Method and apparatus for making a decision on a card
First Claim
Patent Images
1. A method for use in a first credential, comprising:
- receiving, at a first credential, data transmitted from a reader associated with an access control system, the data comprising at least one of a host identifier and timestamp;
analyzing the at least one of a host identifier and timestamp using an application stored on the first credential;
making an access control decision based on the analyzing step;
generating a first message containing results of the access control decision; and
sending the first message to the reader,characterized in that the method further comprises;
receiving, at the first credential, information from a second credential;
wherein the analyzing step further comprises analyzing the information from the second credential, and further wherein the access control decision comprises a determination as to whether the first and second credentials are both allowed access to an asset protected by the reader, wherein at least one of the first credential and the second credential is a wearable computer.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by one or more portable credentials using data and algorithms stored on or received by two or more credentials. Since access decisions are made by the portable credential or credentials, non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database, thereby reducing the cost of building and maintaining the secure access network.
46 Citations
18 Claims
-
1. A method for use in a first credential, comprising:
-
receiving, at a first credential, data transmitted from a reader associated with an access control system, the data comprising at least one of a host identifier and timestamp; analyzing the at least one of a host identifier and timestamp using an application stored on the first credential; making an access control decision based on the analyzing step; generating a first message containing results of the access control decision; and sending the first message to the reader, characterized in that the method further comprises; receiving, at the first credential, information from a second credential; wherein the analyzing step further comprises analyzing the information from the second credential, and further wherein the access control decision comprises a determination as to whether the first and second credentials are both allowed access to an asset protected by the reader, wherein at least one of the first credential and the second credential is a wearable computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An access control system, comprising:
-
at least two credentials, each credential comprising; a memory storing an access decision application that is capable of making an access decision for said credential based on data received from an access control system reader, the access decision comprising a determination as to whether or not the credential is allowed access to the asset protected by the access control system reader, wherein the received data comprises at least one of a host identifier assigned to the access control system reader, authentication information, and a timestamp; and a processor for executing the access decision application in connection with the received data, wherein at least one of the at least two credentials is a wearable computer. - View Dependent Claims (15, 16)
-
-
17. A credential for use in a secure access system, comprising:
-
a memory storing an access decision application that is capable of making an access decision for said credential based on data received from a local host; and a processor for executing said access decision application, wherein said processor is further capable of generating a message after executing said access decision application and causing said message to be transmitted to the local host, and wherein said message comprises results of said access decision for said credential, characterized in that; the access decision for said credential is further based on data received from a second credential, the access decision comprising a determination as to whether or not the credential and the second credential are allowed access to an asset protected by the local host; the access decision application is for execution by the processor in connection with said received data from the local host and said received data from the second credential, wherein at least one of the first credential and the second credential is a wearable computer; and said data received from the second credential comprises at least one of a control or access schedule, a control key, an expiration time, a PIN, a password, biometric identification information, an indication of whether the second credential is allowed access to the asset protected by the local host, and an indication of whether the second credential has completed one or more steps required to be completed by the second credential for the access decision application to determine that the credential is allowed access to the asset. - View Dependent Claims (18)
-
Specification