Smart door lock
First Claim
Patent Images
1. A method for a security and/or automation system, comprising:
- detecting motion of an entity proximate at least one entry to a location;
transmitting a discovery signal based at least in part on the detected motion;
determining a first presence of a first card located proximate the at least one entry to the location based at least in part on the discovery signal;
obtaining information related to an identification of the entity associated with the first card, wherein obtaining information comprises identifying at least one feature of the first card;
performing an authentication of the first card, the authentication based at least in part on obtaining information related to the identification; and
taking an action based at least in part on performing the authentication.
6 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, systems, methods, and techniques relating to security and/or automation systems, collectively referred to as automation systems, may include determining a presence of a first device proximate at least one entry to a location, obtaining information related to an identification of an entity associated with the at least one device, authenticating the first device, the authenticating based at least in part on obtaining information related to the identification, and taking an action based at least in part on determining the authenticity.
-
Citations
20 Claims
-
1. A method for a security and/or automation system, comprising:
-
detecting motion of an entity proximate at least one entry to a location; transmitting a discovery signal based at least in part on the detected motion; determining a first presence of a first card located proximate the at least one entry to the location based at least in part on the discovery signal; obtaining information related to an identification of the entity associated with the first card, wherein obtaining information comprises identifying at least one feature of the first card; performing an authentication of the first card, the authentication based at least in part on obtaining information related to the identification; and taking an action based at least in part on performing the authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus for security and/or automation systems, comprising:
-
a processor; memory in electronic communication with the processor; and instructions stored in the memory, the instructions causing the processor to; determine a first presence of a first card proximate an entry to a location; obtain information related to an identification of an entity associated with the first card; perform an authentication on the first card, the authentication based at least in part on obtaining information related to the identification; determining a second presence of a second entity proximate the entry to the location; creating a ranking of the entity and the second entity; and take an action based at least in part on performing the authentication and the ranking. - View Dependent Claims (19)
-
-
20. A non-transitory computer-readable medium storing computer-executable code, the code executable by a processor to:
-
determine a presence of a card proximate an entry to a location; obtain information related to an identification of an entity associated with the card; perform an authentication on the card, the authentication based at least in part on obtaining information related to the identification; determine a second presence of a second card proximate the entry to the location; obtain information related to a second identification of a second entity associated with the second card; perform an authentication on the second card, the authentication based at least in part on obtaining information related to the second identification; create a ranking of the entity and the second entity; and take an action based at least in part on performing the authentication and the ranking.
-
Specification