Architecture For Access Management
First Claim
Patent Images
1. A method comprises:
- listening by a guest user device for a beacon from a security system, the beacon including a message;
initiating by the guest user device a transaction with a kiosk in response to the message that causes a user wallet to send a user public key stored in the user wallet to the security server;
requesting by the user wallet from a security wallet of the security system an access code having a facility public key and a universal identifier credential exchange mechanism that allows a guest user wallet to verify the facility under control of an entity that issues its own credentials, by the facility having a unique certificate;
testing the facility public key and the universal identifier to determine whether they are legitimate;
sending by the user wallet a user profile corresponding the user associated with the user device to the security server when the public key and identifier are determined to be legitimate; and
receiving an access status message.
4 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. In particular, disclosed is a registration process to register an identity wallet with a facility.
19 Citations
12 Claims
-
1. A method comprises:
-
listening by a guest user device for a beacon from a security system, the beacon including a message; initiating by the guest user device a transaction with a kiosk in response to the message that causes a user wallet to send a user public key stored in the user wallet to the security server; requesting by the user wallet from a security wallet of the security system an access code having a facility public key and a universal identifier credential exchange mechanism that allows a guest user wallet to verify the facility under control of an entity that issues its own credentials, by the facility having a unique certificate; testing the facility public key and the universal identifier to determine whether they are legitimate; sending by the user wallet a user profile corresponding the user associated with the user device to the security server when the public key and identifier are determined to be legitimate; and receiving an access status message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprises:
-
a device that issues a beacon, the beacon including a message to cause a user device to initiate a transaction with a kiosk in response to the message with the message causing a user wallet to send a user public key stored in the user wallet to the security server; send in response to a request by the user wallet, an access code having a facility public key and a universal identifier credential exchange mechanism from a security wallet of the security system, which allow the user wallet to verify the facility under control of an entity that issues its own credentials, by the facility having a unique certificate; testing the facility public key and the universal identifier to determine whether they are legitimate; sending by the user wallet a user profile corresponding the user associated with the user device to the security server when the public key and identifier are determined to be legitimate; and receiving an access status message.
-
Specification