Security system access detection
First Claim
Patent Images
1. A method comprising:
- receiving, at a security system, a request for access to a security system device;
determining whether the device is set to a first mode or a second mode; and
in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device, wherein the device is set to a first mode or a second mode in response to;
receiving, at the security system, sensor data from one or more security system devices of the security system;
using the received data to determine a particular mode to set for the one or more of the security system devices, wherein determining the particular mode includes determining whether sensor data indicates that users are located within a region covered by the security system and wherein a first mode is set when users are located within a region covered by the security system and a second mode is set when users are not located within the region covered by the security system; and
setting the mode of the one or more security devices based on the determination.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for access and control of networked devices. In one aspect, a method includes receiving a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device.
8 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a security system, a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device, wherein the device is set to a first mode or a second mode in response to; receiving, at the security system, sensor data from one or more security system devices of the security system; using the received data to determine a particular mode to set for the one or more of the security system devices, wherein determining the particular mode includes determining whether sensor data indicates that users are located within a region covered by the security system and wherein a first mode is set when users are located within a region covered by the security system and a second mode is set when users are not located within the region covered by the security system; and setting the mode of the one or more security devices based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving at a security system, one or more types of data associated with users of the security system, wherein one of the one or more types of data comprises location data for one or more authorized users; using the received data to determine a particular mode to set one or more security devices of the security system, wherein determining the particular mode includes determining the location of each authorized user and wherein a first mode is set when users are located within a region covered by the security system and a second mode is set when users are not located within the region covered by the security system; setting the mode of one or more security devices based on the determination; receiving a request to access a first security device of the security system; and determining whether to provide a notification based on the mode set for the first security device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
one or more computers including one or more non-transitory computer storage media storing instructions that when executed by the one or more computes are configured to perform operations comprising; receiving, at a security system, a request for access to a security system device; determining whether the device is set to a first mode or a second mode; and in response to determining that the device is in the second mode, generating one or more notifications to authorized users identifying the access to the security device, wherein the device is set to a first mode or a second mode in response to; receiving, at the security system, sensor data from one or more security system devices of the security system; using the received data to determine a particular mode to set for the one or more of the security system devices, wherein determining the particular mode includes determining whether sensor data indicates that users are located within a region covered by the security system and wherein a first mode is set when users are located within a region covered by the security system and a second mode is set when users are not located within the region covered by the security system; and setting the mode of the one or more security devices based on the determination.
-
20. A system comprising:
one or more computers including one or more non-transitory computer storage media storing instructions that when executed by the one or more computes are configured to perform operations comprising; receiving at a security system, one or more types of data associated with users of the security system, wherein one of the one or more types of data comprises location data for one or more authorized users; using the received data to determine a particular mode to set one or more security devices of the security system, wherein determining the particular mode includes determining the location of each authorized user and wherein a first mode is set when users are located within a region covered by the security system and a second mode is set when users are not located within the region covered by the security system; setting the mode of one or more security devices based on the determination; receiving a request to access a first security device of the security system; and determining whether to provide a notification based on the mode set for the first security device.
Specification