Interactive security control system with conflict checking
First Claim
1. An interactive system for managing access via a communications network by one or more Device-Users and Database-Users with regard to at least one secured Location and an entry control Device assignable for use in gaining access to the Location by the one or more Device-Users, the system comprising in combination:
- a searchable database configured to store information on at least one of the secured Location, the one or more Device-Users, the one or more Database-Users, or the entry control Device, wherein the at least one secured Location is associated with a place that is physically protected by the entry control Device, andat least one computer coupled to the searchable database and configured to execute Software stored on a readable medium and configured to search the database and report one or more conflicts concerning the information.
3 Assignments
0 Petitions
Accused Products
Abstract
An interactive system for managing access via a communications network by one or more Device-Users and Database-Users with regard to at least one secured Location and an entry control Device assignable for use in gaining access to the Location by the one or more Device-Users. The system comprises a searchable database configured to store information on at least one of the secured Location, the one or more Device-Users, the one or more Database-Users, or the entry control Device, and Software stored on a readable medium and configured to search the database and report one or more conflicts concerning the information.
29 Citations
36 Claims
-
1. An interactive system for managing access via a communications network by one or more Device-Users and Database-Users with regard to at least one secured Location and an entry control Device assignable for use in gaining access to the Location by the one or more Device-Users, the system comprising in combination:
-
a searchable database configured to store information on at least one of the secured Location, the one or more Device-Users, the one or more Database-Users, or the entry control Device, wherein the at least one secured Location is associated with a place that is physically protected by the entry control Device, and at least one computer coupled to the searchable database and configured to execute Software stored on a readable medium and configured to search the database and report one or more conflicts concerning the information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An interactive system for security management, the system accessible via a communications network by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, the system comprising in combination:
-
at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database; and at least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to; search the at least one searchable database to identify one or more conflicts associated with the information on the plurality of places, the plurality of security mechanisms and the plurality of security mechanism users; and report the one or more identified conflicts. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of checking for conflicts in information stored in at least one database and pertaining to an access control system for at least one secured Location, comprising:
-
providing a manner of assigning an entry control Device to the Location for use in gaining entry by a Device-User to the Location, wherein the Location is associated with a place that is physically protected by the entry control Device; providing a manner of assigning a password to a Database-User enabling access to the database; and providing Software executed by a computer and enabling the Database-User to search the database and selectively display the conflicts in the information on at least one of the Location, the Device, the Device-User, or Database-User. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A method of checking for conflicts in information pertaining to an access control system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, comprising:
-
storing in at least one searchable database information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database; and executing Software accessible by the plurality of Database Users on at least one computer coupled to the at least one searchable database, the Software configured to; search the at least one searchable database to identify one or more conflicts associated with the information on the plurality of places, the plurality of security mechanisms and the plurality of security mechanism users; and report the one or more identified conflicts. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36)
-
Specification