Access control to predetermined area
    1.
    发明专利
    Access control to predetermined area 审中-公开
    访问预测区域

    公开(公告)号:JP2007305149A

    公开(公告)日:2007-11-22

    申请号:JP2007169854

    申请日:2007-06-28

    CPC classification number: G07C9/00103 G07C9/00023

    Abstract: PROBLEM TO BE SOLVED: To provide a method for an entity to control access of a plurality of users to at least one unconnected door. SOLUTION: The users are mapped into groups. Digital signatures SIGUDd indicating that members of the group has access to the door during a period d is generated by an approval organ per the period d of a series of dates. The SIGUDd to be presented to the door is handed to at least one member of the group for the period d to pass the door. The at least one member of the group is to present the SIGUDd to the door D. The SIGUDd is a digital signature of the approval organ indicating that the members of the group is allowed to access the door during the period d. The door is opened after verifying that the present time is within the period d. COPYRIGHT: (C)2008,JPO&INPIT

    Abstract translation: 要解决的问题:提供一种用于实体控制多个用户访问至少一个未连接的门的方法。

    解决方案:用户被映射成组。 数字签名SIGUDd表明,在一系列日期d期间由批准机构产生的期间d内,该组织的成员可以访问该门。 提交给门的SIGUDd交给小组的至少一名成员通过门。 该小组的至少一名成员是将SIGUDd提交给门D. SIGUDd是批准机构的数字签名,指示该组的成员在该段期间被允许进入门。 验证当前时间是否在d期间内,门被打开。 版权所有(C)2008,JPO&INPIT

    SECURE ID CHECKING
    2.
    发明申请
    SECURE ID CHECKING 审中-公开
    安全认证检查

    公开(公告)号:WO2008105779A2

    公开(公告)日:2008-09-04

    申请号:PCT/US2007012074

    申请日:2007-05-21

    Abstract: A cost-effective system that provides for the efficient protection of transmitted non-public attribute information may be used, for example, to control access to a secure area. Encryption of the attribute information may be performed using symmetric encryption techniques, such as XOR and/or stream cipher encryption. A centralized database that stores and transmits the encrypted attribute information may generate the encryption/decryption key based on selected information bytes, for example, as taken from a card inserted into a handheld device used at the secure area. The selected information to generate the encryption key stream may be varied on a periodic basis by the centralized database. Information as to which selected bytes are to be used for a particular access authorization request may be transmitted to the handheld unit or may be input through action of a user of the handheld unit, for example by entry of a PIN code.

    Abstract translation: 可以使用提供有效保护所传送的非公开属性信息的具有成本效益的系统,例如来控制对安全区域的访问。 可以使用诸如XOR和/或流密码加密之类的对称加密技术来执行属性信息的加密。 存储和发送加密的属性信息的集中式数据库可以基于所选择的信息字节生成加密/解密密钥,例如从插入到安全区域使用的手持设备的卡中取出。 用于生成加密密钥流的所选择的信息可以由集中式数据库周期性地改变。 用于特定访问授权请求的哪些选定字节的信息可以被发送到手持式单元,或者可以通过手持式单元的用户的动作来输入,例如通过输入PIN码。

    ACTUATING A SECURITY SYSTEM USING A WIRELESS DEVICE
    3.
    发明申请
    ACTUATING A SECURITY SYSTEM USING A WIRELESS DEVICE 审中-公开
    使用无线设备启动安全系统

    公开(公告)号:WO2006053178A3

    公开(公告)日:2007-02-22

    申请号:PCT/US2005040865

    申请日:2005-11-09

    Inventor: LIBIN PHIL

    Abstract: Actuating a security system (30) includes providing a first set of access codes to a wireless device (32) and causing the wireless device (32) to transmit the first set of access codes to a first controller (26) that actuates the security system (30) . The first set of access codes provided to the wireless device (32) may expire. Actuating a security system (30) may also include providing expiration dates for each of the first set of access codes provided to the wireless device (32) . Actuating a security system (30) may also include examining each of the expiration dates and, in response to a particular expiration date being prior to a current date, erasing from the wireless device (32) a particular one of the first set of access codes that corresponds to the particular expiration date.

    Abstract translation: 执行安全系统(30)包括向无线设备(32)提供第一组访问代码,并且使无线设备(32)将第一组访问代码发送到第一控制器(26),该控制器致动安全系统 (30)。 提供给无线设备(32)的第一组接入码可能会过期。 启动安全系统(30)还可以包括为提供给无线设备(32)的第一组访问代码中的每一个提供有效期限。 启动安全系统(30)还可以包括检查每个到期日期,并且响应于在当前日期之前的特定有效期,从无线设备(32)擦除第一组访问代码中的特定的一个 这对应于特定的到期日。

    EFFICIENT AND SECURE DATA CURRENTNESS SYSTEMS
    4.
    发明申请
    EFFICIENT AND SECURE DATA CURRENTNESS SYSTEMS 审中-公开
    有效和安全的数据流程系统

    公开(公告)号:WO2004102352A2

    公开(公告)日:2004-11-25

    申请号:PCT/US2004014884

    申请日:2004-05-13

    CPC classification number: H04L9/3247 H04L9/3265 H04L2209/56

    Abstract: Indicating data currentness includes, on any date of a sequence of dates, issuing a proof indicating the currentness status of the data during a particular time interval. The proof may be a digital signature. The time interval may be in the form of a current date and an amount of time. The proof may include a digital signature of the time interval. The proof may include a digital signature of the time- interval and the data. The proof may include a digital signature of the time interval and a compact form of the data, such as a hash. Indicating data currentness may also include distributing the proofs to a plurality of unsecure units that respond to requests by users for the proofs. Indicating data currentness may also include gathering a plurality of separate pieces of data and providing a single proof for the separate pieces of data. The data may be electronic documents.

    Abstract translation: 指示数据电流包括在日期序列的任何日期,在特定时间间隔内发出指示数据的当前状态的证明。 证明可能是数字签名。 时间间隔可以是当前日期和时间量的形式。 证明可以包括时间间隔的数字签名。 该证明可以包括时间间隔和数据的数字签名。 证明可以包括时间间隔的数字签名和诸如散列的紧凑形式的数据。 指示数据电流还可以包括将证明分发到响应用户对证明的请求的多个不安全单元。 指示数据电流还可以包括收集多个单独的数据片段,并为单独的数据片提供单一证明。 数据可能是电子文件。

    LOGGING ACCESS ATTEMPTS TO AN AREA
    5.
    发明申请
    LOGGING ACCESS ATTEMPTS TO AN AREA 审中-公开
    登录访问地区

    公开(公告)号:WO2005010687A3

    公开(公告)日:2007-07-12

    申请号:PCT/US2004022812

    申请日:2004-07-16

    CPC classification number: G07C9/00103 G07C9/00023

    Abstract: Logging events associated with accessing an area includes recording an event associated with accessing the area to provide an event recording and authenticating at least the event recording to provide an authenticated recording. Recording an event may include recording a time of the event. Recording an event may include recording a type of event. The event may be an attempt to access the area. Recording an event may include recording credentials/proofs used in connection with the attempt to access the area. Recording an event may include recording a result of the attempt. Recording an event may include recording the existence of data other than the credentials/proofs indicating that access should be denied. Recording an event may include recording additional data related to the area. Authenticating the recording may include digitally signing the recording. Authenticating at least the event recording may include authenticating the event recording and authenticating other event recordings to provide a single authenticated recording.

    Abstract translation: 与访问区域相关联的记录事件包括记录与访问该区域相关联的事件以提供事件记录和至少认证事件记录以提供经认证的记录。 记录事件可能包括记录事件的时间。 记录事件可能包括记录一种事件。 该事件可能是访问该地区的尝试。 记录事件可能包括与访问该区域的尝试相关联的记录凭证/证明。 记录事件可能包括记录尝试的结果。 记录事件可以包括记录除了表示应该拒绝访问的凭据/证明之外的数据的存在。 记录事件可能包括记录与该区域相关的附加数据。 记录录制可能包括对录音进行数字签名。 至少验证事件记录可以包括认证事件记录和认证其他事件记录以提供单一的认证记录。

    PHYSICAL ACCESS CONTROL
    6.
    发明申请
    PHYSICAL ACCESS CONTROL 审中-公开
    物理访问控制

    公开(公告)号:WO03088166A8

    公开(公告)日:2004-08-05

    申请号:PCT/US0310748

    申请日:2003-04-08

    Applicant: CORESTREET LTD

    CPC classification number: G06Q20/02 G07C9/00039 G07C9/00087

    Abstract: A system and method are disclosed for controlling physical access through a digital certificate validation process that works with standard certificate formats and that enables a certifying authority (CA) to prove the validity status of each certificate C at any time interval (e.g., every day, hour, or minute) starting with C's issue date, D1. C's time granularity may be specified within the certificate itself, unless it is the same for all certificates. For example, all certificates may have a one-day granularity with each certificate expires 365 days after issuance. Given certain initial inputs provided by CA, a one-way hash function is utilized to compute values of a specified byte size that are included on the digital certificate and to compute other values that are kept secret and used in the validation process.

    Abstract translation: 公开了一种用于通过数字证书验证过程来控制物理访问的系统和方法,所述数字证书验证过程使用标准证书格式,并且使得认证机构(CA)可以在任何时间间隔(例如,每天, 小时或分钟),从C的发行日期开始,D1。 C的时间粒度可以在证书本身内指定,除非对所有证书是相同的。 例如,所有证书可能具有一天的粒度,每个证书在发布后365天到期。 给定由CA提供的某些初始输入,单向散列函数用于计算数字证书中包含的指定字节大小的值,并计算保密并在验证过程中使用的其他值。

    PHYSICAL ACCESS CONTROL
    7.
    发明专利

    公开(公告)号:CA2479869C

    公开(公告)日:2013-07-09

    申请号:CA2479869

    申请日:2003-04-08

    Applicant: CORESTREET LTD

    Abstract: A system and method are disclosed for controlling physical access through a digital certificate validation process that works with standard certificate formats and that enables a certifying authority (CA) to prove the validity status of each certificate C at any time interval (e.g., every day, hour, or minute) starting with C's issue date, D1. C's time granularity may be specified within the certificate itself, unless it is the same for all certificates. For example, all certificates may have a one-day granularity with each certificate expires 365 days after issuance. Given certain initial inputs provided by CA, a one-way hash function is utilized to compute values of a specified byte size that are included on the digital certificate and to compute other values that are kept secret and used in the validation process.

    EFFICIENT AND SECURE DATA CURRENTNESS SYSTEMS

    公开(公告)号:CA2525398A1

    公开(公告)日:2004-11-25

    申请号:CA2525398

    申请日:2004-05-13

    Applicant: CORESTREET LTD

    Abstract: Indicating data currentness (20) includes, on any date of a sequence of date s, issuing a proof indicating the currentness status (24) of the data during a particular time interval. The proof may be a digital signature (22). The tim e interval may be in the form of a current date and an amount of time. The pro of may include a digital signature of the time interval. The proof may include a digital signature of the time- interval and the data. The proof may include a digital signature of the time interval and a compact form of the data, such as a hash. Indicating data currentness may also include distributing the proofs to a plurality of unsecure units that respond to requests by users for the proofs. Indicating data currentness may also include gathering a plurality o f separate pieces of data and providing a single proof for the separate pieces of data. The data may be electronic documents.

Patent Agency Ranking