US 12,439,007 B2
Point-to-point visual communications in a security monitoring system
Lang Lin, Potomac, MD (US)
Assigned to Alarm.com Incorporated, Tysons, VA (US)
Filed by Alarm.com Incorporated, Tysons, VA (US)
Filed on Dec. 20, 2022, as Appl. No. 18/085,032.
Application 18/085,032 is a continuation of application No. 17/478,076, filed on Sep. 17, 2021, granted, now 11,539,922.
Application 17/478,076 is a continuation of application No. 16/852,000, filed on Apr. 17, 2020, granted, now 11,134,228, issued on Sep. 28, 2021.
Application 16/852,000 is a continuation of application No. 16/131,268, filed on Sep. 14, 2018, granted, now 10,638,096, issued on Apr. 28, 2020.
Claims priority of provisional application 62/558,386, filed on Sep. 14, 2017.
Prior Publication US 2023/0119879 A1, Apr. 20, 2023
Int. Cl. H04N 7/18 (2006.01); G07C 9/32 (2020.01); G08B 13/196 (2006.01); G08B 21/22 (2006.01)
CPC H04N 7/186 (2013.01) [G07C 9/32 (2020.01); G08B 13/19656 (2013.01); G08B 21/22 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
determining, for a request to access a property, a value for an adjustable setting: i) for a monitoring system for the property and ii) that is not specific to the request to access the property, the adjustable setting configurable to have one of a plurality of different values that include the value;
after determining the value for the adjustable setting, selecting, from a plurality of different authentication protocol levels and using the value of the adjustable setting for the monitoring system, an authentication protocol level that indicates one or more criteria for an access code to satisfy to be authenticated;
receiving, from a device associated with the request to access the property, an access code that comprises different data from the value of the adjustable setting for the monitoring system for the property;
determining, using the access code received from the device and the authentication protocol level selected using the value of the adjustable setting for the monitoring system that comprises different data from the access code, whether the access code satisfies the authentication protocol level including the one or more criteria and is authenticated; and
using a result of the determination whether the access code satisfies the authentication protocol level including the one or more criteria and is authenticated, causing performance of a monitoring system action.