propertystate information and the input command against one or more rules thatare related to authorizing the additional input commands that arereceived by the monitoring system without authentication information;and based on analyzing the property state information and the inputcommand against the one or more rules, determine whether to adjust theelectronic device or generate (i) the alarm condition or (ii) thenotification by determining whether adjust the electronic device orgenerate (i) the alarm condition or (ii) the notification based onanalyzing the updated property state information and the input commandagainst the one or more rules.
 20. The method of claim 13, furthercomprising: determining an energy consumption of the property andconditions in or near a property; and based on the energy consumption ofthe property, at least one user-specified setting, and the conditions inor near the property, generating the one or more rules that are relatedto authorizing the additional input commands that are received by themonitoring system without authentication information.