A platform for research: civil engineering, architecture and urbanism
Asymmetric cryptography assisted authentication and access protocols
A lock for securing access to a physical resource is provided. The lock includes a wireless interface configured for communication with a plurality of lock access devices in vicinity of the lock. The wireless interface is further configured to receive digital certificates from the plurality of lock access devices. The lock further includes a memory configured to store a public key, and a processor configured to authenticate a digital certificate received from a lock access device using the public key. The processor may further be configured to extract a wait time parameter, scheduled access period parameter, or re-use parameter from the digital certificate. In addition, the processor is configured to unlock the lock after a delay period based on the wait time parameter, during a scheduled access period based on the scheduled access period parameter, or based on the number of times indicated by the re-use parameter.
Asymmetric cryptography assisted authentication and access protocols
A lock for securing access to a physical resource is provided. The lock includes a wireless interface configured for communication with a plurality of lock access devices in vicinity of the lock. The wireless interface is further configured to receive digital certificates from the plurality of lock access devices. The lock further includes a memory configured to store a public key, and a processor configured to authenticate a digital certificate received from a lock access device using the public key. The processor may further be configured to extract a wait time parameter, scheduled access period parameter, or re-use parameter from the digital certificate. In addition, the processor is configured to unlock the lock after a delay period based on the wait time parameter, during a scheduled access period based on the scheduled access period parameter, or based on the number of times indicated by the re-use parameter.
Asymmetric cryptography assisted authentication and access protocols
KLINK JEROD D (author)
2023-03-28
Patent
Electronic Resource
English
ASYMMETRIC CRYPTOGRAPHY ASSISTED AUTHENTICATION AND ACCESS PROTOCOLS
European Patent Office | 2020
|SECURE ACCESS TO PHYSICAL RESOURCES USING ASYMMETRIC CRYPTOGRAPHY
European Patent Office | 2023
|2-DWT and AES: Secure Authentication Management for Polar Iris Templates Using Visual Cryptography
British Library Online Contents | 2017
|