Method and System for Monitoring Physical Security and Notifying if Anomalies
First Claim
1. A security system for detecting changes in patterns of access requests, the system comprising:
- at least one access control device for controlling the flow of items in a physical setting;
a control system for receiving information from the at least one access control device and determining if access is to be granted;
a database for collecting information regarding access;
an analytical system for analyzing the data gathered to determine patterns and variations from the patterns; and
a notification system for notifying of an anomaly in the patterns.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for monitoring access requests for physical access to a location includes a plurality of access control devices for control accessing to specific locations. The system determines if access is authorized based on comparing information associated with the request with a database. Access is granted to a physical location based on the comparison of information. In addition, the system compares an access request to prior access requests. The system determines if the access request is an anomaly from previous requests. If the access request is an anomaly from previous requests, the system notifies an operator that the access request is an anomaly.
24 Citations
15 Claims
-
1. A security system for detecting changes in patterns of access requests, the system comprising:
-
at least one access control device for controlling the flow of items in a physical setting; a control system for receiving information from the at least one access control device and determining if access is to be granted; a database for collecting information regarding access; an analytical system for analyzing the data gathered to determine patterns and variations from the patterns; and a notification system for notifying of an anomaly in the patterns. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of detecting changes in patterns of access request comprising:
-
comparing an access request to prior access requests; determining if the access request is an anomaly from previous requests; and notifying an operator if the access request is an anomaly. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
Specification