×

Interactive key control system and method of managing access to secured locations

  • US 7,653,945 B2
  • Filed: 02/22/2006
  • Issued: 01/26/2010
  • Est. Priority Date: 08/10/2000
  • Status: Active Grant
First Claim
Patent Images

1. An interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, the system comprising in combination:

  • at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database; and

    at least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to;

    authenticate each Database User attempting to connect to the Software over the Internet through a web site by receiving a password from such Database User and comparing the received password to a password stored in the at least one searchable database;

    interactively communicate a plurality of screens to an authenticated Database User over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by such authenticated Database User, wherein the Software is configured to communicate screens with hotlinks associated with security management operations for which the authenticated Database User is authorized such that the screens communicated to the authenticated Database User do not include any hotlinks associated with security management operations for which the authenticated Database User is not authorized; and

    in response to input from the authenticated Database User and directed to a selected hotlink on one of the plurality of screens, performing the security management operation associated with the selected hotlink.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×