Abstract:
A method for controlling a controlled device is disclosed, wherein the controlled device has a host connection to an RFID tag, the method comprising the following steps: (s1) the controlled device writes operational parameters to the RFID tag through the host connection; (s2) a user interaction device reads the operational parameters from the RFID tag through an RFID connection; (s3) a user changes the operational parameters via a user interface comprised in the user interaction device; (s4) the user interaction device writes the operational parameters to the RFID tag through the RFID connection; (s5) the controlled device reads the operational parameters from the RFID tag through the host connection and adapts its behavior based on the operational parameters. Furthermore, a corresponding controlled device, a user interaction device and a computer program product are disclosed.
Abstract:
According to an aspect of the invention a configuration method for configuring a host device in a control system is conceived, in particular a building control system, wherein an authorized configuration device exchanges confidential configuration data with a radio frequency identification tag coupled to the host device, wherein, after the confidential configuration data have been exchanged and a corresponding configuration operation has been performed, access to the confidential configuration data by an unauthorized configuration device is precluded. According to further aspects of the invention a corresponding configuration device, a corresponding computer program product and a corresponding control system are conceived.
Abstract:
According to an aspect of the invention a localization method for localizing a host device (100) in a control system, in particular a building control system, is provided, the localization method comprising determining geographical location information of the host device (100) by means of a localization device (102) and associating the geographical location information with a unique identifier of the host device (100). According to another aspect of the invention a computer program product is provided that comprises program instructions which, when being executed by one or more processing units, cause said processing units to carry out or control the steps of the inventive localization method. According to another aspect of the invention, a localization device (102), in particular a portable localization device is provided for use in the inventive localization method.
Abstract:
According to an aspect of the invention a configuration method for configuring a host device in a control system is conceived, in particular a building control system, wherein an authorized configuration device exchanges confidential configuration data with a radio frequency identification tag coupled to the host device, wherein, after the confidential configuration data have been exchanged and a corresponding configuration operation has been performed, access to the confidential configuration data by an unauthorized configuration device is precluded. According to further aspects of the invention a corresponding configuration device, a corresponding computer program product and a corresponding control system are conceived.
Abstract:
According to an aspect of the invention, a method for establishing secure communication between nodes in a network is conceived, wherein the network comprises a key manager which accommodates a key-manager-specific public key and a corresponding key-manager-specific private key; wherein a copy of the key-manager-specific public key is stored in an installation device; wherein the installation device provides a new node with the copy of the key-manager-specific public key; and wherein said new node is registered with the key manager by providing a node-specific public key and an identifier of said new node to the key manager, such that other nodes in the network may setup end-to-end secure connections with said new node by requesting the node-specific public key of said new node from the key manager.
Abstract:
A method for facilitating network joining is disclosed, wherein, while a communication session is active between a network gateway and an NFC device comprised in or connected to a networkable device, the following steps are performed: the network gateway obtains a first cryptographic key associated with the networkable device; the network gateway encrypts, using said first cryptographic key, a network key associated with a network; the network gateway provides the encrypted network key to the networkable device, such that the networkable device may decrypt the encrypted network key using a second cryptographic key. Furthermore, a corresponding computer program product and a corresponding system for facilitating network joining are disclosed.
Abstract:
A method for controlling a controlled device is disclosed, wherein the controlled device has a host connection to an RFID tag, the method comprising the following steps: (s1) the controlled device writes operational parameters to the RFID tag through the host connection; (s2) a user interaction device reads the operational parameters from the RFID tag through an RFID connection; (s3) a user changes the operational parameters via a user interface comprised in the user interaction device; (s4) the user interaction device writes the operational parameters to the RFID tag through the RFID connection; (s5) the controlled device reads the operational parameters from the RFID tag through the host connection and adapts its behavior based on the operational parameters. Furthermore, a corresponding controlled device, a user interaction device and a computer program product are disclosed.
Abstract:
According to an aspect of the invention a method for calibrating a measurement device is conceived wherein: a calibration device is brought into close proximity of the measurement device such that a data communication link is established between the measurement device and the calibration device; wherein the following steps are performed while the calibration device and the measurement device are in close proximity of each other: the calibration device performs a measurement of at least one physical phenomenon; the measurement device performs a measurement of the same physical phenomenon; the result of the measurement by the measurement device is compared with the result of the measurement by the calibration device; and calibration parameters are computed based on a difference between the result of the measurement by the measurement device and the result of the measurement by the calibration device.