Apparatus and method providing distributed access point authentication and access control with validation feedback
First Claim
1. A system for distributed access control, comprising:
- a. a content extraction control module operated by a computer process;
b. one or more distributed modules linked to the content extraction control module; and
c. one or more content storage devices linked to the content extraction control module.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for distributed access point authentication and access control with validation feedback. Demographic data and access control logic regarding individuals seeking access to one or more control spaces is stored in a core data storage device or database operably connected to a computer. A portion of this data is extracted by a content extraction control module, encapsulated in one or more distribution modules, and distributed to one or more access control points. Individuals present requests for access at or through the access control points, and obtain access if they are authorized. Feedback about access authorization attempts is sent to feedback modules and stored in staging databases. The core data storage device or database subsequently is updated with the information about access authorization attempts.
32 Citations
15 Claims
-
1. A system for distributed access control, comprising:
-
a. a content extraction control module operated by a computer process;
b. one or more distributed modules linked to the content extraction control module; and
c. one or more content storage devices linked to the content extraction control module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for providing distributed access control, comprising:
-
a. extracting and encapsulating access control information from a central database into a distributed module;
b. communicating said distributed module to one or more access control points;
c. receiving an access request from a prospective user at or through an access control point; and
d. evaluating the access request to determine if access by the prospective user is authorized. - View Dependent Claims (13, 14, 15)
-
Specification