Context-aware controlling of multiple systems of controllable devices
First Claim
1. A computer-implemented method for enabling a controller that is configured for controlling one or more devices of a first system via a first control system backend to also control one or more devices of a second system via a second control system backend, the method comprising:
- receiving, at the second control system backend, from the first control system backend, location information of the controller and credentials of the controller or/and of a user of the controller as available to the first control system backend;
receiving, at the second control system backend, from a source trusted by the second control system backend, location information of the controller and credentials of the controller or/and of the user;
performing, at the second control system backend, context matching to enable the controller to control the one or more devices of the second system, wherein the context matching comprises comparing the location information received from the first control system backend with the location information received from the source trusted by the second control system backend and by comparing the credentials received from the first control system backend with the credentials received from the source trusted by the second control system backend.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method for enabling a controller configured for controlling devices of a first system via a first backend to control devices of a second system via a second backend. The method, performed by the second backend, includes receiving, from the first backend, location information of the controller and credentials of the controller or/and of a user of the controller, receiving, from a source trusted by the second backend, location information of the controller and credentials of the controller or/and of the user, and performing context matching to enable the controller to control the devices of the second system by comparing the location information received from the first backend with the location information received from the source trusted by the second backend and by comparing the credentials received from the first backend with the credentials received from the source trusted by the second backend.
8 Citations
16 Claims
-
1. A computer-implemented method for enabling a controller that is configured for controlling one or more devices of a first system via a first control system backend to also control one or more devices of a second system via a second control system backend, the method comprising:
-
receiving, at the second control system backend, from the first control system backend, location information of the controller and credentials of the controller or/and of a user of the controller as available to the first control system backend; receiving, at the second control system backend, from a source trusted by the second control system backend, location information of the controller and credentials of the controller or/and of the user; performing, at the second control system backend, context matching to enable the controller to control the one or more devices of the second system, wherein the context matching comprises comparing the location information received from the first control system backend with the location information received from the source trusted by the second control system backend and by comparing the credentials received from the first control system backend with the credentials received from the source trusted by the second control system backend. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable medium comprising instructions which, when executed by one or more processors, perform steps for enabling a controller that is configured for controlling one or more devices of a first system via a first control system backend to also control one or more devices of a second system via a second control system backend, the steps comprising:
-
receiving, at the second control system backend, from the first control system backend, location information of the controller and credentials of the controller or/and of a user of the controller as available to the first control system backend; receiving, at the second control system backend, from a source trusted by the second control system backend, location information of the controller and credentials of the controller or/and of the user; performing, at the second control system backend, context matching to enable the controller to control the one or more devices of the second system, wherein the context matching comprises comparing the location information received from the first control system backend with the location information received from the source trusted by the second control system backend and by comparing the credentials received from the first control system backend with the credentials received from the source trusted by the second control system backend.
-
-
9. A second control system backend for enabling a controller configured for controlling, via a first control system backend, one or more devices of a first system to control one or more devices of a second system, the second control system backend configured to:
-
receive from the first control system backend location information of the controller and credentials of the controller or/and of a user of the controller as available to the first control system backend; receive from a source trusted by the second control system backend location information of the controller and credentials of the controller or/and of the user; and perform context matching to enable the controller to control the one or more devices of the second system, wherein the context matching comprises comparing the location information received from the first control system backend with the location information received from the source trusted by the second control system backend and by comparing the credentials received from the first control system backend with the credentials received from the source trusted by the second control system backend. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification