Pseudorandom number generation and crytographic authentication

An automobile door lock receiver module (30) and a plurality of keychain fob transmitter units (16) contain identification numbers, secret initial values, and secret feedback masks so as to authenticate encrypted messages from any of the assigned fobs, indicative of commands registered by closing switches on the fob. Each fob is synchronized with the receiving module by means of a truly random number concatenated with a secret initial value and encrypted, through a linear feedback shift register or other operations. A second secret initial value is encrypted and command bits are exclusive ORed into the low order bit positions; the two encrypted numbers are concatenated and encrypted to form a key word which is transmitted with the fob ID. Synchronization includes decrypting to recover the truly random number and the secret initial value concatenated therewith; the truly random number is compared with previously received random numbers in order to avoid copying of recently transmitted synchronization commands. Successive lock-related commands utilize the number encrypted from the truly random number and the second secret initial value as starting values, employing a pseudorandom number of encryption iterations. A half-second delay between responses mitigates gaining access through numerical trials. An authenticated panic alarm command operates the headlights and horn of the vehicle but does not alter the synchronization.

Skip to:  ·  Claims  ·  References Cited  · Patent History  ·  Patent History

Claims

1. A method of cryptographic authentication of transmissions from a transmitting unit to a receiving module, comprising, in said transmitting unit:

separately generating a plurality of pseudorandom numbers;
concatenating said numbers to form a combined word;
performing an encryption operation on said combined word; and
transmitting a command word including a key portion derived from the result of said encryption operation; and
comprising, in said receiving module:
receiving said command word;
performing a decryption operation on the key portion of said command word to recover said combined word;
providing at least one number; and
providing an authentication signal only if at least a portion of said at least one number is identical to a corresponding portion of said recovered combined word.

2. A method according to claim 1 wherein:

said step of providing at least one number comprises separately generating a second plurality of pseudorandom numbers; and
said step of providing an authentication signal comprises providing said authentication signal only if at least a portion of each of said second plurality of pseudorandom numbers is identical to a corresponding portion of said recovered combined word.

3. A method according to claim 2 wherein said generating steps each comprise generating a pair of numbers.

4. A method according to claim 1 wherein said generating step comprises generating a pair of numbers.

5. A method according to claim 1 wherein said step of performing an encryption operation comprises performing a linear encryption operation.

6. A method according to claim 1 wherein said step of performing an encryption operation comprises performing a feedback shift register operation.

7. A method according to claim 6 wherein said step of performing an encryption operation comprises performing a linear feedback shift register operation employing a secret feedback mask and said step of performing a decryption operation comprises performing a reverse linear feedback shift register operation employing the same secret feedback mask as in said encryption operation.

8. A method according to claim 7 wherein said linear feedback shift register operation comprises a number of iterations on the order of the degree of said combined word or more.

10. A method according to claim 9 wherein said step of performing an iterative encryption operation comprises performing a linear iterative encryption operation.

11. A method according to claim 9 wherein said step of performing an iterative encryption operation comprises performing a feedback shift register operation.

12. A method according to claim 9 wherein said step of performing an iterative encryption operation comprises performing a linear feedback shift register operation employing the same secret feedback mask in said transmitting unit as in said receiving module.

14. A method according to claim 9 wherein said variable number of iterations is a fraction of the degree of said starting number.

16. A method according to claim 15 wherein said variable number is different from said changeable number.

17. A method according to claim 15 wherein said pseudorandom manner is different from said pseudorandom fashion.

18. A method according to claim 15 wherein said iterative encryption operation is the same as said iterative encryption process.

19. A method according to claim 9 wherein, in response to the presence of said first and second equal signals, the command portion of said recovered new altered word is exclusive ORed with the corresponding portion of said second new pseudorandom number and said steps (a) and (b), are performed in response to the result of said exclusive OR operation indicating said command is a synchronization command.

20. A method according to claim 9 wherein said iteration control signal changes in response to the value of a bit position of a changing number.

21. A method according to claim 9 wherein said iteration control signal changes in response to the value of a plurality of bit positions of a changing number.

22. A method according to claim 9 wherein said iteration control signal changes in response to the value of a bit position of said starting number.

23. A method of cryptographically authenticating transmissions from any of a plurality of remote command transmitting units to a command performing receiving module, comprising:

providing a set of numbers in each of said transmitting units, each set corresponding to one of said transmitting units, each set including at least one secret initial value, each set essentially unique to the corresponding unit;
providing in said receiving module, said set of numbers for each of said transmitters to which said receiving module is to respond;
transmitting a command word from one of said transmitting units including a key portion derived at least in part from an encryption operation performed on said secret initial value; and
authenticating said command word received at said receiving module utilizing the numbers in a corresponding set.

24. A method according to claim 23 wherein each of said sets includes an identification number;

said transmitting step comprises transmitting said command word including said identification number; and
said authenticating step comprises performing a process to authenticate said received command word only in response to said command word containing an identification number which matches an identification number in one of the sets provided in said receiving module.

25. A method according to claim 24 wherein, in response to receipt of said command word, said receiving module performs an authentication process using successive ones of said sets which have an identification number that matches the identification number included in said received command word until either authentication occurs or all of said sets have been used.

26. A method according to claim 23 wherein, in response to receipt of said command word, said receiving module performs an authentication process on said key portion using successive ones of said sets until either authentication occurs or all of said sets have been used.

27. A method according to claim 23 wherein each set includes at least one corresponding secret feedback mask, and said encryption operation comprises a feedback register pseudorandom number generation operation utilizing said secret feedback mask.

28. A method according to claim 27 wherein said shift register operation is linear.

29. A method of synchronized cryptographic authentication of transmissions from a remote command transmitting unit to a command performing receiving module selectively responsive thereto comprising:

transmitting a command word including a key portion derived from at least one encrypted number generated in said transmitting unit and indicative of a command;
receiving said command word and, in response thereto, comparing a number in said receiving module with a number decrypted from the key portion recovered from said command word, providing an authentication signal based at least in part on identity between said number in said receiving module and said number decrypted from the key portion recovered from said command word, selectively performing the command indicated thereby in response to said authentication signal; and
rendering said receiving module unresponsive, following receipt of one command word, to receipt of an additional command word for a period of time on the order of one-half second, or more.

30. The method according to claim 29 wherein said rendering step comprises providing a waiting period between the conclusion of any operation responsive to receipt of one of said command words and the enabling of said receiving module to be responsive to a subsequently received command word.

32. A method according to claim 31 wherein said encryption operations comprise linear feedback shift register operations.

33. A method according to claim 31 wherein said first, second and third encryption operations employ the same algorithm.

34. A method according to claim 31 wherein said first and fourth encryption operations employ the same algorithm.

35. A method according to claim 31 wherein said second and fifth encryption operations employ the same algorithm.

36. A method according to claim 31 wherein said third and sixth encryption operations employ the same algorithm.

37. A cryptographically authenticated remote control system in which a command transmitting unit selectively causes a physical effect in a command receiving module rendered responsive thereto;

said transmitting unit comprising:
a source of signals for providing first and second seed signals indicative of respective secret pseudorandom number generator initial values and first, second and third mask signals indicative of respective secret feedback masks, each mask defining a respective feedback polynomial for linear feedback shift register pseudorandom number generation, said initial values and said polynomials being essentially unique to said transmitting unit;
command switches operable to indicate a physical effect which is to be caused by said receiving module; and
first signal processing means responsive to selected operation of said switches indicative of a synchronization command for providing a random signal indicative of a variable random number, for performing a first linear feedback shift register pseudorandom number generation operation, on a combined number consisting of the initial value defined by said first seed signal concatenated with the random number defined by said random signal, a given number of iterations on the order of the degree of said fist polynomial, or more, using the mask defined by said first mask signal, said first polynomial having a degree on the order of the degree of said combined word, for performing a second linear feedback shift register pseudorandom number generation operation, on a second word consisting of the initial value defined by said second seed signal, a fixed number of iterations on the order of the degree of said second polynomial, or more, using the mask defined by said second mask signal, said second polynomial having a degree on the order of the degree of said second initial value, for exclusive ORing a plurality of command bits indicative of said synchronization command with a corresponding plurality of bits of the result of said second generation operation to form an altered word, for storing, for future use in authenticating subsequent transmissions to said receiving module, first and second pseudorandom numbers respectively indicative of the results of said first and second generation operations, for performing a third linear feedback shift register pseudorandom number generation operation, on a word consisting of said first pseudorandom number concatenated with said altered word, a predetermined number of iterations on the order of the degree of said third polynomial, or more, using the mask defined by said third mask signal said third polynomial having a degree on the order of the summation of the degrees of said first pseudorandom number and said altered word, and for transmitting, to said receiving module, a command word signal having the result of said third generation operation as a key portion and including a command bit indicative of said synchronization operation;
said first signal processing means responsive to selected operation of said switches indicative of a lock-related command for performing a fourth linear feedback shift register pseudorandom number generation operation, on said first pseudorandom number, a first determined number of iterations, using the mask defined by said first mask signal, to provide a new first pseudorandom number, for performing a fifth linear feedback shift register pseudorandom number generation operation, an said second pseudorandom number, a second determined number of iterations, using the mask defined by said second mask signal, to provide a new second pseudorandom number, for exclusive ORing a plurality of command bits indicative of said lock-related command with a corresponding plurality of bits of said new second pseudorandom number to form a new altered word, for performing a sixth linear feedback shift register pseudorandom number generation operation, on a word consisting of said new first pseudorandom number concatenated with said new altered word, said predetermined number of iterations, using the mask defined by said third mask signal, for storing said new first and second pseudorandom numbers for future use in authenticating subsequent transmissions to said receiving module, and for transmitting, to said receiving module, a command word signal having the result of said third generation operation as a key portion;
said receiving module comprising
a signal source for providing third and fourth seed signals respectively indicative of said initial values and fourth, fifth and sixth mask signals respectively indicative of said masks; and
second signal processing means for receiving said command word signal and responsive to said command word including said command bit, for performing a first reverse linear feedback shift register pseudorandom number generation operation, on said key portion of said command word signal, said predetermined number of iterations, using the mask defined by said sixth mask signal, for performing a second reverse linear feedback shift register pseudorandom number generation operation, on a portion of the result of said first reverse generation operation corresponding to said combined word, said given number of iterations, using the mask defined by said fourth mask signal, for comparing said initial value defined by said third seed signal with an equivalent portion of the result of said second reverse generation operation and providing a first equal signal only if they are identical, for performing a seventh linear feedback shift register pseudorandom number generation operation on a word consisting of the initial value defined by said fourth seed signal, said fixed number of iterations, using the mask defined by said fifth mask signal, for comparing a portion of the result of said seventh generation operation, corresponding to the unaltered portion of said altered word, with a corresponding portion of the result of said first reverse generation operation and providing a second equal signal only if they are identical, in response to said first and second equal signals, for storing, for subsequent use, the random number portion of the result of said second reverse operation and for comparing said random number portion with a similar random number portion, previously stored for subsequent use in response to prior performances of said second reverse operation, and for selectively storing third and fourth pseudorandom numbers respectively indicative of the result of said second reverse operation and said seventh generation operation, for future use in subsequent authentication of transmissions from said transmitting unit, only if said compared random portions are not equal;
said second signal processing means responsive to said command word signal not including said command bit for performing a third reverse linear feedback shift register pseudorandom number generation operation, on said key portion of said command word signal, said predetermined number of iterations, using the mask defined by said sixth mask signal, to recover said new first pseudorandom number and said new modified word, for performing an eighth linear feedback shift register pseudorandom number generation operation, on said third pseudorandom number, said first determined number of iterations, using the mask defined by said fourth mask signal, to provide a third new pseudorandom number with said third new pseudorandom number and generating a third equal signal only if they are identical, for performing a ninth linear feedback shift register pseudorandom number generation operation, on said fourth pseudorandom number, said second determined number of iterations, using the mask defined by said fifth mask signal, to provide a fourth new pseudorandom number, for comparing the non-command portion of said recovered new altered word with a corresponding portion of said fourth new pseudorandom number and providing a fourth equal signal only if they are identical, and, in response to said first and second equal signals, for storing for future use in subsequent authentication of transmissions from said transmitting unit, said new third and fourth pseudorandom numbers indicative of the results of said eighth and ninth generation operations, for exclusive ORing the command portion of said recovered new altered word with the corresponding portion of said fourth new pseudorandom number to recover said plurality of command bits and for performing said lock-related command.

38. A system according to claim 37 wherein the initial value indicated by said first seed signal is different from the initial value defined by said second seed signal.

39. A system according to claim 37 wherein said polynomials are all different from each other.

40. A system according to claim 37 wherein said fixed number is equal to said given number.

41. A system according to claim 37 wherein said first determined number is different from said second determined number.

42. A system according to claim 37 wherein said feedback polynomials are maximal length feedback polynomials.

43. A system according to claim 37 wherein said first and second determined numbers each vary as a function of a respective pseudorandom event, responsive to each transmission in said transmitting unit and responsive to each reception in said receiving module.

44. A system according to claim 43 wherein said first and second determined numbers are a fraction of said given number and said fixed number, respectively.

45. A method of cryptographically authenticating a transmission from a transmitting unit to a receiving module, comprising:

providing a starting number in said transmitting unit and providing said starting number in said receiving module;
in said transmitting unit:
providing an iteration control signal which changes in a random manner in response to successive transmissions from said transmitting unit;
performing a variable number of iterations of an iterative encryption operation on said starting number, said variable number determined by said iteration control signal;
transmitting a command word derived at least in part from the result of said encryption operation; and
in said receiving module:
receiving said command word;
recovering the result of said encryption operation from said received command word;
providing a second iteration control signal which changes, in the same random manner as said first iteration control signal, in response to successive receptions of command words by said receiving module;
performing a variable number of iterations of said iterative encryption operation on said starting number, said variable number determined by said second iteration control signal;
comparing at least a portion of the result of said encryption operation performed in said receiving module with a corresponding portion of said recovered result; and
providing an authentication signal only if said portion of said encryption operation performed in said receiving module is identical to said corresponding portion of said recovered result.

46. A method according to claim 45 wherein said iteration control signal changes in response to the value of a plurality of bit positions of a random number..Iadd.

47. A cryptographically authenticated remote control system in which a command transmitting unit selectively causes a physical effect in a command receiving module rendered responsive thereto,

the transmitting unit comprising
a first signal generator for providing a plurality of number signals indicative of respective pseudorandom numbers;
a signal processor for concatenating the plurality of number signals to form a combined word signal indicative of a combined word;
an encrypter for encrypting the combined word signal to form an encrypted combined word signal; and
transmission means for transmitting a command signal including a key portion derived from the encrypted combined word signal; and
the receiving module comprising
reception means for receiving the command signal;
a decrypter for decrypting the key portion of the command signal to recover the combined word signal;
a second signal generator for providing at least one number signal; and
authentication means for providing an authentication signal only if at least a portion of said at least one number signal is identical to a corresponding portion of the recovered combined word signal..Iaddend..Iadd.48. A system according to claim 47 wherein
said at least one number signal comprises a second plurality of number signals indicative of respective pseudorandom numbers; and
the authentication means comprises means for providing an authentication signal only if at least a portion of each of the second plurality of number signals is identical to a corresponding portion of the recovered combined word signal..Iaddend..Iadd.49. A system according to claim 47 wherein the encrypter comprises means for performing a linear encryption operation..Iaddend..Iadd.50. A system according to claim 47 wherein the encrypter comprises means for performing a feedback shift operation..Iaddend..Iadd.51. A system according to claim 50 wherein the feedback shift operation is linear..Iaddend..Iadd.52. A system according to claim 51 wherein the linear feedback shift register operation employs a secret feedback mask..Iaddend..Iadd.53. A system according to claim 50 wherein the linear feedback shift register operation employs a secret feedback mask and the decrypter comprises means for performing a reverse CRC operation employing the same secret feedback mask as the CRC operation..Iaddend..Iadd.54. A system according to claim 53 wherein the linear feedback shift register operation comprises a number of iterations on the order of the degree of the combined word or more..Iaddend..Iadd.55. A cryptographically authenticated remote control system in which a command transmitting unit selectively causes a physical effect in a command receiving module rendered responsive thereto, comprising
means for providing a starting number signal in the transmitting unit and for providing the same starting number signal in the receiving module, the starting number signal indicative of a starting number; and
comprising in the transmitting unit
a first signal generator for providing a first iteration control signal which changes in a pseudorandom manner in response to successive transmissions from the transmitting unit;
a first signal processor for iterating a variable number of times an iterative encryption operation on the starting number signal, the variable number determined by the first iteration control signal, and for providing a first resulting signal therefrom;
transmission means for transmitting a command signal derived at least in part from the first resulting signal; and
comprising in the receiving module:
reception means for receiving the command signal;
a signal conditioner for recovering the first resulting signal from the command signal;
a second signal generator for providing a second iteration control signal which changes in the same pseudorandom manner as the first iteration control signal in response to successive receptions of command signals by the receiving module;
a second signal processor for iterating a variable number of times an iterative encryption operation on the starting number signal, the variable number determined by the second iteration control signal, and for providing a second resulting signal therefrom;
comparison means for comparing at least a portion of the first resulting signal with a corresponding portion of the second resulting signal; and
authentication means for providing an authentication signal only if the portion of the first resulting signal is identical to the corresponding

portion of the second resulting signal..Iaddend..Iadd.56. A system according to claim 55 wherein the iterative encryption operation comprises a linear iterative encryption operation..Iaddend..Iadd.57. A system according to claim 55 wherein the iterative encryption operation comprises a feedback shift register operation..Iaddend..Iadd.58. A system according to claim 57 wherein the feedback shift register operation is linear..Iaddend..Iadd.59. A system according to claim 58 wherein the linear feedback shift register operation employs a secret feedback mask..Iaddend..Iadd.60. A system according to claim 59 wherein the linear feedback shift register operation employs the same secret feedback mask in the transmitting unit as in the receiving module..Iaddend..Iadd.61. A system according to claim 55 further comprising means for providing a secret initial value signal in the transmitting unit and the same secret initial value signal in the receiving unit; and further wherein the starting number signal is indicative of a word derived at least in part from the secret initial value signal, and is formed at least in part from a number of iterations of an iterative encryption operation on the order

of the degree of the word..Iaddend..Iadd.62. A system according to claim 55 wherein the variable number is a fraction of the degree of the starting number..Iaddend..Iadd.63. A system according to claim 55 comprising:

means for providing a second starting number signal in the transmitting unit and for providing the same second starting number signal in the receiving module, the starting number signal indicative of a starting number; and
comprising in the transmitting unit
a third signal generator for providing a third iteration control signal which changes in a pseudorandom fashion in response to successive transmissions from the transmitting unit;
a third signal processor for iterating a changeable number of times an iterative encryption process on the second starting number signal, the changeable number determined by the third iteration control signal, and for providing a third resulting signal therefrom;
transmission means for transmitting the command signal derived at least in part from the third resulting signal; and
comprising in the receiving module
fourth signal conditioning means for recovering the third resulting signal from the command signal;
a fourth signal generator for providing a fourth iteration control signal which changes in the same pseudorandom fashion as the third iteration control signal, in response to successive receptions of command signals by the receiving module;
a fourth signal processor for iterating a changeable number of times an iterative encryption operation on the starting number signal, the variable number determined by the fourth iteration control signal, and for providing a fourth resulting signal therefrom;
comparison means for comparing at least a portion of the third resulting signal with a corresponding protion of the fourth resulting signal; and
authentication means for providing an authentication signal only if the portion of the third resulting signal is identical to the corresponding portion of the fourth resulting signal..Iaddend..Iadd.64. A system according to claim 63 wherein the variable number is different from the changeable number..Iaddend..Iadd.65. A system according to claim 63 wherein the pseudorandom manner is different from the pseudorandom fashion..Iaddend..Iadd.66. A system according to claim 65 wherein the iterative encryption operation is the same as the iterative encryption process..Iaddend..Iadd.67. A system according to claim 55 wherein the iteration control signal changes in response to the value of a bit position of a changing number..Iaddend..Iadd.68. A system according to claim 67 wherein the changing number is the starting number..Iaddend..Iadd.69. A system according to claim 55 wherein the iteration control signal changes in response to the value of a plurality of bit positions of a changing number..Iaddend..Iadd.70. A system according to claim 69 wherein the changing number is the starting number..Iaddend..Iadd.71. A cryptographically authenticated remote control system in which any of a plurality of command transmitting units selectively causes a physical effect in a command receiving module rendered responsive thereto, comprising:
transmitter memory for storing a set of numbers in each of the transmitting units, each set corresponding to one of the transmitting units, each set including at least one secret initial value, each set essentially unique to the corresponding unit;
receiver memory for storing in the receiving module the set of numbers for each of the transmitters to which the receiving module is to respond;
transmission means for transmitting to the receiving module from one of the transmitting units a command word including a key portion derived at least in part from an encryption operation performed on the secret initial value; and
authentication means for authenticating the command word received at the receiving module utilizing the numbers in a corresponding set..Iaddend..Iadd.72. A system according to claim 71 wherein each set includes an identification number and the command word includes the identification number; and comprising authentication means for authenticating the command word received at the receiving modules utilizing the numbers in a corresponding set only in response to the command word containing an identification number which matches an identification number in one of the sets disposed in the receiving module..Iaddend..Iadd.73. A system according to claim 72 wherein the receiving module further comprises selection means for performing an authentication process using successive ones of the sets which have an identification number that matches the identification number included in the received command word until either authentication occurs or all of the sets have been used..Iaddend..Iadd.74. A system according to claim 71 wherein the receiving module further comprises selection means for performing an authentication process on the key portion using successive ones of the sets until either authentication occurs or all of the sets have been used..Iaddend..Iadd.75. A system according to claim 71 wherein each set includes at least one corresponding secret feedback mask, and the encryption operation comprises a feedback shift register pseudorandom number generation operation using the secret feedback mask..Iaddend..Iadd.76. A system according to claim 75 wherein the feedback shift register operation is linear..Iaddend..Iadd.77. A synchronized cryptographic authenticated remote control system in which a command transmitting unit selectively causes a physical effect in a command receiving module rendered responsive thereto comprising:
transmission means for transmitting a command word including a key portion derived from at least one encrypted number generated in the transmitting unit and indicative of a command;
reception means for receiving the command word and, in response thereto, for comparing a number in the receiving module with a number decrypted from the key portion recovered from the command word;
authentication means for providing an authentication signal based at least in part on identity between the number in the receiving module and the number decrypted from the key portion recovered from the command word and for selectively performing the command indicated thereby in response to the authentication signal; and
deactivation means for rendering the receiving module unresponsive, following receipt of one command word, to receipt of an additional command word for a period of time on the order of one-half second, or more..Iaddend..Iadd.78. A system according to claim 77 wherein the period of time commences on the conclusion of receipt of one of the command words..Iaddend..Iadd.79. An authentication system for generating an authentication signal upon the identity between two signals comprising
first and second nonvolatile memory;
a starting number stored in each of first and second nonvolatile memory;
a first signal generator for providing a first iteration control signal which changes in a pseudorandom manner in response to successive operations of the authentication system;
a first signal processor coupled to the first nonvolatile memory for iterating a variable number of times an iterative encryption operation on the starting number, the variable number determined by the first iteration control signal, and for providing a first resulting signal therefrom;
reception means for receiving the first resulting signal;
a second signal generator for providing a second iteration control signal which changes in a pseudorandom manner in response to successive receptions of the first resulting signal;
a second signal processor coupled to the second nonvolatile memory for iterating a variable number of times an iterative encryption operation on the starting number, the variable number determined by the second iteration control signal, and for providing a second resulting signal therefrom;
comparison means for comparing at least a portion of the first resulting signal with a portion of the second resulting signal; and
authentication means for providing an authentication signal only if the portion of the first resulting signal is identical to the corresponding portion of the second resulting signal..Iaddend..Iadd.80. A system according to claim 79 wherein the iterative encryption operation comprises a linear iterative encryption operation..Iaddend..Iadd.81. A system according to claim 79 wherein the iterative encryption operation comprises a feedback shift register operation..Iaddend..Iadd.82. A system according to claim 81 wherein the feedback shift register operation is linear..Iaddend..Iadd.83. A system according to claim 82 wherein the linear feedback shift register operation employs a secret feedback mask..Iaddend..Iadd.84. A system according to claim 83 wherein the linear feedback shift register operation employs the same secret feedback mask in the transmitting unit as in the receiving module..Iaddend..Iadd.85. A system according to claim 79 further comprising means for providing a secret initial value signal in the transmitting unit and the same secret initial value signal in the receiving unit; and further wherein the starting number signal is indicative of a word derived at least in part from the secret initial value signal, and is formed at least in part from a number of iterations of an iterative encryption operation on the order of the degree of the word..Iaddend..Iadd.86. A system according to claim 79 wherein the variable number is a fraction of the degree of the starting number..Iaddend..Iadd.87. A remote control lock system comprising
a transmitter having
a first pseudorandom number generator for generating a first pseudorandom number, and a second pseudorandom number generator for generating a second pseudorandom number;
a first signal processor for concatenating the first and second pseudorandom numbers to form a combined word;
a plurality of command switches indicative of respective lock commands;
a second signal processor responsive to the plurality of command switches for generating a combined signal derived at least in part from the combined word and indicative of a lock command; and
transmission means for transmitting the combined signal to a receiver responsive thereto; and
a receiver having
recovery means for recovering the combined word and the lock command from the combined signal;
a third pseudorandom number generator for generating a third pseudorandom number and a fourth pseudorandom number generator for generating a fourth pseudorandom number;
a third signal processor for concatenating the third and fourth pseudorandom numbers to form an authentication word; and comparison means for comparing the combined word and the authentication word, for generating an authentication signal in response to identity therebetween, and for authorizing the performance of the lock command upon the generation of the authentication signal..Iaddend..Iadd.88. The system of claim 87 in which the first, second, third, and fourth pseudorandom number generators employ a feedback shift register..Iaddend..Iadd.89. A remote control lock system comprising a transmitter and a receiver, the transmitter comprising at least one transmitter register having a plurality of bit positions indicative of binary states, wherein the binary state of at least one of the bit positions determines the number of iterations of an iterative encryption algorithm performed on the contents of the transmitter register..Iaddend..Iadd.90. The system of claim 89 wherein the receiver comprises at least one receiver register having a plurality of bit positions indicative of binary states, wherein the binary state of at least one of the bit positions determines the number of iterations of an iterative encryption algorithm performed on the contents of the receiver register; and
comparison means for comparing the contents of a number derived at least in part from the contents of the transmitter register with a number derived at least in part from the contents of the receiver register to provide an authentication signal upon identity therebetween..Iaddend..Iadd.91. The system of claim 90 wherein the iterative encryption algorithm is a feedback shift register algorithm..Iaddend..Iadd.92. The system of claim 91 wherein the feedback shift resister algorithm is linear..Iaddend..Iadd.93. The system of claim 92 comprising
command switches on the transmitter indicative of a plurality of lock related commands;
a signal processor responsive to the command switches for concatenating any one of the lock related commands with a number derived at least in part from the contents of the transmitter register; and
the comparison means comprising means for communicating a signal representative the lock related command from the transmitter to the receiver, and authorization means for authorizing performance of the lock related command on the condition that at least a portion of the contents of the transmitter register is identical to a corresponding portion of the contents of the receiver register..Iaddend.
Referenced Cited
U.S. Patent Documents
RE33189 March 27, 1990 Lee et al.
3622991 November 1971 Lehrer et al.
3654604 April 1972 Crafton
3665162 May 1972 Yamamoto et al.
4133974 January 9, 1979 Morgan
4319273 March 9, 1982 Nossem
4322577 March 30, 1982 Brandstrom
4418275 November 29, 1983 Oosterbaan et al.
4424414 January 3, 1984 Hellman et al.
4435826 March 6, 1984 Matsui
4509093 April 2, 1985 Stellberger
4595985 June 17, 1986 Sakakiya
4596985 June 24, 1986 Bongard et al.
4612413 September 16, 1986 Robert et al.
4613980 September 23, 1986 Newlin et al.
4630201 December 16, 1986 White
4654480 March 31, 1987 Weiss
4667301 May 19, 1987 Chiu et al.
4691291 September 1, 1987 Wolfram
4733215 March 22, 1988 Memmola
4734680 March 29, 1988 Gehman et al.
4736419 April 5, 1988 Roe
4758835 July 19, 1988 Rathmann et al.
4771463 September 13, 1988 Beeman
4797921 January 10, 1989 Shiraishi
4800590 January 24, 1989 Vaughan
4825210 April 25, 1989 Bachhuber et al.
4847614 July 11, 1989 Keller
4853884 August 1, 1989 Brown et al.
4853962 August 1, 1989 Brockman
4870682 September 26, 1989 Morrey et al.
4876718 October 24, 1989 Citta et al.
4881148 November 14, 1989 Lambropoulos et al.
4892098 January 9, 1990 Sauer
4905176 February 27, 1990 Schulz
4912463 March 27, 1990 Li
4928098 May 22, 1990 Dannhaeuser
4942393 July 17, 1990 Waraksa et al.
4980108 December 25, 1990 Suzuki et al.
5001754 March 19, 1991 Deffeyes
5007016 April 9, 1991 Le Mehaute et al.
5048086 September 10, 1991 Bianco et al.
5054067 October 1, 1991 Moroney et al.
5055701 October 8, 1991 Takeuchi
5060265 October 22, 1991 Finkelstein
5103221 April 7, 1992 Memmola
5105162 April 14, 1992 Fleissner et al.
5109152 April 28, 1992 Takagi et al.
5113441 May 12, 1992 Harada
5115236 May 19, 1992 Kohler
5136642 August 4, 1992 Kawamura et al.
5144667 September 1, 1992 Pogue, Jr. et al.
5146215 September 8, 1992 Drori
5161190 November 3, 1992 Cairns
5179592 January 12, 1993 Kusano
5191610 March 2, 1993 Hill et al.
5195136 March 16, 1993 Hardy et al.
5220606 June 15, 1993 Greenberg
5220616 June 15, 1993 Downing et al.
5222141 June 22, 1993 Killian
5224161 June 29, 1993 Daniel et al.
5231667 July 27, 1993 Kojima
5241598 August 31, 1993 Raith
5243650 September 7, 1993 Roth et al.
5243653 September 7, 1993 Malek et al.
5272755 December 21, 1993 Miyaji et al.
5276738 January 4, 1994 Hirsch
5280267 January 18, 1994 Reggiani
5313491 May 17, 1994 Schramm et al.
5313530 May 17, 1994 Iwamura
5317639 May 31, 1994 Mittenthal
5319364 June 7, 1994 Waraksa et al.
5319710 June 7, 1994 Atalla et al.
5365225 November 15, 1994 Bachhuber
5369706 November 29, 1994 Latka
5377270 December 27, 1994 Koopman, Jr. et al.
5398284 March 14, 1995 Koopman, Jr. et al.
5412379 May 2, 1995 Waraksa et al.
5420925 May 30, 1995 Michaels
5434806 July 18, 1995 Hofverberg
5436901 July 25, 1995 Koopman
5442341 August 15, 1995 Lambropoulos
5479511 December 26, 1995 Naccache
5511124 April 23, 1996 Bergner
5517189 May 14, 1996 Bachhuber et al.
5528230 June 18, 1996 Kim
5554977 September 10, 1996 Jablonski et al.
5555303 September 10, 1996 Stambler
5563600 October 8, 1996 Miyake
5588058 December 24, 1996 Le Berre
5598476 January 28, 1997 LaBarre et al.
5604488 February 18, 1997 Lambropoulos
5619475 April 8, 1997 Winkler
Foreign Patent Documents
0304733 May 1993 EPX
3 225 754 January 1984 DEX
2144564 July 1984 GBX
Other references
  • National Semiconductor Corporation Inc.'s Response to United Technologies Automotive, Inc.'s First Set of Interrogatories (dated Sep. 2, 1997). Correspondence letters from Robert P. Greenspoon to Audrey Sugimura dated Feb. 2, 1998 and Feb. 3, 1998. "Integrated Circuit Compatible Random Number Generator," IBM Technical Disclosure Bulletin, vol. 30, No. 11, Apr. 1988, pp. 333-335. Peterson et al, Error-Correcting Codes, MIT Press, 2ed., 1972. Michelson et al, Error-Control Techniques For Digital Communication, John Wiley & Sons, 1985. Petrovic, Branislav, "A Balanced RF Oscillator", rf design awards, no date. Morgan, Harvey L., "An Emitter Follower Oscillator", rf design feature, no date. Demma, Nick, "Balanced Meissner Oscillator", rf design awards, Dec., 1993. Taylor, Craig and Kenny, David, "Basic Crystal Oscillator Design Considerations", RF tutorial, no date. Brown, Fred, "Stable LC Oscillators", rf design feature, Mar., 1987. Mitsumi ICs, "The Best Way to Protect a Microprocessor", no date. IEEE Industrial Electronics Society, Edited by Newman, John G. and Martinsons, Robert, "Automotive Applications of Microprocessors," Oct. 25-26, 1984, Dearborn, MI. Breed, Gary A., "A Basic Review of Feedback," rf tutorial, Apr., 1993. Key, Edwin L., "An Analysis of the Structure and Complexity of Nonlinear Binary Sequence Generators," IEEE Transactions on Information Theory, Nov., 1976. Application for Equipment Authorization, Federal Communications Commission, Grantee: General Motors, Dated Nov. 15, 1990 and grant of Equipment Authorization, Dated: Jan. 14, 1991. Relevant Art to the Cryptography Portfolio, no date.
Patent History
Patent number: RE36181
Type: Grant
Filed: Nov 8, 1996
Date of Patent: Apr 6, 1999
Assignee: United Technologies Automotive, Inc. (Dearborn, MI)
Inventors: Philip J. Koopman, Jr. (Pittsburgh, PA), Alan M. Finn (Amston, CT)
Primary Examiner: Bernarr E. Gregory
Law Firm: Niro, Scavone, Haller & Niro
Application Number: 8/751,932
Classifications
Current U.S. Class: 380/23; 380/21; 380/25; Key Sequence Signal Combined With Data Signal (380/43); 380/49; 340/82531; 340/82534
International Classification: H04L 932;