MOBILE BASED IDENTIFICATION IN SECURITY AND ASSET MANAGEMENT SYSTEMS
First Claim
1. A security and asset management system (100) having a device (110) operable for mobile communication, said device (110) having an id code (112) and a device communication interface (116) operable to initiate transmission of the id code (112) and to respond to a request for transmission of the id code (112), said system (100) comprising:
- at least one reader (140) having a reader communication interface (144) operable to obtain the id code (112) from the device (110);
a control panel (170) operable to communicate with said at least one reader (140); and
a memory (180) for storing location data (184) and ID data (182) comprising at least one or more id codes (112), said memory (180) accessible by said control panel (170),wherein the control panel (170) validates the id code (112) received from said reader (140), and the control panel (170) stores a device location (119) determined using the location data (184) and a signal (118) received from the device (110).
1 Assignment
0 Petitions
Accused Products
Abstract
This invention relates to using consumer devices, such as mobile telephones, to identify, authenticate, locate and contact users of security and asset management systems. Such consumer devices can be used not only with the security systems but also for other uses. A device is initially registered with the security system. As needed, the device is presented to the system for authentication, enabling a person access to a secure area. In addition, the system can determine the person'"'"'s location in the secure area and can send information messages to the person as well as notifying the person in case of emergency.
-
Citations
21 Claims
-
1. A security and asset management system (100) having a device (110) operable for mobile communication, said device (110) having an id code (112) and a device communication interface (116) operable to initiate transmission of the id code (112) and to respond to a request for transmission of the id code (112), said system (100) comprising:
-
at least one reader (140) having a reader communication interface (144) operable to obtain the id code (112) from the device (110); a control panel (170) operable to communicate with said at least one reader (140); and a memory (180) for storing location data (184) and ID data (182) comprising at least one or more id codes (112), said memory (180) accessible by said control panel (170), wherein the control panel (170) validates the id code (112) received from said reader (140), and the control panel (170) stores a device location (119) determined using the location data (184) and a signal (118) received from the device (110). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A security and asset management system (100) comprising:
-
a mobile telephone (110) having an id code (112), and a device communication interface (116) operable to initiate transmission of the id code (114) and to respond to a request for transmission of the id code (114); at least one reader (140) having a reader communication interface (144) operable to obtain the id code (112) from the mobile telephone (110); a control panel (170) operable to communicate with said at least one reader (140); and a memory (180) for storing location data (184) and ID data (182) comprising at least one or more id codes (112), said memory (180) accessible by said control panel (170), wherein the control panel (170) validates the id code (112) received from said reader (140), and the control panel (170) stores a device location (119) determined using the location data (184) and a signal (118) received from the mobile telephone (110).
-
-
12. A method for identifying a device in a security and asset management system (100), comprising:
-
transmitting an id code (112) from a device (110); receiving the id code (112) at a reader (140); transmitting the id code (112) from the reader (140) to a control panel (170); and locating the device (110) in a secure area (240) using a signal (118) transmitted from the device (110) to the reader (140) and location data (184) accessible from the control panel (170), wherein the control panel (170) validates the id code (112) using ID data (182), and if the id code (112) is valid, the device (110) is authorized. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification