Browse Prior Art Database

Method for automated access control to risky area

IP.com Disclosure Number: IPCOM000197230D
Publication Date: 2010-Jun-29
Document File: 2 page(s) / 71K

Publishing Venue

The IP.com Prior Art Database

Abstract

This publication proposes a generic method that can be easily automated to provide access control to a risky area, and to provide a proof that security checking have been properly performed.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 75% of the total text.

Page 1 of 2

Method for automated access control to risky area

Abstract

This publication proposes a generic method that can be easily
automated to provide access control to a risky area, and to
provide a proof that security checking have been properly
performed.

Automated access control

Before entering in a risky area, an Area Entrance Request is
sent to the Access Control System (ACS) using any type of
protocol: SMS, geolocation, HTTP request, etc. According to
the protocol, the system can possibly request more details
(number of people, etc, etc). The system checks all possible
entrance criteria, such as regulation (depending on entrance
time), weather forecast, individual agreements, etc.

If all OK, the system gives back an acknowledgment with a
transaction id and the estimation of maximum exit time. An
alarm timer is set.

If not OK, the system gives back an entrance denial and a
serious warning that people responsibility is engaged if going
over.

When exiting the area, an Area Exit Signal is sent to the ACS
to close the transaction. The system responds with an
acknowledgment to complete the transaction.

On timeout, the system tries to contact the end-user. If no
problem is identified, a new delay is proposed and the alarm
timer is postponed to a further time. If no contact is
obtained, rescue is called and the system provides all known
information about the end-user and his route.

Conclusion

This method provides automated and general purpose security
checkings when crossing a risky area. Aut...