Systems and methods for remote building security and automation
First Claim
1. A method for providing security, comprising:
- sending, from a controller of a security system, an activity notification addressed to a remote client device associated with a user;
receiving, at the controller, access instructions from the remote client device in response to the activity notification;
determining, by the controller, a violation of the access instructions; and
sending, from the controller, a notification of the violation of the access instructions addressed to the remote client device, the notification indicating that a visitor has violated access granted by the access instructions.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for remotely monitoring and controlling building security are provided. A controller is communicatively coupled to security devices of a building and can communicate an activity event detected by one of the security devices to a remote user device. The controller can then establish a communication session between the remote device and a security device via the controller, thereby allowing the user to communicate with any visitors. Video from a security device can be transmitted by the controller to the user device or an alternative user-device. Access instructions can be provided by the user, in response to which the controller can deactivate various building security measures. Security measures can be reactivated by the controller automatically or in response to a user command. Additionally, the controller can monitor visitor compliance with the deactivated security measures and activate alarms or notify security agencies if necessary.
-
Citations
20 Claims
-
1. A method for providing security, comprising:
-
sending, from a controller of a security system, an activity notification addressed to a remote client device associated with a user; receiving, at the controller, access instructions from the remote client device in response to the activity notification; determining, by the controller, a violation of the access instructions; and sending, from the controller, a notification of the violation of the access instructions addressed to the remote client device, the notification indicating that a visitor has violated access granted by the access instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A controller for a security system, comprising:
-
a processor; and a memory storing instructions that when executed cause the processor to perform operations, the operations comprising; receiving an event detected by a monitoring device of the security system; sending an activity notification to an address of a remote client device in response to the event; receiving access instructions from the remote client device in response to the activity notification, the access instructions permitting access to a visitor; deactivating a security feature in response to the access instructions; determining a violation of the access instructions; and sending a violation notification to the address of the remote client device in response to the violation, the violation notification indicating that the visitor has violated the access granted by the access instructions. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A memory storing instructions for providing security, which, when executed by a processor, cause the processor to perform operations, the operations comprising:
-
receiving an event detected by a monitoring device of a security system; sending an activity notification to an address of a remote client device in response to the event; receiving access instructions from the remote client device in response to the activity notification, the access instructions instructing the security system to grant access to a visitor; deactivating a security feature of the security system in response to the access instructions; determining a violation of the access instructions; and sending a notification to the address of the remote client device indicating that the visitor has violated the access granted by the access instructions. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification