Access control reader enabling remote applications
First Claim
Patent Images
1. A security system operation method, comprising:
- in a security system comprising access control readers which are distributed around structures to provide access to restricted areas of the structures, upon user activation of the access control readers by users, validating the users by reference to user information provided by an application server and determining whether an application mode of the access control readers is selected by the users;
displaying selectable applications on displays of the access control readers in response to selection of the application mode; and
invoking the applications in response to selection by the users, wherein invoking the applications includes;
invoking occupancy applications, anddisplaying on the displays of the access control readers numbers of occupants within one or more zones and a remaining allowance of people allowed in the one or more zones.
7 Assignments
0 Petitions
Accused Products
Abstract
A system and method for enabling users to run remote applications on access control readers located throughout office buildings. A system administrator creates different remote applications groups such as admin, engineer or cardholder and then assigns users to one of the remote application groups. Users are then able to run the remote applications assigned to their remote application group from any of the access control readers located throughout the office building.
164 Citations
25 Claims
-
1. A security system operation method, comprising:
-
in a security system comprising access control readers which are distributed around structures to provide access to restricted areas of the structures, upon user activation of the access control readers by users, validating the users by reference to user information provided by an application server and determining whether an application mode of the access control readers is selected by the users; displaying selectable applications on displays of the access control readers in response to selection of the application mode; and invoking the applications in response to selection by the users, wherein invoking the applications includes; invoking occupancy applications, and displaying on the displays of the access control readers numbers of occupants within one or more zones and a remaining allowance of people allowed in the one or more zones. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A security system for structures, comprising:
-
access control readers which are distributed around the structures to provide access to restricted areas of the structures, each of the readers comprising; a user validation system for validating users based on user information, and a display that displays a user interface that includes selectable applications that are invoked by the users, wherein the applications include an occupancy application that provides numbers of occupants within one or more zones and a remaining allowance of people allowed in the one or more zones on the displays of the access control readers; and an application server that supplies the user information to the access control readers. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A security system operation method, comprising:
-
in a security system comprising access control readers which are distributed around structures to provide access to restricted areas of the structures, upon user activation of the access control readers by users, validating the users by reference to user information provided by an application server and determining whether an application mode of the access control readers is selected by the users; displaying selectable applications on displays of the access control readers in response to selection of the application mode; and invoking the applications in response to selection by the users, wherein invoking the applications further includes; invoking muster zones applications, and displaying on the displays of the access control readers numbers of occupants entering and leaving a zone based on keycard swipes.
-
-
24. A security system for structures, comprising:
-
access control readers which are distributed around the structures to provide access to restricted areas of the structures, each of the readers comprising; a user validation system for validating users based on user information, and a display that displays a user interface that includes selectable applications that are invoked by the users, wherein the applications include muster zones applications that indicate numbers of occupants entering and leaving a zone based on keycard swipes on the displays of the access control readers; and an application server that supplies the user information to the access control readers.
-
-
25. A security system for structures, comprising:
-
access control readers which are distributed around the structures to provide access to restricted areas of the structures, each of the readers comprising; a user validation system for validating users based on user information, a display that displays a user interface that includes selectable applications that are invoked by the users, wherein the selectable applications include; a pin change application that provides on the displays of the access control readers a current PIN screen, a new PIN screen, and a PIN confirmation screen, and an occupancy application that provides numbers of occupants within one or more zones and a remaining allowance of people allowed in the one or more zones on the displays of the access control readers, and an intercom system, which includes at least one speaker and at least one microphone; and an application server that supplies the user information to the access control readers.
-
Specification