Interactive key control system and method of managing access to secured locations
First Claim
1. An interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, the system comprising in combination:
- at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database; and
at least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to;
authenticate each Database User attempting to connect to the Software over the Internet through a web site by receiving a password from such Database User and comparing the received password to a password stored in the at least one searchable database;
interactively communicate a plurality of screens to an authenticated Database User over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by such authenticated Database User, wherein the Software is configured to communicate screens with hotlinks associated with security management operations for which the authenticated Database User is authorized such that the screens communicated to the authenticated Database User do not include any hotlinks associated with security management operations for which the authenticated Database User is not authorized; and
in response to input from the authenticated Database User and directed to a selected hotlink on one of the plurality of screens, performing the security management operation associated with the selected hotlink.
0 Assignments
0 Petitions
Accused Products
Abstract
An interactive method and system for managing access to one or more secured locations by one of more users via a global communication network which comprises software made up of a plurality of databases, each of the databases requiring a different level of access to the secured locations as well as being able to perform one or more functions at each different level of access, and a key or other entry control device is assigned to each user for use in gaining access to one or more of the locations at a predetermined level of access assigned to hat user, the system as described being capable of being added to, deleted in whole or in part, or modified, and the databases are capable of maintaining the status of the entry control devices, locations and users in a real time mode for instantaneous access, maintenance and control anywhere in the world.
77 Citations
15 Claims
-
1. An interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, the system comprising in combination:
-
at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database; and at least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to; authenticate each Database User attempting to connect to the Software over the Internet through a web site by receiving a password from such Database User and comparing the received password to a password stored in the at least one searchable database; interactively communicate a plurality of screens to an authenticated Database User over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by such authenticated Database User, wherein the Software is configured to communicate screens with hotlinks associated with security management operations for which the authenticated Database User is authorized such that the screens communicated to the authenticated Database User do not include any hotlinks associated with security management operations for which the authenticated Database User is not authorized; and in response to input from the authenticated Database User and directed to a selected hotlink on one of the plurality of screens, performing the security management operation associated with the selected hotlink. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of managing Database Users in an interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, wherein the interactive system includes at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, and wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database, the method comprising:
-
authenticating a first Database User attempting to connect to the interactive system over the Internet by receiving a password from the first Database User and comparing the received password to a password stored in the at least one searchable database; after authenticating the first Database User, interactively communicating a plurality of screens to the first Database User over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by the first Database User; and in response to input from the first Database User directed to a selected hotlink on one of the plurality of screens, controlling authorization of a second Database User to a plurality of security management operations by receiving input from the first Database User to configure at least one screen accessible by the second Database User such that such configured screen includes at least one hotlink associated with a security management operation for which the second Database User is authorized and omits any hotlinks associated with security management operations for which the second Database User is not authorized. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. An interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, the system comprising in combination:
-
at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is configured to store an association between a first place, a first security mechanism and a first security mechanism user to indicate that the first security mechanism is in the possession of the first security mechanism user and is used to access the first place, and wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database; and at least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to; authenticate each Database User attempting to connect to the Software over the Internet through a web site by receiving a password from such Database User and comparing the received password to a password stored in the at least one searchable database; interactively communicate a plurality of screens to an authenticated Database User over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by such authenticated Database User; for a first Database User authorized to access information associated with the first security mechanism, and based upon an authorization for the first Database User as stored in the at least one searchable database, display the information associated with the first security mechanism to the first Database User, allow the first Database User to access information associated with the first place in association with displaying the information associated with the first security mechanism, and prohibit the first Database User from accessing information associated with the first security mechanism user; and for a second Database User authorized to access information associated with the first security mechanism, and based upon an authorization for the second Database User as stored in the at least one searchable database, display the information associated with the first security mechanism to the second Database User, allow the second Database User to access information associated with the first security mechanism user in association with displaying the information associated with the first security mechanism, and prohibit the second Database User from accessing information associated with the first place.
-
-
15. A method of ordering a physical key in an interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding physical keys used to gain physical entry to the places by security mechanism users, wherein the plurality of places are distributed among a plurality of geographic locations, wherein the interactive system includes at least one searchable database configured to store information on a plurality of places, a plurality of physical keys, a plurality of physical key blanks and a plurality of security mechanism users, and wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database, the method comprising:
-
authenticating a first Database User attempting to connect to the interactive system over the Internet from a first geographic location; after authenticating the first Database User, receiving input from the first Database User to order a physical key for a first place for which information is stored in the at least one searchable database; opening an order in the at least one searchable database in response to the input from the first Database User; electronically routing information associated with the order to a device preparation facility proximate the first geographic location, the order including information used to cut the physical key from a key blank for which a serial number is stored in the at least one searchable database; recording the serial number of the key blank with the order in the at least one searchable database subsequent to cutting the physical key from the key blank; validating the serial number recorded with the order; associating the physical key with a first user in the at least one searchable database to indicate that the physical key is in the possession of the first user; closing the order in the at least one searchable database after the physical key is associated with the first user; and enabling a second Database User disposed at a second geographic location remote from the first geographic location to monitor progress of the order in real time over the Internet while the order is open.
-
Specification