Distributed Access Control and Authentication
First Claim
Patent Images
1. A wireless communication device comprising:
- a radio frequency transceiver, capable of communicating wirelessly with a telecommunications network;
a secondary transceiver capable of wirelessly communicating with an electronic security system;
a memory device; and
a processor in communication with the memory device, the RF transceiver and the secondary receiver, the processor being capable of generating a first concatenated hash combining challenge data transmitted from the electronic security system and a pass code for the electronic security system, wherein the hash is transmitted via the secondary transceiver to the electronic security system whereby the electronic security system is unlocked.
2 Assignments
0 Petitions
Accused Products
Abstract
Presented are apparatus and method for distributed authentication and control of an electronic security device. The method includes prompting an authority for access to an ESS and providing a response package by the authority, wherein the response package comprises a first hash value combining challenge data and a pass code for the ESS. Upon receipt of the response package, the first hash value and a second hash value generated by the by the ESS may be prepared and if the first hash value and the second hash values match, the ESS may be unlocked.
99 Citations
20 Claims
-
1. A wireless communication device comprising:
-
a radio frequency transceiver, capable of communicating wirelessly with a telecommunications network; a secondary transceiver capable of wirelessly communicating with an electronic security system; a memory device; and a processor in communication with the memory device, the RF transceiver and the secondary receiver, the processor being capable of generating a first concatenated hash combining challenge data transmitted from the electronic security system and a pass code for the electronic security system, wherein the hash is transmitted via the secondary transceiver to the electronic security system whereby the electronic security system is unlocked. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for distributed authentication comprising:
-
prompting an authority for access to an electronic security system; receiving a first hash value combining challenge data and a pass code for the electronic security system from the authority; comparing the first hash value and a second hash value generated by the electronic security system; and
,if the first hash value and the second hash values match, unlocking the electronic security system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer readable medium containing instructions to:
-
receive a response package from an authority, wherein the response package comprises a first hash value; generate a second hash value concatenating challenge data and a pass code for an electronic security system compare the first hash value and the second hash value; and
,if the first hash value and the second hash values match, unlock the electronic security system. - View Dependent Claims (19, 20)
-
Specification