SECURITY HUB UTILIZING NEAR FIELD COMMUNICATION TO ONBOARD SENSORS
According to an embodiment of the present disclosure, a security hub includes a near field communication (NFC) interface, a communications interface, and a computer processor. The NFC interface is configured to detect an NFC-enabled sensor. The communications interface is configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device. The computer processor is operatively connected to the NFC interface and the communications interface and configured to: onboard the NFC-enabled sensor, analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information.
This application claims priority to and the benefit of U.S. Provisional Patent Application No. 62/327,795, titled “SYSTEM AND METHOD FOR PROVIDING A SECURITY HUB” and filed on Apr. 26, 2016, the entire content which is incorporated herein by reference
RELATED FIELDThe present disclosure relates in to a system and method of a security hub utilizing near field communication (NFC) to onboard sensors.
BACKGROUNDA security hub system may include one or more of a control panel and a plurality of sensors (e.g., a security camera, a motion sensor, and a contact). In recent years, there is an increasing popularity for low-cost, self-built security hub systems. However, such security hub systems are typically difficult and time-consuming to install/use. Thus, in view of the foregoing, there exists a need for the presently disclosed system and method of utilizing NFC to onboard sensors.
SUMMARYAccording to an embodiment of the present disclosure, a security hub includes a near field communication (NFC) interface, a communications interface, and a computer processor. The NFC interface is configured to detect an NFC-enabled sensor. The communications interface is configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device. The computer processor is operatively connected to the NFC interface and the communications interface and configured to: onboard the NFC-enabled sensor, analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information.
According to an embodiment of the present disclosure, a method of connecting an NFC-enabled sensor to a security hub comprises: detecting the NFC-enabled sensor via a near field communication (NFC) interface of the security hub; establishing communication with the NFC-enabled sensor, a communications network, and an electronic device via a communications interface of security hub; onboarding the NFC-enabled sensor; and receiving detection information from the NFC-enabled sensor.
The accompanying drawings, which are included as part of the present disclosure, illustrate various embodiments and together with the general description given above and the detailed description of the various embodiments given below serve to explain and teach the principles described herein.
The figures in the drawings are not necessarily drawn to scale and elements of similar structures or functions are generally represented by like reference numerals for illustrative purposes throughout the figures. The figures are only intended to facilitate the description of the various embodiments described herein and do not describe every aspect of the teachings disclosed herein and do not limit the scope of the claims.
DETAILED DESCRIPTIONEach of the features and teachings disclosed herein may be utilized separately or in conjunction with other features and teachings to provide the present system and method. Representative examples utilizing many of these features and teachings, both separately and in combination, are described with reference to the attached figures. While the detailed description herein illustrates to a person of ordinary skill in the art further details for practicing aspects of the present teachings, it does not limit the scope of the claims. Therefore, combinations of features disclosed in the detailed description are representative examples of the present teachings and may not be necessary to practice the teachings in the broadest sense.
As discussed earlier, traditional security hubs are typically difficult and time-consuming to install/use. Embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub. NFC is a set of communications protocols that enable two devices, such as the security hub and a sensor, to establish communication by bringing them within a certain range (e.g., 4 cm) of each other.
The communications interface 102 is configured to establish communication with NFC-enabled sensors 111, 112, and 113, which have already gone through the onboarding process. The communications interface 102 is also configured to establish communication with a communications network 120 (e.g., the Internet) and an electronic device 300 (e.g., a smart phone, a tablet).
The computer processor 103 is configured to onboard the detected NFC-enabled sensor. Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information. The computer processor 103 is also configured to analyze detection information received from the NFC-enabled sensor, and perform an action in response to the analysis of the detection information. For example, the computer processor may trigger an alarm in response to determining that there is a high security threat.
The electronic device 300 may execute and run an application that enables a user to interact with and/or control the security hub 100. For example, the application may provide a user interface that enables the user to provide information (e.g., login information, a Wi-Fi router password) to the security hub 100 for connecting to the communications network 120. The user interface may also displays the connection status between the security hub 100 and the communications network 120, such as shown in
According to an example embodiment, the present system and method allow an NFC-enabled sensor (e.g., a contact sensor) to be onboarded with a security hub when the NFC-enabled sensor is brought within contact or within close proximity (e.g., within 4 centimeters (cm)) of the security hub, such as illustrated by the instructions of
According to an example embodiment, the present system and method allow the user to test an NFC-enabled sensor after it has been onboarded with the security hub.
The NFC interface of the security hub detects an NFC-enabled sensor (at 601). The computer processor of the security hub onboards the NFC-enabled sensor (at 602). Onboarding the NFC-enabled sensor, for example, may include registering the NFC-enabled sensor and determining a communications protocol (e.g., Zigbee, Z-Wave) through which the NFC-enabled sensor transmits detection information. The communications interface of the security hub establishes communication with the NFC-enabled sensor (at 603). For example, if the computer processor determines (at 603) that NFC-enabled sensor transmits detection information using Zigbee, the communications interface may establish communication with the NFC-enabled sensor using Zigbee.
Accordingly, in view of the foregoing, embodiments of the present disclosure provide quick and efficient installation by allowing a user to quickly connect a security hub to a communications network (e.g., Wi-Fi), onboard one or more sensors with the security hub quickly using NFC, and test whether the sensors are connected to the security hub.
A data storage device 721 such as a magnetic disk or optical disc and its corresponding drive may also be coupled to architecture 700 for storing information and instructions. Architecture 700 can also be coupled to a second I/O bus 750 via an I/O interface 730. A plurality of I/O devices may be coupled to I/O bus 750, including a display device 743, an input device (e.g., an alphanumeric input device 742, a cursor control device 741, and/or a touchscreen device).
The communication device 740 allows for access to other computers (e.g., servers or clients) via a network. The communication device 740 may comprise one or more modems, network interface cards, wireless network interfaces or other interface devices, such as those used for coupling to Ethernet, token ring, or other types of networks.
Some portions of the detailed description herein are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the below discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The present disclosure also relates to an apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk, including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
The algorithms presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems, messaging servers, or personal computers may be used with programs in accordance with the teachings herein, or it may prove convenient to construct a more specialized apparatus to perform the required method steps. The required structure for a variety of these systems appears in the description above. A variety of programming languages may be used to implement the teachings of the disclosure as described herein.
Moreover, the various features of the representative examples and the dependent claims may be combined in ways that are not specifically and explicitly enumerated in order to provide additional embodiments of the present teachings. The dimensions and the shapes of the components shown in the figures are designed to help understand how the present teachings are practiced and do limit the dimensions and the shapes shown in the examples.
Claims
1. A security hub comprising:
- a near field communication (NFC) interface configured to detect an NFC-enabled sensor;
- a communications interface configured to establish communication with the NFC-enabled sensor, a communications network, and an electronic device; and
- a computer processor operatively connected to the NFC interface and the communications interface and configured to:
- onboard the NFC-enabled sensor;
- analyze detection information received from the NFC-enabled sensor, and
- perform an action in response to the analysis of the detection information.
2. The security hub of claim 1, wherein to onboard the NFC-enabled sensor includes registering the NFC-enabled sensor and determining a communications protocol of the NFC-enabled sensor through which detection information is transmitted.
3. The security hub of claim 2, wherein information used for onboarding the NFC-enabled sensor is received entirely from the NFC-enabled sensor through the NFC interface.
4. The security hub of claim 3, wherein the NFC interface utilizes the Thread network protocol.
5. The security hub of claim 1, further comprising an application running on the electronic device.
6. The security hub of claim 5, wherein the application displays diagrammatic instructions for connecting the security hub to the communications network.
7. The security hub of claim 5, wherein the application displays diagrammatic instructions for connecting the NFC-enabled sensor to security hub.
8. The security hub of claim 5, wherein the application displays diagrammatic instructions for testing the operations of the NFC-enabled sensor.
9. The security hub of claim 8, wherein the application displays an indication of whether the NFC-enabled sensor is connected and operating properly.
10. The security hub of claim 5, wherein the application displays the location and installation status of the NFC-enabled sensor.
11. A method of connecting an NFC-enabled sensor to a security hub, the method comprising:
- detecting the NFC-enabled sensor via a near field communication (NFC) interface of the security hub;
- establishing communication with the NFC-enabled sensor, a communications network, and an electronic device via a communications interface of security hub;
- onboarding the NFC-enabled sensor; and
- receiving detection information from the NFC-enabled sensor.
12. The method of claim 11, wherein onboarding the NFC-enabled sensor includes registering the NFC-enabled sensor and determining a communications protocol of the NFC-enabled sensor through which detection information is transmitted.
13. The method of claim 12, wherein information used for onboarding the NFC-enabled sensor is received entirely from the NFC-enabled sensor through the NFC interface.
14. The method of claim 13, wherein the NFC interface utilizes the Thread network protocol.
15. The method of claim 11, further comprising communicating with an application running on the electronic device.
16. The method of claim 15, further comprising instructing the application to display diagrammatic instructions for connecting the security hub to the communications network.
17. The method of claim 15, further comprising instructing the application to display diagrammatic instructions for connecting the NFC-enabled sensor to security hub.
18. The method of claim 15, further comprising instructing the application to display diagrammatic instructions for testing the operations of the NFC-enabled sensor.
19. The method of claim 18, further comprising instructing the application to display an indication of whether the NFC-enabled sensor is connected and operating properly.
20. The method of claim 15, further comprising instructing the application to display the location and installation status of the NFC-enabled sensor.
Type: Application
Filed: Nov 8, 2016
Publication Date: Oct 26, 2017
Inventors: Venkata Naga Vamsi Nandanavanam (Fremont, CA), Kenny Chui (Campbell, CA)
Application Number: 15/346,652