[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

US20180359635A1 - Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices - Google Patents

Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices Download PDF

Info

Publication number
US20180359635A1
US20180359635A1 US16/005,134 US201816005134A US2018359635A1 US 20180359635 A1 US20180359635 A1 US 20180359635A1 US 201816005134 A US201816005134 A US 201816005134A US 2018359635 A1 US2018359635 A1 US 2018359635A1
Authority
US
United States
Prior art keywords
devices
access
partial
user
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US16/005,134
Other versions
US10171444B1 (en
Inventor
Daniel Maurice Lerner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ironclad Encryption Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority claimed from US16/005,040 external-priority patent/US10154021B1/en
Priority to US16/005,134 priority Critical patent/US10171444B1/en
Priority to US16/005,281 priority patent/US10154031B1/en
Priority to US16/005,968 priority patent/US10154015B1/en
Priority to US16/005,918 priority patent/US10154016B1/en
Priority to US16/005,871 priority patent/US10171435B1/en
Priority to US16/006,011 priority patent/US10158613B1/en
Priority to US16/173,179 priority patent/US10616192B2/en
Priority to US16/173,323 priority patent/US10686764B2/en
Priority to US16/173,384 priority patent/US10623384B2/en
Priority to US16/173,258 priority patent/US10673830B2/en
Priority to US16/178,795 priority patent/US10637854B2/en
Priority to US16/202,905 priority patent/US10645070B2/en
Publication of US20180359635A1 publication Critical patent/US20180359635A1/en
Priority to PCT/US2018/066014 priority patent/WO2019133326A1/en
Priority to PCT/US2018/066055 priority patent/WO2019133329A1/en
Priority to US16/222,684 priority patent/US10764282B2/en
Priority to US16/222,421 priority patent/US10650139B2/en
Application granted granted Critical
Publication of US10171444B1 publication Critical patent/US10171444B1/en
Priority to US17/045,647 priority patent/US20210160235A1/en
Priority to PCT/US2019/026265 priority patent/WO2019195820A1/en
Priority to PCT/US2019/026270 priority patent/WO2019195821A1/en
Priority to PCT/US2019/026567 priority patent/WO2019199813A2/en
Assigned to LERNER, DANIEL MAURICE reassignment LERNER, DANIEL MAURICE ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LERNER, DANIEL MAURICE
Assigned to IRONCLAD ENCRYPTION CORPORATION reassignment IRONCLAD ENCRYPTION CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LERNER, DANIEL MAURICE
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • G06F17/30283
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/02Access control comprising means for the enrolment of users
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/08With time considerations, e.g. temporary activation, valid time window or time limitations
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/14With a sequence of inputs of different identification information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Definitions

  • the present disclosure relates to the security of communications, and more particularly to a system that securitizes signals between one or more secure databases for personal security cards either in combination with or between cellular phones to ensure proper entrance or access into secure locations by only approved personnel.
  • Methods and devices for securing (primarily digital and normally two-way) communications using applications that combine securing those communications for wireless/cellular phones with personnel access card readers (or other devices designed to receive security clearance for entry into secure locations) are not yet well established. These combined communication and access devices require using specific techniques essential to denying fraudulent or otherwise unauthorized personnel with the ability to enter or access security protected devices or secure locations.
  • Access control systems such as personnel security cards to limit access to enclosed areas such as buildings, rooms within buildings, or fenced-in regions to only those personnel who have permission to enter are often employed.
  • Conventional access control systems include access card readers at doors of the secured building. People who have permission to enter the building are often provided with an access control card that can be read by access card readers.
  • the card reader reads information from the card, and transmits the information to a control panel, which determines whether the entrance (such as a door) should be unlocked. If the door should be unlocked (i.e., the card is associated with a person who has permission to enter), the control panel then sends a signal to the locking mechanism of the door, causing it to unlock.
  • RFIDs radio frequency identification devices
  • the access card reader includes an RFID transceiver, and the access card includes an RFID tag or transponder.
  • the RFID transceiver transmits a radio frequency query to the card as the card passes over it.
  • the transponder includes a silicon chip and an antenna that enables the card to receive and respond to the RF query.
  • the response is typically an RF signal that includes a pre-programmed identification (ID) number.
  • ID pre-programmed identification
  • the card reader receives the signal and transmits the ID number to the control panel via a wire connection.
  • Conventional card readers are not very sophisticated. These card readers may perform some basic formatting of the identification data prior to sending it to the control panel, but are generally unable to perform more sophisticated functions with regard to securing digital communications.
  • the control panel is typically mounted on a wall somewhere in the building.
  • the control panel conventionally includes a bank of relays that are each controlled by a controller device.
  • the controller device accesses memory to determine whether the identification number received from the card reader is recognized and valid. If so, the controller causes the associated relay to open (or close) and thereby sends a signal to the door lock, which, if the signal is proper, causes the lock to enter the unlocked state.
  • the lock typically remains unlocked for a specified amount of time.
  • control panels consume a relatively large amount of space in relation to the number of doors they control.
  • a control panel typically includes a specified number of relay banks, with each bank uniquely associated with the door it controls. For example, a control panel may have eight relay banks to control eight doors. Such a control panel could easily take up a 2 square foot area when mounted on a wall. If more than eight doors need to be controlled, then an additional control panel must be installed.
  • the “closed” architecture of conventional control panels make them inflexible, costly to maintain, and not user friendly.
  • the closed architecture of the conventional control panels means that their design, functionality, and specifications are not disclosed by the manufacturers or owners.
  • the control panel design is typically very complex, and specialized for a particular purpose, which renders them inaccessible by a typical building owner who has no specialized knowledge.
  • the building owner must call a specialized technician to perform maintenance or upgrading.
  • the monetary costs associated with a technician's services contribute to excessive maintenance costs.
  • a great deal of time is wasted waiting for the service technician to arrive.
  • a mobile phone is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.
  • the radio frequency link establishes a connection to the switching systems of a mobile phone operator, which provides access to the public switched telephone network (PSTN).
  • PSTN public switched telephone network
  • Most modern mobile telephone services use a cellular network architecture, and, therefore, mobile telephones are often also referred to as cellular telephones or cell phones.
  • 21 st century era mobile phones support a variety of other services, such as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming, and digital photography.
  • mobile phones which offer these and more general computing capabilities are referred to within this disclosure as “smartphones”.
  • Computer and associated cellular phone networks have been compromised by determining authorized account codes and passwords, thereby gaining access to proprietary two-way communications for obtaining information and additional capabilities. Attempts to combat these unauthorized communications has taken many forms. Interception of two-way communications of private (and often individual) conversations by government agencies has become common-place.
  • One security measure implemented in typical communication systems is the authentication of communicating devices at registration, initiation or reception of the communication. Authentication is viewed as the process of confirming the identity of the communicating device, perhaps by transmission and reception of an account or identification code and a password. In applications where the communicating device is mobile, authentication often requires communication between or through a plurality of communicating devices or networks in order to verify the identity of the communicating device and often the user of the communicating device.
  • Another serious flaw with existing cellular telephone systems is referred to as the “false mobile station” syndrome. It is presently possible to copy the entire memory contents of a mobile station and to use that information to manufacture clones that can demand and receive service from the network.
  • Cellular phones may be cloned by reading the entire memory contents of the phone, including its identification codes, “secret” keys, internally stored personal identification codes, signatures, etc., and writing the same codes into any number of similar “clone” phones.
  • the cloning procedure can become quite sophisticated and may include software modifications which replace physically stored information with electronically stored information so that a number of stored mobile station identities may be cyclically rotated within one fraudulent mobile station and used to imitate several authentic mobile stations.
  • Many communication systems including cellular telephone networks and personnel security cards having authentication or authorization systems and comprise a vast number of distributed communicating devices that transmit data to a central computer system.
  • the central communication system is in charge of determining whether to allow the communication to go through or not.
  • the central computer system may execute an authorization algorithm to determine if the security card has a valid account or identification number, if there is an available bio-identifier for the individual and, perhaps, if a valid personal identification number has been given or entered.
  • sophisticated “hackers” have been able to duplicate valid identification numbers and determine one or more personal identification numbers.
  • Password protection provides a limited degree of security, primarily protecting a communication from access by persons who casually encounter the file, but this security can also be violated. Encryption is perhaps the most secure means for preventing outsiders from obtaining the content of the communication and, therefore, is in widespread use by corporations throughout the world for many or all of their electronic transactions.
  • the present disclosure provides the ability to secure digital communications for the authorization and authentication of cellular phones together with personnel security cards by combing these devices and using a unique software encryption technique. More specifically, the present disclosure provides for one or more devices comprising a real or virtual master distributed auto-synchronous array (DASA) database located within or external to the one or more devices that at least stores and retrieves data and that includes at least two or more partial distributed auto-synchronous array (DASA) databases wherein the partial DASA databases function in either an independent manner, a collaborative manner or both, and wherein the master and partial DASA databases allow for bi-directional transmission of data to and from multiple partial user devices, to and from multiple partial access devices or to and from both partial user and partial access devices, wherein one or more partial user and partial access devices store and provide at least partial copies of portions of the master DASA database and wherein the master DASA database, the partial DASA databases or both partial and master DASA databases are linked and communicate with each other as well as one or more logging and monitoring databases capable of statistical and numerical calculations utilizing the data, wherein the tools authenticate
  • the devices further operate by transmission of a credential identifier to an access control server when the devices are determined to be operating, a local authentication processor configured to authenticate said credential identifier against entries of one or more keys existing within tables when said access control system is determined to be operating and a input/output processor configured to send a signal to a secured area when said credential identifier has been successfully authenticated; wherein said communication transceiver includes an interface to serve second data that can be displayed to both a user external to said access control devices and displayed on said access control devices themselves.
  • the data is transmitted to a secured area such that the data is transmitted and received by a cellular phone. If access is allowed, a user's device provides use of oral, visual, or text data on a display, as a message that indicates a match so that the user(s) are allowed access.
  • the user's device If access is denied, the user's device provides use of an oral, visual, or text data on a display as a message of denial of the match indicating that the user is denied access.
  • Denial of the match causes an encryption application on the user's device to be removed and to ensure that master keys in a user table are secured, a new master key in the user table is generated either via a signal from the user's device to one or more secured encryption databases or via a signal from a key management system to one or more secured encryption databases.
  • the key management system is a system that provides one or more keys for encryption or decryption or both encryption and decryption as required by the devices.
  • the devices control access to an enclosed area from a group consisting of a building, a room within a building, a cabinet, a parking lot, a fenced-in region, and an elevator.
  • the embodiments can include a signal converter coupled to a communication module that is capable of receiving and transmitting data as signals, wherein the communication module is agnostic to a communication protocol of an access control server that is also a portion of the devices.
  • the signal converter is agnostic to a communication protocol of a local authentication processor and the signal converter is adapted to interface with a plurality of access controllers.
  • a communication transceiver is provided for the partial user device or the partial access device or both and includes at least one of the group consisting of; a serial interface, a TCP/IP interface, an IEEE 802.11 interface, an IEEE 802.15.4 interface, and a secure HTTP interface.
  • the communication transceiver is configured to transmit a credential identifier to access a control server via a wireless communication link.
  • the communication transceiver can receive the credential identifier from a radio-frequency identification (RFID) transponder included in an access control card.
  • RFID radio-frequency identification
  • operational modes of the devices include at least one of a synchronous mode and an asynchronous mode.
  • a credential identifier can be transmitted to an access control server via a wireless communication link.
  • the disclosure also provides for a ubiquitous access control system comprising; a real or virtual master distributed auto-synchronous array (DASA) database located within or external to the access control system that at least stores and retrieves data and that includes at least two or more partial distributed auto-synchronous array (DASA) databases wherein the partial DASA databases function in either an independent manner, a collaborative manner or both, and wherein the master and partial DASA databases allow for bi-directional transmission of data to and from one or more partial user devices, to and from one or more partial access devices or to and from both partial user and partial access devices, wherein the partial devices store and provide at least partial copies of portions of the master DASA database and wherein the master DASA database, the partial DASA databases or both master and partial databases, are linked and communicate with each other as well as with one or more logging and monitoring databases capable of statistical and numerical calculations utilizing the data, wherein the one or more devices authenticate using a first set of computing operations, validates using a second set of computing operations, and wherein a third
  • the user must download application (app) that requires fingerprints (or other/additional individual biomarkers) which must be subsequently validated.
  • the user must then provide a user ID entry and verifies this against a user table to determine if this user is a valid registered UID (user identification).
  • an encryption application is employed to “build” a master key.
  • the master key is sent to a user table via a secure database.
  • the combination of the user ID and the master key are then stored within a storage system (such as a memory chip within the cellular phone or transmitted subsequently or directly into a cloud-based memory system external to the cellular phone).
  • an installation app message is received by the cellular phone prompting the user to either close or finalize the installation application.
  • FIG. 1 is a flow chart describing the installation of a user authentication application for a user onto a cellular/smart phone.
  • FIG. 2 is a flow chart describing the use of an authentication application that creates a user credential such as a QR code onto a cellular/smart phone.
  • FIG. 3 is a flow chart describing the access process for a user with an authenticated credential.
  • the present invention may also include the ability to detect unauthorized users.
  • the inclusion of a user authorization system is beneficial for reducing the use of authentic communicating devices when they have been stolen or lost. Losses due to the use of lost or stolen communicating devices is also very significant, but is inherently limited to the capacity of the authorized communicating device itself, i.e., one communication at a time, a credit limit, etc.
  • the use of lost or stolen communicating devices by unauthorized users may be restricted by the use of user specific codes, such as a personal identification number (PIN), finger print, password, voice commands and the like.
  • PIN personal identification number
  • the host device and/or the communicating device may be programmed to verify the identity and authenticity of the device alone or in combination with the user.
  • the host computer may first verify that the communication is being initiated from an authorized communicating device, then prompt the user to enter a personal identification code (PIN) indicating that the user is also authorized. Only upon satisfaction of these two criteria is the communication to be allowed to proceed. It should be recognized that the host device could be programmed to verify these two codes, or other additional codes and authorizations, in any order.
  • the communicating device itself may require the successful input of a personal identification code prior to enabling or energizing the transaction specific code, any portion of the device identification code or even some portion of the communication itself.
  • a still further aspect of the invention provides for automatic re-synchronization of the transaction specific codes following one or more unauthorized communications.
  • Re-synchronization methods according to the present disclosure may be achieved by programming the host device to reset the a pointer or designated portion within a database regarding transaction specific (TS) codes for a particular identification code upon receiving a series of attempted communications having a series of transaction specific (TS) codes that match a portion of the database. For example, after receiving an attempted communication having a transaction specific (TS) code that is not the next expected transaction specific (TS) code or within the range of tolerance, no further communications using the same identification code can proceed until the transaction specific codes of the communicating device and the host are re-synchronized.
  • TS transaction specific
  • the host device is programmed to allow re-synchronization after receiving three transaction specific codes (i.e., 12, 13, 14) that match a portion of the host database (i.e., 10, 11, 12, 13, 14, 15, 16, etc.) for the given identification code, then the pointer in the host database is reset for the next TS code (i.e., 15) in the database. Subsequent communications may proceed in accordance with the aforementioned methods. It may be beneficial to a separate range of tolerance for re-synchronization in order to prevent re-synchronization at a dramatically different point in the sequence of transaction specific codes.
  • FIG. 1 is a flow chart ( 100 ) describing the installation of a user authentication application ( 112 ) for a user onto a cellular/smart phone in accordance with the present invention. More specifically, the system provides for a user ( 105 ) to operate a secured cellular (“smart”) phone ( 110 ). The user ( 105 ) must download an application (app) ( 120 ) from a device that provides a check on a fingerprint (or other bio-identifier) ( 115 ). These devices require fingerprints (or other/additional individual biomarkers) which must be subsequently validated ( 125 ).
  • the user ( 105 ) When the fingerprint is not valid, the user ( 105 ) is notified ( 130 ) and is prompted to close the install application ( 180 ) which is unloaded ( 185 ). In the case where the fingerprint is validated, the user ( 105 ) must then provide a user ID (UID) entry ( 135 ). This UID entry ( 135 ) must be verified against a user table ( 140 ) which resides within one or more secured distributed auto-synchronous array databases (DASA), ( 147 ) to determine if this user is a valid registered UID ( 150 ).
  • the DASA database can exist in one or more stand-alone storage devices, computers, computer related clouds, the world-wide-web (internet), intranet, and/or servers ( 149 ). In the case when the user ( 105 ) fails to validate, the user is notified ( 160 ) and the application is unloaded ( 180 , 185 ).
  • an encryption application within the DASA database ( 147 ) is employed to “build” a master key ( 155 ).
  • the master key is sent to a user table ( 165 ) via the secured DASA database ( 147 ).
  • the combination of the user ID and the master key ( 170 ) are then stored within a storage system ( 175 ) (such as a memory chip within the cellular phone or transmitted subsequently or directly into a cloud-based memory system external to the cellular phone).
  • an installation application (app) message is received and displayed ( 180 ) by the cellular phone ( 110 ), prompting the user ( 105 ) to finalize the installation application onto the cellular phone ( 110 ) for the user ( 105 ).
  • the user app is subsequently unloaded ( 185 ).
  • FIG. 2 is a flow chart ( 200 ) describing the use of an authentication application that creates a user credential such as a QR code onto a cellular/smart phone in accordance with the present invention. More specifically the system is for a user ( 205 ) that needs access through a secured door (or entrance) and in this instance invokes the use of the user authentication application ( 212 ), (which corresponds to ( 112 ) in FIG. 1 ) onto an encrypted cellular phone ( 210 ).
  • the user ( 205 ) activates the user authentication application ( 212 ) from the cellular phone ( 210 ) which provides a check on a fingerprint (or any other bio-identifier) ( 215 ) that requires fingerprints (or other/additional individual biomarkers) which must be subsequently validated ( 220 ). If determination of validity ( 225 ) fails ( 230 ), the user ( 205 ) is notified ( 230 ) with a message ( 275 ) prompting the user ( 205 ) to close the application ( 212 ) and the application is subsequently unloaded ( 280 ).
  • the storage device ( 245 ) contains records with at least one user record ( 246 ) residing within the DASA database ( 147 ).
  • an encryption key ( 240 ) is generated, utilizing information in the user record ( 246 ), of the DASA database ( 147 ), residing in storage device ( 245 ).
  • a QR code is built ( 250 ) utilizing the encryption key ( 240 ) and information in the user record ( 246 ).
  • the QR code(s) function as a “superset” of synchronous transaction specific codes (TS codes) within the DASA database ( 147 ) user record(s) ( 246 ). More specifically, the QR codes contain all the functionality of the TS codes plus additional specific metadata pertaining to items such as; user temporal information, location, and historical usage.
  • the QR codes utilized in this specific instance can themselves be encrypted with one or more levels of encryption.
  • the QR code is rendered for display ( 255 ) onto the cellular phone ( 210 ) via a “user friendly” text derivation that changes the cellular phone into a “smarter” phone ( 260 ) in that it now has a QR identifier residing on the phone ( 210 ).
  • the QR code timeout threshold ( 265 ) is retrieved from a configuration table also held within the records ( 246 ) of the DASA database ( 147 ).
  • a clock ( 267 ) is preset with this timeout ( 265 ). The clock ( 267 ) is to check to determine if the delay between the start time and end time is properly achieved regarding whether or not the generation of a new QR code has expired ( 270 ).
  • the QR code has not expired it can be used to match that of the receiving portion of the security system described below. If the QR code has expired, then the user application (app) ( 212 ) provides a message that is displayed ( 275 ) on the cellular phone ( 210 ), prompting the user to close the app which is subsequently unloaded ( 280 ).
  • FIG. 3 is a flow chart ( 300 ) describing the access process for a user ( 305 ) with an authenticated credential.
  • the authenticated credential in this instance are one or more QR codes.
  • the system utilizes two separate devices.
  • the user device which is a smarter cell phone ( 360 ) and displays a QR code and corresponds to ( 260 ) in FIG. 2 .
  • the other device is an access device that has been installed in a cellular phone ( 310 ) but can also be a card reader for entrance into a secured location.
  • the user ( 305 ) that needs access through a secured door (or entrance) invokes the use of the smarter cell phone displaying a QR identifier ( 360 ).
  • This smarter phone ( 360 ) is then pointed toward access device ( 310 ).
  • the access device is a cellular phone ( 310 ) that includes a camera or other detecting technique that is operating by searching for a QR identifier. If the QR identifier is found ( 320 ) then the next step is to acquire a User Identification (UID) and encryption key embedded in the QR identifier ( 330 ). Simultaneously (or within a short time interval), the access device ( 310 ) sends an oral verbal/text/data message displayed or specifically stated as “attempting access”.
  • UID User Identification
  • the DASA database ( 147 ) contains secured access information that resides in the records ( 346 ) of the storage device ( 345 ) and employs a set of process rules ( 380 ) that are followed to authenticate ( 381 ), validate ( 382 ) and determine access ( 383 ) for the access device ( 310 ). There can be, and often are, different rules that should be followed for other access devices.
  • the flow path provided indicates that the access device(s) authenticates ( 381 ) using a first set of rules, validates ( 382 ) using a second set of rules, and includes a third set of rules that controls access ( 383 ) using data that has been supplied by the user device (in this case the smarter cell phone ( 360 )) that ensures access to only the authenticated and validated set of users under specified conditions.
  • the access device(s) authenticates ( 381 ) using a first set of rules, validates ( 382 ) using a second set of rules, and includes a third set of rules that controls access ( 383 ) using data that has been supplied by the user device (in this case the smarter cell phone ( 360 )) that ensures access to only the authenticated and validated set of users under specified conditions.
  • the process rules are finalized with an access decision ( 384 ) which includes at least two options.
  • One option is an access decision that includes the process of allowing user access ( 385 ) with the smarter cell phone ( 360 ) and verifies the user ( 305 ) has invoked its privileges. In this instance this includes physical access such as opening doors or otherwise gaining entrance to secured areas. This equally applies to gaining logical access such as unlocking data within databases or communication systems.
  • the user ( 305 ) is alerted when the system allows access by displaying a message on the access device ( 360 ).
  • the user's activity is monitored by the access process ( 385 ) to ensure that they have utilized their access within certain limitations.
  • Physical limitations may be provided by enabling door monitoring switches, floor-mats, man traps, video analysis, etc.
  • Logical limitations may be monitored by keyboard and/or data access and the like.
  • Temporal limitations may be employed as required.
  • Access may further be limited by counting the number of access egress or access egress attempts. In the case of access denial ( 386 ), the user will normally be notified of the denial of access by a displayed message on access device ( 360 ) and optional alarming may take place.
  • Reporting of the activity is normally returned from the access device ( 360 ) to the storage device ( 345 ) containing records ( 346 ) which are synchronized to the DASA database ( 147 ), which also provides for logging the data, meta-data, and associated information to the external logging and monitoring database ( 105 ).
  • this electronically generated bit or any number of electronically generated bits may be provided to indicate other information about the use of the card, such as an excessive number of attempts to enter the personal identification code.
  • Other uses for additional electronically generated bits will become apparent in particular applications.
  • the pointer refers to the number of steps into the algorithm or the value input into the algorithm and the transaction specific code is the calculated output of the algorithm.
  • the cellular/smart phone and QR code generator are provided with the same algorithm and compares the transaction specific code received from the communicating device with the next expected transaction specific code.
  • the computer readable media described within this application is non-transitory. In most if not all cases, the transmission of data is transmitted via signals that are non-transitory signals.
  • the signals are generated via at least one form of energy selected from one or more of the group consisting of; electrical, optical, mechanical, chemical, magnetic, radiative, electro-optical, electro-mechanical, electrochemical and electro-magnetic energy.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Biomedical Technology (AREA)
  • Databases & Information Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

An access control system and associated devices are described that conceal and securitize data transmissions between one or more secure databases for various user devices to ensure proper entrance or access into secure locations by approved personnel only. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications that combine securing communications for wireless/cellular phones with personnel access card readers for entry into secure locations are also described. These combined communication and access devices require using specific encryption techniques that cannot be corrupted and are essential to denying fraudulent or otherwise unauthorized personnel the ability to enter or access security protected devices or locations.

Description

    PRIORITY STATEMENT
  • This application is a nonprovisional conversion of and takes priority from the US Provisional application entitled “Securitizing Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices” with Ser. No. 62/518,337, filed Jun. 12, 2017.
  • This application is also a continuation-in-part of U.S. Nonprovisional application Ser. No. ______, filed ______ and entitled “Securitization of Temporal Digital Communications with Authentication and Validation of User and Access Devices”, which is a nonprovisional conversion of US Provisional application entitled “A System for Securing and Encrypting Temporal Digital Communications with Authentication and Validation of User and Access Devices” with Ser. No. 62/518,281 filed Jun. 12, 2017.
  • FIELD OF THE INVENTION
  • The present disclosure relates to the security of communications, and more particularly to a system that securitizes signals between one or more secure databases for personal security cards either in combination with or between cellular phones to ensure proper entrance or access into secure locations by only approved personnel. Methods and devices for securing (primarily digital and normally two-way) communications using applications that combine securing those communications for wireless/cellular phones with personnel access card readers (or other devices designed to receive security clearance for entry into secure locations) are not yet well established. These combined communication and access devices require using specific techniques essential to denying fraudulent or otherwise unauthorized personnel with the ability to enter or access security protected devices or secure locations.
  • BACKGROUND
  • Access control systems such as personnel security cards to limit access to enclosed areas such as buildings, rooms within buildings, or fenced-in regions to only those personnel who have permission to enter are often employed. Conventional access control systems include access card readers at doors of the secured building. People who have permission to enter the building are often provided with an access control card that can be read by access card readers. The card reader reads information from the card, and transmits the information to a control panel, which determines whether the entrance (such as a door) should be unlocked. If the door should be unlocked (i.e., the card is associated with a person who has permission to enter), the control panel then sends a signal to the locking mechanism of the door, causing it to unlock.
  • Conventional access control systems have several drawbacks and fail to take advantage of more recent and advanced technologies.
  • For example, many conventional systems utilize radio frequency identification devices (RFIDs) for identification of the personal security card to the access control system. The access card reader includes an RFID transceiver, and the access card includes an RFID tag or transponder. The RFID transceiver transmits a radio frequency query to the card as the card passes over it. The transponder includes a silicon chip and an antenna that enables the card to receive and respond to the RF query. The response is typically an RF signal that includes a pre-programmed identification (ID) number. The card reader receives the signal and transmits the ID number to the control panel via a wire connection. Conventional card readers are not very sophisticated. These card readers may perform some basic formatting of the identification data prior to sending it to the control panel, but are generally unable to perform more sophisticated functions with regard to securing digital communications.
  • The control panel is typically mounted on a wall somewhere in the building. The control panel conventionally includes a bank of relays that are each controlled by a controller device. The controller device accesses memory to determine whether the identification number received from the card reader is recognized and valid. If so, the controller causes the associated relay to open (or close) and thereby sends a signal to the door lock, which, if the signal is proper, causes the lock to enter the unlocked state. The lock typically remains unlocked for a specified amount of time.
  • Conventional control panels also have several deficiencies. In many instances, control panels consume a relatively large amount of space in relation to the number of doors they control. A control panel typically includes a specified number of relay banks, with each bank uniquely associated with the door it controls. For example, a control panel may have eight relay banks to control eight doors. Such a control panel could easily take up a 2 square foot area when mounted on a wall. If more than eight doors need to be controlled, then an additional control panel must be installed.
  • In addition, the “closed” architecture of conventional control panels make them inflexible, costly to maintain, and not user friendly. The closed architecture of the conventional control panels means that their design, functionality, and specifications are not disclosed by the manufacturers or owners. In addition, the control panel design is typically very complex, and specialized for a particular purpose, which renders them inaccessible by a typical building owner who has no specialized knowledge. As a result, when a control panel fails or needs to be upgraded, the building owner must call a specialized technician to perform maintenance or upgrading. The monetary costs associated with a technician's services contribute to excessive maintenance costs. In addition, a great deal of time is wasted waiting for the service technician to arrive.
  • Specific security concerns for cellular phones often deal with the content of the communication itself (often protected by encryption methods), the integrity of the communication (often protected by error-checking and anti-virus software), and authorized access to the communication (often protected by account codes and passwords). For the purposes of this application the definition of mobile or smart phones is as follows;
  • A mobile phone is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area. The radio frequency link establishes a connection to the switching systems of a mobile phone operator, which provides access to the public switched telephone network (PSTN). Most modern mobile telephone services use a cellular network architecture, and, therefore, mobile telephones are often also referred to as cellular telephones or cell phones. In addition to telephony, 21st century era mobile phones support a variety of other services, such as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming, and digital photography. Mobile phones which offer these and more general computing capabilities are referred to within this disclosure as “smartphones”.
  • Computer and associated cellular phone networks have been compromised by determining authorized account codes and passwords, thereby gaining access to proprietary two-way communications for obtaining information and additional capabilities. Attempts to combat these unauthorized communications has taken many forms. Interception of two-way communications of private (and often individual) conversations by government agencies has become common-place.
  • One security measure implemented in typical communication systems is the authentication of communicating devices at registration, initiation or reception of the communication. Authentication is viewed as the process of confirming the identity of the communicating device, perhaps by transmission and reception of an account or identification code and a password. In applications where the communicating device is mobile, authentication often requires communication between or through a plurality of communicating devices or networks in order to verify the identity of the communicating device and often the user of the communicating device.
  • Another serious flaw with existing cellular telephone systems is referred to as the “false mobile station” syndrome. It is presently possible to copy the entire memory contents of a mobile station and to use that information to manufacture clones that can demand and receive service from the network. Cellular phones may be cloned by reading the entire memory contents of the phone, including its identification codes, “secret” keys, internally stored personal identification codes, signatures, etc., and writing the same codes into any number of similar “clone” phones. The cloning procedure can become quite sophisticated and may include software modifications which replace physically stored information with electronically stored information so that a number of stored mobile station identities may be cyclically rotated within one fraudulent mobile station and used to imitate several authentic mobile stations.
  • Many communication systems, including cellular telephone networks and personnel security cards having authentication or authorization systems and comprise a vast number of distributed communicating devices that transmit data to a central computer system. The central communication system is in charge of determining whether to allow the communication to go through or not. The central computer system may execute an authorization algorithm to determine if the security card has a valid account or identification number, if there is an available bio-identifier for the individual and, perhaps, if a valid personal identification number has been given or entered. However, sophisticated “hackers” have been able to duplicate valid identification numbers and determine one or more personal identification numbers.
  • Password protection provides a limited degree of security, primarily protecting a communication from access by persons who casually encounter the file, but this security can also be violated. Encryption is perhaps the most secure means for preventing outsiders from obtaining the content of the communication and, therefore, is in widespread use by corporations throughout the world for many or all of their electronic transactions.
  • However, the security of even the most sophisticated encryption methods remains jeopardized by the growing computing power available to individuals and groups. Complex encryption algorithms using 64 bit keys having 264 (about 1.8×1019) possible keys can become marginalized in terms of protection against outside access to the communication.
  • Therefore, there is a need for improved methods of securing communications between two or more communicating devices and/or users. More particularly, there is a need for devices and methods to ensure prevention of personnel security cards and cellular phones as well the content of the communication. Having a cellular or “smart” phone (smart phones are also those that have embedded memory and microprocessors) that combines security card-type access together with secured cellular phones to ensure proper secured access to users is also important. It would also be desirable to provide devices with a method for a simple measure of detecting the use of “cloned” communicating devices. Furthermore, it would be especially desirable if the method did not require any significant physical modifications to existing communicating devices, but rather are employed by the addition or modification of software.
  • To solve the above mentioned problems and drawbacks, the inventions disclosed in U.S. Pat. Nos. 6,466,780, 6,766,161, and 6,466,780 and the associated details are hereby incorporated by reference into the present disclosure in its entirety and for all proper purposes.
  • SUMMARY
  • The present disclosure provides the ability to secure digital communications for the authorization and authentication of cellular phones together with personnel security cards by combing these devices and using a unique software encryption technique. More specifically, the present disclosure provides for one or more devices comprising a real or virtual master distributed auto-synchronous array (DASA) database located within or external to the one or more devices that at least stores and retrieves data and that includes at least two or more partial distributed auto-synchronous array (DASA) databases wherein the partial DASA databases function in either an independent manner, a collaborative manner or both, and wherein the master and partial DASA databases allow for bi-directional transmission of data to and from multiple partial user devices, to and from multiple partial access devices or to and from both partial user and partial access devices, wherein one or more partial user and partial access devices store and provide at least partial copies of portions of the master DASA database and wherein the master DASA database, the partial DASA databases or both partial and master DASA databases are linked and communicate with each other as well as one or more logging and monitoring databases capable of statistical and numerical calculations utilizing the data, wherein the tools authenticate using a first set of computing operations, validates using a second set of computing operations, and wherein a third set of computing operations controls access for a specified set of users, wherein the computing operations define rules utilized to provide logic with regard to communications between master and partial DASA databases and partial user and partial access devices.
  • In addition, the devices further operate by transmission of a credential identifier to an access control server when the devices are determined to be operating, a local authentication processor configured to authenticate said credential identifier against entries of one or more keys existing within tables when said access control system is determined to be operating and a input/output processor configured to send a signal to a secured area when said credential identifier has been successfully authenticated; wherein said communication transceiver includes an interface to serve second data that can be displayed to both a user external to said access control devices and displayed on said access control devices themselves.
  • The data is transmitted to a secured area such that the data is transmitted and received by a cellular phone. If access is allowed, a user's device provides use of oral, visual, or text data on a display, as a message that indicates a match so that the user(s) are allowed access.
  • If access is denied, the user's device provides use of an oral, visual, or text data on a display as a message of denial of the match indicating that the user is denied access.
  • Denial of the match causes an encryption application on the user's device to be removed and to ensure that master keys in a user table are secured, a new master key in the user table is generated either via a signal from the user's device to one or more secured encryption databases or via a signal from a key management system to one or more secured encryption databases.
  • The key management system is a system that provides one or more keys for encryption or decryption or both encryption and decryption as required by the devices.
  • The devices control access to an enclosed area from a group consisting of a building, a room within a building, a cabinet, a parking lot, a fenced-in region, and an elevator.
  • In addition, the embodiments can include a signal converter coupled to a communication module that is capable of receiving and transmitting data as signals, wherein the communication module is agnostic to a communication protocol of an access control server that is also a portion of the devices. The signal converter is agnostic to a communication protocol of a local authentication processor and the signal converter is adapted to interface with a plurality of access controllers.
  • In an additional embodiment, a communication transceiver is provided for the partial user device or the partial access device or both and includes at least one of the group consisting of; a serial interface, a TCP/IP interface, an IEEE 802.11 interface, an IEEE 802.15.4 interface, and a secure HTTP interface.
  • The communication transceiver is configured to transmit a credential identifier to access a control server via a wireless communication link. Here, the communication transceiver can receive the credential identifier from a radio-frequency identification (RFID) transponder included in an access control card.
  • In a further embodiment, operational modes of the devices include at least one of a synchronous mode and an asynchronous mode.
  • Further embodiments provide for data transmitted to an access control server that is encrypted.
  • In addition, a credential identifier can be transmitted to an access control server via a wireless communication link.
  • In another directly related embodiment to all those described in detail above, the disclosure also provides for a ubiquitous access control system comprising; a real or virtual master distributed auto-synchronous array (DASA) database located within or external to the access control system that at least stores and retrieves data and that includes at least two or more partial distributed auto-synchronous array (DASA) databases wherein the partial DASA databases function in either an independent manner, a collaborative manner or both, and wherein the master and partial DASA databases allow for bi-directional transmission of data to and from one or more partial user devices, to and from one or more partial access devices or to and from both partial user and partial access devices, wherein the partial devices store and provide at least partial copies of portions of the master DASA database and wherein the master DASA database, the partial DASA databases or both master and partial databases, are linked and communicate with each other as well as with one or more logging and monitoring databases capable of statistical and numerical calculations utilizing the data, wherein the one or more devices authenticate using a first set of computing operations, validates using a second set of computing operations, and wherein a third set of computing operations controls access for a specified set of users, wherein the computing operations define rules utilized to provide logic with regard to communications between master and partial DASA databases and partial user and partial access devices.
  • In order to further clarify one embodiment of the invention using a cellular phone, the user must download application (app) that requires fingerprints (or other/additional individual biomarkers) which must be subsequently validated. The user must then provide a user ID entry and verifies this against a user table to determine if this user is a valid registered UID (user identification). Once this has been properly established, an encryption application is employed to “build” a master key. Next, the master key is sent to a user table via a secure database. The combination of the user ID and the master key are then stored within a storage system (such as a memory chip within the cellular phone or transmitted subsequently or directly into a cloud-based memory system external to the cellular phone). Finally, an installation app message is received by the cellular phone prompting the user to either close or finalize the installation application.
  • BRIEF DESCRIPTION OF THE FIGURES
  • FIG. 1 is a flow chart describing the installation of a user authentication application for a user onto a cellular/smart phone.
  • FIG. 2 is a flow chart describing the use of an authentication application that creates a user credential such as a QR code onto a cellular/smart phone.
  • FIG. 3 is a flow chart describing the access process for a user with an authenticated credential.
  • DETAILED DESCRIPTION
  • While the foregoing discussion has dealt primarily with detecting unauthorized communicating devices, the present invention may also include the ability to detect unauthorized users. In many applications, including credit card authorization and approval and cellular telephone communications, it is frequently desirable to verify that the communication is being initiated by an authorized user. The inclusion of a user authorization system is beneficial for reducing the use of authentic communicating devices when they have been stolen or lost. Losses due to the use of lost or stolen communicating devices is also very significant, but is inherently limited to the capacity of the authorized communicating device itself, i.e., one communication at a time, a credit limit, etc. Furthermore, the use of lost or stolen communicating devices by unauthorized users may be restricted by the use of user specific codes, such as a personal identification number (PIN), finger print, password, voice commands and the like.
  • In another aspect of the invention, the host device and/or the communicating device may be programmed to verify the identity and authenticity of the device alone or in combination with the user. In one example, the host computer may first verify that the communication is being initiated from an authorized communicating device, then prompt the user to enter a personal identification code (PIN) indicating that the user is also authorized. Only upon satisfaction of these two criteria is the communication to be allowed to proceed. It should be recognized that the host device could be programmed to verify these two codes, or other additional codes and authorizations, in any order. In another example, the communicating device itself may require the successful input of a personal identification code prior to enabling or energizing the transaction specific code, any portion of the device identification code or even some portion of the communication itself.
  • A still further aspect of the invention provides for automatic re-synchronization of the transaction specific codes following one or more unauthorized communications. Re-synchronization methods according to the present disclosure may be achieved by programming the host device to reset the a pointer or designated portion within a database regarding transaction specific (TS) codes for a particular identification code upon receiving a series of attempted communications having a series of transaction specific (TS) codes that match a portion of the database. For example, after receiving an attempted communication having a transaction specific (TS) code that is not the next expected transaction specific (TS) code or within the range of tolerance, no further communications using the same identification code can proceed until the transaction specific codes of the communicating device and the host are re-synchronized. If the host device is programmed to allow re-synchronization after receiving three transaction specific codes (i.e., 12, 13, 14) that match a portion of the host database (i.e., 10, 11, 12, 13, 14, 15, 16, etc.) for the given identification code, then the pointer in the host database is reset for the next TS code (i.e., 15) in the database. Subsequent communications may proceed in accordance with the aforementioned methods. It may be beneficial to a separate range of tolerance for re-synchronization in order to prevent re-synchronization at a dramatically different point in the sequence of transaction specific codes.
  • FIG. 1 is a flow chart (100) describing the installation of a user authentication application (112) for a user onto a cellular/smart phone in accordance with the present invention. More specifically, the system provides for a user (105) to operate a secured cellular (“smart”) phone (110). The user (105) must download an application (app) (120) from a device that provides a check on a fingerprint (or other bio-identifier) (115). These devices require fingerprints (or other/additional individual biomarkers) which must be subsequently validated (125). When the fingerprint is not valid, the user (105) is notified (130) and is prompted to close the install application (180) which is unloaded (185). In the case where the fingerprint is validated, the user (105) must then provide a user ID (UID) entry (135). This UID entry (135) must be verified against a user table (140) which resides within one or more secured distributed auto-synchronous array databases (DASA), (147) to determine if this user is a valid registered UID (150). The DASA database can exist in one or more stand-alone storage devices, computers, computer related clouds, the world-wide-web (internet), intranet, and/or servers (149). In the case when the user (105) fails to validate, the user is notified (160) and the application is unloaded (180, 185).
  • When the user (105) is validated, an encryption application within the DASA database (147) is employed to “build” a master key (155). Next, the master key is sent to a user table (165) via the secured DASA database (147). The combination of the user ID and the master key (170) are then stored within a storage system (175) (such as a memory chip within the cellular phone or transmitted subsequently or directly into a cloud-based memory system external to the cellular phone). Finally, an installation application (app) message is received and displayed (180) by the cellular phone (110), prompting the user (105) to finalize the installation application onto the cellular phone (110) for the user (105). The user app is subsequently unloaded (185).
  • FIG. 2 is a flow chart (200) describing the use of an authentication application that creates a user credential such as a QR code onto a cellular/smart phone in accordance with the present invention. More specifically the system is for a user (205) that needs access through a secured door (or entrance) and in this instance invokes the use of the user authentication application (212), (which corresponds to (112) in FIG. 1) onto an encrypted cellular phone (210). The user (205) activates the user authentication application (212) from the cellular phone (210) which provides a check on a fingerprint (or any other bio-identifier) (215) that requires fingerprints (or other/additional individual biomarkers) which must be subsequently validated (220). If determination of validity (225) fails (230), the user (205) is notified (230) with a message (275) prompting the user (205) to close the application (212) and the application is subsequently unloaded (280).
  • The storage device (245) contains records with at least one user record (246) residing within the DASA database (147). When determination of fingerprint validation (225) is confirmed, then an encryption key (240) is generated, utilizing information in the user record (246), of the DASA database (147), residing in storage device (245). In this instance, a QR code is built (250) utilizing the encryption key (240) and information in the user record (246). The QR code(s) function as a “superset” of synchronous transaction specific codes (TS codes) within the DASA database (147) user record(s) (246). More specifically, the QR codes contain all the functionality of the TS codes plus additional specific metadata pertaining to items such as; user temporal information, location, and historical usage. The QR codes utilized in this specific instance, can themselves be encrypted with one or more levels of encryption.
  • Next, the QR code is rendered for display (255) onto the cellular phone (210) via a “user friendly” text derivation that changes the cellular phone into a “smarter” phone (260) in that it now has a QR identifier residing on the phone (210). The QR code timeout threshold (265) is retrieved from a configuration table also held within the records (246) of the DASA database (147). Next, a clock (267) is preset with this timeout (265). The clock (267) is to check to determine if the delay between the start time and end time is properly achieved regarding whether or not the generation of a new QR code has expired (270). If the QR code has not expired it can be used to match that of the receiving portion of the security system described below. If the QR code has expired, then the user application (app) (212) provides a message that is displayed (275) on the cellular phone (210), prompting the user to close the app which is subsequently unloaded (280).
  • FIG. 3 is a flow chart (300) describing the access process for a user (305) with an authenticated credential. The authenticated credential in this instance are one or more QR codes. The system utilizes two separate devices. The user device which is a smarter cell phone (360) and displays a QR code and corresponds to (260) in FIG. 2. The other device is an access device that has been installed in a cellular phone (310) but can also be a card reader for entrance into a secured location.
  • More specifically, the user (305) that needs access through a secured door (or entrance) in this instance invokes the use of the smarter cell phone displaying a QR identifier (360). This smarter phone (360) is then pointed toward access device (310). In this specific instance, the access device is a cellular phone (310) that includes a camera or other detecting technique that is operating by searching for a QR identifier. If the QR identifier is found (320) then the next step is to acquire a User Identification (UID) and encryption key embedded in the QR identifier (330). Simultaneously (or within a short time interval), the access device (310) sends an oral verbal/text/data message displayed or specifically stated as “attempting access”.
  • The DASA database (147) contains secured access information that resides in the records (346) of the storage device (345) and employs a set of process rules (380) that are followed to authenticate (381), validate (382) and determine access (383) for the access device (310). There can be, and often are, different rules that should be followed for other access devices. The flow path provided indicates that the access device(s) authenticates (381) using a first set of rules, validates (382) using a second set of rules, and includes a third set of rules that controls access (383) using data that has been supplied by the user device (in this case the smarter cell phone (360)) that ensures access to only the authenticated and validated set of users under specified conditions.
  • The process rules are finalized with an access decision (384) which includes at least two options. One option is an access decision that includes the process of allowing user access (385) with the smarter cell phone (360) and verifies the user (305) has invoked its privileges. In this instance this includes physical access such as opening doors or otherwise gaining entrance to secured areas. This equally applies to gaining logical access such as unlocking data within databases or communication systems. The user (305) is alerted when the system allows access by displaying a message on the access device (360). The user's activity is monitored by the access process (385) to ensure that they have utilized their access within certain limitations. Physical limitations may be provided by enabling door monitoring switches, floor-mats, man traps, video analysis, etc. Logical limitations may be monitored by keyboard and/or data access and the like. Temporal limitations may be employed as required. Access may further be limited by counting the number of access egress or access egress attempts. In the case of access denial (386), the user will normally be notified of the denial of access by a displayed message on access device (360) and optional alarming may take place. Reporting of the activity is normally returned from the access device (360) to the storage device (345) containing records (346) which are synchronized to the DASA database (147), which also provides for logging the data, meta-data, and associated information to the external logging and monitoring database (105).
  • In a further aspect of the invention protecting the security of cellular/smart phone, the security of any transmitting/receiving (transceiving) of signals of the cellular/smart phone with other devices, as well as protection of the acquisition of the QR codes are all accomplished by the use of the encryption techniques described above.
  • In another aspect of the invention, this electronically generated bit or any number of electronically generated bits may be provided to indicate other information about the use of the card, such as an excessive number of attempts to enter the personal identification code. Other uses for additional electronically generated bits will become apparent in particular applications.
  • While most of the foregoing discussion about the present encryption technique has focused on the use of databases, lists and tables for storing transaction specific codes, it may be preferred in some applications having limited memory to provide an algorithm for calculating the next transaction specific code. In these applications, the pointer refers to the number of steps into the algorithm or the value input into the algorithm and the transaction specific code is the calculated output of the algorithm. The cellular/smart phone and QR code generator are provided with the same algorithm and compares the transaction specific code received from the communicating device with the next expected transaction specific code. The concept of “tolerance” described earlier may be incorporated either by setting an acceptable range of values for the transaction specific code (output of the algorithm) or the pointer itself (input to the algorithm), the latter being the equivalent of back calculating the pointer and verifying that it is within the range of tolerance.
  • While the foregoing is directed to the preferred embodiment of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims which follow.
  • While most of the foregoing discussion about the present encryption technique has focused on the use of databases, lists and tables for storing transaction specific codes, it may be preferred in some applications having limited memory to provide an algorithm for calculating the next transaction specific code. The concept of “tolerance” described earlier may be incorporated either by setting an acceptable range of values for the transaction specific code (output of the algorithm) or the designated portion itself (input to the algorithm), the latter being the equivalent of back calculating the designated portion and verifying that it is within the range of tolerance.
  • The computer readable media described within this application is non-transitory. In most if not all cases, the transmission of data is transmitted via signals that are non-transitory signals.
  • The signals are generated via at least one form of energy selected from one or more of the group consisting of; electrical, optical, mechanical, chemical, magnetic, radiative, electro-optical, electro-mechanical, electrochemical and electro-magnetic energy.
  • Each and every aspect of both Provisional Applications are hereby fully incorporated by reference.
  • In addition, all references mentioned herein are hereby incorporated by reference in their entirety.
  • In compliance with the patent laws, the subject matter disclosed herein has been described in language more or less specific as to structural and methodical features. However, the scope of protection sought is to be limited only by the following claims, given their broadest possible interpretations. The claims are not to be limited by the specific features shown and described, as the description above only discloses example embodiments. While the foregoing is directed to preferred embodiments of the present invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof, and the scope thereof is determined by the claims which follow.

Claims (34)

I claim:
1. One or more devices comprising a real or virtual master distributed auto-synchronous array (DASA) database located within or external to said one or more devices that at least stores and retrieves data and that includes at least two or more partial distributed auto-synchronous array (DASA) databases wherein said partial DASA databases function in either an independent manner, a collaborative manner or both, and wherein said master and partial DASA databases allow for bi-directional transmission of data to and from multiple partial user devices, to and from multiple partial access devices or to and from both partial user and partial access devices, wherein said one or more partial user and partial access devices store and provide at least partial copies of portions of said master DASA database and wherein said master DASA database, said partial DASA databases or both partial and master DASA databases are linked and communicate with each other as well as one or more logging and monitoring databases capable of statistical and numerical calculations utilizing said data, wherein said tools authenticate using a first set of computing operations, validates using a second set of computing operations, and wherein a third set of computing operations controls access for a specified set of users, wherein said computing operations define rules utilized to provide logic with regard to communications between master and partial DASA databases and partial user and partial access devices.
2. The devices of claim 1, wherein said devices system further operates by transmission of a credential identifier to an access control server when said devices are determined to be operating, a local authentication processor configured to authenticate said credential identifier against entries of one or more keys existing within tables when said access control system is determined to be operating and a input/output processor configured to send a signal to a secured area when said credential identifier has been successfully authenticated; wherein said communication transceiver includes an interface to serve second data that can be displayed to both a user external to said access control devices and displayed on said access control devices themselves.
3. The devices of claim 2, wherein said data is transmitted to a secured area such that said data is transmitted and received by a cellular phone.
4. The devices of claim 2, wherein if access is allowed, a user's device provides use of oral, visual, or text data on a display, as a message that indicates a match so that said user is allowed access.
5. The devices of claim 3, wherein if access is denied, said user's device provides use of an oral, visual, or text data on a display as a message of denial of said match indicating that said user is denied access.
6. The devices of claim 5, wherein denial of said match causes an encryption application on said user's device to be removed and wherein to ensure that master keys in a user table are secured, a new master key in said user table is generated either via a signal from said user's device to one or more secured encryption databases or via a signal from a key management system to said one or more secured encryption databases.
7. The devices of claim 1, wherein said key management system is a system that provides one or more keys for encryption or decryption or both encryption and decryption as required by said devices.
8. The devices of claim 1, wherein said devices control access to an enclosed area from a group consisting of a building, a room within a building, a cabinet, a parking lot, a fenced-in region, and an elevator.
9. The devices of claim 1, further comprising a signal converter coupled to a communication module that is capable of receiving and transmitting data as signals, wherein said communication module is agnostic to a communication protocol of an access control server that is also a portion of said devices.
10. The devices of claim 9, wherein said signal converter is agnostic to a communication protocol of a local authentication processor.
11. The devices of claim 10, wherein said signal converter is adapted to interface with a plurality of access controllers.
12. The devices of claim 10, wherein said communication transceiver is provided for said partial user device or said partial access device or both and includes at least one of the group consisting of; a serial interface, a TCP/IP interface, an IEEE 802.11 interface, an IEEE 802.15.4 interface, and a secure HTTP interface.
13. The devices of claim 10, wherein said communication transceiver is configured to transmit a credential identifier to access a control server via a wireless communication link.
14. The devices of claim 13, wherein said communication transceiver receives said credential identifier from a radio-frequency identification (RFID) transponder included in an access control card.
15. The devices of claim 1, wherein operational modes of said devices include at least one of a synchronous mode and an asynchronous mode.
16. The devices of claim 10, wherein data transmitted to an access control server is encrypted.
17. The devices of claim 1, wherein a credential identifier is transmitted to an access control server via a wireless communication link.
18. An access control system comprising; a real or virtual master distributed auto-synchronous array (DASA) database located within or external to said access control system that at least stores and retrieves data and that includes at least two or more partial distributed auto-synchronous array (DASA) databases wherein said partial DASA databases function in either an independent manner, a collaborative manner or both, and wherein said master and partial DASA databases allow for bi-directional transmission of data to and from one or more partial user devices, to and from one or more partial access devices or to and from both partial user and partial access devices, wherein said partial devices store and provide at least partial copies of portions of said master DASA database and wherein said master DASA database, said partial DASA databases or both master and partial databases, are linked and communicate with each other as well as with one or more logging and monitoring databases capable of statistical and numerical calculations utilizing said data, wherein said one or more devices authenticate using a first set of computing operations, validates using a second set of computing operations, and wherein a third set of computing operations controls access for a specified set of users, wherein said computing operations define rules utilized to provide logic with regard to communications between master and partial DASA databases and partial user and partial access devices.
19. The access control system of claim 18, wherein said devices system further operates by transmission of a credential identifier to an access control server when said access control system is determined to be operating, a local authentication processor configured to authenticate said credential identifier against entries of one or more keys existing within tables when said access control system is determined to be operating and a input/output processor configured to send a signal to a secured area when said credential identifier has been successfully authenticated; wherein said communication transceiver includes an interface to serve second data that can be displayed to both a user external to said access control devices and displayed on said access control devices themselves.
20. The access control system of claim 19, wherein said data is transmitted to a secured area such that said data is transmitted and received by a cellular phone.
21. The access control system of claim 19, wherein if access is allowed, a user's device provides use of oral, visual, or text data on a display, as a message that indicates a match so that said user is allowed access.
22. The access control system of claim 21, wherein if access is denied, said user's device provides use of an oral, visual, or text data on a display as a message of denial of said match indicating that said user is denied access.
23. The access control system of claim 22, wherein denial of said match causes an encryption application on said user's device to be removed and wherein to ensure that master keys in a user table are secured, a new master key in said user table is generated either via a signal from said user's device to one or more secured encryption databases or via a signal from a key management system to said one or more secured encryption databases.
24. The access control system of claim 1, wherein said key management system is a system that provides one or more keys for encryption or decryption or both encryption and decryption as required by said access control system.
25. The access control system of claim 1, wherein said control system controls access to an enclosed area from a group consisting of a building, a room within a building, a cabinet, a parking lot, a fenced-in region, and an elevator.
26. The access control system of claim 1, further comprising a signal converter coupled to a communication module that is capable of receiving and transmitting data as signals, wherein said communication module is agnostic to a communication protocol of an access control server that is also a portion of said access control system.
27. The access control system of claim 26, wherein said signal converter is agnostic to a communication protocol of a local authentication processor.
28. The access control system of claim 26, wherein said signal converter is adapted to interface with a plurality of access controllers.
29. The access control system of claim 26, wherein said communication transceiver is provided for said partial user device or said partial access device or both and includes at least one of the group consisting of; a serial interface, a TCP/IP interface, an IEEE 802.11 interface, an IEEE 802.15.4 interface, and a secure HTTP interface.
30. The access control system of claim 26, wherein said communication transceiver is configured to transmit a credential identifier to access a control server via a wireless communication link.
31. The access control system of claim 30, wherein said communication transceiver receives said credential identifier from a radio-frequency identification (RFID) transponder included in an access control card.
32. The access control system of claim 1, wherein operational modes of said access control system includes at least one of a synchronous mode and an asynchronous mode.
33. The access control system of claim 26, wherein data transmitted to an access control server is encrypted.
34. The access control system of claim 1, wherein a credential identifier is transmitted to an access control server via a wireless communication link.
US16/005,134 2017-06-12 2018-06-11 Securitization of temporal digital communications via authentication and validation for wireless user and access devices Active US10171444B1 (en)

Priority Applications (20)

Application Number Priority Date Filing Date Title
US16/005,134 US10171444B1 (en) 2017-06-12 2018-06-11 Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US16/005,281 US10154031B1 (en) 2017-06-12 2018-06-11 User-wearable secured devices provided assuring authentication and validation of data storage and transmission
US16/006,011 US10158613B1 (en) 2017-06-12 2018-06-12 Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
US16/005,918 US10154016B1 (en) 2017-06-12 2018-06-12 Devices for transmitting and communicating randomized data utilizing sub-channels
US16/005,968 US10154015B1 (en) 2017-06-12 2018-06-12 Executable coded cipher keys
US16/005,871 US10171435B1 (en) 2017-06-12 2018-06-12 Devices that utilize random tokens which direct dynamic random access
US16/173,179 US10616192B2 (en) 2017-06-12 2018-10-29 Devices that utilize random tokens which direct dynamic random access
US16/173,323 US10686764B2 (en) 2017-06-12 2018-10-29 Executable coded cipher keys
US16/173,384 US10623384B2 (en) 2017-06-12 2018-10-29 Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
US16/173,258 US10673830B2 (en) 2017-06-12 2018-10-29 Devices for transmitting and communicating randomized data utilizing sub-channels
US16/178,795 US10637854B2 (en) 2017-06-12 2018-11-02 User-wearable secured devices provided assuring authentication and validation of data storage and transmission
US16/202,905 US10645070B2 (en) 2017-06-12 2018-11-28 Securitization of temporal digital communications via authentication and validation for wireless user and access devices
PCT/US2018/066014 WO2019133326A1 (en) 2017-12-27 2018-12-17 Securing temporal digital communications
PCT/US2018/066055 WO2019133329A1 (en) 2017-12-27 2018-12-17 Protected and secured user-wearable devices that utilize securitised containers
US16/222,421 US10650139B2 (en) 2017-06-12 2018-12-17 Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers
US16/222,684 US10764282B2 (en) 2017-06-12 2018-12-17 Protected and secured user-wearable devices for assured authentication and validation of data storage and transmission that utilize securitized containers
PCT/US2019/026270 WO2019195821A1 (en) 2018-04-06 2019-04-08 Authentication and validation of data storage and transmission using blockchain
US17/045,647 US20210160235A1 (en) 2017-06-12 2019-04-08 User-wearable devices assuring authentication and validation of data storage and transmission that utilize blockchain
PCT/US2019/026265 WO2019195820A1 (en) 2018-04-06 2019-04-08 Securing temporal digital communications via authentication and validation
PCT/US2019/026567 WO2019199813A2 (en) 2018-04-09 2019-04-09 Managed high integrity blockchain and blockchain communications that utilize containers

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201762518281P 2017-06-12 2017-06-12
US201762518337P 2017-06-12 2017-06-12
US16/005,134 US10171444B1 (en) 2017-06-12 2018-06-11 Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US16/005,040 US10154021B1 (en) 2017-06-12 2018-06-11 Securitization of temporal digital communications with authentication and validation of user and access devices

Related Parent Applications (3)

Application Number Title Priority Date Filing Date
US16/005,281 Continuation-In-Part US10154031B1 (en) 2017-06-12 2018-06-11 User-wearable secured devices provided assuring authentication and validation of data storage and transmission
US16/005,040 Continuation-In-Part US10154021B1 (en) 2017-06-12 2018-06-11 Securitization of temporal digital communications with authentication and validation of user and access devices
US16/221,041 Continuation US10579793B2 (en) 2017-06-12 2018-12-14 Managed securitized containers and container communications

Related Child Applications (7)

Application Number Title Priority Date Filing Date
US16/005,281 Continuation-In-Part US10154031B1 (en) 2017-06-12 2018-06-11 User-wearable secured devices provided assuring authentication and validation of data storage and transmission
US16/005,040 Continuation-In-Part US10154021B1 (en) 2017-06-12 2018-06-11 Securitization of temporal digital communications with authentication and validation of user and access devices
US16/005,040 Continuation US10154021B1 (en) 2017-06-12 2018-06-11 Securitization of temporal digital communications with authentication and validation of user and access devices
US16/006,011 Continuation-In-Part US10158613B1 (en) 2017-06-12 2018-06-12 Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
US16/005,968 Continuation-In-Part US10154015B1 (en) 2017-06-12 2018-06-12 Executable coded cipher keys
US16/005,871 Continuation-In-Part US10171435B1 (en) 2017-06-12 2018-06-12 Devices that utilize random tokens which direct dynamic random access
US16/202,905 Continuation US10645070B2 (en) 2017-06-12 2018-11-28 Securitization of temporal digital communications via authentication and validation for wireless user and access devices

Publications (2)

Publication Number Publication Date
US20180359635A1 true US20180359635A1 (en) 2018-12-13
US10171444B1 US10171444B1 (en) 2019-01-01

Family

ID=64660829

Family Applications (1)

Application Number Title Priority Date Filing Date
US16/005,134 Active US10171444B1 (en) 2017-06-12 2018-06-11 Securitization of temporal digital communications via authentication and validation for wireless user and access devices

Country Status (2)

Country Link
US (1) US10171444B1 (en)
WO (1) WO2018231703A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110288740A (en) * 2019-07-10 2019-09-27 中建八局第二建设有限公司 A kind of vehicles management method and system based on AI intellectual analysis
US20200167621A1 (en) * 2018-11-22 2020-05-28 Alibaba Group Holding Limited Method, apparatus, electronic device and computer storage medium for generating information identification codes
WO2022156541A1 (en) * 2021-01-22 2022-07-28 Smartone Mobile Communications Limited Lift shaft access and safety system
US20220278981A1 (en) * 2019-08-26 2022-09-01 Traitware, Inc. Authentication System for Computer Accessing a Remote Server
CN115188114A (en) * 2022-07-01 2022-10-14 日立楼宇技术(广州)有限公司 Access control information synchronization method, device, equipment and storage medium
US11943219B1 (en) * 2018-09-12 2024-03-26 Massachusetts Mutual Life Insurance Company Systems and methods for secure display of data on computing devices

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10154021B1 (en) 2017-06-12 2018-12-11 Ironclad Encryption Corporation Securitization of temporal digital communications with authentication and validation of user and access devices
WO2019195691A1 (en) 2018-04-05 2019-10-10 Daniel Maurice Lerner Discrete blockchain and blockchain communications
US11543250B2 (en) 2019-03-19 2023-01-03 Diarmuid Gardiner Securitized and encrypted data for vehicle service scheduling and dispatch devices (SSDD) and systems that provide improved operations and outcomes
US12043484B2 (en) 2020-03-05 2024-07-23 PayRange Inc. NFC validation bypass system and method
US11663875B2 (en) * 2020-03-05 2023-05-30 PayRange Inc. Controlled dispensing system and method
US12043483B2 (en) * 2020-03-05 2024-07-23 PayRange Inc. Controlled dispensing system and method
US12045024B2 (en) * 2020-03-05 2024-07-23 PayRange Inc. Controlled dispensing system and method
US12039581B2 (en) 2020-03-05 2024-07-16 PayRange Inc. Controlled dispensing system and method

Family Cites Families (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4578530A (en) 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
NL8201077A (en) * 1982-03-16 1983-10-17 Philips Nv A COMMUNICATION SYSTEM, CONTAINING A CENTRAL DATA PROCESSING DEVICE, ACCESS STATIONS AND EXTERNAL STATIONS, WHICH A CRYPTOGRAPHIC CHECK IS FORDICULARIZING AN EXTERNAL STATION, AND EXTERNAL STATIONS FOR USE IN SUCH A COMMUNITY.
US4558176A (en) * 1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software
US5446880A (en) * 1992-08-31 1995-08-29 At&T Corp. Database communication system that provides automatic format translation and transmission of records when the owner identified for the record is changed
US5657390A (en) 1995-08-25 1997-08-12 Netscape Communications Corporation Secure socket layer application program apparatus and method
US6307936B1 (en) 1997-09-16 2001-10-23 Safenet, Inc. Cryptographic key management scheme
JP3858527B2 (en) * 1999-08-10 2006-12-13 富士ゼロックス株式会社 Data generation apparatus, data verification apparatus and method
US7032240B1 (en) * 1999-12-07 2006-04-18 Pace Anti-Piracy, Inc. Portable authorization device for authorizing use of protected information and associated method
US6950522B1 (en) * 2000-06-15 2005-09-27 Microsoft Corporation Encryption key updating for multiple site automated login
US20020124177A1 (en) * 2001-01-17 2002-09-05 Harper Travis Kelly Methods for encrypting and decrypting electronically stored medical records and other digital documents for secure storage, retrieval and sharing of such documents
US6917974B1 (en) * 2002-01-03 2005-07-12 The United States Of America As Represented By The Secretary Of The Air Force Method and apparatus for preventing network traffic analysis
US20040022222A1 (en) * 2002-07-31 2004-02-05 Allister Clisham Wireless metropolitan area network system and method
US7181016B2 (en) 2003-01-27 2007-02-20 Microsoft Corporation Deriving a symmetric key from an asymmetric key for file encryption or decryption
US7243234B2 (en) * 2003-08-29 2007-07-10 Motorola, Inc. Encryption key rekeying apparatus and method
JP4314950B2 (en) * 2003-09-26 2009-08-19 日本ビクター株式会社 Encryption device and decryption device
JP4688426B2 (en) * 2004-03-09 2011-05-25 富士通株式会社 Wireless communication system
US20060235852A1 (en) * 2005-04-14 2006-10-19 Lockheed Martin Corporation System for inter-database communication
US20060233371A1 (en) * 2005-04-14 2006-10-19 Sowa Hans C Roaming encryption key rekeying apparatus and method
US8179825B2 (en) * 2005-05-12 2012-05-15 Nortel Networks Limited Method and system for detecting radar signals
US7917963B2 (en) * 2006-08-09 2011-03-29 Antenna Vaultus, Inc. System for providing mobile data security
US20080263363A1 (en) 2007-01-22 2008-10-23 Spyrus, Inc. Portable Data Encryption Device with Configurable Security Functionality and Method for File Encryption
US8825999B2 (en) 2007-10-20 2014-09-02 Blackout, Inc. Extending encrypting web service
US8934633B2 (en) * 2010-02-15 2015-01-13 Hitachi, Ltd. Encrypted communication system, transmitter and receiver using same
US8462955B2 (en) 2010-06-03 2013-06-11 Microsoft Corporation Key protectors based on online keys
EP2482220A1 (en) 2011-01-27 2012-08-01 SafeNet, Inc. Multi-enclave token
US20130104197A1 (en) 2011-10-23 2013-04-25 Gopal Nandakumar Authentication system
US8863297B2 (en) 2012-01-06 2014-10-14 Mobile Iron, Inc. Secure virtual file management system
US9094191B2 (en) 2013-03-14 2015-07-28 Qualcomm Incorporated Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks
JP2015130580A (en) * 2014-01-07 2015-07-16 富士通株式会社 Data scrambling device, security device, security system, and data scrambling method
EP2903166A1 (en) 2014-02-03 2015-08-05 Centre National de la Recherche Scientifique (C.N.R.S.) Multiple-vote symbol-flipping decoder for non-binary LDPC codes
WO2015124168A1 (en) 2014-02-18 2015-08-27 Bekey A/S Controlling access to a location
US10083325B2 (en) * 2015-11-16 2018-09-25 The Boeing Company Secure removable storage for aircraft systems
US9703985B1 (en) 2017-03-24 2017-07-11 James S. Farrin, P.C. Concealing a personal number

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11943219B1 (en) * 2018-09-12 2024-03-26 Massachusetts Mutual Life Insurance Company Systems and methods for secure display of data on computing devices
US20200167621A1 (en) * 2018-11-22 2020-05-28 Alibaba Group Holding Limited Method, apparatus, electronic device and computer storage medium for generating information identification codes
US10699172B2 (en) * 2018-11-22 2020-06-30 Alibaba Group Holding Limited Method, apparatus, electronic device and computer storage medium for generating information identification codes
US10783417B2 (en) * 2018-11-22 2020-09-22 Alibaba Group Holding Limited Method, apparatus, electronic device and computer storage medium for generating information identification codes
CN110288740A (en) * 2019-07-10 2019-09-27 中建八局第二建设有限公司 A kind of vehicles management method and system based on AI intellectual analysis
US20220278981A1 (en) * 2019-08-26 2022-09-01 Traitware, Inc. Authentication System for Computer Accessing a Remote Server
WO2022156541A1 (en) * 2021-01-22 2022-07-28 Smartone Mobile Communications Limited Lift shaft access and safety system
CN115188114A (en) * 2022-07-01 2022-10-14 日立楼宇技术(广州)有限公司 Access control information synchronization method, device, equipment and storage medium

Also Published As

Publication number Publication date
WO2018231703A1 (en) 2018-12-20
US10171444B1 (en) 2019-01-01

Similar Documents

Publication Publication Date Title
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US10755507B2 (en) Systems and methods for multifactor physical authentication
US10467832B2 (en) Configurable digital badge holder
US6466780B1 (en) Method and apparatus for securing digital communications
US7205882B2 (en) Actuating a security system using a wireless device
US8952781B2 (en) Method and apparatus for access control using dual biometric authentication
CN104517338B (en) Distance entrance and its implementation based on wireless network
US20070223685A1 (en) Secure system and method of providing same
US20070271596A1 (en) Security, storage and communication system
WO2008094136A1 (en) Wireless authentication
CN105574967A (en) Intelligent access control system and operation method thereof
CN109067881A (en) Remote-authorization method and its device, equipment and storage medium
US8931080B2 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
US20030014642A1 (en) Security arrangement
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN110084947B (en) Access control information updating method and device
CN110223420A (en) A kind of fingerprint unlocking system
RU2260840C2 (en) Protection means
CN110766840A (en) Access control password setting method and device
CN107332989B (en) Data protection system and data protection method of mobile terminal
WO2023239329A1 (en) Secure area door safety system
WO2007092429A2 (en) Secure system and method for providing same
WO2016156665A1 (en) Control device for controlling an electric locking device

Legal Events

Date Code Title Description
FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: LERNER, DANIEL MAURICE, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LERNER, DANIEL MAURICE;REEL/FRAME:052226/0742

Effective date: 20200325

AS Assignment

Owner name: IRONCLAD ENCRYPTION CORPORATION, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LERNER, DANIEL MAURICE;REEL/FRAME:055859/0829

Effective date: 20210331

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment: 4