Security system
First Claim
1. A method of enabling or activating a protected function, said method comprising:
- storing an authorization code in a wireless communication device;
transmitting an access request from said wireless communication device to an access control device;
receiving an authentication challenge from said access control device at said wireless communication device in response to said access request;
computing an authentication response based on said authentication challenge and said authorization code; and
transmitting said authentication response from said wireless communication device to said access control device.
1 Assignment
0 Petitions
Accused Products
Abstract
An access control system includes an access control device, a wireless communication device, and a central controller. The central controller issues authorization codes to the wireless communication device. The wireless communication device is used by an authorized party to enable or activate a protected function secured by an access control device. To enable or activate the protected function, the authorized party uses the wireless communication device to transmit an access request to the access control device, which responds by transmitting an authentication challenge to the wireless communication device. The wireless communication device must transmit a valid authentication response based on the authentication challenge and a valid authorization code stored in its memory. If a valid authentication response is received, the access control device enables or activates the protected function.
-
Citations
77 Claims
-
1. A method of enabling or activating a protected function, said method comprising:
-
storing an authorization code in a wireless communication device; transmitting an access request from said wireless communication device to an access control device; receiving an authentication challenge from said access control device at said wireless communication device in response to said access request; computing an authentication response based on said authentication challenge and said authorization code; and transmitting said authentication response from said wireless communication device to said access control device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of enabling or activating a protected function, said method comprising:
-
receiving an access request from a wireless communication device at an access control device; transmitting an authentication challenge from said access control device to said wireless communication device in response to said access request; receiving an authentication response based on said authentication challenge and an authorization code; comparing said received authentication response with an expected authentication response; and generating a control signal to permit access to said protected function if said received authentication response matches said expected authentication response. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A method of programming a wireless communication device with an authorization code used to enable or activate a protected function, said method comprising:
-
storing a master code in a central controller; receiving an initialization request from said wireless communication device; computing an authorization code based on said master code at said central controller in response to receipt of said initialization request; communicating said authorization code to said wireless communication device. - View Dependent Claims (37, 38, 39)
-
-
40. A device for enabling or activating a protected function, said device comprising:
-
memory to store an authorization code; a wireless transmitter to transmit an access request and an authentication response to an access control device; a wireless receiver to receive an authentication challenge from said access control device responsive to said access request; a processor to compute said authentication response based on said authentication challenge received from said access control device and said authorization code. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
-
-
60. An access control device to secure a protected function, said access control device comprising:
-
a wireless transceiver to communicate with a wireless communication device; a processor programmed to; generate an authentication challenge in response to an access request from said wireless communication device; transmit said authentication response via said wireless transceiver to said wireless communication device; receive an authentication response from said wireless communication device via said wireless transceiver; compare said received authentication response to an expected authentication response based on said authentication challenge and an authorization code; and generate a control signal to permit access to said protected function if said expected authentication response matches said received authentication response. - View Dependent Claims (61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
-
-
72. A device for issuing authorization code to activate or enable a protected function, said device comprising:
-
memory to store a master code; an interface to communicate with a wireless communication device; a processor programmed to; compute an authorization code based on said master code in response to receipt of an initialization request from said wireless communication device; transmit said authorization code to said wireless communication device. - View Dependent Claims (73, 74, 75, 76, 77)
-
Specification