Method and apparatus for making a decision on a card
First Claim
Patent Images
1. A method of controlling physical access to a secure access to a secure asset with a physical access control system including a mobile device and a stand-alone reader associated with a physical access point to the secure asset, comprising:
- receiving, at the mobile device, from the stand-alone reader, a communication associated with a status of the stand-alone reader, the status comprising a locked or unlocked status of the physical access point;
in response to receiving the communication, storing, on the mobile device, the status of the stand-alone reader; and
communicating, with the mobile device, the stored status of the stand-alone reader to at least one other component of the physical access control system that is not connected to the stand-alone reader by a communication network, wherein the at least one other component comprises a second stand-alone reader associated with the second secure asset.
1 Assignment
0 Petitions
Accused Products
Abstract
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network.
-
Citations
17 Claims
-
1. A method of controlling physical access to a secure access to a secure asset with a physical access control system including a mobile device and a stand-alone reader associated with a physical access point to the secure asset, comprising:
-
receiving, at the mobile device, from the stand-alone reader, a communication associated with a status of the stand-alone reader, the status comprising a locked or unlocked status of the physical access point; in response to receiving the communication, storing, on the mobile device, the status of the stand-alone reader; and communicating, with the mobile device, the stored status of the stand-alone reader to at least one other component of the physical access control system that is not connected to the stand-alone reader by a communication network, wherein the at least one other component comprises a second stand-alone reader associated with the second secure asset. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An access control system, comprising:
-
a reader configured to protect one or more assets; a mobile device capable of communicating with the reader; and a blacklist stored on at least one of the reader and the mobile device, the blacklist containing information related to at least one of;
(i) readers to which the mobile device is not allowed to obtain access and (ii) mobile devices to which the reader is not allowed to grant access;wherein at least one of the reader or the mobile device is configured to make an access control decision associated with the one or more assets based at least in part on the blacklist, wherein the reader is configured to communicate a status of the reader to the mobile device, the status comprising a locked or unlocked status, and wherein the mobile device is configured to communicate the status of the reader to at least one other component of the access control system that is not connected to the reader by a communication network, wherein the at least one other component comprises a second reader associated with a second asset. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A phone, comprising:
-
a communication interface enabling the phone to communicate with a reader associated with a secure asset and obtain status information from the reader, the status information comprising a locked or unlocked status; memory configured to store the status information from the reader; and a controller configured to enable the phone to communicate the status of the reader to at least one other component of a physical access control system that is not connected to the reader by a communication network, wherein the at least one other component comprises a second reader associated with a second secure asset. - View Dependent Claims (17)
-
Specification