HID's Gesture Credentials Patents

By: Brian Rhodes, Published on Jul 10, 2013

Proximity style credentials carry a huge risk: they can be passively read by thieves, who take the stolen information and gain unlawful entry into access controlled buildings. HID Global, a major credential provider, has filed patents that keeps prox credentials locked tight until moving it in a specific way. Could this new authentication inject a dose of high security into a vulnerable EAC mainstay? We look at HID's "Gesture" patents in this note.

How it Works

HID filed two different patents that address the same 'gesture protected credential' concept. The patents detail "an RFID device that restricts data transmissions until it has been moved in a particular way by the holder". Essentially, this is an access control credential that must be physically moved in a specific pattern in order to release it's information to a reader.

The patent abstracts provide example gestures required to enable reads, describing several potential functions:

For example, a single gesture mimicking the turn of a door key could potentially 'turn on' a proximity credential so it can be read, up to a three-factor combination requiring movement in different dimensions. One aspect that is clear from the list is that only specific gestures are supported, and are not 'user definable'. However, it is also clear the user will have some discretion on how many gestures are required to make a credential work.

"Snoop Proof"

The biggest advantage "gesturing" provides is that proximity credentials cannot be passively read in a cloning attack. For a demonstration on the snooping vulnerability, see the video below:

MEMS Enables Gesturing

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

The patent description details a proximity-style credential design with several new elements. The key addition is the MEMS, or the "MicroElectro-Mechanical System" component that is a small, solid state accelerometer. It is this mechanism that senses the orientation of the card, and prevents the coil from sending credential information until a specific pattern is followed.

The image below shows the "gesture concept" design next to an existing Multiclass credential. The similarities between the designs are obvious, with the additional MEMS component fitting into available space in standard ISO/IEC card sizes:

The patent abstract describes the relative cost of adding MEMS to be low and mass producible: 

Because MEMS devices are manufactured using batch fabrication techniques similar to those used for integrated circuits, unprecedented levels of functionality, reliability, and sophistication can be placed on a small silicon chip at a relatively low cost.

While the exact prices of "Gesture Credentials" have not been established, the technology does not appear to add significant cost to credential BOMs.

Supports Existing Readers

While HID has yet to formally announce "gesture products", the technology depends only on credentials to work, meaning there is no apparent requirement to replace readers. After the credential is 'unlocked' by gesturing, it interfaces with readers in the same way and in the same formats as existing Prox, iClass, and MiFARE/DESfire credentials.

This potential could enhance security of existing systems, and greatly mitigate the risk of lost, stolen, or snooped credentials. "Gesturing" adds a "Something You Know" authentication layer to classic single-factor credentials, and unless an unauthorised user has privileged information on how to 'unlock' the credential, it will likely be useless.

Cards Only?

The patent scope does not only address 'credential cards', but describes the applications in a variety of forms:

"As can be appreciated, an RFID device can be implemented as a part of an ID/access card, smart card, RF tag, cellular phone, Personal Digital Assistant (PDA), key fob, and the like."

HID has patented gesturing in all common RFID device forms.  While notional designs for phones or fobs were not given, we anticipate examples of "gesture credentials" in forms that currently support proximity-style tokens.

1 report cite this report:

HID 'Twist and Go' Access Control on Sep 30, 2014
Credential giant HID Global is making it easier to use cell phones as...
Comments (8) : Members only. Login. or Join.

Related Reports

Keypads For Access Control Tutorial on Jul 28, 2020
Keypad readers present huge risks to even the best access systems. If...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Use Access Control Logs To Constrain Coronavirus on Apr 09, 2020
Access control users have included capabilities that are not commonly used...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Free Online NFPA, IBC, and ADA Codes and Standards 2020 on Sep 03, 2020
Finding applicable codes for security work can be a costly task, with printed...
Face Masks Increase Face Recognition Errors Says NIST on Aug 04, 2020
COVID-19 has led to widespread facemask use, which as IPVM testing has shown...
Risks Of Managing End User Passwords (Statistics) 2020 on Sep 11, 2020
Alarmingly, most integrators used spreadsheets to manage passwords, IPVM...
Hikvision Hides Xinjiang R&D Activities on Apr 22, 2020
Hikvision has systematically deleted evidence showing their R&D base and...
HID Releases VertX Replacement Aero on Aug 10, 2020
HID is replacing two established and broadly supported types of access...
HID Presents Mercury Security & Aero Access Controllers on Aug 25, 2020
HID presented Mercury Security & Aero Access Controllers at the 2020 IPVM...
FLIR Markets Windows Temperature Screening, Violates IEC And Causes Performance Problems on Jul 17, 2020
FLIR, one of the largest thermal screening manufacturers, is marketing...
FLIR Screen-EST Screening Software Tested on Jun 30, 2020
In our FLIR A Series Test, the cameras' biggest drawback was their lack of...
Beware Rigged China Fever Cameras on Sep 08, 2020
Many China fever camera manufacturers have rigged algorithms dynamically...

Recent Reports

Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
Today is your last chance to save $50 on registration for the Fall 2020 Video...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...
China Bems Temperature Measurement Terminal Tested on Sep 22, 2020
Guangzhou Bems (brand Benshi) is the manufacturer behind temperature...
Axis Exports To China Police Criticized By Amnesty International on Sep 21, 2020
Axis Communications and other EU surveillance providers are under fire from...
Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Axis Compares Fever Camera Sellers to 9/11 on Sep 18, 2020
Axis Communications, the West's largest surveillance camera manufacturer, has...