Detection and visualization of patterns and associations in access card data
First Claim
1. A computer implemented method of processing access control data generated in connection with access control cards, the method comprising:
- reading a log file containing data generated by an access control system that reads the access control cards in connection with restricted areas; and
,detecting unusual access patterns from the data in the log file.
1 Assignment
0 Petitions
Accused Products
Abstract
A log file is generated from data supplied by cards readers that are part of an access control system and that read access control cards in connection with restricted areas. Probabilities of card holders entering the restricted areas are computed based on the data in the log file. Unusual access patterns are detected from the data in the log file based on the computed probabilities. Group associations between card holders are detected based on common movement of the card holders in connection with the restricted areas. A new log file is created based on those of the detected unusual access patterns that are not associated with the group associations.
52 Citations
29 Claims
-
1. A computer implemented method of processing access control data generated in connection with access control cards, the method comprising:
-
reading a log file containing data generated by an access control system that reads the access control cards in connection with restricted areas; and
,detecting unusual access patterns from the data in the log file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer readable storage medium having program code stored thereon, the program code when executed performing the following functions:
-
generating a log file from data supplied by cards readers that read access control cards in connection with restricted areas; computing probabilities of card holders entering the restricted areas, wherein the probabilities are computed based on the data in the log file; and
,detecting unusual access patterns based on the computed probabilities. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer implemented method of processing access control data generated in connection with access control cards, the method comprising:
-
generating a log file from the access control data supplied by cards readers that read the access control cards in connection with restricted areas; computing probabilities of card holders entering the restricted areas, wherein-the probabilities are computed based on the data in the log file; detecting unusual access patterns from the data in the log file based on the computed probabilities; detecting group associations between card holders based on common movement of the card holders in connection with the restricted areas; and
,creating a new log file based on the detected unusual access patterns that are not associated with the group associations. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
Specification