Systems and methods for implementing network connectivity awareness, monitoring and notification in distributed access control
First Claim
1. A system for implementing access control, comprising:
- a first communicating device that communicates with a plurality of access control checkpoint components;
a second communicating device that communicates with a plurality of access control databases;
an access resolution device thatreceives an individual access request from one of the plurality of access control checkpoint components via the first communicating device, the individual access request including identifying information for the individual, and identifying information for the one of the plurality of access control databases containing the information for the individual access verification,queries the one of the plurality of databases containing the information for the individual access verification according to the identifying information in the individual access request via the second communicating device,forwards access verification information for the individual received in response to the query to the one of the plurality of access control checkpoint components via the first communicating device, andforwards an access denial for the individual to the one of the plurality of access control checkpoint components via the first communicating device based on a failure to receive access verification information for the individual in response to the query; and
a connection assessment device thatdetermines that the failure to receive access verification information for a plurality of individuals in response to a plurality of queries to one of the plurality of access control databases is based on an interruption in communication between the access resolution device and the one of the plurality of access control databases via the second communicating device, andalerts a user to the interruption in communication.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are provided for monitoring and aggregating performance of a plurality of independently-controlled access points and connections to a plurality of independently-owned access databases for confirming access to one or more of an access-controlled space, one or more access-controlled pieces of equipment and/or one or more access-controlled devices. A scheme is provided by which disconnections between a central coordination facility, and one or more of the remote databases may be isolated. The central coordination facility is provided a capacity to identify an outage in its communication to a particular database and (1) to determine a cause for the outage through coordination with the entity overseeing the database, (2) to evaluate any need for technical interaction of the central coordination facility, and/or (3) to initiate a notification protocol for end-users attempting to gain/grant access to a particular space, piece of equipment or device.
-
Citations
20 Claims
-
1. A system for implementing access control, comprising:
-
a first communicating device that communicates with a plurality of access control checkpoint components; a second communicating device that communicates with a plurality of access control databases; an access resolution device that receives an individual access request from one of the plurality of access control checkpoint components via the first communicating device, the individual access request including identifying information for the individual, and identifying information for the one of the plurality of access control databases containing the information for the individual access verification, queries the one of the plurality of databases containing the information for the individual access verification according to the identifying information in the individual access request via the second communicating device, forwards access verification information for the individual received in response to the query to the one of the plurality of access control checkpoint components via the first communicating device, and forwards an access denial for the individual to the one of the plurality of access control checkpoint components via the first communicating device based on a failure to receive access verification information for the individual in response to the query; and a connection assessment device that determines that the failure to receive access verification information for a plurality of individuals in response to a plurality of queries to one of the plurality of access control databases is based on an interruption in communication between the access resolution device and the one of the plurality of access control databases via the second communicating device, and alerts a user to the interruption in communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for implementing access control, comprising:
-
receiving, with a processor, access authorization requests from a plurality of access control checkpoint components, each access authorization request identifying an individual requesting access and identifying information for the one of the plurality of access control databases containing the information for the individual access verification; forwarding, with the processor, queries to the identified ones of the plurality of access control databases containing the information for the individuals access verification; forwarding, with the processor, access verification information for the individuals received in response to the queries to the plurality of access control checkpoint components from which the access authorization requests are received; forwarding, with the processor, access denials for the individuals in response to the queries to the plurality of access control checkpoint components from which the access authorization requests are received on failures to receive access verification information for the individuals in response to the queries; determining, with the processor, that the failures to receive access verification information for a plurality of individuals in response to a plurality of queries to one of the plurality of access control databases are based on an interruption in communication with the one of the plurality of access control databases; and directing, with the processor, alerts to users regarding the interruption in communication. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory data storage medium storing instructions that, when executed by a processor, cause the processor to execute the steps of a method for implementing access control, the method comprising:
-
receiving access authorization requests from a plurality of access control checkpoint components, each access authorization request identifying an individual requesting access and identifying information for the one of the plurality of access control databases containing the information for the individual access verification; forwarding queries to the identified ones of the plurality of access control databases containing the information for the individuals access verification; forwarding access verification information for the individuals received in response to the queries to the plurality of access control checkpoint components from which the access authorization requests are received; forwarding access denials for the individuals in response to the queries to the plurality of access control checkpoint components from which the access authorization requests are received on failures to receive access verification information for the individuals in response to the queries; determining that the failures to receive access verification information for a plurality of individuals in response to a plurality of queries to one of the plurality of access control databases are based on an interruption in communication with the one of the plurality of access control databases; and directing alerts to users regarding the interruption in communication.
-
Specification