SECURE WIEGAND COMMUNICATIONS
First Claim
Patent Images
1. A communication method, comprising:
- obfuscating data transmitted in a first message from a first communication device to a second communication device, wherein the first and second communication devices communicate using a unidirectional communication protocol and wherein the obfuscation of the data is effected with a predetermined code.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators.
122 Citations
40 Claims
-
1. A communication method, comprising:
obfuscating data transmitted in a first message from a first communication device to a second communication device, wherein the first and second communication devices communicate using a unidirectional communication protocol and wherein the obfuscation of the data is effected with a predetermined code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
19. A reader, comprising:
-
a rolling code generator operable to generate a plurality of distinct rolling codes; and a message formatting engine, wherein the message formatting engine is operable to retrieve a first rolling code from the rolling code generator and obfuscate data with the first rolling code prior to transmitting the data to an upstream device. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A communication method, comprising:
-
operating a credential reader in a first mode of operation; receiving, at the credential reader, a message from an upstream device; determining, by the credential reader, that the message was transmitted by the upstream device; and based on determining that the message was transmitted by the upstream device, transitioning the credential reader from the first mode of operation to a second mode of operation. - View Dependent Claims (31, 32, 33, 34, 35, 36)
-
-
37. A method, comprising:
-
enabling first and second communication devices with first and second PRNGs, respectively, wherein the first and second PRNGs are synchronized and used to secure communications between the first and second communication devices; determining that synchronization between the first and second PRNGs has been lost; and invoking third and fourth PRNGs at the first and second communication devices respectively, wherein the third and fourth PRNGs are used to resynchronize the first and second PRNGs. - View Dependent Claims (38, 39, 40)
-
Specification