Authentication and control interface of a security system
First Claim
1. A method for controlling a security system comprising:
- authorizing a user of the security system;
accessing user identification input rendered by the authorized user of the security system using a personal mobile device, the accessed user identification input being input provided through an input unit of the personal mobile device other than a keypad that enables entry of alphanumeric characters;
defining, based on the accessed user identification input, one or more signatures of the authorized user of the security system;
storing, in a signature database, the defined one or more signatures;
receiving input defining an activation cue rendered by the authorized user of the security system, wherein the activation cue activates a secure access application on the personal mobile device that enables control of the security system, the activation cue comprising;
a sound inputted through a microphone of the personal mobile device, wherein the sound is the sound of a car engine turning off or the sound of a car door closing, andat least one of;
a determination of whether a distance of the personal mobile device from the security system is within a predetermined value, wherein the determination comprises;
monitoring the distance of the personal mobile device from the security system; and
comparing the monitored distance of the personal mobile device from the security system with the predetermined value;
ora determination of whether a current time is within a defined time interval in a time schedule, wherein the time schedule includes one or more time intervals for a predetermined period of time;
recording, in electronic storage, the activation cue rendered by the authorized user of the security system, the activation cue activating the secure access application that evaluates whether input of one of the defined one or more signatures has been received;
subsequent to recording, in electronic storage, the activation cue rendered by the authorized user of the security system, detecting the activation cue using the personal mobile device;
in response to detecting the activation cue using the personal mobile device, activating the secure access application on the personal mobile device to receive signature input provided through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters rendered by an unauthenticated user;
based on activating the secure access application on the personal mobile device to receive signature input, receiving, through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters, signature input rendered by the unauthenticated user using the personal mobile device;
based on receiving the signature input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database, signature data corresponding to at least one of the defined one or more signatures;
comparing the accessed signature data with the signature input rendered by the unauthenticated user using the personal mobile device;
based on comparison results, determining whether the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures;
authenticating the unauthenticated user as the authorized user of the security system based on a determination that the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures; and
in response to the authentication of the unauthenticated user as the authorized user of the security system, enabling control of the security system based on one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system.
4 Assignments
0 Petitions
Accused Products
Abstract
Techniques are described for providing control of a security system. A user is authorized in the security system and user identification inputs, provided through an input unit of a personal mobile device of the authorized user of the security system, are accessed. One or more signatures of the authorized user are defined and stored in a signature map. Subsequently, user identification input is received from an unauthenticated user using the personal mobile device. The user identification input received from the unauthenticated user is compared to one or more defined signatures in the signature map. The unauthenticated user is determined to be the authorized user if the received user identification input matches one of the defined signatures. The unauthenticated user is allowed to control the security system based on the determination that the unauthenticated user is the authorized user.
26 Citations
17 Claims
-
1. A method for controlling a security system comprising:
-
authorizing a user of the security system; accessing user identification input rendered by the authorized user of the security system using a personal mobile device, the accessed user identification input being input provided through an input unit of the personal mobile device other than a keypad that enables entry of alphanumeric characters; defining, based on the accessed user identification input, one or more signatures of the authorized user of the security system; storing, in a signature database, the defined one or more signatures; receiving input defining an activation cue rendered by the authorized user of the security system, wherein the activation cue activates a secure access application on the personal mobile device that enables control of the security system, the activation cue comprising; a sound inputted through a microphone of the personal mobile device, wherein the sound is the sound of a car engine turning off or the sound of a car door closing, and at least one of; a determination of whether a distance of the personal mobile device from the security system is within a predetermined value, wherein the determination comprises; monitoring the distance of the personal mobile device from the security system; and comparing the monitored distance of the personal mobile device from the security system with the predetermined value; or a determination of whether a current time is within a defined time interval in a time schedule, wherein the time schedule includes one or more time intervals for a predetermined period of time; recording, in electronic storage, the activation cue rendered by the authorized user of the security system, the activation cue activating the secure access application that evaluates whether input of one of the defined one or more signatures has been received; subsequent to recording, in electronic storage, the activation cue rendered by the authorized user of the security system, detecting the activation cue using the personal mobile device; in response to detecting the activation cue using the personal mobile device, activating the secure access application on the personal mobile device to receive signature input provided through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters rendered by an unauthenticated user; based on activating the secure access application on the personal mobile device to receive signature input, receiving, through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters, signature input rendered by the unauthenticated user using the personal mobile device; based on receiving the signature input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database, signature data corresponding to at least one of the defined one or more signatures; comparing the accessed signature data with the signature input rendered by the unauthenticated user using the personal mobile device; based on comparison results, determining whether the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures; authenticating the unauthenticated user as the authorized user of the security system based on a determination that the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures; and in response to the authentication of the unauthenticated user as the authorized user of the security system, enabling control of the security system based on one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An electronic system comprising:
-
at least one processor; and at least one computer-readable medium coupled to the at least one processor having stored thereon instructions which, when executed by the at least one processor, causes the at least one processor to perform operations comprising; authorizing a user of a security system; accessing user identification input rendered by the authorized user of the security system using a personal mobile device, the accessed user identification input being input provided through an input unit of the personal mobile device other than a keypad that enables entry of alphanumeric characters; defining, based on the accessed user identification input, one or more signatures of the authorized user of the security system; storing, in a signature database, the defined one or more signatures; receiving input defining an activation cue rendered by the authorized user of the security system, wherein the activation cue activates a secure access application on the personal mobile device that enables control of the security system, the activation cue comprising; a sound inputted through a microphone of the personal mobile device, wherein the sound is the sound of a car engine turning off or the sound of a car door closing, and at least one of; a determination of whether a distance of the personal mobile device from the security system is within a predetermined value, wherein the determination comprises; monitoring the distance of the personal mobile device from the security system; and comparing the monitored distance of the personal mobile device from the security system with the predetermined value; or a determination of whether a current time is within a defined time interval in a time schedule, wherein the time schedule includes one or more time intervals for a predetermined period of time; recording, in electronic storage, the activation cue rendered by the authorized user of the security system, the activation cue activating the secure access application that evaluates whether input of one of the defined one or more signatures has been received; subsequent to recording, in electronic storage, the activation cue rendered by the authorized user of the security system, detecting the activation cue using the personal mobile device; in response to detecting the activation cue using the personal mobile device, activating the secure access application on the personal mobile device to receive signature input provided through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters rendered by an unauthenticated user; based on activating the secure access application on the personal mobile device to receive signature input, receiving, through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters, signature input rendered by the unauthenticated user using the personal mobile device; based on receiving the signature input rendered by the unauthenticated user using the personal mobile device, accessing, from the signature database, signature data corresponding to at least one of the defined one or more signatures; comparing the accessed signature data with the signature input rendered by the unauthenticated user using the personal mobile device; based on comparison results, determining whether the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures; authenticating the unauthenticated user as the authorized user of the security system based on a determination that the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures; and in response to the authentication of the unauthenticated user as the authorized user of the security system, enabling control of the security system based on one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system.
-
-
17. A control system comprising:
-
a security system operable to authorize a user to control the security system; a secure access application in a personal mobile device operable to access user identification input rendered by the authorized user of the security system, the accessed user identification input being input provided through an input unit of the personal mobile device other than a keypad that enables entry of alphanumeric characters, wherein the secure access application in the personal mobile device is operable; to define, based on the accessed user identification input, one or more signatures of the authorized user of the security system; to store, in a signature database, the defined one or more signatures; to receive input defining an activation cue rendered by the authorized user of the security system, wherein the activation cue activates the secure access application on the personal mobile device that enables control of the security system, the activation cue comprising at least two of; a sound inputted through a microphone of the personal mobile device, wherein the sound is the sound of a car engine turning off or the sound of a car door closing, and at least one of; a determination of whether a distance of the personal mobile device from the security system is within a predetermined value, wherein the determination comprises; monitoring the distance of the personal mobile device from the security system; and comparing the monitored distance of the personal mobile device from the security system with the predetermined value; or a determination of whether a current time is within a defined time interval in a time schedule, wherein the time schedule includes one or more time intervals for a predetermined period of time; to record, in electronic storage, the activation cue rendered by the authorized user of the security system, the activation cue activating the secure access application that evaluates whether input of one of the defined one or more signatures has been received; to detect the activation cue using the personal mobile device; to activate the secure access application on the personal mobile device to receive signature input provided through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters rendered by an unauthenticated user; to receive, through the input unit of the personal mobile device other than the keypad that enables entry of alphanumeric characters, signature input rendered by the unauthenticated user using the personal mobile device; to access, from the signature database, signature data corresponding to at least one of the defined one or more signatures; to compare the accessed signature data with the signature input rendered by the unauthenticated user using the personal mobile device; to determine whether the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures; to authenticate the unauthenticated user as the authorized user of the security system based on a determination that the signature input rendered by the unauthenticated user using the personal mobile device matches one of the defined one or more signatures; and to enable control of the security system based on one or more commands inputted to the personal mobile device at a location that is remote from a property monitored by the security system.
-
Specification