ACCESS CONTROL ARCHITECTURE FOR DETECTING SECURE DATA COPIED BETWEEN DEVICES
A method for leveraging an access control architecture for detecting secure data copied between devices according to an embodiment includes, by a credential system, generating an authentication diversified key based on a master key and a first key diversification input, generating an encryption dive...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A method for leveraging an access control architecture for detecting secure data copied between devices according to an embodiment includes, by a credential system, generating an authentication diversified key based on a master key and a first key diversification input, generating an encryption diversified key based on the master key and a second key diversification input, generating a credential blob including an encrypted credential for a mobile device and a portion of the second key diversification input, and transmitting the credential blob to the mobile device, and by a reader device, receiving credential data from the mobile device including an encrypted version of the credential blob, generating the encryption diversified key based on the master key and the second key diversification input, validating the credential data based on the encryption diversified key, and extracting the credential for use in an access control decision. |
---|