Patent application number | Description | Published |
20100034375 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 02-11-2010 |
20100230490 | SECURE ACCESS MODULE FOR INTEGRATED CIRCUIT CARD APPLICATIONS - Mechanisms are provided for executing security-sensitive applications with a general-purpose computing device. In particular, the general-purpose computing device includes an unsecure computing environment and a secure computing environment. The secure computing environment is established with a secure access module that includes data and functions for executing the security-sensitive application on behalf of the unsecure computing environment. | 09-16-2010 |
20100235360 | SYNCHRONIZED RELAY MESSAGING AND COORDINATED NETWORK PROCESSING USING SNMP - Methods, devices, and systems are provided for utilizing asynchronous messaging protocols, such as the Simple Network Management Protocol (SNMP), to implement relay messaging through a network, gather data from and/or set parameters on a plurality of managed devices in a network through the issuance and transmission of a single SNMP message, and/or cause multiple managed devices to perform cooperative and coordinated computations through the issuance of a single SNMP message. | 09-16-2010 |
20100235487 | USE OF SNMP FOR MANAGEMENT OF SMALL FOOTPRINT DEVICES - Methods, devices, and systems are provided for managing and controlling small footprint devices with a lightweight control protocol, such as SNMP. Relatively small control messages are employed that have a compact command portion included in an object identifier portion, thereby circumventing the need for a separate command portion as well as a data body. Also, methods, devices, and systems for improving the security and privacy of processing SNMP messages on SNMP-managed devices by moving this processing together with the sensitive data that the process employ such a cryptographic keys inside the tamper-resistant and tamper-evident boundary of an integrated circuit card. | 09-16-2010 |
20100235622 | TRANSFER DEVICE FOR SENSITIVE MATERIAL SUCH AS A CRYPTOGRAPHIC KEY - Mechanisms are provided for transferring sensitive information, such as cryptographic keys, between entities. Particularly, a device is provided with a user input connected directly to a secure element. The device enables a user to enter sensitive information in the user input which is then passed directly to the secure element without traversing any other element such that the secure element can encode and/or encrypt the sensitive information. Once the sensitive information has been encoded and/or encrypted by the secure element, the now secure sensitive information can be shared with other entities using familiar and popular, yet relatively unsecure, transfer methods. | 09-16-2010 |
20100235900 | EFFICIENT TWO-FACTOR AUTHENTICATION - Methods, devices, and systems are provided for an efficient two-factor authentication process. In particular, a card challenge is combined with a user-provided password or similar user-based credential before a transformation of the data is performed. Once the combined challenge and user-provided credential have been transformed, the transformed data is used as a basis for authentication verification. | 09-16-2010 |
20100235905 | REALIZATION OF ACCESS CONTROL CONDITIONS AS BOOLEAN EXPRESSIONS IN CREDENTIAL AUTHENTICATIONS - A method, reader, and system are provided for performing group authentication processes. In particular, a group access decision can be made upon the analysis of a group rule. The group rule may contain a Boolean expression including one or more Boolean conditions. If an appropriate group of credentials are presented to a reader such that the Boolean expression is satisfied, then the group of credentials and the holders thereof are allowed access to a protected asset. | 09-16-2010 |
20110016524 | BLIND VERIFICATION OF COMPUTER FIRMWARE - The means for using zero-knowledge protocols to provide assurance that the executable program instructions in a particular computing device are identical to given set of executable program instructions without revealing the executable program instructions themselves are disclosed. | 01-20-2011 |
20110264926 | USE OF A SECURE ELEMENT FOR WRITING TO AND READING FROM MACHINE READABLE CREDENTIALS - A method for conducting secure communications with credential cards using existing reader/writer hardware that enhances the security of the provisioning process is provided. The method moves the sensitive data contained in these communications together with the program that uses this sensitive data for the purpose of interacting with a credential card inside a secure computational element such as an integrated circuit card. The provisioning program inside the secure element issues commands to readers/writers of existing art in order to establish secure communication with the credential card and then uses the secure channel so created for the purpose of direction communication between the secure computation element and the credential card. | 10-27-2011 |
20110289125 | METHOD FOR INCREMENTAL ANTI-TEAR GARBAGE COLLECTION - Persistent memory in an integrated circuit cars (ICC) must be managed in such a way that removal of power from the device at any moment does not leave the data stored in this memory in a faulty or inconsistent state. The mechanisms of this disclosure accomplish this end using the tag-length-value data structures found extensively in ICC software and standards. | 11-24-2011 |
20130117814 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 05-09-2013 |
20130117827 | SECURE WIEGAND COMMUNICATIONS - The present invention is directed toward secure access systems. Specifically, a method and system is provided that enhances the security of unidirectional communication protocols used in access control systems, such as the Wiegand protocol. The enhancements may include obfuscation of data, a two-way packet-mode communications, and blind synchronization of pseudo-random number generators. | 05-09-2013 |