Automated Adaption Based Upon Prevailing Threat Levels in a Security System
First Claim
Patent Images
1. A computer implemented method for automating an adapting system based upon prevailing threat levels in a security system, comprising the steps of:
- providing an administration facility for establishing a plurality of threat levels and corresponding threat level behaviors for a facility-wide security mechanism;
storing said threat levels and corresponding threat level behaviors in a database;
communicating a threat level to a control system;
said control system adapting a current configuration of said facility-wide security mechanism in accordance with threat level behaviors that correspond to said communicated threat level by altering operation of security features associated with said facility and by altering communicated security procedures and a manner in which said security procedures are communicated;
said control system monitoring said facility for changes in facility status, wherein said changes comprise any of physical changes established by any of a plurality of detection means and virtual changes established by data input; and
said control system communicating said monitored facility status changes to said database for use by said administration facility in determining establishment of a new threat level and maintenance of a current threat level, and in adapting said threat level behaviors by altering responses of said facility-wide security mechanisms for one or more threat levels as appropriate.
1 Assignment
0 Petitions
Accused Products
Abstract
Four threat levels reflect a prevailing risk and can be adjusted, for example, when local authorities advise of an increased likelihood of terrorist activity. Thus, a higher threat level in such system indicates a higher level of risk to a particular facility. In an embodiment of the invention, the behavior of the system changes with a simple adjustment to the threat level.
74 Citations
19 Claims
-
1. A computer implemented method for automating an adapting system based upon prevailing threat levels in a security system, comprising the steps of:
-
providing an administration facility for establishing a plurality of threat levels and corresponding threat level behaviors for a facility-wide security mechanism; storing said threat levels and corresponding threat level behaviors in a database; communicating a threat level to a control system; said control system adapting a current configuration of said facility-wide security mechanism in accordance with threat level behaviors that correspond to said communicated threat level by altering operation of security features associated with said facility and by altering communicated security procedures and a manner in which said security procedures are communicated; said control system monitoring said facility for changes in facility status, wherein said changes comprise any of physical changes established by any of a plurality of detection means and virtual changes established by data input; and said control system communicating said monitored facility status changes to said database for use by said administration facility in determining establishment of a new threat level and maintenance of a current threat level, and in adapting said threat level behaviors by altering responses of said facility-wide security mechanisms for one or more threat levels as appropriate. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus for automating an adapting system based upon prevailing threat levels in a security system, comprising:
-
an administration facility for establishing a plurality of threat levels and corresponding threat level behaviors for a facility-wide security mechanism; a database for storing said threat levels and corresponding threat level behaviors; a control system for adapting a current configuration of said facility-wide security mechanism in accordance with threat level behaviors that correspond to a communicated threat level by altering operation of security features associated with said facility and by altering communicated security procedures and a manner in which said security procedures are communicated; a facility for communicating a threat level to said control system; said control system monitoring said facility for changes in facility status, wherein said changes comprise any of physical changes established by any of a plurality of detection means and virtual changes established by data input; and said control system communicating said monitored facility status changes to said database for use by said administration facility in determining establishment of a new threat level and maintenance of a current threat level, and in adapting said threat level behaviors by altering responses of said facility-wide security mechanisms for one or more threat levels as appropriate. - View Dependent Claims (19)
-
Specification