Detection of authorized user presence and handling of unauthenticated monitoring system commands
First Claim
1. A monitoring system that is configured to monitor a property, the monitoring system comprising:
- a camera that is located at the property and that is configured to generate image data;
an electronic device that is configured to receive a voice command that is uttered by a user located inside the property, that is to adjust an attribute of the property, and that does not include authentication information; and
a monitor control unit that is configured to;
receive, from the electronic device, data identifying the voice command that is to adjust the attribute of the property and that does not include the authentication information, data identifying the voice command, and the image data;
based on the image data and the voice command that is to adjust the attribute of the property and that does not include the authentication information, determine whether to authorize the input command that is to adjust the attribute of the property and that does not include the authentication information by;
determining that the image data includes an image of the user who uttered the voice command; and
determining that the user is authorized to issue the voice command; and
based on determining whether to authorize the voice command that is to adjust the attribute of the property and that does not include the authentication information, instruct the electronic device to adjust the attribute of the property based on determining that the user is authorized to issue the voice command.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.
-
Citations
14 Claims
-
1. A monitoring system that is configured to monitor a property, the monitoring system comprising:
-
a camera that is located at the property and that is configured to generate image data; an electronic device that is configured to receive a voice command that is uttered by a user located inside the property, that is to adjust an attribute of the property, and that does not include authentication information; and a monitor control unit that is configured to; receive, from the electronic device, data identifying the voice command that is to adjust the attribute of the property and that does not include the authentication information, data identifying the voice command, and the image data; based on the image data and the voice command that is to adjust the attribute of the property and that does not include the authentication information, determine whether to authorize the input command that is to adjust the attribute of the property and that does not include the authentication information by; determining that the image data includes an image of the user who uttered the voice command; and determining that the user is authorized to issue the voice command; and based on determining whether to authorize the voice command that is to adjust the attribute of the property and that does not include the authentication information, instruct the electronic device to adjust the attribute of the property based on determining that the user is authorized to issue the voice command. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method comprising:
-
receiving, by a monitoring system that is configured to monitor a property and from an electronic device that is configured to receive a voice command that is uttered by a user located inside the property, that is to adjust an attribute of the property, and that does not include authentication information, data identifying the voice command that is to adjust the attribute of the property and that does not include the authentication information and data identifying that the input command; receiving, by the monitoring system and from a camera that is located at the property, image data; based on the image data and the voice command that is to adjust the attribute of the property and that does not include the authentication information, determining, by the monitoring system, whether to authorize the input command that is to adjust the attribute of the property and that does not include the authentication information by; determining that the image data includes an image of the user who uttered the voice command; and determining that the user is authorized to issue the voice command; and based on determining whether to authorize the voice command that is to adjust the attribute of the property and that does not include the authentication information, instructing, by the monitoring system, the electronic device to adjust the attribute of the property based on determining that the user is authorized to issue the voice command. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification