SYSTEMS AND METHODS FOR A CREDENTIAL INCLUDING MULTIPLE ACCESS PRIVILEGES
First Claim
Patent Images
1. A credential for use in an access control system, comprising:
- a first sector including first data of a first database type;
a second sector including second data of a second database type; and
a third sector including third data related to the second data.
1 Assignment
0 Petitions
Accused Products
Abstract
A credential for use in an access control system may include a first sector including first data of a first database type, and a second sector including second data of a second database type. The credential may further include a third sector including third data related to the second data. The first database type and the second database type may he different types.
-
Citations
20 Claims
-
1. A credential for use in an access control system, comprising:
-
a first sector including first data of a first database type; a second sector including second data of a second database type; and a third sector including third data related to the second data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
reading, with a first lock, first data of a first database type from a first sector of a credential; reading, with a second lock, second data of a second database type from a second sector of the credential; and reading, with the second lock, third data from a third sector of the credential based on the second data; and wherein the first database type and the second database type are different. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A credential for use in an access control system, comprising:
-
a first sector including first data of a first database type; a second sector including second data of a second database type; and a third sector including third data related to the second data; and wherein the second data further includes a look-up table for the third data stored in the third sector; wherein the third data includes access privileges for a user; wherein the access privileges include the fields of a personal identification number (PIN), function, user type, activation, deactivation, and door/group identifier; wherein the second data includes a facility code and a unique identifier (UID) for the user; and wherein the first database type and the second database type are different. - View Dependent Claims (19, 20)
-
Specification