$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for security access control in multiple regions 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/00
  • G06F-011/30
출원번호 US-0203455 (1998-12-02)
발명자 / 주소
  • Marchoili John
  • Neilsen John
  • Regelski Michael
  • Prokupets Rudy
  • Zientara David
  • Rozwod Robert
출원인 / 주소
  • Lenel Systems International, Inc.
대리인 / 주소
    Lukacher
인용정보 피인용 횟수 : 65  인용 특허 : 25

초록

A system for controlling access in multiple regions is provided in which each region comprises one or more sites having building areas to which access is controlled. The system includes multiple regional databases, where each regional database is associated with one of the regions, and a master data

대표청구항

[ What is claimed is:] [1.]1. A system for controlling access in a plurality of regions in which each region comprises one or more sites having areas to which access is controlled, said system comprising:a master database for storing system information, cardholder information for the system, and acc

이 특허에 인용된 특허 (25)

  1. Ozer Richard (Brookline MA) DeSantis Edward (Boston MA) Tomlinson Brett (Brighton MA), Access control system having centralized/distributed control.
  2. Dew Larry A., Arbitration method for a communication network.
  3. Bass Theresa A. ; Brinlee Kerry D., Automated system and method for providing access data concerning an item of business property.
  4. Johnston ; Jr. Louie E. (5 Jones Cir. Old Hickory TN 37138), Automated system for manufacturing of customized military uniform insignia badges.
  5. Khandwala Bhupendra J. (Claremont CA) Young Jorge A. (Claremont CA) Kalustian Sarkis V. (Claremont CA), Card reader for security system.
  6. Skorupski Jeffrey H. (Kalamazoo MI) Lueckenbach William H. (Lewisville NC), Computer assisted driver vehicle inspection reporting system.
  7. Materna Anthony T. (Santa Monica CA) Vossler Roger A. (Santa Monica CA) Stepczyk Frank M. (Manhattan Beach CA), Computer integration system.
  8. Kaarsoo Enn (Ottawa CAX) Charlton Bill (Ottawa CAX), Electronic access control mail box system.
  9. Barrett Martin A. (Salem OR) Larson Wayne F. (Salem OR), Electronic access control systems.
  10. Loosmore N. Bert (New York NY) Ehrman Kenneth (New York NY) Jagid Bruce (New York NY), Electronic control system/network.
  11. Crain Lawrence (Pompton Lakes NJ), Emergency action systems including console and security monitoring apparatus.
  12. Nerlikar Virupax M. (Plano TX), Information management and security system.
  13. Mauch Barbara J. (Inglewood CA), Keypad security system.
  14. Weiss Kenneth P. (7 Park Ave. Newton MA 02150), Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics.
  15. Weiss Kenneth P. (Newton MA), Method and apparatus for secure identification and verification.
  16. Barrett Martin A. (Salem OR) Larson Wayne F. (Salem OR), Method for transferring auxillary data using components of a secure entry system.
  17. Lavelle Gary E. ; Conklin Peter S. ; Hass Brian D. ; Walsh ; III John E., Multiple access electronic lock system.
  18. Cohn Robert S. ; Vaudreuil Gregory M. ; Schoeneberger Carl F. ; Reece David M. ; O'Neal Carlton C. ; Kalbfleisch Carl W. ; Whipple Mark B. ; Swoopes James R. ; Huch Alan T. ; Dimitroff Michael P., Network-based multimedia communications and directory system and method of operation.
  19. Fox Thomas M. (Gilbert AZ), Personal identification system.
  20. Gay Kirk W. (Grand Prairie TX) Selari Dan (Grapevine TX), Real-time computer system with multitasking supervisor for building access control or the like.
  21. Snaper Alvin A. (2800 Cameo Cir. La Vegas NV 89107), Remote access personnel identification and tracking system.
  22. Williams Jarvis L. (4452 Ardmore Ct. Bloomfield Hills MI 48013), Security apparatus for controlling access to a predetermined area.
  23. Ulch Bryan D. (Valencia CA) Sturgis Donald P. (Claremont CA) Fox Robert J. (Los Angeles CA), Self-contained programmable terminal for security systems.
  24. Ulch Bryan D. (Valencia CA) Sturgis Donald P. (Claremont CA) Fox Robert J. (Los Angeles CA), Self-contained programmable terminal for security systems.
  25. Ulch Bryan D. (Valencia CA) Sturgis Donald P. (Claremont CA) Fox Robert J. (Los Angeles CA), Self-contained programmable terminal for security systems.

이 특허를 인용한 특허 (65)

  1. Kapczynski, Mark Joseph; Dean, Michael John; Hunt, III, Herbert Harris, Account vulnerability alerts.
  2. Burger, Michael, Adjustment of knowledge-based authentication.
  3. Burger, Michael; Dean, Michael John; Kapczynski, Mark Joseph; Yu, Nelson, Authentication alerts.
  4. Hayashi, Hitoshi, Authentication system.
  5. Hu, Hua; Torrez, Luz M., Automatic generation of code for attributes.
  6. Taylor, Ty; Balducci, Michael R.; Miranda, Arlene E.; Gelgand, Laura, Card registry systems and methods.
  7. Rielau,Serge; Cochrane,Roberta J.; Lapis,George; Pirahesh,Hamid; Sidle,Richard S.; Zhu,Biao, Classification of data for insertion into a database.
  8. Mimura, Atsuhiko; Kumagai, Naoko; Kotani, Hiroki, Communication device, communication system and method for managing access authority data.
  9. Birchbauer, Dave Dale; Thomas, Beth; Huneidi, Tareq (Rick), Controller providing shared device access for access control systems.
  10. Ranade, Dilip M., Coordinated dirty block tracking.
  11. Ranade,Dilip M., Coordinated dirty block tracking.
  12. Dean, Michael John; Kapczynski, Mark Joseph, Debt services candidate locator.
  13. Hashimoto, Ayaka; Okubo, Tadashi; Hashimoto, Hiroshi, Industrial equipment management system, industrial equipment management server, industrial equipment management method, and information storage medium.
  14. Moss,John L.; Gaiman,Barry, Integrated security system having network enabled access control and interface devices.
  15. Serani, Scott M.; McMillin, Leslie S.; Blish, III, Charles D., Interactive key control system and method of managing access to secured locations.
  16. Dean, Michael John; Kapczynski, Mark Joseph, Lifescore.
  17. Alexander, Bruce; Grose, Karen; Schebel, Christoph; Antal, David, Method and process for configuring a premises for monitoring.
  18. Alexander, Bruce; Grose, Karen; Schebel, Christoph; Antal, David, Method and process for configuring a premises for monitoring.
  19. Alexander, Bruce; Grose, Karen; Schebel, Christoph; Antal, David, Method and process for configuring a premises for monitoring.
  20. Alexander,Bruce; Grose,Karen; Schebel,Christoph; Antal,David, Method and process for configuring a premises for monitoring.
  21. Radicella, Michael; Burkley, Richard M.; Chapman, Kriston L.; Jones, Shirl D.; Matsumoto, Roger Y., Method and system for controlling access to an enclosed area.
  22. Farah, Barry Scott; Welsch, Randall Scott; Canaday, Paul Mike; Butkus, Albert William; Vollenweider, Craig William, Method and system for integrating building services by developing and loading an adapter element for each of the devices and applications of plurality of integrated building services to encapsulate t.
  23. Kogen, Mark; Tan, Warren, Method and system for managing transaction card data.
  24. Matsuura, Shun; Nakamitsu, Hiroaki; Ito, Hayashi, Method for smooth scheduling on a periodic basis in a client-server system.
  25. Cheung, Tom Thuan, Multi-connection control system.
  26. Neely, E. Terry, Networked physical security access control system and method.
  27. Neely, E. Terry, Networked physical security access control system and method.
  28. Ghai, Vikrant; Sharma, Shailendra; Jain, Ajay, Physical access control and security monitoring system utilizing a normalized data format.
  29. Ghai, Vikrant; Sharma, Shailendra; Jain, Ajay, Policy-based physical security system for restricting access to computer resources and data flow through network equipment.
  30. Shane, Michael, Proactively communicating information between processes through a message repository.
  31. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, Security control access system.
  32. Radicella, Michael; Matsumoto, Roger; Morrison, Matthew J.; Burkley, Richard; Chapman, Kriston; Jones, Shirl, Security control and access system.
  33. Novozhenets,Yuri; Regelski,Michael, Security system for access control using smart cards.
  34. Petricoin, Jr., Dennis M., Security system with point bus abstraction and partitioning.
  35. Burns,Jeffrey R., Self-service entry control system.
  36. Golan, Oren; Pikaz, Arie; Pikaz, legal representative, Sharon; Raj, Jeffrey Sanders, System and method for counting people near external windowed doors.
  37. Golan, Oren; Pikaz, Arie; Raj, Jeffrey Sanders, System and method for counting people near external windowed doors.
  38. Alexander, Bruce; Antal, David, System and method for customizing the storage and management of device data in a networked environment.
  39. Alexander, Bruce; Antal, David, System and method for customizing the storage and management of device data in a networked environment.
  40. Pikaz, Arie, System and method for detecting an invalid camera in video surveillance.
  41. Alexander, Bruce; Bahneman, Liem, System and method for implementing open-control remote device control.
  42. Alexander,Bruce; Bahneman,Liem, System and method for implementing open-protocol remote device control.
  43. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
  44. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
  45. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
  46. Barker,Geoffrey T.; Alexander,Bruce, System and method for performing a predictive threat assessment based on risk factors.
  47. Alexander, Bruce, System and method for processing monitoring data using data profiles.
  48. Barker, Geoffrey T.; Alexander, Bruce; Talley, Paul, System and method for providing configurable security monitoring utilizing an integrated information portal.
  49. Alexander, Bruce; Talley, Paul; Hicks, Jeffrey, System and method for providing configurable security monitoring utilizing an integrated information system.
  50. Alexander, Bruce; Talley, Paul; Hicks, Jeffrey, System and method for providing configurable security monitoring utilizing an integrated information system.
  51. Barker, Geoffrey T.; Andersen, Claire; Alexander, Bruce; Bahneman, Liem, System and method for providing configurable security monitoring utilizing an integrated information system.
  52. Alexander, Bruce; Antal, David; Litke, Matthew; Schebel, Christoph; Thompson, Paul, System and method for providing data communication in a device network.
  53. Hunt, III, Herbert Harris, System and methods for credit dispute processing, resolution, and reporting.
  54. Mallard, George, System for integrating multiple access controls systems.
  55. Prokupets, Rudy; Regelski, Michael, System for integrating security and access for facilities and information systems.
  56. Prokupets,Rudy; Regelski,Michael, System for integrating security and access for facilities and information systems.
  57. Alexander, Julie D., System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure.
  58. Alexander,Bruce, System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure.
  59. McMillan, Helen; Skurtovich, John Lawrence; Kress, Anita; Sumida, Timothy; McVey, Michael Charles, Systems and methods for providing an integrated identifier.
  60. Charyk, Mike; Yu, Nelson, Systems and user interfaces for dynamic access of multiple remote databases and synchronization of data based on user rules.
  61. Kavanagh, Stephen; Clarke, Conor; Guilfoyle, Kleron; Brosnan, Patrick, Transaction processing.
  62. Kavanagh, Stephen; Clarke, Conor; Guilfoyle, Kleron; Brosnan, Patrick, Transaction processing.
  63. Pattabhi, Ravi; Akali, Harish, Virtual masked database.
  64. Rodenbeck, Robert Wilmer; Russell, Roger Keith; Long, Michael Lee, Wireless security control system.
  65. Rodenbeck, Robert Wilmer; Russell, Roger Keith; Long, Michael Lee, Wireless security control system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로