Use-authorization device for security-related applications
First Claim
1. A use-authorization device for security-related applications, in particular access control to secure areas or for securing vehicles, with a user-end key unit for generating consecutive, alternating user code information which has a sequence of consecutive function values vi+1=F(vi,const) for i=0, . . . , N through the repeated use of a one-way function F(vi,const), which function values are used in inverse order to the sequence formation to create the consecutive user code information;
- and an application-end processing unit for determining actual authorization information which is dependent upon the user code information received from the key unit and for performing a use-authorization checking process by comparing this actual authorization information with the application-end desired authorization information, as well as for generating use-release information depending on the result of the comparison, wherein the desired authorization information has a function value vi which has been transferred from the user code information which had been processed during the previous positive use-authorization operation;
characterized in that there is a certain number of levels G provided from which a certain number of iterative function value calculations can be performed in each level by means of the one-way function F(vi,const), and there are G=┌
L(N)/b┐
levels, wherein N is the starting value, L(N) is the number of bits required for representing N in the dual system and b is the basis.
13 Assignments
0 Petitions
Accused Products
Abstract
This description is given of a use-authorization device for security-related applications, in particular access control to secure areas or securing vehicles with a user operated key unit for generating consecutive, alternating user code information which exhibits a sequence of consecutive function values vi+1=F(vi,const) for i=0, . . . , N through the repeated use of a one-way function F(vi,const), which function values are used in inverse order to the sequence formation to create the consecutive user code information, and an application-sided processing unit for determining actual authorization information which is dependent upon the user code information received from the key unit and for performing a use-authorization checking process by comparing this actual authorization information with target authorization information saved in the application, as well as for generating use-release information depending on the result of the comparison, wherein the target authorization information has a function value v; which has been transferred from the user code information processed during the previous positive use-authorization operation. The special feature of the invention is that there is a certain number of levels G provided, with at least one support point and one intermediate value, from which a certain number of iterative function value calculations can be performed in each level by means of the one-way function F(vi,const) wherein there are G=L(N)/b levels, with N as the starting value, L(N) as the number of bits required for representing N in the dual system and b as the basis.
9 Citations
11 Claims
-
1. A use-authorization device for security-related applications, in particular access control to secure areas or for securing vehicles, with
a user-end key unit for generating consecutive, alternating user code information which has a sequence of consecutive function values vi+1=F(vi,const) for i=0, . . . , N through the repeated use of a one-way function F(vi,const), which function values are used in inverse order to the sequence formation to create the consecutive user code information; - and
an application-end processing unit for determining actual authorization information which is dependent upon the user code information received from the key unit and for performing a use-authorization checking process by comparing this actual authorization information with the application-end desired authorization information, as well as for generating use-release information depending on the result of the comparison, wherein the desired authorization information has a function value vi which has been transferred from the user code information which had been processed during the previous positive use-authorization operation;
characterized in that there is a certain number of levels G provided from which a certain number of iterative function value calculations can be performed in each level by means of the one-way function F(vi,const), and there are G=┌
L(N)/b┐
levels, wherein N is the starting value, L(N) is the number of bits required for representing N in the dual system and b is the basis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
- and
Specification