Method and Apparatus for Making a Decision on a Card
1 Assignment
0 Petitions
Accused Products
Abstract
Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network.
11 Citations
26 Claims
-
1-7. -7. (canceled)
-
8. A method of controlling physical access to a secure asset, comprising:
conducting a substantially real-time transaction with a mobile device comprising the steps of; obtaining a unique identifier associated with a locking mechanism and a reader coupled to a physical access point to the secure asset, the locking mechanism configured to transition between a locked state and an unlocked state, the reader configured to actuate a state transition of the locking mechanism, wherein the unique identifier is obtained absent communication between the mobile device and the reader; in response to obtaining the unique identifier, executing an access control decision with respect to the secure asset based on the unique identifier and credential information stored in secure memory of the mobile device; and in response to determining that access to the secure asset is granted, transmitting a control signal to the reader to transition the locking mechanism from the locked state to the unlocked state. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
16. A mobile device configured to conduct a substantially real-time transaction to gain access to a secure asset through a physical access point coupled to a locking mechanism and a reader, the locking mechanism configured to transition between a locked state and an unlocked state, the reader configured to actuate a state transition of the locking mechanism, the mobile device comprising:
one or more processors configured to; instruct a communications interface of the mobile device to obtain, absent communication with the reader, a unique identifier associated with the reader; in response to obtaining the unique identifier, execute an access control decision with respect to the secure asset based on the unique identifier and credential information stored in secure memory of the mobile device; and in response to determining that access to the secure asset is granted, instruct the communications interface to transmit a control signal to the reader to transition the locking mechanism from the locked state to the unlocked state. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
23. A mobile phone configured to conduct a substantially real-time transaction to gain access to a secure asset through a physical access point coupled to a locking mechanism and a reader, the locking mechanism configured to transition between a locked state and an unlocked state, the reader configured to actuate a state transition of the locking mechanism, the mobile phone comprising:
one or more processors configured to; instruct a communications interface of the mobile phone to obtain, absent communication with the reader and via optical communication protocols, a unique identifier associated with the reader; in response to obtaining the unique identifier, execute an access control decision with respect to the secure asset based on the unique identifier and credential information stored in secure memory of the mobile phone, the access control decision comprising an algorithm defined by an access decision application stored in secure memory of the mobile phone; and in response to determining that access to the secure asset is granted, instruct the communications interface to transmit an RF control signal to the reader to transition the locking mechanism from the locked state to the unlocked state. - View Dependent Claims (24, 25, 26)
Specification