Anti-takeover systems and methods for network attached peripherals
First Claim
1. An automated anti-takeover method, comprising:
- establishing a data session between a peripheral device and a network;
receiving, at the peripheral device, a hint package and an anti-takeover code derived from a function seeded with a shared secret value, the hint package being received based at least in part on detection of a network inclusion event associated with the peripheral device;
storing, at the peripheral device, the hint package and the anti-takeover code;
determining whether the anti-takeover code matches a previously stored anti-takeover code; and
unhobbling the peripheral device based at least in part on determining whether the anti-takeover code matches the previously stored anti-takeover code.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. Peripheral devices may implement an anti-takeover mechanism limiting the number of available device command classes when certain handshake and verification requirements are not met. Anti-takeover peripheral devices with protection enabled may be relocated within a controller network, or in certain cases, from one controller network to another controller network when certain conditions are met. That same device may be hobbled when removed from a controller network and may remain hobbled when connected to another network that fails to meet certain conditions. Unprotection and unhobbling of a device may occur through an algorithmic mechanism using values stored on the peripheral device and the controller device for one or more of anti-takeover code generation, anti-takeover code comparison, network identification value comparison, and manufacturer identification value comparison.
26 Citations
20 Claims
-
1. An automated anti-takeover method, comprising:
-
establishing a data session between a peripheral device and a network; receiving, at the peripheral device, a hint package and an anti-takeover code derived from a function seeded with a shared secret value, the hint package being received based at least in part on detection of a network inclusion event associated with the peripheral device; storing, at the peripheral device, the hint package and the anti-takeover code; determining whether the anti-takeover code matches a previously stored anti-takeover code; and unhobbling the peripheral device based at least in part on determining whether the anti-takeover code matches the previously stored anti-takeover code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for security and/or automation systems, comprising:
-
a processor; memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to; establish a data session between a peripheral device and a network; receive, at the peripheral device, a hint package and an anti-takeover code derived from a function seeded with a shared secret value, the hint package being received based at least in part on detection of a network inclusion event associated with the peripheral device; store, at the peripheral device, the hint package and the anti-takeover code; determine whether the anti-takeover code matches a previously stored anti-takeover code; and unhobble the peripheral device based at least in part on determining whether the anti-takeover code matches the previously stored anti-takeover code. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory computer-readable medium storing computer-executable code, the code executable by a processor to:
-
establish a data session between a peripheral device and a network; receive, at the peripheral device, a hint package and an anti-takeover code derived from a function seeded with a shared secret value, the hint package being received based at least in part on detection of a network inclusion event associated with the peripheral device; store, at the peripheral device, the hint package and the anti-takeover code; determine whether the anti-takeover code matches a previously stored anti-takeover code; and unhobble the peripheral device based at least in part on determining whether the anti-takeover code matches the previously stored anti-takeover code. - View Dependent Claims (19, 20)
-
Specification