Configuration method, configuration device, computer program product and control system
First Claim
1. A configuration method for configuring a host device in a control system comprising:
- exchanging, with an authorized configuration device, which is authorized to exchange confidential configuration data with a radio frequency identification tag coupled to the host device, said confidential configuration data with said radio frequency identification tag coupled to the host device;
precluding after the confidential configuration data have been exchanged and a corresponding configuration operation has been performed, access to the confidential configuration data by an unauthorized configuration device, which is not authorized to exchange said confidential configuration data with said radio frequency identification tag, by locking said radio frequency identification tag, wherein said locking occurs by encrypting the confidential configuration data;
enabling, with the confidential configuration data, the host device to join a network, wherein the confidential configuration data comprises network parameters required for joining the network; and
locking, with the authorized configuration device, the radio frequency identification tag by deleting the confidential configuration data from the radio frequency identification tag and by storing a back-up copy of the confidential configuration data in a non-volatile memory of the authorized configuration device.
10 Assignments
0 Petitions
Accused Products
Abstract
According to an aspect of the invention a configuration method for configuring a host device in a control system is conceived, in particular a building control system, wherein an authorized configuration device exchanges confidential configuration data with a radio frequency identification tag coupled to the host device, wherein, after the confidential configuration data have been exchanged and a corresponding configuration operation has been performed, access to the confidential configuration data by an unauthorized configuration device is precluded. According to further aspects of the invention a corresponding configuration device, a corresponding computer program product and a corresponding control system are conceived.
-
Citations
15 Claims
-
1. A configuration method for configuring a host device in a control system comprising:
-
exchanging, with an authorized configuration device, which is authorized to exchange confidential configuration data with a radio frequency identification tag coupled to the host device, said confidential configuration data with said radio frequency identification tag coupled to the host device; precluding after the confidential configuration data have been exchanged and a corresponding configuration operation has been performed, access to the confidential configuration data by an unauthorized configuration device, which is not authorized to exchange said confidential configuration data with said radio frequency identification tag, by locking said radio frequency identification tag, wherein said locking occurs by encrypting the confidential configuration data; enabling, with the confidential configuration data, the host device to join a network, wherein the confidential configuration data comprises network parameters required for joining the network; and locking, with the authorized configuration device, the radio frequency identification tag by deleting the confidential configuration data from the radio frequency identification tag and by storing a back-up copy of the confidential configuration data in a non-volatile memory of the authorized configuration device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A control system comprising:
-
a host device and an authorized configuration device which is configured to exchange confidential configuration data with a radio frequency identification tag coupled to the host device, wherein the control system is configured to preclude access to the confidential configuration data by an unauthorized configuration device, which is not authorized to exchange said confidential configuration data with said radio frequency identification tag, by locking said radio frequency identification tag after the confidential configuration data have been exchanged and a corresponding configuration operation has been performed, wherein configuring the host device comprises enabling the host device to join a network, and the confidential configuration data comprises network parameters required for joining the network, wherein the authorized configuration device is configured to lock the radio frequency identification tag by deleting the confidential configuration data from the radio frequency identification tag and storing a back-up copy of the confidential configuration data in a non-volatile memory of the authorized configuration device.
-
Specification