Patent attributes
Techniques are described for providing control of a security system. A user is authorized in the security system and user identification inputs, provided through an input unit of a personal mobile device of the authorized user of the security system, are accessed. One or more signatures of the authorized user are defined and stored in a signature map. Subsequently, user identification input is received from an unauthenticated user using the personal mobile device. The user identification input received from the unauthenticated user is compared to one or more defined signatures in the signature map. The unauthenticated user is determined to be the authorized user if the received user identification input matches one of the defined signatures. The unauthenticated user is allowed to control the security system based on the determination that the unauthenticated user is the authorized user.