Authentication and control interface of a security system
First Claim
1. A method for controlling a security system comprising:
- authorizing a user in the security system;
accessing user identification input rendered by the authorized user of the security system using a personal mobile device, including recording, using a tilt sensor of the personal mobile device, a first gesture signature input to authenticate the authorized user and enable the security system, and a second gesture signature input to authenticate the authorized user and disable the security system, the first and second gesture signature inputs having been defined by movement of the personal mobile device in a particular pattern using a set of user gestures performed by the authorized user of the security system while holding the personal mobile device;
defining, based on the accessed user identification input, signatures of the authorized user of the security system, the defined signatures including a first gesture signature based on the recorded first gesture signature input rendered by the authorized user and a second gesture signature based on the recorded second gesture signature input rendered by the authorized user, each of the signatures comprising at least one of;
a sound inputted through a microphone of the personal mobile device,an image captured using a camera of the personal mobile device,a touch point inputted using a touch screen of the personal mobile device,a gesture measured using the tilt sensor of the personal mobile device for at least the gesture signature,a biometric feature of the authorized user inputted at the personal mobile device, orany sequence or combination of a sound inputted through the microphone of the personal mobile device, an image captured using the camera of the personal mobile device, a touch point inputted using the touch screen of the personal mobile device, a gesture measured using the tilt sensor of the personal mobile device, and a biometric feature of the authorized user inputted at the personal mobile device;
storing, in a signature database, the defined signatures;
subsequent to storing, in the signature database, the defined signatures, receiving user identification input rendered by an unauthenticated user using the personal mobile device by receiving, using the tilt sensor of the personal mobile device, a gesture authentication input rendered by an unauthenticated user moving the personal mobile device in a pattern that defines the gesture authentication input;
based on receiving the user identification input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database, signature data corresponding to at least one of the defined signatures including the defined first gesture signature and the defined second gesture signature;
comparing the accessed signature data with the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input;
based on comparison results, determining whether the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature;
authenticating the unauthenticated user as the authorized user of the security system based on a determination that the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature; and
in response to the authentication of the unauthenticated user as the authorized user of the security system;
enabling control of the security system based on the gesture authentication input matching the defined first gesture signature, the enablement of control of the security system allows one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system, anddisabling the security system based on the gesture authentication input matching the defined second gesture signature.
7 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described for providing control of a security system. A user is authorized in the security system and user identification inputs, provided through an input unit of a personal mobile device of the authorized user of the security system, are accessed. One or more signatures of the authorized user are defined and stored in a signature map. Subsequently, user identification input is received from an unauthenticated user using the personal mobile device. The user identification input received from the unauthenticated user is compared to one or more defined signatures in the signature map. The unauthenticated user is determined to be the authorized user if the received user identification input matches one of the defined signatures. The unauthenticated user is allowed to control the security system based on the determination that the unauthenticated user is the authorized user.
74 Citations
20 Claims
-
1. A method for controlling a security system comprising:
-
authorizing a user in the security system; accessing user identification input rendered by the authorized user of the security system using a personal mobile device, including recording, using a tilt sensor of the personal mobile device, a first gesture signature input to authenticate the authorized user and enable the security system, and a second gesture signature input to authenticate the authorized user and disable the security system, the first and second gesture signature inputs having been defined by movement of the personal mobile device in a particular pattern using a set of user gestures performed by the authorized user of the security system while holding the personal mobile device; defining, based on the accessed user identification input, signatures of the authorized user of the security system, the defined signatures including a first gesture signature based on the recorded first gesture signature input rendered by the authorized user and a second gesture signature based on the recorded second gesture signature input rendered by the authorized user, each of the signatures comprising at least one of; a sound inputted through a microphone of the personal mobile device, an image captured using a camera of the personal mobile device, a touch point inputted using a touch screen of the personal mobile device, a gesture measured using the tilt sensor of the personal mobile device for at least the gesture signature, a biometric feature of the authorized user inputted at the personal mobile device, or any sequence or combination of a sound inputted through the microphone of the personal mobile device, an image captured using the camera of the personal mobile device, a touch point inputted using the touch screen of the personal mobile device, a gesture measured using the tilt sensor of the personal mobile device, and a biometric feature of the authorized user inputted at the personal mobile device; storing, in a signature database, the defined signatures; subsequent to storing, in the signature database, the defined signatures, receiving user identification input rendered by an unauthenticated user using the personal mobile device by receiving, using the tilt sensor of the personal mobile device, a gesture authentication input rendered by an unauthenticated user moving the personal mobile device in a pattern that defines the gesture authentication input; based on receiving the user identification input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database, signature data corresponding to at least one of the defined signatures including the defined first gesture signature and the defined second gesture signature; comparing the accessed signature data with the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input; based on comparison results, determining whether the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature; authenticating the unauthenticated user as the authorized user of the security system based on a determination that the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature; and in response to the authentication of the unauthenticated user as the authorized user of the security system; enabling control of the security system based on the gesture authentication input matching the defined first gesture signature, the enablement of control of the security system allows one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system, and disabling the security system based on the gesture authentication input matching the defined second gesture signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An electronic system comprising:
-
at least one processor; and at least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, causes the at least one processor to perform operations comprising; authorizing a user in the security system; accessing user identification input rendered by the authorized user of the security system using a personal mobile device, including recording, using a tilt sensor of the personal mobile device, a first gesture signature input to authenticate the authorized user and enable the security system, and a second gesture signature input to authenticate the authorized user and disable the security system, the first and second gesture signature inputs having been defined by movement of the personal mobile device in a particular pattern using a set of user gestures performed by the authorized user of the security system while holding the personal mobile device; defining, based on the accessed user identification input, signatures of the authorized user of the security system, the defined signatures including a first gesture signature based on the recorded first gesture signature input rendered by the authorized user and a second gesture signature based on the recorded second gesture signature input rendered by the authorized user, each of the signatures comprising at least one of; a sound inputted through a microphone of the personal mobile device, an image captured using a camera of the personal mobile device, a touch point inputted using a touch screen of the personal mobile device, a gesture measured using the tilt sensor of the personal mobile device for at least the gesture signature, a biometric feature of the authorized user inputted at the personal mobile device, or any sequence or combination of a sound inputted through the microphone of the personal mobile device, an image captured using the camera of the personal mobile device, a touch point inputted using the touch screen of the personal mobile device, a gesture measured using the tilt sensor of the personal mobile device, and a biometric feature of the authorized user inputted at the personal mobile device; storing, in a signature map, the defined signatures; subsequent to storing, in the signature map, the defined signatures, receiving user identification input rendered by an unauthenticated user using the personal mobile device by receiving, using the tilt sensor of the personal mobile device, a gesture authentication input rendered by an unauthenticated user moving the personal mobile device in a pattern that defines the gesture authentication input; based on receiving the user identification input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database, signature data corresponding to at least one of the defined signatures including the defined first gesture signature and the defined second gesture signature; comparing the accessed signature data with the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input; based on comparison results, determining whether the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature; authenticating the unauthenticated user as the authorized user of the security system based on a determination that the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature; and in response to the authentication of the unauthenticated user as the authorized user of the security system; enabling control of the security system based on the gesture authentication input matching the defined first gesture signature, the enablement of control of the security system allows one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system, and disabling the security system based on the gesture authentication input matching the defined second gesture signature.
-
-
19. A control system comprising:
-
a security system operable to authorize a user to control the security system; accessing user identification input rendered by the authorized user of the security system using a personal mobile device, including recording, using a tilt sensor of the personal mobile device, a first gesture signature input to authenticate the authorized user and enable the security system, and a second gesture signature input to authenticate the authorized user and disable the security system, the first and second gesture signature inputs having been defined by movement of the personal mobile device in a particular pattern using a set of user gestures performed by the authorized user of the security system while holding the personal mobile device; wherein the secure access application in the personal mobile device is operable to define, based on the accessed user identification input, signatures of the authorized user of the security system, the defined signatures including a first gesture signature based on the recorded first gesture signature input rendered by the authorized user and a second gesture signature based on the recorded second gesture signature input rendered by the authorized user, each of the signatures comprising at least one of; a sound inputted through a microphone of the personal mobile device, an image captured using a camera of the personal mobile device, a touch point inputted using a touch screen of the personal mobile device, a gesture measured using the tilt sensor of the personal mobile device for at least the gesture signature, a biometric feature of the authorized user inputted at the personal mobile device, or any sequence or combination of a sound inputted through the microphone of the personal mobile device, an image captured using the camera of the personal mobile device, a touch point inputted using the touch screen of the personal mobile device, a gesture measured using the tilt sensor of the personal mobile device, and a biometric feature of the authorized user inputted at the personal mobile device; a signature map operable to store the defined signatures; an authentication engine operable; to receive user identification input rendered by an unauthenticated user using the personal mobile device by receiving, using the tilt sensor of the personal mobile device, a gesture authentication input rendered by an unauthenticated user moving the personal mobile device in a pattern that defines the gesture authentication input; to access, from the signature map, signature data corresponding to at least one of the defined signatures including the defined first gesture signature and the defined second gesture signature, to compare the accessed signature data with the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input, to determine, based on comparison results, whether the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature, to authenticate the unauthenticated user as the authorized user of the security system based on a determination that the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature, and to, in response to the authentication of the unauthenticated user as the authorized user of the security system; enable control of the security system based on the gesture authentication input matching the defined first gesture signature, the enablement of control of the security system allows one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system, and disable the security system based on the gesture authentication input matching the defined second gesture signature. - View Dependent Claims (20)
-
Specification