Portable electronic door opener device and method for secure door opening
First Claim
1. A method for secure unlocking of a door based on a shared secret key, comprising the steps of:
- providing a portable computing device, wherein the computing device is equipped with a memory, and the memory holds shared secret keys with matching door identifiers and a first certificate, wherein the computing device is adapted for performing operations with shared secret keys and certificates, and wherein the computing device is adapted for communicating with the door;
the computing device communicating to the door a device identifier;
the door makes a decision to issue a challenge to the computing device, wherein the challenge is issued only on randomly selected occasions;
the computing device responding to the challenge by demonstrating possession of a private key of the first certificate;
after a successful response to a challenge and after receipt of computing device identifier when a challenge decision is not made the door responding with a door identifier and with an encrypted message, wherein the message is encrypted with the shared secret key, and wherein using the shared secret key for encrypting the message resulted from recognizing the device identifier communicated by the computing device;
the computing device responding with a signal attesting decryption of the message, wherein the message has been decrypted in the computing device by the shared secret key, and wherein using the shared secret key for decrypting the message resulted from recognizing the door identifier transmitted by the door; and
the door unlocking upon recognizing validity of the signal attesting decryption of the message.
3 Assignments
0 Petitions
Accused Products
Abstract
A portable computing device for opening a door (an electronic door opener) and a method for its use is disclosed. The computing device has a shared secret key, a standard certificate, means for communicating with the door, and a processor adapted for performing operations with shared secret keys and standard certificates. The door also possesses the same shared secret key. Under normal operation, messages encoded with the shared secret key serve to establish a right to open the door. The portable computing device'"'"'s standard certificate is used to respond to occasional challenges by the door, and to generate the shared secret key. Biometric capabilities of the portable computing device add an additional layer of security in screening the identity of the user of the device. A security system for controlling access, involving a first plurality of computing devices and a second plurality of doors, and operating based on shared secret keys and occasional challenges is also disclosed.
57 Citations
14 Claims
-
1. A method for secure unlocking of a door based on a shared secret key, comprising the steps of:
-
providing a portable computing device, wherein the computing device is equipped with a memory, and the memory holds shared secret keys with matching door identifiers and a first certificate, wherein the computing device is adapted for performing operations with shared secret keys and certificates, and wherein the computing device is adapted for communicating with the door; the computing device communicating to the door a device identifier; the door makes a decision to issue a challenge to the computing device, wherein the challenge is issued only on randomly selected occasions; the computing device responding to the challenge by demonstrating possession of a private key of the first certificate; after a successful response to a challenge and after receipt of computing device identifier when a challenge decision is not made the door responding with a door identifier and with an encrypted message, wherein the message is encrypted with the shared secret key, and wherein using the shared secret key for encrypting the message resulted from recognizing the device identifier communicated by the computing device; the computing device responding with a signal attesting decryption of the message, wherein the message has been decrypted in the computing device by the shared secret key, and wherein using the shared secret key for decrypting the message resulted from recognizing the door identifier transmitted by the door; and the door unlocking upon recognizing validity of the signal attesting decryption of the message. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A security system for controlling access, comprising:
-
a plurality of doors and a plurality of portable computing devices for opening the plurality of doors; wherein each computing device is equipped with a memory that holds a unique first certificate, door identifiers for all the doors out of the plurality of doors that the computing device is permitted to open, and shared secret keys that match each door identifier of the plurality of doors that the computing device is permitted to open; wherein any one of the doors possesses a matching shared secret key for each computing device that is permitted to open the door, wherein the matching information comprises a device identifier, wherein the device identifier is linked to a public key of the unique first certificate and the shared secret key, and wherein the plurality of doors and the plurality of computing devices have means for communicating between any device and any door and; wherein the any one of the plurality of doors is adapted to recognize the device identifier, and further adapted to use the matching information to validate identicalness of the shared secret key, and to issue a challenge on randomly selected occasions to any computing device, using the public key of the unique first certificate. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
Specification