US-20260129128-A1 - Device Control Based on Signature
Abstract
Systems, apparatuses, and methods are described for identifying a recurring event associated with a premises, and automatically performing actions associated with the recurring event. A computing device may generate a signature for the recurring event to indicate a series of actions associated with the recurring event, may detect occurrence of the recurring event, and may perform one or more of the series of actions indicated by the signature.
Inventors
- Mark Hashimoto
Assignees
- COMCAST CABLE COMMUNICATIONS, LLC
Dates
- Publication Date
- 20260507
- Application Date
- 20251231
Claims (20)
- 1 . A method comprising: receiving, by a computing device, audio data comprising non-verbal sounds occurring during an entry into a premises; comparing, by the computing device, the sounds to at least one activity signature, wherein the at least one activity signature indicates a sequence of actions, performed by an authorized user associated with the premises, during prior entries into the premises; identifying, by the computing device and based on the comparing, the authorized user entering the premises; and disarming, by the computing device and based on the identifying, a security system associated with the premises.
- 2 . The method of claim 1 , wherein the comparing comprises comparing a first series of sound types associated with the sounds to a second series of sound types associated with the at least one activity signature.
- 3 . The method of claim 1 , further comprising: updating, based on the received audio data, the at least one activity signature.
- 4 . The method of claim 1 , further comprising: causing, by the computing device and based on the comparing, control of a device associated with the premises.
- 5 . The method of claim 4 , wherein the device comprises: a set-top box; a radio; a television; an air conditioner; or a light.
- 6 . The method of claim 1 , wherein the sequence of actions comprises at least one of: unlocking or opening a door; opening or closing a window; interacting with a household appliance; or arriving at the premises within a predictable time window.
- 7 . The method of claim 1 , further comprising: causing, by the computing device and based on the comparing, a device associated with the premises to output content.
- 8 . The method of claim 1 , wherein the comparing comprises determining whether a score for the at least one activity signature satisfies a threshold, and wherein the score is based on a quantity of sound types, of the sounds occurring during the entry, that match sound types of the at least one activity signature.
- 9 . The method of claim 1 , wherein the prior entries into the premises are each authorized.
- 10 . A method comprising: receiving, by a computing device, audio data comprising non-verbal sounds occurring during an entry into a premises by a user; comparing, by the computing device, the sounds to at least one activity signature, wherein the at least one activity signature indicates a sequence of actions, performed by an authorized user associated with the premises, during prior entries into the premises; determining, by the computing device and based on the comparing, that the user is not the authorized user; and causing, by the computing device and based on the determining, a security system associated with the premises to trigger an alarm.
- 11 . The method of claim 10 , further comprising: causing, by the computing device and based on the determining, sending of a notification to a police authority or a fire authority.
- 12 . The method of claim 10 , wherein the comparing comprises comparing a first series of sound types associated with the sounds to a second series of sound types associated with the at least one activity signature.
- 13 . The method of claim 10 , wherein the sequence of actions comprises at least one of: unlocking or opening a door; opening or closing a window; interacting with a household appliance; or arriving at the premises within a predictable time window.
- 14 . The method of claim 10 , wherein the comparing comprises determining whether a score for the at least one activity signature satisfies a threshold, and wherein the score is based on a quantity of sound types, of the sounds occurring during the entry, that match sound types of the at least one activity signature.
- 15 . The method of claim 10 , further comprising: receiving, by the computing device and after causing the security system to trigger the alarm, second audio data; and disabling, by the computing device and based on the second audio data, the alarm.
- 16 . A method comprising: receiving, by a computing device, audio data comprising non-verbal sounds occurring during an exit from a premises; comparing, by the computing device, the sounds to one or more activity signatures, wherein each activity signature indicates a sequence of actions performed by a user, of one or more users associated with the premises, during prior exits from the premises; identifying, by the computing device and based on the comparing, a specific user of the one or more users that is exiting the premises; and causing, by the computing device and based on the identifying, a device associated with the premises to perform an action.
- 17 . The method of claim 16 , wherein the causing the device to perform the action comprises arming a security system associated with the premises.
- 18 . The method of claim 16 , wherein the comparing comprises comparing a first series of sound types associated with the sounds to a second series of sound types associated with the one or more activity signatures.
- 19 . The method of claim 16 , further comprising: updating, based on the received audio data, one of the one or more activity signatures.
- 20 . The method of claim 16 , wherein the comparing comprises determining whether a score for at least one of the one or more activity signatures satisfies a threshold, and wherein the score for an activity signature is based on a quantity of sound types, of the sounds occurring during the exit, that match sound types of the activity signature.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS This application is a continuation of and claims priority to U.S. patent application Ser. No. 18/585,338, filed Feb. 23, 2024, which is a continuation of U.S. patent application Ser. No. 16/229,087, filed Dec. 21, 2018 (now U.S. Pat. No. 11,968,323), each of which is hereby incorporated by reference in its entirety. BACKGROUND A location of a device in an individual's possession may be used to infer that individual's location. For example, a mobile phone may include global positioning system (GPS) circuitry that may determine the location of the mobile phone. That location may then be communicated from the mobile phone to another device. That other device may, based on the received location data, determine whether a person associated with the mobile phone is in a particular premises. There are drawbacks to such methods, however. A person may forget or lose a mobile phone. Location data transmitted by a mobile phone or other devices could be intercepted and used for undesirable purposes. SUMMARY The following summary presents a simplified summary of certain features. The summary is not an extensive overview and is not intended to identify key or critical elements. Systems, apparatuses, and methods are described for performing actions associated with a recurring event. The recurring event may be associated with a premises and/or with a user. The recurring event may be an event associated with a user arriving at a premises, an event associated with a user leaving a premises, or any other type of event. During a training period, one or more computing devices may analyze audio data and/or non-audio data associated with the recurring event, and may generate, based on the analysis, an activity signature. The activity signature may indicate a series of actions that a user associated with those actions typically performs as part of the recurring event. Based on the activity signature, the recurring event may be detected and one or more actions may be performed. These and other features and advantages are described in greater detail below. BRIEF DESCRIPTION OF THE DRAWINGS Some features are shown by way of example, and not by limitation, in the accompanying drawings. In the drawings, like numerals reference similar elements. FIG. 1 shows an example communication network. FIG. 2 shows hardware elements of a computing device. FIGS. 3A and 3B show examples of activity signatures. FIG. 4 is a flow chart showing an example of generating and using an activity signature. DETAILED DESCRIPTION The accompanying drawings, which form a part hereof, show examples of the disclosure. It is to be understood that the examples shown in the drawings and/or discussed herein are non-exclusive and that there are other examples of how the disclosure may be practiced. FIG. 1 shows an example communication network 100 in which features described herein may be implemented. The communication network 100 may comprise one or more information distribution networks of any type, such as, without limitation, a telephone network, a wireless network (e.g., an LTE network, a 5G network, a WiFi IEEE 802.11 network, a WiMAX network, a satellite network, and/or any other network for wireless communication), an optical fiber network, a coaxial cable network, and/or a hybrid fiber/coax distribution network. The communication network 100 may use a series of interconnected communication links 101 (e.g., coaxial cables, optical fibers, wireless links, etc.) to connect multiple premises 102 (e.g., businesses, homes, consumer dwellings, train stations, airports, etc.) to a local office 103 (e.g., a headend). The local office 103 may send downstream information signals and receive upstream information signals via the communication links 101. Each of the premises 102 may comprise devices, described below, to receive, send, and/or otherwise process those signals and information contained therein. The communication links 101 may originate from the local office 103 and may comprise components not illustrated, such as splitters, filters, amplifiers, etc., to help convey signals clearly. The communication links 101 may be coupled to one or more wireless access points 127 configured to communicate with one or more mobile devices 125 via one or more wireless networks. The mobile devices 125 may comprise smart phones, tablets or laptop computers with wireless transceivers, tablets or laptop computers communicatively coupled to other devices with wireless transceivers, and/or any other type of device configured to communicate via a wireless network. The local office 103 may comprise an interface 104, such as a termination system (TS). The interface 104 may comprise a cable modem termination system (CMTS) and/or other computing device(s) configured to send information downstream to, and to receive information upstream from, devices communicating with the local office 103 via the communications links 101. The interface 104 may be confi