The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators.
대표청구항▼
1. A communication method, comprising: operating a credential reader in a first mode of operation, the credential reader comprising at least one of a microprocessor and firmware that enable the credential reader to operate in the first mode of operation;receiving, at a communication interface of the
1. A communication method, comprising: operating a credential reader in a first mode of operation, the credential reader comprising at least one of a microprocessor and firmware that enable the credential reader to operate in the first mode of operation;receiving, at a communication interface of the credential reader, a message from an upstream device;determining, by the credential reader, that the message was transmitted by the upstream device; andbased on determining that the message was transmitted by the upstream device, transitioning the credential reader from the first mode of operation to a second mode of operation, wherein the first mode comprises a non-secure Wiegand mode and wherein the second mode comprises at least one of a secure Wiegand mode and a packet-mode. 2. The method of claim 1, wherein the credential reader is in communication with an upstream device utilizing a unidirectional communication protocol. 3. The method of claim 2, wherein the unidirectional communication protocol is the Wiegand protocol. 4. The method of claim 1, wherein the message transmitted by the upstream device comprises an alteration of a control line signal between the reader and upstream device for a predetermined amount of time. 5. The method of claim 4, wherein the predetermined amount of time is less than 10 ms. 6. A non-transitory computer-readable medium comprising processor-executable instructions, the processor-executable instructions comprising: instructions configured to cause a credential reader to operated in a first mode of operation;instructions configured to receive a message at the reader, the message being received from an upstream device;instructions configured to determine that the message was transmitted by the upstream device; andinstructions configured to transition the credential reader from the first mode of operation to a second mode of operation, wherein the transition from the first mode of operation to the second mode of operation occurs based on determining that the message was transmitted by the upstream device, wherein the first mode comprises a non-secure Wiegand mode and wherein the second mode comprises at least one of a secure Wiegand mode and a packet-mode. 7. The non-transitory computer-readable medium of claim 6, wherein the credential reader is in communication with an upstream device utilizing a unidirectional communication protocol. 8. The non-transitory computer-readable medium of claim 7, wherein the unidirectional communication protocol is the Wiegand protocol. 9. The non-transitory computer-readable medium of claim 6, wherein the message transmitted by the upstream device comprises an alteration of a control line signal between the reader and upstream device for a predetermined amount of time. 10. The non-transitory computer-readable medium of claim 9, wherein the predetermined amount of time is less than 10 ms. 11. A credential reader comprising at least one of a microprocessor and firmware that enable the reader to operate in a first mode of operation, receive a message from an upstream device, determine that the message was transmitted by the upstream device, and, in response thereto transition the credential reader from the first mode of operation to a second mode of operation, wherein the transition from the first mode of operation to the second mode of operation occurs based on determining that the message was transmitted by the upstream device, wherein the first mode comprises a non-secure Wiegand mode and wherein the second mode comprises at least one of a secure Wiegand mode and a packet-mode. 12. The credential reader of claim 11, wherein the credential reader is in communication with an upstream device utilizing a unidirectional communication protocol, and wherein the unidirectional communication protocol is the Wiegand protocol. 13. The credential reader of claim 11, wherein the message transmitted by the upstream device comprises an alteration of a control line signal between the reader and upstream device for a predetermined amount of time. 14. The credential reader of claim 13, wherein the predetermined amount of time is less than 10 ms.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (143)
Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
Gallagher, III, William F.; Salesky, Ronald; Inui, Shinichiro; Benedetti, Riccardo; Alexander, Samuel; Furey, Lee R.; Lee, Youbok, Anticollision protocol with fast read request and additional schemes for reading multiple transponders in an RFID system.
Greeff Roy ; Ovard David K., Backscatter communication systems, interrogators, methods of communicating in a backscatter system, and backscatter communication methods.
Carroll Gary T. (Boulder CO) Pauley J. Donald (Estes Park CO) Bond Michael X. (Boulder CO), Communications system utilizing FSK/PSK modulation techniques.
Marsh Michael J. C. (Johannesburg ZAX) Lenarcik Andrzej (Johannesburg ZAX) Van Zyl Clinton A. (Pretoria ZAX) Van Schalkwyk Andries C. (Pretoria ZAX) Oosthuizen Marthinus J. R. (Pretoria ZAX), Detection of multiple articles.
Renner G. Fred ; Johnson Randall E. ; Chu-Jeng Caroline, Distinct smart card reader having wiegand, magnetic strip and bar code types emulation output.
Aiello William A. (Madison NJ) Venkatesan Ramarathnam (Morristown NJ), Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random funct.
Carroll Gary T. (Boulder CO) Pauley J. Donald (Estes Park CO), Electronic identifier apparatus and method utilizing a single chip microcontroller and an antenna coil.
Brundrett Peter ; Garg Praerit ; Gu Jianrong ; Kelly ; Jr. James W. ; Kaplan Keith S. ; Reichel Robert P. ; Andrew Brian ; Kimura Gary D. ; Miller Thomas J., Encrypting file system and method.
Landt Jeremy A. ; Berka Ivan,CAX ; Carrender Curt L. ; Mortenson G. Russell ; Sondhi Vickram,CAX ; Speirs Donald F., Integrated multi-meter and wireless communication link.
Bolavage, Joseph T.; Lawlor, James E.; Valentino, Robert K., Interrogating tags on multiple frequencies and synchronizing databases using transferable agents.
Krebs Jay (Crystal Lake IL) Freeburg Thomas A. (Arlington Heights IL), Method and apparatus for communicating variable length messages between a primary station and remote stations of a data.
Scribner James R. (7694 Parkwood Ct. Waterford MI 48095) Brown Thomas G. (6410 Woodland Utica MI 48087) Caracciolo ; Jr. Anthony (1756 Welling Troy MI 48098), Method of collecting and using data associated with tagged objects.
Petersen,Mette Vesterager; Sørensen,Hans Martin Boesgaard, Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data.
Anshel Michael M. (New York NY) Goldfeld Dorian (Tenafly NJ), Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions.
Richard Hiers Wagner, OPEN NETWORK SYSTEM FOR I/O OPERATION INCLUDING A COMMON GATEWAY INTERFACE AND AN EXTENDED OPEN NETWORK PROTOCOL WITH NON-STANDARD I/O DEVICES UTILIZING DEVICE AND IDENTIFIER FOR OPERATION TO BE PERF.
O'Toole James E. ; Tuttle John R. ; Tuttle Mark E. ; Lowrey Tyler ; Devereaux Kevin M. ; Pax George E. ; Higgins Brian P. ; Ovard David K. ; Yu Shu-Sun ; Rotzoll Robert R., Pseudo random number generator.
Thomas Philip H.,CAX ; Li Gang,CAX ; Wang Rui,CAX ; Trofimov Iouri,RUX ; Chloma Alexandre,RUX ; Bakouline Mikhail,RUX ; Kreindeline Vitali,RUX, Pseudo random number sequence synchronization in communications systems.
Vrba, Pavel; Macurek, Filip; Marik, Vladimir; Hall, Kenwood H.; Tichy, Pavel, Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems.
Benjamin G. Bates ; Scott Hahn, Wireless communication systems, interfacing devices, communication methods, methods of interfacing with an interrogator, and methods of operating an interrogator.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.