Interactive security control system with conflict checking
First Claim
1. In an interactive system for managing access via a communications network by one or more users to multiple secured Locations comprising in combination:
- a plurality of entry control Devices used in gaining access to said Locations by multiple users with multiple keys assigned in a plurality of levels of a hierarchy to said Locations, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices;
a searchable database configured to store information on said keys and said entry control Devices, andSoftware stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices, wherein the graphical hierarchy report produced by the Software includes a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to a user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices;
wherein the plurality of levels further includes a third level, wherein a fourth key assigned to the third level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices to which the third key is assigned, and to a third subset of the plurality of entry control Devices, wherein the tree in the graphical hierarchy report further depicts the fourth key and the third subset of the plurality of entry control Devices, and wherein the tree in the graphical hierarchy report further depicts the fourth key at a higher level than the first, second and third keys to indicate to the user that the fourth key is used to gain access through all of the first, second and third subsets of the plurality of entry control Devices.
3 Assignments
0 Petitions
Accused Products
Abstract
An interactive system for managing access via a communications network by one or more users to multiple secured Locations. The system comprises a plurality of entry control Devices assigned for use in gaining access to the Locations by multiple users with multiple keys assigned in a hierarchy to the Locations, a searchable database configured to store information on said keys and said entry control Devices, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices.
29 Citations
18 Claims
-
1. In an interactive system for managing access via a communications network by one or more users to multiple secured Locations comprising in combination:
-
a plurality of entry control Devices used in gaining access to said Locations by multiple users with multiple keys assigned in a plurality of levels of a hierarchy to said Locations, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices; a searchable database configured to store information on said keys and said entry control Devices, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices, wherein the graphical hierarchy report produced by the Software includes a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to a user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices; wherein the plurality of levels further includes a third level, wherein a fourth key assigned to the third level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices to which the third key is assigned, and to a third subset of the plurality of entry control Devices, wherein the tree in the graphical hierarchy report further depicts the fourth key and the third subset of the plurality of entry control Devices, and wherein the tree in the graphical hierarchy report further depicts the fourth key at a higher level than the first, second and third keys to indicate to the user that the fourth key is used to gain access through all of the first, second and third subsets of the plurality of entry control Devices. - View Dependent Claims (2, 3, 4, 5)
-
-
6. In an interactive system for managing access via a communications network by one or more users to multiple secured Locations comprising in combination:
-
a searchable database configured to store information on a plurality of entry control Devices assigned for use in gaining access to said Locations by multiple users and/or multiple keys assigned in a plurality of levels of a hierarchy to said Locations and used to gain access to said Locations, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices, wherein the graphical hierarchy report produced by the Software includes a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to a user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices; wherein the plurality of levels further includes a third level, wherein a fourth key assigned to the third level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices to which the third key is assigned, and to a third subset of the plurality of entry control Devices, wherein the tree in the graphical hierarchy report further depicts the fourth key and the third subset of the plurality of entry control Devices, and wherein the tree in the graphical hierarchy report further depicts the fourth key at a higher level than the first, second and third keys to indicate to the user that the fourth key is used to gain access through all of the first, second and third subsets of the plurality of entry control Devices.
-
-
7. A method of displaying a key hierarchy for multiple entry control Devices comprising:
-
providing at least one database having information stored on multiple keys and entry control Devices used to gain access to multiple secured Locations, wherein the keys and entry control Devices are assigned in a plurality of levels of hierarchy, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices; and providing a function in the at least one database and executed by a hardware-implemented computer for enabling a user to search the at least one database and selectively display the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices, wherein the function enables the user to selectively display the hierarchy by displaying a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to the user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices; wherein the plurality of levels further includes a third level, wherein a fourth key assigned to the third level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices to which the third key is assigned, and to a third subset of the plurality of entry control Devices, wherein the tree in the graphical hierarchy report further depicts the fourth key and the third subset of the plurality of entry control Devices, and wherein the tree in the graphical hierarchy report further depicts the fourth key at a higher level than the first, second and third keys to indicate to the user that the fourth key is used to gain access through all of the first, second and third subsets of the plurality of entry control Devices. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method of displaying a key hierarchy for multiple entry control Devices comprising:
-
using a hardware-implemented computer, searching at least one database having information stored on multiple keys and entry control Devices used to gain access to multiple secured Locations, wherein the keys and entry control Devices are assigned in a plurality of levels of hierarchy, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices; and displaying a hierarchy of the keys and their respectively assigned Locations and/or entry control Devices, wherein displaying the hierarchy includes displaying a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to a user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices; wherein the plurality of levels further includes a third level, wherein a fourth key assigned to the third level is configure to gain access through both of the first and second subsets of the plurality of entry control Devices to which the third key is assigned, and to a third subset of the plurality of entry control Devices, wherein the tree in the graphical hierarchy report further depicts the fourth key and the third subset of the plurality of entry control Devices, and wherein the tree in the graphical hierarchy report further depicts the fourth key at a higher level than the first, second and third keys to indicate to the user that the fourth key is used to gain access through all of the first, second and third subsets of the plurality of entry control Devices.
-
-
13. In an interactive system for managing access via a communications network by one or more users to multiple secured Locations comprising in combination:
-
a plurality of entry control Devices used in gaining access to said Locations by multiple users with multiple keys assigned in a plurality of levels of a hierarchy to said Locations, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices; a searchable database configured to store information on said keys and said entry control Devices, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices, wherein the graphical hierarchy report produced by the Software includes a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to a user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices; wherein the first and second keys include first and second unique user keys configured to respectively gain access through first and second different entry control Devices, and at least a third entry control Device that is permitted access by both of said user keys, wherein the Software is further configured to produce a second graphical hierarchy report that includes a tree that includes first, second and third nodes depicted at a same level, the first node depicting the first key and indicating to the user that the first key is configured to gain access through the first and third entry control Devices, the second node depicting the second key and indicating to the user that the second key is configured to gain access through the second and third entry control Devices, and the third node depicting the third entry control Device and indicating to the user that the third entry control Device is associated with a first location and permits access by the first and second keys. - View Dependent Claims (14)
-
-
15. In an interactive system for managing access via a communications network by one or more users to multiple secured Locations comprising in combination:
-
a searchable database configured to store information on a plurality of entry control Devices assigned for use in gaining access to said Locations by multiple users and/or multiple keys assigned in a plurality of levels of a hierarchy to said Locations and used to gain access to said Locations, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices, and Software stored on a readable medium and configured to produce a graphical hierarchy report on the keys depicting the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices, wherein the graphical hierarchy report produced by the Software includes a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to a user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices; wherein the first and second keys include first and second unique user keys configured to respectively gain access through first and second different entry control Devices, and at least a third entry control Device that is permitted access by both of said user keys, wherein the Software is further configured to produce a second graphical hierarchy report that includes a tree that includes first, second and third nodes depicted at a same level, the first node depicting the first key and indicating to the user that the first key is configured to gain access through the first and third entry control Devices, the second node depicting the second key and indicating to the user that the second key is configured to gain access through the second and third entry control Devices, and the third node depicting the third entry control Device and indicating to the user that the third entry control Device is associated with a first location and permits access by the first and second keys.
-
-
16. A method of displaying a key hierarchy for multiple entry control Devices comprising:
-
providing at least one database having information stored on multiple keys and entry control Devices used to gain access to multiple secured Locations, wherein the keys and entry control Devices are assigned in plurality of levels of a hierarchy, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices; and providing a function in the at least one database and executed by a hardware-implemented computer for enabling a user to search the at least one database and selectively display the hierarchy of the keys and their respectively assigned Locations and/or entry control Devices, wherein the function enables the user to selectively display the hierarchy by displaying a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to the user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices; wherein the first and second keys include at least first and second unique user keys configured to respectively gain access through first and second different entry control Devices, and at least a third entry control Device that is permitted access by both of said user keys, the method further comprising displaying a second tree that includes first, second and third nodes depicted at a same level, the first node depicting the first key and indicating to the user that the first key is configured to gain access through the first and third entry control Devices, the second node depicting the second key and indicating to the user that the second key is configured to gain access through the second and third entry control Devices, and the third node depicting the third entry control Device and indicating to the user that the third entry control Device is associated with a first location and permits access by the first and second keys. - View Dependent Claims (17)
-
-
18. A method of displaying a key hierarchy for multiple entry control Devices comprising:
-
using a hardware-implemented computer, searching at least one database having information stored on multiple keys and entry control Devices used to gain access to multiple secured Locations, wherein the keys and entry control Devices are assigned in a plurality of levels of a hierarchy, wherein the plurality of levels includes at least first and second levels, wherein first and second keys assigned to the first level are configured to respectively gain access through first and second subsets of the plurality of entry control Devices, and wherein a third key assigned to the second level is configured to gain access through both of the first and second subsets of the plurality of entry control Devices; and displaying a hierarchy of keys and their respectively assigned Locations and/or entry control Devices, wherein displaying the hierarchy includes displaying a tree that depicts the first, second and third keys and the first and second subsets of the plurality of entry control Devices, wherein the first subset of the plurality of entry control Devices are depicted in the tree at a lower level than the first key to indicate to a user that the first key is used to gain access through the first subset of the plurality of entry control Devices, the second subset of the plurality of entry control Devices are depicted in the tree at a lower level than the second key to indicate to the user that the second key is used to gain access through the second subset of the plurality of entry control Devices, and the first and second keys are depicted in the tree at a lower level than the third key to indicate to the user that the third key is used to gain access through both of the first and second subsets of the plurality of entry control Devices; wherein the first and second keys include at least first and second unique user keys configured to respectively gain access through first and second different entry control Devices, and at least a third entry control Device that is permitted access by both of said user keys, the method further comprising displaying a second tree that includes first, second and third nodes depicted at a same level, the first node depicting the first key and indicating to the user that the first key is configured to gain access through the first and third entry control Devices, the second node depicting the second key and indicating to the user that the second key is configured to gain access through the second and third entry control Devices, and the third node depicting the third entry control Device and indicating to the user that the third entry control Device is associated with a first location and permits access by the first and second keys.
-
Specification