Access Control System
First Claim
Patent Images
1. A method, comprising:
- authenticating an identity of a user to an access control system;
receiving, by the access control system, a contact request requesting contact with a name of a host;
querying a database for the name of the host, the database storing associations between different names and different contact addresses;
retrieving, by the access control system, a contact address associated with the name of the host; and
initiating, by the access control system, a notification to the contact address, the notification informing the host that the user requests the contact.
1 Assignment
0 Petitions
Accused Products
Abstract
An access control system provides authentication and notification. A visitor to a facility, for example, authenticates to the access control system. Once an identity of the visitor is confirmed, the access control system sends a notification to a host, such as an employee. The notification informs the host of the arrival of the visitor.
-
Citations
20 Claims
-
1. A method, comprising:
-
authenticating an identity of a user to an access control system; receiving, by the access control system, a contact request requesting contact with a name of a host; querying a database for the name of the host, the database storing associations between different names and different contact addresses; retrieving, by the access control system, a contact address associated with the name of the host; and initiating, by the access control system, a notification to the contact address, the notification informing the host that the user requests the contact. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a processor; and a memory storing instructions that when executed cause the processor to perform operations, the operations comprising; authenticating an identity of a user to an access control system; receiving a contact request at the access control system, the contact request entered by the user and requesting contact with a name of a host; querying a database for the name of the host, the database storing associations between different names and different contact addresses; retrieving a contact address associated with the name of the host; and initiating a notification from the access control system to the contact address, the notification informing the host that the user requests the contact. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A memory storing instructions that when executed cause a processor to perform operations, the operations comprising:
-
authenticating an identity of a user to an access control system; receiving a contact request at the access control system, the contact request entered by the user and requesting contact with a name of a host; querying a database for the name of the host, the database storing associations between different names and different contact addresses; retrieving a contact address associated with the name of the host; and initiating a notification from the access control system to the contact address, the notification informing the host that the user requests the contact. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification