Abstract: The invention relates to a system comprising: a lock (10) provided with electronic circuits for transmission/reception via NFC and electric circuits for controlling mechanical locking/unlocking members, and a mobile phone (16) provided with circuits allowing same to operate in NFC mode. In addition, means are provided for transmitting power to the lock by means of remote power feeding (18) from the phone, such as to charge a buffer capacitor in order subsequently to provide power temporarily to the electronic and electric circuits of the lock while the lock is querying the NFC circuits of the phone in order to check the authorization of the person with the phone and to order to opening of the door.
Abstract: A computational device having a user interface is disclosed, the user interface enables a user to securely enter data into the computational device. In particular, the user interface may include a user input portion and a user output portion. The user input portion may be partitioned into a number of input zones, each having a data value associated therewith that when engaged by a user causes the data value associated with the engaged input zone to be provided as input to the computational device.
Abstract: The present disclosure is generally directed toward access control systems and, more specifically, toward access control systems that utilize Near Field Communications (NFC)-enabled devices. The disclosed system enables an NFC device to be remotely checked-in to the access control system; however, the NFC device operates in a read/write mode rather than a card emulation mode when interacting with RFID readers of the access control system.
Abstract: Embodiments of the invention generally relate to credential processing devices and methods of feeding credential substrates in a credential processing device. One exemplary embodiment of the credential processing device includes a processing path, a print head, a transport mechanism, a first motor, a substrate input and an input feed mechanism. The print head is configured to print to a surface of a credential substrate that is fed along the processing path. The transport mechanism comprises one or more transport feed rollers that are configured to feed individual credential substrates along the processing path. The first motor is configured to drive the one or more transport feed rollers. The substrate input comprises an input feed roller configured to feed individual substrates from a supply to the transport mechanism.
Abstract: The invention relates to a system including a lock (10) provided with electronic NFC transceiver circuits and electric circuits for controlling mechanical locking/unlocking members, and a portable telephone (16) provided with circuits for NFC mode of operation. The telephone comprises means for initializing the lock, said means including means for: downloading, from a remote site (20), an applet and elements required for initializing the lock; verifying, using the telephone, the identifier and the transport key stored in the lock against the downloaded ones; deactivating the transport key of the lock; loading, onto the lock, a unique random algorithm and a cryptographic key that have been downloaded; and generating a message notifying of the termination of the initialization of the lock.
Abstract: A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.
Abstract: Managing a digital certificate includes a landlord providing a digital certificate, a secure hardware device generating a series of n hash values, the secure hardware device providing an nth hash value to the landlord, wherein other hash values are not readily available to the landlord, the landlord placing the nth hash value in the certificate, the landlord digitally verifying the certificate containing the nth hash value to obtain a digitally signed certificate, a tenant obtaining the digitally signed certificate, the tenant obtaining the n hash values and the tenant managing the certificate by periodically issuing a previous hash value in the series of n hash values in response to the certificate being valid when the previous hash value is issued.
Abstract: The present invention is directed toward an RFID device that includes a motion sensing mechanism. The motion sensing mechanism is adapted to sense motion of the RFID device and then selectively allow or restrict the RFID device's ability to transmit messages, which may include sensitive data, when the RFID device is placed in an RF field. Thus, the motion sensing mechanism is utilized to control access to data on the RFID device to only instances when the holder of the RFID device moves the RFID device in a predefined sequence of motion(s).
Abstract: Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided herein various mechanisms to provide a modified agent path such that an agent following the modified agent path, may update at least one non-networked reader. The update of the at least one non-networked reader not occurring if the agent follows an unmodified agent path.
Type:
Application
Filed:
September 23, 2013
Publication date:
February 20, 2014
Applicant:
Assa Abloy AB
Inventors:
Tam Hulusi, Robert Wamsley, Michael L. Davis
Abstract: Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided herein various mechanisms to provide a modified agent path such that an agent following the modified agent path, may update at least one non-networked reader. The update of the at least one non-networked reader not occurring if the agent follows an unmodified agent path.
Type:
Application
Filed:
September 23, 2013
Publication date:
February 20, 2014
Applicant:
Assa Abloy AB
Inventors:
Tam Hulusi, Robert Wamsley, Michael L. Davis
Abstract: Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network.
Type:
Application
Filed:
September 3, 2013
Publication date:
January 9, 2014
Applicant:
ASSA ABLOY AB
Inventors:
Michael L. Davis, Robert Wamsley, Tam Hulusi
Abstract: Method and devices for making access decisions in a secure access network are provided. The access decisions are made by a portable credential using data and algorithms stored on the credential. Since access decisions are made by the portable credential non-networked hosts or local hosts can be employed that do not necessarily need to be connected to a central access controller or database thereby reducing the cost of building and maintaining the secure access network.
Type:
Grant
Filed:
October 17, 2011
Date of Patent:
November 5, 2013
Assignee:
Assa Abloy AB
Inventors:
Michael L. Davis, Robert Wamsley, Tam Hulusi
Abstract: Methods, devices, and systems are provided for optimizing the dissemination of information in various types of systems such as an access control system. More specifically, there are provided various mechanisms to increase the efficiency with which system updates and other types of information are spread throughout an access control system having at least one non-networked reader.
Abstract: Methods, devices, and systems are provided for remotely updating provisioning data in devices or a population of devices. An update message is generated that includes an Object Identifier (OID) that uniquely identifies eligible devices or components for the provisioning data update. If an eligible device receives the update message, then the new provisioning data is loaded on the device, thereby replacing the old provisioning data on the device.
Type:
Grant
Filed:
January 26, 2010
Date of Patent:
September 3, 2013
Assignee:
Assa Abloy AB
Inventors:
Michael William Malone, Yoong-Goog Cho, Thad Smith, Ryan Milbrandt
Abstract: A method to produce a rod tag and tag produced according to the method, wherein the method comprises at least the steps of: providing a magnetic core having a cylindrical shape and two end, winding a wire around said core to form an antenna, positioning in longitudinal extension a chip at one of the ends of said rod where the wound wire ends terminates, bonding said wire ends to contacts of said chip, displacing said bonded chip at least partially on said end of said rod, introducing said core with said wire and said chip in an encapsulating means containing a stabilizing material, whereby the chip is further positioned on said end by the friction between said chip and said material during introduction.
Abstract: A method, reader, and system are provided for performing group authentication processes. In particular, a group access decision can be made upon the analysis of a group rule. The group rule may contain a Boolean expression including one or more Boolean conditions. If an appropriate group of credentials are presented to a reader such that the Boolean expression is satisfied, then the group of credentials and the holders thereof are allowed access to a protected asset.
Abstract: A lock device comprises an interlocking means comprising two axially movable parts (61, 62) interconnecting a cylinder core (20) and an extension (40, 50) so that free-turning operation is provided in one mode of operation and the extension rotates with the cylinder core in another operational mode.