Secure Wiegand communications
DCFirst Claim
Patent Images
1. A communication method, comprising:
- operating a credential reader in a first mode of operation, the credential reader comprising at least one of a microprocessor and firmware that enable the credential reader to operate in the first mode of operation;
receiving, at a communication interface of the credential reader, a message from an upstream device;
determining, by the credential reader, that the message was transmitted by the upstream device; and
based on determining that the message was transmitted by the upstream device, transitioning the credential reader from the first mode of operation to a second mode of operation, wherein the first mode comprises a non-secure Wiegand mode and wherein the second mode comprises at least one of a secure Wiegand mode and a packet-mode.
0 Assignments
Litigations
1 Petition
Accused Products
Abstract
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators.
240 Citations
14 Claims
-
1. A communication method, comprising:
-
operating a credential reader in a first mode of operation, the credential reader comprising at least one of a microprocessor and firmware that enable the credential reader to operate in the first mode of operation; receiving, at a communication interface of the credential reader, a message from an upstream device; determining, by the credential reader, that the message was transmitted by the upstream device; and based on determining that the message was transmitted by the upstream device, transitioning the credential reader from the first mode of operation to a second mode of operation, wherein the first mode comprises a non-secure Wiegand mode and wherein the second mode comprises at least one of a secure Wiegand mode and a packet-mode. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable medium comprising processor-executable instructions, the processor-executable instructions comprising:
-
instructions configured to cause a credential reader to operated in a first mode of operation; instructions configured to receive a message at the reader, the message being received from an upstream device; instructions configured to determine that the message was transmitted by the upstream device; and instructions configured to transition the credential reader from the first mode of operation to a second mode of operation, wherein the transition from the first mode of operation to the second mode of operation occurs based on determining that the message was transmitted by the upstream device, wherein the first mode comprises a non-secure Wiegand mode and wherein the second mode comprises at least one of a secure Wiegand mode and a packet-mode. - View Dependent Claims (7, 8, 9, 10)
-
- 11. A credential reader comprising at least one of a microprocessor and firmware that enable the reader to operate in a first mode of operation, receive a message from an upstream device, determine that the message was transmitted by the upstream device, and, in response thereto transition the credential reader from the first mode of operation to a second mode of operation, wherein the transition from the first mode of operation to the second mode of operation occurs based on determining that the message was transmitted by the upstream device, wherein the first mode comprises a non-secure Wiegand mode and wherein the second mode comprises at least one of a secure Wiegand mode and a packet-mode.
Specification