$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Workspace security system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G08B-019/00
  • G06K-005/00
출원번호 US-0376842 (2003-02-28)
발명자 / 주소
  • Elliott, Brent
  • Fenwick, Jeff
  • Thyen, Chris J.
출원인 / 주소
  • Kimball International, Inc.
대리인 / 주소
    Baker &
인용정보 피인용 횟수 : 59  인용 특허 : 25

초록

A workspace security system having processors, sensors, and actuators for local and remote monitoring, control, and automation of physical and environmental security, safety, efficiency, and productivity. The system includes passive and active access authentication devices and active or passive unlo

대표청구항

1. A workspace security system, associated with at least a first work area, comprising:an office furniture component located in the first work area, said office furniture component having at least one access component;at least one processor associated with the first work area and said office furnitu

이 특허에 인용된 특허 (25)

  1. Schmitt John C. ; Setlak Dale R., Access control system including fingerprint sensor enrollment and associated methods.
  2. Gokcebay Asil T. (San Francisco CA), Access control system with mechanical keys which store data.
  3. Seeley John E. ; Vogt William R., Advanced video security system.
  4. Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Communications network for identifying the location of articles relative to a floor plan.
  5. Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Communications network for identifying the location of articles relative to a floor plan.
  6. Joao Raymond Anthony, Control apparatus and methods for vehicles.
  7. Hiroshi Nakamura JP, Door camera unit having a video memory.
  8. Gotanda Motohiro (1802-10 Nakabyo ; Abiko-shi ; Chiba-ken JPX), Door lock control system.
  9. Warren Edward L. (Spring Lake MI), Electronic interlock for storage assemblies.
  10. Warren Edward L. ; Miller David E. ; Arter James, Electronic interlock for storage assemblies.
  11. Feldpausch Thomas G. (Hastings MI) Branc Joseph R. (Grand Rapids MI) Lubinskas Robert B. (Hastings MI), Electronic lock.
  12. Launey Reuel O. (Arlington VA) Grendler Peter A. (Silver Spring MD) Packham Donald L. (Fort Lauderdale FL) Battaglia James M. (Kettering MD) Levine Howard E. (Adelphi MD), Expandable home automation system.
  13. Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Furniture unit having a modular communication network.
  14. Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Furniture unit having a modular communication network.
  15. Frost, Kenneth L.; Russell, Roger Keith, Integrated access system.
  16. Weiss Kenneth P., Method and apparatus for inhibiting unauthorized access to or utilization of a protected device.
  17. Murray James S. (South Lyon MI), Method and apparatus for interconnected electronic locks.
  18. Leonaggeo Patricia (Boynton Beach FL) Lamb James A. (Coral Springs FL), Method and apparatus for remote control of locks.
  19. Johnson William J. (Flower Mound TX) Keller Robert S. (Grapevine TX) Manthuruthil George C. (Coppell TX) Williams Marvin L. (Lewisville TX), Method of and apparatus for providing existential presence acknowledgement.
  20. Toms John Schackelford (University Heights OH) Brown Steven M. (Grand Rapids MI) Miller William L. (Ada MI) Weller George V. (Grand Rapids MI) Russell Scott H. (Kalamazoo MI) Branc Joseph R. (Grand R, Method of configuring a furniture utility distribution system.
  21. Fufido, Michael Vincent; Baldassarre, Giuseppe Pino; Moffat, Reginald Gary, Portal intrusion detection apparatus and method.
  22. Capwell Robert Garold ; Webb Richard D., Programmable electronic desk lock.
  23. Duhame Dean C. (Roseville MI) Meyvis Daniel V. (Bloomfield Hills MI), Security system for controlling building access.
  24. Lawson Todd C. ; Cave Warren D. ; Schmidt Dean L., System and method for global event notification and delivery in a distributed computing environment.
  25. Toms John S. (University Heights OH) Brown Steven M. (Grand Rapids MI) Miller William L. (Ada MI) Weller George V. (Grand Rapids MI) Russell Scott H. (Kalamazoo MI) Branc Joseph R. (Grand Rapids MI) , Utility distribution system for modular furniture and the like.

이 특허를 인용한 특허 (59)

  1. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Activation of a home automation controller.
  2. Bryan, Marc; Kitchen, Jim; Boyd, Weston, Activation of gateway device.
  3. Bailey, Jr., Samuel A., Adaptive policies and protections for securing financial transaction data at rest.
  4. Bailey, Jr., Samuel A., Adaptive policies and protections for securing financial transaction data at rest.
  5. Bailey, Jr., Samuel A., Adaptive policies and protections for securing financial transaction data at rest.
  6. Raji, Reza; Gutt, Gerald, Automation system with mobile interface.
  7. St. George, Paul; Vue, Patrick, Cash drawer having a network interface.
  8. Dawes, Paul; Baum, Marc; Wood, Aaron, Communication protocols in integrated systems.
  9. Decenzo, Chris; Baum, Marc; Dawes, Paul; Chu, Frank, Communication protocols over internet protocol (IP) networks.
  10. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J., Cross-client sensor user interface in an integrated security network.
  11. Fulker, Jim; Sundermeyer, Ken; Dawes, Paul J.; Raji, Reza, Cross-client sensor user interface in an integrated security network.
  12. Bailey, Jr., Samuel A., Dynamic pairing system for securing a trusted communication channel.
  13. Bailey, Jr., Samuel A., Dynamically reacting policies and protections for securing mobile financial transaction data in transit.
  14. Bailey, Jr., Samuel A., Dynamically reacting policies and protections for securing mobile financial transaction data in transit.
  15. Bailey, Jr., Samuel A., Dynamically reacting policies and protections for securing mobile financial transactions.
  16. Mitsumoto,Hiroki, Entering/leaving management system.
  17. Baum, Marc; Dawes, Paul J., Forming a security network including integrated security system components and network devices.
  18. Chmielewski, Tom; Kitchen, Jim, Generating risk profile using data of home monitoring and security system.
  19. Anegawa, Takehiko; Yano, Yoshihiro, Image information management system and method thereof, and image information search system.
  20. Dawes, Paul J.; Decenzo, Chris; Wales, Carolyn, Integrated security network with security alarm signaling system.
  21. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  22. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  23. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  24. Raji, Reza; Wood, Aaron; Hazbun, Robert, Integrated security system with parallel processing architecture.
  25. Barrieau, Mark P., Magnetic releasing and securing device.
  26. Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
  27. Cohn, Alan Wade; Battles, Ronald E.; Proft, David; Shumate, Scott William, Method and system for providing alternate network access.
  28. Tanaka,Toshiaki; Nishikawa,Takeichiro; Imasaki,Naoki, Method of and computer program product for monitoring person's movements.
  29. Bacco, Edward M.; Prinzivalli, Domenic P.; Collins, Anthony T., Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control.
  30. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  31. Raji, Reza; Gutt, Gerald, Methods and systems for improved system performance.
  32. Bailey, Jr., Samuel A., Mobile device sensor data.
  33. Mullins, Kevin W.; McConnell, Gary, Notification apparatus, system, and method.
  34. Igarashi, Yasuhiro, Personal authentication apparatus.
  35. Lekutai, Gaviphat, Personal event data recorder.
  36. Chang, Tzu-Wei, Pick-resistant lock system.
  37. Coughlin,Michael E.; Knutsen,Bernhard P.; Schloemer,David E., RFID tag and method of user verification.
  38. Giraldo,Carlos M.; Helal,Abdelsalam A.; Kaddoura,Youssef Omar; Mann,William C., Remote surveillance and assisted care using a mobile communication device.
  39. Bailey, Jr., Samuel A., Security safeguard modification.
  40. Thyen, Chris J; Elliott, Brent; Fenwick, Jeff, Security system.
  41. Feldkamp,Gregory E.; Kolb,Mark A.; Bass,Harris; Hogue,Mary; Benolken,Ann, Security system configured to provide video and/or audio information to public or private safety personnel at a call center or other fixed or mobile emergency assistance unit.
  42. Dawes, Paul J., Security system with networked touchscreen and gateway.
  43. Abramson, Aron; Sued, Charles, Shredder with biometric detection safety feature.
  44. Huang, William, Sound generator help system of shredder.
  45. Pineau, Stephen; Anderson, Garry, System and method for interfacing facility access with control.
  46. Dean, Stephen, System and method of using RFID tag proximity to grant security access to a computer.
  47. Dean, Stephen, System and method of using RFID tag proximity to grant security access to a computer.
  48. Pineau, Stephen; Lee, David, System, method and database for managing permissions to use physical devices and logical assets.
  49. Bailey, Jr., Samuel A., Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback.
  50. Bailey, Jr., Samuel A., Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback.
  51. Bailey, Jr., Samuel A., Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback.
  52. Bailey, Jr., Samuel A., Systems, methods, and computer program products for collecting and reporting sensor data in a communication network.
  53. Bailey, Jr., Samuel A., Systems, methods, and computer program products for collecting and reporting sensor data in a communication network.
  54. Bailey, Jr., Samuel A., Systems, methods, and computer program products for collecting and reporting sensor data in a communication network.
  55. Baum, Marc; Dawes, Paul J.; Kinney, Mike; Raji, Reza; Swenson, David; Wood, Aaron, Takeover of security network.
  56. Bailey, Jr., Samuel A., Trusted mediator interactions with mobile device sensor data.
  57. Burd, Dana; Dawes, Paul J., WiFi-to-serial encapsulation in systems.
  58. St. George, Paul; Vue, Patrick, Wireless device operable cash drawer.
  59. St. George, Paul; Vue, Patrick, Wireless device operable cash drawer having biometric, database, and messaging capabilities.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로