Mobile device based authentication
First Claim
Patent Images
1. An apparatus for authenticating a user of a home automation and security system, comprising:
- a processor;
a memory in electronic communication with the processor; and
instructions stored in the memory, the instructions being executable by the processor to;
detect a presence of the user within a predetermined distance of the home automation and security system based at least in part on sensor data;
receive, from an electronic device carried by the user, a request to perform at least one function of the home automation and security system based at least in part on the detection, the at least one function including a rule of operation for an automation and security system component associated with the home automation and security system;
determine a level of authentication associated with the request to perform the at least one function based at least in part on the detection;
receive facial recognition information from the electronic device as a first level of authentication to authorize the received request;
confirm that the user is an authorized user based at least in part on facial recognition information;
communicate, to one or more separate electronic devices associated with one or more separate authorized users of the home automation and security system, an authentication message in response to confirming the user as the authorized user;
receive confirmation that at least one of the separate authorized users has received the authentication message at the at least one separate electronic devices carried by the at least one of the separate authorized users, wherein the received confirmation comprises a second level of authentication to authorize the received request; and
modify the rule of operation of the automation and security system component based at least in part on the first level of authentication and the second level of authentication.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are described for controlling an automation and security system. According to at least one embodiment, an apparatus for voice control of an automation and security system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory. The instructions are executable by the processor to receive input from the user to perform at least one function of the automation and security system, receive confirmation that the user has received an authentication message at an electronic device carried by the user, and initiate the at least one function.
-
Citations
21 Claims
-
1. An apparatus for authenticating a user of a home automation and security system, comprising:
-
a processor; a memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to; detect a presence of the user within a predetermined distance of the home automation and security system based at least in part on sensor data; receive, from an electronic device carried by the user, a request to perform at least one function of the home automation and security system based at least in part on the detection, the at least one function including a rule of operation for an automation and security system component associated with the home automation and security system; determine a level of authentication associated with the request to perform the at least one function based at least in part on the detection; receive facial recognition information from the electronic device as a first level of authentication to authorize the received request; confirm that the user is an authorized user based at least in part on facial recognition information; communicate, to one or more separate electronic devices associated with one or more separate authorized users of the home automation and security system, an authentication message in response to confirming the user as the authorized user; receive confirmation that at least one of the separate authorized users has received the authentication message at the at least one separate electronic devices carried by the at least one of the separate authorized users, wherein the received confirmation comprises a second level of authentication to authorize the received request; and modify the rule of operation of the automation and security system component based at least in part on the first level of authentication and the second level of authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-program product for authenticating a user of an automation and security system, the computer-program product comprising a non-transitory computer-readable medium storing instructions executable by a processor to:
-
detect a presence of the user within a predetermined distance of the automation and security system based at least in part on sensor data; receive input, at a control panel in a structure, from the user to initiate at least one function of the automation and security system, the at least one function including a request to change a value associated with a setting of an automation and security system component of the automation and security system; determine a level of authentication associated with the request, to perform the at least one function, based at least in part on the detection; receive a first user authentication input, at the control panel in the structure, from the user; confirm that the user is an authorized user based at least in part on the first user authentication input; communicate, to one or more electronic devices associated with one or more separate authorized users of the automation and security system, an authentication message in response to confirming the user as the authorized user; receive confirmation that at least one of the separate authorized users received the authentication message via at least one of the electronic devices in the at least one of the separate authorized user'"'"'s possession, the confirmation being a second user authentication input; and modify the value associated with the setting of the automation and security system component based at least in part on the first user authentication input and the second user authentication input. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer-implemented method for authenticating a user of an automation and security system, comprising:
-
detecting a presence of the user within a predetermined distance of the automation and security system based at least in part on sensor data; receiving, from an electronic device carried by the user, a request to perform at least one function of the automation and security system based at least in part on the detection, the at least one function including a rule of operation for an automation and security system component associated with the automation and security system; determining a level of authentication associated with the request to perform the at least one function based at least in part on the detection; receiving facial recognition information from the electronic device as a first level of authentication to authorize the received request; confirming that the user is an authorized user based at least in part on the facial recognition information; communicating, to one or more separate electronic devices associated with one or more separate authorized users of the automation and security system, an authentication message in response to confirming the user as the authorized user; receiving confirmation that at least one of the separate authorized users has received the authentication message at the at least one separate electronic devices carried by the at least one of the separate authorized users, wherein the received confirmation comprises a second level of authentication to authorize the received request; and modifying the rule of operation of the automation and security system component based at least in part on the first level of authentication and the second level of authentication. - View Dependent Claims (18, 19, 20, 21)
-
Specification