System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
First Claim
Patent Images
1. A method of controlling physical access to a secure asset, comprising:
- transmitting, by a reader of a physical access control system associated with a physical access point of the secure asset, an interrogating radio frequency (RF) signal to a mobile device, the interrogating RF signal comprising a first credential that is unique to the reader;
receiving, at the reader from the mobile device, an RF response to the interrogating RF signal, the RF response comprising;
a second credential that is unique to the mobile device, anddata associated with an access control decision by the mobile device with respect to the reader; and
controlling the physical access point, with the reader, to permit or deny a holder of the mobile device access to the secure asset based on the RF response to the interrogating RF signal.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have credential data loaded thereon remotely updated, enabled, disabled, revoked, or otherwise altered with a message sent from, for example, a control panel and/or controller in the system.
-
Citations
23 Claims
-
1. A method of controlling physical access to a secure asset, comprising:
-
transmitting, by a reader of a physical access control system associated with a physical access point of the secure asset, an interrogating radio frequency (RF) signal to a mobile device, the interrogating RF signal comprising a first credential that is unique to the reader; receiving, at the reader from the mobile device, an RF response to the interrogating RF signal, the RF response comprising; a second credential that is unique to the mobile device, and data associated with an access control decision by the mobile device with respect to the reader; and controlling the physical access point, with the reader, to permit or deny a holder of the mobile device access to the secure asset based on the RF response to the interrogating RF signal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
a reader of a physical access control system associated with a physical access point of a secure asset, wherein the reader is configured to perform operations comprising; transmitting an interrogating radio frequency (RF) signal to a mobile device, the interrogating RF signal comprising a first credential that is unique to the reader; receiving, from the mobile device, an RF response to the interrogating RF signal, the RF response comprising; a second credential that is unique to the mobile device, and data associated with an access control decision by the mobile device with respect to the reader; and controlling the physical access point to permit or deny a holder of the mobile device access to the secure asset based on the RF response to the interrogating RF signal. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
20. An access control system, comprising:
-
a processor; and memory comprising processor-executable instructions that, when executed by the processor, enable the processor to perform operations comprising; receiving, at a mobile device, an interrogating radio frequency (RF) signal from a reader of a physical access control system associated with a physical access point of a secure asset, the interrogating RF signal comprising a first credential that is unique to the reader; in response to receiving the interrogating RF signal, performing an access control decision by the mobile device with respect to the reader; and transmitting, from the mobile device to the reader, an RF response to the interrogating RF signal, the RF response comprising; a second credential, and data associated with the access control decision by the mobile device with respect to the reader, wherein the physical access point is controlled by the reader to permit or deny a holder of the mobile device access to the secure asset based on the RF response to the interrogating RF signal. - View Dependent Claims (21, 22, 23)
-
Specification