Systems and methods for managing configuration data at disconnected remote devices
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/177
G06F-009/445
H04L-012/24
G06F-009/44
G06F-007/04
출원번호
US-0970778
(2010-12-16)
등록번호
US-9280365
(2016-03-08)
우선권정보
AU-2009906141 (2009-12-17)
발명자
/ 주소
Jones, Bryan
Palme, Matt
Quaill, Stephen
Cheung, Edward
출원인 / 주소
Honeywell International Inc.
대리인 / 주소
Seager, Tufte & Wickhem, LLP
인용정보
피인용 횟수 :
0인용 특허 :
195
초록▼
Described herein are systems and methods for managing configuration data. These are particularly directed towards the management of configuration data in disconnected remote devices of a host system. For example, this may be an access control environment having one or more connected access control d
Described herein are systems and methods for managing configuration data. These are particularly directed towards the management of configuration data in disconnected remote devices of a host system. For example, this may be an access control environment having one or more connected access control devices (i.e. devices in communication with a central server), and one or more disconnected access control devices (i.e. devices operating without communication with the central server), the latter being regarded as disconnected remote devices. In overview, the present systems and methods make use of a versioning protocol to allow the reliable distribution of configuration data at the disconnected remote devices, this protocol operating to best ensure the propagation of the most current configuration data.
대표청구항▼
1. A method performed by an access control device of a host access control system, for managing configuration data, the method comprising the steps of: the access control device determining whether it has a network connection to a server device of the host access control system;the access control de
1. A method performed by an access control device of a host access control system, for managing configuration data, the method comprising the steps of: the access control device determining whether it has a network connection to a server device of the host access control system;the access control device, in response to determining that it does not have a network connection to a server device of the host access control system, adopting a disconnected mode of operation;the access control device reading an access control smartcard, wherein the access control smartcard carries data comprising: (i) user credential data configured to enable an authorization/authentication process to determine whether or not access should be granted in response to reading of the access control smartcard; and (ii) configuration data including threat level data;the access control device, in response to reading the access control smartcard, performing an automated process comprising: (a) reading the configuration data including threat level data from the access control smartcard, wherein the threat level data is a form of configuration data, wherein the configuration data including threat level data, when successfully applied by the access control device, is used by the access control device to determine at least part of the functionality of the remote device when operated in the disconnected mode, including threat-level specific functionality of a given authorization/authentication process to determine whether or not access should be granted;(b) determining version information for the configuration data including threat level data carried by the access control smartcard;(c) comparing the version information of the configuration data including threat level data carried by the access control smartcard with version information of configuration data including threat level data applied by the access control device;(d) in the case that the version information for the configuration data including threat level data carried by the access control smartcard supersedes version information of configuration data including threat level data applied by the access control device, selectively applying the configuration data including threat level data carried by the access control smartcard to the access control device; and(e) in the case that the version information for the configuration data including threat level data carried by the access control device supersedes version information of configuration data applied by the access control smartcard, writing the configuration data including threat level data carried by the access control device to the access control smartcard, and configuring the access control smartcard to cause a further disconnected access control device of the host access control system to, following presentation of the access control smartcard to the further disconnected access control device, selectively apply the written configuration data including threat level data; andthe access control device subsequently performing the authorization/authentication process to determine whether or not access should be granted based on the presentation of the access control smartcard, using configuration data including threat level data current applied by the access control device. 2. A method according to claim 1 wherein writing the configuration data including threat level data carried by the access control device to the access control smartcard includes: (i) determining whether the configuration data to be applied is complete; and(ii) only applying the configuration data in the event that it is complete. 3. A method according to claim 2 wherein determining whether the configuration data to be applied is complete includes taking a hash of the configuration data to be applied. 4. A method according to claim 1 wherein the configuration data includes access permissions for one or more users. 5. A method according to claim 1 wherein the automated process further comprises: in the case that the configuration data including threat level data carried by the access control smartcard is successfully applied to the access control device, writing data indicative of the successful application to the access control smartcard, and configuring the access control smartcard to cause a further device of the host system, being a device in communications with a server device of the host system, to communicate the indicative of the successful application to the server following presentation of the access control smartcard to the further connected device. 6. A method according to claim 1 wherein the version information is defined by a timestamp. 7. An access control device configured for operation as part of a host access control system without a communication channel to the host access control system, the access control device comprising: a communications port configured to read access control smartcards, including an access control smartcard that carries data comprising: (i) user credential data configured to enable an authorization/authentication process to determine whether or not access should be granted in response to presentation of the access control smartcard; and (ii) configuration data including threat level data;a memory module for maintaining software instructions; anda processor for executing the software instructions;wherein the access control device is configured to: operate in a disconnected mode, wherein the access control device does not have a network connection to any other devices of the host access control system, and whilst in the disconnected mode, in response to reading an access control smartcard with configuration data including threat level data, perform an automated process comprising: determining version information for the configuration data including threat level data carried by the access control smartcard;comparing the version information of the configuration data including threat level data carried by the access control smartcard with version information of configuration data including threat level data applied by the access control device;in the case that the version information for the configuration data including threat level data carried by the access control smartcard supersedes version information of configuration data including threat level data applied by the access control device, selectively applying the configuration data including threat level data carried by the access control smartcard to the access control device, wherein the access control device uses the configuration data including threat level data to determine at least part of the functionality of the access control device including threat-level specific functionality of a given authorization/authentication process to determine whether or not access should be granted; andin the case that the version information for the configuration data including threat level data carried by the access control device supersedes version information of configuration data including threat level data applied by the access control smartcard, write the configuration data including threat level data carried by the access control device to the access control smartcard, and configuring the access control smartcard to cause a further access control device of the host access control system to, following presentation of the access control smartcard to the further access control device, selectively apply the written configuration data including threat level data; andsubsequently performing the authorization/authentication process to determine whether or not access should be granted based on the presentation of the access control smartcard, using configuration data including threat level data current applied by the access control device. 8. An access control device according to claim 7 wherein writing the configuration data the configuration data carried by the access control smartcard to the access control device includes: (iii) determining whether the configuration data to be applied is complete; and(iv) only applying the configuration data in the event that it is complete. 9. An access control device according to claim 8 wherein determining whether the configuration data to be applied is complete includes taking a hash of the configuration data to be applied. 10. An access control device according to claim 7 wherein the access control device includes an access control device, and the configuration data includes access permissions for one or more users. 11. A access control device according to claim 7 wherein the automated process further comprises: in the case that the configuration data including threat level data carried by the access control smartcard is successfully applied to the access control device, writing data indicative of the successful application to the access control smartcard, and configuring the access control smartcard to cause a further device of the host system, being a device in communications with a server device of the host system, to communicate the indicative of the successful application to the server following presentation of the access control smartcard to the further connected device. 12. An access control device according to claim 7 wherein the version information is defined by a timestamp. 13. A method for managing configuration data including threat level data in a host system including one or more connected devices that are connected to a host system network and one or more access control devices that are not connected to the host system network, the method comprising: at an access control device, whilst operating in a disconnected mode wherein the device does not have a network connection to any other devices, reading configuration data including threat level data from an access control smartcard, wherein the access control smartcard is a smartcard or a portable memory device, and based on a version control protocol selectively either: (i) apply the read configuration data including threat level data to the access control device, wherein the access control device uses the configuration data including threat level data to determine at least part of the functionality of the access control device including threat-level specific functionality of a given authorization/authentication process to determine whether or not access should be granted; or (ii) write configuration data including threat level data stored at the access control device to the access control smartcard, and in the case that the read configuration data including threat level data is selectively applied to the access control device, writing data indicative of that application to the access control smartcard;at the access control device, subsequently performing an authorization/authentication process to determine whether or not access should be granted based on the presentation of the access control smartcard, using configuration data including threat level data current applied by the access control device; andat a connected device, reading from the access control smartcard data indicative of successful application of configuration data including threat level data to one or more access control devices, and propagating that data to a central controller of the host system;wherein in the case of (ii), configuring the access control smartcard to cause a further access control device of the host access control system to, following presentation of the access control smartcard to the further access control device, selectively apply the written configuration data including threat level data.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (195)
Ryan Joseph L. (Tuscon AZ) Safdie Elias (Chelmsford MA) Watkins Richard R. (Chelmsford MA) Kobs Frederick E. (East Pepperell MA), Access control logic for video terminal display memory.
Michael J. Tracy ; Robert L. Hinze, Apparatus and method for collecting and transmitting utility meter data and other information via a wireless network.
Rossi, Todd M.; Rossi, Dale; Douglas, Jonathan D.; Stockman, Timothy P., Apparatus and method for detecting faults and providing diagnostics in vapor compression cycle equipment.
Koegel Robert J. (Glendale AZ) Rabins Leonard (Scottsdale AZ), Apparatus for controlling system accesses having multiple command level conditional rotational multiple port servicing p.
Jesper Vasell SE; Tom Idermark SE; Malte Lilliestrale SE; Hans Thorsen SE; Staffan Truve SE; Carlo Pompili SE; Johan Ljungberg SE; Jorgen Andersson SE, Application and communication platform for connectivity based services.
Drees Kirk H. ; Gloudeman Jeffrey J. ; Gottschalk Donald A. ; Rasmussen David E., Asynchronous distributed-object building automation system with support for synchronous object execution.
Kshirsagar, Sachin R.; Subbaiah, Ramesh; Subbiah, Siva, Automatic guidance of visitor in new facility through access control system integration with LCD display.
Gloudeman Jeffrey J. ; Gottschalk Donald A. ; Kraemer C. Richard ; Rasmussen David E., Common object architecture supporting application-centric building automation systems.
Reis Robert Steven (Palo Alto CA) Verma Vikram (Palo Alto CA) Mihovilovic Domingo Antonio (Mountain View CA) Bertrand Peter Scott (Palo Alto CA) Stevens Richard Kenneth (Cupertino CA), Communication system for communicating with tags.
Cebasek Gregory B. ; Gloudeman Jeffrey J. ; Gottschalk Donald A. ; Rasmussen David E., Communication system for distributed-object building automation system.
Crooks Gerry ; Arnhold Ed ; Battista John ; Boni Ken ; Bowers Dan ; Feichtner Mark ; French Blaine ; Genzberger Janna ; Holmes David D. ; Kippenhan Larry ; Miller Dave ; Nanto Shawn ; Orr Teri ; Schl, Computerized resource accounting methods and systems, computerized utility management methods and systems, multi-user u.
Korklan Harris J. (Granger IN) Greany John K. (S. Bend IN), Conditioned colloidal silica post impregnant to prevent binder migration in the production of insulation articles compri.
Scarola Kenneth (Windsor CT) Jamison David S. (Windsor CT) Manazir Richard M. (North Canton CT) Rescorl Robert L. (Vernon CT) Harmon Daryl L. (Enfield CT), Display device for indicating the value of a parameter in a process plant.
Gloudeman Jeffrey J. ; Gottschalk Donald A. ; Rasmussen David E. ; Wagner Michael E., Distributed object-oriented building automation system with reliable asynchronous communication.
Krocker,Robert E.; Baier,Terence D.; Renaud,Merle A.; Rentmeester,Paul C.; Swanson,Robert M.; Wilson,Patrick J.; Johnson,Kirk W., HVAC service tool with internet capability.
Chene, George; French, Lee A.; Kramer, Dennis A.; Lawruk, Gerald D.; Mueller, Brian Jeffrey; Ramsey, Reno V.; Shintaku, Wayne; Worrall, Jack R., Individualized vehicle settings.
Steger, Perry C.; Foote, Garritt W.; Potter, David L.; Truchard, James J., Measurement system with modular measurement modules that convey interface information.
Barlow George J. (Tewksbury MA) Bradley John W. (Peabody MA) Getson ; Jr. Edward F. (Peabody MA), Method and apparatus for limiting the utilization of an asynchronous bus with distributed controlled access.
Richard A. Howes ; Edward C. Kersey ; Bruce F. Wong ; James A. Jordan ; William M. Leblanc ; Andrew L. Foss, Method and apparatus for maintaining connection state between a connection manager and a failover device.
Heitman Lynn B. (4711 Sycamore La. Parker TX 75002) Ezell George D. (3733 Pebble Beach Farmers Branch TX 75234), Method and apparatus for monitoring and controlling air handling systems.
Campbell, Bruce S.; Strauss, III, Burton M.; Dolecki, Myron C., Method and system for partitioned service-enablement gateway with utility and consumer services.
Bellamy, Dirk Livingston; Moreno, Nery Manuel; McCormack, Kenneth; St. John, Kenton Arthur; Sharma, Vikas Mohan; Page, R. Kenin; Shelton, Stephen Anthony, Methods and systems for operating a video surveillance system.
van Weele Leonardus A. (Terneuzen NLX) de Bruijn Ronny P. (Jansteen NLX) Vermeire Roger R. (Terneuzen NLX) Zemering Christo (Midland MI) Lenting Ben (Auckland NZX), Operator station for manufacturing process control system.
Boyle,Frank J.; Haserodt,Kurt H.; Mataga,Peter Andrew; Ravipati,Chandra M.; Wallach,Ryan Scott, Originator based directing and origination call processing features for external devices.
Balasubramanian, Meenakshi; Ganesh, Arul; Chaturvedi, Namit; Chowdhury, Atish Datta, Policy language and state machine model for dynamic authorization in physical access control.
Aalto Erkki (Kausala FIX) Mattila Timo (Kausala FIX) Niemel Mertsi (Lahti FIX) Rantanen Pertti (Jaala FIX), Procedure for controlling and maintaining air currents or equivalent in an air-conditioning installation, and an air-con.
Kline James R. ; Costick Matthew L., Process and apparatus for individual adjustment of an operating parameter of a plurality of environmental control devices through a global computer network.
Musser Marshall R. (6793 Trafford Ct. Middletown OH 45044) Brunermann ; Jr. George A. (5456 Red Oak Dr. Cincinnati OH 45238), Quick connect diagnostic apparatus and method for a vehicle cooling system.
Di Luoffo,Vincenzo Valentino; Fellenstein,Craig William; Reilly,Dylan Maxwell, Smart card data transaction system and methods for providing high levels of storage and transmission security.
Gloudeman Jeffrey J. ; Gottschalk Donald A. ; Rasmussen David E. ; Wainscott ; Jr. Barrett G., Software components for a building automation system based on a standard object superclass.
Webster Marvin K. (Glendale AZ) Flynn Richard T. (Peoria AZ) Porter Marion G. (Phoenix AZ) Seminsky George M. (Phoenix AZ), Split-cycle cache system with SCU controlled cache clearing during cache store access period.
Getson ; Jr. Edward F. (Lynn MA) Kelley John H. (Nashua NH) Rathbun Donald J. (Andover MA) McLaughlin Albert T. (Hudson NH), Synchronization control system for firmware access of high data rate transfer bus.
Anne, Gowtham; Desai, Yeshwant Sabaji; Alexander, Bobby Varghese, System and method for accessing and presenting health information for field devices in a process control system.
Hayes,Patrick H.; Conway, Jr.,James N.; Lilleness,Robert P.; Arling,Paul D., System and method for automatically setting up a universal remote control.
Andarawis,Emad Andarawis; Berkcan,Ertugrul; Delgado,Eladio Clemente; Rao,Samantha, System to monitor the health of a structure, sensor nodes, program product, and related methods.
Stoutenburg, Earney; Mollett, Cassandra J.; Price, James; Fillinger, Charles A.; Nelson, Eric M.; Seifert, Dean A.; Singleton, Jeffrey, Systems and methods for deploying a point-of sale device.
Kaplinsky, Michael, Video surveillance system based on high resolution network cameras capable of concurrent transmission of multiple image formats at video rates.
Barker Charles E. (Holland MI) Cairo Anthony C. (Holland MI) Bauer Frederick T. (Holland MI) Jackson ; Jr. Auzville (Richmond VA), Wall thermostat and the like.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.