$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for integrating and adapting security control systems 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G07C-009/00
출원번호 US-0848955 (2015-09-09)
등록번호 US-9558606 (2017-01-31)
발명자 / 주소
  • Radicella, Michael
  • Burkley, Richard
  • Chapman, Kriston
  • Jones, Shirl
  • Matsumoto, Roger
출원인 / 주소
  • Isonas, Inc.
대리인 / 주소
    Neugeboren O'Dowd PC
인용정보 피인용 횟수 : 0  인용 특허 : 106

초록

A system for controlling access to one or more enclosed areas comprises at least one access card reader and controller powered via a Power-over-Ethernet (PoE) interface, each access card reader and controller being capable of controlling access through a particular entrance to a particular enclosed

대표청구항

1. An access control system comprising: a communication module configured to receive a credential identifier;a mode module configured to determine an operational mode of the access control system, the operational modes including a standalone mode and a network mode;the communication module configure

이 특허에 인용된 특허 (106)

  1. Regelski, Michael; Prokupets, Rudy; Yuan, John, Access control system having automatic download and distribution of security information.
  2. Ozer Richard (Brookline MA) DeSantis Edward (Boston MA) Tomlinson Brett (Brighton MA), Access control system having centralized/distributed control.
  3. Buswell,Theodore Albert; Curatola,Frank; Vaseekaran,Aruchunan, Analog gateway.
  4. Quan,Ralph W., Antenna array for an RFID reader compatible with transponders operating at different carrier frequencies.
  5. Lien, Brent D.; Gale, Jr., Thomas G.; Hoffman, Ted M.; Skoglund, John P.; Vander Woude, Andy A., Card printer printhead mounting.
  6. Moss John L. (Wayland MA) Matteson Brian (Acton MA) Pedraza Luis (Hyde Park MA) Chastain David (Acton MA) Turner Thomas (Nashua NH), Card reader.
  7. Khandwala Bhupendra J. (Claremont CA) Young Jorge A. (Claremont CA) Kalustian Sarkis V. (Claremont CA), Card reader for security system.
  8. Imhoff Lee A. (Lakeview MI), Cell lock.
  9. Herrod, Alan; Fuccello, James; Schaefer, Donald E., Collecting data in a batch mode in a wireless communications network with impeded communication.
  10. Syron-Townson Ann T. (398 Wales Ct. Marco Island FL 33937) Townson James A. (398 Wales Ct. Marco Island FL 33937), Computerized door locking and monitoring system using power-line carrier components.
  11. Bi, Daoshen; Jones, Robert, Contact smart cards having a document core, contactless smart cards including multi-layered structure, PET-based identification document, and methods of making same.
  12. Dickon Isaacs ; Jonathan I. Kaplan ; Mark A. Zeh ; Daniel J. Stillion ; Mark Stein ; Timothy J. Ogilvie, Control panel.
  13. Dickon Isaacs ; Jonathan I. Kaplan ; Mark A. Zeh ; Daniel J. Stillion ; Mark Stein ; Timothy J. Ogilvie, Control panel.
  14. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  15. Klinefelter, Gary M., Credential processing device event management.
  16. Hoffman, Ted M., Credential production print ribbon and transfer ribbon cartridges.
  17. Meier, James R.; Pribula, Martin A.; Lukaskawcez, Stacy W.; Johnson, Chadwick M.; Lokken, Anthony L., Credential substrate rotator and processing module.
  18. David A. Johnson, Detection of an RFID device by an RF reader unit operating in a reduced power state.
  19. Daviaud Yves,FRX, Device for controlling access to a space closed by a door.
  20. Giobbi,John J., Digital content security system.
  21. Giobbi,John J., Digital content security system.
  22. Giobbi,John J., Digital rights management.
  23. Renner G. Fred ; Johnson Randall E. ; Chu-Jeng Caroline, Distinct smart card reader having wiegand, magnetic strip and bar code types emulation output.
  24. Ryan, Andrew Edward, Distributed client/server computer network.
  25. Tock,Theron; Srinivas,Sampath; Sang,Yvonne Pui Fung, Dual authentication of a requestor using a mail server and an authentication server.
  26. William D. Denison ; Lawrence C. Brownfield ; Bradley S. Silvers, Electronic access control device.
  27. Marschalek, James S; Simonsen, Warren A.; Voss, Ludger; Meyerle, Herbert; Voss, Norbert; Parhofer, Stefan, Electronic access control handle set for a door lock.
  28. Michalk, Manfred, Flat transponder and method for the production thereof.
  29. Davis, Bruce L., Fraud deterrence in connection with identity documents.
  30. Bi, Daoshen; Jones, Robert; Yeh, Tung-Feng; Haigh, Scott D., ID document structure with pattern coating providing variable security features.
  31. Klinefelter, Gary M.; Platner, Thomas C.; Schuler, Joseph F.; Gershenovich, Leon; Kaiser, David W.; Holland, Gary R., Identification card manufacturing security.
  32. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  33. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over-the-counter card issuing.
  34. Bi, Daoshen; Yeh, Tung-Feng; Jones, Robert L.; Labrec, Brian C., Image destruct feature used with image receiving layers in secure documents.
  35. Schneck, Nelson; Duggan, Charles F.; Jones, Robert; Bi, Daoshen, Image processing techniques for printing identification cards and documents.
  36. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  37. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  38. Jones, Robert L.; Bloomberg, Bentley, Ink with cohesive failure and identification document including same.
  39. Brown, David L.; Hirt, Fred S., Integrated power management of a client device via system time slot assignment.
  40. Roberts Jerry B. (Lexington MA), Integrating-phase lock method and circuit for synchronizing overlay displays on cathode-ray-tube monitors of digital gra.
  41. Bradin, John P., Interference control method for RFID systems.
  42. Bi, Daoshen; Jones, Robert L., Interlocking document security features using incompatible inks.
  43. Meier, James R.; Gindele, Greg E.; Zhao, Gan; Lokken, Anthony L.; Johnson, Chadwick M.; Dunham, Matthew K., Laminating roller assembly, credential substrate laminator and method of laminating a credential substrate.
  44. LaBrec, Brian; Jones, Robert L., Laser engraving methods and compositions, and articles having laser engraving thereon.
  45. Theodossiou, George; Jones, Robert L., Laser etched security features for identification documents and methods of making same.
  46. Fox, Christopher Wayne, Legacy access control security system modernization apparatus.
  47. Steffen,Dale A., Low voltage signal stripping circuit for an RFID reader.
  48. Chandler, Jr., Edmonds H., Method and apparatus for a merged power-communication cable in door security environment.
  49. Smith Marjorie L. ; Smith Mark E. ; Gelling Richard R. ; Cogbill Michael L., Method and apparatus for improved building automation.
  50. Finn, David, Method and apparatus for making a radio frequency inlay.
  51. Radicella, Michael; Burkley, Richard M.; Chapman, Kriston L.; Jones, Shirl D.; Matsumoto, Roger Y., Method and system for controlling access to an enclosed area.
  52. Carr, J. Scott; Davis, Bruce L., Method and system for monitoring and providing notification regarding identity document usage.
  53. Hoon Chiat Lim SG; Kian Giap Lim SG; Yong Huat Sim SG, Method and system for providing cross-platform remote control, monitoring, and up-dating of a facility access controller.
  54. Roberts Jerry B. (Arlington MA), Method of and apparatus for touch-input computer and related display employing touch force location external to the disp.
  55. Waldron James J. (Braintree MA) Ginga Richard L. (Worcester MA) Corcoran Steven G. (Waltham MA), Method of and system for interactive video-audio-computer open architecture operation.
  56. Lowe Peter R. ; Small ; Jr. Donald G., Miniature wireless modem.
  57. Monroe,David A., Multimedia network appliances for security and surveillance applications.
  58. Monroe, David A., Multimedia surveillance and monitoring system including network configuration.
  59. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  60. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  61. Harper, Lawrence Edward; DeNise, Derry Thomas, Object tracking in an enclosure.
  62. Harper, Lawrence Edward; DeNise, Derry Thomas, Object tracking in an enclosure.
  63. Jones, Robert L.; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  64. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  65. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key differentiation for secure transactions.
  66. Harper, Lawrence Edward; DeNise, Derry Thomas, Portal system for a controlled space.
  67. Harper,Lawrence Edward; DeNise,Derry Thomas, Portal system for a controlled space.
  68. Michel Justin F. (5526 Pinecrest Dr. Cincinnati OH 45238), Prison cell locking and unlocking device.
  69. Mejia E. Zeke,CAX ; Griffiths Ian,GBX, Programmable channel search reader.
  70. Davis,Michael L.; Hulusi,Tam, Protection of non-promiscuous data in an RFID transponder.
  71. Lowe Peter R., RF identification system for providing static data and one bit of variable data representative of an external stimulus.
  72. Harper, Lawrence Edward; DeNise, Derry Thomas, RFID switching.
  73. Raspotnik William B., Radio frequency transponder stored value system employing a secure encryption protocol.
  74. Ganderillas Carl, Read head for Wiegand token.
  75. Bradin, John P., Reader for a radio frequency identification system having automatic tuning capability.
  76. Bi, Daoshen; Jones, Robert L.; Collins, Chris, Retroreflective security features in secure documents.
  77. Jones, Robert L., Secure core material for documents.
  78. Nehowig, Kelly R.; Gale, David T.; Fischer, Lisa A.; Platfoot, Keith A.; Ekers, John E.; Zappe, Thomas A., Securely processing and tracking consumable supplies and consumable material.
  79. Novozhenets,Yuri; Regelski,Michael, Security system for access control using smart cards.
  80. Lindsay, Jeffrey Dean, Security systems for protecting an asset.
  81. Bi, Daoshen; Jones, Robert L.; Richardson, Jack, Stability of covert pigments.
  82. Hwang, Kyungtae; Kim, Nam-Deuk, Statistical quality assessment of fingerprints.
  83. Isaacs Dickon ; Simpson Peter Charles ; O'Leary Jerimiah P. ; Kaplan Jonathan I. ; Zeh Mark A. ; Atkins Steven L. ; Haenlein Hans-Christoph ; Stein Mark ; Ogilvie Timothy J., Storage device for unattended, package pick up and delivery.
  84. Ogilvie Timothy J. ; Stein Mark, Storage device for unattended, package pick-up and delivery.
  85. Pikaz, Arie, System and method for detecting an invalid camera in video surveillance.
  86. Radicella, Michael; Burkley, Richard; Chapman, Kriston; Jones, Shirl; Matsumoto, Roger, System and method for integrating and adapting security control systems.
  87. Eckert,David D.; Bontemps,Evan J.; Carey, III,Paul D.; Goodwin,Richard E.; Hatfield,Keith E.; Lorenz,Joseph P.; Nevish,Keith A.; Spang,Edward J.; Westerberg,Glen S., System and method for locating and communicating with personnel and equipment in a facility.
  88. Stephen Van Till ; Stephen Ezell, System and method for providing access to an unattended storage.
  89. Lowe, Peter R., System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone.
  90. Prokupets, Rudy; Regelski, Michael, System for integrating security and access for facilities and information systems.
  91. Prokupets,Rudy; Regelski,Michael, System for integrating security and access for facilities and information systems.
  92. Marchoili John ; Neilsen John ; Regelski Michael ; Prokupets Rudy ; Zientara David ; Rozwod Robert, System for security access control in multiple regions.
  93. Byford, Derrick John, System, apparatus and method for controlling access.
  94. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  95. Howard, James V.; Frazier, Francis, Systems and methods for recognition of individuals using multiple biometric searches.
  96. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  97. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  98. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  99. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  100. Dlugos David J., Token with Wiegand wire.
  101. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Tracking system using personal digital key groups.
  102. Campisi, Steven E., Transaction authentication card.
  103. Timothy Ogilvie ; Mark Stein ; Carter Griffin, Unattended package delivery cross-docking apparatus and method.
  104. Davis, Michael L.; Hulusi, Tam, Using promiscuous and non-promiscuous data to verify card and reader identity.
  105. Dlugos David J. ; Small Don ; Siefer David A., Wiegand effect energy generator.
  106. Dlugos David J., Wiegand tilt sensor.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로