Leveraging a user's geo-location to arm and disarm a network enabled device
First Claim
1. In a system comprising a security monitoring device in a monitored physical location, a security processing system configured to communicate with the security monitoring device over a network, and one or more mobile devices configured to communicate with the security monitoring device over the network, a method comprising:
- arming and disarming the security monitoring device and the security processing system device based on geolocation data associated with at least one of the mobile devices,wherein the disarming comprises;
recognizing, with a particular one of the mobile devices, when the particular mobile device enters a first region centered around the monitored physical location;
when the particular mobile device enters the first region, searching for a second region that is smaller than the first region and is defined by a geo-fence;
when the mobile device recognizes the geo-fence, sending a request from the particular mobile device to the security processing system to disarm the system from sending certain notifications to users of the system; and
processing the request at the security processing system, in conjunction with at least one user-provided instruction and geolocation data from any one or more of the other mobile devices in the system, to set system behavior with respect to notifying articular users of safety or security-related events at the monitored physical location and saving data about the events at the monitored physical location to one or more user-accessible timelines showing information about past events at the monitored physical location.
11 Assignments
0 Petitions
Accused Products
Abstract
A method of controlling operation of a security device in a location by a mobile user device, comprises monitoring a region around a location of interest, via a mobile user device; providing at least one security device within the region, wherein the security device comprises at least one sensor to monitor a location. The user device recognizes that the user device has entered the region, and searches for a security device within the region. The security device is detected and at least certain security features and/or sensors are disarmed. Disarming may mean that at least certain notifications are not sent about the status of the location. When the user device recognizes that the device is leaving the region, security features and/or sensors may be armed.
53 Citations
26 Claims
-
1. In a system comprising a security monitoring device in a monitored physical location, a security processing system configured to communicate with the security monitoring device over a network, and one or more mobile devices configured to communicate with the security monitoring device over the network, a method comprising:
-
arming and disarming the security monitoring device and the security processing system device based on geolocation data associated with at least one of the mobile devices, wherein the disarming comprises; recognizing, with a particular one of the mobile devices, when the particular mobile device enters a first region centered around the monitored physical location; when the particular mobile device enters the first region, searching for a second region that is smaller than the first region and is defined by a geo-fence; when the mobile device recognizes the geo-fence, sending a request from the particular mobile device to the security processing system to disarm the system from sending certain notifications to users of the system; and processing the request at the security processing system, in conjunction with at least one user-provided instruction and geolocation data from any one or more of the other mobile devices in the system, to set system behavior with respect to notifying articular users of safety or security-related events at the monitored physical location and saving data about the events at the monitored physical location to one or more user-accessible timelines showing information about past events at the monitored physical location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 21, 22, 23, 24, 25)
-
-
11. In a system comprising a security monitoring device in a physical location, and one or more mobile user devices configured to communicate with the security monitoring device over a network, a method comprising:
-
arming and disarming certain security features and/or sensors of the security monitoring device based on geolocation data associated with at least one of the mobile user devices, wherein the disarming comprises; recognizing, with a particular one of the mobile devices, when the particular mobile device enters a first region centered around the monitored physical location; upon the particular mobile device entering the first region, searching, with the particular mobile device, for a second region that is smaller than the first region and that is defined by a geo-fence; sending a request from the particular mobile device to an associated computer processing system when the particular mobile device recognizes the geo-fence, wherein the request is to disarm the system from sending notifications to one or more users of the system; and processing the request at the associated computer processing system, in conjunction with at least one user-provided instruction and geolocation data from any one or more of the other mobile devices in the system, to set system behavior with respect to notifying particular users of safety or security-related events at the monitored physical location and saving data about the events at the monitored physical location to one or more user-accessible timelines showing information about past events at the monitored physical location. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
26. In a system comprising a security monitoring device in a monitored physical location, a security processing system configured to communicate with the security monitoring device over a network, and one or more mobile devices configured to communicate with the security monitoring device over the network, a method comprising:
-
arming and disarming the security monitoring device and the security processing system device based on geolocation data associated with at least one of the mobile devices, wherein the disarming comprises; generating a signal when a user begins to approach a selected radius around the monitored physical location, wherein the signal is to ensure that the security monitoring device/security processing system will not notify the user or other users immediately upon an entry into the monitored physical location, but instead will wait a predetermined amount of time after the entry into the monitored physical location to confirm that the user is in the location either through a software-based application or a wireless network, and, upon confirmation, will disarm.
-
Specification