Abstract:
Atomically modifying a personal security device includes presenting the personal security device to a reader/writer coupled to an access module, the access module determining if the personal security device includes a factory security mechanism, and, if the personal security device includes a factory security mechanism, using the reader/writer and the access module to replace the factory security mechanism with another security mechanism. The access module may authenticate the personal security device in connection with replacing the factory security mechanism. Authenticating the personal security device may grant access to a user through a door controlled by the access module. Replacing the factory security mechanism may include replacing an application on the personal security device. An ISO/IEC 7816-13 application management request command may be used to replace the application.
Abstract:
A method and device for discovering, identifying, and configuring a particular one of a plurality of devices to be administered is described. The method and device facilitate these steps by eliminating the need for an administrator to know a specific MAC address or unique identifier for the device to be administered, and by eliminating the need to identify that specific MAC address or unique identifier in a list of MAC addresses or unique identifiers.