Always-available embedded theft reaction subsystem
First Claim
Patent Images
1. A platform protected by a-security system, the platform comprising:
- a plurality of interfaces including a Bluetooth sensor, a motion detector, and a short range near field communications (NFC) reader, wherein the NFC reader to detect a pattern and a timing of tapping on the platform by a NFC device, the NFC device comprising a unique identifier;
a pairing logic to identify an NFC device as an authorized device for arming and disarming the security system by authenticating the unique identifier of the NFC device; and
detecting the pattern and the timing of tapping on the platform by the NFC device;
a risk behavior logic to identify a potential risk behavior, when the system is armed; and
a core logic to evaluate the risk behavior and determine whether a security action logic should take an action;
an arming logic to arm the security system upon receipt of an arming command;
a disarming logic to disarm the security system upon receipt of a disarming command;
wherein the arming command and the disarming command to use the detected pattern and the timing of tapping on the platform by the NFC device; and
wherein the platform to be powered in a plurality of power states such that power is removed from a subset of the plurality of interfaces that are not relevant to a power state of the plurality of power states, and the NFC reader is to be available in a low power mode of the platform, enabling the security system to be armed and disarmed without powering up the platform;
whereby the NFC reader makes it difficult to eavesdrop on the NFC communications by operating at a short range.
1 Assignment
0 Petitions
Accused Products
Abstract
A platform protected by an always-available security system, the system is described. The system, in one embodiment, comprises a near field communications (NFC) reader, a pairing logic to identify an NFC device as an authorized device for arming and disarming the system, an arming logic to arm the system upon receipt of an arming command, and a disarming logic to disarm the system upon receipt of a disarming command, wherein the arming command and the disarming command may use the NFC device, and wherein the NFC reader is powered in a plurality of power states, enabling disarming and arming of the platform in the plurality of power states.
147 Citations
13 Claims
-
1. A platform protected by a-security system, the platform comprising:
-
a plurality of interfaces including a Bluetooth sensor, a motion detector, and a short range near field communications (NFC) reader, wherein the NFC reader to detect a pattern and a timing of tapping on the platform by a NFC device, the NFC device comprising a unique identifier; a pairing logic to identify an NFC device as an authorized device for arming and disarming the security system by authenticating the unique identifier of the NFC device; and
detecting the pattern and the timing of tapping on the platform by the NFC device;a risk behavior logic to identify a potential risk behavior, when the system is armed; and
a core logic to evaluate the risk behavior and determine whether a security action logic should take an action;an arming logic to arm the security system upon receipt of an arming command;
a disarming logic to disarm the security system upon receipt of a disarming command;
wherein the arming command and the disarming command to use the detected pattern and the timing of tapping on the platform by the NFC device; andwherein the platform to be powered in a plurality of power states such that power is removed from a subset of the plurality of interfaces that are not relevant to a power state of the plurality of power states, and the NFC reader is to be available in a low power mode of the platform, enabling the security system to be armed and disarmed without powering up the platform; whereby the NFC reader makes it difficult to eavesdrop on the NFC communications by operating at a short range. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A security system, the system comprising:
-
a plurality of interfaces including a Bluetooth sensor, a motion detector, and a short range near field communications (NFC) reader, wherein the NFC reader to detect a pattern and a timing of tapping on the platform by a NFC device; a pairing logic to authenticate the NFC device as an authorized device for the system and to pair with that NFC device by detecting the pattern and the timing of tapping on the platform by the NFC device and; a risk behavior logic to identify a potential risk behavior, when the system is armed; and
a core logic to evaluate the risk behavior and determine whether a security action logic should take an action;a disarming logic to disarm the system upon receipt of a disarming command;
wherein the disarming command to be generated by detecting the pattern and the timing of tapping on the platform by the paired NFC device, and wherein the disarming command to be received in a plurality of power states such that the NFC device is available in a low power mode of the platform, enabling the security system to be armed and disarmed without powering up the platform by detecting the pattern and the timing of tapping on the platform by the paired NFC device;wherein power is removed from a subset of the plurality of interfaces that are not relevant to a power state of the plurality of power states. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method of protecting a platform with a-security system, the method comprising:
-
in a platform low power state, removing power from a subset of a plurality of interfaces that are not relevant to a power state of the plurality of power states, the plurality of interfaces including a Bluetooth sensor, a motion detector, and a short range near field communications (NFC) reader, wherein the NFC reader to detect a pattern and a timing of tapping on the platform by a NFC device, the NFC device comprising a unique identification; identifying a potential risk behavior, when the system is armed; and evaluating the risk behavior and determining whether a security action logic should take an action; receiving a disarming command at a near field communications (NFC) reader, the disarming command being generated by authenticating the unique identification of the NFC device and detecting the pattern and the timing of tapping of the NFC device on the platform and indicating a presence of an authorized user; and disarming the system, in response to the disarming command; whereby the NFC reader makes it difficult to eavesdrop on the NFC communications by operating at a short range. - View Dependent Claims (12, 13)
-
Specification