Method and system for training users related to a physical access control system
First Claim
Patent Images
1. A security system for allowing access to secure areas, the system comprising:
- at least one access control device configured to control the flow of items or users in an at least one secure area;
an access control database containing information regarding criteria for allowing access to the at least one secure area; and
a control system configured to receive information from the at least one access control device and to compare the information to the access control database to determine if access is to be granted;
the control system configured to modify access if a discrepancy is noted, the control system including a training model configured to modify the access based on operator-based rules and based on the discrepancy to train a user to adhere to access policies.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for training users of an access control system. In particular, the system and method allow for the imposition of “penalties” for improper behavior so as to balance the training of the user with the burden placed on the operators of the system reacting to violations, while allowing the users to accomplish their tasks. The system can also track the location of users or items, determine if a request to pass through a control point is proper based on various factors, and if appropriate, administer a “penalty” based on several contributing factors.
13 Citations
30 Claims
-
1. A security system for allowing access to secure areas, the system comprising:
-
at least one access control device configured to control the flow of items or users in an at least one secure area; an access control database containing information regarding criteria for allowing access to the at least one secure area; and a control system configured to receive information from the at least one access control device and to compare the information to the access control database to determine if access is to be granted; the control system configured to modify access if a discrepancy is noted, the control system including a training model configured to modify the access based on operator-based rules and based on the discrepancy to train a user to adhere to access policies. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A security system for allowing access to secure areas, the system comprising;
-
at least one access control device configured to control the flow of items or users in at least one secured area; an access control database containing information regarding criteria for allowing access to the at least one secure area; a control system configured to receive information from the at least one access control device and to compare the information to the access control database to determine if access is to be granted; a location database configured to track the location of users in the at least one secure area; the control system configured to modify access if the user'"'"'s location is inconsistent with information in the location database; and the control system including a training model configured to modify the access based on operator-based rules and based on detection that the user'"'"'s location is inconsistent with information in the location database to train a user to adhere to access policies. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of training for an access control system comprising:
-
providing at least one access control device for controlling the flow of items or users in at least one secure area; detecting a request to access the at least one secure area by a user; determining if the user'"'"'s location is known prior to the access request; providing a training mode that includes customizable penalties for an access request that has an inconsistency as compared to an access control database containing information regarding criteria for allowing access to the at least one secure area; and determining a penalty for inconsistency based on a level of training of the user to train the user. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30)
-
Specification