×

Authentication and control interface of a security system

  • US 9,792,422 B1
  • Filed: 09/21/2015
  • Issued: 10/17/2017
  • Est. Priority Date: 09/15/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling a security system comprising:

  • authorizing a user of the security system;

    accessing user identification input rendered by the authorized user of the security system using a personal mobile device, the accessed user identification input being input provided through an input unit of the personal mobile device other than a keypad that enables entry of alphanumeric characters;

    defining, based on the accessed user identification input, one or more signatures of the authorized user of the security system;

    storing, in a signature database, the defined one or more signatures;

    receiving input defining an activation cue rendered by the authorized user of the security system, wherein the activation cue activates a secure access application on the personal mobile device that enables control of the security system, the activation cue comprising;

    a sound inputted through a microphone of the personal mobile device, wherein the sound is the sound of a car engine turning off or the sound of a car door closing, andat least one of;

    a determination of whether a distance of the personal mobile device from the security system is within a predetermined value, wherein the determination comprises;

    monitoring the distance of the personal mobile device from the security system; and

    comparing the monitored distance of the personal mobile device from the security system with the predetermined value;

    ora determination of whether a current time is within a defined time interval in a time schedule, wherein the time schedule includes one or more time intervals for a predetermined period of time;

    recording, in electronic storage, the activation cue rendered by the authorized user of the security system, the activation cue activating the secure access application that evaluates whether input of one of the defined one or more signatures has been received;

    subsequent to recording, in electronic storage, the activation cue rendered by the authorized user of the security system, detecting the activation cue using the personal mobile device;

    in response to detecting the activation cue using the personal mobile device, activating the secure access application on the personal mobile device to receive signature input provided through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters rendered by an unauthenticated user;

    based on activating the secure access application on the personal mobile device to receive signature input, receiving, through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters, signature input rendered by the unauthenticated user using the personal mobile device;

    based on receiving the signature input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database, signature data corresponding to at least one of the defined one or more signatures;

    comparing the accessed signature data with the signature input rendered by the unauthenticated user using the personal mobile device;

    based on comparison results, determining whether the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures;

    authenticating the unauthenticated user as the authorized user of the security system based on a determination that the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures; and

    in response to the authentication of the unauthenticated user as the authorized user of the security system, enabling control of the security system based on one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×