WO2020209802A1 - Enhancing security in home automation system - Google Patents

Enhancing security in home automation system Download PDF

Info

Publication number
WO2020209802A1
WO2020209802A1 PCT/SG2020/050222 SG2020050222W WO2020209802A1 WO 2020209802 A1 WO2020209802 A1 WO 2020209802A1 SG 2020050222 W SG2020050222 W SG 2020050222W WO 2020209802 A1 WO2020209802 A1 WO 2020209802A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
data
home automation
pattern
security module
Prior art date
Application number
PCT/SG2020/050222
Other languages
French (fr)
Inventor
Sudheendra SHANTHARAM
Original Assignee
Kaha Pte. Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kaha Pte. Ltd filed Critical Kaha Pte. Ltd
Publication of WO2020209802A1 publication Critical patent/WO2020209802A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]

Definitions

  • the present invention relates generally to smart environments.
  • this pre set invention relates to security in automation systems and methods that are configured to automatically and/or remotely control products, devices and appliances in a house or other residential or commercial building.
  • Home automation involves controlling various devices or systems that can be present in homes.
  • Home automation technologies can allow for local and/or remote control of home automation devices.
  • home automation may include remote and centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, security locks of gates and doors and other systems, to provide improved convenience, comfort, energy efficiency and security.
  • HVAC heating, ventilation and air conditioning
  • appliances security locks of gates and doors and other systems, to provide improved convenience, comfort, energy efficiency and security.
  • the popularity of home automation has been increasing greatly in recent years due to much higher affordability and simplicity through smart phone and tablet connectivity.
  • the concept of the Internet of Things (IOT) has tied in closely with the popularization of home automation.
  • the Internet of Things (IOT) is the network of physical objects or“things” embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices.
  • the conventional security standards include protection or prevention from theft or damage to the hardware, software and information passing through them. It further includes controlling of physical access to the hardware and protecting against one or more harm which comes through network access, data injection of malicious code which may occur due to the malpractice by users, operators, which are intentional, or accidental, or due to them being tricked into deviating from secure procedures.
  • the present invention provides a security in home automation system and a method of operating thereof.
  • the method includes the steps of: inputting a data in the wearable device of user to connect to a home automation module through the security module, securely transmitting the data to the security module, checking and analyzing the data for an security pattern, identifying the security pattern by comparing the subject data with the stored data and approving and authorizing the user to access home automation module.
  • every user of home automation system has a profile data, security pattern, configuration data.
  • the security pattern may be one of or combination of, a gesture, accelerometer, gyro values, pin and password.
  • FIG. 1 is a system illustrating a home automation module with a security module in an embodiment of the present invention.
  • FIG. 2 illustrates the example scenario in which plurality of smart wearables are connected to the home automation module through the security module.
  • Fig. 3A, 3B and 3C illustrates the example combination of connections between the smart wearable devices, security module and the home automation module.
  • Fig. 4 is an example flowchart illustrating the steps involved in authenticating/authorizing the user for home automation module by the security module in an embodiment of the present invention.
  • Figure 5A illustrates an example authorization pattern performed through hand 500 in an embodiment of the present invention.
  • Figure 5B, 5C and 5D illustrates the five different positions (520, 530, 540, 530 and 520) of hand 500 in an embodiment of the present invention.
  • Figure 6A and 6B illustrates an example configuration data stored in the security module.
  • Fig. 1 is a system diagram 100 of network of devices in embodiment of the present invention.
  • the system comprises, smart wearable device 102, a mobile device 104, a home automation module 106, an application server 110, a database 112.
  • the home automation module 106 further comprises a security module 108.
  • the smart wearable device 102 and mobile device 104 are directly connected to the home automation module 106 through the security module 108.
  • the security module 108 is an internal component of home automation module 106 or a standalone module externally connected with the home automation module 106.
  • the security module 108 is used to provide set of one or more policies, practices which are to be adopted to provide access to the authorized user and to prevent and prudently monitor unauthorized access, misuse or modification of data in the home automation module 106.
  • the security module 108 is a series of one or more integrated modules connected in the same runtime environment.
  • the security module 108 is capable of authenticating the user (of the smart wearable device 102 or mobile device 104) for home automation module 106, through one or more pattern of actions performed by the first user through the subject smart wearable device 102.
  • the security module 108 manages the user, and organizes user profiles, user actions, user activities to streamline the accessibility for the home automation module 106.
  • the security module 108 receives one or more inputs from the user’s smart wearable device 102 and mobile device 104.
  • the security module 108 further extends permission/access to the user for home automation module 106, only when the user is successfully validated by one or more authorization methods.
  • the user may enter a pin /setup an action/pattem (for example, gesture, accelerometer/gyro values, pin, password, iris data, finger print etc), in the security module 108 and to access the home automation module 106.
  • the application server 110 and database 112 are connected to the home automation module 106 to centrally process the queries, of one or more users, which are received from one or more smart wearable devices 102 and mobile devices 104.
  • the database 112 is a centralized repository, wherein all policies, procedures, profiles, activities and any data with respect to home automation module 106 and security module 108 kept in an organized manner and securely stored.
  • the security module 108 receives user query to access home automation module 106, when the user is in vicinity of his home.
  • the user may remotely control home automation module 106 only when such access is authorized by the security module 108, and wherein, security module 108 provide such access to one or more selected devices of the user.
  • the smart wearable device 102 is also capable of detecting any actions/pattems/gestures performed by the user, through one or more sensors, configured thereon, which forms the authorization pattern (a security pattern) to access the home automation module 106.
  • the one or more actions/pattems/gestures may be sequentially performed, one after the other, by the user to complete one authorization pattern.
  • the authorization pattern to access the home automation module 106 may be one action or series of actions, that are performed in a smart wearable device 102.
  • the sensors units configured in smart wearable device 102 is allowed to capture and record the such one or more series of action, sequentially and consider them as an authorization pattern or a security pattern.
  • the security module 108 is configured to allow only such user, who performs pre- configured actions/pattem through the one or more connected smart wearable device 102.
  • the pattern is not device specific, the user can use any smart wearable device 102 and perform his/her authorization pattern to access the home automation module 106.
  • the actions, which are captured by the smart wearable device 102 are stored as a‘pattern’ and transmitted (as an encrypted content) to the security module 108 through one or more communication methods or standards, that include, but not limited to, Bluetooth, WiFi, NFC.
  • the security module 108 enables the home automation module 106 only when user is identified and authorized by the security module 108. Once, the user is authenticated, the home automation module 106 will allow commands/inputs from the subject smart wearable device 102.
  • the smart wearable device 102 when the smart wearable device 102 is worn by the user (in the vicinity of security module of home automation module/hub), the smart wearable device 102 prompts the user to perform the actions in order to authorize the user.
  • the smart wearable device need not be in the vicinity of security module, and the communication between the smart wearable device and security module happens through one or more medium and long- range communication standards, which include not limited to, cellular networks, LoRaWAN.
  • the security module processes the data from the user and authorize the user only when the input data from the user is matching with the stored data.
  • the security module 108 creates a session and unlocks the features, configured for the subject user, and the user’s smart wearable device 102 provide one or more options and accessibility for the user to interact with the home automation module 106.
  • the user any time during the ongoing session, can pause the session for 10-15 minutes, by tapping the smart wearable device 102 or performing an action in the mobile device 104 and later resume the session.
  • the user can terminate the session any time.
  • the security module 108 automatically terminates the subject session, and request the user to perform authorization pattern to confirm and re-authorize the access to the home automation module 106.
  • the security module 108 scan for devices either new or already connected devices and further particularly identifies smart wearable devices which are in the range and vicinity. If it is a new device, and subject user requests the access for home automation module 106, by manually initiating a request in mobile device 104 (through a mobile application) or through tapping the smart wearable device, twice (for example), then the security module 108 initiates a configuration procedure and setup the user to access home automation module. During the configuration stage, the security module 108 requests the user to set an authorization pattem/action to authorize him/her for the home automation module 106. The subject authorization pattem/action are stored in the security module 108 as well as processed by the application server 110 and eventually stored in the database 112 of the system.
  • the user may manually enter one or more particulars of smart wearable device 102.
  • the particulars may include user and device details, for example, name, age, type of smart wearable device (for example, smart watch, analog watch, band or any IoT device), with their unique ID etc.
  • the security module and home automation module may have a unique ID, or passcode, which is only known to the user (who had purchased the modules).
  • the user details, device details (smart wearable device, mobile device, security module, home automation module) along with the authorization pattern are processed by the application server 110, and stored as‘user configuration data’ in the profile of the user in database 112. Further, a copy of user configuration data is stored in the memory of security module 108.
  • the security module 108 may store up to 10 user configuration data.
  • the user can create a group of users who need to access the home automation module.
  • an invitation request is immediately shared with the other users to provide their smart wearable device details, mobile device details, profile details, and to configure their authorization pattern for the subject home automation module.
  • the invitation request can only be created by a super user.
  • the super user is a normal user, who has advanced authorization access to both security module and home automation module.
  • the user can configure one or more authorization pattem/action to access home automation module 106.
  • the example authorization pattem/action may be‘two claps’ followed by‘two punches’. This action of the user is sequentially captured by the smart wearable device 102 and the same is being registered by the security module, along with the details of subject smart wearable device 102.
  • the security module 108 may suggest one or more authorization patterns for the user and user can choose any one or more such patterns which may be sequential in nature and subsequently register with the security module 108.
  • the action may be one of entering a code (password, or pin) or finger print authorization on the smart wearable device 102.
  • the user can configure plurality of pattems/actions (through smart wearable) in the security module and to access the home automation module.
  • a smart wearable can recognize one or more authorization pattems/actions of the user.
  • the smart wearable is specific to one action/pattem.
  • the security module 108 can only be accessed by a super user, who configures and monitors home automation module 106 and provide access to one or more users.
  • the security module 108 may limit the number of users to access the home automation module 106 or super user can configure the total number of users for a home automation module 106.
  • the security module 108 provide access to all components in home automation module 106.
  • the accessibility can be provided to control and monitor door/window, kitchen, lighting, one or more rooms, electricity, water flow and all other components which are part of home automation module 106.
  • the smart wearable device 102 is a watch (analog), which is used to capture user actions (through pressing the crown, like one press, two press etc) or through one or more buttons, the security module 108 appropriately identifies the user action through the connected watch.
  • the pattern for analog watch may be different from another smart wearable device and have a different configuration procedure.
  • the smart wearable device 102 is a smart watch/ band or any apparel, having a display screen, which is used to capture user actions (through tapping the screen, or gesture actions, patterns etc), the security module 108 appropriately identifies the user action through the connected smart watch/band or apparel.
  • the security module 108 authenticates the user every time he wears the smart wearable device 102, and authorize the user, to send the instructions for the home automation module 106.
  • the smart wearable device 102 is removed by the user and the authorization is automatically cleared by the security module 108.
  • the smart wearable device 102 may have a proximity sensor, usually at the back, to particularly detect the device is being removed from hand (of the user who was wearing it), hence the authorization is cleared, and nobody shall be able to access the home automation module 106. If in case, when the smart wearable device 102 is forcefully removed from hand, then also the authorization is cleared immediately, through the readings from accelerometer sensor.
  • the smart wearable device 102 may be worn by two people, then based on their action/ pattern, the security module 108 identifies the user and grant authorization to the home automation module 106.
  • each IoT component in home may be configured with an authorization pattern, which is validated by the security module 108 of home automation module 106.
  • the security module 108 receives the accurate pattern for the selected IoT component, only then the home automation module 106 shall grant permission to selected IoT component, otherwise access is denied, for example, safety locker.
  • FIG. 2 illustrates the example scenario in which plurality of smart wearables are connected to the home automation module through the security module.
  • Each of the smart wearable device 102 2 , 1024, 1026...102 n is paired with the home automation module 106 and the security module 108 of home automation module 106 is capable of identifying the smart wearable device 102 2 , 1024, 102 6 ...102 n in real-time and also capable of switching between user configuration settings.
  • Each smart wearable device 102 is authenticated by the security module 108 and the security module is capable of authorizing the smart wearable devices 102 for home automation module 106.
  • Figure 3A, 3B and 3C illustrates the example combination of connections between the smart wearable devices, security module and the home automation module.
  • the security module 108 (of home automation module 106) stores profiles of user.
  • the profiles of user further comprise, Unique identification number (UIN), device name, wearable type, configurations, authorization pattems/vahies, commands/instructions to be performed for scheduled activities, total active duration of profile, list of all IoT components connected with home automation module, accessible list of IoT components, threshold values for each IoT component, condition of each IoT component (active/idle) etc.
  • the security module 108 provide access to the home automation module 106 by authenticating the user with authorization patterns.
  • Figure 3 A illustrate combination of one smart wearable device 102 2 paired with the home automation module 106 and connected through the security module 108.
  • Figure 3B illustrate combination of two smart wearable devices 102 2 and 102 4 paired with the home automation module 106 through the security module 108.
  • Figure 3C illustrate combination of three smart wearable devices 102 2, 102 4, and 102 6 paired with the home automation module 106 the security module 108.
  • the home automation module 106 is configured to receive commands from smart wearable devices 102 2 , 1024, 1026.
  • a single user can have multiple profiles (configuration settings for connected IoT components) in the home automation module.
  • the user may select a profile (from the list of profiles) to be exhibited by the home automation module.
  • each user may have a default profile.
  • the profiles are specific in nature and vary between user to user.
  • the home automation module 106 is pre-programmed to accept and execute the instructions based on the profile data.
  • FIG. 4 is an example flowchart illustrating the steps involved in authenticating/authorizing the user for home automation module by the security module in an embodiment of the present invention.
  • the method 400 includes the step 410 of inputting a data in the wearable device to connect to a home automation module through the security module.
  • the input data is appropriately captured by the wearable device and the subject data is being securely transmitted to the security module in step 420.
  • the data is encrypted by one or more encryption standards.
  • the security module receives the data from the wearable.
  • the security module may use the one or more decryption standards to decrypt the encrypted data.
  • the method 400 performs a check whether the data received is an authorization pattern.
  • the security module may use one or more matching technique to identify the subject data is an authorization pattern.
  • the authorization pattern may have a unique ID and user ID, through which, the security module identifies such pattern from the wearable devices.
  • the security module identifies the received data is an authorization pattern then the control is transferred to step 450, otherwise, the control is transferred to step 460.
  • the security module extracts the pattern into first values or first set of values.
  • the data having authorization pattern is segmented into various parameters, such as user name, device type, device id, authorization type etc. During configuration of home automation module through the security module, a unique id is configured for each user.
  • the unique id may be same for all the smart wearable devices belonging to the same user.
  • the security module check whether the first values match with the already stored values of subject user. If the values are matching then the user is approved and control is transferred to step 480, otherwise, the control is transferred to step 460.
  • the security module authenticates and authorizes the user for home automation module, and provide access to only those components of home automation module, attributing to respective home automation policy.
  • the security module requests the user to re-enter the data having authorization pattern.
  • FIG. 5A illustrates an example authorization pattern performed through hand 500 in an embodiment of the present invention.
  • the user is wearing a smart wearable device 510, who performs the authorization pattern, in this case waving a hand sideways.
  • the ‘waving hand sideways’ authorization pattern is split into 5 partial patterns (at each position of hand).
  • the smart wearable device 510 having one or more sensors, identifies movement of hand which is considered as position of the hand.
  • the smart wearable device captures the data and accommodate them as one single authorization pattern or sequence of authorization pattern.
  • the smart wearable device identifies first position (520), second position (530), third position (540), fourth position (530) and fifth position (520) of the hand and combines them as‘one single authorization pattern’.
  • FIG. 5B, 5C and 5D illustrates the five different positions (520, 530, 540, 530 and 520) of hand 500 in an embodiment of the present invention.
  • FIG. 6A and 6B illustrates an example configuration data stored in the security module.
  • each user has a profile data, security pattern, configuration data in the home automation system.
  • the profile data may include, name, age, type of smart wearable device (for example, smart watch, analog watch, band or any IoT device), with their unique ID etc.
  • the security pattern is one of or combination of pin, password, biometric, gesture actions.
  • the user 1 in figure 6A is connected to the security module, wherein, user can enter the authorization pattern only through pattern (gesture) pin and biometric.
  • the security module further receives only those input from the connected smart wearable device, for authorization.
  • the user in figure 6B is connected to the security module, wherein, the user is limited to enter the authorization only through pattern and pin. Further, user enter one or more security patterns to access the home automation module, but however, such user may be accessible to few of the IoT components in home automation module.
  • the configuration data holds the key list of components that are to be accessed / operated by the user or users, in reference to all IoT components in the home automation module.
  • the user 1 in figure 6A is having a set of authorized IoT components in home automation module. The user 1 can only have access to control‘light (Access: ALL) and ‘light 2’ (Access: On/Off only), whereas the user does not have access to control‘motor 1’ (Access: None).
  • the user 2 in figure 6B is also having another set of authorized IoT components in home automation module.
  • the user 2 having access to control‘TV-Remote’ (Access: ALL),‘Chimney’ (Access: On/Off only),‘Coffee maker’ (Access: ALL),‘Lights’ (Access: ALL) and and‘Fan & AC’ (Access: Yes - Auto cool only).
  • control‘TV-Remote’ Access: ALL
  • Chimney’ Access: On/Off only
  • Coffee maker’ Access: ALL
  • ‘Lights’ Access: ALL
  • and_Fan & AC’ Access: Yes - Auto cool only.
  • each of the IoT component may have a separate second level of authorization, which are monitored by security module. The super user may configure the first and second level of authorization.
  • the first level of authorization is the authorization provided to access home automation module
  • the second level authorization is device or IoT component specific, which may require additional authorization.
  • the security module may have a list of IoT components which may require additional authorization.
  • the user can configure a security pattern for those components in the subject list and securely access them, by providing the such action/pattem.
  • a safety locker may have second level of authorization, but in order to access the safety locker, the user must pass the first level of authorization, as configured in security module.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Computer Hardware Design (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention provides a security in home automation system and a method of operating thereof. The method includes the steps of: inputting a data in the wearable device of user to connect to a home automation module through the security module, securely transmitting the data to the security module, checking and analyzing the data for an security pattern, identifying the security pattern by comparing the subject data with the stored data and approving and authorizing the user to access home automation module. In an embodiment, every user of home automation system has a profile data, security pattern, configuration data. In another embodiment, the security pattern may be one of or combination of, a gesture, accelerometer, gyro values, pin and password.

Description

ENHANCING SECURITY IN HOME AUTOMATION SYSTEM
FIELD OF THE INVENTION
[0001] The present invention relates generally to smart environments. In particular, this pre set invention relates to security in automation systems and methods that are configured to automatically and/or remotely control products, devices and appliances in a house or other residential or commercial building.
BACKGROUND OF THE INVENTION
[0002] Home automation involves controlling various devices or systems that can be present in homes. Home automation technologies can allow for local and/or remote control of home automation devices. Typically, home automation may include remote and centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, security locks of gates and doors and other systems, to provide improved convenience, comfort, energy efficiency and security. The popularity of home automation has been increasing greatly in recent years due to much higher affordability and simplicity through smart phone and tablet connectivity. The concept of the Internet of Things (IOT) has tied in closely with the popularization of home automation. The Internet of Things (IOT) is the network of physical objects or“things” embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Further, it is also important to support and protect such closed networks and all connected devices, through one or more security standards. The conventional security standards include protection or prevention from theft or damage to the hardware, software and information passing through them. It further includes controlling of physical access to the hardware and protecting against one or more harm which comes through network access, data injection of malicious code which may occur due to the malpractice by users, operators, which are intentional, or accidental, or due to them being tricked into deviating from secure procedures.
[0003] As society advances, households within the society may become increasingly diverse, having varied household norms, procedures, and rules. Unfortunately, because so-called smart devices have traditionally been designed with pre-determined tasks and/or functionalities, uses one or more conventional security methods, comparatively fewer advances have been made regarding using these devices in diverse or evolving households or in the context of diverse or evolving household norms, procedures, and rules. Accordingly, there is still a need for improved and advanced security in home automation systems, methods, and technologies, to provide confidentiality, integrity and authentication.
SUMMARY OF THE INVENTION
[0004] The present invention provides a security in home automation system and a method of operating thereof. The method includes the steps of: inputting a data in the wearable device of user to connect to a home automation module through the security module, securely transmitting the data to the security module, checking and analyzing the data for an security pattern, identifying the security pattern by comparing the subject data with the stored data and approving and authorizing the user to access home automation module. In an embodiment, every user of home automation system has a profile data, security pattern, configuration data. In another embodiment, the security pattern may be one of or combination of, a gesture, accelerometer, gyro values, pin and password.
[0005] To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF FIGURES
[0006] These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
[0007] Fig. 1 is a system illustrating a home automation module with a security module in an embodiment of the present invention.
[0008] Fig. 2 illustrates the example scenario in which plurality of smart wearables are connected to the home automation module through the security module.
[0009] Fig. 3A, 3B and 3C illustrates the example combination of connections between the smart wearable devices, security module and the home automation module.
[0010] Fig. 4 is an example flowchart illustrating the steps involved in authenticating/authorizing the user for home automation module by the security module in an embodiment of the present invention. [0011] Figure 5A illustrates an example authorization pattern performed through hand 500 in an embodiment of the present invention.
[0012] Figure 5B, 5C and 5D illustrates the five different positions (520, 530, 540, 530 and 520) of hand 500 in an embodiment of the present invention.
[0013] Figure 6A and 6B illustrates an example configuration data stored in the security module.
[0014] Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION OF THE PREFERRED EXAMPLES
[0015] Fig. 1 is a system diagram 100 of network of devices in embodiment of the present invention. The system comprises, smart wearable device 102, a mobile device 104, a home automation module 106, an application server 110, a database 112. The home automation module 106 further comprises a security module 108. The smart wearable device 102 and mobile device 104 are directly connected to the home automation module 106 through the security module 108. In an embodiment, the security module 108 is an internal component of home automation module 106 or a standalone module externally connected with the home automation module 106. The security module 108 is used to provide set of one or more policies, practices which are to be adopted to provide access to the authorized user and to prevent and prudently monitor unauthorized access, misuse or modification of data in the home automation module 106. In one embodiment, the security module 108 is a series of one or more integrated modules connected in the same runtime environment. The security module 108 is capable of authenticating the user (of the smart wearable device 102 or mobile device 104) for home automation module 106, through one or more pattern of actions performed by the first user through the subject smart wearable device 102. In other words, the security module 108 manages the user, and organizes user profiles, user actions, user activities to streamline the accessibility for the home automation module 106. [0016] The security module 108 receives one or more inputs from the user’s smart wearable device 102 and mobile device 104. The security module 108 further extends permission/access to the user for home automation module 106, only when the user is successfully validated by one or more authorization methods. While configuring the security for home automation module 106, the user may enter a pin /setup an action/pattem (for example, gesture, accelerometer/gyro values, pin, password, iris data, finger print etc), in the security module 108 and to access the home automation module 106. The application server 110 and database 112 are connected to the home automation module 106 to centrally process the queries, of one or more users, which are received from one or more smart wearable devices 102 and mobile devices 104. In an embodiment, the database 112 is a centralized repository, wherein all policies, procedures, profiles, activities and any data with respect to home automation module 106 and security module 108 kept in an organized manner and securely stored. In an embodiment, the security module 108 receives user query to access home automation module 106, when the user is in vicinity of his home. In another embodiment, the user may remotely control home automation module 106 only when such access is authorized by the security module 108, and wherein, security module 108 provide such access to one or more selected devices of the user.
[0017] In an embodiment, the smart wearable device 102 is also capable of detecting any actions/pattems/gestures performed by the user, through one or more sensors, configured thereon, which forms the authorization pattern (a security pattern) to access the home automation module 106. In another embodiment, the one or more actions/pattems/gestures may be sequentially performed, one after the other, by the user to complete one authorization pattern. In other words, the authorization pattern to access the home automation module 106 may be one action or series of actions, that are performed in a smart wearable device 102. When such actions are performed by the user, the sensors units configured in smart wearable device 102 is allowed to capture and record the such one or more series of action, sequentially and consider them as an authorization pattern or a security pattern.
[0018] The security module 108 is configured to allow only such user, who performs pre- configured actions/pattem through the one or more connected smart wearable device 102. The pattern is not device specific, the user can use any smart wearable device 102 and perform his/her authorization pattern to access the home automation module 106. The actions, which are captured by the smart wearable device 102 are stored as a‘pattern’ and transmitted (as an encrypted content) to the security module 108 through one or more communication methods or standards, that include, but not limited to, Bluetooth, WiFi, NFC. [0019] In an embodiment, the security module 108 enables the home automation module 106 only when user is identified and authorized by the security module 108. Once, the user is authenticated, the home automation module 106 will allow commands/inputs from the subject smart wearable device 102.
[0020] In one example, when the smart wearable device 102 is worn by the user (in the vicinity of security module of home automation module/hub), the smart wearable device 102 prompts the user to perform the actions in order to authorize the user. In another embodiment, the smart wearable device need not be in the vicinity of security module, and the communication between the smart wearable device and security module happens through one or more medium and long- range communication standards, which include not limited to, cellular networks, LoRaWAN. The security module processes the data from the user and authorize the user only when the input data from the user is matching with the stored data. Further, after authorization, the security module 108 creates a session and unlocks the features, configured for the subject user, and the user’s smart wearable device 102 provide one or more options and accessibility for the user to interact with the home automation module 106. In one example, the user any time during the ongoing session, can pause the session for 10-15 minutes, by tapping the smart wearable device 102 or performing an action in the mobile device 104 and later resume the session. Also, the user can terminate the session any time. In another embodiment, when the session is inactive for more than 10 minutes, the security module 108 automatically terminates the subject session, and request the user to perform authorization pattern to confirm and re-authorize the access to the home automation module 106.
[0021] In an embodiment, the security module 108 scan for devices either new or already connected devices and further particularly identifies smart wearable devices which are in the range and vicinity. If it is a new device, and subject user requests the access for home automation module 106, by manually initiating a request in mobile device 104 (through a mobile application) or through tapping the smart wearable device, twice (for example), then the security module 108 initiates a configuration procedure and setup the user to access home automation module. During the configuration stage, the security module 108 requests the user to set an authorization pattem/action to authorize him/her for the home automation module 106. The subject authorization pattem/action are stored in the security module 108 as well as processed by the application server 110 and eventually stored in the database 112 of the system. Further, while configuring new devices, the user may manually enter one or more particulars of smart wearable device 102. The particulars may include user and device details, for example, name, age, type of smart wearable device (for example, smart watch, analog watch, band or any IoT device), with their unique ID etc. In an embodiment, the security module and home automation module may have a unique ID, or passcode, which is only known to the user (who had purchased the modules). The user details, device details (smart wearable device, mobile device, security module, home automation module) along with the authorization pattern are processed by the application server 110, and stored as‘user configuration data’ in the profile of the user in database 112. Further, a copy of user configuration data is stored in the memory of security module 108. In an embodiment, the security module 108 may store up to 10 user configuration data. During configuration, the user can create a group of users who need to access the home automation module. Upon such group creation, an invitation request is immediately shared with the other users to provide their smart wearable device details, mobile device details, profile details, and to configure their authorization pattern for the subject home automation module. In another embodiment, the invitation request can only be created by a super user. In yet another embodiment, the super user is a normal user, who has advanced authorization access to both security module and home automation module.
[0022] In another example, the user can configure one or more authorization pattem/action to access home automation module 106. The example authorization pattem/action may be‘two claps’ followed by‘two punches’. This action of the user is sequentially captured by the smart wearable device 102 and the same is being registered by the security module, along with the details of subject smart wearable device 102.
[0023] In yet another embodiment, the security module 108 may suggest one or more authorization patterns for the user and user can choose any one or more such patterns which may be sequential in nature and subsequently register with the security module 108. In another embodiment, the action may be one of entering a code (password, or pin) or finger print authorization on the smart wearable device 102. The user can configure plurality of pattems/actions (through smart wearable) in the security module and to access the home automation module. In another embodiment, a smart wearable can recognize one or more authorization pattems/actions of the user. In yet another embodiment, the smart wearable is specific to one action/pattem.
[0024] Further, the security module 108 can only be accessed by a super user, who configures and monitors home automation module 106 and provide access to one or more users. The security module 108 may limit the number of users to access the home automation module 106 or super user can configure the total number of users for a home automation module 106.
[0025] Further, the security module 108 provide access to all components in home automation module 106. The accessibility can be provided to control and monitor door/window, kitchen, lighting, one or more rooms, electricity, water flow and all other components which are part of home automation module 106.
[0026] In an example, the smart wearable device 102 is a watch (analog), which is used to capture user actions (through pressing the crown, like one press, two press etc) or through one or more buttons, the security module 108 appropriately identifies the user action through the connected watch. The pattern for analog watch may be different from another smart wearable device and have a different configuration procedure. In another example, the smart wearable device 102 is a smart watch/ band or any apparel, having a display screen, which is used to capture user actions (through tapping the screen, or gesture actions, patterns etc), the security module 108 appropriately identifies the user action through the connected smart watch/band or apparel.
[0027] In an embodiment, the security module 108 authenticates the user every time he wears the smart wearable device 102, and authorize the user, to send the instructions for the home automation module 106. In another embodiment, when the smart wearable device 102 is removed by the user and the authorization is automatically cleared by the security module 108. Further, the smart wearable device 102 may have a proximity sensor, usually at the back, to particularly detect the device is being removed from hand (of the user who was wearing it), hence the authorization is cleared, and nobody shall be able to access the home automation module 106. If in case, when the smart wearable device 102 is forcefully removed from hand, then also the authorization is cleared immediately, through the readings from accelerometer sensor.
[0028] In an embodiment, the smart wearable device 102 may be worn by two people, then based on their action/ pattern, the security module 108 identifies the user and grant authorization to the home automation module 106. In another embodiment, each IoT component in home may be configured with an authorization pattern, which is validated by the security module 108 of home automation module 106. When the security module 108 receives the accurate pattern for the selected IoT component, only then the home automation module 106 shall grant permission to selected IoT component, otherwise access is denied, for example, safety locker.
[0029] Figure 2 illustrates the example scenario in which plurality of smart wearables are connected to the home automation module through the security module. Each of the smart wearable device 1022, 1024, 1026...102n is paired with the home automation module 106 and the security module 108 of home automation module 106 is capable of identifying the smart wearable device 1022, 1024, 1026...102n in real-time and also capable of switching between user configuration settings. Each smart wearable device 102 is authenticated by the security module 108 and the security module is capable of authorizing the smart wearable devices 102 for home automation module 106.
[0030] Figure 3A, 3B and 3C illustrates the example combination of connections between the smart wearable devices, security module and the home automation module.
[0031] In an embodiment, the security module 108 (of home automation module 106) stores profiles of user. The profiles of user further comprise, Unique identification number (UIN), device name, wearable type, configurations, authorization pattems/vahies, commands/instructions to be performed for scheduled activities, total active duration of profile, list of all IoT components connected with home automation module, accessible list of IoT components, threshold values for each IoT component, condition of each IoT component (active/idle) etc. The security module 108 provide access to the home automation module 106 by authenticating the user with authorization patterns.
[0032] Figure 3 A illustrate combination of one smart wearable device 1022 paired with the home automation module 106 and connected through the security module 108. Figure 3B illustrate combination of two smart wearable devices 1022 and 1024 paired with the home automation module 106 through the security module 108. Figure 3C illustrate combination of three smart wearable devices 1022, 1024, and 1026 paired with the home automation module 106 the security module 108. The home automation module 106 is configured to receive commands from smart wearable devices 1022, 1024, 1026.
[0033] In an embodiment, a single user can have multiple profiles (configuration settings for connected IoT components) in the home automation module. In another embodiment, the user may select a profile (from the list of profiles) to be exhibited by the home automation module. In another embodiment, each user may have a default profile. The profiles are specific in nature and vary between user to user. The home automation module 106 is pre-programmed to accept and execute the instructions based on the profile data.
[0034] Figure 4 is an example flowchart illustrating the steps involved in authenticating/authorizing the user for home automation module by the security module in an embodiment of the present invention. The method 400 includes the step 410 of inputting a data in the wearable device to connect to a home automation module through the security module. The input data is appropriately captured by the wearable device and the subject data is being securely transmitted to the security module in step 420. In an embodiment, the data is encrypted by one or more encryption standards. Further, in step 430, the security module receives the data from the wearable. The security module may use the one or more decryption standards to decrypt the encrypted data. In step 440, the method 400 performs a check whether the data received is an authorization pattern. In an exemplary implementation, the security module may use one or more matching technique to identify the subject data is an authorization pattern. In an embodiment, the authorization pattern may have a unique ID and user ID, through which, the security module identifies such pattern from the wearable devices. When, the security module identifies the received data is an authorization pattern then the control is transferred to step 450, otherwise, the control is transferred to step 460. In step 450, the security module extracts the pattern into first values or first set of values. In one example, the data having authorization pattern is segmented into various parameters, such as user name, device type, device id, authorization type etc. During configuration of home automation module through the security module, a unique id is configured for each user. In an implementation, the unique id may be same for all the smart wearable devices belonging to the same user. In step 470, the security module check whether the first values match with the already stored values of subject user. If the values are matching then the user is approved and control is transferred to step 480, otherwise, the control is transferred to step 460. In step 480, the security module authenticates and authorizes the user for home automation module, and provide access to only those components of home automation module, attributing to respective home automation policy. In step 460, the security module requests the user to re-enter the data having authorization pattern.
[0035] Figure 5A illustrates an example authorization pattern performed through hand 500 in an embodiment of the present invention. As shown there, the user is wearing a smart wearable device 510, who performs the authorization pattern, in this case waving a hand sideways. The ‘waving hand sideways’ authorization pattern is split into 5 partial patterns (at each position of hand). The smart wearable device 510 having one or more sensors, identifies movement of hand which is considered as position of the hand. The smart wearable device captures the data and accommodate them as one single authorization pattern or sequence of authorization pattern. In this example, the smart wearable device identifies first position (520), second position (530), third position (540), fourth position (530) and fifth position (520) of the hand and combines them as‘one single authorization pattern’. Similarly, various other actions are captured by the smart wearable device and such action in the form of data are transmitted to the security module for authorization. Figure 5B, 5C and 5D illustrates the five different positions (520, 530, 540, 530 and 520) of hand 500 in an embodiment of the present invention.
[0036] Figure 6A and 6B illustrates an example configuration data stored in the security module. As shown there, in an embodiment, each user has a profile data, security pattern, configuration data in the home automation system. The profile data may include, name, age, type of smart wearable device (for example, smart watch, analog watch, band or any IoT device), with their unique ID etc. The security pattern is one of or combination of pin, password, biometric, gesture actions. The user 1 in figure 6A is connected to the security module, wherein, user can enter the authorization pattern only through pattern (gesture) pin and biometric. The security module further receives only those input from the connected smart wearable device, for authorization. The user in figure 6B is connected to the security module, wherein, the user is limited to enter the authorization only through pattern and pin. Further, user enter one or more security patterns to access the home automation module, but however, such user may be accessible to few of the IoT components in home automation module. In an embodiment, the configuration data holds the key list of components that are to be accessed / operated by the user or users, in reference to all IoT components in the home automation module. The user 1 in figure 6A is having a set of authorized IoT components in home automation module. The user 1 can only have access to control‘light (Access: ALL) and ‘light 2’ (Access: On/Off only), whereas the user does not have access to control‘motor 1’ (Access: None). Whereas, the user 2 in figure 6B is also having another set of authorized IoT components in home automation module. The user 2 having access to control‘TV-Remote’ (Access: ALL),‘Chimney’ (Access: On/Off only),‘Coffee maker’ (Access: ALL),‘Lights’ (Access: ALL) and and‘Fan & AC’ (Access: Yes - Auto cool only). In the similar way, one or more users of the home automation system may have access to one or more IoT components. In yet another embodiment, each of the IoT component may have a separate second level of authorization, which are monitored by security module. The super user may configure the first and second level of authorization. The first level of authorization is the authorization provided to access home automation module, whereas, the second level authorization is device or IoT component specific, which may require additional authorization. Further, the security module may have a list of IoT components which may require additional authorization. In another embodiment, the user can configure a security pattern for those components in the subject list and securely access them, by providing the such action/pattem. For example, a safety locker may have second level of authorization, but in order to access the safety locker, the user must pass the first level of authorization, as configured in security module.
[0037] While various embodiments of the present disclosure have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of the present disclosure should not be limited by any of the above- discussed embodiments but should be defined only in accordance with the following claims and their equivalents.

Claims

Claims We Claim,
1. A system for authorizing a user to provide access for home automation comprising:
a smart wearable device configured with one or more sensors, wherein the smart wearable device is capable of detecting a first set of actions performed by a user, and preparing a first data having the first set of actions and profile information of subject user; a communication network, wherein, the first data from the smart wearable device is transmitted to a security module through the communication network;
a security module is capable of, analyzing the first data, identifying and extracting at least one of authorization type and pattern from the first data, validating the at least one of authorization type and pattern by comparing them with the information stored in a database in reference to the subject user, and providing and granting an access to the subject user, for a set of IoT devices configured in a home automation system; and
a database is capable of storing all profile information of one or more users including one or more device details, authorization types and patterns, configuration settings for security module and list of components in home automation system, wherein, the security module retrieves and compares the profile information, authorization type and pattern of the subject user, when subject user requests an access for the home automation system.
2. The system of claim 1, wherein, the smart wearable device which is configured with one or more sensors, finds and records one or more first set of actions includes a single action, series of actions or patterns or gestures performed by any body part of the subject user.
3. The system of claim 2, wherein, the smart wearable device captures at least one or more positions and movements of at least one hand of subject user, in real time.
4. The system of claim 1, wherein, the smart wearable device includes at least one of smart watch, analog watch, wearable band or any IoT device which detects and records the first set of actions of subject user.
5. The system of claim 4, wherein, the authorization pattern in the analog watch is generated by a subject user by pressing one or more crowns, at least for once, twice, thrice or sequentially to complete the whole authorization pattern, wherein, subject authorization pattern is a hardware level data.
6. The system of claim 4, wherein, one or more smart wearable devices are sequentially or simultaneously used and operated to generate at least one authorization pattern from the user.
7. The system of claim 1, wherein, the IoT devices in home automation include at least one of light, fan, AC, door, motor, TV, coffee maker, chimney, electrical circuits, safety lockers.
8. The system of claim 1, wherein, granting the access is a permission to use at least one of IoT device by the subject user, at least by the way of opening, closing, operating, checking a status, viewing and modifying the configuration settings of subject IoT device.
9. The system of claim 1, wherein, the authorization type includes at least one of or combination of, pin, password, gesture pattern, accelerometer & gyro values, iris data and fingerprint, wherein, the authorization pattern is a security information to determine the user's identity and accessibility.
10. A method for storing a user information comprising:
inputting and capturing a first set of actions through a smart wearable device of a user, and preparing a first data by the smart wearable device, wherein the first data includes at least one of first set of actions, device type, device Id, and name of the user;
transmitting the first data to a security module through a communication network; processing the first data by security module, wherein, the security module identifies and extracts at least one of authorization type and pattern from the first data for the subject user; and
storing the authorization type and pattern of the subject user as a user information at the database, wherein, the database contains all profile information of subject user including one or more device details, configuration settings for security module and list of accessible IoT devices in home automation system.
11. The method of claim 10, wherein, the first set of actions comprises at least one of or combination of authorization type and pattern.
12. The method of claim 11, wherein, the authorization type includes at least one of or combination of, pin, password, gesture pattern, accelerometer & gyro values, iris data and fingerprint, wherein, the authorization pattern is a security information to determine the user's identity and accessibility.
13. The method of claim 11, wherein, the authorization type and pattern are set of one or more sequential data inputted through the one or more smart wearable devices of the subject user, at a given interval of time.
14. A method for authorizing a user to provide access for home automation system through a smart wearable device comprising:
detecting a first set of actions performed by a user through one or more sensors configured in the smart wearable device and preparing a first data having the first set of actions and user information, wherein, the smart wearable device encrypts the first data; transmitting the first data over a communication network to a security module, wherein, the security module is capable of decrypting the first data;
analyzing the first data, identifying and extracting at least one of or combination of authorization type and pattern from the first data, validating the subject authorization type and pattern by comparing them with the information stored in the database in reference to the subject user, by the security module; and
providing and granting an access to the subject user for a set of IoT devices configured in a home automation system, by the security module, wherein, the set of IoT devices are permitted devices which are already configured by subject user.
15. The method of claim 14, wherein, the subject user makes a request in at least one of smart wearable device to provide access for home automation system.
16. The method of claim 14, wherein, granting the access is a permission to use at least one of IoT device by the subject user, at least by way of opening, closing, operating, checking a status, viewing and modifying the configuration settings of subject IoT device.
PCT/SG2020/050222 2019-04-12 2020-04-12 Enhancing security in home automation system WO2020209802A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG10201903293XA SG10201903293XA (en) 2019-04-12 2019-04-12 Enhancing security in home automation system
SG10201903293X 2019-04-12

Publications (1)

Publication Number Publication Date
WO2020209802A1 true WO2020209802A1 (en) 2020-10-15

Family

ID=72752220

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2020/050222 WO2020209802A1 (en) 2019-04-12 2020-04-12 Enhancing security in home automation system

Country Status (2)

Country Link
SG (1) SG10201903293XA (en)
WO (1) WO2020209802A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140143678A1 (en) * 2012-11-20 2014-05-22 Samsung Electronics Company, Ltd. GUI Transitions on Wearable Electronic Device
CN106059869A (en) * 2016-07-26 2016-10-26 北京握奇智能科技有限公司 Internet of things smart home equipment safety control method and system
CN106845193A (en) * 2016-12-30 2017-06-13 深圳智乐信息科技有限公司 A kind of method and system for managing smart home
CN108614962A (en) * 2018-04-11 2018-10-02 努比亚技术有限公司 Safety identification control method, wearable device and computer readable storage medium
US20180288209A1 (en) * 2017-03-29 2018-10-04 Samsung Electronics Co., Ltd. Method for managing and controlling external iot device and electronic device supporting the same

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140143678A1 (en) * 2012-11-20 2014-05-22 Samsung Electronics Company, Ltd. GUI Transitions on Wearable Electronic Device
CN106059869A (en) * 2016-07-26 2016-10-26 北京握奇智能科技有限公司 Internet of things smart home equipment safety control method and system
CN106845193A (en) * 2016-12-30 2017-06-13 深圳智乐信息科技有限公司 A kind of method and system for managing smart home
US20180288209A1 (en) * 2017-03-29 2018-10-04 Samsung Electronics Co., Ltd. Method for managing and controlling external iot device and electronic device supporting the same
CN108614962A (en) * 2018-04-11 2018-10-02 努比亚技术有限公司 Safety identification control method, wearable device and computer readable storage medium

Also Published As

Publication number Publication date
SG10201903293XA (en) 2020-11-27

Similar Documents

Publication Publication Date Title
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
US20180309750A1 (en) In-circuit security system and methods for controlling access to and use of sensitive data
US9953151B2 (en) System and method identifying a user to an associated device
US20170264608A1 (en) Visual biometric authentication supplemented with a time-based secondary authentication factor
CA2955354C (en) Networked access control system
CN108650212A (en) A kind of Internet of Things certification and access control method and Internet of Things security gateway system
JP6378773B2 (en) Method of accessing physically secure rack and computer network infrastructure
US20150024710A1 (en) Secure remote access using wireless network
US20070223685A1 (en) Secure system and method of providing same
CN104566822A (en) Management system of air conditioning unit
US11537697B2 (en) Authentication system and method
CN104144411B (en) Encryption, decryption terminal and the encryption and decryption approaches applied to terminal
US11367323B1 (en) System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
CN111917981A (en) Privacy protection method, device, equipment and computer readable storage medium
CN106940907A (en) access control system and device
CN113961896A (en) Teleconference encryption processing method and device, intelligent terminal and storage medium
WO2020058294A1 (en) Matching an user taken image with access control apparatus references for physical access control
CN104135480A (en) Entrance guard authorization system and entrance guard authorization method
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN110738764A (en) Security control system and method based on intelligent lock
WO2020209802A1 (en) Enhancing security in home automation system
CN112446982A (en) Method, device, computer readable medium and equipment for controlling intelligent lock
CN105991524A (en) Family information security system
CN117666376B (en) Intelligent home authority control system
CN110266651A (en) Internet of things equipment and method for internet of things equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20786754

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20786754

Country of ref document: EP

Kind code of ref document: A1