摘要 |
In one embodiment, access log information is written to portable cards of end-users of system that includes networked and non-networked processor based systems that control user access. In conjunction with processing of access attempts by non-networked processor-based systems, time stamps of accesses by each end-user for multiple accesses on multiple processor-based systems are analyzed against one or more access rules, the one or more rules defining one or more relative timing constraints or order constraints for accesses on multiple processor-based systems. Also, in conjunction with processing of the further access attempts by the non-networked processor-based systems, access decisions are controlled in response to determining whether the time stamps of respective end-users indicate that said respective end-users have violated the one or more access rules.
|