WO2023183429A1 - Agencement d'application web de sécurité - Google Patents

Agencement d'application web de sécurité Download PDF

Info

Publication number
WO2023183429A1
WO2023183429A1 PCT/US2023/015967 US2023015967W WO2023183429A1 WO 2023183429 A1 WO2023183429 A1 WO 2023183429A1 US 2023015967 W US2023015967 W US 2023015967W WO 2023183429 A1 WO2023183429 A1 WO 2023183429A1
Authority
WO
WIPO (PCT)
Prior art keywords
interface component
interface
security
user interface
web application
Prior art date
Application number
PCT/US2023/015967
Other languages
English (en)
Inventor
Robert Pearson
Sanela Suljic
Original Assignee
Johnson Controls Tyco IP Holdings LLP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US18/187,363 external-priority patent/US20230308362A1/en
Application filed by Johnson Controls Tyco IP Holdings LLP filed Critical Johnson Controls Tyco IP Holdings LLP
Publication of WO2023183429A1 publication Critical patent/WO2023183429A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/38Creation or generation of source code for implementing user interfaces
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19682Graphic User Interface [GUI] presenting system data to the user, e.g. information on a screen helping a user interacting with an alarm system
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/14Central alarm receiver or annunciator arrangements

Definitions

  • a security system may include security devices such as cameras, identification readers, and various types of doors.
  • security devices such as cameras, identification readers, and various types of doors.
  • a human e.g., a security administrator or security guard
  • a security system may include tens or hundreds of cameras, so a user interface for displaying all of the camera feeds or interacting with the cameras may be cumbersome.
  • a security administrator or security guard may be responsible for monitoring a security system and responding to calls from personnel. For example, an employee may need assistance if an identification reader does not correctly read a card. In a large system with multiple security devices, a security administrator may need to navigate through multiple lists to locate the relevant devices in order to confirm the issue and remotely open a door for the employee. As another example, during an event, the security administrator may want to monitor a particular set of security devices, but an interface may include excess information.
  • the techniques described herein relate to a method of generating a web application user interface for a security system, including: receiving a selection of a first interface component and a location for the interface component on a layout for the web application user interface from a user via a graphic user interface, the first interface component associated with one or more security devices via a security server; receiving, via the graphic user interface, a configuration of an action for the first interface component with respect to the one or more security devices; displaying the first interface component on the web application user interface, wherein the interface component communicates with the one or more security devices via the security server in real time; and receiving input for the one or more security devices from the user via the web application user interface.
  • the techniques described herein relate to a method, wherein the interface component is a card configured to display a real-time result of a query to the security server.
  • the techniques described herein relate to a method, further including deploying the web application user interface to a client device.
  • the techniques described herein relate to a method, wherein the layout for the web application user interface defines a plurality of predefined positions, wherein receiving the selection of the first interface component includes receiving a selection of a size of the first interface component as a number of the plurality of predefined positions.
  • the techniques described herein relate to a method, further including: receiving a selection of a second interface component and a second location for the second interface component on the layout for the web application user interface from the user via the graphic user interface, the interface component associated with one or more security devices via the security server; receiving, via the graphic user interface, a configuration of a second action for the second interface component with respect to the one or more security devices; and displaying the second interface component on the web application user interface along with the first interface component.
  • the techniques described herein relate to a method, wherein the first interface component is a swipe and show interface component that displays a record of users providing identification to the one or more security devices.
  • the techniques described herein relate to a method, wherein the graphical user interface includes a plurality of selectable buttons for selecting an interface component, wherein each button corresponds to one or more of an event interface component configured to display events detected by one or more of the security devices; an identification interface component configured to display information associated with an identification reader; a personnel monitoring interface component configured to display information about a person; a device action interface component configured to receive input to manually control a security device; a system monitoring interface component configured to display system statistics; a video monitoring interface component configured to display and control one or more video feeds; an alert interface component configured to generate an alert; or a card interface component configured to present a result of a database query.
  • the techniques described herein relate to an apparatus for generating a web application user interface for a security system, including: a memory storing computer-executable instructions; and at least one processor coupled to the memory and configured to execute the instructions to: receive a selection of a first interface component and a location for the interface component on a layout for a web application user interface from a user via a graphic user interface, the first interface component associated with one or more security devices via a security server; receive, via the graphic user interface, a configuration of an action for the first interface component with respect to the one or more security devices; display the first interface component on the web application user interface, wherein the interface component communicates with the one or more security devices via the security server in real time; and receive input for the one or more security devices from the user via the web application user interface.
  • the techniques described herein relate to an apparatus, wherein the interface component is a card configured to display a real-time result of a query to the security server. [0016] In some aspects, the techniques described herein relate to an apparatus, wherein the at least one processor is configured to execute the instructions to deploy the web application user interface to a client device.
  • the techniques described herein relate to an apparatus, wherein the layout for the web application user interface defines a plurality of predefined positions, wherein receiving the selection of the first interface component includes receiving a selection of a size of the first interface component as a number of the plurality of predefined positions.
  • the techniques described herein relate to an apparatus, wherein the at least one processor is configured to execute the instructions to: receive a selection of a second interface component and a second location for the second interface component on the layout for the web application user interface from the user via the graphic user interface, the interface component associated with one or more security devices via the security server; receive, via the graphic user interface, a configuration of a second action for the second interface component with respect to the one or more security devices; and display the second interface component on the web application user interface along with the first interface component.
  • the techniques described herein relate to an apparatus, wherein the first interface component is a swipe and show interface component that displays a record of users providing identification to the one or more security devices.
  • the techniques described herein relate to an apparatus, wherein the graphical user interface includes a plurality of selectable buttons for selecting an interface component, wherein each button corresponds to one or more of an event interface component configured to display events detected by one or more of the security devices; an identification interface component configured to display information associated with an identification reader; a personnel monitoring interface component configured to display information about a person; a device action interface component configured to receive input to manually control a security device; a system monitoring interface component configured to display system statistics; a video monitoring interface component configured to display and control one or more video feeds; an alert interface component configured to generate an alert; or a card interface component configured to present a result of a database query.
  • the techniques described herein relate to a security system including: one or more security devices configured to monitor an area and control access to the area; a security server configured to receive information from the one or more security devices and issue commands to the one or more security devices; a node server configured to: receive a selection of a first interface component and a location for the interface component on a layout for a web application user interface from a first user via a graphic user interface, the first interface component associated with one or more security devices via a security server; receive, via the graphic user interface, a configuration of an action for the first interface component with respect to the one or more security devices; and a client device configured to: display the first interface component on the web application user interface, wherein the interface component communicates with the one or more security devices via the security server in real time; and receive input for the one or more security devices from a second user via the web application user interface.
  • the techniques described herein relate to a security system, wherein the interface component is a card configured to display a real-time result of a query to the security server.
  • the techniques described herein relate to a security system, wherein the node server is configured to deploy the web application user interface to the client device.
  • the techniques described herein relate to a security system, wherein the layout for the web application user interface defines a plurality of predefined positions, wherein the node server is configured to receive a selection of a size of the first interface component as a number of the plurality of predefined positions.
  • the techniques described herein relate to a security system, wherein the first interface component is a swipe and show interface component that displays a record of users providing identification to the one or more security devices.
  • the techniques described herein relate to a security system, wherein the graphical user interface includes a plurality of selectable buttons for selecting an interface component, wherein each button corresponds to one or more of: an event interface component configured to display events detected by one or more of the security devices; an identification interface component configured to display information associated with an identification reader; a personnel monitoring interface component configured to display information about a person; a device action interface component configured to receive input to manually control a security device; a system monitoring interface component configured to display system statistics; a video monitoring interface component configured to display and control one or more video feeds; an alert interface component configured to generate an alert; or a card interface component configured to present a result of a database query.
  • the present disclosure also provides an apparatus (e.g., a computer device) including a memory storing computer-executable instructions and at least one processor configured to execute the computer-executable instructions to perform the above methods, an apparatus including means for performing the above methods, and a non-transitory computer-readable medium storing computer-executable instructions for performing the above methods.
  • an apparatus e.g., a computer device
  • a memory storing computer-executable instructions and at least one processor configured to execute the computer-executable instructions to perform the above methods
  • an apparatus including means for performing the above methods
  • a non-transitory computer-readable medium storing computer-executable instructions for performing the above methods.
  • FIG. 1 is a diagram of an example security system including a network that connects security devices to a security server.
  • FIG. 2 is an example architecture 200 for implementing the network of FIG. 1.
  • FIG. 3 is an example of a graphical user interface (GUI) for generating a layout including interface components.
  • GUI graphical user interface
  • FIG. 4 is an example of the GUI of FIG. 3 including multiple interface components in the layout.
  • FIG. 5 is an example of a web application user interface based on the layout of FIG. 4.
  • FIG. 6 is a diagram of an example computer device that may be used to implement a security server or a node server providing an interface to the security server.
  • FIG. 7 is a flowchart of an example method of generating a web application user interface for a security system.
  • FIG. 8 is a diagram of an example computer device in accordance with an implementation, including additional component details as compared to FIG. 6.
  • the present disclosure provides systems and methods for deploying customizable web application interfaces for a security system in real-time.
  • Current techniques for providing interfaces to security systems is for the security system provider to develop an interface and deploy the interface to sites as an application. Deployment of the application at a site may include downtime for the system as new interfaces are added.
  • a graphical user interface allows a user such as a security administrator (admin) to select interface components and arrange the interface components in a layout.
  • the interface components may be based on an application programing interface (API) and or software development kit (SDK) compatible with a security server.
  • API application programing interface
  • SDK software development kit
  • the API or SDK may provide requirements for interacting with the security system.
  • the interface components may be verified and approved for use with the security system before being added to a library that is accessible to different users.
  • the graphical user interface allows the admin to configure each interface component. For example, the admin may associate the interface component with one or more security devices.
  • the customized layout may be deployed instantly for use by the admin or another user such as a security guard. Accordingly, the present disclosure may reduce downtime of a security system or user interface thereof.
  • the present disclosure improves the user interface of the security system by allowing quick and convenient customization of the user interface for particular deployments or scenarios.
  • the admin may develop a user interface for monitoring or controlling a particular room by selecting appropriate interface components based on the needs for an event that is planned for the room.
  • the customized user interface may be deployed to a client device such as a security terminal or a mobile device of a security guard.
  • the interface component may communicate with one or more security devices via the security server in real time.
  • the interface component may present a video feed from a camera, door lock/unlock events, or identification events.
  • the customization of the user interface may allow the user interface to display relevant information and controls without the need for a user to sort through menus and device lists in real time.
  • an example security system 100 includes a network 110 that connects security devices 120 to a security server 112.
  • the security device 120 may include example devices such as a door 122, a camera 124, and an identification reader 126.
  • the security server 112 may be configured to control the security devices 120.
  • the security server 112 may be configured to receive information from the security devices 120 and issue commands to the security devices 120.
  • the security devices may monitor an area and/or control access to an area.
  • the door 122 may control physical access to an area by allowing people to enter the area through the door.
  • the door 122 may include a lock that can be controlled remotely via commands from the security server 112.
  • various doors 122 may be configured to unlock in response to a respective identification reader 126 sending identification information to the security server 112, which determines whether the identification information matches information for authorized personnel and issues an unlock command to the door 122.
  • the cameras 124 may be positioned in strategic locations and provide video feeds to the security server 112.
  • Security personnel such as admins and guards may access the security system 100 and the security server 112 via client devices such as a terminal 130 or a mobile device 132.
  • client devices such as a terminal 130 or a mobile device 132.
  • the present disclosure provides for configuration of a web application that may be accessed via the user devices for the security personnel to interact with the security system.
  • an example architecture 200 may implement the network 110.
  • the network 110 may include a web stack 210 that provides an interface for the client devices including terminal 130 and mobile device 132.
  • the web stack 210 includes a web client 212 that may execute on a user device.
  • the web client 212 may securely communicate with a node server 214, for example, via HTTPS or web sockets.
  • the user may be authenticated as a registered user of the security system and may be associated with a particular role or access privileges.
  • the web stack 210 may communicate with the security server 112 via an internet information services (IIS) 220 that provides web services 222.
  • IIS internet information services
  • the web services 222 may be referred to as a node server.
  • the web services 222 may include authentication, user and operator roles, access control, data services, site management, and video transport.
  • the security server 112 may be connected to multiple security devices 120, for example, using wired connections at a secured location and/or secured connections to a remote location.
  • the security server 112 may be connected to a database server 230 that stores data for the security system such as video and event records.
  • the security server 112 may access the database server 230 to provide information requested via the web client 212.
  • the web stack 210, IIS 220, and security server 112 may be implemented in one location or distributed across multiple locations.
  • FIG. 3 is an example of a graphical user interface (GUI) 300 for generating a layout 310 including interface components 320.
  • the layout 310 may be represented as a grid structure including a plurality of predefined positions.
  • the GUI 300 may allow the user to place an interface component 320 on the layout 310 at a desired location.
  • the user may resize the interface components 320. Accordingly, the user may arrange the interface components 320 to create a layout that allows security personnel to accomplish a task.
  • the GUI 300 may include buttons 330 indicating options for interface components.
  • a configuration button 332 may bring up an interface for configuring a selected interface component 320.
  • An events button 334 may provide an interface component for viewing events detected by one or more of the security devices 120. For instance, the interface component may be configured to filter a stream of detected events and present events matching configured criteria (e.g., employee arrivals).
  • a swipe and show button 336 may provide an interface component for monitoring information associated with an identification reader 126 such as scanned personnel identifiers, timestamps, and approve/deny decisions.
  • a personnel monitoring button 338 may provide an interface component that provides information about a person.
  • a device action button 340 may provide an interface component for controlling a security device 120.
  • a device action interface component may be configured to lock or unlock a door.
  • the device action button 340 may link to another layout or external source of information.
  • a system button 342 may provide an interface component for monitoring system information.
  • the system information may include summary statistics or performance of the security server 112.
  • a video monitoring button 344 may provide an interface component for monitoring one or more video feeds.
  • the interface component may be configured to provide a video feed from one or more specific cameras.
  • An alert button 346 may provide an interface component for generating an alert.
  • the interface component may allow the operator to manually trigger an alert or configure the alert based on monitored conditions.
  • the interface component may also provide configuration options to select parties or devices that receive the alert.
  • a data intelligence button 348 may provide an interface component for viewing data, for example, in the form of a card.
  • the interface component may be configurable to execute a query on the security server 112 and display the result on the card.
  • the GUI 300 may include a settings panel 350.
  • the setting panel 350 may provide text boxes or other input features for defining characteristics of an interface component.
  • the setting panel 350 may include a title box and a description box.
  • the setting panel 350 may include options for selecting a size of the interface component 320.
  • the size may be indicated as a number of predefined locations (e.g., 2 x 2) within the layout 310.
  • FIG. 4 an example of the GUI 300 including multiple interface components 320 in the layout 310.
  • the user interface components may be selected to perform a certain task.
  • An example use case may include identifying people in an area to determine whether there is a security risk.
  • the layout 310 may include a swipe and show interface component 410 that allows a user to see a record of users providing identification within the area.
  • the layout 310 may include a device action interface component 420 configured to remotely lock or unlock a door.
  • the layout 310 may include another device action button 430 that may be configured to, for example, trigger an alarm.
  • the layout 310 may include a video monitoring interface component 440 that may display a video feed for a particular camera. For example, the camera may be oriented toward the door controlled by the identification reader. Accordingly, a security guard may review video in the video monitoring interface component 440 to confirm that the person identified by the identification reader is present at the door and should be allowed to pass before unlocking the door via the action interface component 420.
  • the layout 310 may include a card interface component 450 that is configured to present particular information.
  • the card interface component 450 may be configured to present the result of a database query such as a number of people in an area, or a number of unlocked doors.
  • the interface component when an interface component is added to the layout 310 in the GUI 300, the interface component may include a configure button.
  • Each interface component may be associated with a separate configuration interface.
  • the configuration interface may allow the user to select the security device(s) 120 that provide information to the interface component or can be controlled via the interface component.
  • the configuration interface may also allow definition of a database query, for example, via a variable tracked by security server 112 or a formula defined by such variables.
  • FIG. 5 is an example of a web application user interface 500 based on the layout 310 of FIG. 4.
  • a swipe and show interface component 510 displays a record of users providing identification within the area.
  • the interface component 510 may allow a user to view a video of the identification event, unlock a related door, or change the status of the personnel associated with the event.
  • the device action interface component 520 allows the user to momentarily unlock a door.
  • the device action button 530 allows the user to trigger an emergency alert.
  • the video monitoring interface component 540 displays a video feed.
  • the card interface component 550 presents a number of unlocked doors.
  • an example computer device 640 may be used to implement the security server 112 or a node server 214 providing an interface to the security server 112.
  • the computer device 640 may include a central processing unit (CPU) 642 that executes instructions stored in memory 644.
  • the CPU 642 may execute an operating system 652 and one or more applications 654, which may include a web interface builder application 660.
  • the computer device 640 may include a storage device 646 for storing data (e.g., from security devices 120).
  • the computer device 640 may also include a network interface 648 for communication with external devices via a network. For example, the computer device 640 may communicate with the security devices 120.
  • the computer device 640 may include a display 650.
  • the display 650 may be, for example, a computer monitor and/or a touch-screen.
  • the display 650 may provide information to an operator and allow the operator to configure the computer device 640.
  • Memory 644 may be configured for storing data and/or computer-executable instructions defining and/or associated with an operating system 652 and/or application 654, and CPU 642 may execute operating system 652 and/or application 654.
  • Memory 644 may represent one or more hardware memory devices accessible to computer device 640.
  • memory 644 can include, but is not limited to, a type of memory usable by a computer, such as random access memory (RAM), read only memory (ROM), tapes, magnetic discs, optical discs, volatile memory, non-volatile memory, and any combination thereof.
  • RAM random access memory
  • ROM read only memory
  • Memory 644 may store local versions of applications being executed by CPU 642.
  • the memory 644 may include a storage device, which may be a non-volatile memory.
  • the CPU 642 may include one or more processors for executing instructions.
  • An example of CPU 642 can include, but is not limited to, any processor specially programmed as described herein, including a controller, microcontroller, application specific integrated circuit (ASIC), field programmable gate array (FPGA), system on chip (SoC), or other programmable logic or state machine.
  • the CPU 642 may include other processing components such as an arithmetic logic unit (ALU), registers, and a control unit.
  • the CPU 642 may include multiple cores and may be able to process different sets of instructions and/or data concurrently using the multiple cores to execute multiple threads.
  • the operating system 652 may include instructions (such as applications 654) stored in memory 644 and executable by the CPU 642.
  • the applications 654 may include a web interface builder application 660 configured to generate a web application user interface for a security system.
  • the web interface builder application 660 may include a layout component 662 configured to receive a selection of an interface component 320 and a location for the interface component on a layout 310 for the web application user interface 500 from a user via a graphic user interface 300.
  • the interface component 320 may be associated with one or more security devices 120 via a security server 112.
  • the web interface builder application 660 may include a configuration component 664 configured to receive, via the graphic user interface, a configuration of an action for the interface component with respect to the one or more security devices.
  • the web interface builder application 660 may include a display component 666 configured to display the interface component on the web application user interface.
  • the interface component may communicate with the one or more security devices via the security server in real time.
  • the web interface builder application 660 may include a control component 668 configured to receive input for the one or more security devices from the user via the web application user interface.
  • an example method 700 generates a web application user interface for a security system.
  • method 700 may be performed by the web interface builder application 660 on the computer device 640.
  • Optional blocks are shown with dashed lines.
  • the method 700 may include receiving a selection of an interface component and a location for the interface component on a layout for the web application user interface from a user via a graphic user interface, the interface component associated with one or more security devices via a security server.
  • the user may use the buttons 330
  • the method 700 may include receiving, via the graphic user interface, a configuration of an action for the interface component with respect to the one or more security devices. [0061] At block 730, the method 700 may include deploying the web application user interface to a client device.
  • the method 700 may include displaying the interface component on the web application user interface, wherein the interface component communicates with the one or more security devices via the security server in real time.
  • the method 700 may include receiving input for the one or more security devices from the user via the web application user interface.
  • computer device 640 may include processor 48 for carrying out processing functions associated with one or more of components and functions described herein.
  • processor 48 can include a single or multiple set of processors or multi-core processors.
  • processor 48 can be implemented as an integrated processing system and/or a distributed processing system.
  • processor 48 may include CPU 642.
  • computer device 640 may include memory 50 for storing instructions executable by the processor 48 for carrying out the functions described herein.
  • memory 50 may include memory 644.
  • the memory 50 may include instructions for executing the web interface builder application 660.
  • computer device 640 may include a communications component 52 that provides for establishing and maintaining communications with one or more parties utilizing hardware, software, and services as described herein.
  • Communications component 52 may carry communications between components on computer device 640, as well as between computer device 640 and external devices, such as devices located across a communications network and/or devices serially or locally connected to computer device 640.
  • communications component 52 may include one or more buses, and may further include transmit chain components and receive chain components associated with a transmitter and receiver, respectively, operable for interfacing with external devices.
  • computer device 640 may include a data store 54, which can be any suitable combination of hardware and/or software, that provides for mass storage of information, databases, and programs employed in connection with implementations described herein.
  • data store 54 may be a data repository for operating system 652 and/or applications 654.
  • the data store may include memory 644 and/or storage device 646.
  • Computer device 640 may also include a user interface component 56 operable to receive inputs from a user of computer device 640 and further operable to generate outputs for presentation to the user.
  • User interface component 56 may include one or more input devices, including but not limited to a keyboard, a number pad, a mouse, a touch-sensitive display, a digitizer, a navigation key, a function key, a microphone, a voice recognition component, any other mechanism capable of receiving an input from a user, or any combination thereof.
  • user interface component 56 may include one or more output devices, including but not limited to a display, a speaker, a haptic feedback mechanism, a printer, any other mechanism capable of presenting an output to a user, or any combination thereof.
  • user interface component 56 may transmit and/or receive messages corresponding to the operation of operating system 652 and/or applications 654.
  • processor 48 may execute operating system 652 and/or applications 654, and memory 50 or data store 54 may store them.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer.
  • an application running on a computer device and the computer device can be a component.
  • One or more components can reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers.
  • these components can execute from various computer readable media having various data structures stored thereon.
  • the components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets, such as data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems by way of the signal.
  • the term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from the context, the phrase “X employs A or B” is intended to mean any of the natural inclusive permutations. That is, the phrase “X employs A or B” is satisfied by any of the following instances: X employs A; X employs B; or X employs both A and B.
  • the articles “a” and “an” as used in this application and the appended claims should generally be construed to mean “one or more” unless specified otherwise or clear from the context to be directed to a singular form.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor may be a microprocessor, but, in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computer devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Additionally, at least one processor may comprise one or more components operable to perform one or more of the steps and/or actions described above.
  • a software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
  • An exemplary storage medium may be coupled to the processor, such that the processor can read information from, and write information to, the storage medium.
  • the storage medium may be integral to the processor.
  • the processor and the storage medium may reside in an ASIC. Additionally, the ASIC may reside in a user terminal.
  • processor and the storage medium may reside as discrete components in a user terminal. Additionally, in some implementations, the steps and/or actions of a method or procedure may reside as one or any combination or set of codes and/or instructions on a machine readable medium and/or computer readable medium, which may be incorporated into a computer program product.
  • the functions described may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored or transmitted as one or more instructions or code on a computer-readable medium.
  • Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and Blu-ray disc where disks usually reproduce data magnetically, while discs usually reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

Des exemples de l'invention concernent de manière générale un système de génération d'une interface utilisateur d'application Web pour un système de sécurité. Le système peut recevoir une sélection d'un composant d'interface et un emplacement pour le composant d'interface sur une disposition pour l'interface utilisateur d'application Web d'un utilisateur par l'intermédiaire d'une interface utilisateur graphique, le composant d'interface étant associé à un ou à plusieurs dispositifs de sécurité par l'intermédiaire d'un serveur de sécurité. Le système peut recevoir, par l'intermédiaire de l'interface utilisateur graphique, une configuration d'une action pour le composant d'interface par rapport au ou aux dispositifs de sécurité. Le système peut afficher le composant d'interface sur l'interface utilisateur d'application Web, le composant d'interface communiquant avec le ou les dispositifs de sécurité par l'intermédiaire du serveur de sécurité en temps réel. Le système peut recevoir une entrée pour le ou les dispositifs de sécurité de l'utilisateur par l'intermédiaire de l'interface utilisateur d'application Web.
PCT/US2023/015967 2022-03-22 2023-03-22 Agencement d'application web de sécurité WO2023183429A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US202263322516P 2022-03-22 2022-03-22
US63/322,516 2022-03-22
US18/187,363 2023-03-21
US18/187,363 US20230308362A1 (en) 2022-03-22 2023-03-21 Security web application layouts and tiles

Publications (1)

Publication Number Publication Date
WO2023183429A1 true WO2023183429A1 (fr) 2023-09-28

Family

ID=86185302

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2023/015967 WO2023183429A1 (fr) 2022-03-22 2023-03-22 Agencement d'application web de sécurité

Country Status (1)

Country Link
WO (1) WO2023183429A1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2527789A1 (fr) * 2004-11-23 2006-05-23 Leviton Manufacturing Co., Inc. Interface utilisateur graphique pour systeme domotique comprenant un serveur web integre
US20090307255A1 (en) * 2008-06-06 2009-12-10 Johnson Controls Technology Company Graphical management of building devices
US20100058248A1 (en) * 2008-08-29 2010-03-04 Johnson Controls Technology Company Graphical user interfaces for building management systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2527789A1 (fr) * 2004-11-23 2006-05-23 Leviton Manufacturing Co., Inc. Interface utilisateur graphique pour systeme domotique comprenant un serveur web integre
US20090307255A1 (en) * 2008-06-06 2009-12-10 Johnson Controls Technology Company Graphical management of building devices
US20100058248A1 (en) * 2008-08-29 2010-03-04 Johnson Controls Technology Company Graphical user interfaces for building management systems

Similar Documents

Publication Publication Date Title
US10565809B2 (en) Method, system and device for securing and managing access to a lock and providing surveillance
US20210081720A1 (en) Techniques for the automated customization and deployment of a machine learning application
US9760077B2 (en) Content management
US9984111B2 (en) Process metadata triggers and events
JP5789624B2 (ja) イベント管理用のシステムおよび方法
US20140280913A1 (en) Device and settings management platform
US20130085799A1 (en) Method and apparatus for improving business process management systems
US11394576B2 (en) Unified building management system
US9355193B2 (en) Object design data model
US9367057B2 (en) System and method for real-time controls of energy consuming devices including tiered architecture
EP2770428B1 (fr) Diagnostic de procédés d'exécution
US11231978B2 (en) API and streaming solution for documenting data lineage
US20170206474A1 (en) Computer-implemented system and methods for distribution, verification, and redemption of electronic tickets
JP2008152581A5 (fr)
JP2008152581A (ja) 顔認識システムのユーザインターフェース作成装置、ユーザインターフェース作成プログラムおよびそれを記録した記録媒体
CN108701176B (zh) 系统和凭证数据的授权时间流逝视图
US20110035697A1 (en) Autonomous display management of graphical interfaces
US20230308362A1 (en) Security web application layouts and tiles
WO2023183429A1 (fr) Agencement d'application web de sécurité
US20130304303A1 (en) Method and device for requirement capture for a system for centralized maintenance for aircraft
CN112862420B (zh) 管理系统
CN113867878A (zh) 一种工程部署方法及装置、电子设备、存储介质
CN116097244A (zh) 分析工作空间的物化
US20190122127A1 (en) System and method for specifying rules for operational systems
CN215932670U (zh) 一种设备统一管理工具

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23719517

Country of ref document: EP

Kind code of ref document: A1