US20030226772A1 - Container for securing and uniquely identifying objects - Google Patents

Container for securing and uniquely identifying objects Download PDF

Info

Publication number
US20030226772A1
US20030226772A1 US10/162,560 US16256002A US2003226772A1 US 20030226772 A1 US20030226772 A1 US 20030226772A1 US 16256002 A US16256002 A US 16256002A US 2003226772 A1 US2003226772 A1 US 2003226772A1
Authority
US
United States
Prior art keywords
container
control system
keys
objects
panel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/162,560
Inventor
Edwin Smith
Ronald Wilder
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/162,560 priority Critical patent/US20030226772A1/en
Publication of US20030226772A1 publication Critical patent/US20030226772A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A45HAND OR TRAVELLING ARTICLES
    • A45CPURSES; LUGGAGE; HAND CARRIED BAGS
    • A45C11/00Receptacles for purposes not provided for in groups A45C1/00-A45C9/00
    • A45C11/32Bags or wallets for holding keys
    • A45C11/323Bags or wallets for holding keys with key hangers

Definitions

  • This invention relates generally to asset tracking systems and more particularly to uniquely identifiable containers that are capable of being physically secured in a cabinet to protect keys and other objects.
  • Controlling access to items such as keys and access cards is one method of managing a wide range of assets such as vehicles, aircraft, boats, commercial property and vacation homes. By controlling the key or access card, you effectively control the asset. As part of the control process, there is a need to selectively limit access to keys and other objects in a way that physically prevents unauthorized access, provides an audit trail of each access to the key or object, and provides notification to management personnel in the event that unauthorized access attempts are made.
  • the manual systems may include key hooks and a logbook that is used to manually record each key-out and key-in transaction.
  • the limitation of this approach is that the process can be circumvented intentionally, may be inaccurate due to unintentional errors in the recording of key numbers or user's identity, and keys may be difficult to locate if they are not returned to the correct location on the key hook system. Additionally, selectively limiting access to specific keys using a manual key control system must be done via the honor system.
  • Automated systems for controlling objects such as keys range considerably. One such system, as disclosed in U.S. Pat. No.
  • 5,801,628 can physically restrict access to large sets of keys and can track key-out and key-in transactions for individual keys. While this system can track key movement on a key-by-key basis, its limitation is that each key in a large drawer of keys is not individually secured in place.
  • the keys are attached with a rivet to a plastic tag containing a “touch memory device” containing an ID code.
  • the tags are inserted into a slotted panel within a drawer, however they are not secured in place. This leaves the keys prone to removal by unauthorized users, prone to tampering with the key identification tags, and even prone to users making molds of the keys since they are exposed to each user with access to the drawer of keys.
  • Another such system physically secures keys on a ring (the ring hangs in a key cabinet) and limits removal of keys and rings. However, keys remain exposed and prone to tampering including making a mold of a key.
  • another key system secures keys inside of plastic containers that are identified via a bar code. The plastic containers reside on a carousel inside of the key system and are dispensed using a series of multiple motors and other mechanical devices after access is authorized to the specific set of keys. This system is mechanically complex and prone to failure.
  • Microprocessor-controlled or personal computer-controlled systems are used as part of many automated asset control systems. A variety of methods are used to identify users, however, the means are generally similar amongst the different systems. The primary differences between automated asset control systems are the methods by which keys are identified, the extent to which keys are exposed to potential threats, and the method by which keys are secured inside of the asset controlling cabinet.
  • Bar codes are typically printed on a label and affixed to an object that is attached to a set of keys.
  • the disadvantage of this approach is that bar codes can be removed or can become unreadable due to normal wear because they are on a paper medium. Bar codes can be easily counterfeited or duplicated using devices as simple as a copier machine or a standard personal computer.
  • bar codes are difficult to scan on a frequent interval when keys are in an enclosed area due to the need to have a bar code reader access the relatively large bar code at a perpendicular angle within a confined space.
  • Memory touch devices are more common than bar codes in automated key systems.
  • Memory touch devices come in a variety of sizes and offer the advantage that they are rugged, not very prone to failure, they are compact, they are commercially available, they can not be reproduced without sophisticated means, and they can be sensed electronically within the tight confines of a key cabinet.
  • a different, yet equally important feature of asset control systems is the method by which assets are secured inside of the cabinet.
  • One shortcoming of only securing an entire cabinet or an entire drawer of keys is that an unauthorized key may be removed by anyone gaining access to an entire cabinet or drawer full of keys.
  • a user with the lowest privilege level could physically remove keys requiring the highest access privilege if the keys are not individually secured in a cabinet.
  • Most automated systems notify administrators of such a security breach. However, at times when administrators can not respond immediately, or the potential liability of the wrong key being accessed is great, allowing the wrong keys to be physically removed from the asset control cabinet is not acceptable. Keys or objects that are individually secured in a cabinet are not prone to accidental removal or removal by those with malicious intent.
  • the present invention is for use in securing and uniquely identifying objects such as keys or access control cards in an access control system.
  • the invention is generally a rectangular container equipped with lanyards for securing keys.
  • the unit contains a unique electronic identification chip and an aperture in the invention to accommodate a latching device that is part of an associated automated access control system.
  • the container has a hinged lid with a locking tab. The tab is depressed to open the lid so as to provide access to the contents of the container.
  • the invention is used as part of an access control system.
  • the rectangular container is dispensed from, and inserted into, a slot in an automated access control system.
  • the rectangular container has a beveled edge that mates with a matching bevel in the access control system.
  • a bevel on the edge of the container runs nearly ninety percent of the length of the container, thus exposing the bevel from only one end of the container.
  • the access control system has a mating bevel that allows the beveled edge of the container to slide into the access control system's slot, however, the non-beveled end of the container cannot be inserted into the system. This configuration limits insertion of the container into the access control system's slot in only one orientation.
  • each container is accomplished using a small circuit board that contains the serialized identification chip on one side and a pair of gold contact pads on the reverse side.
  • the circuit board is fixed into a tailored groove in the container, secured with epoxy, and a cover is installed on top of the circuit board to prevent tampering.
  • the gold contact pads face the rear of the container and are arranged in such as way as to mate with sensing devices that are part of the access control system.
  • the contacts are inset from the rear surface of the container. This configuration ensures that electrostatic damage due to contact with surfaces in the environment that are prone to electrostatic discharge cannot occur simply by bumping the flat edge of the container against the statically charged object.
  • each slot of the associated access control system there is a mechanism to sense the presence of a container.
  • a latching device catches the back of the container and locks it into place.
  • two spring-loaded probes from the access control system contact the gold plated circuit board pads located on the rear of the container.
  • An electrical connection within the access control system communicates the unique electronic serial identification number to the system's main processor for identifying the incoming container.
  • Three lanyards are mounted to the container in a manner that allows the lanyards and associated keys to remain affixed to the container while hanging either inside of the invention or outside of the invention while the hinged lid is closed. That is, the lanyards pivot in such as way as to allow a single key mounted on a lanyard to be used in an application such as a car while the remaining keys remain mounted within the plastic container while the lid is closed. Any combination of the three lanyards/keys can be positioned inside or outside of the container at any given time. Lanyards have a two hundred and seventy degree freedom of motion so as to allow keys to hang freely from the container and facilitate ease-of-use while still affixed to the plastic container.
  • the identification chip is not affixed to a plastic tag or other protruding device and therefore can not be easily removed from the container as a means of tampering with the device;
  • this unit can be in environments in which un-trusted users will be accessing keys or other objects because viewing of objects can be restricted on an object-by-object basis;
  • this unit can be in environments in which un-trusted users will be accessing keys or other objects because access can be restricted on an object-by-object basis;
  • FIG. 1-A is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is closed.
  • FIG. 1-B is a back, pictoral representation of a container for securing and uniquely identifying objects.
  • the hinged lid is open and the plastic cover is shown installed covering the serial identification chip.
  • FIG. 1-C is a back, pictoral representation of a container for securing and uniquely identifying objects.
  • the hinged lid is open and the plastic cover is shown removed from on top of the serial identification chip.
  • the cover is shown as a separate component in this drawing.
  • FIG. 2 is a top view of the invention shown without the serial identification chip and without the cover over the identification chip and latch aperture. In this view, the hinged lid is in the open position.
  • FIG. 3-A is a top view of the serialized identification chip.
  • FIG. 3-B is a side view of the serialized identification chip.
  • FIG. 3-C is a pictoral representation of the serialized identification chip.
  • FIG. 4-A is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects.
  • the hingeable panel is shown in slightly ajar position.
  • FIG. 4-B is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects.
  • the hingeable panel is shown in a closed position and the snap tongue is shown inserted in the snap slot.
  • FIG. 4-C is a side view cut-away, representation of a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in an open position.
  • FIG. 4-D is a side view cut-away pictoral, representation of a container for securing and uniquely identifying objects.
  • the hingeable panel is shown in a closed position.
  • FIG. 5-A is a front, pictoral representation of a container for securing and uniquely identifying objects.
  • the container is shown in a vertical orientation.
  • the beveled edge used to ensure the container is inserted into the asset control system is shown at the top right.
  • FIG. 5-B is a rear, pictoral representation of a container for securing and uniquely identifying objects. In this view, the container is shown in a vertical position.
  • FIG. 6-A is a side view of the lanyard used to secure keys and other objects in the container.
  • FIG. 6-B is a pictoral, front view of the lanyard used to secure keys and other objects in the container. In this picture, a key is affixed about the lanyard.
  • FIG. 6-C is a top view of three lanyards mounted to the container for securing and uniquely identifying objects. Keys are shown affixed about each lanyard.
  • FIG. 7-A is a pictoral view of the embodiment of the container with one lanyard mounted to the container and one key attached via the lanyard.
  • the hingeable panel is in the open position and the key is hanging outside of the container.
  • FIG. 7-B is a pictoral view of the embodiment of the container with three lanyards mounted to the container.
  • the hingeable panel is in the closed position and the lanyards are contained on the inside of the container.
  • FIG. 7-C is a pictoral view of the embodiment of the container with three lanyards mounted to the container.
  • the hingeable panel is in the closed position and one key and its associated lanyard are hanging outside of the container. The remaining two lanyards are contained on the inside of the container.
  • FIG. 8-A is a pictoral, front view of the asset control system slot mechanism that receives the container.
  • the container is shown oriented in a vertical position in the manner in which the container is inserted into the asset control system.
  • FIG. 8-B is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown partially inserted into the slot mechanism of the asset control system.
  • FIG. 8-C is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown fully inserted into the slot mechanism of the asset control system.
  • FIG. 9-A is a side, cut-away view of the asset control system slot mechanism that receives the container.
  • the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has not contacted the latch assembly or the access control system's contact pins.
  • FIG. 9-B is a side, cut-away view of the asset control system slot mechanism that receives the plastic container.
  • the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has contacted the latch assembly but has not yet contacted the access control system's contact pins.
  • FIG. 9-C is a side, cut-away view of the asset control system slot mechanism that receives the container.
  • the container for securing and uniquely identifying objects is inserted fully into the asset control system's slot mechanism and the container has been latched in place by the action of the latch assembly and the access control system's contact pins have extended to the point normally occupied by the contact pads on the contact board.
  • FIG. 1-A, FIG. 1-B, and FIG. 1-C illustrate a container that embodies principles of the invention in one preferred form.
  • the container body comprises a generally rectangular body 01 , formed by a right side panel 02 , a left side panel 03 , a rear panel 04 , a bottom panel 37 , and a front panel 05 (not visible in picture).
  • a top panel 06 is attached by an integrated hinge 07 and in FIG. 1-A is shown in the closed position on top of the container body 01 .
  • the rear panel 04 is provided with an elongated lanyard opening 14 and lanyard holes 16 , 17 , and 18 , which facilitate mounting of lanyards 40 .
  • a contact board aperture 19 in the rear panel 04 exposes the integrated contact board 22 to the sensing devices included as part of the associated asset control system.
  • a latch aperture 20 in the rear panel receives the latch that is part of the associated asset control system.
  • the right panel 02 includes a snap indenture 10 .
  • the snap tongue 11 is shown protruding through the snap slot 13 in the hingeable panel 06 .
  • the hingeable panel 06 is pressed down onto the snap tongue 11 resulting in the marriage of the snap tongue 11 into the snap slot 13 .
  • the left panel 03 is provided with a container bevel 15 to enforce insertion of the invention into an associated asset control system in one, and only one, orientation.
  • FIG. 1B further illustrates the container in one preferred form.
  • a top, hingeable panel 06 is attached by a hinge 07 and is shown in the open position on top of the container body 01 .
  • a cover plate 21 is shown which encloses the latch cavity 32 and the contact board cavity 48 , which are exposed to the rear of the container.
  • FIG. 1C illustrates the mounting mechanism for the cover plate 21 .
  • four pins 27 , 28 , 29 , and 30 are shown protruding upward from the aperture wall 09 .
  • the pins are cylindrical in shape.
  • Mating holes 23 , 24 , 25 , and 26 are shown in the cover plate.
  • the cover 21 is snapped in to place by aligning the holes 23 , 24 , 25 , and 26 with pins 27 , 28 , 29 , and 30 respectively.
  • the cover is pressed down over the pins and held in place by a tight press fit.
  • FIG. 2 illustrates the contact board cavity 48 and the latch cavity 32 .
  • the contact board cavity 48 is a slotted opening between the aperture wall 09 and the rear panel 04 .
  • the contact board cavity 49 accepts the contact board 22 .
  • the electronic serial identification chip 35 shown in FIG. 3-B, is mounted on the front-facing surface of the contact board 22 is accommodated in the rectangular cavity that is part of the larger contact board cavity.
  • the contact board 22 is placed into the contact board cavity 48 and an epoxy is filled around the contact board to secure it in place and prevent tampering.
  • the latch cavity 32 receives the access control latch 44 that is part of the associated asset control system.
  • the rear panel 04 of the container contacts an angled leading edge 49 of a spring-loaded latch 44 .
  • the latch is forced downward until the rear edge of the latch head 50 passes the inside wall of the rear panel 04 of the container 01 .
  • the spring-loaded latch is forced upward resulting in the rear of the latch head 50 mating with the latching surface of the container's rear panel 31 .
  • the container therefore cannot be removed from the asset control system without some action forcing the latch in a downward position.
  • An electronic actuation of the latch 44 in a downward motion is a key component of the associated asset control system.
  • the asset control system moves the latch head 51 in a downward motion past the point where the top of the latch head 51 meets with the inside surface of the container's rear panel 31 , the container is released from the latching action of the latch and the container is forced out of the slot of the asset control system.
  • FIGS. 3 -A, 3 -B, and 3 -C illustrate the contact board 22 that is used to uniquely identify each container.
  • One contact board is inserted and affixed in each container.
  • a contact board 22 consists of two gold-plated pads 33 and 34 on the external facing side.
  • FIG. 3-B shows a side view of the contact board 22 , including gold pads 33 and 34 and an electronic identification chip 35 on the internal facing side. The electronic identification chip 35 is soldered to the contact board 22 .
  • FIG. 3-C shows a pictoral view of the top of the contact board 22 .
  • FIG. 4-A illustrates the assembly used to hold the panel 06 of the container in a closed position.
  • the inside surface of the hinged panel 06 meets the rounded surface of the snap tongue 11 .
  • the semi-flexible snap neck 12 assembly is pushed toward the inside of the container so as to allow the smooth snap tongue 11 to slide inside of the panel 06 until the point that the snap tongue 11 reaches the snap slot 13 .
  • the snap tongue 11 moves into the snap slot 13 and the semi-flexible snap neck 12 is returned to a non-flexed state. This action secures the panel 06 in to a closed position as shown in FIG. 4-B.
  • FIG. 4-C is a side, cut-away view of the snap assembly in an open position.
  • FIG. 4-D is a side, cut-away view of the snap assembly in a closed position.
  • FIG. 5-A illustrates a front-view of a container with the hingeable panel 06 closed.
  • the container is oriented in a position resting on its side panel 02 .
  • the container bevel 15 is shown at the top right of the container.
  • FIG. 5-B shows a rear view of the container.
  • the contact board 22 is visible mounted in the rear of the container.
  • lanyards are affixed to the container to facilitate the attachment of keys to the container.
  • FIG. 6-A depicts a side view of the lanyard 40 , which is used to physically attach keys to the container 01 .
  • FIG. 6-B depicts a front view of the lanyard 40 with a key inserted onto it.
  • FIG. 6-C shows one embodiment of the present invention with three lanyards 40 , each containing one key, mounted to the container via the lanyard opening 14 and lanyard hole #1 16 , lanyard hole #2 17 , and lanyard hole #3 18 .
  • FIG. 7-A is a pictoral view of a lanyard 40 mounted to a container 01 .
  • the hingeable panel 06 is open and the lanyard and associated key are oriented outside of the container body 01 .
  • FIG. 7-B depicts the embodiment with three lanyards 40 mounted to the container body 01 .
  • the hingeable panel 06 is shown in a closed position and the three lanyards 40 are oriented inside of the container body 01 .
  • FIG. 7-C the hingeable panel 06 is shown in a closed position and one of the lanyards 40 and the associated key are shown oriented outside of the container body 01 .
  • Two of the lanyards 40 are shown oriented inside of the container body 01 .
  • FIG. 8-A is a pictoral depiction of the container body 01 and the container body's 01 relationship to the access control slots 41 which are part of the associated asset control system.
  • FIG. 8-A shows the container oriented in a manner which mates the beveled edge of the container 15 with the beveled edge of the access control slot 43 . This is the only orientation in which the container can be inserted into the access control slots 41 .
  • FIG. 8-B is a top view of the access control slots 41 and the container body 01 . In FIG. 8-B, the container body 01 is inserted partially into the access control slots 41 . In FIG. 8-C, the container body 01 is inserted fully into the access control slots 41 . In both FIGS. 8 -B and 8 -C, the access control system contact pins 39 are shown.
  • FIG. 9-A, FIG. 9-B, and FIG. 9-C show a side-view of the container body 01 as it is inserted into the associated access control system.
  • the container body 01 is inserted partially into the asset control slot 41 .
  • the container body 01 has not yet reached either the access control latch 44 or the access control contact pins 39 .
  • FIG. 9-B the container body 01 has been inserted further into the access control slot 41 and the container body 01 has contacted the access control system latch front edge 49 and the access control latch has begun to be pushed in a downward motion and into the latch cavity 32 .
  • the container body 01 has not yet contacted the access control contact pins 39 .
  • FIG. 9-C depicts that the container body 01 has been fully inserted into the access control slot 41 .
  • the access control latch 44 of the associated asset control system has been inserted into the latch aperture 20 and the access control system latch back edge 50 has mated with the latching surface 31 of the container.
  • FIG. 9-C depicts that the access control contact pins 39 have married up with the contact pads 33 and 34 located at the rear of the container thus allowing the access control system to detect the presence of, and identify of, the container body 01 .
  • the container for securing and uniquely identifying objects is simple to use and has few parts resulting in high reliability.
  • the container secures keys from view and, when used with the associated asset control system, the container secures keys from accidental or unauthorized removal from the asset control system.
  • Each container is built so as to allow the container to be re-used over and over again.
  • the container and its integrated identification chip are not prone to tampering since the chip is affixed to a circuit board, inserted into a tailored slot, and subsequently glued into place with an epoxy. Keys contained within the container can be used while the lid is closed by simply flipping the lanyard and key out of the container prior to closing the lid.
  • the container for securing and uniquely identifying objects has the additional advantages in that
  • the container can have other shapes, can be larger in size, and can be equipped with devices to hold other specific items.

Abstract

A container for securing and uniquely identifying objects are provided for use with an asset tracking system of the type having a latching device to physically hold the container in place and to automatically sense the memory device which is part of the container. The container includes a surface for being physically latched in place, a device for securing objects such as keys and includes a circuit board which hosts the memory device. Containers are generally rectangular in shape, but include beveled surface to ensure that they can only be inserted into the asset tracking system in one direction. In one embodiment, the container is equipped with reusable metal lanyards to attach keys to the container.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • Not applicable [0001]
  • BACKGROUND
  • 1. Field of Invention [0002]
  • This invention relates generally to asset tracking systems and more particularly to uniquely identifiable containers that are capable of being physically secured in a cabinet to protect keys and other objects. [0003]
  • 2. Description of Prior Art [0004]
  • Controlling access to items such as keys and access cards is one method of managing a wide range of assets such as vehicles, aircraft, boats, commercial property and vacation homes. By controlling the key or access card, you effectively control the asset. As part of the control process, there is a need to selectively limit access to keys and other objects in a way that physically prevents unauthorized access, provides an audit trail of each access to the key or object, and provides notification to management personnel in the event that unauthorized access attempts are made. [0005]
  • A wide range of systems exists to control objects such as keys. These systems range from fully manual systems to totally automated systems. The manual systems may include key hooks and a logbook that is used to manually record each key-out and key-in transaction. The limitation of this approach is that the process can be circumvented intentionally, may be inaccurate due to unintentional errors in the recording of key numbers or user's identity, and keys may be difficult to locate if they are not returned to the correct location on the key hook system. Additionally, selectively limiting access to specific keys using a manual key control system must be done via the honor system. Automated systems for controlling objects such as keys range considerably. One such system, as disclosed in U.S. Pat. No. 5,801,628, can physically restrict access to large sets of keys and can track key-out and key-in transactions for individual keys. While this system can track key movement on a key-by-key basis, its limitation is that each key in a large drawer of keys is not individually secured in place. The keys are attached with a rivet to a plastic tag containing a “touch memory device” containing an ID code. The tags are inserted into a slotted panel within a drawer, however they are not secured in place. This leaves the keys prone to removal by unauthorized users, prone to tampering with the key identification tags, and even prone to users making molds of the keys since they are exposed to each user with access to the drawer of keys. Another such system physically secures keys on a ring (the ring hangs in a key cabinet) and limits removal of keys and rings. However, keys remain exposed and prone to tampering including making a mold of a key. Finally, another key system secures keys inside of plastic containers that are identified via a bar code. The plastic containers reside on a carousel inside of the key system and are dispensed using a series of multiple motors and other mechanical devices after access is authorized to the specific set of keys. This system is mechanically complex and prone to failure. [0006]
  • Microprocessor-controlled or personal computer-controlled systems are used as part of many automated asset control systems. A variety of methods are used to identify users, however, the means are generally similar amongst the different systems. The primary differences between automated asset control systems are the methods by which keys are identified, the extent to which keys are exposed to potential threats, and the method by which keys are secured inside of the asset controlling cabinet. [0007]
  • Key identification in automated systems is generally accomplished using either a bar code or some type of memory touch device. Bar codes are typically printed on a label and affixed to an object that is attached to a set of keys. The disadvantage of this approach is that bar codes can be removed or can become unreadable due to normal wear because they are on a paper medium. Bar codes can be easily counterfeited or duplicated using devices as simple as a copier machine or a standard personal computer. Finally, bar codes are difficult to scan on a frequent interval when keys are in an enclosed area due to the need to have a bar code reader access the relatively large bar code at a perpendicular angle within a confined space. Memory touch devices are more common than bar codes in automated key systems. Memory touch devices come in a variety of sizes and offer the advantage that they are rugged, not very prone to failure, they are compact, they are commercially available, they can not be reproduced without sophisticated means, and they can be sensed electronically within the tight confines of a key cabinet. [0008]
  • The environment in which an automated asset control system can be deployed is heavily dependent upon the extent to which the keys are exposed to potential threats. Independent of whether or not a user can physically remove a key, consideration must be given to the extent to which keys are visually or tactilely exposed to unauthorized users. In environments where all of the users are “trusted”, keys may be visible to users that are not allowed to have access to the keys. That is, the keys may be prone to tampering or casting because they are secured in a system in a way that leaves keys exposed on an electronically-controlled key ring or riveted to plastic tags. However, in environments where threats exist, it is much more critical that keys are hidden from view and exposed only to those with permission to access the specific key or object. Keys that are individually stored in a container within a key cabinet are not exposed to the threat. [0009]
  • A different, yet equally important feature of asset control systems is the method by which assets are secured inside of the cabinet. One shortcoming of only securing an entire cabinet or an entire drawer of keys is that an unauthorized key may be removed by anyone gaining access to an entire cabinet or drawer full of keys. A user with the lowest privilege level could physically remove keys requiring the highest access privilege if the keys are not individually secured in a cabinet. Most automated systems notify administrators of such a security breach. However, at times when administrators can not respond immediately, or the potential liability of the wrong key being accessed is great, allowing the wrong keys to be physically removed from the asset control cabinet is not acceptable. Keys or objects that are individually secured in a cabinet are not prone to accidental removal or removal by those with malicious intent. [0010]
  • SUMMARY
  • Briefly described, the present invention is for use in securing and uniquely identifying objects such as keys or access control cards in an access control system. The invention is generally a rectangular container equipped with lanyards for securing keys. The unit contains a unique electronic identification chip and an aperture in the invention to accommodate a latching device that is part of an associated automated access control system. The container has a hinged lid with a locking tab. The tab is depressed to open the lid so as to provide access to the contents of the container. [0011]
  • The invention is used as part of an access control system. The rectangular container is dispensed from, and inserted into, a slot in an automated access control system. To ensure that the invention is always placed into the access control system in the proper orientation, the rectangular container has a beveled edge that mates with a matching bevel in the access control system. A bevel on the edge of the container runs nearly ninety percent of the length of the container, thus exposing the bevel from only one end of the container. The access control system has a mating bevel that allows the beveled edge of the container to slide into the access control system's slot, however, the non-beveled end of the container cannot be inserted into the system. This configuration limits insertion of the container into the access control system's slot in only one orientation. [0012]
  • The unique identification of each container is accomplished using a small circuit board that contains the serialized identification chip on one side and a pair of gold contact pads on the reverse side. The circuit board is fixed into a tailored groove in the container, secured with epoxy, and a cover is installed on top of the circuit board to prevent tampering. The gold contact pads face the rear of the container and are arranged in such as way as to mate with sensing devices that are part of the access control system. To reduce the risk of electronic chip damage due to electrostatic discharge, the contacts are inset from the rear surface of the container. This configuration ensures that electrostatic damage due to contact with surfaces in the environment that are prone to electrostatic discharge cannot occur simply by bumping the flat edge of the container against the statically charged object. [0013]
  • In the rear of each slot of the associated access control system, there is a mechanism to sense the presence of a container. As the container is returned to the access control system by sliding the container into a slot, a latching device catches the back of the container and locks it into place. At the point that the container is locked securely into place by the latching device, two spring-loaded probes from the access control system contact the gold plated circuit board pads located on the rear of the container. An electrical connection within the access control system communicates the unique electronic serial identification number to the system's main processor for identifying the incoming container. [0014]
  • Three lanyards are mounted to the container in a manner that allows the lanyards and associated keys to remain affixed to the container while hanging either inside of the invention or outside of the invention while the hinged lid is closed. That is, the lanyards pivot in such as way as to allow a single key mounted on a lanyard to be used in an application such as a car while the remaining keys remain mounted within the plastic container while the lid is closed. Any combination of the three lanyards/keys can be positioned inside or outside of the container at any given time. Lanyards have a two hundred and seventy degree freedom of motion so as to allow keys to hang freely from the container and facilitate ease-of-use while still affixed to the plastic container. [0015]
  • These and other objects and advantages of the invention will be apparent from the following detailed description when read with reference to the drawings. [0016]
  • OBJECTS AND ADVANTAGES
  • Accordingly, besides the objects and advantages of the container for securing and uniquely identifying objects in my above patent, several objects and advantages of the present invention are: [0017]
  • (a) To include an integrated identification device—the identification chip is not affixed to a plastic tag or other protruding device and therefore can not be easily removed from the container as a means of tampering with the device; [0018]
  • (b) To work with a simple latching mechanism with few moving parts, thereby minimizing the chance of failure; [0019]
  • (c) To provide a container that hides keys and other objects from view of users that have not been provided access to the specific keys or object—in other words, this unit can be in environments in which un-trusted users will be accessing keys or other objects because viewing of objects can be restricted on an object-by-object basis; [0020]
  • (d) To provide a container that physically locks keys and other objects in place and prevents unauthorized users from removing the specific keys or object—in other words, this unit can be in environments in which un-trusted users will be accessing keys or other objects because access can be restricted on an object-by-object basis; [0021]
  • (e) To provide a container that can accommodate keys, but also any other object that fits within the size constraints of the container, particularly objects that are the size of a standard credit card—this facilitates distribution of several items simultaneously such as car keys and a gas credit card; [0022]
  • (f) To provide a container that can accommodate keys and other objects and be uniquely identified thereby facilitating processing such as billing or access restriction on an object-by-object basis; [0023]
  • (g) To provide re-usable lanyards for securing keys within the container so as to allow re-use of the container—in other words eliminating recurring costs for the end user are minimized; [0024]
  • (h) To provide a size and shape that facilitates use of single-use cable ties, in lieu of the re-usable lanyard, to enable users to implement a tamper-proof mechanism for securing keys within the container; [0025]
  • (i) To provide a container that facilitates the use of the key while it is still physically attached to the uniquely identifiable container so as to eliminate the need to ever remove keys from the container during use. [0026]
  • (j) To include an integrated, living-hinge such that the container can endure more than 2,500 openings and closing of the hinged panel, thereby reducing the need to replace the containers during normal use. [0027]
  • Further objects and advantages are to provide a container for securing and uniquely identifying objects which is easy-to-use, is inexpensive to manufacture, which can be made in any color to provide user-specific value, and which protects the serialized identification chip from electrostatic discharge. Still further objects and advantages will become apparent from a consideration of the ensuing description of drawings.[0028]
  • DRAWING FIGURES
  • In the drawings, closely related figures have the same number but different alphabetic suffixes. [0029]
  • FIG. 1-A is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is closed. [0030]
  • FIG. 1-B is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is open and the plastic cover is shown installed covering the serial identification chip. [0031]
  • FIG. 1-C is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is open and the plastic cover is shown removed from on top of the serial identification chip. The cover is shown as a separate component in this drawing. [0032]
  • FIG. 2 is a top view of the invention shown without the serial identification chip and without the cover over the identification chip and latch aperture. In this view, the hinged lid is in the open position. [0033]
  • FIG. 3-A is a top view of the serialized identification chip. [0034]
  • FIG. 3-B is a side view of the serialized identification chip. [0035]
  • FIG. 3-C is a pictoral representation of the serialized identification chip. [0036]
  • FIG. 4-A is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in slightly ajar position. [0037]
  • FIG. 4-B is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in a closed position and the snap tongue is shown inserted in the snap slot. [0038]
  • FIG. 4-C is a side view cut-away, representation of a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in an open position. [0039]
  • FIG. 4-D is a side view cut-away pictoral, representation of a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in a closed position. [0040]
  • FIG. 5-A is a front, pictoral representation of a container for securing and uniquely identifying objects. In this view, the container is shown in a vertical orientation. The beveled edge used to ensure the container is inserted into the asset control system is shown at the top right. [0041]
  • FIG. 5-B is a rear, pictoral representation of a container for securing and uniquely identifying objects. In this view, the container is shown in a vertical position. [0042]
  • FIG. 6-A is a side view of the lanyard used to secure keys and other objects in the container. [0043]
  • FIG. 6-B is a pictoral, front view of the lanyard used to secure keys and other objects in the container. In this picture, a key is affixed about the lanyard. [0044]
  • FIG. 6-C is a top view of three lanyards mounted to the container for securing and uniquely identifying objects. Keys are shown affixed about each lanyard. [0045]
  • FIG. 7-A is a pictoral view of the embodiment of the container with one lanyard mounted to the container and one key attached via the lanyard. In this view, the hingeable panel is in the open position and the key is hanging outside of the container. [0046]
  • FIG. 7-B is a pictoral view of the embodiment of the container with three lanyards mounted to the container. In this view, the hingeable panel is in the closed position and the lanyards are contained on the inside of the container. [0047]
  • FIG. 7-C is a pictoral view of the embodiment of the container with three lanyards mounted to the container. In this view, the hingeable panel is in the closed position and one key and its associated lanyard are hanging outside of the container. The remaining two lanyards are contained on the inside of the container. [0048]
  • FIG. 8-A is a pictoral, front view of the asset control system slot mechanism that receives the container. The container is shown oriented in a vertical position in the manner in which the container is inserted into the asset control system. [0049]
  • FIG. 8-B is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown partially inserted into the slot mechanism of the asset control system. [0050]
  • FIG. 8-C is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown fully inserted into the slot mechanism of the asset control system. [0051]
  • FIG. 9-A is a side, cut-away view of the asset control system slot mechanism that receives the container. In this view, the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has not contacted the latch assembly or the access control system's contact pins. [0052]
  • FIG. 9-B is a side, cut-away view of the asset control system slot mechanism that receives the plastic container. In this view, the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has contacted the latch assembly but has not yet contacted the access control system's contact pins. [0053]
  • FIG. 9-C is a side, cut-away view of the asset control system slot mechanism that receives the container. In this view, the container for securing and uniquely identifying objects is inserted fully into the asset control system's slot mechanism and the container has been latched in place by the action of the latch assembly and the access control system's contact pins have extended to the point normally occupied by the contact pads on the contact board.[0054]
  • REFERENCE NUMERALS IN DRAWINGS
  • [0055]
    01 container body
    02 container body right side panel
    03 container body left side panel
    04 container body rear panel
    05 container body front panel
    06 hingeable panel
    07 hinge
    08 container main cavity
    09 aperture wall
    10 snap indenture
    11 snap tongue
    12 snap neck
    13 snap slot
    14 lanyard opening
    15 container bevel
    16 lanyard hole #1
    17 lanyard hole #2
    18 lanyard hole #3
    19 contact board aperture
    20 latch aperture
    21 cover plate
    22 contact board
    23 cover hole #1
    24 cover hole #2
    25 cover hole #3
    26 cover hole #4
    27 cover pin #1
    28 cover pin #2
    29 cover pin #3
    30 cover pin #4
    31 latching surface
    32 latch cavity
    33 contact pad #1
    34 contact pad #2
    35 identification chip
    36 leads from identification chip
    37 container bottom
    38 non-beveled “stop”
    39 access control system contact pins
    40 lanyard
    41 access control slot
    42 access control slot spring
    43 access control bevel
    44 access control latch
    45 access control system latch pivot
    46 access control circuit board
    47 access control pivot spring
    48 contact board cavity
    49 access control system latch front edge
    50 access control system latch back edge
    51 access control system latch head
  • DETAILED DESCRIPTION—FIGS. 1-10—PREFERRED EMBODIMENT
  • Referring now in more detail to the drawings, in which like numerals refer to like arts through the several views, FIG. 1-A, FIG. 1-B, and FIG. 1-C illustrate a container that embodies principles of the invention in one preferred form. In this view, the container body comprises a generally [0056] rectangular body 01, formed by a right side panel 02, a left side panel 03, a rear panel 04, a bottom panel 37, and a front panel 05 (not visible in picture). A top panel 06 is attached by an integrated hinge 07 and in FIG. 1-A is shown in the closed position on top of the container body 01.
  • The [0057] rear panel 04 is provided with an elongated lanyard opening 14 and lanyard holes 16, 17, and 18, which facilitate mounting of lanyards 40. A contact board aperture 19 in the rear panel 04 exposes the integrated contact board 22 to the sensing devices included as part of the associated asset control system. A latch aperture 20 in the rear panel receives the latch that is part of the associated asset control system.
  • The [0058] right panel 02 includes a snap indenture 10. In FIG. 1-A the snap tongue 11 is shown protruding through the snap slot 13 in the hingeable panel 06. In use, the hingeable panel 06 is pressed down onto the snap tongue 11 resulting in the marriage of the snap tongue 11 into the snap slot 13.
  • The [0059] left panel 03 is provided with a container bevel 15 to enforce insertion of the invention into an associated asset control system in one, and only one, orientation.
  • FIG. 1B further illustrates the container in one preferred form. A top, [0060] hingeable panel 06 is attached by a hinge 07 and is shown in the open position on top of the container body 01. A cover plate 21 is shown which encloses the latch cavity 32 and the contact board cavity 48, which are exposed to the rear of the container.
  • FIG. 1C illustrates the mounting mechanism for the [0061] cover plate 21. Here, four pins 27, 28, 29, and 30 are shown protruding upward from the aperture wall 09. The pins are cylindrical in shape. Mating holes 23, 24, 25, and 26 are shown in the cover plate. In use, the cover 21 is snapped in to place by aligning the holes 23, 24, 25, and 26 with pins 27, 28, 29, and 30 respectively. The cover is pressed down over the pins and held in place by a tight press fit.
  • FIG. 2 illustrates the [0062] contact board cavity 48 and the latch cavity 32. The contact board cavity 48 is a slotted opening between the aperture wall 09 and the rear panel 04. The contact board cavity 49 accepts the contact board 22. When inserted into the contact board cavity, the contact pads 33 and 34 are exposed through the container's contact board aperture 19 to the rear of the container. The electronic serial identification chip 35, shown in FIG. 3-B, is mounted on the front-facing surface of the contact board 22 is accommodated in the rectangular cavity that is part of the larger contact board cavity. In use, the contact board 22 is placed into the contact board cavity 48 and an epoxy is filled around the contact board to secure it in place and prevent tampering.
  • The [0063] latch cavity 32 receives the access control latch 44 that is part of the associated asset control system. In use, as the container is inserted into the slot of the associated asset control system, the rear panel 04 of the container contacts an angled leading edge 49 of a spring-loaded latch 44. As the container is inserted further into the asset control system, the latch is forced downward until the rear edge of the latch head 50 passes the inside wall of the rear panel 04 of the container 01. At such a point, the spring-loaded latch is forced upward resulting in the rear of the latch head 50 mating with the latching surface of the container's rear panel 31. The container therefore cannot be removed from the asset control system without some action forcing the latch in a downward position. An electronic actuation of the latch 44 in a downward motion is a key component of the associated asset control system. When the asset control system moves the latch head 51 in a downward motion past the point where the top of the latch head 51 meets with the inside surface of the container's rear panel 31, the container is released from the latching action of the latch and the container is forced out of the slot of the asset control system.
  • FIGS. [0064] 3-A, 3-B, and 3-C illustrate the contact board 22 that is used to uniquely identify each container. One contact board is inserted and affixed in each container. As shown in FIG. 3-A, a contact board 22 consists of two gold-plated pads 33 and 34 on the external facing side. FIG. 3-B shows a side view of the contact board 22, including gold pads 33 and 34 and an electronic identification chip 35 on the internal facing side. The electronic identification chip 35 is soldered to the contact board 22. FIG. 3-C shows a pictoral view of the top of the contact board 22.
  • FIG. 4-A illustrates the assembly used to hold the [0065] panel 06 of the container in a closed position. As the hinged panel 06 is closed, the inside surface of the hinged panel 06 meets the rounded surface of the snap tongue 11. As the hinged panel is pushed all of the way to the closed position, the semi-flexible snap neck 12 assembly is pushed toward the inside of the container so as to allow the smooth snap tongue 11 to slide inside of the panel 06 until the point that the snap tongue 11 reaches the snap slot 13. Once the snap tongue 11 reaches the snap slot13, the snap tongue 11 moves into the snap slot 13 and the semi-flexible snap neck 12 is returned to a non-flexed state. This action secures the panel 06 in to a closed position as shown in FIG. 4-B. To affect the opening of the panel 06, the snap indenture 10 must be depressed to the point that the snap tongue 11 disengages from the snap slot 13 located on the panel 06. Once disengaged, the upward force from the hinge 07 of the container raises the hingeablepanel 06 to an open position. FIG. 4-C is a side, cut-away view of the snap assembly in an open position. FIG. 4-D is a side, cut-away view of the snap assembly in a closed position.
  • FIG. 5-A illustrates a front-view of a container with the [0066] hingeable panel 06 closed. The container is oriented in a position resting on its side panel 02. The container bevel 15 is shown at the top right of the container. FIG. 5-B shows a rear view of the container. The contact board 22 is visible mounted in the rear of the container.
  • Additional Embodiment—FIGS. 6,7 [0067]
  • In another preferred embodiment, lanyards are affixed to the container to facilitate the attachment of keys to the container. [0068]
  • FIG. 6-A depicts a side view of the [0069] lanyard 40, which is used to physically attach keys to the container 01. FIG. 6-B depicts a front view of the lanyard 40 with a key inserted onto it. FIG. 6-C shows one embodiment of the present invention with three lanyards 40, each containing one key, mounted to the container via the lanyard opening 14 and lanyard hole #1 16, lanyard hole #2 17, and lanyard hole #3 18.
  • FIG. 7-A is a pictoral view of a [0070] lanyard 40 mounted to a container 01. In FIG. 7-A, the hingeable panel 06 is open and the lanyard and associated key are oriented outside of the container body 01. FIG. 7-B depicts the embodiment with three lanyards 40 mounted to the container body 01. In FIG. 7-B, the hingeable panel 06 is shown in a closed position and the three lanyards 40 are oriented inside of the container body 01. In FIG. 7-C, the hingeable panel 06 is shown in a closed position and one of the lanyards 40 and the associated key are shown oriented outside of the container body 01. Two of the lanyards 40 are shown oriented inside of the container body 01.
  • Operation—FIGS. [0071] 8-9
  • FIG. 8-A is a pictoral depiction of the [0072] container body 01 and the container body's 01 relationship to the access control slots 41 which are part of the associated asset control system. FIG. 8-A shows the container oriented in a manner which mates the beveled edge of the container 15 with the beveled edge of the access control slot 43. This is the only orientation in which the container can be inserted into the access control slots 41. FIG. 8-B is a top view of the access control slots 41 and the container body 01. In FIG. 8-B, the container body 01 is inserted partially into the access control slots 41. In FIG. 8-C, the container body 01 is inserted fully into the access control slots 41. In both FIGS. 8-B and 8-C, the access control system contact pins 39 are shown.
  • FIG. 9-A, FIG. 9-B, and FIG. 9-C show a side-view of the [0073] container body 01 as it is inserted into the associated access control system. In FIG. 9-A, the container body 01 is inserted partially into the asset control slot 41. In FIG. 9-A, the container body 01 has not yet reached either the access control latch 44 or the access control contact pins 39.
  • In FIG. 9-B, the [0074] container body 01 has been inserted further into the access control slot 41 and the container body 01 has contacted the access control system latch front edge 49 and the access control latch has begun to be pushed in a downward motion and into the latch cavity 32. In FIG. 9-B, the container body 01 has not yet contacted the access control contact pins 39.
  • Finally, in FIG. 9-C, the [0075] container body 01 has been fully inserted into the access control slot 41. The access control latch 44 of the associated asset control system has been inserted into the latch aperture 20 and the access control system latch back edge 50 has mated with the latching surface 31 of the container. Additionally, FIG. 9-C depicts that the access control contact pins 39 have married up with the contact pads 33 and 34 located at the rear of the container thus allowing the access control system to detect the presence of, and identify of, the container body 01.
  • Conclusion, Ramifications, and Scope [0076]
  • Accordingly, the reader will see the container for securing and uniquely identifying objects is simple to use and has few parts resulting in high reliability. The container secures keys from view and, when used with the associated asset control system, the container secures keys from accidental or unauthorized removal from the asset control system. Each container is built so as to allow the container to be re-used over and over again. The container and its integrated identification chip are not prone to tampering since the chip is affixed to a circuit board, inserted into a tailored slot, and subsequently glued into place with an epoxy. Keys contained within the container can be used while the lid is closed by simply flipping the lanyard and key out of the container prior to closing the lid. Further, the container for securing and uniquely identifying objects has the additional advantages in that [0077]
  • It can be manufactured in a variety of colors so as to allow end-users to secure objects with different access levels in different colored containers [0078]
  • It can be manufactured using low-cost plastic molds [0079]
  • It has a life expectancy of at least 2,500 openings and closings, thereby reducing the need to replace the units frequently [0080]
  • It can be used to distribute many types of objects to users with varying access privileges when used in conjunction with the associated asset control system. [0081]
  • Although the description above contains much specificity, these specifications should not be construed as limiting the scope of the invention but merely providing illustrations of some of the presently preferred embodiments of this invention. For example, the container can have other shapes, can be larger in size, and can be equipped with devices to hold other specific items. [0082]
  • Thus, the scope of the invention should be determined by the appended claims and their legal equivalents, rather than by the examples given. [0083]

Claims (5)

I claim:
1. A container for holding objects in an asset control system, comprising:
(a) an opening for accessing the interior of the container
(b) a panel covering said opening having a mechanism for retaining said panel in a closed position whereby loose objects can be stored in the container
(c) an aperture having clearance for receiving the latching device provided as part of the asset control system
(d) a solid surface for mating with said latching device whereby the container can be secured in the asset control system by the latching device of the asset control system
(e) conductive pads with an attached identification device mounted within said container in such as way as to be accessible from the exterior of the container for detection and identification by said asset control system whereby said container can be uniquely identified by the asset control system
2. A container assembly as claimed in 1 and wherein said panel is attached to said container along one edge of the container and the panel is hingeable between a closed position and an open position
3. A container assembly as claimed in 1 wherein a plurality of holes is formed to receive fastening devices for securing objects to said container
4. A container assembly as claimed in 3 wherein the fastening device used to secure objects to the container is a metal lanyard whereby objects can be attached to and removed from the said lanyard
5. A container assembly as claimed in 3 wherein the fastening device used to secure objects to the container is a ratcheting plastic device whereby said ratcheting plastic device is designed for a single use and removal of an object from the ratcheting plastic device renders the ratcheting plastic device unusable.
US10/162,560 2002-06-06 2002-06-06 Container for securing and uniquely identifying objects Abandoned US20030226772A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/162,560 US20030226772A1 (en) 2002-06-06 2002-06-06 Container for securing and uniquely identifying objects

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/162,560 US20030226772A1 (en) 2002-06-06 2002-06-06 Container for securing and uniquely identifying objects

Publications (1)

Publication Number Publication Date
US20030226772A1 true US20030226772A1 (en) 2003-12-11

Family

ID=29709837

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/162,560 Abandoned US20030226772A1 (en) 2002-06-06 2002-06-06 Container for securing and uniquely identifying objects

Country Status (1)

Country Link
US (1) US20030226772A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090000343A1 (en) * 2005-12-20 2009-01-01 Valeo Securite Habitacle Device for Positioning and Holding an Emergency Key
US20100155471A1 (en) * 2008-12-23 2010-06-24 Ncr Corporation Method and apparatus for automated access control system
WO2019132664A1 (en) 2017-12-29 2019-07-04 R.J. Van Geer Beheer Bv Key attachment system for butterfly type wallet
CN110900548A (en) * 2018-06-01 2020-03-24 Ftc欧洲有限责任公司 Tool box

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2849044A (en) * 1957-03-19 1958-08-26 Drescher & Kiefer Key case
US2886396A (en) * 1958-01-24 1959-05-12 American Telephone & Telegraph Drawer for storage of keys
US3371975A (en) * 1967-02-21 1968-03-05 Henry E. Meltzer Cooling and carrying box for electric tools and appliances
US4236463A (en) * 1979-05-14 1980-12-02 Westcott Randy L Tamper proof case for the protection of sensitive papers
US5871100A (en) * 1995-12-22 1999-02-16 Rayovac Corporation Security battery package
US6195005B1 (en) * 1998-09-11 2001-02-27 Key-Trak, Inc. Object carriers for an object control and tracking system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2849044A (en) * 1957-03-19 1958-08-26 Drescher & Kiefer Key case
US2886396A (en) * 1958-01-24 1959-05-12 American Telephone & Telegraph Drawer for storage of keys
US3371975A (en) * 1967-02-21 1968-03-05 Henry E. Meltzer Cooling and carrying box for electric tools and appliances
US4236463A (en) * 1979-05-14 1980-12-02 Westcott Randy L Tamper proof case for the protection of sensitive papers
US5871100A (en) * 1995-12-22 1999-02-16 Rayovac Corporation Security battery package
US6195005B1 (en) * 1998-09-11 2001-02-27 Key-Trak, Inc. Object carriers for an object control and tracking system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090000343A1 (en) * 2005-12-20 2009-01-01 Valeo Securite Habitacle Device for Positioning and Holding an Emergency Key
US8225634B2 (en) * 2005-12-20 2012-07-24 Valeo Securite Habitacle Device for positioning and holding an emergency key
US20100155471A1 (en) * 2008-12-23 2010-06-24 Ncr Corporation Method and apparatus for automated access control system
US8191781B2 (en) * 2008-12-23 2012-06-05 Ncr Corporation Method and apparatus for automated access control system
WO2019132664A1 (en) 2017-12-29 2019-07-04 R.J. Van Geer Beheer Bv Key attachment system for butterfly type wallet
CN110900548A (en) * 2018-06-01 2020-03-24 Ftc欧洲有限责任公司 Tool box

Similar Documents

Publication Publication Date Title
US8661861B2 (en) Dual locking system for integrated zipper lock
US4918952A (en) Computer data drive locking device
US5361610A (en) Totelock
US9245702B1 (en) Keypad having tamper-resistant keys
US8758033B2 (en) Blockout device for USB port
US20080210577A1 (en) Safety lock box and key organization unit
CA2102923A1 (en) Method and apparatus for a lockable, removable cassette
US20080258869A1 (en) Electronic Key-Management System
AU671632B2 (en) Magnetic locks
EP1212663B1 (en) A method and an apparatus for identification and control of handling of keys and the like
US20030226772A1 (en) Container for securing and uniquely identifying objects
US4636781A (en) Housing for data terminal device
JP2007062262A (en) Seal device
US6885558B2 (en) Electronic apparatus having housing to contain components and door supported by housing
US4258253A (en) Cartridge assembly for data-sensing system
US11429755B2 (en) Intrusion switch
US7317401B2 (en) Method and mechanical tamper-evident case fastener
US20160265251A1 (en) Emergency access mechanism for a cash drawer
CN111418961A (en) Key ring, management device, management method, management system, and storage medium
NL9201727A (en) IDENTIFIER FOR A LOCKING SYSTEM.
TWI373549B (en) Combination lock
JP6010202B2 (en) Key management machine and key management system
CN212488793U (en) Key ring and key ring management device
NL9201834A (en) Theft protection system.
US20230126812A1 (en) Electronic payment device with means for blocking access to a data storage module

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION