System and method for deploying handheld devices to secure an area
First Claim
1. A security system comprising:
- a global security server;
a first memory connected to the global security server;
a first set of program instructions stored in the first memory;
a global security database stored in the first memory;
a set of handheld security devices;
a set of operable devices;
a set of local security databases and a second set of program instructions resident on the set of handheld security devices;
wherein the first set of program instructions, when executed by the global security server, causes the global security server to;
identify the set of handheld security devices;
associate a handheld security device, of the set of handheld security devices, to a physical location;
transmit a set of provisioning information to the set of handheld security devices;
transmit a mode of operation to the set of handheld security devices;
transmit a set of database records from the global security database to the set of local security databases;
initiate operation of the set of handheld security devices;
update a set of database records in the global security database;
wherein the second set of program instructions when executed by the set of handheld security devices causes the set of handheld security devices to;
transmit a set of authorization data to the global security server;
receive the set of provisioning information;
receive the mode of operation;
download a first set of security device drivers for the set of handheld security devices; and
interface with the set of operable security devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A handheld security system includes a set of handheld devices positioned at a group of access points to a secure area. The handheld device includes a set of input/output devices including a text and graphics display, a camera, a local security database and a set of security devices including an RFID reader, a bar code reader, a magnetic stripe card reader and a biometric scanner. The set of handheld devices are communicatively connected through wireless signaling and protocol to one another and to a server operating a global a global security database. The local security database is synchronized to the global security database. A location stack table is continuously updated with security events and monitored for violation of a set of anti-passback rules. An association table associates a set of assets and a set of personnel, allowing for visitor tracking and asset tracking on a schedule.
-
Citations
4 Claims
-
1. A security system comprising:
-
a global security server; a first memory connected to the global security server; a first set of program instructions stored in the first memory; a global security database stored in the first memory; a set of handheld security devices; a set of operable devices; a set of local security databases and a second set of program instructions resident on the set of handheld security devices; wherein the first set of program instructions, when executed by the global security server, causes the global security server to; identify the set of handheld security devices; associate a handheld security device, of the set of handheld security devices, to a physical location; transmit a set of provisioning information to the set of handheld security devices; transmit a mode of operation to the set of handheld security devices; transmit a set of database records from the global security database to the set of local security databases; initiate operation of the set of handheld security devices; update a set of database records in the global security database; wherein the second set of program instructions when executed by the set of handheld security devices causes the set of handheld security devices to; transmit a set of authorization data to the global security server; receive the set of provisioning information; receive the mode of operation; download a first set of security device drivers for the set of handheld security devices; and interface with the set of operable security devices. - View Dependent Claims (2, 3, 4)
-
Specification