The present invention relates to access control systems (ACSs) such as can be used to control access to various resources, e.g. rooms or other areas protected by electronic door locks.
In a typical ACS, an electronic door lock (EDL) is opened by an electronic key, e.g. a card key. The key can be carried by a human user or attached to a vehicle for example. A remote computer configures the EDLs to allow entry for some users while keeping out others. It is desirable to provide an improved ACS which facilitates operation of the remote computer and has improved EDLs.
This section summarizes some features of the invention. Other features may be described in the subsequent sections. The invention is defined by the appended claims, which are incorporated into this section by reference.
Some embodiments of the present invention provide improved access control systems and methods. Some embodiments provide data integrity verification methods for verifying the integrity of access control data stored on the EDLs. Some embodiments of the data integrity verification methods are applicable to data unrelated to access control systems.
The embodiments described in this section illustrate but do not limit the invention. The invention is defined by the appended claims.
Improved configuration capabilities are desirable.
Some embodiments provide solutions to such problems. More particularly:
Configuration:
Some embodiments of the present invention provide new configuration capabilities. In particular, in some embodiments, a user 174U can be given authority to configure, or view the configuration of, a set of EDLs 110 or other devices (the set is sometimes called a “domain” herein), but not the devices outside of the set. A user 174U or 140U can be allowed to configure or own alarm-handling rights for a set of devices but not for other devices.
In some embodiments, an Access Group can be configured so as to be valid for only a limited number of days. Some embodiments associate an Access Group with Start and End dates that are Access Group specific.
In some embodiments, each Access Group is associated with its own specific calendar, and different Access Groups can be associated with different calendars. The structure of an exemplary ACL 130 according to some embodiments of the present invention is shown in
Each group 234 corresponds to an Access Group, and contains the Access Group's ID and an aggregation of any number of schedule structures 240.
A group structure 234 can be associated with any E-key structures 140D which are members of the Access Group. A group structure 234 can be associated with zero or one calendars 238 applicable to all the schedules in the group. A schedule structure 240 can be associated with zero or one calendar structures 238.
An access group defines days and times of day when the group's members 140U have access. A user 140U can be in multiple groups. The user has access when at least one of the groups containing the user has access.
For example, an Access Group for sports classes may have a calendar schedule depending on a team's tournament registration; while an Access Group for academic classes may have a different calendar, which in turn may be different from an Access Group for religious classes. In contrast, in a conventional ACS, the same calendar is effective for all Access Groups.
Other configuration capabilities are also provided.
EDL Speed
In some embodiments, the EDL speed is enhanced by caching access control data for a period including the current time. The cache is refreshed as the current time advances, so the cache always has data relevant to the current time.
The inventors have realized that the EDL speed improvements can be particularly desirable for hand-free operation. In hand-free operation, the E-Key 140 may communicate with EDL 110 when the E-Key is carried, for example, in the user's bag or pocket; the E-Key does not have to be in close proximity with the EDL. When the E-Key and the EDL are discovering each other and the EDL checks its ACL to determine whether the user is allowed access, the E-Key may keep its radio on, waiting for the EDL messages. The radio consumes much energy, and this is undesirable since the E-Key is not connected to a stationary power supply. It is therefore highly desirable for the EDL to make the access decisions in a short, predictable interval of time.
Data Integrity
Improved techniques for checking for data integrity between server 170 and EDLs 110 are also provided. In some embodiments, checksums are used to check for data integrity without transmitting the actual data. A checksum can be computed on a plurality of records. If checksums do not match of the plurality, then checksums are computed on individual records or subsets of records within the plurality to identify the individual record or subset which lacks integrity.
Personalized Access Modes
In some embodiments, users 140U are provided with personalized access modes depending on the users' needs. E.g. wheelchair users may need more time for entry, so the EDL can unlock the door at a greater distance from the user.
There is a number of other problems solved by some embodiments of the present invention as discussed below. The invention is not limited to embodiments solving such problems.
Below, the term “computer network” may refer to the computer network 190 with or without the wireless links 154.
As is known, a class may represent an entity. In the class description below, classes are sometimes spoken of as if there the corresponding entities. For example, an EDL class 110D can be spoken of as an EDL 110. Sometimes, the same reference numeral is used for the class and the corresponding entity.
The classes of
Some embodiments of the invention provide a method for operating a computer system to configure secure access to one or more resources. The computer system can be, for example, application server 170 or computer 174 or both. The access is controlled by a plurality of electronic devices, e.g. EDLs 110. The method comprises:
For each said device set, the computer system:
For example, if the computer system is AS server 170, then the operation performed by the computer system may include generating suitable ACLs and sending them to EDLs 110. If the computer system is a computer 174, the operation may include communicating with the AS server 170 to cause the AS server to generate the ACLs and send them to EDLs 110.
In some embodiments, for at least one device set, the command specifies at least one first user (e.g. 174U), and the operation comprises causing the access control system to allow the first user to configure each electronic device in the device set and/or to receive information about configuration of each electronic device in the device set.
In some embodiments, configuring an electronic device comprises at least one of:
specifying which user or users (e.g. 140U) are allowed and/or not allowed access controlled by the device;
specifying when the device is to allow and/or disallow access.
In some embodiments, for at least one device set, the command specifies at least one first user (e.g. 174U), and the operation comprises causing the access control system to allow the first user to configure alarm handling for alarms originating from any device in the device set.
In some embodiments, configuring alarm handling comprises at least one of:
specifying kinds of events that are considered an alarm or not considered an alarm;
specifying an alarm severity;
specifying which user or users (e.g. 140U) are allowed and/or disallowed to respond to an alarm via the access control system.
In some embodiments, responding to an alarm via the access control system comprises issuing an alarm-handling computer command (e.g. by clicking a button 374) to the access control system.
Some embodiments provide a method for operating a computer system (e.g. 170 or 174) to configure secure access to one or more resources, the access being controlled by a plurality of electronic devices, the method comprising:
obtaining, by the computer system, data which specify:
operating the computer system to configure the devices to provide access in accordance with the one or more schedules and the plurality of calendars.
In some embodiments:
the data associates each of one or more users (e.g. 140U) with one or more calendars;
configuring the devices to provide access comprises the computer system associating each of the one or more users with the one or more calendars to provide access to each of the one or more users in accordance with the one or more calendars.
In some embodiments, the one or more users comprise a plurality of users, and at least two of the users are associated with different calendars.
In some embodiments, the data specify, for at least one schedule, a time when the schedule is in effect (e.g. start date (stDate) and end date (endDate) in room assignment 394), and the computer system is operated to configure the devices to provide access in accordance with the time when the schedule is in effect.
Some embodiments provide a method for controlling access to a resource, the method comprising:
receiving, by an electronic device (e.g. EDL 110) which controls access to the resource, data over a computer network, the data specifying:
operating the device to provide access in accordance with the one or more schedules and the plurality of calendars.
Some embodiments include a method performed by an electronic device (e.g. EDL 110) that provides, to one or more users, secure access to a resource, the method comprising:
storing, in the device, access control data (e.g. room assignments, calendars, etc.) which define, for each user, when the user is to have access;
keeping track of a current time;
detecting the user;
determining, from the access control data, whether access is to be provided to the detected user at the current time; and
causing the access to be provided or not provided based on the determining operation (e.g. unlocking the lock or keeping it locked);
wherein the device comprises a first memory (e.g. flash 910) and a second memory (e.g. SRAM) faster than the first memory (the invention is not limited to particular memory types);
wherein storing access control data comprises:
storing first access control data in the first memory, wherein the first access control data define, for each user, when the user is to have access;
storing second access control data in the second memory, wherein the second access control data is relevant to the current time to define, for each of one or more of the users, whether the user is to have access in one or more time periods (e.g. 1020) comprising the current time;
wherein upon detecting the user whose time-related information is in the second memory, the determining operation uses the second access control data in the second memory.
Some embodiments further comprise, as the current time advances towards an end of the one or more time periods, refreshing the second access control data in the second memory from the first access control data to cause the second access control data to define, for each of one or more of the users, whether the user is to have access in one or more time periods comprising a future time. The refreshing can be done, for example, as in Table 1.
Some embodiments provide a method for determining integrity of access control data stored and used by an electronic device (e.g. EDL 110) that controls access to a resource, the method comprising:
storing, by a computer system (e.g. 170), access control data for the device;
receiving, from the device, one or more first checksums of one or more sets of the access control data stored by the device, without receiving all of the one or more sets of the access control data stored by the device (e.g. the first checksums can be generated by EDL 110);
determining, from the access control data stored by the computer system, one or more second checksums of one or more sets of the access control data stored by the computer system (e.g. the second checksums can be generated by server 170);
the computer system matching the one or more first checksums with the one or more second checksums to determine integrity of the access control data stored by the device.
In some embodiments, in the matching operation, equality between the one or more first checksums and the respective one or more checksums indicates integrity of the access control data stored by the device, and inequality indicates lack of integrity.
The invention includes, but not limited to, the following numbered aspects.
Aspect 1. A method for operating a computer system to configure secure access to one or more resources, the access being controlled by a plurality of electronic devices, the method comprising:
obtaining, by the computer system, data which identify the electronic devices and also identify one or more device sets, each device set comprising zero or more of the devices, at least one device set comprising a plurality of the devices;
for each said device set, the computer system:
Aspect 2. The method of aspect 1 wherein for at least one device set, the command specifies at least one first user, and the operation comprises causing the access control system to allow the first user to configure each device in the device set and/or to receive information about configuration of each device in the device set.
Aspect 3. The method of aspect 2 wherein configuring a device comprises at least one of:
specifying which user or users are allowed and/or not allowed access controlled by the device;
specifying when the device is to allow and/or disallow access.
Aspect 4. The method of aspect 1 wherein for at least one device set, the command specifies at least one first user, and the operation comprises causing the access control system to allow the first user to configure alarm handling for alarms originating from any device in the device set.
Aspect 5. The method of aspect 4 wherein configuring alarm handling comprises at least one of:
specifying kinds of events that are considered an alarm or not considered an alarm;
specifying an alarm severity;
specifying which user or users are allowed and/or disallowed to respond to an alarm via the access control system.
Aspect 6. The method of aspect 5 wherein responding to an alarm via the access control system comprises issuing an alarm-handling computer command to the access control system.
Aspect 7. A computer system configured to perform the method of aspect 1.
Aspect 8. The computer system of aspect 7 wherein in the method, for at least one device set, the command specifies at least one first user, and the operation comprises causing the access control system to allow the first user to configure each device in the device set and/or to receive information about configuration of each device in the device set.
Aspect 9. The computer system of aspect 8 wherein in the method, configuring a device comprises at least one of:
specifying which user or users are allowed and/or not allowed access controlled by the device;
specifying when the device is to allow and/or disallow access.
Aspect 10. The computer system of aspect 7 wherein in the method, for at least one device set, the command specifies at least one first user, and the operation comprises causing the access control system to allow the first user to configure alarm handling for alarms originating from any device in the device set.
Aspect 11. The computer system of aspect 10 wherein in the method, configuring alarm handling comprises at least one of:
specifying kinds of events that are considered an alarm or not considered an alarm;
specifying an alarm severity;
specifying which user or users are allowed and/or disallowed to respond to an alarm via the access control system.
Aspect 12. The computer system of aspect 11 wherein in the method, responding to an alarm via the access control system comprises issuing an alarm-handling computer command to the access control system.
Aspect 13. A computer readable memory comprising software operable to cause a computer system to perform the method of aspect 1.
Aspect 14. The computer readable memory of aspect 13 wherein in the method, for at least one device set, the command specifies at least one first user, and the operation comprises causing the access control system to allow the first user to configure each device in the device set and/or to receive information about configuration of each device in the device set.
Aspect 15. The computer readable memory of aspect 14 wherein in the method, configuring a device comprises at least one of:
specifying which user or users are allowed and/or not allowed access controlled by the device;
specifying when the device is to allow and/or disallow access.
Aspect 16. The computer readable memory of aspect 13 wherein in the method, for at least one device set, the command specifies at least one first user, and the operation comprises causing the access control system to allow the first user to configure alarm handling for alarms originating from any device in the device set.
Aspect 17. The computer readable memory of aspect 16 wherein in the method, configuring alarm handling comprises at least one of:
specifying kinds of events that are considered an alarm or not considered an alarm;
specifying an alarm severity;
specifying which user or users are allowed and/or disallowed to respond to an alarm via the access control system.
Aspect 18. The computer readable memory of aspect 17 wherein in the method, responding to an alarm via the access control system comprises issuing an alarm-handling computer command to the access control system.
Aspect 18A. A computer readable memory comprising a data structure comprising:
data which identify electronic devices which control secure access to one or more resources;
data which identify one or more device sets, each device set comprising zero or more of the devices, at least one device set comprising a plurality of the devices; and
for at least one device set, data which identify at least one first user as being allowed to perform at least one of:
(A) configure each device in the device set and/or to receive information about configuration of each device in the device set;
(B) configure alarm handling for alarms originating from any device in the device set.
Aspect 18B. The computer readable memory of aspect 18A wherein for at least one device set and at least one first user, the data identify the first user as being allowed to perform the operation (A), wherein configuring a device comprises at least one of:
specifying which user or users are allowed and/or not allowed access controlled by the device;
specifying when the device is to allow and/or disallow access.
Aspect 18C. The computer readable memory of aspect 18B wherein configuring a device comprises at least one of:
specifying which user or users are allowed and/or not allowed access controlled by the device;
specifying when the device is to allow and/or disallow access.
Aspect 18D. The computer readable memory of aspect 18A wherein for at least one device set and at least one first user, the data identify the first user as being allowed to perform the operation (B), wherein configuring alarm handling comprises at least one of:
specifying kinds of events that are considered an alarm or not considered an alarm;
specifying an alarm severity;
specifying which user or users are allowed and/or disallowed to respond to an alarm via the access control system.
Aspect 18E. The computer readable memory of aspect 18D wherein responding to an alarm via the access control system comprises issuing an alarm-handling computer command to the access control system.
Aspect 19. A method for operating a computer system to configure secure access to one or more resources, the access being controlled by a plurality of electronic devices, the method comprising:
obtaining, by the computer system, data which specify:
operating the computer system to configure the electronic devices to provide access in accordance with the one or more schedules and the plurality of calendars.
Aspect 20. The method of aspect 19 wherein:
the data associates each of one or more users with one or more calendars;
configuring the devices to provide access comprises the computer system associating each of the one or more users with the one or more calendars to provide access to each of the one or more users in accordance with the one or more calendars.
Aspect 21. The method of aspect 20 wherein the one or more users comprise a plurality of users, and at least two of the users are associated with different calendars.
Aspect 22. The method of aspect 19 wherein the data specify, for at least one schedule, a time when the schedule is in effect, and the computer system is operated to configure the devices to provide access in accordance with the time when the schedule is in effect.
Aspect 23. A computer system configured to perform the method of aspect 19.
Aspect 24. The computer system of aspect 23 wherein in the method:
the data associates each of one or more users with one or more calendars;
configuring the devices to provide access comprises the computer system associating each of the one or more users with the one or more calendars to provide access to each of the one or more users in accordance with the one or more calendars.
Aspect 25. The computer system of aspect 24 wherein in the method, the one or more users are operable to comprise a plurality of users, and at least two of the users are operable to be associated with different calendars.
Aspect 26. The computer system of aspect 23 wherein in the method, the data specify, for at least one schedule, a time when the schedule is in effect, and the computer system is operated to configure the devices to provide access in accordance with the time when the schedule is in effect.
Aspect 27. A computer readable memory comprising software operable to cause a computer system to perform the method of aspect 19.
Aspect 28. The computer readable memory of aspect 27 wherein in the method:
the data associates each of one or more users with one or more calendars;
configuring the devices to provide access comprises the computer system associating each of the one or more users with the one or more calendars to provide access to each of the one or more users in accordance with the one or more calendars.
Aspect 29. The computer readable memory of aspect 28 wherein in the method, the one or more users are operable to comprise a plurality of users, and at least two of the users are operable to be associated with different calendars.
Aspect 30. The computer readable memory of aspect 23 wherein in the method, the data specify, for at least one schedule, a time when the schedule is in effect, and the computer system is operated to configure the devices to provide access in accordance with the time when the schedule is in effect.
Aspect 31. A method for controlling access to a resource, the method comprising:
receiving, by an electronic device which controls access to the resource, data over a computer network, the data specifying:
operating the device to provide access in accordance with the one or more schedules and the plurality of calendars.
Aspect 32. The method of aspect 31 wherein:
the data associates each of one or more users with one or more calendars;
operating the device to provide access comprises operating the device to provide access to each of the one or more users in accordance with the one or more calendars.
Aspect 33. The method of aspect 32 wherein the one or more users comprise a plurality of users, and at least two of the users are associated with different calendars.
Aspect 34. The method of aspect 31 wherein the data specify, for at least one schedule, a time when the schedule is in effect, and the device is operated to provide access in accordance with the time when the schedule is in effect.
Aspect 35. An electronic device for controlling access to a resource, the device being operable to perform the method of aspect 31.
Aspect 36. The device of aspect 31 wherein in the method:
the data associates each of one or more users with one or more calendars;
operating the device to provide access comprises operating the device to provide access to each of the one or more users in accordance with the one or more calendars.
Aspect 37. The device of aspect 36 wherein in the method, the one or more users are operable to comprise a plurality of users, and at least two of the users are operable to be associated with different calendars.
Aspect 38. The device of aspect 35 wherein in the method, the data specify, for at least one schedule, a time when the schedule is in effect, and the device is operated to provide access in accordance with the time when the schedule is in effect.
Aspect 38A. A computer readable memory comprising a data structure comprising:
data identifying a group of one or more schedules each of which specifies when access is allowed and/or disallowed to one or more resources, the access being controlled by one or more electronic devices; and
data associated with the group and identifying a plurality of calendars, each calendar specifying one or more days when access controlled by one or more of the electronic devices is allowed and/or disallowed regardless of the one or more schedules.
Aspect 38B. The computer readable memory of aspect 38A further comprising data associating one or more users with one or more calendars, each user being allowed or disallowed access to the one or more resources in accordance with the one or more calendars.
Aspect 38C. The computer readable memory of aspect 38B wherein the one or more users comprise a plurality of users, and at least two of the users are associated with different calendars.
Aspect 38D. The computer readable memory of aspect 38A wherein the data specify, for at least one schedule, a time when the schedule is in effect.
Aspect 39. A method performed by an electronic device that provides, to one or more users, secure access to a resource, the method comprising:
storing, in the electronic device, access control data which define, for each user, when the user is to have access;
keeping track of a current time;
detecting the user;
determining, from the access control data, whether access is to be provided to the detected user at the current time; and
causing the access to be provided or not provided based on the determining operation;
wherein the device comprises a first memory and a second memory faster than the first memory;
wherein storing access control data comprises:
storing first access control data in the first memory, wherein the first access control data define, for each user, when the user is to have access;
storing second access control data in the second memory, wherein the second access control data is relevant to the current time to define, for each of one or more of the users, whether the user is to have access in one or more time periods comprising the current time;
wherein upon detecting the user whose time-related information is in the second memory, the determining operation uses the second access control data in the second memory.
Aspect 40. The method of aspect 39 further comprising, as the current time advances towards an end of the one or more time periods, refreshing the second access control data in the second memory from the first access control data to cause the second access control data to define, for each of one or more of the users, whether the user is to have access in one or more time periods comprising a future time.
Aspect 41. An electronic device for performing the method of aspect 39.
Aspect 42. The electronic device of aspect 41 wherein the method further comprises, as the current time advances towards an end of the one or more time periods, refreshing the second access control data in the second memory from the first access control data to cause the second access control data to define, for each of one or more of the users, whether the user is to have access in one or more time periods comprising a future time.
Aspect 43. A method for determining, by a computer system, integrity of data stored and used by an electronic device that controls access to a resource, the method comprising the computer system performing operations of:
storing, by the computer system, access control data for the electronic device;
receiving from the device, by the computer system, one or more first checksums of one or more records of the access control data stored by the device, without receiving all of the one or more records of the access control data stored by the device;
determining by the computer system, from the access control data stored by the computer system, one or more second checksums of one or more records of the access control data stored by the computer system;
the computer system matching the one or more first checksums with the one or more second checksums to determine integrity of the access control data stored by the device.
Aspect 44. The method of aspect 43 wherein in the matching operation, equality between the one or more first checksums and the respective one or more checksums indicates integrity of the access control data stored by the device, and inequality indicates lack of integrity.
Aspect 45. The method of aspect 43 wherein, in case of a mismatch between at least one first checksum and a corresponding one second checksum which correspond to a plurality of records, the method further comprises:
receiving from the device, by the computer system, a plurality of new first checksums each of which is a checksum of a subset of the plurality of records of the access control data stored by the device;
determining by the computer system, from the subsets of the plurality of records of access control data stored by the computer system, a plurality of new second checksums each of which is a checksum of a subset of the plurality of records of the access control data stored by the computer system;
the computer system matching the one or more new first checksums with the one or more new second checksums to identify the one or more subsets lacking integrity.
Aspect 46. A computer system configured to perform the method of aspect 43.
Aspect 47. The computer system of aspect 46 wherein in the matching operation, equality between the one or more first checksums and the respective one or more checksums indicates integrity of the access control data stored by the device, and inequality indicates lack of integrity.
Aspect 48. The computer system of aspect 46 wherein in the method, in case of a mismatch between at least one first checksum and a corresponding one second checksum which correspond to a plurality of records, the computer system is operable to perform operations of:
receiving, from the device, a plurality of new first checksums each of which is a checksum of a subset of the plurality of records of the access control data stored by the device;
determining, from the subsets of the plurality of records of access control data stored by the computer system, a plurality of new second checksums each of which is a checksum of a subset of the plurality of records of the access control data stored by the computer system;
matching the one or more new first checksums with the one or more new second checksums to identify the one or more subsets lacking integrity.
Aspect 49. A computer readable memory comprising software operable to cause a computer system to perform the method of aspect 43.
Aspect 50. The computer readable memory of aspect 49 wherein in the matching operation, equality between the one or more first checksums and the respective one or more checksums indicates integrity of the access control data stored by the device, and inequality indicates lack of integrity.
Aspect 51. The computer readable memory of aspect 49 wherein in the method, in case of a mismatch between at least one first checksum and a corresponding one second checksum which correspond to a plurality of records, the software is operable to cause the computer system to perform operations of:
receiving, from the device, a plurality of new first checksums each of which is a checksum of a subset of the plurality of records of the access control data stored by the device;
determining, from the subsets of the plurality of records of access control data stored by the computer system, a plurality of new second checksums each of which is a checksum of a subset of the plurality of records of the access control data stored by the computer system;
matching the one or more new first checksums with the one or more new second checksums to identify the one or more subsets lacking integrity.
Aspect 52. A method for determining, by a computer system, integrity of data stored on a remote electronic device, the method comprising:
(a) the computer system receiving, from the electronic device, one or more first checksums of one or more records of the data stored by the device, without receiving all of the one or more records of the data stored by the device;
(b) the computer system determining, from a version of the data stored by the computer system, one or more second checksums of one or more records of the data stored by the computer system;
(c) the computer system matching the one or more first checksums with the one or more second checksums to determine integrity of the access control data stored by the device;
(d) in case of a mismatch between at least one first checksum and a corresponding one second checksum which correspond to a plurality of records, the computer system:
(d1) receiving, from the device, a plurality of new first checksums each of which is a checksum of a subset of the plurality of records of the data stored by the device;
(d2) determining, from the subsets of the plurality of records of the version of the data stored by the computer system, a plurality of new second checksums each of which is a checksum of a subset of the plurality of records of the version of the data stored by the computer system;
(d3) the computer system matching the one or more new first checksums with the one or more new second checksums to identify the one or more subsets lacking integrity.
Aspect 53. The method of aspect 52 further comprising, in case of a mismatch between at least one new first checksum and a corresponding one new second checksum which correspond to a plurality of records which is a sub-plurality of the plurality of operation (d), the computer system repeating operations (d1) through (d3) on the sub-plurality of records.
Aspect 54. A computer system configured to perform the method of aspect 52.
Aspect 55. The computer system of aspect 54 wherein in case of a mismatch between at least one new first checksum and a corresponding one new second checksum which correspond to a plurality of records which is a sub-plurality of the plurality of operation (d), the computer system is operable to repeat operations (d1) through (d3) on the sub-plurality of records.
Aspect 56. A computer readable memory comprising software operable to cause a computer system to perform the method of aspect 52.
Aspect 57. The computer readable memory of aspect 56 wherein in case of a mismatch between at least one new first checksum and a corresponding one new second checksum which correspond to a plurality of records which is a sub-plurality of the plurality of operation (d), the software is operable to cause the computer system to repeat operations (d1) through (d3) on the sub-plurality of records.
Aspect 58. A method performed by an electronic device storing data, to allow a remote computer system to determine integrity of the data, the method comprising:
(a) the electronic device sending, to the computer system, a checksum of a plurality of records of the data stored by the device;
(b) the device receiving, from the computer system, a request for a plurality of checksums each of which is a checksum of a sub-plurality of the plurality of records, the request being received upon the computer system discovering lack of integrity of the plurality of records based on the checksum in (a);
(c) the device sending the plurality of checksums to the computer system.
Aspect 59. The method of aspect 58 wherein the device is an electronic lock controlling access to a resource, and the data comprise access control data.
Aspect 60. An electronic device operable to perform the method of aspect 58.
Aspect 61. The electronic device of aspect 60 wherein the electronic device is an electronic lock for controlling access to a resource, and the data comprise access control data.
Aspect 62. A method for controlling access to a resource, the method comprising:
storing, by an electronic device controlling access to the resource, access control data for one or more users, wherein for at least one user, the access control data specify one or more of following parameters for providing access when access is allowed:
wherein the method further comprises:
detecting a user by the electronic device;
controlling the access in accordance with one or more of the parameters specified by the access control data if the access control data specify one or more of the parameters.
Aspect 63. An electronic device operable to perform the method of aspect 62.
Aspect 64. A method for configuring one or more electronic devices controlling access to one or more resources, the method comprising:
obtaining, by a computer system, access control data for one or more users, wherein for at least one user, the access control data specify one or more of following parameters for providing access when access is allowed:
wherein the method further comprises causing the one or more electronic devices to store access control data with the one or more of the parameters.
Aspect 65. A computer system configured to perform the method of aspect 64.
Aspect 66. A computer readable memory comprising software operable to cause a computer system to perform the method of aspect 64.
The invention is not limited to the embodiments described above. Other embodiments and variations are within the scope of the invention, as defined by the appended claims.
The present application claims priority of U.S. provisional application No. 61/611,575 filed Mar. 16, 2012, incorporated herein by reference.
| Number | Date | Country | |
|---|---|---|---|
| 61611575 | Mar 2012 | US |