EP3252728B1 - Système et procédé pour un système d'alarme - Google Patents

Système et procédé pour un système d'alarme Download PDF

Info

Publication number
EP3252728B1
EP3252728B1 EP17172597.1A EP17172597A EP3252728B1 EP 3252728 B1 EP3252728 B1 EP 3252728B1 EP 17172597 A EP17172597 A EP 17172597A EP 3252728 B1 EP3252728 B1 EP 3252728B1
Authority
EP
European Patent Office
Prior art keywords
signal
deception
time slots
disarm
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP17172597.1A
Other languages
German (de)
English (en)
Other versions
EP3252728A1 (fr
Inventor
Haim Amir
Ohad Amir
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Essence Security International Ltd
Original Assignee
Essence Security International Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Essence Security International Ltd filed Critical Essence Security International Ltd
Publication of EP3252728A1 publication Critical patent/EP3252728A1/fr
Application granted granted Critical
Publication of EP3252728B1 publication Critical patent/EP3252728B1/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/008Alarm setting and unsetting, i.e. arming or disarming of the security system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/007Details of data content structure of message packets; data protocols

Definitions

  • the present invention in some embodiments thereof, relates to an alarm system and, more specifically, but not exclusively, to detecting an attempt at unauthorized disarming of an alarm system.
  • a typical alarm system installed on premises comprises one or more sensors for detecting motion, presence or intrusion, protecting one or more openings in premises or one or more areas of the premises.
  • the protected areas may be indoors or outdoors.
  • a gate, a door and a window are examples of possible openings protected by a sensor.
  • the one or more sensors are typically connected to a control panel, which may be in communication with a control center.
  • a control panel which may be in communication with a control center.
  • the control panel Upon detection of motion on premises, presence of a person or object on premises or an attempt at intruding the premises, for example by detecting opening of a protected opening, at least one of the sensors sends a signal to the control panel which may transmit a signal to the control center.
  • the control center may take one or more actions, for example calling an emergency center or activating an audio or visual alarm signal.
  • Alarm systems are installed in a wide variety of homes, offices, businesses and other locations.
  • a typical alarm system may be in one of a plurality of possible states, including fully disabled, fully active, and partially active.
  • an alarm system may be fully disabled at an office during office business hours.
  • the one or more sensors may not detect movement, presence or intrusion into premises, or the control panel may not transmit a signal to the control center.
  • An alarm may be fully active at the office after office business hours, when the office may be empty.
  • all of the one or more sensors may be active to detect movement, presence or intrusion into premises.
  • an alarm system may be partially active at night, where some of the one or more sensors are active and some are disabled.
  • some sensors protecting exterior openings of the house such as windows and doors may be enabled, whereas other sensors for detecting motion in rooms of the house may be disabled, to allow persons living in the house to move freely in the house.
  • the control panel may receive all sensor indications but may transmit to the control center only the relevant indications.
  • the plurality of states are controlled using one or more radio frequency (RF) signals.
  • the control panel typically includes a signal processor to receive one or more RF signals from a control device, for example a key fob having a plurality of buttons for controlling the state of the alarm system.
  • a person may press one of the plurality of buttons of the key fob to instruct the alarm system to change state to a requested state, resulting in the key fob sending an RF signal indicative of the requested state to the signal processor.
  • the signal processor processes the signal, identifies the requested state and instructs changing the state of the alarm system to the requested state.
  • an alarm system comprises at least one radio-frequency (RF) transceiver and at least one signal processor, electrically connected to the at least one RF transceiver.
  • the at least one RF transceiver is configured to: receive a first disarm RF signal from an alarm control device; and during a predetermined delay time after receiving the first disarm RF signal, transmit at least one deception RF signal during one or more transmission time slots selected from a plurality of consecutive time slots of the predetermined delay time, and determine whether one or more receive RF signals are received during one or more receiving time slots selected from the plurality of consecutive time slots, the one or more receiving time slots interleaved with the one or more transmission time slots.
  • the at least one signal processor is configured to determine an alarm system operation according to analysis of the one or more receive RF signals.
  • a method for an alarm system comprises: receiving a first disarm RF signal from an alarm control device; during a predetermined delay time after receiving the first disarm RF signal, transmitting at least one deception RF signal during one or more transmission time slots selected from a plurality of consecutive time slots of the predetermined delay time, and determining whether one or more receive RF signals are received during one or more receiving time slots selected from the plurality of consecutive time slots, the one or more receiving time slots interleaved with the one or more transmission time slots; and determining an alarm system operation according to analysis of the one or more receive RF signals.
  • the analysis comprises: matching at least one of the one or more receive RF signals with a predefined deception signal pattern; producing a true deception detection indication for each one of the one or more receive RF signals matching the predefined deception signal pattern; and selecting the alarm system operation according to the true deception detection indication. Detecting one deception signal is sufficient to identify an attempted intrusion.
  • the analysis comprises: producing a false deception detection indication subject to none of the one or more receive RF signals being received during the one or more receiving time slots or each one of the one or more receive RF signals failing to match the predefined deception signal pattern; and selecting the alarm system operation according to the false deception detection indication.
  • no RF signals are detected during the receiving slots, or when none of the one or more received RF signals match the predefined deception signal pattern, no deception is detected.
  • the at least one signal processor is further configured to: determine the first disarm RF signal is valid, subject to not receiving any of the one or more receive RF signals or producing only false deception detection indications; and receive a second disarm RF signal from the alarm control device after the predetermined delay time.
  • the alarm system operation comprises at least one of: instructing disarming the alarm system, and transmitting an acknowledgement RF signal to the alarm control device via the at least one RF transceiver. After identifying a valid disarm signal, also the retry may be considered valid.
  • the transmission time slots are selected at random by the signal processor upon reception of the first disarm RF signal for transmitting the at least one deception RF signal, and the reception time slots comprise all of the plurality of consecutive time slots different from the transmission time slots. Selecting a random pattern of transmitting slots reduces the probability of repeating the same sequence and increases the probability of detecting a recorded deception signal in one of the receiving slots. Listening for received signals during all remaining time slots increases probability of detecting a retransmitted deception sequence.
  • an amount of the transmission time slots is between 15 % and 30 % of an amount of the plurality of consecutive time slots. This ratio allows a balance between high probability of detecting a deception and reducing overhead of frequently changing between transmission and reception.
  • the predetermined delay time is partitioned into 25 consecutive time slots. This amount of consecutive time slots allows a balance between high probability of detecting a deception and reducing overhead of frequently changing between transmission and reception.
  • the at least one deception RF signal is protected by an error detecting code being a 16-bit cyclic redundancy check.
  • an error detecting code being a 16-bit cyclic redundancy check.
  • Protecting the at least one deception RF signal reduces the probability of falsely detecting deception.
  • 16-bit cyclic redundancy check is easy to implement and introduces little overhead to processing and bandwidth.
  • the at least one deception RF signal is encrypted using a method selected from the group of: obfuscation, exclusive-or with a predefined seed word, and exclusive-or with a random seed word. Encrypting the at least one deception RF signal reduces the probability of an unauthorized party distinguishing between the at least one deception RF signal and the disarm RF signal. Obfuscation and exclusive-or are easy to implement and introduce little overhead to processing and bandwidth.
  • alarm system operation comprises at least one operation selected from the group comprising: notifying a control center operatively connected to said at least one signal processor of an attempted intrusion, subject to producing at least one true deception detection indication and delivering an electrical current to a device capable of emitting an audio signal or a visual signal, electrically connected to said at least one signal processor, subject to producing at least one true deception detection indication.
  • the at least one deception RF signal comprises at least one of: an identifier, a time stamp and a random number, for use in identifying an origin of a recorded deception RF signal.
  • the identifier consists of 32 binary bits
  • the time stamp consists of 32 binary bits
  • the random number consists of 8 binary bits.
  • matching the predefined deception signal pattern comprises detecting in the one received RF signal at least one of: an identifier, a time stamp and a random number.
  • the analysis further comprises: detecting a packet number in the first disarm RF signal; comparing a difference between the packet number and a previously stored packet number with a predefined threshold number; and producing a true deception detection indication when the difference is greater than the predefined threshold number.
  • Adding a packet number to the disarm RF signal provides an additional means for detecting resending a recorded signal by detecting a repeated packet number.
  • the present invention in some embodiments thereof, relates to an alarm system and, more specifically, but not exclusively, to detecting an attempt at unauthorized disarming of an alarm system.
  • the term “disarm” means "instructing to change to a disabled or a partially active state” and the term “signal” means "RF signal”.
  • Attempts to intrude into a premises protected by an alarm system may include attempts to break through any component of the alarm system.
  • a typical RF signal may be detected and recorded in an identified range of distances from a device sending the RF signal.
  • a person unauthorized to access the premises may record a legitimate signal sent by an alarm control device instructing to disarm the alarm system, and retransmit the recorded signal at a later time.
  • RF radio frequency
  • a typical alarm system cannot distinguish between the original legitimate signal and the recorded signal, and upon reception of the recorded signal the alarm system's signal processer may instruct disarming the alarm system.
  • a recorded signal may be used to gain unauthorized access to premises.
  • Authentication solutions using encrypted signals or including predefined information in one or more signals transmitted by an alarm control device are limited in that they require replacing multiple existing alarm control devices, for example replacing existing key fobs with alarm control devices supporting encryption or predefined information.
  • alarm control devices supporting encryption or sending predefined information may be more expensive than existing simple alarm control devices such as existing key fobs.
  • the present invention in some embodiments thereof, enables an alarm system to distinguish between a legitimate signal and retransmission of a previously recorded signal, without requiring a specially configured alarm control device, by changing the way the signal processor operates.
  • the signal processor after receiving a disarm signal from an alarm control device, sends one or more deception signals. An attempt to record the disarm signal will record the one or more deception signals as well. When transmitting the recorded signal, the one or more deception signals are transmitted as well and may be received by the signal processor. In these embodiments, the signal processor interchangeably transmits the one or more deception signals and checks for reception of one or more other signals. When one or more of the other signals are determined to be deception signals, the signal processor determines an attempt at unauthorized intrusion.
  • the signal processor analyzes the RF signal imperfections of a received disarm signal for imperfections.
  • a typical signal transmitted by an alarm control device comprises a sequence of digital bits encoded in an analog carrier signal comprising a plurality of sinus signal components.
  • the transceiver introduces noise into the transmitted signal, including at least one of a frequency imperfection of a sinus signal, a phase imperfection of a sinus signal and an amplitude imperfection of a sinus signal.
  • carrier frequency offset, phase noise, in-phase and quadrature (IQ) imbalance and signal nonlinearity that is, nonlinear changes in an output signal strength in response to an input signal strength.
  • RF signal imperfections is signal imperfection of the RF transceiver and may be quantified, combined and normalized, resulting for example in a number between 0 and 1.
  • Two RF transceivers are typically characterized by distinctively different RF signal imperfections.
  • a recorded disarm signal typically comprises a recorded sequence of digital bits. When an unauthorized alarm control device transmits a recorded disarm signal, the unauthorized alarm control device re-encodes the recorded sequence of digital bits in a new analog carrier signal.
  • the signal processor compares the RF imperfections of a received preamble signal to a predetermined set of RF imperfections associated with legitimate transmitters. When the RF imperfections of the received preamble signal do not comply with the predetermined set of RF imperfections, the signal processor determines in these embodiments an attempt at unauthorized intrusion.
  • the alarm control device is configured to send a signal indicating an event, and receive a signal including an identification of a function to be executed by the alarm control device.
  • the alarm control device may be a key fob, configured to send a signal indicating a button pressed and a duration, for example "short press on button 1", and receive a signal including an encoding of an identification of a function, for example "function 3".
  • a possible function is to turn on a light emitting diode (LED) for a predetermined period of time.
  • the alarm control device upon receiving a signal including an encoding of an identification of a function unrecognized by the alarm control device, the alarm control device sends an error message indicating an error and the identification of the unrecognized function.
  • the signal processor after receiving a disarm signal from an alarm control device, sends a deception signal including a randomly selected identifier of an invalid function. An attempt to record the disarm signal will record the deception signal as well. When transmitting the recorded signal, the deception signal is transmitted as well and may be received by the signal processor. In these embodiments, after transmitting a deception signal including an invalid-function identifier, the signal processor checks for reception of another signal.
  • the received signal is processed to extract a possible unknown-function identifier.
  • the extracted identifier is compared with the invalid-function identifier.
  • the signal processor determines in these embodiments an attempt at unauthorized intrusion, since the extracted identifier is assumed to be the result of a pre-recorded signal.
  • the present invention may be a system, a method, and/or a computer program product.
  • the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
  • the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
  • the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
  • a network for example, the Internet, a local area network, a wide area network and/or a wireless network.
  • the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • LAN local area network
  • WAN wide area network
  • Internet Service Provider for example, AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
  • electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
  • FPGA field-programmable gate arrays
  • PLA programmable logic arrays
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the block may occur out of the order noted in the figures.
  • two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • system 100 comprises one or more sensors 111, for detecting motion within premises, presence within the premises or intrusion into an opening of the premises.
  • One or more sensors 110 may be connected to a control panel 106 comprising alarm controller 110 comprising at least one hardware processor.
  • alarm controller 110 is configured to instruct activation of the one or more sensors and disabling the one or more sensors.
  • system 100 comprises a signal processor 101 connected to alarm controller 110 for controlling the system.
  • Signal processor 101 may be electrically connected to alarm controller 110.
  • signal processor 101 is connected to alarm controller 110 via a digital communication network, such as a Local Area Network.
  • signal processor 101 is electrically connected to alarm controller 110.
  • signal processor 101 is electrically connected to an RF transceiver 102, for communicating with one or more alarm control devices 103 such as key fobs.
  • signal processor 101 comprises at least one hardware processor.
  • RF transceiver 102 receives one or more RF signals from alarm control device 103.
  • each of the one or more RF signals encodes a sequence of digital bits in an analog carrier signal.
  • one or more of the RF signals is a disarm message, sent from alarm control device 103 to signal processor 101 to instruct disarming alarm system 100.
  • signal processor 101 processes the disarm message to determine whether the message is a valid message received from an authorized alarm control device, or an unauthorized intrusion attempt. Upon determining a valid disarm message, signal processor 101 may instruct disarming alarm system 100.
  • signal processor 101 instructs alarm controller 110 to disarm the system.
  • signal processor 101 is electrically connected to one or more alarm devices 105 capable of emitting an audio signal such as an alarm sound, and/or a visual signal such as a flashing light, to attract the attention of a person close enough to one or more alarm devices 105 to notice the alarm signal or visual signal.
  • signal processor 101 drives an electrical current to one or more alarm devices 105 to emit the audio or visual signal.
  • signal processor 101 is connected to one or more control centers 104, comprising at least one hardware processor.
  • signal processor 101 upon detecting an intrusion attempt, signal processor 101 notifies control center 104 of the intrusion attempt detection. Following receiving notification of an intrusion attempt detection, control center 104may perform one or more actions such as call a designated person, record an event to an event log, etc.
  • signal processor 101 is electrically connected to a non-volatile digital storage 112 such as a hard disk or an electrically erasable programmable memory, for the purpose of storing reference data used to determine validity of a received message.
  • a non-volatile digital storage 112 such as a hard disk or an electrically erasable programmable memory
  • system 100 may implement one or more of the following methods.
  • a possible method to detect an intrusion attempt uses interleaved transmission and reception of a deception signal.
  • FIG. 2A showing a schematic illustration of an exemplary RF disarm signal transmitted by an alarm control device 103 to a signal processor 101, according to some embodiments of the present invention.
  • alarm control device 103 transmits in such embodiments a first disarm message 201.
  • time 212 indicates the time at which alarm control device 103 completed transmission of disarm message 201.
  • alarm control device 103 transmits a second disarm message 202 at time 214.
  • signal processor 101 Upon receiving a disarm message, in some embodiments of the present invention signal processor 101 transmits a deception signal.
  • FIG. 2B showing a schematic illustration of a possible deception RF signal transmitted by a signal processor 101 via an RF transceiver 102, according to some embodiments of the present invention.
  • the predetermined delay time is partitioned into a plurality of consecutive time slots.
  • a non-limiting example of an amount of time slots is 25 time slots.
  • time 213 indicates the earliest time at which RF transceiver 102 receiving disarm message 201 can start transmitting.
  • signal processor 101 selects a group of transmission time slots from the plurality of consecutive time slots and transmits one or more deception sequences 220 by transmitting in each of the transmission time slots one deception sequence.
  • a recorder recording the signals transmitted to signal processor 101 will record both disarm message 201 and the one or more deception sequences 220.
  • FIG. 2C showing a schematic illustration of a possible recorded RF signal, according to some embodiments of the present invention.
  • the recorded signal 230 comprises disarm message 201, and the one or more deception sequences 220 transmitted by signal processor 101.
  • the group of transmission slots is selected at random by signal processor 101 upon receiving a disarm message, and comprises fewer slots than the plurality of consecutive time slots.
  • the amount of transmission slots is between 15 % and 30 % of the amount of slots in the plurality of consecutive time slots.
  • the amount of transmission slots is 25 % of the amount of slots in the plurality of consecutive time slots.
  • the amount of transmission time slots may be 5.
  • an unauthorized alarm control device transmitting a recorded signal transmits the disarm message originally transmitted by an authorized alarm control device, followed by the one or more disarm sequences as previously transmitted by the signal processor.
  • an alarm control device 105 transmits at time 241 a recorded signal 250, comprising a disarm signal 201 originally transmitted by an authorized alarm control device.
  • transmission of disarm signal 201 ends at time 242.
  • signal processor 101 selects a new group of transmit slots from the plurality of consecutive time slots between time 243 and time 244, and transmits via RF transceiver 102 one or more deception signals 260.
  • the new group of transmit slots may be different from the group of transmit slots in the recorded signal.
  • RF transceiver 102 listens for received signals in a group of receive time slots selected from the plurality of consecutive time slots such that the receive time slots are different from the new group of transmit time slots and are interleaved with the new group of transmit time slots.
  • the receive time slots are all of the plurality of consecutive time slots not in the new transmit time slots.
  • signal processor 101 optionally detects one or more recorded deception sequences during the receive time slots, for example in slot 262.
  • one or more time slots are both in the new group of transmit time slots and in the group of transmit time slots in the recorded signal, for example slot 261. In such slots, signal processor 101 cannot detect a deception signal, since transceiver 102 is transmitting.
  • Detecting a deception signal in a receive time slot indicates a high probability that the disarm signal is a recorded signal retransmitted by an unauthorized alarm control device.
  • detecting no deception signal in any of the receive time slots indicates a high probability that the disarm signal was transmitted by an authorized alarm control device.
  • the probability of repeating the exact same group of time slots is less than 1 in 50,000. Using fewer time slots in the plurality of consecutive time slots increases the probability of repeating an exact same group of time slots.
  • a greater amount of time slots in the plurality of consecutive time slots or a greater amount of transmit slots may increase security by reducing the probability of repeating an exact same group of time slots, but in addition might increase power consumption due to more frequently switching the RF transceiver between transmitting and receiving.
  • FIG. 3 showing a flowchart schematically representing an optional flow of operations 300 for detecting an intrusion attempt using interleaved transmission and reception of a deception signal, according to some embodiments of the present invention.
  • an RF transceiver 102 electrically connected to a signal processor 101 receives at 301 a first disarm RF signal from an alarm control device 103.
  • alarm control device 103 waits for an acknowledgement from signal processor 101 for a predetermined delay time.
  • signal processor 101 partitions the predetermined delay time into a plurality of consecutive time slots, for example 25 time slots.
  • signal processor 101 transmits at 302 one or more deception RF signals during transmission time slots selected from the plurality of consecutive time slots.
  • each of the one or more deception RF signals comprises at least one of an identifier, a time stamp and a random number.
  • An identifier may be used to identify the origin of a deception RF signal, and in particular a recorded RF signal.
  • a time stamp may be used to identify an original time of a recorded deception RF signal.
  • a random number may be used to detect repeated deception RF signals, having the same random number.
  • a time stamp and an identifier may each consist of 32 digital bits.
  • a random number may consist of 8 digital bits.
  • each of the one or more deception RF signals comprises a packet number in a sequence of packet numbers.
  • the packet number may consist of an 8 bit digital number. When the packet number consists of 8 digital bits, the packet number is a number in a sequence modulo 256.
  • signal processor 101 optionally intercepts at 303 a plurality of RF signals during receiving time slots selected from the plurality of consecutive time slots and interleaved with the transmission time slots.
  • RF transceiver 102 optionally sends the one or more RF signals to signal processor 101.
  • signal processor 101 receives the one or more RF signals and analyzes the first disarm RF signal and the one or more RF signals to produce at least one deception detection indication.
  • analyzing the one or more RF signals comprises matching at 304 at least one of the one or more RF signals with a predefined deception signal pattern.
  • matching one of the RF signals with the predefined deception signal pattern comprises detecting in the one RF signal at least one of an identifier, a time stamp and a random number.
  • signal processor 101 produces at 305 a true deception detection indication.
  • the first disarm RF message comprises a packet number
  • signal processor 101 may store a last packet number received.
  • analyzing the first disarm RF message comprises detecting a packet number in the first disarm RF message and comparing a difference between the stored packet number and the detected packet number with a predefined threshold number. When the difference is greater than the predefined threshold number, signal processor 101 optionally produces a true deception detection indication.
  • signal processor 101 optionally determines an alarm system operation according to the at least one deception detection indication. Examples of an alarm system operation are processing a message, sending an acknowledgement signal, instructing disarming the alarm system, sounding an alarm and notifying a control center. When at least one true deception detection indication is produced, signal processor 101 optionally determines an intrusion attempt at 308. Optionally, signal processor 101 next notifies control center 104 at 309. Optionally, at 310 signal processor 101 delivers an electrical current to one or more alarm devices 105 capable of emitting an audio signal or a visual signal.
  • signal processor 101 When no true deception detection indication is produced, signal processor 101 optionally determines a valid first disarm RF signal. Optionally, signal processor 101 determines a valid first disarm RF signal when no RF signals are received in the receive time slots. In some embodiments, after the predefined delay time alarm control device 103 sends a second disarm RF signal. Optionally, signal processor 101 receives the second disarm signal via RF transceiver 102 at 311 after determining a valid first disarm RF signal, and at 312 optionally sends alarm control device 103 an acknowledgment RF signal. Optionally, signal processor 101 instructs disarming the alarm system at 313.
  • the at least one deception RF signal is protected by an error detecting code.
  • the error detecting code is a 16-bit cyclic-redundancy-check.
  • the at least one deception RF signal is encrypted.
  • the at least one deception RF signal is encrypted using obfuscation.
  • the at least one deception RF signal is encrypted using exclusive-or with a predefined seed word or with a random seed word.
  • Up to a predetermined number of RF signals received during one or more of the receive time slots and not recognized as a deception RF signal may be discarded and ignored by signal processor 101.
  • Another possible method to detect an intrusion attempt uses RF imperfections of a signal. Following is an optional method implemented by the system in some embodiments of the present invention, to detect an intrusion attempt using RF imperfections of a signal.
  • a signal transmitted by an alarm control device comprises a sequence of digital bits encoded in an analog carrier signal.
  • the signal comprises a preamble and/or a code word before a message.
  • an RF transceiver 102 receives at 401 a preamble RF signal from an alarm control device 103.
  • the preamble RF signal comprises a sequence of preamble digital bits encoded in an analog preamble carrier signal.
  • RF transceiver 102 sends the received preamble RF signal to a signal processor 101 and at 402 signal processor 101 analyzes the preamble RF signal to determine a plurality of preamble imperfections of the analog preamble carrier signal.
  • preamble imperfections are an offset of a frequency of the analog preamble carrier signal, a phase noise in the analog preamble carrier signal, an IQ imbalance in the analog preamble carrier signal, and nonlinearity on the analog preamble carrier signal.
  • a level of sinus signal inaccuracy in the sinuses making up the analog preamble carrier signal's may be expressed as a normalized range of numbers.
  • the signal processor optionally compares the plurality of preamble imperfections to a plurality of reference preamble imperfections to determine preamble compliance.
  • signal processor 101 uses a correlator having a sample rate of 16 bits per second to compare the plurality of preamble imperfections to the plurality of reference preamble imperfections.
  • signal processor 101 optionally selects an alarm system operation to perform according to the preamble compliance.
  • signal processor 101 optionally determines an intrusion attempt at 407.
  • signal processor 101 next notifies a control center 104 at 410.
  • signal processor 101 delivers an electrical current to one or more alarm devices 105 capable of emitting an audio signal or a visual signal.
  • signal processor 101 optionally determines a valid message.
  • signal processor 101 at 409 optionally processes the message.
  • signal processor 101 optionally instructs disarming the alarm system, for example by instructing an alarm controller 110.
  • RF transceiver 102 receives a synchronization word (sync-word) after the preamble.
  • sync-word a synchronization word
  • FIG. 5 showing a flowchart schematically representing another optional flow of operations 500 for detecting an intrusion attempt using RF signal imperfections of a signal, according to some embodiments of the present invention.
  • signal processor 101 after receiving the preamble RF signal, signal processor 101 receives via RF transceiver 102 a sync-word RF signal at 501.
  • the sync-word RF signal comprises a sequence of sync-word digital bits encoded in an analog sync-word carrier signal.
  • signal processor 101 analyzes the sync-word RF signal to determine a plurality of sync-word signal imperfections of the analog sync-word carrier signal.
  • sync-word signal imperfections are an offset of a frequency of the analog sync-word carrier signal, a phase noise in the analog sync-word carrier signal, an IQ imbalance in the analog sync-word carrier signal and nonlinearity on the analog sync-word carrier signal.
  • a level of sinus signal inaccuracy in the sinuses making up the analog sync-word carrier signal's may be expressed as a range. For example, a sub-range between 0 and 1, for example 0.7-0.72.
  • signal processor 101 optionally compares the plurality of sync-word signal imperfections to a plurality of reference sync-word signal imperfections to determine sync-word compliance.
  • signal processor 101 uses a correlator having a sample rate of 16 bits per second to compare the plurality of sync-word signal imperfections to the plurality of reference sync-word signal imperfections.
  • signal processor 101 optionally selects an alarm system operation to perform according to the sync-word compliance.
  • signal processor 101 optionally determines an intrusion attempt at 407.
  • signal processor 101 next notifies control center 104 at 410.
  • signal processor 101 delivers an electrical current to one or more alarm devices 105 capable of emitting an audio signal or a visual signal.
  • signal processor 101 optionally determines a valid message.
  • signal processor 101 at 409 optionally processes the message.
  • signal processor 101 optionally instructs disarming the alarm system, for example by instructing alarm controller 110.
  • signal processor 101 determines a valid message when only one of the sync-word compliance and preamble compliance is true.
  • reference signal imperfections are produced by analyzing a reference signal transmitted by an authorized alarm control device.
  • FIG. 6 showing a flowchart schematically representing an optional flow of operations 600 for producing reference signal imperfections, according to some embodiments of the present invention.
  • signal processor 101 may receive at 601 via RF transceiver 102 a reference RF signal, encoding a sequence of reference digital bits in an analog reference carrier signal.
  • Signal processor 101 optionally processes the analog reference carrier signal at 602 to obtain a plurality of reference preamble signal imperfections, and at 603 optionally stores the plurality of reference preamble signal imperfections in non-volatile storage 112.
  • signal processor 101 optionally processes the analog reference carrier signal at 602 to obtain a plurality of sync-word preamble signal imperfections, and at 603 optionally stores the plurality of reference sync-word signal imperfections in non-volatile storage 112.
  • Another possible method to detect an intrusion attempt uses unsupported alarm control device instructions. Following is an optional method implemented by the system in some embodiments of the present invention, to detect an intrusion attempt using unsupported alarm control device instructions.
  • the alarm control device has a predefined set of supported instructions.
  • An unsupported instruction is an instruction not in the predefined set of supported instructions.
  • the alarm control device optionally transmits to the signal processor an error RF signal message including an indication of the unsupported instruction. This protocol is used in some embodiments to create a deception signal.
  • RF transceiver 702 receives at 710 a first disarm RF signal from an alarm control device 701, and transmits at 711 a deception RF signal comprising an unsupported instruction X selected from a group of predefined instructions known to be unsupported by alarm control device 701.
  • unsupported instruction X is selected at random from the group of predefined unsupported instructions.
  • the alarm control device 701 When alarm control device 701 is authorized, the alarm control device optionally transmits at 712 an error RF response comprising the unsupported instruction X received from RF transceiver 702.
  • the RF transceiver optionally sends the error RF response to signal processor 703 at 713.
  • signal processor 703 receives the error RF response and extracts at 714 the returned unsupported instruction.
  • signal processor 703 optionally compares the returned unsupported instruction to the unsupported instruction X.
  • signal processor 703 optionally selects an alarm system operation to output according to the unsupported instruction compliance.
  • the returned unsupported instruction complies with X, for example is equal to X
  • signal processor 703 optionally determines a valid disarm message.
  • signal processor 703 sends alarm control device 701 via RF transceiver 702 a response RF signal comprising a supported instruction selected from the alarm control device's predefined set of supported instructions.
  • signal processor 703 instructs disarming the alarm system, for example by instructing an alarm controller.
  • a sequence of signals including a disarm message and an RF response signal indicating an erroneous instruction may be recorded and retransmitted by an unauthorized alarm control device.
  • FIG. 7B showing a time sequence schematically representing an optional flow of operations for detecting an intrusion attempt using an unsupported instruction with regard to an unauthorized alarm control device, according to some embodiments of the present invention.
  • signal processor 703 in response to received recorded first disarm RF signal at 710, transmits at 721 a deception RF signal comprising another unsupported instruction Y selected from a group of predefined instructions known to be unsupported by alarm control device 701.
  • unsupported instruction Y is selected at random from the group of predefined unsupported instructions.
  • the alarm control device 701 When alarm control device 701 is unauthorized, the alarm control device optionally transmits at 712 a recorded error RF response comprising the recorded unsupported instruction X.
  • the RF transceiver optionally sends the error RF response to signal processor 703 at 713.
  • signal processor 703 receives the error RF response and extracts at 714 the returned unsupported instruction.
  • signal processor 703 optionally compares the returned unsupported instruction to the unsupported instruction Y.
  • signal processor 703 optionally selects an alarm system operation to output according to the unsupported instruction compliance.
  • the signal processor 703 optionally determines an intrusion attempt.
  • the signal processor next notifies a control center.
  • the signal processor delivers an electrical current to one or more alarm devices capable of emitting an audio signal or a visual signal.
  • an alarm control device supports only several functions, typically fewer than 100.
  • the unsupported instruction is represented by a 16-bit digital word and an unsupported instruction transmitted by the transceiver to the alarm control device is selected at random, the probability of selecting the same unsupported instruction recorded is close to 2 ⁇ 16. Comparing a received unsupported instruction indication to a transmitted unsupported instruction indication has a high probability of detecting a recorded error RF signal.
  • a possible alarm system comprises at least one radio-frequency (RF) transceiver configured to receive a preamble RF signal from an alarm control device, the preamble RF signal comprising a sequence of preamble digital bits encoded in an analog preamble carrier signal; and at least one signal processor electrically connected to the at least one RF transceiver, configured to: analyze the preamble RF signal to determine a plurality of preamble signal imperfections of the analog preamble carrier signal, the preamble signal imperfections comprising at least one of a frequency imperfection of a sinus signal, an amplitude imperfection of a sinus signal and a phase imperfection of a sinus signal; compare the plurality of preamble signal imperfections with a plurality of reference preamble signal imperfections to determine a preamble compliance; receive via the at least one RF transceiver a message RF signal from the alarm control device, the message RF signal comprising a sequence of message digital bits encoded in an analog message carrier signal; and perform an alarm system operation according to the pre
  • the at least one signal processor is further configured to determine an intrusion attempt, subject to at least one of the plurality of preamble signal imperfections failing to comply with the plurality of reference preamble signal imperfections.
  • the at least one signal processor is further configured to determine a valid message subject to the plurality of preamble signal imperfections complying with the plurality of reference preamble signal imperfections; and wherein the alarm system operation comprises processing the message RF signal.
  • the plurality of reference preamble signal imperfections comprises at least one preamble characteristic selected from the group of: a carrier frequency offset, a phase noise, an in-phase and quadrature imbalance (IQ imbalance), and a signal nonlinearity.
  • a preamble characteristic selected from the group of: a carrier frequency offset, a phase noise, an in-phase and quadrature imbalance (IQ imbalance), and a signal nonlinearity.
  • the at least one signal processor is further configured to: receive via the at least one RF transceiver after the preamble signal a synchronization-word (sync-word) RF signal from the alarm control device, the sync-word RF signal comprising a sequence of sync-word digital bits encoded in an analog sync-word carrier signal; analyze the analog sync-word carrier signal to determine a plurality of sync-word signal imperfections of the sync-word signal, the sync-word signal imperfections comprising at least one of a frequency imperfection of a sinus signal, an amplitude imperfection of a sinus signal and a phase imperfection of a sinus signal; compare the plurality of sync-word signal imperfections with a plurality of reference sync-word signal imperfections to determine a sync-word compliance; and perform the alarm system operation according to the preamble compliance and the sync-word compliance.
  • the at least one signal processor is further configured to determine an intrusion attempt, subject to at least one of the plurality of sync-word signal imperfections failing to comply with the plurality of reference sync-word signal imperfections, or at least one of the plurality of signal imperfections failing to comply with the plurality of reference signal imperfections.
  • the at least one signal processor is further configured to determine a valid message subject to the plurality of preamble signal imperfections complying with the plurality of reference preamble signal imperfections and the plurality of sync-word signal imperfections complying with the plurality of reference sync-word signal imperfection, and the alarm system operation comprises processing the message RF signal.
  • the plurality of reference sync-word signal imperfections comprises at least one sync-word characteristic selected from the group of: a carrier frequency offset, a phase noise, an IQ imbalance, and a signal nonlinearity.
  • the alarm system operation comprises notifying a control center comprising at least one hardware processor upon the attempted intrusion being determined.
  • the alarm system further comprises a device capable of emitting an audio signal or a visual signal, electrically connected to the at least one signal processor; and the alarm system operation comprises delivering an electrical current to the device upon the attempted intrusion being determined.
  • the alarm system further comprises a non-volatile digital storage electrically coupled with the at least one signal processor; and the at least one signal processor is further configured to: receiving via the at least one RF transceiver a reference RF signal, encoding a sequence of reference digital bits in an analog reference carrier signal; process the analog reference carrier signal to obtain the plurality of reference preamble signal imperfections; and store the reference preamble signal imperfections in the non-volatile digital storage.
  • the compare is using a correlator having a sample rate of 16 bits per second.
  • a possible method for an alarm system comprises: receiving a preamble RF signal from an alarm control device, the preamble RF signal comprising a sequence of preamble digital bits encoded in an analog preamble carrier signal; analyzing the preamble RF signal to determine a plurality of preamble signal imperfections of the analog preamble carrier signal, the preamble signal imperfections comprising at least one of a frequency imperfection of a sinus signal, an amplitude imperfection of a sinus signal and a phase imperfection of a sinus signal; comparing the plurality of preamble signal imperfections with a plurality of reference preamble signal imperfections to determine a preamble compliance; receiving via the at least one RF transceiver a message RF signal from the alarm control device, the message RF signal comprising a sequence of message digital bits encoded in an analog message carrier signal; and performing an alarm system operation according to the preamble compliance.
  • a possible alarm system comprises at least one radio-frequency (RF) transceiver configured to: receive a first disarm RF signal from an alarm control device; transmit, after receiving the first disarm RF signal, a deception RF signal to the alarm control device, the deception RF signal comprising an unsupported instruction selected from a group of predefined instructions unsupported by the alarm control device; and receive an error RF response from said alarm control device, the error RF response comprising an indication of a returned unsupported instruction; and at least one signal processor electrically connected to the at least one RF transceiver, configured to: receive the error RF response from the RF transceiver; extract the returned unsupported instruction from the error RF response; compare the returned unsupported instruction to the unsupported instruction to determine a compliance; and output an alarm system operation according to the compliance.
  • RF radio-frequency
  • the at least one signal processor is further configured to determine an intrusion attempt, subject to the returned unsupported instruction differing from with the unsupported instruction.
  • the at least one signal processor is further configured to determine a valid disarm message subject to subject to the returned unsupported instruction being equal to the unsupported instruction; and the alarm system operation comprises at least one of a group of: instructing disarming said alarm system and transmitting via said at least one RF transceiver a response RF signal comprising a supported instruction.
  • the alarm system operation comprises notifying a control center comprising at least one hardware processor upon the attempted intrusion being detected.
  • the alarm system further comprises a device capable of emitting an audio signal or a visual signal, electrically connected to the at least one signal processor; and the alarm system operation comprises delivering an electrical current to the device upon the attempted intrusion being detected.
  • the unsupported instruction is selected at random from the group of predefined instructions; and the unsupported instruction is represented as a 16 bit digital word.
  • a possible method for an alarm system comprises: receiving a first disarm RF signal from an alarm control device; transmitting, after receiving the first disarm RF signal, a deception RF signal to the alarm control device, the deception RF signal comprising an unsupported instruction selected from a group of predefined instructions unsupported by the alarm control device; receiving an error RF response from the alarm control device, the error RF response comprising an indication of a returned unsupported instruction; extracting the returned unsupported instruction from the error RF response; comparing the returned unsupported instruction to the unsupported instruction to determine a compliance; and outputting an alarm system operation according to the compliance.
  • alarm control device It is expected that during the life of a patent maturing from this application many relevant alarm control devices will be developed and the scope of the term "alarm control device" is intended to include all such new technologies a priori.
  • composition or method may include additional ingredients and/or steps, but only if the additional ingredients and/or steps do not materially alter the basic and novel characteristics of the claimed composition or method.
  • a compound or “at least one compound” may include a plurality of compounds, including mixtures thereof.
  • range format is merely for convenience and brevity and should not be construed as an inflexible limitation on the scope of the invention. Accordingly, the description of a range should be considered to have specifically disclosed all the possible subranges as well as individual numerical values within that range. For example, description of a range such as from 1 to 6 should be considered to have specifically disclosed subranges such as from 1 to 3, from 1 to 4, from 1 to 5, from 2 to 4, from 2 to 6, from 3 to 6 etc., as well as individual numbers within that range, for example, 1, 2, 3, 4, 5, and 6. This applies regardless of the breadth of the range.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)

Claims (15)

  1. Système d'alarme (100), comprenant :
    au moins un émetteur-récepteur (102) radiofréquence (RF) configuré pour :
    recevoir un premier signal RF de désarmement (201) en provenance d'un dispositif de commande d'alarme (103) ;
    pendant un temps de retard prédéterminé après réception dudit premier signal RF de désarmement, émettre au moins un signal RF de dissimulation (220) pendant un ou plusieurs créneaux temporels d'émission sélectionnés parmi une pluralité de créneaux temporels consécutifs dudit temps de retard prédéterminé, et déterminer si un ou plusieurs signaux RF de réception (250) sont reçus pendant un ou plusieurs créneaux temporels de réception sélectionnés parmi ladite pluralité de créneaux temporels consécutifs, lesdits un ou plusieurs créneaux temporels de réception étant entrelacés avec lesdits un ou plusieurs créneaux temporels d'émission ; et
    au moins un processeur de signal (101), électriquement connecté audit au moins un émetteur-récepteur RF, configuré pour :
    déterminer une opération du système d'alarme conformément à une analyse desdits un ou plusieurs signaux RF de réception.
  2. Système (100) selon la revendication 1, dans lequel ladite analyse consiste à :
    mettre en correspondance au moins l'un desdits un ou plusieurs signaux RF de réception (250) avec un motif de signal de dissimulation prédéfini ;
    produire une indication de vraie détection de dissimulation pour chacun desdits un ou plusieurs signaux RF de réception correspondant audit motif de signal de dissimulation prédéfini ; et
    sélectionner ladite opération du système d'alarme conformément à ladite indication de vraie détection de dissimulation.
  3. Système (100) selon la revendication 1 ou 2, dans lequel ladite analyse consiste à :
    produire une indication de fausse détection de dissimulation sous réserve qu'aucun desdits un ou plusieurs signaux RF de réception (250) ne soit reçu pendant lesdits un ou plusieurs créneaux temporels de réception ou que chacun desdits un ou plusieurs signaux RF de réception ne correspondent pas audit motif de signal de dissimulation prédéfini ; et
    sélectionner ladite opération du système d'alarme conformément à ladite indication de fausse détection de dissimulation.
  4. Système (100) selon l'une quelconque des revendications précédentes, dans lequel ledit au moins un processeur de signal (101) est en outre configuré pour :
    déterminer que ledit premier signal RF de désarmement (201) est valide, sous réserve de ne recevoir aucun desdits un ou plusieurs signaux RF de réception (250) ou de ne produire qu'une indication de fausse détection de dissimulation ; et
    recevoir un second signal RF de désarmement (202) en provenance dudit dispositif de commande d'alarme (103) après ledit temps de retard prédéterminé ;
    dans lequel, lors de la réception dudit second signal RF de désarmement, ladite opération du système d'alarme comprend au moins l'une des opérations suivantes : ordonner le désarmement dudit système d'alarme, et transmettre un signal RF d'acquittement audit dispositif de commande d'alarme par l'intermédiaire dudit au moins un émetteur-récepteur RF (102).
  5. Système (100) selon l'une quelconque des revendications précédentes, dans lequel lesdits créneaux temporels d'émission sont sélectionnés aléatoirement par ledit processeur de signal (101) lors de la réception dudit premier signal RF de désarmement (201) pour émettre ledit au moins un signal RF de dissimulation (220) ; et
    dans lequel lesdits créneaux temporels de réception comprennent la totalité de ladite pluralité de créneaux temporels consécutifs différents desdits créneaux temporels d'émission.
  6. Système (100) selon l'une quelconque des revendications précédentes, dans lequel une quantité desdits créneaux temporels d'émission est comprise entre 15% et 30% d'une quantité de ladite pluralité de créneaux temporels consécutifs.
  7. Système (100) selon l'une quelconque des revendications précédentes, dans lequel ledit temps de retard prédéterminé est divisé en 25 créneaux temporels consécutifs.
  8. Système (100) selon l'une quelconque des revendications précédentes, dans lequel au moins un signal RF de dissimulation (220) comprend au moins l'un :
    d'un identificateur, d'un marqueur temporel et d'un nombre aléatoire, destinés à être utilisés pour identifier l'origine d'un signal RF de dissimulation enregistré.
  9. Système (100) selon la revendication 8, dans lequel ledit identificateur est constitué de 32 bits binaires, dans lequel ledit marqueur temporel est constitué de 32 bits binaires, et dans lequel ledit nombre aléatoire est constitué de 8 bits binaires.
  10. Système (100) selon la revendication 8 ou 9, dans lequel ladite mise en correspondance dudit motif de signal de dissimulation prédéfini consiste à détecter dans ledit un signal RF reçu (250) au moins l'un : d'un identificateur, d'un marqueur temporel et d'un nombre aléatoire.
  11. Système (100) selon l'une quelconque des revendications précédentes, dans lequel ledit au moins un signal RF de dissimulation (220) est protégé par un code de détection d'erreur qui est un contrôle de redondance cyclique à 16 bits.
  12. Système (100) selon l'une quelconque des revendications précédentes, dans lequel ledit au moins un signal RF de dissimulation (220) est crypté à l'aide d'un procédé choisi dans le groupe comprenant : un obscurcissement, un ou exclusif avec un mot de germe prédéfini, et un ou exclusif avec un mot de germe aléatoire.
  13. Système (100) selon l'une quelconque des revendications précédentes, dans lequel ladite analyse consiste en outre à :
    détecter un nombre de paquets dans ledit premier signal RF de désarmement (201) ;
    comparer une différence entre ledit nombre de paquets et un nombre de paquets précédemment stocké à un nombre seuil prédéfini ; et
    produire une indication de vraie détection de dissimulation lorsque ladite différence est supérieure audit nombre seuil prédéfini.
  14. Système (100) selon l'une quelconque des revendications précédentes, dans lequel ladite opération du système d'alarme comprend au moins une opération sélectionnée dans le groupe comprenant :
    le signalement à un centre de commande (104) fonctionnellement connecté audit au moins un processeur de signal (101) d'une tentative d'intrusion, sous réserve de produire au moins une indication de vraie détection de dissimulation et la fourniture d'un courant électrique à un dispositif (105) capable d'émettre un signal audio ou un signal visuel, qui est électriquement connecté audit au moins un processeur de signal (101), sous réserve de produire au moins une indication de vraie détection de dissimulation.
  15. Procédé destiné à un système d'alarme (100), consistant à :
    recevoir un premier signal RF de désarmement (201) en provenance d'un dispositif de commande d'alarme (103) ; pendant un temps de retard prédéterminé après réception dudit premier signal RF de désarmement, émettre au moins un signal RF de dissimulation (220) pendant un ou plusieurs créneaux temporels d'émission sélectionnés parmi une pluralité de créneaux temporels consécutifs dudit temps de retard prédéterminé, et déterminer si un ou plusieurs signaux RF de réception (250) sont reçus pendant un ou plusieurs créneaux temporels de réception sélectionnés parmi ladite pluralité de créneaux temporels consécutifs, lesdits un ou plusieurs créneaux temporels de réception étant entrelacés avec lesdits un ou plusieurs créneaux temporels d'émission ; et
    déterminer une opération du système d'alarme conformément à une analyse desdits un ou plusieurs signaux RF de réception.
EP17172597.1A 2016-05-23 2017-05-23 Système et procédé pour un système d'alarme Active EP3252728B1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201662339980P 2016-05-23 2016-05-23
US201662367657P 2016-07-28 2016-07-28
US201662383432P 2016-09-04 2016-09-04

Publications (2)

Publication Number Publication Date
EP3252728A1 EP3252728A1 (fr) 2017-12-06
EP3252728B1 true EP3252728B1 (fr) 2018-12-05

Family

ID=58772486

Family Applications (1)

Application Number Title Priority Date Filing Date
EP17172597.1A Active EP3252728B1 (fr) 2016-05-23 2017-05-23 Système et procédé pour un système d'alarme

Country Status (2)

Country Link
EP (1) EP3252728B1 (fr)
ES (1) ES2710329T3 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112162301B (zh) * 2020-09-29 2023-09-29 海南大学 抗欺骗干扰卫星导航定位方法及芯片

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7053764B2 (en) * 2003-02-03 2006-05-30 Ingrid, Inc. Controller for a security system
US7190264B2 (en) * 2004-03-05 2007-03-13 Simon Fraser University Wireless computer monitoring device with automatic arming and disarming
US20090232307A1 (en) * 2008-03-11 2009-09-17 Honeywell International, Inc. Method of establishing virtual security keypad session from a mobile device using java virtual machine

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Also Published As

Publication number Publication date
EP3252728A1 (fr) 2017-12-06
ES2710329T3 (es) 2019-04-24

Similar Documents

Publication Publication Date Title
US11156704B2 (en) Method, device and system for secure distance measurement
US20240054038A1 (en) Method and apparatus for improving reliability of digital communications
JP2013217142A (ja) 状態制御システム、及び状態制御方法
KR20080067680A (ko) 보안 통신을 위한 방법 및 시스템
US20220408263A1 (en) Access control system and method
US10747185B2 (en) System and method for performing encryption between alarm panel and monitoring station
US20200287728A1 (en) Method, device and system for secure distance measurement
EP3252728B1 (fr) Système et procédé pour un système d'alarme
US10091204B1 (en) Controlling user access to protected resource based on outcome of one-time passcode authentication token and predefined access policy
US10673832B2 (en) Predefined access policy implementation based on auxiliary information embedded in one-time authentication passcodes
Ying et al. Covert channel-based transmitter authentication in controller area networks
US20230328523A1 (en) Authentication method and device, and related products
US10965463B2 (en) Apparatuses, system, and methods for controlling an actuator through a wireless communications system
US9967251B1 (en) Security-aware single-server passcode verification for one-time authentication tokens
CN105376003A (zh) 一种音频通信控制码加密方法及加密系统
US8615265B2 (en) Coded system for radio frequency communication
US11930353B2 (en) Method for monitoring or tracking between mobile devices
US20230180004A1 (en) 5g smart factory replay attack detection method and apparatus
US20160026836A1 (en) Tamper credential
JP2017155420A (ja) 通信不正成立防止システム
CN111212393A (zh) 用信号通知胁迫
KR20200082944A (ko) 디바이스 인증 시스템
ES2728289A1 (es) Sistema para control de accesos a espacios físicos o redes telemáticas mediante señales acústicas
CN106559784A (zh) 控制设备接入的方法、装置以及接入网络的方法
JP2007195156A (ja) 誤り制御装置及びプログラム

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20170523

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: ESSENCE SECURITY INTERNATIONAL (E.S.I.) LTD.

INTG Intention to grant announced

Effective date: 20180705

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1074035

Country of ref document: AT

Kind code of ref document: T

Effective date: 20181215

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602017001183

Country of ref document: DE

REG Reference to a national code

Ref country code: CH

Ref legal event code: NV

Representative=s name: DENNEMEYER AG, CH

REG Reference to a national code

Ref country code: SE

Ref legal event code: TRGR

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20181205

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1074035

Country of ref document: AT

Kind code of ref document: T

Effective date: 20181205

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2710329

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20190424

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190305

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190305

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190306

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190405

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20190405

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602017001183

Country of ref document: DE

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

26N No opposition filed

Effective date: 20190906

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20190531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190523

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190523

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20190531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20170523

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181205

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230526

Year of fee payment: 7

Ref country code: DE

Payment date: 20230519

Year of fee payment: 7

Ref country code: CH

Payment date: 20230602

Year of fee payment: 7

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230626

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: SE

Payment date: 20230519

Year of fee payment: 7

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20230524

Year of fee payment: 7

Ref country code: ES

Payment date: 20230725

Year of fee payment: 7