CN101268649B - Controlling access using additional data - Google Patents
Controlling access using additional data Download PDFInfo
- Publication number
- CN101268649B CN101268649B CN2004800220044A CN200480022004A CN101268649B CN 101268649 B CN101268649 B CN 101268649B CN 2004800220044 A CN2004800220044 A CN 2004800220044A CN 200480022004 A CN200480022004 A CN 200480022004A CN 101268649 B CN101268649 B CN 101268649B
- Authority
- CN
- China
- Prior art keywords
- data
- voucher
- card
- credential
- prove
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
- Credit Cards Or The Like (AREA)
Abstract
Description
相关申请交叉索引 Related application cross-references
本申请要求2003年7月18日申请的美国临时专利申请60/488,645的优先权,其通过引用组合于此,且还要求2003年9月24日申请的美国临时专利申请60/505,640的优先权,其通过引用组合于此,且是2004年6月24日申请的美国专利申请10/876,275(未决)的延续,其要求2003年6月24日申请的美国临时专利申请60/482,179的优先权,且其本身是2001年7月25日申请的美国专利申请09/915,180的部分的延续,其是2000年1月14日申请的美国专利申请09/483,125的延续(现在为美国专利6,292,893),其是1999年7月19日申请的美国专利申请09/356,745的延续(已放弃),其是1997年3月24日申请的美国专利申请08/823,354的延续(现在为美国专利5,960,083),其是1995年11月16日申请的美国专利申请08/559,533的延续(现在为美国专利5,666,416),其要求1995年10月24日申请的美国临时申请60/006,038的优先权,且是2003年4月8日申请的美国专利申请10/409,638的延续(未决),其要求下述申请的优先权:2002年4月8日申请的美国临时申请60/370,867;2002年4月16日申请的美国临时申请60/372,951;2002年4月17日申请的美国临时申请60/373,218;2002年4月23日申请的美国临时申请60/374,861;2002年10月23日申请的美国临时申请60/420,795;2002年10月25日申请的美国临时申请60/421,197;2002年10月28日申请的美国临时申请60/421,756;2002年10月30日申请的美国临时申请60/422,416;2002年11月19日申请的美国临时申请60/427,504;2003年1月29日申请的美国临时申请60/443,407;及2003年2月10日申请的美国临时申请60/446,149;所有这些申请的示教均通过引用组合于此。且其是2002年3月20日申请的美国专利申请10/103,541(未决)的部分的延续, 其示教通过引用组合于此,其本身是2001年7月25日申请的美国专利申请09/915,180(未决)的部分的延续,且其是2000年1月14日申请的美国专利申请09/483,125的延续(现在为美国专利6,292,893),其是1999年7月19日申请的美国专利申请09/356,745的延续(已放弃),其是1997年3月24日申请的美国专利申请08/823,354的延续(现在为美国专利5,960,083),其是1995年11月16日申请的美国专利申请08/559,533的延续(现在为美国专利5,666,416),其基于1995年10月24日申请的美国临时申请60/006,038。美国专利申请10/103,541还是1997年12月18日申请的美国专利申请08/992,897(现在为美国专利6,487,658)的延续,其基于1996年12月18日申请的美国临时申请60/033,415,且其是1996年9月19日申请的美国专利申请08/715,712(已放弃)的部分的延续,其基于1995年10月2日申请的美国临时申请60/004,796的延续。美国专利申请08/992,897的部分还是1996年10月11日申请的美国专利申请08/729,619(现在为美国专利6,097,811)的延续,其基于1995年11月2日申请的美国临时申请60/006,143。美国专利申请08/992,897的部分还是1997年2月24日申请的美国专利申请08/804,868(已放弃)的延续,其是1996年11月1日申请的美国专利申请08/741,601(已放弃)的延续,其基于1995年11月2日申请的美国临时申请60/006,143。美国专利申请08/992,897的部分还是1997年6月11日申请的美国专利申请08/872,900(已放弃)的延续,其是1996年11月5日申请的美国专利申请08/746,007(现在为美国专利5,793,868)的延续,其基于1996年8月29日申请的美国临时申请60/025,128。美国专利申请08/992,897还基于1997年2月3日申请的美国临时申请60/035,119,其还是1997年8月5日申请的美国专利申请08/906,464(已放弃)的延续,其部分是1996年12月9日申请的美国专利申请08/763,536(现在为美国专利5,717,758)的延续,其基于1996年9月10日申请的美国临时申请60/024,786,并基于1996年4月23日申请的美国专利申请 08/636,854(现在为美国专利5,604,804),并还基于1996年8月29日申请的美国临时申请60/025,128。美国专利申请08/992,897的部分还是1996年11月26日申请的美国专利申请08/756,720(已放弃)的延续,其基于1996年8月29日申请的美国临时申请60/025,128,并还基于1996年9月19日申请的美国专利申请08/715,712(已放弃),并还基于1995年11月16日申请的美国专利申请08/559,533(现在为美国专利5,666,416)。美国专利申请08/992,897的部分还是1996年11月19日申请的美国专利申请08/752,223(现在为美国专利5,71 7,757)的延续,其基于1996年8月29日申请的美国临时申请60/025,128,且部分还是1997年2月24日申请的美国专利申请08/804,869(已放弃)的延续,其是1996年11月1日申请的美国专利申请08/741,601(已放弃)的延续,其基于1995年11月2日申请的美国临时申请60/006,143。美国专利申请08/992,897的部分还是1997年3月24日申请的美国专利申请08/823,354(现在为美国专利5,960,083)的延续,其是1995年11月16日申请的美国专利申请08/559,533(现在为美国专利5,666,416)的延续,其基于1995年10月24日申请的美国临时申请60/006,038。美国专利申请10/103,541还基于2001年3月20日申请的美国临时申请60/277,244、及2001年6月25日申请的美国临时申请60/300,621、及2001年12月27日申请的美国临时申请60/344,245。上述所有申请均通过引用组合于此。美国专利申请10/409,638还是2001年6月25日申请的美国专利申请09/915,180(未决)的延续,其示教组合于此以供参考,其本身是2000年1月14日申请的美国专利申请09/483,125(现在为美国专利6,292,893)的延续,其是1999年7月19日申请的美国专利申请09/356,745(已放弃)的延续,其是1997年3月24日申请的美国专利申请08/823,354(现在为美国专利5,960,083)的延续,其是1995年11月16日申请的美国专利申请08/559,533(现在为美国专利5,666,416)的延续,其基于1995年10月24日申请的美国临时申请60/006,038。上述所有申请的示教均 通过引用组合于此。美国专利申请10/409,638还是2003年3月21日申请的美国专利申请10/395,017(未决的)的延续,其示教组合于此以供参考,其本身是2002年9月16日申请的美国专利申请10/244,695(已放弃)的延续,其是1997年12月18日申请的美国专利申请08/992,897(现在为美国专利6,487,658)的延续,其基于1996年12月18日申请的美国临时专利申请60/033,415,且其部分是1996年9月19日申请的美国专利申请08/715,712(已放弃)的延续,其基于1995年10月2日申请的美国专利申请60/004,796,且其部分还是1996年10月10日申请的美国专利申请08/729,619(现在为美国专利6,097,811)的延续,其基于1995年11月2日申请的美国专利申请60/006,143,且其部分还是1997年2月24日申请的美国专利申请08/804,868(已放弃)的延续,其是1996年11月1日申请的美国专利申请08/741,601(已放弃)的延续,其基于1995年11月2日申请的美国专利申请60/006,143,且其部分还是1997年6月11日申请的美国专利申请08/872,900(已放弃)的延续,其是1996年11月5日申请的美国专利申请08/746,007(现在为美国专利5,793,868)的延续,其基于1996年8月29日申请的美国专利申请60/025,128,且其还基于1997年2月3日申请的美国专利申请60/035,119,且其部分还是1997年8月5日申请的美国专利申请08/906,464(已放弃)的延续,其是1996年12月9日申请的美国专利申请08/763,536(现在为美国专利5,717,758)的延续,其基于1996年9月10日申请的美国专利申请60/024,786,且还基于1997年4月23日申请的美国专利申请08/636,854(现在为美国专利5,604,804)及1996年8月29日申请的美国专利申请60/025,128,且其部分还是1996年11月26日申请的美国专利申请08/756,720(已放弃)的延续,其基于1996年8月29日申请的美国专利申请60/025,128,并还基于1996年9月19日申请的美国专利申请08/715,712(已放弃),并还基于1995年11月16日申请的美国专利申请08/559,533(现在为美国专利5,666,416),且其部分还是1996 年11月19日申请的美国专利申请08/752,223(现在为美国专利5,717,757)的延续,其基于1996年8月29日申请的美国专利申请60/025,128,且部分还是1997年2月24日申请的美国专利申请08/804,869(已放弃)的延续,其是1996年11月1日申请的美国专利申请08/741,601(已放弃)的延续,其基于1995年11月2日申请的美国专利申请60/006,143,且其部分还是1997年3月24日申请的美国专利申请08/823,354(现在为美国专利5,960,083)的延续,其是1995年11月16日申请的美国专利申请08/559,533(现在为美国专利5,666,416)的延续,其基于1995年10月24日申请的美国专利申请60/006,038。上述所有申请的示教均通过引用组合于此。 This application claims priority to U.S. Provisional Patent Application 60/488,645, filed July 18, 2003, which is hereby incorporated by reference, and also claims priority to U.S. Provisional Patent Application 60/505,640, filed September 24, 2003 , which is incorporated herein by reference and is a continuation of U.S. Patent Application 10/876,275 (pending), filed June 24, 2004, which claims priority over U.S. Provisional Patent Application 60/482,179, filed June 24, 2003 and itself a continuation-in-part of U.S. Patent Application 09/915,180, filed July 25, 2001, which is a continuation of U.S. Patent Application 09/483,125, filed January 14, 2000 (now U.S. Patent 6,292,893) , which is a continuation of U.S. Patent Application 09/356,745, filed July 19, 1999 (abandoned), which is a continuation of U.S. Patent Application 08/823,354, filed March 24, 1997 (now U.S. Patent 5,960,083), It is a continuation of U.S. Patent Application 08/559,533, filed November 16, 1995 (now U.S. Patent 5,666,416), which claimed priority to U.S. Provisional Application 60/006,038, filed October 24, 1995, and was filed in 2003 Continuation (pending) of U.S. Patent Application 10/409,638, filed April 8, which claims priority to: U.S. Provisional Application 60/370,867, filed April 8, 2002; U.S. Provisional Application 60/372,951 filed April 17, 2002; U.S. Provisional Application 60/374,861 filed April 23, 2002; U.S. Provisional Application 60 filed October 23, 2002 /420,795; U.S. Provisional Application 60/421,197, filed October 25, 2002; U.S. Provisional Application 60/421,756, filed October 28, 2002; U.S. Provisional Application 60/422,416, filed October 30, 2002; U.S. Provisional Application 60/427,504, filed November 19; U.S. Provisional Application 60/443,407, filed January 29, 2003; and U.S. Provisional Application 60/446,149, filed February 10, 2003; teachings of all of these applications Both are incorporated herein by reference. and is a continuation-in-part of U.S. Patent Application 10/103,541 (pending) filed March 20, 2002, the teachings of which are incorporated herein by reference, itself U.S. Patent Application 09 filed July 25, 2001 /915,180 (pending), and which is a continuation-in-part of U.S. Patent Application 09/483,125, filed January 14, 2000 (now U.S. Patent 6,292,893), which is a U.S. Patent filed on July 19, 1999 Continuation (Abandoned) of Application 09/356,745, which was a continuation of U.S. Patent Application 08/823,354, filed March 24, 1997 (now U.S. Patent 5,960,083), which was a U.S. Patent Application, filed November 16, 1995 Continuation of 08/559,533 (now US Patent 5,666,416), which is based on US Provisional Application 60/006,038 filed October 24,1995. U.S. Patent Application 10/103,541 is also a continuation of U.S. Patent Application 08/992,897, filed December 18, 1997 (now U.S. Patent 6,487,658), which is based on U.S. Provisional Application 60/033,415, filed December 18, 1996, and which is a continuation-in-part of US Patent Application 08/715,712 (abandoned), filed September 19, 1996, which is based on a continuation of US Provisional Application 60/004,796, filed October 2, 1995. US Patent Application 08/992,897 is also a continuation-in-part of US Patent Application 08/729,619, filed October 11, 1996 (now US Patent 6,097,811), which is based on US Provisional Application 60/006,143, filed November 2, 1995. US patent application 08/992,897 is also a continuation-in-part of US patent application 08/804,868 (abandoned), filed February 24, 1997, which is a continuation of US patent application 08/741,601 (abandoned), filed November 1, 1996 A continuation of US Provisional Application 60/006,143 filed November 2, 1995. U.S. Patent Application 08/992,897 is also a continuation-in-part of U.S. Patent Application 08/872,900 (abandoned), filed June 11, 1997, which is U.S. Patent Application 08/746,007, filed November 5, 1996 (now U.S. Continuation of Patent 5,793,868) based on US Provisional Application 60/025,128 filed August 29, 1996. U.S. Patent Application 08/992,897 is also based on U.S. Provisional Application 60/035,119, filed February 3, 1997, which is also a continuation of U.S. Patent Application 08/906,464 (abandoned), filed August 5, 1997, which was filed in part in 1996 Continuation of U.S. Patent Application 08/763,536 (now U.S. Patent 5,717,758), filed December 9, 1996, based on U.S. Provisional Application 60/024,786, filed September 10, 1996, and based on U.S. Patent Application 08/636,854 (now U.S. Patent 5,604,804), and also based on U.S. Provisional Application 60/025,128 filed August 29, 1996. U.S. Patent Application 08/992,897 is also a continuation in part of U.S. Patent Application 08/756,720 (abandoned), filed November 26, 1996, based on U.S. Provisional Application 60/025,128, filed August 29, 1996, and based on US Patent Application 08/715,712, filed September 19, 1996 (abandoned), and also based on US Patent Application 08/559,533, filed November 16, 1995 (now US Patent 5,666,416). U.S. Patent Application 08/992,897 is also a continuation in part of U.S. Patent Application 08/752,223 filed November 19, 1996 (now U.S. Patent 5,717,757), which is based on U.S. Provisional Application 60 filed August 29, 1996 /025,128, and is also a continuation in part of U.S. Patent Application Serial No. 08/804,869 (abandoned), filed February 24, 1997, which is a continuation of U.S. Patent Application Serial No. 08/741,601 (abandoned), filed November 1, 1996, It is based on US Provisional Application 60/006,143 filed November 2,1995. US Patent Application 08/992,897 is also a continuation in part of US Patent Application 08/823,354, filed March 24, 1997 (now US Patent 5,960,083), which is a continuation of US Patent Application 08/559,533, filed November 16, 1995 ( Now a continuation of US Patent 5,666,416) based on US Provisional Application 60/006,038 filed October 24,1995. U.S. Patent Application 10/103,541 is also based on U.S. Provisional Application 60/277,244, filed March 20, 2001, and U.S. Provisional Application 60/300,621, filed June 25, 2001, and U.S. Provisional Application Apply 60/344,245. All of the above applications are hereby incorporated by reference. U.S. Patent Application 10/409,638 is also a continuation of U.S. Patent Application 09/915,180 (pending), filed June 25, 2001, the teachings of which are incorporated herein by reference, itself U.S. Patent Application No. 1, January 2000. Continuation of Patent Application 09/483,125 (now U.S. Patent 6,292,893), which was a continuation of U.S. Patent Application 09/356,745 (abandoned), filed July 19, 1999, which was a U.S. Patent filed March 24, 1997 Continuation of Application 08/823,354 (now U.S. Patent 5,960,083), which is a continuation of U.S. Patent Application 08/559,533 (now U.S. Patent 5,666,416), filed November 16, 1995, based on US provisional application 60/006,038. The teachings of all of the above applications are incorporated herein by reference. U.S. Patent Application 10/409,638 is also a continuation of U.S. Patent Application 10/395,017 (pending), filed March 21, 2003, the teachings of which are incorporated herein by reference, itself filed September 16, 2002 Continuation of U.S. Patent Application 10/244,695 (Abandoned), which is a continuation of U.S. Patent Application 08/992,897, filed December 18, 1997 (now U.S. Patent 6,487,658), based on U.S. Patent Application No. 1, filed December 18, 1996 Provisional Patent Application 60/033,415, a continuation in part of U.S. Patent Application 08/715,712 (abandoned), filed September 19, 1996, based on U.S. Patent Application 60/004,796, filed October 2, 1995, and Also a continuation in part of U.S. Patent Application 08/729,619 filed October 10, 1996 (now U.S. Patent 6,097,811), which is based on U.S. Patent Application 60/006,143 filed November 2, 1995, also in part 1997 Continuation of U.S. Patent Application Serial No. 08/804,868 (Abandoned), filed February 24, which is a continuation of U.S. Patent Application Serial No. 08/741,601 (Abandoned), filed November 1, 1996, based on November 2, 1995 filed U.S. Patent Application 60/006,143, which is also a continuation in part of U.S. Patent Application No. 08/872,900 (abandoned), filed June 11, 1997, which was U.S. Patent Application No. 08/746,007, filed November 5, 1996 (now U.S. Patent 5,793,868), which is based on U.S. Patent Application 60/025,128, filed August 29, 1996, which is also based on U.S. Patent Application 60/035,119, filed February 3, 1997, and is also based in part on Continuation of U.S. Patent Application Serial No. 08/906,464 (abandoned), filed August 5, 1997, which is a continuation of U.S. Patent Application Serial No. 08/763,536, filed December 9, 1996 (now U.S. Patent No. 5,717,758), based on 1996 U.S. Patent Application 60/024,786, filed September 10, 1997, and also based on U.S. Patent Application 08/636,854, filed April 23, 1997 (now U.S. Patent 5,604,804) and U.S. Patent Application, filed August 29, 1996 60/025,128, and a continuation in part of U.S. Patent Application 08/756,720, filed November 26, 1996 (abandoned), based on U.S. Patent Application 60/025,128, filed August 29, 1996, and also based on 1996 U.S. Patent Application 08/715,712 (abandoned) filed September 19, 1995 and also based on U.S. Patent Application filed November 16, 1995 08/559,533 (now U.S. Patent 5,666,416), and in part, a continuation of U.S. Patent Application 08/752,223 (now U.S. Patent 5,717,757), filed November 19, 1996, based on U.S. Patent application 60/025,128, which is also a continuation in part of U.S. patent application 08/804,869 (abandoned), filed February 24, 1997, which is a continuation of U.S. patent application 08/741,601 (abandoned), filed November 1, 1996 A continuation of U.S. Patent Application 60/006,143, filed November 2, 1995, and in part, U.S. Patent Application 08/823,354, filed March 24, 1997 (now U.S. Patent 5,960,083), which is Continuation of US Patent Application Serial No. 08/559,533, filed November 16, 1995 (now US Patent No. 5,666,416), which is based on US Patent Application Serial No. 60/006,038, filed October 24, 1995. The teachings of all of the above applications are hereby incorporated by reference. the
发明背景 Background of the invention
1.技术领域 1. Technical field
本申请涉及物理访问控制领域,特别是使用处理器操纵的锁及相关数据的物理访问控制领域。 This application relates to the field of physical access control, particularly using processor-manipulated locks and associated data. the
2.背景技术 2. Background technology
在许多情况下,如在访问机场、军事设施、办公楼等时,确保只有经授权的个人才可访问受保护的区域和设备是非常重要的。传统的门和墙可用于保护敏感区域,但具有传统的锁和钥匙的门在管理许多用户的设置时非常麻烦。例如,一旦雇员被解雇,很难收回当初雇用时发给该前雇员的物理钥匙。此外,还有这样的钥匙被复制多把且永未交出的风险。 In many situations, such as when visiting airports, military installations, office buildings, etc., it is important to ensure that only authorized individuals have access to protected areas and equipment. Traditional doors and walls can be used to secure sensitive areas, but doors with traditional locks and keys can be cumbersome to manage settings for many users. For example, once an employee is terminated, it is very difficult to recover the physical keys issued to the former employee upon employment. In addition, there is a risk that such keys will be copied multiple times and never handed over. the
智能门提供访问控制。在某些情况下,智能门可被装备以键盘,用户通过键盘可输入其PIN或密码。键盘可具有附加的存储器和/或基本处理器,有效的PIN/密码的列表可被保存在其中。因此,门可检查当前输入的PIN是否属于当前的有效列表。如果属于,则门打开。否则,门可保持被锁。当然,不是(唯一)依赖于传统的钥匙或简单的键盘,更现代的智能门可与卡(如智能卡和磁条卡)或无接触设备(如PDA、移动电话等)一起工作。这样的卡或设备可在除传统钥匙 或电子键盘之外辅助使用或用以代替前述钥匙或电子键盘。设计来由用户携带的这些磁条卡、智能卡或无接触设备可具有保存信息的能力,信息可被传输给门。更先进的卡还可具有计算和通信能力。门上的相应设备能够从卡读信息,并可能参加与卡的交互式协议,与计算机通信等。 Smart gates provide access control. In some cases, smart doors can be equipped with keypads through which users can enter their PIN or password. The keypad may have additional memory and/or base processor in which a list of valid PIN/passwords may be kept. Thus, the gate can check whether the currently entered PIN belongs to the current valid list. If it belongs, the door opens. Otherwise, the door can remain locked. Of course, rather than (only) relying on traditional keys or simple keypads, more modern smart doors work with cards (such as smart cards and magnetic stripe cards) or contactless devices (such as PDAs, mobile phones, etc.). Such cards or devices can be used in addition to or in place of traditional keys or electronic keypads. These magnetic stripe cards, smart cards or contactless devices designed to be carried by the user may have the ability to hold information which may be transmitted to the door. More advanced cards may also have computing and communication capabilities. The corresponding device on the door is able to read the information from the card and possibly participate in an interactive protocol with the card, communicate with the computer, etc. the
门的一方面是其连通性等级。全连接的门是一直与一些数据库(或其它计算机系统)连接的门。例如,数据库可包含关于当前有效的卡、用户、PIN等的信息。在某些情况下,为防止敌人改变流入门的信息,这样的连接被保护(例如,通过将从门到数据库的导线置放在钢管内)。另一方面,全不连通的门不与其紧靠的附近区域的外面进行通信。在这两个极端情况之间,还有具有断续连通性的门(例如,无线连接的“移动”门,其仅在地面站范围之内时才可与外面通信,如飞机或卡车的门)。 One aspect of a door is its connectivity class. A fully connected gate is one that is always connected to some database (or other computer system). For example, the database may contain information about currently valid cards, users, PINs, and the like. In some cases, such connections are secured (for example, by placing wires from the gate to the database within steel pipes) to prevent an adversary from altering the information flowing into the gate. A fully disconnected door, on the other hand, does not communicate with the outside of its immediate immediate vicinity. Between these two extremes, there are also doors with intermittent connectivity (e.g., wirelessly connected "mobile" doors that can only communicate with the outside when within range of a ground station, such as the doors of airplanes or trucks) ). the
传统的访问控制机制有许多缺点。全连接的门非常昂贵。将安全管连接到远处的智能门的花费可能远超出智能门本身的成本。以密码方式保护导线,同时可能较廉价,但也有其自己的成本(例如,保护和管理密钥的成本)。此外,没有钢管和安全守卫的密码系统不能防止导线被割断,在这种情况下,不长久连接的门可能被迫在两个极端选择之间进行选择:即,总是保持关闭或总是打开,但二者均不是合意。在一些情况下,全连接门通常不是可行的选择。(例如,在大西洋中部海平面以下的货物集装箱的门实际上被完全不连通。) Traditional access control mechanisms have many disadvantages. Fully connected doors are very expensive. The cost of connecting a security tube to a remote smart door can far outweigh the cost of the smart door itself. Cryptographically securing wires, while potentially less expensive, has its own costs (eg, the cost of securing and managing keys). Furthermore, a coded system without steel pipes and security guards does not protect against wires being cut, in which case doors that are not permanently connected may be forced to choose between two extreme choices: namely, always remain closed or always open , but neither is desirable. In some cases, fully connected doors are usually not a viable option. (For example, the doors of cargo containers below sea level in the mid-Atlantic are virtually completely disconnected.)
不连通的智能门可能较连通的门便宜。然而,传统接近智能门具有其自身的问题。例如,假设不连通的智能门能够识别PIN。被终止的雇员不再被授权通过该门,然而,如果他还记得他自己的PIN,他将没有任何困难打开如基本的智能门。因此,必须“抵消”已终止雇员的PIN的影响,这对于不连通的门来说很难。事实上,这样的过程可能非常麻烦且昂贵:机场设施具有好几百道门,无论雇员在何时离开或被终止雇用关系,均调度特殊的工人队伍出去并去除所有这些门的旧有程序太不切实际。 A non-connected smart door may be less expensive than a connected door. However, conventional access to smart doors has its own problems. For example, suppose a disconnected smart door is able to recognize a PIN. The terminated employee is no longer authorized to pass through the door, however, if he still remembers his own PIN, he will have no difficulty opening as a basic smart door. Therefore, the effect of the terminated employee's PIN must be "neutralized", which is difficult with disconnected doors. In fact, such a process can be cumbersome and expensive: an airport facility has hundreds of doors, and the old procedure of dispatching special teams of workers out and removing all of these doors whenever an employee leaves or is terminated is too inappropriate. practical. the
因此,希望提供与全连通的门相关联的安全等级,而不导致额外的成本。如所证明的,不连通的智能门和卡本身并不保证访问控制系统的安全、方便和低成本。 Therefore, it is desirable to provide the level of security associated with fully connected doors without incurring additional costs. As demonstrated, disconnected smart doors and cards alone do not guarantee the security, convenience and low cost of an access control system. the
发明内容 Contents of the invention
根据本发明,控制访问包括提供访问障碍,其包括有选择允许访问的控制器,至少一管理实体产生凭证/证明,其中如果仅给出凭证和过期证明的值,则不可确定为有效证明,控制器接收凭证/证明,控制器确定访问在当前是否被授权,如果访问被当前授权,则控制器允许访问。凭证/证明可以为一体,也可是分开的部分。可以是第一管理实体产生凭证,其它管理实体产生证明。第一管理实体还可产生证明或第一管理实体不可产生证明。凭证可对应于包括终值的数字证书,终值是将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。数字证书可包括电子设备的标识符。凭证可包括终值,终值为将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。凭证可包括用户请求访问的标识符。凭证/证明可包括数字签名。访问障碍可包括墙和门。控制访问还可包括提供连接到控制器的门锁,其中控制器允许访问包括控制器开动门锁以允许门打开。控制访问还可包括提供连接到控制器的读卡机,其中控制器从读卡机接收凭证/证明。凭证/证明可被提供在用户呈现的智能卡上。控制访问还可包括提供外部连接到控制器。外部连接可以是间歇性连接。控制器可使用外部连接接收至少一部分凭证/证明,或控制器可使用外部连接接收所有凭证/证明。控制访问还可包括提供读卡机连接到控制器,控制器从读卡机接收凭证/证明的剩余部分。凭证/证明可被提供在用户呈现的智能卡上。凭证/证明可包括用户输入的密码。凭证/证明可包括用户生物测定信息。凭证/证明可包括手写签名。凭证/证明可包括在用户所持的卡上提供的秘密值。凭证/证明可在预定时间后过期。 According to the invention, controlling access includes providing access barriers, including a controller that selectively allows access, at least one management entity generates a credential/certificate, wherein if only the value of the credential and expired certificate is given, it cannot be determined as a valid certificate, the control The credential/certificate is received by the controller, the controller determines whether access is currently authorized, and if access is currently authorized, the controller allows access. Credentials/proofs can be one piece or separate parts. It may be that the first management entity generates the credential and the other management entities generate the certificate. The first managing entity may also generate certificates or the first managing entity may not generate certificates. A credential may correspond to a digital certificate that includes a terminal value that is the result of applying a one-way function to the first certificate. Each proof may be the result of applying a one-way function to one of future proofs. A digital certificate may include an identifier for the electronic device. The credential may include a terminal value that is the result of applying the one-way function to the first proof. Each proof may be the result of applying a one-way function to one of future proofs. Credentials may include an identifier for which the user requests access. Credentials/proofs may include digital signatures. Barriers to access can include walls and doors. Controlling access may also include providing a door lock connected to the controller, wherein the controller allowing access includes the controller actuating the door lock to allow the door to open. Controlling access may also include providing a card reader connected to the controller, wherein the controller receives credentials/proof from the card reader. Credentials/proofs may be provided on a smart card presented by the user. Controlling access may also include providing external connections to the controller. External connections can be intermittent. The controller may receive at least some of the credentials/proofs using the external connection, or the controller may receive all the credentials/proofs using the external connection. Controlling access may also include providing a card reader connected to the controller, the controller receiving the remainder of the credential/proof from the card reader. Credentials/proofs may be provided on a smart card presented by the user. Credentials/proofs may include user-entered passwords. Credentials/proofs may include user biometric information. Credentials/proofs may include handwritten signatures. Credentials/proofs may include a secret value provided on a card held by the user. Vouchers/proofs can expire after a predetermined time. the
根据本发明,实体控制多个用户对至少一不连通的门的访问包括 将多个用户映射到组,对于一系列日期的每一时间间隔d,使管理机构产生数字签名SIGUDd,其表明该组的成员在时间间隔d期间可访问门,使该组的至少一成员在时间间隔d期间接收SIGUDd以呈现给门从而通过门,使该组的至少一成员将SIGUDd呈现给门D,并在验证下述内容之后使门打开:(i)SIGUDd是表明该组成员可在时间间隔d访问门的管理机构数字签名,及(ii)当前时间在时间间隔d之内。该组的至少一成员可具有用户卡且门可具有连接到机电锁的读卡机,该组的至少一成员可通过将SIGUDd保存在用户卡内而接收SIGUDd,并通过使用户卡被读卡机读而将SIGUDd呈现给门。管理机构可通过将SIGUDd记入可由该组的至少一成员访问的数据库中而使SIGUDd将被该组的至少一成员在时间间隔d期间接收。SIGUDd可以是公钥签名,且门可保存管理机构的公钥。门还可验证该组的至少一成员的身份信息。关于该组的至少一成员的身份信息可包括至少下述之一:PIN及对门的复杂问题的回答。 According to the invention, an entity controlling access of a plurality of users to at least one disconnected door comprises mapping the plurality of users to groups, for each interval d of a series of dates, causing the authority to generate a digital signature SIGUDd indicating that the group Members of the group have access to the gate during time interval d, have at least one member of the group receive SIGUDd to present to the gate during time interval d to pass through the gate, have at least one member of the group present SIGUDd to gate D, and verify The door is opened after (i) SIGUDd is the authority's digital signature indicating that the group member has access to the door for time interval d, and (ii) the current time is within time interval d. At least one member of the group may have a user card and the door may have a card reader connected to an electromechanical lock, at least one member of the group may receive SIGUDd by storing SIGUDd in the user card, and by having the user card read Machine readable and presents SIGUDd to the gate. The authority may cause SIGUDd to be received by at least one member of the group during time interval d by logging SIGUDd in a database accessible by at least one member of the group. SIGUDd may be a public key signature, and the gate may hold the governing body's public key. The gate may also verify identity information of at least one member of the group. The identity information about at least one member of the group may include at least one of: a PIN and answers to complex questions about the door. the
根据本发明,控制物理访问还包括分配实时凭证给一组用户,检查实时凭证,其中实时凭证包括固定的第一部分及定期被修改的第二部分,其中第二部分提供实时凭证为当前凭证的证明,通过在第一部分上执行操作并将结果与第二部分进行比较来验证实时凭证的有效性;且只在实时凭证被验证为有效时才允许该组成员的物理访问。第一部分可由管理机构数字签署。管理机构可提供第二部分。第二部分可由不同于管理机构的实体提供。实时凭证可被提供在智能卡上。该组的成员可在第一位置获得实时凭证的第二部分。该组的成员可被允许访问不同于且与第一位置分开的第二位置。实时凭证的第一部分的至少一部分可代表多次应用到实时凭证的第二部分的一部分的单向散列。多次可对应于自实时凭证的第一部分被发出之后逝去的时间量。控制物理访问还可包括控制通过门的访问。 According to the present invention, controlling physical access further includes assigning a real-time credential to a group of users, checking the real-time credential, wherein the real-time credential includes a fixed first part and a second part that is periodically modified, wherein the second part provides proof that the real-time credential is current , verify the validity of the live credential by performing an operation on the first part and comparing the result to the second part; and only allow physical access to members of the group if the live credential is verified as valid. The first part may be digitally signed by the governing body. The governing body may provide the second part. The second part may be provided by an entity other than the governing body. Real-time credentials can be provided on the smart card. Members of the group can obtain the second portion of the real-time credential at the first location. Members of the group may be allowed access to a second location that is different and separate from the first location. At least a portion of the first portion of the real-time credential may represent a one-way hash applied multiple times to a portion of the second portion of the real-time credential. The number of times may correspond to the amount of time that has elapsed since the first portion of the real-time credential was issued. Controlling physical access may also include controlling access through doors. the
根据本发明,确定访问包括确定特定的凭证/证明是否表明访问被允许,确定是否有另外的数据与凭证/证明相关联,其中另外的数据独立于凭证/证明,及如果特定凭证/证明表明访问已被允许且有另 外的数据与特定凭证/证明相关联,则根据另外的数据提供的信息决定是否拒绝访问。凭证/证明可以为一体,也可是分开的部分。可以是第一管理实体产生凭证,其它管理实体产生证明。第一管理实体还可产生证明或第一管理实体不可产生证明。凭证可对应于包括终值的数字证书,终值是将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。数字证书可包括电子设备的标识符。凭证可包括终值,终值为将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。凭证可包括用户请求访问的标识符。凭证/证明可包括数字签名。访问可以是对由墙和门封闭的区域的访问。确定访问可包括提供门锁,其中门锁根据访问是否被拒绝进行开启。确定访问还可包括提供接收凭证/证明的读卡机。凭证/证明可被提供在用户呈现的智能卡上。凭证/证明可包括用户输入的密码。凭证/证明可包括用户生物测定信息。凭证/证明可包括手写签名。凭证/证明可包括在用户所持的卡上提供的秘密值。凭证/证明可在预定时间后过期。另外的数据可被数字签署。另外的数据可以是与凭证/证明绑定的消息。消息可识别特定的凭证/证明并包括特定凭证/证明是否已被取消的指示。指示可以是空串。另外的数据可包括日期。另外的数据可以是包含关于特定凭证/证明的信息及包含关于一个或多个其它凭证/证明的信息的消息。确定访问还可包括保存另外的数据。另外的数据可包括到期时间,其表明另外的数据将被保存多久。到期时间可对应于特定凭证/证明的到期。确定访问还可包括将另外的数据保存预定长的时间。凭证/证明可在预定时间之后均到期。另外的数据可使用智能卡进行提供。智能卡可由试图访问区域的用户呈现。对区域的访问可使用墙和至少一门进行限制。另外的数据可用于不同于试图访问的用户的用户。确定访问还可包括提供通信链路并使用通信链路传输另外的数据。通信链路可由智能卡提供以另外的数据。智能卡可要求与通信链路定期通信以保持有效。智能卡可被另一智能卡提供以另外的数据。另外的数据可被有选择地提供给一小组智能卡。确定访问还可包括提供优先级给另 外的数据。另外的数据可根据提供给另外的数据的优先级而被有选择地提供给一小组智能卡。另外的数据可被随机提供给一小组智能卡。 According to the present invention, determining access includes determining whether a particular credential/certificate indicates that access is permitted, determining whether additional data is associated with the credential/certificate, wherein the additional data is independent of the credential/certificate, and determining whether a particular credential/certificate indicates access has been permitted and additional data is associated with a specific credential/certificate, it is decided whether to deny access based on the information provided by the additional data. Credentials/proofs can be one piece or separate parts. It may be that the first management entity generates the credential and the other management entities generate the certificate. The first managing entity may also generate certificates or the first managing entity may not generate certificates. A credential may correspond to a digital certificate that includes a terminal value that is the result of applying a one-way function to the first certificate. Each proof may be the result of applying a one-way function to one of future proofs. A digital certificate may include an identifier for the electronic device. The credential may include a terminal value that is the result of applying the one-way function to the first proof. Each proof may be the result of applying a one-way function to one of future proofs. Credentials may include an identifier for which the user requests access. Credentials/proofs may include digital signatures. Access can be to areas enclosed by walls and doors. Determining access may include providing a door lock, wherein the door lock is unlocked based on whether access is denied. Determining access may also include providing a card reader to receive the credential/proof. Credentials/proofs may be provided on a smart card presented by the user. Credentials/proofs may include user-entered passwords. Credentials/proofs may include user biometric information. Credentials/proofs may include handwritten signatures. Credentials/proofs may include a secret value provided on a card held by the user. Vouchers/proofs can expire after a predetermined time. Additional data may be digitally signed. Additional data may be messages tied to credentials/proofs. The message may identify the particular credential/certificate and include an indication of whether the particular credential/certificate has been revoked. Indication can be an empty string. Additional data may include dates. Additional data may be messages containing information about a particular credential/certificate and containing information about one or more other credential/certificates. Determining access may also include saving additional data. The additional data may include an expiration time indicating how long the additional data will be kept. An expiration time may correspond to the expiration of a particular credential/proof. Determining access may also include saving the additional data for a predetermined length of time. Vouchers/Certificates may both expire after a predetermined time. Additional data can be provided using a smart card. A smart card can be presented by a user attempting to access a zone. Access to areas may be restricted using walls and at least one door. Additional data is available for a user other than the user attempting to access. Determining access may also include providing a communication link and using the communication link to transmit additional data. A communication link may be provided by the smart card with additional data. A smart card may require periodic communication with the communication link to remain valid. A smart card can be provided with additional data by another smart card. Additional data can be selectively provided to a small group of smart cards. Determining access may also include providing priority to additional data. Additional data may be selectively provided to a small group of smart cards according to the priority given to the additional data. Additional data can be randomly provided to a small group of smart cards. the
根据本发明,发出和传播关于凭证的数据包括使实体发出表明凭证已被取消的经鉴定的数据,使得经鉴定的数据保存在第一用户的第一卡中,使用第一卡将经鉴定的数据传输给第一门,使第一门保存关于经鉴定的数据的信息,并使第一门依靠关于经鉴定的数据的信息来拒绝访问凭证。经鉴定的数据可由数字签名进行鉴定,且第一门可验证数字签名。数字签名可以是公钥数字签名。数字签名的公钥可与凭证关联。数字签名可以是私钥数字签名。凭证和第一卡均属于第一用户。凭证可被保存在不同于第一卡的第二卡中,第一门可通过从存储器检索关于经鉴定的数据的信息而依靠这样的信息。凭证可属于不同于第一用户的第二用户。经鉴定的数据可被首先保存在不同于第一卡的至少一其它卡中,且经鉴定的数据可从至少一其它卡传输给第一卡。经鉴定的数据可通过首先传输给不同于第一门的至少一其它门而从至少一其它卡传输给第一卡。实体可通过首先使经鉴定的数据保存在应答器上然后使第一卡从应答器获得经鉴定的数据而使得经鉴定的数据被保存在第一卡中。应答器可无保护。第一门可通过使经鉴定的数据首先传输给不同于第一卡的至少一其它卡而从第一卡接收关于经鉴定的数据的信息。至少一其它卡可通过使经鉴定的数据首先传输给不同于第一门的至少一其它门而从第一卡接收关于经鉴定的数据的信息。第一门可以是全不连通或间歇连通。 According to the invention, issuing and disseminating data about the voucher includes causing the entity to issue authenticated data indicating that the voucher has been cancelled, so that the authenticated data is stored in the first card of the first user, using the first card to transfer the authenticated The data is transmitted to the first gate, causing the first gate to store information about the authenticated data, and causing the first gate to deny access credentials relying on the information about the authenticated data. Authenticated data can be authenticated by a digital signature, and the first gate can verify the digital signature. The digital signature may be a public key digital signature. A digitally signed public key can be associated with a certificate. The digital signature may be a private key digital signature. Both the voucher and the first card belong to the first user. The credential may be stored in a second card different from the first card and the first gate may rely on information about the authenticated data by retrieving such information from memory. The credential may belong to a second user different from the first user. The authenticated data may first be stored in at least one other card than the first card, and the authenticated data may be transferred from the at least one other card to the first card. Authenticated data may be transmitted from at least one other card to the first card by first transmitting to at least one other gate different from the first gate. The entity may cause the authenticated data to be stored in the first card by first having the authenticated data stored on the transponder and then causing the first card to obtain the authenticated data from the transponder. The transponder may be unprotected. The first gate may receive information about authenticated data from the first card by causing the authenticated data to be first transmitted to at least one other card than the first card. At least one other card may receive information about authenticated data from the first card by having the authenticated data first transmitted to at least one other door than the first door. The first gate can be completely disconnected or intermittently connected. the
根据本发明,第一门接收关于第一用户的凭证的经鉴定的数据,过程包括从属于不同于第一用户的第二用户的第一卡接收经鉴定的数据,保存关于经鉴定的数据的信息,接收凭证,及依靠所保存的关于经鉴定的数据的信息拒绝访问凭证。经鉴定的数据可由数字签名进行鉴定,且第一门验证数字签名。数字签名可以是公钥数字签名。数字签名的公钥可与凭证关联。数字签名可以是私钥数字签名。经鉴定的数据可通过首先保存在至少一其它卡中然后从至少一其它卡传输给第一卡而被保存在第一卡中。经鉴定的数据可通过首先传输给不同 于第一门的至少一其它门而从至少一其它卡传输给第一卡。经鉴定的数据可通过首先保存在应答器上然后使第一卡从应答器获得而被保存在第一卡中。应答器可无保护。第一门可通过使经鉴定的数据首先传输给不同于第一卡的至少一其它卡而从第一卡接收关于经鉴定的数据的信息。至少一其它卡可通过使经鉴定的数据首先传输给不同于第一门的至少一其它门而从第一卡接收关于经鉴定的数据的信息。第一门可以是全不连通或间歇连通。 According to the invention, the first gate receives authenticated data on credentials of a first user, the process comprising receiving authenticated data from a first card belonging to a second user different from the first user, saving authenticated data on information, receive credentials, and deny access credentials by virtue of stored information about authenticated data. Authenticated data may be authenticated by a digital signature, and the first gate verifies the digital signature. The digital signature may be a public key digital signature. A digitally signed public key can be associated with a certificate. The digital signature may be a private key digital signature. Authenticated data may be stored in the first card by first being stored in at least one other card and then being transferred from the at least one other card to the first card. Authenticated data can be transmitted from at least one other card to the first card by first transmitting to at least one other door different from the first door. Authenticated data may be stored in the first card by first storing on the transponder and then having the first card obtain it from the transponder. The transponder may be unprotected. The first gate may receive information about authenticated data from the first card by causing the authenticated data to be first transmitted to at least one other card than the first card. At least one other card may receive information about authenticated data from the first card by having the authenticated data first transmitted to at least one other door than the first door. The first gate can be completely disconnected or intermittently connected. the
根据本发明,帮助立即取消访问包括接收关于凭证的经鉴定的数据,将关于经鉴定的数据的信息保存在第一卡上,及使第一门接收关于经鉴定的数据的信息。经鉴定的数据可由数字签名进行鉴定。数字签名可以是公钥数字签名。数字签名的公钥可与凭证关联。数字签名可以是私钥数字签名。凭证和卡均属于第一用户。如果第一卡在预先指定的时间中未能接收预先指定类型的信号,则第一卡将变为不可用于访问。凭证可属于不同于第一用户的另一用户。经鉴定的数据可通过首先保存在不同于第一卡的至少一其它卡中然后从至少一其它卡传输给第一卡而被第一卡接收。经鉴定的数据可通过首先传输给不同于第一门的至少一其它门而从至少一其它卡传输给第一卡。第一卡可从应答器获得经鉴定的数据。应答器可无保护。第一卡可通过首先将经鉴定的数据传输给不同于第一卡的至少一其它卡而使第一门接收关于经鉴定的数据的信息。第一卡可通过首先将经鉴定的数据传输给不同于第一门的至少一其它门而使至少一其它卡接收关于经鉴定的数据的信息。第一门可以全不连通或间歇连通。最后第一卡可从存储器删除所保存的关于经鉴定的数据的信息。凭证可具有到期日期,第一卡可在凭证过期之后从存储器删除所保存的关于经鉴定的数据的信息。凭证的到期日期可从凭证内指定的信息推断。 According to the invention, facilitating immediate revocation of access comprises receiving authenticated data about the credential, storing information about the authenticated data on the first card, and causing the first gate to receive information about the authenticated data. Authenticated data can be authenticated by a digital signature. The digital signature may be a public key digital signature. A digitally signed public key can be associated with a certificate. The digital signature may be a private key digital signature. Both the credential and the card belong to the first user. If the first card fails to receive a pre-specified type of signal within a pre-specified time, the first card will become unavailable for access. The credential may belong to another user than the first user. Authenticated data may be received by the first card by first being stored in at least one other card different from the first card and then being transmitted from the at least one other card to the first card. Authenticated data may be transmitted from at least one other card to the first card by first transmitting to at least one other gate different from the first gate. The first card can obtain authenticated data from the transponder. The transponder may be unprotected. The first card may cause the first gate to receive information about the authenticated data by first transmitting the authenticated data to at least one other card different from the first card. The first card may cause at least one other card to receive information about the authenticated data by first transmitting the authenticated data to at least one other door different from the first door. The first gate can be completely unconnected or intermittently connected. Finally the first card can delete the saved information about the authenticated data from the memory. The voucher may have an expiration date and the first card may delete the saved information about the authenticated data from the memory after the voucher has expired. The expiration date for a voucher can be inferred from the information specified within the voucher. the
根据本发明,记录与访问区域相关的事件包括记录与访问区域有关的事件以提供事件记录并鉴定至少一事件记录从而提供经鉴定的记录。记录事件可包括记录事件的时间。记录事件可包括记录事件的类型。事件可以是试图访问区域。记录事件可包括记录连同访问区域 尝试使用的凭证/证明。记录事件可包括记录尝试的结果。记录事件可包括记录不同于表明访问应被拒绝的凭证/证明的数据的存在。记录事件可包括记录与区域有关的另外的数据。鉴定记录可包括数字签署记录。鉴定至少一事件记录可包括鉴定事件记录及鉴定其它事件记录以提供单一经鉴定的记录。单一经鉴定的记录可被保存在卡上。经鉴定的记录可被保存在卡上。卡可具有另一经鉴定的记录保存于其上。另一经鉴定的记录可由卡连同用于访问区域的卡提供。如果另一经鉴定的记录未被验证,则访问可被拒绝。控制器可连同访问区域一起提供,其中控制器进一步鉴定另一经鉴定的记录。另一经鉴定的记录可使用数字证书进行鉴定。记录事件还可包括用户呈现卡以试图访问区域。记录事件还可包括在用户试图访问区域时卡进一步鉴定经鉴定的记录。与访问区域有关,控制器可被提供,其中控制器和卡共同进一步鉴定经鉴定的记录。记录事件可包括提供相关产生数据,其指明经鉴定的记录的内容。相关产生数据可与经鉴定的记录绑定。相关产生数据可与经鉴定的记录绑定且所得的绑定可被鉴定。所得到的绑定可被数字签署。相关产生数据可以是一系列数字,且数字中的特定之一可被赋予事件。记录事件还可包括鉴定特定数字和事件的绑定。鉴定绑定可包括数字签署绑定。鉴定绑定可包括单向散列绑定然后数字签署其结果。事件的相关产生数据可包括识别另一事件的信息。另一事件可以是在前的事件。另一事件可以是未来的事件。记录事件还可包括关联事件的第一和第二随机值,将第一和第二随机值中的至少一个与另一事件相关联,及将第一和第二值中的至少一个与另一事件绑定。提供相关产生数据可包括使用多项式产生相关信息。提供相关产生数据可包括使用散列链产生相关信息。相关产生数据可包括关于多个其它事件的信息。相关产生数据可包括纠错代码。记录事件还可包括传播经鉴定的记录。传播经鉴定的记录可包括将经鉴定的记录提供在由试图访问区域的用户呈现的卡上。区域可由墙和门确定。 According to the invention, recording events related to the visited area includes recording events related to the visited area to provide an event record and authenticating at least one event record to provide an authenticated record. Logging an event may include logging a time of the event. Logging an event may include logging a type of event. An event can be an attempt to access a region. Logging events may include logging the credentials/proofs used in connection with the access zone attempt. Logging the event may include logging a result of the attempt. Logging an event may include logging the presence of data other than credentials/proofs indicating that access should be denied. Logging the event may include logging additional data related to the zone. Authentication records may include digitally signed records. Authenticating at least one event record may include authenticating the event record and authenticating other event records to provide a single authenticated record. A single authenticated record can be saved on the card. Authenticated records can be saved on the card. The card may have another authenticated record kept on it. Another authenticated record may be provided by the card along with the card used to access the zone. Access may be denied if another authenticated record is not verified. The controller may be provided with an access zone, where the controller further authenticates another authenticated record. Another authenticated record can be authenticated using a digital certificate. Logging an event may also include the user presenting the card in an attempt to access the area. Logging events may also include card further authenticating authenticated logging when a user attempts to access a zone. In relation to the access zone, a controller may be provided, wherein the controller and the card cooperate to further authenticate the authenticated record. Recording an event may include providing associated generated data indicating the content of the authenticated record. Associated production data can be tied to authenticated records. Associated production data can be bound to the authenticated record and the resulting binding can be authenticated. The resulting binding can be digitally signed. The associated generated data can be a series of numbers, and a specific one of the numbers can be assigned to the event. Logging events may also include identifying specific numbers and bindings to events. Authentication bindings may include digitally signing bindings. Authentication binding may include one-way hash binding and then digitally signing the result. Related generation data for an event may include information identifying another event. Another event may be a preceding event. Another event may be a future event. Logging an event may also include associating the first and second random values of the event, associating at least one of the first and second random values with another event, and associating at least one of the first and second values with another Event binding. Providing the correlation generated data may include generating the correlation information using a polynomial. Providing the associated generated data may include generating associated information using a hash chain. Related generation data may include information about a number of other events. The associated generated data may include error correction codes. Logging events may also include propagating authenticated records. Propagating the authenticated record may include providing the authenticated record on a card presented by a user attempting to access the area. Areas can be defined by walls and doors. the
根据本发明,至少一管理实体控制电子设备的访问,其通过至少一管理实体为电子设备产生凭证和多个相应的证明,其中如果仅给出 According to the invention, at least one management entity controls the access of the electronic equipment, which generates a credential and a plurality of corresponding certificates for the electronic equipment through at least one management entity, wherein if only given
凭证和过期证明的值,不可确定有效的证明,电子设备接收凭证,如果访问在特定时间被授权,电子设备接收对应于特定时间的证明,及电子设备使用凭证确认证明。至少一管理实体可在产生凭证之后产生证明。单一管理实体可产生凭证并产生证明。也可以是第一管理实体产生凭证,其它管理实体产生证明。第一管理实体也可产生证明或不可产生证明。凭证可以是包括终值的数字证书,终值为将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。数字证书可包括电子设备的标识符。凭证可包括终值,其为将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。凭证可包括电子设备的标识符。电子设备可以是计算机,其仅在访问被授权时启动。电子设备可以是磁盘驱动器。至少一管理实体控制电子设备的访问可包括使用独立于至少一管理实体的至少一证明分配实体提供证明。可以仅有一个证明分配实体或有多个证明分配实体。至少一管理实体控制电子设备的访问可包括使用到电子设备的连接提供证明。连接可以是因特网。至少部分证明可被本机保存在电子设备上。至少一管理实体控制电子设备的访问可包括,如果对应于时间的证明不可在本机获得,电子设备经外部连接请求证明。每一证明可与特定的时间间隔相关联。在与特定证明相关联的特定时间间隔已消逝之后,电子设备可接收新证明。时间间隔可以是一天。 The value of the credential and expired certificate, which cannot be determined to be valid, the electronic device receives the credential, if access is authorized at a specific time, the electronic device receives the certificate corresponding to the specific time, and the electronic device uses the credential to confirm the certificate. At least one managing entity may generate the certificate after generating the credential. A single governing entity can generate credentials and generate certificates. It is also possible that the first management entity generates the credential, and the other management entities generate certificates. The first management entity may or may not generate certificates as well. The credential may be a digital certificate that includes a terminal value that is the result of applying a one-way function to the first certificate. Each proof may be the result of applying a one-way function to one of future proofs. A digital certificate may include an identifier for the electronic device. The credential may include an end value that is the result of applying the one-way function to the first proof. Each proof may be the result of applying a one-way function to one of future proofs. Credentials may include an identifier for the electronic device. An electronic device may be a computer, which only starts up when access is authorized. The electronic device may be a disk drive. At least one management entity controlling access to the electronic device may include providing certification using at least one certification distribution entity independent of the at least one management entity. There may be only one certificate distribution entity or multiple certificate distribution entities. At least one management entity controlling access to the electronic device may include providing credentials using a connection to the electronic device. The connection can be the Internet. At least a portion of the certificate may be locally stored on the electronic device. The at least one management entity controlling access to the electronic device may include, if the certificate corresponding to the time is not available locally, the electronic device requesting the certificate via an external connection. Each proof can be associated with a specific time interval. After a particular time interval associated with a particular certificate has elapsed, the electronic device may receive a new certificate. The time interval can be one day. the
根据本发明,电子设备控制对其的访问,其通过接收用于电子设备的凭证和多个相应证明中的至少一个,其中如果仅给出凭证和过期证明的值则不可确定有效的证明,且使用凭证测试多个证明中的至少一个。凭证可以是包括终值的数字证书,终值为将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。数字证书可包括电子设备的标识符。凭证可包括终值,其为将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。凭证可包括电子设备的标识符。电子设备可以是计算机。电子设备控制对其的访问还可包括仅在访问被授权时计算机 启动。电子设备可以是磁盘驱动器。电子设备控制对其的访问可包括使用到电子设备的连接获得证明。连接可以是因特网。至少部分证明可被本机保存在电子设备上。电子设备控制对其的访问可包括,如果对应于时间的证明不可在本机获得,电子设备经外部连接请求证明。每一证明可与特定的时间间隔相关联。在与特定证明相关联的特定时间间隔已消逝之后,电子设备可接收新证明。时间间隔可以是一天。 According to the invention, the electronic device controls access thereto by receiving at least one of a plurality of corresponding certificates and a credential for the electronic device, wherein no valid certificate can be determined if only the values of the credential and the expired certificate are given, and At least one of the plurality of proofs is tested using the credential. The credential may be a digital certificate that includes a terminal value that is the result of applying a one-way function to the first certificate. Each proof may be the result of applying a one-way function to one of future proofs. A digital certificate may include an identifier for the electronic device. The credential may include an end value that is the result of applying the one-way function to the first proof. Each proof may be the result of applying a one-way function to one of future proofs. Credentials may include an identifier for the electronic device. The electronic device may be a computer. Controlling access thereto by the electronic device may also include starting the computer only when access is authorized. The electronic device may be a disk drive. Controlling access thereto by the electronic device may include obtaining credentials using a connection to the electronic device. The connection can be the Internet. At least a portion of the certificate may be locally stored on the electronic device. Controlling access thereto by the electronic device may include, if the certificate corresponding to the time is not available locally, the electronic device requesting the certificate via an external connection. Each proof can be associated with a specific time interval. After a particular time interval associated with a particular certificate has elapsed, the electronic device may receive a new certificate. The time interval can be one day. the
根据本发明,控制对电子设备的访问包括提供凭证给电子设备,如果访问在特定时间被允许,提供对应于特定时间的证明给电子设备,其中如果仅给出凭证和过期证明的值则不可确定证明。凭证可以是包括终值的数字证书,终值为将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。数字证书可包括电子设备的标识符。凭证可包括终值,其为将单向函数应用到第一证明的结果。每一证明可以是将单向函数应用到未来证明之一的结果。凭证可包括电子设备的标识符。电子设备可以是计算机。控制对电子设备的访问可包括仅在访问被授权时计算机启动。电子设备可以是磁盘驱动器。控制对电子设备的访问可包括使用独立于至少一管理实体的至少一证明分配实体提供证明。可以仅有一个证明分配实体。可以有多个证明分配实体。控制对电子设备的访问可包括使用到电子设备的连接提供证明。连接可以是因特网。至少部分证明可被本机保存在电子设备上。控制对电子设备的访问可包括,如果对应于时间的证明不可在本机获得,电子设备经外部连接请求证明。每一证明可与特定的时间间隔相关联。在与特定证明相关联的特定时间间隔已消逝之后,电子设备可接收新证明。时间间隔可以是一天。 According to the invention, controlling access to an electronic device includes providing a credential to the electronic device, and if access is allowed at a specific time, providing a certificate corresponding to a specific time, wherein the value of the certificate and the expired certificate cannot be determined if only the value of the certificate and the expired certificate are given. prove. The credential may be a digital certificate that includes a terminal value that is the result of applying a one-way function to the first certificate. Each proof may be the result of applying a one-way function to one of future proofs. A digital certificate may include an identifier for the electronic device. The credential may include an end value that is the result of applying the one-way function to the first proof. Each proof may be the result of applying a one-way function to one of future proofs. Credentials may include an identifier for the electronic device. The electronic device may be a computer. Controlling access to electronic devices may include computer booting only when access is authorized. The electronic device may be a disk drive. Controlling access to the electronic device may include providing the certificate using at least one certificate distribution entity independent of the at least one management entity. There may be only one certificate allocation entity. There can be multiple attestation allocation entities. Controlling access to the electronic device may include providing proof using a connection to the electronic device. The connection can be the Internet. At least a portion of the certificate may be locally stored on the electronic device. Controlling access to the electronic device may include, if the certificate corresponding to the time is not available locally, the electronic device requesting the certificate via an external connection. Each proof can be associated with a specific time interval. After a particular time interval associated with a particular certificate has elapsed, the electronic device may receive a new certificate. The time interval can be one day. the
附图说明 Description of drawings
图1A为根据在此描述的系统的实施例的示意图,其包括连接、多个电子设备、管理实体、证明分配实体。 FIG. 1A is a schematic diagram according to an embodiment of the system described herein, which includes a connection, a plurality of electronic devices, a management entity, and a certificate distribution entity. the
图1B为根据在此描述的系统的另一实施例的示意图,其包括连接、多个电子设备、管理实体、证明分配实体。 FIG. 1B is a schematic diagram according to another embodiment of the system described herein, which includes a connection, a plurality of electronic devices, a management entity, and a certificate distribution entity. the
图1C为根据在此描述的系统的另一实施例的示意图,其包括连接、多个电子设备、管理实体、证明分配实体。 Fig. 1C is a schematic diagram according to another embodiment of the system described herein, which includes a connection, a plurality of electronic devices, a management entity, and a certificate distribution entity. the
图1D为根据在此描述的系统的另一实施例的示意图,其包括连接、多个电子设备、管理实体、证明分配实体。 1D is a schematic diagram according to another embodiment of the system described herein, which includes a connection, a plurality of electronic devices, a management entity, and a certificate distribution entity. the
图2为根据在此描述的系统的电子设备的详细示图。 2 is a detailed diagram of an electronic device in accordance with the system described herein. the
图3为根据在此描述的系统,连同电子设备确定是否执行确认执行的步骤的流程图。 3 is a flow diagram of steps in conjunction with an electronic device determining whether to execute a confirmation execution according to the system described herein. the
图4为根据在此描述的系统,所执行的与执行确认有关的步骤的流程图。 FIG. 4 is a flow diagram of steps performed in connection with performing validation in accordance with the system described herein. the
图5为根据在此描述的系统,所执行的与产生凭证有关的步骤的流程图。 Figure 5 is a flowchart of the steps performed in connection with generating a credential according to the system described herein. the
图6为根据在此描述的系统,所执行的与根据凭证核对证明有关的步骤的流程图。 FIG. 6 is a flowchart of the steps performed in connection with checking proofs against credentials, according to the system described herein. the
图7为根据在此描述的系统的示意图,包括对其物理访问将被限制的区域。 Fig. 7 is a schematic diagram according to the system described herein, including an area to which physical access is to be restricted. the
具体实施方式 Detailed ways
参考图1A,图20示出了一般连接22,具有多个电子设备24-26连接到该连接。尽管图20示出了三个电子设备24-26,在此描述的系统可与任何数量的电子设备一起工作。连接22可被实施为直接电子数据连接、通过电话线的连接、LAN、WAN、因特网、虚拟专用网、或任何其它用于提供数据通信的机构。电子设备24-26可代表一个或多个膝上型计算机、台式计算机(在办公室中或在雇员家中或其它位置)、PDA、移动电话、磁盘驱动器、海量存储设备、或任何其它可用于限制对其的访问的电子设备。在在此的实施例中,电子设备24-26代表可由机构的雇员使用的台式或膝上型计算机,在用户/雇员离开机构和/或计算机之一被丢失或偷窃时机构希望限制对电子设备的访问。当然,可以有其它限制对一个或多个电子设备24-26的访问的原因,在此描述的系统可与任何适当的实施方式一起使用。
Referring to FIG. 1A , FIG. 20 shows a
管理实体28设定允许用户访问电子设备24-26的策略。例如,管理实体28可确定特定用户U1不再有权访问任何电子设备24-26,而另一用户U2可访问电子设备24但不可访问其它电子设备25、26。管理实体28可使用任何策略用于设定用户访问。
The
管理实体28提供多个证明,其经连接22传输给电子设备24-26。证明可通过其它手段提供给电子设备24-26,这些手段将在下面详细描述。电子设备24-26接收所分配的证明,使用内部保存的凭证(在本说明书别处详细描述),确定对其的访问是否应被允许。可选地,证明分配实体32也可被连接到连接22及管理实体28。证明分配实体32提供证明给电子设备24-26。在在此的实施例中,证明仅对一个用户和电子设备24-26之一有效,可选地,仅在某一日期或日期范围有效。
The
证明可使用美国专利5,666,416中公开的类似机制提供,该专利通过引用组合于此,其中,每一电子设备24-26将管理实体28(或其它经授权的实体)签署的数字证书作为凭证进行接收,数字证书包含特殊值,其代表单向函数应用到初始值N次后的值。在每一新的时间间隔,电子设备可被呈现以证明,其由通过应用单向函数获得的N个值中之一组成。在该例子中,电子设备24-26可通过多次应用单向函数以获得数字证书中提供的特殊值而确认证明是合法的。该机制及其它可能的机制均在本说明书别处详细描述。 Proof can be provided using a mechanism similar to that disclosed in U.S. Patent 5,666,416, which is incorporated herein by reference, wherein each electronic device 24-26 receives as a credential a digital certificate signed by the managing entity 28 (or other authorized entity) , the digital certificate contains a special value representing the value of the one-way function applied N times to the initial value. At each new time interval, the electronic device can be presented with a proof consisting of one of N values obtained by applying a one-way function. In this example, the electronic device 24-26 may confirm that the certificate is legitimate by applying the one-way function multiple times to obtain the particular value provided in the digital certificate. This mechanism, and other possible mechanisms, are described in detail elsewhere in this specification. the
也可使用麻萨诸塞州Cambridge的CoreStreet,Ltd.提供的一个或多个产品提供在此提出的适当凭证和证明,或使用任何其它用于产生独特证明的机制,其1)仅可已由管理机构(不存在管理安全违背)产生;及2)不能用于产生任何其它证明。因此,证明使得,给定合法证明P1,未经授权的用户不可产生另一表面上合法的证明P2用于不同的目的(例如,用于不同的时间间隔、不同的设备等)。因而,发出的证明可以非保密方式保存和分发,这实质上降低了系统成本。当然,对产生凭证和/或证明的实体保持适当的安全性及对任何未发出(如未来的)的证明保持适当的安全性是有利的。 Appropriate credentials and proofs set forth herein may also be provided using one or more of the products provided by CoreStreet, Ltd. of Cambridge, MA, or any other mechanism for generating unique proofs that 1) can only be obtained by Generated by a regulatory authority (no regulatory security violation exists); and 2) cannot be used to generate any other proofs. Thus, the proof is such that, given a legitimate proof P1, an unauthorized user cannot generate another apparently legitimate proof P2 for a different purpose (eg, for a different time interval, different device, etc.). Thus, issued proofs can be stored and distributed in a non-secure manner, which substantially reduces system cost. Of course, it is advantageous to maintain appropriate security for the entity generating the credential and/or certificate, as well as for any unissued (eg future) certificates. the
此外,拥有合法证明P1-PN的未经授权的用户不可产生新证明PN+1。这在许多情况下是有利的。例如,被终止雇用关系的雇员在终止之后即使其还拥有他被公司雇用时用于膝上型计算机的所有先前的合法证明,其自己也不可产生新证明以提供对其公司膝上型计算机的未经授权访问。 Furthermore, an unauthorized user possessing a valid proof P1-PN cannot generate a new proof PN+1. This is advantageous in many situations. For example, a terminated employee may not himself generate new certificates to provide certification for his company laptop after termination even if he still has all the previous legal certificates he used for the laptop while employed by the company. Unauthorized access. the
在在此的实施例中,电子设备24-26为具有执行在此描述的处理的固件和/或操作系统软件的计算机,证明用于阻止对其的未经授权登录和/或访问。在启动基础上和/或在足够时间已消逝之后,计算机应要求适当的证明以进行运行。在该实施例中,在此描述的功能可与标准Windows登录系统(及BIOS或PXE环境)结合。管理实体28可与公司Microsoft网络的普通用户管理工具结合并允许管理员为每一用户设定登录策略。在许多情况下,管理实体28能够从现存的管理信息导出所有所需要的信息,其使该新功能对管理员几乎透明并降低了培训和采用成本。管理实体28可在企业网络内运行或由膝上型计算机制造商、BIOS制造商或其它受托伙伴存放为ASP模型。证明分配实体32可部分在企业网络内运行、部分在全球站点运行。由于证明不是敏感信息,证明分配系统的可全球访问的储存库可作为网络服务运行,从而使证明可用于企业网络之外的用户。
In the embodiments herein, electronic devices 24-26 are computers having firmware and/or operating system software that performs the processes described herein, certified to prevent unauthorized login and/or access thereto. On a boot basis and/or after sufficient time has elapsed, the computer should require appropriate certification to function. In this embodiment, the functionality described herein can be combined with a standard Windows login system (and BIOS or PXE environment). The
在在此的实施例中,每一计算机每天应要求新证明。然而,本领域一般技术人员应意识到的是,时间增量可被改变,使得计算机可每周要求新证明或每小时要求新证明。 In the embodiments herein, each computer should require a new certificate every day. However, one of ordinary skill in the art will appreciate that the time increments may be varied such that the computer may request a new certificate every week or every hour. the
此外,还可能利用IDE硬盘驱动器的很少使用的特征,其允许在驱动器上设置密码,在驱动器将旋转并允许访问内容之前密码必须被呈现给驱动器。如果驱动器的固件被修改以使用在此描述的系统,则对硬盘驱动器的访问可能被限制,使得即使将硬盘驱动器放置在不同的计算机中也不能访问计算机硬盘驱动器。该特征可与其它类型的硬盘驱动器一起实施。 In addition, it is also possible to take advantage of a rarely used feature of IDE hard drives which allows a password to be set on the drive, which must be presented to the drive before it will spin up and allow access to the content. If the drive's firmware is modified to use the system described herein, access to the hard drive may be restricted such that the computer hard drive cannot be accessed even if the hard drive is placed in a different computer. This feature can be implemented with other types of hard drives. the
在其它实施方式中,系统可用于访问数据文件、实际盘卷、逻辑卷等。在一些情况下,如限制访问文件的情况下,其可用于对相应的 操作系统进行适当的修改。 In other embodiments, the system can be used to access data files, actual disk volumes, logical volumes, and the like. In some cases, such as in the case of restricted access files, it can be used to make appropriate modifications to the corresponding operating system. the
参考图1B,图20’示出了具有多个管理实体28a-28c的另一实施例。尽管图20’示出了三个管理实体28a-28c,在此描述的系统可与任何数量的管理实体一起工作。在图20’所示的实施例中,可能管理实体28a-28c之一(如管理实体28a)产生凭证,而管理实体28a-28c中的其它实体(如管理实体28b、28c)产生证明,或所有管理实体28a-28c均产生证明。可选地,可使用证明分配实体32。
Referring to FIG. 1B , FIG. 20' illustrates another embodiment having
参考图1C,图20″示出了具有多个证明分配实体32a-32c的另一实施例。尽管图20″只示出了三个证明分配实体32a-32c,在此描述的系统可与任何数量的证明分配实体一起工作。图20″所示的实施例可使用麻萨诸塞州Cambridge的Akamai Technologies Incorporated提供的技术实施。
Referring to FIG. 1C, FIG. 20" shows another embodiment with multiple
参考图1D,图20”’示出了具有多个管理实体28a’-28c’和多个证明分配实体32a’-32c’的另一实施例。尽管20”’只示出了三个管理实体28a’-28c’和三个证明分配实体32a’-32c’,在此描述的系统可与任何数量的管理实体和证明分配实体一起工作。图20”’所示的实施例结合了图1B所示实施例的特征和图1C所示实施例的特征。
Referring to FIG. 1D, FIG. 20"' shows another embodiment having
参考图2,其详细示出了电子设备24,其包括确认单元42、凭证数据44和证明数据46。确认单元42可使用硬件、软件、固件或其结合实施。基于某些条件,如启动,确认单元42接收启动信号,其使得确认单元42检查凭证数据44和证明数据46,基于检查结果,产生表明合法证明已被呈现的通过信号或产生失败信号。确认单元42的输出由继续处理/设备如计算机启动固件使用以确定操作是否可继续。
Referring to FIG. 2 , there is shown in detail the
在在此的实施例中,电子设备24包括外部接口48,其由确认单元42控制。如确认单元42一样,外部接口48可使用硬件、软件、固件或其结合实施。外部接口48被连接到连接22,并用于取回可被保存在证明数据46中的新证明。因而,如果确认单元42确定保存在证明数据46中的证明不充分(例如已过期),确认单元42提供信号 给外部接口48以使外部接口48经连接22请求新证明。当然,如果电子设备24已被丢失和/或偷窃或如果用户为已终止的雇员或如果有任何其它不允许访问电子设备24的原因,则外部接口48将不能获得有效证明。在一些实施例中,外部接口48提示用户进行适当的电子连接(例如,将膝上型计算机连接到网络)。
In the embodiment herein, the
在在此的实施例中,时间数据52提供信息给确认单元42以指明有效证明被呈现给确认单元42的最近一次时间。该信息可用于阻止太频繁地请求证明,同时防止在请求新证明之前等待得太久。确认单元42、外部接口48、凭证数据44、证明数据46、及时间数据52的相互作用和使用在本说明书别处详细描述。
In the embodiment herein,
参考图3,流程图70示出了确定是否发送启动信号给确认单元42所执行的步骤,以确定确认单元42是否应检查凭证数据44和证明数据46以产生通过或失败信号。处理开始于第一步骤72,其确定启动操作是否正被执行。在在此的实施例中,证明总是连同启动操作一起进行检查。因此,如果在测试步骤72确定启动正被执行,则控制从步骤72转到步骤74,启动信号被发送给确认单元42。在步骤74之后是步骤76,在再次循环之前进程等待预定长的时间。在在此的实施例中预定的时长可以是一天,尽管其它时长也可被使用。在步骤76之后,控制转回到如上述的测试步骤72。
Referring to FIG. 3 , a
如果在测试步骤72确定启动操作未被执行,则控制从测试步骤72转到测试步骤78,其确定自上次运行确认单元42之后预定的时间量是否已消逝。这可通过使用时间数据元件52或许及当前系统时间进行确定。在在此的实施例中,在测试步骤78使用的预定时间量为一天。如果在测试步骤78确定自上次运行确认单元42以来的时间量大于预定时间量,则控制从测试步骤78转到步骤74,启动信号被发送给确认单元42。在步骤74之后或在测试步骤78之后(如果时间量不大于预定时间量)是如上所述的步骤76。
If it is determined at
参考图4,流程图90示出了确认单元42确定是否已接收足够的证明所执行的步骤。如本说明书别处所述,确认单元42发送或通过 或失败信号给后继处理/设备(如计算机启动固件或磁盘驱动器固件)。处理开始于第一步骤92,确认单元42确定必须的证明。必须证明为确认单元42确定的足以能够发送通过信号的证明。确认单元42通过检查凭证数据44、证明数据46、时间数据52、甚至内部/系统时钟来确定必须证明。在步骤92之后是测试步骤94,其确定适当的证明是否可本地获得(即在证明数据46中)及本地提供的证明是否满足必要的要求(本说明书别处描述)。如果是,则控制从步骤94转到步骤96,确认单元42发出通过信号。在步骤96之后,处理结束。
Referring to FIG. 4, a flowchart 90 shows the steps performed by
在一些实施例中,可能并希望获得并保存未来的证明于证明数据46中。例如,预计不能连接到管理实体28和/或证明分配实体32的用户可获得和保存未来的证明。在这些实施例中,当电子设备连接到管理实体28和/或证明分配实体32时,其可自动轮询未来的证明,其可根据重新定义的策略提供,或者(或此外),用户和/或电子设备明确请求未来的证明也是可能的,其可以也可不根据控制策略提供。
In some embodiments, it is possible and desirable to obtain and store future proofs in
如果在测试步骤94确定适当的证明不可本地获得(即在证明数据46中),则控制从测试步骤94转到测试步骤98,确认单元42确定适当的证明是否可从外部获得,例如如上所述,通过提供信号以使外部接口48试图取回证明。如果在测试步骤98确定外部提供的证明满足必要的要求(本说明书别处描述),则控制从测试步骤98转到步骤96,如上所述,确认单元42发出通过信号。在在此的实施例中,外部提供的证明被保存在证明数据46中。
If at test step 94 it is determined that suitable certificates are not available locally (i.e. in the certificate data 46), control passes from test step 94 to test step 98 where
如果在测试步骤98确定适当的数据不可从外部获得,或因为没有适当的连接或因为其它原因,则控制从测试步骤98转到步骤102,用户被提示输入适当的证明。在在此的实施例中,如果用户在没有适当电连接的位置,用户可呼叫特定的电话号码并接收数字形式的适当证明,其可连同步骤102提供的提示手动输入到电子设备中。当然,用户可通过其它手段接收证明,如被手写、打字、甚或出版在报纸中的证明(例如,在分类区域)。 If it is determined at test step 98 that appropriate data is not available externally, either because there is no proper connection or for other reasons, then control passes from test step 98 to step 102 where the user is prompted to enter appropriate credentials. In an embodiment herein, if the user is in a location without a proper electrical connection, the user can call a specific phone number and receive appropriate identification in digital form, which can be manually entered into the electronic device along with the prompt provided by step 102 . Of course, the user may receive proof by other means, such as being handwritten, typed, or even published in a newspaper (for example, in a classifieds area). the
在步骤102之后是测试步骤104,其确定用户是否已输入满足必要要求的证明(如本说明书别处所述)。如果是,则控制从测试步骤104转到步骤96,如上所述,确认单元42发出通过信号。否则,控制从测试步骤104转到步骤106,确认单元42发出失败信号。在步骤106之后,处理结束。
Following step 102 is a test step 104 which determines whether the user has entered proof that the necessary requirements are met (as described elsewhere in this specification). If so, control passes from test step 104 to step 96 where
参考图5,流程图120示出了产生确认单元42所使用的凭证所执行的步骤。流程图120的步骤可由产生凭证(及一系列证明)的管理实体28执行并提供凭证给电子设备24。其它适当的实体(如经管理实体28授权的实体)可产生凭证。在在此的实施例中,随机值可连同产生凭证和证明一起使用,通常是不可预测的。在步骤122之后是步骤124,下标变量I被设定为1。在在此的实施例中,所提供的凭证被用于全年且每天需要新证明,从而365个独立的证明可连同产生凭证一起产生。下标变量I用于跟踪被产生的证明的数量。在步骤124之后是步骤126,初始证明值Y(0)被设定为等于在步骤122确定的随机值RV。
Referring to FIG. 5 , a flowchart 120 shows the steps performed to generate a credential for use by the
在步骤126之后是测试步骤128,其确定下标变量I是否大于端值IEND。如上所述,在在此的实施例中,365个证明连同产生凭证一起产生,从而,在该实施例中,IEND为365。然而,对于其它实施例,可将IEND设定为任何数。 Following step 126 is a test step 128 which determines whether the index variable I is greater than the endpoint IEND. As mentioned above, in the embodiment herein, 365 certificates are generated along with the generation voucher, so, in this embodiment, the IEND is 365. However, for other embodiments, IEND may be set to any number. the
如果在测试步骤128确定I值不大于IEND,则控制从步骤128转到步骤132,Y(I)被设定为等于单向函数应用到Y(I-1)。在步骤132使用的单向函数是这样的函数,给定应用单向函数的结果,其几乎不可能确定被输入单向函数的值。因而,对于在步骤132使用的单向函数,给定Y(I),非常难并非不可能确定输入值(在该例子中Y(I-1))。如在此使用的,术语单向函数包括任何适当提供该特性的函数或运算,包括但不限于传统的单向散列函数和数字签名。在步骤132使用的单向函数的该特性可用于能够以不保密方式保存和分发发出的证明,如本说明书别处所述。凭证和证明可在不同的时间产生或证明可由产生凭证的实体或另一实体在稍后的日期产生。注意,对于 其它实施例,在这方面,可能使Y(I)不是Y(I-1)或任何其它Y的函数。 If at test step 128 it is determined that the value of I is not greater than IEND, then control passes from step 128 to step 132 where Y(I) is set equal to the one-way function applied to Y(I-1). The one-way function used at step 132 is one that, given the result of applying the one-way function, makes it nearly impossible to determine the value entered into the one-way function. Thus, for the one-way function used at step 132, given Y(I), it is very difficult if not impossible to determine the input value (Y(I-1) in this example). As used herein, the term one-way function includes any function or operation that suitably provides this property, including but not limited to conventional one-way hash functions and digital signatures. This property of the one-way function used at step 132 can be used to enable storage and distribution of issued certificates in a non-secure manner, as described elsewhere in this specification. The voucher and certificate may be generated at different times or the certificate may be generated at a later date by the entity that generated the voucher or by another entity. Note that for other embodiments, it is possible to have Y(I) not be Y(I-1) or any other function of Y in this regard. the
处理开始于第一步骤122,随机值RV被产生。在步骤132之后是步骤134,下标变量I加1。在步骤134之后,控制转回到测试步骤128,如上所述。如果在测试步骤128确定I大于IEND,则控制从测试步骤128转到步骤136,终值FV被设定为等于Y(I-1)。应注意,I被减1,因为I被递增超出IEND。在步骤136之后是步骤138,管理实体28(或产生证明和凭证的其它实体)数字签署终值、当前日期、及其它连同证明一起使用的信息。在在此的实施例中,其它信息可用于识别特定的电子设备(如膝上型计算机)、特定用户、或将凭证和证明绑定到特定电子设备和/或用户和/或一些其它财产的其它信息。可选地,日期和/或FV可与其它信息结合。例如,可使用类似OCSP签署的消息,其简单地说“device#123456 is valid on1/1/2004”或使miniCRL中对应于特殊设备的位为on或off。在这些情况下,设备上的凭证可鉴定设备(即确定设备真地是设备#123456等)。OCSP和miniCRL均为现有技术中公知的。在步骤138之后,处理结束。 Processing starts in a first step 122 where a random value RV is generated. After step 132 is step 134, the subscript variable I is incremented by 1. After step 134, control passes back to test step 128, as described above. If it is determined at test step 128 that I is greater than IEND, then control passes from test step 128 to step 136 where the final value FV is set equal to Y(I-1). Note that I is decremented by 1 because I was incremented beyond IEND. Following step 136 is step 138 in which the managing entity 28 (or other entity generating the certificate and voucher) digitally signs the end value, current date, and other information to be used with the certificate. In embodiments herein, other information may be used to identify a particular electronic device (such as a laptop), a particular user, or bind credentials and proofs to a particular electronic device and/or user and/or to some other property Other Information. Optionally, date and/or FV can be combined with other information. For example, an OCSP-like signed message could be used that simply says "device#123456 is valid on 1/1/2004" or turns on or off a bit in the miniCRL corresponding to a particular device. In these cases, the credentials on the device may authenticate the device (ie determine that the device is really device #123456, etc.). Both OCSP and miniCRL are well known in the prior art. After step 138, processing ends. the
参考图6,流程图150示出了确认单元42确定证明的有效性时所执行的步骤。处理开始于第一步骤152,确认单元42接收证明(例如,通过从证明数据44读取证明)。在步骤152之后是步骤154,确认单元42接收凭证(例如,通过读凭证数据46)。
Referring to FIG. 6 , a
在步骤154之后是测试步骤156,其确定连同凭证提供的其它信息是否匹配。如本说明书别处所述,其它信息包括电子设备的标识、用户的标识、或其它财产识别信息。如果在测试步骤156确定与凭证相关联的其它信息与其它信息描述的特定财产不匹配(例如,凭证用于不同的电子设备或不同的用户),则控制从测试步骤156转到步骤158,失败信号被提供。在步骤158之后,处理结束。
Following
如果在测试步骤156确定与凭证相关联的其它信息匹配,则控制从测试步骤156转到步骤162,变量N被设定为等于当前日期减去与 凭证相关的日期(即自凭证被发出之后的天数)。在步骤162之后是步骤164,在步骤152提供的证明值具有单向函数应用到其N次。在步骤164使用的单向函数对应于在步骤132使用的单向函数,如上所述。
If at
在步骤164之后是测试步骤166,其确定在步骤164获得的结果是否等于终值FV,FV是在步骤154接收的凭证的一部分。如果是,则控制从测试步骤166转到步骤168,确认单元42提供通过信号。否则,如果在测试步骤166确定在步骤164获得的结果不等于随步骤154的凭证提供的终值FV,则控制从测试步骤166转到步骤172,确认单元42提供失败信号。在步骤172之后,处理结束。
Following
数字签名可提供有效形式的因特网鉴别。与传统的密码和PIN不一样,数字签名可提供到处可验证且不可否认权威的鉴别。数字签名可经签署密钥SK产生并经匹配的验证密钥PK验证。用户U对其自己的SK保密(使得只有U可代表U签署)。幸运的是,密钥PK不会“背叛”相匹配的密钥SK,即,知道PK在计算SK时并不会给予敌人任何实际的好处。因此,用户U可使其自己的PK尽可能地公开(从而每个人均可验证U的签名)。为此,PK最好被称为公钥。注意,术语“用户”可表示用户、实体、设备或用户、设备和/或实体的集合。 Digital signatures provide an efficient form of Internet authentication. Unlike traditional passwords and PINs, digital signatures provide ubiquitously verifiable and undeniable authentication of authority. A digital signature can be generated via the signing key SK and verified via the matching verification key PK. User U keeps his own SK secret (so that only U can sign on U's behalf). Fortunately, the key PK does not "betray" the matching key SK, i.e., knowing PK does not give the enemy any real benefit in computing SK. Thus, user U can make his own PK as public as possible (so everyone can verify U's signature). For this reason, the PK is best called a public key. Note that the term "user" may refer to a user, entity, device or collection of users, devices and/or entities. the
公钥还可用于非对称加密。公用的加密钥PK可与相匹配的解密钥SK一起产生。再次地,知道PK不会背叛SK。任何消息可容易地使用PK加密,但经那样计算的密文仅可经知道密钥SK才可容易地解密。因此,用户U可使其自己的PK尽可能地公开(使得每个人均可为U加密消息),但保持SK专用(使得只有U可读为U加密的消息)。 Public keys can also be used for asymmetric encryption. A public encryption key PK can be generated together with a matching decryption key SK. Again, knowing that PK will not betray SK. Any message can be easily encrypted using PK, but the ciphertext computed in that way can be easily decrypted only by knowing the key SK. Thus, user U can make his own PK as public as possible (so that everyone can encrypt messages for U), but keep the SK private (so that only U can read messages encrypted for U). the
公知的RSA系统提供数字签名和非对称加密的例子。 The well known RSA system provides examples of digital signatures and asymmetric encryption. the
文字数字字符串调用的证书规定给定密钥PK是给定用户U的公钥。实体,通常称为发证机构(CA),产生并发出证书给用户。证书在指定时间后过期,在公共CA的情况下,通常为一年。实际上,数字证书(C)由CA的数字签名将几个数值安全绑定在一起组成:SN-对证书唯一的序列号、PK-用户的公钥、U-用户的名称、D1-发行日期、 D2-有效期、及AI-另外的信息(包括没有信息)。表示成符号,C=SIGCA(SN,PK,U,D1,D2,AI)。 A certificate called by an alphanumeric string specifies that the given key PK is the public key of the given user U. An entity, often called a certificate authority (CA), generates and issues certificates to users. Certificates expire after a specified time, usually one year in the case of public CAs. In fact, a digital certificate (C) is composed of several values securely bound together by the digital signature of the CA: SN-the serial number unique to the certificate, PK-the user's public key, U-the user's name, D 1 -issuance Date, D2 - expiration date, and AI - additional information (including no information). Denoted notationally, C = SIG CA (SN, PK, U, D 1 , D 2 , AI).
公用的加密钥还可提供鉴别/识别手段。例如,一方知道特定公用加密钥PK属于特定用户U(如因为该方已验证U的相应数字证书及PK)并渴望识别U,其可使用PK加密随机挑战C,并要求U以正确的解密应答。由于只有SK的处理器(因而U)可做这项工作,如果对挑战的应答是正确的,U被完全识别。 A public encryption key may also provide a means of authentication/identification. For example, a party who knows that a particular public encryption key PK belongs to a particular user U (e.g. because the party has verified U's corresponding digital certificate and PK) and desires to identify U can randomly challenge C using the PK encryption and ask U to decrypt it with the correct answer. Since only SK's processor (and thus U) can do this work, U is fully identified if the answer to the challenge is correct. the
可提供系统控制对使用智能门(和/或智能虚拟门,参见本说明书别处的描述)的区域的物理访问。智能门可验证正进入的人在当前已被授权进入。向门不仅提供以特定用户的凭证而且提供以单独的证明是有利的,凭证/用户在某种程度上依然有效,其甚至可由不连通的门安全使用。在实施例中,这样的证明按下述产生。假定凭证向门指明用户可进入。接着,对于每一凭证和每一时间间隔(如每天),适当的实体E(如决定谁被授权在任意时间访问该门的实体或为该实体工作的第二实体)计算经鉴定的指示(PROOF),其为特定凭证在特定时间间隔是有效的指示。(如果凭证没有确定门用户被授权进入,PROOF还可向门指明凭证在特定时间间隔有效)。 A system may be provided to control physical access to areas using smart doors (and/or smart virtual doors, as described elsewhere in this specification). A smart gate verifies that the person entering is currently authorized to enter. It is advantageous to provide the door not only with a user-specific credential but also with a separate certificate, the credential/user still valid to some extent, which can be safely used even by disconnected doors. In the Examples, such proof was generated as follows. Assume that the credentials indicate to the door that the user has access. Then, for each credential and each time interval (e.g., every day), the appropriate entity E (e.g., the entity that decides who is authorized to access the door at any time or a second entity working for the entity) calculates an authenticated indication ( PROOF), which is an indication that a particular credential is valid for a particular time interval. (PROOF can also indicate to the door that the credential is valid for a specific time interval if the credential does not establish that the door user is authorized to enter). the
E的PROOF可由E的数字签名组成,其以经鉴定的方式指明特定凭证在特定时间间隔是有效的,例如:SIGE(ID,Day,Valid,AI),其中ID为识别凭证的信息(如凭证的序号),Day为特定时间间隔的指示(普通的特定天),Valid为凭证被视为有效的指示(如果E从未签署类似的数据串该指示可被省略,除非凭证被视为有效),AI指示任何视为有用的额外信息(包括没有信息)。在一些情况下,E的签名可以是公钥签名(但其也可是私钥签名,即,可经单一秘密密钥产生和验证的签名,只有签署者和验证者知道)。如果凭证包括数字证书,一次等实施例可包括短期证书,即,对所需时间间隔重新发出凭证的数字签名(例如,数字证书指明同一公钥、同一用户U和一些其它基本信息,但还指明开始日期和期满日期以确定想要的、普通的日子)。例如,在次等实施例中,普通地让短期证书持续一天,PROOF 可采取SIGE(PK,U,D1,D2,AI)的形式,其中开始日期D1指明特定日子D的开始,结束日期D2指明日子D的相应结束,或D1=D2=D;或者,更简单地,使用单日期信息字段确定正被讨论的日子,SIGE(PK,U,Day,AI)。如果E与原始发证机构相符,短期证书PROOF可采取下述形式:SIGCA(PK,U,D1,D2,AI)或SIGCA(PK,U,Day,AI)。 E's PROOF may consist of E's digital signature, which specifies in an authenticated manner that a specific credential is valid at a specific time interval, for example: SIG E (ID, Day, Valid, AI), where ID is the information identifying the credential (such as The serial number of the certificate), Day is an indication of a specific time interval (ordinary specific day), Valid is an indication that the certificate is considered valid (if E has never signed a similar data string, the indication can be omitted, unless the certificate is considered valid ), the AI indicates any additional information deemed useful (including no information). In some cases, E's signature may be a public key signature (but it may also be a private key signature, ie, a signature that can be generated and verified via a single secret key, known only to the signer and verifier). If the credential includes a digital certificate, a primary embodiment may include a short-lived certificate, i.e., a digital signature that reissues the credential for a desired time interval (e.g., the digital certificate specifies the same public key, the same user U, and some other basic information, but also specifies start date and expiration date to determine desired, common days). For example, in an inferior embodiment, where short-term certificates generally last for one day, PROOF may take the form SIGE (PK, U, D 1 , D 2 , AI ), where the start date D 1 designates the beginning of a particular day D, End date D2 designates the corresponding end of day D, or D1 = D2 = D; or, more simply, use a single date info field to determine the day in question, SIGE (PK, U, Day, AI). If E matches the original issuing authority, the short-term certificate PROOF can take the following forms: SIG CA (PK, U, D 1 , D 2 , AI) or SIG CA (PK, U, Day, AI).
作为被鉴定的用户不可产生当时其自身的PROOF(即其自身凭证当时的PROOF),也不能将其昨天的PROOF改为今天其自身的PROOF,也不能将另一用户今天的PROOF改为其自己今天的PROOF。因为PROOF实质上是非延性且不能变更的,这些PROOF不必须被保护。因而,实体E可以可忽略的成本使PROOF可用。例如,E可将特定日子的所有PROOF发布在因特网上(如使PROOF可经Akamai服务器或类似物获得),或将PROOF发送给用户容易接近的应答器/服务器。例如,发送给位于机场(或办公楼)入口的服务器,许多应被恰当访问的门位于那里。这样,来工作的雇员可容易地获得其自己的PROOF(如通过将其自己的卡插入与服务器连接的读卡机)并表示将PROOF保存在其自己的卡上,连同其自己的凭证。这样,当用户将其卡呈现给其凭证授权访问的门时,门不仅可验证凭证而且可接收和验证当前授权的PROOF,根本不需连接。门验证PROOF(如经自安装后可保存的E的公钥验证E的数字签名)及PROOF指明的时间间隔是否正确(如经其自身的本地时钟)。如果一切正常,则门准许访问,否则门拒绝访问。实质上,门可以是不连通的门,其PROOF验证相对容易(因为门可接收大多数可用方的PROOF:真实用户要求访问)和相对安全(尽管门从可论证地大多数可疑方接收PROOF:真实用户要求访问)。实际上,用户要求访问通常可以是在物理上接近门,因而可非常容易地提供PROOF,而不用使用任何连接到远处站点的连接,因而可独立于门的连通性运行。同时,在至关紧要的时刻,用户要求访问可能是最不可信赖的信息源。但是,因为用户不可以任何方式产生或改变其自己当前有效性的PROOF,门可注意适当验证的PROOF必须由E产生,且如果E知道用户在特定时间间隔将不被授权则E不应产生PROOF。当用 户被停止授权时,E将停止发出该用户授权的PROOF,因而用户不再能进入相应的门(甚至不连通的门),因为用户将缺少门需要验证以准许访问的PROOF。因此,通过使用用户要求访问来证明适当及当前的授权,在此描述的相同免除了与其它系统相关的不方便,即不需要分派全体人员去对不连通的门重编程序。 As an authenticated user, it is not possible to generate its own PROOF at that time (that is, the PROOF of its own certificate at that time), nor can it change its yesterday's PROOF to today's own PROOF, nor can it change another user's today's PROOF to its own PROOF today. Because PROOFs are essentially inductive and cannot be changed, these PROOFs do not have to be protected. Thus, entity E can make PROOF available at negligible cost. For example, E can post all PROOFs for a particular day on the Internet (eg make the PROOFs available via an Akamai server or similar), or send the PROOFs to a responder/server that is easily accessible to the user. For example, to a server located at the entrance of an airport (or office building), where many doors should be properly accessed. In this way, an employee coming to work can easily obtain his own PROOF (eg, by inserting his own card into a card reader connected to the server) and expressly save the PROOF on his own card, along with his own credentials. This way, when a user presents their card to a door whose credentials authorize access, the door not only verifies the credentials but also receives and verifies the PROOF of the current authorization, no connection required at all. The gate verifies PROOF (e.g. verifying E's digital signature via E's public key which can be preserved since installation) and whether the time interval specified by PROOF is correct (e.g. via its own local clock). If all is well, the door grants access, otherwise the door denies access. In essence, a gate can be a disconnected gate, whose PROOF verification is relatively easy (because the gate receives PROOFs from most available parties: real users require access) and relatively secure (although the gates receive PROOFs from arguably most suspicious parties: real user requesting access). In fact, the user's required access can often be physically close to the door, so PROOF can be provided very easily without using any connections to remote sites, and thus can operate independently of the door's connectivity. At the same time, when it matters most, users demand access to perhaps the most untrustworthy source of information. However, since a user cannot generate or change its own current valid PROOF in any way, gates may note that a properly authenticated PROOF must be generated by E, and that E should not generate a PROOF if E knows that the user will not be authorized for a certain time interval . When a user is de-authenticated, E will stop issuing the PROOF authorized by that user, so the user can no longer enter the corresponding door (even a door that is not connected), because the user will lack the PROOF that the door needs to authenticate to grant access. Thus, by using the user to require access to demonstrate proper and current authorization, the same as described herein dispenses with the inconvenience associated with other systems of not needing to dispatch crews to reprogram disconnected doors. the
该方法还使人们能够按“角色”(或按“特权”)管理不连通的门的访问。即,不使用凭证指定用户被授权进入的门并接着如每天发出凭证当前有效性的PROOF(也不是发出指明特定凭证授权其用户在特定时间间隔进入某些门的PROOF),不连通的门可被编程(如在安装时)以仅准予具有特定角色的用户进入。例如,飞机的驾驶员座舱门可被编程以仅准予飞行员(PILOT)和检查员进入。凭证可被发给雇员以主要保证他们的身份(这不会变),同时E如每天对特定凭证发出的每一PROOF还可指定(如在AI字段中)其相应用户在那天的角色。例如,PROOF=SIGE(ID,Day,PILOT,AI)证明在那天对应于ID所确定的凭证的用户为飞行员。这样,雇员可从一个角色“转换”为下一角色,而不用为他们重新发出凭证,且不需要在用户凭证或其相应的每日PROOF内指明用户可在那天进入哪些门。应注意,这样的门的数量可以非常大。因而,在用户凭证内指明用户被准予进入的所有门是非常麻烦的。此外,如果增加新的门(例如因为购买了新飞机),则飞行员的凭证不得不重新发出以指定额外的门,这也非常麻烦。 The method also enables one to manage access to disconnected doors by "role" (or by "privilege"). That is, instead of using a credential to specify the doors a user is authorized to enter and then issuing a PROOF as daily as a proof of the credential's current validity (nor issuing a PROOF specifying that a particular credential authorizes its user to enter certain doors at specific time intervals), disconnected doors may Programmed (eg, at install time) to grant entry only to users with specific roles. For example, the cockpit door of an aircraft may be programmed to grant access only to the pilot (PILOT) and inspectors. Credentials may be issued to employees to primarily guarantee their identity (which will not change), while each PROOF issued eg on a specific credential each day may also specify (eg in an AI field) its corresponding user's role on that day. For example, PROOF= SIGE (ID, Day, PILOT, AI) proves that the user corresponding to the credential identified by ID is a pilot on that day. In this way, employees can "transition" from one role to the next without having their credentials reissued and without specifying in the user's credentials or their corresponding daily PROOF which doors the user can enter that day. It should be noted that the number of such gates can be very large. Thus, it is very cumbersome to specify within the user credentials all the doors the user is granted access to. Furthermore, if new doors are added (eg because of a new aircraft purchase), the pilot's credentials have to be reissued to specify the additional doors, which is also very cumbersome.
适于特定凭证的时间间隔可在凭证本身内指定,或可由凭证和PROOF一起指定。例如,凭证可指定特定的开始日期且其需要被每天证明有效,而PROOF可指定时间间隔244,其意味着PROOF指凭证中指定的开始日期之后的日子244。 The time interval appropriate for a particular credential may be specified within the credential itself, or may be specified by the credential along with the PROOF. For example, a voucher may specify a specific start date and it needs to be proven valid every day, while a PROOF may specify a time interval 244, meaning that the PROOF refers to the days 244 after the start date specified in the voucher. the
在此描述的系统相对于更昂贵的连通门系统也是有利的。例如,假设所有门均被安全地连接到中央数据库,及假设发生突然断电(如由于阴谋破坏)。则连通门可能被迫使在两个极端选择之间选择:一直打开(有利于安全但不利于保密,特别是在恐怖分子导致断电的情况下)及一直关闭(不利于安全但有利于保密)。通过对比,在突然 断电的情况下,在此描述的系统提供更灵活的反应,一些(不再)连通的门可保持一直关闭,而其它门一直打开,且其它门还可继续按在此描述的不连通门访问控制进行运行。即,只要正确的凭证和正确的PROOF被呈现,则依赖于电池的门可打开。实际上,在断电发生之前,所有雇员可能已正常接收他们的预期PROOF。 The system described herein is also advantageous over more expensive interconnecting door systems. For example, assume that all doors are securely connected to a central database, and assume that a sudden power outage occurs (eg due to sabotage). Then the connecting door may be forced to choose between two extreme options: always open (good for safety but bad for secrecy, especially in the case of terrorists causing power outages) and always closed (bad for safety but good for secrecy) . By contrast, in the event of a sudden power failure, the system described herein provides a more flexible response, some (no longer) connected doors can remain closed while others remain open, and others can continue to be pressed in. The disconnected door access control described operates. That is, as long as the correct credentials and the correct PROOF are presented, the battery-dependent door can be opened. In fact, all employees may have normally received their expected PROOF before the outage occurred. the
当然,实体E可产生对不同凭证指定不同时间间隔的PROOF。例如,在机场设施中,警员和应急人员可每天具有指定下两周作为相应时间间隔的PROOF,而所有正常的雇员可具有仅指定所述日子的每日PROOF。在长期及意外断电的情况下,这样的系统可提供更好的控制。如果发生那样的断电,PROOF的每日惯常分配可能被中断,一般雇员可能未接收他们的每日PROOF,但警察和紧急事件处理人员依然可在他们的卡中输入他们在头天接收的两周证明,因而可继续在他们被准予进入的所有门(如所有门)处起作用。 Of course, entity E may generate PROOFs specifying different time intervals for different credentials. For example, in an airport facility, police officers and emergency personnel may have daily PROOFs specifying the next two weeks as respective time intervals, while all regular employees may have daily PROOFs specifying only those days. Such a system would provide better control in the event of prolonged and unexpected power outages. In the event of a power outage like that, the usual daily distribution of PROOF may be interrupted and general employees may not receive their daily PROOF, but police and emergency personnel may still enter into their cards the two weeks they received the previous day certificate, and thus continue to function at all doors (eg, all doors) they were granted access to. the
应意识到的是,在此描述的方法包含使用由简化形式的证书构成的凭证,其可被称为最小证书。最小证书实质上可省略用户名和/或证书的标识符ID(或用证书的公钥代替用户名和/或标识符ID,每一证书的公钥是唯一的)。例如,最小证书凭证可采取C=SIGCA(PK,D1,D2,AI)的形式,应理解该凭证的正确呈现包括证明对应于PK的秘密密钥SK的知识(如通过挑战-应答方法)。门预先知道关于PK的凭证的正确呈现(首选地,如果当前被确认)是否应导致准予进入。或者,最小凭证C可指定(如在AI中)知道相应SK的用户是否有权进入特定的门。如果理解任何类似的签名通过暗示表明有效性,关于其公钥为PK的最小证书的PROOF可以是下述形式:SIGE(ID,Day,Valid,AI)或SIGE(PK,Day,Valid,AI)或SIGE(ID,Day,AI)。或者,最小证书的当前PROOF可采取重新发出最小短期证书的形式:如,SIGE(PK,D1,D2,AI),其中开始日期D1指特定日子D的开始,D2相应为日子D的结束,或D1=D2=D;或者,SIGE(PK,Day,AI);或者,让E与最初发证机构一致,SIGCA(PK,D1,D2,AI)or SIGCA(PK,Day,AI)。总之,在此描述的任何致力于证书的方法均应被理解为也可应用最小证书。 It should be appreciated that the methods described herein involve the use of credentials consisting of a simplified form of credentials, which may be referred to as minimal credentials. A minimal certificate may essentially omit the username and/or identifier ID of the certificate (or replace the username and/or identifier ID with the certificate's public key, which is unique per certificate). For example, a minimal certificate credential may take the form of C=SIG CA (PK, D 1 , D 2 , AI), with the understanding that correct presentation of this credential includes proving knowledge of the secret key SK corresponding to PK (e.g. via a challenge-response method). The gate knows in advance whether the correct presentation of credentials on the PK (preferably if currently validated) should result in granting entry. Alternatively, a minimum credential C may specify (as in an AI) whether a user who knows the corresponding SK is authorized to enter a particular door. If it is understood that any similar signature indicates validity by implication, a PROOF for a minimal certificate whose public key is PK can be of the form: SIG E (ID, Day, Valid, AI) or SIG E (PK, Day, Valid, AI) or SIG E (ID, Day, AI). Alternatively, the current PROOF of the minimum certificate may take the form of reissuing the minimum short-term certificate: e.g., SIG E (PK, D 1 , D 2 , AI ), where the start date D 1 refers to the beginning of a particular day D, and D 2 corresponds to the day End of D, or D1 = D2 = D; or, SIG E (PK, Day, AI); or, let E coincide with the original issuing authority, SIG CA (PK, D 1 , D 2 , AI) or SIG CA (PK, Day, AI). In conclusion, any approach to credentials described herein should be understood to apply minimal credentials as well.
智能门可验证用户的凭证的有效性和流通,凭证可伴随相应的证明。用户使用凭证/证明以获得对区域的访问类似于在控制电子设备的访问时使用凭证/证明,如本说明书别处所述。下述为凭证/证明的例子,其中部分可与其它结合: The smart gate can verify the validity and circulation of the user's credentials, which can be accompanied by corresponding proofs. Use of credentials/proofs by users to gain access to zones is similar to using credentials/proofs in controlling access to electronic devices, as described elsewhere in this specification. The following are examples of credentials/proofs, some of which may be combined with others:
1、PIN或密码,在与门相关联的键座输入或通过用户卡通信给门; 1. PIN or password, input on the key pad associated with the door or communicated to the door through the user card;
2、生物测定信息,由用户经与门相关联的特殊输入机提供; 2. Biometric information, provided by the user via a special input machine associated with the door;
3、传统(手写)签名,由用户经与门相关联的特殊签名簙提供; 3. The traditional (handwritten) signature is provided by the user through the special signature blog associated with the door;
4、用于公钥PK的数字证书(如,这样的凭证可被保存在用户卡中,正确的用户/卡可使用相应的秘密密钥SK鉴定/识别其对于门的身份-如经挑战应答协议)。例如,如果PK是签名公钥,门可要求已签署特定的消息,且正确的用户-唯一知道相应秘密签署密钥SK的人-可提供正确的被请求的签名;如果PK是公开的加密密钥,门可请求使特定挑战加密密文被解密,这可由知道相应秘密解密密钥SK的正确用户完成。 4. Digital certificate for public key PK (e.g. such credential can be stored in user card, correct user/card can authenticate/recognize its identity to door using corresponding secret key SK - if challenged protocol). For example, if the PK is a signing public key, the gate can require that a particular message has been signed, and that the correct user - the only one who knows the corresponding secret signing key SK - can provide the correct requested signature; if the PK is a public encryption key key, the gate can request that a particular challenge encrypted ciphertext be decrypted, which can be done by the correct user who knows the corresponding secret decryption key SK. the
5、包括每日“确认值”(其确保证书在该特定日期有效)的增强数字证书,保存在用户卡中并通信给门; 5. An enhanced digital certificate including a daily "confirmation value" (which ensures that the certificate is valid on that particular date), stored in the user card and communicated to the door;
6、确认用户的证书在当前时间有效的中央机构的数字签名,其提供服务器或应答器通信给门; 6. The digital signature of the central authority confirming that the user's certificate is valid at the current time, which provides the server or transponder to communicate to the gate;
7、保存在用户卡中并通信给门的数字证书及通过服务器或应答器通信给门的每日“确认值”; 7. The digital certificate stored in the user card and communicated to the door and the daily "confirmation value" communicated to the door through the server or transponder;
8、保存在用户卡中的秘密,其知识由门具有的交互(可能零知识)协议向门证明; 8. The secret stored in the user card, whose knowledge is proved to the door by the interactive (possibly zero-knowledge) protocol possessed by the door;
9、机构的秘密密钥签名,保存在用户卡中,其指示用户被授权在特定日子进入。 9. The agency's secret key signature, stored on the user's card, which indicates that the user is authorized to enter on specific days. the
因而,在一些情况下,凭证/证明被作为一体提供,而在其它情况下,凭证/证明以分开部分的形式提供:凭证及分开的证明。例如,在凭证/证明由包括指示证书在该特定日期有效的每日确认值的增强数字证书构成且与用户相关联并被通信给门时,凭证(增强的数字证 书)可独立于证明(每日确认值)提供(通过不同的手段和/或在不同的时间)。类似地,凭证和证明可均由同一机构产生或由不同的机构产生。 Thus, in some cases the voucher/proof is provided as one piece, while in other cases the voucher/proof is provided in separate parts: the voucher and the separate certificate. For example, where the credential/certificate consists of an enhanced digital certificate that includes a daily confirmation value indicating that the credential is valid on that particular date and is associated with the user and communicated to the gate, the credential (enhanced digital certificate) can be independent of the attestation ( daily confirmed value) provided (by different means and/or at different times). Similarly, credentials and certificates may both be generated by the same institution or by different institutions. the
参考图7,其示出了包括区域202的系统200,其中对区域202的物理访问将被限制。区域202由多个墙204-207封闭。墙207具有门212,以提供区域202的出口。在其它实施例中,可使用一扇以上的门。墙204-207及门212提供区域202的访问障碍。门212可使用电子锁214锁上,其防止门212打开,直到电子锁214接收适当的信号为止。电子锁214可使用提供在此描述的功能的任何适当元件实施,包括但不限于使用不用定制的电子锁。
Referring to FIG. 7 , a
电子锁214可被连接到控制器216,其提供适当信号给电子锁214以允许门212被打开。在一些实施例中,电子锁214及控制器216可被提供在单一装置中。控制器216可被连接到输入装置218,其可接收用户的凭证,可选地,还接收指明用户在当前被准予进入区域202的相应证明。输入装置218还可接收紧急合法性取消警报(HRA),其表明用户不再被允许进入区域202。HRA将在下文中详细描述。输入装置218可以是任何适当的输入设备如键座、读卡机、生物测定装置等。
可选地,控制器216可具有外部连接222,其可用于将数据传输到控制器216或从控制器216传输数据。外部连接222可以是保密的,尽管在一些实施例中外部连接222不需要保密。此外,外部连接222可能不需要,因为在此描述的功能可能使用不具有外部连接的独立装置提供。在提供外部连接222的例子中,外部连接222可用于传输凭证、证明、HRA和/或用于联机对区域202的访问。联机访问将在本说明别处详细描述。应注意,外部连接222可以是断续连接,使得,例如,在某些时间外部连接222提供对控制器216的连通性,而在其它时间控制器216没有外部连接。在一些情况下,外部连接222可用于传输一部分凭证/证明(如PKI数字证书),而用户向输入装置218呈现凭证/证明的剩余部分(如连同数字证书使用的每日确认值)。
Optionally, the
在一些实施例中,用户可将卡224呈现给输入装置。如本说明书别处所述,卡224可以是提供数据(如凭证/证明)给输入装置218的智能卡、PDA等。卡224可从应答器225获得部分或所有数据。在其它例子中,卡224可从其它卡(未示出)、输入装置218(或与访问区域202相关联的一些其它机构)、或一些其它适当源获得数据。
In some embodiments, a user may present
在第一例子中,凭证和证明可使用具有物理保护的pin/口令进行维护。在该例子中,每天早上服务器为每一经授权的用户U产生新的秘密口令SU并将新的SU通信给U被允许访问的具体的门。通信可使用非保密线路加密发送或可经一些其它保密手段传输给门。当U在早上来上班时,中央服务器使U的卡接收当前秘密口令SU。秘密口令SU被保存在卡的安全存储器中,其仅可在卡被适当授权时才被读(如通过用户输入与卡有关的秘密PIN或通过与服务器或门上的受托硬件连接)。无论用户试图在何时进入门,卡均安全地将SU通信给门。门接着检查从卡接收的值SU是否与早上从服务器接收的值匹配,如果是,则允许进入。 In a first example, credentials and proofs can be maintained using a physically protected pin/password. In this example, each morning the server generates a new secret password SU for each authorized user U and communicates the new SU to the specific doors U is allowed to access. Communications can be sent encrypted using an unsecured line or can be transmitted to the gate via some other secure means. When U comes to work in the morning, the central server causes U's card to receive the current secret password SU. The secret password SU is stored in the card's secure memory, which can only be read when the card is properly authorized (eg by the user entering a secret PIN associated with the card or by connecting to a server or trusted hardware on the door). Whenever the user attempts to enter the door, the card securely communicates the SU to the door. The gate then checks whether the value SU received from the card matches the value received from the server in the morning, and if so, allows entry. the
因而,SU为当天的用户凭证。该系统优点在于每一凭证仅具有有限的持续时间:如果雇员被终止雇用关系或其卡被偷窃,其凭证在第二天将没有用。然而,系统要求某些连通:至少需要短期连通(最好每天早上)以更新门。该传输应被保密(如物理上或使用密码)。 Thus, SU is the user credential for the current day. The advantage of this system is that each voucher has only a limited duration: if an employee is terminated or his card is stolen, his voucher will not be useful the next day. However, the system requires some connectivity: at least short-term connectivity (preferably every morning) is required to update the gates. This transmission should be kept secure (eg physically or using a password). the
在另一例子中,用户凭证包括秘密密钥签名。该例子使用签名,或公钥签名(如RSA签名)或秘密密钥签名(如报文鉴定代码或MAC)。例如,访问控制服务器使用秘密密钥SK产生签名,门具有验证这样的签名的手段(如经相应的公钥或通过共享同一SK的知识)。当用户U在日子D的早上来上班工作时,服务器使用户卡接收签名Sig,其鉴定U的辨识信息(如唯一卡号、或U的秘密口令、或生物测定信息如U的指纹)及日期D。当U试图进入门时,卡将签名Sig通信给门,其验证Sig的有效性甚至U提供的辨识信息、及门锁提供的日期。如果所有均正确,则门允许进入。 In another example, the user credentials include a secret key signature. This example uses signatures, either public key signatures (such as RSA signatures) or secret key signatures (such as Message Authentication Code or MAC). For example, the access control server generates a signature using the secret key SK, and the gate has means of verifying such a signature (eg via the corresponding public key or by sharing knowledge of the same SK). When user U comes to work on the morning of day D, the server causes the user card to receive a signature Sig, which identifies U's identifying information (such as a unique card number, or U's secret password, or biometric information such as U's fingerprint) and date D . When U tries to enter the door, the card communicates the signature Sig to the door, which verifies the validity of the Sig and even the identification information provided by U, and the date provided by the door lock. If all are correct, the door allows entry. the
在该技术中,签名Sig可被当作用户的凭证连同证明。该方法具有其自身的优点:卡不需要保存秘密,门不需要保持到中央服务器的安全连接,也没有很长的有效凭证列表。 In this technique, the signature Sig can be regarded as the user's credential along with the proof. This approach has its own advantages: cards don't need to keep secrets, doors don't need to maintain a secure connection to a central server, and there's no long list of valid credentials. the
在另一例子中,用户的凭证包括具有类似于图5的流程图120产生的那些散列链有效性证明的数字证书。该例子使用公钥签名及单向散列函数H(实现特殊类型的数字签名)。中央机构具有密钥对:公钥PK(为门所知道)和通常不被知道的秘密密钥SK。对于用户U,机构产生随机秘密值X0并计算值X1=H(X0)、X2=H(X1)、...、X365=H(X364)。因为H是单向散列函数,X的每一值不能从X的下一值计算。机构向U发出数字证书Cert,使用SK签署并包含值X365,对一年有效。接下来,当U在日子i来上班工作时,机构使用户卡接收该天的确认值Xj,其中j=365-i。当U试图进入门时,卡将确认值Xj和包含X365的证书Cert通信给门。门用机构的公钥PK验证Cert的有效性并还检查向Xj应用i次H是否产生X365。应注意,“一年”和365可用任何其它时间周期代替。 In another example, the user's credentials include a digital certificate with hash chain validity proofs similar to those produced by flowchart 120 of FIG. 5 . This example uses public key signatures and a one-way hash function H (to implement a special type of digital signature). The central authority has a pair of keys: a public key PK (known to the gate) and a secret key SK which is generally not known. For user U, the institution generates a random secret value X0 and calculates the values X1=H(X0), X2=H(X1), . . . , X365=H(X364). Since H is a one-way hash function, each value of X cannot be computed from the next value of X. The organization issues a digital certificate Cert to U, signed with SK and contains the value X365, which is valid for one year. Next, when U comes to work on day i, the organization makes the user card receive the confirmation value Xj for that day, where j=365-i. When U tries to enter the door, the card communicates to the door a confirmation value Xj and a certificate Cert containing X365. The door verifies the validity of Cert with the institution's public key PK and also checks whether applying H to Xj i times produces X365. It should be noted that "one year" and 365 may be replaced by any other time period. the
因而,用户的证书Cert及确认值Xj组成用户的凭证/证明。该系统具有许多优点:门及卡均不需要保存任何秘密;门不需要具有任何安全连接;证书可一年发出一次,且其后中央机构上的每日计算负载最小(因为机构只需要检索Xj);每日确认值可由非保密(便宜)布置的应答器提供,因为它们不需要隐秘。 Thus, the user's certificate Cert and the confirmation value Xj constitute the user's credential/proof. This system has many advantages: neither the door nor the card needs to keep any secrets; the door does not need to have any secure connections; certificates can be issued once a year, and thereafter the daily computational load on the central authority is minimal (since the authority only needs to retrieve Xj ); daily confirmation values can be provided by non-secure (cheap) deployed transponders, since they do not require secrecy. the
用户U的凭证/证明的持续时间通常被限制,这在许多情况下是有用的。例如,如果U是机场的雇员并被终止雇用关系,其凭证/证明可在该天结束时过期,其不再能够进入机场的门。为更精确的访问控制,可能希望具有更短持续时间的凭证。例如,如果U的凭证/证明包括小时和分钟及日期,则U可在被终止雇用关系后一分钟内被锁在机场的外面。然而,较短持续时间的凭证/证明要求更频繁的更新,这增加了系统的花费。因而,在希望具有短期凭证和具有低成本系统之间存在固有平衡,这可导致凭证的持续时间有时较所希望的长。例如,U可能需要立刻在机场的外面,但其凭证直到午夜才过期。因此,希望能够立即撤消尚未过期的凭证。 The duration of user U's credentials/proofs is usually limited, which is useful in many situations. For example, if U is an employee of the airport and is terminated, his credential/proof may expire at the end of the day and he can no longer enter the gates of the airport. Credentials with a shorter duration may be desired for more precise access control. For example, U can be locked out of the airport within one minute of being terminated if U's credential/proof includes hours and minutes and date. However, credentials/proofs of shorter duration require more frequent updates, which increases the cost of the system. Thus, there is an inherent balance between desiring to have short-term credentials and having a low-cost system, which can result in credentials sometimes lasting longer than desired. For example, U may need to be outside the airport immediately, but his credential does not expire until midnight. Therefore, it is desirable to be able to immediately revoke credentials that have not expired. the
应注意,如果凭证/证明一直被保存在安全数据库中,每次请求访问时门均查询数据库,则可通过从数据库中移除被取消的凭证/证明而相当直接地取消凭证/证明。然而,使门每次查询安全数据库花费昂贵。首先,因为这增加了事务处理的很大延迟,由于用户想立刻进入门,但他必须等待查询被适当地完成。第二,因为该通信首选是在安全通道上进行,这可轻松地就每门花掉$4,000(或更多)或在某些情况下根本达不到(如飞机或货物集装箱的门)。第三,因为单一安全数据库仅可处理有限的查询负载,且复制安全数据库本身非常昂贵和耗时(例如,因为保持数据库安全的花费必定翻倍且保持这些拷贝同步的努力也必定增加)。因此,与全流通的方法不一样,不连通或断续连通方法(如上述例子)要求更少的通信且通常将凭证/证明保存在非保密的应答器或卡上。在这种情况下,简单地从数据库移除凭证/证明并不足够。再次参考上述例子,口令SU或机构签名或确认值Xj由于某种原因不得不被从用户卡或门删除。此外,即使这样的删除也不总是保证凭证的取消,因为保存在无保证的应答器中的凭证可为任何人获得,包括恶意攻击者,其将凭证保存并在凭证从用户卡删除之后试图使用该凭证。因而,即使具有有限持续时间凭证的效能成本合算解决方案存在,这些解决方案本身没有必要提供未过期凭证/证明的充分取消。 It should be noted that if the credentials/proofs are kept in a secure database that is queried every time access is requested, it is fairly straightforward to revoke the credentials/proofs by removing revoked credentials/proofs from the database. However, it is expensive to make the gate query the security database every time. First, because this adds a significant delay to the transaction processing, since the user wants to get in the door right away, but he has to wait for the query to be properly completed. Second, because the communication is preferred to be over a secure passage, this can easily cost $4,000 (or more) per door or in some cases not reach at all (eg aircraft or cargo container doors). Third, because a single secure database can only handle a limited query load, and duplicating a secure database is itself very expensive and time-consuming (eg, because the cost of keeping the database secure must double and the effort to keep these copies in sync must also increase). Thus, unlike full-flow methods, disconnected or intermittent-connection methods (such as the above examples) require less communication and typically store credentials/proofs on non-secure transponders or cards. In this case, simply removing the credential/certificate from the database is not sufficient. Referring again to the above example, the password SU or authority signature or confirmation value Xj has to be deleted from the user card or door for some reason. Furthermore, even such deletion does not always guarantee the cancellation of the credentials, since credentials stored in unsecured transponders can be obtained by anyone, including malicious attackers, who save the credentials and attempt to Use that credential. Thus, even if cost-effective solutions with limited duration vouchers exist, these solutions do not necessarily provide sufficient cancellation of non-expired vouchers/proofs by themselves. the
取消凭证/证明可使用紧急合法性取消警报(HRA)执行,其是传输给门的数据段(最好是经鉴定的),其将阻止门授权具有取消的(尽管可能未过期)凭证/证明的用户访问。例如,HRA可由数字签署的消息组成,其指明特定凭证/指明已被取消。然而,应注意,在安全连通的门的情况下,只沿受保护的连接发送HRA可能并不足够。然而,如上所述,在一些情况下安全连通的门非常昂贵,而在其它情况下则不可能(或几乎接近于不可能)使用那样的门。 Revocation of credentials/proofs can be performed using an urgent legality revocation alert (HRA), which is a piece of data (preferably authenticated) transmitted to a door that will prevent the door from authorizing with a revoked (though possibly not expired) credential/proof user access. For example, an HRA may consist of a digitally signed message indicating that a particular certificate/designation has been revoked. However, it should be noted that in the case of securely connected gates, it may not be sufficient to just send the HRA along the protected connection. However, as noted above, in some cases secure communication doors are very expensive, while in other cases it is impossible (or nearly impossible) to use such a door. the
如果HRA被鉴定是有用的,从而HRA被呈现给其的实体可相对确定HRA是真实的。让ID作为被取消的凭证/证明C的标识符(具体地,ID可与C本身一致),则SIG(ID,″REVOKED″,AI)可以是HRA,其中 “REVOKED”代表任何方式的C已被取消的信令(″REVOKED″可能是空串,如果凭证/证明被取消的事实可通过其它手段推断-如全系统约定除了取消的情况,这样的签署的消息未被发送),及AI代表任何额外的信息(可能是日期信息-如当凭证/证明已被取消时的时间和/或HRA被产生时的时间或没有信息)。具体地,数字签名SIG可以是公钥签名、秘密密钥数字签名、或报文鉴定代码。通过适当地加密信息而发出经鉴定的HRA也是可能的。例如,经鉴定的HRA可采取ENC(ID,″REVOKED″,AI)的形式。 It is useful if the HRA is identified so that the entity to which the HRA is presented can be relatively certain that the HRA is authentic. Let ID be the identifier of the revoked credential/proof C (specifically, ID can be consistent with C itself), then SIG(ID, "REVOKED", AI) can be HRA, where "REVOKED" means that C has been revoked in any way Signaling of being revoked ("REVOKED" may be the empty string if the fact that the credential/proof is revoked can be inferred by other means - as system-wide agreement that such signed messages are not sent except in the case of revoke), and the AI representative Any additional information (possibly date information - such as time when the credential/proof has been canceled and/or time when the HRA was generated or no information). Specifically, the digital signature SIG may be a public key signature, a private key digital signature, or a message authentication code. It is also possible to issue authenticated HRAs by encrypting the information appropriately. For example, an identified HRA may take the form of ENC(ID, "REVOKED", AI). the
经鉴定的HRA的另一值得注意的例子在美国专利5,666,416中描述,其通过引用组合于此。发出机构将凭证/证明C组合到对C唯一的(数字签名方案的)公钥PK中,从而关于PK的数字签名指明C被取消。在这样的方案的特殊实施例中,PK可由值Y1组成,其计算为Y1=H(Y0),其中H为(最好散列)单向函数,Y0为秘密值。当凭证/证明C被取消时,仅由Y0组成的HRA被发出。这样的HRA可通过散列Y0并检查结果是否与属于凭证/证明C的值Y1匹配而进行验证。 Another notable example of an identified HRA is described in US Patent 5,666,416, which is incorporated herein by reference. The issuing authority combines the certificate/proof C into a public key (of the digital signature scheme) unique to C, PK, such that the digital signature on PK indicates that C is revoked. In a particular embodiment of such a scheme, PK may consist of a value Y1 calculated as Y1=H(Y0), where H is a (preferably hashed) one-way function and Y0 is a secret value. When credential/certificate C is revoked, an HRA consisting only of Y0 is issued. Such an HRA can be verified by hashing Y0 and checking if the result matches the value Y1 belonging to the credential/certificate C. the
应注意,签名可能不被要求用于HRA。例如,在安全连通门的情况下,仅沿受保护的连接发送(ID,″REVOKED″,AI)足以作为HRA。然而,经鉴定的HRA的优点在于HRA本身不必是秘密的。经鉴定的HRA,一旦被适当的机构鉴定,可被保存在一个以上(可能在地理上分散)的应答器上。此外,这些应答器可以无保护(与发出机构不一样),因为它们没有保存秘密信息。通过复制多个无保护应答器可以较低的成本提供更高的可靠性。美国专利5,666,416的经鉴定的HRA例子的一些其它优点为:(1)HRA相当短(能够为20字节那样短);(2)相当容易计算(简单地,先前保存的Y0的查表);及(3)相当容易验证(只应用一次单向散列函数)。 It should be noted that a signature may not be required for the HRA. For example, in the case of a secure access gate, just sending (ID, "REVOKED", AI) along the protected connection is sufficient as an HRA. However, the advantage of an authenticated HRA is that the HRA itself need not be secret. Authenticated HRAs, once authenticated by the appropriate agency, may be maintained on more than one (possibly geographically dispersed) transponder. Furthermore, these transponders can be left unprotected (unlike the issuing authority), since they do not hold secret information. Higher reliability can be provided at lower cost by duplicating multiple unprotected transponders. Some other advantages of the identified HRA example of US Patent 5,666,416 are: (1) the HRA is fairly short (can be as short as 20 bytes); (2) is fairly easy to compute (simply, a look-up table of Y0 previously saved); and (3) are fairly easy to verify (only apply the one-way hash function once). the
经鉴定的HRA特别有利于有效的广泛传播,如下面进一步描述的那样。当HRA通过接近门的多个点传输时,可能有多种可能将不正确的HRA插入系统中。实际上,由门接收的HRA不直接通过或来自经安全连接的发行人只不过是特定凭证取消的纯粹未经证实的信息。然 而,如果HRA被鉴定,该未经证实的信息可容易地由门确认,这可验证其可靠性。 Identified HRAs are particularly advantageous for efficient broad dissemination, as described further below. When an HRA is transmitted through multiple points close to the door, there may be multiple possibilities for an incorrect HRA to be inserted into the system. In fact, the HRA received by the gate not directly through or from the issuer over the secure connection is nothing but purely unverified information of specific credential cancellation. However, if the HRA is authenticated, this unverified information can be easily confirmed by the gate, which can verify its reliability. the
总之,HRA对单一凭证/证明可以是明确的或可提供关于多个凭证/证明的取消信息。例如,如果ID1,…,IDk为被取消的凭证的标识符,HRA可由单一数字签名SIG(ID1,...,IDk;″REVOKED″;AI)组成。考虑门保存信息的情况,所述信息确定凭证/证明有权进入门。如果这样的门接收指明一个或多个凭证/证明被取消的HRA,门不需要保存HRA。门从其存储器删除所确定的凭证/证明就足够了(或以某种方式将它们标记为″REVOKED″)。接着,如果具有取消的凭证/证明的用户试图访问,门将不允许访问,因为所呈现的凭证/证明当前未被保存在门中,或如果保存在其中,但已被标记为″REVOKED″。 In summary, the HRA can be specific for a single voucher/certificate or can provide cancellation information for multiple vouchers/certificates. For example, if ID1, . . . , IDk are identifiers of revoked certificates, the HRA may consist of a single digital signature SIG(ID1, . . . , IDk; "REVOKED"; AI). Consider the case where a door holds information that establishes a credential/certification of the right to enter the door. If such a gate receives an HRA indicating that one or more credentials/certifications are revoked, the gate need not save the HRA. It is sufficient for the gate to delete the determined credentials/proofs from its memory (or mark them as "REVOKED" somehow). Then, if a user with a revoked credential/proof attempts to access, the door will not allow access because the presented credential/proof is not currently held in the door, or if held there, has been marked as "REVOKED". the
现在考虑门不保存确定所有允许的凭证/证明的信息,而是当呈现时验证凭证/证明是否被允许。当用户向这样的门呈现凭证/证明时,门可首先验证凭证/证明是否有效,不管HRA。(例如,如果凭证/证明包括数字签名,则门验证签名。此外,如果凭证/证明包括期满时间,门还可验证凭证/证明未到期,如使用内部时钟。)但即使通过所有检查,如果凭证/证明被指示为已由HRA取消,门依然可拒绝访问。因此,如果这样的门具有关于相应HRA的信息则是有帮助的。实现此的一种办法是门保存所有呈现给其的HRA。另一方面,在一些情况下,这可能不切实际。考虑许多凭证/证明可用于通过门的系统。例如,运输部门正设想规模为10,000,000凭证的系统以用于曾经被允许访问特定门的各种个体(包括飞行员、机场维护人员、航线雇员、机师、搬运工、经理人、卡车司机、警察等)。谨慎估计每年10%的取消率,则到年末门可保存有1,000,000HRA,这是花费非常昂贵的任务(如果可行的话)。此外,如果HRA的数量不能够被预先准确确定,系统的设计者不得不过高估计用于HRA的存储器容量以求保险,并在门内建立更多的存储容量(以更高的成本)。 Now consider that the gate does not hold information determining all allowed credentials/proofs, but instead verifies whether the credentials/proofs are allowed when presented. When a user presents a credential/certificate to such a door, the gate may first verify that the credential/certificate is valid, regardless of the HRA. (For example, if the credential/proof includes a digital signature, the gate verifies the signature. Additionally, if the credential/proof includes an expiration time, the gate also verifies that the credential/proof has not expired, such as using an internal clock.) But even if all checks pass, If the credential/proof is indicated as revoked by the HRA, the door can still deny access. Therefore, it is helpful if such gates have information about the corresponding HRA. One way to achieve this is for the gate to keep all HRAs presented to it. On the other hand, in some cases, this may not be practical. Consider a system where many credentials/proofs can be used to pass through a door. For example, the Department of Transportation is envisioning a 10,000,000 credential scale system for the various individuals (including pilots, airport maintenance personnel, airline employees, pilots, porters, managers, truck drivers, police officers, etc.) ). Prudently estimating a cancellation rate of 10% per year leaves 1,000,000 HRA saved by the end of the year, a very expensive undertaking (if feasible). Furthermore, if the number of HRAs cannot be accurately determined in advance, the system designer has to overestimate the memory capacity for the HRAs to be safe, and build more memory capacity (at higher cost) inside the gate. the
该问题可借助于可删除HRA而得以解决。这意味着使HRA指明时间分量,其指定HRA在何时可被安全地从存储器上删除。例如,在凭 证/指明持续时间有限的系统中,这可通过下述步骤实现:(1)使凭证/证明包括期满时间,在期满时间之后,凭证/证明应不被门接受为有效的访问凭证/证明;(2)使取消凭证/证明的HRA包括期满时间;及(3)在期满时间之后,使门从其存储器删除取消凭证/证明的HRA。例如,凭证/证明的期满时间可以是凭证/证明过期的时间(及期满时间可明确地包括在凭证/证明内并被鉴定或其可由全系统约定暗示)。在期满时间之后删除该HRA不会损害安全性。实际上,如果门没有保存取消特定凭证/证明的HRA,可能因为门已在期满后将HRA从存储器中删除,则过期凭证/证明将被门拒绝访问。 This problem can be solved by means of deletable HRA. This means having the HRA specify a time component that specifies when the HRA can be safely deleted from memory. For example, in a system where the credential/indication has a limited duration, this can be accomplished by: (1) having the credential/certificate include an expiration time after which the credential/proof should not be accepted by the gate as valid (2) cause the HRA of the revoked credential/certificate to include an expiration time; and (3) cause the gate to delete the HRA of the revoked credential/certificate from its memory after the expiration time. For example, the expiration time of the credential/certificate may be the time at which the credential/certificate expires (and the expiry time may be explicitly included in the credential/certificate and authenticated or it may be implied by a system-wide agreement). Deleting the HRA after the expiration time does not compromise security. In practice, if the gate does not hold an HRA that revokes a particular credential/certificate, the expired credential/certificate will be denied access by the gate, possibly because the gate has deleted the HRA from memory after expiration. the
应注意,在期满时间可能在HRA中暗示或间接指明的情况下,上面的步骤(2)是可选步骤。例如,HRA具有SIG(C,″REVOKED″,AI)的形式,凭证/证明可包括其自己的期满日期。此外,由于可删除HRA还可使用根本不指明被取消凭证的期满时间的HRA进行实施,上面的步骤(1)是可选步骤。例如,如果特定系统中的所有凭证均至多在一天有效,则所有HRA可在被保存一天后擦除(更一般地,如果凭证/证明的最大寿命可以某种方式推断,则相应的HRA可在被保存前述时间量之后被擦除)。至于另一例子,当被呈现具有特定期满时间的凭证/证明时,门可寻找取消凭证的HRA。如果存在且期满时间已过,则门可安全地删除HRA。否则,门可保存与所保存的HRA有关的期满时间,并在该时间之后删除HRA。 It should be noted that step (2) above is an optional step where the expiration time may be indicated implicitly or indirectly in the HRA. For example, HRA is of the form SIG(C, "REVOKED", AI), and the credential/certificate may include its own expiry date. Furthermore, step (1) above is an optional step, since a deletable HRA can also be implemented using an HRA that does not specify an expiration time for canceled credentials at all. For example, if all credentials in a particular system are valid for at most one day, all HRAs can be erased after being kept for one day (more generally, if the maximum lifetime of credentials/proofs can be inferred somehow, then the corresponding HRA can be in are erased after being saved for the aforementioned amount of time). As another example, when presented with a voucher/certificate with a specific expiration time, the gate may look for an HRA that cancels the voucher. The gate safely deletes the HRA if it exists and the expiration time has elapsed. Otherwise, the gate may save an expiration time associated with the saved HRA and delete the HRA after that time. the
门可在HRA过期之后以多种方式将它们删除。在一些情况下,HRA删除可通过基于期满时间维护HRA的数据结构(如优先队列)而有效地实现。或者,门可定期查看存储器中的所有HRA并清除不再需要的HRA。作为另一选择,当遭遇HRA时,如果门意识到HRA不再有关,则门可删除HRA。例如,HRA可被保存在列表中,凭证每次被呈现以进行验证时均要检查该列表。无论在何时在该列表中遇到过期HRA,过期HRA可被删除。作为另一选择,当存储器需要被释放时(或许用于其它HRA),门仅按需删除HRA。 Gates can delete HRAs in a number of ways after they expire. In some cases, HRA deletion can be efficiently implemented by maintaining the HRA's data structure (such as a priority queue) based on expiration time. Alternatively, the gate can periodically look at all HRAs in memory and clear those that are no longer needed. Alternatively, when an HRA is encountered, the gate can delete the HRA if the gate realizes that the HRA is no longer relevant. For example, the HRA may be kept in a list that is checked each time a credential is presented for verification. Whenever an expired HRA is encountered in the list, the expired HRA can be deleted. Alternatively, the gate only deletes HRAs on demand when memory needs to be freed (perhaps for other HRAs). the
可删除HRA可大大降低门所需要的存储容量。使用上述 10,000,000用户及10%每年取消率的例子,如果HRA过期并被删除,则平均每天只有2,740(而不是1,000,000)个HRA需要被保存。该降低的存储容量要求是可删除HRA的最大潜在优势。 The HRA can be removed to greatly reduce the storage capacity required for the gate. Using the above example of 10,000,000 users and a 10% annual cancellation rate, if an HRA expires and is deleted, on average only 2,740 (instead of 1,000,000) HRAs need to be saved per day. This reduced storage capacity requirement is the biggest potential advantage of the removable HRA. the
HRA可为门尽可能快地获得是有用的,以将不再可接受的凭证/证明通知给门。这是不连通门存在的问题,但也可是全连通的门存在的问题。当然,当HRA被发出时,全连通的门可在门的连接上发送HRA。然而,该传输可能被坚决的敌人阻止或干扰(例如,如果到门的连接通过加密手段保密,则敌人仅可切断导线或改变/过滤行进的信号。如果到连接的门通过使导线在钢管中而进行保护,则这样的干扰和阻止可能更难,但也不是不可能)。这样的恶意HRA干扰和阻止对断续(如无线)连通的门可更容易地实施。 It can be useful for the HRA to get the door as quickly as possible to notify the door of credentials/certifications that are no longer acceptable. This is a problem with disconnected gates, but it can also be a problem with fully connected gates. Of course, fully connected gates can send HRAs on the gate's connections when HRAs are issued. However, this transmission can be blocked or interfered with by a determined enemy (e.g. if the connection to the door is secured by encryption, the enemy can only cut the wire or alter/filter the signal going on. protection, such interference and blocking may be more difficult, but not impossible). Such malicious HRA jamming and blocking of doors on intermittent (eg wireless) connectivity can be more easily implemented. the
为使敌人更难阻止门接收HRA,HRA可由被取消的卡本身携带。例如,当卡与数据库或连通的门(或知道相应HRA的任何门)通信时,门可将HRA发送给卡,卡可保存HRA。具体地,这可在不向用户进行任何指示的情形下完成,以保护HRA免遭希望纂改卡并删除HRA的用户的损害。如果卡携带防止纂改硬件部件或不容易被用户读/删除的数据(如加密数据),则该方法更有效。当卡在随后被使用以试图进入任何(甚至全不连通的)门时,卡可将其HRA通信给门,基于适当的验证,卡可拒绝访问(及在某些情况下,保存HRA)。 To make it more difficult for enemies to prevent the door from receiving HRA, HRA can be carried by the canceled card itself. For example, when a card communicates with a database or a connected door (or any door that knows the corresponding HRA), the door can send the HRA to the card, and the card can save the HRA. In particular, this can be done without any instructions to the user to protect the HRA from users wishing to tamper with the card and delete the HRA. This method is more effective if the card carries tamper-resistant hardware components or data that cannot be easily read/deleted by the user, such as encrypted data. When the card is subsequently used to attempt to enter any (even completely disconnected) door, the card can communicate its HRA to the door, and based on proper authentication, the card can deny access (and in some cases save the HRA). the
HRA可在无线通道上(如经寻呼机或移动网络或经人造卫星)发送给卡。即使卡仅具有有限的通信能力,这也可被完成,例如通过将无线发射机放置在每一用户可能经过的地方。例如,在建筑物中,这样的发射机可被放置在每一建筑物入口,以在卡的用户无论于何时进入建筑物时为每一卡提供接收传输的机会。或者,发射机可被放置在停车场的入口等。 The HRA can be sent to the card over a wireless channel such as via a pager or mobile network or via satellite. This can be done even if the card has only limited communication capabilities, eg by placing wireless transmitters where each user is likely to pass. For example, in a building, such a transmitter could be placed at each building entrance to provide each card with an opportunity to receive a transmission whenever the user of the card enters the building. Alternatively, the transmitter could be placed at the entrance of a parking lot or the like. the
为防止怀恶意的用户阻止传输(例如,通过将卡包裹在传输信号难以渗透的材料中),实际上,卡可要求其接收定期传输以能完全起作用。例如,卡可每5分钟期待一信号以使其时钟与系统时钟同步,或可期望接收另一定期(最好数字签署的)信号,如GPS信号,或近 期望适当频率的适当噪声。如果这样的信号未在合理的时间间隔内接收到,卡可“封锁”并简单地拒绝与任何门通信,这使其本身不适于访问。应注意,较简单地将所有HRA传播给所有卡,这样的系统可能更经济和更方便,因为HRA为不断改变的消息。因而,将HRA传播给所有卡可能要求建造特殊目的的人造卫星或定制已经存在的人造卫星。上述方法代替利用已经可用的广泛传输的信号并安装本地发射机用于常规消息。 To prevent a malicious user from blocking the transmission (for example, by wrapping the card in a material impenetrable to the transmission signal), the card may in fact require it to receive periodic transmissions in order to be fully functional. For example, the card may expect a signal every 5 minutes to synchronize its clock with the system clock, or it may expect to receive another periodic (preferably digitally signed) signal, such as a GPS signal, or approximately the appropriate noise at the appropriate frequency. If such a signal is not received within a reasonable time interval, the card can "block" and simply refuse to communicate with any door, making itself unsuitable for access. It should be noted that such a system may be more economical and convenient than simply propagating all HRAs to all cards, since HRAs are constantly changing messages. Thus, propagating the HRA to all cards may require building a special purpose satellite or customizing an already existing satellite. The above approach instead utilizes already available widely transmitted signals and installs local transmitters for regular messages. the
或者,如果安全策略要求用户可见地穿戴卡如安全徽章或在适当地方(在传输范围内)将卡呈现给防护装置,则可防止用户进行阻止向卡传输的行为。用于传播特定卡/凭证/证明的HRA的其它技术包括使用其它卡将HRA传送给门。在该技术中,卡1可(例如当获得其自己的每日凭证/证明时,或无线方式或当与连通的门通信时或在进行任何类型的连接时)接收HRA、HRA2、取消与不同的卡即卡2相关联的凭证/证明。卡1接着可保存HRA2并将HRA2通信给门,门接着还保存HRA2。实际上,卡1可向多个门提供,例如提供给所有门或卡2在特定时间段(如全天)访问或通信的所有不连通的门。这里,可由卡1到达的任何门(即使不连通)能够拒绝包含取消的凭证/证明的卡2的持有人进入。优选地,HRA2是数字签署或自鉴定的,且可由卡1到达的任何门检查HRA2的可靠性以防止假HRA的恶意传播。 Alternatively, if the security policy requires the user to visibly wear the card such as a security badge or present the card to a guard in place (within transmission range), then the user may be prevented from taking actions that would prevent transfers to the card. Other techniques for propagating the HRA for a particular card/credential/proof include using other cards to communicate the HRA to the door. In this technique, card 1 can receive HRA, HRA2, cancellation and difference (for example when obtaining its own daily credential/certification, or wirelessly or when communicating with a connected door or when making any type of connection) The card is the credential/proof associated with Card 2. Card 1 can then save HRA2 and communicate HRA2 to the door, which then also saves HRA2. In practice, Card 1 may be provided to multiple doors, for example to all doors or to all disconnected doors that Card 2 accesses or communicates with during a certain period of time, such as throughout the day. Here, any door (even if not communicated) accessible by card 1 can deny entry to the holder of card 2 containing the canceled voucher/proof. Preferably, HRA2 is digitally signed or self-authenticating, and any door accessible by card 1 can check the authenticity of HRA2 to prevent malicious propagation of fake HRAs. the
这可通过使卡1到达的门将学得的HRA2通信给另一卡即卡3而得以增强,卡3随后访问门或与门通信。这是有用的,因为卡3可到达卡1将不到达或将在卡3之后到达的门。通过使这些另外到达的门与其它卡通信,该过程可继续。此外,某些门即使不全连接到中央数据库,也可具有相互之间的连接。因而,这样的门可类似地交换可用HRA。如果卡具有相互通信能力-例如当接近时-它们也可交换关于它们保存的HRA的信息。 This can be enhanced by having the door that card 1 arrives at communicate the learned HRA2 to another card, card 3, which then accesses or communicates with the door. This is useful because card 3 can reach doors that card 1 will not or will reach after card 3. The process can continue by having these additional arriving doors communicate with other cards. Furthermore, certain gates may have connections to each other, even if they are not fully connected to the central database. Thus, such gates can similarly be exchanged for available HRAs. If the cards are capable of communicating with each other - eg when in proximity - they may also exchange information about the HRAs they hold. the
应注意,经鉴定的HRA对在此描述的HRA传播技术特别有利。事实上,通过多个媒介(卡及门)发送HRA可能提供多个故障点,其中HRA可能被对手修改或假HRA可被对手注入。在某种意义上,未经鉴 定的HRA在它们到达门时可能已变成纯粹的未经证实的信息。另一方面,经鉴定的HRA,无论它们怎样到达门,均可被保证是正确的。 It should be noted that certified HRAs are particularly beneficial for the HRA propagation techniques described herein. In fact, sending HRAs through multiple mediums (cards and doors) may provide multiple points of failure where HRAs may be modified by an adversary or fake HRAs may be injected by an adversary. In a sense, unauthenticated HRAs may have become pure unverified information by the time they hit the gate. Authenticated HRAs, on the other hand, are guaranteed to be correct no matter how they arrive at the gate. the
在不大大考虑资源的情况下,所有HRA可以这种方式进行保存和传播。采用一些优化也是可能的。例如,卡可像门那样管理HRA存储,并将过期的HRA删除以释放内在的卡存储空间并防止与其它门进行不必要的通信。在这样的系统内使存储通信和最小是有用的,因为,即使未过期但取消的凭证的数量不多,但可能某些部件(如一些卡或门)没有足够的存储器或带宽来处理所有未过期的HRA。 All HRAs can be preserved and disseminated in this manner without significant consideration of resources. It is also possible to employ some optimizations. For example, a card can manage HRA storage like a door, and delete expired HRAs to free up internal card storage and prevent unnecessary communication with other doors. It is useful to keep memory communication and minimum in such a system, because, even if the number of unexpired but canceled credentials is not large, it may be that some components (such as some cards or doors) do not have enough memory or bandwidth to process all outstanding credentials. Expired HRAs. the
使存储和通信最小的另一可能包括选择哪些HRA将经哪些卡进行传播。例如,HRA可与优先级信息一起提供,其表明尽可能快地分散关于特定凭证/证明的知识的相对重要性。例如,一些HRA可被标记为“紧急”,而其它可被标记为“常规”(优先等级可以尽可能地精确或近似)。具有有限带宽或存储器的设备可记录并交换关于较高优先级HRA的信息,且只要资源允许,可专心于较低优先级HRA。作为另一例子,阻止卡访问特定门的HRA可经更可能快到达该门的卡(如其凭证使能在该门附近访问该门的卡)进行传播。事实上,卡及门可从事于建立哪一HRA接受存储和/或另外传播的目标。或者,HRA或保存它们的卡可在某种程度上进行选择,其包括随机性,或者门可提供HRA给一定数量的卡(如门“遇到”的前k个卡)。 Another possibility to minimize storage and communication includes choosing which HRAs will propagate via which cards. For example, the HRA may be provided with priority information indicating the relative importance of distributing knowledge about a particular credential/proof as quickly as possible. For example, some HRAs may be marked as "Urgent" while others may be marked as "Routine" (priority levels may be as precise or approximate as possible). Devices with limited bandwidth or memory can record and exchange information on higher priority HRAs and can concentrate on lower priority HRAs as long as resources allow. As another example, an HRA that blocks a card from accessing a particular door may be propagated via cards that are more likely to reach that door sooner (eg, cards whose credentials enable access to that door in its vicinity). In fact, the cards and gates may serve to establish which HRA accepts objects for storage and/or otherwise dissemination. Alternatively, the HRA or the cards holding them could be chosen to some degree, which includes randomness, or the gate could provide the HRA to a certain number of cards (eg, the first k cards the gate "encounters"). the
这样的传播技术的使用可降低具有取消的凭证/证明的用户将能进入的可能性,因为即使不连通的门,用户也不得不在任何其它用户以更新的卡提供适当的HRA给门之前到达门。在卡和门之间的信息交换可帮助确保许多卡可被快速地通知关于取消的信息。该方法还可用作防“蓄意干扰”攻击的对策,所述攻击试图断开连通的门并阻止门接收HRA。即使干扰攻击取得成功且门永远未获得中央服务器或应答器的HRA通知,个体用户的卡也可能向门通知HRA。应注意,在卡和门之间交换HRA的实际方法可变化。在少许短HRA的情况下,交换并比较所有已知HRA最有效。如果许多HRA被弄在一个列表中,列表可包含指明列表在何时由服务器发出的时间。接着,卡和门可首先比较 它们的HRA列表的发出时间,且可用较新的列表替换较旧的列表。在其它情况下,可使用更复杂的用于发现和协调区别的算法。 The use of such propagation techniques can reduce the likelihood that a user with a revoked credential/proof will be able to enter, because even with a disconnected door, the user would have to reach the door before any other user presents the appropriate HRA to the door with an updated card . The exchange of information between the card and the door can help ensure that many cards can be notified about cancellations quickly. This method can also be used as a countermeasure against "jamming" attacks that attempt to disconnect a connected gate and prevent the gate from receiving the HRA. Even if the jamming attack is successful and the door is never notified by the HRA from the central server or transponder, it is possible for the door to be notified by the card of an individual user to the HRA. It should be noted that the actual method of exchanging HRAs between cards and doors may vary. In the case of few short HRAs, it is most efficient to swap and compare all known HRAs. If many HRAs are made in a list, the list may contain a time indicating when the list was sent by the server. Then, the cards and doors can first compare the issue times of their HRA lists, and the older lists can be replaced with newer lists. In other cases, more complex algorithms for finding and reconciling differences may be used. the
有效的HRA传播可通过下述步骤实现:(1)发出经鉴定的HRA;(2)将经鉴定的HRA发送给一个或多个卡;(3)使卡将经鉴定的HRA发送给其它卡和/或门;(4)使门保存所接收的HRA和/或传输所接收的HRA给其它卡。 Efficient HRA propagation can be accomplished by: (1) issuing a certified HRA; (2) sending the certified HRA to one or more cards; (3) causing the card to send the certified HRA to other cards and/or the gate; (4) cause the gate to save the received HRA and/or transmit the received HRA to other cards. the
详细介绍一些样本HRA使用是有用的: It is useful to detail some sample HRA usage:
顺序1(直接从“管理机构”到门): Sequence 1 (directly from "governing body" to the gate) :
1、实体E取消用户U的凭证/证明并发出HRA A,其包含凭证/证明已被取消的信息; 1. Entity E cancels user U’s credential/certificate and issues HRA A, which contains information that the credential/certificate has been cancelled;
2、A经有线或无线通信传输给门D; 2. A transmits to door D via wired or wireless communication;
3、D验证A的可靠性,如果验证成功,保存关于A的信息; 3. D verifies the reliability of A, and if the verification is successful, saves the information about A;
4、当U试图通过呈现凭证/证明访问D时,门D注意到所保存的关于A的信息指明凭证/证明已被取消并拒绝访问。 4. When U tries to access D by presenting the credential/certificate, door D notices that the saved information about A indicates that the credential/certificate has been revoked and denies access. the
顺序2(从“管理机构”到用户卡到门): Sequence 2 (from "Administrative Authority" to user card to door) :
1、实体E取消用户U的凭证/证明并发出HRA A,其包含凭证/证明已被取消的信息; 1. Entity E cancels user U’s credential/certificate and issues HRA A, which contains information that the credential/certificate has been cancelled;
2、另一用户U’来上班并将其卡呈现给E以获取其当前凭证/证明; 2. Another user U' comes to work and presents his card to E to get his current credential/proof;
3、连同U’的当前凭证/证明,HRA A被传输给U’的卡;卡保存A(卡可以也可不验证A的可靠性,取决于卡的能力); 3. Together with U''s current credential/proof, HRA A is transmitted to U''s card; the card saves A (the card may or may not verify the reliability of A, depending on the card's ability);
4、当U’试图访问门D时,其卡将其凭证/证明连同A传输给D; 4. When U' tries to access door D, its card transmits its credential/proof along with A to D;
5、D验证A的可靠性,如果验证成功,保存A; 5. D verifies the reliability of A, if the verification is successful, save A;
6、当U试图通过呈现其凭证/证明访问D时,门D注意到A取消U的凭证/证明并拒绝访问。 6. When U tries to access D by presenting his credential/proof, gate D notices that A revokes U's credential/proof and denies access. the
顺序3(从“管理机构”到另一门到用户卡到门): Sequence 3 (from "Administrative Authority" to another door to user card to door) :
1、实体E取消用户U的凭证/证明并发出HRA A,其包含U的凭证/证明已被取消的信息; 1. Entity E cancels user U's credential/certificate and issues HRA A, which contains the information that U's credential/certificate has been cancelled;
2、A经有线或无线通信传输给门D’; 2. A transmits to door D’ through wired or wireless communication;
3、D’验证A的可靠性,如果验证成功,保存A; 3. D' verify the reliability of A, if the verification is successful, save A;
4、另一具有其自己的凭证/证明的用户U’将其卡呈现给D’以进入D’。D’除了验证U’的凭证/证明并在合适时准予进入,还将A传输给U’的卡。卡保存A(卡可以也可不验证A的可靠性,取决于卡的能力); 4. Another user U' with his own credentials/proofs presents his card to D' to enter D'. D' transmits A to U''s card in addition to verifying U''s credential/proof and granting entry when appropriate. The card saves A (the card may or may not verify the reliability of A, depending on the ability of the card);
5、当U’试图访问门D时,其卡将其凭证/证明连同A传输给D; 5. When U' tries to access door D, its card transmits its credential/proof along with A to D;
6、D’验证A的可靠性,如果验证成功,保存A; 6. D'verifies the reliability of A, if the verification is successful, save A;
7、当U试图通过呈现其凭证/证明访问D时,门D注意到A取消U的凭证/证明并拒绝访问。 7. When U tries to access D by presenting his credential/proof, gate D notices that A revokes U's credential/proof and denies access. the
顺序4(从“管理机构”到用户卡到门): Sequence 4 (from "management agency" to user card to door) :
1、实体E取消用户U的凭证C并发出HRA A,其包含C已被取消的信息; 1. Entity E cancels user U's credential C and issues HRA A, which contains the information that C has been cancelled;
2、用户U携带其卡通过位于建筑物入口附近的传输点,这使得其卡接收A;卡保存A(卡可以也可不验证A的可靠性,取决于卡的能力); 2. The user U carries his card through the transmission point located near the entrance of the building, which makes his card receive A; the card saves A (the card may or may not verify the reliability of A, depending on the ability of the card);
3、当U试图访问门D时,其卡将A连同C传输给D; 3. When U tries to access door D, its card transfers A together with C to D;
4、D验证A的可靠性,如果验证成功,保存A并拒绝U的访问; 4. D verifies the reliability of A. If the verification is successful, save A and deny U's access;
5、如果U再次试图通过呈现C而访问D,则门D注意到先前保存的A已取消C并拒绝访问。 5. If U tries again to access D by presenting C, gate D notices that previously saved A has canceled C and denies access. the
有时,在犯罪之后,建立谁试图访问特定的门、在什么时间、呈现了什么凭证/证明、及访问是否被拒绝或同意是有用的。知道门的机构是否被堵塞、开关或敏感元件是否发生故障等也是有用的。到最后,可能希望维护发生的事件的事件日志。如果这样的日志可在某些中央位置容易地获得,其特别有用,从而其可被检查并遵照其行事。例如,在硬件故障的情况下,修理队可能需要被迅速调度。然而,这样的日志有两个主要问题。 Sometimes, following a crime, it is useful to establish who attempted to access a particular door, at what time, what credentials/proofs were presented, and whether access was denied or granted. It is also useful to know if the door mechanism is blocked, if a switch or sensitive element is malfunctioning, etc. Eventually, it may be desirable to maintain an event log of events that occur. It is especially useful if such a log is readily available at some central location so that it can be checked and acted upon. For example, in the event of a hardware failure, a repair crew may need to be dispatched quickly. However, such logs have two major problems. the
首先,如果门被连通,则较容易通过经连接发送日志而收集日志。然而,对于不连通的门,收集事件日志则更难。当然,收集日志的一种办法是派人到每一不连通的门以通过物理方式将日志传回中央位 置,但该方法成本太高。 First, if the gates are connected, it is easier to collect logs by sending them over the connection. However, collecting event logs is more difficult for disconnected doors. Of course, one way to collect the logs would be to send someone to each disconnected door to physically transfer the logs back to the central location, but that would be too costly. the
其次,对于将被信任的事件日志,包括日志的产生、收集及存储的整个系统的完整性应被保证。否则,例如,敌手可创建假日志记录或删除有效日志。传统的方法如在物理上保护通信通道及数据存储设施,其成本非常高(且通过它们自身也不足以保护)。 Second, for event logs to be trusted, the integrity of the entire system including log generation, collection, and storage should be guaranteed. Otherwise, for example, an adversary could create fake log records or delete valid logs. Traditional methods such as physically securing communication channels and data storage facilities are very costly (and insufficiently secure by themselves). the
通过这样的日志记录的存在,假定日志记录是有效的,则传统的日志可断定“某一用户去某一门”。然而,这不适于高安全性应用。假定用户U被控告损害被锁的门D后面的某些财产。传统的日志记录仅可提供U进入D的无力证据:人们不得不相信没有人恶意伪造日志记录。因而,希望使日志提供更强有力的证据,因为日志不可由敌人“人造”。具体地,无争议的日志可证明门D(可能与U的卡合作)在日志中创建记录。 By the existence of such a log record, assuming that the log record is valid, the traditional log can conclude that "a certain user went to a certain door". However, this is not suitable for high security applications. Assume that user U is accused of damaging some property behind locked door D. Traditional logging provides only weak evidence that U enters D: one has to believe that no one maliciously falsified the logging. Thus, it is desirable to make logs provide stronger evidence, since logs cannot be "artificial" by an enemy. Specifically, an undisputed log can prove that door D (possibly in cooperation with U's card) created a record in the log. the
在此描述的系统以下述方式解决了该问题:无论门在何时接收作为访问请求的部分的凭证/证明,门可创建日志记录(如数据串),其包含关于事件的信息,例如: The system described here solves this problem in the following way: Whenever a door receives a credential/proof as part of an access request, the door can create a log record (such as a data string) that contains information about the event, such as:
请求时间; request time;
请求类型(如果一个以上请求可能的话-例如,如果请求用于退出或进入,或打开或关闭引擎等); request type (if more than one request is possible - for example, if the request is for exit or entry, or to turn an engine on or off, etc.);
凭证/证明及所呈现的身份(如果有); Credentials/proof and identity presented (if any);
凭证/证明是否被成功验证; whether the credential/proof was successfully verified;
凭证/证明是否具有相应的HRA; Whether the credential/proof has a corresponding HRA;
访问是否被授权或解决。 Whether access is authorized or resolved. the
日志记录还可包含任何不寻常事件的运行数据或信息,如电流或电压起伏、敏感元件故障、开关位置等。产生无争议日志的一种办法包括使门借助于秘密密钥(SK)数字签署事件信息。所得的无争议日志可由SIG(event,AI)表示,其中AI代表任何额外的信息。门D使用的签名方法可以是公钥或私钥。 Log records can also contain operational data or information on any unusual events such as current or voltage fluctuations, sensitive component failures, switch positions, etc. One way to generate a non-controversial log involves having the gate digitally sign event information by means of a secret key (SK). The resulting uncontested log can be denoted by SIG(event, AI), where AI represents any additional information. The signature method used by door D can be public key or private key. the
强调签名相对于其是有效的公钥PK、或用于产生签名的秘密密钥SK或产生签名的门是有用的,因而可将无争议日志象征性地表示 为。SIGPK(event,AI)、SIGSK(event,AI)或SIGD(event,AI)。这样的日志是无争议的,因为敌人在不知道相应的秘密密钥的情况下不可能伪造门的签名。另一方面,日志的可靠性可由任何被适当通知的验证者(如知道门的PK或门的SK的验证者)检查,而不必盼望保存日志的数据库的完整性或传输日志的系统的完整性。总之,日志不仅可通过数字签署每一记录而被使得无可争议,而且还可通过使用用于多个记录的数字鉴定步骤使得无可争议。例如,门可借助于数字签名SIG(E1,...,E2,AI)鉴定多个事件E1、E2、…。照常,在本应用的这里及其它地方,数字签名可能意味着数字签署将被鉴定的数据的单向散列的过程。具体地,流鉴定可被看作数字签名的特殊情况。例如,每一经鉴定的记录可用于鉴定下一(或先前的)记录。实现此的一种办法包括使经鉴定的记录包含用于鉴定下一或其它记录的公钥(具体地,以前数字签名的公钥)。 It is useful to emphasize that the signature is valid with respect to the public key PK, or the secret key SK used to generate the signature, or the gate that generated the signature, and thus the undisputed log can be represented symbolically as . SIG PK (event, AI), SIG SK (event, AI), or SIG D (event, AI). Such a log is non-controversial, since it is impossible for an adversary to forge the signature of a door without knowing the corresponding secret key. On the other hand, the reliability of the log can be checked by any properly informed verifier (such as a verifier who knows the PK of the door or the SK of the door), without any hope of the integrity of the database holding the log or the integrity of the system transmitting the log. . In summary, logs can be made indisputable not only by digitally signing each record, but also by using a digital authentication step for multiple records. For example, a gate can authenticate a plurality of events E1, E2, ... by means of a digital signature SIG(E1, . . . , E2, AI). As usual, here and elsewhere in this application, digital signature may mean the process of digitally signing a one-way hash of data to be authenticated. In particular, flow authentication can be seen as a special case of digital signatures. For example, each authenticated record can be used to authenticate the next (or previous) record. One way of accomplishing this involves having the authenticated record contain the public key (specifically, the public key of the previous digital signature) used to authenticate the next or other record.
日志及无争议日志还可由卡产生(具体地,卡可通过以数字签署关于事件E的信息而产生无争议日志:表示成符号SIG(E,AI))。在此描述的所有日志技术也可被视为与卡产生的日志有关。 Logs and non-contested logs can also be generated by the card (in particular, the card can generate non-contested logs by digitally signing information on the event E: denoted by the notation SIG(E, AI)). All logging techniques described here can also be considered in relation to card generated logs. the
此外,其它日志和无争议日志可通过门及卡获得。例如,在门访问请求期间,卡可将卡自己的(可能无争议的)日志记录提供给门。门可检查日志记录并仅在门发现日志记录“可接受”时授权访问。例如,门可验证卡的数字签名从而鉴定日志记录;或门可根据门可接近的时钟验证包括在卡的日志记录中的时间信息是否正确。 In addition, other logs and non-controversial logs are available by door and card. For example, during a door access request, the card may provide the card's own (possibly non-controversial) log records to the door. The gate can examine the log records and only grant access if the gate finds the log records "acceptable". For example, the gate may verify the card's digital signature thereby authenticating the log record; or the gate may verify that the time information included in the card's log record is correct based on a clock accessible to the gate. the
其它类型的无争议日志还可通过使门及卡均致力于日志记录的产生和/或鉴定而获得。例如,卡可鉴定日志记录,且门也可鉴定日志记录信息的至少一部分,反之亦然。在具体的实施例中,卡C可将其日志记录的签名x=SIGC(E,AI)给予门,门将副签该签名,表示为符号SIGD(x,AI’),反之亦然。或者,门和卡可计算事件信息的联合数字签名(如借助于门和卡之间的秘密签署的密钥拆分计算,或将门的签名与卡的签名结合为单个“多重”签名进行计算)。可使用几个多重签名方案,具体地,Micali、Ohta和Reyzin的方案。 Other types of non-controversial logs can also be obtained by dedicating both the door and the card to the generation and/or authentication of log records. For example, the card can authenticate the logging and the gate can also authenticate at least a portion of the logging information, and vice versa. In a specific embodiment, the card C may give the gate its log-recorded signature x = SIG C (E, AI), which the gate will countersign, denoted by the notation SIG D (x, AI'), and vice versa. Alternatively, the door and the card may compute a joint digital signature of the event message (e.g. computed by means of key splitting of the secret signing between the door and the card, or by combining the door's signature with the card's signature into a single "multiple" signature) . Several multi-signature schemes are available, specifically those of Micali, Ohta and Reyzin.
可能将额外的信息包括在日志中。如果由卡和门报告的信息一致,额外的信息可被检查。例如,卡和门可使用它们可用的时钟将时间信息包括在日志记录中。此外,卡(可能还有门)可将位置信息(如从GPS获得的位置信息)包括在日志记录中。或者,如果难以获得当前位置(如因为GPS接收能力无法使用),则最近知道的位置信息(及其在多久以前建立)可被包括。这样,具体地,在移动门(如飞机的门)的情形下,可能确定当事件发生时门及卡位于何处。 Additional information may be included in the log. Additional information can be checked if the information reported by the card and the door agree. For example, cards and doors can use their available clocks to include time information in log records. Additionally, the card (and possibly the door) may include location information (eg, from GPS) in the log record. Alternatively, if the current location is difficult to obtain (eg because GPS reception capability is unavailable), last known location information (and how long ago it was established) may be included. In this way, in particular in the case of moving doors, such as those of an airplane, it is possible to determine where the door and card were located when the event occurred. the
当然,即使如上述的无争议日志记录也可被恶意地从数据库删除或被阻止到达数据库。为防止这样的删除,提供删除可检测日志系统是有用的。这样的系统可通过使用下述方案建立:(1)鉴定方案(如数字签名方案);(2)关联生成方案;及(3)关联检测方案。给定一日志事件E(一系列过去和/或未来事件的部分),关联生成方案可用于产生关联信息CI,其继而借助于鉴定方案而安全绑定到E以产生删除可检测日志记录。关联生成方案可确保,即使事件本身无关联且一事件的存在不可从其它事件的存在进行推断,CI仍以这样的方式产生以保证缺少的没有适当关联信息的日志记录存在,某些可使用关联检测方案检测。在一些情况下,系统还可保证即使一些日志记录不见了,其它日志记录也可被保证可信和/或个别无争议。 Of course, even uncontroversial log records as described above can be maliciously deleted from the database or prevented from reaching the database. To prevent such deletions, it is useful to provide a deletion-detectable logging system. Such a system can be built by using the following schemes: (1) authentication schemes (such as digital signature schemes); (2) association generation schemes; and (3) association detection schemes. Given a log event E (part of a sequence of past and/or future events), the correlation generation scheme can be used to generate correlation information CI, which is then securely bound to E by means of an authentication scheme to generate deletion-detectable log records. The correlation generation scheme ensures that, even if the events themselves are uncorrelated and the existence of one event cannot be inferred from the existence of other events, CIs are generated in such a way that missing log records exist without proper correlation information, some of which can use correlation Detection scheme detection. In some cases, the system can also guarantee that even if some log records are missing, other log records can be guaranteed to be trusted and/or individually indisputable. the
在第一例子中,日志记录的关联信息CI可包括顺序编号日志记录。相应的关联检测方案可包括通知数序中间隔的存在。但为了获得删除可检测日志系统,CI和日志记录之间的适当绑定被发现,这可能不容易实现,即使安全数字签名用于系统的鉴定部分。例如,使第i个日志记录由(i,SIG(event,AI))组成是不安全的,因为敌人可在删除日志记录后修改随后的记录的编号以隐藏间隔。具体地,在删除日志记录号100之后,敌手可将日志记录101、102等的号码减1。从而敌人可隐藏其删除,因为,即使事件信息的完整性由数字签名保护,但编号本身不能被保护。此外,即使也数字签署编号可能也不能奏效。例如,假定第i个日志记录由(SIG(i),SIG(event,AI))组成。接下来,敌人可:(1)观察并记住SIG(100);(2)删除记录号 100;(3)用原始记录101的SIG(101)代替SIG(100),同时记住SIG(101),依此类推,以完全隐藏删除。 In a first example, the associated information CI of log records may include sequentially numbered log records. A corresponding association detection scheme may include notifying the presence of gaps in the sequence. But to get a delete-detectable logging system, a proper binding between CI and logging is found, which may not be easy to achieve, even if secure digital signatures are used for the authentication part of the system. For example, it is not safe to have the i-th log record consist of (i, SIG(event, AI)) because an adversary can modify the number of subsequent records after deleting the log record to hide the interval. Specifically, after deleting log record number 100, the adversary may decrement the number of log records 101, 102, etc. by 1. The adversary can thus hide its deletion because, even though the integrity of the event information is protected by a digital signature, the number itself cannot be protected. Also, even digitally signing the number may not work. For example, assume the i-th log record consists of (SIG(i), SIG(event, AI)). Next, the enemy can: (1) observe and remember SIG(100); (2) delete record number 100; (3) replace SIG(100) with SIG(101) of the original record 101, and remember SIG(101 ), and so on, to completely hide the delete. the
上述两种方法均不能产生想要的CI和日志记录的安全绑定。事实上,通过安全绑定(1)编号信息与(2)被编号的事件,我们意为当j不同于i时,即使提供(a)数i和Ei的安全绑定及(b)数j和Ej的安全绑定,敌人也不可制造数j和关于第i个事件Ei的事件信息的绑定。例如,第i个日志记录可由SIG(i,Ei,AI)组成。这样,第i个日志记录的删除将被特定的稍后的日志记录检测到。这是因为稍后的日志记录携带比i大的数,其不能被敌手删除、修改或用另一日志记录编号信息替换,因为其与日志记录安全绑定。例如,假定敌人删除日志记录号100:SIG(100,E100,AI)。只要敌手不能删除所有随后的日志记录(这将要求持续访问数据库),为隐藏其删除,敌手将需要创建具有相同号码100的另一日志记录。然而,这是很难的,因为:(a)敌手不能产生全新的第100个日志记录SIG(100,E’,AI’),因为他没有门的秘密签署的密钥;(b)敌手在未使数字签名无效的情况下不能修改现有的日志记录(如不能将SIG(101,E101,AI101)改变为SIG(100,E101,AI101),即使他记住所删除的记录SIG(100,E100,AI100));(c)敌手不能提取指示编号100的日志记录的部分的签名并将其与数字签名绑定以产生另一日志记录。 Neither of the above approaches produces the desired secure binding of CI and logging. In fact, by securely binding (1) numbered information with (2) numbered events, we mean that when j is different from i, even if providing (a) secure binding of number i and Ei and (b) number j With the safe binding of Ej, the enemy cannot also create a binding between the number j and the event information about the i-th event Ei. For example, the i-th log record may consist of SIG(i, Ei, AI). This way, deletion of the i-th log record will be detected by a specific later log record. This is because later log records carry numbers greater than i, which cannot be deleted, modified, or replaced with another log record number information by an adversary since it is securely bound to the log record. For example, assume the enemy deletes log record number 100: SIG(100, E100, AI). As long as the adversary cannot delete all subsequent log records (which would require constant access to the database), the adversary will need to create another log record with the same number 100 in order to hide its deletion. However, this is hard because: (a) the adversary cannot generate a brand new 100th log record SIG(100,E',AI') because he does not have the secret signing key for the gate; (b) the adversary is at Cannot modify existing log records without invalidating the digital signature (for example, cannot change SIG(101, E101, AI101) to SIG(100, E101, AI101), even if he remembers the deleted record SIG(100, E100, AI100)); (c) the adversary cannot extract the signature indicating the portion of the log record numbered 100 and bind it with the digital signature to generate another log record. the
这样的安全绑定还可通过不同于共同数字签署记录编号和被编号的事件的手段实现。例如,其可通过单向散列记录编号和被编号的事件然后签署散列而实现,以符号表示为SIG(H(i,Ei,AI))。至于另一例子,其可通过将编号的散列包括在事件的数字签名中而得以实现,反之亦然:例如,以符号表示为SIG(i,H(Ei),AI))。其还可通过签署编号信息及事件信息的数字签名实现:例如,以符号表示为SIG(i,SIG(Ei),AI))。作为另一例子,人们可单独地签署(1)编号信息和唯一的字符串x;及(2)事件信息及字符串x,以符号表示为(SIG(i,x),SIG(x,Ei,AI))(这样的字符串x可以是当前时间)。 Such secure binding may also be achieved by means other than co-digitally signing the record number and the event being numbered. For example, this can be achieved by one-way hashing the record number and the numbered event and then signing the hash, notationally denoted as SIG(H(i,Ei,AI)). As another example, this can be achieved by including a hash of the number in the digital signature of the event, and vice versa: eg in notation SIG(i, H(Ei), AI)). It can also be achieved by digitally signing the number information and the event information: eg in notation SIG(i, SIG(Ei), AI)). As another example, one can separately sign (1) number information and unique string x; and (2) event information and string x, notationally expressed as (SIG(i,x), SIG(x,Ei , AI)) (such a string x can be the current time). the
删除可检测日志还可通过与不同于顺序编号信息的日志记录关 联信息安全绑定而实现。例如,可在日志记录i中包括一些来自先前日志记录如记录i-1的识别信息。这样的信息可以是记录i-1(或日志记录i-1的部分)的防碰撞散列:以符号表示,日志记录i可被表示为SIG(H(日志记录i-1),Ei,AI)。接着,如果敌手试图删除日志记录i-1,这样的删除在接收日志记录i时将被检测到,因为先前接收的日志记录的散列H(日志记录i-2)与H(日志记录i-1)不匹配(由于H的防碰撞),反之,H(日志记录i-1),由于其与日志记录i安全地绑定,在不破坏数字签名的有效性的情况下其不可被敌手修改。在此,日志记录i还可意为其信息的子集如Ei。 Removal of detectable logs may also be accomplished through secure binding of log record association information other than sequential number information. For example, some identifying information from previous log records such as record i-1 may be included in log record i. Such information can be a collision-resistant hash of record i-1 (or a portion of log record i-1): notationally, log record i can be denoted as SIG(H(log record i-1),Ei,AI ). Then, if an adversary tries to delete log record i-1, such deletion will be detected upon receipt of log record i, since the hash H(log record i-2) of the previously received log record is identical to H(log record i- 1) Mismatch (due to the anti-collision of H), conversely, H(log record i-1), since it is securely bound to log record i, it cannot be modified by an adversary without destroying the validity of the digital signature . Here, a log record i can also mean a subset of its information such as Ei. the
应注意,不必须是日志记录i-1的信息与记录i绑定,其可以是先前或未来的另一记录,或者实际上,多个其它记录。此外,哪一日志记录与哪一记录绑定可随机选择。 It should be noted that it is not necessary that the information of log record i−1 is bound to record i, it could be another previous or future record, or indeed, multiple other records. Furthermore, which log record is bound to which record can be chosen randomly. the
其它关联信息也可被使用。例如,每一日志记录i可具有与两个值(如随机值或当前时间)xi和xi+1的安全绑定:以符号表示,如SIG(xi,xi+1,Ei,AI)。接着,两个相继的日志记录可总是共享一x值:例如,记录i和i+1将共享xi+1。然而,如果日志记录被删除,这将不再有效(因为敌手不能在没有检测的情况下修改签署的日志记录,除非其知道签名的秘密密钥)。例如,如果记录号100被删除,数据库将包含SIG(x99,x100,E99,AI)和SIG(x101,x102,E101,AI),且可注意到它们未共享共同的x值。这样的关联信息可采取其它形式:实际上,日志记录可与多个其它日志记录关联。具体地,这可利用多项式产生关联信息而实现(如两个或多个日志记录中的每一个可包含以不同输入求值同一多项式的结果)。这样的关联信息还可利用散列链:例如,以值y1开始,让y2=H(y1)、y3=H(y2)、...等,并接下来使yi与Ei安全绑定:例如,第i个日志记录可以符号表示为SIG(yi,Ei,AI)。接着,相继日志记录i和i+1可具有关联值yi和yi+1,适当yi+1=H(yi)。然而,如果敌手删除日志记录,这可能不再有效因而删除可被检测。例如,如果记录100被删除,数据库将包含SIG(y99,E99,AI)和SIG(y101,E1101,AI)(如前所述,其不能在不破坏数字签名的情况 下被敌手修改)。接着,删除可被检测,因为H(y101)将不与y99匹配。使用多个散列链,或许使用非相继记录及双向,也可提供这样的关联信息。 Other associated information may also be used. For example, each log record i may have a security binding to two values (such as a random value or the current time) x i and x i+1 : notationally expressed as SIG(xi , x i+1 , Ei, AI). Then, two consecutive log records may always share a value of x: for example, records i and i+1 will share x i+1 . However, if the log record is deleted, this will no longer work (since an adversary cannot modify a signed log record without detection unless it knows the secret key that signed it). For example, if record number 100 is deleted, the database will contain SIG(x 99 , x 100 , E99, AI) and SIG(x 101 , x 102 , E101 , AI), and it will be noted that they do not share a common x value. Such associated information may take other forms: indeed, a log record may be associated with multiple other log records. In particular, this may be achieved using polynomials to generate associated information (eg, each of two or more log records may contain the result of evaluating the same polynomial with different inputs). Such association information can also utilize hash chains: for example, starting with the value y 1 , let y 2 =H(y 1 ), y 3 =H(y 2 ), ... etc., and then let y i and Ei Security Binding: For example, the i-th log record can be denoted notationally as SIG(y i , Ei, AI). Then, successive log records i and i+1 may have associated values y i and y i+1 , appropriately y i+1 =H(y i ). However, if an adversary deletes the log record, this may no longer be valid and the deletion can be detected. For example, if record 100 is deleted, the database will contain SIG( y99 , E99, AI) and SIG( y101 , E1101, AI) (which, as stated earlier, cannot be modified by an adversary without breaking the digital signature) . Then, deletions can be detected because H(y 101 ) will not match y 99 . Using multiple hash chains, perhaps using non-sequential records and bi-directional, can also provide such associated information.
在另一实施例中,每一日志记录可包含部分或所有先前甚或随后的事件的指示,因而使日志不仅删除可检测,而且在删除时可重建。可重建日志系统可通过使用下述方案建立:(1)鉴定方案(如数字签名方案);(2)重建信息产生方案;及(3)重建方案。给定一日志事件E(一系列过去和/或未来事件的部分),重建信息产生方案被用于产生重建信息RI,其接着可借助于鉴定方案与其它日志记录安全绑定。重建信息产生方案确保,即使对应于事件i的日志记录丢失,其它日志记录包含足够的关于E的信息,以允许从其它日志记录中存在的RI重建E。例如,第i+1个记录可包含关于所有或部分先前i个事件的信息,其由重建信息产生方案生成。因此,如果敌人以某种方式成功从数据库擦除第j个日志记录,关于第j个事件的信息Ej将在一个或多个随后的记录中揭示,使得即使在缺少第j个日志记录的情况下也可使用重建方案重建信息Ej。因而,对敌人而言,对数据库临时访问是不足够的:他不得不“始终”监视数据库并删除多个日志记录以阻止关于第j个事件的信息被展现。选择哪一事件包括在日志记录中可由重建信息产生方案以随机方式完成,以使敌人很难预测关于特定事件的信息将在何时在后继的日志中揭示。优选地,可重建日志系统还可以是删除可检测和无可争议的。 In another embodiment, each log record may contain an indication of some or all previous or even subsequent events, thus making the log not only detectable for deletion, but rebuildable when deleted. A rebuildable log system can be built by using the following schemes: (1) an authentication scheme (such as a digital signature scheme); (2) a reconstruction information generation scheme; and (3) a reconstruction scheme. Given a log event E (part of a series of past and/or future events), the reconstruction information generation scheme is used to generate reconstruction information RI, which can then be securely bound with other log records by means of the authentication scheme. The reconstruction information generation scheme ensures that, even if the log record corresponding to event i is lost, the other log records contain enough information about E to allow reconstruction of E from the RI present in the other log records. For example, the i+1th record may contain information about all or part of the previous i events, generated by the reconstruction information generation scheme. Thus, if an adversary somehow succeeds in erasing the jth log record from the database, information Ej about the jth event will be revealed in one or more subsequent records such that even in the absence of the jth log record Next, the information Ej can also be reconstructed using the reconstruction scheme. Thus, temporary access to the database is not enough for the enemy: he has to monitor the database "always" and delete several log records to prevent information about the jth event from being revealed. The selection of which events to include in a log record may be done in a random fashion by the reconstruction information generation scheme, making it difficult for an adversary to predict when information about a particular event will be revealed in subsequent logs. Preferably, the rebuildable logging system can also be deletion detectable and indisputable. the
还应注意,关于包括在另一日志记录中的事件j的重建信息不必是直接信息。其可由部分记录j、或其散列值hj(具体地,由重建信息产生方案经单向/防碰撞散列函数计算)、或其数字签名、或任何其它指示组成。具体地,如果使用单向防碰撞散列函数H,则可能无争议地从包含hj的日志记录i恢复关于第j个事件的信息:以符号表示,如果第i个记录被签署,相应的无争议日志可采取形式SIG(hj,Ei,AI)。例如,如果怀疑特定用户在特定时间进入特定的门,可测试值hj是否与已响应于该事件创建的日志记录Ej的散列H(Ej)匹配。这是 无可争议的,因为H的防碰撞特性:实质上不可能提出不同于Ej的记录E’j使得H(E’j)=H(Ej)。 It should also be noted that the reconstructed information about event j included in another log record need not be direct information. It may consist of a partial record j, or its hash value h j (in particular, computed by the reconstruction information generation scheme via a one-way/collision-proof hash function), or its digital signature, or any other indication. Specifically, if a one-way collision-resistant hash function H is used, it is possible to uncontroversially recover information about the j-th event from a log record i containing h j : notationally, if the i-th record is signed, the corresponding An uncontested log may take the form SIG(h j , Ei, AI). For example, if a particular user is suspected of entering a particular door at a particular time, it can be tested whether the value hj matches the hash H(Ej) of the log record Ej that has been created in response to that event. This is indisputable because of the anti-collision properties of H: it is virtually impossible to come up with a record E'j different from Ej such that H(E'j)=H(Ej).
日志记录Ej可被创建,在某种程度上应使其容易猜测(因而验证)对于特定事件应是什么日志记录(例如,通过使用日志记录的标准化格式,使用近似时间间隔等)。单向散列因为其大小很小而特别有用:可以散列许多甚或所有先前的日志记录以包括在随后的记录中。例如,记录i+1可包括h1=H(E1)、h2=H(E2)、...、hi=H(Ei)。或者,可以嵌套(部分)散列,从而减少所要求的空间量。例如,如果嵌套所有散列,则第二日志记录应包括h1=H(E1),第三日志记录应包括h2=H(E2,h1)...。因而,如果通过i-1和日志记录i+1创建或观日志记录i,则可无争议地创建日志记录i。该系统可通过(如使用仅数据库知道的密钥)加密日志记录中的(部分)信息进行改进,从而敌人不能看到他必须损害哪一信息以危害特定事件的可重建性。实际上,一旦日志被加密保护,这样的加密日志(最好是无争议的加密日志)可被发到另一(第二)数据库,而不会损失任何秘密。这使得敌人更难删除:现在他不得不进入两个或更多数据库以伪造日志。 Log records Ej may be created in a way that should make it easy to guess (and thus verify) what log records should be for a particular event (eg, by using a standardized format for log records, using approximate time intervals, etc.). One-way hashes are particularly useful because of their small size: many or even all previous log records can be hashed for inclusion in subsequent records. For example, record i+1 may include h 1 =H(E 1 ), h 2 =H(E 2 ), . . . , h i =H(E i ). Alternatively, (partial) hashes can be nested, thereby reducing the amount of space required. For example, if all hashes are nested, the second log record should include h 1 =H(E 1 ), the third log record should include h 2 =H(E 2 ,h 1 ) . . . . Thus, if log record i is created or viewed by i−1 and log record i+1, log record i can be created without dispute. This system can be improved by encrypting (eg using a key known only to the database) the (part of) information in the log records, so that the enemy cannot see which information he has to compromise to jeopardize the reconstructability of a particular event. In fact, once a log is cryptographically protected, such an encrypted log (preferably a non-controversial encrypted log) can be sent to another (secondary) database without any loss of secrets. This makes it harder for the enemy to delete: now he has to go into two or more databases to forge logs.
可重建日志还可通过使用错误纠正代码实现。具体地,这可通过产生每一日志记录的多个分量(“部分”)并将它们以这样的方式单独(或许与其它日志记录一起)发送,当足够多的部分已被接收时,日志记录可由重建方案重建,这可能调用错误纠正代码的解码算法。这些部分可被随机或伪随机传播,因而当足够的部分实际上到达时,使敌手很难删除足够多的部分以阻止日志记录的重建。 Reconstructable logging can also be achieved through the use of error-correcting code. Specifically, this can be done by generating multiple components ("parts") of each log record and sending them separately (perhaps with other log records) in such a way that when enough parts have been received, the log record Can be reconstructed by a reconstruction scheme, which may invoke decoding algorithms for error-correcting codes. These parts may be spread randomly or pseudo-randomly, thus making it difficult for an adversary to delete enough parts to prevent reconstruction of the log record when enough parts actually arrive. the
事件日志(无论由卡创建还是由门或卡和门结合创建)可由卡携带以有利于其收集。当卡到达连通的门或与中央服务器通信或相反能够与中央数据库通信时,其可发送保存于其中的日志。这可类似于HRA的传播那样实现,除了HRA可从中央点发送给卡以外,而日志可从卡发送给中央点。因此,传播HRA的所有方法应用于事件日志的收集。具体地,传播HRA的方法可被变换为收集事件日志的方法,其通过:(1)用接收器取代发送器,反之亦然;(2)用日志记录代替HRA。 Event logs (whether created by cards or doors or a combination of cards and doors) can be carried by cards to facilitate their collection. When a card reaches a communicating door or communicates with a central server or otherwise is able to communicate with a central database, it can send the log it keeps there. This can be accomplished similarly to the propagation of the HRA, except that the HRA can be sent to the card from a central point, while the log can be sent from the card to the central point. Therefore, all methods of propagating HRA are applied to the collection of event logs. Specifically, the method of propagating HRAs can be transformed into a method of collecting event logs by: (1) replacing senders with receivers, and vice versa; (2) replacing HRAs with log records. the
具体地,卡C1可收集与C1无关的事件的事件日志,如另一卡C2的访问或门D的故障。此外,一门D1的事件日志可被保存(或许临时)在另一门D2上(或许由卡C1携带到那里)。接着,当另一卡C2与D2通信时,其可接收这些日志记录的部分并随后将它们通信给另一门或通信给中央位置。该广泛传播可确保事件日志更快地到达中央点。(此外,一些门尽管不全连接到中央数据库,可具有相互之间的连接。因而,这样的门可类似地交换可用事件日志。如果卡具有相互通信能力-例如当接近时-它们也可交换关于它们保存的事件日志的信息。在这样的收集过程中,无争议的日志是有利的,因为它们不必须在安全通道上传送,因为它们不能被伪造。因此,它们不依赖于卡或卡和门之间的连接的安全性。删除可检测日志提供额外的优点,如果某些日志记录未被收集(或许因为某些卡从未到达连通的门),其确保该事实可被检测到。可重建日志在某些日志记录没有到达中央数据库的情况下可允许日志记录的重建(再次地,或许因为某些卡从未到达连通的门)。 In particular, card C1 may collect an event log of events not related to C1, such as an access by another card C2 or a failure of door D. Furthermore, the event log of one door D1 may be kept (perhaps temporarily) on another door D2 (perhaps carried there by card C1). Then, when another card C2 communicates with D2, it can receive portions of these log records and then communicate them to another door or to a central location. This wide spread ensures that event logs reach the central point more quickly. (Furthermore, some gates, although not fully connected to the central database, may have connections between each other. Thus, such gates may similarly exchange available event logs. If the cards have the ability to communicate with each other - for example when in proximity - they may also exchange information about The information of the event logs they hold. In such a collection process undisputed logs are advantageous because they do not have to be transmitted on a secure channel, as they cannot be forged. Therefore, they are not dependent on cards or cards and doors The security of the connection between. Removing the detectable log provides an additional advantage, if some log records are not collected (perhaps because some cards never reach the connected door), it ensures that the fact can be detected. Reconstructable Logging may allow reconstruction of log records in the event that some log records do not reach the central database (again, perhaps because some cards never reached connected gates).
在一些情况下,所有事件日志可以这种方式进行保存和传播。否则,采用一些优化是有用的。一种优化方法是使事件日志与优先级信息一起提供,其表明通知中央机构关于特定事件的相对重要性。一些日志记录可能比其它日志记录更紧急:例如,如果门被维持在打开或关闭位置,如果试图进行未经授权的访问,或如果检测到不寻常的访问模式。为了加速将这样的重要信息传送到其可被遵照行事的位置,访问日志中的信息可用指明其重要性的标志标记(或其重要性可从其自身的信息推断)。例如,一些日志记录可被标记为“紧急”,而其它可被标记为“常规”。或它们可由指明它们的重要程度的数字或代码字标记(优先等级尽可能适当地精确或接近)。例如,较高优先级的信息可被给予更多的卡和/或门以增加其将更快或更安全到达其目的地的可能性。同样,卡或门,当接收高优先级的信息时,可通过从其存储器删除低优先级信息而为高优先级信息腾出空位。同样,门可决定将高优先级信息给予经过其的每一卡,而低优先级信息仅被给予少 数几个卡或可等待直到门被连通为止。 In some cases, all event logs can be saved and propagated in this manner. Otherwise, it is useful to employ some optimizations. One optimization approach is to have event logs provided with priority information indicating the relative importance of notifying a central authority about a particular event. Some log entries may be more urgent than others: for example, if a door is maintained in an open or closed position, if unauthorized access is attempted, or if unusual access patterns are detected. To expedite the delivery of such important information to where it can be acted upon, information in the access log may be tagged with a flag indicating its importance (or its importance may be inferred from its own information). For example, some log records may be marked as "urgent" while others may be marked as "routine". Or they may be marked by a number or code word indicating their degree of importance (priority as exact or as close as possible). For example, higher priority information may be given more cards and/or doors to increase the likelihood that it will reach its destination faster or more safely. Likewise, a card or door, when receiving a high priority message, can make room for the high priority message by deleting the low priority message from its memory. Likewise, a gate may decide to give high priority information to every card passing through it, while low priority information is given to only a few cards or may wait until the gate is connected. the
或者或除了上述技术以外,卡可被选择以在某种程度上保存特定的日志记录,包括随机保存,或门可将日志记录提供给一定数量的卡(例如,门“遭遇”的前k个卡)。这样的传播技术的使用可大大降低事件日志中的重要记录将不能到达其被遵照行事的中央位置的可能性。具体地,其可用作防“蓄意干扰”攻击的有效对策,所述攻击试图阻止损坏的门通信其遇险信息。在卡和门之间交换日志的实际方法可变化。在少许记录的情况下,交换并比较所有已知记录最有效。在其它情况下,可使用更复杂的用于发现和协调区别的算法。 Alternatively or in addition to the above techniques, cards may be selected to save certain logging to some extent, including random saving, or gates may provide logging to a certain number of cards (e.g., the first k of the gate "encounters" Card). The use of such propagation techniques can greatly reduce the likelihood that important records in the event log will not reach the central location where they are acted upon. In particular, it can be used as an effective countermeasure against "jamming" attacks that attempt to prevent damaged doors from communicating their distress messages. The actual method of exchanging logs between the card and the door may vary. In the case of few records, it is most efficient to swap and compare all known records. In other cases, more complex algorithms for finding and reconciling differences may be used. the
详细介绍一些事件日志可被收集的样本方法是有用的。下面,“管理机构”A包括一些中央点或数据库,事件日志被收集于其中。 It is useful to detail some sample ways in which event logs can be collected. Next, "Administrative Authority" A includes some central point or database where event logs are collected. the
顺序1(直接从门到管理机构): Sequence 1 (directly from gate to governing body) :
1、连通的门D响应于事件创建无可争议的日志记录E。 1. A connected gate D creates an indisputable log record E in response to an event. the
2、E经有线或无线通信传输给管理机构A。 2. E is transmitted to management institution A via wired or wireless communication. the
3、A验证E的可靠性,如果验证成功,则保存E。 3. A verifies the reliability of E, and saves E if the verification is successful. the
顺序2(从门到用户卡到管理机构): Sequence 2 (from door to user card to authority) :
1、门D响应于事件创建无争议日志记录E。 1. Gate D creates an uncontested log record E in response to an event. the
2、被呈现用于访问D的用户U的卡C接收并保存E(除了与访问有关的通信以外)。卡可以也可不验证E的可靠性。 2. The card C of the user U presented for access D receives and stores E (except for communications related to the access). The card may or may not verify the authenticity of E. the
3、当U下班并在工作日结束时将其卡呈现给A时,E由卡传输给A。 3. When U is off duty and presents his card to A at the end of the working day, E is transferred to A by the card. the
4、A验证E的可靠性,如果验证成功,则保存E。 4. A verifies the reliability of E, and saves E if the verification is successful. the
顺序3(从门到用户卡到另一(连通的)门到管理机构): Sequence 3 (from door to user card to another (connected) door to authority) :
1、门D响应于事件创建无争议日志记录E。 1. Gate D creates an uncontested log record E in response to an event. the
2、被呈现用于访问D的用户U的卡C接收并保存E(除了与访问有关的通信以外)。卡可以也可不验证E的可靠性。 2. The card C of the user U presented for access D receives and stores E (except for communications related to the access). The card may or may not verify the authenticity of E. the
3、随后,U呈现其卡C以用于访问另一(连通的)门D’。D’,除了验证凭证并在合适时授权访问以外,从C接收E。D’可以也可不验证E的可靠性。 3. U then presents his card C for access to another (connected) door D'. D', receives E from C in addition to validating credentials and authorizing access when appropriate. D' may or may not verify the reliability of E. the
4、E经有线或无线通信由D’传输给管理机构A。 4. E is transmitted from D' to management agency A via wired or wireless communication. the
5、A验证E的可靠性,如果验证成功,则保存E。 5. A verifies the reliability of E, and saves E if the verification is successful. the
受保护区域可由墙和物理门确定,如通过其人可进入的门、或集装箱的门、安全门、交通工具的门等。受保护的区域也可由虚拟的门和墙确定。例如,区域可由检测器保护,其可感觉侵入并可在未被提供授权时发出报警或发送另一信号。这样的报警系统是虚拟门的一个例子:在机场中,经常通过出口巷道进入门区将触发这样的报警,尽管没有物理的门或墙已被违犯。虚拟门的另一例子是收费所:尽管许多收费所不包含物理的栅栏或门,特定的汽车可能被授权也可能未被授权通过收费所。例如,这样的授权可依赖于汽车的电子收费付款标记的有效性。另一例子是交通管制区。例如,要进入特定城市的市中心或通向核设施的路、军队军营、或另一敏感区域,交通工具必须具有合适的授权,用于记账、安全或拥塞控制等目的。 Protected areas may be defined by walls and physical doors, such as doors through which people can enter, or doors of containers, security doors, doors of vehicles, etc. Protected areas can also be defined by virtual doors and walls. For example, an area may be guarded by detectors which may sense intrusion and which may sound an alarm or send another signal if authorization is not provided. Such an alarm system is an example of a virtual door: in an airport, often entering a gate area through an exit roadway will trigger such an alarm even though no physical door or wall has been violated. Another example of a virtual gate is a toll booth: Although many toll booths do not contain physical barriers or gates, a particular car may or may not be authorized to pass through a toll booth. For example, such authorization may rely on the validity of the car's electronic toll payment token. Another example is a restricted traffic area. For example, to enter the center of a particular city or a road leading to a nuclear facility, a military barracks, or another sensitive area, vehicles must have appropriate authorizations for billing, security, or congestion control purposes. the
此外,保护不仅仅为区域所需要,还为设备需要,如飞机引擎或军事装备。例如,必须确保只有经授权的个人才可启动飞机的引擎或运载危险材料的卡车的引擎。 Furthermore, protection is not only required for areas, but also for equipment, such as aircraft engines or military equipment. For example, it must be ensured that only authorized individuals start the engines of airplanes or trucks carrying hazardous materials. the
有许多方式使用凭证/证明来进行访问控制。应注意,对于在此公开的方式,术语“日子”应被理解为一系列时间段中的一般时间段,及“早上”意为时间段的开始。 There are many ways to use credentials/proofs for access control. It should be noted that for the approaches disclosed herein, the term "day" should be understood as a general time period in a series of time periods, and "morning" means the beginning of a time period. the
在该申请中,“门”应被视为包括所有类型的入口(如物理的和/或虚拟的)、访问控制系统/设备、及监视系统/设备。具体地,它们包括用于启动引擎和控制装置的关键机构(具体地,从而本发明可用于确保只有当前的授权用户可启动飞机、操作推土机或访问和控制各种重要和/或危险的物品、设备和机件)。与该约定一致,我们将“进入”称为被授权想得到的访问(或物理的或虚拟的)。 In this application, "gate" shall be considered to include all types of entrances (eg, physical and/or virtual), access control systems/devices, and surveillance systems/devices. In particular, they include key mechanisms for starting engines and controls (specifically, so that the present invention can be used to ensure that only current authorized users can start an aircraft, operate a bulldozer, or access and control various important and/or dangerous items, equipment and components). Consistent with this convention, we refer to "entry" as the access (either physical or virtual) desired by an authorized person. the
类似地,具体地但不损失一般性,卡可被理解为用户的任何访问设备。应该意识到的是,卡的概念足够概括地包括移动电话、PDA、或其它无线和/或先进设备,且卡可包括或连同其它安全措施一起工作,如PIN、口令及生物测定信息,尽管这些措施的部分可能“位于” 卡持有人的大脑或身体中而不是卡本身之中。 Similarly, in particular but without loss of generality, a card may be understood as any access device of a user. It should be appreciated that the concept of a card is broad enough to include mobile phones, PDAs, or other wireless and/or advanced devices, and that a card may include or work in conjunction with other security measures, such as PINs, passwords, and biometrics, although these Parts of the measure may be "located" in the card holder's brain or body rather than in the card itself. the
此外,措辞“用户”(经常称为“他”或“她”)可被广泛地理解为不仅包括用户和人,还包括设备、实体(及用户、设备和实体的集合),包括但不限于用户卡。 Furthermore, the term "user" (often referred to as "he" or "she") may be interpreted broadly to include not only users and persons, but also devices, entities (and collections of users, devices and entities), including but not limited to user card. the
在此描述的系统可使用硬件和软件的任何适当结合实施,包括但不限于保存在计算机可读的介质中的软件,其可由一个或多个处理器访问。此外,用于加密、鉴定等的技术可被适当地结合和可交换地使用。在那一点上,下述美国专利和申请中的每一个均通过引用组合于此: The systems described herein can be implemented using any suitable combination of hardware and software, including but not limited to software stored on a computer-readable medium that can be accessed by one or more processors. Furthermore, techniques for encryption, authentication, etc. may be appropriately combined and used interchangeably. In that regard, each of the following U.S. patents and applications are hereby incorporated by reference:
1995年10月2日申请的美国临时专利申请60/004,796; U.S. Provisional Patent Application 60/004,796, filed October 2, 1995;
1995年10月24日申请的美国临时专利申请60/006,038; U.S. Provisional Patent Application 60/006,038, filed October 24, 1995;
1995年11月2日申请的美国临时专利申请60/006,143; U.S. Provisional Patent Application 60/006,143, filed November 2, 1995;
1996年9月10日申请的美国临时专利申请60/024,786; U.S. Provisional Patent Application 60/024,786, filed September 10, 1996;
1996年8月29日申请的美国临时专利申请60/025,128; U.S. Provisional Patent Application 60/025,128 filed August 29, 1996;
1996年12月18日申请的美国临时专利申请60/033,415; U.S. Provisional Patent Application 60/033,415, filed December 18, 1996;
1997年2月3日申请的美国临时专利申请60/035,119; U.S. Provisional Patent Application 60/035,119, filed February 3, 1997;
2001年3月20日申请的美国临时专利申请60/277,244; U.S. Provisional Patent Application 60/277,244, filed March 20, 2001;
2001年6月25日申请的美国临时专利申请60/300,621; U.S. Provisional Patent Application 60/300,621 filed June 25, 2001;
2001年12月27日申请的美国临时专利申请60/344,245; U.S. Provisional Patent Application 60/344,245 filed December 27, 2001;
2002年4月8日申请的美国临时专利申请60/370,867; U.S. Provisional Patent Application 60/370,867, filed April 8, 2002;
2002年4月16日申请的美国临时专利申请60/372,951; U.S. Provisional Patent Application 60/372,951 filed April 16, 2002;
2002年4月17日申请的美国临时专利申请60/373,218; U.S. Provisional Patent Application 60/373,218 filed April 17, 2002;
2002年4月23日申请的美国临时专利申请60/374,861; U.S. Provisional Patent Application 60/374,861 filed April 23, 2002;
2002年10月23日申请的美国临时专利申请60/420,795; U.S. Provisional Patent Application 60/420,795, filed October 23, 2002;
2002年10月25日申请的美国临时专利申请60/421,197; U.S. Provisional Patent Application 60/421,197, filed October 25, 2002;
2002年10月28日申请的美国临时专利申请60/421,756; U.S. Provisional Patent Application 60/421,756, filed October 28, 2002;
2002年10月30日申请的美国临时专利申请60/422,416; U.S. Provisional Patent Application 60/422,416, filed October 30, 2002;
2002年11月19日申请的美国临时专利申请60/427,504; U.S. Provisional Patent Application 60/427,504, filed November 19, 2002;
2003年1月29日申请的美国临时专利申请60/443,407; U.S. Provisional Patent Application 60/443,407, filed January 29, 2003;
2003年2月10日申请的美国临时专利申请60/446,149; U.S. Provisional Patent Application 60/446,149 filed February 10, 2003;
2003年6月24日申请的美国临时专利申请60/482,179; U.S. Provisional Patent Application 60/482,179 filed June 24, 2003;
2003年7月18日申请的美国临时专利申请60/488,645; U.S. Provisional Patent Application 60/488,645, filed July 18, 2003;
2003年9月24日申请的美国临时专利申请60/505,640; U.S. Provisional Patent Application 60/505,640, filed September 24, 2003;
1996年9月19日申请的美国专利申请08/715,712; U.S. Patent Application 08/715,712 filed September 19, 1996;
1996年11月1日申请的美国专利申请08/741,601; U.S. Patent Application 08/741,601 filed November 1, 1996;
1996年11月26日申请的美国专利申请08/756,720; U.S. Patent Application 08/756,720 filed November 26, 1996;
1997年2月24日申请的美国专利申请08/804,868; U.S. Patent Application 08/804,868 filed February 24, 1997;
1997年2月24日申请的美国专利申请08/804,869; U.S. Patent Application 08/804,869 filed February 24, 1997;
1997年6月11日申请的美国专利申请08/872,900; U.S. Patent Application 08/872,900 filed June 11, 1997;
1997年8月5日申请的美国专利申请08/906,464; U.S. Patent Application 08/906,464, filed August 5, 1997;
2001年7月25日申请的美国专利申请09/915,180; U.S. Patent Application 09/915,180 filed July 25, 2001;
2002年3月20日申请的美国专利申请10/103,541; U.S. Patent Application 10/103,541 filed March 20, 2002;
2002年9月16日申请的美国专利申请10/244,695; U.S. Patent Application 10/244,695 filed September 16, 2002;
2003年4月8日申请的美国专利申请10/409,638; U.S. Patent Application 10/409,638 filed April 8, 2003;
2004年6月24日申请的美国专利申请10/876,275; U.S. Patent Application 10/876,275 filed June 24, 2004;
美国专利5,604,804; US Patent 5,604,804;
美国专利5,666,416; US Patent 5,666,416;
美国专利5,717,757; US Patent 5,717,757;
美国专利5,717,758; US Patent 5,717,758;
美国专利5,793,868; US Patent 5,793,868;
美国专利5,960,083; US Patent 5,960,083;
美国专利6,097,811;及 US Patent 6,097,811; and
美国专利6,487,658。 US Patent 6,487,658. the
在本发明已结合多个实施例公开的同时,其修改对本领域技术人员将是非常明显的。因此,本发明的实质和范围由下面的权利要求提出。 While the invention has been disclosed in connection with a number of embodiments, modifications thereof will be readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present invention are indicated by the following claims. the
Claims (45)
Applications Claiming Priority (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US48864503P | 2003-07-18 | 2003-07-18 | |
| US60/488,645 | 2003-07-18 | ||
| US50564003P | 2003-09-24 | 2003-09-24 | |
| US60/505,640 | 2003-09-24 | ||
| PCT/US2004/022813 WO2005010688A2 (en) | 2003-07-18 | 2004-07-16 | Controlling access using additional data |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN101268649A CN101268649A (en) | 2008-09-17 |
| CN101268649B true CN101268649B (en) | 2012-07-04 |
Family
ID=38731771
Family Applications (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2004800220044A Expired - Fee Related CN101268649B (en) | 2003-07-18 | 2004-07-16 | Controlling access using additional data |
| CN2004800220010A Expired - Fee Related CN101036339B (en) | 2003-07-18 | 2004-07-16 | Disseminating additional data used for controlling access |
| CN2004800207923A Expired - Fee Related CN101088247B (en) | 2003-07-18 | 2004-07-16 | Control group access to doors |
| CN2004800220006A Expired - Fee Related CN101065789B (en) | 2003-07-18 | 2004-07-16 | Recording access attempts to an area |
Family Applications After (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2004800220010A Expired - Fee Related CN101036339B (en) | 2003-07-18 | 2004-07-16 | Disseminating additional data used for controlling access |
| CN2004800207923A Expired - Fee Related CN101088247B (en) | 2003-07-18 | 2004-07-16 | Control group access to doors |
| CN2004800220006A Expired - Fee Related CN101065789B (en) | 2003-07-18 | 2004-07-16 | Recording access attempts to an area |
Country Status (2)
| Country | Link |
|---|---|
| CN (4) | CN101268649B (en) |
| ES (1) | ES2367435T3 (en) |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| IT1393199B1 (en) * | 2009-02-25 | 2012-04-11 | Asselle | CONTROL SYSTEM FOR THE MANAGEMENT OF ACCESSES TO RESERVED AREAS |
| US9083698B2 (en) * | 2010-11-09 | 2015-07-14 | Zablox AB | Method and system for remote operation of an installation |
| JP5771772B2 (en) * | 2010-12-10 | 2015-09-02 | パナソニックIpマネジメント株式会社 | Door opening / closing control system and door opening / closing control device |
| AU2012222859B2 (en) * | 2011-02-28 | 2015-06-04 | Leapin Digital Keys Llc | System and method for controlling access to electronic locks |
| CN103426215B (en) * | 2012-05-21 | 2015-12-16 | 上海宽带技术及应用工程研究中心 | For door lock management-control method and the system of unexpected relief |
| CN103778690B (en) * | 2012-10-17 | 2018-08-21 | 刘全 | A kind of the entrance overall situation control method and system of Cargo Oriented on Group user |
| CN103778689B (en) * | 2012-10-17 | 2016-03-09 | 刘全 | A kind of gateway towards personal user overall situation control method and system |
| US20160315927A1 (en) * | 2015-04-21 | 2016-10-27 | Zte (Usa) Inc. | Method and system for establishing and managing personal black box (pbb) in virtually-networked big-data (vnbd) environment |
| CN105554035B (en) * | 2016-02-06 | 2019-08-30 | 安钥(北京)科技股份有限公司 | An electronic lock system and its control method |
| US11395138B2 (en) * | 2016-12-06 | 2022-07-19 | Assa Abloy Ab | Providing access to a lock for a service provider |
| AU2018455995A1 (en) * | 2018-12-31 | 2021-08-19 | Lleidanetworks Serveis Telemàtics S.A. | Universal certified and qualified contracting method |
| EP3716224B1 (en) * | 2019-03-27 | 2023-10-25 | Carrier Corporation | System and method for providing secure access |
| US11550892B2 (en) * | 2020-02-28 | 2023-01-10 | Microsoft Technology Licensing, Llc | Presentation of a verifiable credential having usage data |
| KR20230128328A (en) * | 2020-12-31 | 2023-09-04 | 아싸 아브로이 에이비 | Physical access control system with security relay |
| CN114519559A (en) * | 2021-12-31 | 2022-05-20 | 山东日照发电有限公司 | Electronic document signing management system and method |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5742035A (en) * | 1996-04-19 | 1998-04-21 | Kohut; Michael L. | Memory aiding device for credit card pin numbers |
| US5768379A (en) * | 1994-07-13 | 1998-06-16 | La Poste | System for the checking of limited access to authorized time slots renewable by means of a portable storage device |
| US5841122A (en) * | 1994-09-13 | 1998-11-24 | Dorma Gmbh + Co. Kg | Security structure with electronic smart card access thereto with transmission of power and data between the smart card and the smart card reader performed capacitively or inductively |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5887131A (en) * | 1996-12-31 | 1999-03-23 | Compaq Computer Corporation | Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password |
| US6038666A (en) * | 1997-12-22 | 2000-03-14 | Trw Inc. | Remote identity verification technique using a personal identification device |
| WO2002008551A1 (en) * | 2000-07-20 | 2002-01-31 | Codesmart Access Systems Pty Ltd | Access method and system |
| CN2504689Y (en) * | 2001-02-28 | 2002-08-07 | 北京永毅行科技发展有限公司 | Intelligent entrance guard, attendance machine |
| CN1148683C (en) * | 2002-04-30 | 2004-05-05 | 北京信源咨讯信息技术有限公司 | Entrance guard method and system using blue tooth technique in wireless authentication and data transmitting/receiving |
-
2004
- 2004-07-16 CN CN2004800220044A patent/CN101268649B/en not_active Expired - Fee Related
- 2004-07-16 CN CN2004800220010A patent/CN101036339B/en not_active Expired - Fee Related
- 2004-07-16 CN CN2004800207923A patent/CN101088247B/en not_active Expired - Fee Related
- 2004-07-16 CN CN2004800220006A patent/CN101065789B/en not_active Expired - Fee Related
- 2004-07-16 ES ES04778354T patent/ES2367435T3/en not_active Expired - Lifetime
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5768379A (en) * | 1994-07-13 | 1998-06-16 | La Poste | System for the checking of limited access to authorized time slots renewable by means of a portable storage device |
| US5841122A (en) * | 1994-09-13 | 1998-11-24 | Dorma Gmbh + Co. Kg | Security structure with electronic smart card access thereto with transmission of power and data between the smart card and the smart card reader performed capacitively or inductively |
| US5742035A (en) * | 1996-04-19 | 1998-04-21 | Kohut; Michael L. | Memory aiding device for credit card pin numbers |
Also Published As
| Publication number | Publication date |
|---|---|
| CN101065789A (en) | 2007-10-31 |
| ES2367435T3 (en) | 2011-11-03 |
| CN101065789B (en) | 2010-05-26 |
| CN101088247B (en) | 2012-05-16 |
| CN101088247A (en) | 2007-12-12 |
| CN101036339A (en) | 2007-09-12 |
| CN101268649A (en) | 2008-09-17 |
| CN101036339B (en) | 2012-05-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN100533368C (en) | Controlling access to an area | |
| US8015597B2 (en) | Disseminating additional data used for controlling access | |
| US7600129B2 (en) | Controlling access using additional data | |
| US7822989B2 (en) | Controlling access to an area | |
| US8261319B2 (en) | Logging access attempts to an area | |
| US7716486B2 (en) | Controlling group access to doors | |
| US9449443B2 (en) | Logging access attempts to an area | |
| US9230375B2 (en) | Physical access control | |
| US7353396B2 (en) | Physical access control | |
| CN101268649B (en) | Controlling access using additional data | |
| US8631486B1 (en) | Adaptive identity classification | |
| CN100473002C (en) | Physical Access Control Methods | |
| KR20230104921A (en) | How to break the protection of an object achieved by the protection device | |
| AU2006200187B2 (en) | Controlling access to an area | |
| KR20040098066A (en) | Physical access control |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| ASS | Succession or assignment of patent right |
Owner name: ASSA ABLOY CO., LTD. Free format text: FORMER OWNER: CORESTREET LTD. Effective date: 20150105 |
|
| C41 | Transfer of patent application or patent right or utility model | ||
| TR01 | Transfer of patent right |
Effective date of registration: 20150105 Address after: Stockholm Patentee after: BUGA Technologies GmbH Address before: Massachusetts Patentee before: Corestreet Ltd. |
|
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120704 Termination date: 20170716 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |