Security system
First Claim
1. A security system for use with a localized area, comprising:
- a utility component located within the localized area, said utility component having at least one movable access element;
at least one processor including at least one stored access code and instructions for comparing said stored access code to access codes associated with a user that are input into said processor;
a first access authentication device associated with the localized area and interfaced with said at least one processor;
a second access authentication device associated with said utility component and interfaced with said at least one processor, said second access authentication device operable to generate an access code associated with the user;
a locking element associated with said at least one access element, said locking element interfaced with said at least one processor; and
at least one mobile credential device detectable by said first access authentication device, each said mobile credential device including at least one access code associated with a user.
1 Assignment
0 Petitions
Accused Products
Abstract
A security system for monitoring, controlling, and automating one or more work areas and office furniture components, or monitoring, controlling, and automating utility components in other environments such as retail, restaurant, and home applications. The system includes passive and active access authentication devices and active or passive unlocking and lockdown devices for utility components, such as storage components, office furniture components, offices, and work sites. The system may include, for example, a processor, an access authentication device, sensors for monitoring work areas, actuators for controlling and automating work areas, and status and alarm notifiers.
-
Citations
21 Claims
-
1. A security system for use with a localized area, comprising:
-
a utility component located within the localized area, said utility component having at least one movable access element; at least one processor including at least one stored access code and instructions for comparing said stored access code to access codes associated with a user that are input into said processor; a first access authentication device associated with the localized area and interfaced with said at least one processor; a second access authentication device associated with said utility component and interfaced with said at least one processor, said second access authentication device operable to generate an access code associated with the user; a locking element associated with said at least one access element, said locking element interfaced with said at least one processor; and at least one mobile credential device detectable by said first access authentication device, each said mobile credential device including at least one access code associated with a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security system, comprising:
-
a utility component having at least one movable access element; a processor associated with said utility component; a locking element associated with said at least one movable access element and interfaced with said processor, said locking element having a first state in which said at least one movable access element is movable between an open and a closed position and a second state in which said at least one movable access element is locked in said closed position; a proximity based access authentication device interfaced with said processor; a non-proximity based authentication device interfaced with said processor; at least one mobile credential device, each said mobile credential device including at least one access code associated with a user; and said processor comprising; operating instructions for switching said locking element between said first state and said second state based upon access data received from said proximity based authentication device and said non-proximity based authentication device; at least one stored access code; and evaluation instructions for evaluating access codes received from said proximity based and said non-proximity based access authentication devices. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method of operating a security system associated with a utility component, comprising the steps of:
-
detecting the presence of a mobile credential device within a localized area surrounding the utility component; obtaining first data corresponding to a biometric characteristic of a user from the mobile credential device; obtaining second data corresponding to the biometric characteristic of the user from the user; comparing the first data with the second data; and granting access to the utility component if the first data matches the second data. - View Dependent Claims (18, 19, 20, 21)
-
Specification