Clever approach. I disagree that reverse engineering MTH protocols is a breach of anything, but you have avoided the issue rather neatly. Conceptually, it is like those "learning" remote controls that store the IR patterns to control a TV, DVR etc using a random remote. Even if MTH disagrees with you, there is a body of work on your side.
Mike