Patent classifications
G07C2009/00412
Enhanced Security for Contactless Access Card System
An access card may store an encrypted operation key and a key used to read the encrypted operation key from the access card. The encrypted operation key and the key may be based on a unique identifier (UID) of the access card. The encrypted operation key may be obtained by encrypting an operation key using a cryptographic key that is also based on the UID of the access card. An access card reader may read the UID from the access card and use it to generate the key used to read the encrypted operation key from the access card. The access card read may also use the UID read from the access card to generate a cryptographic key used to decrypt the encrypted operation key. The access card reader may validate the decrypted operation key and determine whether to grant or deny access, for example, via an access control device.
SECURITY SYSTEM FOR A MOVEABLE BARRIER OPERATOR
Electronic systems are provided for secure actuation of a remote device such as a moveable barrier operator. The systems address the “man in the middle” problem of persons intercepting and duplicating radio frequency signals from a control device by introducing timing parameters into a bidirectional communication sequence between at least two devices.
CONTROL DEVICE AND CONTROL METHOD
A control device comprising, a control section configured to control an authentication process of performing a process related to device authentication together with at least one communication device on a basis of information included in a signal received through wireless communication with the communication device, wherein the control section performs control in such a manner that a signal including authentication information that is information to be used for the authentication process is transmitted to the communication device through the wireless communication, the authentication information varying depending on signal types, which are types of roles of signals to be transmitted to the communication device in the authentication process.
Method for Authenticating Identity of Digital Key, Terminal Device, and Medium
A method for authenticating an identity of a digital key, a terminal, and a medium, where before a second terminal enters a preset operating state from a non-preset operating state, identity authentication is first performed on a user using an identity authentication system of the second terminal, and obtained identity authentication information is stored in a secure element of the second terminal. Then, when a digital key in the second terminal is to be used, the identity authentication information stored in the secure element of the second terminal is sent to a first terminal, and the first terminal may perform verification based on the identity authentication information to determine whether the user using the digital key in the second terminal is an authorized holder of the second terminal.
DOOR LOCK, DEVICE FOR CONTROLLING DOOR LOCK, PROGRAM FOR CONTROLLING DOOR LOCK AND SERVER F OR MANAGING DOOR LOCK
Provided is a door lock. The door lock includes a door lock body installed on a door and having an opening/closing device for opening and closing the door; a memory embedded in the door lock body to store a door lock identifier including a door recognition code assigned to the door and a door lock ID matched with the door recognition code; an antenna provided in the door lock body to sequentially receive a first RF signal and a second RF signal from a reader; and a control unit configured to transmit the door recognition code to the reader through the antenna such that the door recognition code together with a reader recognition code previously assigned to the reader is authenticated by a door lock management server that is communicatively connected with the reader when receiving the first RF signal, and configured to determine whether the door lock ID provided from the door lock management server through the reader matches the previously assigned door lock ID of the door lock identifier when receiving the second RF signal to control the opening/closing device such that the door is maintained in a lock state or released from the lock state.
Electric vehicle support system
A vehicle non-use state recognition unit recognizes that an electric vehicle 1 is in non-use state. A battery remaining amount recognition unit recognizes a remaining amount of a battery loaded into the electric vehicle. A battery maintenance request unit transmits, when the vehicle non-use state recognition unit recognizes that the electric vehicle is in non-use state, remaining amount recovery request information for requesting to recover the remaining amount of the battery to a maintenance server which receives a maintenance of the battery when the battery remaining amount recognition unit recognizes that the remaining amount of the battery is a first predetermined value or less.
ELECTRONIC DEVICE AUTHENTICATION METHOD, AND APPARATUS ACCORDING THERETO
The disclosure relates to a method and apparatus for authenticating an electronic device. An operating method of a target device according to an embodiment includes generating a random value based on whether an electronic device is within a certain distance from the target device, transmitting, to the electronic device, first information including the generated random value and identification information of the target device, and receiving, from the electronic device, first authentication information obtained based on the first information, encrypting the received first authentication information and a target device key, transmitting the encrypted target device key and the encrypted first authentication information to a server, and receiving, from the server, second authentication information obtained based on the first authentication information, and determining whether to open or close a door based on a comparison between the second authentication information and the random value.
COMMUNICATION SYSTEM AND CONTROL DEVICE
[Object] To provide a communication system that makes it possible to improve security.
[Solution] Provided is a communication system including: a first device configured to transmit encrypted information that is encrypted by using a first encryption key; and a second device configured to execute a predetermined process based on the encrypted information obtained from the first device, and a second encryption key that is common to the first encryption key. The first device includes a first change section configured to change the first encryption key in the case where a first condition is satisfied. The second device includes a second change section configured to change the second encryption key in the case where a second condition is satisfied, the second condition being common to the first condition.
Wireless device enabled locking system having different modalities
An encrypted security system and associated methods for controlling physical access are described. The system includes a security server configured to receive a request for authentication from a mobile device, the request including information identifying the mobile device and a physical access control device. The security server forwards an encryption message including a plurality of unique identifiers to the physical access control device via the mobile device. The physical access control device is configured to authenticate the plurality of unique identifiers in the encryption message and operate an access control mechanism.
AUTHORIZATION SYSTEM, MANAGEMENT SERVER AND AUTHORIZATION METHOD
[Problem] In guest invitation for a smart lock, a burden on an owner on invitation is reduced and impersonation or invitation of an unintended third party is prevented.
[Solution] A representative guest terminal 102 requesting unlocking of a smart lock 400 generates authentication information referred to at the time of a request for unlocking, imparts a signature to the authentication information, and transmits the authentication information to an owner terminal 101. The owner terminal 101 verifies a signature of the representative guest terminal 102, imparts a signature to the authentication information, and transmits the authentication information to a management server 200. The management server 200 verifies the signatures of the representative guest terminal 102 and the owner terminal 101, stores the owner terminal 101 and the representative guest terminal 102 in association with each other, and stores the authentication information and the representative guest terminal 102 in association with each other. When the management server 200 receives an unlocking request from the smart lock 400 and successfully authenticates the unlocking request by referring to the stored authentication information, the smart lock 400 is unlocked.