×

False alarm avoidance

  • US 10,068,077 B2
  • Filed: 02/11/2014
  • Issued: 09/04/2018
  • Est. Priority Date: 02/11/2014
  • Status: Active Grant
First Claim
Patent Images

1. A central monitoring system comprising:

  • a subscriber database under control of a database engine, the subscriber database including entries corresponding to plural subscriber control panels in physical proximity to and associated with corresponding plural security systems monitored by the central monitoring system station;

    one or more server computer systems in communication with the subscriber database that are configured to cause the central monitoring system to;

    receive from a user device that is registered with a particular one of the plural security systems, a request to control the particular security system, with the request specifying one or more control actions to perform on a given one of the plural subscriber control panels, which corresponds to the particular one of the plural security systems;

    send a request to the user device to acquire user biometric information, the request specifying a particular live action for the user to perform on the given one of the plural subscriber control panels using the registered user device;

    receive from the user device, the acquired biometric information of the user in current possession of the registered user device;

    retrieve from the subscriber database stored authentication information including biometric information for a registered user that the central monitoring system has associated with the registered user device, and associated with the particular security system by the central monitoring system;

    analyze the received biometric information of the user in current possession of the user device and the retrieved stored authentication information to determine whether there is a match between the retrieved biometric information and the received biometric information, and when there is a match,determine whether a security system that is linked to the stored biometric information matches the particular security system the user requests to access;

    determine a level of access to the security system that is linked to the stored biometric information; and

    grant access from the user device to the security system that is linked to the stored biometric information, when the central monitoring system determines based on the determined level of access that the user is authorized to perform the specified one or more control actions from the user device to access the security system that is linked to the stored biometric information.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×