The present invention is directed toward secure access systems. Specifically, a method, system, and device are described that employ a synchronized pseudo-random number generator to secure communications between endpoints involved in a communication. If synchronization is lost between two devices, t
The present invention is directed toward secure access systems. Specifically, a method, system, and device are described that employ a synchronized pseudo-random number generator to secure communications between endpoints involved in a communication. If synchronization is lost between two devices, the two devices can regain synchronization by switching to use of a different pseudo-random number generator that is used for resynchronization instead of communications.
대표청구항▼
1. A method, comprising: enabling first and second communication devices with first and second PRNGs, respectively, wherein the first and second PRNGs are synchronized and used to secure communications between the first and second communication devices;determining that synchronization between the fi
1. A method, comprising: enabling first and second communication devices with first and second PRNGs, respectively, wherein the first and second PRNGs are synchronized and used to secure communications between the first and second communication devices;determining that synchronization between the first and second PRNGs has been lost; andinvoking third and fourth PRNGs at the first and second communication devices respectively, wherein the third and fourth PRNGs are used to resynchronize the first and second PRNGs, wherein the first and second communication devices execute their respective PRNGs in firmware and/or with a microprocessor executing instructions stored in non-transitory computer-readable memory. 2. The method of claim 1, wherein the first and second PRNGs are fast PRNGs and the third and fourth PRNGs are slow PRNGs. 3. The method of claim 1, wherein determining that synchronization has been lost comprises determining that power has been lost at one or more of the first and second PRNGs. 4. The method of claim 1, wherein the first and second communication devices utilize a unidirectional communication protocol to facilitate communications between the first and second communication devices. 5. A system, comprising: first and second communication devices configured to communicate with first and second PRNGs, respectively, wherein the first and second PRNGs are synchronized and used to secure communications between the first and second communication devices, the first and second communication devices being further configured to invoke third and fourth PRNGs, respectively, to resynchronize the first and second PRNGs when synchronization between the first and second PRNGs has been lost. 6. The system of claim 5, wherein the first and second PRNGs are fast PRNGs and the third and fourth PRNGs are slow PRNGs. 7. The system of claim 5, wherein at least one of the first and second communication device are configured to determine synchronization has been lost by determining that power has been lost at one or more of the first and second PRNGs. 8. The system of claim 5, wherein the first and second communication devices utilize a unidirectional communication protocol to facilitate communications between the first and second communication devices. 9. A first communication device comprising: firmware comprising and configured to execute a first PRNG, the first PRNG, when executed by the firmware, enabling the first communication device to securely communicate with a second communication device that has a second PRNG synchronized with the first PRNG, the first communication device further comprising a third PRNG in the firmware that is configured to be invoked by the firmware to resynchronize the first PRNG with the second PRNG when the first and second PRNGs become unsynchronized. 10. The communication device of claim 9, wherein the first and second PRNGs are fast PRNGs and the third PRNG is a slow PRNG. 11. The communication device of claim 9, wherein the third PRNG is invoked by the first communication device in response to determining that power has been lost at one or more of the first and second PRNGs. 12. The communication device of claim 9, further comprising a Wiegand interface. 13. An access control reader, comprising: a non-transitory computer-readable medium comprising instructions that are executable by a processor, the instructions including a first PRNG, the first PRNG, when executed, enabling the reader to securely communicate with a remote communication device that has a second PRNG synchronized with the first PRNG, the instructions further including a third PRNG that is configured to be invoked to resynchronize the first PRNG with the second PRNG when the first and second PRNGs become unsynchronized; anda processor that executes the instructions stored in the non-transitory computer-readable medium. 14. The reader of claim 13, wherein the first and second PRNGs are fast PRNGs and the third PRNG is a slow PRNG. 15. The reader of claim 13, wherein the third PRNG is invoked by the first communication device in response to determining that power has been lost at one or more of the first and second PRNGs. 16. The reader of claim 13, further comprising a Wiegand interface.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (143)
Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
Gallagher, III, William F.; Salesky, Ronald; Inui, Shinichiro; Benedetti, Riccardo; Alexander, Samuel; Furey, Lee R.; Lee, Youbok, Anticollision protocol with fast read request and additional schemes for reading multiple transponders in an RFID system.
Greeff Roy ; Ovard David K., Backscatter communication systems, interrogators, methods of communicating in a backscatter system, and backscatter communication methods.
Carroll Gary T. (Boulder CO) Pauley J. Donald (Estes Park CO) Bond Michael X. (Boulder CO), Communications system utilizing FSK/PSK modulation techniques.
Marsh Michael J. C. (Johannesburg ZAX) Lenarcik Andrzej (Johannesburg ZAX) Van Zyl Clinton A. (Pretoria ZAX) Van Schalkwyk Andries C. (Pretoria ZAX) Oosthuizen Marthinus J. R. (Pretoria ZAX), Detection of multiple articles.
Renner G. Fred ; Johnson Randall E. ; Chu-Jeng Caroline, Distinct smart card reader having wiegand, magnetic strip and bar code types emulation output.
Aiello William A. (Madison NJ) Venkatesan Ramarathnam (Morristown NJ), Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random funct.
Carroll Gary T. (Boulder CO) Pauley J. Donald (Estes Park CO), Electronic identifier apparatus and method utilizing a single chip microcontroller and an antenna coil.
Brundrett Peter ; Garg Praerit ; Gu Jianrong ; Kelly ; Jr. James W. ; Kaplan Keith S. ; Reichel Robert P. ; Andrew Brian ; Kimura Gary D. ; Miller Thomas J., Encrypting file system and method.
Landt Jeremy A. ; Berka Ivan,CAX ; Carrender Curt L. ; Mortenson G. Russell ; Sondhi Vickram,CAX ; Speirs Donald F., Integrated multi-meter and wireless communication link.
Bolavage, Joseph T.; Lawlor, James E.; Valentino, Robert K., Interrogating tags on multiple frequencies and synchronizing databases using transferable agents.
Krebs Jay (Crystal Lake IL) Freeburg Thomas A. (Arlington Heights IL), Method and apparatus for communicating variable length messages between a primary station and remote stations of a data.
Scribner James R. (7694 Parkwood Ct. Waterford MI 48095) Brown Thomas G. (6410 Woodland Utica MI 48087) Caracciolo ; Jr. Anthony (1756 Welling Troy MI 48098), Method of collecting and using data associated with tagged objects.
Petersen,Mette Vesterager; Sørensen,Hans Martin Boesgaard, Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data.
Anshel Michael M. (New York NY) Goldfeld Dorian (Tenafly NJ), Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions.
Richard Hiers Wagner, OPEN NETWORK SYSTEM FOR I/O OPERATION INCLUDING A COMMON GATEWAY INTERFACE AND AN EXTENDED OPEN NETWORK PROTOCOL WITH NON-STANDARD I/O DEVICES UTILIZING DEVICE AND IDENTIFIER FOR OPERATION TO BE PERF.
O'Toole James E. ; Tuttle John R. ; Tuttle Mark E. ; Lowrey Tyler ; Devereaux Kevin M. ; Pax George E. ; Higgins Brian P. ; Ovard David K. ; Yu Shu-Sun ; Rotzoll Robert R., Pseudo random number generator.
Thomas Philip H.,CAX ; Li Gang,CAX ; Wang Rui,CAX ; Trofimov Iouri,RUX ; Chloma Alexandre,RUX ; Bakouline Mikhail,RUX ; Kreindeline Vitali,RUX, Pseudo random number sequence synchronization in communications systems.
Vrba, Pavel; Macurek, Filip; Marik, Vladimir; Hall, Kenwood H.; Tichy, Pavel, Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems.
Benjamin G. Bates ; Scott Hahn, Wireless communication systems, interfacing devices, communication methods, methods of interfacing with an interrogator, and methods of operating an interrogator.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.