摘要 |
A system and method are provided for providing communications via security and distributed access control systems that dynamically alter security protocols and security-associated mailing lists based on sender, receiver and/or message content. Exemplary embodiments provide individual stakeholders with an ability to transmit information to select groups or sub-groups, where appropriate, to provide broadcast communications of information that may be specifically applicable to members of those groups or sub-groups. The groups and/or sub-groups may be ad hoc or according to some predetermined scheme (including predetermined databases of lists designated by one or more of the stakeholders). In embodiments, all coordination of individual messaging will reside in, or be cleared through, a central coordination facility. Security and access control may be included in the databases to be automatically associated with the information provided to the receiving nodes. |
主权项 |
1. A system for implementing access control, comprising:
a first communicating device that is configured to communicate with a plurality of access control checkpoint components at a plurality of access control checkpoints controlled by a first entity, each of the access control checkpoint components being used to gain access to at least one of an access-controlled space, access-controlled equipment and an access controlled device; a second communicating device that is configured to separately communicate with a plurality of access control databases, each one of the plurality of access control databases (1) being controlled by a second entity and (2) containing information maintained by the second entity for individual access verification, the second entity being a different entity from the first entity; an access resolution device that is configured to
receive, via the first communicating device, an access request generated by a first one of the plurality of access control checkpoint components, the received access request including (1) identifying information for an individual seeking access verification via the first one of the plurality of access control checkpoints and (2) an identification of the one of the plurality of access control databases containing the information for the individual access verification,initiate a query, via the second communicating device, of the identified one of the plurality of databases containing the information for the individual access verification according to the identifying information in the received access request,receive, via the second communicating device, individual access verification information from the identified one of the plurality of databases, andforward, via the first communicating device, the received individual access verification information to the first one of the plurality of access control checkpoint components; and a message transmission device that is configured to
receive information regarding an anomalous occurrence in a vicinity of the first one of the plurality of access control checkpoint components,search one or more message and information databases to retrieve messaging information for directing a response to the anomalous occurrence at the first one of the plurality of access control checkpoint components or for directing a supporting response to the anomalous event at a second one of the plurality of access control checkpoint components via the first communicating device,generate a data transmission based the retrieved messaging information, and send the generated data transmission to at least one receiving node. |