Broadcast encryption based security system
First Claim
1. A security system, comprising:
- a plurality of security components associated with physical assets of a facility;
a cluster that hinds the plurality of physical components into a secure configuration for the protection of the physical assets; and
logic for;
transmitting, using broadcast encryption, an encrypted message between a first component and second component of the physical components;
decrypting the encrypted message text to produce a decrypted text message; and
executing a command transmitted in the decrypted message on the second component.
20 Assignments
0 Petitions
Accused Products
Abstract
Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
-
Citations
20 Claims
-
1. A security system, comprising:
-
a plurality of security components associated with physical assets of a facility; a cluster that hinds the plurality of physical components into a secure configuration for the protection of the physical assets; and logic for; transmitting, using broadcast encryption, an encrypted message between a first component and second component of the physical components; decrypting the encrypted message text to produce a decrypted text message; and executing a command transmitted in the decrypted message on the second component. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
grouping a plurality of security components associated with physical assets of a facility into a cluster that binds the plurality of components into a secure configuration for the protection of the physical assets; transmitting an encrypted message from a first component of the plurality of security components to a second component of the plurality of security components, wherein the transmitting of the encrypted message is via broadcast encryption; decrypting, the encrypted message to produce a decrypted message; and executing a command transmitted in the decrypted message on the second component. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer programming product, comprising:
- a non-transitory computer-readable storage medium; and
logic stored on the non-transitory computer-readable storage medium for execution on a processor, for;
grouping a plurality of security components associated with physical assets of a facility into a cluster that binds the plurality of components into a secure configuration for the protection of the physical assets;
transmitting, via broadcast encryption, an encrypted message from a first component of the plurality of security components to a second component of the plurality of security components;
decrypting, at the second component, the encrypted message to produce a decrypted message; and
executing a command transmitted in the decrypted message on the second component. - View Dependent Claims (16, 17, 18, 19, 20)
- a non-transitory computer-readable storage medium; and
Specification