会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • TIME-BASED MULTIVARIABLE SECURE FACILITY ALARM SYSTEM
    • 基于时间的多重安全设备报警系统
    • US20160104361A1
    • 2016-04-14
    • US14975455
    • 2015-12-18
    • Telmate, LLC
    • Richard TorgersrudChristopher DittoGrant Gongaware
    • G08B21/18
    • G08B21/18G06Q20/40G06Q20/405H04M15/86H04N7/141
    • An exemplary embodiment provides for a computer-implemented method that generates a time-based multivariable secure facility alarm. The method includes selecting a person for alert monitoring, alert monitor criteria pertaining to the person and alarm notification rules. When an occurrence that satisfies the alert monitor criteria are detected, an alarm notification, based upon the alarm notification rules, is generated. The method's alert monitor criteria include at least two events and a time period such that the alert monitor criteria is satisfied when the at least two events occur within the time period. Additionally, at least one event of the at least two events is a non-telephonic event.
    • 示例性实施例提供了一种计算机实现的方法,其生成基于时间的多变量安全设施报警。 该方法包括选择用于警报监视的人员,关于该人员的警报监视标准和警报通知规则。 当检测到满足警报监视准则的事件时,产生基于警报通知规则的警报通知。 方法的警报监视标准包括至少两个事件和时间段,使得当在该时间段内发生至少两个事件时,警报监视标准被满足。 另外,至少两个事件的至少一个事件是非电话事件。
    • 8. 发明授权
    • Individual location tracking in detention environments
    • 拘留环境中的个人位置跟踪
    • US08903060B2
    • 2014-12-02
    • US14279968
    • 2014-05-16
    • Telmate, LLC
    • Grant GongawareNick GarciaRichard TorgersrudKevin Krauss
    • H04M11/00H04M3/38
    • H04M3/38H04M3/382H04M3/42348
    • Methods for permitting a log in to a restricted access communications terminal are provided. In one aspect, a method includes receiving a request from a user to access a communications terminal, the request including a first authentication provided by the user, and verifying the first authentication provided by the user. The method also includes identifying the user based on the verified first authentication, determining, based on an actual location of the communications terminal, that the user is restricted from accessing the communications terminal, and requesting a second authentication from the user when the user is attempting to access the communications terminal from an unauthorized or undocumented location. The method further includes receiving the second authentication from the user, verifying the second authentication provided by the user, and providing access to the user to the communications terminal based on the verified second authentication. Systems, terminals, and machine-readable media are also provided.
    • 提供了允许登录到受限访问通信终端的方法。 一方面,一种方法包括从用户接收访问通信终端的请求,所述请求包括由用户提供的第一认证,以及验证由用户提供的第一认证。 该方法还包括基于验证的第一认证来识别用户,基于通信终端的实际位置确定用户被限制访问通信终端,并且在用户尝试时请求用户的第二认证 从未经授权或无证件的位置访问通信终端。 该方法还包括从用户接收第二认证,验证由用户提供的第二认证,以及基于经验证的第二认证向用户提供对通信终端的访问。 还提供了系统,终端和机器可读介质。