ON-LINE SECURITY MANAGEMENT SYSTEM
First Claim
1. A security management system comprising a server on the Internet, the server being programmed for maintaining a database including a call list for a site in response to user access over the Internet, the server being programmed for accessing the call list in order to send a notification of an abnormal condition at the site to a recipient on the call list.
1 Assignment
0 Petitions
Accused Products
Abstract
The Internet provides communication between a server and security officers, supervisors, client representatives, and a security system computer at a client site. On-line access to the server provides integration and management of security system functions such as maintenance of call lists and reports, shift management, and supervision of security officers. The use of the Internet for communication between the server and the client site computer not only provides faster and more reliable communication but also enables the client site computer to request the server to schedule a contingent future event including a need to service a call list unless the client site computer reports a condition warranting the removal of the contingent event from the schedule. For example, the failure of a security officer to visit a check point at a scheduled time results in the server accessing a call list to notify a designated recipient.
9 Citations
29 Claims
- 1. A security management system comprising a server on the Internet, the server being programmed for maintaining a database including a call list for a site in response to user access over the Internet, the server being programmed for accessing the call list in order to send a notification of an abnormal condition at the site to a recipient on the call list.
-
13. A security management system comprising a server on the Internet;
-
the server being programmed for maintaining data about security officers, supervisors of the security officers, and clients having sites to be monitored;
the server being programmed for access by operation of an Internet browser program by the security officers, supervisors of the security officers, and representatives of the clients;
the server being programmed for setting up respective call lists of recipients and methods for notifying the recipients of abnormal conditions at the sites, and for scheduling security officer shifts at the respective sites, managing use of keys at the respective sites, and managing access of visitors to the respective sites. - View Dependent Claims (14, 15, 16)
-
-
17. A method of managing security at a site, the site including a security system computer linked via the Internet to a server, the server being accessible over the Internet by a user operating an Internet browser program, said method comprising:
the user accessing the server using the Internet browser program to set up a call list for the site, the security system computer sending messages over the Internet to the server to report normal conditions at the site to the server at scheduled times, and upon failing to receive a message reporting a normal condition at the site at a scheduled time, the server accessing the call list in order to send a notification to a recipient on the call list. - View Dependent Claims (18, 19, 20, 21)
-
22. A computer-implemented method of managing security at a site, the method comprising:
-
scheduling a security officer to visit check points at the site;
setting up a call list including at least one recipient to be notified in the event of the security officer failing to visit at least one of the check points at a scheduled time; and
upon detecting a failure of the security officer to visit said at least one of the check points at the scheduled time, accessing the call list to notify said at least one recipient. - View Dependent Claims (23, 24, 25)
-
-
26. A computer-implemented method of managing security at a site, the method comprising:
-
scheduling a security officer to visit the site;
setting up a call list including at least one recipient to be notified upon detecting a failure of the security officer to follow a designated path at the site; and
upon detecting a failure of the security officer to follow the designated path at the site, accessing the call list to notify said at least one recipient. - View Dependent Claims (27, 28, 29)
-
Specification