Anti-takeover systems and methods for network attached peripherals
First Claim
1. A method for an automation and security system, comprising:
- receiving, at a control panel, an event message from a peripheral device of the automation and security system;
determining, at the control panel, whether the event message is encrypted or unencrypted;
processing, at the control panel, the event message using a first protocol based at least in part on determining that the event message is encrypted and using a second protocol different from the first protocol based at least in part on determining that the event message is unencrypted; and
extracting, at the control panel, a decryption key value element and a key serial number from at least one packet of the event message based at least in part on processing the event message using the second protocol, the decryption key value element comprising at least one static bit field and the key serial number comprising at least one dynamic bit field adjustable based at least in part on a number of occurrences of peripheral device events.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. In some embodiments, peripheral devices may implement an anti-takeover mechanism encrypting messages and transmitting unencrypted decryption keys for a limited period of time. Anti-takeover peripheral devices may transition from a plain operational mode, to a decryption key transmission mode, to a secure mode based on pre-defined triggering events, commands, or timers. Random decryption key values may be generated by peripheral devices and transmitted to listening devices for later storage and retrieval by the listening device. Decryption keys may be stored in remote data stores for later retrieval by anti-takeover aware controller devices.
40 Citations
16 Claims
-
1. A method for an automation and security system, comprising:
-
receiving, at a control panel, an event message from a peripheral device of the automation and security system; determining, at the control panel, whether the event message is encrypted or unencrypted; processing, at the control panel, the event message using a first protocol based at least in part on determining that the event message is encrypted and using a second protocol different from the first protocol based at least in part on determining that the event message is unencrypted; and extracting, at the control panel, a decryption key value element and a key serial number from at least one packet of the event message based at least in part on processing the event message using the second protocol, the decryption key value element comprising at least one static bit field and the key serial number comprising at least one dynamic bit field adjustable based at least in part on a number of occurrences of peripheral device events. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus for an automation and security system, comprising:
-
a processor; memory in electronic communication with the processor; and instructions stored in the memory and executable by the processor to cause the apparatus to; receive, at the apparatus, an event message from a peripheral device of the automation and security system; determine, at the apparatus, whether the event message is encrypted or unencrypted; and process, at the apparatus, the event message using a first protocol based at least in part on determining that the event message is encrypted and using a second protocol different from the first protocol based at least in part on determining that the event message is unencrypted; and extract, at the apparatus, a decryption key value element and a key serial number from at least one packet of the event message based at least in part on processing the event message using the second protocol, the decryption key value element comprising at least one static bit field and the key serial number comprising at least one dynamic bit field adjustable based at least in part on a number of occurrences of peripheral device events. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium storing code for an automation and security system, the code comprising instructions executable by a processor to:
-
receive, at a control panel, an event message from a peripheral device of the automation and security system; determine, at the control panel, whether the event message is encrypted or unencrypted; process, at the control panel, the event message using a first protocol based at least in part on determining that the event message is encrypted and using a second protocol different from the first protocol based at least in part on determining that the event message is unencrypted; and extract, at the control panel, a decryption key value element and a key serial number from at least one packet of the event message based at least in part on processing the event message using the second protocol, the decryption key value element comprising at least one static bit field and the key serial number comprising at least one dynamic bit field adjustable based at least in part on a number of occurrences of peripheral device events. - View Dependent Claims (16)
-
Specification