SECURITY SYSTEM APPLICATIONS FOR LOCATIONS TO BE SECURED
First Claim
1. A computer-implemented method for automating security of a secured location, the method comprising:
- providing an electronic device at the secured location, the electronic device including an application in communication with at least one sensor adapted to detect at least one trigger event at the secured location;
providing an application on a mobile device, the application configured to receive an alert from the electronic device at the secured location;
detecting a trigger event at the secured location;
comparing a predetermined threshold with a distance between the mobile device and the secured location;
transmitting, based on the distance exceeding the predetermined threshold, a signal indicating detection of the trigger event from the electronic device at the secured location to the mobile device; and
providing, via the application on the mobile device, an alert on the mobile device indicating the detection of the trigger event at the secured location.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method, and computer program product determine when a user'"'"'s mobile device has left a secured location, such as a house or office, without predefined site security settings being met, and responsively inform the user of any security anomalies. A predetermined distance threshold is compared with the distance between the mobile device, and the secured location. If the distance exceeds the threshold and a trigger event is detected, an alert is transmitted. An alert may also be sent when a mobile object to be secured is moved away from the user'"'"'s mobile device by a distance that exceeds the predetermined distance threshold.
19 Citations
20 Claims
-
1. A computer-implemented method for automating security of a secured location, the method comprising:
-
providing an electronic device at the secured location, the electronic device including an application in communication with at least one sensor adapted to detect at least one trigger event at the secured location; providing an application on a mobile device, the application configured to receive an alert from the electronic device at the secured location; detecting a trigger event at the secured location; comparing a predetermined threshold with a distance between the mobile device and the secured location; transmitting, based on the distance exceeding the predetermined threshold, a signal indicating detection of the trigger event from the electronic device at the secured location to the mobile device; and providing, via the application on the mobile device, an alert on the mobile device indicating the detection of the trigger event at the secured location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for automating security of a mobile object, the method comprising:
-
providing an electronic device at the mobile object, the electronic device including an application in communication with at least one sensor adapted to detect at least one trigger event at the mobile object; providing an application on a mobile device, the application configured to receive an alert from the electronic device at the mobile object; detecting a trigger event at the mobile object; comparing a predetermined threshold with a distance between the mobile device and the mobile object; transmitting, based on the distance exceeding the predetermined threshold, a signal indicating detection of the trigger event from the electronic device at the mobile object to the mobile device; and providing, via the application on the mobile device, an alert on the mobile device indicating the detection of the trigger event at the mobile object. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification