Security monitoring and control
First Claim
Patent Images
1. A method for security monitoring and control comprising:
- receiving sensor data from at least one first peripheral, the sensor data associated with at least one of activity inside and activity outside of a structure;
determining a critical event based in part on the sensor data;
creating an alert based in part on the critical event;
getting user preferences associated with at least one of a user and a base unit;
determining a response based in part on the alert and user preferences;
activating at least one of a second peripheral and a service based in part on the response;
detecting a wireless device associated with an intruder; and
determining one or more properties of the wireless device, the determining including detecting a digital fingerprint of the wireless device, the wireless device being an unpaired Bluetooth enabled device in discoverable mode, and the determining of one or more properties further includes at least one of executing software on, sending a chunk of data to, or sending a sequence of commands to the unpaired Bluetooth enabled device, so as to gain control of the unpaired Bluetooth enabled device.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and software for monitoring and controlling a security system for a structure are provided herein. An exemplary method may include receiving sensor data from at least one first peripheral, the sensor data associated with at least one of activity inside and activity outside of a structure; determining a critical event based in part on the sensor data; creating an alert based in part on the critical event; getting user preferences associated with at least one of a user and a base unit; determining a response based in part on the alert and user preferences; and activating at least one of a second peripheral and a service based in part on the response.
212 Citations
17 Claims
-
1. A method for security monitoring and control comprising:
-
receiving sensor data from at least one first peripheral, the sensor data associated with at least one of activity inside and activity outside of a structure; determining a critical event based in part on the sensor data; creating an alert based in part on the critical event; getting user preferences associated with at least one of a user and a base unit; determining a response based in part on the alert and user preferences; activating at least one of a second peripheral and a service based in part on the response; detecting a wireless device associated with an intruder; and determining one or more properties of the wireless device, the determining including detecting a digital fingerprint of the wireless device, the wireless device being an unpaired Bluetooth enabled device in discoverable mode, and the determining of one or more properties further includes at least one of executing software on, sending a chunk of data to, or sending a sequence of commands to the unpaired Bluetooth enabled device, so as to gain control of the unpaired Bluetooth enabled device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A base unit comprising:
-
a processor; and a memory coupled to the processor, the memory storing instructions executable by the processor to perform a method for security monitoring and control including; receiving sensor data from at least one first peripheral, the sensor data associated with at least one of activity inside and activity outside of a structure; determining a critical event based in part on the sensor data; creating an alert based in part on the critical event; getting user preferences associated with at least one of a user and a base unit; determining a response based in part on the alert and user preferences; activating at least one of a second peripheral and a service based in part on the response; detecting a wireless device associated with an intruder; and determining properties of the wireless device, the wireless device being an unpaired Bluetooth enabled device in discoverable mode, and the determining properties includes at least one of executing software on, sending a chunk of data to, or sending a sequence of commands to the unpaired Bluetooth enabled device, so as to gain control of the unpaired Bluetooth enabled device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a processor to perform a method for security monitoring and control, the method comprising:
-
receiving sensor data from at least one first peripheral, the sensor data associated with at least one of activity inside and activity outside of a structure; determining a critical event based in part on the sensor data; creating an alert based in part on the critical event; getting user preferences associated with at least one of a user and a base unit; determining a response based in part on the alert and user preferences; activating at least one of a second peripheral and a service based in part on the response; detecting a wireless device associated with an intruder; and determining one or more properties of the wireless device, the wireless device being an unpaired Bluetooth enabled device in discoverable mode, and the determining of one or more properties includes at least one of executing software on, sending a chunk of data to, or sending a sequence of commands to the unpaired Bluetooth enabled device, so as to gain control of the unpaired Bluetooth enabled device.
-
Specification