System of non-intrusive access control and method thereof
First Claim
Patent Images
1. A non-intrusive access control method, comprising the steps of:
- acquiring identification of tags existing in a detection area;
determining user roles represented by the tags based on the acquired identification thereof, wherein each user role has been assigned a rank;
retrieving identification of a first tag corresponding to a user role with the highest rank;
acquiring real-time circumstance information related to the detection area; and
determining whether the tags are permitted based on circumstance identification corresponding to the detection area, the identification of the first tag, and the real-time circumstance information.
1 Assignment
0 Petitions
Accused Products
Abstract
A non-intrusive access control method. First, identification of a tag and real-time circumstance information both related to a detection area are acquired. Next, whether the tag is permitted is determined based on circumstance identification corresponding to the detection area, the tag and the real-time circumstance information.
-
Citations
22 Claims
-
1. A non-intrusive access control method, comprising the steps of:
-
acquiring identification of tags existing in a detection area; determining user roles represented by the tags based on the acquired identification thereof, wherein each user role has been assigned a rank; retrieving identification of a first tag corresponding to a user role with the highest rank; acquiring real-time circumstance information related to the detection area; and determining whether the tags are permitted based on circumstance identification corresponding to the detection area, the identification of the first tag, and the real-time circumstance information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An non-intrusive access control system, comprising:
-
a sensor for acquiring identification of tags and real-time circumstance information from a detection area; and a computing device for determining user roles represented by the tags based on the acquired identification thereof, wherein each user role has been assigned a rank, and the computing device retrieves identification of a first tag corresponding to a user role with the highest rank and determines whether the tags are permitted based on circumstance identification corresponding to the detection area, the identification of the first tag, and real-time circumstance information. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification