Interactive security control system with real time activity reports
First Claim
1. An interactive system for security management via a communications network by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users the system comprising in combination:
- at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database, andat least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to produce a real time activity report on a selected portion of the stored information during a time period selected by a Database User among the plurality of Database Users, wherein the real time activity report includes information regarding security mechanism maintenance activities for a plurality of security mechanisms at a plurality of places.
3 Assignments
0 Petitions
Accused Products
Abstract
An interactive system for managing access via a communications network by one or more Device-Users and Database-Users with regard to at least one secured Location and an entry control Device assignable for use in gaining access to the Location by the one or more Device-Users. The system may include a searchable database configured to store information on at least one of the secured Location, the one or more Device-Users, the one or more Database-Users or the entry control Device. Software is configured to produce a real time activity report on a selected portion of the stored information during a time period selected by the one or more Database-Users.
30 Citations
31 Claims
-
1. An interactive system for security management via a communications network by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users the system comprising in combination:
-
at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database, and at least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to produce a real time activity report on a selected portion of the stored information during a time period selected by a Database User among the plurality of Database Users, wherein the real time activity report includes information regarding security mechanism maintenance activities for a plurality of security mechanisms at a plurality of places. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An interactive system for security management via a communications network by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, the system comprising in combination:
-
a plurality of databases having different levels of access; and at least one computer coupled to plurality of databases and configured to execute Software configured to assign a password to each of a plurality of Database-Users corresponding to one of said levels of access; wherein information is maintained in said plurality of databases on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein at least one database is further configured to store information on the plurality of Database Users authorized to access the plurality of databases, and wherein said Software is further configured to search and display selected portions of said data stored in said plurality of databases related to a period of time selected by one of the Database-Users, wherein the selected portions of said data includes real time information regarding security mechanism maintenance activities for a plurality of security mechanisms at a plurality of places.
-
-
19. A method of reporting maintenance activities in an interactive system for security management, the system accessible via a communications network by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, wherein the interactive system includes at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, and wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database, the method comprising:
-
authenticating a Database User attempting to connect to the interactive system over the communications network by receiving a password from the Database User and comparing the received password to a password stored in the at least one searchable database; after authenticating the Database User, and in response to input from the Database User, producing a real time activity report on a selected portion of the stored information during a time period selected by the Database User, wherein the real time activity report includes information regarding security mechanism maintenance activities for a plurality of security mechanisms at a plurality of places. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification