WO1999035616A1 - Procede d'auto-controle d'une cle electronique dans un systeme de controle d'acces a une ressource et cle electronique mettant en oeuvre un tel procede - Google Patents
Procede d'auto-controle d'une cle electronique dans un systeme de controle d'acces a une ressource et cle electronique mettant en oeuvre un tel procede Download PDFInfo
- Publication number
- WO1999035616A1 WO1999035616A1 PCT/FR1999/000022 FR9900022W WO9935616A1 WO 1999035616 A1 WO1999035616 A1 WO 1999035616A1 FR 9900022 W FR9900022 W FR 9900022W WO 9935616 A1 WO9935616 A1 WO 9935616A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- electronic key
- verification
- access
- self
- Prior art date
Links
- 238000000034 method Methods 0.000 title abstract description 9
- 238000012544 monitoring process Methods 0.000 title abstract 2
- 238000012795 verification Methods 0.000 claims abstract description 34
- 230000004044 response Effects 0.000 claims abstract description 7
- 238000004422 calculation algorithm Methods 0.000 claims description 17
- 238000004364 calculation method Methods 0.000 claims description 7
- 150000002500 ions Chemical class 0.000 claims 1
- 238000010200 validation analysis Methods 0.000 description 6
- 230000015654 memory Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 230000006835 compression Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000000295 complement effect Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000006837 decompression Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- SYHGEUNFJIGTRX-UHFFFAOYSA-N methylenedioxypyrovalerone Chemical compound C=1C=C2OCOC2=CC=1C(=O)C(CCC)N1CCCC1 SYHGEUNFJIGTRX-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
Definitions
- the present invention aims to remedy the aforementioned drawbacks by providing the electronic key with an internal self-checking and self-invalidation device, based on the real time clock of the key, on certain internal data stored in the key, as well as its cryptographic potential, allowing it to perform a certain number of verifications.
- the present invention proposes a self-checking protocol for an electronic key provided with a real time clock delivering a time variable and an access right, with which is associated a signature value of the range.
- steps (c) a step of self-invalidation of the electronic key on negative response to one of the steps of verification, respectively of comparison.
- steps (a) and (b) can be reversed.
- the aforementioned range of validity may include several separate ranges of validity.
- the validity range is an interval comprising two limits each expressed as a date in day, month, year and a timetable in hours, minutes, seconds.
- the self-invalidation step consists, with respect to data stored in the registers protected access memory, either to assign a set of internal status data to an arbitrary value causing the electronic key to be locked in the out-of-service position, or to trigger the complete erasure of a plurality of these status data , or to cause the short-circuit of the autonomous electrical energy supply.
- the present invention also provides an electronic key comprising, arranged on a portable support, a calculation unit, storage registers, with protected access, of a set of internal state data and a real time clock delivering a time variable, the electronic key being provided with an access right, which is associated with a signature value of the range of validity relating to this access right, the electronic key being remarkable in that it further comprises: - a module verifying the signature value of the range of validity relating to this access right, this verification module comprising at least one specific verification key, as well as a verification algorithm; a module for comparing the membership of the time variable in the validity range, and, commanded by the verification module and the comparison module, a module for self-invalidation of the electronic key on negative response, ie from the module or the comparison module.
- the key is provided with an autonomous electrical energy supply, which maintains a real time clock in the key.
- This real-time clock delivers a time variable, for example in the form of a current hourly value VH, expressed in day, month, year, hours, minutes, seconds.
- VH current hourly value
- PH [VH1, VH2], or more broadly as a meeting of such intervals:
- the positive verification of the signature makes it possible to ensure the authenticity of the range of validity, ie [VH1, VH2] in the particular non-limiting case of a range of validity limited to an interval, said range being obtained, either by restoration of the message during the signature verification step, either by simple reading if it was transmitted in clear with the signature.
- the consistency between the current hourly value transmitted VH and the predetermined time range PH is checked. For example, in the case of a time slot reduced to an interval ⁇ [VHl, VH2], it is verified that VH is later than VHl and earlier than VH2.
- a first value of the variable HS corresponds to a “in service” state, in which the key is validated and can have access to the lock.
- a second value of the variable HS corresponds to an “out of service” state.
- the self-invalidation of the key consists in assigning this second value to the state variable HS and in storing it in the storage registers with protected access. This has the effect of locking the key and preventing its access to the lock.
- the “in service” state can only be restored by a legitimate validation authority, during a key reloading session, using a validation terminal for example.
- the previous self-invalidation operations may be replaced or accompanied by a short circuit in the electrical power supply to the key.
- the supply of electrical energy 1, of the electric cell or battery type for example can be connected to a short-circuiting module 2 which may have any known structure deemed appropriate, such as a switch constituted by a transistor TB and a resistor for limiting current Rd, according to a conventional arrangement, the transistor being controlled by an invalidation command.
- the self-checking protocol which is the subject of the invention, instead of using a signature value of the time range of validity, it is possible to use a variable chosen arbitrarily, apply to this variable a coding or compression algorithm determined from a password and store the variable thus coded or compressed in the electronic key.
- the verification step 1004 consists, in this case, in applying a decoding or decompression algorithm previously stored in the electronic key from the same password and corresponding to operations opposite to those performed by the coding algorithm or compression.
- Such coding / decoding or compression / decompression algorithms are commercially available.
- the verification step whether verifying a signature value or any other variable, can be entirely omitted.
- the step 1001 described above is omitted; in step 1003, only the current hourly value VH is transmitted to the internal self-checking modules of the electronic key; step 1004 is deleted; step 1005 is maintained; in step 1006, the key is self-invalidating only if the comparison of the current hourly value VH with the time range PH indicates that VH is outside of PH.
- the two previous embodiments although having a much lower degree of security, make it possible to reduce the necessary calculation potential of the key, and therefore, to reduce costs.
- a particular embodiment of an electronic key in accordance with the present invention will now be described with the aid of FIG. 3.
- the storage registers 32 are accessible in read and write. They can for example be produced in the form of one or more random access memories of the RAM type.
- the registers 32 are connected to a calculation unit 34, which controls the key self-control protocol, via a validation command CDV sent to a verification module 330, which verifies the electronic signature S (PH) stored in the registers 32.
- the verification module 330 has for this purpose the specific verification key associated with the algorithm which made it possible to calculate the signature S (PH).
- the verification module 330 receives the signature S (PH) of the validity range and, in the case where the signature calculation algorithm used is a public key algorithm, applies the public key K P to the signature S (PH) received.
- the calculation unit 34 is also connected to the circuits for transmitting and receiving messages or data from the electronic key 3.
- the comparison module 331 tests whether VH> VH1 and VH ⁇ VH2.
- the verification module 330 and the comparison module 331 are connected to a self-invalidation module 332 and control the operation thereof. Indeed, in the event of a negative response, either at the end of step 1004, or at the end of step 1005 described above, the self-invalidation module 332 is controlled so as to prohibit the use of the electronic key, by acting, as described above, either on a binary state variable “in use” / “out of service” HS and / or other operating data stored in the registers 32, or on the power supply module 30.
- the self-invalidation module 332 can be included in an electrically reprogrammable memory of the EPROM or EEPROM type 33, in which are stored program modules corresponding to the execution of the operations illustrated by the flowchart of FIG. 1 described previously.
- the present invention finds an application particularly suitable for access, by mail attendants, to mailboxes, which are not energy independent.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP53578299A JP2001517413A (ja) | 1998-01-08 | 1999-01-08 | 資源アクセス管理システムにおける電子キー自動管理方法およびこの方法を実現する電子キー |
EP99900507A EP0965106A1 (fr) | 1998-01-08 | 1999-01-08 | Procede d'auto-controle d'une cle electronique dans un systeme de controle d'acces a une ressource et cle electronique mettant en oeuvre un tel procede |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9800126A FR2773426B1 (fr) | 1998-01-08 | 1998-01-08 | Procede d'auto-controle d'une cle electronique dans un systeme de controle d'acces a une ressource et cle electronique mettant en oeuvre un tel procede |
FR98/00126 | 1998-01-08 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999035616A1 true WO1999035616A1 (fr) | 1999-07-15 |
Family
ID=9521600
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR1999/000022 WO1999035616A1 (fr) | 1998-01-08 | 1999-01-08 | Procede d'auto-controle d'une cle electronique dans un systeme de controle d'acces a une ressource et cle electronique mettant en oeuvre un tel procede |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP0965106A1 (fr) |
JP (1) | JP2001517413A (fr) |
FR (1) | FR2773426B1 (fr) |
WO (1) | WO1999035616A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2003226656B2 (en) * | 2002-03-19 | 2008-01-03 | Metanomics Gmbh & Co. Kgaa | Population of transgenic plants, biological material derived therefrom, corresponding plasmid collection and population of transformed host organisms, use thereof and methods for producing the same |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0475837A1 (fr) * | 1990-09-12 | 1992-03-18 | Gemplus Card International | Procédé de gestion d'un programme d'application chargé dans un support à microcircuit |
WO1993003246A1 (fr) * | 1991-08-05 | 1993-02-18 | Supra Products, Inc. | Systemes de securite electroniques ameliores |
US5243175A (en) * | 1988-04-08 | 1993-09-07 | Minolta Camera Kabushiki Kaisha | Method and apparatus for determining the validity of data in an integrated circuit card |
FR2704081A1 (fr) * | 1993-04-16 | 1994-10-21 | France Telecom | Procédé de mise à jour d'une carte à mémoire et carte à mémoire pour la mise en Óoeuvre de ce procédé. |
EP0621569A1 (fr) * | 1993-04-22 | 1994-10-26 | Bull Cp8 | Dispositif de protection des clés d'une carte à puce |
FR2722596A1 (fr) | 1994-07-13 | 1996-01-19 | France Telecom | Systeme de controle d'acces limites a des places horaires autorisees et renouvables au moyen d'un support de memorisation portable |
-
1998
- 1998-01-08 FR FR9800126A patent/FR2773426B1/fr not_active Expired - Lifetime
-
1999
- 1999-01-08 WO PCT/FR1999/000022 patent/WO1999035616A1/fr not_active Application Discontinuation
- 1999-01-08 EP EP99900507A patent/EP0965106A1/fr not_active Withdrawn
- 1999-01-08 JP JP53578299A patent/JP2001517413A/ja active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5243175A (en) * | 1988-04-08 | 1993-09-07 | Minolta Camera Kabushiki Kaisha | Method and apparatus for determining the validity of data in an integrated circuit card |
EP0475837A1 (fr) * | 1990-09-12 | 1992-03-18 | Gemplus Card International | Procédé de gestion d'un programme d'application chargé dans un support à microcircuit |
WO1993003246A1 (fr) * | 1991-08-05 | 1993-02-18 | Supra Products, Inc. | Systemes de securite electroniques ameliores |
FR2704081A1 (fr) * | 1993-04-16 | 1994-10-21 | France Telecom | Procédé de mise à jour d'une carte à mémoire et carte à mémoire pour la mise en Óoeuvre de ce procédé. |
EP0621569A1 (fr) * | 1993-04-22 | 1994-10-26 | Bull Cp8 | Dispositif de protection des clés d'une carte à puce |
FR2722596A1 (fr) | 1994-07-13 | 1996-01-19 | France Telecom | Systeme de controle d'acces limites a des places horaires autorisees et renouvables au moyen d'un support de memorisation portable |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2003226656B2 (en) * | 2002-03-19 | 2008-01-03 | Metanomics Gmbh & Co. Kgaa | Population of transgenic plants, biological material derived therefrom, corresponding plasmid collection and population of transformed host organisms, use thereof and methods for producing the same |
Also Published As
Publication number | Publication date |
---|---|
FR2773426B1 (fr) | 2000-03-03 |
FR2773426A1 (fr) | 1999-07-09 |
EP0965106A1 (fr) | 1999-12-22 |
JP2001517413A (ja) | 2001-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0719438B1 (fr) | Systeme de controle d'acces limites a des plages horaires autorisees et renouvelables au moyen d'un support de memorisation portable | |
EP1055203B1 (fr) | Protocole de controle d'acces entre une cle et une serrure electronique | |
EP3547270B1 (fr) | Procédé de vérification d'une authentification biométrique | |
EP0941525B1 (fr) | Systeme d'authentification a carte a microcircuit | |
EP2720199B1 (fr) | Procédé sécurisé de commande d'ouverture de dispositifs de serrure à partir de messages mettant en oeuvre un cryptage symétrique | |
FR2597142A1 (fr) | Systeme de serrure electronique cryptographique et procede de fonctionnement | |
EP0055986A2 (fr) | Procédé et dispositif de sécurité pour communication tripartite de données confidentielles | |
WO2007045745A1 (fr) | Procede et dispositif de creation d'une signature de groupe et procede et dispositif de verification d'une signature de groupe associes | |
WO2014057107A1 (fr) | Procédé de signature electronique a signature ephemere | |
CA2407288A1 (fr) | Procede et dispositif de controle d'habilitation d'un appareil electrique connecte a un reseau | |
EP0891611A1 (fr) | Systeme de controle d'acces a une fonction, dans lequel le chiffrement implique plusieurs variables dynamiques | |
EP3965361B1 (fr) | Echange de données entre un client et un dispositif distant, par exemple un module sécurisé | |
EP0960406B1 (fr) | Systeme de transport securise d'objets en conteneur inviolable dont au moins une station destinataire est mobile et transportable | |
WO1999035616A1 (fr) | Procede d'auto-controle d'une cle electronique dans un systeme de controle d'acces a une ressource et cle electronique mettant en oeuvre un tel procede | |
WO2006048524A1 (fr) | Procede de delegation securisee de calcul d'une application bilineaire | |
FR2773405A1 (fr) | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires | |
WO2004084525A2 (fr) | Procede de protection d’un terminal de telecommunication de type telephone mobile | |
EP1149361A1 (fr) | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, les ressources accedante et accedee etant depourvues d'horloge temps reel | |
EP4116855B1 (fr) | Circuit intégré programmable utilisant une source radioactive | |
EP3981185B1 (fr) | Procede et systeme pour acquerir, sauvegarder et utiliser des donnees de preuve | |
FR2786903A1 (fr) | Procede et systeme de controle d'acces a une ressource limite a certaines plages horaires, a partir d'un compteur dynamique | |
EP1802026A2 (fr) | Procédé de déblocage d'une ressource par un dispositif sans contact | |
WO2013140078A1 (fr) | Procede de generation et de verification d'identite portant l'unicite d'un couple porteur-objet | |
FR3137769A1 (fr) | Procédé de sauvegarde de données personnelles sensibles sur une chaîne de blocs | |
WO2012152581A1 (fr) | Systeme d'identification d'un individu |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): JP US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 1999 535782 Kind code of ref document: A Format of ref document f/p: F |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1999900507 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1999900507 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09403683 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1999900507 Country of ref document: EP |