×

Authentication and control interface of a security system

  • US 9,141,150 B1
  • Filed: 09/15/2011
  • Issued: 09/22/2015
  • Est. Priority Date: 09/15/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling a security system comprising:

  • authorizing a user in the security system;

    accessing user identification input rendered by the authorized user of the security system using a personal mobile device, including recording, using a tilt sensor of the personal mobile device, a first gesture signature input to authenticate the authorized user and enable the security system, and a second gesture signature input to authenticate the authorized user and disable the security system, the first and second gesture signature inputs having been defined by movement of the personal mobile device in a particular pattern using a set of user gestures performed by the authorized user of the security system while holding the personal mobile device;

    defining, based on the accessed user identification input, signatures of the authorized user of the security system, the defined signatures including a first gesture signature based on the recorded first gesture signature input rendered by the authorized user and a second gesture signature based on the recorded second gesture signature input rendered by the authorized user, each of the signatures comprising at least one of;

    a sound inputted through a microphone of the personal mobile device,an image captured using a camera of the personal mobile device,a touch point inputted using a touch screen of the personal mobile device,a gesture measured using the tilt sensor of the personal mobile device for at least the gesture signature,a biometric feature of the authorized user inputted at the personal mobile device, orany sequence or combination of a sound inputted through the microphone of the personal mobile device, an image captured using the camera of the personal mobile device, a touch point inputted using the touch screen of the personal mobile device, a gesture measured using the tilt sensor of the personal mobile device, and a biometric feature of the authorized user inputted at the personal mobile device;

    storing, in a signature database, the defined signatures;

    subsequent to storing, in the signature database, the defined signatures, receiving user identification input rendered by an unauthenticated user using the personal mobile device by receiving, using the tilt sensor of the personal mobile device, a gesture authentication input rendered by an unauthenticated user moving the personal mobile device in a pattern that defines the gesture authentication input;

    based on receiving the user identification input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database, signature data corresponding to at least one of the defined signatures including the defined first gesture signature and the defined second gesture signature;

    comparing the accessed signature data with the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input;

    based on comparison results, determining whether the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature;

    authenticating the unauthenticated user as the authorized user of the security system based on a determination that the received gesture authentication input rendered by the unauthenticated user moving the personal mobile device in the pattern that defines the gesture authentication input matches the defined first gesture signature or the defined second gesture signature; and

    in response to the authentication of the unauthenticated user as the authorized user of the security system;

    enabling control of the security system based on the gesture authentication input matching the defined first gesture signature, the enablement of control of the security system allows one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system, anddisabling the security system based on the gesture authentication input matching the defined second gesture signature.

View all claims
  • 7 Assignments
Timeline View
Assignment View
    ×
    ×