ANTI-TAKEOVER SYSTEMS AND METHODS FOR NETWORK ATTACHED PERIPHERALS
5 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and devices are described for the prevention of network peripheral takeover activity. In some embodiments, peripheral devices may implement an anti-takeover mechanism encrypting messages and transmitting unencrypted decryption keys for a limited period of time. Anti-takeover peripheral devices may transition from a plain operational mode, to a decryption key transmission mode, to a secure mode based on pre-defined triggering events, commands, or timers. Random decryption key values may be generated by peripheral devices and transmitted to listening devices for later storage and retrieval by the listening device. Decryption keys may be stored in remote data stores for later retrieval by anti-takeover aware controller devices.
-
Citations
44 Claims
-
1-23. -23. (canceled)
-
24. A method for an automation and security system, comprising:
-
receiving, at a control panel, an event message from a peripheral device of the automation and security system; determining, at the control panel, whether the event message is encrypted or unencrypted; and processing, at the control panel, the event message using a first protocol based at least in part on determining that the event message is encrypted and using a second protocol different from the first protocol based at least in part on determining that the event message is unencrypted. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32)
-
-
34. An apparatus for an automation and security system, comprising:
-
a processor; memory in electronic communication with the processor; and instructions stored in the memory and executable by the processor to cause the apparatus to; receive, at the apparatus, an event message from a peripheral device of the automation and security system; determine, at the apparatus, whether the event message is encrypted or unencrypted; and process, at the apparatus, the event message using a first protocol based at least in part on determining that the event message is encrypted and using a second protocol different from the first protocol based at least in part on determining that the event message is unencrypted. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A non-transitory computer-readable medium storing code for an automation and security system, the code comprising instructions executable by a processor to:
-
receive, at a control panel, an event message from a peripheral device of the automation and security system; determine, at the control panel, whether the event message is encrypted or unencrypted; and process, at the control panel, the event message using a first protocol based at least in part on determining that the event message is encrypted and using a second protocol different from the first protocol based at least in part on determining that the event message is unencrypted. - View Dependent Claims (44)
-
Specification