METHODS FOR REMOTE MONITORING AND CONTROL OF SECURITY DEVICES OVER A COMPUTER NETWORK
First Claim
1. A non-transitory computer readable medium including at least computer program code stored thereon facilitates control of a security system at a local location from a remote location using a central server, said computer readable medium comprising:
- computer program code for identifying a user account;
computer program code for identifying a security system associated with the user account;
computer program code for presenting, within at least one graphical control screen on a remote computing device, (i) current status information regarding the security system, and (ii) user interface controls for permitting a remote user at the remote location to set one or more security settings;
computer program code for receiving at least a remote security setting request from the remote user via the graphical control screen; and
computer program code for causing configuration of the security system at the local location based on the remote security setting request;
wherein the remote computing device and the security system are capable of being electrically connected to a network of computers, andwherein the central server connects to the network of computers, receives the remote security setting request from the remote computing device, and electronically transmits at least one control message to the security system to thereby configure the security system.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods are provided to access devices over the Internet and to control and/or set states of devices over the Internet. One method includes providing, at a server connected to the Internet, code for enabling access to networked devices at a remote location using a networked computing device. The method can enable receiving a status request to view status of one or more of the networked devices. The method can also enable receiving a control request at the server, via the networked computing device, to operate one or more utility controls at a remote location. The utility controls can be used for any of a variety of purposes. The method is operable for any computing device that has access to the Internet, including wireless hand-held networked devices.
-
Citations
10 Claims
-
1. A non-transitory computer readable medium including at least computer program code stored thereon facilitates control of a security system at a local location from a remote location using a central server, said computer readable medium comprising:
-
computer program code for identifying a user account; computer program code for identifying a security system associated with the user account; computer program code for presenting, within at least one graphical control screen on a remote computing device, (i) current status information regarding the security system, and (ii) user interface controls for permitting a remote user at the remote location to set one or more security settings; computer program code for receiving at least a remote security setting request from the remote user via the graphical control screen; and computer program code for causing configuration of the security system at the local location based on the remote security setting request; wherein the remote computing device and the security system are capable of being electrically connected to a network of computers, and wherein the central server connects to the network of computers, receives the remote security setting request from the remote computing device, and electronically transmits at least one control message to the security system to thereby configure the security system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification