Interactive key control system and method of managing access to secured locations
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/30
H04L-009/32
출원번호
UP-0359326
(2006-02-22)
등록번호
US-7653945
(2010-02-24)
발명자
/ 주소
Serani, Scott M.
McMillin, Leslie S.
Blish, III, Charles D.
출원인 / 주소
Shield Security Systems, L.L.C.
대리인 / 주소
Wood, Herron & Evans, L.L.P.
인용정보
피인용 횟수 :
4인용 특허 :
60
초록▼
An interactive method and system for managing access to one or more secured locations by one of more users via a global communication network which comprises software made up of a plurality of databases, each of the databases requiring a different level of access to the secured locations as well as
An interactive method and system for managing access to one or more secured locations by one of more users via a global communication network which comprises software made up of a plurality of databases, each of the databases requiring a different level of access to the secured locations as well as being able to perform one or more functions at each different level of access, and a key or other entry control device is assigned to each user for use in gaining access to one or more of the locations at a predetermined level of access assigned to hat user, the system as described being capable of being added to, deleted in whole or in part, or modified, and the databases are capable of maintaining the status of the entry control devices, locations and users in a real time mode for instantaneous access, maintenance and control anywhere in the world.
대표청구항▼
We claim: 1. An interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by s
We claim: 1. An interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, the system comprising in combination: at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database; and at least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to: authenticate each Database User attempting to connect to the Software over the Internet through a web site by receiving a password from such Database User and comparing the received password to a password stored in the at least one searchable database; interactively communicate a plurality of screens to an authenticated Database User over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by such authenticated Database User, wherein the Software is configured to communicate screens with hotlinks associated with security management operations for which the authenticated Database User is authorized such that the screens communicated to the authenticated Database User do not include any hotlinks associated with security management operations for which the authenticated Database User is not authorized; and in response to input from the authenticated Database User and directed to a selected hotlink on one of the plurality of screens, performing the security management operation associated with the selected hotlink. 2. The system of claim 1, wherein the stored information on the security mechanisms further comprises information on tangible security items. 3. The system of claim 1, wherein the stored information on the security mechanisms further comprises information on intangible security items. 4. The system of claim 1, wherein the security management operations include at least one of viewing, adding, modifying, or deleting information in the database. 5. The interactive system of claim 1, wherein the Software is configured to update the at least one searchable database in real time in response to input from authenticated Database Users such that an update to information stored in the at least one searchable database by a first authenticated Database User is accessible to a second authenticated Database User upon updating of the at least one searchable database. 6. A method of managing Database Users in an interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, wherein the interactive system includes at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, and wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database, the method comprising: authenticating a first Database User attempting to connect to the interactive system over the Internet by receiving a password from the first Database User and comparing the received password to a password stored in the at least one searchable database; after authenticating the first Database User, interactively communicating a plurality of screens to the first Database User over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by the first Database User; and in response to input from the first Database User directed to a selected hotlink on one of the plurality of screens, controlling authorization of a second Database User to a plurality of security management operations by receiving input from the first Database User to configure at least one screen accessible by the second Database User such that such configured screen includes at least one hotlink associated with a security management operation for which the second Database User is authorized and omits any hotlinks associated with security management operations for which the second Database User is not authorized. 7. The method of claim 6, wherein the stored information on the security mechanisms further comprises information on tangible security items. 8. The method of claim 6, wherein the stored information on the security mechanisms further comprises information on intangible security items. 9. The method of claim 6, wherein the security management operations include at least one of viewing, adding, modifying, or deleting information in the database. 10. The method of claim 6, further comprising: maintaining the information in the at least one database in a real time mode. 11. The method of claim 6, further comprising: maintaining current and historical data on each of the places, the security mechanisms, the security mechanism users, and the Database-Users. 12. The method of claim 6, further comprising: providing information related to one of the security mechanisms which has been found. 13. The method of claim 6, further comprising: providing information related to one of the security mechanisms which has been lost or stolen. 14. An interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users, the system comprising in combination: at least one searchable database configured to store information on a plurality of places, a plurality of security mechanisms and a plurality of security mechanism users, wherein the at least one searchable database is configured to store an association between a first place, a first security mechanism and a first security mechanism user to indicate that the first security mechanism is in the possession of the first security mechanism user and is used to access the first place, and wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database; and at least one computer coupled to the at least one searchable database and configured to execute Software accessible by the plurality of Database Users, the Software configured to: authenticate each Database User attempting to connect to the Software over the Internet through a web site by receiving a password from such Database User and comparing the received password to a password stored in the at least one searchable database; interactively communicate a plurality of screens to an authenticated Database User over the Internet, wherein each of the plurality of screens includes at least one hotlink configured to initiate a security management operation responsive to input directed thereto by such authenticated Database User; for a first Database User authorized to access information associated with the first security mechanism, and based upon an authorization for the first Database User as stored in the at least one searchable database, display the information associated with the first security mechanism to the first Database User, allow the first Database User to access information associated with the first place in association with displaying the information associated with the first security mechanism, and prohibit the first Database User from accessing information associated with the first security mechanism user; and for a second Database User authorized to access information associated with the first security mechanism, and based upon an authorization for the second Database User as stored in the at least one searchable database, display the information associated with the first security mechanism to the second Database User, allow the second Database User to access information associated with the first security mechanism user in association with displaying the information associated with the first security mechanism, and prohibit the second Database User from accessing information associated with the first place. 15. A method of ordering a physical key in an interactive system for security management, the system accessible via the Internet by a plurality of Database Users and adapted to manage a security system associated with places physically protected by corresponding physical keys used to gain physical entry to the places by security mechanism users, wherein the plurality of places are distributed among a plurality of geographic locations, wherein the interactive system includes at least one searchable database configured to store information on a plurality of places, a plurality of physical keys, a plurality of physical key blanks and a plurality of security mechanism users, and wherein the at least one searchable database is further configured to store information on the plurality of Database Users authorized to access the at least one searchable database, the method comprising: authenticating a first Database User attempting to connect to the interactive system over the Internet from a first geographic location; after authenticating the first Database User, receiving input from the first Database User to order a physical key for a first place for which information is stored in the at least one searchable database; opening an order in the at least one searchable database in response to the input from the first Database User; electronically routing information associated with the order to a device preparation facility proximate the first geographic location, the order including information used to cut the physical key from a key blank for which a serial number is stored in the at least one searchable database; recording the serial number of the key blank with the order in the at least one searchable database subsequent to cutting the physical key from the key blank; validating the serial number recorded with the order; associating the physical key with a first user in the at least one searchable database to indicate that the physical key is in the possession of the first user; closing the order in the at least one searchable database after the physical key is associated with the first user; and enabling a second Database User disposed at a second geographic location remote from the first geographic location to monitor progress of the order in real time over the Internet while the order is open.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (60)
VonBallmoos Fritz (Horgen CHX), Access control device.
Nixon, Mark; Chatkoff, Teresa; Gilbert, Stephen, Accessing and updating a configuration database from distributed physical locations within a process control system.
Nixon, Mark; Chatkoff, Teresa; Gilbert, Stephen, Accessing and updating a configuration database from distributed physical locations within a process control system.
Lindman Richard S. (3708 17th Ave. South Minneapolis MN 55407) Lindman Richard P. (7625 18th Ave. South Richfield MN 55423) Myers Edward D. (4440 Denton Way Inver Grove Heights MN 55075), Computer security system.
Satoshi Kikuchi JP; Hiromichi Ito JP; Keiichi Nakane JP; Hisashi Hashimoto JP; Eisaku Nishiyama JP, Distributed database management system including logical database constituted by a group of physical databases.
Disbrow James E. (Palm Bay FL) Malinowski Christopher W. (Melbourne FL) Smitt Eric L. (Indian Harbor Beach FL) Mellen Michael R. (Palm Bay FL) Danile Peter S. (Palm Bay FL) Chhatwal K. N. Singh (West, Electronic lock and key system.
Clarkson Bruce A. (Beverly MA) Frere Ronald J. (Southampton MA) Loughlin Thomas G. (Rocky Hill CT) Taylor ; Jr. William W. (Golden CO) Mongeau Peter (Needham MA), Electronic locking system and key therefor.
Clarkson Bruce A. (Beverly MA) Frere Ronald J. (Southampton MA) Loughlin Thomas G. (Rocky Hill CT) Taylor ; Jr. William W. (Golden CO) Mongeau Peter (Needham MA), Electronic locking system and key therefor.
Clarkson Bruce A. (Beverly MA) Frere Ronald J. (Southampton MA) Loughlin Thomas G. (Rocky Hill CT) Taylor ; Jr. William W. (Golden CO) Mongeau Peter (Needham MA), Electronic locking system and key therefor.
Wills, Phillip R.; Kromann, Roger F.; Axelrod, Norman N.; Schroeder, Wesley A.; Berilla, James A.; Burba, Bryce, Method and apparatus for aligning keys for cutting.
Wills Phillip R. ; Kromann Roger F. ; Axelrod Norman N. ; Schroeder Wesley A. ; Berilla James A. ; Burba Bryce, Method and apparatus for using light to identify a key.
Amy Rubert ; Bren Dykes ; Saraswatula V. Sastry ; Shreedev G. Nair ; Shane Hatch, Method and system for efficiently retrieving information from multiple databases.
Bapat Subodh ; Fisher Bart Lee, System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects.
Bapat Subodh ; Fisher Bart Lee, System and method for restricting database access to managed object information using a permissions table that specifies access rights to the managed objects.
Marchoili John ; Neilsen John ; Regelski Michael ; Prokupets Rudy ; Zientara David ; Rozwod Robert, System for security access control in multiple regions.
Meganck, David; Fares, Ahmad; Belhadia, Karim; Mouradian, Jean, Mobile key devices systems and methods for programming and communicating with an electronic programmable key.
Belhadia, Karim; Mouradian, Jean; Meganck, David; Fares, Ahmad, Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.