Secure mechanisms to enable mobile device communication with a security panel
First Claim
1. A method of operating a building security system, comprising the steps of:
- electronically transferring an electronic security credential from an authorizing environment to a mobile computing device;
reading and interpreting the security credential file within a software application executing on the mobile computing device;
receiving from the mobile computing device at a building security system a communication including authentication data transmitted in the electronic security credential file;
within the building security system, using the authentication data to verify that a user of the mobile computing device is authorized to communicate with the building security system; and
enabling the mobile computing device to communicate with the building security system only if the authentication data stored in the electronic security credential file has been used to verify that a user of the mobile computing device is authorized to communicate with the building security system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of arming or disarming a building security system includes transferring an electronic security credential file from an authorizing environment to a mobile computing device. The electronic security credential file is read by the mobile computing device to extract authentication data. The authentication data is transmitted from the mobile computing device and received at the building security system. Within the building security system, the authentication data is used to verify that a user of the mobile computing device is authorized to communicate with the building security system. The mobile computing device is enabled to communicate with the building security system only if the electronic security credential file has been used to verify that a user of the mobile computing device is authorized to communicate with the building security system.
-
Citations
22 Claims
-
1. A method of operating a building security system, comprising the steps of:
-
electronically transferring an electronic security credential from an authorizing environment to a mobile computing device; reading and interpreting the security credential file within a software application executing on the mobile computing device; receiving from the mobile computing device at a building security system a communication including authentication data transmitted in the electronic security credential file; within the building security system, using the authentication data to verify that a user of the mobile computing device is authorized to communicate with the building security system; and enabling the mobile computing device to communicate with the building security system only if the authentication data stored in the electronic security credential file has been used to verify that a user of the mobile computing device is authorized to communicate with the building security system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 17, 18)
-
-
15. A method of operating a building security system, comprising the steps of:
-
transferring an electronic security credential file from an authorizing environment to a mobile computing device; reading and interpreting the security credential file within a software application executing on the mobile computing device; receiving from the mobile computing device at a building security system a communication including authentication data transmitted in the electronic security credential file; within the building security system, using the authentication data to verify that a user of the mobile computing device is authorized to communicate with the building security system; and enabling the mobile computing device to communicate with the building security system if the authentication data including a first passcode that is stored in the electronic security credential file matches a second passcode that is stored in the building security system and the user of the remote computing application software enters a third passcode at the time of the connection that matches a fourth passcode that is stored in the building security system to verify that the user of the mobile computing device is authorized to communicate with the building security system. - View Dependent Claims (16)
-
-
19. A security arrangement, comprising:
-
an authorizing apparatus configured to; generate an electronic security credential file including user authentication parameters; and transfer the electronic security credential file to a mobile computing device belonging to a user of the building security system; and a software application executing on the mobile computing device configured to extract the user authentication parameters from the electronic security credential file; and a building security system including a telecommunication device and a security control unit, the security control unit having a processor and a memory device configured to store the user authentication parameters, the security control unit being configured to; receive a wireless communication from the mobile computing device via the telecommunication device, the wireless communication including the user authentication parameters stored in the electronic security credential file that the mobile computing device received from the authorizing apparatus; verify that user authentication parameters within the electronic security credential file received from the mobile computing device match the user authentication parameters stored in the memory device; and enable the mobile computing device to communicate with the building security system only if the security control unit of the building security system has verified that the user authentication parameters within the electronic security credential file received from the mobile computing device match the user authentication parameters stored in the memory device. - View Dependent Claims (20, 21, 22)
-
Specification