Entry control system
First Claim
1. A method for obtaining physical access to a protected location, the method comprising:
- presenting a security token to communicate with a security controller of a physical access control system by a communication interface, the security token including memory that contains at least one critical security parameter;
causing the security controller to temporarily maintain a local access list of authenticated users that are granted access to the protected location using one or more predetermined critical security parameters, the security controller being in communication with a life cycle management server adapted to perform life cycle management functions related to the at least one critical security parameter contained in the security token;
providing the at least one critical security parameter from the security token to the security controller to authenticate the user by performing one or more authentication transactions based on the critical security parameters; and
permitting the security controller to send the local access list to an authentication server that updates a master access list maintained by the authentication server, wherein, based on a signal that the one or more authentication transactions successfully authenticate the user, an electromechanical circuit is activated to grant the user access to the protected location.
3 Assignments
0 Petitions
Accused Products
Abstract
An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a security controller having standard network interface capabilities including IEEE 802.x and takes advantage of the convenience and security offered by smart cards and related devices for both physical and logical security purposes. The invention is based on standard remote authentication dial-in service (RADIUS) protocols or TCP/IP using SSL, TLS, PCT or IPsec and stores a shared secret required by the secure communication protocols in a secure access module coupled to the security controller. The security controller is intended to be a networked client or embedded intelligent device controlled remotely by to an authentication server. In another embodiment of the invention one or more life cycle management transactions are performed with the secure access module. These transactions allow for the updating, replacement, deletion and creation of critical security parameters, cryptographic keys, user data and applications used by the secure access module and/or security token. In another embodiment of the invention a security access module associated with the security controller locally performs local authentication transactions which are recorded in a local access list used to update a master access list maintained by the authentication server.
52 Citations
9 Claims
-
1. A method for obtaining physical access to a protected location, the method comprising:
-
presenting a security token to communicate with a security controller of a physical access control system by a communication interface, the security token including memory that contains at least one critical security parameter; causing the security controller to temporarily maintain a local access list of authenticated users that are granted access to the protected location using one or more predetermined critical security parameters, the security controller being in communication with a life cycle management server adapted to perform life cycle management functions related to the at least one critical security parameter contained in the security token; providing the at least one critical security parameter from the security token to the security controller to authenticate the user by performing one or more authentication transactions based on the critical security parameters; and permitting the security controller to send the local access list to an authentication server that updates a master access list maintained by the authentication server, wherein, based on a signal that the one or more authentication transactions successfully authenticate the user, an electromechanical circuit is activated to grant the user access to the protected location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification