Multi-level security mechanism for accessing a panel
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G07C-009/00
H04W-064/00
H04L-029/08
H04W-088/02
출원번호
US-0256372
(2016-09-02)
등록번호
US-9953474
(2018-04-24)
발명자
/ 주소
Mohan, Reshma
Gaurav, Galib
Rajkumar, Malathy
Sampathkumar, Karthic
Ankireddy, Venkata Prakash Reddy
출원인 / 주소
Honeywell International Inc.
대리인 / 주소
Seager, Tufte & Wickhem, LLP
인용정보
피인용 횟수 :
0인용 특허 :
127
초록▼
A panel associated with maintaining security of mobile devices. The devices such as mobile phones may be registered with user codes at the panel. If a user wants to access the panel, the user may enter a user code corresponding to a number of the device. The device may have a geo-location app in tha
A panel associated with maintaining security of mobile devices. The devices such as mobile phones may be registered with user codes at the panel. If a user wants to access the panel, the user may enter a user code corresponding to a number of the device. The device may have a geo-location app in that the panel can track the device. If the user is within the pre-determined range of a protected location, another check about the user may be effected with a face recognition app. A face scan of the user may be compared with a face of an authorized user. If the user is found to be unauthorized anywhere along the above-noted process, then the user may be deemed to be an intruder, and an alert can be sent to a central monitor station, which may take action to remove any threat associated with the intruder.
대표청구항▼
1. A security access mechanism comprising: a security panel;a central monitor station connected to the security panel; andone or more mobile phones; andwherein:each of the one or more mobile phones has a phone number that is registered at the security panel with a user code;the security panel is in
1. A security access mechanism comprising: a security panel;a central monitor station connected to the security panel; andone or more mobile phones; andwherein:each of the one or more mobile phones has a phone number that is registered at the security panel with a user code;the security panel is in an armed state which can be disarmed with a user code from a mobile phone having the phone number mapped to the user code as registered at the security panel;a geo location app is provided to each of the one or more mobile phones that is registered with its phone number against a user code at the security panel;the geo location app permits the security panel to track each mobile phone for its presence within a pre-determine range around a protected premise;a person may disarm and access the security panel with a mobile phone if the person uses the user code registered at the security panel for the mobile phone;if the mobile phone that the person is using to access the security panel has no user code registered at the security panel, then the person is treated by the security panel as an unauthorized caller or an intruder;if the person is treated as an unauthorized caller or intruder, then an alert indicating an intruder attempting to gain access to the security panel is sent to the one or more mobile phones that are registered at the security panel according to user codes; andif a user of the one or more mobile phones acknowledges the alert, then a second alert about the intruder is sent to the central monitor station. 2. The mechanism of claim 1, wherein upon receipt of the second alert, the central monitor station takes action to remove any threat associated with the intruder. 3. A multi-level mobile device security system comprising: a security panel;one or more mobile devices; anda central monitor station connected to the security panel; andwherein:the one or more mobile devices have numbers that are registered at the security panel with user codes, respectively;the security panel is armed and can be disarmed by a mobile number that is registered with a user code at the security panel;the security panel tracks the one or more mobile devices that have numbers registered with the user codes at the security panel, within a pre-determined range around a protected location; andthe security panel contains a friendly mobile device number list that comprises the numbers of the one or more mobile devices that have their numbers registered with user codes, respectively, at the security panel. 4. The system of claim 3, wherein if a mobile device is within the pre-determined range and a number of the mobile device is absent from the friendly mobile device number list, then a user of the mobile device accessing the security panel is regarded as an unauthorized user and thus an intruder. 5. The system of claim 4, wherein upon the user being regarded as an intruder, an alert about a presence of the intruder within the pre-determined range is sent to the numbers of the friendly mobile device number list. 6. The system of claim 5, wherein if an acknowledgement to the alert is received by the security panel, then an alert is sent to a central monitor station, which takes action to remove the intruder or any issue associated with the intruder. 7. The system of claim 6, wherein if a comparison of the scan of the face of the person using the mobile device with the face of the authorized user results in a non-similarity of the two faces, than the person using the mobile device is regarded as an intruder. 8. A method for obtaining authorized access to a security panel, comprising: entering a user code for each of one or more mobile phones in a security panel;connecting a central monitor station to the security panel;mapping numbers of the one or more mobile phones to the user codes at the security panel;adding a geo location app to each of the one or more mobile phones for tracking a mobile phone of the one or more mobile phones by the security panel; anddetermining whether a person using a mobile phone of the one or more mobile phones is an intruder; andwherein determining whether a person using a selected mobile phone of the one or more mobile phones is an intruder, comprises: checking that the user code entered by the person at the security panel corresponds to a user code that is mapped to a phone number of the selected mobile phone at the security panel; andchecking that a presence of the selected mobile phone with the geo location app in the selected mobile phone by the security panel is outside of a pre-determined range around a protected premise. 9. The method of claim 8, wherein determining whether a person using a selected mobile phone of the one or more mobile phones is an intruder, further comprises: invoking a face recognition app in the selected mobile phone; andwherein:a face of the person using the selected mobile phone is scanned with the face recognition app;the face that is scanned is compared by the security panel with a face of an authorized user of the selected mobile phone; anda result of a comparison of the face that is scanned with the face of an authorized user of the selected mobile phone indicates whether the person is an authorized user of the selected mobile phone or an intruder. 10. The method of claim 9, wherein if the person using the selected mobile phone is an intruder, then a message is conveyed by the security panel to the central monitor station to remove any threat associated with the person. 11. A security access mechanism comprising: a security panel;a central monitor station connected to the security panel; andone or more mobile phones; andwherein:each of the one or more mobile phones has a phone number that is registered at the security panel with a user code;the security panel is in an armed state which can be disarmed with a user code from a mobile phone having the phone number mapped to the user code as registered at the security panel;a geo location app is provided to each of the one or more mobile phones that is registered with its phone number against a user code at the security panel;the geo location app permits the security panel to track each mobile phone for its presence within a pre-determine range around a protected premise; andif a person disarms and accesses the security panel with a mobile phone and a user code registered at the security panel for that mobile phone, and the mobile phone has a presence within the pre-determined range around the protected premise, then a check of whether the person is an authentic user is invoked by the security panel with a face recognition app in the mobile phone. 12. The mechanism of claim 11, wherein: a face of the person using the mobile phone is scanned by the face recognition app;the face that is scanned is compared with a face of an authorized user of the mobile phone; anda result of a comparison of the face that is scanned with the face of the authorized user of the mobile phone indicates whether the person is an intruder or the authorized user of the mobile phone. 13. The mechanism of claim 12, wherein if the person is indicated to be the intruder with the mobile phone according to the result of the comparison, then an alert is sent to the central monitor station to take necessary action to remove any threat associated with the person. 14. A multi-level mobile device security system comprising: a security panel;one or more mobile devices; anda central monitor station connected to the security panel; andwherein:the one or more mobile devices have numbers that are registered at the security panel with user codes, respectively;the security panel is armed and can be disarmed by a mobile number that is registered with a user code at the security panel;the security panel tracks the one or more mobile devices that have numbers registered with the user codes at the security panel, within a pre-determined range around a protected location; andif a person, other than an authorized user of a mobile device, accesses the security panel with a correct user code of the mobile device, and the mobile device is with the pre-determined range, the security panel triggers a notification to a face recognition app that becomes present in the mobile device for authentication or of non-authentication the person as an authorized user of the device, with a scan of a face of the person using the mobile device, which is compared with a face of the authorized user of the mobile device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (127)
Gutierrez,Jos�� A.; Pereira,Luis R., Ad-hoc network and method of routing communications in a communication network.
Gelvin, David C.; Girod, Lewis D.; Kaiser, William J.; Merrill, William M.; Newberg, Fredric; Pottie, Gregory J.; Sipos, Anton I.; Vardhan, Sandeep, Apparatus for internetworked hybrid wireless integrated network sensors (WINS).
Gloudeman Jeffrey J. ; Gottschalk Donald A. ; Kraemer C. Richard ; Rasmussen David E., Common object architecture supporting application-centric building automation systems.
Kim, Jin-Kyeong; Kim, Dae-Sik; Park, Nam-Hoon, Communication device having function for searching access point of wireless local area network and method thereof.
Kettler John P. (Shawnee KS) Reese James A. (Overland Park KS), Control system for air quality and temperature conditioning unit with high capacity filter bypass.
Jensen Howard A. (Mequon WI) Seem John E. (Menomonee Falls WI), Controller for use in an environment control network capable of storing diagnostic information.
Hancock,Martin A.; Wynans,Arthur B.; Mansey,Bernard C.; Marr,Darrin G.; Lightbody,Simon H.; Teachman,Michael E.; Henneberry,Scott M., Data integrity in a mesh network.
Cohn, Alan Wade; Dial, IV, John Degraffenreid; Faulkner, Gary Robert; Kitchen, James Edward; Proft, David Leon; Quain, Corey Wayne, Defining and implementing sensor triggered response rules.
West Jonathan D. ; Estill Brian T. ; Chen Jiade, Detection of saturation status for non-synchronous incremental actuators using a variable position estimate window.
Seiler, Christian, Energy saving operation of a hardwired communication interface and a function unit provided for the communication interface of a field device.
Seem, John E.; Li, Yaoyu; Salsbury, Timothy, Fault detection systems and methods for self-optimizing heating, ventilation, and air conditioning controls.
Seem,John E.; Huth,William A.; Fraune,Robert J.; Lewis,Anita M.; Ky,Tri V., Method and apparatus for assessing performance of an environmental control system.
Songakul, Pornsak; Nass, Geoffrey D.; McFarland, Norman R., Method and apparatus to optimize power to maximize performance of wireless mesh sensors and control networks.
Alex Bernaden, III ; Gaylon M. Decious ; John E. Seem ; Kirk H. Drees ; Jonathan D. West ; William R. Kuckuk, Method of programming and executing object-oriented state machine logic in a controller.
Cumming,Daniel A.; Forth,J. Bradford; Wynans,Arthur B.; Haight,Eric K.; Ransom,Douglas S.; Hancock,Martin A., Methods and apparatus for retrieving energy readings from an energy monitoring device.
Ott, Michael G.; Law, Gary; Stevenson, Dennis; Ali, Riyaz; Nixon, Mark; Forsythe, Tim, On-line device testing block integrated into a process control/safety system.
Seem John (Shorewood WI) Jensen Howard A. (Mequon WI) Monroe Richard H. (West Milwaukee WI), On-line monitoring of controllers in an environment control network.
Takeshi Saito JP; Hajime Ohsawa JP; Shigeru Maeda JP; Tatsunori Kanai JP; Shigeyasu Natsubori JP; Toshio Okamoto JP; Yoshiaki Takabatake JP, Scheme for managing nodes connected to a home network according to their physical locations.
Bernaden ; III Alex ; Decious Gaylon M. ; Seem John E. ; Drees Kirk H. ; West Jonathan D. ; Kuckuk William R., State machine controller for operating variable air volume terminal units of an environmental control system.
Flint, Jason C.; Matsuura, Craig; Child, Michael D.; Vega, JonPaul; Lyman, Jefferson; Eyring, Matthew J.; Warren, Jeremy B.; Nye, James Ellis, System and methods for correlating sound events to security and/or automation system operations.
Simon ; deceased Bernard S. (late of St. Louis Park MN by Barbara J. Simon ; executor) Smith Wade W. (Plymouth MN), Two-way wireless HVAC system and thermostat.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.