Logging access attempts to an area
First Claim
1. A method of logging events associated with accessing an area, comprising:
- recording an event associated with accessing the area to provide an event recording, wherein the event recording is generated after an attempt to access the area, and wherein the event recording includes log entry information that logs the attempt to access the area and is created separately from information presented as part of a request for access during the attempt to access the area; and
authenticating at least the event recording to provide an authenticated recording, wherein the authenticated recording is authenticated at least in part by a door used in the attempt to access the area, the authenticated recording being generated at the door, wherein the door is a disconnected door that, at least intermittently and while generating the authenticated recording, is not able to electronically communicate with any network, and wherein generating the authenticated recording at the door includes the door digitally signing at least one entry of the event recording.
5 Assignments
0 Petitions
Accused Products
Abstract
Logging events associated with accessing an area includes recording an event associated with accessing the area to provide an event recording and authenticating at least the event recording to provide an authenticated recording. Recording an event may include recording a time of the event. Recording an event may include recording a type of event. The event may be an attempt to access the area. Recording an event may include recording credentials/proofs used in connection with the attempt to access the area. Recording an event may include recording a result of the attempt. Recording an event may include recording the existence of data other than the credentials/proofs indicating that access should be denied. Recording an event may include recording additional data related to the area. Authenticating the recording may include digitally signing the recording. Authenticating at least the event recording may include authenticating the event recording and authenticating other event recordings to provide a single authenticated recording.
192 Citations
40 Claims
-
1. A method of logging events associated with accessing an area, comprising:
-
recording an event associated with accessing the area to provide an event recording, wherein the event recording is generated after an attempt to access the area, and wherein the event recording includes log entry information that logs the attempt to access the area and is created separately from information presented as part of a request for access during the attempt to access the area; and authenticating at least the event recording to provide an authenticated recording, wherein the authenticated recording is authenticated at least in part by a door used in the attempt to access the area, the authenticated recording being generated at the door, wherein the door is a disconnected door that, at least intermittently and while generating the authenticated recording, is not able to electronically communicate with any network, and wherein generating the authenticated recording at the door includes the door digitally signing at least one entry of the event recording. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method of logging events associated with accessing an area, comprising:
-
recording an event associated with accessing the area to provide an event recording, wherein the event recording is generated after an attempt to access the area and wherein the event recording includes log entry information that logs the attempt to access the area and is created separately from information presented as part of a request for access during the attempt to access the area; authenticating at least the event recording to provide an authenticated recording, wherein the authenticated recording is authenticated at least in part by a door used in the attempt to access the area, the authenticated recording being generated at the door, wherein the door is a disconnected door that, at least intermittently and while generating the authenticated recording, is not able to electronically communicate with any network, and wherein generating the authenticated recording at the door includes the door digitally signing at least one entry of the event recording; and disseminating the authenticated recording from the door via a transaction that is unrelated to the attempt to access the area. - View Dependent Claims (40)
-
Specification