Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND APPARATUS FOR AUTHENTICATION IN A SECURITY SYSTEM
Document Type and Number:
WIPO Patent Application WO/2024/068031
Kind Code:
A1
Abstract:
A video doorbell device (300) is presented. The video doorbell (300) comprises an image sensing circuit (310) capable of capturing one or more video images, a near field communication, NFC, circuit (320), and a processor circuit (330) operatively connected to the image sensing circuit (310) and the NFC circuit (320). The processor circuit (330) is configured to control the image sensing circuit (310) based on a first token obtained from the NFC circuit (320), and/or to control the NFC circuit (320) based on one or more video images obtained from the image sensing circuit (310).

Application Number:
PCT/EP2022/087725
Publication Date:
April 04, 2024
Filing Date:
December 23, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
VERISURE SARL (CH)
International Classes:
G08B13/196; G08B25/10; H04L9/40
Foreign References:
US20220292902A12022-09-15
US20200349786A12020-11-05
Attorney, Agent or Firm:
DENNEMEYER & ASSOCIATES SA (DE)
Download PDF:
Claims:
CLAIMS A video doorbell device (300) comprising: an image sensing circuit (310) capable of capturing one or more video images (30), a near field communication, NFC, circuit (320), and a processor circuit (330) operatively connected to the image sensing circuit (310) and the NFC circuit (320); wherein, the processor circuit (330) is configured to control the image sensing circuit (310) based on a first token (21) obtained from the NFC circuit (320), and/or to control the NFC circuit (320) based on one or more video images (30) obtained from the image sensing circuit (310). The video doorbell device (300) of claim 1, wherein the processor circuit (330) is configured to activate the image sensing circuit (310) responsive to a first token (21) being obtained from the NFC circuit (320). The video doorbell device (300) of claim 1, wherein the processor circuit (330) is configured to activate the NFC circuit (320) responsive to the one or more video images (30) being obtained from the image sensing circuit (310). The video doorbell device (300) of any one of the preceding claims, wherein the processor circuit (330) is further configured to cause identification of a second token (22) in the one or more video images (30) obtained from the image sensing circuit (310), the second token (22) being one of a barcode, a QR code or a biometric token. The video doorbell device (300) of any one of the preceding claims, further comprising a transceiver circuit (340) configured to relay operational control data of the video doorbell device (300). The video doorbell device (300) of claim 5, wherein the video doorbell device (300) is configured to be operatively connected to an electronically controllable lock (400), and the operational control data comprise control data configured to lock and/or unlock the electronically controllable lock (400). The video doorbell device (300) of claim 5 or 6, wherein the video doorbell device (300) is configured to be operatively connected to a security monitoring system (1), and the operational control data comprise control data configured to arm and/or disarm the security monitoring system (1). A video doorbell system (1000) comprising: an image sensing circuit (310, 1010) capable of capturing one or more video images (30), an input circuit (1020), and a processor circuit (1030) operatively connected to the image sensing circuit (310, 1010) and the input circuit (1020); wherein, the processor circuit (1030) is configured to cause a multi-factor authentication of a user based on one or more video images (30) obtained from the image sensing circuit (310, 1010) and a first token (21) obtained from the input circuit (1020). The video doorbell system (1000) of claim 8, wherein the input circuit (1020) comprises an NFC circuit (1021, 320) and the first token (21) comprises an NFC token. The video doorbell system (1000) of claim 8 or 9, wherein the input circuit (1020) comprises an audio sensing circuit (1022) and the first token (21) comprises an audio token.

11. The video doorbell system (1000) of any one of claims 8 to 10, wherein the input circuit (1020) comprises a keyed interface (1023) and the first token (21) comprises a password token.

12. The video doorbell system (1000) of any one of claims 8 to 11, wherein the input circuit (1020) comprises a biometric reader (1025) and the first token (21) comprises a biometric token, preferably, the biometric reader (1025) comprises a fingerprint reader and the biometric token comprises a fingerprint token.

13. The video doorbell system (1000) of any one of claims 8 to 12, wherein the image sensing circuit (310) is comprised in a video doorbell device (300) further comprising the input circuit (1020) and the processor circuit (1030).

14. The video doorbell system (1000) of any one of claims 8 to 13, further comprising a transceiver circuit (1024) configured to relay operational control data of the video doorbell system (1000).

15. The video doorbell system (1000) of claim 14, wherein the video doorbell system (1000) is configured to be operatively connected to an electronically controllable lock (400), and the operational control data comprise control data configured to lock and/or unlock the electronically controllable lock (400).

16. The video doorbell system (1000) of claim 14 or 15, wherein the video doorbell system (1000) is configured to be operatively connected to a security monitoring system (1), and the operational control data comprise control data configured to arm and/or disarm the security monitoring system (1).

17. A security monitoring system (1) comprising an alarm gateway (10) operatively connected to the video doorbell device (300) of claim 7 and configured to cause control of a state of the security monitoring system (1) based on operational control data (11) of the video doorbell device (300). A security monitoring system (1) comprising an alarm gateway (10) operatively connected to the video doorbell system (1000) of claim 16 and configured to cause control of a state of the security monitoring system (1) based on operational control data (11) of the video doorbell system (1000). The security monitoring system (1) of claim 17 or 18, further comprising an electronically controllable lock (400) operatively connected to the alarm gateway (10), wherein the alarm gateway (10) is further configured to cause control of a locking state of the electronically controllable lock (400) between a locked state and an unlocked state based on the operational control data (11). The security monitoring system (1) of any one of claims 17 to 19, wherein the alarm gateway (10) is further configured to cause control of an arm state of the security monitoring system (1) between an armed state and an unarmed state based on the operational control data (11). A method (1100) of authenticating a user of a security monitoring system (1), the security monitoring system (1) being operatively connected to a first input circuit (1020) and a second input circuit (1020), the method (1100) comprising: obtaining (1110), by means of the first input circuit (1020), a first token (21) associated with the user; obtaining (1120), by means of the second input circuit (1020), a second token (22) associated with the user, wherein the second token (22) is different from the first token (21); and authenticating (1130) the user based on the first token (21) and the second input circuit (1020). The method (1100) of claim 21, further comprising: changing (1143) a lock state of an electronically controllable lock (400), operatively connected to the security monitoring system (1), between a locked state and an unlocked state based on the authenticating (1130) of the user.

23. The method (1100) of claim 21 or 22, wherein the method (1100) further comprises: changing (1145) an arm state of the security monitoring system (1) between an unarmed state and an armed state based on the authenticating (1130) of the user.

24. The method (1100) of any one of claims 21 to 23, wherein the first token (21) is one of one or more video images, an NFC token, a password, a biometric token or an audio sample associated with the user, and the second token (22) is a different one of the video image, the NFC token, the password, the biometric token or the audio sample associated with the user.

25. The method (1100) of any one of claims 21 to 24, wherein the second input circuit (1020) is comprised in a mobile device (5) operatively connected to the security monitoring system (1).

26. The method (1100) of any one of claims 21 to 25, wherein the second input circuit is a stationary device operatively connected to an access device of the security monitoring system (1).

27. The method (1100) of any one of claims 21 to 26, wherein the first input circuit (1020) is comprised in an access device (300) of the security monitoring system (1).

28. The method (1100) of any one of claims 21 to 24, wherein the first input circuit (1020) and the second input circuit (1020) are comprised in an access device (300) of the security monitoring system (1). The method (1100) of any one of claims 21 to 28, wherein the first input circuit (1020) is an image sensing circuit (310, 1010) capable of capturing one or more video images (30), and the method (1100) further comprises: identifying (1125) the first token (21) from one or more video images (30) obtained from the image sensing circuit (310). The method (1100) of any one of claims 21 to 29, wherein the second input circuit (1020) is an NFC circuit (320) and the second indicator is an NFC token. A method (1200) of authenticating a user of a security monitoring system (1), the method (1200) comprising: obtaining (1210) one or more video images (30) of the user, obtaining (1220) a first token (21) associated with the user, and authenticating (1230) the user based on the one or more video images (30) and the first token (21). A computer program (1400, 1600) configured to cause execution of the method (1100, 1200) according to any of claims 21 to 31 when the computer program (1400, 1600) is run by a processor circuit (330, 1030).

Description:
METHOD AND APPARATUS FOR AUTHENTICATION IN A SECURITY SYSTEM

TECHNICAL FIELD

The present invention relates to security installations and devices thereof to secure at least part of a perimeter of premises and to monitor premises, and further to methods performed by the system and/or by controllers of the system.

BACKGROUND

Security installations that are or include security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events. Commonly such systems include sensors to detect the opening and closing of doors and windows to provide a secure perimeter to the premises, creating one or more protected interior spaces, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones. Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected. Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response. The central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit. Similarly, for ease of installation and to improve security, the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered. In addition, these monitoring systems shall not activate any alarms when the person or people performing some action are authorised to do so, and the systems shall allow the person or people to actually perform such action or actions. As an alternative to self-contained systems, a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a remote Central Monitoring Station (CMS) where, typically, human operators the responses required by different alarm and notification types. In such centrally monitored systems, the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events. In such a configuration, the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station. Again, in such installations the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.

Such security monitoring systems contribute to the safety and wellbeing of occupants of the protected premises not only by safeguarding articles within the protected perimeter -which may of course not simply be limited to a house or dwelling, but may also extend to the grounds of the house, protected by a boundary fence and gate, for example -, but also by allowing or not allowing certain actions depending on the person or people taking them.

The present disclosure seeks to provide enhanced security access devices, security and monitoring systems, methods and other implementations that improve the scope of security access devices and systems to address aspects of the problem of authenticating a person trying to have access to certain functions or tasks that are behind a security system.

SUMMARY

The present disclosure seeks to provide enhanced security access devices, security and monitoring systems, methods and other implementations that improve the scope of security access devices and systems to address aspects of the problem of authenticating a person trying to have access to certain functions or tasks that are behind a security system. More specifically, an object of the invention is to provide methods, systems and devices that increases the security of security monitoring system without a significant compromise in the convenience when interacting with the security monitoring system. These objects are addressed by the techniques set forth in the appended independent claims with preferred embodiments defined in the dependent claims related thereto.

In a first aspect, a video doorbell device is presented. The video doorbell device comprises an image sensing circuit capable of capturing one or more video images, a near field communication (NFC) circuit, and a processor circuit operatively connected to the image sensing circuit and the NFC circuit. The processor circuit is configured (e.g. programmed) to control the image sensing circuit based on a first token obtained from the NFC circuit, and/or to control the NFC circuit based on one or more video images obtained from the image sensing circuit.

In one variant, the processor circuit is configured (e.g. programmed) to activate the image sensing circuit responsive to a first token being obtained from the NFC circuit. This is beneficial as it will allow the image sensing circuit to be at a low power mode or powered down for extended periods of time saving power and enabling a battery operated device.

In one variant, the processor circuit is configured (e.g. programmed) to activate the NFC circuit responsive to the one or more video images being obtained from the image sensing circuit. This is beneficial as the NFC circuit may be at a low power mode or powered down for extended periods of time saving power and reducing a risk that e.g. a brute force approach of token presentation is attempted.

In one variant, the processor circuit is further configured (e.g. programmed) to cause identification of a second token in the one or more video images obtained from the image sensing circuit, the second token being one of a barcode, a QR code or a biometric token.

In one variant, the video doorbell device further comprises a transceiver circuit configured to relay operational control data of the video doorbell device. This is beneficial as it enables the video doorbell device to be interconnected with other devices or services and to be configurable (e.g. programmed) to control, or be controlled by, by the other devices or services.

In one variant, the video doorbell device is configured (e.g. programmed) to be operatively connected to an electronically controllable lock. This is beneficial as the states of the electronically controllable lock may be utilized to control modes of operation of the video doorbell device.

In one variant, the operational control data comprise control data configured to lock and/or unlock the electronically controllable lock. This is beneficial as e.g. facial recognition in combination with a valid NFC tag provides a simple two-factor authentication allowing secure and reliable control of the electronically controllable lock. Just having the electronically controllable lock lockable by the video doorbell device greatly increases convenience and usability of the electronically controllable lock and the video doorbell device.

In one variant, the video doorbell device is configured (e.g. programmed) to be operatively connected to a security monitoring system. This is beneficial as e.g. states of the security monitoring system may be utilized to control modes of operation of the video doorbell device. That is to say, if the security monitoring system is armed, the video doorbell may be configured (e.g. programmed) to operate in a two-factor authentication (NFC and e.g. facial recognition), and in if the security monitoring system is unarmed, a simple one-factor authentication may be employed (one of NFC or facial recognition).

In one variant, the operational control data comprise control data configured to arm and/or disarm the security monitoring system. This is beneficial as e.g. facial recognition in combination with a valid NFC tag provides a simple two-factor authentication allowing secure and reliable control of the security monitoring system. Just having the security monitoring system armable by the video doorbell device greatly increases convenience and usability of the security monitoring system and the video doorbell device.

In a second aspect, a video doorbell system is presented. The video doorbell system comprises an image sensing circuit capable of capturing one or more video images, an input circuit, and a processor circuit operatively connected to the image sensing circuit and the input circuit. The processor circuit is configurable (e.g. programmed) to achieve a multi-factor authentication of a user based on one or more video images obtained from the image sensing circuit and a first token obtained from the input circuit. In one variant, the input circuit comprises an NFC circuit and the first token comprises an NFC token.

In one variant, the input circuit comprises an audio sensing circuit and the first token comprises an audio token. This is beneficial as it allows voice recognition to be utilized.

In one variant, the input circuit comprises a keyed interface and the first token comprises a password token.

In one variant, the input circuit comprises a biometric reader and the first token comprises a biometric token, preferably, the biometric reader comprises a fingerprint reader and the biometric token comprises a fingerprint token.

In one variant, the image sensing circuit is comprised in a video doorbell device further comprising the input circuit and the processor circuit.

In one variant, the video doorbell system further comprises a transceiver circuit configured (e.g. programmed and arranged) to relay operational control data of the video doorbell system.

In one variant, the video doorbell system is configured (e.g. programmed) to be operatively connected to an electronically controllable lock. This is beneficial as the states of the electronically controllable lock may be utilized to control modes of operation of the video doorbell system.

In one variant, the operational control data comprise control data configured to lock and/or unlock the electronically controllable lock. This is beneficial as a simple two-factor authentication may be provided by the video doorbell system allowing secure and reliable control of the electronically controllable lock. Just having the electronically controllable lock lockable by the video doorbell system greatly increases convenience and usability of the electronically controllable lock and the video doorbell system.

In one variant, the video doorbell system is configured (e.g. programmed and arranged) to be operatively connected to a security monitoring system. This is beneficial as e.g. states of the security monitoring system may be utilized to control modes of operation of the video doorbell system. That is to say, if the security monitoring system is armed, the video doorbell system may be configured (e.g. programmed) to operate in a two-factor authentication (first and second token), and in if the security monitoring system is unarmed, a simple one-factor authentication may be employed (first token or second token).

In one variant, the operational control data comprise control data configured to arm and/or disarm the security monitoring system. This is beneficial as the two-factor authentication provide by the video doorbell system allows secure and reliable control of the security monitoring system. Just having the security monitoring system armable by the video doorbell system greatly increases convenience and usability of the security monitoring system and the video doorbell system.

In a third aspect, a security monitoring system is presented. The security monitoring system comprises an alarm gateway operatively connected to the video doorbell device of the first aspect.

In one variant, the alarm gateway is configured (e.g. programmed) to cause control of a state of the security monitoring system based on operational control data of the video doorbell device.

In a fourth aspect, a security monitoring system is presented. The security monitoring system comprises an alarm gateway operatively connected to the video doorbell system of the second aspect.

In one variant, the alarm gateway is configured (e.g. programmed) to cause control a state of the security monitoring system based on operational control data of the video doorbell system.

In one variant of the third or fourth aspect, the security monitoring system further comprises an electronically controllable lock operatively connected to the alarm gateway. The alarm gateway is further configured (e.g. programmed) to cause control of a locking state of the electronically controllable lock between a locked state and an unlocked state based on the operational control data.

In one variant of the third or fourth aspect, the alarm gateway is further configured (e.g. programmed) to cause control of an arm state of the security monitoring system between an armed state and an unarmed state based on the operational control data.

In a fifth aspect, a method of authenticating a user of a security monitoring system is presented. The security monitoring system is operatively connected to a first input circuit and a second input circuit. The method comprises obtaining, e.g. by means of the first input circuit, a first token associated with the user. The method further comprises obtaining, e.g. by means of the second input circuit, a second token associated with the user, wherein the second token is different from the first token, and authenticating the user based on the first token and the second input circuit.

In one variant, the method further comprises changing a lock state of an electronically controllable lock between a locked state and an unlocked state based on the authenticating of the user. The electronically controllable lock being operatively connected to the security monitoring system,

In one variant, the method further comprises changing an arm state of the security monitoring system between an unarmed state and an armed state based on the authenticating of the user.

In one variant, the first token is one of one or more video images, an NFC token, a password, a biometric token or an audio sample associated with the user, and the second token is a different one of the video image, the NFC token, the password, the biometric token or the audio sample associated with the user.

In one variant, the second input circuit is comprised in a mobile device (e.g. a wireless transmitting and receiving unit - WTRU - such as a smartphone or tablet device) operatively connected to the security monitoring system. This is beneficial as the mobile device may have additional security functions implemented in order for it so provide the second token.

In one variant, the second input circuit is a stationary device operatively connected to an access device of the security monitoring system. The stationary device may be e.g. a keypad device, a video doorbell device etc.

In one variant, the first input circuit is comprised in an access device of the security monitoring system.

In one variant, the first input circuit and the second input circuit are comprised in an access device of the security monitoring system.

In one variant, the first input circuit is an image sensing circuit capable of capturing one or more video images, and the method further comprises identifying the first token from one or more video images obtained from the image sensing circuit. In one variant, the second input circuit is an NFC circuit and the second indicator is an NFC token.

In a sixth aspect a method of authenticating a user of a security monitoring system is presented. The method comprises obtaining one or more video images of the user, obtaining a first token associated with the user, and authenticating the user based on the one or more video images and the first token.

In a seventh aspect, a computer program is presented. The computer program is configured to cause execution of the method according to the fifth aspect when the computer program is run by a processor circuit.

In an eighth aspect, a computer program is presented. The computer program is configured to cause execution of the method according to the sixth aspect when the computer program is run by a processor circuit.

In a ninth aspect, a video doorbell device is presented including an NFC circuit and a processor circuit operatively connected to the NFC circuit. The processor circuit is configured to control one or more operations of the video doorbell device based on a first token obtained from the NFC circuit.

Advantages of some of the aspects and variants described herein are that power consumption of devices and/or systems may be reduced. If the devices are battery powered, the need for servicing and changing batteries is reduced decreasing a cost of maintenance and increasing the convenience of the devices and the systems.

Advantages of some of the aspects and variants are that two-factor, or in fact any multi-factor, authentication may be readily implemented. This increases the reliability of devices and systems and especially when used for controlling a security monitoring system, electronically controllable locks etc.

Advantages of some of the aspects and variants are that convenience, accessibility and usability of devices and/or systems is increased.

Further benefits and advantages will be apparent to the person skilled in the art, and the above or the following benefits and advantages are not to be considered exhaustive in any way. BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the present disclosure will be described in the following; references being made to the appended diagrammatical drawings which illustrate nonlimiting examples of how the inventive concept can be reduced into practice.

Figure l is a view of a premises comprising a security monitoring system according to some embodiments of the present disclosure;

Figure 2 is a schematic view of a security monitoring system according to some embodiments of the present disclosure;

Figure 3 is a schematic view of a security monitoring system according to some embodiments of the present disclosure;

Figure 4 is a block diagram of a video doorbell according to some embodiments of the present disclosure;

Figure 5 is a simplified flow chart of obtaining of tokens according to some embodiments of the present disclosure;

Figure 6 is a block diagram of a video doorbell system according to some embodiments of the present disclosure;

Figure 7 is a block diagram of an input circuit according to some embodiments of the present disclosure;

Figure 8 is a simplified flow chart of obtaining and processing video images according to some embodiments of the present disclosure;

Figure 9 is a block diagram of a method of authenticating a user of a security monitoring system according to some embodiments of the present disclosure;

Figure 10 is a detailed view of a method step of changing a state of a security monitoring system according to some embodiments of the present disclosure;

Figure 11 is a block diagram of a method of authenticating a user of a security monitoring system according to some embodiments of the present disclosure;

Figure 12 is a schematic view of a computer program product according to some embodiments of the present disclosure; and

Figure 13 is a schematic view of a computer program product according to some embodiments of the present disclosure. DETAILED DESCRIPTION OF EMBODIMENTS

Hereinafter, certain embodiments will be described more fully with reference to the accompanying drawings. The invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided by way of example so that this disclosure will be thorough and complete, and will fully convey the scope of the invention, such as it is defined in the appended claims, to those skilled in the art.

The term “coupled” is defined as connected, although not necessarily directly, and not necessarily mechanically. Similarly, the term “connected”, or “operatively connected”, is defined as connected, although not necessarily directly, and not necessarily mechanically. Two or more items that are “coupled” or “connected” may be integral with each other. The terms “a” and “an” are defined as one or more unless this disclosure explicitly requires otherwise. The terms “substantially”, “approximately” and “about” are defined as largely, but not necessarily wholly what is specified, as understood by a person of ordinary skill in the art. The terms “comprise” (and any forms thereof), “have” (and any forms thereof), “include” (and any form thereof) and “contain” (and any forms thereof) are open-ended linking verbs. As a result, a method that “comprises”, “has”, “includes” or “contains” one or more steps, possesses those one or more steps, but is not limited to possessing only those one or more steps.

Figure 1 shows a view of the front of a premises 100 protected by a security monitoring system 1 (see Figure 3) according to an aspect of the present invention. The premises 100, here in the form of a house, have an exterior door 102, here front door 102. The door 102 gives access to a protected interior space. The security monitoring system 1 secures at least part of a perimeter to the premises 100, and the door 102 constitutes an exterior closure 102 in the secure perimeter giving access to a protected interior space 200 (see Figure 2) of the premises. An electronically controllable lock 400, or lock 400 for short, on the exterior door 102 is optionally electrically controlled so that it may be locked and unlocked remotely.

To the side of the door 102, on the facade of the house 100, is a first video camera 300 in the form of a video doorbell 300 which looks out from the facade of the premises so that anyone approaching the door 102 along the path 108 may be monitored, and in particular when visitor(s) stand at the door 102 their faces are preferably clearly captured by the video doorbell 300. The video doorbell 300 is sometimes referred to as a doorbell camera 300. The video doorbell 300 comprises an actuator, e.g. a push button, for a visitor to indicate their presence at the closure, i.e. at the door 102. The video doorbell 300 may further comprise an audio interface configured to enable bidirectional audio communication with a visitor at the closure 102.

As is conventional, the video doorbell 300 preferably includes an infrared light source to illuminate whatever is in front of the video doorbell 300. Optionally, as shown, the facade of the house 100 also carries an external keypad 500, keypad 500, keypad device 500, by means of which a user may disarm or arm the security monitoring system, and lock or unlock the lock 400. Also shown is an optional second exterior video camera 112 which is coupled to a presence and/or movement detector 114. The detector 114 may optionally be a thermal detector, for example a PIR sensor. The second exterior video camera 112 may, when the security monitoring system 1 is armed, be arranged to capture video of the front of the house 100 and optionally a private area, e.g. the garden, in front of the house 100 and signal an alarm event to a controller of the security monitoring system 1. As with the video doorbell 300, the second exterior video camera 112 is preferably provided with an audio interface configured to enable bidirectional audio communication with anyone observed by the second exterior video camera 112. Although a first video camera is illustrated in the form of a video doorbell 300, the first video camera may additionally or alternatively have the features described above for the second exterior video camera 112, whether or not plural video cameras are used. The house 100 is generally fitted with a plurality of windows 202 and optionally a read door 204 (see Figure 2).

Figure 2 is a schematic part plan view of a house (premises) 100 protected by the security monitoring system 1 according to an aspect of the present disclosure, together with other elements of the system, corresponding generally to the premises of Figure 1. The front door 102, with electrically controlled lock 400, leads into the protected interior space 200 of the premises. Each of the windows 202, and the rear door 204 is preferably fitted with a sensor 206 configured to detect when they are opened, closed and/or when they are subjected to vibrations due to e.g. malicious forces. Each of the sensors 206 includes a radio transceiver to report events to a controller, or central unit, alarm gateway, 10 of the security monitoring system 1. If one of the sensors 206 is triggered when the system 1 is armed, a signal is sent to the central unit 10 which in turn may signal an alarm event to a remote central monitoring station 3, sometimes referred to as remote monitoring centre 3, central monitoring station 3, (central) alarm receiving centre 3, or backend 3. The central unit 10 may be connected to the remote central monitoring station 3 via the Internet 212, either via a wired or a wireless connection. Also (preferably) wirelessly coupled to the central unit 10 are the video doorbell 300, the electrically controlled lock 400, and, if present, the second exterior video camera 112, its associated presence and/or movement detector 114 (although the latter may be integral with the second exterior video camera 112) and the audio interface. These items, and the sensors 206, are preferably coupled to the central unit 10 using at least one transceiver operating in the industrial scientific and medical (ISM) bandwidths, for example a sub-gigahertz bandwidth such as 868 MHz, and the communications are encrypted preferably using shared secret keys. Further frequency bands and/or communication techniques may be employed for e.g. specific functionality of the items and/or the sensors 206. Such specific functionality may be exemplified, but not limited by, video streaming, voice data, data transfer etc. The security monitoring system 1 may further comprise other sensors within the protected interior space 200, such as an interior video camera 214 and associated movement detector 216 (which again may be integral with the camera 214), and each of the interior doors 218 may also be provided with a sensor 206 to detect the when the door 102 opened, closed and/or subjected to vibrations due to e.g. malicious forces. Also shown in Figure 2 is a user device 5 (e.g. a WTRU such as a mobile phone), preferably configured with an appropriate app - as will be described later, and a public land mobile network (PLMN) by means of which the remote monitoring station 3, and the central unit 10, may communicate with the user device 5.

Operation of the security monitoring system may be controlled by one or more of: the controller 10, the remote monitoring station 3, and a security monitoring app installed on the user device 5. For example, the remote monitoring station 3, if provided, may receive one or more signals from any of the first camera and/or video doorbell 300, the second camera 112, the keypad 500, the sensors 206 and/or 520 (described in more detail later). The remote monitoring station 3 may transmit commands for controlling any one or more of: the arm state of the security monitoring system (e.g. armed or unarmed); commanding a tripped alarm state to be signalled by the security monitoring system (e.g. by triggering one or more sirens to generate alarm noise); commanding a lock state of the door lock 400 (e.g. locked or unlocked), commanding operation of one or more functions of the video doorbell 300, commanding operation of one or more cameras to transmit images to the remote monitoring unit. Communication with the remote monitoring station 3 may pass through the controller 10, as described above. In some embodiments without the remote monitoring station 3, or when communication with the remote monitoring station 3 be interrupted, operation of the security monitoring system 1 may be controlled by the controller 10. In some embodiments, the controller 10 may be omitted, and the individual peripheral devices may communicate directly with the remote monitoring station 3, and/or one or more of the individual peripheral devices may be configured (e.g. programmed) to perform the functionality of the controller 10.

The security monitoring system app is preferably installed on the user device 5, here shown as a smartphone, although of course it could be almost any kind of electronic device, such as a laptop or desktop computer, a tablet such as an iPad, a smart watch, or even a television. The security monitoring system app may, as previously indicated, be used to control the operation of the security monitoring system 1, configure the security monitoring system 1 etc.

As mentioned, the security monitoring system 1 may further comprising an audio interface to enable audio communication with a visitor at the closure. In such embodiment, the controller 10 may be configured (e.g. programmed) to enable the remote monitoring centre 3 to use the audio interface to speak to the visitor.

In some embodiments, wherein the security monitoring system 1 comprises the first video camera 300, the controller 10 may be configured (e.g. programmed) to enable the remote monitoring centre 3 to use the first video camera 300 to observe the visitor. As mentioned, the first video camera 300 may be comprised in the video doorbell 300, which is convenient both in terms of the location of the first camera 300, and the co-location of the video and audio interfaces, along with the actuator, and in terms of the visual performance of the camera. This being the case at least partly because video doorbells are typically very well placed to capture images of people at the door 102. Conveniently, the video doorbell 300 may comprise the audio interface, as this is likely to be well located from the point of view of performance, and it may also reduce installation complexity and time.

Preferably, the security monitoring system 1 further comprises an interior video camera 216 arranged to observe the protected interior space 200 behind the closure (e.g. the door 102). In such embodiments, the controller 10 may be configured (e.g. programmed) to enable the remote monitoring centre 3 to use the interior video camera 216 to observe any visitor within the protected interior space 200.

Although use of a doorbell video camera 300 for the purpose of observing the visitor, and the doorbell audio interface as a means to speak with a visitor at the door 102 are preferred, it will be appreciated that the actuator (e.g. push button), the external video source, and the external audio interface may all be provided in free-standing components to implement embodiments of the invention. Thus, although it is preferred for the first video camera, if used, to be the video camera of a video doorbell 300, because of the generally ideal location of such a camera in terms of surveying the space in front of the front door 102, it is also possible to use a different video camera installation, such as the second exterior video camera 112, which also observes the space in front of the door 102. Unlike most video doorbells, which typically do not show a view of the exterior face of the front door itself, a video camera installation such as that shown schematically in Figures 1 and 2 as the second exterior video camera 112 may provide a view not only of the space in front of the front door 102, but also of the door 102 itself. As previously described, the second exterior video camera 112 may comprise, or may be associated with, presence and/or motion detector 114, such as a PIR or other thermal sensor, with the camera 112 typically only being turned on when the detector 114 detects movement and/or a presence within its field of view. It is further possible to make use of a different form of video camera installation, such as a surveillance camera installation. Typically, a surveillance camera installation does not require a movement/presence sensor, rather when the surveillance camera is activated it may continuously monitor the area under surveillance, typically streaming images continuously or every few seconds to a monitoring location. Such a surveillance camera may also operate under the control of a security monitoring system 1 according to an aspect of the invention, the controller 10 of the security monitoring system 1 transmitting a signal to cause the surveillance camera to capture images and transmit the captured images to the controller 10, and, optionally, to forward the captured images for checking remotely, e.g. at the remote monitoring station 3 or at a user device 5.

In the following, specific aspects providing increased security and usability in user identification for the security monitoring systems 1 will be presented. Figure 3 shows a schematic view of the security monitoring system 1 according to some embodiments of the present disclosure. As previously indicated, the security monitoring system 1 may be a security monitoring system 1 for a home or a business and configured to hamper activities of intruders and other villains. A security monitoring system 1 according to the present disclosure may, as previously indicated, comprise, or be operatively connected (preferably wirelessly) to, one or more peripheral devices. These peripheral devices may be any of the features presented with reference to Figure 1 and/or Figure 2. The security monitoring system 1 is preferably, as shown in Figure 3, configured as a star network centred about an alarm gateway 10. The alarm gateway 10 may be referred to as a central unit, or home central unit, gateway, alarm switch, alarm panel etc. The alarm gateway 10 is operatively connected to the peripheral devices. It should be mentioned already now, that the star architecture is but one example, and a security monitoring system 1 according to the present disclosure may be configured as a mesh network, a serial network or combinations of any of the exemplified architectures. The peripheral devices may comprise, but are not limited to, motion detectors (e.g. PIR- detectors, radar sensors, video sensing detectors etc.), contact detectors (e.g. detector switches for doors, windows etc.), sirens, light strobes, control devices (e.g. keypads etc.), monitoring devices etc. The security monitoring system 1 may further comprise one or more smart devices configured (e.g. programmed) to control the home or business where the security monitoring system 1 is configured to be installed. Such smart devices may comprise, but are not limited to, mains switches controllable by the alarm gateway 10, doorbells, monitoring video sensing and/or displays, configurable buttons, digital home assistants (e.g. Amazon Alexa, Google Home, Apple Siri etc.). The smart device(s) may additionally, or alternatively, be configured (e.g. programmed) to control the security monitoring system 1. The security monitoring system 1 may be stand-alone or may be operatively connected to the remote monitoring centre. The connection to the alarm receiving centre 3 may be wired via e.g. Ethernet, PSTN, ISDN etc. or wireless via a base station 4. The wireless connection may be any suitable mobile network (e.g. 2G, 3G, 4G, 5G etc.), LPWAN (LoRa, Sigfox etc.) or other suitable wireless technologies, or a combination of these. The security monitoring system 1 may be controllable by, or interacted with, a user of the security monitoring system 1 via one or more of the peripheral devices. In some embodiments, a user may interact with the security monitoring system 1 by means of a mobile phone 5 operatively connected to the alarm gateway 10. The mobile phone 5 may be operatively connected, via e.g. a base station 4, to the backend 3 and interact with the security monitoring system 1 via the backend 3. Additionally, or alternatively, the mobile phone 5 may connect to the security monitoring system 1, via the base station 4. In some embodiments, the mobile phone 5 may connect to the security monitoring system 1 using a short range wireless interface such as Bluetooth. The security monitoring system 1 may be configured (e.g. programmed and arranged) such that the mobile phone 5 may, using the short range wireless interface, connect directly to the alarm gateway 10 and/or to one or more peripheral devices which may, or may not, be configured (e.g. programmed and arranged) to relay the connection to other peripheral devise and/or the alarm gateway 10.

In the embodiment shown in Figure 3, the peripheral devices are exemplified as a video doorbell device 300, an electronically controllable lock 400, a keypad device 500, a biometric input device 600, a video sensing device 700 and smoke generator device 800. Generally, the video sensing device 700 may be any of the cameras 216, 112 presented with reference to Figure 1 and Figure 2. These peripheral devices are examples, and the skilled person will appreciate the security monitoring system 1 is not required to comprise any of these devices, it may comprise many other kinds of devices and/or it may comprise more than one of each of the types of peripheral devices. A video doorbell device 300 according to the present disclosure, schematically shown in Figure 4, preferably comprises an image sensing circuit 310. The image sensing circuit 310 is configurable to capture one or more video images 30 (see Figure 8). Throughout the present disclosure, a video image (captured video, video) is to mean a recording of an image or of moving images, that is to say, the video is not necessarily a collection of moving images, but may very well be a single still image or a collection of multiple still images. The image sensing circuit 310 may be any suitable image sensing circuit 310 such as, but not limited to, a camera circuit (a camera, e.g. including one or more lenses) configured to capture still images, a video camera circuit (a video camera, e.g. including one or more lenses) configured to capture still pictures and/or moving images. The details of such circuits 310 are well within the scope of knowledge of the skilled person and further generic details of the image sensing circuit 310 e.g. image sensor, filters, memory, processor etc. will not be further detailed.

The video doorbell 300 may, in some embodiments, comprise a near field communication, NFC, circuit 320. This is but one exemplary circuit of the video doorbell 300, and as will be explained elsewhere, other circuits may be comprised in the video doorbell 300 and/or operatively connected to the video doorbell 300 together with, or instead of the NFC circuit 320. Such circuits may be referenced to as input circuits 1020 (see Figure 7) and will be further explained elsewhere. However, in a preferred embodiment, the video doorbell 300 comprises the NFC circuit 320. The NFC circuit 320 may be any suitable NFC circuit 320 and is preferably configured for communication with a proximal device (not shown). Preferably the proximal device is with 10 cm from the NFC circuit 320, more preferably within 6 cm from the NFC circuit 320, and most preferably within 4 cm of the NFC circuit 320. The communication between the proximal device and the NFC circuit may be according to any NFC standard exemplified by, but not limited, ISO/IEC 14443, FeliCa etc. The NFC circuit 320 is configured as an NFC reader, but may, in some embodiments, be configured (additionally or alternatively) as an NFC tag, e.g. for pairing, installation, service, maintenance etc. As seen in Figure 5, the NFC circuit 320 may be configured to obtain a token 21, 22 from an NFC tag (NFC token) of a proximal device (tag). The obtained token 21, 22 is a token 21, 22 generally associated with a specific proximal device, but me be a token associated with a group of proximal devices. Generally, each NFC token is specific to a specific tag, and based on e.g. look-up tables, the specific tag may be associated with a specific user. The NFC circuit 320 may optionally comprise means to process the obtained token 21, 22.

Throughout the present disclosure, a first token 21 and a second token 22 will be presented. These tokens 21, 22 are, depending on embodiment, exemplified differently and it should be emphasized that this is for ease of explanation only. Generally, the first token 21 is the token 21, 22 obtained first, and the second token 22 is a token obtained (not necessarily directly) after the first token 21. However, in some embodiment, both tokens 21, 22 may be obtained at substantially the same time.

With continued reference to Figure 4, the video doorbell 300 further comprises a processor circuit 330. The processor circuit 330 is operatively connected to the image sensing circuit 310 and (if present) the NFC circuit 320. In some embodiments, the processor circuit 330 is configured (e.g. programmed and arranged) to control the image sensing circuit 310 based on a first token 21 obtained from the NFC circuit 320. Such control may comprise one or more of initiating (provide power to, configure to initiate etc.) the image sensing circuit 310, activating (record image(s)) the image sensing circuit 310, deactivating (stop recording image(s)) the image sensing circuit 310, power off (stop providing power to, configure to si eep/hib emate etc.) the image sensing circuit 310, etc. Additionally, or alternatively, the processor circuit 330 may be configured (e.g. programmed and arranged) to control the NFC circuit 320 based on one or more video images 30 obtained from the image sensing circuit 310. The video images 30 may, in some embodiments, be referenced to as the first token 21 and/or a second token 22. Such control may comprise one or more of initiating (provide power to, configure to initiate etc.) NFC circuit 320, activating (record image(s)) NFC circuit 320, deactivating (stop recording image(s)) NFC circuit 320, power off (stop providing power to, configure to si eep/hib ernate etc.) NFC circuit 320, etc. Configuring the processor circuit 330 to control one of the image sensing circuit 310 or the NFC circuit 320 based on data obtained from the other of the image sensing circuit 310 or the NFC circuit 320 is beneficial e.g. as it enables a reduction in power consumption as, for instance, only one of the mage sensing circuit 310 or the NFC circuit 320 has to be activated and prepared to obtain a token 21, 22. This is especially beneficial when using the NFC token 21, 22 to activate the image sensing circuit 310 as the latter generally consumes more power than the NFC circuit 320. Further, using the video image 30 (by e.g. identifying a token 21, 22 in the video image 30) to control the NFC circuit 320 is beneficial e.g. as it decreases the risk of a successful attempt to brute-force an acceptance from the NFC circuit 320 by presenting a large number of (auto-generated) NFC tokens (tags) to the NFC circuit 320.

The video doorbell 300 presented with reference to Figure 4 is one example of how to incorporate multiple input devices in order to address the scope of the present disclosure. The video doorbell 300 of Figure 4 is preferably a single integrated device. In Fig. 6, an exemplary schematic view of a video doorbell system 1000 is shown. The video doorbell system 1000 may be configured to operate as a video doorbell 300 but is not necessarily integrated. The video doorbell system 1000 comprises an image sensing circuit 1010 that may be configured with any of the features presented with reference to the image sensing circuit 310. The video doorbell system 1000 further comprises an input circuit 1020. The input circuit 1020 may be the NFC circuit 320 of Figure 4, but will be further detailed elsewhere, e.g. with reference to Figure 7. The video doorbell system 1000 further comprises a processor circuit 1030, the processor circuit 1030 may be, the processor 330 of Figure 4, and/or may be configured with the corresponding features as the processor circuit 330. The processor circuit 1030 of the video doorbell system 1000 is preferably operatively connected to the image sensing circuit 1010 and the input circuit 1020. The operative connection between the processor circuit 1030 and the image sensing circuit 1010 may be, but is not required to be, a corresponding operative connection to the operative connection between the processor circuit and the input circuit 1020. In some embodiments, both connections are wireless connections as exemplified by the connections introduced in reference to Figures 1-3. In some embodiments, one of the connections is a wired connection and the other connection is a wireless connection. The type of connection will generally depend on the configuration of the video doorbell system 1000, if one (or both) of the image sensing circuit 1010 or the input circuit 1020 are integrated in the same device as the processor circuit 1030, the operative connection between the processor circuit 1030 and the integrated image sensing circuit 1010 and/or input circuit 1020 is preferably wired. In should be mentioned that, also when the image sensing circuit 1010 or the input circuit 1020 are remote from the processor circuit 1030, wired connections are feasible. In some embodiments, the operative connection between the processor circuit and the image sensing circuit 1010 and/or input circuit 1020 is through a cloud service, i.e. through an internet connection.

The image sensing circuit 1010 may be activated based on the input circuit 1020, or the input circuit may be activated based on the image sensing circuit analogue to what was described with reference to the video doorbell 300.

Regardless of the connection between the processor circuit 1030 and the image sensing circuit 1010 and the input circuit 1020, or the order of activation (if any) of the image sensing circuit 1010 and the input circuit 1020, the processor circuit 1030 may be configured (e.g. programmed or be configurable) to achieve a multi-factor authentication of a user based on a first token obtained from the input circuit 1020 and one or more video images 30 obtained from the image sensing circuit 1010. The tokens 21, 22 may be obtained sequentially (in order) or simultaneously.

Preferably, the obtained video image(s) 30 is processed to identify a user in the video image 30. Such identification may be obtained through e.g. facial recognition, or as previously mentioned by identification of e.g. a QR-code or barcode in the video image(s) 30. The processing of the video images(s) 30 preferably provide the second token 22. The second token preferably associated, through e.g. a (local or remote) lookup table, with a specific user of the video doorbell system 1000, or a specific user of a system comprising or being operatively connected to the video doorbell system 1000. In some embodiments, the video image(s) may be obtained from the video sensing device 700 as detailed elsewhere. Accordingly, the video sensing device 700 of the present disclosure may be configured to perform any feature or action described with reference to the image sensing circuit 1010.

In Figure 7, a block diagram of an input circuit 1020 is shown. As previously mentioned, the input circuit 1020 may comprise an NFC circuit 1021, 320. In such embodiments, the first token 21 preferably comprises an NFC token obtained from the NFC circuit 1021, 320. It should be mentioned that the input circuit 1020 may comprise processing circuitry configured (e.g. programmed and arranged) to identify the first token in the form of e.g. a QR code and/or a barcode. The QR code, barcode or the NFC token are (if used) preferably associated, through e.g. a (local or remote) lookup table, with a specific user of the video doorbell system 1000, or a specific user of the system that comprises or that is operatively connected to the video doorbell system 1000.

Additionally, or alternatively, the input circuit 1020 may comprise an audio sensing circuit 1022. In such embodiments, the first token 21 preferably comprises an audio token obtained from the audio sensing circuit 1022. The audio token may be a parametrized data set obtained by analysing, filtering and/or processing audio data obtained from the audio sensing circuit 1022. The audio token is preferably (locally or remotely) associated with a specific user of the video doorbell system 1000, or a specific user of a system that comprises or that is operatively connected to the video doorbell system 1000. Such association may be based on e.g. voice (speaker) recognition which is known in the art.

Additionally, or alternatively, the input circuit 1020 may comprise a keyed interface 1023. In such embodiments, the first token 21 preferably comprises a password token. The password token may be any length of any type of characters (e.g. digits, letters, special characters etc.) forming a password. In some embodiments, the keyed interface 102 is a numeric keypad comprising the digits 0 to 9 and the password token is a pin of any length. In some embodiments, the keypad interface 102 comprises fewer keys than the number of characters selectable by the keypad interface wherein some characters are selected by pressing each key more than once (repeatedly). The password token is preferably associated, through e.g. a (local or remote) lookup table, with a specific user of the video doorbell system 1000, or a specific user of a system comprising or being operatively connected to the video doorbell system 1000. In some embodiments, the keypad interface is provide by the keypad device 500 as presented elsewhere. Accordingly, the keypad device 500 of the present disclosure may be configured to perform any feature or action described with reference to the keyed interface 1023.

Additionally, or alternatively, the input circuit 1020 may comprise a biometric reader 1025. In such embodiments, the first token 21 preferably comprises a biometric token. In some embodiments, the biometric reader 1025 comprises a fingerprint reader and the biometric token comprises a fingerprint token. In some embodiments, the biometric reader 1025 comprises a retina scanner and the biometric token comprises a retina token. In some embodiments, the biometric reader 1025 may be implemented as a processing function configured (e.g. programmed and arranged) to identify biometric markers (e.g. facial recognition) in the video image 30. The biometric token may be any suitable representation of data describing biometric features of a user obtained by the biometric reader 1025. The biometric token is preferably associated, through e.g. a (local or remote) lookup table or identification process, with a specific user of the video doorbell system 1000, or a specific user of the system that comprises or that is operatively connected to the video doorbell system 1000. In some embodiments, the biometric reader is provided by the biometric input device 600 as presented elsewhere. Accordingly the biometric input device 600 of the present disclosure may be configured to perform any feature or action described with reference to the biometric reader 1025.

As previously indicated, the image sensing circuit 1010 of the video doorbell system 1000 may be the image sensing system 310 of the doorbell device 300. In fact, the also the input circuit 1020 and the processor circuit 1030 may be comprised in the video doorbell 300. If the input circuit 1020 is in the form of the NFC circuit 1021 and specifically the NFC circuit 320 of the video doorbell 300, the video doorbell system 1000 may be equated to the video doorbell 300.

The processor circuit 1030 may be configured (e.g. programmed and arranged) to determine if the specific person associated with the first token 21 is the same person as the specific person associated with the second token 22. In some embodiments, the processor circuit 1030 relays one or more of the obtained tokens 21, 22 to a remote service, and the remote service may be configured to determine (e.g. validate) if the specific person associated with the first token 21 is the same as the specific person associated with the second token 22.

In some embodiments, the video doorbell system 1000 further comprises a transceiver circuit 1024. The transceiver circuit may be configured (e.g. programmed), or be configurable, to relay operational control data the video doorbell system 1000. To exemplify, but not limit, the operational data may be relayed to e.g. the central monitoring station 3, the alarm gateway 10 and/or one or more peripheral devices.

In some embodiments, the video doorbell system 1000 may be configured, e.g. programmed or configurable, to be operatively connected to the previously presented electronically controllable lock 400. The operational control data may comprise control data configured to lock and/or unlock the electronically controllable lock 400. The video doorbell system 1000 may, for instance, be configured to relay to the lock 400 (e.g. directly, or via the alarm gateway 10 etc.) operational data configured to unlock the electronically controllable lock 400 in response to the processor circuit 1030 determining (or causing other circuits or devices to determine) that the specific person associated with the first token 21 is the same as the specific person associated with the second token 22.

Additionally, and/or alternatively, the video doorbell system 100 may be configured, e.g. programmed or configurable, to be operatively connected to the security monitoring system 1. It may in some embodiments be comprised in the security monitoring system 1. The operational control data may comprise control data configured to arm and/or disarm the security monitoring system 1. The video doorbell system 1000 may, for instance, be configured (e.g. programmed and arranged) to relay to the security monitoring system (e.g. directly, or via the alarm gateway 10 etc.) operational data configured to disarm the security monitoring system 1 in response to the processor circuit 1030 determining (or causing other circuits or devices to determine) that the specific person associated with the first token 21 is the same as the specific person associated with the second token 22.

In Fig. 8, a simplified flow chart of obtaining and processing a video image 30 is shown. The video image 30 may be processed, e.g. by the processor circuit 330, 1030 as presented herein or any other suitable device presented herein, to identify the first token 21 and/or the second token 22 in the video image 30. That is to say, without limitation of the scope of the present disclosure, the second token 22 (or the first token for that matter) may be a barcode or a QR code and this may be identifiable in the video image 30. In some embodiments, the second token 22 (or the first token for that matter) may be a biometric token such as facial recognition data etc. In some embodiments, both the first and second token 21, 22 may be obtained from the video image 30. Such an example may be video image 30 showing a face of a person presenting a barcode or a QR code. That is to say, in embodiments of the present disclosure, both the first token 21 and the second token 22 may be obtained from the same source. It may further be that the video image 30 is showing the faces of two persons, wherein each face may correspond to one token 21, 22. To exemplify, this may be utilized in situations where specific users only are admitted if accompanied by another specific user. For instance, an older brother is only allowed home (to the comfort of TV and snacks) if accompanied by his younger sister, this to ensure that he does not forget to pick her up on his way home.

As mentioned, the video doorbell 300, or the video doorbell system 1000 may be comprised in a security monitoring system 1, e.g. the security monitoring systems 1 presented with reference to Figures 1 to 3. As mentioned, the security monitoring systems 1 preferably comprises an alarm gateway 10. The video doorbell device 300 or the video doorbell system 1000 is operatively connected to the alarm gateway 10. Such an arrangement is beneficial as it enable the alarm gateway 10 to control (cause control of) a state of the security monitoring system 1 based on operational control data 11 obtained by/from the video doorbell device 300 or video doorbell system 1000. The state of the security monitoring system 1 may be exemplified, but not limited, by an armed state (optionally an armed at home state or an armed away state), a disarmed state, a triggered state, a reset state etc. To this end, the video doorbell 300 or video doorbell system 1000 may be configured (e.g. programmed and arranged) to, via the sensing circuit 310, 1010 capture one or more video images 30. From the video image 30, the first token 21 may be obtained by e.g. facial recognition. The second token 22 may be obtained in the form of an NFC tag from the video doorbell device 300 or the input circuit 1020 of the video doorbell system 1000. Alternatively, or additionally, the second token 22 may be obtained from any other suitable device comprised in or operatively connected to the security monitoring system 1.

A decision to control the state of the security monitoring system 1 may be taken directly by the video doorbell 300 or the video doorbell system 1000. In a preferred embodiment, the decision to control the state of the security monitoring system 1 is taken by the alarm gateway 10 or the backend 3. In some embodiments, the decision to control the state of the security monitoring system 1 may be taken at different devices depending on the decision. A decision to trigger the security monitoring system 1 may be taken at the peripheral devices, whilst decisions to arm/disarm the security monitoring system 1 may be taken by the alarm gateway 10 and decisions to deactivate the security monitoring system 1, or a triggered alarm, may be taken by the backend 3.

To exemplify, a burglar enters a protected premises and a motion detector 114 is triggered. The motion detector transmits the alarm to the alarm gateway 10 causing the security monitoring system 1 to activate an alarm and signal a remote monitoring centre 3. A guardian is dispatched and upon arrival at the premises finds that the burglar has vacated the premises. In order to silence the alarm, the guardian presents credentials in the form of an NFC tag (first token 21) to an NFC circuit 320 of a video doorbell 300 of the security monitoring system 1. In response to the NFC tag, the video doorbell 300 activates its image sensing circuit 320 and captures a video image 30 of the face of the guardian. The video image 30 is transferred to the alarm gateway 10 together with the first token 21. The alarm gateway 10 determines that there is a person in the video image 30 and forwards the image together with the first token to the backend 3. At the backend 3, an operator reviews the video image 30 to identify the guardian and compares the face on the video image 30 with an image obtained from a database based on the first token. If the faces match, operator may change the state of the security monitoring system 1 such that the triggered alarm is reset.

The above was just one example of how a two-factor authentication may be performed. The video doorbell 300 was configured to perform partial identification when accepting the first token 21, but the second token 22 had to be accepted by the backend 3. In other words, the tokens 21, 22 may be obtained at any place, but depending on the event, the device (location, level) of the security monitoring system 1 where a decision is taken based on the tokens 21, 22 may vary depending on the decision to be taken.

The video image 30 may be processed by the processor circuit 330, 1030 of the video doorbell device 300 or the video doorbell system 1000 and/or be transferred to the alarm gateway 10. The alarm gateway 10 may be configured to process, or further process the video image 30 and/or transfer it to the backend 3 or any other device of the security monitoring systems 1. The backend 3 may be configured to process, or further process the video image 30.

From the video image 30, a first token 21 may be obtained as explained elsewhere and a second token may be obtained from any other suitable source, e.g. an image sensing circuit 1021, an audio sensing circuit 1022, a keypad interface 1023, a biometric reader 1025 etc.

The first token 21 and the second token 22 may be matched to one or more specific users or groups of uses at any device of the security monitoring system 1. In a preferred embodiment, the first token 21 and the second token 22 are be matched at the alarm gateway 10 and/or at the backend 3.

As explained, the video image 30 may be processed at any suitable device of, or operatively connected to, the security monitoring systems 1. The same is true for the first token 21 and the second token 22, regardless if they are originating from e.g. an image sensing circuit 1021, an audio sensing circuit 1022, a keypad interface 1023, a biometric reader 1025 etc. Consequently the first token 21 may be obtained by any device of, or operatively connected to, the security monitoring system 1, the second token may be obtained by any device of, or operatively connected to, the security monitoring system 1. The tokens 21, 22 may be processed by any device of, or operatively connected to, the security monitoring system 1 and decisions to change a state of the security monitoring system 1 may be taken by any device of, or operatively connected to, the security monitoring system 1.

Based on the teachings presented herein, a method 1100 of authenticating a user of a security system 1 will be explained in reference to Figure 9. The security monitoring system 1 may be a security monitoring system 1 according to any embodiment or example presented herein. The security monitoring system 1 is preferably operatively connected to a first input circuit 1020 and a second input circuit 1020. The first and second input circuits 1020 may be any input circuits 1020 or peripheral devices according to the present disclosure. More importantly, the first and second input circuits 1020 are able to provide tokens 21, 22 according to any embodiment or example presented herein.

The method 1100 comprises obtaining 1110 the first token 21. The first token 21 is preferably associated with the user and obtained by means of the first input circuit 1020. The first token 21 may be any form of token mentioned herein.

In some embodiments, the first input circuit 1020 is an image sensing circuit 310, 1010 capable of capturing one or more video images 30. In such embodiments, the method 1100 may further comprise identifying 1125 the first token 21 from the one or more video images 30 obtained from the image sensing circuit 310.

The method 1100 further comprises obtaining 1120 the second token 22. The second token 22 is preferably associated by the user and obtained by means of the second input circuit 1020. The second token 22 may be any form of token mentioned herein. Preferably, the second token 22 is different from the first token 21.

The method 1100 further comprises authentication 1130 of the user based on the first token 21 and the second token 22. This authentication may be performed anywhere and by any device of the security monitoring system 1 and in any way mentioned herein.

The method may further comprise changing 1140 a state of the security monitoring system 1 based on the authentication 1130 of the user. The state of the security monitoring system 1 may be any state as detailed herein.

In some embodiments, see Figure 10, changing 1140 a state of the security monitoring system 1 comprises changing 1143 a lock state of an electronically controllable lock 400 operatively connected to the security monitoring system 1. The electronically controllable lock 400 may be changed between a locked state and an unlocked state based on the authenticating 1130 of the user. If the electronically controllable lock 400 is changed from a locked state to an unlocked state or vice versa may of course depend on a current state of the electronically controllable lock 400, but also on the authenticating 1130 of the user. E.g., some users may not have permission to unlock the electronically controllable lock 400.

In some embodiment, changing 1140 a state of the security monitoring system 1 comprises changing 1145 an arm state of the security monitoring system 1 between an unarmed state and an armed state (or between an armed away to an armed at home state, or vice versa) based on the authenticating 1130 of the user. If the arm state of the security monitoring system 1 is changed from an unarmed state and an armed state or vice versa may of course depend on a current arm state of the security monitoring system 1, but also on the authenticating 1130 of the user. E.g., some users may not have permission to disarm the security monitoring system 1.

In Figure 11, a method 1200 of authenticating a user of a security monitoring system 1 is schematically shown. The security monitoring system 1 may be a security monitoring system 1 according to any embodiment or example presented herein. The method 1200 comprises obtaining 1210 one or more video images 30 of the user. The video images 30 may be obtained by any suitable device or circuit presented herein. The method 1200 further comprises obtaining 1220 a first token 21 associated with the user. The first token may be any form of token mentioned herein. The method 1200 further comprises authenticating 1230 the user based on the one or more video images 30 and the first token 21. The authenticating 1230 may be done in any way as described herein.

Figure 12 shows a schematic view of a computer program product 1300. The computer program product 1300 comprises a non-transitory computer readable medium 1310. A computer program 1400 may be stored on the non-transitory computer readable medium 1310. The computer program 1400 comprises program instructions 1410, which, when executed by a processor circuit 330, 1030, cause the processor circuit 330, 1030 to perform, or cause performance of, the method 1100 presented with reference to Figure 9.

Figure 13 shows a schematic view of a computer program product 1500. The computer program product 1500 comprises a non-transitory computer readable medium 1510. A computer program 1600 may be stored on the non-transitory computer readable medium 1510. The computer program 1600 comprises program instructions 1610, which, when executed by a processor circuit 330, 1030, cause the processor circuit 330, 1030 to perform, or cause performance of, the method 1200 presented with reference to Figure 9.

Modifications and other variants of the described embodiments will come to mind to one skilled in the art having benefit of the teachings presented in the foregoing description and associated drawings. Therefore, it is to be understood that the embodiments are not limited to the specific example embodiments described in this disclosure and that modifications and other variants are intended to be included within the scope of this disclosure. For example, while embodiments of the invention have been described with reference to variants of video doorbells and security alarm systems, persons skilled in the art will appreciate that the embodiments of the invention can equivalently be applied to two-factor authentication in other devices and systems. Furthermore, although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation. Therefore, a person skilled in the art would recognize numerous variations to the described embodiments that would still fall within the scope of the appended claims. Furthermore, although individual features may be included in different claims (or embodiments), these may possibly advantageously be combined, and the inclusion of different claims (or embodiments) does not imply that a combination of features is not feasible and/or advantageous. In addition, singular references do not exclude a plurality. Finally, reference signs in the claims are provided merely as a clarifying example and should not be construed as limiting the scope of the claims in any way.