System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
First Claim
Patent Images
1. A method of operating a physical access control system protecting a secure asset, comprising:
- receiving a request following a first transaction between a reader of the physical access control system and a mobile device, the request corresponding to a determination that the mobile device is within proximity of the reader, the reader associated with a physical access point to the secure asset, the first transaction comprising receipt, by the reader, of a first credential stored at the mobile device for operating the physical access point;
generating a second credential for the mobile device based on data included in the request, the second credential being different from the first credential received by the reader in the first transaction; and
in response to the request, routing the second credential to the mobile device via a mobile communications network prior to a second transaction between the mobile device and the reader that is subsequent to the first transaction.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have credential data loaded thereon remotely updated, enabled, disabled, revoked, or otherwise altered with a message sent from, for example, a control panel and/or controller in the system.
125 Citations
31 Claims
-
1. A method of operating a physical access control system protecting a secure asset, comprising:
-
receiving a request following a first transaction between a reader of the physical access control system and a mobile device, the request corresponding to a determination that the mobile device is within proximity of the reader, the reader associated with a physical access point to the secure asset, the first transaction comprising receipt, by the reader, of a first credential stored at the mobile device for operating the physical access point; generating a second credential for the mobile device based on data included in the request, the second credential being different from the first credential received by the reader in the first transaction; and in response to the request, routing the second credential to the mobile device via a mobile communications network prior to a second transaction between the mobile device and the reader that is subsequent to the first transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A physical access control system protecting a secure asset, comprising:
a controller that is configured to perform operations comprising; receiving a request following a first transaction between a reader of the physical access control system and a mobile device, the request corresponding to a determination that the mobile device is within proximity of the reader, the reader associated with a physical access point to the secure asset, the first transaction comprising receipt, by the reader, of a first credential stored at the mobile device for operating the physical access point; generating a second credential for the mobile device based on data included in the request, the second credential being different from the first credential received by the reader in the first transaction; and in response to the request, routing the second credential to the mobile device via a mobile communications network prior to a second transaction between the mobile device and the reader that is subsequent to the first transaction. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
22. A non-transitory computer-readable medium comprising processor-executable instructions for operating a physical access control system protecting a secure asset, the instructions, when executed, are configured to cause a processor to perform operations comprising:
-
receiving a request following a first transaction between a reader of the physical access control system and a mobile device, the request corresponding to a determination that the mobile device is within proximity of the reader, the reader associated with a physical access point to the secure asset, the first transaction comprising receipt, by the reader, of a first credential stored at the mobile device for operating the physical access point; generating a second credential for the mobile device based on data included in the request, the second credential being different from the first credential received by the reader in the first transaction; and in response to the request, routing the second credential to the mobile device via a mobile communications network prior to a second transaction between the mobile device and the reader that is subsequent to the first transaction. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. A system of operating a physical access control system protecting a secure asset, comprising:
a mobile device that is configured to perform operations comprising; transmitting, via a mobile communications network, a request following a first transaction between a reader of the physical access control system and the mobile device, the reader associated with a physical access point to the secure asset, the request corresponding to a determination that the mobile device is within proximity of the reader, the first transaction comprising receipt, by the reader, of a first credential stored at the mobile device for operating the physical access point; and in response to the request, receiving, at the mobile device via the mobile communications network, a second credential for the mobile device generated based on data included in the request, the second credential different from the first credential received by the reader in the first transaction, the second credential received prior to a second transaction between the mobile device and the reader that is subsequent to the first transaction.
-
31. A physical access control system protecting a secure asset, comprising:
-
a mobile device configured to store credentials for operating a physical access point to the secure asset; and a controller that is configured to perform operations comprising; receiving a request following a first transaction between a reader of the physical access control system and the mobile device, the request corresponding to a determination that the mobile device is within proximity of the reader, the reader associated with the physical access point, the first transaction comprising receipt of a first credential stored at the mobile device; generating a second credential for the mobile device based on data included in the request, the second credential different from the first credential received by the reader in the first transaction; and in response to the request, routing the second credential to the mobile device via a mobile communications network prior to a second transaction between the mobile device and the reader that is subsequent to the first transaction.
-
Specification