Secured device access in a device automation system
First Claim
1. A method of providing secured access to a device automation system implementing automatic control of one or more connected physical devices in a user'"'"'s automation environment, the user'"'"'s automation environment including a plurality of connected physical devices, connected to a data network to facilitate communication with a central server over the data network, the method comprising:
- retrieving a physical graph describing the connected physical devices in the user'"'"'s automation environment;
receiving, from a client device, a selection of an automation application, wherein the automation application comprises one or more event handlers, each event handler specifying an event and an action, and wherein an event handler is executed to issue the specified action in response to the specified event;
receiving application configuration information for the selected automation application, the application configuration information identifying one or more required device types and one or more required device capabilities;
automatically filtering the physical graph to identify one or more connected physical devices in the user'"'"'s automation environment that are of the required device types and have the required device capabilities;
authorizing one or more of the identified connected physical devices for access by the selected automation application wherein the authorized one or more connected physical devices are a selected subset of and not all of the plurality of connected physical devices, the remaining connected physical devices being devices that are not authorized for access by the selected automation application;
installing the selected automation application in the device automation system; and
in response to the installation of the selected automation application, restricting the installed automation application to access only the authorized connected physical devices, wherein the authorized connected physical devices are a subset of and not all of the plurality of connected physical devices in the user'"'"'s automation environment, and the automation application does not have access to any of the connected physical devices that are not authorized.
3 Assignments
0 Petitions
Accused Products
Abstract
A secured device access method is implemented in a web-based device automation system whereby the configuration of an automation application for specific devices in a user'"'"'s automation environment and the installation of the automation application define the security scope for the automation application. Once the automation application is configured and installed, the automation application is only allowed access to the authorized devices in the user'"'"'s automation environment and the automation application may not access other devices in the user'"'"'s environment that have not been authorized.
-
Citations
14 Claims
-
1. A method of providing secured access to a device automation system implementing automatic control of one or more connected physical devices in a user'"'"'s automation environment, the user'"'"'s automation environment including a plurality of connected physical devices, connected to a data network to facilitate communication with a central server over the data network, the method comprising:
-
retrieving a physical graph describing the connected physical devices in the user'"'"'s automation environment; receiving, from a client device, a selection of an automation application, wherein the automation application comprises one or more event handlers, each event handler specifying an event and an action, and wherein an event handler is executed to issue the specified action in response to the specified event; receiving application configuration information for the selected automation application, the application configuration information identifying one or more required device types and one or more required device capabilities; automatically filtering the physical graph to identify one or more connected physical devices in the user'"'"'s automation environment that are of the required device types and have the required device capabilities; authorizing one or more of the identified connected physical devices for access by the selected automation application wherein the authorized one or more connected physical devices are a selected subset of and not all of the plurality of connected physical devices, the remaining connected physical devices being devices that are not authorized for access by the selected automation application; installing the selected automation application in the device automation system; and in response to the installation of the selected automation application, restricting the installed automation application to access only the authorized connected physical devices, wherein the authorized connected physical devices are a subset of and not all of the plurality of connected physical devices in the user'"'"'s automation environment, and the automation application does not have access to any of the connected physical devices that are not authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for providing an secured access to a device automation system implementing automatic control of one or more physical devices in a user'"'"'s automation environment, the user'"'"'s automation environment including a plurality of connected physical devices, connected to a data network to facilitate communication with a central server over the data network, the system comprising:
-
a central server connected to the data network, the central server comprising a processor configured to; retrieve a physical graph describing the connected physical devices in the user'"'"'s automation environment; receive, from a client device, a selection of an automation application, wherein the automation application comprises one or more event handlers, each event handler specifying an event and an action, and wherein an event handler is executed to issue the specified action in the environment in response to the specified event; receive application configuration information for the selected automation application, the application configuration information identifying one or more device types of interest and one or more required device capabilities; automatically filtering the physical graph to identify one or more connected physical devices in the user'"'"'s automation environment that are of the device types of interest and have the required device capabilities; authorizing one or more of the identified connected physical devices for access by the selected automation application, wherein the authorized one or more connected physical devices are a selected subset of and not all of the plurality of connected physical devices, the remaining connected physical devices being devices that are not authorized for access by the selected automation application; install the selected automation application; and in response to the installation of the selected automation application, restrict the installed automation application to access only the authorized connected physical devices, configuration information, wherein the authorized connected physical devices are a subset of and not all of the plurality of connected physical devices in the user'"'"'s automation environment, and the automation application does not have access to any of the connected physical devices that are not authorized; and a memory coupled to the processor and configured to provide the processor with instructions. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification