Multi-level security mechanism for accessing a panel
First Claim
1. A security access mechanism comprising:
- a security panel;
a central monitor station connected to the security panel; and
one or more mobile phones; and
wherein;
each of the one or more mobile phones has a phone number that is registered at the security panel with a user code;
the security panel is in an armed state which can be disarmed with a user code from a mobile phone having the phone number mapped to the user code as registered at the security panel;
a geo location app is provided to each of the one or more mobile phones that is registered with its phone number against a user code at the security panel;
the geo location app permits the security panel to track each mobile phone for its presence within a pre-determine range around a protected premise;
a person may disarm and access the security panel with a mobile phone if the person uses the user code registered at the security panel for the mobile phone;
if the mobile phone that the person is using to access the security panel has no user code registered at the security panel, then the person is treated by the security panel as an unauthorized caller or an intruder;
if the person is treated as an unauthorized caller or intruder, then an alert indicating an intruder attempting to gain access to the security panel is sent to the one or more mobile phones that are registered at the security panel according to user codes; and
if a user of the one or more mobile phones acknowledges the alert, then a second alert about the intruder is sent to the central monitor station.
4 Assignments
0 Petitions
Accused Products
Abstract
A panel associated with maintaining security of mobile devices. The devices such as mobile phones may be registered with user codes at the panel. If a user wants to access the panel, the user may enter a user code corresponding to a number of the device. The device may have a geo-location app in that the panel can track the device. If the user is within the pre-determined range of a protected location, another check about the user may be effected with a face recognition app. A face scan of the user may be compared with a face of an authorized user. If the user is found to be unauthorized anywhere along the above-noted process, then the user may be deemed to be an intruder, and an alert can be sent to a central monitor station, which may take action to remove any threat associated with the intruder.
160 Citations
14 Claims
-
1. A security access mechanism comprising:
-
a security panel; a central monitor station connected to the security panel; and one or more mobile phones; and wherein; each of the one or more mobile phones has a phone number that is registered at the security panel with a user code; the security panel is in an armed state which can be disarmed with a user code from a mobile phone having the phone number mapped to the user code as registered at the security panel; a geo location app is provided to each of the one or more mobile phones that is registered with its phone number against a user code at the security panel; the geo location app permits the security panel to track each mobile phone for its presence within a pre-determine range around a protected premise; a person may disarm and access the security panel with a mobile phone if the person uses the user code registered at the security panel for the mobile phone; if the mobile phone that the person is using to access the security panel has no user code registered at the security panel, then the person is treated by the security panel as an unauthorized caller or an intruder; if the person is treated as an unauthorized caller or intruder, then an alert indicating an intruder attempting to gain access to the security panel is sent to the one or more mobile phones that are registered at the security panel according to user codes; and if a user of the one or more mobile phones acknowledges the alert, then a second alert about the intruder is sent to the central monitor station. - View Dependent Claims (2)
-
-
3. A multi-level mobile device security system comprising:
-
a security panel; one or more mobile devices; and a central monitor station connected to the security panel; and wherein; the one or more mobile devices have numbers that are registered at the security panel with user codes, respectively; the security panel is armed and can be disarmed by a mobile number that is registered with a user code at the security panel; the security panel tracks the one or more mobile devices that have numbers registered with the user codes at the security panel, within a pre-determined range around a protected location; and the security panel contains a friendly mobile device number list that comprises the numbers of the one or more mobile devices that have their numbers registered with user codes, respectively, at the security panel. - View Dependent Claims (4, 5, 6, 7)
-
-
8. A method for obtaining authorized access to a security panel, comprising:
-
entering a user code for each of one or more mobile phones in a security panel; connecting a central monitor station to the security panel; mapping numbers of the one or more mobile phones to the user codes at the security panel; adding a geo location app to each of the one or more mobile phones for tracking a mobile phone of the one or more mobile phones by the security panel; and determining whether a person using a mobile phone of the one or more mobile phones is an intruder; and wherein determining whether a person using a selected mobile phone of the one or more mobile phones is an intruder, comprises; checking that the user code entered by the person at the security panel corresponds to a user code that is mapped to a phone number of the selected mobile phone at the security panel; and checking that a presence of the selected mobile phone with the geo location app in the selected mobile phone by the security panel is outside of a pre-determined range around a protected premise. - View Dependent Claims (9, 10)
-
-
11. A security access mechanism comprising:
-
a security panel; a central monitor station connected to the security panel; and one or more mobile phones; and wherein; each of the one or more mobile phones has a phone number that is registered at the security panel with a user code; the security panel is in an armed state which can be disarmed with a user code from a mobile phone having the phone number mapped to the user code as registered at the security panel; a geo location app is provided to each of the one or more mobile phones that is registered with its phone number against a user code at the security panel; the geo location app permits the security panel to track each mobile phone for its presence within a pre-determine range around a protected premise; and if a person disarms and accesses the security panel with a mobile phone and a user code registered at the security panel for that mobile phone, and the mobile phone has a presence within the pre-determined range around the protected premise, then a check of whether the person is an authentic user is invoked by the security panel with a face recognition app in the mobile phone. - View Dependent Claims (12, 13)
-
-
14. A multi-level mobile device security system comprising:
-
a security panel; one or more mobile devices; and a central monitor station connected to the security panel; and wherein; the one or more mobile devices have numbers that are registered at the security panel with user codes, respectively; the security panel is armed and can be disarmed by a mobile number that is registered with a user code at the security panel; the security panel tracks the one or more mobile devices that have numbers registered with the user codes at the security panel, within a pre-determined range around a protected location; and if a person, other than an authorized user of a mobile device, accesses the security panel with a correct user code of the mobile device, and the mobile device is with the pre-determined range, the security panel triggers a notification to a face recognition app that becomes present in the mobile device for authentication or of non-authentication the person as an authorized user of the device, with a scan of a face of the person using the mobile device, which is compared with a face of the authorized user of the mobile device.
-
Specification