WO2018007774A1 - Système de virtualisation et de centralisation des fonctions de protection de sécurité d'autorisation et d'authentification d'entrants dans des sites sans personnel - Google Patents

Système de virtualisation et de centralisation des fonctions de protection de sécurité d'autorisation et d'authentification d'entrants dans des sites sans personnel Download PDF

Info

Publication number
WO2018007774A1
WO2018007774A1 PCT/GB2016/052036 GB2016052036W WO2018007774A1 WO 2018007774 A1 WO2018007774 A1 WO 2018007774A1 GB 2016052036 W GB2016052036 W GB 2016052036W WO 2018007774 A1 WO2018007774 A1 WO 2018007774A1
Authority
WO
WIPO (PCT)
Prior art keywords
entry
candidate
facility
security
access
Prior art date
Application number
PCT/GB2016/052036
Other languages
English (en)
Inventor
Lance B. DEVIN
Max O. STAYNER
Original Assignee
EdgeConneX, Inc.
BINNIE, Simon John
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by EdgeConneX, Inc., BINNIE, Simon John filed Critical EdgeConneX, Inc.
Priority to PCT/GB2016/052036 priority Critical patent/WO2018007774A1/fr
Publication of WO2018007774A1 publication Critical patent/WO2018007774A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/02Access control comprising means for the enrolment of users

Definitions

  • the inventive security system accomplishes all of the objectives without the use of on-site personnel. I n order to accomplish these objectives the protective system features the use of multi-dimensional criteria to assign individualized access across the multiple locations, each location having multi-zoned areas. Further, the subject security system utilizes automated messaging to provide secured access to an entrant through a specific door of an unmanned data center that has not been heretofore defined as the entrant's pre-approved access level.
  • the inventive process has the capability of using existing IP cameras located in view of doorways in the data center to provide an instant image of an entrant for security purposes without the need for dedicated hardware, personnel, or extensive manual processes.
  • a significant feature of the invention is directed to a queuing control to enable security operation housed at one or more remote locations to respond to a plurality of separate entry requests
  • inventive system is a bespoke application providing the aforementioned functionality in addition to that of any commercially available security system that provides an adequate application programming interface (API).
  • API application programming interface
  • FIG. 1 is a comprehensive schematic of the Virtual Guard System
  • Figure 2 is a schematic showing the information flow for the pre-registration mode of the inventive system.
  • Figure 3 is a schematic showing the information flow for the pre-registered entry mode of the inventive system.
  • Figure 4 is a schematic showing the information flow of the in situ registration and entry mode of the inventive system,
  • Communications Engine 113 A bespoke application module that uses standards-based comm unications protocols to communicate from the virtual guard system 100 to entrant 5, entrant 7 -1, and entrant 7-2, in the form of email or Short Message Service (SMS).
  • SMS Short Message Service
  • Access Request Queue 118 A bespoke application module that receives requests from entrants at all sites and puts them in the order of first request received is the first request to be processed ("First in / First Out" queuing). This list is acted upon by security operators 3 for performing the functions of the virtual security guard. Access request queue 118 knows about an entry because entrant 7-1 enters a PIN into card / pin reader 311 which then communicates that PIN through site controller 310, which passes that information to commercially available security software 200, which in turn programmatically communicates the entrant 7-1 identity and location to virtual guard interface 108 and subsequently to access request queue 118.
  • Virtual Guard Interface 108 A bespoke application interface, programmed in commercially available programming language. It provides the user experience for the whole virtual guard system to the security operator. A separate instance of the interface is presented to each individual security operator 3. More than one security operator 3 can use the virtual guard system 100 at any given time.
  • Virtual Guard Matrix Database 114 A commercially available relational database is used to define a bespoke set of tables and relational database structures that represent the access levels that need to be applied to an entrant representing any given company, at a site, and with a role. This is explained in detail below.
  • Commercial Security System & Controllers 210 Commercially available security software residing in one centralized location communicates to commercially purchased physical site controller 310 that exist at many sites. Physical site controller 310 stores entrant access levels and determines if a PI N entered by entrant is valid for an entryway. If valid, the controller sends an electro-mechanical pulse to doors 312 to unlock. There may be one or more physical site controllers 310 at a site as each controller has a limit to the number of doors that it can control.
  • Electro-Mechanical Doors 312 A commercially available physical door. Each site has entry ways that may or may not have a door. An electro-mechanical door 312 can be locked or unlocked by site controller 310. There may be one or more doors at any site, and in this document is used to represent any given door for the purposes of description.
  • Card/PIN reader 311 A commercially available physical device used to read badges or collect pins from entrants.
  • An electro-mechanical door 312 may have zero to two card/PIN readers as defined by the use case of the door.
  • a card/PIN reader is used to represent any given card/PI N reader for the purposes of description.
  • Site Controller 310 A commercially available physical device installed at a site. For the purposes of this document, there may be one or more site controllers at any given site, controlling one or many electro-mechanical doors 312 at a site.
  • a site controller has twO-way comm unication between Card/PIN reader 311 as well as commercially available security software 200, and by doing so ultimately gives control of doors and access control to virtual guard system 100.
  • Security Operator 3 Defines a role of any person whose responsibility is to administer access to data centers for desired entrants. The security operator does not need a physical presence at a site, as long as they have access to Virtual Guard System 100.
  • the Security Operator 3 may represent one person, or many persons, in one or many locations.
  • Credentials 4 Is a set of data collected about an entrant that uniquely identifies that entrant. Credentials may be defined for any given circumstance related to security, however in the preferred embodiment comprises: First Name, Last Name, Government ID Type, Government ID number, mobile phone number, email, photo, and company.
  • One-step Direct to Credential Process In the process of collecting credentials from entrant 6 in the In Situ Registration and Entry process, a photo credential must be taken.
  • the invention takes a snapshot from the I P Camera 317 using network video recorder 416 software, maintains that image in memory, and communicates the image to virtual guard interface 108 via the NVR API (Application Programming Interface).
  • the picture is immediately stored as the photo credential of entrant 6 in the commercial security system & controllers 210 via the commercial security system API 209. From security operator 3's perspective, this sequence of events is merely a push of a button in virtual guard interface 108 called "Take Picture".
  • each of the multiple locations or sites are data centers with each center having commonly and uniformly defined areas or zones with different functional purposes such as common areas, data center space, loading, electrical and customer equipment.
  • the common areas include lobbies, bathrooms, corridors and the like.
  • Data center space includes rooms housing computer equipment. Storage areas are those in which equipment is stored. Loading is done at the loading dock a nd is the area through which various items and equipment are delivered into the site.
  • the electrical room is a common area housing all power plant equipment.
  • the customer equipment is housed in areas called cages. Each of several customers may have one or more cages depending on the amount of equipment needed.
  • Entrants to the data center are classified as to the reason each has to enter the site. For example, electricians should be allowed access to the common areas and electrical rooms; customers should have access to the common areas, data center space and its designated cages; persons delivering items should have access to the loading dock etc.
  • the access level control takes into consideration all of the various areas of a specific site in which controls are necessary. Access levels are assigned to entrants either on a pre-registration basis or on an ad-hoc basis.
  • the pre- registration is sometimes referred to as the A Priori Access Request in the preferred embodiment of the invention.
  • Access levels issued on an ad-hoc basis is sometimes referred to as an In Situ Request in the preferred embodiment.
  • Each assigned access level determines the entry ways in each particular site that will allow entry by that entrant with an associated PIN.
  • An entrant's assigned access level is determined by applying pre-determined classifications relevant to that entrant. Classifications are important or there would be a metaphorically infinite number of possible access levels for each individual entrant (number of doors raised to the power of 2 - options) and impractical to administrate. I n the preferred embodiment of the invention the predetermined classifications are the entrant type, the badge type and site location.
  • a classification can be a refinement of an existing classification or an entirely new type of classification (orthogonal in nature).
  • the entrant type is defined by the company or companies the entrant represents and by extension the function they perform in the facility. In the preferred embodiment, there are entrant types such as "Customer”, “Maintenance”, “IT”, “Janitorial”, etc. More than one company can be categorized as “Maintenance” with each employee of that company being assigned the "Maintenance” access level.
  • the badge type is a further refinement of the functional responsibilities of the entrant for that specific entrant type. For exa mple, an entrant that is responsible for maintenance has pre-determined access to those rooms in the buildings in which maintenance must be performed.
  • An example of the refinement could be entrant type equals maintenance, badge type equals electrical or mechanical.
  • the electrical maintenance person can go into the electrical rooms whereby the maintenance mechanicals badge type would not, and vice versa.
  • the site location refers to the geographical location of the particular site defined by its address.
  • a three-dimensional matrix has been designed that designates the entrant type, badge type and site location of each pre-approved entrant so that upon that entrant being authorized his/her access level is automatically and dynamically programmed to allow access to all of the entry ways designated to that assigned access level.
  • an entrant can be assigned two sets of access levels based on for whom the work is to be performed, which is defined in this application as the "On-Behalf-Of" company. In that case, a different unique PIN will be assigned to each set of access levels.
  • an example is a service vendor on behalf of a customer 1 and who is also on behalf of a different customer 2.
  • Customer 1 access levels include access to customer l's equipment located in their own caged areas and customer 2 access levels include access to customer 2's equipment located in their caged areas.
  • the preferred embodiment of the inventive system has an established relationship between the Company and the On-Behalf-Of Company such that the virtual guard Interface 108 (shown in the figures) can be simplified for security operator 3. While there can be many vendor companies across multiple sites, for example, there are substantially less "On-behalf-of" companies, thus simplifying the task of assigning an access level.
  • One of the dimensions in the matrix database 114 is the assignment of the entrant type. This is determined by the On-Behalf Of credential.
  • the virtual guard interface 108 is automatically simplified when the Company credential, as indicated by the entrant 5, is associated to the On-behalf-of company credential.
  • Each "On-behalf- of" company has a limited number of possible entrant types (customer or maintenance or janitorial), and further reductions in Badge Types (electrical, mechanical, customer, etc.).
  • Figure 2 shows the information flow that is employed to pre-register a candidate who desires to be approved for access to one or more sites at a later time ("Pre-registration and/or A Priori Request").
  • Entrant 5 completes a pre-determined credentials form and submits the form via the internet or email to security operator 3.
  • Security operator 3 may be located at a centralized location or in different geographical areas and can be part of the network operations center (NOC) for the entire network of data centers. It is to be understood that the data centers under control of security operator 3 are located in various locations throughout the world.
  • NOC network operations center
  • the minimally required information in the request for pre-approval includes the future entrant 5's: picture, copy of his/hers government I D type, associated ID number, mobile telephone number, email address, other identifying information, the sites they have reason to access, the company being represented, and the company for which work will be performed ("On- Behalf-Of Company").
  • Entrant 5's information and access levels are directed into commercially available security application programming interface API 209 and controller 210 and security hardware 300 consisting of electro mechanical doors 312, PIN readers 311 and site controller 310. Eventually entrant 5 will enter a site as entrant 7 in Figure 3 further described below.
  • FIG. 3 is a diagram of information flow once a pre-approved entrant 7-1 arrives at a site and seeks access thereto.
  • Mantrap 500 is a small area having front door 501 on one wall and barrier door 502 on the opposite wall that leads into the interior of the data center building.
  • the pre-approved entrant 7- 1 enters his/hers unique PIN previously issued by security operator 3 during the pre- registration process, into front door 501's PIN reader 311.
  • the entrant 7-1 now in man trap 500, cannot access the locked barrier door 502 to enter the interior of the center using their unique PIN.
  • Virtual guard system 100 determines, based on the entrant 7-1 identity automatically retrieved from the commercially available security software 200 via the commercially available security hardware 300, whether dual authentication will be performed by security operator 3 or an SMS authentication mechanism. Dual authentication is the term used for using two distinct forms of identity unique to an entrant to ensure that an entrant is the person they say they are.
  • the preferred criteria to perform the SMS authentication mechanism is a valid mobile phone number entered during the pre-registration process, and whether the entrant 7 -1 has only one set of access levels assigned. If both criteria are true, we refer to them in Figure 3 as entrant 7-2.
  • security operator 3 takes the entrance request from an access request queue 118 to be described below, to then perform the second authentication.
  • the identity of the entrant 7- 1 must be confirmed by the interaction between security operator 3 through virtual guard interface 108 retrieving data from commercially available security software 200.
  • Security operator 3 checks the ID type and ID number as well as the photo in comparison to view of the entrant 7-1 made available by IP Camera 317 to ensure that the person is who they say they are. If a positive identification is made (second authentication), Security operator 3 uses virtual guard interface 108 to initiate an open door event sent through commercial security system 200 through to the commercially available security hardware 300.
  • a feature of the inventive system is the ability to provide automatic dual authentication or double confirmation using SMS. If the virtual guard system 100 determines that an SMS authentication can be performed, then a standards-based short message service (SMS) communication is sent to the entrant 7-2's mobile telephone. Entrant 7-2 enters the one-time, temporary PIN 10 issued by communications engine 113 for use to unlock the man trap barrier door 502. It is to be understood that the entrant's mobile telephone number is stored in the data base 114 and is delivered via interface 108 to comm unications engine 113.
  • SMS short message service
  • the request for entry by the entrant is communicated to access request queue 118 and that request is retrieved by security operator 3 from request queue 118.
  • the purpose of the access request queue 118 is to ensure an efficient processing of entrants on a first in, first out queue of entrants.
  • the unique aspect related to access request queue 118 is that when having to respond to multiple requests for entry at multiple locations the queue is a virtual one as if the entrants were in line at a single location. In accordance with the invention when there is more than one request for entry to a site and or different there is made available as many security operators 3 that is needed to handles the requests in the order resulting in an efficient processing of entry requests.
  • entrant 6 When entrant 6, who is physically at the site but has not been pre-approved, seeks to enter an unmanned site protected by the inventive system, he/she uses an intercom located outside the front door 501 that communicates with security operator 3. Upon approval, security operator 3 unlocks front door 501 and entrant 6 is able to gain access to the man trap. Once in the man trap entrant 6 uses the intercom at barrier door 502 to call security operator 3 for the start of credential collection, authorization and the authentication process. At that time the entrant's credentials (identical to the information required for pre-approval) are obtained by security operator 3. All obtained credentials are inputed into guard interface 108.
  • Security operator 3 instructs entrant 6 to face the IP camera 317 in man trap 500 and uses an innovative one-step, direct-to- credential storage process.
  • Virtual guard interface 108 uses NVR API 415 to take the picture, stores that picture in computer memory and associates that picture with credentials as well as access levels defined by virtual guard matrix database 114, then stores all that information in commercially available security software 200 using the commercial security system API 209.. It is to be understood that this system, can be operated remotely, does not require any dedicated hardware associated with the operation of the camera, nor does it require specia lized commercially available security software.
  • Virtual guard interface 108 using matrix database 114, automatically prompts security operator 3 with the On-Behalf-Of Company's dedicated authorizer's phone number. If properly authorized by the On-Behalf-Of company, security operator 3 sends authorization to commercial security system API 209 for database storage in commercially available security software 200 and the localized storage in Site Controller 310. Upon confirmation of the authorization of entrant 6, a PIN is given to entrant 6 which associates with the assigned access levels. Security operator 3 then uses virtual guard interface 8 to unlock barrier door 502 for entrance into the interior data center. Entrant 6 can then use the given PIN to enter the assigned areas in the site and access the appropriate entry ways. At this point in time, entrant 6 is now considered pre- registered and would use process flows defined in Figure 3 as entrant 5.
  • the protective system features the use of multidimensional criteria to assign individualized access across the multiple locations, each location having multi-zoned areas.
  • the subject security system utilizes automated messaging to provide secured dual authentication access to an entrant through a specific barrier door of an unmanned data center that has not been heretofore defined as the entrant's pre-approved access level.
  • the inventive process has the capability of using existing IP cameras located in view of doorways in the data center to provide an instant image of an entrant for security purposes without the need for dedicated hardware.
  • a significant feature of the invention is directed to a queuing control to enable security operation housed at a remote centralized location to respond to a plurality of separate entry requests simultaneously.
  • the above-mentioned functionality may be implemented as one or more corresponding modules as hardware and/or software.
  • the above-mentioned functionality may be implemented as one or more software components for execution by a processor of the system.
  • the above- mentioned functionality may be implemented as hardware, such as on one or more field-programmable-gate-arrays (FPGAs), and/or one or more application-specific- integrated-circuits (ASICs), and/or one or more digital-signal-processors (DSPs), and/or other hardware arrangements.
  • FPGAs field-programmable-gate-arrays
  • ASICs application-specific- integrated-circuits
  • DSPs digital-signal-processors
  • the computer program may have one or more program instructions, or program code, which, when executed by a computer carries out an embodiment of the invention.
  • program as used herein, may be a sequence of instructions designed for execution on a computer system, and may include a subroutine, a function, a procedure, a module, an object method, an object implementation, an executable application, an applet, a servlet, source code, object code, a shared library, a dynamic linked library, and/or other sequences of instructions designed for execution on a computer system.
  • the storage medium may be a magnetic disc (such as a hard drive or a floppy disc), an optical disc (such as a CD-ROM, a DVD- ROM or a BluRay disc), or a memory (such as a ROM, a RAM, EEPROM, EPROM, Flash memory or a portable/removable memory device), etc.
  • the transmission medium may be a communications signal, a data broadcast, a communications link between two or more computers, etc.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

La présente invention concerne des procédés pour permettre à des candidats à l'entrée pré-agréés chacun ayant un numéro d'identification personnel (PIN) unique dans une installation à zones multiples sans personnel, comprenant les étapes consistant : à demander audit candidat à l'entrée de saisir ledit numéro d'identification personnel unique dans le lecteur de numéro d'identification personnel de porte avant de ladite installation, à autoriser ledit candidat à l'entrée à accéder à l'intérieur d'un sas, à déterminer l'identité dudit candidat à l'entrée à l'aide de multiples formes d'authentification, et lors de la détermination de ladite identité, à ouvrir une porte barrière pour permettre audit candidat à l'entrée de quitter ledit sas et de pénétrer à l'intérieur de ladite installation.
PCT/GB2016/052036 2016-07-06 2016-07-06 Système de virtualisation et de centralisation des fonctions de protection de sécurité d'autorisation et d'authentification d'entrants dans des sites sans personnel WO2018007774A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/GB2016/052036 WO2018007774A1 (fr) 2016-07-06 2016-07-06 Système de virtualisation et de centralisation des fonctions de protection de sécurité d'autorisation et d'authentification d'entrants dans des sites sans personnel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/GB2016/052036 WO2018007774A1 (fr) 2016-07-06 2016-07-06 Système de virtualisation et de centralisation des fonctions de protection de sécurité d'autorisation et d'authentification d'entrants dans des sites sans personnel

Publications (1)

Publication Number Publication Date
WO2018007774A1 true WO2018007774A1 (fr) 2018-01-11

Family

ID=56551422

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2016/052036 WO2018007774A1 (fr) 2016-07-06 2016-07-06 Système de virtualisation et de centralisation des fonctions de protection de sécurité d'autorisation et d'authentification d'entrants dans des sites sans personnel

Country Status (1)

Country Link
WO (1) WO2018007774A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2580896A (en) * 2019-01-22 2020-08-05 Continental Automotive Gmbh Methods and systems for controlling access to a secured area

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050093675A1 (en) * 2003-10-30 2005-05-05 Wood Richard G. Process and method of screening an individual at a point of entry to a secure environment to ascertain a risk factor
US20060213982A1 (en) * 2005-03-24 2006-09-28 Privaris, Inc. Biometric identification device with smartcard capabilities
US20080285814A1 (en) * 2007-05-18 2008-11-20 James Martin Di Carlo Independent third party real time identity and age verification process employing biometric technology

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050093675A1 (en) * 2003-10-30 2005-05-05 Wood Richard G. Process and method of screening an individual at a point of entry to a secure environment to ascertain a risk factor
US20060213982A1 (en) * 2005-03-24 2006-09-28 Privaris, Inc. Biometric identification device with smartcard capabilities
US20080285814A1 (en) * 2007-05-18 2008-11-20 James Martin Di Carlo Independent third party real time identity and age verification process employing biometric technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2580896A (en) * 2019-01-22 2020-08-05 Continental Automotive Gmbh Methods and systems for controlling access to a secured area

Similar Documents

Publication Publication Date Title
US10026248B2 (en) Integrated real estate showing scheduling and key management system
JP6081859B2 (ja) 入退域管理システム及び入退域管理方法
US20160196704A1 (en) System for vitualizing and centralizing the security guard functions of authorization and authentication of entrants at unmanned sites
CN103383785A (zh) 用于自动访客登记和访问卡发行的系统和方法
EP3584769A1 (fr) Système de contrôle d'accès amélioré et procédé associé permettant de commander l'accès de personnes dans des zones limitées
US20150106150A1 (en) System and method for managing event participant authorizations
JP7108873B2 (ja) 顔認証管理サーバおよび顔認証管理方法
JP7026341B2 (ja) 顔認証機および顔認証方法
JP6998568B2 (ja) 顔認証システムおよび顔認証方法
US20110148576A1 (en) Device, System and Method for Personnel Tracking and Authentication
WO2020179335A1 (fr) Dispositif de commande d'ouverture/de fermeture de grille et procédé de commande d'ouverture/de fermeture de grille
US11004287B2 (en) Seamless hands-free reader route to a destination
JP4984490B2 (ja) 不在時の訪問者認証システム
US20220262184A1 (en) Property management systems
WO2018007774A1 (fr) Système de virtualisation et de centralisation des fonctions de protection de sécurité d'autorisation et d'authentification d'entrants dans des sites sans personnel
US20070067330A1 (en) Security method for verifying and tracking service personnel
CN110675534A (zh) 访客对讲门禁系统及其使用方法
US20100169378A1 (en) Access management system
US20220147612A1 (en) Face authentication registration device and face authentication registration method
JP2023064839A (ja) 来訪者入場管理システム
JP2014066079A5 (fr)
CN112233306A (zh) 一种门禁响应的处理方法、门禁终端及管控平台
JP2014197328A (ja) データセンタ入退室管理方法
WO2020053638A1 (fr) Procédé de contrôle d'accès par le biais de dispositifs de communication à distance
KR102518623B1 (ko) 제한구역 출입을 위한 접근통제 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16744835

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16744835

Country of ref document: EP

Kind code of ref document: A1