$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure wiegand communications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/12
  • H04L-029/06
  • G06F-021/60
  • H04L-009/06
  • H04L-009/16
  • H04L-009/32
출원번호 US-0689108 (2012-11-29)
등록번호 US-8923513 (2014-12-30)
발명자 / 주소
  • Guthery, Scott B.
  • Robinton, Mark
  • Davis, Michael Lawrence
  • Andresky, David
출원인 / 주소
  • Assa Abloy AB
대리인 / 주소
    Sheridan Ross P.C.
인용정보 피인용 횟수 : 0  인용 특허 : 143

초록

The present invention is directed toward secure access systems. Specifically, a method, system, and device are described that employ a synchronized pseudo-random number generator to secure communications between endpoints involved in a communication. If synchronization is lost between two devices, t

대표청구항

1. A method, comprising: enabling first and second communication devices with first and second PRNGs, respectively, wherein the first and second PRNGs are synchronized and used to secure communications between the first and second communication devices;determining that synchronization between the fi

이 특허에 인용된 특허 (143)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Stobbe Anatoli (Steinradweg 3 D-3013 Barsinghausen 2 DEX), Access control system where the card controls the transmission format of the card reader.
  3. Scott Walter Guy ; Brunell David ; Kahn Matthew ; McClurg George William, Access control unit interface.
  4. Merkert, Sr.,Robert J., Access system.
  5. Gallagher, III, William F.; Salesky, Ronald; Inui, Shinichiro; Benedetti, Riccardo; Alexander, Samuel; Furey, Lee R.; Lee, Youbok, Anticollision protocol with fast read request and additional schemes for reading multiple transponders in an RFID system.
  6. Ridenour Nancy M. (Ft. Wayne IN), Apparatus and method for a pseudo-random number generator for high precision numbers.
  7. Jay Werb, Article tracking system.
  8. Watkins Randy, Auto-tunning scanning proximity reader.
  9. Greeff Roy ; Ovard David K., Backscatter communication systems, interrogators, methods of communicating in a backscatter system, and backscatter communication methods.
  10. Burger Paul M., Biometric authentication system.
  11. Bartholomew Steven R. ; Norteman Stella Yuen-Chi, Call forwarding techniques using smart cards.
  12. Bierach Kirk B. (Saratoga CA) Shi Ximing (Fremont CA), Communication data format.
  13. Ohshima Izumi (Tokyo JPX), Communication system and communication devices having lock function.
  14. Hikita, Junichi; Taguchi, Haruo; Ikefuji, Yoshihiro, Communications system having an authentication function.
  15. Carroll Gary T. (Boulder CO) Pauley J. Donald (Estes Park CO) Bond Michael X. (Boulder CO), Communications system utilizing FSK/PSK modulation techniques.
  16. Rakoff Steven Barnett,CAX, Control system for automated security and control systems.
  17. Driscoll,Kevin R., Cryptographic combiner using two sequential non-associative operations.
  18. Au,Derek C.; Fruehauf,Hugo, Cryptographic communications using pseudo-randomly generated cryptography keys.
  19. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  20. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  21. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  22. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  23. Scheidt,Edward M.; Wack,C. Jay, Cryptographic key split combiner.
  24. Cusmario, Adolf, Cryptographic method using modified fractional fourier transform kernel.
  25. Johnson ; Jr. William S., Cryptography security for remote dispenser transactions.
  26. Koller Manfred,ATX ; Thuringer Peter,ATX, Data carrier having rectifier and improved voltage limiter.
  27. Glasspool Andrew J. K. (Addlestone GBX), Data detection, power transfer and power regulation for data storage devices.
  28. Alon Noga (Tel Aviv CA ILX) Bruck Jehoshua (Palo Alto CA), Depth-2 threshold logic circuits for logic and arithmetic functions.
  29. Marsh Michael J. C. (Johannesburg ZAX) Lenarcik Andrzej (Johannesburg ZAX) Van Zyl Clinton A. (Pretoria ZAX) Van Schalkwyk Andries C. (Pretoria ZAX) Oosthuizen Marthinus J. R. (Pretoria ZAX), Detection of multiple articles.
  30. Davis, Michael L.; Hulusi, Tam, Device authentication using a unidirectional protocol.
  31. Weaver Charles S. (Palo Alto CA) Yarborough ; Jr. John M. (Palo Alto CA), Digital data transmission with parity bit word lock-on.
  32. Renner G. Fred ; Johnson Randall E. ; Chu-Jeng Caroline, Distinct smart card reader having wiegand, magnetic strip and bar code types emulation output.
  33. Daniel R. Puchek ; Tianning Xu ; David M. Tumey, Distributed biometric access control apparatus and method.
  34. Aiello William A. (Madison NJ) Venkatesan Ramarathnam (Morristown NJ), Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random funct.
  35. Glick Mark ; Fekete Nicholas M. G. ; Bolan Michael L. ; Owens Jeffrey D., Electrical/mechanical access control systems.
  36. Carroll Gary T. (Boulder CO) Pauley J. Donald (Estes Park CO), Electronic identifier apparatus and method utilizing a single chip microcontroller and an antenna coil.
  37. Johnsen Edward L. (19 Bent Ave. Wayland MA 01778), Electronic inventory label and security apparatus.
  38. Cole,Peter H.; Hall,David Malcolm; Turner,Leigh Holbrook; Kalinowski,Richard, Electronic label reading system.
  39. Rowse,Graham; Pendlebury,Joe, Electronic near field communication enabled multifunctional device and method of its operation.
  40. Brundrett Peter ; Garg Praerit ; Gu Jianrong ; Kelly ; Jr. James W. ; Kaplan Keith S. ; Reichel Robert P. ; Andrew Brian ; Kimura Gary D. ; Miller Thomas J., Encrypting file system and method.
  41. Kowalski Jacek,FRX ; Martin Michel,FRX ; Stern Jacques,FRX ; Joux Antoine,FRX, Encryption and authentication method and circuit for synchronous smart card.
  42. Carroll Gary T. (Boulder CO) Pauley J. Donald (Estes Park CO), Enhanced peak detector.
  43. Hardjono Thomas P., Exchanging a secret over an unreliable network.
  44. DeVane Charles J. (Milford MA), High-speed pseudo-random number generator and method for generating same.
  45. Bridgelall, Raj, Hybrid bluetooth/RFID based real time location tracking.
  46. Beigel Michael (Warwick NY), Identification device.
  47. Milheiser Thomas A. (Littleton CO), Identification system.
  48. Milheiser Thomas A. (Littleton CO), Identification system.
  49. Giles Thomas E. (Oxfordville WI) Reining William N. (Madison WI), Identification transponder circuit.
  50. Shober R. Anthony, In-building modulated backscatter system.
  51. Ikeda Hietoshi (Kanagawa JPX), Information disc apparatus.
  52. Delp, Don; Renaldi, Pat, Integrated building control and information system with wireless networking.
  53. Landt Jeremy A. ; Berka Ivan,CAX ; Carrender Curt L. ; Mortenson G. Russell ; Sondhi Vickram,CAX ; Speirs Donald F., Integrated multi-meter and wireless communication link.
  54. Renner G. Fred (Dublin OH) Johnson Randall E. (Dublin OH) Chu-Jenq Caroline (Columbus OH), Intelligent card reader having emulation features.
  55. Conrad Alexander (Neptune Beach FL) Bell Charles (Jacksonville FL), Intelligent locator system with multiple bits represented in each pulse.
  56. Bolavage, Joseph T.; Lawlor, James E.; Valentino, Robert K., Interrogating tags on multiple frequencies and synchronizing databases using transferable agents.
  57. Reed Irving S. (Santa Monica CA) Yin Xiaowei (Alhambra CA) Chen Xuemin (Los Angeles CA), Keyless entry system using a rolling code.
  58. Anders Frank W. (Greeley CO) Herring Joseph C. (Aurora CO) White Douglas A. (Aurora CO), LIMIS systems, devices and methods.
  59. Klein Elliot S., Lost and found system and method.
  60. Bailey, Thomas; Benditt, Ronnie; Brewerton, Nigel; Finkelmeier, Steven D.; Glinecke, Robert; Martini, Luigi; Simmons, Paul, Machine and method for pharmaceutical and pharmaceutical-like product assembly.
  61. Erwin Lehmann DE, Measuring method and measuring device for data communication networks.
  62. Donny V. Lee, Metal compensated radio frequency identification reader.
  63. Lee Donny V., Metal compensated radio frequency identification reader.
  64. Krebs Jay (Crystal Lake IL) Freeburg Thomas A. (Arlington Heights IL), Method and apparatus for communicating variable length messages between a primary station and remote stations of a data.
  65. Barry,Mark Patrick; Bickerstaff,Mark Andrew, Method and apparatus for generating a pseudo random number.
  66. Gallup Michael G. (Austin TX) Goke L. Rodney (Austin TX), Method and apparatus for generating pseudo-random numbers.
  67. Schmidt, Douglas Charles, Method and apparatus for generating random number generators.
  68. Chiu Manfred F. (P.O. Box 2353 Cupertino CA 95015-2353), Method and apparatus for powering and signaling over a single wire pair.
  69. Diorio,Christopher J.; Sundstrom,Kurt E., Method and apparatus to configure an RFID system to be adaptable to a plurality of environmental conditions.
  70. Smeets, Ben; Hansson, Mattias; Persson, Joakim, Method and device for effective key length control.
  71. Ricketts James G. (5970 N. Echo Canyon Dr. Phoenix AZ 85018), Method and system for monitoring personnel.
  72. Griffith David W. ; Hurkamp Alan C. ; Salmon Donald K., Method and system for remote monitoring and tracking of inventory.
  73. Clifford A. Horwitz CA; William E. Davidson, Method and system for tracking clustered items.
  74. Patel Sarvar ; Sundaram Ganapathy Subramanian, Method for generating pseudo-random numbers.
  75. Scribner James R. (7694 Parkwood Ct. Waterford MI 48095) Brown Thomas G. (6410 Woodland Utica MI 48087) Caracciolo ; Jr. Anthony (1756 Welling Troy MI 48098), Method of collecting and using data associated with tagged objects.
  76. Vos Gerardus J. F. (HG Maarssen NLX), Method of controlling the operation of security modules.
  77. Petersen,Mette Vesterager; Sørensen,Hans Martin Boesgaard, Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data.
  78. Chieu Trieu Can ; Cofino Thomas Anthony ; Heinrich Harley Kent ; Sousa Paul Jorge ; Zai Li-Cheng Richard, Method of grouping RF transponders.
  79. Borza Stephen J.,CAX, Method of protecting a computer system from record-playback breaches of security.
  80. Harsch Thomas B., Method to sustain TCP connection.
  81. Mullen Sean F. (Bristol GB2) Jebwab Jonathan (Bristol GB2), Methods and apparatus for generating pseudo-random binary patterns.
  82. Anshel Michael M. (New York NY) Goldfeld Dorian (Tenafly NJ), Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions.
  83. Anshel Michael M. ; Goldfeld Dorian, Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions.
  84. Lavelle Gary E. ; Conklin Peter S. ; Hass Brian D. ; Walsh ; III John E., Multiple access electronic lock system.
  85. Bellantoni,John Vincent, Multiprotocol RFID reader.
  86. Richard Hiers Wagner, OPEN NETWORK SYSTEM FOR I/O OPERATION INCLUDING A COMMON GATEWAY INTERFACE AND AN EXTENDED OPEN NETWORK PROTOCOL WITH NON-STANDARD I/O DEVICES UTILIZING DEVICE AND IDENTIFIER FOR OPERATION TO BE PERF.
  87. Guthrie Warren E. ; Cox Daniel D., Personnel monitoring tag.
  88. Mejia E. Zeke,CAX ; Griffiths Ian,GBX, Programmable channel search reader.
  89. Davis,Michael L.; Hulusi,Tam, Protection of non-promiscuous data in an RFID transponder.
  90. Sanderson Glenn A. (2211 Alameda Padra Serra Santa Barbara CA 93103), Proximity actuator and reader for an electronic access system.
  91. O'Toole James E. ; Tuttle John R. ; Tuttle Mark E. ; Lowrey Tyler ; Devereaux Kevin M. ; Pax George E. ; Higgins Brian P. ; Ovard David K. ; Yu Shu-Sun ; Rotzoll Robert R., Pseudo random number generator.
  92. Thomas Philip H.,CAX ; Li Gang,CAX ; Wang Rui,CAX ; Trofimov Iouri,RUX ; Chloma Alexandre,RUX ; Bakouline Mikhail,RUX ; Kreindeline Vitali,RUX, Pseudo random number sequence synchronization in communications systems.
  93. Woodall,Thomas R.; Lum,Milton K., Pseudo--random state mechanical switch.
  94. Bonaccio,Anthony R.; Haar,Allen P., Pseudo-random binary sequence checker with automatic synchronization.
  95. Vobach Arnold R. (11114 Ashcroft Houston TX 77096), Pseudo-random choice cipher and method.
  96. Aiello William A. (Madison NJ) Venkatesan Ramarathnam (Morristown NJ), Pseudo-random generator.
  97. Vobach Arnold (11114 Ashcroft Houston TX 77096), Pseudo-random transposition cipher system and method.
  98. DeBellis Robert S. ; Smith ; Sr. Ronald M. ; Yeh Phil Chi-Chung, Pseudorandom number generator.
  99. Nguyen Trung D., Questionless cased-based knowledge and a method for constructing the same.
  100. Lee, Donny V., RFID reader with multiple antenna selection and automated antenna matching.
  101. Grunwald, Lukas; Wolf, Boris, RFID security system and method, including security stamp.
  102. Sullivan,Michael S.; Dubash,Jamshed H., RFID tag sensitivity.
  103. Kenneth Geiszler ; Russel E. Walker ; Kenneth Alan Whiston ; Jon Kwong ; Dale Lindseth, Radio frequency identification system.
  104. Schmidt,Douglas Charles, Random number generators.
  105. MacLellan John Austin ; Smithgall David Harry, Read/write protocol for radio frequency identification tags.
  106. Nakano Akio,JPX, Remote control system and method having a system-specific code.
  107. Roberts, David Keir, Removable hardware device authentication system and method.
  108. Farris Bradford L. ; Fitzgibbon James J., Rolling code security system.
  109. Farris, Bradford L.; Fitzgibbon, James J., Rolling code security system.
  110. Farris,Bradford L.; Fitzgibbon,James J., Rolling code security system.
  111. Farris,Bradford L.; Fitzgibbon,James J., Rolling code security system.
  112. Fitzgibbon,James J., Rolling code security system.
  113. Iida Makoto (Tokyo JP), Safety lock system for controlling access to an area in response to predetermined data inputs.
  114. Brader ; Roy Henry, Scrambler and unscrambler for serial data.
  115. Tsuchida Shinichi,JPX, Secrecy communication system.
  116. Green Graeme Allan,AUX, Secure access control system.
  117. Bruwer Frederick Johannes (Montana ZAX), Secure self learning system.
  118. Davis, Michael; Andresky, David; Guthery, Scott B.; Robinton, Mark, Secure wiegand communications.
  119. Utz Hubert W. (Munchen DEX), Security system having randomized synchronization code after power up.
  120. Utz Hubert W.,DEX, Security system with randomized synchronization code.
  121. Baratelli Paul J., Smart card with integrated fingerprint reader.
  122. Graunke,Gary L.; Ellison,Carl M., Stream cipher having a combiner function with storage based shuffle unit.
  123. Fitzgibbon,James J., System and method for actuating a remote control access system.
  124. Landt, Jeremy A., System and method for automatically controlling or configuring a device, such as an RFID reader.
  125. Armingaud, Francois-Dominique Gilles, System and method for controlling access to a computer resource.
  126. Hardy Norman ; Vetter Linda L. ; Tribble E. Dean, System and method for generating unique secure values for digitally signing documents.
  127. Kamerman Adriaan,NLX ; van Driest Hans,NLX, System and method for improved spread spectrum signal detection.
  128. Davis,Michael; Hulusi,Tam, System and method of extending communications with the wiegand protocol.
  129. Siegel, William G.; McClurg, George W.; Cannon, Greg L., System and methods for access control utilizing two factors to control access.
  130. Audebert Yves,FRX, System for controlling access to a function, using a plurality of dynamic encryption variables.
  131. Horwitz, Clifford A.; Davidson, William E., System for multi-standard RFID tags.
  132. Kahn, Clifford E.; Venable, Sr., Jeffrey C.; Chickering, Roger A., System for slowing password attacks.
  133. Vrba, Pavel; Macurek, Filip; Marik, Vladimir; Hall, Kenwood H.; Tichy, Pavel, Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems.
  134. Carroll, Gary T.; Hunter, Robert D., Time and accounting system.
  135. Kokubu Sadao,JPX ; Aoki Hisashi,JPX ; Mizuno Takashi,JPX ; Koga Shinichi,JPX, Transmission-reception system.
  136. Beigel Michael L. ; Malm Robert E., Universal electronic identification tag.
  137. Guthrie,Warren E.; Dykema,Kurt A.; Harwood,Jody K., Universal vehicle based garage door opener control system and method.
  138. Kolze Thomas J. ; Anderson Steven E. ; Hou Victor T., Variable length burst transmission over the physical layer of a multilayer transmission format.
  139. Hinkle Terry A. (14392 Dresden Sterling Heights MI 48312), Vehicle operation inhibitor control apparatus.
  140. Wallner George (Phoenix AZ), Virtual POS terminal.
  141. Cheng,Lee Ming; Chan,Chi Kwong; Hsie,Wei Cheng, Wiegand converter and method of generating a bi-directional data.
  142. Albert Herb ; Renton Paul ; Rowe Lorin ; Schramke Stephen R. ; Zorn Glen, Wireless adaptor and wireless financial transaction system.
  143. Benjamin G. Bates ; Scott Hahn, Wireless communication systems, interfacing devices, communication methods, methods of interfacing with an interrogator, and methods of operating an interrogator.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로