GB2435323A - Key registration and identification system - Google Patents

Key registration and identification system Download PDF

Info

Publication number
GB2435323A
GB2435323A GB0603096A GB0603096A GB2435323A GB 2435323 A GB2435323 A GB 2435323A GB 0603096 A GB0603096 A GB 0603096A GB 0603096 A GB0603096 A GB 0603096A GB 2435323 A GB2435323 A GB 2435323A
Authority
GB
United Kingdom
Prior art keywords
key
keys
unique identification
registration system
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0603096A
Other versions
GB2435323B (en
GB0603096D0 (en
Inventor
Ashley Gordon Kemp
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0603096A priority Critical patent/GB2435323B/en
Publication of GB0603096D0 publication Critical patent/GB0603096D0/en
Publication of GB2435323A publication Critical patent/GB2435323A/en
Application granted granted Critical
Publication of GB2435323B publication Critical patent/GB2435323B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C3/00Milling particular work; Special milling operations; Machines therefor
    • B23C3/28Grooving workpieces
    • B23C3/35Milling grooves in keys
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01BMEASURING LENGTH, THICKNESS OR SIMILAR LINEAR DIMENSIONS; MEASURING ANGLES; MEASURING AREAS; MEASURING IRREGULARITIES OF SURFACES OR CONTOURS
    • G01B11/00Measuring arrangements characterised by the use of optical techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C2235/00Details of milling keys
    • B23C2235/12Using a database to store details of the key, the information in the database being used for the generation of the profile of the key
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B23MACHINE TOOLS; METAL-WORKING NOT OTHERWISE PROVIDED FOR
    • B23CMILLING
    • B23C2235/00Details of milling keys
    • B23C2235/41Scanning systems
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/24Key distinguishing marks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Theoretical Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A key registration system comprises a computer system which interrogates keys, (or jewellery or other valuables etc), generates and records unique identification information relating to each individual key as one component of a record relating to that key, and records the use or description of the key input by the user as another component of the record relating to the key. Interrogation can be by laser, REID or other scanner and the unique identification information can be the shape of the key, its REID signature or an engraved, magnetic or bar code. Once registered, the system can be used to identify registered keys, find lost keys and provide information for fabricating duplicate keys.

Description

<p>1 2435323 Key re2istration system The key registration system assists
people, businesses etc. to monitor the location of and identify small items of importance or value such as keys, jewellery and other articles which are small in size and have significant value to their owner.</p>
<p>It is a common experience to lose keys, either temporarily or permanently. Temporary loss is usually due to misplacing them. A great deal of frustration and waste of time is caused by having to search round the house, in clothes and likely hiding places -such as the fridge, the dog kennel or your wife's handbag in order to find them. Permanent loss is usually due either to keys being stolen, or to them falling into disuse over a period of time, so that when the lockable item is needed again, the key can no longer be found.</p>
<p>It is also a common experience for quantities of old keys to build up in a household or business, or on personal key-rings, as items that once required locking become obsolete.</p>
<p>To take a domestic example, frequently used keys such as those for the car and external house doors are usually managed effectively, by removing them from key-rings and replacing them with new ones when cars and door locks are changed. But keys to cupboards, cases, internal doors, padlocks etc very often remain on key-rings after the item they fit is no longer used. Their purpose is soon forgotten; they remain on the key-ring, but the owner is not able to discard them in case they are still important.</p>
<p>Moreover, when items requiring keys are unused for a period of time, the owner will often keep the old keys in a safe place, with the likelihood that the purpose of the key will be forgotten and for numbers of keys of unknown purpose to accumulate. Items requiring keys can become useless, or less useful, when the keys are missing. Lockable cupboards are still usable, but no longer fully functional. Padlocks are completely useless without their keys.</p>
<p>It is also usual to keep a number of spare keys in case further authorised people need to be given access to locked items, and similar problems arise with management and security of spares as they are allocated to further users. Generally they need to be kept in a secure place separately from the locked items and the problems of dissociation between the key and the locked item occur here too.</p>
<p>Having copies made of keys is relatively straightforward when at least one of the original keys has been retained, or when a key is one of a numbered series, as is the case with many car keys, or furniture locks which sometimes carry a code number on the lock. But it is impossible or much more difficult when none of the original keys can be found and there is no identification system.</p>
<p>These familiar situations require considerable thought and effort to ensure keys and the items they lock are managed effectively and maintained up to date. In the domestic situation, key management is usually left to chance, while in the business environment where security and efficiency are essential to the running of the business, considerable time and money is spent in managing keys. Initial research has indicated that every household and business has problems with its keys and this device is intended to solve the problems at an acceptable cost when produced in volume for anyone with access to a computer.</p>
<p>The invention prevents or ameliorates these problems by providing a registration system for keys which records two items of information about each key. Firstly unique identification data relating to a unique feature such as the shape of the key or the signature of an RFID tag attached to the key which will identify a key uniquely, and secondly information about the use of the key which is recognisable to the owner and is stored in association with the identification information. For example a user may enter information such as; "Front Door, Yale" (Yale is a trade mark), or "Garden Shed, Padlock", etc as use information.</p>
<p>The system further provides hardware for detecting the unique identification data such as a scanner into which a key is placed and its three dimensional shape scanned and recorded, or an RFID detection system which interrogates its immediate area and identifies the unique RFID code, and in response to detection of the unique identification data provides the user with a read-out of the use data.</p>
<p>The system also optionally provides a system for fabricating keys from the unique identification data. Where the identification data relates to the shape of the key, the fabricating system fabricates keys directly from the identification data. Where the identification data relates only partly or not at all to the shape of the key, the system includes key shape data which is stored in the system as a third item of information associated with the unique identification data and the use information, and is used alone or together with the identification data when it is desired to fabricate a key.</p>
<p>The system has been described so far in relation to keys, but it would also be useful for registering other small items of value which may easily get lost or stolen and of which it would be beneficial to have a record. These include items ofjewellery which are uniquely identified by shape or by having an attached RFID marker and where a description of the item is recorded for insurance purposes. For convenience I will refer to the objects as keys'in the following description, but this description and the claims should be understood to include such other items. Other items are also referred to specifically if there is some feature of the invention that is peculiar to them.</p>
<p>Three dimensional shape and RFID code are two possible methods for providing the unique identification data, however any suitable means of uniquely identifying an item could also be used, such as a two dimensional profile together with identification of a specific blank type of a particular make of key, or a code number which uniquely identifies a key such as the codes commonly associated with car keys, or a bar code, or a magnetic signature inscribed on a key.</p>
<p>The system is provided by a computer with software to implement the database system. The database records the identification data and the use data. Hardware is also provided such as a scanner for scanning the 3D or 2D shape of a key and/or RFID identification apparatus for transmitting an interrogation signal into the immediate area and receiving responses from nearby articles, or a bar code reader or other code reader.</p>
<p>The system hardware is connected together using the usual computer interconnection systems. For example SCSI or other internal bus structure for hardware that is incorporated into a computer chassis. USB, IEEE 1394, Bluetooth, Infra red or other suitable connection are used where the scanner or RFID interrogator/receiver element is separate from but connected to a computer system unit, and local area or wide area network technology is used where the computing and database functionality is removed from the scanning and RFID interrogation system. In short any suitable means of connecting together the various hardware parts of the system may be used.</p>
<p>Users will register all keys that they are interested in on the system. On initial registration of a new key, the system will generate the unique identification information and allow the user to enter information about the use of the key. Other useful information such as the date of registration can also be recorded and displayed which may serve to further identify the use of the key in the event there may have been more than one lock which fits the description. In addition, where duplicate keys are provided to a number of users, their names and dates when the key was provided, and optionally a serial number associated with the key can also be recorded. Where the system is used to register details ofjewellery and the like, the system records unique identification data in the same way as for keys, but instead of use data, the user would record a description of the article and other information such as the date and place of purchase, insurance value or other data which is relevant to the reason for registration.</p>
<p>Once a set of keys has been registered in the system, it is used in three particular ways to assist with key management.</p>
<p>Firstly, when a user has a key previously registered on the system, but whose purpose has been forgotten, the system is used to detect the identification information relating to the key, for example by placing the key in the scanner or activating the RFID interrogator. The system scans or interrogates the key, identifies within its database the particular record which corresponds to the key and from that information, presents the user with the information previously input as to the use of the key, eg that it belongs to the Garden Shed padlock.</p>
<p>Secondly, when a user loses a key, a scanner or RFID or other identification system is activated which is able to detect a key at a distance of the order of a metre to a few tens of metres, and the response used to help locate it. This distance scale is that over which it would be useful to be able to detect a lost key in normal circumstances. A simple system will indicate that a missing key is within a certain distance. A more sophisticated system will indicate distance and/or direction of a lost key.</p>
<p>Thirdly, the unique identification data is used when it is desired to produce a copy of the key. This has a number of advantages over the usual arrangement in which an original key is used as a template on a pantograph copying tool and a physical copy made directly from the original. Firstly, it is not necessary to have a physical copy of the key.</p>
<p>Consequently, if the only key has been stolen or lost, it is still possible to produce a copy of the key. Secondly, a faithful copy can always be made from the original data and there is less opportunity for the shape of copied keys to become degraded, as is the case where one copy is made from another copy, and thirdly, there is less likelihood for inaccuracies in copying to occur, which can result in an inoperable key due to lack of skill on the part of the tool operator.</p>
<p>Key duplication in the present system involves key cutting equipment that interprets the unique registration data in terms of the physical shape of the key concerned, and passes that information to the key cutting equipment.</p>
<p>It may be implemented in the form of a software module, which converts the identification data into control signals for the key cutting equipment.</p>
<p>As indicated above, where the unique identification data does not record the shape of the key or only partially records the shape, it is supplemented by a third item of data which either alone or together with that part of the unique identification data which records shape, provides shape data for the fabrication of duplicate keys.</p>
<p>The registration and key cutting machine tool can be part of a single system operated by an agency. Customers would have keys registered centrally at the agency, and the agency would be able to produce new keys on request. The request would take the form of any of the identification data; either the key itself which could be used to invoke the identification file, or an electronic file of the identification data, which could be sent in any convenient way for example by e-mail or network, or physically as a file in a stick memory or other transportable memory medium, or by the user identifying the key by its use data -eg Mr Jones of such and such an address's Garden Shed padlock key.</p>
<p>Alternatively, the user could maintain their own database of key identification and use data, and simply provide a key cutting agency with the unique identification data from which a key could be produced.</p>
<p>Keys of any three dimensional shape could be identified and produced using this system. Laser scanners are able to measure surface topography down to micron scale accuracies. That is a much greater level of accuracy than is required for the present use, and it will be acceptable to trade off some accuracy for a system which is more robust, cheaper and smaller for ease of use and efficiency.</p>
<p>Even small and unsophisticated 3D laser scanners are relatively expensive and an alternative possibility is to use a 2D scanner to generate a representation of the profile of a key and to use some other method to capture the surface shape, such as identification of a standard key blank type corresponding to the key in question, or use of another suitable type of sensor.</p>
<p>Pseudo 3D scanning could also be used as an alternative to full 3D scanning. Pseudo 3D scanning recognises that the features of interest in relation to key geometry are on the two sides and two edges of the key blade. The scanning system therefore only has to detect and record the characteristics of these features on the four orthogonal surfaces.</p>
<p>As a further option, some keys involve more than one 2D profile, and the scanning and registration system could be arranged to determine the locations and profiles of each of the separate 2D profiles which make up the key shape. This will be referred to as "multiple 2D" scanning etc. On the key production side, it is possible to produce fully three dimensional shapes through laser, water jet, ion beam or physical machining, or 3D printing in which 3D shapes are built up for example by fusing powdered material into solid shapes by intersection of scanned laser beams. Any suitable means for producing small 3D articles can be employed.</p>
<p>Although it is possible to build 3D shapes in this way, this is likely to be relatively expensive for keys, and an alternative is to identify from the unique identification data, a standard key blank from which the key can be machined, and simply carry out the 2D machining, or multiple 2D machining where a key has more than one 2D profile.</p>
<p>What type of machining will be appropriate will depend to a degree on the type of data that is recorded as identification data for a key. If the make, standard blank type, and 2D profile are what is recorded, it will be a simple matter for the manufacturing system to identify the blank and recreate the key. However if the manufacturer and blank type are not known, it would still be possible for the software system, provided with sufficient information about standard blank types, to identify a standard blank which is suitable to be used for 2D machining of the target key. In this case the system would match basic size and shape parameters of the target key with stored examples and select the closest match or matches.</p>
<p>If necessary the blank could be finally selected by operator intervention.</p>
<p>Even if an exact match could not be found, it would be possible in this way to find a close enough match to allow 2D rather than 3D machining.</p>
<p>Keys could be of metal conventional shapes, or flat plastic/composite material or almost any construction and shape.</p>
<p>In the typical use of the system, a key, or similar, has a micro dot type RFID transponder applied to it in a place where it is not likely to become abraded. This would ideally be a depression in the surface into which the microdot could be inserted so that it did not project physically above the surface of the key. It could be further protected from abrasion or removal by applying a protective covering. Keys for use with the system may be specially constructed to facilitate secure attachment of RFID microdots.</p>
<p>An REID is alternatively placed in or on a key fob attached to the key.</p>
<p>For shape scanning, the key is placed into or near the scanner hardware attached to a host computer by USB port or other connection. The key registration software is activated and the scanner measures the complete or partial profile (3D, pseudo 3D, multiple 2D or 2D) of the item within.</p>
<p>The software then invites the owner/user to define a name for the key or its function which will be unique to that key scan, and save both in memory. The date and any other relevant information such as value will also be recorded. At the same time or alternatively, the system detects and records any RFID signature. The software will then hold the exact unique identification details of the key in perpetuity.</p>
<p>There system optionally incorporates security and confidentiality features. This is at a moderate level, for example password protection, for domestic systems in which the database is retained within the home and mere dimension data is provided to outside agencies for fabricating copies of keys. Levels of security and confidentiality are increased as the items protected by the locking systems become more valuable and as more information relating to keys and their uses is placed in the hands of outside agencies, for example where an agency operates the registration system as well as the key copying system on behalf of customers.</p>
<p>Suitable protection systems are incorporated in the key registration system to implement the necessary level of security.</p>
<p>Registration systems of a kind already exist in relation to certain specialist keys such as car keys for which owners are notified of a code associated with their key when they buy a car and are thereafter able to request repeat copies of the key by reference to the code number. These systems can be incorporated within the present key registration system by incorporating the code and shape information within the database so that a key can be registered by reference to its manufacturers code as well as its 3D shape and copies can be produced by agencies other than the car manufacturer on the basis of this data.</p>
<p>The scanner or RFID unit can have a small, internal power source recharged by connection to a computer or other charger and means such as a sound or light source or a more sophisticated display showing range and/or direction for indicating to the user that a key is in the vicinity. This allows the key retrieval function to operate whilst disconnected from the computer. If a key is missing but its approximate whereabouts are known, the owner can use the scanner or RFID unit, standalone, to locate the key in question. The device may be carried in one hand around the likely location area and be set to electronically search either for any registered key or for the specific key-code within a radius.</p>

Claims (1)

  1. <p>Claims 1. A key registration system for the registration of keys as
    hereinbefore defined, comprising a computer system which interrogates keys and generates from the interrogation of each key, unique identification information relating to the individual key, records the unique identification information as one component of a record relating to the individual key and records further information input by a user, selected from the use and the description of the key as another component of the record relating to the individual key.</p>
    <p>2. A key registration system as claimed in claim 1 in which the unique identification information includes the shape of the key.</p>
    <p>3. A key registration system as claimed in claim 1 or 2 in which the computer system interrogates the key by scanning.</p>
    <p>4. A key registration system as claimed in claim 3 in which the scanning is 3D, pseudo 3D, multiple 2D or 2D scanning.</p>
    <p>5. A key registration system as claimed in claim 3 or 4 in which the scanning is laser scanning.</p>
    <p>6. A key registration system as claimed in any preceding claim in which the computer system interrogates the key by activation and reception of the response of an RFID transponder attached to the key.</p>
    <p>7. A key registration system as claimed in any preceding claim in which the computer system interrogates the key by detection of a visible or magnetic code attached to the key.</p>
    <p>8. A key registration system as claimed in any preceding claim in which once the unique identification information and further information have been recorded, interrogation of a key by the system results in output of the further information corresponding to the unique identification information relating to the individual key.</p>
    <p>9. A key registration system as claimed in any preceding claim in which the interrogation system is able to detect a key at a distance of the order of a few metres to a few tens of metres, which upon detection of a key indicates its presence and optionally also its distance and/or its direction.</p>
    <p>10. A key registration system as claimed in any preceding claim in which the unique identification data is used to produce a copy of the key.</p>
GB0603096A 2006-02-16 2006-02-16 Key registration system Expired - Fee Related GB2435323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0603096A GB2435323B (en) 2006-02-16 2006-02-16 Key registration system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0603096A GB2435323B (en) 2006-02-16 2006-02-16 Key registration system

Publications (3)

Publication Number Publication Date
GB0603096D0 GB0603096D0 (en) 2006-03-29
GB2435323A true GB2435323A (en) 2007-08-22
GB2435323B GB2435323B (en) 2008-11-26

Family

ID=36141925

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0603096A Expired - Fee Related GB2435323B (en) 2006-02-16 2006-02-16 Key registration system

Country Status (1)

Country Link
GB (1) GB2435323B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009019640A1 (en) 2009-04-30 2010-11-04 Volkswagen Ag Spare key manufacturing method for motor vehicle, involves transferring of milling information automatically into control instruction for milling device, and milling key with respect to milling device
WO2013032679A1 (en) * 2011-08-31 2013-03-07 Hy-Ko Products Company Data key and method of using same

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5127534A (en) * 1991-09-13 1992-07-07 Fite Jr Vernley A Moistureproof top for welding rod cans
US6175638B1 (en) * 1996-11-29 2001-01-16 Vladislav Yanovsky Shadow image acquisition device
WO2001057472A1 (en) * 2000-02-01 2001-08-09 Machine Magic Llc Key measurement apparatus and method
US20020022901A1 (en) * 2000-06-02 2002-02-21 Machine Magic, Llc Key identification code and manufacturing method
GB2389576A (en) * 2001-12-31 2003-12-17 David Stuart Smith Key location system
WO2004059598A1 (en) * 2002-12-27 2004-07-15 Koninklijke Philips Electronics N.V. Object identifying method and apparatus
US6895100B1 (en) * 1999-03-05 2005-05-17 Silca S.P.A. Method to identify a key profile, machine to implement the method and apparatus for the duplication of keys utilizing the machine
WO2006031822A2 (en) * 2004-09-10 2006-03-23 Hy-Ko Products Company Radio frequency identification (rfid) system for manufacturing, distribution and retailing of keys

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5127532A (en) * 1988-06-24 1992-07-07 Cimino William J Automatic key identification system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5127534A (en) * 1991-09-13 1992-07-07 Fite Jr Vernley A Moistureproof top for welding rod cans
US6175638B1 (en) * 1996-11-29 2001-01-16 Vladislav Yanovsky Shadow image acquisition device
US6895100B1 (en) * 1999-03-05 2005-05-17 Silca S.P.A. Method to identify a key profile, machine to implement the method and apparatus for the duplication of keys utilizing the machine
WO2001057472A1 (en) * 2000-02-01 2001-08-09 Machine Magic Llc Key measurement apparatus and method
US20020022901A1 (en) * 2000-06-02 2002-02-21 Machine Magic, Llc Key identification code and manufacturing method
GB2389576A (en) * 2001-12-31 2003-12-17 David Stuart Smith Key location system
WO2004059598A1 (en) * 2002-12-27 2004-07-15 Koninklijke Philips Electronics N.V. Object identifying method and apparatus
WO2006031822A2 (en) * 2004-09-10 2006-03-23 Hy-Ko Products Company Radio frequency identification (rfid) system for manufacturing, distribution and retailing of keys

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9963908B2 (en) 2004-09-10 2018-05-08 Hy-Ko Products Company Data key and method of using same
US10480214B2 (en) 2004-09-10 2019-11-19 Hy-Ko Products Company Data key and method of using same
DE102009019640A1 (en) 2009-04-30 2010-11-04 Volkswagen Ag Spare key manufacturing method for motor vehicle, involves transferring of milling information automatically into control instruction for milling device, and milling key with respect to milling device
DE102009019640B4 (en) 2009-04-30 2020-01-16 Volkswagen Ag Method, device and system for producing a key for a vehicle, and method and device for generating milling information for producing a key
WO2013032679A1 (en) * 2011-08-31 2013-03-07 Hy-Ko Products Company Data key and method of using same

Also Published As

Publication number Publication date
GB2435323B (en) 2008-11-26
GB0603096D0 (en) 2006-03-29

Similar Documents

Publication Publication Date Title
US7755482B2 (en) Method and apparatus for toolbox inventory
AU2004264009B2 (en) System for retreiving the owner of a lost article
CN101960896B (en) System and method for streamlined registration of electronic products over a communication network and for verification and management of information related thereto
US20030102970A1 (en) Tool or implement storage system using wireless devices to facilitate tool control
US20140028443A1 (en) Electronically Monitored Safety Lockout Devices, Systems and Methods
US20080183722A1 (en) Registration System
US20040044596A1 (en) Identification tag for fine art registry system
WO2005122069A2 (en) Storing and accessing keys
EP1783570A1 (en) Tool monitoring system
WO2013032679A4 (en) Data key and method of using same
WO2004027702A2 (en) Smart card with onboard authentication facility
JP2012527031A (en) Vehicle automatic identification electronic system and method
CN101123008A (en) Noble dangerous goods monitoring system
CN101297313A (en) System and method for managing physical and electronic documents
AU2021203854A1 (en) Method and System for Isolation Management
US20130117176A1 (en) Key Box Apparatus
CN112232709A (en) Intelligent tool missing detection method and system, electronic equipment and storage medium
GB2435323A (en) Key registration and identification system
JP2007213105A (en) Cabinet control system
EP2116157A2 (en) Transportable control system
CN210307746U (en) Management cabinet
EP2713353B1 (en) System and method for identifying a vehicle
RU2008112161A (en) RF IDENTIFICATION SYSTEM AND SECURITY SYSTEM
JP2004086828A (en) Business model for quality certification and antitheft system for jewel
EP1259936A2 (en) Library system with electronic identification and locking of compact discs

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20110216