Security method for verifying and tracking service personnel
First Claim
1. A method for the security screening of service personnel, comprising;
- The hiring of an identity verification company by client company to conduct identification verification of a specified vendor company, wherein;
said identity verification company obtains all pertinent information required to conduct a verification of said vendor company;
a determination by said identity verification company of the requirement for a background check of said vendor company is required for the verification process, based on the review of said information;
wherein said identity verification company obtains all pertinent vendor employee information from said vendor company; and
, an employee tracking database is created, based on the information thus obtained by said identity verification company.
0 Assignments
0 Petitions
Accused Products
Abstract
It is the principal object of the present invention to provide an improved identification method, which will facilitate the rapid and accurate identification of individuals. In addition, this allows sensitive locations to record and track service personnel that enter any secured area. The method incorporates the use of a identity verification company to store all vendor employee information for identification purposes. The identification required includes an identification card distributed by the identity verification company, a biometric scan, which can include a hand scan, retinal scan, voice recognition device or handwriting sample, and digitized picture identification.
-
Citations
38 Claims
-
1. A method for the security screening of service personnel, comprising;
-
The hiring of an identity verification company by client company to conduct identification verification of a specified vendor company, wherein;
said identity verification company obtains all pertinent information required to conduct a verification of said vendor company;
a determination by said identity verification company of the requirement for a background check of said vendor company is required for the verification process, based on the review of said information;
wherein said identity verification company obtains all pertinent vendor employee information from said vendor company; and
,an employee tracking database is created, based on the information thus obtained by said identity verification company. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for the security screening of service personnel, comprising;
-
Completion of enrollment by all vendor company personnel into the identity verification company'"'"'s employee tracking database;
A determination by an identity verification company of whether a background check of said vendor company employee is required in order to grant an identification card;
The recordation of said vendor employee'"'"'s identification information into said employee tracking database by said identity verification company; and
,The querying of said identity verification Company'"'"'s employee tracking database to a specified client company via a network connection. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for the security screening of an independent service provider, comprising;
-
the obtaining of all pertinent information required by a specified identity verification company to conduct a verification of said independent service provider;
the submission of a hand scan by said independent service provider for identification purposes with said identity verification company;
the processing of said information by conducting a background check on said independent service provider;
the recordation of said information into an employee tracking database by said identity verification company; and
the querying of said identity verification company'"'"'s employee tracking database to a specified client company via a network connection. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A method for the security screening of service personnel, comprising;
-
The entry of vendor employee or independent service provider into a secured building of the client company;
The request by the client company that said vendor employee or independent service provider produce proper identification to enter said secured building. Confirmation by said client company that said vendor employee or said independent service provider identity is verified. Input any information to be databased and grant access to said secured building. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification