Method and apparatus for making a decision on a card
First Claim
Patent Images
1. A method of controlling physical access to a secure asset, comprising:
- conducting a substantially real-time transaction with a mobile device comprising the steps of;
obtaining, with the mobile device, a unique identifier that uniquely identifies a locking mechanism and a reader coupled to a physical access point to the secure asset, the locking mechanism configured to transition between a locked state and an unlocked state, the reader configured to actuate a state transition of the locking mechanism, wherein the unique identifier is obtained absent communication between the mobile device and the reader;
in response to obtaining the unique identifier, executing, with the mobile device, an access control decision with respect to the secure asset based on the unique identifier and credential information stored in secure memory of the mobile device; and
in response to determining that access to the secure asset is granted, transmitting, with the mobile device, a control signal to the reader to transition the locking mechanism from the locked state to the unlocked state.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network.
134 Citations
19 Claims
-
1. A method of controlling physical access to a secure asset, comprising:
conducting a substantially real-time transaction with a mobile device comprising the steps of; obtaining, with the mobile device, a unique identifier that uniquely identifies a locking mechanism and a reader coupled to a physical access point to the secure asset, the locking mechanism configured to transition between a locked state and an unlocked state, the reader configured to actuate a state transition of the locking mechanism, wherein the unique identifier is obtained absent communication between the mobile device and the reader; in response to obtaining the unique identifier, executing, with the mobile device, an access control decision with respect to the secure asset based on the unique identifier and credential information stored in secure memory of the mobile device; and in response to determining that access to the secure asset is granted, transmitting, with the mobile device, a control signal to the reader to transition the locking mechanism from the locked state to the unlocked state. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A mobile device configured to conduct a substantially real-time transaction to gain access to a secure asset through a physical access point coupled to a locking mechanism and a reader, the locking mechanism configured to transition between a locked state and an unlocked state, the reader configured to actuate a state transition of the locking mechanism, the mobile device comprising:
one or more processors configured to; instruct a communications interface of the mobile device to obtain, absent communication with the reader, a unique identifier that uniquely identifies the reader; in response to obtaining the unique identifier, execute, with the mobile device, an access control decision with respect to the secure asset based on the unique identifier and credential information stored in secure memory of the mobile device; and in response to determining that access to the secure asset is granted, instruct the communications interface to transmit a control signal to the reader to transition the locking mechanism from the locked state to the unlocked state. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A mobile phone configured to conduct a substantially real-time transaction to gain access to a secure asset through a physical access point coupled to a locking mechanism and a reader, the locking mechanism configured to transition between a locked state and an unlocked state, the reader configured to actuate a state transition of the locking mechanism, the mobile phone comprising:
one or more processors configured to; instruct a communications interface of the mobile phone to obtain, absent communication with the reader and via optical communication protocols, a unique identifier that uniquely identifies the reader; in response to obtaining the unique identifier, execute, with the mobile phone, an access control decision with respect to the secure asset based on the unique identifier and credential information stored in secure memory of the mobile phone, the access control decision comprising an algorithm defined by an access decision application stored in secure memory of the mobile phone; and in response to determining that access to the secure asset is granted, instruct the communications interface to transmit an RF control signal to the reader to transition the locking mechanism from the locked state to the unlocked state. - View Dependent Claims (17, 18, 19)
Specification