The present invention relates to an access control system that includes both on-line and off-line access points. More particularly, the present invention relates to a system and method for collecting access point event data from both off-line and on-line access points.
Current access control systems may include on-line access points that are directly connected to a central data storage system and/or off-line access points that are not connected to the central data storage system. The off-line access points are convenient in that they do not require the addition of wiring or other connection means between the access point and the central data storage system. However, off-line locks generally require periodic access to download any event data (e.g., access logs, access denial lists, access grant list, lock status, faults, etc.) that may be stored. Thus, these systems generally require a user to periodically connect to each of the off-line locks to download this data. The data is then uploaded to the central data storage system for analysis and storage.
This type of system can be labor intensive and reduces the flexibility of the system. For example, global security changes, the addition of new users, the removal of old users, changes in codes or passwords, and the like cannot be easily transferred to the off-line locks. Rather, such information must be transferred during the periodic downloads.
In one embodiment, the invention provides a method of collecting data in a lock system. The method includes providing each user with a credential that contains user information, presenting the credential at an off-line access point, and reading the user information from the credential. The method also includes analyzing the user information at the first off-line access point to determine if access to the first off-line access point should be allowed, sending event data from the off-line access point to the credential, and selectively overwriting existing event data and storing the sent event data on the credential. The invention further includes presenting the credential at an on-line access point and reading the user data and reading the event data.
In another embodiment, the invention provides a method of collecting data in a lock system in which each user possesses a credential that includes user information. The method includes presenting the credential at an off-line access point, storing event data from the off-line access point on the credential, and presenting the credential at an on-line access point. The method also includes transferring the event data from the credential through the on-line access point to a central system, storing verification data on the credential, re-presenting the credential at the off-line access point, and erasing event data from the off-line access point in response to receipt of the verification data.
In yet another embodiment, the invention provides a method of collecting data in a lock system. The method includes presenting a credential at an on-line access point. The credential includes event data and user data. The method also includes storing the event data in a central system, storing verification data on the credential, and reading the user data and the event data from the credential at a first off-line access point. The method also includes selectively erasing event data that corresponds to the verification data from the first off-line access point, and storing first off-line access point event data on the credential. The first off-line access point event data includes a priority assigned by the first off-line access point.
Before any embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the following drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. The use of “including,” “comprising,” or “having” and variations thereof herein is meant to encompass the items listed thereafter and equivalents thereof as well as additional items. Unless specified or limited otherwise, the terms “mounted,” “connected,” “supported,” and “coupled” and variations thereof are used broadly and encompass direct and indirect mountings, connections, supports, and couplings. Further, “connected” and “coupled” are not restricted to physical or mechanical connections or couplings.
The system 10 of
As illustrated in
As shown in
Beyond the on-line access point 40 are several access points 15 for which access is controlled by off-line locks 80. Each off-line lock 80 is coupled to an access point 15 to define an off-line access point 85. As shown in
It should be noted that
In use, each user has a credential 55 that contains unique user information. The user information may be assigned and stored by the central computer 20. In addition, each user may be assigned certain access rights. For example, the user may be limited to access at certain access control points 15 or may be allowed limited entry based on the time of day or the particular date or day of the week.
To enter the controlled portion 10 illustrated in
The attempted entry of the user at the on-line access point 40, as well as the denial or grant of access, generates event data (block 135) that may be stored by the central computer for later use and analysis (block 140). Because the on-line lock 45 is connected to the central computer 20, the event data can be immediately transferred to the central computer 20 and stored.
The user enters a first space 145 that provides access to additional spaces 150 that are secured by off-line access points 85 that include off-line locks 80. The procedure for entry to any one of these access points 85 is similar. The user presents the credential 55 at the access point 85 for which access is desired as shown in block 155. The off-line lock 80 reads the user information from the credential 55, analyzes the user information (e.g., compares the user information to stored user information for users allowed access) and makes an access decision (block 160) at least partially based on the user data. The reading of the user data, as well as the access decision may generate event data (block 165) that is stored in the memory 95 of the off-line lock 80. If the access decision is to allow entry, the off-line lock 80 actuates the lock mechanism 105 and unlocks the access point 85 for entry. This process is repeated at each off-line lock 80 to determine if entry should be granted.
Each event generated, whether at an on-line lock 45 or an off-line lock 80, can be assigned an event priority (blocks 135, 165) that approximately corresponds to the importance of the event. For example, in one arrangement, an attempted access receives a relatively low priority of five, while a denied access receives a higher event priority of three. An even more important event, such as granted access, may receive an event priority of two, while a device failure may receive an event priority of one. Additionally, the importance of a particular event may vary depending on the location of the access point 15. Particularly important access points 15 may produce events with priorities that are one or more levels more important than they would be at less important access points 15. For example, a particular access point 15 may generate an event priority of two for any attempted access, and an event priority of one for any access gained or denied.
Each time the credential 55 is presented at an off-line lock 80, the user information is read to allow for access decisions (block 160). However, event data stored in the off-line lock 80 is also downloaded to the credential 55 (blocks 170, 175, 180). Because the credential 55 has limited memory 110, the data is stored in its order of importance (i.e., data having the highest event priority is stored first). In order to facilitate the storage of the proper data given the short period of communication between the credential 55 and the off-line lock 80, one construction orders the event data within the off-line lock 80 based on the event priority. Thus, the data is sent to the credential 55 in the proper order. Other constructions may reorder the data after it is stored on the credential 55 or may provide pointers to the data. The pointers could be rearranged based on the event priority of the data to which they point. Thus, following the example discussed above, as the user attempts to gain access to the first off-line access point 85, the off-line lock 80 transfers event data to the credential 55. As the user proceeds to a second off-line lock 80 and even a third or fourth off-line lock 80, the process is repeated as shown in path 185 (i.e., event data is downloaded to the credential 55 if space is available, and access decisions are made). However, at some point, the data storage capacity of the credential 55 is reached. Once reached, additional data is stored only if it has an event priority that is higher than the data already stored as shown in block 190. Stored data is deleted or overwritten to accommodate the higher priority data as may be necessary.
When the user again attempts to gain entry at the on-line access point 40 (block 120), the user data is read from the credential 55 as before. In addition, all of the event data is uploaded through the on-line lock 45 to the central computer 20 as shown in block 195. After the data is stored, confirmation data corresponding to the uploaded event data is downloaded to, and stored on the credential as shown in block 200. The on-line lock 45 or the central computer 20 than makes the access decision (block 130), and presuming access is granted actuates the lock mechanism 75 to allow the user to pass through the on-line access point 40.
The user then moves to the off-line access point 85 and attempts to gain access (block 155). The user information as well as the confirmation data is read (blocks 160 and 205). If any of the confirmation data matches event data stored in the off-line lock 80, the event data is deleted from the off-line lock 80 as it has been successfully transferred to the central computer 20 as shown in blocks 210 and 215. Similarly, the confirmation data that matched the event data can be deleted from the credential 55 to free memory for additional event data. The user data is used to make the access decision (block 160) and new event data is downloaded to the credential 55 (block 170). This process is repeated for each user and each access point 15 accessed.
In many cases, the same event data may be downloaded to multiple user credentials 55. The first user to access an on-line access point 40 transfers the data to the central computer 20 and receives the confirmation data. All subsequent users simply receive the confirmation data, which replaces the actual event data. The first of these users that accesses the off-line access point 85 transfers the confirmation data such that the event data is erased from the off-line lock 80. Any subsequent users simply have the confirmation data erased when they access the off-line lock 80. This system assures that all of the downloaded data is eventually transferred to the central computer 20. In addition, the off-line access point 85 can add event data, or change the confirmation data, to the credentials 55 to indicate that the off-line data has received the confirmations. Once the central computer 20 receives this information, the on-line access point 40 will stop adding the confirmation data to the credentials 55.
In addition to transferring event data, the present system is capable of transferring changes to the security system such as global security changes, the addition of new users, the removal of old users, changes in codes or passwords, and the like. As illustrated in
The invention has been described herein as including a plurality of access points 15. While the most common application of the system and methods described herein would be to access points 15 that include doors, other types of access points 15 and combinations thereof are possible. For example, one arrangement provides security for a facility that stores materials that require additional security. In this construction, many of the access points 15 are doors, while others are material lockers, refrigerators, freezers, safes, vaults, and the like. Thus, as one of ordinary skill in the art will realize, the system and method can be applied to many different arrangements in which secure access is desired.
Thus, the invention provides, among other things, a new and useful system and method of securing a plurality of access points 15, and more particularly for transferring data to and from off-line access points 85.