Broadcast encryption based home security system
First Claim
1. A security system, comprising:
- a plurality of security components;
a cluster that binds the plurality of components into a secure configuration;
a plurality of messages, each message comprising;
an encrypted message text;
a key management block (KMB); and
an encrypted title key (ETk);
logic for transmitting the encrypted message text, the KMB and the ETk among the security components; and
logic for decrypting the encrypted message text using the KMB and the ETk.
23 Assignments
0 Petitions
Accused Products
Abstract
Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
29 Citations
20 Claims
-
1. A security system, comprising:
-
a plurality of security components;
a cluster that binds the plurality of components into a secure configuration;
a plurality of messages, each message comprising;
an encrypted message text;
a key management block (KMB); and
an encrypted title key (ETk);
logic for transmitting the encrypted message text, the KMB and the ETk among the security components; and
logic for decrypting the encrypted message text using the KMB and the ETk. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for delivery of a security service, comprising:
-
organizing a plurality of security components into a cluster that binds the plurality of components into a secure configuration;
creating a message that incorporates an encrypted message text, a key management block (KMB), and an encrypted title key (ETk);
transmitting the encrypted message text, the KMB and the ETk among the security components; and
decrypting the encrypted message text using the KMB and the ETk. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for providing security to a home or business, comprising:
-
grouping a plurality of security components into a cluster that binds the plurality of components into a secure configuration;
generating a message, wherein the message includes an encrypted message text, a key management block (KMB), and an encrypted title key (ETk);
transmitting the encrypted message text, the KMB and the ETk between two of the security components;
decrypting the encrypted message text using the KMB and the ETk to produce a decrypted message; and
controlling the component receiving the encrypted based upon the decrypted message. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification