MXPA97003885A - Securi access system - Google Patents

Securi access system

Info

Publication number
MXPA97003885A
MXPA97003885A MXPA/A/1997/003885A MX9703885A MXPA97003885A MX PA97003885 A MXPA97003885 A MX PA97003885A MX 9703885 A MX9703885 A MX 9703885A MX PA97003885 A MXPA97003885 A MX PA97003885A
Authority
MX
Mexico
Prior art keywords
entry
pin
access
access system
enter
Prior art date
Application number
MXPA/A/1997/003885A
Other languages
Spanish (es)
Other versions
MX9703885A (en
Inventor
Raymond Miller Ii Robert
Original Assignee
At&T Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US08/657,448 external-priority patent/US6075861A/en
Application filed by At&T Corp filed Critical At&T Corp
Publication of MX9703885A publication Critical patent/MX9703885A/en
Publication of MXPA97003885A publication Critical patent/MXPA97003885A/en

Links

Abstract

The present invention relates to an entry access system that includes a lock mechanism that allows authorized entry into a secure entry point to a closed access area or computing device. The entry is approved in response to an interaction between the person wishing to enter and the entry access system involving an exchange of multiple digit numbers and the use of IDs and PINs to generate a multi-digit verification number , to establish the authenticity of the application to enter

Description

fitgrraiR PK ^ rrR E SBC30RT2DAD This invention relates to secure access entry systems and in particular to a system based on the use of telephones and telephone systems that includes: cellular systems, wireless PCS, public switched telephony and wireless telephone systems, all, in combination with the use of a smart card (smart card) for storage of access information.
ANTBCgDBMrBS OF THE INVBMCTÓW A secured access entry is effective to prevent unauthorized entry only to the extent that the intruder is unable to reconstruct any authorized access entry item such as a password, a combination, a password or access word, etc. If the means of entry is relatively simple to improve the functioning of a person entering authorized frequently as determined by a person entering unauthorized for unauthorized entry. On the other hand, a sophisticated and inadvertently complicated entry means can prevent even an authorized entry. It is necessary to design REF: 23992 an entry authorization system which is friendly (easy to use) by the persons authorized to enter and who is still able to eliminate unauthorized entry attempts. In another aspect, the input means may operate by transmitting keywords over an insecure transmission facility. The protection provided may be compromised by the interception of this information by an unauthorized recipient.
SHORT DESCRIPTION An entry access system includes a lock mechanism that allows authorized entry at the secured entry point to a closed access area or a computing device. The entry is approved in response to an interaction between the person wishing to enter and the entry access system involving an ID exchange (identification) and PIN (personal identification number) and the generation of a multi-digit or multidigit number is encrypted to establish a relationship between valid combinations of ID and PIN. The transmission of the ID and related numbers is internally encrypted at both ends so that the number intercept is useless for an unauthorized receiver who performs an intercept.
In a particular embodiment, a person wishing to enter / user who has access to the system ID in a personal communicator will enter or allow the entry of a PIN number in the device. In a preferred embodiment, a smart card is inserted into the personal communicator and provides the ID number which the user accesses when entering the PIN, which is compared to a PIN stored on the card. The communicator is connected by telephone link to the entry access system by dialing the user's co-speaker or automatically in response to the smart card. The entry access system correlates the received ID with a PIN stored in its database. An arbitrary number of multiple digits is generated and transmitted to the communicator. In the communicator, in the number of multiple digits a new number is received and generated, using encryption algorithm techniques with the PIN as a key. The new number is retransmitted back to the entry access system where a verification number is generated using the new number, and using the PIN as a key. The verification number is compared with the original generated arbitrary number. If they match, access is granted to whoever requests the entry. The numbers generated can be transmitted openly between stations without compromising the security of the system since the encryption process is limited to internal processes at each end. The obtaining of the numbers transmitted through interception by an unauthorized receiver is not of value to have access to the secure area.
BRIEF DESCRIPTION OF DT2BD.TO Figure 1 is a schematic of an access system secured in accordance with the principles of the invention; Figure 2 is a protocol arrangement included in the entry access system to allow access in accordance with the principles of the invention; and Figure 3 is a flow chart illustrating a process in which the entry access system operates.
DESCRIPTION A secured system, shown in Figure 1, has an area, a computer or data storage 101 which is secured from the entrance by the entrance access system 103 which controls a lock mechanism 105 which needs to be released before a user can access the inside of the secure system (that is, the area). The entry access system includes a telephone station assembly 109 connected to the public switched telephone network (PSTN) 107. The PSTN 107 is connected to a wireless base station 111. The user who wishes to enter the secure system 101 in the illustrative mode has a communicator 121 mobile in wireless communication with the wireless base station 111. The communicator 121 preferably has a touch tone decoder 123 for receiving and transmitting numbers as double DTMF frequencies. The invention is not limited to wireless communication but can be communicated, alternatively, through a set of wired station, external to the secure area. The communicator is positioned to accept a smart card 125 which includes storage of data relevant to the cardholder. The smart card may include information such as an ID number, a PIN (ie, also stored in the entry access system) or other information relevant to the user. In the alternative, to a smart card, part of this information can be entered by the user through a keyboard in the communicator. In Figure 2 a more detailed description of the entry access system is shown. The entry access system includes a stored data base 201 of ID numbers of the persons authorized to enter the insurance system. This is connected to a common link 202. A base 203 of PIN numbers data of authorized persons and of input / output unit 205 to connect to a telephone subscriber set of a system is also connected to the common link. of entry access. An encryption device 207 is operative to examine the input PINs and ID numbers, and to generate an arbitrary number of multiple digits. This number is converted to multiple tones DT F by the generator 209 in the illustrative mode for transmission, by means of the input / output unit 205 and the telephone network to the user's communication unit. The number of multiple digits returns to the entry access system from the communicator and is applied to the encryption device 207 which compares it with the original transmitted number. If the two coincide, a signal is transmitted through the input / output unit to allow access to the user. An illustrative process by which the entry into the system is approved is shown schematically in the process flow diagram of Figure 3. Starting at the start, the terminal 301, the flow proceeds to execute the instructions of block 303 which they reflect the action of the user to insert the user's smart card, which contains relevant user information such as the user's PIN, in the personal communicator or communication device, which may be a cell phone or a PCS communicator. A subsequent instruction, illustrated in block 305, causes the user to establish a call at the entry point telephone of the receiver contained in the entry point access system. This receiver responds, based on the instructions of block 307, to indicate the readability and receive a transmitted ID number from the user, as indicated. If the system is not ready at this time, the flow returns to the input of block 307 until the ID number can be received. Readability indications can be an audio return or by display on the communicator screen. Upon readability to receive the status that is indicated, the user ID is transmitted to the entry point receiver, as indicated by the instructions in block 309. Upon receipt of the user ID, the entry point system recovers the Related PIN of its own database, as indicated by the instructions indicated in block 311. The entry point encryption device uses the ID number to formulate a number of multiple digits and transmit this number to the communicator of the user, as indicated by the instructions in block 313. The user's communicator includes encryption circuits which generate another number from the received number and the user's PIN, indicated by the instructions in block 315. The user's PIN can be entered directly by the user or recovered from a smart card inserted. The other number is returned to the entry point, as indicated in block 317; and in the entry point system, the originally generated number is triggered by the encryption device in combination with the stored PIN at the entry point to re-generate a verification number as set in block 319. If the number Once the generated verification number is identical to the number transmitted for the communicator, the entry is unlocked or opened as indicated in decision block 321. If the numbers do not match, the process ends, leaving the entry closed. Although a particular process and apparatus have been described in an illustrative manner, other variations may be implemented without departing from the spirit and scope of the invention. In an alternative mode, the entry point number can be released only by application of the PIN that 'releases the number, stored in the smart card. Although the communicator shown is wireless, the process can be implemented using a wired communication connection.
Another variation may include an expired period of time in which to enter valid information, after which the system is inactivated or the process is completed. It is noted that in relation to this date, the best method known by the applicant to carry out the aforementioned invention, is the conventional one for the manufacture of the objects to which it relates. Having described the invention as above, property is claimed as contained in the following:

Claims (7)

RBIVINDICA IQMES
1. A method for providing access to a secure system through an entry access system, in which access is granted in response to a protocol process, comprising the steps of: providing a user with an ID (identification) of system and a PIN (personal identification number); store the system ID in a communication device and allow the user to access the use of the ID when entering the PIN; establish a telephone communication link between the communications device of the entry access system; enter the PIN in the communication device to transmit the transmission of the ID to the entry access system; in the entry access system, correlate the received ID with the stored PIN, assigned to the user; the method is characterized in that: a number of multiple digits is transmitted from the entry access system to the communications device derived from the stored PIN; - ?? - the number of multiple digits is received in the communication device and transformed, by encryption techniques, to obtain a new number by using the PIN as a key; the new transformed number is returned to the entry access system; the received number is transformed into the entry of the entry access system using the PIN as a key and using the same encryption techniques to obtain a verification number; the lock is deactivated and the verification number is identical to the new number.
2. An entry access system for controlling access to a secure system, comprising: elements for communication over a telephone network; a database of ID and PIN numbers; means for generating an arbitrary number of multiple digits in response to an ID communicated by a person wishing to enter, to the secure system; means for converting the number of multiple digits into multiple DTMF tones; telephone communication means connected to transmit the multiple tones in a telephony network for transmission to the person who wishes to enter; the system is characterized in that it has: means for receiving a number generated by encryption methods of a communicator of the person wishing to enter from an ID and PIN of the person wishing to enter, through the telephone network; means for generating a verification number using the stored PIN as a key, and comparing it with the number of multiple digits; a fixation mechanism to allow / prevent entry to a secure operating system for identity of the number of multiple digits and the generated verification number.
3. A method for providing access to a secure system through an entry access system, in accordance with claim 1, characterized by additionally includes: the step of storing the system ID and the PIN includes inserting a smart card ( smart card) in the communication device.
4. A method for providing access to a secure system through an entry access system, in accordance with claim 1, characterized in that it additionally includes: the step of entering the PIN that includes the step of releasing the PIN from the card Smart inserted in the communication device.
5. A method for providing access to a secure system through an entry access system, in accordance with claim 1 ,. characterized in that it additionally includes: the step of limiting the response in deactivating the lock to operations performed within a specified time limit.
6. The entry access system for controlling access to a secure system, according to claim 2, characterized in that it additionally comprises: a telephone communication element that includes a connection through a network to a wireless station to communicate with a wireless communicator of the person I wanted to enter.
7. The access access system for controlling access to a secure system, according to claim 6, characterized in that it additionally comprises: a wireless communicator that receives the ID and PIN of a smart card inserted in the wireless communicator. RESUME »OF THE TNVEMCTÓM An entry access system is described that includes a lock mechanism that allows authorized entry into a secure entry point to a closed access area or computing device. The entry is approved in response to an interaction between the person wishing to enter and the entry access system involving an exchange of multiple digit numbers and the use of IDs and PINs to generate a multi-digit verification number , to establish the authenticity of the application to enter.
MXPA/A/1997/003885A 1996-05-29 1997-05-27 Securi access system MXPA97003885A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US08657448 1996-05-29
US08/657,448 US6075861A (en) 1996-05-29 1996-05-29 Security access system

Publications (2)

Publication Number Publication Date
MX9703885A MX9703885A (en) 1997-11-29
MXPA97003885A true MXPA97003885A (en) 1998-07-03

Family

ID=

Similar Documents

Publication Publication Date Title
CA2197367C (en) Security access system
US5343529A (en) Transaction authentication using a centrally generated transaction identifier
US6078908A (en) Method for authorizing in data transmission systems
US4310720A (en) Computer accessing system
KR100952551B1 (en) Method and apparatus for simplified audio authentication
US4601011A (en) User authorization verification apparatus for computer systems including a central device and a plurality of pocket sized remote units
CA2183629C (en) Method and apparatus for utilizing a token for resource access
US5406619A (en) Universal authentication device for use over telephone lines
US5120939A (en) Databaseless security system
JP3312335B2 (en) User authentication method, user authentication system and recording medium
US5787154A (en) Universal authentication device for use over telephone lines
CN1323538C (en) A dynamic identity certification method and system
EP2320388A1 (en) Security system
US20180359635A1 (en) Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices
EP1149343A2 (en) Programmable telecommunications security module for key encryption adaptable for tokenless use
CN104574616B (en) Intelligent electronic door lock control method and control device
US6393567B1 (en) Method of enabling a server to authorize access to a service from portable devices having electronic microcircuits, e.g. devices of the smart card type
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN100449990C (en) User centrificating apparatus and method for fixed network terminal
MXPA97003885A (en) Securi access system
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US6983485B1 (en) Method and apparatus for authentication for a multiplicity of services
WO2001092999A2 (en) Secure exchange of an authentication token
KR101051552B1 (en) Door lock device and method using mobile communication terminal
CN115085911A (en) Security enhancement method and system based on entrance guard