Browse Prior Art Database

System for Enabling Any Wirelessly Enabled Mobile Device to Act As a Physical Security Key

IP.com Disclosure Number: IPCOM000131852D
Publication Date: 2005-Nov-21
Document File: 2 page(s) / 10K

Publishing Venue

The IP.com Prior Art Database

Abstract

The ability to open a door without a physical key is not new. Garage door openers and security passes have been using RF technology to signal a door to open for years. These systems are flawed, however, in that it is possible to attack the system and obtain entry into a building.

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 53% of the total text.

SECURE WIRELESS PHYSICAL KEY SYSTEM

System for Enabling Any Wirelessly Enabled

Mobile

Device to Act As a Physical Security Key

Disclosed Anonymously

The ability to open a door without a physical key is not new.  Garage door openers and security passes have been using RF technology to signal a door to open for years. These systems are flawed, however, in that it is possible to attack the system and obtain entry into a building.

Garage doors, and office entry points all are areas where keyless doors are in operation.  In the future we will see this technology move to residential and public sector institutions like (e.g., hotels, resorts, etc.)

The proposed solution leverages a high standard of encyrption on mobile devices and applies this to physical security. In theory, it is possible to have the locking system on all doors connected via a network to a central based computer server. This server would contain connections to all locks.  Each lock would have an ID and a sensor.  These sensors could use a WiFi technology like 802.11 or Bluetooth.

When a device/phone is in close proximity to a lock, it would establish communications with the lock sensor.  This sensor acts like a gateway to the central server so that the device can talk directly to the controlling server. The device would talk on a newly devised protocol over some wireless transport like Bluetooth, WiFi (802.11) or some other RF mechanism.

In order for the device to sucessfully communicate to the server, all communication is encrypted. The server will only talk to the device if it can successfully decrypt the packets the device is sending.

The key algorithm used will be the same algorithm that protects a mobile device’s corpora...