METHOD AND APPARATUS FOR MAKING A DECISION ON A CARD
First Claim
Patent Images
1. An access control system, comprising:
- a reader configured to protect one or more assets;
a mobile device capable of communicating with the reader;
a blacklist containing information related to at least one of;
(i) readers to which the mobile device or a user thereof is not allowed to obtain access and (ii) mobile devices or users thereof to which the reader is not allowed to grant access; and
wherein the blacklist is stored on at least one of the reader and the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network.
27 Citations
20 Claims
-
1. An access control system, comprising:
-
a reader configured to protect one or more assets; a mobile device capable of communicating with the reader; a blacklist containing information related to at least one of;
(i) readers to which the mobile device or a user thereof is not allowed to obtain access and (ii) mobile devices or users thereof to which the reader is not allowed to grant access; andwherein the blacklist is stored on at least one of the reader and the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of operating an access control system, comprising:
-
maintaining a blacklist containing information related to at least one of;
(i) readers to which a credential or a user thereof is not allowed to obtain access and (ii) credentials or users thereof to which the reader is not allowed to grant access; andcommunicating at least parts of the blacklist to at least one of readers and credentials in the access control system thereby enabling access control decisions to be made based on information contained in the blacklist. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification