Abstract:
Providing virtualized credentials of a holder includes setting conditions for determining which of a subset of credentials are to be sent to a device of a relying party that is different from the holder, where the conditions depend on a role of the relying party, selection by the holder, and/or contextual data of the holder or relying party, the relying party requesting specific ones of the credentials corresponding to the holder, the relying party receiving either none or at least some of the specific ones of the credentials according to the conditions, and displaying specific ones of the credentials received by the relying party on a screen of the device of the relying party. The contextual data may be a privacy level setting, distance between the relying party and the holder, and/or geolocation of the holder or relying party.
Abstract:
Methods, devices, and systems are provided for configuring a reading device and/or a lock using a mobile device. The mobile device, running a configuration application, communicates with the reading device, determines a configuration of the reading device, and makes a determination for configuring the reading device based at least partially on configuration information provided by the reading device.
Abstract:
A tag and a method of writing data to memory of a tag are provided. The tag includes memory that stores data elements as well as an access control list that maps access keys to the data elements. An authentication protocol is employed by the tag to determine whether a data element received from a writing device will be written to the memory.
Abstract:
Atomically modifying a personal security device includes presenting the personal security device to a reader/writer coupled to an access module, the access module determining if the personal security device includes a factory security mechanism, and, if the personal security device includes a factory security mechanism, using the reader/writer and the access module to replace the factory security mechanism with another security mechanism. The access module may authenticate the personal security device in connection with replacing the factory security mechanism. Authenticating the personal security device may grant access to a user through a door controlled by the access module. Replacing the factory security mechanism may include replacing an application on the personal security device. An ISO/IEC 7816-13 application management request command may be used to replace the application.
Abstract:
Various systems and methods for securely sharing private information are described herein. A mobile device comprises instruction to configured the mobile device to identify a verifier device having an available wireless connection, the wireless connection having a wireless connection strength; determine that a triggering event occurs, the triggering event based on the wireless connection strength; when the triggering event occurs: connect to the verifier device; transmit a digital credential to the verifier device, each of a plurality of data elements of the digital credential separately encrypted using distinct encryption keys; receive a request to access a requested data element of the digital credential; prompt a user of the mobile device for consent to share the requested data element; and transmit information to the verifier device when the user consents sharing the requested data element, the information used to decrypt only the requested data element.
Abstract:
A privacy preserving tag and methods for reading the same are disclosed. An authentication and tracking method and system for the privacy preserving tag is also disclosed. The method includes storing information in memory of a tag, receiving a read response at the tag from a reading device, and responding to the read request by generating a response at the tag that includes a combination of a base resource identifier as well as a privacy identifier. The privacy identifier is provided to support privacy characteristics of the tag while enabling establishment of a personalized portal at a remote system.
Abstract:
An access control system is described along with a method for operating the system. In one example, a system and method are disclosed that provide a hands-free solution thereby enabling a user to walk through a door or portal with no stop in motion and limited to no interaction or user effort. Security of the system is still maintained even though user interactions are significantly decreased.
Abstract:
An access control system enabling the use of a single mobile device with a plurality of keys is described. The plurality of keys are described as being stored in a key vault that is particularly administered by a holder of the mobile device and/or an enterprise that is granting the holder of the mobile device access to enterprise assets. By utilizing the key vault described herein, the holder of the mobile device does not need to carry separate access credentials or physical keys.
Abstract:
An access control system configured to distinguish between the intentional and unintentional presentation of an authorized identification code in making an access control decision is described. The system uses a fixed reader and primary and secondary mobile devices to determine the location and position of the mobile devices and/or to determine whether the mobile devices are inside or outside of the resource protected by the access control system.
Abstract:
An access control system may comprise a credential including credential data, and at least one reader. The at least one reader is configured to receive, over a link, the credential data. The at least one reader is configured to verify that the credential is valid based on the credential data, and mark the credential as valid and track a location of the credential relative to the at least one reader. The at least one reader is configured to make or delay an access control decision for the credential based on the location of the credential.