System and Method of Preventing Hijacking of Security Systems and Components

A component, event technology, applied in the field of systems and methods for preventing the hijacking of security systems and components, capable of addressing issues such as breach of prior contracts

Inactive Publication Date: 2016-08-17
HONEYWELL INT INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such practices often violate prior contracts between the monitoring service t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and Method of Preventing Hijacking of Security Systems and Components

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0006] While the disclosed embodiments may take many different forms, specific embodiments thereof are shown in the drawings and are to be considered in this disclosure as illustrative of its principles and as the best mode for practicing those principles and not as intended. Specific embodiments are described in detail herein with the understanding that the application or claims are limited to the specific embodiments illustrated.

[0007] In one aspect, a decentralized component of the above mentioned primarily centralized system architecture for the purpose of preventing the above mentioned unauthorized hijacking. More generally, it provides added protection against man-in-the-middle network attacks.

[0008] In disclosed embodiments, decentralization of components is accomplished by designing 'watchdog' agents into components of the security system, especially those located at the edge of the network underlying the system architecture (e.g., sensors, device control point,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a system and Method of Preventing Hijacking of Security Systems and Components. A decentralized component is provided as an overlay for a centralized system architecture as represented, for example, by a regional monitoring system. The decentralized components provide additional authentication of communications with a displaced monitoring service. Where agents of the decentralized component detect the presence of an unauthenticated monitoring service, messages can be generated, or other actions taken, to respond to that monitoring service.

Description

technical field [0001] The present application pertains to systems and methods for preventing hijacking of security systems having a centralized architecture. More particularly, the present application pertains to such systems and methods that provide decentralized components, including watchdog agents, to monitor and authenticate communications with replaced monitoring services. Background technique [0002] Security system monitoring services compete with each other for subscribers. As a result, it is not uncommon for these services to modify, replace or add components that exit the security system installation to gain (ie, hijack) subscribers from competitors. This is especially damaging because monitoring services often subsidize the cost of security system components and initial installation. [0003] Known monitored security systems often utilize a centralized architecture such that command and control of the system originates from the monitoring service. This archi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/08H04L63/1441H04L63/30G08B25/003G08B25/14G06F21/554H04L12/2803G08B29/16H04L63/126H04L63/1425
Inventor T·P·施米特
Owner HONEYWELL INT INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products