Mobile supported disarming
First Claim
1. A method for security and/or automation systems, comprising:
- identifying a mobile device associated with a user entering a geographical region surrounding a residence;
detecting that the mobile device has connected with a Wi-Fi network associated with the residence;
receiving a first indication of authentication information from the mobile device, the first indication of authentication information associated with the mobile device;
authenticating the first indication of authentication information;
detecting a pre-determined number of occurrences of an event associated with a component of an automation system associated with the residence;
receiving a second indication of authentication information from the mobile device, wherein the second indication of authentication information includes a new encryption key inserted into the second indication based at least in part on detecting the pre-determined number of occurrence of the event;
authenticating the second indication of authentication information;
authenticating the mobile device based at least in part on authenticating the first indication of authentication information and the second indication of authentication information; and
automatically deactivating a security component of the automation system associated with the residence based at least in part on the authenticating the mobile device.
5 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, security and/or automation systems, hereinafter referred to as automation systems, may enable a user to deactivate a security portion of an automation system using a mobile device. An automation system may detect the presence of an authorized mobile device which may modify a status of at least one component of the automation system. The automation system may be installed at a user'"'"'s residence and may identify when the user'"'"'s mobile device enters a geographical region surrounding the residence. Modifying a status of at least one component may include deactivating a security component of the automation system. This may enable the user to enter the residence without the need to enter a code into a control panel.
23 Citations
20 Claims
-
1. A method for security and/or automation systems, comprising:
-
identifying a mobile device associated with a user entering a geographical region surrounding a residence; detecting that the mobile device has connected with a Wi-Fi network associated with the residence; receiving a first indication of authentication information from the mobile device, the first indication of authentication information associated with the mobile device; authenticating the first indication of authentication information; detecting a pre-determined number of occurrences of an event associated with a component of an automation system associated with the residence; receiving a second indication of authentication information from the mobile device, wherein the second indication of authentication information includes a new encryption key inserted into the second indication based at least in part on detecting the pre-determined number of occurrence of the event; authenticating the second indication of authentication information; authenticating the mobile device based at least in part on authenticating the first indication of authentication information and the second indication of authentication information; and automatically deactivating a security component of the automation system associated with the residence based at least in part on the authenticating the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus for security and/or automation systems, comprising:
-
a processor; memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to; identify a mobile device associated with a user entering a geographical region surrounding a residence; detect that the mobile device has connected with a Wi-Fi network associated with the residence; receive a first indication of authentication information from the mobile device, the first indication of authentication information associated with the mobile device; authenticate the first indication of authentication information; detect a pre-determined number of occurrences of an event associated with a component of an automation system associated with the residence; receive a second indication of authentication information from the mobile device, wherein the second indication of authentication information includes a new encryption key inserted into the second indication based at least in part on detecting the pre-determined number of occurrence of the event; authenticate the second indication of authentication information; authenticate the mobile device based at least in part on authenticating the first indication of authentication information and the second indication of authentication information; and automatically deactivate a security component of the automation system associated with the residence based at least in part on the authenticating the mobile device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium storing computer-executable code, the code executable by a processor to:
-
identify a mobile device associated with a user entering a geographical region surrounding a residence; detect that the mobile device has connected with a Wi-Fi network associated with the residence; receive a first indication of authentication information from the mobile device, the first indication of authentication information associated with the mobile device; authenticate the first indication of authentication information; detect a pre-determined number of occurrences of an event associated with a component of an automation system associated with the residence; receive a second indication of authentication information from the mobile device, wherein the second indication of authentication information includes a new encryption key inserted into the second indication based at least in part on detecting the pre-determined number of occurrence of the event; authenticate the mobile device based at least in part on authenticating the first indication of authentication information and the second indication of authentication information; and automatically deactivate a security component of the automation system associated with the residence based at least in part on the authenticating the mobile device. - View Dependent Claims (17, 18, 19, 20)
-
Specification