[go: up one dir, main page]

US20170311154A1 - Security hub utilizing near field communication to onboard sensors - Google Patents

Security hub utilizing near field communication to onboard sensors Download PDF

Info

Publication number
US20170311154A1
US20170311154A1 US15/346,652 US201615346652A US2017311154A1 US 20170311154 A1 US20170311154 A1 US 20170311154A1 US 201615346652 A US201615346652 A US 201615346652A US 2017311154 A1 US2017311154 A1 US 2017311154A1
Authority
US
United States
Prior art keywords
nfc
enabled sensor
security hub
interface
enabled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/346,652
Inventor
Venkata Naga Vamsi Nandanavanam
Kenny Chui
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics Co Ltd filed Critical Samsung Electronics Co Ltd
Priority to US15/346,652 priority Critical patent/US20170311154A1/en
Assigned to SAMSUNG ELECTRONICS CO., LTD. reassignment SAMSUNG ELECTRONICS CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHUI, KENNY, NANDANAVANAM, VENKATA NAGA VAMSI
Publication of US20170311154A1 publication Critical patent/US20170311154A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G04HOROLOGY
    • G04CELECTROMECHANICAL CLOCKS OR WATCHES
    • G04C3/00Electromechanical clocks or watches independent of other time-pieces and in which the movement is maintained by electric means
    • G04C3/001Electromechanical switches for setting or display
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G04HOROLOGY
    • G04GELECTRONIC TIME-PIECES
    • G04G21/00Input or output devices integrated in time-pieces
    • GPHYSICS
    • G04HOROLOGY
    • G04BMECHANICALLY-DRIVEN CLOCKS OR WATCHES; MECHANICAL PARTS OF CLOCKS OR WATCHES IN GENERAL; TIME PIECES USING THE POSITION OF THE SUN, MOON OR STARS
    • G04B19/00Indicating the time by visual means
    • G04B19/22Arrangements for indicating different local apparent times; Universal time pieces
    • G04B19/223Arrangements for indicating different local apparent times; Universal time pieces with rotary disc, rotary bezel, or rotary dial
    • GPHYSICS
    • G04HOROLOGY
    • G04BMECHANICALLY-DRIVEN CLOCKS OR WATCHES; MECHANICAL PARTS OF CLOCKS OR WATCHES IN GENERAL; TIME PIECES USING THE POSITION OF THE SUN, MOON OR STARS
    • G04B19/00Indicating the time by visual means
    • G04B19/28Adjustable guide marks or pointers for indicating determined points of time
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0362Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of 1D translations or rotations of an operating part of the device, e.g. scroll wheels, sliders, knobs, rollers or belts
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/038Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/006Alarm destination chosen according to type of event, e.g. in case of fire phone the fire service, in case of medical emergency phone the ambulance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/33Security of mobile devices; Security of mobile applications using wearable devices, e.g. using a smartwatch or smart-glasses
    • H04W4/008
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/038Indexing scheme relating to G06F3/038
    • G06F2203/0384Wireless input, i.e. hardware and software details of wireless interface arrangements for pointing devices
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • the present disclosure relates in to a system and method of a security hub utilizing near field communication (NFC) to onboard sensors.
  • NFC near field communication
  • a security hub system may include one or more of a control panel and a plurality of sensors (e.g., a security camera, a motion sensor, and a contact).
  • sensors e.g., a security camera, a motion sensor, and a contact.
  • a security hub includes a near field communication (NFC) interface, a communications interface, and a computer processor.
  • the NFC interface is configured to detect an NFC-enabled sensor.
  • the communications interface is configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device.
  • the computer processor is operatively connected to the NFC interface and the communications interface and configured to: onboard the NFC-enabled sensor, analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information.
  • a method of connecting an NFC-enabled sensor to a security hub comprises: detecting the NFC-enabled sensor via a near field communication (NFC) interface of the security hub; establishing communication with the NFC-enabled sensor, a communications network, and an electronic device via a communications interface of security hub; onboarding the NFC-enabled sensor; and receiving detection information from the NFC-enabled sensor.
  • NFC near field communication
  • FIG. 1 is a block diagram depicting an implementation of a security hub that utilizes NFC for onboarding sensors, according to an example embodiment of the disclosure.
  • FIG. 2 shows an example user interface of an application displaying a connection status of between a security hub and a communications network, according to an example embodiment of the present disclosure.
  • FIG. 3 shows an example user interface of an application displaying diagrammatic instructions for connecting sensors to the security hub using NFC, according to an example embodiment of the present disclosure.
  • FIG. 4 shows an example user interface of an application displaying diagrammatic instructions for testing connected sensors, according to an example embodiment of the present disclosure.
  • FIG. 5 shows an example user interface of an application displaying the location, type, and installation status of connected NFC-enabled sensors, according to an example embodiment of the present disclosure.
  • FIG. 6 shows a flowchart of high-level operations of a security hub that utilizes NFC to onboard sensors, according to an example embodiment of the present disclosure.
  • FIG. 7 illustrates an example computer architecture that may be used to implement embodiments of the present disclosure, for example, the security hub.
  • Embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub.
  • a communications network e.g., Wi-Fi
  • NFC is a set of communications protocols that enable two devices, such as the security hub and a sensor, to establish communication by bringing them within a certain range (e.g., 4 cm) of each other.
  • FIG. 1 is a block diagram depicting an implementation of a security hub that utilizes NFC for onboarding sensors, according to an example embodiment of the disclosure.
  • a security hub 100 includes an NFC interface 101 , a communications interface 102 , and a computer processor 103 (although only three components of the security hub are shown, the security hub of the present disclosure are not limited thereto).
  • the NFC interface 101 is configured to detect one or more NFC-enabled sensors.
  • the NFC interface 101 may utilize the Thread network protocol.
  • the communications interface 102 is configured to establish communication with NFC-enabled sensors 111 , 112 , and 113 , which have already gone through the onboarding process.
  • the communications interface 102 is also configured to establish communication with a communications network 120 (e.g., the Internet) and an electronic device 300 (e.g., a smart phone, a tablet).
  • a communications network 120 e.g., the Internet
  • an electronic device 300 e.g., a smart phone, a tablet.
  • the computer processor 103 is configured to onboard the detected NFC-enabled sensor. Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information.
  • the computer processor 103 is also configured to analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information. For example, the computer processor may trigger an alarm in response to determining that there is a high security threat.
  • the electronic device 300 may execute and run an application that enables a user to interact with and/or control the security hub 100 .
  • the application may provide a user interface that enables the user to provide information (e.g., login information, a Wi-Fi router password) to the security hub 100 for connecting to the communications network 120 .
  • the user interface may also displays the connection status between the security hub 100 and the communications network 120 , such as shown in FIG. 2 .
  • the application may also provide a user interface that shows step-by-step instructions on how to onboard an NFC-enabled sensor 115 with the security hub 100 , such as shown in FIG. 3 , and/or how to connect the security hub 100 to the communications network 120 .
  • the application may also provide a user interface that enables the user to test the operation and/or connectivity of connected NFC-enabled sensors, such as shown in FIG. 4 .
  • the instructions may include diagrammatic instructions.
  • the present system and method allow an NFC-enabled sensor (e.g., a contact sensor) to be onboarded with a security hub when the NFC-enabled sensor is brought within contact or within close proximity (e.g., within 4 centimeters (cm)) of the security hub, such as illustrated by the instructions of FIG. 3 .
  • the security hub may receive information used for onboarding the NFC-enabled sensor entirely from the NFC-enabled sensor through its NFC interface. That is, the onboarding process between an NFC-enabled sensor and the security hub may be performed entirely without the aid of an electronic device, such as a smart phone, or an application running on the electronic device.
  • the user interface may also display a connection status between the NFC-enabled sensor and the security hub.
  • the present system and method allow the user to test an NFC-enabled sensor after it has been onboarded with the security hub.
  • FIG. 4 shows an example user interface including diagrammatic instructions for testing connected sensors, according to an example embodiment of the present disclosure.
  • the user interface may instruct the user to place two contact parts of the sensor in contact with each other.
  • the user interface may also provide an indication of whether contact sensor is connected and operating properly, for example, by displaying a message with the text “safe.”
  • FIG. 5 shows an example user interface of an application displaying the location, type, and installation status of connected NFC-enabled sensors, according to an example embodiment of the present disclosure.
  • the user interface of the application displays a type of each of the listed sensors, along with corresponding locations where the sensors are installed.
  • the user interface also allows the user to test a working status of each of the listed sensors at each installed location.
  • the user interface further indicates an installation status (e.g., just added) of a sensor, for example, if the sensor was installed within a pre-defined period of time (e.g., previous 10 minutes).
  • FIG. 6 shows a flowchart of high-level operations of a security hub that utilizes NFC to onboard sensors, according to an example embodiment of the present disclosure.
  • a security hub that utilizes NFC to onboard sensors
  • the NFC interface of the security hub detects an NFC-enabled sensor (at 601 ).
  • the computer processor of the security hub onboards the NFC-enabled sensor (at 602 ). Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information.
  • the communications interface of the security hub establishes communication with the NFC-enabled sensor (at 603 ). For example, if the computer processor determines (at 603 ) that NFC-enabled sensor transmits detection information using Zigbee, the communications interface may establish communication with the NFC-enabled sensor using Zigbee.
  • embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub.
  • a communications network e.g., Wi-Fi
  • FIG. 7 illustrates an example computer architecture that may be used to implement embodiments of the present system and method.
  • the example computer architecture may be used for implementing one or more components described in the present disclosure including, but not limited to, the security hub.
  • One embodiment of architecture 700 comprises a system bus 720 for communicating information, and a processor 710 coupled to bus 720 for processing information.
  • Architecture 700 further comprises a random access memory (RAM) or other dynamic storage device 725 (referred to herein as main memory), coupled to bus 720 for storing information and instructions to be executed by processor 710 .
  • Main memory 725 also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 710 .
  • Architecture 700 may also include a read only memory (ROM) and/or other static storage device 726 coupled to bus 720 for storing static information and instructions used by processor 710 .
  • ROM read only memory
  • a data storage device 721 such as a magnetic disk or optical disc and its corresponding drive may also be coupled to architecture 700 for storing information and instructions.
  • Architecture 700 can also be coupled to a second I/O bus 750 via an I/O interface 730 .
  • a plurality of I/O devices may be coupled to I/O bus 750 , including a display device 743 , an input device (e.g., an alphanumeric input device 742 , a cursor control device 741 , and/or a touchscreen device).
  • the communication device 740 allows for access to other computers (e.g., servers or clients) via a network.
  • the communication device 740 may comprise one or more modems, network interface cards, wireless network interfaces or other interface devices, such as those used for coupling to Ethernet, token ring, or other types of networks.
  • the present disclosure also relates to an apparatus for performing the operations herein.
  • This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer.
  • a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk, including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Public Health (AREA)
  • Software Systems (AREA)
  • Alarm Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephonic Communication Services (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

According to an embodiment of the present disclosure, a security hub includes a near field communication (NFC) interface, a communications interface, and a computer processor. The NFC interface is configured to detect an NFC-enabled sensor. The communications interface is configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device. The computer processor is operatively connected to the NFC interface and the communications interface and configured to: onboard the NFC-enabled sensor, analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims priority to and the benefit of U.S. Provisional Patent Application No. 62/327,795, titled “SYSTEM AND METHOD FOR PROVIDING A SECURITY HUB” and filed on Apr. 26, 2016, the entire content which is incorporated herein by reference
  • RELATED FIELD
  • The present disclosure relates in to a system and method of a security hub utilizing near field communication (NFC) to onboard sensors.
  • BACKGROUND
  • A security hub system may include one or more of a control panel and a plurality of sensors (e.g., a security camera, a motion sensor, and a contact). In recent years, there is an increasing popularity for low-cost, self-built security hub systems. However, such security hub systems are typically difficult and time-consuming to install/use. Thus, in view of the foregoing, there exists a need for the presently disclosed system and method of utilizing NFC to onboard sensors.
  • SUMMARY
  • According to an embodiment of the present disclosure, a security hub includes a near field communication (NFC) interface, a communications interface, and a computer processor. The NFC interface is configured to detect an NFC-enabled sensor. The communications interface is configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device. The computer processor is operatively connected to the NFC interface and the communications interface and configured to: onboard the NFC-enabled sensor, analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information.
  • According to an embodiment of the present disclosure, a method of connecting an NFC-enabled sensor to a security hub comprises: detecting the NFC-enabled sensor via a near field communication (NFC) interface of the security hub; establishing communication with the NFC-enabled sensor, a communications network, and an electronic device via a communications interface of security hub; onboarding the NFC-enabled sensor; and receiving detection information from the NFC-enabled sensor.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The accompanying drawings, which are included as part of the present disclosure, illustrate various embodiments and together with the general description given above and the detailed description of the various embodiments given below serve to explain and teach the principles described herein.
  • FIG. 1 is a block diagram depicting an implementation of a security hub that utilizes NFC for onboarding sensors, according to an example embodiment of the disclosure.
  • FIG. 2 shows an example user interface of an application displaying a connection status of between a security hub and a communications network, according to an example embodiment of the present disclosure.
  • FIG. 3 shows an example user interface of an application displaying diagrammatic instructions for connecting sensors to the security hub using NFC, according to an example embodiment of the present disclosure.
  • FIG. 4 shows an example user interface of an application displaying diagrammatic instructions for testing connected sensors, according to an example embodiment of the present disclosure.
  • FIG. 5 shows an example user interface of an application displaying the location, type, and installation status of connected NFC-enabled sensors, according to an example embodiment of the present disclosure.
  • FIG. 6 shows a flowchart of high-level operations of a security hub that utilizes NFC to onboard sensors, according to an example embodiment of the present disclosure.
  • FIG. 7 illustrates an example computer architecture that may be used to implement embodiments of the present disclosure, for example, the security hub.
  • The figures in the drawings are not necessarily drawn to scale and elements of similar structures or functions are generally represented by like reference numerals for illustrative purposes throughout the figures. The figures are only intended to facilitate the description of the various embodiments described herein and do not describe every aspect of the teachings disclosed herein and do not limit the scope of the claims.
  • DETAILED DESCRIPTION
  • Each of the features and teachings disclosed herein may be utilized separately or in conjunction with other features and teachings to provide the present system and method. Representative examples utilizing many of these features and teachings, both separately and in combination, are described with reference to the attached figures. While the detailed description herein illustrates to a person of ordinary skill in the art further details for practicing aspects of the present teachings, it does not limit the scope of the claims. Therefore, combinations of features disclosed in the detailed description are representative examples of the present teachings and may not be necessary to practice the teachings in the broadest sense.
  • As discussed earlier, traditional security hubs are typically difficult and time-consuming to install/use. Embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub. NFC is a set of communications protocols that enable two devices, such as the security hub and a sensor, to establish communication by bringing them within a certain range (e.g., 4 cm) of each other.
  • FIG. 1 is a block diagram depicting an implementation of a security hub that utilizes NFC for onboarding sensors, according to an example embodiment of the disclosure. A security hub 100 includes an NFC interface 101, a communications interface 102, and a computer processor 103 (although only three components of the security hub are shown, the security hub of the present disclosure are not limited thereto). The NFC interface 101 is configured to detect one or more NFC-enabled sensors. The NFC interface 101 may utilize the Thread network protocol.
  • The communications interface 102 is configured to establish communication with NFC-enabled sensors 111, 112, and 113, which have already gone through the onboarding process. The communications interface 102 is also configured to establish communication with a communications network 120 (e.g., the Internet) and an electronic device 300 (e.g., a smart phone, a tablet).
  • The computer processor 103 is configured to onboard the detected NFC-enabled sensor. Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information. The computer processor 103 is also configured to analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information. For example, the computer processor may trigger an alarm in response to determining that there is a high security threat.
  • The electronic device 300 may execute and run an application that enables a user to interact with and/or control the security hub 100. For example, the application may provide a user interface that enables the user to provide information (e.g., login information, a Wi-Fi router password) to the security hub 100 for connecting to the communications network 120. The user interface may also displays the connection status between the security hub 100 and the communications network 120, such as shown in FIG. 2. The application may also provide a user interface that shows step-by-step instructions on how to onboard an NFC-enabled sensor 115 with the security hub 100, such as shown in FIG. 3, and/or how to connect the security hub 100 to the communications network 120. The application may also provide a user interface that enables the user to test the operation and/or connectivity of connected NFC-enabled sensors, such as shown in FIG. 4. The instructions may include diagrammatic instructions.
  • According to an example embodiment, the present system and method allow an NFC-enabled sensor (e.g., a contact sensor) to be onboarded with a security hub when the NFC-enabled sensor is brought within contact or within close proximity (e.g., within 4 centimeters (cm)) of the security hub, such as illustrated by the instructions of FIG. 3. The security hub may receive information used for onboarding the NFC-enabled sensor entirely from the NFC-enabled sensor through its NFC interface. That is, the onboarding process between an NFC-enabled sensor and the security hub may be performed entirely without the aid of an electronic device, such as a smart phone, or an application running on the electronic device. Although not shown in FIG. 3, the user interface may also display a connection status between the NFC-enabled sensor and the security hub.
  • According to an example embodiment, the present system and method allow the user to test an NFC-enabled sensor after it has been onboarded with the security hub. FIG. 4 shows an example user interface including diagrammatic instructions for testing connected sensors, according to an example embodiment of the present disclosure. For example, for testing a contact sensor, the user interface may instruct the user to place two contact parts of the sensor in contact with each other. The user interface may also provide an indication of whether contact sensor is connected and operating properly, for example, by displaying a message with the text “safe.”
  • FIG. 5 shows an example user interface of an application displaying the location, type, and installation status of connected NFC-enabled sensors, according to an example embodiment of the present disclosure. After the user installs one or more sensors at various locations, the user interface of the application displays a type of each of the listed sensors, along with corresponding locations where the sensors are installed. The user interface also allows the user to test a working status of each of the listed sensors at each installed location. In one embodiment, the user interface further indicates an installation status (e.g., just added) of a sensor, for example, if the sensor was installed within a pre-defined period of time (e.g., previous 10 minutes).
  • FIG. 6 shows a flowchart of high-level operations of a security hub that utilizes NFC to onboard sensors, according to an example embodiment of the present disclosure. Although one or more components of the security hub are described below as performing the disclosed operations, the present system and method are not limited thereto, and other components of the security hub may perform those operations instead or in conjunction.
  • The NFC interface of the security hub detects an NFC-enabled sensor (at 601). The computer processor of the security hub onboards the NFC-enabled sensor (at 602). Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information. The communications interface of the security hub establishes communication with the NFC-enabled sensor (at 603). For example, if the computer processor determines (at 603) that NFC-enabled sensor transmits detection information using Zigbee, the communications interface may establish communication with the NFC-enabled sensor using Zigbee.
  • Accordingly, in view of the foregoing, embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub.
  • FIG. 7 illustrates an example computer architecture that may be used to implement embodiments of the present system and method. The example computer architecture may be used for implementing one or more components described in the present disclosure including, but not limited to, the security hub. One embodiment of architecture 700 comprises a system bus 720 for communicating information, and a processor 710 coupled to bus 720 for processing information. Architecture 700 further comprises a random access memory (RAM) or other dynamic storage device 725 (referred to herein as main memory), coupled to bus 720 for storing information and instructions to be executed by processor 710. Main memory 725 also may be used for storing temporary variables or other intermediate information during execution of instructions by processor 710. Architecture 700 may also include a read only memory (ROM) and/or other static storage device 726 coupled to bus 720 for storing static information and instructions used by processor 710.
  • A data storage device 721 such as a magnetic disk or optical disc and its corresponding drive may also be coupled to architecture 700 for storing information and instructions. Architecture 700 can also be coupled to a second I/O bus 750 via an I/O interface 730. A plurality of I/O devices may be coupled to I/O bus 750, including a display device 743, an input device (e.g., an alphanumeric input device 742, a cursor control device 741, and/or a touchscreen device).
  • The communication device 740 allows for access to other computers (e.g., servers or clients) via a network. The communication device 740 may comprise one or more modems, network interface cards, wireless network interfaces or other interface devices, such as those used for coupling to Ethernet, token ring, or other types of networks.
  • Some portions of the detailed description herein are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
  • It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the below discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
  • The present disclosure also relates to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk, including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
  • The algorithms presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems, messaging servers, or personal computers may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the required method steps. The required structure for a variety of these systems appears in the description above. A variety of programming languages may be used to implement the teachings of the disclosure as described herein.
  • Moreover, the various features of the representative examples and the dependent claims may be combined in ways that are not specifically and explicitly enumerated in order to provide additional embodiments of the present teachings. The dimensions and the shapes of the components shown in the figures are designed to help understand how the present teachings are practiced and do limit the dimensions and the shapes shown in the examples.

Claims (20)

What is claimed is:
1. A security hub comprising:
a near field communication (NFC) interface configured to detect an NFC-enabled sensor;
a communications interface configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device; and
a computer processor operatively connected to the NFC interface and the communications interface and configured to:
onboard the NFC-enabled sensor;
analyze detection information received from the NFC-enabled sensor, and
perform an action in response to the analysis of the detection information.
2. The security hub of claim 1, wherein to onboard the NFC-enabled sensor includes registering the NFC-enabled sensor and determining a communications protocol of the NFC-enabled sensor through which detection information is transmitted.
3. The security hub of claim 2, wherein information used for onboarding the NFC-enabled sensor is received entirely from the NFC-enabled sensor through the NFC interface.
4. The security hub of claim 3, wherein the NFC interface utilizes the Thread network protocol.
5. The security hub of claim 1, further comprising an application running on the electronic device.
6. The security hub of claim 5, wherein the application displays diagrammatic instructions for connecting the security hub to the communications network.
7. The security hub of claim 5, wherein the application displays diagrammatic instructions for connecting the NFC-enabled sensor to security hub.
8. The security hub of claim 5, wherein the application displays diagrammatic instructions for testing the operations of the NFC-enabled sensor.
9. The security hub of claim 8, wherein the application displays an indication of whether the NFC-enabled sensor is connected and operating properly.
10. The security hub of claim 5, wherein the application displays the location and installation status of the NFC-enabled sensor.
11. A method of connecting an NFC-enabled sensor to a security hub, the method comprising:
detecting the NFC-enabled sensor via a near field communication (NFC) interface of the security hub;
establishing communication with the NFC-enabled sensor, a communications network, and an electronic device via a communications interface of security hub;
onboarding the NFC-enabled sensor; and
receiving detection information from the NFC-enabled sensor.
12. The method of claim 11, wherein onboarding the NFC-enabled sensor includes registering the NFC-enabled sensor and determining a communications protocol of the NFC-enabled sensor through which detection information is transmitted.
13. The method of claim 12, wherein information used for onboarding the NFC-enabled sensor is received entirely from the NFC-enabled sensor through the NFC interface.
14. The method of claim 13, wherein the NFC interface utilizes the Thread network protocol.
15. The method of claim 11, further comprising communicating with an application running on the electronic device.
16. The method of claim 15, further comprising instructing the application to display diagrammatic instructions for connecting the security hub to the communications network.
17. The method of claim 15, further comprising instructing the application to display diagrammatic instructions for connecting the NFC-enabled sensor to security hub.
18. The method of claim 15, further comprising instructing the application to display diagrammatic instructions for testing the operations of the NFC-enabled sensor.
19. The method of claim 18, further comprising instructing the application to display an indication of whether the NFC-enabled sensor is connected and operating properly.
20. The method of claim 15, further comprising instructing the application to display the location and installation status of the NFC-enabled sensor.
US15/346,652 2016-04-26 2016-11-08 Security hub utilizing near field communication to onboard sensors Abandoned US20170311154A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/346,652 US20170311154A1 (en) 2016-04-26 2016-11-08 Security hub utilizing near field communication to onboard sensors

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201662327795P 2016-04-26 2016-04-26
US15/346,652 US20170311154A1 (en) 2016-04-26 2016-11-08 Security hub utilizing near field communication to onboard sensors

Publications (1)

Publication Number Publication Date
US20170311154A1 true US20170311154A1 (en) 2017-10-26

Family

ID=60089566

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/346,652 Abandoned US20170311154A1 (en) 2016-04-26 2016-11-08 Security hub utilizing near field communication to onboard sensors
US15/346,644 Expired - Fee Related US10061273B2 (en) 2016-04-26 2016-11-08 Intelligent security hub for providing smart alerts
US15/354,689 Active US10209677B2 (en) 2016-04-26 2016-11-17 System and method of user input utilizing a rotatable part

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/346,644 Expired - Fee Related US10061273B2 (en) 2016-04-26 2016-11-08 Intelligent security hub for providing smart alerts
US15/354,689 Active US10209677B2 (en) 2016-04-26 2016-11-17 System and method of user input utilizing a rotatable part

Country Status (2)

Country Link
US (3) US20170311154A1 (en)
KR (2) KR20170122107A (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102576802B1 (en) * 2017-02-24 2023-09-12 삼성디스플레이 주식회사 Smart watch and a method for unlocking the same
US20190146441A1 (en) * 2017-11-16 2019-05-16 Associated Materials, Llc Methods and systems for home automation using an internet of things platform
US10802598B2 (en) * 2018-08-05 2020-10-13 Pison Technology, Inc. User interface control of responsive devices
US11099647B2 (en) 2018-08-05 2021-08-24 Pison Technology, Inc. User interface control of responsive devices
US10847018B2 (en) 2018-08-31 2020-11-24 Nortek Security & Control Llc Community-based security system
US11157086B2 (en) 2020-01-28 2021-10-26 Pison Technology, Inc. Determining a geographical location based on human gestures
US11199908B2 (en) 2020-01-28 2021-12-14 Pison Technology, Inc. Wrist-worn device-based inputs for an operating system
CN111736450B (en) * 2020-06-28 2021-07-27 江苏乐芯智能科技有限公司 Intelligent watch

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170195325A1 (en) * 2016-01-05 2017-07-06 Xevo Inc. Connection management of smart devices with automobile head unit

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5576972A (en) 1992-05-08 1996-11-19 Harrison; Dana C. Intelligent area monitoring system
US5517429A (en) 1992-05-08 1996-05-14 Harrison; Dana C. Intelligent area monitoring system
US6166633A (en) 1999-05-21 2000-12-26 Wang; Randall Process for reducing motion-type false alarm of security alarm system with self-analyzing and self-adjusting control
US20020101457A1 (en) * 2001-01-31 2002-08-01 Microsoft Corporation Bezel interface for small computing devices
US7113090B1 (en) * 2001-04-24 2006-09-26 Alarm.Com Incorporated System and method for connecting security systems to a wireless device
US7330768B2 (en) * 2003-01-28 2008-02-12 Fisher-Rosemount Systems, Inc. Integrated configuration in a process plant having a process control system and a safety system
US7323978B2 (en) 2005-02-16 2008-01-29 Ee Systems Group Inc. False alarm reduction method and system
US20060232673A1 (en) 2005-04-19 2006-10-19 Objectvideo, Inc. Video-based human verification system and method
US8704668B1 (en) 2005-04-20 2014-04-22 Trevor Darrell System for monitoring and alerting based on animal behavior in designated environments
US7893960B1 (en) 2006-04-05 2011-02-22 Wallach Morton L Smart sensors for perimeter and border security
US20110106736A1 (en) 2008-06-26 2011-05-05 Intuitive User Interfaces Ltd. System and method for intuitive user interaction
US9030404B2 (en) 2009-07-23 2015-05-12 Qualcomm Incorporated Method and apparatus for distributed user interfaces using wearable devices to control mobile and consumer electronic devices
US8810408B2 (en) * 2011-04-04 2014-08-19 Alarm.Com Incorporated Medication management and reporting technology
US9176485B2 (en) * 2011-06-02 2015-11-03 Microsoft Technology Licensing, Llc Occupancy prediction using historical occupancy patterns
DE102012020817A1 (en) * 2012-03-13 2013-09-19 Hannes Bonhoff Method for entering a password and computer program product
US10185416B2 (en) 2012-11-20 2019-01-22 Samsung Electronics Co., Ltd. User gesture input to wearable electronic device involving movement of device
US9049168B2 (en) 2013-01-11 2015-06-02 State Farm Mutual Automobile Insurance Company Home sensor data gathering for neighbor notification purposes
JP6293259B2 (en) 2013-04-01 2018-03-14 杭州惠道科技有限公司Hangzhou Kind−Tao Technologies Co., Ltd. Smart watch
US20150098309A1 (en) 2013-08-15 2015-04-09 I.Am.Plus, Llc Multi-media wireless watch
US9183712B2 (en) 2013-10-10 2015-11-10 Time Warner Cable Enterprises Llc Security system and alarm activation control
US20150102924A1 (en) * 2013-10-15 2015-04-16 Richard L. Soloway Volume/Vibrate Overriding Feature Of Alert System For Mobile Devices
US8779919B1 (en) 2013-11-03 2014-07-15 Instant Care, Inc. Event communication apparatus and method
US20150134954A1 (en) 2013-11-14 2015-05-14 Broadcom Corporation Sensor management system in an iot network
US20150145653A1 (en) 2013-11-25 2015-05-28 Invensense, Inc. Device control using a wearable device
KR102114616B1 (en) 2013-12-06 2020-05-25 엘지전자 주식회사 Smart Watch and Method for controlling thereof
US9898175B2 (en) 2014-08-05 2018-02-20 Fibar Group S.A. Home network manager for home automation
US9785123B2 (en) 2014-09-26 2017-10-10 Intel Corporation Digital analog display with rotating bezel

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170195325A1 (en) * 2016-01-05 2017-07-06 Xevo Inc. Connection management of smart devices with automobile head unit

Also Published As

Publication number Publication date
US20170309157A1 (en) 2017-10-26
US20170308040A1 (en) 2017-10-26
KR20170122107A (en) 2017-11-03
US10061273B2 (en) 2018-08-28
KR20170122114A (en) 2017-11-03
US10209677B2 (en) 2019-02-19

Similar Documents

Publication Publication Date Title
US20170311154A1 (en) Security hub utilizing near field communication to onboard sensors
US10635809B2 (en) Authenticating application legitimacy
EP3575975B1 (en) Method and apparatus for operating smart network interface card
CN105934912B (en) Authentication system and method
US10142352B2 (en) Configuration management for virtual machine environment
US20140317708A1 (en) Login via near field communication with automatically generated login information
US9503965B2 (en) Set-top box setup via near field communication
US20110241823A1 (en) Tag-based personalization
US20150146706A1 (en) Remotely Provisioning And Operating A Headless WIFI Device
US11237636B2 (en) System and method for network configuration and behavior control by proximity enabled devices
US10171519B2 (en) Session transfer protocol between different browsers on different devices
US11301313B2 (en) Collaborative application testing
US20170339559A1 (en) Over-the-air personalization of network devices
EP3007066A1 (en) Method for using shared device in apparatus capable of operating two operating systems
ES2785048T3 (en) Automatic connection to an online service
WO2017054307A1 (en) Recognition method and apparatus for user information
US20180247060A1 (en) Detecting security vulnerabilities on computing devices
CN103902882B (en) A kind of prevent user profile from leaking terminal and method
KR20160099193A (en) System and method of identifying position of mobile device based on near field communication device
TW201919020A (en) System and method for conducting a secured computer based candidate assessment and non-transitory computer readable medium perform the method
JP6710762B2 (en) Terminal control apparatus and method using notification message
CN104660480B (en) A kind of method, apparatus and system of account number abnormality processing
US20160014207A1 (en) Chipset For Cellular M2M Communications
KR20240086238A (en) Service providing apparatus and method for detecting fire at construction site based on image, and fire monitoring system including the same and non-transitory computer readable medium having computer program recorded thereon
CN115600213A (en) Vulnerability management method, device, medium and equipment based on application program

Legal Events

Date Code Title Description
AS Assignment

Owner name: SAMSUNG ELECTRONICS CO., LTD., KOREA, REPUBLIC OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NANDANAVANAM, VENKATA NAGA VAMSI;CHUI, KENNY;REEL/FRAME:040326/0629

Effective date: 20161108

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION