×

System, method, and computer program for two layer user authentication associated with connected home devices

  • US 10,021,095 B1
  • Filed: 05/27/2016
  • Issued: 07/10/2018
  • Est. Priority Date: 05/29/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer program product embodied on a non-transitory computer readable medium, comprising computer code for:

  • executing, by a user computing device, an application associated with at least one connected home device, the at least one connected home device and the user computing device being in communication over a network;

    determining, by the user computing device as a first layer of security, that a user is authenticated to control the at least one connected home device utilizing the user computing device, wherein the user is authenticated by logging into the application via the user computing device;

    receiving, via input entered by the user through the application executing on the user computing device, a command for controlling the at least one connected home device, when it is determined through the first layer of security that the user is authenticated to control the at least one connected home device;

    in response to determining through the first layer of security that the user is authenticated, determining, by the user computing device, that the command requires a second layer of security for execution thereof;

    in response to determining that the command requires the second layer of security, determining, by the user computing device, that at least one registered fingerprint is accessible;

    displaying, by the user computing device, a fingerprint identification interface on a display of the user computing device, when it is determined that at least one registered fingerprint is accessible by the user computing device;

    receiving, by the user computing device, a fingerprint input from the user utilizing the fingerprint identification interface;

    causing, by the user computing device, the received fingerprint input to be compared with the at least one registered fingerprint;

    determining, by the user computing device as the second layer of security, that the user is authenticated to control the at least one connected home device based on the comparison; and

    executing, by the user computing device, the command for controlling the at least one connected home device, when it is determined through the second layer of security that the user is authenticated to control the at least one connected home device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×