SECURE WIEGAND COMMUNICATIONS
First Claim
Patent Images
1. A communication method, comprising:
- operating a credential reader in a first mode of operation;
receiving, at the credential reader, a message from an upstream device;
determining, by the credential reader, that the message was transmitted by the upstream device; and
based on determining that the message was transmitted by the upstream device, transitioning the credential reader from the first mode of operation to a second mode of operation.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators.
2 Citations
20 Claims
-
1. A communication method, comprising:
-
operating a credential reader in a first mode of operation; receiving, at the credential reader, a message from an upstream device; determining, by the credential reader, that the message was transmitted by the upstream device; and based on determining that the message was transmitted by the upstream device, transitioning the credential reader from the first mode of operation to a second mode of operation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium comprising processor-executable instructions, the processor-executable instructions comprising:
-
instructions configured to cause a credential reader to operated in a first mode of operation; instructions configured to receive a message at the reader, the message being received from an upstream device; instructions configured to determine that the message was transmitted by the upstream device; and instructions configured to transition the credential reader from the first mode of operation to a second mode of operation, wherein the transition from the first mode of operation to the second mode of operation occurs based on determining that the message was transmitted by the upstream device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
- 15. A credential reader comprising at least one of a microprocessor and firmware that enable the reader to operate in a first mode of operation, receive a message from an upstream device, determine that the message was transmitted by the upstream device, and, in response thereto transition the credential reader from the first mode of operation to a second mode of operation, wherein the transition from the first mode of operation to the second mode of operation occurs based on determining that the message was transmitted by the upstream device.
Specification