Street watch
First Claim
1. A method for security or automation systems, comprising:
- receiving, from a first device at a first location, a request to access data captured during a time period by a second device at a second location, the data comprising at least one of audio data, visual data, or a combination thereof, wherein the data captured during the time period comprises data captured between a start time and an end time, the end time being prior to a time of receiving the request;
receiving, from the first device, a category associated with the request;
identifying a first set of data captured during the time period, the identified first set of data based at least in part on the request, the time period, and the category;
adjusting a first security action at the second location based at least in part on comparing the first set of data with a second set of data from the first device at the first location; and
automatically transmitting the first set of data to the first device based at least in part on the category and the adjusting.
5 Assignments
0 Petitions
Accused Products
Abstract
Apparatuses, techniques, and methods for a security and/or automation system are described. In some cases, methods may include receiving, from a first device at a first location, a request to access data associated with a time period from a second device at a second location, the data comprising at least one of audio data, visual data, or a combination thereof, receiving, from the first device, a category associated with the request, identifying a first set of data associated with the time period, the identified first set of data based at least in part on the request and the category, and automatically transmitting the first set of data to the first device based at least in part on the category.
52 Citations
20 Claims
-
1. A method for security or automation systems, comprising:
-
receiving, from a first device at a first location, a request to access data captured during a time period by a second device at a second location, the data comprising at least one of audio data, visual data, or a combination thereof, wherein the data captured during the time period comprises data captured between a start time and an end time, the end time being prior to a time of receiving the request; receiving, from the first device, a category associated with the request; identifying a first set of data captured during the time period, the identified first set of data based at least in part on the request, the time period, and the category; adjusting a first security action at the second location based at least in part on comparing the first set of data with a second set of data from the first device at the first location; and automatically transmitting the first set of data to the first device based at least in part on the category and the adjusting. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for security or automation systems, comprising:
-
determining that a first device at a first location and a second device at a second location are part of a pre-determined group of devices operating in a network; creating, at the first device, a request to access data captured during a time period, the data being captured by the second device, and the data comprising at least one of audio data, visual data, or a combination thereof, wherein the data captured during the time period comprises data captured between a start time and an end time, the end time being prior to a time of receiving the request; identifying a category associated with the request; adjusting a first security action at the second location based at least in part on comparing a first set of data captured during the time period and a second set of data from the first device at the first location; and transmitting the request and the category associated with the request to the second device and the adjusting. - View Dependent Claims (15, 16, 17)
-
-
18. An apparatus for remotely monitoring a plurality of distributed remote storage devices, comprising:
-
a processor; a memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to; receive, from a first device at a first location, a request to access data captured during a time period by a second device at a second location, the data comprising at least one of audio data, visual data, or a combination thereof, wherein the data captured during the time period comprises data captured between a start time and an end time, the end time being prior to a time of receiving the request; receive, from the first device, a category associated with the request; identify a first set of data captured during the time period, the identified first set of data based at least in part on the request, the time period, and the category; adjust a first security action at the second location based at least in part on comparing the first set of data with a second set of data from the first device at the first location; and automatically transmit the first set of data to the first device based at least in part on the category and the adjusting. - View Dependent Claims (19, 20)
-
Specification