A workspace security system having processors, sensors, and actuators for local and remote monitoring, control, and automation of physical and environmental security, safety, efficiency, and productivity. The system includes passive and active access authentication devices and active or passive unlo
A workspace security system having processors, sensors, and actuators for local and remote monitoring, control, and automation of physical and environmental security, safety, efficiency, and productivity. The system includes passive and active access authentication devices and active or passive unlocking and lockdown of office furniture components, work sites, and facilities. The system may include multilevel authentication credentials, automatic lockdown of office furniture and other components based on the proximity of credentials, and video or other imaging systems to detect and record motion.
대표청구항▼
1. A workspace security system, associated with at least a first work area, comprising:an office furniture component located in the first work area, said office furniture component having at least one access component;at least one processor associated with the first work area and said office furnitu
1. A workspace security system, associated with at least a first work area, comprising:an office furniture component located in the first work area, said office furniture component having at least one access component;at least one processor associated with the first work area and said office furniture component;a first access authentication device associated with the first work area and interfaced with said at least one processor;a second access authentication device associated with said office furniture component; anda locking element associated with said at least one access component, said locking element interfaced with said at least one processor.2. The workspace security system of claim 1, wherein at least one of said first access authentication device and said second authentication device includes an RF transmitter and receiver for polling and receiving codes from access credential devices.3. The workspace security system of claim 2, further comprising an antenna coupled to said RF transmitter and receiver and having a radiation pattern enveloping an entryway to the first work area.4. The workspace security system of claim 2, further comprising an antenna coupled to said RF transmitter and receiver and having a radiation pattern around at least a portion of said office furniture component.5. The workspace security system of claim 2, wherein at least one of said first access authentication device and said second access authentication device includes a biometric reader.6. The workspace security system of claim 5, wherein said biometric reader is capable of identifying a fingerprint.7. The workspace security system of claim 1, further comprising:a sensor respectively associated with each of said at least one access component, said sensor interfaced with said at least one processor.8. The workspace security system of claim 7, wherein:said locking element has a first state in which said at least one access component is movable between an open and a closed position, and a second state in which said at least one access component is not movable and is in said closed position; andsaid sensor detects said at least one access component is in said open or said closed position.9. The workspace security system of claim 8, wherein said at least one processor stores access rights for individuals authenticated by and a first group of individuals have access to the first work area, a second group of individuals have access to the first work area and said at least one access component, and a third group of individuals have no access to either the first work area or the said at least one access component.10. The workspace security system of claim 9, further comprising a lockable physical barrier securing the first work area and interfaced with said at least one processor, and wherein upon said at least one processor authenticating a member of said first group or said second group, said at least one processor unlocks said lockable physical barrier.11. The workspace security system of claim 10, further comprising an imaging system interfaced with said at least one processor, said imaging system having a first mode in which images are at least one of viewable or stored and a second mode in which images are not viewable or stored, and wherein upon said at least one processor authenticating a member of said first group or said second group, said at least one processor selects said second mode.12. The workspace security system of claim 9, wherein upon said at least one processor detecting a member of said third group in the work area said at least one processor outputs an alarm signal.13. The workspace security system of claim 12, further comprising a motion detector for detecting persons in the work area.14. The workspace security system of claim 13, wherein said motion detector includes an imaging system capable of detecting motion and interfaced to said at least one processor.15. The workspace security system of claim 9, wherein upon at least one of said first access authentication devices and said second access authentication devices detecting a member of said first group, said at least one processor unlocks said locking element.16. The workspace security system of claim 15, wherein upon at least one of said first access authentication devices and said second access authentication devices no longer detecting said member of said first group, said at least one processor locks said locking element.17. The workspace security system of claim 1, further comprising:a second work area;at least a second processor associated with the second work area, said at least a second processor monitoring and controlling aspects of said second work area; anda supervisory processor coupled with said at least one processor and said at least a second processor.18. The workspace security system of claim 17, wherein said second work area is geographically distant from the first work area.19. The workspace security system of claim 1, wherein said at least one processor is coupled with an existing building security system.20. An office furniture component, comprising at least one access component;a locking element associated with said at least one access component, said locking element having a first state in which said at least one access component is movable between an open and a closed position and a second state in which said at least one access component is not movable and is in said closed position;a controller capable of receiving and comparing an RF code to a list of authorized codes and capable of switching said locking element between said first and second states; andan antenna embedded in the office furniture component and coupled to said controller, said antenna having a reception pattern extending around at least a portion of the office furniture.21. The office furniture component of claim 20, wherein said antenna is a loop antenna embedded in a work surface of the office furniture component.22. A workspace security system for monitoring a workspace, comprising:an imaging device associated with the workspace and coupled with a processor;an access authentication device associated with the workspace and coupled with said processor, said access authentication device including an RF receiver for receiving signals from access credentials carried by individuals; anda presence detector coupled with said processor and capable of detecting motion from an individual in the workspace;said processor storing authorized access codes and upon receiving an access code from said access authentication device, said processor determining whether the received access code matches an authorized access code; andupon said presence detector detecting an individual in the workspace and said processor not receiving an access code matching said one of said authorized access codes, said processor initiates storage of images from said imaging device and outputs an event signal.23. The workspace security system of claim 22, wherein said processor transmits said event signal via a telecommunications network.24. The workspace security system of claim 22, wherein said processor transmits said event signal via the Internet.25. The workspace security system of claim 22, wherein said processor is web-enabled for remote monitoring of said images and said event signal.26. The workspace security system of claim 22, further comprising software enabling said processor to support searching and viewing of previously stored images and said event signals.27. The workspace security system of claim 22, wherein said presence detector comprises image comparison to detect motion.28. The workspace security system of claim 22, wherein said imaging device includes at least one of pan, tilt, and zoom and said processor directs said imaging device based on the location of motion detected by said presence detector.29. The workspace security system of claim 22, wherein said processor is capable of being interfaced with an existing building security system.30. The workspace security system of claim 22, further comprising a controller coupled to said processor; anda locking element capable of securing a portion of the workspace, said locking element controlled by said controller;wherein upon receiving said event signal, said controller locks said locking element.31. The workspace security system of claim 30, wherein upon said processor receiving an access code matching one of said authorized access codes, said processor terminates storage of images from said imaging device and output on outputs an unlock signal to said controller, unlocking said locking element.32. The workspace security system of claim 29, wherein said processor is capable of storing authorized access authentication codes for evaluating codes received from said authentication devices.33. The workspace security system of claim 32, further comprising an audible warning device coupled to said processor; anda sensor associated with said at least one movable component and coupled to said processor, said sensor detecting said open and said closed positions;wherein upon said processor not receiving a code matching one of said authorized access authentication codes from said proximity authentication device and said sensor detected said open position, said processor activates said audible warning device.34. The workspace security system of claim 29, wherein said utility component includes an office furniture component.35. The workspace security system of claim 29, wherein said utility component includes a mobile storage cart.36. The workspace security system of claim 29, wherein said proximity based access authentication device includes an RF credential reader.37. The workspace security system of claim 35, further comprising an antenna coupled to said RF credential reader and having a reception pattern adjacent at least a portion of said utility component.38. The workspace security system of claim 37, further comprising an antenna coupled to said RF credential reader and wherein said utility component is located in an enclosed workspace having an entryway,and said antenna has a reception pattern spanning said entryway.39. The workspace security system of claim 29, wherein said non-proximity based access authentication device includes a fingerprint reader.40. A workspace security system, comprising:a utility component having at least one movable component;a processor associated with said utility component;a locking element associated with said at least one movable component and interfaced with said processor, said locking element having a first state in which said at least one movable component is movable between an open and a closed position and a second state in which said at least one movable component is locked in said closed position;a proximity based authentication device associated with said utility component and interfaced with said processor; anda non-proximity based authentication device associated with said utility component and interfaced with said processor;wherein said processor is capable of switching said locking element between said first state and said second state based upon inputs received from said proximity based authentication device and said non-proximity based authentication device.41. The workspace security system of claim 40, wherein:upon receiving a code matching one of said authorized access authentication codes from said non-proximity based authentication device, said processor shifts said locking element to said first state; andupon not receiving a code matching one of said authorized access authentication codes from said proximity based authentication device, said processor shifts said locking element to said second state.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (25)
Schmitt John C. ; Setlak Dale R., Access control system including fingerprint sensor enrollment and associated methods.
Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Communications network for identifying the location of articles relative to a floor plan.
Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Communications network for identifying the location of articles relative to a floor plan.
Launey Reuel O. (Arlington VA) Grendler Peter A. (Silver Spring MD) Packham Donald L. (Fort Lauderdale FL) Battaglia James M. (Kettering MD) Levine Howard E. (Adelphi MD), Expandable home automation system.
Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Furniture unit having a modular communication network.
Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Furniture unit having a modular communication network.
Johnson William J. (Flower Mound TX) Keller Robert S. (Grapevine TX) Manthuruthil George C. (Coppell TX) Williams Marvin L. (Lewisville TX), Method of and apparatus for providing existential presence acknowledgement.
Toms John Schackelford (University Heights OH) Brown Steven M. (Grand Rapids MI) Miller William L. (Ada MI) Weller George V. (Grand Rapids MI) Russell Scott H. (Kalamazoo MI) Branc Joseph R. (Grand R, Method of configuring a furniture utility distribution system.
Lawson Todd C. ; Cave Warren D. ; Schmidt Dean L., System and method for global event notification and delivery in a distributed computing environment.
Toms John S. (University Heights OH) Brown Steven M. (Grand Rapids MI) Miller William L. (Ada MI) Weller George V. (Grand Rapids MI) Russell Scott H. (Kalamazoo MI) Branc Joseph R. (Grand Rapids MI) , Utility distribution system for modular furniture and the like.
Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
Bacco, Edward M.; Prinzivalli, Domenic P.; Collins, Anthony T., Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control.
Giraldo,Carlos M.; Helal,Abdelsalam A.; Kaddoura,Youssef Omar; Mann,William C., Remote surveillance and assisted care using a mobile communication device.
Feldkamp,Gregory E.; Kolb,Mark A.; Bass,Harris; Hogue,Mary; Benolken,Ann, Security system configured to provide video and/or audio information to public or private safety personnel at a call center or other fixed or mobile emergency assistance unit.
Bailey, Jr., Samuel A., Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback.
Bailey, Jr., Samuel A., Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback.
Bailey, Jr., Samuel A., Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.