Secure key fob
First Claim
Patent Images
1. A computer-implemented method for operating a security system, comprising:
- receiving at a receiving unit a protected signal sent from a portable transmitter, the receiving unit in communication with a security system panel, wherein the protected signal comprises an authentication signal having a secret;
assessing at least one characteristic of the protected signal;
modifying at least one characteristic of the protected signal based at least in part on the assessing, wherein modifying the protected signal comprises authenticating the authentication signal, and wherein the authentication signal comprises a hash;
comparing, at the receiving unit, the protected signal to a stored signal after the modifying, wherein comparing the protected signal to the stored signal comprises determining whether at least one packet of the protected signal is valid; and
transmitting, to the portable transmitter, an indication of whether the protected signal is valid based at least in part on comparing the protected signal to the stored signal, wherein the indication comprises a signal to enter a security mode based at least in part on determining that the at least one packet of the protected signal is invalid.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems, apparatuses, and methods relating to operating a security system are described. In one embodiment a method may include receiving at a receiving unit a protected signal sent from a portable transmitter, the receiving unit in communication with a security system panel, assessing at least one characteristic of the protected signal, modifying at least one characteristic of the protected signal based at least in part on the assessing, and comparing the protected signal to a stored signal after the modifying.
24 Citations
25 Claims
-
1. A computer-implemented method for operating a security system, comprising:
-
receiving at a receiving unit a protected signal sent from a portable transmitter, the receiving unit in communication with a security system panel, wherein the protected signal comprises an authentication signal having a secret; assessing at least one characteristic of the protected signal; modifying at least one characteristic of the protected signal based at least in part on the assessing, wherein modifying the protected signal comprises authenticating the authentication signal, and wherein the authentication signal comprises a hash; comparing, at the receiving unit, the protected signal to a stored signal after the modifying, wherein comparing the protected signal to the stored signal comprises determining whether at least one packet of the protected signal is valid; and transmitting, to the portable transmitter, an indication of whether the protected signal is valid based at least in part on comparing the protected signal to the stored signal, wherein the indication comprises a signal to enter a security mode based at least in part on determining that the at least one packet of the protected signal is invalid. - View Dependent Claims (2, 3, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
4. A computer-implemented method for operating a security system, comprising:
-
receiving at a receiving unit a protected signal sent from a portable transmitter, the receiving unit in communication with a security system panel, wherein the protected signal comprises an authentication signal having a secret, wherein the protected signal further comprises an encrypted signal, and wherein the encrypted signal comprises at least a portion of the authentication signal; assessing at least one characteristic of the protected signal; modifying at least one characteristic of the protected signal based at least in part on the assessing; comparing, at the receiving unit, the protected signal to a stored signal after the modifying, wherein comparing the protected signal to the stored signal comprises determining whether at least one packet of the protected signal is valid; and transmitting, to the portable transmitter, an indication of whether the protected signal is valid based at least in part on comparing the protected signal to the stored signal, wherein the indication comprises a signal to enter a security mode based at least in part on determining that the at least one packet of the protected signal is invalid. - View Dependent Claims (5)
-
-
16. An apparatus for operating a security system, comprising:
-
a receiving unit having a receiver in communication with a security system panel; at least one processor; memory in electronic communication with the at least one processor; and instructions stored in the memory, the instructions being executable by the at least one processor to; receive at the receiving unit a protected signal sent from a portable transmitter, wherein the protected signal comprises an authentication signal having a secret; assess at least one characteristic of the protected signal; modify at least one characteristic of the protected signal based at least in part on the assessing, wherein the modification of the protected signal comprises authenticating the authentication signal, and wherein the authentication signal comprises a hash; compare, at the receiving unit, the protected signal to a stored signal after the modifying, wherein comparing the protected signal to the stored signal comprises determining whether at least one packet of the protected signal is valid; and transmit, to the portable transmitter, an indication of whether the protected signal is valid based at least in part on comparing the protected signal to the stored signal, wherein the indication comprises a signal to enter a security mode based at least in part on determining that the at least one packet of the protected signal is invalid. - View Dependent Claims (19, 20, 21, 22, 23)
-
-
17. A non-transitory computer-readable storage medium storing computer executable instructions that when executed by a processor cause the processor to:
-
receive at a receiving unit a protected signal sent from a portable transmitter, wherein the protected signal comprises an authentication signal having a secret; assess at least one characteristic of the protected signal; modify at least one characteristic of the protected signal based at least in part on the assessing, wherein the modification of the protected signal comprises authenticating the authentication signal, and wherein the authentication signal comprises a hash; compare, at the receiving unit, the protected signal to a stored signal after the modifying, wherein comparing the protected signal to the stored signal comprises determining whether at least one packet of the protected signal is valid; and transmit, to the portable transmitter, an indication of whether the protected signal is valid based at least in part on comparing the protected signal to the stored signal, wherein the indication comprises a signal to enter a security mode based at least in part on determining that the at least one packet of the protected signal is invalid. - View Dependent Claims (18, 24, 25)
-
Specification