A security system for monitoring, controlling, and automating one or more work areas and office furniture components, or monitoring, controlling, and automating utility components in other environments such as retail, restaurant, and home applications. The system includes passive and active access a
A security system for monitoring, controlling, and automating one or more work areas and office furniture components, or monitoring, controlling, and automating utility components in other environments such as retail, restaurant, and home applications. The system includes passive and active access authentication devices and active or passive unlocking and lockdown devices for utility components, such as storage components, office furniture components, offices, and work sites. The system may include, for example, a processor, an access authentication device, sensors for monitoring work areas, actuators for controlling and automating work areas, and status and alarm notifiers.
대표청구항▼
What is claimed is: 1. A security system for use with a localized area, comprising: a utility component located within the localized area, said utility component having at least one movable access element; at least one processor including at least one stored access code and instructions for compari
What is claimed is: 1. A security system for use with a localized area, comprising: a utility component located within the localized area, said utility component having at least one movable access element; at least one processor including at least one stored access code and instructions for comparing said stored access code to access codes associated with a user that are input into said processor; a first access authentication device associated with the localized area and interfaced with said at least one processor; a second access authentication device associated with said utility component and interfaced with said at least one processor, said second access authentication device operable to generate an access code associated with the user; a locking element associated with said at least one access element, said locking element interfaced with said at least one processor; and at least one mobile credential device detectable by said first access authentication device, each said mobile credential device including at least one access code associated with a user. 2. The security system of claim 1, wherein said utility component is a storage component, and said at least one movable access element comprises at least one of a door and a drawer. 3. The security system of claim 1, wherein said first access authentication device includes an RF transmitter and receiver for polling and receiving said access code of said mobile credential device. 4. The security system of claim 3, wherein said first access authentication device further comprises at least one of: an antenna coupled to said RF transmitter and receiver and having a radiation pattern substantially enveloping an entryway to the localized area; and an antenna coupled to said RF transmitter and receiver and having a radiation pattern substantially around at least a portion of said utility component. 5. The security system of claim 1, wherein at least one said access code is associated with a biometric characteristic of a user. 6. The security system of claim 5, wherein said at least one access code is also stored within said processor, said at least one access code detectable by said first access authentication device and verifiable upon presentation by the user of the biometric characteristic to said second access authentication device. 7. The security system of claim 6, wherein said biometric characteristic is a fingerprint of a user and said second access authentication device is a fingerprint reading device. 8. The security system of claim 1, wherein said processor includes a memory with instructions for recording time and attendance data associated with a user of said mobile credential device. 9. The security system of claim 1, wherein said processor is interfaced with at least one of a controller and a monitor via at least one connection selected from the group consisting of an Internet, RF, and telephone connection. 10. A security system, comprising: a utility component having at least one movable access element; a processor associated with said utility component; a locking element associated with said at least one movable access element and interfaced with said processor, said locking element having a first state in which said at least one movable access element is movable between an open and a closed position and a second state in which said at least one movable access element is locked in said closed position; a proximity based access authentication device interfaced with said processor; a non-proximity based authentication device interfaced with said processor; at least one mobile credential device, each said mobile credential device including at least one access code associated with a user; and said processor comprising: operating instructions for switching said locking element between said first state and said second state based upon access data received from said proximity based authentication device and said non-proximity based authentication device; at least one stored access code; and evaluation instructions for evaluating access codes received from said proximity based and said non-proximity based access authentication devices. 11. The security system of claim 10, wherein said proximity based access authentication device includes an RF transmitter and receiver for polling and receiving an access code of said mobile credential device, and said proximity based access authentication device further comprises at least one of: an antenna coupled to said RF transmitter and receiver and having a radiation pattern substantially enveloping a localized area around said utility component; and an antenna coupled to said RF transmitter and receiver and having a radiation pattern substantially around at least a portion of said utility component. 12. The security system of claim 10, wherein said processor includes a memory with instructions for recording time and attendance data associated with a user of said mobile credential device. 13. The security system of claim 10, wherein said processor is interfaced with at least one of a controller and a monitor via at least one connection selected from the group consisting of an Internet, RF, and a telephone connection. 14. The security system of claim 10, wherein at least one said access code is associated with a biometric characteristic of a user. 15. The security system of claim 14, wherein said at least one access code is detectable by said proximity based access authentication device and is verifiable upon presentation by the user of the biometric characteristic to said non-proximity based access authentication device. 16. The security system of claim 15, wherein said biometric characteristic is a fingerprint of a user and said non-proximity based access authentication device is a fingerprint reading device. 17. A method of operating a security system associated with a utility component, comprising the steps of: detecting the presence of a mobile credential device within a localized area surrounding the utility component; obtaining first data corresponding to a biometric characteristic of a user from the mobile credential device; obtaining second data corresponding to the biometric characteristic of the user from the user; comparing the first data with the second data; and granting access to the utility component if the first data matches the second data. 18. The method of claim 17, wherein said detecting step comprises polling with an RF transmitter and receiver to detect the presence of the mobile credential device. 19. The method of claim 18, wherein said first obtaining step comprises receipt of the first data in the form of a first access code from the mobile credential device. 20. The method of claim 19, wherein said second obtaining step comprises receipt of the second data in the form of a fingerprint of a user via a fingerprint reading device and converting the second data into a second access code. 21. The method of claim 20, wherein said comparing step comprises comparing the first and second access codes.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (24)
Schmitt John C. ; Setlak Dale R., Access control system including fingerprint sensor enrollment and associated methods.
Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Communications network for identifying the location of articles relative to a floor plan.
Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Communications network for identifying the location of articles relative to a floor plan.
Launey Reuel O. (Arlington VA) Grendler Peter A. (Silver Spring MD) Packham Donald L. (Fort Lauderdale FL) Battaglia James M. (Kettering MD) Levine Howard E. (Adelphi MD), Expandable home automation system.
Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Furniture unit having a modular communication network.
Toms John Shackelford ; Brown Steven M. ; Miller William L. ; Weller George V. ; Russell Scott H. ; Branc Joseph R. ; Sweeton David C. ; Mikolajczak Matthew M., Furniture unit having a modular communication network.
Johnson William J. (Flower Mound TX) Keller Robert S. (Grapevine TX) Manthuruthil George C. (Coppell TX) Williams Marvin L. (Lewisville TX), Method of and apparatus for providing existential presence acknowledgement.
Toms John Schackelford (University Heights OH) Brown Steven M. (Grand Rapids MI) Miller William L. (Ada MI) Weller George V. (Grand Rapids MI) Russell Scott H. (Kalamazoo MI) Branc Joseph R. (Grand R, Method of configuring a furniture utility distribution system.
Lawson Todd C. ; Cave Warren D. ; Schmidt Dean L., System and method for global event notification and delivery in a distributed computing environment.
Toms John S. (University Heights OH) Brown Steven M. (Grand Rapids MI) Miller William L. (Ada MI) Weller George V. (Grand Rapids MI) Russell Scott H. (Kalamazoo MI) Branc Joseph R. (Grand Rapids MI) , Utility distribution system for modular furniture and the like.
Cohn, Alan Wade; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Method and system for logging security event data.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.