×

Mobile device based authentication

  • US 10,026,245 B2
  • Filed: 03/31/2014
  • Issued: 07/17/2018
  • Est. Priority Date: 03/31/2014
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus for authenticating a user of a home automation and security system, comprising:

  • a processor;

    a memory in electronic communication with the processor; and

    instructions stored in the memory, the instructions being executable by the processor to;

    detect a presence of the user within a predetermined distance of the home automation and security system based at least in part on sensor data;

    receive, from an electronic device carried by the user, a request to perform at least one function of the home automation and security system based at least in part on the detection, the at least one function including a rule of operation for an automation and security system component associated with the home automation and security system;

    determine a level of authentication associated with the request to perform the at least one function based at least in part on the detection;

    receive facial recognition information from the electronic device as a first level of authentication to authorize the received request;

    confirm that the user is an authorized user based at least in part on facial recognition information;

    communicate, to one or more separate electronic devices associated with one or more separate authorized users of the home automation and security system, an authentication message in response to confirming the user as the authorized user;

    receive confirmation that at least one of the separate authorized users has received the authentication message at the at least one separate electronic devices carried by the at least one of the separate authorized users, wherein the received confirmation comprises a second level of authentication to authorize the received request; and

    modify the rule of operation of the automation and security system component based at least in part on the first level of authentication and the second level of authentication.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×