SYSTEMS AND METHODS FOR CONTROLLING ACCESS WITHIN A SYSTEM OF NETWORKED AND NON-NETWORKED PROCESSOR-BASED SYSTEMS
First Claim
1. A method of controlling access rights within a system, the system comprising at least one security server for managing access rights and at least one networked processor-based system that processes access attempts to provide or deny access and multiple non-networked processor-based systems that process access attempts to provide or deny access, the method comprising:
- processing an access attempt from a first end-user by the at least one networked processor-based system, wherein the access attempt occurs when the first-end user is in physical proximity to the at least one networked processor-based system, wherein the first end-user does not manage, control, or modify access rights within the system;
in conjunction with processing of the access attempt by the networked processor-based system, reading a portable card by the at least one networked processor-based system, wherein the portable card belongs to the first end-user and comprises data identifying the first end-user and data relevant to the access rights associated with the first end-user;
obtaining revocation data by the networked processor-based system from the at least one security server, the revocation data indicating previously existing access rights allowing access that are specific to a second end-user have been revoked, wherein the second end-user does not manage, control, or modify access rights within the system, and wherein the first-end user and the second end-user are employees of a common organization;
in conjunction with processing of the access attempt by the networked processor-based system, writing the obtained revocation data by the networked processor-based system to the portable card of the first end-user;
physically transporting the portable card by the first end-user from the networked processor-based system to multiple non-networked processor-based systems;
processing respective access attempts from the first end-user by the multiple non-networked processor-based systems, wherein the access attempts occur when the first-end user is in physical proximity to the multiple non-networked processor-based systems; and
in conjunction with processing of the respective access attempts by the multiple non-networked processor-based systems, reading the revocation data from the portable card of the first-end user by the multiple non-networked processor-based systems and locally storing the revocation data by the multiple non-networked processor-based systems, wherein upon storing the updated revocation data, the multiple non-networked processor-based systems become operable to deny access to the second end-user.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method controls access rights within a system. The method comprises: physically transporting a portable card by the first end-user from a networked processor-based system to multiple non-networked processor-based systems; processing respective access attempts from the first end-user by the multiple non-networked processor-based systems, wherein the access attempts occur when the first-end user is in physical proximity to the multiple non-networked processor-based systems; and in conjunction with processing of the respective access attempts by the multiple non-networked processor-based systems, reading the revocation data from the portable card of the first-end user by the multiple non-networked processor-based systems and locally storing the revocation data by the multiple non-networked processor-based systems, wherein upon storing the updated revocation data, the multiple non-networked processor-based systems become operable to deny access to a second end-user.
27 Citations
7 Claims
-
1. A method of controlling access rights within a system, the system comprising at least one security server for managing access rights and at least one networked processor-based system that processes access attempts to provide or deny access and multiple non-networked processor-based systems that process access attempts to provide or deny access, the method comprising:
-
processing an access attempt from a first end-user by the at least one networked processor-based system, wherein the access attempt occurs when the first-end user is in physical proximity to the at least one networked processor-based system, wherein the first end-user does not manage, control, or modify access rights within the system;
in conjunction with processing of the access attempt by the networked processor-based system, reading a portable card by the at least one networked processor-based system, wherein the portable card belongs to the first end-user and comprises data identifying the first end-user and data relevant to the access rights associated with the first end-user;
obtaining revocation data by the networked processor-based system from the at least one security server, the revocation data indicating previously existing access rights allowing access that are specific to a second end-user have been revoked, wherein the second end-user does not manage, control, or modify access rights within the system, and wherein the first-end user and the second end-user are employees of a common organization;
in conjunction with processing of the access attempt by the networked processor-based system, writing the obtained revocation data by the networked processor-based system to the portable card of the first end-user;
physically transporting the portable card by the first end-user from the networked processor-based system to multiple non-networked processor-based systems;
processing respective access attempts from the first end-user by the multiple non-networked processor-based systems, wherein the access attempts occur when the first-end user is in physical proximity to the multiple non-networked processor-based systems; and
in conjunction with processing of the respective access attempts by the multiple non-networked processor-based systems, reading the revocation data from the portable card of the first-end user by the multiple non-networked processor-based systems and locally storing the revocation data by the multiple non-networked processor-based systems, wherein upon storing the updated revocation data, the multiple non-networked processor-based systems become operable to deny access to the second end-user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification