WO2014182621A1 - Mobile identity provider with two factor authentication - Google Patents

Mobile identity provider with two factor authentication Download PDF

Info

Publication number
WO2014182621A1
WO2014182621A1 PCT/US2014/036811 US2014036811W WO2014182621A1 WO 2014182621 A1 WO2014182621 A1 WO 2014182621A1 US 2014036811 W US2014036811 W US 2014036811W WO 2014182621 A1 WO2014182621 A1 WO 2014182621A1
Authority
WO
WIPO (PCT)
Prior art keywords
machine readable
data
readable code
secure machine
secure
Prior art date
Application number
PCT/US2014/036811
Other languages
French (fr)
Inventor
Chris CASILLI
Original Assignee
Siemens Industry, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/890,797 external-priority patent/US20130261804A1/en
Priority claimed from US14/187,575 external-priority patent/US20140173289A1/en
Application filed by Siemens Industry, Inc. filed Critical Siemens Industry, Inc.
Priority to BR112015026936A priority Critical patent/BR112015026936A2/en
Priority to CN201480025852.4A priority patent/CN105190643A/en
Priority to CA2911641A priority patent/CA2911641A1/en
Priority to MX2015015319A priority patent/MX2015015319A/en
Priority to EP14794403.7A priority patent/EP2994849A4/en
Publication of WO2014182621A1 publication Critical patent/WO2014182621A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/082Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Definitions

  • This application relates to the field of building systems and, more particularly, to interfaces for modification of parameters used in a building automation system.
  • Building automation systems encompass a wide variety of systems that aid in the monitoring and control of various aspects of building operation.
  • Building automation systems (which may also be referred to herein as “building control systems”) include security systems, fire safety systems, lighting systems, and heating, ventilation, and air conditioning (“HVAC”) systems. Lighting systems and HVAC systems are sometimes referred to as "environmental control systems” because these systems control the environmental conditions within the building.
  • a single facility may include multiple building automation systems (e.g., a security system, a fire system and an environmental control system). Multiple building automation systems may be arranged separately from one another or as a single system with a plurality of subsystems that are controlled by a common control station or server.
  • the common control station or server may be contained within the building or remote from the building, depending upon the implementation,
  • the elements of a building automation system may be widely dispersed throughout a facility or campus.
  • an HVAC system includes temperature sensors and ventilation damper controls as well as other elements that are located in virtually every area of a facility or campus.
  • a security system may have intrusion detection, motion sensors and alarm actuators dispersed throughout an entire building or campus.
  • fire safety systems include smoke alarms and pull stations dispersed throughout the facility or campus.
  • the different areas of a building automation system may have different environmental settings based upon the use and personal likes of people in those areas, such as offices and conference rooms.
  • Building automation systems typically have one or more centralized control stations in which data from the system may be monitored, and in which various aspects of system operation may be controlled and/or monitored.
  • the control station typically includes a computer or server having processing equipment, data storage equipment, and a user interface.
  • building automation systems often employ multilevel communication networks to communicate operational and/or alarm information between operating elements, such as sensors and actuators, and the centralized control station.
  • One example of a building automation system control station is the
  • Apogee® Insight ⁇ Workstation available from Siemens Industry, Inc., Building Technologies Division, of Buffalo Grove, IL (“Siemens"), which may be used with the Apogee® building automation system, also available from Siemens.
  • Siemens Siemens Industry, Inc.
  • Apogee® building automation system also available from Siemens.
  • se veral control stations connected via an Ethernet or another type of network may be distributed throughout one or more building locations, each having the ability to monitor and control system operation.
  • Apogee® Insight® Workstation has a plurality of field panels that are in communication with the central control station. While the central control station is generally used to make modifications and/or changes to one or more of the various components of the building automation system, a field panel may also be operative to allow r certain modifications and/or changes to one or more parameters of the system. This typically includes changes to parameters such as temperature and lighting, and/or similar parameters.
  • the central control station and field panels are in communication with various field devices, otherwise known as "points".
  • Field devices are typically in communication with field panels of building automation systems and are operative to measure, monitor, and/or control various building automation system parameters.
  • Example field devices include lights, thermostats, damper actuators, alarms, HVAC devices, sprinkler systems, speakers, door locks, and numerous other field devices as will be recognized by those of skill in the art. These field devices receive control signals from the central control station and/or field panels. Accordingly, building automation systems are able to control various aspects of building operation by controlling the field devices. Large commercial and industrial facilities have numerous field devices that are used for environmental control purposes. These field devices may be referred to herein as "environmental control devices”.
  • a secure approach for accessing building automation and other systems Users set their desired environmental settings using an application executed by a processor in a mobile computing device, A user enters in data that is then digitally signed to prevent changes in the data. The digitally signed data is then encrypted. The encrypted data is then passed to a machine readable code generator. The machine readable code is generated and displayed. That code may then be presented to a reader that is connected to the building automation system or other system, The reader reads the machine readable code and the building automation system decodes the machine readable code and accesses the data contained in the machine readable code. Additional authentication may also be done by the building automation system using the data, such as a pin contained in the machine readable code.
  • the machine readable code may be a generated symbolic code, such as a QR code with multiple layers of security.
  • additional data may be encoded in to the machine readable code, That information may include passwords, public or private encryption keys, biometric data, in addition to the actually QR code data being encrypted prior to generation.
  • FIG. 1 is an exemplar ⁇ ' topology diagram for a building automation system having an environmental control access panel
  • FIG. 2 shows an exemplary block diagram of a building automation system of the bui lding netw ork of FIG. 1 ;
  • FIG. 3 shows an exemplary internal block diagram of a field panel for the building automation system of FIG. 2;
  • FIG. 4 shows an exemplary process flow diagram of modification of a building automation system using parameters encoded by a mobile device and read by the buil ding automation system independent of the network;
  • FIG. 5 shows an exemplar ⁇ ' front view of an environmental control access panel with display for the building interface system of FIG. 1;
  • FIG. 6 shows an exemplary internal block diagram of a mobile computing device for the building interface system of FIG. 1;
  • FIG. 7 illustrates a top level building synergistic interface system
  • FIG. 8 illustrates a temperature control submenu graphical user interface that appears on the mobile computing device of FIG, 1;
  • FIG. 9 illustrates a fan control submenu graphical user interface that appears on the mobile computing device of FIG . 1 ;
  • FIG. 10 illustrates a lighting control submenu graphical user interface that appears on the mobile computing device of FIG. 1;
  • FIG. 11a illustrates a flow r diagram of the process for the BSIS mobile application approach in accordance with an example implementation
  • FIG . 1 l b continues to illustrate the flow diagram of the process for the
  • FIG. 12 show r s an exemplary application of the mobile computing device with BSIS mobile application displaying a Quick Response (QR) code that is read by the environmental access panel;
  • QR Quick Response
  • FIG. 13 depicts a diagram of security layers of a machine readable code (QR Code) in accordance with an example implementation of the invention.
  • FIG. 14 depicts the data layer of FIG. 13 having data in accordance with and example implementation of the invention.
  • FIG. 15 shows a diagram that depicts the digital signing of the data of
  • FIG. 14 in accordance with an example implementation of the invention.
  • FIG. 16 depicts a diagram of the encryption of the data of FIG. 14 and digital signature of FIG. 15 in accordance with and example implementation of the invention
  • FIG. 17 depicts a diagram of encoding the encrypted data of FIG. 16 into a machine readable code is depicted in accordance with an example implementation of the invention
  • FIG. 18 depicts a message flow of decoding the machine readable code
  • FIG. 19 depicts a flow diagram of an approach for the generation of a secure machine readable code in accordance with an example implementation of the invention.
  • FIG. 20 depicts a flo diagram 2000 of an approach for the decoding of a secure machine readable code in accordance with an example implementation of the invention.
  • a user may modify the environmental settings of a building automation system via generation of a machine readable code that is read by a reader device located in an environmental control access panel.
  • the building wide area network 55 includes a plurality of systems and components in wired or wireless communication.
  • the buildmg wide area network 55 generally includes a plurality of building automation systems 100 and may be accessed via a "building synergistic interface system" or "BSIS".
  • BSIS 200 may be changed by one or more mobile computing devices 300 that are able to generate a graphical display readable by the BSIS 200 that may be part of an environmental control access panel 250.
  • the BSIS 200 further may include access to a data storage device comprising a building information database 210 and a user database 220.
  • Software for communicating environmental and other data to the BSIS 200 may be stored on both the mobile computing device 300 and/or the building automation system 100.
  • the BSIS 200 enables one or more of the environmental settings in a building automation system to be adjusted based on human actions without a network connection between the mobile computing device 300 and the BSIS 200.
  • FIG. 1 a system block diagram of an exemplary building automation system (BAS) 100 within a building 99 is depicted.
  • the building automation system 100 is depicted as a distributed building system that provides control functions for any one of a plurality of building operations, such as environmental control, security, Hie or fire safety, industrial control and/or the like.
  • An example of a BAS is the Apogee® building automation system available from Siemens Industry, Inc., Building Technologies Division, of Buffalo Grove, IL.
  • the Apogee® building automation system allows the setting and/or changing of various controls of the system, generally as provided below. While a brief description of an exemplary BAS is provided in the paragraphs below, it should be appreciated that the building automation system 100 described herein is only an exemplar ⁇ ' form or configuration for a building automation system.
  • 100 includes at least one supervisory control system or workstation 102, client workstations 103a-103e, report server 104, a plurality of field panels represented by field panels 106a and 106b, and a plurality of controllers represented by controllers 108a-! Q8e. It will be appreciated, however, that wide varieties of BAS architectures may be employed.
  • Each of the controllers 108a-108e represents one of plurality of localized, standard building control subsystems, such as space temperature control subsystems, lighting control subsystems, or the like. Suitable controllers for building control subsystems include, for example, the model TEC (Terminal Equipment Controller) available from Siemens Industry, Inc., Building Technologies Division, of Buffalo Grove, IL. To carry out control of its associated subsystem, each controller 108a-10Se connects to one or more field devices, such as sensors or actuators, shown by way of example in FIG. 2 as the sensor 109a is connected to the controller 108a and the actuator 109b is connected to controller 108b.
  • TEC Terminal Equipment Controller
  • a controller such as the controller 108a affects control of a subsystem based on sensed conditions and desired set point conditions.
  • the controller controls the operation of one or more field devices to attempt to bring the sensed condition to the desired set point condition.
  • the controller 108a may further open or close the air conditioning damper via actuator 109b to attempt to bring the temperature closer to the desired set point.
  • sensor, actuator and set point information may be shared between controllers 108a-108e, the field panels 106a and 106b, the work station 102 and any other elements on or connected to the BAS 100.
  • FLNs floor level networks or field level networks
  • the FLN data network 1 10a is a low-level data network that may suitably employ any suitable proprietary or open protocol.
  • Subsystems 108c, 108d and 108e along with the field panel 106b are similarly connected via another low- level FLN data network 110b.
  • FLN data network 110b may suitably employ any suitable proprietary or open protocol.
  • the field panels 106a and 106b are also connected via building level network ("BLN") 112 to the workstation 102 and the report server 104.
  • the field panels 106a and 106b thereby coordinate the communication of data and control signals between the subsystems 108a-108e and the supervisory computer 102 and report server 104.
  • one or more of the field panels 106a, 106b may themselves be in direct communication with and control field devices, such as ventilation damper controllers or the like.
  • the field panel 106a is operably connected to one or more field devices, shown for example as a sensor 109c and an actuator 109d.
  • the workstation (server in other implementations) 102 provides overall control and monitoring of the building automation system 100 and includes a user interface.
  • the workstation 102 further operates as a BAS data server that exchanges data with various elements of the BAS 100.
  • the BAS data server can also exchange data with the report server 104.
  • the BAS data server 102 allows access to the BAS system data by various applications. Such applications may be executed on the workstation 102 or other supervisor ⁇ ' computers (not shown).
  • the workstation 102 is operative to accept modifications, changes, alterations and/or the like from the user. This is typically accomplished via a user interface of the workstation 102,
  • the user interface may include a keyboard, touchscreen, mouse, or other interface components.
  • the workstation 102 is operable to, among other things, affect or change operational data of the field panels 106a, 106b as well as other components of the BAS 100.
  • the field panels 106a and 106b utilize the data and/or instructions from the workstation 102 to provide control of their respective controllers.
  • the workstation 102 is also operative to poll or query the field panels
  • the workstation 102 processes the data received from the field panels 106a and 106b, including trending data. Information and/or data is thus gathered from the field panels 106a and 106b in connection with the polling, query or otherwise, which the workstation 102 stores, logs and/or processes for various uses. To this end, the field panels 106a and 106b are operative to accept modifications, changes, alterations and/or the like from the user.
  • the workstation 102 also preferably maintains a database associated with each field panel 106a and 106b.
  • the database maintains operational and configuration data for the associated field panel.
  • the report server 104 stores historical data, trending data, error data, system configuration data, graphical data and other I3AS system information as appropriate.
  • the building information database 210 and the user database 220 may be accessed by the BSIS 200 via the BAS data server 102. In other embodiments the building information database 210 and the user database 220 may be stored elsewhere, such as field panel 106b.
  • the management level network (MLN) 113 may connect to other supervisory computers and/or servers, internet gateways, or other network gateways to other external devices, as well as to additional network managers (which in turn connect to more subsystems via additional low level data networks).
  • the workstation may connect to other supervisory computers and/or servers, internet gateways, or other network gateways to other external devices, as well as to additional network managers (which in turn connect to more subsystems via additional low level data networks).
  • 102 may operate as a supervisory computer that uses the MLN 1 13 to communicate
  • the MLN 113 may suitably comprise an Ethernet or similar wired network and may employ TCP/IP, BACnet, and/or other protocols that support high speed data communications.
  • FIG. 2 also shows that the IMS 100 may include a field panel 106b that is shown in FIG. 2 as a housing that holds the building information database 210, the user database 220, and the environmental access panel 250 having BSIS 200.
  • the mobile computing device 300 is configured for wireless communications with the
  • the building information database 210 and the user database 220 of the BSIS could be provided on the workstation 102.
  • the building information database 210 and the user database 220 could be housed separately from those components shown in FIG. 2, such as in a separate computer device that is coupled to the building level network 1 12 or other BAS location.
  • Such a separate computer device could also be used to store BSIS operational software.
  • the environmental access panel 250 with 13SIS 200 may be housed within the workstation 102 or within a separate computer device coupled to the building level network 112 of the BAS.
  • FIG. 3 a block diagram of an exemplary embodiment of the field panel 106b of FIG. 2 is shown. It should be appreciated that the embodiment of the field panel 106b is only an exemplary embodiment of a field panel in a BAS 100 coupled to the BSIS 200. As such, the exemplary embodiment of the field panel 106b of FIG. 3 is a generic representation of all manners or configurations of field panels that are operative in the manner set forth herein.
  • the field panel 106b of FIG. 3 includes a housing, cabinet or the like
  • the field panel 106b includes processing circuitry/logic 122, memory 124, a power module 126, a user interface 128, an I/O module 134, a BAS network communications module 136, and the WiFi server 130.
  • the processing circuitry/logic 122 is operative, configured and/or adapted to operate the field panel 106b including the features, functionality, characteristics and/or the like as described herein. To this end, the processing circuitry logic 122 is operably connected to all of the elements of the field panel 106a described below.
  • the processing circuitry/logic 122 is typically under the control of program instructions or programming software or firmware contained in the instructions 142 area of memory 124, explained in further detail below . In addition to storing the instructions 142, the memory also stores data 152 for use by the BAS 100 and/or the BSIS 200.
  • the field panel 106b also includes a power module 126 that is operative, adapted and/or configured to supply appropriate electricity to the field panel 106b (i.e., the various components of the field panel).
  • the power module 126 may operate on standard 120 volt AC electricity, but may alternatively operate on other AC voltages or include DC power supplied by a battery or batteries.
  • An input/output (I/O) module 134 is also provided in the field panel
  • the I/O module 134 includes one or more input/output circuits that communicate directly with terminal control system devices such as actuators and sensors.
  • terminal control system devices such as actuators and sensors.
  • the I/O module 134 includes analog input circuitry for receiving analog sensor signals from the sensor 109a, and includes analog output circuitry for providing analog actuator signals to the actuator 109b.
  • the I/O module 134 typically includes several of such input and output circuits.
  • the field panel 106b further includes a BAS network communication module 136.
  • the network communication module 136 allows for communication to the controllers 108c and 108e as well as other components on the FLN 1 10b, and furthermore allows for communication with the workstation 102, other field panels (e.g., field panel 106a) and other components on the BLN 112.
  • the BAS network communication module 136 includes a first port, (which may suitably be a RS-485 standard port circuit) that is connected to the FLN 1 10b, and a second port (which may also be an RS-485 standard port circuit) that is connected to the BLN 1 12.
  • the field panel 106b may be accessed locally.
  • the field panel 106b includes an interactive user interface 128.
  • the user may control the collection of data from devices such as sensor 109a and actuator 109b.
  • the user interface 128 of the field panel 106b includes devices that display data and receive input data. Reception of input data may include a code reader device, such as a Quick Response (QR) code reader. These devices may be devices that are permanently affixed to the field panel 106b or portable and moveable.
  • the user interface 128 may also suitably include an LCD type screen or the like, and a keypad.
  • the user interface 128 is operative, configured and/or adapted to both alter and show information regarding the field panel 106b, such as status information, and/or other data pertaining to the operation, function and/or modifications or changes to the field panel 106b.
  • the memory 124 includes various programs that may be executed by the processing circuitry/logic 122.
  • the memory 124 of FIG. 3 includes a BAS application 144 and a BSIS building application 146.
  • BAS application 144 includes conventional applications configured to control the field panel 106b of the BAS 100 in order to control and monitor various field devices
  • z processing circuitry/logic 122 results in control signals being sent to the field devices 109a ⁇ n via the I/O module 134 of the field panel 106b, Execution of the BAS application 144 also results in the processor 122 receiving status signals and other data signals from various field devices 109a-n, and storage of associated data in the memory 124.
  • the BAS application 144 may be provided by the Apogee ⁇ Insight® BAS control software commercially available from Siemens Industry, Inc. or another BAS control software.
  • the memory 124 may also includes data 1 52,
  • the data 152 includes records 154, graphical views 156, a room database 158, a user database 162, and an equipment database 164.
  • the records 154 include current and historical data stored by the field panel 106b in association with control and operation of the field devices 109a-n.
  • the records 154 may include current and historical temperature information in a particular room of the building 99, as provided by a thermistor or other temperature sensor within the room.
  • the records 154 in the memory may also includes various set points and control data for the field devices 109, which may be pre-installed in memory 124 or provided by the user through the user interface 128,
  • the records 154 may also include other information related to the control and operation of the 100 B AS and BSIS building application 146, including statistical, logging, licensing, and historical information.
  • the graphical views 156 provide various screen arrangements to be displayed to the user via the user interface 128. Examples of such screens for display on the mobile computing device 300 are provided in FIGs. 8, 9 and 1 1 , discussed in further detail below.
  • the user interface 128 may be displayed at thermostats with displays or other user access points having displays, such as liquid crystal displays, light emitting diode displays, or other kno wn types of visual displays devices.
  • the room database 158 may include data related to the layout of the building 99.
  • This room database 158 includes a unique identifier for each room or area within the building (e.g., room " 12345").
  • the room database 158 may include other information about particular rooms or areas within the building 99.
  • the room database 158 may include information about field devices located within the room or area, particular equipment (e.g., research equipment, manufacturing equipment, or HVAC equipment) positioned within the room or area.
  • the user database 162 may include data related to human users who frequent the building 99, Accordingly, the user database 162 may include a unique identifier for each human user (e.g., user "12345") and a user profile associated with that user. In other implementations, each room or area may have a profile that has one or more users associated with it.
  • the user profile may include information provided by the user or provided by third parties about the user. For example, the user profile may include a preferred temperature or lighting level for the user, which is provided to the user database 162 by the user. Also, the user profile may include a security clearance level, room access, or data access for the user, all provided to the database 162 by a third party, such as the human resources department or security department for the employer who owns the building 99.
  • the equipment database 164 may include data related to various pieces of equipment within the building 99.
  • the equipment may include field devices associated with the BAS 100 or other equipment that is positioned within the building 99.
  • the equipment database 164 may include information related to manufacturing or research equipment located in a particular room of the building.
  • the equipment database 164 maintains a unique identifier for each piece of equipment (e.g., equipment "12345") and data associated with that equipment.
  • the database 164 may associate particular schematics, operation manuals, photographs, or similar data with a given piece of equipment within the database 164.
  • the field panel 106b has been explained in the foregoing embodiment as housing the BSIS building application 146 and various BSIS databases, such as the room database 158, user database 162, and equipment database 164, it will be recognized that these components may be retained in other locations in association with the 13 AS 100. For example, these components could all be retained within the central workstation 102 of the BAS 100 or a separately designated BSIS computing device in the BAS 100.
  • FIG. 4 an exemplary process flow diagram 400 of modification of a building automation system using parameters encoded by a mobile device and read by the building automation system independent of the network is depicted.
  • A. user interacts with a mobile device, such as mobile device 300, and sets up various environmental parameters associated with the building automation system via a mobile application 404.
  • the mobile application uses the various preferences and user information contained in the mobile device to encode the data into machine-readable code that is transmittable independent of the network 404.
  • the data that is encoded may also include information associated with the building automation system, such as fan identifies or blind identifies.
  • the term "transmittable independent of a network” means that the data is transferred without having to physically insert a memory device into the system to be read.
  • independent transmission examples include a reader that reads codes, such as bar codes or QR codes, RF1 D tags, MOS codes, flashing lights, and magnetic card readers.
  • codes such as bar codes or QR codes, RF1 D tags, MOS codes, flashing lights, and magnetic card readers.
  • the various preferences and other data may then be generated into a machine-readable (machine-perceivable) code that is displayed on the mobile device 406.
  • the displayed code may be read off the mobile device or a printed code by the building automation system independent of network connections 408.
  • the building automation system decodes the various parameters from the code via a processor 410.
  • the various parameters are then sent to the systems, such as environment systems that make up the building automation system 412 in the current example.
  • the system environmental access control panel device 250 may be one of a number of different environmental access control panel devices that are mounted in various locations in the building 99.
  • the environmental access control panel device 250 may be configured to present information to a human user, and in some embodiments, may be configured to receive information from the human user.
  • the environmental access control panel device 250 includes a display screen 255, such as a LED, LCD or plasma screen capable of displaying visual data to a human user.
  • the reader 250 is to have a reader that is able to read encoded symbols or characters (user preferences in a coded QR format).
  • the reader may be a QR code reader 260.
  • the environmental access control panel device 250 may also have one or more displays for providing information to users. Examples of such information include location 262, temperature 264, and/or energy consumption 266.
  • a QR code 265 pattern that is indicative of environmental settings is presented to the reader 260.
  • the reader may read the QR code 265 from paper, wireless device, or other materials that support the reading of the QR code 265.
  • the reader for QR codes in the current example may be a reader for bar codes, text codes, or other machine readable codes in other implementations. It is noted that the reading of the encoded environmental data occurs without a user having to have access to the data network or the building automation network.
  • the environmental access control panel device 250 with BSIS 200 capable of reading the QR code 265 may be mounted to the building 99 at a location that is within or in close proximity to a room or group of rooms for convenience of the users. In other implementations, a central location may be provided for the environmental access control panel device 250, such as mounted on a wail in the main lobby of the building 99, next to the doorway or other threshold of a testing lab in the building 99. It is understood that the environmental access control panel device 250 is not required to be associated with any specific area of the building 99. The association of the area within building 99 to a QR code is encoded within the QR code 265.
  • the environmental access control panel device 250 may be coupled to the BLN 1 12 or a FLN 1 10b of the BAS 100. Accordingly , the environmental access control device 250 may be configured to transmit and receive information from the BAS 100. Received information from the B AS 100 may be displayed on the display screen 255, This information may include the building information indicia 262, 264, and 266 as well as other information that may be beneficial to a human user, such as building information, weather information, current news, time of day, or other information. As noted above, the display screen 255 of the environmental access control panel device 250 of FIG. 5 is a dynamic display that is capable of changing over time.
  • system enrollment/display device may include additional components that allow the human to interface with the
  • the display screen 255 is a touch screen that allows a user to input data via the display screen 255.
  • the environmental access control panel device 250 may also include additional components, such as speakers, microphones, cameras, various data communications ports, and other interface components, including those that are commonly found on televisions and computer monitors. These additional interface components may be used to provide the human user with helpful features, such as providing audio instructions for the
  • BSIS 200 to a human user.
  • These additional interface components may also be used by security to provide surveillance cameras and intercoms at various locations within the building. Additionally, the interface components may be used by maintenance when operational issues arise with the environmental access control panel device 250.
  • the environmental access control panel device 250 may be configured to display only static data and be free of electronic components.
  • the environmental access control panel device 250 may be a printed sign posted outside of a room or a doorway that identifies the room and displays the building information.
  • a combination of static and dynamic devices may be used, including printed signs (with readers) as described in this paragraph in combination with devices with screens and various electronic components, as described above in association with FIG. 5.
  • the BSIS may also include a mobile computing device 300, FIG. 1 .
  • the mobile computing device 300 may be provided by any mobile device capable of being carried by a human, and generating a code (QR code 260 in the current example).
  • QR code 260 in the current example.
  • FIG. 6 an internal block diagram of an exemplary mobile computing device 300 is shown.
  • the mobile computing device 300 includes a scanner/camera module 350 that may be configured to read the building information QR codes 260 and a user interface 340 that includes a display screen.
  • Exemplary mobile computing devices include personal digital assistants, smart phones, and handheld personal computers (e.g., Droid®, iOS iPhone®, iPod®, iPod Touch ®, iPad®, etc.).
  • the mobile computing device 300 of FIG. 6 includes a housing, case or the like 308 that is configured in a typical manner for a mobile computing device.
  • the mobile computing device 300 includes processing circuitry/logic 310, a memory 320, a power module 330, a user interface 340, and a camera/scanner module 350, all positioned within the housing 308. It will be appreciated by one having ordinary skill in the art that the embodiment of the mobile computing device 300 is only an exemplary embodiment of a mobile computing device configured for communication with the BAS 100 over a wireless network and may include other components not shown to avoid obscuring aspects of the present invention.
  • the processing circuitry/logic 310 is operative, configured and/or adapted to operate the mobile computing device 300 including the features, functionality, characteristics and/or the like as described herein. To this end, the processing circuitry / ' logic 310 is coupled to all of the elements of the mobile computing device 300 described below.
  • the processing circuitry/logic 310 is typically under the control of program instructions or programming software or firmware 322 contained in memory 320, explained in further detail below. In addition to storing the instructions 322, the memory also stores data 324 for use by the BAS 100 and/or the BSIS 200.
  • the mobile computing device 300 also includes a power module 330 that is operative, adapted and/or configured to supply appropriate electricity to the mobile computing device 300 (i.e., the various components of the mobile computing device).
  • the power module 330 is generally DC power supplied by a battery or batteries.
  • the mobile computing device 300 further includes a user interface
  • the user interface 340 allows the mobile computing device 300 to present information to the user, and also allows the user to insert data into the mobile computing device 300. Accordingly, the user interface 340 may be configured to drive a touchscreen, keypad, buttons, speaker, microphone, or any of various other standard user interface devices,
  • a camera/scanner module 350 may also be provided in the mobile computing device 300.
  • the camera/scanner module 350 may be configured by software or an application to read the QR codes 265 that have previously been generated and associated with the BAS 100.
  • the camera/scanner module 350 may include a camera configured to focus on a QR CODE, such as QR code 265 and produce an electronic data file of the image (e.g., a JPEG file).
  • the electronic data file generated by the camera/scanner module 350 may be stored in memory 320.
  • the processing circuitry/logic 310 is configured to process the electronic data file generated by the camera/scanner module 350 into indicia data that is used by one or more applications.
  • the processing circuitry/logic 310 may be configured to generate a QR code number or other unique identifier associated with the building information indicia captured by the mobile computing device 300 and user entered data,
  • the memory 320 includes various programs that may be executed by the processing circuitry/logic 310 (which may include a processor).
  • the memory 320 in the mobile communications device 300 of FIG. 6 includes a BSIS mobile application 322.
  • the BSIS mobile application 322 is configured to facilitate advanced interactions between a human user in possession of the mobile communications device and the building automation system 100.
  • the BSIS mobile application 322 is configured to generate a machine readable code (QR code in the current example) with at least environmental settings for use by the BSIS 200,
  • QR code machine readable code in the current example
  • the BSiS mobile application 322 may be further configured to encode additional data, such as user identification data unique to the computing device that generated the QR code to the BAS 100. Operation of the BSIS mobile application 322 will be explained in further detail below.
  • the memory 320 of the mobile computing device 300 also includes data.
  • the data may include records 324 of current and historical data related to operation of the mobile computing device 300.
  • the records 324 may include user identification information that identifies the mobile computing device 300.
  • the records 324 may also include current and historical QR codes generated by the mobile computing device 300.
  • FIG. 7 a diagram of a graphical user interface
  • the graphical user interface 702 may present a user with a plurality of environmental options 704, 706, 708, 710, 712 and QR code generator 714. In other implementations, additional or fewer options may be presented to a user. In yet other implementations, additional information may be provided for inclusion in the code (QR code in the current example) in addition to environmental options, such as clock-in, clock-out, securit system activation, security system deactivation, location verification.
  • a temperature graphical user interface 800 FIG. 8 is presented to the user.
  • the desired temperature may be presented in numerical form 802.
  • a graphical input may also be presented 804.
  • the graphical input 804 is a slide bar in the shape of a thermometer. As the slide bar is moved, the desired temperature in numerical form 802 may also change in the current example.
  • An additional conservation icon 806 may also be present. When the temperature is at an environmentally friendly level (60-68 degrees), the conservation icon 806 may appear green in color.
  • the bottom of the graphical user interface 800 may provide a plurality of buttons 808 that correspond to the selections in the graphical user interface 702 display.
  • the graphical user interface 800 may also have a temperature button 812 in the plurality of buttons 808 that visually indicates that it is the current selection. In the present example, the temperature button 812 is highlighted.
  • a user is presented with a fan graphical user interface 900, FIG. 9.
  • the desired speed of the fan is presented as a numerical value 902.
  • a user is also presented with a virtual knob in the shape of a fan 904 that may be rotated in one direction to increase fan speed and in the other to reduce fan speed.
  • the corresponding fan speed may be changed and displayed as a numerical value 902.
  • the fa graphical user interface 900 may also have a conservation icon 906 that functions in a similar manner as 806, but with respect to fan speed.
  • the graphical user interface 900 may also have a fan button 912 in the plurality of buttons 908 that visually indicates that it is the current selection. In the present example, the fan button 912 is highlighted.
  • a user is presented with a light setting graphical user interface 1000, FIG. 10.
  • the desired light setting is presented as a numerical value 1002.
  • a user is also presented with an image of light bulb 1004 that a user moves a finger up or down on to change the light setting.
  • the corresponding light setting may be changed and the updated value displayed as a numerical value 1002.
  • the light setting graphical user interface 1000 may also have a conservation icon 1006 that functions in a similar manner as 806 and 906, but with respect to lighting.
  • the graphical user interface 1000 may also have a fan button 1012 in the plurality of buttons 1008 that visually indicates that it is the current selection. In the present example, the light setting button 1012 is highlighted.
  • the humidity button 706 of FIG. 7 and blinds button 712 may operate in similar manners as the graphical user interfaces for temperature 800, fan speed 900, and light 1000.
  • step 1 102 the user activates BSIS mobile application 702 that has been previously downloaded or otherwise installed on mobile device 300.
  • step 1 104 the top level of the graphical user interface 702 of the BSIS mobile application 700 is displayed.
  • the user is then able to select a environmental control submenu (704-714) from the top level of the graphical user interface 702 in step 1 106. If no selection is made, the top level graphical user interface 702 continues to be displayed unti l it is exited in step 1 1 10. If the application is exited in 11 10, then it is closed and no longer displayed in step 1 1 12.
  • step 1 1 14 a check occurs in step 1 1 14 for selection of the temperature graphical user interface 704, If the temperature graphical user interface has been selected in step 1 1 14, the temperature graphical user interface submenu 800 is generated and displayed on mobile device 300 in step 1 1 16. The user may then modify the temperature in step 1 1 18. The user then may use the plurality of buttons 808 to select a different submenu or the mobile device's exit button to close the application.
  • the humidity graphical user interface is selected in step 1 106, then in step 1120 the humidity graphical user interface submenu is generated and displayed on mobile device 300 in step 1 122. The user may then modify the humidity in step 1124. The user then may use the plurality of buttons 808 to select a different submenu or the mobile device's exit button to close the application.
  • step 1106 If the light graphical user interface is selected in step 1106, then in step 1106, then in step 1106, then in step
  • the light graphical user interface submenu 1000 is generated and displayed on mobile device 300 in step 1130.
  • the user may then modify the light brightness in step 1 132.
  • the user then may use the plurality of buttons 1008 to select a different submenu or the mobile device's exit button to close the application.
  • step 1 106 If the fan graphical user interface is selected in step 1 106, then in step 2 106, then in step 3 106, then in step
  • the fan graphical user interface submenu 900 is generated and displayed on mobile device 300 in step 1136.
  • the user may then modify the fan speed in step 1 138.
  • the user then may use the plurality of buttons 1008 to select a different submenu or the mobile device's exit button to close the application.
  • step 1140 the blinds graphical user interface submenu is generated and displayed on mobile device 300 in step 1 142.
  • the user may then change the blinds setting in step 1144.
  • the user then may use the plurality of button to select a different submenu or the mobile device's exit button to close the application.
  • step 1148 the user is presented with a submenu graphical interface where he may confirm that the code (QR code in the current example) should be generated and generates the QR code in step 1150.
  • the generated QR code may then be displayed in step 1 152.
  • the displayed QR code is displayed in step 1 152, such that it may be read by a code reader that is in communication with the BAS 100.
  • the user may also be given the option to save the QR code in step 1154.
  • the QR code may be saved as a graphic or picture in the current implementation in step 1 156. In other implementations, if text codes are employed, the text may be sa ved.
  • BSIS mobile application 322 and the BAS 100 are illustrated when a user scans a QR code with a mobile computing device 300.
  • the user begins by using the mobile computing device 300 as described herein to set the desired environment using the BSIS mobile application graphical user interface 340.
  • the user then generates a code (QR code in the current example) that is displayed upon the mobile computing device 300.
  • the mobile computing device 300 is held up to BSIS 200 of the environmental access control panel 250.
  • the BSIS 200 may be located in conference room "A.”
  • the QR code is read by the BSIS 200 in conference room "A"
  • the BAS sets the environmental controls for conference room "A” to the settings encoded in the QR code. It is noted tha there is no network connection between the mobile computing device and the BAS.
  • the data is only passed via the BAS reading the QR code.
  • the BSIS mobile application may provide checks to verify that acceptable ranges for the environmental controls are being used, such as preventing the temperature from being set too low or too high. In other implementations, the checks may occur within the BAS.
  • BAS knew where it was located.
  • a user may use the BSIS graphical user interface and may set the location to be adjusted.
  • the location to be adjusted may be entered as text in some implementations, or in other implementations, it may be set via pull down menus that have been preloaded.
  • the multiple codes may be individually saved in memory and recalled as needed. For example, a code for an office may be stored as "office,” a code for conference room “A” may be stored as “Conf A,” and so on.
  • the code may also be printed out and affixed to a back of a badge, enabling the user to use the QR code without a mobile computing device.
  • user data may be encoded in a machine readable code, such as a QR code
  • the encoded data may just as easily be decoded and accessed.
  • multiple layers of security may be added to the QR code.
  • FIG. 13 a diagram 1300 of security layers of a machine readable code
  • QR Code is depicted in accordance with an example implementation of the invention.
  • the lowest layer is the data layer 1302 that is to be encoded into the machine readable code.
  • the data may be presented as text or numerical data in the current example.
  • the data layer 1 302 may be digitally signed in a digital signature layer 1304.
  • the digital signature assures the data has not been changed or modified.
  • the data layer 1302and digital signature layer 1304 may also be encrypted via the encrypted data layer 1306.
  • the resulting encrypted signed data may then be used to generate a machine readable code, i.e. QR code layer 1308.
  • Text data such as a users name 1402, user identification 1404, personal identification number (PIN) 1406, biometric data 1408, or other data 1410 may be placed in the data layer 1302.
  • PIN personal identification number
  • biometric data 1408, or other data 1410 may be placed in the data layer 1302.
  • a temple may be used to create the data layer.
  • a combination of text and other data may be used (such as color or graphical data) may make up the data layer 1302.
  • FIG. 15 a diagram 1500 that depicts the digital signing of the data
  • a digital signature algorithm 1504 may be executed via a processor on a processor controlled device, such as the building automation system's security access control system 140.
  • a valid digital signature provides an assurance of the integrity of the data, i.e. the data has not been moditied.
  • a separate key for digital signing of a document is depicted in FIG, 15, with a public portion (digital signature password 1502) and data 1400 processed by the digital signature algorithm 1504.
  • the digital signature algorithm 1504 may be implemented as a series of logical functions that combine the data with the digital signature 1502 and a private key to generate a hash tag or other unique identifier that is associated with the original data 1400.
  • the generated value may be referred to as a digital signature 1506. If the data changes, then a reprocessing of the data will return a different value signaling the underlying data has changed.
  • FIG. 16 a diagram of the encryption of the data 1400 of FIG. 14 and digital signature 1506 of FIG. 15 is depicted in accordance with and example implementation of the invention.
  • the data 1400 and digital signature 1506 along with an encryption key (another public key 1602) is passed to an encryption algorithm 1604 that may have a private key.
  • the encryption algorithm 1604 may be executed via a processor in the building automation system.
  • the public key 1602 may be the same as the digital signature password 1502.
  • the encryption algorithm 1604 encrypts the data 1400 and digital signature 1506 resulting in encrypted data 1606.
  • FIG. 17 a diagram 1700 of encoding the encrypted data
  • FIG. 16 1 606 of FIG. 16 into a machine readable code is depicted in accordance with an example im lementation of the invention.
  • the encrypted data 1606 is passed to a OR code generator 1702 that generates a QR code of the encrypted data.
  • the resulting QR code is a secure QR code 1704 with multiple layers of security.
  • other machine readable codes may be used, such as bar codes, provided the resulting machine readable code can accommodate the encrypted data.
  • FIG. 18 a message flow 1800 of decoding the machine readable code (secure QR code 1704) is depicted in accordance with an example implementation.
  • the secure QR code is scanned by a human machine interface device, such as the environmental control access panel 250 of FIG. 5 via code reader 260.
  • the secure QR code 1704 is scanned or read by the code reader 260 and transmitted 1802 to the security access control system 140.
  • a processor may decode the scanned secure QR code into secure data 1804. If the secure QR code is decodable by the security access control system 140, then a personal identification number (PIN) request may be displayed at the environmental control access panel 250.
  • a PIN may be entered at the environmental control access panel 250 by a user and transmitted 1808 to the security access control system 140 where it is used as the public keys decrypt the secure data into digitally signed data 1810.
  • PIN personal identification number
  • the digital signature of the digitally signed data may then be verified to assure the data has not been tampered with or changed 1812. If the integrity of the data is verified, then the user has been identified and a menu for the building automation system 100 may be displayed 1814 on the environmental control access panel 250. in the current example, the same pin was used as the public keys for digitally signing the document and encryption. In other implementations, different keys may be employed and additional prompts may be displayed to gather additional user inputs. Similarly, once the data has been accessed, a password request may be displayed at the environmental control access panel. This password may reside in the building automations system 100. In other implementations, the password may reside in the data that is decoded from the secure QR code.
  • FIG. 19 a flow diagram 1900 of an approach for the generation of a secure machine readable code is depicted in accordance with an example implementation of the invention.
  • Data is 1400 may be entered in a template or flat file 1902 is received or accessed via a processor.
  • the data 1400 and digital signature password 1502 or public key is employed to generate a digital signature for the data 1904,
  • the digital signature and data may then be encrypted using a public encryption key 1906.
  • the encrypted data may then be encoded into a machine readable code, such as a QR code 1908.
  • the resulting QR code is a secure QR code that may be printed or stored by a user.
  • FIG. 20 a flow diagram 2000 of an approach for the decoding of a secure machine readable code is depicted in accordance with an example implementation of the invention.
  • A. machine readable code such as a bar code or secure QR code is read or scanned with the image or scan being processed or received from the scanner or similar input device and stored in memory by a processor or controller 2002.
  • the memory that the secure QR code is stored in may be a temporary memory, such as ram or a buffer memory.
  • the secure QR code is decoded via the processor into encrypted data 2004.
  • a user may provide a public encryption key 2006 in response to a request generated via the processor to decrypt the encrypted data into digitally signed data.
  • the encryption may be via a single encryption algorithm that does not require a public key.
  • the encrypted data may be data that is not digitally signed.
  • the digitally signed data may then be verified via the process to assure data integrity 2008. Once the data integrity has been checked, the data may be used to further authenticate the user or allow access the system, In other implementations, the data may also be used to update databases or records associated with the data contained in the secure QR code.
  • the mobile computing device executes the BSIS mobile application.
  • a desktop computer may be used to execute an application.
  • the application may implement the process of FIG. 11a and FIG. l ib and be executed by a computer's processor that is running an operating system, such as Windows or Linux.
  • the application may implement the process of FIG, 1 1 a and l ib in a "browser" such as Internet Explorer, Chrome, Safari, and Firefox by a processor on a computerized device,
  • BSIS application is described as being implemented as software executed by a device with a processor (i.e., as a combination of hardware and software), the embodiments presented may be implemented in hardware alone such as in an application-specific integrated circuit (“ASIC") device,
  • ASIC application-specific integrated circuit
  • the flow diagrams of FIG. 19 and 20 may be implemented in hardware, software, or a combination of hardware and software.
  • the software is a plurality of non-transitory machine readable instructions that may be loaded into a memory, such as RAM, ROM, SDRAM, DIMMS, or there types of digital memory and execute via a processor or controller.
  • the software may be accessed from punch cards, magnetic tape, magnetic disks, compact discs (CDs), digital video discs (DVDs), or other non-transitory storage devices and loaded into memory or executed from the non-transitory storage.
  • the secure machine readable code such as the secure QR code has been described with respect to a building automation system and security system.
  • Other uses for the secure machine readable code include and are not limited to transfer of secure data, access control of systems, validation of users, or a combination of the transfer of secure data, access control of systems, validation of users in any type of system that is controlled by or has access to a processor or controller.
  • Industries and other applications that could make use of a secure machine readable code include and is limited to manufacturing, communication, medical, governmental, and education applications.

Abstract

An approach is provided for generating and decoding secure machine readable codes with a processor where the machine readable codes have multiple layers of security.

Description

1, Field of the Invention.
[0001] This application relates to the field of building systems and, more particularly, to interfaces for modification of parameters used in a building automation system.
2. Related Applications.
[0002] This application is a continuation-in-part of United States Patent
Application 13/218,132, titled SYNERGISTIC INTERFACE SYSTEM FOR A BUILDING NETWORK, by Chris Casilli, filed on August 25, 2011, and a continuation-in-part of United States Patent Application 13/890,797, titled INTERFACE FOR ADJUSTMENT OF PORTIONS OF A BUILDING AUTOMATION SYSTEM by Chris Casilli, filed on May 9, 2013, all of which are incorporated by reference in its entirety.
3. Background,
[0003] Building automation systems encompass a wide variety of systems that aid in the monitoring and control of various aspects of building operation. Building automation systems (which may also be referred to herein as "building control systems") include security systems, fire safety systems, lighting systems, and heating, ventilation, and air conditioning ("HVAC") systems. Lighting systems and HVAC systems are sometimes referred to as "environmental control systems" because these systems control the environmental conditions within the building. A single facility may include multiple building automation systems (e.g., a security system, a fire system and an environmental control system). Multiple building automation systems may be arranged separately from one another or as a single system with a plurality of subsystems that are controlled by a common control station or server. The common control station or server may be contained within the building or remote from the building, depending upon the implementation,
[0004J The elements of a building automation system may be widely dispersed throughout a facility or campus. For example, an HVAC system includes temperature sensors and ventilation damper controls as well as other elements that are located in virtually every area of a facility or campus. Similarly, a security system may have intrusion detection, motion sensors and alarm actuators dispersed throughout an entire building or campus. Likewise, fire safety systems include smoke alarms and pull stations dispersed throughout the facility or campus. The different areas of a building automation system may have different environmental settings based upon the use and personal likes of people in those areas, such as offices and conference rooms.
[0005] Building automation systems typically have one or more centralized control stations in which data from the system may be monitored, and in which various aspects of system operation may be controlled and/or monitored. The control station typically includes a computer or server having processing equipment, data storage equipment, and a user interface. To allow for monitoring and control of the dispersed control system elements, building automation systems often employ multilevel communication networks to communicate operational and/or alarm information between operating elements, such as sensors and actuators, and the centralized control station.
[0006] One example of a building automation system control station is the
Apogee® Insight© Workstation, available from Siemens Industry, Inc., Building Technologies Division, of Buffalo Grove, IL ("Siemens"), which may be used with the Apogee® building automation system, also available from Siemens. In this system, se veral control stations connected via an Ethernet or another type of network may be distributed throughout one or more building locations, each having the ability to monitor and control system operation.
[0007] The typical building automation system (including those utilizing the
Apogee® Insight® Workstation) has a plurality of field panels that are in communication with the central control station. While the central control station is generally used to make modifications and/or changes to one or more of the various components of the building automation system, a field panel may also be operative to allowr certain modifications and/or changes to one or more parameters of the system. This typically includes changes to parameters such as temperature and lighting, and/or similar parameters.
[0008] The central control station and field panels are in communication with various field devices, otherwise known as "points". Field devices are typically in communication with field panels of building automation systems and are operative to measure, monitor, and/or control various building automation system parameters. Example field devices include lights, thermostats, damper actuators, alarms, HVAC devices, sprinkler systems, speakers, door locks, and numerous other field devices as will be recognized by those of skill in the art. These field devices receive control signals from the central control station and/or field panels. Accordingly, building automation systems are able to control various aspects of building operation by controlling the field devices. Large commercial and industrial facilities have numerous field devices that are used for environmental control purposes. These field devices may be referred to herein as "environmental control devices".
[0009] As the environmental settings of the environmental control devices have traditionally been set using thermostats and switches, limited security was available to secure the devices. Known approaches have included covers with locks to prevent modification of a thermostat or lights. More recently, wired and wireless network approaches have been employed, where networked or smart switches and thermostats have been accessed and controlled by people to adjust the environment they are currently in, such as an office or conference room, via a computer or wireless device that communicates with the building data networks.
[0010] As user gain the ability to set and/or modify the setting of a building automation system, additional security is required. Such security measures in the past have included passwords or personal identification numbers. As often happens, user record their passwords or use passwords for multiple devices and accounts. Such use creates security risk for a building automation system and especially security systems which may be part of a building automation system.
[0011] While existing building automation systems may allow for network users to securely modify their environment using a data network, this creates issues for network security and determining authorized users. What is needed in the art is an approach that will address these issues and problems identified above.
SUMMARY
[0012] In accordance with one embodiment of the disclosure, there is provided a secure approach for accessing building automation and other systems. Users set their desired environmental settings using an application executed by a processor in a mobile computing device, A user enters in data that is then digitally signed to prevent changes in the data. The digitally signed data is then encrypted. The encrypted data is then passed to a machine readable code generator. The machine readable code is generated and displayed. That code may then be presented to a reader that is connected to the building automation system or other system, The reader reads the machine readable code and the building automation system decodes the machine readable code and accesses the data contained in the machine readable code. Additional authentication may also be done by the building automation system using the data, such as a pin contained in the machine readable code.
[0013] Thus, the machine readable code may be a generated symbolic code, such as a QR code with multiple layers of security. In addition to identification information, additional data may be encoded in to the machine readable code, That information may include passwords, public or private encryption keys, biometric data, in addition to the actually QR code data being encrypted prior to generation.
[0014] The above described features and advantages, as well as others, will become more readily apparent to those of ordinary skill in the art by reference to the following detailed description and accompanying drawings. While it would be desirable to provide an interface system for a building network that provides one or more of these or other advantageous features, the teachings disclosed herein extend to those embodiments which fall within the scope of the appended claims, regardless of whether they accomplish one or more of the above-mentioned advantages.
BRIEF DESCRIPTION OF THE DRAWINGS
[0015] FIG. 1 is an exemplar}' topology diagram for a building automation system having an environmental control access panel;
[0016J FIG. 2 shows an exemplary block diagram of a building automation system of the bui lding netw ork of FIG. 1 ;
[0017] FIG. 3 shows an exemplary internal block diagram of a field panel for the building automation system of FIG. 2;
[0018] FIG. 4 shows an exemplary process flow diagram of modification of a building automation system using parameters encoded by a mobile device and read by the buil ding automation system independent of the network;
[0019] FIG. 5 shows an exemplar}' front view of an environmental control access panel with display for the building interface system of FIG. 1;
[0020] FIG. 6 shows an exemplary internal block diagram of a mobile computing device for the building interface system of FIG. 1;
[0021] FIG. 7 illustrates a top level building synergistic interface system
(BSIS) graphical user interface appearing on mobile computing device of FIG. 1 ;
[0022] FIG. 8 illustrates a temperature control submenu graphical user interface that appears on the mobile computing device of FIG, 1;
[0023] FIG. 9 illustrates a fan control submenu graphical user interface that appears on the mobile computing device of FIG . 1 ;
[0024] FIG. 10 illustrates a lighting control submenu graphical user interface that appears on the mobile computing device of FIG. 1;
[0025] FIG. 11a illustrates a flowr diagram of the process for the BSIS mobile application approach in accordance with an example implementation;
[0026] FIG . 1 l b continues to illustrate the flow diagram of the process for the
BSIS mobile application approach in accordance with an example implementation;
[0027] FIG. 12 showrs an exemplary application of the mobile computing device with BSIS mobile application displaying a Quick Response (QR) code that is read by the environmental access panel;
[0028] FIG. 13 depicts a diagram of security layers of a machine readable code (QR Code) in accordance with an example implementation of the invention.
[0029] FIG. 14 depicts the data layer of FIG. 13 having data in accordance with and example implementation of the invention; [0030] FIG. 15 shows a diagram that depicts the digital signing of the data of
FIG. 14 in accordance with an example implementation of the invention;
[0031] FIG. 16 depicts a diagram of the encryption of the data of FIG. 14 and digital signature of FIG. 15 in accordance with and example implementation of the invention;
[0032] FIG. 17 depicts a diagram of encoding the encrypted data of FIG. 16 into a machine readable code is depicted in accordance with an example implementation of the invention;
[0033] FIG. 18 depicts a message flow of decoding the machine readable code
(secure QR code) in accordance with an example implementation;
[0034] FIG. 19 depicts a flow diagram of an approach for the generation of a secure machine readable code in accordance with an example implementation of the invention; and
[0035] FIG. 20 depicts a flo diagram 2000 of an approach for the decoding of a secure machine readable code in accordance with an example implementation of the invention.
DESCRIPTION
[0036] An example approach for modification of environmental settings is presented. In the example, a user may modify the environmental settings of a building automation system via generation of a machine readable code that is read by a reader device located in an environmental control access panel.
[0037] With reference to FIG. 1 , an exemplar}' topology diagram for a building automation system approach is shown. The building wide area network 55 includes a plurality of systems and components in wired or wireless communication. The buildmg wide area network 55 generally includes a plurality of building automation systems 100 and may be accessed via a "building synergistic interface system" or "BSIS". The BSIS 200 may be changed by one or more mobile computing devices 300 that are able to generate a graphical display readable by the BSIS 200 that may be part of an environmental control access panel 250. The BSIS 200 further may include access to a data storage device comprising a building information database 210 and a user database 220. Software for communicating environmental and other data to the BSIS 200 may be stored on both the mobile computing device 300 and/or the building automation system 100. As will be explained herein, the BSIS 200 enables one or more of the environmental settings in a building automation system to be adjusted based on human actions without a network connection between the mobile computing device 300 and the BSIS 200.
[0038] In the following pages, the general arrangement of an exemplary building automation system 100 configured for use with the BSIS 200 is explained first. Thereafter, the general arrangement of the environmental control access panel 250 is explained followed by the general arrangement of the mobile computing device 300. Overall operation of the BSIS 200 is discussed following the description of the building automation system (BAS), environmental access control panel 250, and the mobile computing device 300.
[0039] Building Automation System
[0040] In the example embodiment of FIG. 1 , the building automation system
100 includes a building information database 210, user database 220, closed circuit television system 130, a security system 140, a fire alarm system 1 50, and an environmental control system 160. In Fig. 2, a system block diagram of an exemplary building automation system (BAS) 100 within a building 99 is depicted. The building automation system 100 is depicted as a distributed building system that provides control functions for any one of a plurality of building operations, such as environmental control, security, Hie or fire safety, industrial control and/or the like. An example of a BAS is the Apogee® building automation system available from Siemens Industry, Inc., Building Technologies Division, of Buffalo Grove, IL. The Apogee® building automation system allows the setting and/or changing of various controls of the system, generally as provided below. While a brief description of an exemplary BAS is provided in the paragraphs below, it should be appreciated that the building automation system 100 described herein is only an exemplar}' form or configuration for a building automation system.
[0041] With particular reference to FIG. 2, the building automation system
100 includes at least one supervisory control system or workstation 102, client workstations 103a-103e, report server 104, a plurality of field panels represented by field panels 106a and 106b, and a plurality of controllers represented by controllers 108a-! Q8e. It will be appreciated, however, that wide varieties of BAS architectures may be employed.
[0042] Each of the controllers 108a-108e represents one of plurality of localized, standard building control subsystems, such as space temperature control subsystems, lighting control subsystems, or the like. Suitable controllers for building control subsystems include, for example, the model TEC (Terminal Equipment Controller) available from Siemens Industry, Inc., Building Technologies Division, of Buffalo Grove, IL. To carry out control of its associated subsystem, each controller 108a-10Se connects to one or more field devices, such as sensors or actuators, shown by way of example in FIG. 2 as the sensor 109a is connected to the controller 108a and the actuator 109b is connected to controller 108b.
[0043] Typically, a controller such as the controller 108a affects control of a subsystem based on sensed conditions and desired set point conditions. The controller controls the operation of one or more field devices to attempt to bring the sensed condition to the desired set point condition. By way of example, consider a temperature control subsystem that is controlled by the controller 108a, where the actuator 109b is connected to an air conditioning damper and the sensor 109a is a room temperature sensor. If the sensed temperature as provided by the sensor 109a is not equal to a desired temperature set point, then the controller 108a may further open or close the air conditioning damper via actuator 109b to attempt to bring the temperature closer to the desired set point. It is noted that in the BAS 100, sensor, actuator and set point information may be shared between controllers 108a-108e, the field panels 106a and 106b, the work station 102 and any other elements on or connected to the BAS 100.
[0044] To facilitate the sharing of such information, groups of subsystems such as those connected to controllers 108a and 108b are typically organized into floor level networks or field level networks ("FLNs") and generally interface to the field panel 106a. The FLN data network 1 10a is a low-level data network that may suitably employ any suitable proprietary or open protocol. Subsystems 108c, 108d and 108e along with the field panel 106b are similarly connected via another low- level FLN data network 110b. Again, it should be appreciated that wide varieties of FLN architectures may be employed.
[0045] The field panels 106a and 106b are also connected via building level network ("BLN") 112 to the workstation 102 and the report server 104. The field panels 106a and 106b thereby coordinate the communication of data and control signals between the subsystems 108a-108e and the supervisory computer 102 and report server 104. in addition, one or more of the field panels 106a, 106b may themselves be in direct communication with and control field devices, such as ventilation damper controllers or the like. To this end, as shown in FIG, 2, the field panel 106a is operably connected to one or more field devices, shown for example as a sensor 109c and an actuator 109d.
[0046] The workstation (server in other implementations) 102 provides overall control and monitoring of the building automation system 100 and includes a user interface. The workstation 102 further operates as a BAS data server that exchanges data with various elements of the BAS 100. The BAS data server can also exchange data with the report server 104. The BAS data server 102 allows access to the BAS system data by various applications. Such applications may be executed on the workstation 102 or other supervisor}' computers (not shown).
[0047] With continued reference to FIG. 2, the workstation 102 is operative to accept modifications, changes, alterations and/or the like from the user. This is typically accomplished via a user interface of the workstation 102, The user interface may include a keyboard, touchscreen, mouse, or other interface components. The workstation 102 is operable to, among other things, affect or change operational data of the field panels 106a, 106b as well as other components of the BAS 100. The field panels 106a and 106b utilize the data and/or instructions from the workstation 102 to provide control of their respective controllers.
[0048] The workstation 102 is also operative to poll or query the field panels
106a and 106b for gathering data, The workstation 102 processes the data received from the field panels 106a and 106b, including trending data. Information and/or data is thus gathered from the field panels 106a and 106b in connection with the polling, query or otherwise, which the workstation 102 stores, logs and/or processes for various uses. To this end, the field panels 106a and 106b are operative to accept modifications, changes, alterations and/or the like from the user.
[0049] The workstation 102 also preferably maintains a database associated with each field panel 106a and 106b. The database maintains operational and configuration data for the associated field panel. The report server 104 stores historical data, trending data, error data, system configuration data, graphical data and other I3AS system information as appropriate. In at least one embodiment, the building information database 210 and the user database 220 may be accessed by the BSIS 200 via the BAS data server 102. In other embodiments the building information database 210 and the user database 220 may be stored elsewhere, such as field panel 106b.
[0050] The management level network (MLN) 113 may connect to other supervisory computers and/or servers, internet gateways, or other network gateways to other external devices, as well as to additional network managers (which in turn connect to more subsystems via additional low level data networks). The workstation
102 may operate as a supervisory computer that uses the MLN 1 13 to communicate
BAS data to and from other elements on the MLN 113. The MLN 113 may suitably comprise an Ethernet or similar wired network and may employ TCP/IP, BACnet, and/or other protocols that support high speed data communications.
[0051] FIG. 2 also shows that the IMS 100 may include a field panel 106b that is shown in FIG. 2 as a housing that holds the building information database 210, the user database 220, and the environmental access panel 250 having BSIS 200. The mobile computing device 300 is configured for wireless communications with the
BAS 100 via the environmental access panel 250 provided on the field panel 106b.
While the foregoing BSiS members are shown in FIG. 2 as being associated with one of the field panels 106b, it will be recognized that in other embodiments these and other BSIS members may be differently positioned in or connected to the BAS 100. For example, the building information database 210 and the user database 220 of the BSIS could be provided on the workstation 102. Alternatively, the building information database 210 and the user database 220 could be housed separately from those components shown in FIG. 2, such as in a separate computer device that is coupled to the building level network 1 12 or other BAS location. Such a separate computer device could also be used to store BSIS operational software. Similarly, the environmental access panel 250 with 13SIS 200 may be housed within the workstation 102 or within a separate computer device coupled to the building level network 112 of the BAS.
[0052] With reference now to FIG. 3, a block diagram of an exemplary embodiment of the field panel 106b of FIG. 2 is shown. It should be appreciated that the embodiment of the field panel 106b is only an exemplary embodiment of a field panel in a BAS 100 coupled to the BSIS 200. As such, the exemplary embodiment of the field panel 106b of FIG. 3 is a generic representation of all manners or configurations of field panels that are operative in the manner set forth herein.
[0053] The field panel 106b of FIG. 3 includes a housing, cabinet or the like
114 that is configured in a typical manner for a building automation system field panel. The field panel 106b includes processing circuitry/logic 122, memory 124, a power module 126, a user interface 128, an I/O module 134, a BAS network communications module 136, and the WiFi server 130.
[0054] The processing circuitry/logic 122 is operative, configured and/or adapted to operate the field panel 106b including the features, functionality, characteristics and/or the like as described herein. To this end, the processing circuitry logic 122 is operably connected to all of the elements of the field panel 106a described below. The processing circuitry/logic 122 is typically under the control of program instructions or programming software or firmware contained in the instructions 142 area of memory 124, explained in further detail below . In addition to storing the instructions 142, the memory also stores data 152 for use by the BAS 100 and/or the BSIS 200.
[0055] The field panel 106b also includes a power module 126 that is operative, adapted and/or configured to supply appropriate electricity to the field panel 106b (i.e., the various components of the field panel). The power module 126 may operate on standard 120 volt AC electricity, but may alternatively operate on other AC voltages or include DC power supplied by a battery or batteries. [0056] An input/output (I/O) module 134 is also provided in the field panel
106b. The I/O module 134 includes one or more input/output circuits that communicate directly with terminal control system devices such as actuators and sensors. Thus, for example, the I/O module 134 includes analog input circuitry for receiving analog sensor signals from the sensor 109a, and includes analog output circuitry for providing analog actuator signals to the actuator 109b. The I/O module 134 typically includes several of such input and output circuits.
[0057] The field panel 106b further includes a BAS network communication module 136. The network communication module 136 allows for communication to the controllers 108c and 108e as well as other components on the FLN 1 10b, and furthermore allows for communication with the workstation 102, other field panels (e.g., field panel 106a) and other components on the BLN 112. To this end, the BAS network communication module 136 includes a first port, (which may suitably be a RS-485 standard port circuit) that is connected to the FLN 1 10b, and a second port (which may also be an RS-485 standard port circuit) that is connected to the BLN 1 12.
[0058] The field panel 106b may be accessed locally. To facilitate local access, the field panel 106b includes an interactive user interface 128. Using user interface 128, the user may control the collection of data from devices such as sensor 109a and actuator 109b. The user interface 128 of the field panel 106b includes devices that display data and receive input data. Reception of input data may include a code reader device, such as a Quick Response (QR) code reader. These devices may be devices that are permanently affixed to the field panel 106b or portable and moveable. The user interface 128 may also suitably include an LCD type screen or the like, and a keypad. The user interface 128 is operative, configured and/or adapted to both alter and show information regarding the field panel 106b, such as status information, and/or other data pertaining to the operation, function and/or modifications or changes to the field panel 106b.
[0059] As mentioned above, the memory 124 includes various programs that may be executed by the processing circuitry/logic 122. In particular, the memory 124 of FIG. 3 includes a BAS application 144 and a BSIS building application 146. The
BAS application 144 includes conventional applications configured to control the field panel 106b of the BAS 100 in order to control and monitor various field devices
109a-n of the BAS 100. Accordingly, execution of the 13AS application 144 by the
! z processing circuitry/logic 122 results in control signals being sent to the field devices 109a~n via the I/O module 134 of the field panel 106b, Execution of the BAS application 144 also results in the processor 122 receiving status signals and other data signals from various field devices 109a-n, and storage of associated data in the memory 124. In one embodiment, the BAS application 144 may be provided by the Apogee© Insight® BAS control software commercially available from Siemens Industry, Inc. or another BAS control software.
[0060] In addition to the instructions 142, the memory 124 may also includes data 1 52, The data 152 includes records 154, graphical views 156, a room database 158, a user database 162, and an equipment database 164. The records 154 include current and historical data stored by the field panel 106b in association with control and operation of the field devices 109a-n. For example, the records 154 may include current and historical temperature information in a particular room of the building 99, as provided by a thermistor or other temperature sensor within the room. The records 154 in the memory may also includes various set points and control data for the field devices 109, which may be pre-installed in memory 124 or provided by the user through the user interface 128, The records 154 may also include other information related to the control and operation of the 100 B AS and BSIS building application 146, including statistical, logging, licensing, and historical information.
[0061] The graphical views 156 provide various screen arrangements to be displayed to the user via the user interface 128. Examples of such screens for display on the mobile computing device 300 are provided in FIGs. 8, 9 and 1 1 , discussed in further detail below. The user interface 128 may be displayed at thermostats with displays or other user access points having displays, such as liquid crystal displays, light emitting diode displays, or other kno wn types of visual displays devices.
[0062] The room database 158 may include data related to the layout of the building 99. This room database 158 includes a unique identifier for each room or area within the building (e.g., room " 12345"). In addition to the unique identifier data, the room database 158 may include other information about particular rooms or areas within the building 99. For example, the room database 158 may include information about field devices located within the room or area, particular equipment (e.g., research equipment, manufacturing equipment, or HVAC equipment) positioned within the room or area. [0063] The user database 162 may include data related to human users who frequent the building 99, Accordingly, the user database 162 may include a unique identifier for each human user (e.g., user "12345") and a user profile associated with that user. In other implementations, each room or area may have a profile that has one or more users associated with it. The user profile may include information provided by the user or provided by third parties about the user. For example, the user profile may include a preferred temperature or lighting level for the user, which is provided to the user database 162 by the user. Also, the user profile may include a security clearance level, room access, or data access for the user, all provided to the database 162 by a third party, such as the human resources department or security department for the employer who owns the building 99.
[0064J The equipment database 164 may include data related to various pieces of equipment within the building 99. The equipment may include field devices associated with the BAS 100 or other equipment that is positioned within the building 99. For example, the equipment database 164 may include information related to manufacturing or research equipment located in a particular room of the building. The equipment database 164 maintains a unique identifier for each piece of equipment (e.g., equipment "12345") and data associated with that equipment. For example, the database 164 may associate particular schematics, operation manuals, photographs, or similar data with a given piece of equipment within the database 164.
[0065J While the field panel 106b has been explained in the foregoing embodiment as housing the BSIS building application 146 and various BSIS databases, such as the room database 158, user database 162, and equipment database 164, it will be recognized that these components may be retained in other locations in association with the 13 AS 100. For example, these components could all be retained within the central workstation 102 of the BAS 100 or a separately designated BSIS computing device in the BAS 100.
[0066] Turning to FIG. 4, an exemplary process flow diagram 400 of modification of a building automation system using parameters encoded by a mobile device and read by the building automation system independent of the network is depicted. A. user interacts with a mobile device, such as mobile device 300, and sets up various environmental parameters associated with the building automation system via a mobile application 404. The mobile application then uses the various preferences and user information contained in the mobile device to encode the data into machine-readable code that is transmittable independent of the network 404. The data that is encoded may also include information associated with the building automation system, such as fan identifies or blind identifies. The term "transmittable independent of a network" means that the data is transferred without having to physically insert a memory device into the system to be read. Examples of independent transmission include a reader that reads codes, such as bar codes or QR codes, RF1 D tags, MOS codes, flashing lights, and magnetic card readers. The various preferences and other data may then be generated into a machine-readable (machine-perceivable) code that is displayed on the mobile device 406. The displayed code may be read off the mobile device or a printed code by the building automation system independent of network connections 408. The building automation system decodes the various parameters from the code via a processor 410. The various parameters are then sent to the systems, such as environment systems that make up the building automation system 412 in the current example.
[0067] Environment Access Control Panel
[0068] With reference now to FIG. 5, an exemplary environmental access control panel device 250 is shown. The system environmental access control panel device 250 may be one of a number of different environmental access control panel devices that are mounted in various locations in the building 99. The environmental access control panel device 250 may be configured to present information to a human user, and in some embodiments, may be configured to receive information from the human user. Accordingly, the environmental access control panel device 250 includes a display screen 255, such as a LED, LCD or plasma screen capable of displaying visual data to a human user.
[0069] The primary function of the environmental access control panel device
250 is to have a reader that is able to read encoded symbols or characters (user preferences in a coded QR format). In the current example, the reader may be a QR code reader 260. The environmental access control panel device 250 may also have one or more displays for providing information to users. Examples of such information include location 262, temperature 264, and/or energy consumption 266. In the example of FIG. 4, a QR code 265 pattern that is indicative of environmental settings is presented to the reader 260. The reader may read the QR code 265 from paper, wireless device, or other materials that support the reading of the QR code 265. It is understood that the reader for QR codes in the current example, may be a reader for bar codes, text codes, or other machine readable codes in other implementations. It is noted that the reading of the encoded environmental data occurs without a user having to have access to the data network or the building automation network.
[0070] The environmental access control panel device 250 with BSIS 200 capable of reading the QR code 265 may be mounted to the building 99 at a location that is within or in close proximity to a room or group of rooms for convenience of the users. In other implementations, a central location may be provided for the environmental access control panel device 250, such as mounted on a wail in the main lobby of the building 99, next to the doorway or other threshold of a testing lab in the building 99. It is understood that the environmental access control panel device 250 is not required to be associated with any specific area of the building 99. The association of the area within building 99 to a QR code is encoded within the QR code 265.
[0071] The environmental access control panel device 250 may be coupled to the BLN 1 12 or a FLN 1 10b of the BAS 100. Accordingly , the environmental access control device 250 may be configured to transmit and receive information from the BAS 100. Received information from the B AS 100 may be displayed on the display screen 255, This information may include the building information indicia 262, 264, and 266 as well as other information that may be beneficial to a human user, such as building information, weather information, current news, time of day, or other information. As noted above, the display screen 255 of the environmental access control panel device 250 of FIG. 5 is a dynamic display that is capable of changing over time.
[0072] In addition to a display screen 255, the system enrollment/display device may include additional components that allow the human to interface with the
13 AS 100. For example, in at least one embodiment, the display screen 255 is a touch screen that allows a user to input data via the display screen 255. The environmental access control panel device 250 may also include additional components, such as speakers, microphones, cameras, various data communications ports, and other interface components, including those that are commonly found on televisions and computer monitors. These additional interface components may be used to provide the human user with helpful features, such as providing audio instructions for the
BSIS 200 to a human user. These additional interface components may also be used by security to provide surveillance cameras and intercoms at various locations within the building. Additionally, the interface components may be used by maintenance when operational issues arise with the environmental access control panel device 250.
[0073J While the environmental access control panel device 250 has been explained above as displaying dynamic data and having multiple electronic features, in other embodiments the environmental access control panel device 250 may be configured to display only static data and be free of electronic components. In such an arrangement, the environmental access control panel device 250 may be a printed sign posted outside of a room or a doorway that identifies the room and displays the building information. When a plurality of environmental access control panel devices are present in a building 99, a combination of static and dynamic devices may be used, including printed signs (with readers) as described in this paragraph in combination with devices with screens and various electronic components, as described above in association with FIG. 5.
[0074] Mobile Computing Device
[0075] In addition to the system environmental access control panel device
250, the BSIS may also include a mobile computing device 300, FIG. 1 . The mobile computing device 300 may be provided by any mobile device capable of being carried by a human, and generating a code (QR code 260 in the current example). With reference now to FIG. 6, an internal block diagram of an exemplary mobile computing device 300 is shown. The mobile computing device 300 includes a scanner/camera module 350 that may be configured to read the building information QR codes 260 and a user interface 340 that includes a display screen. Exemplary mobile computing devices include personal digital assistants, smart phones, and handheld personal computers (e.g., Droid®, iOS iPhone®, iPod®, iPod Touch ®, iPad®, etc.).
[0076J The mobile computing device 300 of FIG. 6 includes a housing, case or the like 308 that is configured in a typical manner for a mobile computing device. The mobile computing device 300 includes processing circuitry/logic 310, a memory 320, a power module 330, a user interface 340, and a camera/scanner module 350, all positioned within the housing 308. It will be appreciated by one having ordinary skill in the art that the embodiment of the mobile computing device 300 is only an exemplary embodiment of a mobile computing device configured for communication with the BAS 100 over a wireless network and may include other components not shown to avoid obscuring aspects of the present invention.
[0077] The processing circuitry/logic 310 is operative, configured and/or adapted to operate the mobile computing device 300 including the features, functionality, characteristics and/or the like as described herein. To this end, the processing circuitry /'logic 310 is coupled to all of the elements of the mobile computing device 300 described below. The processing circuitry/logic 310 is typically under the control of program instructions or programming software or firmware 322 contained in memory 320, explained in further detail below. In addition to storing the instructions 322, the memory also stores data 324 for use by the BAS 100 and/or the BSIS 200.
[0078] The mobile computing device 300 also includes a power module 330 that is operative, adapted and/or configured to supply appropriate electricity to the mobile computing device 300 (i.e., the various components of the mobile computing device). The power module 330 is generally DC power supplied by a battery or batteries.
[0079J The mobile computing device 300 further includes a user interface
340. The user interface 340 allows the mobile computing device 300 to present information to the user, and also allows the user to insert data into the mobile computing device 300. Accordingly, the user interface 340 may be configured to drive a touchscreen, keypad, buttons, speaker, microphone, or any of various other standard user interface devices,
[0080] A camera/scanner module 350 may also be provided in the mobile computing device 300. The camera/scanner module 350 may be configured by software or an application to read the QR codes 265 that have previously been generated and associated with the BAS 100. Thus, for example, the camera/scanner module 350 may include a camera configured to focus on a QR CODE, such as QR code 265 and produce an electronic data file of the image (e.g., a JPEG file).
[0081] The electronic data file generated by the camera/scanner module 350 may be stored in memory 320. The processing circuitry/logic 310 is configured to process the electronic data file generated by the camera/scanner module 350 into indicia data that is used by one or more applications. For example, the processing circuitry/logic 310 may be configured to generate a QR code number or other unique identifier associated with the building information indicia captured by the mobile computing device 300 and user entered data,
[0082J The memory 320 includes various programs that may be executed by the processing circuitry/logic 310 (which may include a processor). In particular, the memory 320 in the mobile communications device 300 of FIG. 6 includes a BSIS mobile application 322. The BSIS mobile application 322 is configured to facilitate advanced interactions between a human user in possession of the mobile communications device and the building automation system 100. To this end, the BSIS mobile application 322 is configured to generate a machine readable code (QR code in the current example) with at least environmental settings for use by the BSIS 200, An example of pseudo code that may be used to generate a QR code is presented:
/*
Point XX XXXXXXXX XXXXXXXX XX XX ·
Λ A Λ Λ Λ
Object I I I I I
Type# ! I I I
Instance j j j
Number j | j
IPAddress j |
Mac I
Network
0200000032C28AD827XXXXXXXXXX- [Temperature Monitor]
020Q000032C28AD827XXXXXXXXXX- [Temperature SetPoint]
0200000032C28AD827XXXXXXXXXX- [Humidity Monitor]
0200000032C28AD827XXXXXXXXXX- [Humidity Setpoint]
0200000032C28AD827XXXXXXXXXX- [AirQuality Monitor] (6) 0200000032C28AD827XXXXXXXXXX [AirQuality Setpoint]
(7) 0200000032C28AD827XXXXXXXXXX- [Fan Monitor]
(8) 0200000032C28AD827XXXXXXXXXX- [Fan Setpoint]
(9) 0200000032C28AD827XXXXXXXXXX- [Light Monitor]
(10) 0200000032C28AD827XXXXXXXXXX- [Light Setpoint]
(11) 0200000032C28AD827XXXXXXXXXX- [Blind Monitor]
(12) 0200000032C28AD827XXXXXXXXXX- [Blind SetPoint]
(13) 0200000032C28AD827XXXXXXXXXX- [OccMode Point]
(14) 0200000032C28AD827XXXXXXXXXX- [Green Leaf Point]
(15) 0200000032C28AD827XXXXXXXXXX- [Emergency Point]
(1) 00750 [Preset #1 Temperature]
(2) XXXXX [Preset #1 Humidity]
(3) XXXXX [Preset #1 AirQuality]
(4) XXXXX [Preset #1 Fan]
(5) XXXXX [Preset #1 Light]
(6) XXXXX [Preset #1 Blind]
(7) XXXXX- [Preset #1 OccMode]
NSMutableString * tempMString = [NSMutableString string WithCapacity:0]; [tempMString appendString:@,,0200000051C28AD827XXXXXXXXXXXXXX
//' Temperature
[tempMString appendString:@"0200000056C28AD827XXXXXXXXXXXXXX'
//' Temperature STPT
[tempMString appendString:@"0200000057C28AD827XXXXXXXXXXXXXX'
//' Humidity
[tempMString appendString:@"0200000058C28AD827XXXXXXXXXXXXXX /./ HumiditySTPT
[tempMString appendString:@"0200000061 C28AD827XXXXXXXXXXXXXX- //' AirQuality
[tempMString appendString:@"0200000062C28AD827XXXXXXXXXXXXXX- // AirQualitySTPT
[tempMString appendString:@' 20000005DC28AD827XXXXXXXXXXXXXX-
//' Fan [tempMStrmg appendString:@"020000005EC28AD827XXXXXXXXXXXXXX-~"];
//' FanSTPT
[tempMString appendStmg:@'O200000059C28AD827XXXXXXXXXXXXXX~"];
// Light
[tempMString appendString:@' 20000005AC28AD827XXXXXXXXXXXXXX~"]; /./ LiehtSTPT
[tempMString appendString:@"020000005BC28AD827XXXXXXXXXXXXXX~"];
// Blind
[tempMStrmg appendString:@,O20000005CC28AD827XXXXXXXXXXXXXX~"j; /./ BlindSTPT
[tempMString appendString:@' 50000001 DC28 AD827XXXXXXXXXXXXXX-"] ;
//' OccMode
[tempMStrmg appendString:@"0200000060C28AD827XXXXXXXXXXXXXX^"];
// GreenLeaf
[tempMString
appendString:@"050000001EC28AD827XXXXXXXXXXXXXX~"];// Emergency
[tempMString appendString:@"00700"]; // Preset 1 Temperature
[tempMString appendString:@"00500"]; // Preset! Humidity
[tempMString appendString:@"20000"]; // Preset 1 AirQuaiity
[tempMString appendString:@"00000"j; // Preset! Fan
[tempMString appendString:@"00000"]; // Preset 1 Light
[tempMString appendString:@"00000"]; // Preset! Blind
[tempMString appendString:@"00000"]; // Preset 1 OccMode
[tempMString appendString:@''~"]; // Preset 1 ClosingMark
[tempMString appendString:@"00745"]; // Preset2Temperature
[tempMString appendString:@"00450"]; // Preset2Humidity
[tempMString appendString:@"08000"]; // Pre set2 AirQuaiity
[tempMString appendString:@"00600"]; // Preset2Fan
[tempMString appendString:@"00300"J; // Preset2Light
[tempMString appendString:@"08000"]; // Preset2Blind
[tempMString appendString:@"0001 ()"]; // Preset20ccMode
[tempMString appendString:@"~"]; // Preset2ClosingMark
[tempMString appendString:@"00780"]; //' Preset3Temperature
[tempMString appendString:@"00600"J; // PresetSHumidity [tempMString appendString:@" 10000"]; // Presets AirQuaiity
[tempMString appendString:@"00400"]; // Preset3Fan
[tempMString appendString:@"00500"]; // PresetSLight
[tempMString appendString:@"01000"]; //' PresetSBlind
[tempMString appendStritig:@"00010"]; // Preset3()ccMode
[tempMString appendStting:@"~"]; //' PresetSCiosingMark
[tempMString appendString:@"0()720"]; // Preset4Temperature
[tempMString appendString:@"00300"]; // Preset4Hurnidity
[tempMString appendString:@"08000"]; // Preset4AirQuality
[tempMString appendString:@"00500"]; // Preset4Fan
[iempMString appendString:@"00500"]; // Preset4Light
[tempMString appendString:@"00500"]; // Preset4Blind
[tempMString appendString:@"00010"]; // Preset4GccMode
[tempM String appendStritig:@"~"]; // Preset4CIosingMark
[tempMString appendStriiig:@"00725"]; //' PresetSTemperature
[tempMString appendString:@"00450"]; // Presets Humidity
[tempMString appendString:@"08000"]; // Presets AirQuaiity
[tempMString appendString:@"00800"]; // PresetSFan
[tempMString appendString:@"00100"]; // PresetSLight
[tempMString appeiidString:@"00000"]; // PresetSBlind
[tempMString appendString:@"00010"]; // Presets OccM ode
// self.qrCodeString ~ [NSString stringWithString:tenipMString];
The BSiS mobile application 322 may be further configured to encode additional data, such as user identification data unique to the computing device that generated the QR code to the BAS 100. Operation of the BSIS mobile application 322 will be explained in further detail below.
[0083] In addition to the instructions 322, the memory 320 of the mobile computing device 300 also includes data. The data may include records 324 of current and historical data related to operation of the mobile computing device 300. For example, the records 324 may include user identification information that identifies the mobile computing device 300. The records 324 may also include current and historical QR codes generated by the mobile computing device 300. [0084] BSIS Mobile Application Operation
[0085] With reference now to FIG. 7, a diagram of a graphical user interface
702 of the BSIS mobile application 700 that is generated by the execution of an application by the mobile device 300. The graphical user interface 702 may present a user with a plurality of environmental options 704, 706, 708, 710, 712 and QR code generator 714. In other implementations, additional or fewer options may be presented to a user. In yet other implementations, additional information may be provided for inclusion in the code (QR code in the current example) in addition to environmental options, such as clock-in, clock-out, securit system activation, security system deactivation, location verification.
[0086] If environmental option 704, for changing the temperature, is selected in the graphical user interface 702, a temperature graphical user interface 800, FIG. 8 is presented to the user. The desired temperature may be presented in numerical form 802. A graphical input may also be presented 804. The graphical input 804 is a slide bar in the shape of a thermometer. As the slide bar is moved, the desired temperature in numerical form 802 may also change in the current example. An additional conservation icon 806 may also be present. When the temperature is at an environmentally friendly level (60-68 degrees), the conservation icon 806 may appear green in color. As the temperature is raised, the green color of the conservation icon 806 gradually changes to red, The bottom of the graphical user interface 800 may provide a plurality of buttons 808 that correspond to the selections in the graphical user interface 702 display. The graphical user interface 800 may also have a temperature button 812 in the plurality of buttons 808 that visually indicates that it is the current selection. In the present example, the temperature button 812 is highlighted.
[0087J If f¾n control 710 or 810 is selected, a user is presented with a fan graphical user interface 900, FIG. 9. The desired speed of the fan is presented as a numerical value 902. A user is also presented with a virtual knob in the shape of a fan 904 that may be rotated in one direction to increase fan speed and in the other to reduce fan speed. The corresponding fan speed may be changed and displayed as a numerical value 902. The fa graphical user interface 900 may also have a conservation icon 906 that functions in a similar manner as 806, but with respect to fan speed. The graphical user interface 900 may also have a fan button 912 in the plurality of buttons 908 that visually indicates that it is the current selection. In the present example, the fan button 912 is highlighted.
[0088J If light control, such as 708 or 910, is selected, a user is presented with a light setting graphical user interface 1000, FIG. 10. The desired light setting is presented as a numerical value 1002. A user is also presented with an image of light bulb 1004 that a user moves a finger up or down on to change the light setting. The corresponding light setting may be changed and the updated value displayed as a numerical value 1002. The light setting graphical user interface 1000 may also have a conservation icon 1006 that functions in a similar manner as 806 and 906, but with respect to lighting. The graphical user interface 1000 may also have a fan button 1012 in the plurality of buttons 1008 that visually indicates that it is the current selection. In the present example, the light setting button 1012 is highlighted.
[0089J The humidity button 706 of FIG. 7 and blinds button 712 may operate in similar manners as the graphical user interfaces for temperature 800, fan speed 900, and light 1000.
[0090] BSIS Mobile App Process Flow
[0091] Referring now to FIGs. 1 1a and l ib, an exemplary flow diagram 1 100 of the BSIS mobile application 700 performed by the mobile device 300 is shown. The process begins with step 1 102, where the user activates BSIS mobile application 702 that has been previously downloaded or otherwise installed on mobile device 300. In step 1 104, the top level of the graphical user interface 702 of the BSIS mobile application 700 is displayed. The user is then able to select a environmental control submenu (704-714) from the top level of the graphical user interface 702 in step 1 106. If no selection is made, the top level graphical user interface 702 continues to be displayed unti l it is exited in step 1 1 10. If the application is exited in 11 10, then it is closed and no longer displayed in step 1 1 12.
[0092] If an environmental control submenu is selected in step 1 106, then a check occurs in step 1 1 14 for selection of the temperature graphical user interface 704, If the temperature graphical user interface has been selected in step 1 1 14, the temperature graphical user interface submenu 800 is generated and displayed on mobile device 300 in step 1 1 16. The user may then modify the temperature in step 1 1 18. The user then may use the plurality of buttons 808 to select a different submenu or the mobile device's exit button to close the application. [0093] If the humidity graphical user interface is selected in step 1 106, then in step 1120 the humidity graphical user interface submenu is generated and displayed on mobile device 300 in step 1 122. The user may then modify the humidity in step 1124. The user then may use the plurality of buttons 808 to select a different submenu or the mobile device's exit button to close the application.
[0094] If the light graphical user interface is selected in step 1106, then in step
1 128 the light graphical user interface submenu 1000 is generated and displayed on mobile device 300 in step 1130. The user may then modify the light brightness in step 1 132. The user then may use the plurality of buttons 1008 to select a different submenu or the mobile device's exit button to close the application.
[0095] If the fan graphical user interface is selected in step 1 106, then in step
1 134 the fan graphical user interface submenu 900 is generated and displayed on mobile device 300 in step 1136. The user may then modify the fan speed in step 1 138. The user then may use the plurality of buttons 1008 to select a different submenu or the mobile device's exit button to close the application.
[0096] If the blinds graphical user interface is selected in step 1 106, then in step 1140 the blinds graphical user interface submenu is generated and displayed on mobile device 300 in step 1 142. The user may then change the blinds setting in step 1144. The user then may use the plurality of button to select a different submenu or the mobile device's exit button to close the application.
[0097] If the generate code graphical user interface is selected in step 1106, then in step 1148 the user is presented with a submenu graphical interface where he may confirm that the code (QR code in the current example) should be generated and generates the QR code in step 1150. The generated QR code may then be displayed in step 1 152. The displayed QR code is displayed in step 1 152, such that it may be read by a code reader that is in communication with the BAS 100. The user may also be given the option to save the QR code in step 1154. The QR code may be saved as a graphic or picture in the current implementation in step 1 156. In other implementations, if text codes are employed, the text may be sa ved. When the user is finished generating the QR code, he or she may, in step 1158, exit the application or return to the top level BISI mobile application graphical user interface.
[0098] Exemplary BSIS Scenario
[0099] With reference now to FIG. 12, exemplary interactions between the
BSIS mobile application 322 and the BAS 100 are illustrated when a user scans a QR code with a mobile computing device 300. In this illustration, the user begins by using the mobile computing device 300 as described herein to set the desired environment using the BSIS mobile application graphical user interface 340. The user then generates a code (QR code in the current example) that is displayed upon the mobile computing device 300. The mobile computing device 300 is held up to BSIS 200 of the environmental access control panel 250. The BSIS 200 may be located in conference room "A." Then the QR code is read by the BSIS 200 in conference room "A", the BAS sets the environmental controls for conference room "A" to the settings encoded in the QR code. It is noted tha there is no network connection between the mobile computing device and the BAS. The data is only passed via the BAS reading the QR code.
[00100] The BSIS mobile application may provide checks to verify that acceptable ranges for the environmental controls are being used, such as preventing the temperature from being set too low or too high. In other implementations, the checks may occur within the BAS.
[00101] In the current example, the reader's location was identified because the
BAS knew where it was located. In other implementations, a user may use the BSIS graphical user interface and may set the location to be adjusted. The location to be adjusted may be entered as text in some implementations, or in other implementations, it may be set via pull down menus that have been preloaded.
[00102] The multiple codes may be individually saved in memory and recalled as needed. For example, a code for an office may be stored as "office," a code for conference room "A" may be stored as "Conf A," and so on. The code may also be printed out and affixed to a back of a badge, enabling the user to use the QR code without a mobile computing device.
[00103] Secure Machine Readable Code
[00104] As user data may be encoded in a machine readable code, such as a QR code, the encoded data may just as easily be decoded and accessed. In order to prevent such decoding, multiple layers of security may be added to the QR code.
Turning to FIG. 13, a diagram 1300 of security layers of a machine readable code
(QR Code) is depicted in accordance with an example implementation of the invention. The lowest layer is the data layer 1302 that is to be encoded into the machine readable code. The data may be presented as text or numerical data in the current example. The data layer 1 302 may be digitally signed in a digital signature layer 1304. The digital signature assures the data has not been changed or modified. The data layer 1302and digital signature layer 1304 may also be encrypted via the encrypted data layer 1306. The resulting encrypted signed data may then be used to generate a machine readable code, i.e. QR code layer 1308.
[00105] Turning to FIG. 14, an example of the data layer 31 02 of FIG. 13 having data 1400 is depicted in accordance with and example implementation of the invention. Text data such as a users name 1402, user identification 1404, personal identification number (PIN) 1406, biometric data 1408, or other data 1410 may be placed in the data layer 1302. In some implementations, a temple may be used to create the data layer. In other implementations a combination of text and other data may be used (such as color or graphical data) may make up the data layer 1302.
[00106] In FIG. 15, a diagram 1500 that depicts the digital signing of the data
1400 of FIG. 14 is shown in accordance with an example implementation of the invention. A digital signature algorithm 1504 may be executed via a processor on a processor controlled device, such as the building automation system's security access control system 140. A valid digital signature provides an assurance of the integrity of the data, i.e. the data has not been moditied. A separate key for digital signing of a document is depicted in FIG, 15, with a public portion (digital signature password 1502) and data 1400 processed by the digital signature algorithm 1504. The digital signature algorithm 1504 may be implemented as a series of logical functions that combine the data with the digital signature 1502 and a private key to generate a hash tag or other unique identifier that is associated with the original data 1400. The generated value may be referred to as a digital signature 1506. If the data changes, then a reprocessing of the data will return a different value signaling the underlying data has changed.
[00107] In FIG. 16, a diagram of the encryption of the data 1400 of FIG. 14 and digital signature 1506 of FIG. 15 is depicted in accordance with and example implementation of the invention. The data 1400 and digital signature 1506 along with an encryption key (another public key 1602) is passed to an encryption algorithm 1604 that may have a private key. The encryption algorithm 1604 may be executed via a processor in the building automation system. In other implementations, the public key 1602 may be the same as the digital signature password 1502. The encryption algorithm 1604 encrypts the data 1400 and digital signature 1506 resulting in encrypted data 1606. [00108] Turning to FIG. 17, a diagram 1700 of encoding the encrypted data
1 606 of FIG. 16 into a machine readable code is depicted in accordance with an example im lementation of the invention. The encrypted data 1606 is passed to a OR code generator 1702 that generates a QR code of the encrypted data. The resulting QR code is a secure QR code 1704 with multiple layers of security. In other implementations, other machine readable codes may be used, such as bar codes, provided the resulting machine readable code can accommodate the encrypted data.
[00109] In FIG. 18, a message flow 1800 of decoding the machine readable code (secure QR code 1704) is depicted in accordance with an example implementation. The secure QR code is scanned by a human machine interface device, such as the environmental control access panel 250 of FIG. 5 via code reader 260. The secure QR code 1704 is scanned or read by the code reader 260 and transmitted 1802 to the security access control system 140. At the security access control system 140, a processor may decode the scanned secure QR code into secure data 1804. If the secure QR code is decodable by the security access control system 140, then a personal identification number (PIN) request may be displayed at the environmental control access panel 250. A PIN may be entered at the environmental control access panel 250 by a user and transmitted 1808 to the security access control system 140 where it is used as the public keys decrypt the secure data into digitally signed data 1810.
[00110] The digital signature of the digitally signed data may then be verified to assure the data has not been tampered with or changed 1812. If the integrity of the data is verified, then the user has been identified and a menu for the building automation system 100 may be displayed 1814 on the environmental control access panel 250. in the current example, the same pin was used as the public keys for digitally signing the document and encryption. In other implementations, different keys may be employed and additional prompts may be displayed to gather additional user inputs. Similarly, once the data has been accessed, a password request may be displayed at the environmental control access panel. This password may reside in the building automations system 100. In other implementations, the password may reside in the data that is decoded from the secure QR code.
[00111] Turning to FIG. 19, a flow diagram 1900 of an approach for the generation of a secure machine readable code is depicted in accordance with an example implementation of the invention. Data is 1400 may be entered in a template or flat file 1902 is received or accessed via a processor. The data 1400 and digital signature password 1502 or public key is employed to generate a digital signature for the data 1904, The digital signature and data may then be encrypted using a public encryption key 1906. The encrypted data may then be encoded into a machine readable code, such as a QR code 1908. The resulting QR code is a secure QR code that may be printed or stored by a user.
[00112] In FIG. 20, a flow diagram 2000 of an approach for the decoding of a secure machine readable code is depicted in accordance with an example implementation of the invention. A. machine readable code, such as a bar code or secure QR code is read or scanned with the image or scan being processed or received from the scanner or similar input device and stored in memory by a processor or controller 2002. The memory that the secure QR code is stored in may be a temporary memory, such as ram or a buffer memory. Using the secure QR code in the current example, the secure QR code is decoded via the processor into encrypted data 2004. A user may provide a public encryption key 2006 in response to a request generated via the processor to decrypt the encrypted data into digitally signed data. In other implementations, the encryption may be via a single encryption algorithm that does not require a public key. Further, in other implementations the encrypted data may be data that is not digitally signed.
[00113] The digitally signed data may then be verified via the process to assure data integrity 2008. Once the data integrity has been checked, the data may be used to further authenticate the user or allow access the system, In other implementations, the data may also be used to update databases or records associated with the data contained in the secure QR code.
[00114] In the current implementations, the mobile computing device executes the BSIS mobile application. In other implementations, a desktop computer may be used to execute an application. The application may implement the process of FIG. 11a and FIG. l ib and be executed by a computer's processor that is running an operating system, such as Windows or Linux. In yet other implementations, the application may implement the process of FIG, 1 1 a and l ib in a "browser" such as Internet Explorer, Chrome, Safari, and Firefox by a processor on a computerized device,
[00115] While the BSIS application is described as being implemented as software executed by a device with a processor (i.e., as a combination of hardware and software), the embodiments presented may be implemented in hardware alone such as in an application-specific integrated circuit ("ASIC") device,
[00116] The flow diagrams of FIG. 19 and 20 may be implemented in hardware, software, or a combination of hardware and software. The software is a plurality of non-transitory machine readable instructions that may be loaded into a memory, such as RAM, ROM, SDRAM, DIMMS, or there types of digital memory and execute via a processor or controller. The software may be accessed from punch cards, magnetic tape, magnetic disks, compact discs (CDs), digital video discs (DVDs), or other non-transitory storage devices and loaded into memory or executed from the non-transitory storage.
[00117] The secure machine readable code, such as the secure QR code has been described with respect to a building automation system and security system. Other uses for the secure machine readable code, include and are not limited to transfer of secure data, access control of systems, validation of users, or a combination of the transfer of secure data, access control of systems, validation of users in any type of system that is controlled by or has access to a processor or controller. Industries and other applications that could make use of a secure machine readable code include and is limited to manufacturing, communication, medical, governmental, and education applications.
[00118] The foregoing detailed description of one or more embodiments of the secure machine readable code has been presented herein by way of example only and not limitation. It will be recognized that there are advantages to certain individual features and functions described herein that may be obtained without incorporating other features and functions described herein. Moreover, it will be recognized that various alternatives, modifications, variations, or improvements of the above- disclosed embodiments and other features and functions, or alternatives thereof, may be desirably combined into many other different embodiments, systems or applications. Presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the appended claims. Therefore, the spirit and scope of any appended claims should not be limited to the description of the embodiments contained herein.

Claims

CLAIMS What is claimed is
1. A secure machine readable code encoder, comprising:
an input device;
a memory; and
a processor coupled to the input device and memory, where the processor generates a secure machine readable code stored in the memory from data received at the input device and have at least two layers of security selected from encryption layer, digital signature layer, and password layer.
2. The secure machine readable code encoder of claim 1, where the input device is a keyboard.
3. The secure machine readable code encoder of claim 1 , where the input device is a file.
4. The secure machine readable code encoder of claim 1, further includes a digital signature password that is employed by the processor to generate the digital signature of claim 1 ,
5. The secure machine readable code encoder of claim 1 , further includes a public encryption key employed by the processor to encrypt the data.
6. The secure machine readable code encoder of claim 5, where the data includes the digital signature.
7. The secure machine readable code encoder of claim 1, where the secure machine readable code is a secure QR code,
8. A secure machine readable code decoder, comprising:
an input device;
a memory; and
a processor that receives the secure machine readable code from the input device and verifies the machine readable code after which it decodes the secure machine readable code into encrypted data that is then decrypted into data.
9. The secure machine readable code decoder of claim 8, further includes a digital signature that is checked by the processor against the data to assure integrity of the data.
10. The secure machine readable code decoder of claimS, where a public encryption key is received from the input device and employed during decryption of the encrypted data.
11. The secure machine readable code decoder of claim 8, where the secure machine readable code is a QR code.
12. A method for a secure machine readable code encoder, comprising:
receiving data via an input device;
storing the data in a memory; and
generating with a processor coupled to the input device and memory, a secure machine readable code from the data with at least two layers of security selected from encryption layer, digital signature layer, and password layer.
13. The method of for a secure machine readable code encoder of claim 12, where receiving data via the input device includes receiving data from a keyboard.
14. The method for a secure machine readable code encoder of claim 12, where receiving data via the input device includes receiving data from a file.
15. The method for a secure machine readable code encoder of claim 12, further includes employing a digital signature password employed by the processor to generate the digital signature.
16. The method for a secure machine readable code encoder of claim 12, further includes employing a public encryption key employed by the processor to encrypt the data.
17. The method for a secure machine readable code encoder of claim 16, where the data includes the digital signature.
18. The method for a secure machine readable code encoder of claim 12, where the secure machine readable code is a secure QR code,
19. A method for a secure machine readable code decoder, comprising:
receiving the secure machine readable code from an input device;
storing the secure machine readable code in a memory;
verifying the secure machine readable code with a processor; and
decoding the secure machine readable code into encrypted data that is then decrypted into data.
20. The method for a secure machine readable code decoder of claim 19, further includes checking a digital signature t by the processor against the data to assure integrity of the data.
21. The method for a secure machine readable code decoder of claim 19, includes receiving a public encryption key from the input device; and
decrypting the encrypted data into the data with the public encryption key.
22. The method for a secure machine readable code decoder of claim 19, where the secure machine readable code is a QR code.
23. A non-transient computer readable media with a plurality of instructions that when executed perform a method for a secure machine readable code decoder, comprising:
receiving the secure machine readable code from an input device;
storing the secure machine readable code in a memory;
verifying the secure machine readable code with a processor; and
decoding the secure machine readable code into encrypted data that is then decrypted into data.
24. The non-transient computer readable media with a plurality of instructions that when executed perform a method for a secure machine readable code decoder of claim 23, further includes checking a digital signature t by the processor against the data to assure integrity of the data. 25, The non-transient computer readable media with a plurality of instructions that when executed perform a method for a secure machine readable code decoder of claim 23, includes receiving a public encryption key from the input device; and
decrypting the encrypted data into the data with the public encryption key.
PCT/US2014/036811 2013-05-09 2014-05-05 Mobile identity provider with two factor authentication WO2014182621A1 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
BR112015026936A BR112015026936A2 (en) 2013-05-09 2014-05-05 secure machine readable code encoder and decoder, encoder and decoder methods, and computer readable non-temporary media
CN201480025852.4A CN105190643A (en) 2013-05-09 2014-05-05 Mobile identity provider with two factor authentication
CA2911641A CA2911641A1 (en) 2013-05-09 2014-05-05 Mobile identity provider with two factor authentication
MX2015015319A MX2015015319A (en) 2013-05-09 2014-05-05 Mobile identity provider with two factor authentication.
EP14794403.7A EP2994849A4 (en) 2013-05-09 2014-05-05 Mobile identity provider with two factor authentication

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US13/890,797 2013-05-09
US13/890,797 US20130261804A1 (en) 2011-08-25 2013-05-09 Interface for adjustment of portions of a building automation system
US14/187,575 2014-02-24
US14/187,575 US20140173289A1 (en) 2011-08-25 2014-02-24 Mobile identity provider with two factor authentication

Publications (1)

Publication Number Publication Date
WO2014182621A1 true WO2014182621A1 (en) 2014-11-13

Family

ID=51867666

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/036811 WO2014182621A1 (en) 2013-05-09 2014-05-05 Mobile identity provider with two factor authentication

Country Status (6)

Country Link
EP (1) EP2994849A4 (en)
CN (1) CN105190643A (en)
BR (1) BR112015026936A2 (en)
CA (1) CA2911641A1 (en)
MX (1) MX2015015319A (en)
WO (1) WO2014182621A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9898628B1 (en) 2017-02-16 2018-02-20 International Business Machines Corporation Dynamic quick response code branding
WO2020205168A1 (en) * 2019-03-29 2020-10-08 Siemens Industry, Inc. System and method for configuring and managing field devices of a building
US11118802B2 (en) 2017-07-21 2021-09-14 Carrier Corporation Indoor environmental weighted preference management
US11215376B2 (en) 2017-07-21 2022-01-04 Carrier Corporation Integrated environmental control for shared locations

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040193878A1 (en) * 2001-08-17 2004-09-30 Markus Dillinger Method and data processing device for transferring data via various interfaces
US20060037067A1 (en) * 2004-07-09 2006-02-16 Tricerion Ltd. Method of secure data communication
US7039946B1 (en) * 1999-10-12 2006-05-02 International Business Machines Corporation Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme
US20120138679A1 (en) * 2010-12-01 2012-06-07 Yodo Inc. Secure two dimensional bar codes for authentication
US20120194320A1 (en) * 2006-01-05 2012-08-02 Yeakley Daniel D Data collection system having reconfigurable data collection terminal

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60220959T2 (en) * 2002-09-17 2008-02-28 Errikos Pitsos Method and apparatus for providing a list of public keys in a public key system
US8904486B2 (en) * 2005-05-19 2014-12-02 International Business Machines Corporation Method and system for autonomic security configuration
CN103532707B (en) * 2007-05-18 2018-01-26 美国唯美安视国际有限公司 For the system and method for the programmable processing step for determining to apply when protecting data
CN103415858B (en) * 2011-01-14 2018-03-20 闪席有限责任公司 Mobile solution barcode recognition method and system
US20120308003A1 (en) * 2011-05-31 2012-12-06 Verisign, Inc. Authentic barcodes using digital signatures
US8870084B2 (en) * 2011-09-13 2014-10-28 Sca Promotions Method and system for the generation and validation of personal identification numbers

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7039946B1 (en) * 1999-10-12 2006-05-02 International Business Machines Corporation Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme
US20040193878A1 (en) * 2001-08-17 2004-09-30 Markus Dillinger Method and data processing device for transferring data via various interfaces
US20060037067A1 (en) * 2004-07-09 2006-02-16 Tricerion Ltd. Method of secure data communication
US20120194320A1 (en) * 2006-01-05 2012-08-02 Yeakley Daniel D Data collection system having reconfigurable data collection terminal
US20120138679A1 (en) * 2010-12-01 2012-06-07 Yodo Inc. Secure two dimensional bar codes for authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2994849A4 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9898628B1 (en) 2017-02-16 2018-02-20 International Business Machines Corporation Dynamic quick response code branding
US9898629B1 (en) 2017-02-16 2018-02-20 International Business Machines Corporation Dynamic quick response code branding
US10007812B1 (en) 2017-02-16 2018-06-26 International Business Machines Corporation Dynamic quick response code branding
US10013585B1 (en) 2017-02-16 2018-07-03 International Business Machines Corporation Dynamic quick response code branding
US10121027B2 (en) 2017-02-16 2018-11-06 International Business Machines Corporation Dynamic quick response code branding
US11118802B2 (en) 2017-07-21 2021-09-14 Carrier Corporation Indoor environmental weighted preference management
US11215376B2 (en) 2017-07-21 2022-01-04 Carrier Corporation Integrated environmental control for shared locations
WO2020205168A1 (en) * 2019-03-29 2020-10-08 Siemens Industry, Inc. System and method for configuring and managing field devices of a building
CN113661686A (en) * 2019-03-29 2021-11-16 西门子工业公司 System and method for configuring and managing field devices of a building
US11461605B2 (en) 2019-03-29 2022-10-04 Siemens Industry, Inc. System and method for configuring and managing field devices of a building
CN113661686B (en) * 2019-03-29 2023-01-31 西门子工业公司 System and method for configuring and managing field devices of a building

Also Published As

Publication number Publication date
CA2911641A1 (en) 2014-11-13
EP2994849A4 (en) 2017-01-11
BR112015026936A2 (en) 2017-07-25
EP2994849A1 (en) 2016-03-16
CN105190643A (en) 2015-12-23
MX2015015319A (en) 2016-02-18

Similar Documents

Publication Publication Date Title
US10296022B2 (en) Configuration of a building automation system controller
US20130268128A1 (en) Shared configuration data in a building automation system controller
US20140173289A1 (en) Mobile identity provider with two factor authentication
US20130261804A1 (en) Interface for adjustment of portions of a building automation system
CA2846194C (en) Synergistic interface system for a building network
US10049520B2 (en) Access system with persistent display
Shanthini et al. IoT enhanced smart door locking system
US20190354220A1 (en) Transparent display control device
US20150094860A1 (en) Use of a geo-fencing perimeter for energy efficient building control
US20140192197A1 (en) Method and apparatus for controlling access to a home using visual cues
CA2975986A1 (en) Passive indoor occupancy detection and location tracking
CN103221985A (en) Remote control and remote control systems
EP2994849A1 (en) Mobile identity provider with two factor authentication
CA2883281C (en) Configuration of a building automation system controller
EP2891274A1 (en) Shared configuration data in a building automation system controller
EP1732050A1 (en) Apparatus control system
WO2014182623A1 (en) Interface for adjustment of portions of a building automation system
US20180286203A1 (en) System and Method for Energy Saving on Access Control Products
Rao et al. A comprehensive study on the development of an automated RFID-based security system for residential and industrial applications
US20230354041A1 (en) Concealed three-dimensional data object for multi factor authentication

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201480025852.4

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14794403

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: MX/A/2015/015319

Country of ref document: MX

ENP Entry into the national phase

Ref document number: 2911641

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112015026936

Country of ref document: BR

WWE Wipo information: entry into national phase

Ref document number: 2014794403

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 112015026936

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20151023