System and method to access/restrict a security system for temporary users using a mobile application
First Claim
Patent Images
1. A method comprising:
- a first processor of a security system monitoring a secured geographic area and storing a first access password, wherein the first access password is entered into a user interface of the security system by an authorized person to disarm the security system;
a first mobile wireless device of the authorized person receiving an identifier of a second person who is to be granted temporary access into the secured geographic area by the security system;
a second processor of the first mobile wireless device of the authorized person or the first processor of the security system generating a temporary access password that is to be used by the second person to disarm the security system by entering the temporary access password into the user interface of the security system, wherein the temporary access password includes a limits use parameter, and wherein the limits use parameter includes a start date, a start time, an end date, and an end time that limit use of the temporary access password such that the temporary access password is valid only after the start date and the start time and before the end date and the end time;
the first mobile wireless device of the authorized person transferring the temporary access password to a second mobile wireless device of the second person; and
the first processor of the security system automatically arming the security system at the end time on the end date,wherein the first access password is different than the temporary access password.
4 Assignments
0 Petitions
Accused Products
Abstract
An apparatus that includes a mobile wireless device of an authorized person receiving an identifier of another person who is to be granted temporary access into a secured geographic area of the authorized person by a security system of the authorized person, a processor of the mobile device or the security system generating a temporary access code with specific features that is to be used by the other person for gaining entry into the secured area and the mobile device of the authorized person transferring the temporary password to a mobile wireless device of the other person.
42 Citations
14 Claims
-
1. A method comprising:
-
a first processor of a security system monitoring a secured geographic area and storing a first access password, wherein the first access password is entered into a user interface of the security system by an authorized person to disarm the security system; a first mobile wireless device of the authorized person receiving an identifier of a second person who is to be granted temporary access into the secured geographic area by the security system; a second processor of the first mobile wireless device of the authorized person or the first processor of the security system generating a temporary access password that is to be used by the second person to disarm the security system by entering the temporary access password into the user interface of the security system, wherein the temporary access password includes a limits use parameter, and wherein the limits use parameter includes a start date, a start time, an end date, and an end time that limit use of the temporary access password such that the temporary access password is valid only after the start date and the start time and before the end date and the end time; the first mobile wireless device of the authorized person transferring the temporary access password to a second mobile wireless device of the second person; and the first processor of the security system automatically arming the security system at the end time on the end date, wherein the first access password is different than the temporary access password. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
a first processor of a security system that monitors a secured geographic area and that stores a first access password, wherein the first access password is entered into a first user interface of the security system by an authorized person to disarm the security system; a first mobile wireless device of the authorized person with a second user interface that receives an identifier of a second person who is to be granted temporary access into the secured geographic area by the security system; and a second processor of the first mobile wireless device of the authorized person, wherein the second processor of the first mobile wireless device of the authorized person or the first processor of the security system generates a temporary access password to disarm the security system by entering the temporary access password into the first user interface of the security system and transfers the temporary access password to a second mobile device of the second person, wherein the temporary access password includes a set of limitations on use of the temporary access password, wherein the set of limitations includes a start date, a start time, an end date, and an end time that limit the use of the temporary access password such that the temporary access password is valid only after the start date and the start time and before the end date and the end time, wherein the first processor of the security system automatically arms the security system at the end time on the end date, and wherein the first access password is different than the temporary access password. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
a security system of an authorized user that protects a secured geographic area; a first processor of the security system that stores a first access password, wherein the first access password is entered into a first user interface of the security system by the authorized user to disarm the security system; a first mobile wireless device of the authorized user that is coupled to the security system, wherein the first mobile wireless device of the authorized user receives, through a second user interface of the first mobile wireless device of the authorized user, an identifier of a second person who is to be granted temporary access into the secured geographic area by the security system; and a second processor of the first mobile wireless device of the authorized user, wherein the second processor of the first mobile wireless device of the authorized user or the first processor of the security system generates a temporary access password that is to be used by the second person to disarm the security system by entering the temporary access password into the first user interface of the security system, wherein the second processor of the first mobile wireless device of the authorized user transfers the temporary access password and a set of limitations to a second mobile wireless device of the second person, wherein the second processor of the first mobile wireless device of the authorized user receives an input from the authorized user setting parameters defining the set of limitations, wherein the set of limitations includes a start date, a start time, an ending date, and an ending time such that the temporary access password is valid only after the start date and the start time and before the ending date and the ending time, wherein the first processor of the security system automatically arms the security system at the end time on the end date, and wherein the first access password is different than the temporary access password.
-
Specification