Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
SYSTEM AND METHOD FOR SECURE SYNCHRONIZATION CONTROL OF SMART DEVICES
Extensive patent search conducted by a registered patent agent
Patent search done by experts in under 48hrs
₹999
₹399
Abstract
Information
Inventors
Applicants
Specification
Documents
ORDINARY APPLICATION
Published
Filed on 30 October 2024
Abstract
ABSTRACT SYSTEM AND METHOD FOR SECURE SYNCHRONIZATION CONTROL OF SMART DEVICES The present invention discloses system and method for secure synchronization control of smart devices. The system comprising a hardware processor, a memory to store a first pairing code, a wireless communication interface configured to establish an initial pairing with a smart device using the first pairing code, a custom device operatively connected to the hardware processor, wherein the custom device is configured to prompt a user device to input a second pairing code, authenticate the user device using the second pairing code during subsequent pairing, broadcast a signal from the smart device, wherein the signal comprises Received Signal Strength Indicator (RSSI) value, authenticate the RSSI value to detect unauthorized one or more access attempts, trigger a factory reset confirmation on the user device when the RSSI value exceeds a predefined threshold, revert the smart device to the first pairing code upon receiving a factory reset confirmation from the user device. FIG. 1
Patent Information
Application ID | 202441083102 |
Invention Field | COMMUNICATION |
Date of Application | 30/10/2024 |
Publication Number | 45/2024 |
Inventors
Name | Address | Country | Nationality |
---|---|---|---|
VADIVELU N | NO-4, 14TH A CROSS, ESHWARA LAYOUT, INDIRANAGAR, BANGALORE- 560008, KARNATAKA, INDIA | India | India |
JAGAN BAGAVATHY | NO-4, 14TH A CROSS, ESHWARA LAYOUT, INDIRANAGAR, BANGALORE- 560008, KARNATAKA, INDIA | India | India |
Applicants
Name | Address | Country | Nationality |
---|---|---|---|
HOAGS TECHNOLOGIES INDIA PRIVATE LIMITED | M-138, 9TH A MAIN ROAD, LIC COLONY, JEEVAN BHEEMANAGAR, HAL STAGE-III, BANGALORE- 560075, KARNATAKA, INDIA | India | India |
Specification
Description:FIELD OF INVENTION
[0001]Embodiments of the present invention relate to smart home technology and more particularly to a system and method for secure synchronization control of smart devices.
BACKGROUND
[0002]Smart home devices have seen rapid adoption in recent years, enabling users to control and automate various functions within their homes via mobile devices and voice assistants. Devices such as smart lights, thermostats, door locks, and connected devices often utilize wireless communication protocols like Bluetooth Low Energy (BLE) to facilitate seamless interaction. This connectivity empowers users to manage their devices remotely, significantly enhancing convenience and efficiency in daily life. However, the proliferation of these devices has raised substantial concerns regarding security and privacy. Current pairing methods, which establish connections between smart devices and mobile applications, are frequently vulnerable to unauthorized access. Traditional approaches, including reliance on default pairing codes or simple button presses, lack robust security measures and often fail to prevent unauthorized individuals from pairing with the devices. This inadequacy poses serious risks, as malicious actors can potentially gain control over these devices, leading to data breaches, unauthorized entry, and other privacy violations.
[0003]Additionally, existing pairing methods do not require direct physical interaction with the device, increasing the risk of unauthorized access. Malicious users can exploit weak or default security configurations to connect to devices remotely if they are within range. These vulnerabilities undermine the integrity and security of smart home networks, underscoring the urgent need for more secure methods that mandate physical proximity for initiating the pairing process. Another significant challenge lies in the ability to reset smart home devices to their factory settings. Traditional reset mechanisms often necessitate physically pressing a button on the device, which can be cumbersome or even impossible when devices are installed in hard-to-reach locations, such as ceiling-mounted lights or high wall fixtures. This reliance on physical interaction limits user convenience and complicates quick resets or reconfigurations in certain scenarios. Moreover, existing reset methods frequently lack adequate safeguards against accidental or unauthorized resets, leaving devices vulnerable to risks of data loss or unintended disruptions.
[0004]Given these limitations, the current state of the art fails to adequately address the dual requirements of ensuring secure pairing and convenient reset capabilities for smart devices. This critical gap necessitates the development of a comprehensive system and method that enhances the security of the device pairing process by requiring physical interaction with the smart device while simultaneously introducing a proximity-based reset mechanism. Such a solution would facilitate factory resets without compromising security or user convenience, effectively mitigating the risks of unauthorized access and accidental resets while providing a seamless and user-friendly experience for managing smart home devices.
[0005]Hence, there is a need for an efficient system and method for secure synchronization control of smart devices, to address the aforementioned issues.
SUMMARY
[0006]This summary is provided to introduce a selection of concepts, in a simple manner, which is further described in the detailed description of the disclosure. This summary is neither intended to identify key or essential inventive concepts of the subject matter nor to determine the scope of the disclosure.
[0007]In accordance with one embodiment of the present invention disclosure, a system for secure synchronization control of smart devices is disclosed. The system comprising a hardware processor, a memory coupled to the hardware processor configured to store a first pairing code, a wireless communication interface configured to establish an initial pairing with a smart device using the first pairing code, a custom device operatively connected to the hardware processor, wherein the custom device is configured to prompt a user device to input a second pairing code, authenticate the user device using the second pairing code during subsequent pairing, broadcast a signal from the smart device, wherein the signal comprises Received Signal Strength Indicator (RSSI) value, authenticate the RSSI value to detect unauthorized one or more access attempts, trigger a factory reset confirmation on the user device when the RSSI value exceeds a predefined threshold, revert the smart device to the first pairing code upon receiving a factory reset confirmation from the user device.
[0008]In another embodiment, the custom device is configured to initiate temporary blocking the user device after a predetermined number of failed attempts to input the second pairing code.
[0009]In yet another embodiment, the custom module is configured to initiate a temporary rejection of the factory reset command upon detection of a suspicious RSSI patterns.
[0010]In yet another embodiment, the predefined threshold for the RSSI value is in the range of -20 dbm to 0 dbm to initiate the factory reset.
[0011]In yet another embodiment, the wireless communication interface employs one of a Bluetooth Low Energy, Wi-Fi and cloud for secure pairing.
[0012]In one aspect, a method for secure synchronization control of smart device, the method comprising storing a first pairing code, establishing, via a wireless communication interface, an initial pairing with a smart device using the first pairing code, prompting a user device to input a second pairing code, authenticating the user device using the second pairing code during subsequent pairing, broadcasting a signal from the smart device, wherein the signal comprises Received Signal Strength (RSSI) value, authenticate the RSSI value to detect unauthorized one or more access attempts, triggering a factory reset confirmation on the user device when an RSSI value exceeds a predefined threshold, reverting the smart device to the first pairing code upon receiving a factory reset confirmation from the user device.
[0013]In yet another embodiment, initiating a temporary blocking of the user device after a predetermined number of failed attempts to input the second pairing code.
[0014]In yet another embodiment, initiating a temporary rejection of the factory reset command upon detection of a suspicious RSSI pattern.
[0015]In yet another embodiment, the predefined threshold for the RSSI value is in the range of -20dbm to 0 dbm to initiate the factory reset.
[0016]In yet another embodiment, wherein the wireless communication interface employs one of a Bluetooth Low Energy, Wi-Fi and cloud for secure pairing.
[0017]To further clarify the advantages and features of the present disclosure, a more particular description of the disclosure will follow by reference to specific embodiments thereof, which are illustrated in the appended figures. It is to be appreciated that these figures depict only typical embodiments of the disclosure and are therefore not to be considered limiting in scope. The disclosure will be described and explained with additional specificity and detail with the appended figures.
BRIEF DESCRIPTION OF DRAWINGS
The disclosure will be described and explained with additional specificity and detail with the accompanying figures in which:
[0018]Figure 1 illustrates a block diagram for an exemplary system for secure synchronization control of smart devices, in accordance with an embodiment of the present invention;
[0019]Figure 2 illustrates a system setup for a RF pairing, in accordance with an embodiment of the present invention;
[0020]Figure 3 illustrates a system setup for proximity-based factory reset, in accordance with an embodiment of the present invention;
[0021]Figure 4 illustrates a flow chart of a pairing code-based RF pairing of the smart device, in accordance with an embodiment of the present disclosure;
[0022]Figure 5 illustrates a flow chart of proximity-based factory reset, in accordance with an embodiment of the present invention; and
[0023]Figure 6 illustrates a flow chart of the method for secure synchronization control of smart devices, in accordance with an embodiment of the present invention.
[0024]Further, those skilled in the art will appreciate that elements in the figures are illustrated for simplicity and may not have necessarily been drawn to scale. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the figures by conventional symbols, and the figures may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION
[0025]For the purpose of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the disclosure is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the disclosure as would normally occur to those skilled in the art are to be construed as being within the scope of the present disclosure.
[0026]In the present document, the word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment or implementation of the present subject matter described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
[0027]The terms "comprise", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more devices or sub-systems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other devices, sub-systems, elements, structures, components, additional devices, additional sub-systems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
[0028]Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this disclosure belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
[0029]In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings. The singular forms "a", "an", and "the" include plural references unless the context clearly dictates otherwise.
[0030]A computer system (standalone, client, or server computer system) configured by an application may constitute a "device" (or "subsystem") that is configured and operated to perform certain operations. In one embodiment, the "device" or "subsystem" may be implemented mechanically or electronically, so a device includes dedicated circuitry or logic that is permanently configured (within a special-purpose processor) to perform certain operations. In another embodiment, a "device" or "subsystem" may also comprise programmable logic or circuitry (as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations.
[0031]Accordingly, the term "device" or "subsystem" should be understood to encompass a tangible entity, be that an entity that is physically constructed permanently configured (hardwired), or temporarily configured (programmed) to operate in a certain manner and/or to perform certain operations described herein.
[0032]Referring now to the drawings, and more particularly to Figure 1 through Figure 6, where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments, and these embodiments are described in the context of the following exemplary system and/or method.
[0033]The present invention describes a novel approach to provide secure synchronization control of smart devices. The secure wireless communication and control of smart devices, with a focus on secure pairing and proximity-based factory reset mechanisms. These mechanisms utilize Bluetooth Low Energy (BLE) technology to establish a secure connection between a smart device and a user device. The secure pairing process may involve the use of a second pairing code, which can enhance the security of the connection and help prevent unauthorized access. The proximity-based factory reset mechanism may utilize Received Signal Strength Indicator (RSSI) values to determine the proximity of the user device to the smart device. This proximity information may then be used to allow or deny a factory reset command, potentially adding an additional layer of security. The systems and methods described herein may offer a solution for managing smart devices that addresses some limitations of traditional pairing and factory reset methods.
[0034]Figure 1 illustrates a block diagram for an exemplary system for secure synchronization control of smart devices, in accordance with an embodiment of the present invention.
[0035]According to an embodiment of the present invention, a system for secure synchronization control of smart devices is disclosed. The system 100 may comprise a user device 102 and a smart device 108. The user device 102 may further comprise a mobile application 104. The user device 102 and the smart device 108 are connected to each other via one of a Bluetooth Low Energy (BLE), a Wi-Fi, a Zigbee® or cloud 106. The smart device 108 may comprise a custom module 110, one or more hardware processors 112 and a memory 114.
[0036]The one or more hardware processors 112, as used herein, may mean any type of computational circuit, such as, but not limited to, a microprocessor unit, microcontroller, complex instruction set computing microprocessor unit, reduced instruction set computing microprocessor unit, very long instruction word microprocessor unit, explicitly parallel instruction computing microprocessor unit, graphics processing unit, digital signal processing unit, or any other type of processing circuit. The one or more hardware processors 112 may also include embedded controllers, such as generic or programmable logic devices or arrays, application-specific integrated circuits, single-chip computers, and the like.
[0037]The memory 114 may be non-transitory volatile memory and non-volatile memory. The memory 114 may be coupled for communication with the one or more hardware processors 112, such as being a computer-readable storage medium. The one or more hardware processors 112 may execute machine-readable instructions and/or source code stored in the memory 114. A variety of machine-readable instructions may be stored in and accessed from the memory 114. The memory 114 may include any suitable elements for storing data and machine-readable instructions, such as read-only memory, random access memory, erasable programmable read-only memory, electrically erasable programmable read-only memory, a hard drive, a removable media drive for handling compact disks, digital video disks, diskettes, magnetic tape cartridges, memory cards, and the like.
[0038]Figure 2 illustrates a system setup for a RF pairing, in accordance with an embodiment of the present invention.
[0039]In an embodiment, the system 102 illustrates an exemplary system for controlling a smart device (ceiling fan), in accordance with an embodiment of the present invention. The system may utilize RF-based pairing with pairing code authentication to establish a secure connection between the user device and the ceiling fan. The user device may be configured to send commands to the ceiling fan via the wireless communication interface when prompted. The wireless communication interface may support various wireless communication protocols, such as Bluetooth Low Energy (BLE), Wi-Fi, Zigbee®, or cloud any other suitable wireless communication protocol. The wireless communication interface may be responsible for transmitting and receiving data between the user device and the ceiling fan.
[0040]In some aspects, the system may comprise a ceiling fan mounted on a ceiling and a mobile application operated by a user. The ceiling fan may include a wireless communication interface capable of RF-based pairing. The mobile application, running on a user's device, may be configured to interact with the ceiling fan wirelessly. This pairing mechanism may allow the user to control the fan remotely without physical access to the device.
[0041]The mobile application may provide a user interface for controlling the fan. For instance, the application may display messages such as "Hello Fan, Turn ON", indicating the ability to send commands to the fan. The wireless communication link established through RF-based pairing may be represented by a dashed line between the mobile application and the ceiling fan.
[0042]This system may enable users to control ceiling-mounted devices that may be physically out of reach, potentially enhancing convenience and accessibility in smart home environments. The pairing code-based pairing may add a layer of security to help prevent unauthorized access to the device. In some cases, this approach may be particularly useful for managing devices installed in hard-to-reach locations, allowing for remote control and configuration without requiring direct physical interaction.
[0043]Figure 3 illustrates a system setup for proximity-based factory reset, in accordance with an embodiment of the present invention.
[0044]In another embodiment, the system leverages Received Signal Strength Indicator (RSSI) values to determine the physical proximity between the user device and the smart device. RSSI is a measurement of the power present in a received radio signal, typically expressed in decibel-milliwatts (dBm).
[0045]In yet another embodiment, the user device is configured to read RSSI values greater than or equal to -20 dBm to determine close proximity to the smart device. The threshold of -20 dBm has been carefully selected to balance security and usability, ensuring that the user is sufficiently close to the device to initiate sensitive operations like a factory reset, while still allowing for some flexibility in positioning. Factory reset refers to a functionality or process implemented in an electronic or digital device that restores the device's software and settings to its original state as configured by the manufacturer.
[0046]When the RSSI value exceeds this predefined threshold, indicating that the user device is within the designated proximity range of the smart household device, the user device is programmed to display a message or an alert to the user. This notification serves two important purposes: first, it informs the user that they are now in close proximity to the smart device, and second, it indicates that a factory reset can be initiated.
[0047]The implementation of this proximity-based alert system provides a user-friendly interface for managing the factory reset process. It eliminates the need for physical buttons on the device itself, which can be particularly advantageous for ceiling-mounted devices or other devices installed in hard-to-reach locations. By relying on RSSI values and mobile notifications, the system ensures that only users who are physically present near the device can initiate a factory reset, thereby enhancing security while maintaining ease of use.
[0048]This approach not only improves the user experience by providing clear, contextual information about when certain actions are available but also adds an additional layer of security to prevent unauthorized resets from remote locations. The system effectively combines the convenience of wireless control with the security assurance of physical proximity, addressing key concerns in smart home device management
[0049]Figure 4 illustrates a flow chart of a pairing code-based RF pairing of the smart device, in accordance with an embodiment of the present disclosure.
[0050]In another embodiment, the process begins with the user device reading the details (step 402), which may involve gathering essential information about the smart device. This may include retrieving the device's model number, current firmware version, and connection status. This initial step may be important for establishing a baseline understanding of the device's configuration and capabilities.
[0051]The flowchart then diverges based on whether the device has a stored pairing code, representing two distinct scenarios: initial setup and subsequent access. If no stored pairing code is detected (step 404), the system initiates the initial pairing process. The app prompts the user to send an first pairing code to the device (step 408), typically a first code provided by the manufacturer (e.g., "0000"). This step may be important in establishing a secure initial connection between the user device and the smart device. Should the first pairing code authentication fail at the device level (step 412), the app provides a retry mechanism, prompting the user to re-enter the first pairing code (step 420). This feature may help mitigate potential errors during the setup process, ensuring that users can successfully establish the initial connection. Upon successful authentication with the first pairing code (step 414), the app transitions to a personalization phase, allowing the user to set a second pairing code (step 422). This new pairing code is then transmitted to the device, enhancing security by replacing the first code with a user-specific credential.
[0052]Following the new pairing code setup, the system implements a verification step to ensure the second pairing code has been successfully stored on the device (step 428). This check confirms that the new security credentials are properly synchronized between the user device and the smart device. If verification is successful, the app loads the device control dashboard (step 436), granting the user full access to the smart device's features and functionalities. In cases where the pairing code verification fails (step 430), the app prompts the user to re-enter the second pairing code (step 438), ensuring that the correct credentials are stored and synchronized.
[0053]For devices with an existing stored pairing code (step 406), indicating a previously configured device, the app initiates a different authentication flow. Users are prompted to enter their second pairing code (step 410), which is then sent to the device for verification. This step represents the standard authentication process for returning users accessing their configured smart devices.
[0054]In scenarios where users have forgotten their second pairing code (step 418), the system provides a factory reset option (step 426). This feature allows users to revert the device to its original state, effectively restarting the setup process. While this ensures users can regain access to their devices, it also underscores the importance of pairing code management and the potential inconvenience of losing access to customized settings.
[0055]The authentication process includes multiple validation checks to ensure security and user convenience. If pairing code validation fails (step 432), the app offers users additional attempts to enter the correct pairing code (step 440), balancing security with usability. Upon successful validation (step 434), the app loads the device control dashboard (step 442), providing users with comprehensive access to their smart device's features and settings.
[0056]This process demonstrates a secure and user-friendly approach to device pairing and pairing code management. It may include steps to check if the pairing code has been set on the device after sending a second pairing code (step 428), which may ensure that the second pairing code has been successfully stored before the user can proceed to control the device. If the pairing code has not been set on the device (step 430), the user device may prompt the user to re-enter the second pairing code (step 438). This may provide a user-friendly interface for managing the pairing code setting process and may help to prevent errors or confusion during the pairing process.
[0057]Figure 5 illustrates a flow chart of proximity-based factory reset, in accordance with an embodiment of the present invention.
[0058]In another embodiment, the process leverages the Received Signal Strength Indicator (RSSI) value to enhance security and user convenience when performing a factory reset on smart devices. The custom module 110 may be configured to trigger a factory reset confirmation on the user device 102 when an RSSI value exceeds a predefined threshold. The RSSI value may be a measure of the power level of the radio signal received by the user device 102 from the smart device 108. The RSSI value may be used to determine the proximity of the user device 102 to the smart device 108.
[0059]The process begins with the user device 102 scanning for available devices to pair and displaying a list with corresponding RSSI values (step 502). This step allows the user to identify nearby smart devices that are available for pairing or reset. The process then checks if a smart device is in close proximity to the user device 102 by evaluating if the RSSI value is in the range of -20dbm or above (step 504). This step ensures that only devices within a specific range can be reset, adding a layer of security to the process.
[0060]If a device is detected within the specified proximity, a pop-up is triggered to display a factory reset option to the user (step 506). This prompt allows the user to confirm whether they want to initiate the factory reset process. If the user agrees to the factory reset, the device undergoes the reset process (step 508). This step reverts the device to its original factory settings, clearing any user-specific configurations or data.
[0061]In some cases, the custom device 110 may be further configured to enhance security by rejecting factory reset commands when suspicious RSSI patterns are detected. This feature adds an additional layer of protection against potential unauthorized reset attempts. Suspicious RSSI patterns could include rapid fluctuations in signal strength, inconsistent readings, or values that do not align with expected proximity-based measurements. For example, if the RSSI values oscillate dramatically within a short timeframe or if they indicate a distance inconsistent with the user's supposed location, the system may flag this as suspicious behavior. In such cases, the custom module 110 would automatically reject the factory reset command, preventing potential security breaches. This intelligent pattern recognition helps safeguard against sophisticated attacks that might attempt to simulate proximity or manipulate RSSI readings to gain unauthorized access to the device's reset functionality. By implementing this feature, the system maintains a robust security posture while still allowing legitimate users to perform factory resets when necessary.
[0062]The predefined threshold for the RSSI value may be in the range of -20 dBm to 0 dBm for initiating the factory reset. This range may be selected to ensure that the user device 102 is in close proximity to the smart household device 108 when the factory reset is initiated. If the RSSI value is below -20 dBm, indicating that the user device 102 is not in close proximity to the smart device 108, the custom module 110 may not trigger the factory reset confirmation.
[0063]The user device 102 may be configured to read RSSI values greater than or equal to -20dbm to determine close proximity to the smart device 108. The user device 102 may display a message or an alert to the user when the RSSI value exceeds the predefined threshold, indicating that the user device 102 is in close proximity to the smart device 108 and that a factory reset can be initiated. This may provide a user-friendly interface for managing the factory reset process.
[0064]Upon receiving a factory reset confirmation from the user device 102, the custom module 110 may revert the smart device 108 to the first pairing code. This proximity-based factory reset functionality may provide an additional layer of security by ensuring that only users who are physically close to the smart household device 108 can initiate a factory reset. This approach may also enhance user convenience by allowing the user to initiate a factory reset without requiring physical access to the smart household device 108.
[0065]Figure 6 illustrates a flow chart of the method for secure synchronization control of smart devices, in accordance with an embodiment of the present disclosure.
[0066]At step 602, the method stores a first pairing code in the memory.
[0067]At step 604, the method establishes an initial pairing with a smart device using the first pairing code.
[0068]At step 606, the method prompts a user device to input a second pairing code.
[0069]At step 608, the method authenticates the user device using the second pairing code during subsequent pairing.
[0070]At step 610, the method broadcasts a signal from the smart device, wherein the signal comprises Received Signal Strength (RSSI) value.
[0071]At step 612, the method authenticates the RSSI value to detect unauthorized one or more access attempts.
[0072]At step 614, the method triggers a factory reset confirmation on the user module when an RSSI value exceeds a predefined threshold.
[0073]At step 616, the method reverts the smart device to the first pairing code upon receiving a factory reset confirmation from the user device.
[0074]The system and method for secure synchronization control of smart devices may offer several technical advantages. By implementing a two-step authentication process and utilizing RSSI values for proximity-based factory resets, the invention may enhance both security and user convenience in managing smart household devices. The use of custom pairing codes and RSSI thresholds may significantly reduce the risk of unauthorized access and remote attacks, addressing key vulnerabilities in existing smart home systems. Additionally, the proximity-based reset functionality may allow users to easily restore devices to factory settings without requiring physical access, which may be particularly beneficial for devices installed in hard-to-reach locations. The system's ability to detect and reject suspicious RSSI patterns may further bolster its security measures, potentially thwarting sophisticated attempts to simulate proximity. Moreover, the user-friendly interface and intuitive pairing code management process may improve the overall user experience, potentially encouraging wider adoption of secure smart home technologies.
[0075]While specific language has been used to describe the invention, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.
[0076]The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, order of processes described herein may be changed and is not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.
[0077]Finally, the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter. It is therefore intended that the scope of the invention be limited not by this detailed description, but rather by any claims that issue on an application based here on. Accordingly, the embodiments of the present invention are intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
, Claims:WE CLAIM:
1. A system for secure synchronization control of smart devices, the system comprising:
a hardware processor;
a memory coupled to the hardware processor configured to store a first pairing code;
a wireless communication interface configured to establish an initial pairing with a smart device using the first pairing code;
a custom module operatively connected to the hardware processor, wherein the custom module is configured to:
prompt a user device to input a second pairing code;
authenticate the user device using the second pairing code during subsequent pairing;
broadcast a signal from the smart device,
wherein the signal comprises Received Signal Strength Indicator (RSSI) value;
authenticate the RSSI value to detect unauthorized one or more access attempts;
trigger a factory reset confirmation on the user device when the RSSI value exceeds a predefined threshold; and
revert the smart device to the first pairing code upon receiving a factory reset confirmation from the user device.
2. The system as claimed in claim 1, wherein the custom module is configured to initiate temporary blocking the user device after a predetermined number of failed attempts to input the second pairing code.
3. The system as claimed in claim 1, wherein the custom module is configured to initiate temporary rejection of the factory reset command upon detection of a suspicious RSSI pattern.
4. The system as claimed in claim 1, wherein the predefined threshold for the RSSI value is in the range -20dbm to 0 dbm to initiate the factory reset.
5. The system as claimed in claim 1, wherein the wireless communication interface employs one of a Bluetooth Low Energy (BLE), Wi-Fi and cloud for secure pairing.
6. A method for secure synchronization control of smart devices, the method comprising:
storing a first pairing code;
establishing, via a wireless communication interface, an initial pairing with a smart device using the first pairing code;
prompting a user device to input a second pairing code;
authenticating the user device using the second pairing code during subsequent pairing;
broadcasting a signal from the smart device,
wherein the signal comprises Received Signal Strength (RSSI) value;
authenticate the RSSI value to detect unauthorized one or more access attempts;
triggering a factory reset confirmation on the user device when an RSSI value exceeds a predefined threshold;
reverting the smart device to the first pairing code upon receiving a factory reset confirmation from the user device.
7. The method as claimed in claim 1, further comprising initiating a temporary blocking of the user device after a predetermined number of failed attempts to input the second pairing code.
8. The method as claimed in claim 1, further comprising initiating a temporary rejection of the factory reset command upon detection of a suspicious RSSI pattern.
9. The method as claimed in claim 1, wherein the predefined threshold for the RSSI value is in the range of -20 dBm to 0 dBm to initiate the factory reset.
10. The method as claimed in claim 1, wherein the wireless communication interface employs one of a Bluetooth Low Energy (BLE), Wi-Fi and cloud for secure pairing.
Dated this 30th day of October, 2024
VIDYA BHASKAR SINGH NANDIYAL
Patent Agent No. 2912
IPExcel Private Limited
Documents
Name | Date |
---|---|
202441083102-Proof of Right [08-11-2024(online)].pdf | 08/11/2024 |
202441083102-COMPLETE SPECIFICATION [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-DECLARATION OF INVENTORSHIP (FORM 5) [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-DRAWINGS [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-EVIDENCE FOR REGISTRATION UNDER SSI [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-FORM 1 [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-FORM 18A [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-FORM FOR SMALL ENTITY(FORM-28) [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-FORM FOR STARTUP [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-FORM-9 [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-FORM28 [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-POWER OF AUTHORITY [30-10-2024(online)].pdf | 30/10/2024 |
202441083102-STARTUP [30-10-2024(online)].pdf | 30/10/2024 |
Talk To Experts
Calculators
Downloads
By continuing past this page, you agree to our Terms of Service,, Cookie Policy, Privacy Policy and Refund Policy © - Uber9 Business Process Services Private Limited. All rights reserved.
Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.
Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.