System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
First Claim
Patent Images
1. A method of relaying information relating to activities in a physical access control system associated with a lock coupled to a physical access point to a secure asset, comprising:
- detecting an activity at a reader of the physical access control system, the activity comprising an access control decision executed by a first mobile device based on exchanged communications of credential information between the reader and the first mobile device;
storing information relating to the detected activity in one or more log files, the information relating to the detected activity including access decision information corresponding to at least one of a user identity, a time of access decision, a location of access decision, and an access decision identifier;
receiving, with one or more servers of the physical access control system, the one or more log files via the first mobile device, the one or more servers being separate and remote from the first mobile device;
selecting, with the one or more servers, a second mobile device that is different than the first mobile device for receiving the one or more log files; and
sending, with the one or more servers, the one or more log files to the selected second mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is generally directed toward a mobile device that can be used in a secure access system. More specifically, the mobile device can have credential data loaded thereon remotely updated, enabled, disabled, revoked, or otherwise altered with a message sent from, for example, a control panel and/or controller in the system.
125 Citations
20 Claims
-
1. A method of relaying information relating to activities in a physical access control system associated with a lock coupled to a physical access point to a secure asset, comprising:
-
detecting an activity at a reader of the physical access control system, the activity comprising an access control decision executed by a first mobile device based on exchanged communications of credential information between the reader and the first mobile device; storing information relating to the detected activity in one or more log files, the information relating to the detected activity including access decision information corresponding to at least one of a user identity, a time of access decision, a location of access decision, and an access decision identifier; receiving, with one or more servers of the physical access control system, the one or more log files via the first mobile device, the one or more servers being separate and remote from the first mobile device; selecting, with the one or more servers, a second mobile device that is different than the first mobile device for receiving the one or more log files; and sending, with the one or more servers, the one or more log files to the selected second mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium having stored thereon computer executable instructions that, when executed by a processor, perform a method comprising:
-
receiving, via a first mobile device, one or more log files containing information relating to a detected activity at a reader of a physical access control system associated with a lock coupled to a physical access point to a secure asset, the activity comprising an access control decision executed by the first mobile device based on exchanged communications of credential information between the reader and the first mobile device, the information relating to the detected activity including access decision information corresponding to at least one of a user identity, a time of access decision, a location of access decision, and an access decision identifier; selecting a second mobile device that is different than the first mobile device for receiving the one or more log files; and sending the one or more log files to the selected second mobile device. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A physical access control system associated with a lock coupled to a physical access point to a secure asset, comprising:
-
a first mobile device; at least one reader configured to interact with the first mobile device, the interaction between the first mobile device and the at least one reader comprising an access control decision executed by the first mobile device based on exchanged communications of credential information between the reader and the first mobile device; and one or more servers separate and remote from the mobile device, and operable to; receive, via the first mobile device, one or more log files including information relating to a detected activity at the reader comprising the interaction, the information relating to the detected activity including access decision information corresponding to at least one of a user identity, a time of access decision, a location of access decision, and an access decision identifier; select a second mobile device that is different from the first mobile device for receiving the one or more log files, and send the one or more log files to the selected second mobile device. - View Dependent Claims (17, 18, 19, 20)
-
Specification