Challenge and response system for identifying non-credentialed occupants and method
First Claim
1. A system for determining authorization of individuals at a premises, the system comprising:
- interrogator devices that are carried through the premises by security personnel and that send challenge beacons for triggering responses from target user devices;
a management system that confirms whether users of the target user devices are authorized based on the responses received by the interrogator devices; and
auxiliary devices, which are carried by the security personnel with the interrogator devices, that capture image data of the users carrying the target user devices, wherein the management system additionally confirms whether users of the target user devices are authorized based on the image data, wherein the auxiliary devices are wearable devices that are worn by the security personnel;
wherein the management system additionally confirms whether users of the target user devices are authorized based on media access control (MAC) addresses of the target user devices.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for determining authorization of individuals at a premises is disclosed. The system (e.g. security system) includes interrogator devices such as mobile computing devices that are carried through the premises by an interrogator. The interrogator devices send challenge beacons for triggering responses from target user devices carried by users. A management system then confirms whether users of the target user devices are authorized users based on the responses received by the interrogator devices. Examples of target user devices include mobile computing devices such as smart phones/tablet devices, and auxiliary devices such as smart badges and wallets. In embodiments, the interrogator can also carry an auxiliary device having an integrated camera system that captures image data of the users, where the management system additionally confirms whether the users are authorized by comparing the image data along with information in the responses to stored records of authorized users.
13 Citations
20 Claims
-
1. A system for determining authorization of individuals at a premises, the system comprising:
-
interrogator devices that are carried through the premises by security personnel and that send challenge beacons for triggering responses from target user devices; a management system that confirms whether users of the target user devices are authorized based on the responses received by the interrogator devices; and auxiliary devices, which are carried by the security personnel with the interrogator devices, that capture image data of the users carrying the target user devices, wherein the management system additionally confirms whether users of the target user devices are authorized based on the image data, wherein the auxiliary devices are wearable devices that are worn by the security personnel; wherein the management system additionally confirms whether users of the target user devices are authorized based on media access control (MAC) addresses of the target user devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for determining authorization of individuals at a premises, the method comprising:
-
for interrogator devices that are carried through the premises by security personnel, sending challenge beacons from the interrogator devices for triggering responses from target user devices; confirming whether users of the target user devices are authorized based on the responses received by the interrogator devices; and additionally confirming whether users of the target user devices are authorized based on image data of the users carrying the target user devices, the image data being captured by auxiliary devices that are carried with the interrogator devices by security personnel, wherein the auxiliary devices are wearable devices that are worn by the security personnel; and additionally confirming whether users of the target user devices are authorized based on MAC addresses of the target user devices. - View Dependent Claims (16, 17, 18)
-
-
19. A system for determining authorization of individuals, the system comprising:
-
interrogator devices that are carried through the premises by security personnel and that analyze responses from target user devices; and auxiliary devices, which are carried with the interrogator devices by security personnel, that capture image data of the users carrying the target user devices, wherein it is confirmed that the users of the target user devices are authorized based on the image data and the auxiliary devices are wearable devices that are worn by the security personnel; and
it is additionally confirmed whether users of the target user devices are authorized based on MAC addresses of the target user devices.
-
-
20. A system for determining authorization of individuals at a premises, the system comprising:
-
interrogator devices that are carried through the premises and that send challenge beacons for triggering responses from target user devices; a management system that confirms whether users of the target user devices are authorized based on the responses received by the interrogator devices; and auxiliary devices, which are carried by the security personnel with the interrogator devices, that capture image data of the users carrying the target user devices, wherein the management system additionally confirms whether users of the target user devices are authorized based on the image data and MAC addresses of the target user devices.
-
Specification