ACCESS CONTROL SYSTEM AND METHOD
First Claim
1. An access control system for enabling access by an authorized user having a mobile device, the system comprising:
- a computer system having stored programming instructions configured to cause the computer system to;
identify the user at an area-based location;
send a first access code to the mobile device representing additional authorizing information;
receive the first access code within a predefined interval of time; and
unlock the access based on a determination that the access code is valid and the identification of the user at the area-based location.
1 Assignment
0 Petitions
Accused Products
Abstract
An access control system and method for permitting access by a user having a mobile device, based on a determined location for the user and additional authentication information sent to the mobile device. A computer system has stored programming instructions configured to cause the computer system to identify the user at an area-based location, send a first access code to the mobile device representing additional authorizing information, receive the first access code within a predefined interval of time, and unlock the access based on a determination that the access code is valid and the identification of the user at the area-based location.
-
Citations
29 Claims
-
1. An access control system for enabling access by an authorized user having a mobile device, the system comprising:
a computer system having stored programming instructions configured to cause the computer system to; identify the user at an area-based location; send a first access code to the mobile device representing additional authorizing information; receive the first access code within a predefined interval of time; and unlock the access based on a determination that the access code is valid and the identification of the user at the area-based location.
-
2. The system of claim 1 wherein the computer system is distributed among a plurality of computers.
-
3. The system of claim 1, wherein the computer system is further configured to learn a semantic rule by:
-
mapping a first endpoint in a semantic network model to a first location; mapping a second endpoint in the semantic network model to a second location; determining that the user is at the first endpoint and receiving an input from the user; determining that the user is present at the second endpoint; determining an oriented link based on the determined presence of the user at the first endpoint and the second endpoint; and associating a semantic attribute to the oriented link based on the user input.
-
-
4. The system of claim 1 wherein the computer system identifies the authorized user by identity and access information provided by user.
-
5. The system of claim 1 wherein the computer system identifies the user at the area-based location based on a RFID device.
-
6. The system of claim 1, wherein the computer system unlocks the access by controlling at least one device.
-
7. The system of claim 1, wherein the computer system further stores a semantic network model comprising endpoints and oriented links between the endpoints, and wherein at least a subset of the oriented links is associated with semantic attributes.
-
8. The system of claim 7, wherein the computer system determines a semantic attribute for the user based on an identification of the user at a first endpoint corresponding to the area-based location and at a second endpoint.
-
9. The system of claim 7, wherein the semantic network model is further associated with at least one device and the computer is configured to unlock the access by sending a signal to the at least one device.
-
10. The system of claim 7, wherein the semantic network model is further associated with at least one device and the computer is configured to unlock the access by controlling the at least one device based on an access control rule.
-
11. The system of claim 1, wherein the computer system further stores a semantic network model having a plurality of elements including endpoints and oriented links between the endpoints and wherein at least one element from among the plurality of elements is associated with an access control rule.
-
12. The system of claim 11, wherein the semantic network model is further associated with at least one device and the computer is configured to unlock the access by controlling the at least one device based on an access control rule.
-
13. The system of claim 11, wherein the semantic network model is further associated with at least one device and the computer is configured to unlock the access by sending a signal to the at least one device.
-
14. The system of claim 1, wherein the computer system further stores a semantic network model having endpoints and oriented links, and further wherein the semantic network model is hierarchical.
-
15. The system of claim 14, wherein the semantic network model is further associated with at least one device and the computer is configured to unlock the access by sending a signal to the at least one device.
-
16. The system of claim 14, wherein the semantic network model is further associated with at least one device and the computer is configured to unlock the access by controlling the at least one device based on an access control rule.
-
17. The system of claim 14, wherein the semantic network model is further associated with at least a first and a second semantic attribute and the computer system infers the first semantic attribute at a first level of hierarchy of a semantic network graph and further the computer system infers the second semantic attribute at a second level of hierarchy of the semantic network graph, wherein the first and second semantic attributes are determined based on the same event in relation to the user.
-
18. The system of claim 1, wherein the computer system is configured to accept time intervals, and wherein the computer system adjusts at least one configuration setting based on the time intervals and values associated with the time intervals.
-
19. The system of claim 1, wherein the computer system is configured to accept security levels, and wherein the computer system adjusts at least one configuration setting based on their associated levels.
-
20. The system of claim 1, wherein the computer system unlocking the access is further associated with an access control rule.
-
21. An access control method comprising:
-
determining a user permission of access based on an identification of the user and a localization of the user within an area; based on the determination that the user is authorized, sending an access code to a mobile device associated with the user; receiving the access code within a predefined interval of time; determining that the access code is valid; and permitting the access based on the determination that the access code is valid.
-
-
22. The method of claim 21 wherein the user identification comprises identity and access information provided by the user.
-
23. The method of claim 21 wherein the user is associated with an identity in a radio frequency network.
-
24. The method of claim 21, wherein the step of permitting the access comprises controlling at least one device.
-
25. The method of claim 21, wherein the access control method is performed by a computer system, the method further comprising storing, in the computer system, a semantic network model comprising endpoints and oriented links between the endpoints, and wherein at least a subset of the oriented links is associated with semantic attributes.
-
26. The method of claim 25, further comprising determining a semantic attribute for the user based on a validation of the user at a first endpoint and at a second endpoint.
-
27. The method of claim 21, wherein the access control method is performed by a computer system, the method further comprising storing, in the computer system, a semantic network model having endpoints and oriented links, wherein the semantic network model is hierarchical.
-
28. The method of claim 21, wherein the access control method is performed by a computer system, the method further comprising storing, in the computer system, a semantic network model having elements including endpoints and oriented links between the endpoints and wherein at least one element is associated with an access control rule.
-
29. The method of claim 21, wherein the permitting the access is associated with an access control rule.
Specification