Google's smart-home plans include 'neighborhood security networks' and security ratings for homes

A patent application the search giant published Thursday points to a future in which smart homes have each other's back.

On Thursday, March 5, 2015, the United States Patent and Trademark Office (USPTO) published a patent application filed by Google in September. Titled "Security Scoring in a Smart-Sensored Home", it simply repeats, with a few additions, the claims made in a prior patent application filed by Nest in March 2013, almost a year before the smart thermostat-maker was acquired by Google for $3.2 billion. But that's beside the point, which is that Google is toying with the idea of scoring smart homes on how secure they are.

"The security score may be generated based on processed home data that may include at least one of various types of data, including, but not limited to, capability data, opportunity data, and environmental data," the application reads.

In other words, the proposed cloud-based scoring system will take into account the combined and individual capabilities of the various connected devices within a given smart home environment (e.g., battery backup/capacity, sensors, network protocols, etc.). It will also check to see if there are any impediments preventing any of the devices or the network as a whole from performing as expected (e.g., a smoke detector being located too close to an open window).

Finally, it will also factor in key characteristics of the smart home environment (e.g., structural vulnerabilities and proximity to a police station) as well as the behavioral patterns of its occupants (e.g., the swiftness with which they usually respond to sensor alarms).

While it's easy to see how such a security rating could help homeowners make necessary changes to their smart-home setup, it's not the only thing Google has in mind. The company sees a house's security score having a direct bearing on the cost of insurance and security services: "The higher the security score of the home, the more secure the home and the cheaper the security services and/or insurance may be." The patent application lists trespass detection and emergency notification as examples of basic security services, and "neighborhood security networks" as that of premium security services.

But what exactly is a neighborhood security network? The patent filing talks of organizing different smart homes into a sort of a virtual neighborhood watch based on a variety of criteria, including location, familial ties and demography. There will be real-time sharing of information and alerts among the homes in a neighborhood created thus.

According to the application, one of the many ways in which these virtual neighborhoods may be created could be for the security service's central server to come up with them--and on the fly if need be. "For example, in the event a home experiences a fire, the central server or cloud-computer architecture creates a neighborhood that includes all homes within a one-mile radius, whereas if a child goes missing then the neighborhood can include all homes within a ten-mile radius or all homes in a particular ZIP code, city, county, etc."

The impact on you: This is just a patent application and there's every chance that many of the ideas contained in it will never see the light of the day, or may be unrecognizable from their current selves when they are finally implemented. But in the eventuality that they do come to fruition, the likely impact could be huge and manifold. As much as we are excited about a future where smart homes are secure from both within and without, the potential privacy implications of such a wide-scale data collection program aren't something we are willing to overlook.

Join the CSO newsletter!

Error: Please check your email address.

Tags home automationGooglesecurityConnected Homes

More about GoogleNestPatent and Trademark OfficeSmartUSPTO

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Pulkit Chandna

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place