Security system with call management functionality
First Claim
Patent Images
1. A security controller, comprising:
- at least one first interface to at least one user identification device;
a second interface to a call management controller; and
logic to determine a security status of a user based on identification information received from the at least one user identification device and to communicate the security status of the user to the call management controller, wherein the call management controller enables, disables, or modifies a communication service based on the security status of the user.
3 Assignments
0 Petitions
Accused Products
Abstract
A security system with call management functionality is disclosed and includes a security controller having at least one first interface to at least one user identification device and a second interface to a call management controller. The security controller also includes logic to determine a security status of a user based on identification information received from the at least one user identification device and to communicate the security status of the user to the call management controller, where the call management controller enables, disables, or modifies a communication service based on the security status of the user.
47 Citations
20 Claims
-
1. A security controller, comprising:
-
at least one first interface to at least one user identification device;
a second interface to a call management controller; and
logic to determine a security status of a user based on identification information received from the at least one user identification device and to communicate the security status of the user to the call management controller, wherein the call management controller enables, disables, or modifies a communication service based on the security status of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A call management controller, comprising;
-
an interface to a security controller; and
logic to receive a security status of a user from the security controller and to enable, disable, or modify a telephone service based on the security status of the user. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification