EMPLOYING EXTERNAL STORAGE DEVICES AS MEDIA FOR ACCESS CONTROL PANEL CONTROL INFORMATION
First Claim
Patent Images
1. A security system comprising:
- a panel having first control information for performing security operations in a security system; and
a token having second control information, wherein said panel reads said second control information and determines if said token is authentic, and, if said token is authentic, said panel updates said first control information in accordance with said second control information and performs said security operations based on said updated first control information, and said updated first control information is written to said token.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention advantageously provides a flexible system and method for a security system having a control panel with control information for performing security operations, and a token having its own control information, such that the panel reads control information from the token and determines if the token is authentic, and, if it is, the panel updates its control information in accordance with the token'"'"'s control information and performs the security operations based on its updated control information, and the updated control information is copied from the panel to the token.
22 Citations
8 Claims
-
1. A security system comprising:
-
a panel having first control information for performing security operations in a security system; and a token having second control information, wherein said panel reads said second control information and determines if said token is authentic, and, if said token is authentic, said panel updates said first control information in accordance with said second control information and performs said security operations based on said updated first control information, and said updated first control information is written to said token. - View Dependent Claims (2, 3, 4)
-
-
5. A method for operating a security system, comprising the steps of:
-
reading second control information from a token to a panel having first control information; determining, using said panel, if said token is authentic; and if said token is authentic; updating first control information on said panel in accordance with said second control information; performing security operations based on said updated first control information; and writing said updated first control information to said token. - View Dependent Claims (6, 7, 8)
-
Specification