Managing barrier and occupancy based home automation system
First Claim
1. An apparatus comprising:
- a processor;
a memory in electronic communication with the processor; and
instructions stored in the memory, the instructions being executable by the processor to;
determine a location of a user of a home automation system relative to a barrier of a home being monitored by the home automation system, wherein the home automation system comprises a sensor, a wall-mounted control panel, and a locking mechanism of the barrier distinct from the sensor and the control panel, wherein the wall to which the control panel is mounted is a fixed wall of a building;
determine whether to permit a change in the locking mechanism of the barrier based at least in part on the determined location of the user and whether the user is authorized; and
if the user is authorized, maintain a current armed state of the home automation system when the authorized user accesses the barrier; and
if the user is unauthorized, maintain the current armed state of the home automation system when the unauthorized user accesses the barrier;
wherein maintaining the current armed state of the home automation system when the unauthorized user accesses the barrier comprises triggering an alarm when the unauthorized user accesses the barrier from inside the home while the current armed state is maintained;
wherein maintaining the current armed state of the home automation system when the authorized user accesses the barrier comprises refraining from triggering the alarm when the authorized user accesses the barrier from inside the home while the current armed state is maintained; and
wherein the home security system is powered on when the home automation system is in either the armed state or a disarmed state.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are described for controlling access to a home based on user occupancy. According to at least one embodiment, an apparatus for controlling access to a home based on user occupancy includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory which are executable by a processor to determine a location of a user of a home automation system relative to a barrier of a home being monitored by the home automation system. The instructions are executable to determine whether to permit a change in a locking mechanism of the barrier based in part on the determined location of the user, and maintain a current state of the home automation system.
-
Citations
23 Claims
-
1. An apparatus comprising:
-
a processor; a memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to; determine a location of a user of a home automation system relative to a barrier of a home being monitored by the home automation system, wherein the home automation system comprises a sensor, a wall-mounted control panel, and a locking mechanism of the barrier distinct from the sensor and the control panel, wherein the wall to which the control panel is mounted is a fixed wall of a building; determine whether to permit a change in the locking mechanism of the barrier based at least in part on the determined location of the user and whether the user is authorized; and if the user is authorized, maintain a current armed state of the home automation system when the authorized user accesses the barrier; and if the user is unauthorized, maintain the current armed state of the home automation system when the unauthorized user accesses the barrier; wherein maintaining the current armed state of the home automation system when the unauthorized user accesses the barrier comprises triggering an alarm when the unauthorized user accesses the barrier from inside the home while the current armed state is maintained; wherein maintaining the current armed state of the home automation system when the authorized user accesses the barrier comprises refraining from triggering the alarm when the authorized user accesses the barrier from inside the home while the current armed state is maintained; and wherein the home security system is powered on when the home automation system is in either the armed state or a disarmed state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-program product comprising a non-transitory computer-readable medium storing instructions executable by a processor to:
-
determine a location of a user of a home automation system relative to a barrier of a home being monitored by the home automation system wherein the home automation system comprises a sensor, a wall-mounted control panel, and a locking mechanism of the barrier distinct from the sensor and the control panel, wherein the wall to which the control panel is mounted is a permanent wall of a building; determine an identity of the user; determine whether to permit a change in the locking mechanism of the barrier based at least in part on the determined location of the user and whether the user is authorized; and if the user is authorized, maintain a current armed state of the home automation system when the authorized user accesses the barrier; and if the user is unauthorized, maintain the current armed state of the home automation system when the unauthorized user accesses the barrier; wherein maintaining the current armed state of the home automation system when the unauthorized user accesses the barrier comprises triggering an alarm when the unauthorized user accesses the barrier from inside the home while the current armed state is maintained; wherein maintaining the current armed state of the home automation system when the authorized user accesses the barrier comprises refraining from triggering the alarm when the authorized user accesses the barrier from inside the home while the current armed state is maintained; and wherein the home security system is powered on when the home automation system is in either the armed state or a disarmed state. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer-implemented method comprising:
-
determine a location of a user of a home automation system relative to a barrier of a home being monitored by the home automation system, wherein the home automation system comprises a sensor, a wall-mounted control panel, and a locking mechanism of the barrier distinct from the sensor and the control panel, wherein the wall to which the control panel is mounted is a permanent wall of a building; determining an identity of the user; determining whether to permit a change in the locking mechanism of the barrier based at least in part on the determined location of the user and whether the user is authorized; and if the user is authorized, maintaining a current armed state of the home automation system when the authorized user accesses the barrier; and if the user is unauthorized, maintaining the current armed state of the home automation system when the unauthorized user accesses the barrier; wherein maintaining the current armed state of the home automation system when the unauthorized user accesses the barrier comprises triggering an alarm when the unauthorized user accesses the barrier from inside the home while the current armed state is maintained; wherein maintaining the current armed state of the home automation system when the authorized user accesses the barrier comprises refraining from triggering the alarm when the authorized user accesses the barrier from inside the home while the current armed state is maintained; and wherein the home security system is powered on when the home automation system is in either the armed state or a disarmed state. - View Dependent Claims (21, 22, 23)
-
Specification