Apparatus for distributed data storage of security identification and security access system and method of use thereof
First Claim
1. A system for secure access control comprising:
- a controller having a unique identifier;
a controllable access portal in communication with the controller;
a first reader in communication with the controller;
a data card, removably connectable to the reader, for storing the unique identifier list; and
,the controller programmed to upload the unique identifier list from the data card, compare the unique identifier to the unique identifier list and to open the controllable access portal if the unique identifier is in the unique identifier list.
0 Assignments
0 Petitions
Accused Products
Abstract
An apparatus and method are provided to control the entry and tracking of individuals into and through controlled areas for security. A novel system is provided which stores data in a collection of portable data carriers of various formats and flash memory. A method is further provided to control the so called “anti-passback” of individuals into controlled areas. Still further provided is a system which allows storage and dissemination of control information for security system operation on the collection of data carriers allowing the intelligence of the reader system to be low compared to the network security systems of the prior art. Controlling data can include data pointers, program components, executable files and various operating systems.
-
Citations
53 Claims
-
1. A system for secure access control comprising:
-
a controller having a unique identifier; a controllable access portal in communication with the controller; a first reader in communication with the controller; a data card, removably connectable to the reader, for storing the unique identifier list; and
,the controller programmed to upload the unique identifier list from the data card, compare the unique identifier to the unique identifier list and to open the controllable access portal if the unique identifier is in the unique identifier list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20, 21, 22)
-
-
15. The system of claim 15 wherein the tracking field contains a stack of data related to a physical location of the data card.
-
23. A system for controlling access to controlled areas comprising:
-
a first programmable controller having a first unique identifier and a first key access connector; a first controllable lock operatively connected to the first controller; a second programmable controller having a second unique identifier and a second key access connector; a second controllable lock operatively connected to the second controller; a first access key removably connectable to the first key access connector and the second key access connector and having a first readable memory programmed with the first unique identifier and the second unique identifier and wherein; the first programmable controller is programmed to; read the first readable memory and identify the first unique identifier; and open the controllable lock to allow access to the controlled areas upon identification of the first unique identifier. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A method of verifying the access authorization of an access card comprising:
-
presenting the access card to a reader connected to a controller having a unique GUID; uploading a GUID list from the access card to the controller; receiving a decision from the controller as to the presence of the GUID on the GUID list; not blocking access authorization if the GUID is on the GUID list; and blocking access authorization if the GUID is not on the GUID list. - View Dependent Claims (43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53)
-
Specification