Integration of Physical Access Control
First Claim
1. A security identification system that operates in conjunction with a plurality of network authenticators, comprising:
- a computerized certificate application configured to receive a plurality of security credentials from the plurality of network authenticators, wherein each received security credential comprises an access code to a locked physical facility, and wherein each received security credential has been differently coded in comparison to at least one other security credential received by the certificate application, wherein the computerized certificate application processes different types of security credentials prepared by different types of network authenticators and prepares security access certificates from the received security credentials; and
a transceiver package configured to receive a plurality of security credentials from the plurality of network authenticators and further configured to transmit security access control certificates prepared by the computerized certificate application to at least one sensor associated with a locked physical facility wherein transmitted security access control certificates engage unlocking the locked physical facility for a user associated with the computerized certificate application; and
a data repository configured to store security access control certificates prepared by the computerized certificate application.
3 Assignments
0 Petitions
Accused Products
Abstract
A security identification system is described that receives and processes multiple security credentials that have been configured by different network authenticators, devices configured to provide security credentials to user access devices, such as mobile phones and bracelets. The security identification system having multiple security certificates allows an employee to enter different locked physical facilities maintained by an employer when each of the locked physical facilities has been secured by a different security protocol, including security protocols provided by different security vendors. The security identification system may obtain security credentials over a network cloud service. The security identification system may take a variety of wearable forms, such as a bracelet, eyeglasses, rings, or ear buds, as well as forms such as a mobile phone. The security identification system may include a biometric reading device that measures users to verify that the person controlling an access device is its authorized user.
51 Citations
23 Claims
-
1. A security identification system that operates in conjunction with a plurality of network authenticators, comprising:
-
a computerized certificate application configured to receive a plurality of security credentials from the plurality of network authenticators, wherein each received security credential comprises an access code to a locked physical facility, and wherein each received security credential has been differently coded in comparison to at least one other security credential received by the certificate application, wherein the computerized certificate application processes different types of security credentials prepared by different types of network authenticators and prepares security access certificates from the received security credentials; and a transceiver package configured to receive a plurality of security credentials from the plurality of network authenticators and further configured to transmit security access control certificates prepared by the computerized certificate application to at least one sensor associated with a locked physical facility wherein transmitted security access control certificates engage unlocking the locked physical facility for a user associated with the computerized certificate application; and a data repository configured to store security access control certificates prepared by the computerized certificate application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for providing a security identification system that operates in conjunction with a plurality of network authenticators, comprising:
-
receiving a plurality of security credentials on a computerized certificate application from the plurality of network authenticators, wherein each security credential comprises an access code to a locked physical facility, and wherein each security credential has been uniquely coded in comparison to at least one other security credential received by the computerized certificate application, and wherein the computerized certificate application processes different types of security credentials prepared by different types of network authenticators and prepares security access certificates from the received security credentials; receiving a plurality of security credentials from the plurality of network authenticators by a transceiver package and transmitting security access control certificates prepared by the computerized certificate application to at least one sensor associated with a locked physical facility wherein transmitted security access control certificates engage unlocking the locked physical facility for a user associated with the computerized certificate application; and storing security access control certificates prepared by the computerized certificate application in a data repository. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification