Secure fire/security/sensor transmitter system
First Claim
1. The method of programming a sensor in a secure manner, comprising the steps of:
- a. providing a programming station containing in memory sensor identification and function information comprising programming data bits, said programming station further containing in memory a scrambling algorithm;
b. providing an sensor containing in memory a scrambling algorithm identical to said programming station scrambling algorithm;
c. said programming station applying said scrambling algorithm to said programming data bits, producing security/randomization bits which are appended to said programming data bits, forming an outgoing programming message having programming data bits and appended security bits;
d. transferring said outgoing programming message from said programming station to said sensor, forming an incoming programming message to said sensor;
e. said sensor applying said scrambling algorithm in said memory to said incoming data bits in said incoming programming message, providing a scrambling result;
g. comparing said scrambling result to the security bits appended to said programming data bits in said incoming programming message;
h. upon a correct match of said scrambling result with said security bits, said transmitter accepting said programming data bits in said incoming programming message as from a valid, secure programmer;
g. programming said programming station sending a coded JAM command to said sensor, said sensor comparing said JAM command to said programming message and, upon verifying a match, said sensor permanently latching said jam command into a flip-flop in such a manner as to logically disconnect the programming connection so that future incoming programming command will be ignored.
27 Assignments
0 Petitions
Accused Products
Abstract
A system for preventing unauthorized access to the programming and control features of a fire/security/control systems remote sensors. The exemplary embodiment of the present invention utilizes an association of transmitter identity/address with a central processor/control fire/security data base, which in turn is configured to securely program each transmitter with its location and function, or "personality". The various, individual sensors and central processor/control unit communicate individually via individual, repeatable pseudo randomization algorithms, producing a several bit result. The communicating central processor/control and each sensor must have a match on outgoing/incoming code before the transmitting sensor will accept the programming on its personality. The exemplary embodiment of the present invention also utilizes a randomization seed, which can altered occasionally, to further increase security.
94 Citations
38 Claims
-
1. The method of programming a sensor in a secure manner, comprising the steps of:
-
a. providing a programming station containing in memory sensor identification and function information comprising programming data bits, said programming station further containing in memory a scrambling algorithm; b. providing an sensor containing in memory a scrambling algorithm identical to said programming station scrambling algorithm; c. said programming station applying said scrambling algorithm to said programming data bits, producing security/randomization bits which are appended to said programming data bits, forming an outgoing programming message having programming data bits and appended security bits; d. transferring said outgoing programming message from said programming station to said sensor, forming an incoming programming message to said sensor; e. said sensor applying said scrambling algorithm in said memory to said incoming data bits in said incoming programming message, providing a scrambling result; g. comparing said scrambling result to the security bits appended to said programming data bits in said incoming programming message; h. upon a correct match of said scrambling result with said security bits, said transmitter accepting said programming data bits in said incoming programming message as from a valid, secure programmer; g. programming said programming station sending a coded JAM command to said sensor, said sensor comparing said JAM command to said programming message and, upon verifying a match, said sensor permanently latching said jam command into a flip-flop in such a manner as to logically disconnect the programming connection so that future incoming programming command will be ignored. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. The method of programming a sensor in a secure manner, comprising the steps of:
-
a. providing a programming station containing in memory sensor identification and function information comprising programming data bits, said programming station further containing in memory a scrambling algorithm; b. providing an sensor containing in memory a scrambling algorithm identical to said programming station scrambling algorithm; c. said programming station applying said scrambling algorithm to said programming data bits, producing security/randomization bits which are appended to said programming data bits, forming an outgoing programming message having programming data bits and appended security bits; d. transferring said outgoing programming message from said programming station to said sensor, forming an incoming programming message to said sensor; e. said sensor applying said scrambling algorithm in said memory to said incoming data bits in said incoming programming message, providing a scrambling result; g. comparing said scrambling result to the security bits appended to said programming data bits in said incoming programming message; h. upon a correct match of said scrambling result with said security bits, said transmitter accepting said programming data bits in said incoming programming message as from a valid, secure programmer; g. said programming station sending a coded JAM command to said sensor, said sensor comparing said JAM command compared to the incoming programming message and, upon verifying a match, said sensor initiating a means to disconnect the programming connection, preventing further programming of said sensor. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. The method of programming a sensor in a secure manner, comprising the steps of:
-
a. providing sensor identification and function information comprising programming data bits; b. applying a scrambling algorithm to said programming data bits, producing security/randomization bits, appending said security/randomization bits to said programming data bits, forming a programming message having programming data bits and security bits; c. providing an sensor containing in memory a scrambling algorithm identical to said scrambling algorithm in step "b"; d. transferring said programming message to said sensor, forming an incoming programming message to said sensor; e. said sensor applying said scrambling algorithm in said memory to said incoming programming data bits in said incoming programming message, providing a scrambling result; g. comparing said scrambling result to the security bits appended to said programming data; h. upon a correct match of said scrambling result with said security bits, said transmitter accepting said data bits in said incoming programming message as from a valid, secure programmer, i. sending a coded JAM command to said sensor, said sensor comparing said JAM command with said programming message and, upon verifying a match, said sensor permanently latching said jam command into a flip-flop in such a manner as to logically disconnect the programming connection so that future incoming programming command will be ignored. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. The method of programming a sensor in a secure manner, comprising the steps of:
-
a. providing sensor identification and function information comprising programming data bits; b. applying a scrambling algorithm to said programming data bits, producing security/randomization bits, appending said security/randomization bits to said programming data bits, forming a programming message having programming data bits and security bits; c. providing an sensor containing in memory a scrambling algorithm identical to said scrambling algorithm in step "b"; d. transferring said programming message to said sensor, forming an incoming programming message to said sensor; e. said sensor applying said scrambling algorithm in said memory to said incoming programming data bits in said incoming programming message, providing a scrambling result; g. comparing said scrambling result to the security bits appended to said programming data; h. upon a correct match of said scrambling result with said security bits, said transmitter accepting said data bits in said incoming programming message as from a valid, secure programmer, i. sending a coded JAM command to said sensor, said sensor comparing said JAM command with said programming message and, upon verifying a match, said sensor initiating a means to disconnect the programming connection, preventing further programming of said sensor. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method of programming a sensor transmitter in a secure fashion, comprising the steps of:
-
a. placing a transmitter within a reception range of a receiver; b. said receiver being set into a mode by which it can accept programming data via transmitted programming information from said transmitter; c. providing secure programming means for preventing unauthorized programming of said transmitter; d. said transmitter having a random number generator means for generating random numbers; e. placing said transmitter in a programming mode, selectively generating a security/randomization bit for said transmitter by initiating said random number generator means, and designating said random number generated as said security/randomization bit, and transmitting said bit to said receiver as a programming message indicating a proposed device ID/address; f. said receiver imputing said programming message and determining if said programming message corresponds to a preexisting device ID/address;
wherein,g. if said programming message is acceptable, utilizing said programming message to provide a new device ID/address; h. if said proposed device ID/address in said programming message is not acceptable, an appropriate indication is so made; i. step e is repeated until step g is met, once met the transmitter is removed from said programming mode. - View Dependent Claims (34, 35, 36, 37, 38)
-
Specification