Object proximity/security adaptive event detection
First Claim
1. A program portion stored on a processor readable medium for a security system, the program portion comprising:
- a program segment arranged to receive identification information on an item and a person;
a program segment arranged to generate an alert in dependence upon the identification information and a set of security rules; and
a program segment arranged to receive feedback associated with the alert and modify the set of security rules based upon the feedback.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system incorporating a reasoning system and security rules and processes. Transponders may be triggered and sensed from a distance to identify both items and individuals. These sensed identifiers are processed by the reasoning system to determine whether each identified item is authorized to be removed from or brought into a secured location by the identified individual. The system modifies and optimizes its rules and processes based on assessments of security events. The security system enforces these security rules and receives feedback from authorized security personnel. A learning system is configured to modify existing rules or create new rules in conformance with the feedback from the authorized security personnel.
71 Citations
7 Claims
-
1. A program portion stored on a processor readable medium for a security system, the program portion comprising:
-
a program segment arranged to receive identification information on an item and a person;
a program segment arranged to generate an alert in dependence upon the identification information and a set of security rules; and
a program segment arranged to receive feedback associated with the alert and modify the set of security rules based upon the feedback. - View Dependent Claims (2, 3, 4, 5, 6, 7)
a transponder associated with at least one of the item and the person;
a card that is associated with at least one of the item and the person;
an image of at least one of the item and the person; and
a characteristic that is embodied in at least one of the item and the person.
-
-
4. The program portion of claim 1, wherein at least one of the program segments comprises at least one of a neural network, an expert system, an agent system, an associative memory, a genetic algorithm, a fuzzy logic system, and a rule-based system.
-
5. The program portion of claim 1, wherein the program segment for modifying the set of security rules is arranged to modify the set of security rules based on at least one of:
-
a time of day, a day of a week, a temperature, a direction of movement of at least one of the item and the person, a presence of an other item, a presence of an other person, and a state of security.
-
-
6. The program portion of claim 1, wherein the program segment for modifying the set of security rules is arranged to modify the set of security rules based on a class-type associated with the feedback.
-
7. The program portion of claim 6, wherein the class-type includes at least one of routine, considered, temporary, absolute, and override.
Specification