Secure wiegand communications
First Claim
Patent Images
1. A method, comprising:
- enabling first and second communication devices with first and second PRNGs, respectively, wherein the first and second PRNGs are synchronized and used to secure communications between the first and second communication devices;
determining that synchronization between the first and second PRNGs has been lost; and
invoking third and fourth PRNGs at the first and second communication devices respectively, wherein the third and fourth PRNGs are used to resynchronize the first and second PRNGs, wherein the first and second communication devices execute their respective PRNGs in firmware and/or with a microprocessor executing instructions stored in non-transitory computer-readable memory.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed toward secure access systems. Specifically, a method, system, and device are described that employ a synchronized pseudo-random number generator to secure communications between endpoints involved in a communication. If synchronization is lost between two devices, the two devices can regain synchronization by switching to use of a different pseudo-random number generator that is used for resynchronization instead of communications.
-
Citations
16 Claims
-
1. A method, comprising:
-
enabling first and second communication devices with first and second PRNGs, respectively, wherein the first and second PRNGs are synchronized and used to secure communications between the first and second communication devices; determining that synchronization between the first and second PRNGs has been lost; and invoking third and fourth PRNGs at the first and second communication devices respectively, wherein the third and fourth PRNGs are used to resynchronize the first and second PRNGs, wherein the first and second communication devices execute their respective PRNGs in firmware and/or with a microprocessor executing instructions stored in non-transitory computer-readable memory. - View Dependent Claims (2, 3, 4)
-
-
5. A system, comprising:
first and second communication devices configured to communicate with first and second PRNGs, respectively, wherein the first and second PRNGs are synchronized and used to secure communications between the first and second communication devices, the first and second communication devices being further configured to invoke third and fourth PRNGs, respectively, to resynchronize the first and second PRNGs when synchronization between the first and second PRNGs has been lost. - View Dependent Claims (6, 7, 8)
-
9. A first communication device comprising:
firmware comprising and configured to execute a first PRNG, the first PRNG, when executed by the firmware, enabling the first communication device to securely communicate with a second communication device that has a second PRNG synchronized with the first PRNG, the first communication device further comprising a third PRNG in the firmware that is configured to be invoked by the firmware to resynchronize the first PRNG with the second PRNG when the first and second PRNGs become unsynchronized. - View Dependent Claims (10, 11, 12)
-
13. An access control reader, comprising:
-
a non-transitory computer-readable medium comprising instructions that are executable by a processor, the instructions including a first PRNG, the first PRNG, when executed, enabling the reader to securely communicate with a remote communication device that has a second PRNG synchronized with the first PRNG, the instructions further including a third PRNG that is configured to be invoked to resynchronize the first PRNG with the second PRNG when the first and second PRNGs become unsynchronized; and a processor that executes the instructions stored in the non-transitory computer-readable medium. - View Dependent Claims (14, 15, 16)
-
Specification