LOGGING ACCESS ATTEMPTS TO AN AREA
2 Assignments
0 Petitions
Accused Products
Abstract
Logging events associated with accessing an area includes recording an event associated with accessing the area to provide an event recording and authenticating at least the event recording to provide an authenticated recording. Recording an event may include recording a time of the event. Recording an event may include recording a type of event. The event may be an attempt to access the area. Recording an event may include recording credentials/proofs used in connection with the attempt to access the area. Recording an event may include recording a result of the attempt. Recording an event may include recording the existence of data other than the credentials/proofs indicating that access should be denied. Recording an event may include recording additional data related to the area. Authenticating the recording may include digitally signing the recording.
-
Citations
56 Claims
-
1-39. -39. (canceled)
-
40. A method of logging events associated with accessing an area, comprising:
-
recording an event associated with accessing the area to provide an event recording, wherein the event recording is generated after an attempt to access the area, and wherein the event recording includes log entry information that logs the attempt to access the area and is created separately from information presented as part of a request for access during the attempt to access the area; and authenticating at least the event recording to provide an authenticated recording, wherein the authenticated recording is authenticated at least in part by a door used in the attempt to access the area, the authenticated recording being generated at the door. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A method of logging events associated with accessing an area, comprising:
-
recording an event associated with accessing the area to provide an event recording, wherein the event recording is generated after an attempt to access the area and wherein the event recording includes log entry information that logs the attempt to access the area and is created separately from information presented as part of a request for access during the attempt to access the area; authenticating at least the event recording to provide an authenticated recording, wherein the authenticated recording is authenticated at least in part by a door used in the attempt to access the area, the authenticated recording being generated at the door; and disseminating the authenticated recording from the door via a transaction that is unrelated to the attempt to access the area. - View Dependent Claims (56)
-
Specification