System, method, and computer program for two layer user authentication associated with connected home devices
First Claim
1. A computer program product embodied on a non-transitory computer readable medium, comprising computer code for:
- executing, by a user computing device, an application associated with at least one connected home device, the at least one connected home device and the user computing device being in communication over a network;
determining, by the user computing device as a first layer of security, that a user is authenticated to control the at least one connected home device utilizing the user computing device, wherein the user is authenticated by logging into the application via the user computing device;
receiving, via input entered by the user through the application executing on the user computing device, a command for controlling the at least one connected home device, when it is determined through the first layer of security that the user is authenticated to control the at least one connected home device;
in response to determining through the first layer of security that the user is authenticated, determining, by the user computing device, that the command requires a second layer of security for execution thereof;
in response to determining that the command requires the second layer of security, determining, by the user computing device, that at least one registered fingerprint is accessible;
displaying, by the user computing device, a fingerprint identification interface on a display of the user computing device, when it is determined that at least one registered fingerprint is accessible by the user computing device;
receiving, by the user computing device, a fingerprint input from the user utilizing the fingerprint identification interface;
causing, by the user computing device, the received fingerprint input to be compared with the at least one registered fingerprint;
determining, by the user computing device as the second layer of security, that the user is authenticated to control the at least one connected home device based on the comparison; and
executing, by the user computing device, the command for controlling the at least one connected home device, when it is determined through the second layer of security that the user is authenticated to control the at least one connected home device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for two layer user authentication associated with connected home devices. In use, it is determined whether a user is authenticated to control at least one connected home device utilizing a user device, as a first layer of security. If it is determined the user is authenticated to control the at least one connected home device, a command for controlling the at least one connected home device is received by the user utilizing the user device. Further, it is determined whether at least one registered fingerprint is accessible by the user device. If it is determined that at least one registered fingerprint is accessible by the user device, a fingerprint identification interface is displayed on a display associated with the user device. Additionally, a fingerprint input is received from the user utilizing the fingerprint identification interface. Furthermore, the received fingerprint input is compared with the at least one registered fingerprint. Still yet, it is determined whether the user is authenticated to control the at least one connected home device based on the comparison, as a second layer of security. If it is determined that the user is authenticated to control the at least one connected home device based on the comparison, the command for controlling the at least one connected home device is executed.
-
Citations
8 Claims
-
1. A computer program product embodied on a non-transitory computer readable medium, comprising computer code for:
-
executing, by a user computing device, an application associated with at least one connected home device, the at least one connected home device and the user computing device being in communication over a network; determining, by the user computing device as a first layer of security, that a user is authenticated to control the at least one connected home device utilizing the user computing device, wherein the user is authenticated by logging into the application via the user computing device; receiving, via input entered by the user through the application executing on the user computing device, a command for controlling the at least one connected home device, when it is determined through the first layer of security that the user is authenticated to control the at least one connected home device; in response to determining through the first layer of security that the user is authenticated, determining, by the user computing device, that the command requires a second layer of security for execution thereof; in response to determining that the command requires the second layer of security, determining, by the user computing device, that at least one registered fingerprint is accessible; displaying, by the user computing device, a fingerprint identification interface on a display of the user computing device, when it is determined that at least one registered fingerprint is accessible by the user computing device; receiving, by the user computing device, a fingerprint input from the user utilizing the fingerprint identification interface; causing, by the user computing device, the received fingerprint input to be compared with the at least one registered fingerprint; determining, by the user computing device as the second layer of security, that the user is authenticated to control the at least one connected home device based on the comparison; and executing, by the user computing device, the command for controlling the at least one connected home device, when it is determined through the second layer of security that the user is authenticated to control the at least one connected home device. - View Dependent Claims (2, 3)
-
-
4. A method, comprising:
-
executing, by a user computing device, an application associated with at least one connected home device, the at least one connected home device and the user computing device being in communication over a network; determining, by the user computing device as a first layer of security, that a user is authenticated to control the at least one connected home device utilizing the user computing device, wherein the user is authenticated by logging into the application via the user computing device; receiving, via input entered by the user through the application executing on the user computing device, a command for controlling the at least one connected home device, when it is determined through the first layer of security that the user is authenticated to control the at least one connected home device; in response to determining through the first layer of security that the user is authenticated, determining, by the user computing device, that the command requires a second layer of security for execution thereof; in response to determining that the command requires the second layer of security, determining, by the user computing device, that at least one registered fingerprint is accessible; displaying, by the user computing device, a fingerprint identification interface on a display of the user computing device, when it is determined that at least one registered fingerprint is accessible by the user computing device; receiving, by the user computing device, a fingerprint input from the user utilizing the fingerprint identification interface; causing, by the user computing device, the received fingerprint input to be compared with the at least one registered fingerprint; determining, by the user computing device as the second layer of security, that the user is authenticated to control the at least one connected home device based on the comparison; and executing, by the user computing device, the command for controlling the at least one connected home device, when it is determined through the second layer of security that the user is authenticated to control the at least one connected home device. - View Dependent Claims (5, 6)
-
-
7. A user computing device, comprising:
-
a memory storing computer instructions; and at least one hardware processor in communication with the memory that executes the computer instructions to perform a method comprising; executing an application associated with at least one connected home device, the at least one connected home device and the user computing device being in communication over a network; determining, as a first layer of security, that a user is authenticated to control the at least one connected home device utilizing the user computing device, wherein the user is authenticated by logging into the application via the user computing device; receiving, via input entered by the user through the application executing on the user computing device, a command for controlling the at least one connected home device, when it is determined through the first layer of security that the user is authenticated to control the at least one connected home device; in response to determining through the first layer of security that the user is authenticated, determining that the command requires a second layer of security for execution thereof; in response to determining that the command requires the second layer of security, determining that at least one registered fingerprint is accessible; displaying a fingerprint identification interface on a display of the user computing device, when it is determined that at least one registered fingerprint is accessible by the user computing device; receiving a fingerprint input from the user utilizing the fingerprint identification interface; causing the received fingerprint input to be compared with the at least one registered fingerprint; determining, as the second layer of security, that the user is authenticated to control the at least one connected home device based on the comparison; and executing the command for controlling the at least one connected home device, when it is determined through the second layer of security that the user is authenticated to control the at least one connected home device. - View Dependent Claims (8)
-
Specification