Leveraging neighborhood to handle potential visitor at a smart-home
First Claim
1. A method of potentially handling a visitor in a system comprising a computing system communicatively coupled to a first smart environment and a second smart environment, wherein the first smart environment comprises a first smart device and a first structure located at a first location, wherein the first structure is operative to shelter a first user, wherein the first smart device is operative to provide at least one security objective for the first structure, wherein the second smart environment comprises a second smart device and a second structure located at a second location distinct from the first location, wherein the second structure is operative to shelter a second user, and wherein the second smart device is operative to provide at least one security objective for the second structure, the method comprising:
- receiving, at the computing system, first visitor identification data generated by the first smart device that is indicative of the visitor being detected at the first location at a first time;
analyzing, using the computing system, at least a first portion of the received first identification data to determine that the visitor is one of the following types of visitor;
a suspected criminal;
a solicitor;
a missing person;
a missing pet;
a missing item; and
a package deliverer;
processing, using the computing system, at least a second portion of the received first identification data to determine that the first location is within a particular distance of the second location; and
automatically adjusting, using the computing system, a functionality of the second smart device of the second smart environment based on the analyzing and based on the processing.
2 Assignments
0 Petitions
Accused Products
Abstract
This patent specification relates to apparatus, systems, methods, and related computer program products for providing home security/smart home objectives. More particularly, this patent specification relates to a plurality of devices, including intelligent, multi-sensing, network-connected devices, that communicate with each other and/or with a central server or a cloud-computing system to provide any of a variety of useful home security/smart home objectives.
184 Citations
24 Claims
-
1. A method of potentially handling a visitor in a system comprising a computing system communicatively coupled to a first smart environment and a second smart environment, wherein the first smart environment comprises a first smart device and a first structure located at a first location, wherein the first structure is operative to shelter a first user, wherein the first smart device is operative to provide at least one security objective for the first structure, wherein the second smart environment comprises a second smart device and a second structure located at a second location distinct from the first location, wherein the second structure is operative to shelter a second user, and wherein the second smart device is operative to provide at least one security objective for the second structure, the method comprising:
-
receiving, at the computing system, first visitor identification data generated by the first smart device that is indicative of the visitor being detected at the first location at a first time; analyzing, using the computing system, at least a first portion of the received first identification data to determine that the visitor is one of the following types of visitor; a suspected criminal; a solicitor; a missing person; a missing pet; a missing item; and a package deliverer; processing, using the computing system, at least a second portion of the received first identification data to determine that the first location is within a particular distance of the second location; and automatically adjusting, using the computing system, a functionality of the second smart device of the second smart environment based on the analyzing and based on the processing. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system comprising:
-
a first smart environment comprising; a first structure located at a first location, wherein the first structure is operative to shelter a first user; and a first smart device located at the first location, wherein the first smart device is operative to; provide at least one security objective for the first structure; detect a visitor at the first location; and generate visitor identification data indicative of the visitor being detected at the first location; a second smart environment comprising; a second structure located at a second location distinct from the first location, wherein the second structure is operative to shelter a second user; and a second smart device located at the second location, wherein the second smart device is operative to provide at least one security objective for the second structure; and a computing system operative to; receive the generated visitor identification data from the first smart device; analyze at least a portion of the received identification data to determine that the visitor is of interest to the computing system; and based on the determination that the visitor is of interest, adjust a functionality of the second smart device. - View Dependent Claims (22, 23)
-
-
24. A non-transitory computer readable medium comprising computer readable instructions recorded thereon for:
-
receiving, at a computing system, first visitor identification data indicative of a visitor being detected at a first location at a first time; analyzing, using the computing system, at least a portion of the received first identification data to determine that the visitor is of interest to a smart environment, wherein; the smart environment comprises; a structure located at a second location distinct from the first location; and at least one smart device located at the second location; the structure is operative to shelter at least one user; the at least one smart device is communicatively coupled to the computing system and operative to provide at least one security objective for the structure; and the analyzing determines that the visitor is of interest to the smart environment by determining that the visitor is one of the following types of visitor; a suspected criminal; a solicitor; a missing person; a missing pet; a missing item; and a package deliverer; processing, using the computing system, at least a portion of the received first identification data to determine that the first location is within a predetermined distance of the second location; and automatically adjusting, using the computing system, a functionality of the at least one smart device of the smart environment based on the analyzing and based on the processing.
-
Specification