×

Method and apparatus for access control and/or identification

  • US 5,452,357 A
  • Filed: 03/06/1995
  • Issued: 09/19/1995
  • Est. Priority Date: 01/18/1991
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for access control for authorizing a user device, comprising the steps of:

  • generating in an authorizing device an identification data signal representative of identification data unique to the user device;

    generating in the authorizing device an encrypted data signal includingdata encrypted depending on the identification data and having been calculated mod n, where n is a product of at least two prime numbers;

    providing the encrypted data signal to the user device from the authorizing device;

    exchanging between the user device and a verifier device at least a portion of the encrypted data;

    checking by the verifier device the validity of the data exchanged on a mod n basis; and

    further comprising authorizing steps performed in an initial user set-up interval including;

    a) combining by the authorizing device the identification data with public key data PKj and data representative of a number c to produce data representative of a combined number G having a d-th root g mod n such that G=gd mod n, and such that each PKj has ε

    roots rood n, designated SKj-1 ;

    b) storing data representative of g and n in a memory included in the user device; and

    further comprising verifying steps including;

    c) sending data representative of g from the user device to the verifier device;

    d) computing, in the verifier device, G=g2 mod n; and

    separating, in the verifier device, the identification data and the public key data PKj from G;

    e) selecting, in the user device, a random number δ

    in the range ##EQU12## and computing in the user device, a value E where E=δ

    .sup.ε

    mod n; and

    sending E to the verifier device;

    f) selecting in the verifier device a random binary vector v where v=(v1 v2 . . . vk); and

    sending v to the user deviceg) computing in the user device;

    ##EQU13## sending z to the verifier device;

    h) checking in the verifier device to determine if;

    ##EQU14## wherein ε

    =2 or ε

    =3 and a and b are a constant, especially a=b=1.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×