METHOD AND SYSTEM FOR PERMITTING REMOTE CHECK-IN AND COORDINATING ACCESS CONTROL
First Claim
Patent Images
1. A facility, comprising:
- an access control module located within the facility, the access control module comprising;
access control logic configured to make a determination to either permit or deny user access to an asset controlled by the access control module; and
a check-in module configured to receive a credential identifier from an access credential, compare the credential identifier to a list of credential identifiers, determine that the credential identifier matches at least one credential identifier in the list of credential identifiers, and, based on determining that the credential identifier matches at least one credential identifier in the list of identifiers, invoke the access control module to encode the access credential with access data that is useable by the access credential with other access control modules within the multi-room facility.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and devices for controlling access within a multi-facility room are provided. More specifically, a guest of the multi-room facility is allowed to remotely confirm reservations to the facility as well as bypass the front desk of the multi-room for check-in purposes. At a location within the facility, the guest is allowed to confirm their arrival, check-in, and have their access credential written with personalized access data that may be useable for the duration of the guest'"'"'s stay.
95 Citations
19 Claims
-
1. A facility, comprising:
an access control module located within the facility, the access control module comprising; access control logic configured to make a determination to either permit or deny user access to an asset controlled by the access control module; and a check-in module configured to receive a credential identifier from an access credential, compare the credential identifier to a list of credential identifiers, determine that the credential identifier matches at least one credential identifier in the list of credential identifiers, and, based on determining that the credential identifier matches at least one credential identifier in the list of identifiers, invoke the access control module to encode the access credential with access data that is useable by the access credential with other access control modules within the multi-room facility. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A method of operating a facility having a first location with a credential programming system located in proximity therewith and a plurality of access control modules located within the facility, a first of the access control modules comprising access control logic configured to make a determination to either permit or deny user access to an asset controlled by the first access control module and a check-in module configured to perform check-in operations similar to the credential programming system, the method comprising:
-
receiving, at the first access control module, a message from an access credential, the message including a credential identifier; extracting, by the first access control module, the credential identifier from the message; comparing, by the first access control module, the credential identifier with credential identifiers contained within a list of credential identifiers maintained at the first access control module; determining that the credential identifier matches at least one credential identifier in the list of credential identifiers; and based on determining that the credential identifier matches at least one credential identifier in the list of identifiers, encoding, by the first access control module, the access credential with access data that enables the access credential to verify access permissions with the plurality of access control modules within the facility. - View Dependent Claims (12, 13, 14)
-
-
15. A method of managing a multi-room facility comprising a first asset and a second asset, the method comprising:
-
receiving, at a first access control module, a message from an access credential, the message including a credential identifier, wherein the first access control module comprises access control logic configured to make a determination to either permit or deny user access to the first asset; extracting, by the first access control module, the credential identifier from the message; comparing, by the first access control module, the credential identifier with credential identifiers contained within a list of credential identifiers maintained at the first access control module; determining that the credential identifier matches at least one credential identifier in the list of credential identifiers maintained at the first access control module; based on determining that the credential identifier matches at least one credential identifier in the list of identifiers maintained at the first access control module, permitting user access to the first asset; receiving, at a second access control module, a message from the access credential, the message including the credential identifier, wherein the second access control module comprises access control logic configured to make a determination to either permit or deny user access to the second asset and a check-in module configured to perform check-in operations; extracting, by the second access control module, the credential identifier from the message; comparing, by the second access control module, the credential identifier with credential identifiers contained within a list of credential identifiers maintained at the second access control module; determining that the credential identifier matches at least one credential identifier in the list of credential identifiers maintained at the second access control module; based on determining that the credential identifier matches at least one credential identifier in the list of identifiers maintained at the second access control module, encoding, by the second access control module, the access credential with access data that enables the access credential to verify access permissions with a plurality of access control modules within the multi-room facility, the plurality of access control modules including the first access control module and at least a third access control module. - View Dependent Claims (16, 17, 18, 19)
-
Specification