Method and System for Training Users Related to a Physical Access Control System
First Claim
Patent Images
1. A security system for allowing access to secure areas, the system comprising:
- at least one access control device configured to control the flow of items or users in an at least one secure area;
an access control database containing information regarding criteria for allowing access to the at least one secure area;
a control system configured to receive information from the at least one access control device and to compare the information to the access control database to determine if access is to be granted;
the control system configured to modify access if a discrepancy is noted; and
a training model configured to modify the modified access based on operator-based rules.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for training users of an access control system. In particular, the system and method allow for the imposition of “penalties” for improper behavior so as to balance the training of the user with the burden placed on the operators of the system reacting to violations, while allowing the users to accomplish their tasks. The system can also track the location of users or items, determine if a request to pass through a control point is proper based on various factors, and if appropriate, administer a “penalty” based on several contributing factors.
13 Citations
30 Claims
-
1. A security system for allowing access to secure areas, the system comprising:
-
at least one access control device configured to control the flow of items or users in an at least one secure area; an access control database containing information regarding criteria for allowing access to the at least one secure area; a control system configured to receive information from the at least one access control device and to compare the information to the access control database to determine if access is to be granted; the control system configured to modify access if a discrepancy is noted; and a training model configured to modify the modified access based on operator-based rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A security system for allowing access to secure areas, the system comprising:
-
at least one access control device configured to control the flow of items or users in at least one secured area; an access control database containing information regarding criteria for allowing access to the at least one secure area; a control system configured to receive information from the at least one access control device and to compare the information to the access control database to determine if access is to be granted; a location database configured to track the location of users in the at least one secure area; the control system configured to modify access if the user'"'"'s location is inconsistent with information in the location database; and a training model configured to modify the modified access based on operator-based rules. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of training for an access control system comprising:
-
providing at least one access control device for controlling the flow of items or users in at least one secure area; detecting a request to access the at least one secure area; determining if the user'"'"'s location is known prior to their access request; providing a training mode that includes customizable penalties for an access request that has an inconsistency as compared to an access control database containing information regarding criteria for allowing access to the at least one secure area; and determining the penalty for inconsistency. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
Specification