Security system database management
First Claim
Patent Images
1. A method of creating a user database suitable for use in conjunction with a security system to grant or deny a user access to a property, such as a building, comprising the steps of:
- receiving first data from an input device representing a biometric feature of an administrator;
saving the first data in a memory as a record associated with the administrator;
saving access privilege information in the record associated with the administrator;
receiving second data from the input device representing the biometric feature of the administrator and comparing the second data to the first data to detect a match;
receiving a command from the administrator to create a user record associated with a user;
receiving third data from the input device representing a biometric feature of the user;
saving the third data in the memory as a record associated with the user; and
saving access privilege information in the record associated with the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system database is configured to store a unique identifier and a biometrics feature for each user'"'"'s. This information is periodically transferred from a central server to a plurality of access controllers. The access controllers in turn control building access based upon the information received from the central server. The access data is in turn periodically transferred from the access controllers to the central server. The central server uses this information to generate access reports.
84 Citations
16 Claims
-
1. A method of creating a user database suitable for use in conjunction with a security system to grant or deny a user access to a property, such as a building, comprising the steps of:
-
receiving first data from an input device representing a biometric feature of an administrator;
saving the first data in a memory as a record associated with the administrator;
saving access privilege information in the record associated with the administrator;
receiving second data from the input device representing the biometric feature of the administrator and comparing the second data to the first data to detect a match;
receiving a command from the administrator to create a user record associated with a user;
receiving third data from the input device representing a biometric feature of the user;
saving the third data in the memory as a record associated with the user; and
saving access privilege information in the record associated with the user. - View Dependent Claims (2, 4, 5, 6, 7, 8, 9)
-
-
10. A method of monitoring access to a building comprising the steps of:
-
establishing a database of authorized users at a central server wherein the database includes a unique identifier and a biometric feature for each authorized user;
transferring the database of authorized users though a computerized network to a plurality of access controllers;
receiving access requests at the plurality of access controllers, wherein the access requests each include a unique identifier and a biometric feature and comparing the access requests with the database of authorized users to determine access privileges, wherein each comparison is made with a database of user information stored by the access controller that received the access request;
transferring records of the access requests from the access controllers through the computerized network to the central server; and
generating a report of attendance at the central server based upon the records of the access requests. - View Dependent Claims (3, 11, 12, 13, 14, 15)
-
-
16. A security system comprising:
-
a central server configured to establish a database of user information including a unique identifier and a biometrics feature for each user, and further configured to generate reports of user access information; and
a plurality of access controllers operationally coupled with the central server through a network and configured to control associated access points based upon the database of user information and to retain access records;
wherein the central server periodically transfers an updated copy of the database of user information to the plurality of access controllers, and wherein the plurality of access controllers each periodically transfer an updated copy of access records to the central server for use in generating the reports of user access information.
-
Specification