SECURITY SYSTEM ACCESS DETECTION
First Claim
Patent Images
1. A method comprising:
- receiving a request for access to a security system device;
determining whether the device is set to a first mode or a second mode; and
in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.
28 Citations
22 Claims
-
1. A method comprising:
-
receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving at a security system, one or more types of data associated with users of the security system; using the received data to determine a particular mode to set one or more security devices of the security system; setting the mode of one or more security devices based on the determination; receiving a request to access a first security device of the security system; and determining whether to provide a notification based on the mode set for the first security device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification