Monitoring and alarm system
First Claim
Patent Images
1. A security system for monitoring objects and persons, the security system comprising:
- a classifier operable to associate a person identifier and user role with each of the persons and further operable to associate an object identifier and object class with each of the objects, wherein a person identifier is unique to a corresponding person, and wherein a user role comprises a classification of a person into a group with members having predefined attributes;
an identification interrogator operable to identify which of the object and person identifiers are currently present within an area;
a rule generator operable to implement rules defining which persons of designated user roles and which objects of designated object classes are allowed or required within the area; and
a controller in communication with the identification interrogator and operable to determine whether identified object and person identifiers comply with the rules.
2 Assignments
0 Petitions
Accused Products
Abstract
A security system for providing monitoring of objects and persons is described. Person identifiers are assigned to, and generally carried by, the persons, where each person identifier is associated with at least one user role. Similarly, object identifiers are assigned to the objects, where each object identifier is assigned to at least one object class. An identification interrogator identifies the object and person identifiers within an area, and a rule generator determines rules defining which persons of which user roles, together with which objects of which object classes are, allowed and/or required within the area.
-
Citations
28 Claims
-
1. A security system for monitoring objects and persons, the security system comprising:
-
a classifier operable to associate a person identifier and user role with each of the persons and further operable to associate an object identifier and object class with each of the objects, wherein a person identifier is unique to a corresponding person, and wherein a user role comprises a classification of a person into a group with members having predefined attributes; an identification interrogator operable to identify which of the object and person identifiers are currently present within an area; a rule generator operable to implement rules defining which persons of designated user roles and which objects of designated object classes are allowed or required within the area; and a controller in communication with the identification interrogator and operable to determine whether identified object and person identifiers comply with the rules. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security system for monitoring objects and persons, the security system utilizing person identifiers assigned to the persons, where each person identifier is assigned to at least one user role, where object identifiers are assigned to the objects, where each object identifier is assigned to at least one object class, where a person identifier is unique to a corresponding person, and where a user role comprises a classification of a person into a group with members having predefined attributes, the security system comprising:
-
an identification interrogator configured to identify object and person identifiers within an area; a central database configured to provide user roles for each identified person and object class for each identified object; a rule generator configured to generate rules from information from the central database, the rules defining which persons of which user roles, together with which objects of which object classes, are allowed or required within the area; a controller configured to check whether identified object and person identifiers comply with the rules; and an access controller configured to control access to the area such that one of the persons is allowed to enter or exit the area only if the identified object and person identifiers still comply with the rules after the person has entered or exited the area.
-
-
11. A method for monitoring persons and objects, the method comprising:
-
interrogating person identifiers assigned to the persons, where each interrogated person identifier is assigned to at least one user role, to thereby obtain an identified person, wherein a person identifier is unique to a corresponding person, and wherein a user role comprises a classification of a person into a group with members having predefined attributes; interrogating object identifiers assigned to the objects, where each object identifier is assigned to at least one object class, to thereby obtain an identified object; determining rules defining which persons and which objects are allowed or required within the area based on the user roles and the object classes; and checking whether the identified person and object comply with the rules. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product for use in monitoring persons and objects, the computer program product comprising a at least one machine-readable medium for storing instructions operable to cause at least one processing device to:
-
instruct an interrogator to interrogate person identifiers assigned to the persons, where each person identifier is assigned to at least one user role, and to interrogate object identifiers assigned to the objects, where each object identifier is assigned to at least one object class, where a person identifier is unique to a corresponding person, and where a user role comprises a classification of a person into a group with members having predefined attributes; and instruct a rule generator to determine rules defining combinations of persons, user roles, objects, and object classes that are allowed or required within the area; and check whether identifiers currently present within the area comply with the rules. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
Specification