Systems and methods for managing security at plural physical...

Registers – Systems controlled by data bearing records – Credit or identification card systems

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C235S380000, C235S382500, C235S381000, C705S002000, C705S014270, C705S026640, C340S005200, C340S005210

Reexamination Certificate

active

06779721

ABSTRACT:

BACKGROUND
Many different types of security systems have been deployed in workplaces and other physical locations. In recent years, employee security cards have been increasingly used in connection with physical security systems implemented by employers. Often, the security cards will include photographs and relevant personal data, and in some cases will also include biometric data to permit verification of the cardholder's identity. This data typically is also stored on a computerized in-house security system, along with more extensive data relating to the employee. The security cards may be used to monitor and control access to the employer's physical facilities, via interfacing the security cards with card reader equipment deployed at various locations within the employer's facility. Common examples of such monitoring and control include tracking employee movements through various access points, and allowing only specified individuals to access particular areas.
Although systems such as that described above are often adequate in the case of employees, typically there are a variety of individuals other than employees that may have frequent and relatively unrestricted access to the employer's physical location. For example, employers commonly contract with outside entities to perform maintenance, cleaning, provide food service, etc., such that individuals employed by or associated with those outside entities have nearly unrestricted access to the employer's facilities. The security concerns are as great in respect to these individuals as they are with employees. Despite this, employers commonly do not have cost-effective or convenient mechanisms for screening outside parties and applying on-site security systems to those parties.
SUMMARY
Accordingly, methods and systems are provided for managing personnel security. One such method includes managing personnel security for a plurality of different sponsor entities from an administrator entity. The method includes obtaining screening data from a plurality of different vendor entities and individuals associated with those vendor entities, where the screening data is obtained to screen the vendor entities and individuals to determine whether physical access to facilities of the sponsor entities should be granted. The method further includes performing background checks on the outside companies and their employees based on the screening data, where the background checks are initiated by the administrator entity using a computer-based system operated and maintained by the administrator entity.


REFERENCES:
patent: 4980679 (1990-12-01), Klaubert
patent: 6394356 (2002-05-01), Zagami
patent: 6408337 (2002-06-01), Dietz et al.
patent: 6507826 (2003-01-01), Maners
patent: 6640246 (2003-10-01), Gary et al.
patent: 2001/0041994 (2001-11-01), Kim
patent: 2002/0052773 (2002-05-01), Kraemer et al.
patent: 2002/0072960 (2002-06-01), Dabbiere
patent: 2003/0097273 (2003-05-01), Carpenter et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Systems and methods for managing security at plural physical... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Systems and methods for managing security at plural physical..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for managing security at plural physical... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3355081

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.