Facility Access Integrated With Other Security Systems
First Claim
1. A method comprising:
- identifying an individual seeking access to a restricted area;
determining whether the identified individual is authorized to access the restricted area;
if authorized, permitting entry of the identified individual into the restricted area;
determining a time period of a plurality of time periods to disable an alarm system of the restricted area based on at least one characteristic associated with the identified individual; and
disabling the alarm system for the time period.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for integrating facility access with other security systems are described. An individual seeking access authorization to a facility may be identified with a biometric parameter such as an iris scan. If authorized, the system may allow entry by disabling the alarm system, and a time period for access may be determined based on one or more characteristics associated with the individual. These characteristics may include the functional role of the individual at the facility and/or the location of the facility itself. Moreover, this facility access authorization system may be integrated with a network access authorization system associated with the facility so that when an individual gains access to the facility for a specific time period, the system is also able to determine how long the individual may access its network resources.
25 Citations
37 Claims
-
1. A method comprising:
-
identifying an individual seeking access to a restricted area; determining whether the identified individual is authorized to access the restricted area; if authorized, permitting entry of the identified individual into the restricted area; determining a time period of a plurality of time periods to disable an alarm system of the restricted area based on at least one characteristic associated with the identified individual; and disabling the alarm system for the time period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus comprising:
-
a processor; a memory having stored therein computer executable instructions, that when executed by the processor, cause the apparatus to perform a method of; identifying an individual seeking access to a restricted area; determining whether the identified individual is authorized to access the restricted area; if authorized, permitting entry of the identified individual into the restricted area; determining a time period of a plurality of time periods to disable an alarm system of the restricted area based on at least one characteristic associated with the identified individual; and disabling the alarm system for the time period. - View Dependent Claims (20, 21)
-
-
22. A method comprising:
-
identifying an individual seeking access to a restricted area; determining whether the identified individual is authorized to access the restricted area; if authorized, permitting entry of the identified individual into the restricted area; allowing access to network resources associated with the restricted area; determining a time period of a plurality of time periods to disable an alarm system of the restricted area and to allow use of network facilities within the restricted area based on at least one characteristic associated with the identified individual; and disabling the alarm system for the time period. - View Dependent Claims (23, 24)
-
-
25. An apparatus comprising:
-
a processor; a memory having stored therein computer executable instructions, that when executed by the processor, cause the apparatus to perform a method of; identifying an individual seeking access to a restricted area; determining whether the identified individual is authorized to access the restricted area; if authorized, permitting entry of the identified individual into the restricted area; allowing access to network resources associated with the restricted area; determining a time period of a plurality of time periods to disable an alarm system of the restricted area and to allow use of network facilities within the restricted area based on at least one characteristic associated with the identified individual; and disabling the alarm system for the time period. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification