DE9216798U1 - Kit for checking the legitimacy of electronic access and / or information media - Google Patents
Kit for checking the legitimacy of electronic access and / or information mediaInfo
- Publication number
- DE9216798U1 DE9216798U1 DE9216798U DE9216798U DE9216798U1 DE 9216798 U1 DE9216798 U1 DE 9216798U1 DE 9216798 U DE9216798 U DE 9216798U DE 9216798 U DE9216798 U DE 9216798U DE 9216798 U1 DE9216798 U1 DE 9216798U1
- Authority
- DE
- Germany
- Prior art keywords
- kit according
- access
- microprocessor chip
- chip
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00388—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/0042—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
- G07C2009/00476—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
- G07C2009/005—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a random code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00785—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by light
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Description
Elektronische Zugangs- und/oder Informationsmedien gewinnen in der Gestalt von Chipkarten und elektronischen Schlüsseln neben vielen anderen Anwendungsbereichen zunehmende Bedeutung.Electronic access and/or information media in the form of chip cards and electronic keys are becoming increasingly important, among many other areas of application.
Dabei spielt insbesondere bei Schließanlagen der Schlüssel insofern eine verletzbare Stelle, als er bei simplifizierter Gestaltung auslesbar und damit z. B. über einen PC "kopierbar" ist.The key is a particularly vulnerable point in locking systems, as it can be read out in a simplified design and thus "copied" via a PC, for example.
Aus diesem Grunde entstand z. B. bei Chipkarten die sog« PIN, die einen gewissen Schutz dahingehend darstellt, als der Benutzer sich zunächst durch diese PIN identifizieren muß. Mißbrauch ist dabei dadurch gegeben, daß &zgr;. B. fremde Personen die Eingabe der PIN verfolgen können und anschließend nach Entwendung der Chipkarte diese in strafbarer Handlungweise verwenden.For this reason, the so-called PIN was developed for chip cards, for example, which provides a certain level of protection in that the user must first identify himself using this PIN. Misuse occurs because strangers can, for example, see the PIN being entered and then, after stealing the chip card, use it to commit a criminal offense.
Auch bei Schlüsseln ist es natürlich möglich, eine PIN zu benutzen, was jedoch fast zwangsläufig die Entwicklung eines Einlesegerätes erfordert, das allein durch die Größe der Tastatur die Möglichkeit gewährleistet, daß auch weniger geschickte Personen die PIN eingeben können.It is of course also possible to use a PIN for keys, but this almost inevitably requires the development of a reader device that, through the size of the keyboard alone, ensures that even less skilled people can enter the PIN.
In der Verwendung der Chipkarte als Schlüssel besteht natürlich wiederum die Möglichkeit, die Chipkarte als sog. "Super/Smart/Card" zu konzipieren, die gleichzeitig z. B. neben ihrem Chip eine alphanumerische Tastatur aufweist. When using the chip card as a key, it is of course possible to design the chip card as a so-called "Super/Smart/Card", which also has an alphanumeric keyboard in addition to its chip.
Soll der Schlüssel dennoch einen gewissen Sicherheitsgrad ohne PIN besitzen, ist es erforderlich, daß er nicht von unlegitimierten Personen auslesbar ist. Dies bedeutet, daß bei der Schlüsselaktivierung dessen Code nicht auslesbar sein darf.If the key is to have a certain level of security without a PIN, it is necessary that it cannot be read by unauthorized persons. This means that when the key is activated, its code must not be readable.
Unter dieser Voraussetzung wurde in der Anwendung der Zugangs- und/oder Informationsmedien als Schlüssel mit der Kommunikation eines elektronischen Schlosses davon Gebrauch gemacht, daß sowohl der Schlüssel, als auch das Schloß einen Algorithmus, entsprechend aufeinander abgestimmt, durchführen.Under this premise, in the application of access and/or information media as a key with the communication of an electronic lock, use was made of the fact that both the key and the lock execute an algorithm that is appropriately coordinated with each other.
In bevorzugter Ausführungsform wird mit dieser Erfindung ein Verfahren und ein Bausatz vorgestellt, der es gestattet, den Schlüsselcode nicht auslesbar zu machen, so daß z. 8. in Sicherheitsbereichen nicht einmal der Schlüsselbenutzer seinen eigenen Legitimationscode kennen muß.In a preferred embodiment, this invention presents a method and a kit that makes it possible to make the key code unreadable, so that, for example, in security areas, the key user does not even have to know his own authentication code.
In der Vorgehensweise wird dabei der Schlüssel mit seinem Mikroprozessor-Chip mit einem Schloßcode programmiert, der bevorzugt in einem umprogrammierbaren Festspeicher über z. B. EEPROMs abgelegt wird. Dabei besitzt der Mikroprozessor des Schlüssels ein bevorzugt integriertes Rechenwerk, das in seiner Funktion ausreicht, die Grundrechenarten durchzuführen.In the procedure, the key with its microprocessor chip is programmed with a lock code, which is preferably stored in a reprogrammable read-only memory, e.g. via EEPROMs. The microprocessor of the key preferably has an integrated arithmetic unit, which is sufficient in its function to carry out basic arithmetic.
Es ist vorgesehen, daß der Schloß-Mikroprozessor zunächst durch einen "Weckimpuls" des Schlüssels in Aktionsbereitschaft geschaltet wird und anschließend z. 8. über eine LED dem Schlüssel eine Zufallszahl überspielt, die diese über Photodiode empfängt und seinem Mikroprozessor weiterleitet, über das Rechenwerk des Schlüssels wird nun eine einfache Rechenoperation durchgeführt, die z. B. in einer einfachen Multiplikation bestehen kann und von der das Schloß "weiß", welche Rechenoperation im Schlüssel durchgeführt wird, damit diese bei der Legitimationsprüfung durch das Schloß rückgerechnet werden kann.It is intended that the lock microprocessor is first switched to readiness for action by a "wake-up pulse" from the key and then, for example, a random number is sent to the key via an LED, which receives it via a photodiode and forwards it to its microprocessor. A simple calculation is then carried out via the key's arithmetic unit, which can, for example, consist of a simple multiplication and from which the lock "knows" which calculation is carried out in the key so that it can be calculated back during the legitimacy check by the lock.
Die ermittelete Zahl des Schlüssels wiederum wird im Ausführungsbeispiel durch eine Schlüssel-LED der Photodiode des Schlosses und damit dessen Mikroprozessors zugespielt, der in einem Schreib-Lesespeicher die vorgenannte Zufallszahl gespeichert beinhaltet. Die übermittelte Zahl wird mit Hilfe dieser Zufallszahl und mit Hilfe der bekannten Rückrechenoperation, d. h. hier Division anstelle von Multiplikation, verarbeitet, womit für das Schloß der Legitimationscode des Schlüssels erkennbar wird, der anschließend mit einer Festspeicher-Codeliste auf Legitimation geprüft wird.In the example, the determined number of the key is in turn fed through a key LED to the photodiode of the lock and thus to its microprocessor, which contains the aforementioned random number stored in a read-write memory. The transmitted number is processed using this random number and the known back calculation operation, ie here division instead of multiplication, which allows the lock to recognize the legitimation code of the key, which is then checked for legitimacy using a read-only memory code list.
Ist diese Legitimationsprüfung positiv ausgefallen, wird von Schloßseite die notwendige Mechanik betätigt, um das Schloß zu öffnen bzw. offen zu halten oder schließbar zu machen.If this legitimacy check is positive, the necessary mechanism is activated on the lock side to open the lock or to keep it open or to make it lockable.
Die Erfindung wird nun anhand der Bausatzansprüche 1-10 sowie der Figur 1 näher erläutert, die als reines Blockschaltbild dargestellt ist.The invention will now be explained in more detail with reference to the kit claims 1-10 and Figure 1, which is shown as a pure block diagram.
Dabei erkennen wir linksseitig schematisiert den Schlüssel (1) mit seinem Logik-Speicherchip (2) und seinem Rechenwerk (3). Der Anwendungsbereich als Schloß wurde rechts mit (6) symbolisiert dargestellt, wobei dessen Logik-Speicherchip (8) zunächst über Zufallsgenerator (9) eine, z. B. hier nicht dargestellte LED, Zufallszahl an das Rechenwerk (3) über den Chip (2) zu übersenden.On the left side we can see the key (1) with its logic memory chip (2) and its arithmetic unit (3). The application area as a lock is symbolized on the right with (6), whereby its logic memory chip (8) first sends a random number (e.g. LED not shown here) to the arithmetic unit (3) via the chip (2) via the random generator (9).
Rechenwerk (3) führt dann die oben beschriebene Rechenoperation durch, die dem Logik-Speicherchip (8) des hier symbolisierten Schlosses übermittelt (12) wird, wobei eine nicht dargestellte Photodiode die Aufnahme übernimmt.The arithmetic unit (3) then carries out the arithmetic operation described above, which is transmitted to the logic memory chip (8) of the lock symbolized here (12), with a photodiode (not shown) taking over the recording.
Chip (8) übermittelt die vom Chip (2) transferierte Zahl ins Rechenwerk (10), das mit der im Schreib-Lesespeicher von Chip (8) abgelegten Zufallszahl die Gegen-Rechenoperation durchführt und den Schlüsselcode errechnet. Dieser wird in der Codeliste (11) von Schlüssel (6) gesucht, wobei bei positivem Suchvorgang Schlüssel (6) die Legitimation zur Betätigung bestätigt.Chip (8) transmits the number transferred from chip (2) to the arithmetic unit (10), which carries out the counter arithmetic operation with the random number stored in the read-write memory of chip (8) and calculates the key code. This is searched for in the code list (11) by key (6), and if the search is positive, key (6) confirms the legitimacy for operation.
Claims (10)
dadurch gekennzeichnet,2. Kit according to claim 1,
characterized,
dadurch gekennzeichnet,3. Kit according to claim 1,2,
characterized,
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE9216798U DE9216798U1 (en) | 1992-12-10 | 1992-12-10 | Kit for checking the legitimacy of electronic access and / or information media |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE9216798U DE9216798U1 (en) | 1992-12-10 | 1992-12-10 | Kit for checking the legitimacy of electronic access and / or information media |
Publications (1)
Publication Number | Publication Date |
---|---|
DE9216798U1 true DE9216798U1 (en) | 1994-04-07 |
Family
ID=6886958
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE9216798U Expired - Lifetime DE9216798U1 (en) | 1992-12-10 | 1992-12-10 | Kit for checking the legitimacy of electronic access and / or information media |
Country Status (1)
Country | Link |
---|---|
DE (1) | DE9216798U1 (en) |
-
1992
- 1992-12-10 DE DE9216798U patent/DE9216798U1/en not_active Expired - Lifetime
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69815272T2 (en) | Access to doors and machines controlled by fingerprint comparison | |
DE69932643T2 (en) | IDENTIFICATION DEVICE WITH SECURED PHOTO, AND METHOD AND METHOD FOR AUTHENTICATING THIS IDENTIFICATION DEVICE | |
DE10047967B4 (en) | Vehicle key system | |
DE69029921T2 (en) | Method of protection against fraudulent use of a microprocessor card and device for carrying it out | |
DE60306277T2 (en) | Electronic vehicle key system | |
DE60101045T2 (en) | SYSTEM FOR DATA BACKUP ON A DATA CARRIER | |
DE2949351C2 (en) | Method and device for generating and checking documents and the document used therewith | |
DE19622720C2 (en) | Authentication facility with key number memory | |
DE3327720A1 (en) | METHOD AND DEVICE FOR OPERATING AN ELECTRONIC SAFETY DEVICE | |
DE29613136U1 (en) | Lock or access authorization system | |
DE2738113A1 (en) | Processing device for banking operations | |
DE3809170A1 (en) | SYSTEM FOR THE ISSUING OF SECURE IC CARDS | |
DE2627981C3 (en) | Identification system using fingerprints | |
EP0663650A2 (en) | Method for allocating a mobile record carrier to a fixed data station | |
DE69133047T2 (en) | METHOD AND DEVICE FOR PERSONAL IDENTIFICATION | |
DE69405811T2 (en) | Device for monitoring and controlling differential access with at least two compartments in an interior | |
DE19648042A1 (en) | Road vehicle with key having memory | |
EP0724343B1 (en) | Method for indicating manipulation in data that is to be transmitted | |
DE4433499A1 (en) | Electronic theft prevention system for vehicle | |
EP0950217B1 (en) | System for protecting a data processing device from unauthorised access | |
EP0846821B1 (en) | Device for checking the user authorization of an access control system | |
DE9216798U1 (en) | Kit for checking the legitimacy of electronic access and / or information media | |
DE4439593C2 (en) | Device and method for access and access control | |
DE19526320A1 (en) | Mechanical and electronic blocking device | |
DE3342651A1 (en) | Method for protecting access to terminals |