Eine Plattform für die Wissenschaft: Bauingenieurwesen, Architektur und Urbanistik
Asymmetric cryptography assisted authentication and access protocols
A lock for securing access to a physical resource is provided. The lock includes a wireless interface configured for communication with a plurality of lock access devices in vicinity of the lock. The wireless interface is further configured to receive digital certificates from the plurality of lock access devices. The lock further includes a memory configured to store a public key, and a processor configured to authenticate a digital certificate received from a lock access device using the public key. The processor may further be configured to extract a wait time parameter, scheduled access period parameter, or re-use parameter from the digital certificate. In addition, the processor is configured to unlock the lock after a delay period based on the wait time parameter, during a scheduled access period based on the scheduled access period parameter, or based on the number of times indicated by the re-use parameter.
Asymmetric cryptography assisted authentication and access protocols
A lock for securing access to a physical resource is provided. The lock includes a wireless interface configured for communication with a plurality of lock access devices in vicinity of the lock. The wireless interface is further configured to receive digital certificates from the plurality of lock access devices. The lock further includes a memory configured to store a public key, and a processor configured to authenticate a digital certificate received from a lock access device using the public key. The processor may further be configured to extract a wait time parameter, scheduled access period parameter, or re-use parameter from the digital certificate. In addition, the processor is configured to unlock the lock after a delay period based on the wait time parameter, during a scheduled access period based on the scheduled access period parameter, or based on the number of times indicated by the re-use parameter.
Asymmetric cryptography assisted authentication and access protocols
KLINK JEROD D (Autor:in)
28.03.2023
Patent
Elektronische Ressource
Englisch
ASYMMETRIC CRYPTOGRAPHY ASSISTED AUTHENTICATION AND ACCESS PROTOCOLS
Europäisches Patentamt | 2020
|SECURE ACCESS TO PHYSICAL RESOURCES USING ASYMMETRIC CRYPTOGRAPHY
Europäisches Patentamt | 2023
|2-DWT and AES: Secure Authentication Management for Polar Iris Templates Using Visual Cryptography
British Library Online Contents | 2017
|