Detecting and responding to an atypical behavior
First Claim
Patent Images
1. A method, comprising:
- creating a number of records each associated with a presentation of a credential device to a reader for authentication, wherein the reader, at least in part, controls access to the interior of a secure premises and wherein, in response to the presentation of the credential device to the reader by a user, access to the interior of the secure premises was granted to the user;
analyzing, by a processor, at least two of the number of records to determine a predicted behavior from the analyzed number of records; and
setting an indicator upon the analysis further determining that at least one of the number of records indicates a behavior atypical of the determined predicted behavior.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided herein various mechanisms to provide a modified agent path such that an agent following the modified agent path, may update at least one non-networked reader. The update of the at least one non-networked reader not occurring if the agent follows an unmodified agent path.
-
Citations
20 Claims
-
1. A method, comprising:
-
creating a number of records each associated with a presentation of a credential device to a reader for authentication, wherein the reader, at least in part, controls access to the interior of a secure premises and wherein, in response to the presentation of the credential device to the reader by a user, access to the interior of the secure premises was granted to the user; analyzing, by a processor, at least two of the number of records to determine a predicted behavior from the analyzed number of records; and setting an indicator upon the analysis further determining that at least one of the number of records indicates a behavior atypical of the determined predicted behavior. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a reader, at least in part, controlling access to the interior of a secure premises, and operable to read a credential device; a storage medium; and a processor operable to; create a number of records, ones of the records being associated with the presentation of the credential device to the reader and wherein, in response to the presentation of the credential device to the reader by a user, access to the interior of the secure premises was granted to the user, store the records in the storage medium, analyze at least two of the number of records to determine a predicted behavior from fields of the number of records, and set an indicator upon the analysis further determining that at least one of the records deviates from the determined predicted behavior. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A portable credential device, comprising:
-
a storage medium; and a processor operable to; create a number of records, each record associated with the presentation of the credential device to the reader and wherein, in response to the presentation of the credential device to the reader by a user, access to the interior of the secure premises was granted to the user, store the records in the storage medium, analyze at least two of the number of records to determine an predicted behavior from fields of the number of records, and set an indicator upon the analysis further determining that at least one of the records deviates from the determined predicted behavior. - View Dependent Claims (18, 19, 20)
-
Specification