MOBILE DEVICE BASED AUTHENTICATION
First Claim
1. An apparatus for authenticating a user of an automation and security system, comprising:
- a processor;
a memory in electronic communication with the processor; and
instructions stored in the memory, the instructions being executable by the processor to;
receive input from the user to perform at least one function of the automation and security system;
receive confirmation that the user has received an authentication message at an electronic device carried by the user; and
initiate the at least one function.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are described for controlling an automation and security system. According to at least one embodiment, an apparatus for voice control of an automation and security system includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory. The instructions are executable by the processor to receive input from the user to perform at least one function of the automation and security system, receive confirmation that the user has received an authentication message at an electronic device carried by the user, and initiate the at least one function.
-
Citations
20 Claims
-
1. An apparatus for authenticating a user of an automation and security system, comprising:
-
a processor; a memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to; receive input from the user to perform at least one function of the automation and security system; receive confirmation that the user has received an authentication message at an electronic device carried by the user; and initiate the at least one function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-program product for authenticating a user of an automation and security system, the computer-program product comprising a non-transitory computer-readable medium storing instructions executable by a processor to:
-
receive a first user authentication input from the user; receive confirmation that the user received an authentication message on an electronic device in the user'"'"'s possession as a second user authentication input; receive input from the user to initiate at least one function of the automation and security system; and initiate the at least one function. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer-implemented method for authenticating a user of an automation and security system, comprising:
-
determining a location of the user based on use of the automation and security system; authenticating the user by receiving confirmation that the user possesses a handheld electronic device; and initiating at least one function of the automation and security system after authenticating the user. - View Dependent Claims (18, 19, 20)
-
Specification