False alarm avoidance
First Claim
1. A central monitoring system comprising:
- a subscriber database under control of a database engine, the subscriber database including entries corresponding to plural subscriber control panels in physical proximity to and associated with corresponding plural security systems monitored by the central monitoring system station;
one or more server computer systems in communication with the subscriber database that are configured to cause the central monitoring system to;
receive from a user device that is registered with a particular one of the plural security systems, a request to control the particular security system, with the request specifying one or more control actions to perform on a given one of the plural subscriber control panels, which corresponds to the particular one of the plural security systems;
send a request to the user device to acquire user biometric information, the request specifying a particular live action for the user to perform on the given one of the plural subscriber control panels using the registered user device;
receive from the user device, the acquired biometric information of the user in current possession of the registered user device;
retrieve from the subscriber database stored authentication information including biometric information for a registered user that the central monitoring system has associated with the registered user device, and associated with the particular security system by the central monitoring system;
analyze the received biometric information of the user in current possession of the user device and the retrieved stored authentication information to determine whether there is a match between the retrieved biometric information and the received biometric information, and when there is a match,determine whether a security system that is linked to the stored biometric information matches the particular security system the user requests to access;
determine a level of access to the security system that is linked to the stored biometric information; and
grant access from the user device to the security system that is linked to the stored biometric information, when the central monitoring system determines based on the determined level of access that the user is authorized to perform the specified one or more control actions from the user device to access the security system that is linked to the stored biometric information.
4 Assignments
0 Petitions
Accused Products
Abstract
Among other things, a system comprises a processor device, a memory in communication with the processor device, and a storage device that stores a program of computing instructions for execution by the processor using the memory. The program comprises instructions configured to cause the processor to receive from a user device biometric information of a user requesting access to the security system. The biometric information is associated with the user in possession of the user device. The processor is also caused to analyze the received biometric information to determine whether the user in possession of the device is a person authorized to access the security system with the user device. If the user is determined to be authorized, the user is allowed to access the security system.
25 Citations
16 Claims
-
1. A central monitoring system comprising:
-
a subscriber database under control of a database engine, the subscriber database including entries corresponding to plural subscriber control panels in physical proximity to and associated with corresponding plural security systems monitored by the central monitoring system station; one or more server computer systems in communication with the subscriber database that are configured to cause the central monitoring system to; receive from a user device that is registered with a particular one of the plural security systems, a request to control the particular security system, with the request specifying one or more control actions to perform on a given one of the plural subscriber control panels, which corresponds to the particular one of the plural security systems; send a request to the user device to acquire user biometric information, the request specifying a particular live action for the user to perform on the given one of the plural subscriber control panels using the registered user device; receive from the user device, the acquired biometric information of the user in current possession of the registered user device; retrieve from the subscriber database stored authentication information including biometric information for a registered user that the central monitoring system has associated with the registered user device, and associated with the particular security system by the central monitoring system; analyze the received biometric information of the user in current possession of the user device and the retrieved stored authentication information to determine whether there is a match between the retrieved biometric information and the received biometric information, and when there is a match, determine whether a security system that is linked to the stored biometric information matches the particular security system the user requests to access; determine a level of access to the security system that is linked to the stored biometric information; and grant access from the user device to the security system that is linked to the stored biometric information, when the central monitoring system determines based on the determined level of access that the user is authorized to perform the specified one or more control actions from the user device to access the security system that is linked to the stored biometric information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 15)
-
-
12. A method executed by a remote server system including a subscriber database under control of a database engine, the subscriber database including entries corresponding to plural subscriber control panels in physical proximity to and associated with plural security systems that are serviced by the central monitoring station, the method comprising:
-
receiving by the remote server system from a user device registered with a particular security system, a user request to execute a security system control action, with the user request specifying one or more control actions on a given one of the plural subscriber control panels, which corresponds to the particular one of the plural security systems; sending by the remote server system a request to the user device to acquire user biometric information, the request specifying a particular live action for the user to perform on the given one of the plural subscriber control panels using the registered user device; receiving by the remote server system from the user device, the acquired biometric information of the user in current possession of the registered user device; retrieving by the remote server system from the subscriber database, stored authentication information including biometric information for a registered user that the remote server system has associated with the registered user device, and associated with the particular security system by the remote server system; analyzing, by the remote server system the received biometric information of the user in current possession of the user device and the retrieved stored authentication information to determine whether there is a match between the retrieved biometric information and the received biometric information and when there is a match, determining by the remote server system whether a security system that is linked to the stored biometric information matches the particular security system the user requests to access; determine by the remote sever system a level of access to the security system that is linked to the stored biometric information; and granting by the remote sever system access from the user device to the security system that is linked to the stored biometric information, when the system determines based on the determined level of access that the user is authorized to perform the specified one or more control actions from the user device to access the security system that is linked to the stored biometric information. - View Dependent Claims (13, 14, 16)
-
Specification