US20170311154A1 - Security hub utilizing near field communication to onboard sensors - Google Patents
Security hub utilizing near field communication to onboard sensors Download PDFInfo
- Publication number
- US20170311154A1 US20170311154A1 US15/346,652 US201615346652A US2017311154A1 US 20170311154 A1 US20170311154 A1 US 20170311154A1 US 201615346652 A US201615346652 A US 201615346652A US 2017311154 A1 US2017311154 A1 US 2017311154A1
- Authority
- US
- United States
- Prior art keywords
- nfc
- enabled sensor
- security hub
- interface
- enabled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000004891 communication Methods 0.000 title claims abstract description 53
- 238000001514 detection method Methods 0.000 claims abstract description 15
- 230000009471 action Effects 0.000 claims abstract description 5
- 230000004044 response Effects 0.000 claims abstract description 5
- 238000000034 method Methods 0.000 claims description 24
- 238000012360 testing method Methods 0.000 claims description 10
- 238000009434 installation Methods 0.000 claims description 7
- 230000015654 memory Effects 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G04—HOROLOGY
- G04C—ELECTROMECHANICAL CLOCKS OR WATCHES
- G04C3/00—Electromechanical clocks or watches independent of other time-pieces and in which the movement is maintained by electric means
- G04C3/001—Electromechanical switches for setting or display
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G04—HOROLOGY
- G04G—ELECTRONIC TIME-PIECES
- G04G21/00—Input or output devices integrated in time-pieces
-
- G—PHYSICS
- G04—HOROLOGY
- G04B—MECHANICALLY-DRIVEN CLOCKS OR WATCHES; MECHANICAL PARTS OF CLOCKS OR WATCHES IN GENERAL; TIME PIECES USING THE POSITION OF THE SUN, MOON OR STARS
- G04B19/00—Indicating the time by visual means
- G04B19/22—Arrangements for indicating different local apparent times; Universal time pieces
- G04B19/223—Arrangements for indicating different local apparent times; Universal time pieces with rotary disc, rotary bezel, or rotary dial
-
- G—PHYSICS
- G04—HOROLOGY
- G04B—MECHANICALLY-DRIVEN CLOCKS OR WATCHES; MECHANICAL PARTS OF CLOCKS OR WATCHES IN GENERAL; TIME PIECES USING THE POSITION OF THE SUN, MOON OR STARS
- G04B19/00—Indicating the time by visual means
- G04B19/28—Adjustable guide marks or pointers for indicating determined points of time
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/033—Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
- G06F3/0362—Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of 1D translations or rotations of an operating part of the device, e.g. scroll wheels, sliders, knobs, rollers or belts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
- G06F3/033—Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
- G06F3/038—Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/006—Alarm destination chosen according to type of event, e.g. in case of fire phone the fire service, in case of medical emergency phone the ambulance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/33—Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
-
- H04W4/008—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2203/00—Indexing scheme relating to G06F3/00 - G06F3/048
- G06F2203/038—Indexing scheme relating to G06F3/038
- G06F2203/0384—Wireless input, i.e. hardware and software details of wireless interface arrangements for pointing devices
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/008—Alarm setting and unsetting, i.e. arming or disarming of the security system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- the present disclosure relates in to a system and method of a security hub utilizing near field communication (NFC) to onboard sensors.
- NFC near field communication
- a security hub system may include one or more of a control panel and a plurality of sensors (e.g., a security camera, a motion sensor, and a contact).
- sensors e.g., a security camera, a motion sensor, and a contact.
- a security hub includes a near field communication (NFC) interface, a communications interface, and a computer processor.
- the NFC interface is configured to detect an NFC-enabled sensor.
- the communications interface is configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device.
- the computer processor is operatively connected to the NFC interface and the communications interface and configured to: onboard the NFC-enabled sensor, analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information.
- a method of connecting an NFC-enabled sensor to a security hub comprises: detecting the NFC-enabled sensor via a near field communication (NFC) interface of the security hub; establishing communication with the NFC-enabled sensor, a communications network, and an electronic device via a communications interface of security hub; onboarding the NFC-enabled sensor; and receiving detection information from the NFC-enabled sensor.
- NFC near field communication
- FIG. 1 is a block diagram depicting an implementation of a security hub that utilizes NFC for onboarding sensors, according to an example embodiment of the disclosure.
- FIG. 2 shows an example user interface of an application displaying a connection status of between a security hub and a communications network, according to an example embodiment of the present disclosure.
- FIG. 3 shows an example user interface of an application displaying diagrammatic instructions for connecting sensors to the security hub using NFC, according to an example embodiment of the present disclosure.
- FIG. 4 shows an example user interface of an application displaying diagrammatic instructions for testing connected sensors, according to an example embodiment of the present disclosure.
- FIG. 5 shows an example user interface of an application displaying the location, type, and installation status of connected NFC-enabled sensors, according to an example embodiment of the present disclosure.
- FIG. 6 shows a flowchart of high-level operations of a security hub that utilizes NFC to onboard sensors, according to an example embodiment of the present disclosure.
- FIG. 7 illustrates an example computer architecture that may be used to implement embodiments of the present disclosure, for example, the security hub.
- Embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub.
- a communications network e.g., Wi-Fi
- NFC is a set of communications protocols that enable two devices, such as the security hub and a sensor, to establish communication by bringing them within a certain range (e.g., 4 cm) of each other.
- FIG. 1 is a block diagram depicting an implementation of a security hub that utilizes NFC for onboarding sensors, according to an example embodiment of the disclosure.
- a security hub 100 includes an NFC interface 101 , a communications interface 102 , and a computer processor 103 (although only three components of the security hub are shown, the security hub of the present disclosure are not limited thereto).
- the NFC interface 101 is configured to detect one or more NFC-enabled sensors.
- the NFC interface 101 may utilize the Thread network protocol.
- the communications interface 102 is configured to establish communication with NFC-enabled sensors 111 , 112 , and 113 , which have already gone through the onboarding process.
- the communications interface 102 is also configured to establish communication with a communications network 120 (e.g., the Internet) and an electronic device 300 (e.g., a smart phone, a tablet).
- a communications network 120 e.g., the Internet
- an electronic device 300 e.g., a smart phone, a tablet.
- the computer processor 103 is configured to onboard the detected NFC-enabled sensor. Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information.
- the computer processor 103 is also configured to analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information. For example, the computer processor may trigger an alarm in response to determining that there is a high security threat.
- the electronic device 300 may execute and run an application that enables a user to interact with and/or control the security hub 100 .
- the application may provide a user interface that enables the user to provide information (e.g., login information, a Wi-Fi router password) to the security hub 100 for connecting to the communications network 120 .
- the user interface may also displays the connection status between the security hub 100 and the communications network 120 , such as shown in FIG. 2 .
- the application may also provide a user interface that shows step-by-step instructions on how to onboard an NFC-enabled sensor 115 with the security hub 100 , such as shown in FIG. 3 , and/or how to connect the security hub 100 to the communications network 120 .
- the application may also provide a user interface that enables the user to test the operation and/or connectivity of connected NFC-enabled sensors, such as shown in FIG. 4 .
- the instructions may include diagrammatic instructions.
- the present system and method allow an NFC-enabled sensor (e.g., a contact sensor) to be onboarded with a security hub when the NFC-enabled sensor is brought within contact or within close proximity (e.g., within 4 centimeters (cm)) of the security hub, such as illustrated by the instructions of FIG. 3 .
- the security hub may receive information used for onboarding the NFC-enabled sensor entirely from the NFC-enabled sensor through its NFC interface. That is, the onboarding process between an NFC-enabled sensor and the security hub may be performed entirely without the aid of an electronic device, such as a smart phone, or an application running on the electronic device.
- the user interface may also display a connection status between the NFC-enabled sensor and the security hub.
- the present system and method allow the user to test an NFC-enabled sensor after it has been onboarded with the security hub.
- FIG. 4 shows an example user interface including diagrammatic instructions for testing connected sensors, according to an example embodiment of the present disclosure.
- the user interface may instruct the user to place two contact parts of the sensor in contact with each other.
- the user interface may also provide an indication of whether contact sensor is connected and operating properly, for example, by displaying a message with the text “safe.”
- FIG. 5 shows an example user interface of an application displaying the location, type, and installation status of connected NFC-enabled sensors, according to an example embodiment of the present disclosure.
- the user interface of the application displays a type of each of the listed sensors, along with corresponding locations where the sensors are installed.
- the user interface also allows the user to test a working status of each of the listed sensors at each installed location.
- the user interface further indicates an installation status (e.g., just added) of a sensor, for example, if the sensor was installed within a pre-defined period of time (e.g., previous 10 minutes).
- FIG. 6 shows a flowchart of high-level operations of a security hub that utilizes NFC to onboard sensors, according to an example embodiment of the present disclosure.
- a security hub that utilizes NFC to onboard sensors
- the NFC interface of the security hub detects an NFC-enabled sensor (at 601 ).
- the computer processor of the security hub onboards the NFC-enabled sensor (at 602 ). Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information.
- the communications interface of the security hub establishes communication with the NFC-enabled sensor (at 603 ). For example, if the computer processor determines (at 603 ) that NFC-enabled sensor transmits detection information using Zigbee, the communications interface may establish communication with the NFC-enabled sensor using Zigbee.
- embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub.
- a communications network e.g., Wi-Fi
- FIG. 7 illustrates an example computer architecture that may be used to implement embodiments of the present system and method.
- the example computer architecture may be used for implementing one or more components described in the present disclosure including, but not limited to, the security hub.
- One embodiment of architecture 700 comprises a system bus 720 for communicating information, and a processor 710 coupled to bus 720 for processing information.
- Architecture 700 further comprises a random access memory (RAM) or other dynamic storage device 725 (referred to herein as main memory), coupled to bus 720 for storing information and instructions to be executed by processor 710 .
- Main memory 725 also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 710 .
- Architecture 700 may also include a read only memory (ROM) and/or other static storage device 726 coupled to bus 720 for storing static information and instructions used by processor 710 .
- ROM read only memory
- a data storage device 721 such as a magnetic disk or optical disc and its corresponding drive may also be coupled to architecture 700 for storing information and instructions.
- Architecture 700 can also be coupled to a second I/O bus 750 via an I/O interface 730 .
- a plurality of I/O devices may be coupled to I/O bus 750 , including a display device 743 , an input device (e.g., an alphanumeric input device 742 , a cursor control device 741 , and/or a touchscreen device).
- the communication device 740 allows for access to other computers (e.g., servers or clients) via a network.
- the communication device 740 may comprise one or more modems, network interface cards, wireless network interfaces or other interface devices, such as those used for coupling to Ethernet, token ring, or other types of networks.
- the present disclosure also relates to an apparatus for performing the operations herein.
- This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer.
- a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk, including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Public Health (AREA)
- Software Systems (AREA)
- Alarm Systems (AREA)
- User Interface Of Digital Computer (AREA)
- Telephonic Communication Services (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
According to an embodiment of the present disclosure, a security hub includes a near field communication (NFC) interface, a communications interface, and a computer processor. The NFC interface is configured to detect an NFC-enabled sensor. The communications interface is configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device. The computer processor is operatively connected to the NFC interface and the communications interface and configured to: onboard the NFC-enabled sensor, analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information.
Description
- This application claims priority to and the benefit of U.S. Provisional Patent Application No. 62/327,795, titled “SYSTEM AND METHOD FOR PROVIDING A SECURITY HUB” and filed on Apr. 26, 2016, the entire content which is incorporated herein by reference
- The present disclosure relates in to a system and method of a security hub utilizing near field communication (NFC) to onboard sensors.
- A security hub system may include one or more of a control panel and a plurality of sensors (e.g., a security camera, a motion sensor, and a contact). In recent years, there is an increasing popularity for low-cost, self-built security hub systems. However, such security hub systems are typically difficult and time-consuming to install/use. Thus, in view of the foregoing, there exists a need for the presently disclosed system and method of utilizing NFC to onboard sensors.
- According to an embodiment of the present disclosure, a security hub includes a near field communication (NFC) interface, a communications interface, and a computer processor. The NFC interface is configured to detect an NFC-enabled sensor. The communications interface is configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device. The computer processor is operatively connected to the NFC interface and the communications interface and configured to: onboard the NFC-enabled sensor, analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information.
- According to an embodiment of the present disclosure, a method of connecting an NFC-enabled sensor to a security hub comprises: detecting the NFC-enabled sensor via a near field communication (NFC) interface of the security hub; establishing communication with the NFC-enabled sensor, a communications network, and an electronic device via a communications interface of security hub; onboarding the NFC-enabled sensor; and receiving detection information from the NFC-enabled sensor.
- The accompanying drawings, which are included as part of the present disclosure, illustrate various embodiments and together with the general description given above and the detailed description of the various embodiments given below serve to explain and teach the principles described herein.
-
FIG. 1 is a block diagram depicting an implementation of a security hub that utilizes NFC for onboarding sensors, according to an example embodiment of the disclosure. -
FIG. 2 shows an example user interface of an application displaying a connection status of between a security hub and a communications network, according to an example embodiment of the present disclosure. -
FIG. 3 shows an example user interface of an application displaying diagrammatic instructions for connecting sensors to the security hub using NFC, according to an example embodiment of the present disclosure. -
FIG. 4 shows an example user interface of an application displaying diagrammatic instructions for testing connected sensors, according to an example embodiment of the present disclosure. -
FIG. 5 shows an example user interface of an application displaying the location, type, and installation status of connected NFC-enabled sensors, according to an example embodiment of the present disclosure. -
FIG. 6 shows a flowchart of high-level operations of a security hub that utilizes NFC to onboard sensors, according to an example embodiment of the present disclosure. -
FIG. 7 illustrates an example computer architecture that may be used to implement embodiments of the present disclosure, for example, the security hub. - The figures in the drawings are not necessarily drawn to scale and elements of similar structures or functions are generally represented by like reference numerals for illustrative purposes throughout the figures. The figures are only intended to facilitate the description of the various embodiments described herein and do not describe every aspect of the teachings disclosed herein and do not limit the scope of the claims.
- Each of the features and teachings disclosed herein may be utilized separately or in conjunction with other features and teachings to provide the present system and method. Representative examples utilizing many of these features and teachings, both separately and in combination, are described with reference to the attached figures. While the detailed description herein illustrates to a person of ordinary skill in the art further details for practicing aspects of the present teachings, it does not limit the scope of the claims. Therefore, combinations of features disclosed in the detailed description are representative examples of the present teachings and may not be necessary to practice the teachings in the broadest sense.
- As discussed earlier, traditional security hubs are typically difficult and time-consuming to install/use. Embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub. NFC is a set of communications protocols that enable two devices, such as the security hub and a sensor, to establish communication by bringing them within a certain range (e.g., 4 cm) of each other.
-
FIG. 1 is a block diagram depicting an implementation of a security hub that utilizes NFC for onboarding sensors, according to an example embodiment of the disclosure. Asecurity hub 100 includes anNFC interface 101, acommunications interface 102, and a computer processor 103 (although only three components of the security hub are shown, the security hub of the present disclosure are not limited thereto). TheNFC interface 101 is configured to detect one or more NFC-enabled sensors. TheNFC interface 101 may utilize the Thread network protocol. - The
communications interface 102 is configured to establish communication with NFC-enabledsensors communications interface 102 is also configured to establish communication with a communications network 120 (e.g., the Internet) and an electronic device 300 (e.g., a smart phone, a tablet). - The
computer processor 103 is configured to onboard the detected NFC-enabled sensor. Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information. Thecomputer processor 103 is also configured to analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information. For example, the computer processor may trigger an alarm in response to determining that there is a high security threat. - The
electronic device 300 may execute and run an application that enables a user to interact with and/or control thesecurity hub 100. For example, the application may provide a user interface that enables the user to provide information (e.g., login information, a Wi-Fi router password) to thesecurity hub 100 for connecting to thecommunications network 120. The user interface may also displays the connection status between thesecurity hub 100 and thecommunications network 120, such as shown inFIG. 2 . The application may also provide a user interface that shows step-by-step instructions on how to onboard an NFC-enabledsensor 115 with thesecurity hub 100, such as shown inFIG. 3 , and/or how to connect thesecurity hub 100 to thecommunications network 120. The application may also provide a user interface that enables the user to test the operation and/or connectivity of connected NFC-enabled sensors, such as shown inFIG. 4 . The instructions may include diagrammatic instructions. - According to an example embodiment, the present system and method allow an NFC-enabled sensor (e.g., a contact sensor) to be onboarded with a security hub when the NFC-enabled sensor is brought within contact or within close proximity (e.g., within 4 centimeters (cm)) of the security hub, such as illustrated by the instructions of
FIG. 3 . The security hub may receive information used for onboarding the NFC-enabled sensor entirely from the NFC-enabled sensor through its NFC interface. That is, the onboarding process between an NFC-enabled sensor and the security hub may be performed entirely without the aid of an electronic device, such as a smart phone, or an application running on the electronic device. Although not shown inFIG. 3 , the user interface may also display a connection status between the NFC-enabled sensor and the security hub. - According to an example embodiment, the present system and method allow the user to test an NFC-enabled sensor after it has been onboarded with the security hub.
FIG. 4 shows an example user interface including diagrammatic instructions for testing connected sensors, according to an example embodiment of the present disclosure. For example, for testing a contact sensor, the user interface may instruct the user to place two contact parts of the sensor in contact with each other. The user interface may also provide an indication of whether contact sensor is connected and operating properly, for example, by displaying a message with the text “safe.” -
FIG. 5 shows an example user interface of an application displaying the location, type, and installation status of connected NFC-enabled sensors, according to an example embodiment of the present disclosure. After the user installs one or more sensors at various locations, the user interface of the application displays a type of each of the listed sensors, along with corresponding locations where the sensors are installed. The user interface also allows the user to test a working status of each of the listed sensors at each installed location. In one embodiment, the user interface further indicates an installation status (e.g., just added) of a sensor, for example, if the sensor was installed within a pre-defined period of time (e.g., previous 10 minutes). -
FIG. 6 shows a flowchart of high-level operations of a security hub that utilizes NFC to onboard sensors, according to an example embodiment of the present disclosure. Although one or more components of the security hub are described below as performing the disclosed operations, the present system and method are not limited thereto, and other components of the security hub may perform those operations instead or in conjunction. - The NFC interface of the security hub detects an NFC-enabled sensor (at 601). The computer processor of the security hub onboards the NFC-enabled sensor (at 602). Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information. The communications interface of the security hub establishes communication with the NFC-enabled sensor (at 603). For example, if the computer processor determines (at 603) that NFC-enabled sensor transmits detection information using Zigbee, the communications interface may establish communication with the NFC-enabled sensor using Zigbee.
- Accordingly, in view of the foregoing, embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub.
-
FIG. 7 illustrates an example computer architecture that may be used to implement embodiments of the present system and method. The example computer architecture may be used for implementing one or more components described in the present disclosure including, but not limited to, the security hub. One embodiment ofarchitecture 700 comprises asystem bus 720 for communicating information, and aprocessor 710 coupled tobus 720 for processing information.Architecture 700 further comprises a random access memory (RAM) or other dynamic storage device 725 (referred to herein as main memory), coupled tobus 720 for storing information and instructions to be executed byprocessor 710.Main memory 725 also may be used for storing temporary variables or other intermediate information during execution of instructions byprocessor 710.Architecture 700 may also include a read only memory (ROM) and/or otherstatic storage device 726 coupled tobus 720 for storing static information and instructions used byprocessor 710. - A
data storage device 721 such as a magnetic disk or optical disc and its corresponding drive may also be coupled toarchitecture 700 for storing information and instructions.Architecture 700 can also be coupled to a second I/O bus 750 via an I/O interface 730. A plurality of I/O devices may be coupled to I/O bus 750, including adisplay device 743, an input device (e.g., analphanumeric input device 742, acursor control device 741, and/or a touchscreen device). - The
communication device 740 allows for access to other computers (e.g., servers or clients) via a network. Thecommunication device 740 may comprise one or more modems, network interface cards, wireless network interfaces or other interface devices, such as those used for coupling to Ethernet, token ring, or other types of networks. - Some portions of the detailed description herein are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
- It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the below discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
- The present disclosure also relates to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk, including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
- The algorithms presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems, messaging servers, or personal computers may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the required method steps. The required structure for a variety of these systems appears in the description above. A variety of programming languages may be used to implement the teachings of the disclosure as described herein.
- Moreover, the various features of the representative examples and the dependent claims may be combined in ways that are not specifically and explicitly enumerated in order to provide additional embodiments of the present teachings. The dimensions and the shapes of the components shown in the figures are designed to help understand how the present teachings are practiced and do limit the dimensions and the shapes shown in the examples.
Claims (20)
1. A security hub comprising:
a near field communication (NFC) interface configured to detect an NFC-enabled sensor;
a communications interface configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device; and
a computer processor operatively connected to the NFC interface and the communications interface and configured to:
onboard the NFC-enabled sensor;
analyze detection information received from the NFC-enabled sensor, and
perform an action in response to the analysis of the detection information.
2. The security hub of claim 1 , wherein to onboard the NFC-enabled sensor includes registering the NFC-enabled sensor and determining a communications protocol of the NFC-enabled sensor through which detection information is transmitted.
3. The security hub of claim 2 , wherein information used for onboarding the NFC-enabled sensor is received entirely from the NFC-enabled sensor through the NFC interface.
4. The security hub of claim 3 , wherein the NFC interface utilizes the Thread network protocol.
5. The security hub of claim 1 , further comprising an application running on the electronic device.
6. The security hub of claim 5 , wherein the application displays diagrammatic instructions for connecting the security hub to the communications network.
7. The security hub of claim 5 , wherein the application displays diagrammatic instructions for connecting the NFC-enabled sensor to security hub.
8. The security hub of claim 5 , wherein the application displays diagrammatic instructions for testing the operations of the NFC-enabled sensor.
9. The security hub of claim 8 , wherein the application displays an indication of whether the NFC-enabled sensor is connected and operating properly.
10. The security hub of claim 5 , wherein the application displays the location and installation status of the NFC-enabled sensor.
11. A method of connecting an NFC-enabled sensor to a security hub, the method comprising:
detecting the NFC-enabled sensor via a near field communication (NFC) interface of the security hub;
establishing communication with the NFC-enabled sensor, a communications network, and an electronic device via a communications interface of security hub;
onboarding the NFC-enabled sensor; and
receiving detection information from the NFC-enabled sensor.
12. The method of claim 11 , wherein onboarding the NFC-enabled sensor includes registering the NFC-enabled sensor and determining a communications protocol of the NFC-enabled sensor through which detection information is transmitted.
13. The method of claim 12 , wherein information used for onboarding the NFC-enabled sensor is received entirely from the NFC-enabled sensor through the NFC interface.
14. The method of claim 13 , wherein the NFC interface utilizes the Thread network protocol.
15. The method of claim 11 , further comprising communicating with an application running on the electronic device.
16. The method of claim 15 , further comprising instructing the application to display diagrammatic instructions for connecting the security hub to the communications network.
17. The method of claim 15 , further comprising instructing the application to display diagrammatic instructions for connecting the NFC-enabled sensor to security hub.
18. The method of claim 15 , further comprising instructing the application to display diagrammatic instructions for testing the operations of the NFC-enabled sensor.
19. The method of claim 18 , further comprising instructing the application to display an indication of whether the NFC-enabled sensor is connected and operating properly.
20. The method of claim 15 , further comprising instructing the application to display the location and installation status of the NFC-enabled sensor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/346,652 US20170311154A1 (en) | 2016-04-26 | 2016-11-08 | Security hub utilizing near field communication to onboard sensors |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662327795P | 2016-04-26 | 2016-04-26 | |
US15/346,652 US20170311154A1 (en) | 2016-04-26 | 2016-11-08 | Security hub utilizing near field communication to onboard sensors |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170311154A1 true US20170311154A1 (en) | 2017-10-26 |
Family
ID=60089566
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/346,652 Abandoned US20170311154A1 (en) | 2016-04-26 | 2016-11-08 | Security hub utilizing near field communication to onboard sensors |
US15/346,644 Expired - Fee Related US10061273B2 (en) | 2016-04-26 | 2016-11-08 | Intelligent security hub for providing smart alerts |
US15/354,689 Active US10209677B2 (en) | 2016-04-26 | 2016-11-17 | System and method of user input utilizing a rotatable part |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/346,644 Expired - Fee Related US10061273B2 (en) | 2016-04-26 | 2016-11-08 | Intelligent security hub for providing smart alerts |
US15/354,689 Active US10209677B2 (en) | 2016-04-26 | 2016-11-17 | System and method of user input utilizing a rotatable part |
Country Status (2)
Country | Link |
---|---|
US (3) | US20170311154A1 (en) |
KR (2) | KR20170122107A (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102576802B1 (en) * | 2017-02-24 | 2023-09-12 | 삼성디스플레이 주식회사 | Smart watch and a method for unlocking the same |
US20190146441A1 (en) * | 2017-11-16 | 2019-05-16 | Associated Materials, Llc | Methods and systems for home automation using an internet of things platform |
US10802598B2 (en) * | 2018-08-05 | 2020-10-13 | Pison Technology, Inc. | User interface control of responsive devices |
US11099647B2 (en) | 2018-08-05 | 2021-08-24 | Pison Technology, Inc. | User interface control of responsive devices |
US10847018B2 (en) | 2018-08-31 | 2020-11-24 | Nortek Security & Control Llc | Community-based security system |
US11157086B2 (en) | 2020-01-28 | 2021-10-26 | Pison Technology, Inc. | Determining a geographical location based on human gestures |
US11199908B2 (en) | 2020-01-28 | 2021-12-14 | Pison Technology, Inc. | Wrist-worn device-based inputs for an operating system |
CN111736450B (en) * | 2020-06-28 | 2021-07-27 | 江苏乐芯智能科技有限公司 | Intelligent watch |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170195325A1 (en) * | 2016-01-05 | 2017-07-06 | Xevo Inc. | Connection management of smart devices with automobile head unit |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5576972A (en) | 1992-05-08 | 1996-11-19 | Harrison; Dana C. | Intelligent area monitoring system |
US5517429A (en) | 1992-05-08 | 1996-05-14 | Harrison; Dana C. | Intelligent area monitoring system |
US6166633A (en) | 1999-05-21 | 2000-12-26 | Wang; Randall | Process for reducing motion-type false alarm of security alarm system with self-analyzing and self-adjusting control |
US20020101457A1 (en) * | 2001-01-31 | 2002-08-01 | Microsoft Corporation | Bezel interface for small computing devices |
US7113090B1 (en) * | 2001-04-24 | 2006-09-26 | Alarm.Com Incorporated | System and method for connecting security systems to a wireless device |
US7330768B2 (en) * | 2003-01-28 | 2008-02-12 | Fisher-Rosemount Systems, Inc. | Integrated configuration in a process plant having a process control system and a safety system |
US7323978B2 (en) | 2005-02-16 | 2008-01-29 | Ee Systems Group Inc. | False alarm reduction method and system |
US20060232673A1 (en) | 2005-04-19 | 2006-10-19 | Objectvideo, Inc. | Video-based human verification system and method |
US8704668B1 (en) | 2005-04-20 | 2014-04-22 | Trevor Darrell | System for monitoring and alerting based on animal behavior in designated environments |
US7893960B1 (en) | 2006-04-05 | 2011-02-22 | Wallach Morton L | Smart sensors for perimeter and border security |
US20110106736A1 (en) | 2008-06-26 | 2011-05-05 | Intuitive User Interfaces Ltd. | System and method for intuitive user interaction |
US9030404B2 (en) | 2009-07-23 | 2015-05-12 | Qualcomm Incorporated | Method and apparatus for distributed user interfaces using wearable devices to control mobile and consumer electronic devices |
US8810408B2 (en) * | 2011-04-04 | 2014-08-19 | Alarm.Com Incorporated | Medication management and reporting technology |
US9176485B2 (en) * | 2011-06-02 | 2015-11-03 | Microsoft Technology Licensing, Llc | Occupancy prediction using historical occupancy patterns |
DE102012020817A1 (en) * | 2012-03-13 | 2013-09-19 | Hannes Bonhoff | Method for entering a password and computer program product |
US10185416B2 (en) | 2012-11-20 | 2019-01-22 | Samsung Electronics Co., Ltd. | User gesture input to wearable electronic device involving movement of device |
US9049168B2 (en) | 2013-01-11 | 2015-06-02 | State Farm Mutual Automobile Insurance Company | Home sensor data gathering for neighbor notification purposes |
JP6293259B2 (en) | 2013-04-01 | 2018-03-14 | 杭州惠道科技有限公司Hangzhou Kind−Tao Technologies Co., Ltd. | Smart watch |
US20150098309A1 (en) | 2013-08-15 | 2015-04-09 | I.Am.Plus, Llc | Multi-media wireless watch |
US9183712B2 (en) | 2013-10-10 | 2015-11-10 | Time Warner Cable Enterprises Llc | Security system and alarm activation control |
US20150102924A1 (en) * | 2013-10-15 | 2015-04-16 | Richard L. Soloway | Volume/Vibrate Overriding Feature Of Alert System For Mobile Devices |
US8779919B1 (en) | 2013-11-03 | 2014-07-15 | Instant Care, Inc. | Event communication apparatus and method |
US20150134954A1 (en) | 2013-11-14 | 2015-05-14 | Broadcom Corporation | Sensor management system in an iot network |
US20150145653A1 (en) | 2013-11-25 | 2015-05-28 | Invensense, Inc. | Device control using a wearable device |
KR102114616B1 (en) | 2013-12-06 | 2020-05-25 | 엘지전자 주식회사 | Smart Watch and Method for controlling thereof |
US9898175B2 (en) | 2014-08-05 | 2018-02-20 | Fibar Group S.A. | Home network manager for home automation |
US9785123B2 (en) | 2014-09-26 | 2017-10-10 | Intel Corporation | Digital analog display with rotating bezel |
-
2016
- 2016-11-08 US US15/346,652 patent/US20170311154A1/en not_active Abandoned
- 2016-11-08 US US15/346,644 patent/US10061273B2/en not_active Expired - Fee Related
- 2016-11-17 US US15/354,689 patent/US10209677B2/en active Active
-
2017
- 2017-02-27 KR KR1020170025694A patent/KR20170122107A/en unknown
- 2017-04-04 KR KR1020170043905A patent/KR20170122114A/en not_active Application Discontinuation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170195325A1 (en) * | 2016-01-05 | 2017-07-06 | Xevo Inc. | Connection management of smart devices with automobile head unit |
Also Published As
Publication number | Publication date |
---|---|
US20170309157A1 (en) | 2017-10-26 |
US20170308040A1 (en) | 2017-10-26 |
KR20170122107A (en) | 2017-11-03 |
US10061273B2 (en) | 2018-08-28 |
KR20170122114A (en) | 2017-11-03 |
US10209677B2 (en) | 2019-02-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170311154A1 (en) | Security hub utilizing near field communication to onboard sensors | |
US10635809B2 (en) | Authenticating application legitimacy | |
EP3575975B1 (en) | Method and apparatus for operating smart network interface card | |
CN105934912B (en) | Authentication system and method | |
US10142352B2 (en) | Configuration management for virtual machine environment | |
US20140317708A1 (en) | Login via near field communication with automatically generated login information | |
US9503965B2 (en) | Set-top box setup via near field communication | |
US20110241823A1 (en) | Tag-based personalization | |
US20150146706A1 (en) | Remotely Provisioning And Operating A Headless WIFI Device | |
US11237636B2 (en) | System and method for network configuration and behavior control by proximity enabled devices | |
US10171519B2 (en) | Session transfer protocol between different browsers on different devices | |
US11301313B2 (en) | Collaborative application testing | |
US20170339559A1 (en) | Over-the-air personalization of network devices | |
EP3007066A1 (en) | Method for using shared device in apparatus capable of operating two operating systems | |
ES2785048T3 (en) | Automatic connection to an online service | |
WO2017054307A1 (en) | Recognition method and apparatus for user information | |
US20180247060A1 (en) | Detecting security vulnerabilities on computing devices | |
CN103902882B (en) | A kind of prevent user profile from leaking terminal and method | |
KR20160099193A (en) | System and method of identifying position of mobile device based on near field communication device | |
TW201919020A (en) | System and method for conducting a secured computer based candidate assessment and non-transitory computer readable medium perform the method | |
JP6710762B2 (en) | Terminal control apparatus and method using notification message | |
CN104660480B (en) | A kind of method, apparatus and system of account number abnormality processing | |
US20160014207A1 (en) | Chipset For Cellular M2M Communications | |
KR20240086238A (en) | Service providing apparatus and method for detecting fire at construction site based on image, and fire monitoring system including the same and non-transitory computer readable medium having computer program recorded thereon | |
CN115600213A (en) | Vulnerability management method, device, medium and equipment based on application program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SAMSUNG ELECTRONICS CO., LTD., KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NANDANAVANAM, VENKATA NAGA VAMSI;CHUI, KENNY;REEL/FRAME:040326/0629 Effective date: 20161108 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |