×

Authentication and control interface of a security system

  • US 10,354,059 B1
  • Filed: 09/06/2017
  • Issued: 07/16/2019
  • Est. Priority Date: 09/15/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling a security system comprising:

  • authorizing a user of the security system;

    accessing user identification input rendered by the authorized user of the security system by recording, using a camera of a personal mobile device of the authorized user of the security system, an image input rendered by the authorized user of the security system, the recorded image input including a non-human object;

    defining, based on the accessed user identification input, one or more signatures of the authorized user of the security system comprising an image signature based on the recorded image input rendered by the authorized user, the image signature including one or more images of the non-human object;

    storing, in a signature database, the defined one or more signatures;

    receiving signature input rendered by an unauthenticated user using the personal mobile device by receiving, using the camera of the personal mobile device, an image input rendered by the unauthenticated user;

    based on receiving the image input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database with the defined one or more signatures, signature data corresponding to the defined image signature;

    comparing the accessed signature data with the signature input rendered by the unauthenticated user using the personal mobile device by comparing the accessed image signature with the received image input rendered by the unauthenticated user;

    based on comparison results, determining whether the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures by determining whether the received image input rendered by the unauthenticated user matches the one or more images of the non-human object included in the accessed image signature;

    authenticating the unauthenticated user as the authorized user of the security system based on a determination that the received image input rendered by the unauthenticated user matches the one or more images of the non-human object included in the accessed image signature; and

    in response to the authentication of the unauthenticated user as the authorized user of the security system, enabling control of the security system based on one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system,wherein the one or more images of the non-human object comprise a sequence of images of two or more key objects,wherein comparing the accessed image signature with the received image input rendered by the unauthenticated user comprises comparing the sequence of images of two or more key objects of the image signature with a sequence of images of the image input rendered by the unauthenticated user, andwherein determining whether the received image input rendered by the unauthenticated user matches the one or more images of the non-human object included in the accessed image signature comprises determining whether the sequence of images of two or more key objects of the image signature matches the sequence of images of the image input rendered by the unauthenticated user.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×