PROXIMITY BASED SECURITY MONITORING
First Claim
1. A method for security and/or automation systems, comprising:
- setting, by a control panel of a security and/or an automation system, one or more monitoring thresholds for an item, wherein the one or more monitoring thresholds are communicated by a sensor proximate the item;
receiving one or more notifications via the sensor indicating that the item has exceeded at least one of the one or more monitoring thresholds and that the sensor has exited an inactive state based at least in part on exceeding the monitoring threshold;
activating a monitoring aspect of the sensor based at least in part on the receiving;
monitoring the item for one or more alarm thresholds based at least in part on the receiving; and
activating one or more alarms based at least in part on the monitoring.
5 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method to monitor a proximity of an item within the confines of an automation system is described. The method may comprise setting one or more monitoring thresholds for an item. The monitoring threshold factors are communicating by a sensor proximate the item. The method may receive one or more notifications via the sensor that the item has exceeded at least one monitoring threshold and activating a monitoring aspect of the sensors based at least in part on the receiving. The method may monitor the item for one or more alarm thresholds based at least in part on the receiving. One or more alarms may be activated based at least in part on the monitoring.
-
Citations
20 Claims
-
1. A method for security and/or automation systems, comprising:
-
setting, by a control panel of a security and/or an automation system, one or more monitoring thresholds for an item, wherein the one or more monitoring thresholds are communicated by a sensor proximate the item; receiving one or more notifications via the sensor indicating that the item has exceeded at least one of the one or more monitoring thresholds and that the sensor has exited an inactive state based at least in part on exceeding the monitoring threshold; activating a monitoring aspect of the sensor based at least in part on the receiving; monitoring the item for one or more alarm thresholds based at least in part on the receiving; and activating one or more alarms based at least in part on the monitoring. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A control panel for security and/or automation systems, comprising:
-
a processor; memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to; set one or more monitoring thresholds for an item, wherein the monitoring thresholds are executed by a sensor proximate the item; receive one or more notifications via the sensor indicating that the item has exceeded at least one of the one or more monitoring thresholds and that the sensor has exited an inactive state based at least in part on exceeding the monitoring threshold; monitor the item for one or more alarm thresholds based at least in part on the receiving; and activate one or more alarms based at least in part on the monitoring. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium storing computer-executable code for wireless communication, the code executable by a processor to:
-
set one or more monitoring thresholds for an item, wherein the monitoring thresholds are executed by a sensor proximate the item; receive one or more notifications via the sensor indicating that the item has exceeded at least one of the one or more monitoring thresholds and that the sensor has exited an inactive state based at least in part on exceeding the monitoring threshold; monitor the item for one or more alarm thresholds based at least in part on the receiving; and activate one or more alarms based at least in part on the monitoring. - View Dependent Claims (18, 19, 20)
-
Specification