ASSA ABLOY AB Patent applications |
Patent application number | Title | Published |
20160142210 | SIGNATURES FOR NEAR FIELD COMMUNICATIONS - A data-carrying device and methods of authenticating the same are disclosed. The data-carrying device is described as being capable of communicating via the Near Field Communications (NFC) protocol and may have one or more NFC Data Exchange Format (NDEF) records stored in its memory. The data-carrying device also comprises or has the ability to generate a signature that proves the data-carrying device is the authorized device for storing the one or more NDEF records. A data-carrying device that attempts to transmit an NDEF record without a valid signature may be identified as an unauthorized data-carrying device. | 05-19-2016 |
20160026910 | METHOD OF MANUFACTURING A FUNCTIONAL INLAY - The method of manufacturing a functional inlay comprises the steps of: —providing a support layer with at least a first and a second side —embedding a wire antenna in said support layer —processing said support layer with said embedded wire antenna to a connection station in which —said support layer is approached on said first side by a holding device holding a chip with a surface comprising connection pads; —said support layer is approached on said second side by a connection device; and —said antenna wire is connected to said connection pads by means of a reciprocal pressure exerted between said holding device and said connection device. | 01-28-2016 |
20150367670 | METHOD OF USING LASER ABLATION TO REVEAL UNDERLYING SECURITY FEATURE AND DEVICE OBTAINED THEREBY - A credential with one or more security features is disclosed. The disclosed credential includes a thin-film metal layer that can be utilized as a recording media. The thin-film metal layer may also have portions thereof removed to reveal at least one underlying layer, such as a photoreactive layer. A method of manufacturing such a credential is also disclosed. | 12-24-2015 |
20150236861 | SIGNATURE - EFFICIENT REAL TIME CREDENTIALS FOR OCSP AND DISTRIBUTED OCSP - Providing information about digital certificate validity includes ascertaining digital certificate validity status for each of a plurality of digital certificates in a set of digital certificates, generating a plurality of artificially pre-computed messages about the validity status of at least a subset of the set of digital certificate of the plurality of digital certificates, where at least one of the messages indicates validity status of more than one digital certificate and digitally signing the artificially pre-computed messages to provide OCSP format responses that respond to OCSP queries about specific digital certificates in the set of digital certificates, where at least one digital signature is used in connection with an OCSP format response for more than one digital certificate. Generating and digitally signing may occur prior to any OCSP queries that are answered by any of the OCSP format responses. Ascertaining digital certificate validity status may include obtaining authenticated information about digital certificates. | 08-20-2015 |
20150224811 | SECURE LAIMINATE WITH SECURITY FEATURE ON THE EDGE - A laminate structure along with one or more security features is disclosed. The laminate structure may correspond to an identification document, such as an identification card, and may include a core layer with one or more security elements established thereon. As light is emitted into the core layer, the light impacts one or more of the security elements and is re-radiated back out of the core layer, thereby providing an indication that the laminate structure includes the security elements and is, therefore, authentic. | 08-13-2015 |
20150209980 | FUNCTIONAL LAMINATE WARP ELIMINATION METHOD - The present invention relates to a method and a device for rapidly stress relieving laminated RFID cards sheets ( | 07-30-2015 |
20150208245 | METHOD, APPARATUS, AND SYSTEM FOR PROVIDING AND USING A TRUSTED TAG - A trusted authority, validation system and method are provided. The system and method may employ Near Field Communication (NFC) technologies to prepare and write signed validation signatures to tags as well as read and analyze validation signatures from tags. An NFC-enabled phone is also provided as a mechanism for facilitating the trusted authority and validation services described herein. | 07-23-2015 |
20150186768 | TRANSPARENT RFID ANTENNA - A transponder having a transparent conductive material deposited thereon is disclosed. Specifically, the transparent conductive material forms an antenna or antenna portion of the transponder. The transparent conductive material includes a plurality of nanometer-sized materials that are integrated in a polymer solution. The nanometer sized materials are smaller than the wavelengths of visible light and therefore do not block or interfere with the visible light rays transmitted. Even at relatively high loading levels for the nanometer sized materials in the polymer solution, the polymer solution remains transparent in the visible light spectrum. The resulting conductive coating is also substantially transparent in the visible spectrum. | 07-02-2015 |
20150109098 | COMMUNICATION AND PROCESSING OF CREDENTIAL DATA - Credential data representing users seeking access to a well-defined space are registered in a reader unit associated with an access-control-related building component. A linked address associates the credential data with a first credential data receiver (EAC | 04-23-2015 |
20140359301 | UNIFORM MODULAR FRAMEWORK FOR A HOST COMPUTER SYSTEM - A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session. | 12-04-2014 |
20140331286 | EVENT DRIVEN SECOND FACTOR CREDENTIAL AUTHENTICATION - A reader configured to perform dual-factor authentication is provided. The reader is configured to analyze credential data as well as event-based user inputs. The event-based user inputs are received in response to the reader presenting one or more events to a user and monitoring the user's reaction thereto. Utilization of an event-based user input enables the reader to perform dual-factor authentication without necessarily being provided with a keyboard or other advanced user input device. | 11-06-2014 |
20140320261 | METHOD FOR UPGRADING RFID READERS IN SITU - A reader-enhancing device is proposed which enables an in situ upgrade of readers having limited processing capabilities. The reader-enhancing device includes an emulation module that is capable of generating an output which emulates a first type of credential when the reader-enhancing device receives an input that is not in a format used by the first type of credential. The output generated by the emulation module enables the reader to respond to the input even though the input is not in a format natively supported by the reader. | 10-30-2014 |
20140266627 | AUTONOMOUS TUNING METHOD TO IMPROVE RADIO FREQUENCY PERFORMANCE - Methods and systems are provided for an RFID system that can be tuned dynamically and/or in real-time during a coupling event between a reader and a transponder. The reader can comprise an antenna assembly, a signal driver, and a controller. The antenna assembly may include a tuning circuit and an antenna coupled to the tuning circuit. The tuning circuit can include registers that may be set to adjust one or more characteristics of the reader. A controller is coupled to the antenna assembly to determine characteristics of the received signal and to set hardware or firmware functions that improve the coupling of the reader and transponder and/or improve the reception of the signal(s) from the transponder. | 09-18-2014 |
20140248867 | SYSTEM FOR PROGRAMMING A LOCK COMPRISING CONTACTLESS NFC COMMUNICATION MEANS - The invention relates to a system including a lock ( | 09-04-2014 |
20140173717 | SYSTEM AND METHOD OF SECURE DATA ENTRY - A computational device having a user interface is disclosed, the user interface enables a user to securely enter data into the computational device. In particular, the user interface may include a user input portion and a user output portion. The user input portion may be partitioned into a number of input zones, each having a data value associated therewith that when engaged by a user causes the data value associated with the engaged input zone to be provided as input to the computational device. | 06-19-2014 |
20140145823 | ACCESS CONTROL SYSTEM - The present disclosure is generally directed toward access control systems and, more specifically, toward access control systems that utilize Near Field Communications (NFC)-enabled devices. The disclosed system enables an NFC device to be remotely checked-in to the access control system; however, the NFC device operates in a read/write mode rather than a card emulation mode when interacting with RFID readers of the access control system. | 05-29-2014 |
20140118147 | DIRECTIONAL SENSING MECHANISM AND COMMUNICATIONS AUTHENTICATION - The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s). | 05-01-2014 |
20140053248 | DETECTING AND RESPONDING TO AN ATYPICAL BEHAVIOR - Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided herein various mechanisms to provide a modified agent path such that an agent following the modified agent path, may update at least one non-networked reader. The update of the at least one non-networked reader not occurring if the agent follows an unmodified agent path. | 02-20-2014 |
20140049360 | DATA COLLECTION USING A CREDENTIAL - Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided herein various mechanisms to provide a modified agent path such that an agent following the modified agent path, may update at least one non-networked reader. The update of the at least one non-networked reader not occurring if the agent follows an unmodified agent path. | 02-20-2014 |
20140013418 | METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD - Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network. | 01-09-2014 |
20130181877 | METHOD TO PRODUCE A ROD TAG AND TAG PRODUCED BY THE METHOD - A method to produce a rod tag and tag produced according to the method, wherein the method comprises at least the steps of:
| 07-18-2013 |
20130117827 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 05-09-2013 |
20130117814 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 05-09-2013 |
20120157058 | SYSTEM AND METHOD FOR REMOTELY ASSIGNING AND REVOKING ACCESS CREDENTIALS USING A NEAR FIELD COMMUNICATION EQUIPPED MOBILE PHONE - The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have credential data loaded thereon remotely updated, enabled, disabled, revoked, or otherwise altered with a message sent from, for example, a control panel and/or controller in the system. | 06-21-2012 |
20120082963 | ANTENNA CALCULATION INTERFACE - A reader is proposed that includes a reader core having a web server provided thereon. The web server is made accessible to users via an advertised IP address. One set of scripts made available via the web server provide a user with the ability to optimize a tuning network for the reader. | 04-05-2012 |
20120036575 | METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD - Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network. | 02-09-2012 |
20110267174 | DIRECTIONAL SENSING MECHANISM AND COMMUNICATIONS AUTHENTICATION - The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s). | 11-03-2011 |
20110226856 | HIGH TEMPERATURE TAG - In the high temperature tag of the disclosure, a transponder is placed between at least two thin layers of compressible high temperature material, preferably a high temperature textile. This resulting sandwich is then placed in the closed chamber formed by a two-part-housing of high temperature plastic. Finally, a cover, also of high temperature plastic, is injection-molded over the joining parts of the housing, in order to seal it hermetically. | 09-22-2011 |
20110016524 | BLIND VERIFICATION OF COMPUTER FIRMWARE - The means for using zero-knowledge protocols to provide assurance that the executable program instructions in a particular computing device are identical to given set of executable program instructions without revealing the executable program instructions themselves are disclosed. | 01-20-2011 |
20100259390 | TRANSPONDER DETECTOR FOR AN RFID SYSTEM GENERATING A PROGRESSION OF DETECTION SIGNALS - A transponder detector is provided with capabilities for detecting the presence and type of a transponder in its read range while operating at low power. The transponder detector includes an antenna assembly and a detection signal generator circuit coupled to the antenna assembly. The detection signal generator circuit is capable of generating a progression of detection signals on the antenna assembly across a range of frequencies. The transponder detector further includes a response signal receiver circuit coupled to the antenna assembly to receive a progression of response signals from the antenna assembly resulting from the progression of detection signals. A controller is coupled to the response signal receiver circuit which determines the presence and type of the transponder based on an evaluation of a transponder detection parameter in the progression of response signals. | 10-14-2010 |
20100235905 | REALIZATION OF ACCESS CONTROL CONDITIONS AS BOOLEAN EXPRESSIONS IN CREDENTIAL AUTHENTICATIONS - A method, reader, and system are provided for performing group authentication processes. In particular, a group access decision can be made upon the analysis of a group rule. The group rule may contain a Boolean expression including one or more Boolean conditions. If an appropriate group of credentials are presented to a reader such that the Boolean expression is satisfied, then the group of credentials and the holders thereof are allowed access to a protected asset. | 09-16-2010 |
20100235900 | EFFICIENT TWO-FACTOR AUTHENTICATION - Methods, devices, and systems are provided for an efficient two-factor authentication process. In particular, a card challenge is combined with a user-provided password or similar user-based credential before a transformation of the data is performed. Once the combined challenge and user-provided credential have been transformed, the transformed data is used as a basis for authentication verification. | 09-16-2010 |
20100235622 | TRANSFER DEVICE FOR SENSITIVE MATERIAL SUCH AS A CRYPTOGRAPHIC KEY - Mechanisms are provided for transferring sensitive information, such as cryptographic keys, between entities. Particularly, a device is provided with a user input connected directly to a secure element. The device enables a user to enter sensitive information in the user input which is then passed directly to the secure element without traversing any other element such that the secure element can encode and/or encrypt the sensitive information. Once the sensitive information has been encoded and/or encrypted by the secure element, the now secure sensitive information can be shared with other entities using familiar and popular, yet relatively unsecure, transfer methods. | 09-16-2010 |
20100235487 | USE OF SNMP FOR MANAGEMENT OF SMALL FOOTPRINT DEVICES - Methods, devices, and systems are provided for managing and controlling small footprint devices with a lightweight control protocol, such as SNMP. Relatively small control messages are employed that have a compact command portion included in an object identifier portion, thereby circumventing the need for a separate command portion as well as a data body. Also, methods, devices, and systems for improving the security and privacy of processing SNMP messages on SNMP-managed devices by moving this processing together with the sensitive data that the process employ such a cryptographic keys inside the tamper-resistant and tamper-evident boundary of an integrated circuit card. | 09-16-2010 |
20100235360 | SYNCHRONIZED RELAY MESSAGING AND COORDINATED NETWORK PROCESSING USING SNMP - Methods, devices, and systems are provided for utilizing asynchronous messaging protocols, such as the Simple Network Management Protocol (SNMP), to implement relay messaging through a network, gather data from and/or set parameters on a plurality of managed devices in a network through the issuance and transmission of a single SNMP message, and/or cause multiple managed devices to perform cooperative and coordinated computations through the issuance of a single SNMP message. | 09-16-2010 |
20100230490 | SECURE ACCESS MODULE FOR INTEGRATED CIRCUIT CARD APPLICATIONS - Mechanisms are provided for executing security-sensitive applications with a general-purpose computing device. In particular, the general-purpose computing device includes an unsecure computing environment and a secure computing environment. The secure computing environment is established with a secure access module that includes data and functions for executing the security-sensitive application on behalf of the unsecure computing environment. | 09-16-2010 |
20100191951 | PROVISIONED FIRMWARE UPDATES USING OBJECT IDENTIFIERS - Methods, devices, and systems are provided for remotely updating provisioning data in devices or a population of devices. An update message is generated that includes an Object Identifier (OID) that uniquely identifies eligible devices or components for the provisioning data update. If an eligible device receives the update message, then the new provisioning data is loaded on the device, thereby replacing the old provisioning data on the device. | 07-29-2010 |
20100139341 | LOCK DEVICE - A lock device comprises an interlocking means comprising two axially movable parts ( | 06-10-2010 |
20100085163 | DECODING SCHEME FOR RFID READER - The present invention is directed toward the recovery of RFID signals from RFID credentials. The recovery and subsequent interpretation of RFID signals may be accomplished by providing a set of predetermined probabilities for the occurrence of a symbol after another symbol in a received signal. The predetermined probabilities may be dependent only upon the encoding scheme used, thereby providing a more robust and less processor intensive decoding protocol than has previously been contemplated. | 04-08-2010 |
20100039220 | RFID READER WITH EMBEDDED ATTACK DETECTION HEURISTICS - The present invention is directed toward secure access control systems. Specifically, a method and system is provided that detects, blocks, and reports attempts to compromise access control systems that utilizes machine readable credentials and reader devices. | 02-18-2010 |
20100034375 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 02-11-2010 |
20100033299 | DIRECTIONAL SENSING MECHANISM AND COMMUNICATIONS AUTHENTICATION - The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s). | 02-11-2010 |
20090251291 | SWITCHED CAPACITANCE METHOD FOR THE DETECTION OF, AND SUBSEQUENT COMMUNICATION WITH A WIRELESS TRANSPONDER DEVICE USING A SINGLE ANTENNA - A transponder detector is provided with capabilities for detecting the presence and type of a transponder in its read range while operating at low power and also using a common antenna for detecting and executing data transactions with transponders. | 10-08-2009 |
20090152362 | COUPLING DEVICE FOR TRANSPONDER AND SMART CARD WITH SUCH DEVICE - A coupling device is formed by a continuous conductive path having a central section and two extremity sections, the central section forming at least a small spiral for inductive coupling with the transponder device, the extremities sections forming each one large spiral for inductive coupling with the reader device, wherein the small spiral shows a larger pitch than the ones of the large spirals, and wherein the two extremities of the continuous path are loose such that the coupling device forms an open circuit. The pitches of the large spirals are chosen such as that the interturn stray capacitances is important and that the large spirals have mainly a capacitive behaviour. And the pitch of the small spiral is chosen such as that the interturn stray capacitances are negligible, and that the small spiral has mainly an inductive behaviour. | 06-18-2009 |
20090135817 | METHOD FOR COMPUTING THE ENTROPIC VALUE OF A DYNAMICAL MEMORY SYSTEM - Methods, devices, and systems are provided for optimizing the dissemination of information in an access control system. More specifically, there are provided various mechanisms to increase the efficiency with which system updates and other types of information are spread throughout an access control system having at least one non-networked reader. | 05-28-2009 |
20090085226 | METHOD AND ARRANGEMENT FOR CONTACT-CONNECTING SEMICONDUCTOR CHIPS ON A METALLIC SUBSTRATE - The method comprises the following steps: the substrate in the form of a one-piece basic substrate ( | 04-02-2009 |
20090055911 | METHOD FOR COMPUTING THE ENTROPIC VALUE OF A DYNAMICAL MEMORY SYSTEM - Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided various mechanisms to increase the efficiency with which system updates and other types of information are spread throughout an access control system having at least one non-networked reader. | 02-26-2009 |
20090004467 | HIGH DURABILITY CONTACTLESS IDENTIFICATION CARD - A 10-year universal contactless composite card is provided that can be personalized by both color and black&white surface printing and laser-engraving. The card includes a prelam layer or core that is a combination of polyvinyl chloride and polycarbonate. A co-extruded polycarbonate layer is then provided external to the polyvinyl chloride/polycarbonate core. The co-extruded polycarbonate layer is capable of being engraved by a laser. A clear polyvinyl chloride layer, which is capable of accepting printing ink, may then be provided on top of the co-extruded polycarbonate layer, thereby allowing the card to be personalized with either printing techniques or laser-engraving techniques. | 01-01-2009 |