Interactive security control system with conflict checking
First Claim
1. In an interactive system for managing access via a:
- communications network by one or more users to multiple secured Locations comprising in combination;
a plurality of entry control Devices assigned for use in gaining access to said Locations by multiple users with multiple keys assigned in a hierarchy to said Locations;
a searchable database configured to store information on said keys and said entry control Devices, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices.
3 Assignments
0 Petitions
Accused Products
Abstract
An interactive system for managing access via a communications network by one or more users to multiple secured Locations. The system comprises a plurality of entry control Devices assigned for use in gaining access to the Locations by multiple users with multiple keys assigned in a hierarchy to the Locations, a searchable database configured to store information on said keys and said entry control Devices, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices.
-
Citations
8 Claims
-
1. In an interactive system for managing access via a:
- communications network by one or more users to multiple secured Locations comprising in combination;
a plurality of entry control Devices assigned for use in gaining access to said Locations by multiple users with multiple keys assigned in a hierarchy to said Locations;
a searchable database configured to store information on said keys and said entry control Devices, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices. - View Dependent Claims (2, 3)
- communications network by one or more users to multiple secured Locations comprising in combination;
-
4. In an interactive system for managing access via a communications network by one or more users to multiple secured Locations comprising in combination:
-
a searchable database configured to store information on a plurality of entry control Devices assigned for use in gaining access to said Locations by multiple users and/or multiple keys assigned in a hierarchy to said Locations and used to gain access to said Locations, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices.
-
-
5. A method for displaying a key hierarchy for multiple entry control Devices comprising:
-
providing at least one database having information stored on multiple keys and entry control Devices usable to gain access to multiple secured Locations; and
providing a function in the at least one database for enabling a user to search the at least one database and selectively display a hierarchy of the keys and their respectively assigned Locations and/or entry control Devices. - View Dependent Claims (6, 7)
-
-
8. A method for displaying a key hierarchy for multiple entry control Devices comprising:
-
searching at least one database having information stored on multiple keys and entry control Devices usable to gain access to multiple secured Locations; and
displaying a hierarchy of the keys and their respectively assigned Locations and/or entry control Devices.
-
Specification