METHODS AND APPARATUS RELATING TO A SECURITY SYSTEM
3 Assignments
0 Petitions
Accused Products
Abstract
A method of receiving secure information from a mobile communication device to control an authorisation device in a security system, the method including the steps of the authorisation device: receiving an electronic key transmitted by the mobile communication device; decoding the key using a decoding technique to retrieve a hidden token; and decrypting the retrieved token to retrieve the secure information.
-
Citations
84 Claims
-
1-59. -59. (canceled)
-
60. A method of retrieving secure information from a mobile communication device to control an authorisation device in a security system, the method including the steps of the authorisation device:
-
receiving an electronic key transmitted by the mobile communication device; decoding the key using a decoding technique to retrieve a hidden token, wherein the token is hidden in an unencrypted image using a steganographic technique; and decrypting the retrieved token to retrieve the secure information by receiving identification information from the mobile communication device that identifies the mobile communication device, and decrypting the token using the identification information. - View Dependent Claims (61, 62, 63, 64, 65, 66, 67)
-
-
68. An authorisation device in a security system, the authorisation device including a communication interface arranged to retrieve secure information from a mobile communication device, wherein the secure information is used to control the authorisation device, the authorisation device arranged to receive an electronic key via the communication interface;
-
decode the key using a decoding technique to retrieve a hidden token wherein the token is decoded from an unencrypted image using a steganographic technique; and
decrypt the retrieved token to retrieve the secure information by being further arranged to receive identification information from the mobile communication device that identifies the mobile communication device, anddecrypt the secure information using the identification information. - View Dependent Claims (69, 70, 71, 72, 73)
-
-
76. A method of creating an electronic key for controlling an authorisation device in a security system including the steps of:
-
encrypting secure information to form an electronic token using an encryption key, wherein the encryption key includes identification information for a mobile communication device that identifies the mobile communication device, where the mobile communication device is intended to transfer the secure information to the authorisation device, and encoding the electronic token to hide the token in an unencrypted image using a steganographic technique within the electronic key. - View Dependent Claims (77, 78, 79)
-
-
80. A key management system for creating an electronic key for controlling an authorisation device in a security system, the key management system arranged to:
-
encrypt secure information to form an electronic token using an encryption key, wherein the encryption key includes identification information for a mobile communication device that identifies the mobile communication device, where the mobile communication device is intended to transfer the secure information to the authorisation device, and encode the electronic token to hide the token in an unencrypted image using a steganographic technique within the electronic key. - View Dependent Claims (81, 82, 83)
-
-
84. A data structure for controlling an authorisation device in a security system, the data structure including an encoded electronic token, the token having been encoded to be hidden in an unencrypted image using a steganographic technique, wherein the electronic token includes encrypted secure information, wherein the secure information is encrypted using identification information for identifying a mobile communication device intended to transfer the secure information to the authorisation device.
Specification