CONTROL, MONITORING, AND/OR SECURITY, APPARATUS AND METHOD FOR PREMISES, VEHICLES, AND/OR ARTICLES
First Claim
1. A computer-implemented method, comprising:
- receiving, with a receiver or with a computer, information for establishing a personal control and monitoring account, wherein the personal control and monitoring account is capable of allowing a user to perform a control, a monitoring, or a security, operation, action, or function, on, for, or regarding, any number of premises, any number of vehicles, or any number of articles;
receiving, with the receiver or with the computer, information regarding each premises, each vehicle, or each article;
processing, with the computer, the information for establishing the personal control and monitoring account and the information regarding each premises, each vehicle, or each article;
establishing, using the computer, the personal control and monitoring account, wherein the personal control and monitoring account contains or includes a link or a hyperlink to a computer associated with each premises, each vehicle, or each article in the personal control and monitoring account; and
storing the information regarding the personal control and monitoring account in a database of the computer or a database of a second computer.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method, including receiving, with a receiver or computer, information regarding a user and a personal control and monitoring account associated with the user, processing, with the computer, the information regarding the user and the personal control and monitoring account, wherein the personal control and monitoring account can be utilized to allow the user to perform a control, a monitoring, or a security, operation, action, or function for or regarding any number of premises, any number of vehicle, or any number of articles, determining, with the computer, whether or not the user is an authorized user, and allowing, with the computer, the user to access the personal control and monitoring account if the user is authorized or denying the user access to the personal control and monitoring account if the user is not authorized.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, with a receiver or with a computer, information for establishing a personal control and monitoring account, wherein the personal control and monitoring account is capable of allowing a user to perform a control, a monitoring, or a security, operation, action, or function, on, for, or regarding, any number of premises, any number of vehicles, or any number of articles; receiving, with the receiver or with the computer, information regarding each premises, each vehicle, or each article; processing, with the computer, the information for establishing the personal control and monitoring account and the information regarding each premises, each vehicle, or each article; establishing, using the computer, the personal control and monitoring account, wherein the personal control and monitoring account contains or includes a link or a hyperlink to a computer associated with each premises, each vehicle, or each article in the personal control and monitoring account; and storing the information regarding the personal control and monitoring account in a database of the computer or a database of a second computer.
-
-
2. A computer-implemented method, comprising:
-
receiving, with a receiver or with a computer, information regarding a user and a personal control and monitoring account associated with the user; processing, with the computer, the information regarding the user and the personal control and monitoring account associated with the user, wherein the personal control and monitoring account can be utilized to allow a user to perform a control, a monitoring, or a security, operation, action, or function, on, for, or regarding, any number of premises, any number of vehicles, or any number of articles; determining, with the computer, whether or not the user is an authorized user; and allowing, with the computer, the user to access the personal control and monitoring account if the user is an authorized user of the personal control and monitoring account or denying the user access to the personal control and monitoring account if the user is not an authorized user of the personal control and monitoring account. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method, comprising:
-
receiving, with a receiver or with a computer, at least one signal transmitted or issued by a user for performing, or for attempting to perform, a control, a monitoring, or a security, operation, action, or function, on or regarding a premises or a premises system, equipment, or device, of the premises, on or regarding a vehicle or a vehicle system, equipment, or device, of the vehicle, or on or regarding an article or an article system, equipment, or device, of the article; receiving, with the receiver or with the computer, a picture, a photograph, or a video clip, of the user; processing, with the computer, information regarding the at least one signal for performing a control, a monitoring, or a security, operation, action, or function, and information regarding the picture, the photograph, or the video clip, of the user; generating, with the computer, an alert message or a notification message, wherein the alert message or the notification message contains information regarding the control, monitoring, or security, operation, action, or function, and the picture, the photograph, or the video clip, of the user; and transmitting the alert message or the notification message to a communication device associated with an authorized user or an authorized lead user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification