Verified access to a monitored property
First Claim
1. A monitoring system comprising:
- one or more sensors that are located throughout a property, at least one of the one or more sensors being configured to detect a biometric identifier of a visitor to the property;
an input device that is configured to detect a personally identifying code;
a monitoring control unit that is configured to;
receive, from the at least one of the one or more sensors, the biometric identifier of the visitor to the property;
receive, from the input device, the personally identifying code; and
determine that the personally identifying code corresponds to a stored personally identifying code; and
a monitoring server that is configured to;
based on the personally identifying code corresponding to the stored personally identifying code, receive location information that corresponds to locations of the visitor during a time period before visiting the property; and
compare the biometric identifier to a stored biometric identifier,wherein the monitoring control unit is further configured to;
based on the personally identifying code corresponding to the stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determine a confidence score that reflects a likelihood that the visitor is authorized to access the property;
based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, select, from among multiple monitoring system actions, a monitoring system action; and
perform the monitoring system action.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving, by a monitoring system that is configured to monitor a property and from a visitor to the property, a personally identifying code and a biometric identifier, determining that the personally identifying code corresponds to a stored personally identifying code, receiving, by the monitoring system, location information that corresponds to locations of the visitor during a time period before visiting the property, comparing the biometric identifier to a stored biometric identifier, based on determining that the personally identifying code corresponds to a stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determining a confidence score that reflects a likelihood that the visitor is authorized to access the property, based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, selecting, from among multiple monitoring system actions, a monitoring system action, and performing the monitoring system action.
-
Citations
20 Claims
-
1. A monitoring system comprising:
-
one or more sensors that are located throughout a property, at least one of the one or more sensors being configured to detect a biometric identifier of a visitor to the property; an input device that is configured to detect a personally identifying code; a monitoring control unit that is configured to; receive, from the at least one of the one or more sensors, the biometric identifier of the visitor to the property; receive, from the input device, the personally identifying code; and determine that the personally identifying code corresponds to a stored personally identifying code; and a monitoring server that is configured to; based on the personally identifying code corresponding to the stored personally identifying code, receive location information that corresponds to locations of the visitor during a time period before visiting the property; and compare the biometric identifier to a stored biometric identifier, wherein the monitoring control unit is further configured to; based on the personally identifying code corresponding to the stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determine a confidence score that reflects a likelihood that the visitor is authorized to access the property; based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, select, from among multiple monitoring system actions, a monitoring system action; and perform the monitoring system action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method, comprising:
-
receiving, by a monitoring system that is configured to monitor a property and from a visitor to the property, a personally identifying code and a biometric identifier; determining that the personally identifying code corresponds to a stored personally identifying code; based on determining that the personally identifying code corresponds to a stored personally identifying code, receiving, by the monitoring system, location information that corresponds to locations of the visitor during a time period before visiting the property; comparing the biometric identifier to a stored biometric identifier; based on determining that the personally identifying code corresponds to a stored personally identifying code, comparing the biometric identifier to the stored biometric identifier, and the location information, determining a confidence score that reflects a likelihood that the visitor is authorized to access the property; based on the confidence score that reflects the likelihood that the visitor is authorized to access the property, selecting, from among multiple monitoring system actions, a monitoring system action; and performing the monitoring system action. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification