(19)
(11)EP 2 779 119 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
01.07.2020 Bulletin 2020/27

(21)Application number: 14158688.3

(22)Date of filing:  10.03.2014
(51)International Patent Classification (IPC): 
G07C 9/00(2020.01)
G08B 25/14(2006.01)
G08B 27/00(2006.01)

(54)

Access control systems with variable threat level

Zugangssteuerungssystem mit variablem Bedrohungsniveau

Systèmes de contrôle d'accès avec un niveau de menace variable


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 15.03.2013 US 201313832288

(43)Date of publication of application:
17.09.2014 Bulletin 2014/38

(73)Proprietor: Honeywell International Inc.
Morris Plains, NJ 07950 (US)

(72)Inventors:
  • Manikandan, Raja
    Morristown, NJ 07692-2245 (US)
  • Balakrishnan, Sivakumar
    Morristown, NJ 07962-2245 (US)

(74)Representative: Houghton, Mark Phillip 
Patent Outsourcing Limited 1 King Street
Bakewell, Derbyshire DE45 1DZ
Bakewell, Derbyshire DE45 1DZ (GB)


(56)References cited: : 
EP-B1- 1 789 936
US-A1- 2008 320 552
US-A1- 2012 314 063
US-A1- 2007 192 867
US-A1- 2010 201 480
US-B1- 7 280 030
  
  • Stradbroke School: "LOCK DOWN (INVACUATION PROCEDURES)", , 31 December 2011 (2011-12-31), XP055415317, Retrieved from the Internet: URL:http://www.stradsch.sa.edu.au/images/p olicies/downloads/Emergency_Invacuation_Pr ocedures.pdf [retrieved on 2017-10-12]
  • Norman Thomas: "Electronic Access Control" In: "Electronic Access Control", 7 October 2011 (2011-10-07), Elsevier Science, XP055415139, ISBN: 978-0-12-382028-0 pages 39-41, * page 41, lines 9-11 *
  • P Us Department Of Homeland Security: "NTAS GUIDE National Terrorism Advisory System Public Guide April 2011 The National Terrorism Advisory System", , 1 April 2011 (2011-04-01), XP055525297, Retrieved from the Internet: URL:https://www.dhs.gov/xlibrary/assets/nt as/ntas-public-guide.pdf [retrieved on 2018-11-20]
  
Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


Description

FIELD



[0001] The field of the invention is related to security systems and more particularly to methods of controlling access to secured areas of the security systems.

BACKGROUND



[0002] Security systems are generally known. Such systems typically include one or more sensors of various types used to detect intruders into the secured area and/or one or more security cameras that detect intruders or other threats within the secured area.

[0003] US 2012/314063 A1 discloses a security system for physical facilities, including a security system interface configured to respond to a received threat level, and a computing module configured to determine whether the received threat level exceeds assigned threshold values to determine if physical security devices should be activated or communications systems disabled.

[0004] US 7 280 030 B1 discloses a system and method for automatically regulating access control levels in an access control system based on the threat level as determined by the Department of Homeland Security and/or their corresponding local offices.

[0005] In some cases (e.g., a home), access to the secured area may be limited to a small number of authorized persons (e.g., the homeowner and family).

[0006] In these cases, the security system may be armed when the homeowner leaves home and the security system may operate to signal an alarm to a central monitoring station upon the detection of any person (i.e., intruder) within that area.

[0007] In other cases (e.g., an office, factory, etc.), access may be limited a number of authorized persons. In this case, access to the secured area may be provided through one or more designated portals (e.g., doors) and where the opening of any other door may cause the security system to issue an alarm. Access through the designated portals may be controlled through use of a card reader connected to the security system. In this case, the card reader reads an access card carried by authorized users and grants access (unlocks a door) based upon a content of the card.

[0008] While existing security systems work well, they are limited in their capacity to protect authorized persons from unanticipated threats associated with the secured area. Accordingly, a need exists for better methods of protecting authorized persons within the secured area.

BRIEF DESCRIPTION OF THE DRAWING



[0009] FIG. 1 is a block diagram of a security system in accordance with an illustrated embodiment.

DETAILED DESCRIPTION OF AN ILLUSTRATED EMBODIMENT



[0010] The invention for which protection is sought is defined by independent claims 1 and 11. Advantageous aspects are defined by the dependent claims. Examples which do not fall within the scope of the appended claims are provided for illustrative purposes only and do not form part of the claimed invention.

[0011] FIG. 1 depicts a security system 10 shown generally in accordance with an illustrated embodiment. Included within the security system may be one or more sensors 12, 14 used to protect a secured area 16 from threats. The sensors 12, 14 may be limit switches placed on portals (e.g., doors, windows, etc.) 34 located along the periphery of the secured area and that allow entry to and egress from the secured area.

[0012] Alternatively, the sensors may be environmental sensors. In this case, the sensors may serve to detect fires or other hazards within the secured area.

[0013] Also included within the secured area may be one or more cameras 18, 20. The cameras may be used to detect security threats both within or along the periphery of the secured area.

[0014] The sensors and cameras may be coupled to a control panel 22. Upon activation of a sensor or detection of a threat by one of the cameras, the control panel may send an alarm to a central monitoring station 34. The central monitoring station may summon the police or other help.

[0015] Included within the control panel may be one or more processor apparatus (processors) 24, 26 operating under control of one or more computer programs 28, 30 loaded from a non-transitory computer readable medium (memory) 32. As used herein, reference to a step of a computer program is also a reference to the processor that executed that step of the program.

[0016] Associated with at least some of the doors 34 located along a periphery of the secured area may be a respective identity sensor (e.g., card reader) 36. In this case, an access processor may monitor the identity sensor for activation by an authorized person and activate a lock 38 to grant entrance into or egress from the secured area.

[0017] Under the illustrated embodiment, the system 10 includes provisions to respond to external threats. In this regard, the system may register itself to receive notices of alarms raised in the neighborhood of the secured area. This includes registering with websites that raise alarms based upon status of public safety organizations, registering with alarm stations that provide panic alarms of imminent public threat or government agencies that provide the locations of blacklisted people. In addition, options may be provided in registering for receipt of notices via TCP/IP or by the hardwiring of external devices. The alerts received will contain the type of alarm, the sensitivity and priority associated with the alarm, the source generating the alarm, the time at which the alarm was triggered and associated text data along with it. The types of alarms that the system may receive include neighborhood riots, natural calamities (e.g., rain, storm, etc.), neighborhood fire, and presence of a black listed person, sex offender or a terrorist in the neighborhood.

[0018] Based upon the notice or alert received and its severity, the system will decide upon the corresponding actions. These actions include opening/closing all doors in the system, securing the perimeter of the building to deny illegal entry into the building, selective opening/closing of certain doors in a floor or entity, sending out commands to other security devices installed in the premises. The actions may also include relaying a panic alarm to other external systems which are interested in such alarms via mass event notification systems.

[0019] The severity of the alarm determines the duration during which the security system modifies its operational state in response to the threat. The higher the severity of the alarm notice, the longer the operational state is modified.

[0020] Provisions are provided in the system to over-ride the threat level modification of the operational state, manually. In this regard, an authorized user may employ a user interface 40 to implement the modification of the operational state of the security system. The user interface may be included on the control panel or located remotely from the control panel.

[0021] The user interface may include a display 42. The display may be touch sensitive or the user interface may include a separate keyboard 44 through which the user may enter instructions.

[0022] In order to modify operation of the security system in response to the external threat, the user may activate a browser associated with the user interface to browse for and select one or more websites 52 of public safety organizations 46 through the Internet 48. The website may provide a list of public threats that is updated in real time based upon the detection and occurrence of those events. Each of those events posted to the list may include an identifier of the type of event, a time of the event and geographic indicia (e.g., GPS coordinates) of the location of the event.

[0023] The events may each also contain an indicator of the threat level of the event. The indication of the threat level may be based upon an objective indicator, such as the likelihood of the event or the potential for loss of life upon the occurrence of the event.

[0024] Alternatively, the threat level may be based upon other factors. For example, in the case of a sex offender, the threat level may be based upon a geographical distance of the domicile of the sex offender to the secured area. In the case of a natural gas leak, the threat level may be based upon the size of the leak and the geographical distance of the detected location of the gas leak to the secured area. Similarly if the threat is the detection of a pathogen (e.g., anthrax, small pox, etc.) released by a terrorist, the threat level may also be based upon a geographical distance of the detected location of the location of the discharge and/or probable location of the terrorist to the secured area.

[0025] A processor of the security system may also modify the threat level received as part of the notice or substitute its own threat level based upon distance. In this case, a threat processor may compare the geographic coordinates of the threat with the geographic coordinates of the secured area and adjust the threat level accordingly.

[0026] The user may elect to receive notices including the entire list and real time updates to the list or the user may select to receive real time notices of specific types of threats. As each notice is received, it may be saved in a file 54 that includes all events or the user may select a particular file 54, 56 for each type of event.

[0027] In addition to receiving notices from public safety organizations, the security system may include one or more wired connections to external sensors or data sources 50. The sensors may be maintained outside the periphery of the secured area and/or may be maintained by independent monitoring organizations. In each case, real time notices of threats are saved in files 54, 56.

[0028] The user may also save his/her own indicator of threat level for each type of notice in the file 54, 56 that is independent of the threat level assigned by the public safety organization. For example, if the secured area is a school or day care center, then the user may save a threat level that is very high for sex offenders. In this case, the threat level assigned by the user would be used in place of the threat level provided by the public safety organization.

[0029] One or more threat processors may retrieve the various threats saved in the files 54, 56 and modify operation of the security system accordingly. For example, in the case of a sex offender or terrorist, the processor may modify the access level for entry into the secured area in response to the notice by automatically activating one or more (or all) of the locks 38 to lock each of the doors providing entry into the secured area.

[0030] Alternatively, the threat processor may activate the locks 38 to open each of the doors 34 to allow easy access by police or rescue workers. This may be the case in the event of a gas leak or fire near a protected area that includes a school.

[0031] In addition, a notification processor operating in conjunction with the threat processor may automatically notify authorized occupants of the secured area of the type and scope of the threat. In this case, the notification processor may cause one or more audible or visual notices to be presented to the occupants through one or more speakers or visual displays within the secured area.

[0032] The scope of modification of operation of the security system and time of modification may be based upon the threat level provided by the user and/or public service organization. For example, in the event of a sex offender or terrorist directly outside the secured area, all doors may be immediately locked.

[0033] Similarly, the time of modification of the security system is based upon the scope of threat. The time during which the security system is modified is response to the threat may be based upon a number of different respective time values saved in the files 54, 56 where each time value is based upon a specific threat and threat level. Each time a new notice of a threat is received, the security system may be modified by the corresponding predetermined time associated with the threat and threat level. In the case, where the threat is a continuing situation, then the predetermined time may be extended or the processor that compares the accumulated time since notification of the threat with the predetermined time period may be reset the accumulating time each time a new notification of the threat is received.

[0034] In some cases, the authorized user may wish to modify or cancel the modification of the security system caused by the notification. For example, in the case of a school, the user may cancel the modification at the end of the school day when it becomes necessary to open the doors in order to allow the children to go home. The user may implement this change through a cancel button displayed on the user interface.

[0035] From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the scope hereof. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims.


Claims

1. A method comprising:

providing an access controller (10) that controls locking devices (38) on entry and egress portals (34) of a secured area (16);

the access controller registering with an external website (52) or information source to receive notices of alarms raised in a neighborhood of the secured area;

the access controller receiving a notice of an alarm raised in the neighborhood of the secured area based on the registering, the notice of the alarm comprising a threat level;

the access controller modifying the threat level based on a distance between a location of the secured area and a location of a threat in the notice of the alarm; and

the access controller automatically modifying an operational state of the access controller based on the modified threat level in response to receiving the notice of the alarm.


 
2. The method as in claim 1 wherein the alarms include a neighborhood riot, a presence of a blacklisted person, a presence of a sex offender, or a presence of a terrorist in the neighborhood of the secured area (16).
 
3. The method as in claim 2 further comprising:
modifying an access level for entry into the secured area in response to the notice of the alarm by automatically activating one or more locks of the locking devices to lock each door providing entry into the secured area.
 
4. The method as in claim 1 wherein the notice of the alarm includes a neighborhood fire in the neighborhood of the secured area (16).
 
5. The method as in claim 4 further comprising:
activating one or more locks of the locking devices to open each door providing entry into the secured area and allow easy access to the secured area by police or rescue workers.
 
6. The method as in claim 1 further comprising automatically issuing an audible or visual alert to authorized occupants of the secured area based upon the threat level of the notice.
 
7. The method as in claim 6 wherein the audible or visual alert includes an evacuation announcement.
 
8. The method as in claim 1 further comprising canceling the modification of the operational state of the access controller after a predetermined time period following receipt of the notice of the alarm.
 
9. The method as in claim 8 further comprising setting the predetermined time period based upon the threat level of the notice.
 
10. The method as in claim 1 further comprising canceling the modification to the operational state of the security system in response to receiving a selection of a cancel button by an authorized user.
 
11. An apparatus comprising:

an access controller (10) configured to control locking devices (38) on entry and egress portals (34) of a secured area (16);

an interface of the access controller configured to register the access controller to receive notices of alarms raised in a neighborhood of the secured area with an external website (52) or information source that provides information about public threats existing outside the secured area; and

a processor (24) of the access controller configured to:

receive a notice of an alarm raised in the neighborhood of the secured area based on the registration, the notice of alarm comprising a threat level;

modify the threat level based on a distance between a location of the secured area and a location of a threat in the notice of the alarm; and

modify an operational state of the access controller based on the modified threat level in response to receiving the notice of the alarm.


 
12. The apparatus as in claim 11 wherein the alarms include a neighborhood riot, a presence of a blacklisted person, a presence of a sex offender, or a presence of a terrorist in the neighborhood of the secured area (16).
 
13. The apparatus as in claim 12 wherein the processor is configured to modify an access level for entry into the secured in response to the notice of the alarm by automatically activating one or more locks of the locking devices to lock each door providing entry into the secured area.
 
14. The apparatus as in claim 11 wherein the notice of the alarm includes a neighborhood fire in the neighborhood of the secured area (16).
 
15. The apparatus as in claim 14 wherein the processor (24) is configured to activate one or more locks of the locking devices to open each door providing entry into the secured area and allow easy access to the secured area by police or rescue workers.
 
16. The method of claim 1, wherein the access controller is configured to determine a distance between the location of the secured area and the location of the threat in the notice of the alarm by comparing geographic coordinates of the threat with geographic coordinates of the secured area.
 


Ansprüche

1. Verfahren, das Folgendes umfasst:

Bereitstellen einer Zugangssteuerung (10), die Verriegelungsvorrichtungen (38) an Eingangs- und Ausgangsportalen (34) eines gesicherten Bereichs (16) steuert;

die Zugangssteuerung, die sich bei einer externen Website (52) oder einer Informationsquelle registriert, um Benachrichtigungen über Alarme zu empfangen, die in einer Nachbarschaft des gesicherten Bereichs ausgelöst werden;

die Zugangssteuerung empfängt eine Benachrichtigung über einen Alarm, der in der Nachbarschaft des gesicherten Bereichs basierend auf der Registrierung ausgelöst wird, wobei die Benachrichtigung über den Alarm ein Bedrohungsniveau umfasst;

die Zugangssteuerung ändert das Bedrohungsniveau basierend auf einer Entfernung zwischen einem Ort des gesicherten Bereichs und einem Ort einer Bedrohung in der Benachrichtigung über den Alarm; und

die Zugangssteuerung ändert automatisch einen Betriebszustand der Zugangsssteuerung basierend auf dem geänderten Bedrohungsniveau als Reaktion auf den Empfang der Benachrichtigung über den Alarm.


 
2. Verfahren nach Anspruch 1, wobei die Alarme einen Aufstand in der Nachbarschaft, die Anwesenheit einer auf der schwarzen Liste stehenden Person, die Anwesenheit eines Sexualstraftäters oder die Anwesenheit eines Terroristen in der Nachbarschaft des gesicherten Bereichs (16) einschließen.
 
3. Verfahren nach Anspruch 2, ferner umfassend:
Ändern eines Zugangsniveaus für den Eintritt in den gesicherten Bereich als Reaktion auf die Benachrichtigung über den Alarm durch automatisches Aktivieren eines oder mehrerer Schlösser der Verriegelungsvorrichtungen, um jede Tür zu verriegeln, die den Eintritt in den gesicherten Bereich bereitstellt.
 
4. Verfahren nach Anspruch 1, wobei die Benachrichtigung über den Alarm einen Nachbarschaftsbrand in der Nachbarschaft des gesicherten Bereichs (16) einschließt.
 
5. Verfahren nach Anspruch 4, ferner umfassend:
Aktivieren eines oder mehrerer Schlösser der Verriegelungsvorrichtungen, um jede Tür zu öffnen, die den Eintritt in den gesicherten Bereich bereitstellt, und um Polizei oder Rettungskräften einen einfachen Zugang zum gesicherten Bereich zu ermöglichen.
 
6. Verfahren nach Anspruch 1, ferner umfassend das automatische Ausgeben eines akustischen oder visuellen Alarms an autorisierte Nutzer des gesicherten Bereichs basierend auf dem Bedrohungsniveau der Benachrichtigung.
 
7. Verfahren nach Anspruch 6, wobei der akustische oder visuelle Alarm eine Evakuierungsansage einschließt.
 
8. Verfahren nach Anspruch 1, ferner umfassend das Aufheben der Änderung des Betriebszustands der Zugangssteuerung nach einer vorbestimmten Zeitspanne nach Empfang der Benachrichtigung über den Alarm.
 
9. Verfahren nach Anspruch 8, ferner umfassend das Einstellen des vorbestimmten Zeitraums basierend auf dem Bedrohungsniveau der Benachrichtigung.
 
10. Verfahren nach Anspruch 1, ferner umfassend das Aufheben der Änderung des Betriebszustands des Sicherheitssystems als Reaktion auf das Empfangen einer Auswahl einer Abbruchtaste von einem autorisierten Benutzer.
 
11. Vorrichtung, die Folgendes umfasst:

eine Zugangssteuerung (10), die konfiguriert ist, um Verriegelungsvorrichtungen (38) an Eingangs- und Ausgangsportalen (34) eines gesicherten Bereichs (16) zu steuern;

eine Schnittstelle der Zugangssteuerung, die konfiguriert ist, um die Zugangssteuerung zu registrieren, um Benachrichtigungen über Alarme zu empfangen, die in einer Nachbarschaft des gesicherten Bereichs mit einer externen Website (52) oder einer Informationsquelle ausgelöst werden, die Informationen über öffentliche Bedrohungen bereitstellt, die außerhalb des gesicherten Bereichs existieren; und

einen Prozessor (24) der Zugangssteuerung, konfiguriert zum:

Empfangen einer Benachrichtigung über einen Alarm, der in der Nachbarschaft des gesicherten Bereichs basierend auf der Registrierung ausgelöst wird, wobei die Benachrichtigung über den Alarm ein Bedrohungsniveau umfasst;

Ändern des Bedrohungsniveaus basierend auf einer Entfernung zwischen einem Ort des gesicherten Bereichs und einem Ort einer Bedrohung in der Benachrichtigung über den Alarm; und

Ändern eines Betriebszustands der Zugangsssteuerung basierend auf dem geänderten Bedrohungsniveau als Reaktion auf den Empfang der Benachrichtigung über den Alarm.


 
12. Vorrichtung nach Anspruch 11, wobei die Alarme einen Aufstand in der Nachbarschaft, die Anwesenheit einer auf der schwarzen Liste stehenden Person, die Anwesenheit eines Sexualstraftäters oder die Anwesenheit eines Terroristen in der Nachbarschaft des gesicherten Bereichs (16) einschließen.
 
13. Vorrichtung nach Anspruch 12, wobei der Prozessor konfiguriert ist, um ein Zugangsniveau für den Eintritt in den gesicherten Bereich als Reaktion auf die Benachrichtigung über den Alarm durch automatisches Aktivieren eines oder mehrerer Schlösser der Verriegelungsvorrichtungen zu ändern, um jede Tür zu verriegeln, die den Eintritt in den gesicherten Bereich bereitstellt.
 
14. Vorrichtung nach Anspruch 11, wobei die Benachrichtigung über den Alarm einen Nachbarschaftsbrand in der Nachbarschaft des gesicherten Bereichs (16) einschließt.
 
15. Vorrichtung nach Anspruch 14, wobei der Prozessor (24) konfiguriert ist, um eines oder mehrere Schlösser der Verriegelungsvorrichtungen zu aktivieren, um jede Tür zu öffnen, die den Eintritt in den gesicherten Bereich bereitstellt, und um Polizei oder Rettungskräften einen einfachen Zugang zum gesicherten Bereich zu ermöglichen.
 
16. Verfahren nach Anspruch 1, wobei die Zugangssteuerung konfiguriert ist, um eine Entfernung zwischen einem Ort des gesicherten Bereichs und einem Ort einer Bedrohung in der Benachrichtigung über den Alarm zu bestimmen, indem geografische Koordinaten der Bedrohung mit geografischen Koordinaten des gesicherten Bereichs verglichen werden.
 


Revendications

1. Procédé comprenant :

la fourniture d'un contrôleur d'accès (10) qui contrôle des dispositifs de verrouillage (38) sur des portails d'entrée et de sortie (34) d'une zone sécurisée (16) ;

le contrôleur d'accès s'enregistrant auprès d'un site Web externe (52) ou une source d'informations pour recevoir des notifications d'alarmes déclenchées dans un quartier de la zone sécurisée ;

le contrôleur d'accès recevant une notification d'une alarme déclenchée dans le quartier de la zone sécurisée en fonction de l'enregistrement, la notification de l'alarme comprenant un niveau de menace ;

le contrôleur d'accès modifiant le niveau de menace en fonction d'une distance entre un emplacement de la zone sécurisée et un emplacement d'une menace dans la notification de l'alarme ; et

le contrôleur d'accès modifiant automatiquement un état opérationnel du contrôleur d'accès en fonction du niveau de menace modifié en réponse à la réception de la notification de l'alarme.


 
2. Procédé selon la revendication 1, dans lequel les alarmes comprennent une émeute de quartier, la présence d'une personne sur liste noire, la présence d'un délinquant sexuel ou la présence d'un terroriste dans le quartier de la zone sécurisée (16).
 
3. Procédé selon la revendication 2, comprenant en outre :
la modification d'un niveau d'accès pour l'entrée dans la zone sécurisée en réponse à la notification de l'alarme en activant automatiquement une ou plusieurs serrures des dispositifs de verrouillage pour verrouiller chaque porte permettant l'entrée dans la zone sécurisée.
 
4. Procédé selon la revendication 1, dans lequel la notification de l'alarme comprend un incendie de quartier dans le quartier de la zone sécurisée (16).
 
5. Procédé selon la revendication 4, comprenant en outre :
l'activation d'une ou plusieurs serrures des dispositifs de verrouillage pour ouvrir chaque porte permettant l'entrée dans la zone sécurisée et permettre un accès facile à la zone sécurisée par les policiers ou les secouristes.
 
6. Procédé selon la revendication 1, comprenant en outre l'émission automatique d'une alerte audible ou visuelle aux occupants autorisés de la zone sécurisée en fonction du niveau de menace de la notification.
 
7. Procédé selon la revendication 6, dans lequel l'alerte audible ou visuelle comprend une annonce d'évacuation.
 
8. Procédé selon la revendication 1, comprenant en outre l'annulation de la modification de l'état opérationnel du contrôleur d'accès après une période de temps prédéterminée suivant la réception de la notification de l'alarme.
 
9. Procédé selon la revendication 8, comprenant en outre le réglage de la période de temps prédéterminée en fonction du niveau de menace de la notification.
 
10. Procédé selon la revendication 1, comprenant en outre l'annulation de la modification de l'état opérationnel du système de sécurité en réponse à la réception d'une sélection d'un bouton d'annulation par un utilisateur autorisé.
 
11. Appareil comprenant :

un contrôleur d'accès (10) configuré pour contrôler des dispositifs de verrouillage (38) sur des portails d'entrée et de sortie (34) d'une zone sécurisée (16) ;

une interface du contrôleur d'accès configurée pour enregistrer le contrôleur d'accès pour recevoir des notifications d'alarmes déclenchées dans un quartier de la zone sécurisée auprès d'un site Web externe (52) ou une source d'informations qui fournit des informations sur les menaces publiques existant en dehors de la zone sécurisée ; et

un processeur (24) du contrôleur d'accès configuré pour :

recevoir une notification d'une alarme déclenchée dans le quartier de la zone sécurisée en fonction de l'enregistrement, la notification d'alarme comportant un niveau de menace ;

modifier le niveau de menace en fonction d'une distance entre un emplacement de la zone sécurisée et un emplacement d'une menace dans la notification de l'alarme ; et

modifier un état opérationnel du contrôleur d'accès en fonction du niveau de menace modifié en réponse à la réception de la notification de l'alarme.


 
12. Appareil selon la revendication 11, dans lequel les alarmes comprennent une émeute de quartier, la présence d'une personne sur liste noire, la présence d'un délinquant sexuel ou la présence d'un terroriste dans le quartier de la zone sécurisée (16).
 
13. Appareil selon la revendication 12, dans lequel le processeur est configuré pour modifier un niveau d'accès pour entrer dans la zone sécurisée en réponse à la notification de l'alarme en activant automatiquement une ou plusieurs serrures des dispositifs de verrouillage pour verrouiller chaque porte permettant l'entrée dans la zone sécurisée.
 
14. Appareil selon la revendication 11, dans lequel la notification de l'alarme comprend un incendie de quartier dans le quartier de la zone sécurisée (16).
 
15. Appareil selon la revendication 14, dans lequel le processeur (24) est configuré pour activer une ou plusieurs serrures des dispositifs de verrouillage pour ouvrir chaque porte permettant l'entrée dans la zone sécurisée et permettre un accès facile à la zone sécurisée par les policiers ou les secouristes.
 
16. Procédé selon la revendication 1, dans lequel le contrôleur d'accès est configuré pour déterminer une distance entre l'emplacement de la zone sécurisée et l'emplacement de la menace dans la notification de l'alarme en comparant les coordonnées géographiques de la menace avec les coordonnées géographiques de la zone sécurisée.
 




Drawing








Cited references

REFERENCES CITED IN THE DESCRIPTION



This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

Patent documents cited in the description