US20030226772A1 - Container for securing and uniquely identifying objects - Google Patents
Container for securing and uniquely identifying objects Download PDFInfo
- Publication number
- US20030226772A1 US20030226772A1 US10/162,560 US16256002A US2003226772A1 US 20030226772 A1 US20030226772 A1 US 20030226772A1 US 16256002 A US16256002 A US 16256002A US 2003226772 A1 US2003226772 A1 US 2003226772A1
- Authority
- US
- United States
- Prior art keywords
- container
- control system
- keys
- objects
- panel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 239000002184 metal Substances 0.000 claims abstract 2
- 230000013011 mating Effects 0.000 claims description 4
- 238000001514 detection method Methods 0.000 claims 1
- 239000007787 solid Substances 0.000 claims 1
- 238000000034 method Methods 0.000 description 7
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 4
- 239000010931 gold Substances 0.000 description 4
- 229910052737 gold Inorganic materials 0.000 description 4
- 239000004593 Epoxy Substances 0.000 description 3
- 230000000994 depressogenic effect Effects 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 238000013474 audit trail Methods 0.000 description 1
- 238000005266 casting Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000000284 resting effect Effects 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
Images
Classifications
-
- A—HUMAN NECESSITIES
- A45—HAND OR TRAVELLING ARTICLES
- A45C—PURSES; LUGGAGE; HAND CARRIED BAGS
- A45C11/00—Receptacles for purposes not provided for in groups A45C1/00-A45C9/00
- A45C11/32—Bags or wallets for holding keys
- A45C11/323—Bags or wallets for holding keys with key hangers
Definitions
- This invention relates generally to asset tracking systems and more particularly to uniquely identifiable containers that are capable of being physically secured in a cabinet to protect keys and other objects.
- Controlling access to items such as keys and access cards is one method of managing a wide range of assets such as vehicles, aircraft, boats, commercial property and vacation homes. By controlling the key or access card, you effectively control the asset. As part of the control process, there is a need to selectively limit access to keys and other objects in a way that physically prevents unauthorized access, provides an audit trail of each access to the key or object, and provides notification to management personnel in the event that unauthorized access attempts are made.
- the manual systems may include key hooks and a logbook that is used to manually record each key-out and key-in transaction.
- the limitation of this approach is that the process can be circumvented intentionally, may be inaccurate due to unintentional errors in the recording of key numbers or user's identity, and keys may be difficult to locate if they are not returned to the correct location on the key hook system. Additionally, selectively limiting access to specific keys using a manual key control system must be done via the honor system.
- Automated systems for controlling objects such as keys range considerably. One such system, as disclosed in U.S. Pat. No.
- 5,801,628 can physically restrict access to large sets of keys and can track key-out and key-in transactions for individual keys. While this system can track key movement on a key-by-key basis, its limitation is that each key in a large drawer of keys is not individually secured in place.
- the keys are attached with a rivet to a plastic tag containing a “touch memory device” containing an ID code.
- the tags are inserted into a slotted panel within a drawer, however they are not secured in place. This leaves the keys prone to removal by unauthorized users, prone to tampering with the key identification tags, and even prone to users making molds of the keys since they are exposed to each user with access to the drawer of keys.
- Another such system physically secures keys on a ring (the ring hangs in a key cabinet) and limits removal of keys and rings. However, keys remain exposed and prone to tampering including making a mold of a key.
- another key system secures keys inside of plastic containers that are identified via a bar code. The plastic containers reside on a carousel inside of the key system and are dispensed using a series of multiple motors and other mechanical devices after access is authorized to the specific set of keys. This system is mechanically complex and prone to failure.
- Microprocessor-controlled or personal computer-controlled systems are used as part of many automated asset control systems. A variety of methods are used to identify users, however, the means are generally similar amongst the different systems. The primary differences between automated asset control systems are the methods by which keys are identified, the extent to which keys are exposed to potential threats, and the method by which keys are secured inside of the asset controlling cabinet.
- Bar codes are typically printed on a label and affixed to an object that is attached to a set of keys.
- the disadvantage of this approach is that bar codes can be removed or can become unreadable due to normal wear because they are on a paper medium. Bar codes can be easily counterfeited or duplicated using devices as simple as a copier machine or a standard personal computer.
- bar codes are difficult to scan on a frequent interval when keys are in an enclosed area due to the need to have a bar code reader access the relatively large bar code at a perpendicular angle within a confined space.
- Memory touch devices are more common than bar codes in automated key systems.
- Memory touch devices come in a variety of sizes and offer the advantage that they are rugged, not very prone to failure, they are compact, they are commercially available, they can not be reproduced without sophisticated means, and they can be sensed electronically within the tight confines of a key cabinet.
- a different, yet equally important feature of asset control systems is the method by which assets are secured inside of the cabinet.
- One shortcoming of only securing an entire cabinet or an entire drawer of keys is that an unauthorized key may be removed by anyone gaining access to an entire cabinet or drawer full of keys.
- a user with the lowest privilege level could physically remove keys requiring the highest access privilege if the keys are not individually secured in a cabinet.
- Most automated systems notify administrators of such a security breach. However, at times when administrators can not respond immediately, or the potential liability of the wrong key being accessed is great, allowing the wrong keys to be physically removed from the asset control cabinet is not acceptable. Keys or objects that are individually secured in a cabinet are not prone to accidental removal or removal by those with malicious intent.
- the present invention is for use in securing and uniquely identifying objects such as keys or access control cards in an access control system.
- the invention is generally a rectangular container equipped with lanyards for securing keys.
- the unit contains a unique electronic identification chip and an aperture in the invention to accommodate a latching device that is part of an associated automated access control system.
- the container has a hinged lid with a locking tab. The tab is depressed to open the lid so as to provide access to the contents of the container.
- the invention is used as part of an access control system.
- the rectangular container is dispensed from, and inserted into, a slot in an automated access control system.
- the rectangular container has a beveled edge that mates with a matching bevel in the access control system.
- a bevel on the edge of the container runs nearly ninety percent of the length of the container, thus exposing the bevel from only one end of the container.
- the access control system has a mating bevel that allows the beveled edge of the container to slide into the access control system's slot, however, the non-beveled end of the container cannot be inserted into the system. This configuration limits insertion of the container into the access control system's slot in only one orientation.
- each container is accomplished using a small circuit board that contains the serialized identification chip on one side and a pair of gold contact pads on the reverse side.
- the circuit board is fixed into a tailored groove in the container, secured with epoxy, and a cover is installed on top of the circuit board to prevent tampering.
- the gold contact pads face the rear of the container and are arranged in such as way as to mate with sensing devices that are part of the access control system.
- the contacts are inset from the rear surface of the container. This configuration ensures that electrostatic damage due to contact with surfaces in the environment that are prone to electrostatic discharge cannot occur simply by bumping the flat edge of the container against the statically charged object.
- each slot of the associated access control system there is a mechanism to sense the presence of a container.
- a latching device catches the back of the container and locks it into place.
- two spring-loaded probes from the access control system contact the gold plated circuit board pads located on the rear of the container.
- An electrical connection within the access control system communicates the unique electronic serial identification number to the system's main processor for identifying the incoming container.
- Three lanyards are mounted to the container in a manner that allows the lanyards and associated keys to remain affixed to the container while hanging either inside of the invention or outside of the invention while the hinged lid is closed. That is, the lanyards pivot in such as way as to allow a single key mounted on a lanyard to be used in an application such as a car while the remaining keys remain mounted within the plastic container while the lid is closed. Any combination of the three lanyards/keys can be positioned inside or outside of the container at any given time. Lanyards have a two hundred and seventy degree freedom of motion so as to allow keys to hang freely from the container and facilitate ease-of-use while still affixed to the plastic container.
- the identification chip is not affixed to a plastic tag or other protruding device and therefore can not be easily removed from the container as a means of tampering with the device;
- this unit can be in environments in which un-trusted users will be accessing keys or other objects because viewing of objects can be restricted on an object-by-object basis;
- this unit can be in environments in which un-trusted users will be accessing keys or other objects because access can be restricted on an object-by-object basis;
- FIG. 1-A is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is closed.
- FIG. 1-B is a back, pictoral representation of a container for securing and uniquely identifying objects.
- the hinged lid is open and the plastic cover is shown installed covering the serial identification chip.
- FIG. 1-C is a back, pictoral representation of a container for securing and uniquely identifying objects.
- the hinged lid is open and the plastic cover is shown removed from on top of the serial identification chip.
- the cover is shown as a separate component in this drawing.
- FIG. 2 is a top view of the invention shown without the serial identification chip and without the cover over the identification chip and latch aperture. In this view, the hinged lid is in the open position.
- FIG. 3-A is a top view of the serialized identification chip.
- FIG. 3-B is a side view of the serialized identification chip.
- FIG. 3-C is a pictoral representation of the serialized identification chip.
- FIG. 4-A is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects.
- the hingeable panel is shown in slightly ajar position.
- FIG. 4-B is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects.
- the hingeable panel is shown in a closed position and the snap tongue is shown inserted in the snap slot.
- FIG. 4-C is a side view cut-away, representation of a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in an open position.
- FIG. 4-D is a side view cut-away pictoral, representation of a container for securing and uniquely identifying objects.
- the hingeable panel is shown in a closed position.
- FIG. 5-A is a front, pictoral representation of a container for securing and uniquely identifying objects.
- the container is shown in a vertical orientation.
- the beveled edge used to ensure the container is inserted into the asset control system is shown at the top right.
- FIG. 5-B is a rear, pictoral representation of a container for securing and uniquely identifying objects. In this view, the container is shown in a vertical position.
- FIG. 6-A is a side view of the lanyard used to secure keys and other objects in the container.
- FIG. 6-B is a pictoral, front view of the lanyard used to secure keys and other objects in the container. In this picture, a key is affixed about the lanyard.
- FIG. 6-C is a top view of three lanyards mounted to the container for securing and uniquely identifying objects. Keys are shown affixed about each lanyard.
- FIG. 7-A is a pictoral view of the embodiment of the container with one lanyard mounted to the container and one key attached via the lanyard.
- the hingeable panel is in the open position and the key is hanging outside of the container.
- FIG. 7-B is a pictoral view of the embodiment of the container with three lanyards mounted to the container.
- the hingeable panel is in the closed position and the lanyards are contained on the inside of the container.
- FIG. 7-C is a pictoral view of the embodiment of the container with three lanyards mounted to the container.
- the hingeable panel is in the closed position and one key and its associated lanyard are hanging outside of the container. The remaining two lanyards are contained on the inside of the container.
- FIG. 8-A is a pictoral, front view of the asset control system slot mechanism that receives the container.
- the container is shown oriented in a vertical position in the manner in which the container is inserted into the asset control system.
- FIG. 8-B is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown partially inserted into the slot mechanism of the asset control system.
- FIG. 8-C is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown fully inserted into the slot mechanism of the asset control system.
- FIG. 9-A is a side, cut-away view of the asset control system slot mechanism that receives the container.
- the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has not contacted the latch assembly or the access control system's contact pins.
- FIG. 9-B is a side, cut-away view of the asset control system slot mechanism that receives the plastic container.
- the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has contacted the latch assembly but has not yet contacted the access control system's contact pins.
- FIG. 9-C is a side, cut-away view of the asset control system slot mechanism that receives the container.
- the container for securing and uniquely identifying objects is inserted fully into the asset control system's slot mechanism and the container has been latched in place by the action of the latch assembly and the access control system's contact pins have extended to the point normally occupied by the contact pads on the contact board.
- FIG. 1-A, FIG. 1-B, and FIG. 1-C illustrate a container that embodies principles of the invention in one preferred form.
- the container body comprises a generally rectangular body 01 , formed by a right side panel 02 , a left side panel 03 , a rear panel 04 , a bottom panel 37 , and a front panel 05 (not visible in picture).
- a top panel 06 is attached by an integrated hinge 07 and in FIG. 1-A is shown in the closed position on top of the container body 01 .
- the rear panel 04 is provided with an elongated lanyard opening 14 and lanyard holes 16 , 17 , and 18 , which facilitate mounting of lanyards 40 .
- a contact board aperture 19 in the rear panel 04 exposes the integrated contact board 22 to the sensing devices included as part of the associated asset control system.
- a latch aperture 20 in the rear panel receives the latch that is part of the associated asset control system.
- the right panel 02 includes a snap indenture 10 .
- the snap tongue 11 is shown protruding through the snap slot 13 in the hingeable panel 06 .
- the hingeable panel 06 is pressed down onto the snap tongue 11 resulting in the marriage of the snap tongue 11 into the snap slot 13 .
- the left panel 03 is provided with a container bevel 15 to enforce insertion of the invention into an associated asset control system in one, and only one, orientation.
- FIG. 1B further illustrates the container in one preferred form.
- a top, hingeable panel 06 is attached by a hinge 07 and is shown in the open position on top of the container body 01 .
- a cover plate 21 is shown which encloses the latch cavity 32 and the contact board cavity 48 , which are exposed to the rear of the container.
- FIG. 1C illustrates the mounting mechanism for the cover plate 21 .
- four pins 27 , 28 , 29 , and 30 are shown protruding upward from the aperture wall 09 .
- the pins are cylindrical in shape.
- Mating holes 23 , 24 , 25 , and 26 are shown in the cover plate.
- the cover 21 is snapped in to place by aligning the holes 23 , 24 , 25 , and 26 with pins 27 , 28 , 29 , and 30 respectively.
- the cover is pressed down over the pins and held in place by a tight press fit.
- FIG. 2 illustrates the contact board cavity 48 and the latch cavity 32 .
- the contact board cavity 48 is a slotted opening between the aperture wall 09 and the rear panel 04 .
- the contact board cavity 49 accepts the contact board 22 .
- the electronic serial identification chip 35 shown in FIG. 3-B, is mounted on the front-facing surface of the contact board 22 is accommodated in the rectangular cavity that is part of the larger contact board cavity.
- the contact board 22 is placed into the contact board cavity 48 and an epoxy is filled around the contact board to secure it in place and prevent tampering.
- the latch cavity 32 receives the access control latch 44 that is part of the associated asset control system.
- the rear panel 04 of the container contacts an angled leading edge 49 of a spring-loaded latch 44 .
- the latch is forced downward until the rear edge of the latch head 50 passes the inside wall of the rear panel 04 of the container 01 .
- the spring-loaded latch is forced upward resulting in the rear of the latch head 50 mating with the latching surface of the container's rear panel 31 .
- the container therefore cannot be removed from the asset control system without some action forcing the latch in a downward position.
- An electronic actuation of the latch 44 in a downward motion is a key component of the associated asset control system.
- the asset control system moves the latch head 51 in a downward motion past the point where the top of the latch head 51 meets with the inside surface of the container's rear panel 31 , the container is released from the latching action of the latch and the container is forced out of the slot of the asset control system.
- FIGS. 3 -A, 3 -B, and 3 -C illustrate the contact board 22 that is used to uniquely identify each container.
- One contact board is inserted and affixed in each container.
- a contact board 22 consists of two gold-plated pads 33 and 34 on the external facing side.
- FIG. 3-B shows a side view of the contact board 22 , including gold pads 33 and 34 and an electronic identification chip 35 on the internal facing side. The electronic identification chip 35 is soldered to the contact board 22 .
- FIG. 3-C shows a pictoral view of the top of the contact board 22 .
- FIG. 4-A illustrates the assembly used to hold the panel 06 of the container in a closed position.
- the inside surface of the hinged panel 06 meets the rounded surface of the snap tongue 11 .
- the semi-flexible snap neck 12 assembly is pushed toward the inside of the container so as to allow the smooth snap tongue 11 to slide inside of the panel 06 until the point that the snap tongue 11 reaches the snap slot 13 .
- the snap tongue 11 moves into the snap slot 13 and the semi-flexible snap neck 12 is returned to a non-flexed state. This action secures the panel 06 in to a closed position as shown in FIG. 4-B.
- FIG. 4-C is a side, cut-away view of the snap assembly in an open position.
- FIG. 4-D is a side, cut-away view of the snap assembly in a closed position.
- FIG. 5-A illustrates a front-view of a container with the hingeable panel 06 closed.
- the container is oriented in a position resting on its side panel 02 .
- the container bevel 15 is shown at the top right of the container.
- FIG. 5-B shows a rear view of the container.
- the contact board 22 is visible mounted in the rear of the container.
- lanyards are affixed to the container to facilitate the attachment of keys to the container.
- FIG. 6-A depicts a side view of the lanyard 40 , which is used to physically attach keys to the container 01 .
- FIG. 6-B depicts a front view of the lanyard 40 with a key inserted onto it.
- FIG. 6-C shows one embodiment of the present invention with three lanyards 40 , each containing one key, mounted to the container via the lanyard opening 14 and lanyard hole #1 16 , lanyard hole #2 17 , and lanyard hole #3 18 .
- FIG. 7-A is a pictoral view of a lanyard 40 mounted to a container 01 .
- the hingeable panel 06 is open and the lanyard and associated key are oriented outside of the container body 01 .
- FIG. 7-B depicts the embodiment with three lanyards 40 mounted to the container body 01 .
- the hingeable panel 06 is shown in a closed position and the three lanyards 40 are oriented inside of the container body 01 .
- FIG. 7-C the hingeable panel 06 is shown in a closed position and one of the lanyards 40 and the associated key are shown oriented outside of the container body 01 .
- Two of the lanyards 40 are shown oriented inside of the container body 01 .
- FIG. 8-A is a pictoral depiction of the container body 01 and the container body's 01 relationship to the access control slots 41 which are part of the associated asset control system.
- FIG. 8-A shows the container oriented in a manner which mates the beveled edge of the container 15 with the beveled edge of the access control slot 43 . This is the only orientation in which the container can be inserted into the access control slots 41 .
- FIG. 8-B is a top view of the access control slots 41 and the container body 01 . In FIG. 8-B, the container body 01 is inserted partially into the access control slots 41 . In FIG. 8-C, the container body 01 is inserted fully into the access control slots 41 . In both FIGS. 8 -B and 8 -C, the access control system contact pins 39 are shown.
- FIG. 9-A, FIG. 9-B, and FIG. 9-C show a side-view of the container body 01 as it is inserted into the associated access control system.
- the container body 01 is inserted partially into the asset control slot 41 .
- the container body 01 has not yet reached either the access control latch 44 or the access control contact pins 39 .
- FIG. 9-B the container body 01 has been inserted further into the access control slot 41 and the container body 01 has contacted the access control system latch front edge 49 and the access control latch has begun to be pushed in a downward motion and into the latch cavity 32 .
- the container body 01 has not yet contacted the access control contact pins 39 .
- FIG. 9-C depicts that the container body 01 has been fully inserted into the access control slot 41 .
- the access control latch 44 of the associated asset control system has been inserted into the latch aperture 20 and the access control system latch back edge 50 has mated with the latching surface 31 of the container.
- FIG. 9-C depicts that the access control contact pins 39 have married up with the contact pads 33 and 34 located at the rear of the container thus allowing the access control system to detect the presence of, and identify of, the container body 01 .
- the container for securing and uniquely identifying objects is simple to use and has few parts resulting in high reliability.
- the container secures keys from view and, when used with the associated asset control system, the container secures keys from accidental or unauthorized removal from the asset control system.
- Each container is built so as to allow the container to be re-used over and over again.
- the container and its integrated identification chip are not prone to tampering since the chip is affixed to a circuit board, inserted into a tailored slot, and subsequently glued into place with an epoxy. Keys contained within the container can be used while the lid is closed by simply flipping the lanyard and key out of the container prior to closing the lid.
- the container for securing and uniquely identifying objects has the additional advantages in that
- the container can have other shapes, can be larger in size, and can be equipped with devices to hold other specific items.
Abstract
A container for securing and uniquely identifying objects are provided for use with an asset tracking system of the type having a latching device to physically hold the container in place and to automatically sense the memory device which is part of the container. The container includes a surface for being physically latched in place, a device for securing objects such as keys and includes a circuit board which hosts the memory device. Containers are generally rectangular in shape, but include beveled surface to ensure that they can only be inserted into the asset tracking system in one direction. In one embodiment, the container is equipped with reusable metal lanyards to attach keys to the container.
Description
- Not applicable
- 1. Field of Invention
- This invention relates generally to asset tracking systems and more particularly to uniquely identifiable containers that are capable of being physically secured in a cabinet to protect keys and other objects.
- 2. Description of Prior Art
- Controlling access to items such as keys and access cards is one method of managing a wide range of assets such as vehicles, aircraft, boats, commercial property and vacation homes. By controlling the key or access card, you effectively control the asset. As part of the control process, there is a need to selectively limit access to keys and other objects in a way that physically prevents unauthorized access, provides an audit trail of each access to the key or object, and provides notification to management personnel in the event that unauthorized access attempts are made.
- A wide range of systems exists to control objects such as keys. These systems range from fully manual systems to totally automated systems. The manual systems may include key hooks and a logbook that is used to manually record each key-out and key-in transaction. The limitation of this approach is that the process can be circumvented intentionally, may be inaccurate due to unintentional errors in the recording of key numbers or user's identity, and keys may be difficult to locate if they are not returned to the correct location on the key hook system. Additionally, selectively limiting access to specific keys using a manual key control system must be done via the honor system. Automated systems for controlling objects such as keys range considerably. One such system, as disclosed in U.S. Pat. No. 5,801,628, can physically restrict access to large sets of keys and can track key-out and key-in transactions for individual keys. While this system can track key movement on a key-by-key basis, its limitation is that each key in a large drawer of keys is not individually secured in place. The keys are attached with a rivet to a plastic tag containing a “touch memory device” containing an ID code. The tags are inserted into a slotted panel within a drawer, however they are not secured in place. This leaves the keys prone to removal by unauthorized users, prone to tampering with the key identification tags, and even prone to users making molds of the keys since they are exposed to each user with access to the drawer of keys. Another such system physically secures keys on a ring (the ring hangs in a key cabinet) and limits removal of keys and rings. However, keys remain exposed and prone to tampering including making a mold of a key. Finally, another key system secures keys inside of plastic containers that are identified via a bar code. The plastic containers reside on a carousel inside of the key system and are dispensed using a series of multiple motors and other mechanical devices after access is authorized to the specific set of keys. This system is mechanically complex and prone to failure.
- Microprocessor-controlled or personal computer-controlled systems are used as part of many automated asset control systems. A variety of methods are used to identify users, however, the means are generally similar amongst the different systems. The primary differences between automated asset control systems are the methods by which keys are identified, the extent to which keys are exposed to potential threats, and the method by which keys are secured inside of the asset controlling cabinet.
- Key identification in automated systems is generally accomplished using either a bar code or some type of memory touch device. Bar codes are typically printed on a label and affixed to an object that is attached to a set of keys. The disadvantage of this approach is that bar codes can be removed or can become unreadable due to normal wear because they are on a paper medium. Bar codes can be easily counterfeited or duplicated using devices as simple as a copier machine or a standard personal computer. Finally, bar codes are difficult to scan on a frequent interval when keys are in an enclosed area due to the need to have a bar code reader access the relatively large bar code at a perpendicular angle within a confined space. Memory touch devices are more common than bar codes in automated key systems. Memory touch devices come in a variety of sizes and offer the advantage that they are rugged, not very prone to failure, they are compact, they are commercially available, they can not be reproduced without sophisticated means, and they can be sensed electronically within the tight confines of a key cabinet.
- The environment in which an automated asset control system can be deployed is heavily dependent upon the extent to which the keys are exposed to potential threats. Independent of whether or not a user can physically remove a key, consideration must be given to the extent to which keys are visually or tactilely exposed to unauthorized users. In environments where all of the users are “trusted”, keys may be visible to users that are not allowed to have access to the keys. That is, the keys may be prone to tampering or casting because they are secured in a system in a way that leaves keys exposed on an electronically-controlled key ring or riveted to plastic tags. However, in environments where threats exist, it is much more critical that keys are hidden from view and exposed only to those with permission to access the specific key or object. Keys that are individually stored in a container within a key cabinet are not exposed to the threat.
- A different, yet equally important feature of asset control systems is the method by which assets are secured inside of the cabinet. One shortcoming of only securing an entire cabinet or an entire drawer of keys is that an unauthorized key may be removed by anyone gaining access to an entire cabinet or drawer full of keys. A user with the lowest privilege level could physically remove keys requiring the highest access privilege if the keys are not individually secured in a cabinet. Most automated systems notify administrators of such a security breach. However, at times when administrators can not respond immediately, or the potential liability of the wrong key being accessed is great, allowing the wrong keys to be physically removed from the asset control cabinet is not acceptable. Keys or objects that are individually secured in a cabinet are not prone to accidental removal or removal by those with malicious intent.
- Briefly described, the present invention is for use in securing and uniquely identifying objects such as keys or access control cards in an access control system. The invention is generally a rectangular container equipped with lanyards for securing keys. The unit contains a unique electronic identification chip and an aperture in the invention to accommodate a latching device that is part of an associated automated access control system. The container has a hinged lid with a locking tab. The tab is depressed to open the lid so as to provide access to the contents of the container.
- The invention is used as part of an access control system. The rectangular container is dispensed from, and inserted into, a slot in an automated access control system. To ensure that the invention is always placed into the access control system in the proper orientation, the rectangular container has a beveled edge that mates with a matching bevel in the access control system. A bevel on the edge of the container runs nearly ninety percent of the length of the container, thus exposing the bevel from only one end of the container. The access control system has a mating bevel that allows the beveled edge of the container to slide into the access control system's slot, however, the non-beveled end of the container cannot be inserted into the system. This configuration limits insertion of the container into the access control system's slot in only one orientation.
- The unique identification of each container is accomplished using a small circuit board that contains the serialized identification chip on one side and a pair of gold contact pads on the reverse side. The circuit board is fixed into a tailored groove in the container, secured with epoxy, and a cover is installed on top of the circuit board to prevent tampering. The gold contact pads face the rear of the container and are arranged in such as way as to mate with sensing devices that are part of the access control system. To reduce the risk of electronic chip damage due to electrostatic discharge, the contacts are inset from the rear surface of the container. This configuration ensures that electrostatic damage due to contact with surfaces in the environment that are prone to electrostatic discharge cannot occur simply by bumping the flat edge of the container against the statically charged object.
- In the rear of each slot of the associated access control system, there is a mechanism to sense the presence of a container. As the container is returned to the access control system by sliding the container into a slot, a latching device catches the back of the container and locks it into place. At the point that the container is locked securely into place by the latching device, two spring-loaded probes from the access control system contact the gold plated circuit board pads located on the rear of the container. An electrical connection within the access control system communicates the unique electronic serial identification number to the system's main processor for identifying the incoming container.
- Three lanyards are mounted to the container in a manner that allows the lanyards and associated keys to remain affixed to the container while hanging either inside of the invention or outside of the invention while the hinged lid is closed. That is, the lanyards pivot in such as way as to allow a single key mounted on a lanyard to be used in an application such as a car while the remaining keys remain mounted within the plastic container while the lid is closed. Any combination of the three lanyards/keys can be positioned inside or outside of the container at any given time. Lanyards have a two hundred and seventy degree freedom of motion so as to allow keys to hang freely from the container and facilitate ease-of-use while still affixed to the plastic container.
- These and other objects and advantages of the invention will be apparent from the following detailed description when read with reference to the drawings.
- Accordingly, besides the objects and advantages of the container for securing and uniquely identifying objects in my above patent, several objects and advantages of the present invention are:
- (a) To include an integrated identification device—the identification chip is not affixed to a plastic tag or other protruding device and therefore can not be easily removed from the container as a means of tampering with the device;
- (b) To work with a simple latching mechanism with few moving parts, thereby minimizing the chance of failure;
- (c) To provide a container that hides keys and other objects from view of users that have not been provided access to the specific keys or object—in other words, this unit can be in environments in which un-trusted users will be accessing keys or other objects because viewing of objects can be restricted on an object-by-object basis;
- (d) To provide a container that physically locks keys and other objects in place and prevents unauthorized users from removing the specific keys or object—in other words, this unit can be in environments in which un-trusted users will be accessing keys or other objects because access can be restricted on an object-by-object basis;
- (e) To provide a container that can accommodate keys, but also any other object that fits within the size constraints of the container, particularly objects that are the size of a standard credit card—this facilitates distribution of several items simultaneously such as car keys and a gas credit card;
- (f) To provide a container that can accommodate keys and other objects and be uniquely identified thereby facilitating processing such as billing or access restriction on an object-by-object basis;
- (g) To provide re-usable lanyards for securing keys within the container so as to allow re-use of the container—in other words eliminating recurring costs for the end user are minimized;
- (h) To provide a size and shape that facilitates use of single-use cable ties, in lieu of the re-usable lanyard, to enable users to implement a tamper-proof mechanism for securing keys within the container;
- (i) To provide a container that facilitates the use of the key while it is still physically attached to the uniquely identifiable container so as to eliminate the need to ever remove keys from the container during use.
- (j) To include an integrated, living-hinge such that the container can endure more than 2,500 openings and closing of the hinged panel, thereby reducing the need to replace the containers during normal use.
- Further objects and advantages are to provide a container for securing and uniquely identifying objects which is easy-to-use, is inexpensive to manufacture, which can be made in any color to provide user-specific value, and which protects the serialized identification chip from electrostatic discharge. Still further objects and advantages will become apparent from a consideration of the ensuing description of drawings.
- In the drawings, closely related figures have the same number but different alphabetic suffixes.
- FIG. 1-A is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is closed.
- FIG. 1-B is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is open and the plastic cover is shown installed covering the serial identification chip.
- FIG. 1-C is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is open and the plastic cover is shown removed from on top of the serial identification chip. The cover is shown as a separate component in this drawing.
- FIG. 2 is a top view of the invention shown without the serial identification chip and without the cover over the identification chip and latch aperture. In this view, the hinged lid is in the open position.
- FIG. 3-A is a top view of the serialized identification chip.
- FIG. 3-B is a side view of the serialized identification chip.
- FIG. 3-C is a pictoral representation of the serialized identification chip.
- FIG. 4-A is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in slightly ajar position.
- FIG. 4-B is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in a closed position and the snap tongue is shown inserted in the snap slot.
- FIG. 4-C is a side view cut-away, representation of a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in an open position.
- FIG. 4-D is a side view cut-away pictoral, representation of a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in a closed position.
- FIG. 5-A is a front, pictoral representation of a container for securing and uniquely identifying objects. In this view, the container is shown in a vertical orientation. The beveled edge used to ensure the container is inserted into the asset control system is shown at the top right.
- FIG. 5-B is a rear, pictoral representation of a container for securing and uniquely identifying objects. In this view, the container is shown in a vertical position.
- FIG. 6-A is a side view of the lanyard used to secure keys and other objects in the container.
- FIG. 6-B is a pictoral, front view of the lanyard used to secure keys and other objects in the container. In this picture, a key is affixed about the lanyard.
- FIG. 6-C is a top view of three lanyards mounted to the container for securing and uniquely identifying objects. Keys are shown affixed about each lanyard.
- FIG. 7-A is a pictoral view of the embodiment of the container with one lanyard mounted to the container and one key attached via the lanyard. In this view, the hingeable panel is in the open position and the key is hanging outside of the container.
- FIG. 7-B is a pictoral view of the embodiment of the container with three lanyards mounted to the container. In this view, the hingeable panel is in the closed position and the lanyards are contained on the inside of the container.
- FIG. 7-C is a pictoral view of the embodiment of the container with three lanyards mounted to the container. In this view, the hingeable panel is in the closed position and one key and its associated lanyard are hanging outside of the container. The remaining two lanyards are contained on the inside of the container.
- FIG. 8-A is a pictoral, front view of the asset control system slot mechanism that receives the container. The container is shown oriented in a vertical position in the manner in which the container is inserted into the asset control system.
- FIG. 8-B is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown partially inserted into the slot mechanism of the asset control system.
- FIG. 8-C is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown fully inserted into the slot mechanism of the asset control system.
- FIG. 9-A is a side, cut-away view of the asset control system slot mechanism that receives the container. In this view, the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has not contacted the latch assembly or the access control system's contact pins.
- FIG. 9-B is a side, cut-away view of the asset control system slot mechanism that receives the plastic container. In this view, the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has contacted the latch assembly but has not yet contacted the access control system's contact pins.
- FIG. 9-C is a side, cut-away view of the asset control system slot mechanism that receives the container. In this view, the container for securing and uniquely identifying objects is inserted fully into the asset control system's slot mechanism and the container has been latched in place by the action of the latch assembly and the access control system's contact pins have extended to the point normally occupied by the contact pads on the contact board.
-
01 container body 02 container body right side panel 03 container body left side panel 04 container body rear panel 05 container body front panel 06 hingeable panel 07 hinge 08 container main cavity 09 aperture wall 10 snap indenture 11 snap tongue 12 snap neck 13 snap slot 14 lanyard opening 15 container bevel 16 lanyard hole # 117 lanyard hole #2 18 lanyard hole #3 19 contact board aperture 20 latch aperture 21 cover plate 22 contact board 23 cover hole # 124 cover hole #2 25 cover hole #3 26 cover hole #4 27 cover pin # 128 cover pin #2 29 cover pin #3 30 cover pin #4 31 latching surface 32 latch cavity 33 contact pad # 134 contact pad #2 35 identification chip 36 leads from identification chip 37 container bottom 38 non-beveled “stop” 39 access control system contact pins 40 lanyard 41 access control slot 42 access control slot spring 43 access control bevel 44 access control latch 45 access control system latch pivot 46 access control circuit board 47 access control pivot spring 48 contact board cavity 49 access control system latch front edge 50 access control system latch back edge 51 access control system latch head - Referring now in more detail to the drawings, in which like numerals refer to like arts through the several views, FIG. 1-A, FIG. 1-B, and FIG. 1-C illustrate a container that embodies principles of the invention in one preferred form. In this view, the container body comprises a generally
rectangular body 01, formed by aright side panel 02, aleft side panel 03, arear panel 04, abottom panel 37, and a front panel 05 (not visible in picture). Atop panel 06 is attached by anintegrated hinge 07 and in FIG. 1-A is shown in the closed position on top of thecontainer body 01. - The
rear panel 04 is provided with anelongated lanyard opening 14 and lanyard holes 16, 17, and 18, which facilitate mounting oflanyards 40. Acontact board aperture 19 in therear panel 04 exposes the integratedcontact board 22 to the sensing devices included as part of the associated asset control system. Alatch aperture 20 in the rear panel receives the latch that is part of the associated asset control system. - The
right panel 02 includes asnap indenture 10. In FIG. 1-A thesnap tongue 11 is shown protruding through thesnap slot 13 in thehingeable panel 06. In use, thehingeable panel 06 is pressed down onto thesnap tongue 11 resulting in the marriage of thesnap tongue 11 into thesnap slot 13. - The
left panel 03 is provided with acontainer bevel 15 to enforce insertion of the invention into an associated asset control system in one, and only one, orientation. - FIG. 1B further illustrates the container in one preferred form. A top,
hingeable panel 06 is attached by ahinge 07 and is shown in the open position on top of thecontainer body 01. Acover plate 21 is shown which encloses thelatch cavity 32 and thecontact board cavity 48, which are exposed to the rear of the container. - FIG. 1C illustrates the mounting mechanism for the
cover plate 21. Here, fourpins aperture wall 09. The pins are cylindrical in shape. Mating holes 23, 24, 25, and 26 are shown in the cover plate. In use, thecover 21 is snapped in to place by aligning theholes pins - FIG. 2 illustrates the
contact board cavity 48 and thelatch cavity 32. Thecontact board cavity 48 is a slotted opening between theaperture wall 09 and therear panel 04. The contact board cavity 49 accepts thecontact board 22. When inserted into the contact board cavity, thecontact pads contact board aperture 19 to the rear of the container. The electronicserial identification chip 35, shown in FIG. 3-B, is mounted on the front-facing surface of thecontact board 22 is accommodated in the rectangular cavity that is part of the larger contact board cavity. In use, thecontact board 22 is placed into thecontact board cavity 48 and an epoxy is filled around the contact board to secure it in place and prevent tampering. - The
latch cavity 32 receives theaccess control latch 44 that is part of the associated asset control system. In use, as the container is inserted into the slot of the associated asset control system, therear panel 04 of the container contacts an angled leading edge 49 of a spring-loadedlatch 44. As the container is inserted further into the asset control system, the latch is forced downward until the rear edge of thelatch head 50 passes the inside wall of therear panel 04 of thecontainer 01. At such a point, the spring-loaded latch is forced upward resulting in the rear of thelatch head 50 mating with the latching surface of the container'srear panel 31. The container therefore cannot be removed from the asset control system without some action forcing the latch in a downward position. An electronic actuation of thelatch 44 in a downward motion is a key component of the associated asset control system. When the asset control system moves the latch head 51 in a downward motion past the point where the top of the latch head 51 meets with the inside surface of the container'srear panel 31, the container is released from the latching action of the latch and the container is forced out of the slot of the asset control system. - FIGS.3-A, 3-B, and 3-C illustrate the
contact board 22 that is used to uniquely identify each container. One contact board is inserted and affixed in each container. As shown in FIG. 3-A, acontact board 22 consists of two gold-platedpads contact board 22, includinggold pads electronic identification chip 35 on the internal facing side. Theelectronic identification chip 35 is soldered to thecontact board 22. FIG. 3-C shows a pictoral view of the top of thecontact board 22. - FIG. 4-A illustrates the assembly used to hold the
panel 06 of the container in a closed position. As the hingedpanel 06 is closed, the inside surface of the hingedpanel 06 meets the rounded surface of thesnap tongue 11. As the hinged panel is pushed all of the way to the closed position, thesemi-flexible snap neck 12 assembly is pushed toward the inside of the container so as to allow thesmooth snap tongue 11 to slide inside of thepanel 06 until the point that thesnap tongue 11 reaches thesnap slot 13. Once thesnap tongue 11 reaches the snap slot13, thesnap tongue 11 moves into thesnap slot 13 and thesemi-flexible snap neck 12 is returned to a non-flexed state. This action secures thepanel 06 in to a closed position as shown in FIG. 4-B. To affect the opening of thepanel 06, thesnap indenture 10 must be depressed to the point that thesnap tongue 11 disengages from thesnap slot 13 located on thepanel 06. Once disengaged, the upward force from thehinge 07 of the container raises thehingeablepanel 06 to an open position. FIG. 4-C is a side, cut-away view of the snap assembly in an open position. FIG. 4-D is a side, cut-away view of the snap assembly in a closed position. - FIG. 5-A illustrates a front-view of a container with the
hingeable panel 06 closed. The container is oriented in a position resting on itsside panel 02. Thecontainer bevel 15 is shown at the top right of the container. FIG. 5-B shows a rear view of the container. Thecontact board 22 is visible mounted in the rear of the container. - Additional Embodiment—FIGS. 6,7
- In another preferred embodiment, lanyards are affixed to the container to facilitate the attachment of keys to the container.
- FIG. 6-A depicts a side view of the
lanyard 40, which is used to physically attach keys to thecontainer 01. FIG. 6-B depicts a front view of thelanyard 40 with a key inserted onto it. FIG. 6-C shows one embodiment of the present invention with threelanyards 40, each containing one key, mounted to the container via thelanyard opening 14 andlanyard hole # 1 16, lanyard hole #2 17, and lanyard hole #3 18. - FIG. 7-A is a pictoral view of a
lanyard 40 mounted to acontainer 01. In FIG. 7-A, thehingeable panel 06 is open and the lanyard and associated key are oriented outside of thecontainer body 01. FIG. 7-B depicts the embodiment with threelanyards 40 mounted to thecontainer body 01. In FIG. 7-B, thehingeable panel 06 is shown in a closed position and the threelanyards 40 are oriented inside of thecontainer body 01. In FIG. 7-C, thehingeable panel 06 is shown in a closed position and one of thelanyards 40 and the associated key are shown oriented outside of thecontainer body 01. Two of thelanyards 40 are shown oriented inside of thecontainer body 01. - Operation—FIGS.8-9
- FIG. 8-A is a pictoral depiction of the
container body 01 and the container body's 01 relationship to theaccess control slots 41 which are part of the associated asset control system. FIG. 8-A shows the container oriented in a manner which mates the beveled edge of thecontainer 15 with the beveled edge of theaccess control slot 43. This is the only orientation in which the container can be inserted into theaccess control slots 41. FIG. 8-B is a top view of theaccess control slots 41 and thecontainer body 01. In FIG. 8-B, thecontainer body 01 is inserted partially into theaccess control slots 41. In FIG. 8-C, thecontainer body 01 is inserted fully into theaccess control slots 41. In both FIGS. 8-B and 8-C, the access control system contact pins 39 are shown. - FIG. 9-A, FIG. 9-B, and FIG. 9-C show a side-view of the
container body 01 as it is inserted into the associated access control system. In FIG. 9-A, thecontainer body 01 is inserted partially into theasset control slot 41. In FIG. 9-A, thecontainer body 01 has not yet reached either theaccess control latch 44 or the access control contact pins 39. - In FIG. 9-B, the
container body 01 has been inserted further into theaccess control slot 41 and thecontainer body 01 has contacted the access control system latch front edge 49 and the access control latch has begun to be pushed in a downward motion and into thelatch cavity 32. In FIG. 9-B, thecontainer body 01 has not yet contacted the access control contact pins 39. - Finally, in FIG. 9-C, the
container body 01 has been fully inserted into theaccess control slot 41. Theaccess control latch 44 of the associated asset control system has been inserted into thelatch aperture 20 and the access control system latch backedge 50 has mated with the latchingsurface 31 of the container. Additionally, FIG. 9-C depicts that the access control contact pins 39 have married up with thecontact pads container body 01. - Conclusion, Ramifications, and Scope
- Accordingly, the reader will see the container for securing and uniquely identifying objects is simple to use and has few parts resulting in high reliability. The container secures keys from view and, when used with the associated asset control system, the container secures keys from accidental or unauthorized removal from the asset control system. Each container is built so as to allow the container to be re-used over and over again. The container and its integrated identification chip are not prone to tampering since the chip is affixed to a circuit board, inserted into a tailored slot, and subsequently glued into place with an epoxy. Keys contained within the container can be used while the lid is closed by simply flipping the lanyard and key out of the container prior to closing the lid. Further, the container for securing and uniquely identifying objects has the additional advantages in that
- It can be manufactured in a variety of colors so as to allow end-users to secure objects with different access levels in different colored containers
- It can be manufactured using low-cost plastic molds
- It has a life expectancy of at least 2,500 openings and closings, thereby reducing the need to replace the units frequently
- It can be used to distribute many types of objects to users with varying access privileges when used in conjunction with the associated asset control system.
- Although the description above contains much specificity, these specifications should not be construed as limiting the scope of the invention but merely providing illustrations of some of the presently preferred embodiments of this invention. For example, the container can have other shapes, can be larger in size, and can be equipped with devices to hold other specific items.
- Thus, the scope of the invention should be determined by the appended claims and their legal equivalents, rather than by the examples given.
Claims (5)
1. A container for holding objects in an asset control system, comprising:
(a) an opening for accessing the interior of the container
(b) a panel covering said opening having a mechanism for retaining said panel in a closed position whereby loose objects can be stored in the container
(c) an aperture having clearance for receiving the latching device provided as part of the asset control system
(d) a solid surface for mating with said latching device whereby the container can be secured in the asset control system by the latching device of the asset control system
(e) conductive pads with an attached identification device mounted within said container in such as way as to be accessible from the exterior of the container for detection and identification by said asset control system whereby said container can be uniquely identified by the asset control system
2. A container assembly as claimed in 1 and wherein said panel is attached to said container along one edge of the container and the panel is hingeable between a closed position and an open position
3. A container assembly as claimed in 1 wherein a plurality of holes is formed to receive fastening devices for securing objects to said container
4. A container assembly as claimed in 3 wherein the fastening device used to secure objects to the container is a metal lanyard whereby objects can be attached to and removed from the said lanyard
5. A container assembly as claimed in 3 wherein the fastening device used to secure objects to the container is a ratcheting plastic device whereby said ratcheting plastic device is designed for a single use and removal of an object from the ratcheting plastic device renders the ratcheting plastic device unusable.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/162,560 US20030226772A1 (en) | 2002-06-06 | 2002-06-06 | Container for securing and uniquely identifying objects |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/162,560 US20030226772A1 (en) | 2002-06-06 | 2002-06-06 | Container for securing and uniquely identifying objects |
Publications (1)
Publication Number | Publication Date |
---|---|
US20030226772A1 true US20030226772A1 (en) | 2003-12-11 |
Family
ID=29709837
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/162,560 Abandoned US20030226772A1 (en) | 2002-06-06 | 2002-06-06 | Container for securing and uniquely identifying objects |
Country Status (1)
Country | Link |
---|---|
US (1) | US20030226772A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090000343A1 (en) * | 2005-12-20 | 2009-01-01 | Valeo Securite Habitacle | Device for Positioning and Holding an Emergency Key |
US20100155471A1 (en) * | 2008-12-23 | 2010-06-24 | Ncr Corporation | Method and apparatus for automated access control system |
WO2019132664A1 (en) | 2017-12-29 | 2019-07-04 | R.J. Van Geer Beheer Bv | Key attachment system for butterfly type wallet |
CN110900548A (en) * | 2018-06-01 | 2020-03-24 | Ftc欧洲有限责任公司 | Tool box |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2849044A (en) * | 1957-03-19 | 1958-08-26 | Drescher & Kiefer | Key case |
US2886396A (en) * | 1958-01-24 | 1959-05-12 | American Telephone & Telegraph | Drawer for storage of keys |
US3371975A (en) * | 1967-02-21 | 1968-03-05 | Henry E. Meltzer | Cooling and carrying box for electric tools and appliances |
US4236463A (en) * | 1979-05-14 | 1980-12-02 | Westcott Randy L | Tamper proof case for the protection of sensitive papers |
US5871100A (en) * | 1995-12-22 | 1999-02-16 | Rayovac Corporation | Security battery package |
US6195005B1 (en) * | 1998-09-11 | 2001-02-27 | Key-Trak, Inc. | Object carriers for an object control and tracking system |
-
2002
- 2002-06-06 US US10/162,560 patent/US20030226772A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2849044A (en) * | 1957-03-19 | 1958-08-26 | Drescher & Kiefer | Key case |
US2886396A (en) * | 1958-01-24 | 1959-05-12 | American Telephone & Telegraph | Drawer for storage of keys |
US3371975A (en) * | 1967-02-21 | 1968-03-05 | Henry E. Meltzer | Cooling and carrying box for electric tools and appliances |
US4236463A (en) * | 1979-05-14 | 1980-12-02 | Westcott Randy L | Tamper proof case for the protection of sensitive papers |
US5871100A (en) * | 1995-12-22 | 1999-02-16 | Rayovac Corporation | Security battery package |
US6195005B1 (en) * | 1998-09-11 | 2001-02-27 | Key-Trak, Inc. | Object carriers for an object control and tracking system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090000343A1 (en) * | 2005-12-20 | 2009-01-01 | Valeo Securite Habitacle | Device for Positioning and Holding an Emergency Key |
US8225634B2 (en) * | 2005-12-20 | 2012-07-24 | Valeo Securite Habitacle | Device for positioning and holding an emergency key |
US20100155471A1 (en) * | 2008-12-23 | 2010-06-24 | Ncr Corporation | Method and apparatus for automated access control system |
US8191781B2 (en) * | 2008-12-23 | 2012-06-05 | Ncr Corporation | Method and apparatus for automated access control system |
WO2019132664A1 (en) | 2017-12-29 | 2019-07-04 | R.J. Van Geer Beheer Bv | Key attachment system for butterfly type wallet |
CN110900548A (en) * | 2018-06-01 | 2020-03-24 | Ftc欧洲有限责任公司 | Tool box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8661861B2 (en) | Dual locking system for integrated zipper lock | |
US4918952A (en) | Computer data drive locking device | |
US5361610A (en) | Totelock | |
US9245702B1 (en) | Keypad having tamper-resistant keys | |
US8758033B2 (en) | Blockout device for USB port | |
US20080210577A1 (en) | Safety lock box and key organization unit | |
CA2102923A1 (en) | Method and apparatus for a lockable, removable cassette | |
US20080258869A1 (en) | Electronic Key-Management System | |
AU671632B2 (en) | Magnetic locks | |
EP1212663B1 (en) | A method and an apparatus for identification and control of handling of keys and the like | |
US20030226772A1 (en) | Container for securing and uniquely identifying objects | |
US4636781A (en) | Housing for data terminal device | |
JP2007062262A (en) | Seal device | |
US6885558B2 (en) | Electronic apparatus having housing to contain components and door supported by housing | |
US4258253A (en) | Cartridge assembly for data-sensing system | |
US11429755B2 (en) | Intrusion switch | |
US7317401B2 (en) | Method and mechanical tamper-evident case fastener | |
US20160265251A1 (en) | Emergency access mechanism for a cash drawer | |
CN111418961A (en) | Key ring, management device, management method, management system, and storage medium | |
NL9201727A (en) | IDENTIFIER FOR A LOCKING SYSTEM. | |
TWI373549B (en) | Combination lock | |
JP6010202B2 (en) | Key management machine and key management system | |
CN212488793U (en) | Key ring and key ring management device | |
NL9201834A (en) | Theft protection system. | |
US20230126812A1 (en) | Electronic payment device with means for blocking access to a data storage module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |