Virtual Entry Assistant Using Automated Greeter
First Claim
Patent Images
1. A method, comprising:
- using an automated machine to prompt a user to identify themselves;
receiving a response from the user and verifying, using at least two different kinds of verifications, the user'"'"'s identification; and
comparing information about the user identified by said receiving, to a list of approved users; and
based on both said verifying and said comparing, electronically operating an entry door latch to allow user entry to a facility.
7 Assignments
0 Petitions
Accused Products
Abstract
A virtual security guard or receptionist automatically allows entry to an area by determining a user'"'"'s identity and comparing that to an access list. If the user is authorized, then the user is allowed entry to the area. The receptionist can be implemented by either a sign, or by using a virtual receptionist to shows a picture selected from a media server that has many different pictures. Computer intelligence can be used to allow the receptionist to carry out almost any operation that is carried out by a real receptionist.
-
Citations
19 Claims
-
1. A method, comprising:
-
using an automated machine to prompt a user to identify themselves; receiving a response from the user and verifying, using at least two different kinds of verifications, the user'"'"'s identification; and comparing information about the user identified by said receiving, to a list of approved users; and based on both said verifying and said comparing, electronically operating an entry door latch to allow user entry to a facility. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
an operating computer, which includes information indicative of plural different faces and voices and also includes structure which allows said faces and voices to provide information to a user indicative of entry to a facility, wherein said information provided to the user includes at least a request for first information that includes identifying information from the user, and wherein said computer also has a capability of receiving information from a user, comparing the information to stored information, and taking an action to allow entry of a user to a stored facility based on said comparing. - View Dependent Claims (11, 12)
-
13. A method, comprising:
-
using an automated computer to communicate with a visitor by allowing the visitor to communicate with the computer in any of a plurality of different languages; receiving information indicative of a visitors name and at least one verifying information about the visitor; comparing the name with a prestored list of names on an entry device that has a list of authorized entrants; responsive to said comparing indicating that the person'"'"'s name exists on said list, and also that said verifying information verifies that the visitor is the person on said list, automatically opening an entry device to allow the visitor access to the secured area. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification