ENTRY CONTROL SYSTEM
3 Assignments
0 Petitions
Accused Products
Abstract
An integrated security system which seamlessly assimilates with current generation logical security systems. The integrated security system incorporates a security controller having standard network interface capabilities including WEE 802.x and takes advantage of the convenience and security offered by smart cards and related devices for both physical and logical security purposes. The invention is based on standard remote authentication dial-in service (RADIUS) protocols or TCP/IP using SSL, TLS, PCT or IPsec and stores a shared secret required by the secure communication protocols in a secure access module coupled to the security controller. The security controller is intended to be a networked client or embedded intelligent device controlled remotely by to an authentication server. In another embodiment of the invention one or more life cycle management transactions are performed with the secure access module. These transactions allow for the updating, replacement, deletion and creation of critical security parameters, cryptographic keys, user data and applications used by the secure access module and/or security token. In another embodiment of the invention a security access module associated with the security controller locally performs local authentication transactions which are recorded in a local access list used to update a master access list maintained by the authentication server.
-
Citations
57 Claims
-
1-36. -36. (canceled)
-
37. A method for physically controlling access to a protected location, comprising:
-
establishing a secure communications connection over a network between a security controller and an authentication server; operatively coupling a security token to the security controller; providing a critical security parameter to the security controller for authentication after using a token remote authentication application on the security token to verify the critical security parameter against one or more reference critical security parameters; sending the critical security parameter to the authentication server via the secure communications connection; performing an authentication transaction at the authentication server for the critical security parameter; sending a result of the authentication transaction from the authentication server to the security controller via one of;
the secure communications connection or the security token; andenergizing an electromechanical circuit coupled to and controlled by the security controller if the result of the authentication transaction is successful. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A method for physically controlling access to a protected location, comprising:
-
providing one or more critical security parameters to a security controller for authentication after using a token remote authentication application on a security token to verify a critical security parameter against one or more reference critical security parameters; performing one or more authentication transactions using the one or more critical security parameters; temporarily maintaining a local access list of the one or more critical security parameters which have been authenticated; sending the local access list to an authentication server; updating a master access list maintained by the authentication server; and energizing an electromechanical circuit coupled to and controlled by the security controller if a result of the one or more authentication transaction is successful. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
Specification