System and Method for Virtual Region Based Access Control Operations Using BIM
First Claim
1. A method comprising:
- a building information model (BIM) of a security system defining a three-dimensional floor plan of a secured area;
the BIM receiving an a graphical input from a user defining at least one subarea of the secured area;
a user input of the security system receiving a selection of the at least one subarea of the secured area;
the user input of the security system receiving a change in a parameter from the user of the security system, the parameter is used by a plurality of security devices within the at least one subarea; and
changing a corresponding parameter within each of the plurality of security devices to match the changed parameter.
1 Assignment
0 Petitions
Accused Products
Abstract
A system operates using the steps of a building information model (BIM) of a security system defining a three-dimensional floor plan of a secured area, the BIM receiving an a graphical input from a user defining at least one subarea of the secured area, a user input of the security system receiving a selection of the at least one subarea of the secured area, the user input of the security system receiving a change in a parameter from the user of the security system, the parameter is used by a plurality of security devices within the at least one subarea and changing a corresponding parameter within each of the plurality of security devices to match the changed parameter.
23 Citations
20 Claims
-
1. A method comprising:
-
a building information model (BIM) of a security system defining a three-dimensional floor plan of a secured area; the BIM receiving an a graphical input from a user defining at least one subarea of the secured area; a user input of the security system receiving a selection of the at least one subarea of the secured area; the user input of the security system receiving a change in a parameter from the user of the security system, the parameter is used by a plurality of security devices within the at least one subarea; and changing a corresponding parameter within each of the plurality of security devices to match the changed parameter. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a security system having a secured area; a building information model (BIM) of the security system that defines a three-dimensional floor plan of the secured area; a zone file that defines a plurality of zones within the secured area in accordance with a coordinate system of the BIM; a user input of the security system that receives a selection of the at least one zone of the plurality of zones within the secured area; the user input of the security system that receives a change in a parameter from the user of the security system, the parameter is used by a plurality of security devices within the selected zone; and a processor that changes a corresponding parameter within each of the plurality of security devices to match the changed parameter. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a security system having a secured area; a building information model (BIM) of the security system that defines a plurality of regions within the secured area; a first portion of a user input of the security system that receives a selection of the at least one region of the plurality of regions within the secured area; a second portion of the user input of the security system that receives a change in a parameter from the user of the security system, the parameter is used by a plurality of security devices within the selected zone; and a parameter processor that changes a corresponding parameter within each of the plurality of security devices to match the changed parameter. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification