Doorbell communication systems and methods
First Claim
Patent Images
1. A method for using a doorbell system capable of allowing and blocking a doorbell communication request, the method comprising:
- obtaining a doorbell that comprises a speaker, a microphone, and a camera, wherein the doorbell is configurable for mounting near an entryway;
assigning a first priority to a first remote computing device and assigning a second priority to a second remote computing device, wherein the first priority is superior to the second priority;
using the doorbell to detect a visitor;
generating the doorbell communication request regarding the visitor;
sending the doorbell communication request to the first remote computing device due to the first priority;
detecting a location of the second remote computing device; and
blocking the second remote computing device from displaying the doorbell communication request, wherein the doorbell system blocks displaying the doorbell communication request in response to the location of the second remote computing device.
10 Assignments
0 Petitions
Accused Products
Abstract
Communication systems configured to monitor an entryway to a building can include a security system configured to wirelessly communicate with a remote computing device. The security system can include a doorbell that comprises a camera, a speaker, and a microphone.
393 Citations
20 Claims
-
1. A method for using a doorbell system capable of allowing and blocking a doorbell communication request, the method comprising:
-
obtaining a doorbell that comprises a speaker, a microphone, and a camera, wherein the doorbell is configurable for mounting near an entryway; assigning a first priority to a first remote computing device and assigning a second priority to a second remote computing device, wherein the first priority is superior to the second priority; using the doorbell to detect a visitor; generating the doorbell communication request regarding the visitor; sending the doorbell communication request to the first remote computing device due to the first priority; detecting a location of the second remote computing device; and blocking the second remote computing device from displaying the doorbell communication request, wherein the doorbell system blocks displaying the doorbell communication request in response to the location of the second remote computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for using a doorbell system, the method comprising:
-
obtaining a doorbell that comprises a speaker, a microphone, and a camera, wherein the doorbell is configurable for mounting near an entryway; assigning a first priority to a first remote computing device and assigning a second priority to a second remote computing device, wherein the first priority is superior to the second priority; using the doorbell to detect a visitor; generating a doorbell communication request regarding the visitor; sending the doorbell communication request to the first remote computing device due to the first priority; blocking the doorbell communication request from being accepted by the second remote computing device due to a profile associated with the second remote computing device, wherein the profile comprises restrictions that prohibit the second remote computing device from accepting the doorbell communication request; detecting a location of the second remote computing device; and blocking the second remote computing device from displaying the doorbell communication request, wherein the doorbell system blocks displaying the doorbell communication request in response to the location of the second remote computing device. - View Dependent Claims (10, 11, 12)
-
-
13. A method for using a doorbell system configured to block or allow a doorbell communication request, the method comprising:
-
obtaining a doorbell that comprises a speaker, a microphone, and a camera, wherein the doorbell is configurable for mounting near an entryway; using the doorbell to detect a visitor; generating the doorbell communication request regarding the visitor; detecting a location of the first remote computing device; and blocking the first remote computing device from displaying the doorbell communication request, wherein the doorbell system blocks displaying the doorbell communication request in response to the location of the first remote computing device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification