The present disclosure relates to wireless devices, and more particularly to wireless devices such as sensors and sensor networks thereof.
Security systems generally involve a secured area protected by one or more sensors. The secured area may include some form of physical barrier (e.g., a wall, a fence, etc.) provided around the secured area with one or more portals (e.g., doors, windows, etc.) that allow entry into or egress from the secure area by authorized persons. The sensors need to be located throughout the secured area, e.g., to monitor the portals, and are generally coupled to a local alarm panel wirelessly. In most cases, the wireless exchange between transceivers is encrypted to avoid subversion of the security system. Usually, this requires the use of secret coding schemes.
Such conventional methods and systems have generally been considered satisfactory for their intended purpose. However, there is still a need in the art for improved wireless systems and methods. The present disclosure provides a solution for this need.
A method of commissioning a sensor includes using a system having a control panel, a sensor, and a cloud server. Identification codes from respective NFC tags that identify the control panel and sensor are read and transmitted to the cloud server. The control panel receives authorization information from the cloud server that identifies the sensor. The control panel receives information from the sensor when the information includes the authorization information that matches the authorization information received by the control panel.
The identification codes from the NFC tags and the authorization information can be stored in a database of the cloud server during manufacturing of the control panel and sensor. During manufacturing the NFC tags can be attached to the control panel and sensor, e.g., either disposed in the devices themselves or on the packaging. Reading the identification codes can be done using a mobile device equipped with an NFC reader. The cloud server can monitor the received identification code of the sensor and detect a non-authentic sensor when a duplicate identification code is received identifying a sensor already commissioned.
A system for commissioning a sensor includes a control panel having an NFC tag and a sensor having an NFC tag. A reader is programmed to read the identification codes of the respective NFC tags from the control panel and the sensor. A cloud server has a processor operatively connected to a memory wherein the memory includes instructions recorded thereon that, when read by the processor, cause the processor to receive the identification codes and transmit authorization information to the control panel.
The reader can be a mobile device equipped with an NFC reader and an associated mobile application. Upon activation, the application prompts a user to read the identification codes of the NFC tags of the control panel and sensor and transmit the identification codes to the cloud server.
The system can further include a database of unique sensor identification codes within the cloud server. The database can be populated during manufacturing of the sensors wherein the sensor identification codes are linked to the authorization information to identify each sensor.
A method of commissioning a sensor includes using a system having a reader, a control panel, a sensor, and a cloud server. Identification codes from respective NFC tags that identify the control panel and sensor are read and transmitted to the cloud server. A learn-in code is received from the cloud server by the reader and displayed to a user. The learn-in code is received at the control panel as input from the user.
A system for commissioning a sensor includes a control panel having an NFC tag and a sensor having an NFC tag. A reader is programmed to read the identification codes of the respective NFC tags from the control panel and the sensor. A cloud server has a processor operatively connected to a memory wherein the memory includes instructions recorded thereon that, when read by the processor, cause the processor to receive the identification codes and transmit a learn-in code to the reader.
The reader can include a display screen to display the learn-in code to a user. The control panel can include a user interface to accept the learn-in code as entered by the user.
These and other features of the systems and methods of the subject disclosure will become more readily apparent to those skilled in the art from the following detailed description of the preferred embodiments taken in conjunction with the drawings.
So that those skilled in the art to which the subject disclosure appertains will readily understand how to make and use the devices and methods of the subject disclosure without undue experimentation, preferred embodiments thereof will be described in detail herein below with reference to certain figures, wherein:
Reference will now be made to the drawings wherein like reference numerals identify similar structural features or aspects of the subject disclosure. For purposes of explanation and illustration, and not limitation, a partial view of an exemplary embodiment of a system and method for network node authentication in accordance with the disclosure is shown in
Near field communication (NFC) technology has proven to be of particular value for setting up Wi-Fi networks and for pairing Bluetooth devices. These technologies can be of high value in the field of smart buildings. For example, they can be used to simplify the commissioning of wireless devices in a smart building. Commissioning can include operations that relate to the configuration of devices, such as establishing a network connection between devices, establishing a control relationship between devices and localizing devices in an environment. NFC technology provides particular advantages for commissioning sensors such as ease-of-installation. In addition, NFC technology can make commissioning procedures easy and intuitive to perform as it reduces the error-proneness of these procedures.
Sensor 102 and control panel 104 are each manufactured with an NFC tag 106, 108, respectively, for wireless identification. The NFC tags 106, 108 can be manufactured within the devices (i.e. sensor and control panel), can be affixed to the devices, or can be part of the packaging of the devices. System 100 further includes a mobile device 110, such as a smart phone or tablet, that can access a cloud server 112. Cloud server 112 includes a processor 114 that is operatively connected to a memory 116. Cloud server 112 is also in communication with a database 118 of stored identification codes populated, e.g., during manufacturing of the sensor 102 and control panel 104, with the identification codes of the NFC tags 106, 108.
With reference to
With reference to
After the learn-in code is received at the mobile device, the mobile device prompts the user to activate a learn-in mode of the control panel, as shown in box 409. The control panel prompts the user to trigger the sensor, as shown in box 410. Upon receiving a transmission from the sensor, as shown in box 411, the control panel prompts the user to enter the learn-in code displayed on the mobile device. The control panel matches the received learn-in code with the plurality of stored learn-in codes and if a match exists, the sensor is enabled to communicate with the control panel. If the learn-in code that identifies the sensor is not found among the stored learn-in codes in the control panel, the sensor will not be authenticated.
The methods and systems of the present disclosure, as described above and shown in the drawings, provide for systems and methods for network node authentication with superior properties including improved commissioning of sensors and other devices. While the apparatus and methods of the subject disclosure have been shown and described with reference to preferred embodiments, those skilled in the art will readily appreciate that changes and/or modifications may be made thereto without departing from the spirit and scope of the subject disclosure.
This application is a 371 U.S. National Phase of International PCT Patent Application No. PCT/US2015/061474, filed Nov. 19, 2015, which claims the benefit of and priority to U.S. Provisional Patent Application No. 62/082,794 filed Nov. 21, 2014, the content of which is expressly incorporated by reference herein in its entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2015/061474 | 11/19/2015 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2016/081684 | 5/26/2016 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
8611517 | Bookstaff | Dec 2013 | B2 |
9237465 | Tanner | Jan 2016 | B1 |
9470699 | Peeters | Oct 2016 | B2 |
9528861 | Haupt | Dec 2016 | B1 |
20030117260 | Fanshawe | Jun 2003 | A1 |
20070052672 | Ritter et al. | Mar 2007 | A1 |
20080080396 | Meijer et al. | Apr 2008 | A1 |
20100290351 | Toepke et al. | Nov 2010 | A1 |
20120050018 | Sajadi et al. | Mar 2012 | A1 |
20120191566 | Sayan | Jul 2012 | A1 |
20120246077 | Skaaksrud et al. | Sep 2012 | A1 |
20130176115 | Puleston et al. | Jul 2013 | A1 |
20130204717 | Bookstaff | Aug 2013 | A1 |
20130210360 | Ljung | Aug 2013 | A1 |
20130268773 | Davis et al. | Oct 2013 | A1 |
20130282438 | Hunter et al. | Oct 2013 | A1 |
20130318188 | Liekens | Nov 2013 | A1 |
20140115346 | Ekberg et al. | Apr 2014 | A1 |
20140149742 | Yau | May 2014 | A1 |
20140151446 | Bovell | Jun 2014 | A1 |
20140164254 | Dimmick | Jun 2014 | A1 |
20150070132 | Candelore | Mar 2015 | A1 |
20150228133 | Capaldi-Tallon | Aug 2015 | A1 |
20150304804 | Lotito | Oct 2015 | A1 |
Number | Date | Country |
---|---|---|
102316452 | Jan 2012 | CN |
202870900 | Apr 2013 | CN |
103400272 | Nov 2013 | CN |
2665235 | Nov 2003 | EP |
2779712 | Sep 2004 | EP |
2071800 | Jun 2009 | EP |
Entry |
---|
International Search Report for International Application No. PCT/2015/061474, dated Feb. 25, 2016. |
Number | Date | Country | |
---|---|---|---|
20180295508 A1 | Oct 2018 | US |
Number | Date | Country | |
---|---|---|---|
62082794 | Nov 2014 | US |