Systems and methods for a credential including multiple access privileges
First Claim
Patent Images
1. A credential for use in an access control system, comprising:
- a first sector, a second sector, and a third sector;
wherein the first sector includes first data and is associated with a first database type;
wherein the second sector includes second data and is associated with a second database type different from the first database type, the second data including user data and a look-up table that references data stored in the third sector based on at least one of a group/door identifier or a sector number; and
wherein the third sector includes access privilege data for a user arranged by fields associated with an indication of whether a personal identification number is required, a personal identification number, a credential function type, an activation date of the access privilege, an expiration date of the access privilege, and a door/group identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
A credential for use in an access control system may include a first sector including first data of a first database type, and a second sector including second data of a second database type. The credential may further include a third sector including third data related to the second data. The first database type and the second database type may he different types.
-
Citations
20 Claims
-
1. A credential for use in an access control system, comprising:
-
a first sector, a second sector, and a third sector; wherein the first sector includes first data and is associated with a first database type; wherein the second sector includes second data and is associated with a second database type different from the first database type, the second data including user data and a look-up table that references data stored in the third sector based on at least one of a group/door identifier or a sector number; and wherein the third sector includes access privilege data for a user arranged by fields associated with an indication of whether a personal identification number is required, a personal identification number, a credential function type, an activation date of the access privilege, an expiration date of the access privilege, and a door/group identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
reading, with a first lock, first data from a first sector of a credential, wherein the first sector is associated with an access database; reading, with a second lock, second data from a second sector of the credential, wherein the second sector is associated with a void database; and reading, with the second lock, third data from a third sector of the credential based on the second data; and wherein the first database type and the second database type are different. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A credential for use in an access control system, comprising:
-
a first sector including first data of a first database type; a second sector including second data of a second database type; and a third sector including third data related to the second data; and wherein the second data further includes a look-up table for the third data stored in the third sector; wherein the third data includes access privileges for a user; wherein the access privileges include the fields of a personal identification number (PIN), function, user type, activation, deactivation, and door/group identifier; wherein the second data includes a facility code and a unique identifier (UID) for the user; and wherein the first database type and the second database type are different. - View Dependent Claims (19, 20)
-
Specification