Patents Assigned to Security Systems, L.L.C.
-
Patent number: 11610403Abstract: Systems and methods for monitoring an environment using a Graphical Management System (GMS) are described. The GMS may present a vector image map of the environment for interaction by a user. The user may zoom and pan on the map to generate views of the map with various ranges of detail of the map. Video data from a plurality of video cameras may also be displayed on the map based on the user input and the level of zoom and the location viewed in the map. Further, the user may select a timeline event and sensor data associated with the event and the map may be initialized at the time and location of the event.Type: GrantFiled: June 22, 2021Date of Patent: March 21, 2023Assignee: Security Systems, L.L.C.Inventors: W. Lance Hodges, S. Robert Johnson
-
Patent number: 11074460Abstract: Systems and methods for monitoring an environment using a Graphical Management System (GMS) are described. The GMS may present a vector image map of the environment for interaction by a user. The user may zoom and pan on the map to generate views of the map with various ranges of detail of the map. Video data from a plurality of video cameras may also be displayed on the map based on the user input and the level of zoom and the location viewed in the map. Further, the user may select a timeline event and sensor data associated with the event and the map may be initialized at the time and location of the event.Type: GrantFiled: April 2, 2020Date of Patent: July 27, 2021Assignee: Security Systems, L.L.C.Inventors: W. Lance Hodges, S. Robert Johnson
-
Publication number: 20100115626Abstract: A security system associated with places physically protected by corresponding security mechanisms used to gain physical entry to the places by security mechanism users is managed using a searchable database that stores information on a plurality of places, a plurality of security mechanisms, and a plurality of security mechanism users. Program code provides access to the searchable database and interacts with database users using an Internet-accessible web site. The program code further authenticates each database user attempting to connect to the searchable database, and after authentication, interactively communicates a plurality of screens to database users, where each screen includes only hotlinks associated with security management operations for which those database users are authorized such that the screens do not include any hotlinks associated with security management operations for which the database users are not authorized.Type: ApplicationFiled: December 10, 2009Publication date: May 6, 2010Applicant: SHIELD SECURITY SYSTEMS, L.L.C.Inventors: Scott M. Serani, Leslie S. McMillin, Charles D. Blish, III
-
Patent number: 7653945Abstract: An interactive method and system for managing access to one or more secured locations by one of more users via a global communication network which comprises software made up of a plurality of databases, each of the databases requiring a different level of access to the secured locations as well as being able to perform one or more functions at each different level of access, and a key or other entry control device is assigned to each user for use in gaining access to one or more of the locations at a predetermined level of access assigned to hat user, the system as described being capable of being added to, deleted in whole or in part, or modified, and the databases are capable of maintaining the status of the entry control devices, locations and users in a real time mode for instantaneous access, maintenance and control anywhere in the world.Type: GrantFiled: February 22, 2006Date of Patent: January 26, 2010Assignee: Shield Security Systems, L.L.C.Inventors: Scott M. Serani, Leslie S. McMillin, Charles D. Blish, III
-
Publication number: 20070214491Abstract: An interactive system and method for security management, the system accessible via a communications network by a plurality of DB-Users and adapted to manage a security system associated with places physically protected by corresponding security components used to control physical entry to the places. The system comprises at least one searchable database configured to store information on the DB-Users and the security components. The Software is configured to recognize different DB-User profiles established based on the information for different DB-Users. Each profile may define an authority level of the corresponding DB-User. A feature may be provided requiring at least one approver, in addition to that DB-User, for submitting an order for one or more of the components of the security system.Type: ApplicationFiled: February 28, 2007Publication date: September 13, 2007Applicant: SHIELD SECURITY SYSTEMS, L.L.C.Inventors: Scott M. Serani, Leslie S. McMillin, Charles D. Blish
-
Publication number: 20060268758Abstract: Computerized methods and systems for auditing data associated with controlling physical entry to at least one of a plurality of secured Locations via an entry control device. The method may comprise providing at least one database having stored data associated with the Location, providing a function for enabling the stored data in the database to be searched, providing a function for selectively displaying a set of display data based on the stored data, and providing a function for comparing the set of display data to actual data found at the Location.Type: ApplicationFiled: April 28, 2006Publication date: November 30, 2006Applicant: Shield Security Systems, L.L.C.Inventors: Scott Serani, Leslie McMillin, Charles Blish
-
Publication number: 20060206719Abstract: An interactive method and system for managing access to one or more secured locations by one of more users via a global communication network which comprises software made up of a plurality of databases, each of the databases requiring a different level of access to the secured locations as well as being able to perform one or more functions at each different level of access, and a key or other entry control device is assigned to each user for use in gaining access to one or more of the locations at a predetermined level of access assigned to hat user, the system as described being capable of being added to, deleted in whole or in part, or modified, and the databases are capable of maintaining the status of the entry control devices, locations and users in a real time mode for instantaneous access, maintenance and control anywhere in the world.Type: ApplicationFiled: February 22, 2006Publication date: September 14, 2006Applicant: Shield Security Systems, L.L.C.Inventors: Scott Serani, Leslie McMillin, Charles Blish
-
Publication number: 20050131723Abstract: The food safety system and method of the present invention provides a comprehensive consumer risk distribution model, which can be applied to any food item. Additionally, the present invention automatically evaluates consumer risk based on how much contaminated food is at each stage of the food distribution process according to the consumer risk distribution model, allowing for quick and accurate determinations as to the efficacy of a trace recall effort. A further element of the present invention provides expert analysis of data to detect and identify food events from sporadic information. Finally, the real time detection system provides early warning data in order to intercept isolated food contamination events before the contaminated food products reach the consuming public.Type: ApplicationFiled: September 21, 2004Publication date: June 16, 2005Applicant: Food Security Systems , L.L.C.Inventors: Jeffrey Sholl, Andrew Jaine, Susan Harlander
-
Publication number: 20040083201Abstract: The food safety system and method of the present invention provides a comprehensive consumer risk distribution model, which can be applied to any food item. Additionally, the present invention automatically evaluates consumer risk based on how much contaminated food is at each stage of the food distribution process according to the consumer risk distribution model, allowing for quick and accurate determinations as to the efficacy of a trace recall effort. A further element of the present invention provides expert analysis of data to detect and identify food events from sporadic information. Finally, the real time detection system provides early warning data in order to intercept isolated food contamination events before the contaminated food products reach the consuming public.Type: ApplicationFiled: October 8, 2003Publication date: April 29, 2004Applicant: Food Security Systems, L.L.C.Inventors: Jeffrey John Sholl, Andrew Martin Jaine, Susan Kay Harlander
-
Publication number: 20020023232Abstract: An interactive method and system for managing access to one or more secured locations by one of more users via a global communication network which comprises software made up of a plurality of databases, each of the databases requiring a different level of access to the secured locations as well as being able to perform one or more functions at each different level of access, and a key or other entry control device is assigned to each user for use in gaining access to one or more of the locations at a predetermined level of access assigned to that user, the system as described being capable of being added to, deleted in whole or in part, or modified, and the databases are capable of maintaining the status of the entry control devices, locations and users in a real time mode for instantaneous access, maintenance and control anywhere in the world.Type: ApplicationFiled: August 10, 2001Publication date: February 21, 2002Applicant: Shield Security Systems, L.L.C.Inventors: Scott M. Serani, Leslie S. McMillin, Charles D. Blish
-
Patent number: 6100802Abstract: An alarmed cable lock that sounds an alarm upon an attempt to open the lock or remove the secured item while the alarm is armed. The invention includes a lock, a cable, a power source and an alarm. The lock includes a C-channel closed at one end, a switch, and a blocking pin. The cable is attached at one end to the lock. The free end of the cable terminates in a head that is formed to slide in the C-channel. The switch is exposed in the C-channel. When the lock is armed, the blocking pin extends into the C-channel to prevent the free end of the cable from sliding out of the open C-channel end. If an attempt is made to remove the end of the cable by sliding it out the C-channel, the head passes by the switch and sets off the alarm. The alarm/lock features are operated by remote control.Type: GrantFiled: November 16, 1998Date of Patent: August 8, 2000Assignee: Nitro Security Systems, L.L.C.Inventor: Morgan Allen Adams