Automated physical access control systems and methods
First Claim
1. An access control system, comprising:
- an object detector configured to detect persons present within a detection area;
a token reader configured to interrogate tokens present within a token reader area; and
an access controller configured to receive signals from the object detector and the token reader, and configured to compute one or more characteristics linking persons and tokens based upon signals received from the object detector and the token reader and to determine whether each detected person is carrying a permissioned token based upon the one or more computed characteristics linking persons and tokens.
2 Assignments
0 Petitions
Accused Products
Abstract
Automated physical access control systems and methods are described. In one aspect, an access control system includes an object detector, a token reader, and an access controller. The object detector is configured to detect persons present within a detection area. The token reader is configured to interrogate tokens present within a token reader area. The access controller is configured to receive signals from the object detector and the token reader. The access controller is configured to compute one or more characteristics linking persons and tokens based upon signals received from the object detector and the token reader and to determine whether detected persons are carrying permissioned tokens based upon the one or more computed characteristics linking persons and tokens.
185 Citations
40 Claims
-
1. An access control system, comprising:
-
an object detector configured to detect persons present within a detection area;
a token reader configured to interrogate tokens present within a token reader area; and
an access controller configured to receive signals from the object detector and the token reader, and configured to compute one or more characteristics linking persons and tokens based upon signals received from the object detector and the token reader and to determine whether each detected person is carrying a permissioned token based upon the one or more computed characteristics linking persons and tokens. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An access control method, comprising:
-
detecting persons present within a detection area;
interrogating tokens present within a token reader area;
computing one or more characteristics linking persons and tokens based upon results of the detecting and interrogating steps; and
determining whether each detected person is carrying a permissioned token based upon the computed characteristics linking persons and tokens. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A machine-readable medium storing machine-readable instructions for causing a machine to:
-
detect persons present within a detection area;
interrogate tokens present within a token reader area;
compute one or more characteristics linking persons and tokens based upon results of the detecting and interrogating steps; and
determine whether each detected person is carrying a permissioned token based upon the computed characteristics linking persons and tokens. - View Dependent Claims (29, 30, 31, 32)
-
-
33. An access control method, comprising:
-
visually tracking a person;
determining whether the tracked person has a permissioned token based on one or more characteristics linking persons and tokens; and
generating a signal in response to a determination that the tracked person is free of any permissioned tokens.
-
-
34. An access control method, comprising:
-
detecting tokens crossing a first boundary of a first area;
tallying a count of tokens in the first area based on the tokens detected crossing the first boundary;
detecting persons crossing a second boundary of a second area;
tallying a count of persons in the second area based on the persons detected crossing the second boundary; and
generating a signal in response to a determination that the persons count exceeds the tokens count. - View Dependent Claims (35, 36, 37, 38)
-
-
39. An access control system, comprising:
-
a token reader configured to detect tokens crossing a first boundary of a first area;
an object detector configured to detect persons crossing a second boundary of a second area; and
an access controller configured to tally a count of tokens in the first area based on the tokens detected crossing the first boundary, tally a count of persons in the second area based on the persons detected crossing the second boundary, and generating a signal in response to a determination that the persons count exceeds the tokens count.
-
-
40. A machine-readable medium storing machine-readable instructions for causing a machine to:
-
detect tokens crossing a first boundary of a first area;
tally a count of tokens in the first area based on the tokens detected crossing the first boundary;
detect persons crossing a second boundary of a second area;
tally a count of persons in the second area based on the persons detected crossing the second boundary; and
generate a signal in response to a determination that the persons count exceeds the tokens count.
-
Specification