Digital Key With Monetary Value
20220366408 · 2022-11-17
Inventors
Cpc classification
H04L63/0428
ELECTRICITY
G06Q20/127
PHYSICS
H04L9/088
ELECTRICITY
B60L53/65
PERFORMING OPERATIONS; TRANSPORTING
H04L9/083
ELECTRICITY
H04L2209/56
ELECTRICITY
H04L63/10
ELECTRICITY
H04L9/0877
ELECTRICITY
G06Q2240/00
PHYSICS
B60L53/665
PERFORMING OPERATIONS; TRANSPORTING
International classification
G06Q20/40
PHYSICS
Abstract
The disclosure is directed to use of digital keys in providing access to secured locations, goods and resources as well as other assets. The access may be fee based with the disclosure further directed to including fee payment authorization into the access process. Electronic locks may be employed within modules to faciltiate the access. The digital keys may be accompanied with commands for the electronic locks and/or modules accomodating them to execute in the course of providing the access. The digital keys may be shared, limited to single or multiple use and may be lock agnostic. The commands may be sent from a smart mobile device and be digitally signed for subsequent attestation by the lock for authenticity verification. The digital keys may be generated and otherwise handled under one of a series of escalating security encryption methods typically used and reserved for financial transactions.
Claims
1. A system for controlling access permission to at least one of a module-controlled location and module-controlled service, the system comprising: a backend configured to generate at least one digital key based upon a selected one of a plurality of escalating encryption security level encryption standards; a frontend arranged in communication with the backend, the frontend configured to establish an encrypted communication with the module and communicate the digital key and a module executable command to the module via the encrypted communication; wherein the encryption standards comprise at least one key generator service based upon at least one of Payment Card Industry Data Security Standards and certified HSM; and wherein the digital key is configured to enable the access permission.
2. The system according to claim 1, wherein: the digital key is configured to trigger a payment verification process; and the access permission is triggered by approval received from the payment verification process.
3. The system according to claim 2, wherein the front end is configured to communicate at least one of an approval of access and a denial of access, the approval of access and the denial of access arising out of the payment verification process.
4. The system according to claim 3, wherein: the module is configured to perform in response to the approval of access; and the module is configured to not perform in response to the denial of access.
5. The system according to claim 4, wherein the module comprises at least one of: a charging station configured to release charging power in response to execution of the the module executable command; an electric lock configured to enable egress and ingress to at least one of a location and a service, in response to execution of the mobile executable command; and a virtual lock configured to enable access to virtual resources.
6. The system according to claim 1, wherein at least one of the frontend and the backend is further configured to count a number of times an executable command has been communicated and prevent subsequent communication of the executable command after the count has exceed a threshold.
7. The system according to claim 1, wherein the module is configured to authenticate the digital key and to execute the command if the digital key is authentic.
8. The system according to claim 7, wherein the front end further comprises a smart mobile device configured to affect at least one of the encrypted communication and generation of digital keys.
9. The system according to claim 8, wherein the digital key is configured to be at least one of unique and assignable to a single user.
10. The system according to claim 9, wherein the backend is configured to authenticate digital keys and communicate digital key authentication to the module.
11. The system according to claim 10, wherein the digital key is asymmetric, and the backend comprises a certification authority for attesting public keys.
12. The system according to claim 11, wherein communication within the backend is encrypted and the at least one digital key is generated in a virtual private data center with controlled access within the backend.
13. The system according to claim 12, wherein: the backend is configured to generate a list of blacklisted digital keys and communicate the list to the module; and the module is configured to query the list during digital key authentication.
14. The system according to claim 13, wherein the backend is configured to generate module maintenance information and communicate the module maintenance information at least one of directly to the module and indirectly to the module via at least one smart mobile device.
15. A method for controlling access to a module-controlled location, the method comprising the steps of: generating in a backend at least one digital key based upon one of a plurality of escalating encryption security level encryption standards, the digital key comprising at least one module executable command and a payment verification trigger; communicating the at least one digital key to a smart mobile device; establishing an encrypted communication channel between the smart mobile device and the module; communicating the at least one digital key to the module via the encrypted communication channel; authenticating the at least one digital key at the module; executing the module executable command at the module if the at least one digital key is authentic and not executing the module executable command if the at least one digital key is not authentic; and wherein the encryption standards comprise at least one key generator service based upon at least one of Payment Card Industry Data Security Standards and certified HSM.
16. The method according to claim 15, wherein: the module is configured to authenticate the digital key and to execute the module executable command if the digital key is authentic; and the front end is configured to communicate at least one of an approval and denial arising out of a payment verification process.
17. The method according to claim 16, wherein the module is configured to: perform the payment verification process; and ignore the mobile executable command after receipt of the denial.
18. The method according to claim 17, wherein at least one of the frontend and the backend is further configured to count a number of time the mobile executable command has been communicated and prevent subsequent communication of the mobile executable command after the count has exceed a threshold.
19. The method according to claim 18, wherein the module comprises at least one of: a charging station configured to release charging power in response to execution of the module executable command by the module; an electric lock configured to enable egress and ingress to at least one of a location and a service; and a virtual lock configured to enable access to virtual resources.
20. The method according to claim 19, wherein: the backend is configured to generate a list of blacklisted digital keys and communicate the list to the module and the module is configured to query the list during digital key authentication; and the backend is configured to generate module maintenance information and communicate the module maintenance information directly to module and indirect to the module via at least one smart mobile device.
Description
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
[0018] The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles, wherein:
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
DETAILED DESCRIPTION OF THE INVENTION
[0029] A high level overview of system architecture which may be employed by embodiments of the present disclosure is depicted in
[0030] Any number of communications within or between the frontend and backend respectively may be encrypted. Routers are well known in the computer arts as a networking device configured to forward packet data between computer networks, while API gateways are known servers which may act as API front-ends for receiving API requests, enforcing throttling and security policies, and passing requests to backend services as well as responses back out to respective requesters. The aforementioned communications may comprise API requests. Accordingly, a user in the frontend is in communication with applications running in the backend. Such applications may include those devoted to digital key generation; user, permission and device management; online device monitoring, procurement and firmware updates; and 3.sup.rd party solutions including financial payments processing which may be engaged via application of particular content of the digital key itself.
[0031] In order to ensure secure communications between user and module, cryptographic systems may be employed in key generation and creation of an encrypted communication channel between user and module. Once secure communication is established between the smart mobile device 102 and module 106, commands, updates and sensitive user data may be communicated between the two to, for example, affect an action at the module.
[0032] The module may comprise an electronic lock or its equivalent depending upon application configured and arranged to facilitate select access to particular physical or virtual locations as well as goods and/or services. Examples of modules applying electronic locks for physical locations may include storage lockers, dwellings, buildings, motor vehicles, elevators and the like. The module may further comprise a service or commodity provider reactive to commands with payment authentications. Examples of same include provision of electrical power for charging electric vehicles and the like. Still other forms of payment authentication, in particular via backend 110, may be implemented.
[0033] Digital key generation is a well-known process in computer cryptography which essentially uses integers as keys. The keys may be randomly generated using for example known random number generators or pseudorandom number generators—a computer algorithm that, when executed, produces data that appears to be random when under analysis. Sizes of keys may also vary with, for example, larger keys being employed when greater security against discovery is desired.
[0034] By way of embodiments of the present disclosure, the keys are generated according to pre-selected security levels which may correspond to those typically associated within the financial services industry, such as with financial transactions. For example, the key generation may be secured and performed by a dedicated private hardware solution in a backend with such generation being selectively made in accordance with the Payment Card Data Industry Security Standards (PCI DSS) as well as by certified Hardware Security Module (HSM). For example, a high security level may conform to at least nShield FIPS 140 Level 3 HSM key generation while a standard security level may conform to up to nShield FIPS 140 Level 2 HSM key generation. Application of other security levels are envisioned. Various asynchronous and synchronous cypto algorithms as well as certain hash algorithms may be supported while the lengths and encryption algorythms of the keys may vary depending upon the select security level employed.
[0035] Cryptographic systems, employable by embodiments of the present invention, may include symmetric as well as asymmetric key algorithms. Initial keys may be generated locally in the frontend and module or remotely in the backend. In particular, the keys may be generated at the front end by a smart mobile device or module, as well as in the backend by an appropriately configured server, as may be dependent upon the policy implementations for certain key security levels. In addition, the key exchange may be affected in higher levels of security where an initial key is sent to a smart mobile device and after initial use the module will generate a new key along with other such confidences between the smart mobile device and module. Accordingly, from this moment onwards, only the module and smart mobile device have knowledge of the keys and confidences or secrets for the next lock opening. The key generation at the module is enabled by proprietary software configured to cooperate with the appropriately preconfigured module, the key generation occurring as part of the module registration process with the back end, itself enabled by the smart mobile device and/or online module, or as part of a communication between smart mobile device and module. Additionally, initial digital keys may be generated offline between the module and smart mobile device by triggering initial key exchange via the sharing of a secret, for example, through scanning a QR-code with the instructions to get access to the secret.
[0036] With respect to communication, symmetric key based communication makes use of a single shared key which is kept secret and used to encrypt and decrypt messages. Asymmetric key based communication uses a public key/private key combination wherein the public key may be freely and openly made available and used to decrypt data encrypted with the private key which is kept in secret. Here, a sender encrypts a message with the receiver's public key; only the holder of the private key, in this case the receiver, can decrypt this message. Attestation of the public key may be obtained from the certification authority during the decrypting step in order to ensure that the public key validly belongs to the claimed owner. To this end, embodiments of the present invention employ Public Key Infrastructure (PKI) best practices while offering a proprietary Certification Authority (CA).
[0037] Throughout, message and data are used interchangeably with the understanding that the skilled person when applying the aforementioned would understand that both and/or either of the message and data may be encrypted with at least one of the symmetric and asymmetric keys. Embodiments of the present disclosure are further configured to support any one or more of the following: asynchronous crypto algorithms RSA, Diffie-Hellman, ECMQV, DSA, KCDSA, ECDSA, ECDH and Edwards (X25519, Ed25519ph); synchronous crypto algorithms AES, AES-GCM, ARIA, Camellia, CAST, RIPEMD160 HMAC, SEED and Triple DES; and hash algorithms SHA-1, SHA-2 (224, 256, 384, 512 bit) and HAS-160. Example digital certificates generation, communication and use in confirmation of communication establishment between smart mobile device and module is set out in
[0038] As is known in the art, PKI is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates as well as manage public-key encryption. Its purpose is to facilitate secure electronic transfer of information through the binding and authenticating of public keys to and with respective communicating entities. Example public key infrastructure and process flow of the implementation of the same is depicted in
[0039] As depicted in
[0040]
[0041] All requests and activities may be saved in a data warehouse which is encrypted and which may be accessed only by key generators and policy servers. Log analyzers may be employed, with the analyzers having read-only access to data, while the data may be anonymized and coded via indexes of locks and users. The keys generated are unique for every user and their respective smart mobile device. Accordingly, the same key cannot be transferred for use in or on another smart mobile device, even if such belongs to the same user. Alternatively, special permissions may be included in the key generation for selective sharing and the like. Keys may be revoked in the backend (e.g. revocation of their digital certificate) rendering the key unusable. Appropriate measures are in place to communicate such revoked or blacklisted keys to online as well as offline locks or modules. Such may include affecting such communication directly or via the proprietary application running on the user's mobile device. The number of keys generated becomes limited only by the capacity of the mobile device to accommodate them.
[0042] Modules, according to embodiments of the present description, may be maintained with provision of maintenance information. Such provision may be regular, periodic or ad hoc. While online modules may receive maintenance information, such as timing, clock, firmware updates, blacklisted keys, and the like, from the backend by virtue of their respective online connections, offline modules receive such information via maintenance channels set up between smart mobile devices, as may be affected by the aforementioned as well as proprietary applications running thereon, and the offline modules. Online modules may also receive maintenance information accordingly.
[0043]
[0044] An example application of the present disclosure is set out in
[0045]
[0046] Where the module is not configured to confirm a payment request process and/or by selection of the user, credit card payment requests may be processed using the network 308 as a payment gateway. Here, as with
[0047]
[0048] When registered, the user may become a module owner and will receive an appropriate digital key to use the module. Alternatively, the user may receive the key from another module owner (634, 636). If the user is the module owner, the user will use their smart mobile device to identify the module intended for tie into the user's account. The identification may be effected by scanning a QR code and the like present on the module or via other similar such identification means. Such identification may find application with offline module 620 or online module 618. Once identified, the module is also registered in the first application 606. Registrations may be stored in a database as set out hereinabove.
[0049] The first application 606 proceeds to obtain 610 from a second application 608, via an API, the generation of the digital key for the user along with any related and/or proprietary applications and modules as communicated within the user's registration. The generated digital key may be then related to the registered module and generated by the example arrangement set out above. The second application 610 may also be running on a server and include appropriately configured functionality to generate digital keys in accordance with embodiments of the present disclosure. The first application 606 further requests 614, via an API, device data and, optionally, module opening or unlocking via LAN, etc. with digital keys from a third application 616 running on a server and appropriately configured to be tasked with online device 618 monitoring 620 procurement and maintenance information updates. The module opening may be obtained for online modules responsive to online commands instigated by at least the third application 616 or for offline modules (620) as may be instigated as part of the registration process or subsequently thereafter in order to facilitate ease of use. An administration tool 630 to at least monitor logs and manage users, devices and permissions may be appropriately configured and arranged in communication 632 with the first application 606. The first application 606 may exchange user and key information, though not necessarily the digital key itself, with third party solutions 622 which, as connected via an API 626, may also grant access, generate keys and revoke keys as depending upon particular solution and administration 624 thereof. The digital keys may now be sent back (612) to the smart mobile device 604 for use in communication with a module. Two modules which may include electronic locks are depicted: an offline lock 620 arranged in communication 628 with mobile device 604 and an online lock 618 also in communication 628 with mobile device 604 but also in networked communication with the aforementioned applications and the like. The communications 628 may be proximity based and comprise any communication scheme and standard envisioned by the skilled person.
[0050] A method for communicating between a smart mobile device and a module is set out in
[0051] Another method according to an embodiment of the present disclosure is set out in
[0052] Another method according to another embodiment of the present disclosure is set out in 3144969151781450 [0054] g0czibdmahfh5m793ptvtm871oqb6qkq [0055] The above result is communicated back (step 918) to the module which then decrypts the result (step 920) with the known user key. Such may appear as follows: [0056] g0czibdmahfh5m793ptvtm871oqb6qkq
3144969151781450 [0057] = [0058] 1257282715093802
The module then compares the aforementioned second result with the aforementioned randomized string (step 922). Where there is a match (YES), the module would know that the aforementioned was encrypted with the same user key and the module triggers the command, such as opening the gate (932). Where there is not a match (NO), a counter is started (step 926) for execution of a number of retries (928) of step 724 which, if any are successful (YES) result in the command being executed (step 932, gate open). If the number of retries is exceeded without success (NO), the command is blocked (930). Alternatively, the number of retries may be time based. The module may have one master key, while the user may have at least 99 unique user keys. While the aforementioned has been described with respect to unlocking access to a location, such may be applied to the unlocking of access to commodities, goods and/or services.
[0059] While application of embodiments of the present disclosure are set out above with respect to the modules being online and offline locks, other embodiments may be envisioned. For example, an embodiment of the present disclosure may be applied to the controlled access to software. Such access may pertain to the initial installation on a suitable device, access to software already running on a device and the like.
[0060] Further embodiments may include application to elevators and other such transportation means wherein a particular interaction is required to enable the transportation, the interaction including certain authentications and/or commands from the transportee. Such applications may include certain security features such as time based command entry. For example, a user running the proprietary software on its smart mobile device may have a certain time span, such as 10 seconds, in which to enter a desired floor, once the smart mobile device authenticated itself with the elevator. Other transportation may include private, commercial and public motor vehicles.
[0061] The modules described herein may be applied to at least one of a door lock module, a garage door module, a car gate module, a software access module, a elevator control module, a vehicle control module, a parcel delivery cabinet and a locker control module. Here, the module affects entry, egress, access and the like, as per the particular application, in a manner as described herein.
[0062] Communication in the present embodiments may be affected by communication modules comprising network and communication chips, namely, semiconductor integrated circuits that use a variety of technologies and support different types of serial and wireless technologies as envisioned by the skilled person. Example serial technologies supported by the communication module include RS232, RS422, RS485, serial peripheral interface, universal serial bus, and USB on-the-go, Ethernet via RJ-45 connectors or USB 2.0. Example wireless technologies include code division multiple access, wide band code division multiple access, wireless fidelity or IEEE 802.11, worldwide interoperability for microwave access or IEEE 802.16, wireless mesh, and ZigBee or IEEE 802.15.4. Bluetooth® or NFC chips may be used to provide wireless connectivity in solution-on-chip platforms that power short-range radio communication applications. The communication module may be configured to operate using 3G, 4G or 5G technology standards, including: universal mobile telecommunications systems, enhanced data rates for global evolution and global system for global communication. The 4G standard is based solely on packet switching, whereas 3G is based on a combination of circuit and packet switching.
[0063] Processing in the present embodiments may be affected by processors disposed in communication with one or more memory devices, such as a RAM or a ROM, via a storage interface. The storage interface may connect to memory devices including, without limitation, memory drives, removable disc drives, etc., employing connection protocols such as serial advanced technology attachment, integrated drive electronics, IEEE-1394, universal serial bus, fiber channel, small computer systems interface, etc. The memory drives may further include a drum, magnetic disc drive, magneto-optical drive, optical drive, redundant array of independent discs, solid-state memory devices, solid-state drives, etc.
[0064] Memory devices may be used to store a collection of program or database components, including, without limitation, an operating system, a user interface application, a user/application data (e.g., any data variables or data records discussed in this disclosure), etc. The operating system may facilitate resource management and operation of the computer system. Examples of the operating system include, without limitation, Apple Macintosh OS X, Unix, Unix-like system distributions, Linux distributions, IBM OS/2, Microsoft Windows, Apple iOS, Google Android, Blackberry OS, or the like. The user interface may facilitate display, execution, interaction, manipulation, or operation of program components through textual or graphical facilities, including but not limited to touch screens. For example, user interfaces may provide computer interaction interface elements on a display system operatively connected to the computer system, such as cursors, icons, check boxes, menus, scrollers, windows, widgets, etc. Graphical user interfaces (GUIs) may be employed, including, without limitation, Apple Macintosh operating systems' Aqua, IBM OS/2, Microsoft Windows (e.g., Aero, Metro, etc.), Unix X-Windows, web interface libraries (e.g., ActiveX, Java, Javascript, AJAX, HTML, Adobe Flash, etc.), or the like.
[0065] It will be appreciated that, for clarity purposes, the above description has described embodiments of the technology described herein with reference to different functional units and processors. However, it will be apparent that any suitable distribution of functionality between different functional units, processors or domains may be used without detracting from the technology described herein. For example, functionality illustrated to be performed by separate processors or controllers may be performed by the same processor or controller. Such may be located on individual servers, co-located and the like as envisioned by the skilled person. Hence, references to specific functional units are only to be seen as references to suitable means for providing the described functionality, rather than indicative of a strict logical or physical structure or organization.
[0066] Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.
[0067] It is intended that the disclosure and examples be considered as exemplary only, with a true scope of disclosed embodiments being indicated by the following claims.