Physical and logical threat analysis in access control systems using BIM
First Claim
Patent Images
1. An apparatus comprising:
- a building information model (BIM) of a secured area having a plurality of different portions, wherein the BIM is embodied in a memory; and
a processor that identifies different ones of the plurality of different portions of the secured area having different levels of security by referencing the BIM,wherein the processor notifies a user about a security weakness based upon an interaction between the different levels of the security of the different ones of the plurality of different portions of the secured area defined by the BIM and physical characteristics of the different ones of the plurality of different portions of the secured area defined by the BIM, andwherein the security weakness comprises at least a set of categories that includes;
dividers among the different ones of the plurality of different portions of the secured area having the different levels of the security having both a physical material strength and an impact strength below a predetermined threshold, walkways or corridors that lead only from a first one of the plurality of different portions of the secured area having a first one of the different levels of the security to a second one of the plurality of different portions of the secured area having a second one of the different levels of the security, and a mismatch between total authorized users of the secured area and a number of authorized users within a selected one of the plurality of different portions of the secured area with a higher relative one of the different levels of the security.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus including a building information model (BIM) of a secured area having a plurality of different portions, the BIM embodied in a memory, a processor that identifies portions of the secured area having different levels of security and a processor that alerts a user of a security weakness based upon an interaction between the security levels and physical characteristics of the secured area defined by the BIM.
13 Citations
17 Claims
-
1. An apparatus comprising:
-
a building information model (BIM) of a secured area having a plurality of different portions, wherein the BIM is embodied in a memory; and a processor that identifies different ones of the plurality of different portions of the secured area having different levels of security by referencing the BIM, wherein the processor notifies a user about a security weakness based upon an interaction between the different levels of the security of the different ones of the plurality of different portions of the secured area defined by the BIM and physical characteristics of the different ones of the plurality of different portions of the secured area defined by the BIM, and wherein the security weakness comprises at least a set of categories that includes;
dividers among the different ones of the plurality of different portions of the secured area having the different levels of the security having both a physical material strength and an impact strength below a predetermined threshold, walkways or corridors that lead only from a first one of the plurality of different portions of the secured area having a first one of the different levels of the security to a second one of the plurality of different portions of the secured area having a second one of the different levels of the security, and a mismatch between total authorized users of the secured area and a number of authorized users within a selected one of the plurality of different portions of the secured area with a higher relative one of the different levels of the security. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
a security system having a secured area with a number of different portions, wherein each one of the number of different portions includes a respective security level; a building information model (BIM) of the secured area embodied in a memory of the security system; an analysis engine of the security system that identifies different ones of the number of different portions of the secured area having different ones of the respective security level by referencing the BIM and a respective partition between the different ones of the number of different portions of the secured area having the different ones of the respective security levels; and a processor of the analysis engine that analyzes a context of the respective partition between each of the different ones of the number of different portions of the secured area having the different ones of the respective security levels and compares the context with a respective rule of a plurality of rules related to the context, wherein the processor alerts a user about a security weakness based upon an interaction between the different ones of the respective security levels of the different ones of the number of different portions of the secured area defined by the BIM and physical characteristics of the different ones of the number of different portions of the secured area defined by the BIM, and wherein the security weakness comprises at least a set of categories that includes;
dividers among the different ones of the number of different portions of the secured area having the different ones of the respective security levels having both a physical material strength and an impact strength below a predetermined threshold, walkways or corridors that lead only from a first one of the number of different portions of the secured area with a first one of the respective security levels to a second one of the number of different portions of the secured area having a second one of the respective security levels, and a mismatch between total authorized users of the secured area and a number of the authorized users within a selected one of the number of different portions of the secured area with a higher relative one of the respective security levels. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An apparatus comprising:
-
a security system; a building information model (BIM) of a secured area having a plurality of different portions, wherein the BIM is embodied in a memory of the security system; a plurality of rules defining a minimum level of security for each of the plurality of different portions; an analysis engine of the security system that identifies different ones of the plurality of different portions of the secured area having different levels of security by referencing the BIM and a rule of the plurality of rules that applies to a partition between the different ones of the plurality of different portions of the secured area having the different levels of the security; and a processor of the analysis engine that analyzes a context of the partition between the different ones of the plurality of different portions of the secured area and compares the context with the rule of the plurality of rules related to the context, wherein the processor alerts a user about a security weakness based upon an interaction between the different levels of the security of the different ones of the plurality of different portions of the secured area and the plurality of rules, and wherein the security weakness comprises at least a set of categories that includes;
dividers among the different ones of the plurality of different portions of the secured area having the different levels of the security having both a physical material strength and an impact strength below a predetermined threshold, walkways or corridors that lead only from a first one of the plurality of different portions of the secured area having a first one of the different levels of the security to a second one of the plurality of different portions of the secured area having a second one of the different levels of the security, and a mismatch between total authorized users of the secured area and a number of the authorized users within an identified one of the plurality of different portions of the secured area with a higher relative one of the different levels of the security and access contradictions.
-
Specification