摘要:
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators.
摘要:
The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators.
摘要:
The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s).
摘要:
The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s).
摘要:
A method and device for protecting sensitive information stored on a mobile device capable of wireless communication is described. The protection is provided by permitting wireless transmission of the sensitive information only if data received from an optical sensor or a magnetic sensor satisfies a predetermined requirement.
摘要:
Methods, systems, and devices for managing energy consumption in multi-room facilities are provided. In particular, intelligent mechanisms for determining a location of a mobile device (124) associated with a room (112a, 112b . . . 112n) and then for managing energy settings, especially setback controls, of that room (112a, 112b . . . 112n) are provided. Some logic for implementing these mechanisms may be provided in a mobile device (124) and in-room device, such as a motion detector, thermostat, HVAC controller, door, lock, television, set top box, etc.
摘要:
Methods, systems and devices for employing the Near Field Communications (NFC) protocol are described. Specifically, a safe or similar in-room security device is configured to exchange communications with one or more NFC-enabled devices in accordance with the NFC protocol. Based on the exchange of information with the NFC-enabled devices, the safe is configured to make one or more access control decisions.
摘要:
The present invention is directed toward secure access systems. Specifically, a method, system, and device are described that employ a synchronized pseudo-random number generator to secure communications between endpoints involved in a communication. If synchronization is lost between two devices, the two devices can regain synchronization by switching to use of a different pseudo-random number generator that is used for resynchronization instead of communications.
摘要:
The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s).
摘要:
Readers are associated with a number of access credentials and, once authenticated by the reader, may grant the holder of the access credential access to a secured asset. Readers may become the target of attack, such as when an unauthorized party attempts to gain access to the interior of the reader or removes the reader from an installed location. Once removed the reader may be reinstalled in another location or a counterfeit reader used in its place. By providing a paired tamper credential, the reader may deny otherwise authorized access to the secured asset if the tamper credential fails to respond appropriately. The tamper credential may fail to respond due to distance, such as when the reader alone is relocated, or the tamper credential is damaged, such as during an attempt to gain access the interior of the reader and/or remove the reader from its installed location.