Automated system and method for gaining access to restricted or controlled areas
First Claim
1. A computer based method for effecting the entry of an individual into a restricted or controlled area, comprising the steps of:
- (a) entering a signature on a receiving medium;
(b) receiving the signature into a computer system;
(c) querying the individual to enter a client identification number on the receiving medium;
(d) receiving the client identification number into the computer system;
(e) querying the individual to verify their identity from a list of at least one client name that corresponds to the entered client identification number;
(f) selecting a client name from the list of at least one client name that corresponds to the entered client identification number;
(g) receiving the client name into the computer system;
(h) querying the individual to enter information on the receiving medium relating to accessing the restricted or controlled area;
(i) receiving the information entered into the computer system;
(j) storing the signature, client name, and information into the computer system; and
(k) providing the individual with a greeting displayed in the receiving medium.
1 Assignment
0 Petitions
Accused Products
Abstract
An automated method and system for gaining access to restricted or controlled areas. The system allows individuals to sign-in and request access to the facility or building that is restricted or controlled. The system will proceed through a series of prompts that require inputted information from the individual. The information will be processed and, if acceptable, the individual will be permitted to gain access to the restricted or controlled area. The system also allows the administrator to manage and oversee the administration of the system and individuals and prepare detailed reports based upon certain criteria. In particular, the system maintains the confidentiality of the individuals seeking access to the restricted or controlled area from the other individuals who are seeking the same access.
19 Citations
28 Claims
-
1. A computer based method for effecting the entry of an individual into a restricted or controlled area, comprising the steps of:
-
(a) entering a signature on a receiving medium;
(b) receiving the signature into a computer system;
(c) querying the individual to enter a client identification number on the receiving medium;
(d) receiving the client identification number into the computer system;
(e) querying the individual to verify their identity from a list of at least one client name that corresponds to the entered client identification number;
(f) selecting a client name from the list of at least one client name that corresponds to the entered client identification number;
(g) receiving the client name into the computer system;
(h) querying the individual to enter information on the receiving medium relating to accessing the restricted or controlled area;
(i) receiving the information entered into the computer system;
(j) storing the signature, client name, and information into the computer system; and
(k) providing the individual with a greeting displayed in the receiving medium. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 16)
-
-
13. A computer based method for effecting the entry of an individual into a restricted or controlled area, comprising the steps of:
-
(a) entering a signature on an electronic tablet;
(b) receiving the signature into a computer system;
(c) querying the individual to enter a client identification number on the electronic tablet;
(d) receiving the client identification number into the computer system;
(e) querying the individual to verify a client name which matches the individual;
(f) selecting the client name from a list of at least one client name that corresponds to the entered client identification number; and
(g) providing the individual with a greeting displayed in the electronic tablet. - View Dependent Claims (14, 15, 17)
-
-
18. A computer based method for effecting the entry of an individual into a restricted or controlled area, comprising the steps of:
-
(a) requesting the individual to enter a signature in a receiving medium;
(b) entering the signature on the receiving medium;
(c) receiving the signature in a computer system;
(d) requesting the individual to enter information in the receiving medium relating to accessing the restricted or controlled area;
(e) receiving the information entered into computer system;
(f) providing the individual with a greeting displayed in the receiving medium. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A computer based method for effecting the entry of an individual into a restricted or controlled area, comprising the steps of:
-
querying the individual to enter a signature in a electronic tablet;
entering the signature on the electronic tablet;
receiving the signature in a computer system;
querying the individual to enter a client identification number in the electronic tablet;
receiving the client identification number entered in the computer system;
if the individual verifies their identity by selecting a client name from a list of at least one client name that corresponds to the entered client identification number, then performing the following steps (a)-(d);
(a) querying the individual to enter information relating to accessing the restricted or controlled area in the electronic tablet;
(b) receiving the information in the computer system;
(c) storing the signature, client name, and information in the computer system;
(d) providing the individual with a greeting displayed in the electronic tablet; and
if the individual'"'"'s identity cannot be identified by the individual selecting a client name from the list of at least one client name that corresponds to the entered client identification number because their name is not among the at least one client name, then performing the following steps (e)-(j);
(e) querying the individual to re-enter the client identification number in the electronic tablet;
(f) receiving the client identification number in the computer system;
(g) querying the individual to enter information relating to their request to access the restricted or controlled area in the electronic tablet;
(h) receiving the information in the computer system;
(i) storing the signature, client name, and information in the computer system;
(j) providing the individual with a greeting displayed in the electronic tablet.
-
-
26. The method according to claim 26 and the further comprising the step of, if the individual is unable to again verify their identity by selecting a client name from the list of at least one client name that corresponds to the entered client identification number because their name is not among the at least one client name, then performing the following step (k):
(k) requesting the individual to see an administrator.
-
27. A computer program product comprising a computer storage medium having a computer program code mechanism embedded in the computer storage medium for use with a receiving medium for allowing an individual to gain access to a restricted or controlled area, the computer program code mechanism comprising:
-
a first computer code device configured to query the individual to enter a signature in a receiving medium;
a second computer code device configured to receive the signature entered into the receiving medium;
a third computer code device configured to query the individual to enter a client identification number in the receiving medium;
a fourth computer code device configured to receive the client identification number entered into the receiving medium;
a fifth computer code device configured to query the individual to verify their identity a client name from a list of at least one client name that corresponds to the entered client identification number;
a sixth computer code configured to receive the client name, a seventh computer code device configured to query the individual to enter information relating to accessing the restricted or controlled area in the receiving medium;
a eighth computer code device configured to receive the information entered into the receiving medium;
a ninth computer code device configured to store the signature, client name, and information into the computer system; and
a tenth computer code device configured to provide the individual with a greeting displayed in the receiving medium.
-
-
28. A system for effecting the entry of an individual into a restricted or controlled area, comprising:
-
means for requesting the individual to enter a signature in an electronic tablet;
means for receiving the signature entered into a computer system;
means for requesting the individual to enter a client identification number in the electronic tablet;
means for receiving the client identification number into the computer system;
means for requesting the individual to verify their identity by selecting a client name from a list of at least one client name that corresponds to the entered client identification number, means for requesting the individual to enter information relating to accessing the restricted or controlled area in the electronic tablet;
means for receiving the information into the computer system;
means for storing the signature, client name, and information into the computer system; and
means for providing the individual with a greeting displayed in the electronic tablet.
-
Specification