×

Systems and methods for managing configuration data at disconnected remote devices

  • US 9,280,365 B2
  • Filed: 12/16/2010
  • Issued: 03/08/2016
  • Est. Priority Date: 12/17/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by an access control device of a host access control system, for managing configuration data, the method comprising the steps of:

  • the access control device determining whether it has a network connection to a server device of the host access control system;

    the access control device, in response to determining that it does not have a network connection to a server device of the host access control system, adopting a disconnected mode of operation;

    the access control device reading an access control smartcard, wherein the access control smartcard carries data comprising;

    (i) user credential data configured to enable an authorization/authentication process to determine whether or not access should be granted in response to reading of the access control smartcard; and

    (ii) configuration data including threat level data;

    the access control device, in response to reading the access control smartcard, performing an automated process comprising;

    (a) reading the configuration data including threat level data from the access control smartcard, wherein the threat level data is a form of configuration data, wherein the configuration data including threat level data, when successfully applied by the access control device, is used by the access control device to determine at least part of the functionality of the remote device when operated in the disconnected mode, including threat-level specific functionality of a given authorization/authentication process to determine whether or not access should be granted;

    (b) determining version information for the configuration data including threat level data carried by the access control smartcard;

    (c) comparing the version information of the configuration data including threat level data carried by the access control smartcard with version information of configuration data including threat level data applied by the access control device;

    (d) in the case that the version information for the configuration data including threat level data carried by the access control smartcard supersedes version information of configuration data including threat level data applied by the access control device, selectively applying the configuration data including threat level data carried by the access control smartcard to the access control device; and

    (e) in the case that the version information for the configuration data including threat level data carried by the access control device supersedes version information of configuration data applied by the access control smartcard, writing the configuration data including threat level data carried by the access control device to the access control smartcard, and configuring the access control smartcard to cause a further disconnected access control device of the host access control system to, following presentation of the access control smartcard to the further disconnected access control device, selectively apply the written configuration data including threat level data; and

    the access control device subsequently performing the authorization/authentication process to determine whether or not access should be granted based on the presentation of the access control smartcard, using configuration data including threat level data current applied by the access control device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×