Secure interface for access control systems
First Claim
1. An access control system, comprising:
- an RFID reader, includingan RFID card interface configured to receive an RFID signal including at least some identification data associated with a holder of an RFID card;
a controller configured toretrieve the identification data from the received RFID signal, andgenerate a message responsive to the identification data, wherein the message further includes an RFID reader identifier and a message sequence number;
an encryption engine configured to encrypt the generated message; and
an access controller interface configured to send the encrypted message to a remote access controller; and
an access controller, includingan RFID reader interface configured to receive the encrypted message;
a decryption engine configured to decrypt the received message;
an authentication engine configured to authenticate the decrypted message based on the RFID reader identifier and the message sequence number; and
an access control signal generator configured to generate an access control signal responsive to the received identification data.
2 Assignments
0 Petitions
Accused Products
Abstract
An access control system and methods utilizing secure Wiegand communication interface are disclosed. In one example embodiment, an access control system includes an a plurality of RFID cards, a RFID reader and an access controller. The RFID reader collects user identification information communicated thereto via RFID cards and forwards it to the remote access controller. The access controller process the received identification information and determines whether to grant RFID card holder access to a restricted area or service. The RFID reader communicates with the access controller via a secure Wiegand interfaces, which utilized RFID reader identifiers, message sequence numbers and data encryption techniques to secure data transmissions between the RFID reader and access controller from various types of attacks.
155 Citations
20 Claims
-
1. An access control system, comprising:
-
an RFID reader, including an RFID card interface configured to receive an RFID signal including at least some identification data associated with a holder of an RFID card; a controller configured to retrieve the identification data from the received RFID signal, and generate a message responsive to the identification data, wherein the message further includes an RFID reader identifier and a message sequence number; an encryption engine configured to encrypt the generated message; and an access controller interface configured to send the encrypted message to a remote access controller; and an access controller, including an RFID reader interface configured to receive the encrypted message; a decryption engine configured to decrypt the received message; an authentication engine configured to authenticate the decrypted message based on the RFID reader identifier and the message sequence number; and an access control signal generator configured to generate an access control signal responsive to the received identification data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An access control method, comprising:
-
receiving a RFID card signal from a RFID card, the signal including at least an identification data associated with the holder of the RFID card; retrieving the identification data from the received RFID card signal; generating an access controller message based on the received identification data, the message further including a RFID reader identifier and a message sequence number; encrypting the generated access controller message; and sending the encrypted message to the access controller via an access controller interface. - View Dependent Claims (10, 11, 12)
-
-
13. An access control method, comprising:
-
receiving an encrypted RFID reader message via a RFID reader interface; decrypting the received message, the message including at least a RFID reader identifier, a message sequence number and an identification data; retrieving the RFID reader identifier and the message sequence number from the decrypted message; authenticating the decrypted message based on the RFID reader identifier and the message sequence number; and generating an access control signal based on the received identification data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification