Abstract:
Example implementations include a method, apparatus and computer-readable medium of controlling a security system by a computer device, comprising receiving device metadata associated with a device in communication with a wireless communication access point. The implementations further include determining that the device metadata comprises matched device metadata based on a match with one of a plurality of previously-identified device metadata in a historical database that stores the plurality of previously-identified device metadata in association with one or more of a plurality of security breach events and a corresponding one of a plurality of security breach probability values. Additionally, the implementations further include determining that the matched device metadata corresponds with a security breach probability value that exceeds a security breach probability threshold. Additionally, the implementations further include generating an alert and sending the alert to a security system device, wherein the alert is configured to initiate a security function.