System and method of collecting data in an access control system
First Claim
1. A method of collecting data in a lock system, the method comprising:
- providing each user with a credential that contains user information;
presenting the credential at an off-line access point;
reading the user information from the credential;
analyzing the user information at the first off-line access point to determine if access to the first off-line access point should be allowed;
sending event data from the off-line access point to the credential;
selectively overwriting existing event data and storing the sent event data on the credential;
presenting the credential at an on-line access point; and
reading the user data and reading the event data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of collecting data in a lock system. The method includes providing each user with a credential that contains user information, presenting the credential at an off-line access point, and reading the user information from the credential. The method also includes analyzing the user information at the first off-line access point to determine if access to the first off-line access point should be allowed, sending event data from the off-line access point to the credential, and selectively overwriting existing event data and storing the sent event data on the credential. The invention further includes presenting the credential at an on-line access point and reading the user data and reading the event data.
32 Citations
24 Claims
-
1. A method of collecting data in a lock system, the method comprising:
-
providing each user with a credential that contains user information; presenting the credential at an off-line access point; reading the user information from the credential; analyzing the user information at the first off-line access point to determine if access to the first off-line access point should be allowed; sending event data from the off-line access point to the credential; selectively overwriting existing event data and storing the sent event data on the credential; presenting the credential at an on-line access point; and reading the user data and reading the event data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of collecting data in a lock system in which each user possesses a credential that includes user information, the method comprising:
-
presenting the credential at an off-line access point; storing event data from the off-line access point on the credential; presenting the credential at an on-line access point; transferring the event data from the credential through the on-line access point to a central system; storing verification data on the credential; re-presenting the credential at the off-line access point; and erasing event data from the off-line access point in response to receipt of the verification data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of collecting data in a lock system, the method comprising:
-
presenting a credential at an on-line access point, the credential including event data and user data; storing the event data in a central system and storing verification data on the credential; reading the user data and the verification data from the credential at a first off-line access point; selectively erasing event data that corresponds to the verification data from the first off-line access point; storing first off-line access point event data on the credential, the first off-line access point event data including a priority assigned by the first off-line access point. - View Dependent Claims (21, 22, 23, 24)
-
Specification