Controlling access to an area
First Claim
1. A method of controlling access, comprising:
- providing a barrier to access that includes a controller that selectively allows access;
at least one administration entity generating credentials/proofs, wherein the credentials/proofs include credentials and a plurality of proofs, wherein the plurality of proofs are not determinable as valid given only the credentials and values for expired proofs, wherein the credentials include a final value and the expired proofs are no longer valid, and wherein each of the plurality of proofs is a result of applying a one way function to a subsequent one of the plurality of proofs, and comparing the result with the final value;
the controller receiving the credentials and at least one of the plurality of proofs;
the controller determining if access is presently authorized, wherein the determining includes applying the one way function to the at least one of the plurality of proofs; and
if access is presently authorized, the controller allowing access.
5 Assignments
0 Petitions
Accused Products
Abstract
Controlling access includes providing a barrier to access that includes a controller that selectively allows access, at least one administration entity generating credentials/proofs, wherein no valid proofs are determinable given only the credentials and values for expired proofs, the controller receiving the credentials/proofs, the controller determining if access is presently authorized, and, if access is presently authorized, the controller allowing access. The credentials/proofs may be in one part or may be in separate parts. There may be a first administration entity that generates the credentials and other administration entities that generate proofs. The first administration entity may also generate proofs or the first administration entity may not generate proofs. The credentials may correspond to a digital certificate that includes a final value that is a result of applying a one way function to a first one of the proofs.
-
Citations
29 Claims
-
1. A method of controlling access, comprising:
-
providing a barrier to access that includes a controller that selectively allows access;
at least one administration entity generating credentials/proofs, wherein the credentials/proofs include credentials and a plurality of proofs, wherein the plurality of proofs are not determinable as valid given only the credentials and values for expired proofs, wherein the credentials include a final value and the expired proofs are no longer valid, and wherein each of the plurality of proofs is a result of applying a one way function to a subsequent one of the plurality of proofs, and comparing the result with the final value;the controller receiving the credentials and at least one of the plurality of proofs; the controller determining if access is presently authorized, wherein the determining includes applying the one way function to the at least one of the plurality of proofs; and if access is presently authorized, the controller allowing access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification