×

Interactive key control system and method of managing access to secured locations

  • US 7,861,314 B2
  • Filed: 12/10/2009
  • Issued: 12/28/2010
  • Est. Priority Date: 08/10/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. An apparatus configured to manage a security system associated with places physically protected by corresponding locks and physical keys used by key users to gain physical entry to the places via the locks, the apparatus configured to access at least one searchable database that stores information on a plurality of places, a plurality of physical keys, and a plurality of key users, the apparatus comprising:

  • at least one processor; and

    program code configured to be executed by the at least one processor to provide access to the at least one searchable database by a plurality of database users by;

    interacting with database users using an Internet-accessible web site;

    authenticating each database user attempting to connect to the at least one searchable database over the Internet through the web site by receiving a password from such database user and comparing the received password to a stored password associated with such database user;

    after authenticating a first database user among the plurality of database users, interactively communicating a plurality of screens to the first database user over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by the first database user, including communicating screens with hotlinks associated with security management operations for which the first database user is authorized such that the screens communicated to the first database user do not include any hotlinks associated with security management operations for which the first database user is not authorized; and

    in response to input from the first database user and directed to a selected hotlink on one of the plurality of screens, performing a first security management operation associated with the selected hotlink, wherein performing the first security management operation includes searching the at least one searchable database and generating a custom search result screen for display to the first database user, the custom search result screen including information retrieved from the at least one searchable database and at least one hotlink to configured to perform a second security management operation that is related to the first security management operation.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×