Method and apparatus for making a decision on a card
First Claim
Patent Images
1. A method of controlling physical access to a secure asset with a physical access control system including a mobile device and a host, comprising:
- receiving location information at the mobile device;
analyzing the location information by an application stored on the mobile device; and
making, by the mobile device, an access control decision as to whether to permit or deny a holder of the mobile device to access the secure asset based on the analysis of the location information; and
determining, by the mobile device, a host identifier based upon the location information.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network.
128 Citations
15 Claims
-
1. A method of controlling physical access to a secure asset with a physical access control system including a mobile device and a host, comprising:
-
receiving location information at the mobile device; analyzing the location information by an application stored on the mobile device; and making, by the mobile device, an access control decision as to whether to permit or deny a holder of the mobile device to access the secure asset based on the analysis of the location information; and determining, by the mobile device, a host identifier based upon the location information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of controlling physical access to a secure asset with a physical access control system including a mobile device and a host, comprising:
-
receiving, at a mobile device, a first location information of the mobile device; analyzing the first location information by an application stored on the mobile device; making, by the mobile device, a first access control decision as to whether to permit or deny a holder of the mobile device to access the secure asset based on the analysis of the first location information; receiving, at the mobile device, a second location information, wherein the second location information is location information for the mobile device; analyzing the second location information by an application stored on the mobile device; and making a second access control decision as to whether to permit or deny a holder of the mobile device to access the secure asset based on the analysis of the second location information, wherein the second access control decision is dependent upon the first access control decision. - View Dependent Claims (13, 14, 15)
-
Specification