Access control system and method using user location information for controlling access to a restricted area
First Claim
1. A method of controlling access for an authorized user to a restricted area, comprising:
- receiving, by an access system, a token to request entry into the restricted area, wherein the access system comprises a primary tracking source;
receiving supplemental location information from at least one supplemental tracking source which tracks location of the authorized user; and
making an access decision, comprising granting access to the restricted area when the received token is valid, when the supplemental location information indicates that the authorized user is located near the restricted area, and when the authorized user is not on a muster, and otherwise denying access when the received token is not valid, or when the supplemental location information indicates that the authorized user is not located near the restricted area, or when the authorized user is already on the muster; and
adding the authorized user to the muster when access is granted, and removing the authorized user from the muster when the supplemental location information indicates that the authorized user is not in the restricted area.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of controlling access to a restricted area including receiving location information from at least one supplemental tracking source which tracks location of an authorized user, and controlling access by the authorized user to a restricted area based on the location information. The method may further include maintaining a muster based on the location information. A physical access control system for controlling access to a restricted area including a user location information system and an access system which controls access based on the location information. The user location information system may further maintain a muster based on the location information. The user location information system receives location information indicating location of an authorized user from at least one supplemental tracking source.
179 Citations
16 Claims
-
1. A method of controlling access for an authorized user to a restricted area, comprising:
-
receiving, by an access system, a token to request entry into the restricted area, wherein the access system comprises a primary tracking source; receiving supplemental location information from at least one supplemental tracking source which tracks location of the authorized user; and making an access decision, comprising granting access to the restricted area when the received token is valid, when the supplemental location information indicates that the authorized user is located near the restricted area, and when the authorized user is not on a muster, and otherwise denying access when the received token is not valid, or when the supplemental location information indicates that the authorized user is not located near the restricted area, or when the authorized user is already on the muster; and adding the authorized user to the muster when access is granted, and removing the authorized user from the muster when the supplemental location information indicates that the authorized user is not in the restricted area. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A physical access control system for controlling access for an authorized user to a restricted area, comprising:
-
a user location information system which receives supplemental location information indicating location of the authorized user from at least one supplemental tracking source; and a muster comprising a list of authorized users which are in the restricted area; an access system, coupled to said user location information system and said muster, which comprises a primary location tracking system for receiving a token, and which controls access by said the authorized user to the restricted area based on said token, said muster, and said supplemental location information; wherein said access system grants access only when said token is valid, when said authorized user is located within a local area surrounding the restricted area as indicated by said supplemental location information, and when said authorized user is not on said muster; and wherein said access system adds said authorized user to said muster when access is granted and removes said authorized user from said muster when said supplemental location information indicates that the authorized user is not within said local area. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification