Registers – Systems controlled by data bearing records – Credit or identification card systems
Reexamination Certificate
2008-10-21
2011-12-06
Hess, Daniel (Department: 2876)
Registers
Systems controlled by data bearing records
Credit or identification card systems
C235S375000, C235S380000
Reexamination Certificate
active
08070061
ABSTRACT:
In one implementation, a method for providing access to a secure facility includes authenticating the user; generating a card credential, transmitting the card credential to an access card carried by of the user, and transmitting the card key to the access card in a form that is usable by the access card. The generating the card credential includes encrypting the card key using a server encryption key. The card key is usable for a challenge-response interaction during subsequent access requests by the user.
REFERENCES:
patent: 5120939 (1992-06-01), Claus et al.
patent: 5420924 (1995-05-01), Berson et al.
patent: 5434919 (1995-07-01), Chaum
patent: 6434238 (2002-08-01), Chaum et al.
patent: 6718314 (2004-04-01), Chaum et al.
patent: 2002/0008145 (2002-01-01), Walsh et al.
patent: 2002/0062438 (2002-05-01), Asay et al.
patent: 2005/0033703 (2005-02-01), Holdsworth
patent: 2008/0148393 (2008-06-01), Wendt
R. L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,”Communications of the ACM, vol. 21, No. 2 (downloaded from http://people.csail.mit.edu/rivest/publications.html), pp. 120-126, Feb. 1978.
Steven M. Bellovin, “A Introduction to Modern Cryptography,” presentation (downloaded from http://www.research.att.com/˜smb), pp. 1-31, Mar. 1, 2003.
Gerhard P. Hancke, “A Practical Relay Attack on ISO 14443 Proximity Cards,” manuscript (downloaded from http://www.cl.cam.ac.uk/˜gh275/), pp. 1-13, Feb. 2005.
Ziroli Plutschow, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” presentation (downloaded from http://www.crypto.ethz.ch/teaching/lectures/ISS05/), 75 pages, Dec. 12, 2005.
Joint Interpretation Library, “Application of Attack Potential to Smartcards,” Version 2.1, pp. 1-34, Apr. 2006.
Eurosmart, “RFID technology security concerns: Understanding Secure Contactless device versus RFID tag,” manuscript (downloaded Aug. 27, 2008 from http://www.eurosmart.com/Update/07-10/Eurosmart—White—paper—on—RFID—Oct07.pdf), pp. 1-9, 2007.
TechEncyclopedia, “Challenge/Response,” web page downloaded Jul. 11, 2008 from http://www.techweb.com/encyclopedia/shared/ArticlePageSrc.jhtml?term=challenge/response, pp. 1-2.
Wikipedia, “CRAM-MD5,”web page downloaded Jul. 11, 2008 from http://en.wikipedia.org/wiki/CRAM-MD5, pp. 1-2.
Wikipedia, “SHA hash functions,” web page downloaded Jul. 11, 2008 from http://en.wikipedia.org/wiki/SHA—hash—functions, pp. 1-8.
Neuman, Clifford B., et al., “A Note on the Use of Timestamps as Nonces,”Operating Systems Review, vol. 27, No. 2, pp. 10-14, Apr. 27, 1993.
Menezes, A., et al., “Chapter 12: Key Establishment Protocols,”Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, pp. 489-541, 1997.
Clark, John, et al., “A Survey of Authentication Protocol Literature: Version 1.0,” pp. 1-109, Nov. 17, 1997.
Rankl, W., et al., “Handbuch der Chipkarten, 4.Auflage, Kap. 10.3, 10.4 Lebenszyklus einer Chipkarte,” Handbuch Der Chipkarten, pp. 638-656, Aug. 29, 2002.
Fan, Chun-I, et al., “Robust remote authentication scheme with smart cards,”Computers&Security, vol. 24, pp. 619-628, 2005.
International Search Report for International Patent Application No. PCT/US2009/061567. 5 pages, Apr. 9, 2010.
Campbell Stephenson LLP
Chedekel Tabitha
Hess Daniel
LandOfFree
Card credential method and system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Card credential method and system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Card credential method and system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4316041