Systems and methods of automated arming and disarming of a security system
First Claim
Patent Images
1. A security system comprising:
- a sensor to detect a location of at least one person from a first device of the at least one person, generate detection data according to the detected location of the at least one person, and detect authentication information that is received from a second device of the at least one person;
a processor communicatively coupled to the sensor to receive the detection data and the authentication information, to determine whether the at least one person is occupying a building according to the location information of the first device, and authenticates the at least one person as the authorized user according to the detected authentication information received from the second device; and
an alarm device, communicatively coupled to at least the processor, that is armed or disarmed by the processor according to the determination as to whether the at least one person is occupying the building and according to whether the at least one person is the authorized user, and to provide a preset time period for the authorized user to enter or exit the building.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of security are provided, including at least one of a plurality of sensors to detect a location of at least one user, and generate detection data according to the detected location of the at least one user. A processor may be communicatively coupled to the at least one of the plurality of sensors to receive the detection data and to determine whether the at least one user is occupying a building according to the detection data. An alarm device, communicatively coupled to the processor, can be armed or disarmed by the processor according to the determination as to whether the at least one user is occupying the building.
-
Citations
35 Claims
-
1. A security system comprising:
-
a sensor to detect a location of at least one person from a first device of the at least one person, generate detection data according to the detected location of the at least one person, and detect authentication information that is received from a second device of the at least one person; a processor communicatively coupled to the sensor to receive the detection data and the authentication information, to determine whether the at least one person is occupying a building according to the location information of the first device, and authenticates the at least one person as the authorized user according to the detected authentication information received from the second device; and an alarm device, communicatively coupled to at least the processor, that is armed or disarmed by the processor according to the determination as to whether the at least one person is occupying the building and according to whether the at least one person is the authorized user, and to provide a preset time period for the authorized user to enter or exit the building. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method comprising:
-
detecting, by a sensor, a location of at least one person from a first device of the least one person; generating, by the sensor, detection data according to the detected location of the at least one person; detecting, by the sensor, authentication information received from a second device of the at least one person; receiving, by a processor communicatively coupled to the sensor, the detection data and the authentication information; determining, by the processor, whether the at least one person is occupying a building according to the detection data; authenticating, by the processor, the at least one person as an authorized user according to the detected authentication information received from the second device; arming or disarming, by the processor, an alarm device communicatively coupled to at least the processor based on the determination as to whether the at least one persons is occupying the building and according to whether the at least one person is the authorized user; and
providing, by the processor, a preset time period for the authorized user to enter or exit the building. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification