INTERACTIVE SECURITY CONTROL SYSTEM WITH AUDIT CAPABILITIES
First Claim
Patent Images
1. A method for computerized generation of an audit report with data:
- associated with controlling physical entry to at least one of a plurality of secured Locations via an entry control device, the method comprising;
providing at least one database having stored data associated with the Location, providing a function for enabling the stored data in said database to be searched, providing a function for selectively displaying a set of display data based on the stored data, and providing a function for comparing the set of display data to actual data found at the Location.
1 Assignment
0 Petitions
Accused Products
Abstract
Computerized methods and systems for auditing data associated with controlling physical entry to at least one of a plurality of secured Locations via an entry control device. The method may comprise providing at least one database having stored data associated with the Location, providing a function for enabling the stored data in the database to be searched, providing a function for selectively displaying a set of display data based on the stored data, and providing a function for comparing the set of display data to actual data found at the Location.
40 Citations
17 Claims
-
1. A method for computerized generation of an audit report with data:
- associated with controlling physical entry to at least one of a plurality of secured Locations via an entry control device, the method comprising;
providing at least one database having stored data associated with the Location, providing a function for enabling the stored data in said database to be searched, providing a function for selectively displaying a set of display data based on the stored data, and providing a function for comparing the set of display data to actual data found at the Location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- associated with controlling physical entry to at least one of a plurality of secured Locations via an entry control device, the method comprising;
-
9. A method of providing a computerized auditing procedure for auditing a database having stored data associated with a physical security system of a secured Location, said Location having at least one entry control device for use in gaining physical entry thereto, the method comprising:
-
providing a function for using a phone to input data obtained at the Location and associated with the physical security system, providing a function for enabling the stored data in said database to be searched, and providing a function for comparing the inputted data to the stored and searched data. - View Dependent Claims (10)
-
-
11. A method for computerized generation of an audit report with data associated with at least one of an entry control device or an access device operable therewith for use in gaining physical entry to at least one of a plurality of secured Locations, the method comprising:
-
providing at least one database having stored data associated with at least one of the entry control device or the access device, providing a function for enabling the stored data in said database to be searched, providing a function for selectively displaying a set of display data based on the stored data, and providing a function for comparing the set of display data to actual data associated with the entry control and/or access devices found at the Location. - View Dependent Claims (12, 13, 14)
-
-
15. An interactive system for security management, the system accessible via a communications network by a plurality of DB-Users and adapted to manage a security system associated with places physically protected by corresponding security components used to control physical entry to the places, the system comprising:
-
at least one searchable database having stored data associated with securing the places via the security components, and Software configured to allow a DB-User to search the stored data in said database and to display a set of data based on the stored data, and further configured to allow the DB-User to compare the displayed data to actual data obtained at one of the places.
-
-
16. An interactive system for security management, the system accessible via a communications network by a plurality of DB-Users and adapted to manage a security system associated with places physically protected by corresponding security components used to control physical entry to the places, the system comprising:
-
at lease one searchable database having stored data associated with the security components, and Software configured to
1) allow a DB-User to transmit actual data associated with the security components inputted from a phone,
2) search the stored data in said database in response to the inputted actual data, and
3) compare the inputted actual data to the stored and searched data. - View Dependent Claims (17)
-
Specification