Detection of authorized user presence and handling of unauthenticated monitoring system commands
First Claim
1. A monitoring system comprising:
- one or more sensors that are located throughout a property;
a monitoring control unit that is configured to;
receive data collected by the one or more sensors located throughout the property; and
generate property state information based on the data collected by the one or more sensors; and
an input device that is configured to;
detect an input command to adjust an electronic device, wherein the input command does not include authentication information for the monitoring control unit to authenticate the input command before adjusting the electronic device,wherein the monitoring control unit is further configured to;
receive, from the input device, data identifying the input command that does not include the authentication information for the monitoring control unit to authenticate the input command before adjusting the electronic device;
analyze the property state information and the input command against one or more rules that are related to authorizing additional input commands that are received by the monitoring system without the authentication information; and
based on analyzing the property state information and the input command against the one or more rules, determine whether to adjust the electronic device or generate (i) an alarm condition or (ii) a notification.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.
21 Citations
20 Claims
-
1. A monitoring system comprising:
-
one or more sensors that are located throughout a property; a monitoring control unit that is configured to; receive data collected by the one or more sensors located throughout the property; and generate property state information based on the data collected by the one or more sensors; and an input device that is configured to; detect an input command to adjust an electronic device, wherein the input command does not include authentication information for the monitoring control unit to authenticate the input command before adjusting the electronic device, wherein the monitoring control unit is further configured to; receive, from the input device, data identifying the input command that does not include the authentication information for the monitoring control unit to authenticate the input command before adjusting the electronic device; analyze the property state information and the input command against one or more rules that are related to authorizing additional input commands that are received by the monitoring system without the authentication information; and based on analyzing the property state information and the input command against the one or more rules, determine whether to adjust the electronic device or generate (i) an alarm condition or (ii) a notification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method, comprising:
-
receiving, by a monitoring system that is configured to monitor a property, property state information that includes data collected by one or more sensors located throughout the property; receiving, by the monitoring system, an input command to adjust an electronic device does not include authentication information for the monitoring system to authenticate the input command before performing adjusting the electronic device; analyzing, by the monitoring system, the property state information and the input command against one or more rules that are related to authorizing additional input commands that are received by the monitoring system without authentication information; and based on analyzing the property state information and the input command against the one or more rules, determining, by the monitoring system, whether to adjust the electronic device or generate (i) an alarm condition or (ii) a notification. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification