CN1536771A - Access control method by using key cell - Google Patents

Access control method by using key cell Download PDF

Info

Publication number
CN1536771A
CN1536771A CNA03146243XA CN03146243A CN1536771A CN 1536771 A CN1536771 A CN 1536771A CN A03146243X A CNA03146243X A CN A03146243XA CN 03146243 A CN03146243 A CN 03146243A CN 1536771 A CN1536771 A CN 1536771A
Authority
CN
China
Prior art keywords
unknowable
access control
battery
control system
communication device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA03146243XA
Other languages
Chinese (zh)
Inventor
埃利斯・亚瑟・品德
埃利斯·亚瑟·品德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Motorola Solutions Inc
Original Assignee
Motorola Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/409,797 external-priority patent/US7149554B2/en
Application filed by Motorola Inc filed Critical Motorola Inc
Publication of CN1536771A publication Critical patent/CN1536771A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

An access control system (100) for enabling functionality to a portable communications device includes a battery (120) for providing access to user-agnostic, system-agnostic and radio transceiver-agnostic control data to the portable communications device such as a portable two-way radio transceiver (110). A data connection (150) connected between the battery (120) and the portable two-way radio transceiver (110) provides control data to radio (110) and enables access to a predetermined set of device functions.

Description

Utilize the access control method of cell with enciphered key
Technical field
The present invention relates generally to the bidirectional portable communication equipment and relate more specifically to utilize cell with enciphered key to control visit the local device function in user's unknowable (agnostic) mode.
Background technology
Bidirectional portable communication equipment for example two-way radios etc. has many application aspect commercial affairs and the amusement.The certain feature or the inaccurate general user of ability that usually wish limiting device use.In one case, certain feature or ability are used with the user who is applicable to the process specialized training only.In other cases, certain feature legally or in the management only to authorize one group of specific user to use.In this case, the general user can not carry out any visit or use to the special characteristic of this equipment.
Do not wish to control visit to per unit special feature by differently disposing each equipment.A kind of implementation is with some equipment of utilization " substantially " firmware programs and utilizes " expansion " firmware programs enhanced apparatus.This method provides maximum fail safe but has not had flexibility.Each equipment has a kind of fixing configuration and is unmodifiable at the scene.If changeable, then in fact it will be a kind of upgrading and need personal computer (PC), software and custom cable probably.Be readily appreciated that this process is time-consuming and trouble.May need reverse process equipment is returned to " substantially " level of function.Whether another solution is to be programmed configurations information in available each equipment selecting expanded function.In this method, in all equipment, use and expand the level firmware, but can stop its use selectively according to the pre-programmed configuration data.This kind method not too security reason is that unwarranted people may change this configuration data.Activate or disable function is still time-consuming and trouble, because PC, software and custom cable all are required this configuration data of reprogramming.
Another improved method is to use all devices and restriction with " expansion " firmware to visit special characteristic (i.e. those features except that " substantially " firmware features group) to using as the access control mechanisms (mechanism) of this equipment part in addition.This can license PC software with the form of computer software protector.Therefore, on all equipment, exist the software of the operation that general features is provided and this software to use for all users.On all equipment, exist software and this software of the operation that limited features is provided only can use for authorized users.If this access control mechanisms is simple, light with unobtrusive, then any equipment can change rapidly and expediently between basic equipment and expansion equipment, allows thus or forbids specific function, feature or ability.
Easily allow at the scene or forbid that this requirement of specific function is very important.This requirement be exemplified as a two-way radios with front panel programmable (FPP) ability.This radio device can directly use the keyboard of radio device oneself and display to programme.Because commercial two-way radios can be launched on a lot of frequencies, comprising police and the used frequency of public security organs, therefore wish restriction to the visit of front panel programmable feature so that the influence of malicious user is reduced to minimum.
A kind of generic access control method that is used for the limiting access radio function is to use password.Correctly input password and can visit the feature of one or more restrictions.Though cryptographic technique is easy to implement and use, it is defectiveness aspect fail safe.If a unauthorized user is known this password, then before the use new password was with the radio device reprogramming, he can use this password to realize undelegated visit.Because the consideration of actual conditions, common one group or one " team " radio device have identical access code, and therefore a password that is exposed can be used for tackling any radio device.In this case, the security disadvantages of cryptographic acess method is a serious problem.A kind of alternative method relates to the use of hardware keys, and this hardware keys invests on the radio device.When radio device detected an effective hardware keys, radio device promptly allowed the visit to limited features.This technology can physically be obtained hardware keys for being an improvement only because need for cryptography scheme.In the FPP radio device was used, Federal Communications Committee (FCC) required radio device manufacturer to utilize hardware keys mechanism to control visit to the FPP feature.The proposition of the hardware keys scheme of share with cryptography scheme has more increased fail safe.
Yet, with a general hardware keys add to portable communication device for example the scheme of two-way radios have many shortcomings: it comprises: the profile factor that 1) has changed equipment with and/or increased the volume of equipment, not very comfortable when making the user use this equipment; 2) necessary design and processing hardware keys, and this is expensive, the variation of industrial design or electrical interface may cause reusing hardware keys in the continuous simultaneously production product; And 3) this key requires to increase a line on radio device, perhaps this key take an existing line so that when this key use this line can't be used for other purposes.For example, if hardware keys takies this line, then possibly can't use the radio device annex.
Therefore, be starved of the visit of a kind of access control mechanisms control to the limitation function of portable communication device.The best method of obtaining visit is to utilize a hardware keys, and is not expensive when its design and manufacturing, do not change the profile factor of equipment, and do not hinder annex or other abilities used.
Description of drawings
Fig. 1 is the block diagram that the communication equipment of being made up of radio set and radio device battery pack is described according to a preferred embodiment of the invention.
Fig. 2 is the block diagram that shows selected according to a preferred embodiment of the invention radio set parts and comprise the radio device battery of a memory unit.
Fig. 3 shows the flow chart that allows one group of functions of the equipments of being locked is carried out the method for function visit according to the preferred method of the present invention in portable communication device.
Embodiment
Be considered to new feature of the present invention though claim has defined, can believe, below considering in conjunction with the accompanying drawings, after the explanation, can understand the present invention better, use reference number roughly the same in the accompanying drawing.
Now portable communication device often utilizes the battery pack that comprises once one or more or secondary cell, memory device and for example be used to detect the transducer of battery temperature.Memory device is a nonvolatile devices normally, for example PROM or serial EEPROM.For making the wiring quantity that is connected to battery minimum, use serial device usually.Memory device comprises the parameter about battery, for example chemical composition, charging rate etc. usually.These information are programmed when making battery usually, and use battery charger suitably with safely with battery charge.These information also can comprise the threshold value of being used by radio device, so that a multistage battery gauge (gauge) or " remaining power life " indicating device are provided.
Referring now to Fig. 1, portable communication device or radio device (radio) comprise radio set 110, and the latter is by 120 power supplies of radio device battery, and battery 120 places in the shell that is attached to radio device physically usually.Between transceiver 110 and battery 120, have several lines, comprise ground wire 140 and battery supply line 130.In addition, data bus connection 150 provides stored reading capability in the visit radio device battery 120 to radio device.Data bus connection 150 is enough for " line " serial memory device, but the person skilled in the art knows that many lines of some serial device requirement are in order to uses such as clock signal, control signals.
Set forth the block diagram of a typical portable radio device among Fig. 2.Fig. 2 has illustrated a transceiver 290, and it comprises a receiver 260 and transmitter 240, and the two all is connected to antenna 280 by duplexer 270.Receiver 260 and transmitter 240 boths are connected to controller 250, and controller 250 is microprocessor or the similar devices of being responsible for operation transceiver 290.Controller 250 uses memory 230 to operate, and can use data/address bus 220 references to storage 230.
Portable radio transceivers 290 is by radio device battery 200 power supply, and the latter comprises also the memory device that can be visited by controller 250 on data/address bus 220.Will be appreciated that controller 250 can use the serial of data/address bus 220 and parallel example to hold dissimilar memory device 210,230.
In a preferred embodiment, the memory device 210 in the radio device battery 200 is read-only.In other embodiments, memory device 210 can read/write, thereby allows communication equipment or battery charger to upgrade information in the radio device battery storage device 210.As previously mentioned, memory device 210 comprises the information about battery-operated characteristic usually, comprising charge information.Also manufacturing information can be arranged, for example pattern number, series number and build date.According to the present invention, battery storage device 210 also comprises one or more groups access control data or mandate " key ".
As skilled person understands that each battery key is corresponding to some functions concrete, restriction that is provided by the local software of carrying out on the radio device.This key is relevant with any radio device that its software is discerned that key, and irrelevant with specific radio device.In the preferred embodiment, specific radio models will have a kind of single software construction and key will be effective to all radio devices.Can support a plurality of keys to activate the various combination of limitation function.In other embodiments, very big one group of radio device can be ordered and this client can be assigned with its key by the big customer.Even in this embodiment, key and specific radio device are irrelevant.On this key all radio devices in this very big group radio device is effective.Many keys are also irrelevant with specific user.Information in the battery key does not comprise Any user information or user ID (ID).Any individual who physically obtains cell with enciphered key can be to activate expanded function on effective any radio device at the key in determining battery.Should know that some radio devices can comprise is used for the user ID (ID) of radio to radio signaling, but these ID and access control mechanisms and key self is irrelevant.
For example, as have the company of general 500 radio devices or an entity of government organs can have more than 30 cell with enciphered key.This entity may wish to make its cell with enciphered key to be installed in all the time on administrative staff's the radio device (supervisor radio), thereby gives administrative staff's radio device additional ability.Maybe need service if administrative staff's radio device is damaged, then cell with enciphered key can be moved on on any normal radio device, new radio device provides additional function immediately.This cell with enciphered key needn't rely on any specific radio device or any specific administrative staff's radio device.Therefore, access control mechanisms is that cell with enciphered key can be considered to " user is unknowable " and " radio device is unknowable ".
In order to further specify this point, this entity can select not make cell with enciphered key to use on radio device always.This cell with enciphered key is still had by administrative staff or can be used by them.If the particular extension function by the access control mechanisms protection allows the user to change passage programming and other settings, then administrative staff can use this cell with enciphered key to come to change any radio device in the scene as required.Administrative staff install this cell with enciphered key, realize the visit to expanded function, utilize this expanded function, remove this cell with enciphered key then.This radio device no longer has enhancement function, but the setting of radio device is changed by administrative staff.For any cell with enciphered key that any administrative staff had can be carried out this operation on any radio device of this mechanism.Therefore, access control mechanisms is indicated as " user is unknowable " and " radio device is unknowable " again.This example one group of front panel programmable (FPP) radio device use and manage in be a typical example.
Nowadays many communication equipments need utilize some operational infrastructure for example cellular phone network or special-purpose, trunk line two-way radio system.The for example traditional two-way radios of some communication equipments does not need this infrastructure and its to operate independently, and other equipment are supported multi-modal communications, and some of them may need infrastructure and wherein some do not need.Those skilled in the art will be appreciated that can be designed to " using radio " with these communication equipments of the infrastructure-based communication of complexity realizes an access control mechanisms.Though this method has advantage really, also have limitation, can not guarantee the covering of infrastructure, and the availability of infrastructure operation can not be guaranteed.The present invention has many application, and no matter how the position of radio device or cover must guarantee to be used for the visit to limitation function.For example, the many users (for example forester and outlying district fire fighter) with radio device of FPP function are usually in the suburb that does not have infrastructure or the outlying district operation.Except already mentioned limitation, this ability has exceeded this scope and purpose of the present invention.Those skilled in the art will be appreciated that the subscriber identity data of the preferred embodiment without any need for communication system infrastructure or any kind of.But the existence of this infrastructure does not hinder or limits operation of the present invention.Those skilled in the art should know that also the access control mechanisms among the present invention is local to radio device.
Therefore, the battery that has a specific key can drive the general operation of any radio device and can allow at needs or receive function restrict access, that this locality provides on any radio device of that specific key.Therefore access control mechanisms of the present invention is that the user is unknowable, communication system is unknowable and radio set is unknowable.Do not consider Fig. 2, be stored in each software key in the battery storage device 210 corresponding to the local feature or function of a restriction of communication equipment.Controller 250 can detect the existence of one or more software key.Then, verify the key (alternatively, these keys can pass through and encrypt) that detects.The existence of given key allows visit or uses one group of predetermined functions of the equipments, and not this key with denied access.
Fig. 3 is the flow chart according to the detection and the processing of battery key of the present invention.When communication equipment is switched on 300, equipment is finished usually and the equipment of microprocessor control the switch on initialization and the self check task of associated.After finishing these tasks.Radio device is attempted reading of data 310 from appended battery.If any battery data, then wherein may comprise one or more keys.The lacking of battery data may mean has used the battery that a no cell with enciphered key, third party make or the battery of a malfunction.Radio device is analyzed the data 320 that receive from battery then, so that judge whether to exist any key.As there not being any battery data, if perhaps do not detect battery key 330 in battery data, then the normal running 380 of starting device and disagreeing with conducts interviews to any limited features.
If read battery data and detect at least one key 330, then radio device is verified first detected key 340.Checking relates to decoding and possible deciphering.If key is effective 350, then is provided with one and allows mark corresponding to the effective feature of key.Each limited features or one group of limited features by cipher controlled all have a feature to allow mark, for use in the function of associated in the visit radio device.After a feature significant notation is set 360, if perhaps first detected key is invalid 350, then radio device judges whether that more keys need verify 370 in addition.If also have more keys, then be each additionally detected key repeated authentication process 340,350, and the feature that is provided with corresponding to each effective key allow mark 360.In case intact all the detected keys of empirical tests promptly begin normal running 380.If the feature corresponding to any limited features allows mark to be provided with, then this limited features is promptly addressable.
Therefore, the present invention has defined a kind of access control system that is used to allow to visit the portable communication device local function.The present invention comprises a battery, connects by the data between a battery and the equipment, is used for providing to portable communication device that the user is unknowable, system is unknowable and the unknowable access control data of radio set.
Though have illustrated and described the preferred embodiments of the present invention, will be appreciated that these be not be used to limit of the present invention.The person skilled in the art can make many modifications, change, change, substitute and corresponding operating under the situation that does not deviate from the spirit and scope of the invention that defined by appended claims.

Claims (17)

1. access control system that is used to allow to visit the portable communication device function comprises:
At least one is used for providing to portable communication device, and the user is unknowable, system is unknowable and the battery of the unknowable access control data of radio set; And
At least one is connected with data between the portable communication device at least one battery, and being used for provides that the user is unknowable, system is unknowable and unknowable access control data of radio set and allow the predetermined local function group of visit to portable communication device.
2. as the access control system in the claim 1, wherein portable communication device is a two-way radios.
3. as the access control system in the claim 1, wherein this battery comprises a shell that is used for physically being attached to portable communication device.
4. as the access control system in the claim 1, wherein the user is unknowable, system is unknowable and the unknowable access control data of radio set are software key.
5. as the access control system in the claim 4, wherein this software key is encrypted.
6. as the access control system in the claim 1, wherein predetermined local function group comprises the front panel programming (FPP) of using an appended keyboard.
7. access control system that is used to allow visit front panel programming (FPP) feature of portable communication device comprises:
At least one is used for providing to portable communication device, and the user is unknowable, system is unknowable and the battery of the unknowable access control data of radio set; And
At least one is connected with data between the portable communication device at least one battery, and being used for provides that the user is unknowable, system is unknowable and unknowable access control data of radio set and allow visit to the FPP feature to portable communication device.
8. as the access control system in the claim 7, wherein portable communication device is a two-way radios.
9. as the access control system in the claim 7, wherein this battery comprises a shell that is used for physically being attached to portable communication device.
10. as the access control system in the claim 7, wherein the user is unknowable, system is unknowable and the unknowable access control data of radio set are software key.
11. as the access control system in the claim 10, wherein this software key is encrypted.
12. as the access control system in the claim 7, wherein by an appended keyboard inquiry FPP feature.
13. a method that is used for allowing to visit at the portable two-way radios electric installation front panel programmable (FPP) feature functionality comprises following steps:
At least one battery is installed to the portable two-way radios electric installation;
Use at least one data to connect, unknowable the user who stores in the battery, system is unknowable and the unknowable access control transfer of data of radio set to the portable two-way radios electric installation; And
If the user is unknowable, system is unknowable and the unknowable access control data of radio set are verified, then assess this access control data characteristics.
14. as the access control system in the claim 13, wherein this battery comprises a shell that is used for physically being attached to portable communication device.
15. as the access control system in the claim 13, wherein the user is unknowable, system is unknowable and the unknowable access control data of radio set are software key.
16. as the access control system in the claim 15, wherein this software key is encrypted.
17., wherein use an appended keyboard inquiry FPP feature as the access control system in the claim 13.
CNA03146243XA 2003-04-09 2003-07-04 Access control method by using key cell Pending CN1536771A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/409,797 US7149554B2 (en) 1999-09-20 2003-04-09 Access control method utilizing a key battery
US10/409,797 2003-04-09

Publications (1)

Publication Number Publication Date
CN1536771A true CN1536771A (en) 2004-10-13

Family

ID=34375141

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA03146243XA Pending CN1536771A (en) 2003-04-09 2003-07-04 Access control method by using key cell

Country Status (1)

Country Link
CN (1) CN1536771A (en)

Similar Documents

Publication Publication Date Title
US11830306B2 (en) Systems and methods for controlling access to physical space
JP4726950B2 (en) Mobile phone and access control method
US7616091B2 (en) Actuating a security system using a wireless device
CN101483872B (en) Defining a boundary for wireless network using physical access control systems
CN103370717A (en) Always-available embedded theft reaction subsystem
CN101393587A (en) Mobile equipment with security protection function and security protection method thereof
CN100343881C (en) Access control system
CN105006045A (en) NFC cell phone dynamic password entrance guard system and control method thereof
CN105184184A (en) Anti-theft method for terminal data
US7149554B2 (en) Access control method utilizing a key battery
JP5269408B2 (en) Anti-theft device
CN1536771A (en) Access control method by using key cell
KR100944246B1 (en) Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module
JP2005301454A (en) User identification system and charger/radio ic chip reader
KR20110128424A (en) Portable memory device with function of protection and protection system using the portable memory device
JP5293931B2 (en) Security management system and method for information processing terminal using RFID
KR101800716B1 (en) System for managing input and output of laptop and response method for loss laptop using the same
JP2010146475A (en) System and method for preventing information leakage of mobile terminal, and program
JP2006229437A (en) Emergency reporting system
CN1289185A (en) Acess controlling method using cell with enciphered key
JP6759119B2 (en) Information terminal, its management system, its management method and its management program
TWI534761B (en) Access control safety system
JP2013162408A (en) Portable terminal communication device, terminal communication method, terminal communication system, and program
KR20050034169A (en) System and method be equipped with crime prevention/security service using handheld terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication