Electronic security system for monitoring mechanical keys and other items
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G08B-013/00
G08B-029/00
B60R-025/00
G05B-019/00
G05B-023/00
G06F-007/00
G06F-007/04
G08C-019/00
H04B-001/00
H04B-003/00
H04Q-001/00
H04Q-009/00
출원번호
US-0556982
(2012-07-24)
등록번호
US-8643487
(2014-02-04)
발명자
/ 주소
Roatis, Calin V.
Denison, William D.
Myers, Gary L.
출원인 / 주소
TriTeq Lock and Security, LLC
대리인 / 주소
Miller, Matthias & Hull LLP
인용정보
피인용 횟수 :
2인용 특허 :
116
초록▼
A security system with a security container and an electronic lock circuit is used to securely store mechanical keys or other valuable items. Items to be protected are placed in a secured location in the security container. A detector of the security system detects whether the items are indeed in th
A security system with a security container and an electronic lock circuit is used to securely store mechanical keys or other valuable items. Items to be protected are placed in a secured location in the security container. A detector of the security system detects whether the items are indeed in the secured location, such as by means of receiving signals from a transponder attached to the items. The security container is locked only if the items are detected to be in the secured location. Audit trail records for the locking and unlocking events of the security container may be transmitted to a device remote to the security container for analysis. A monitoring device with a location identification device, such as a GPS sensor, may be attached to items to be monitored for tracking locations and activities of the items.
대표청구항▼
1. An electronic security system, comprising: a secured enclosure including a safe or a vending machine; an electronic detection circuit for detecting authorized and unauthorized access events; a closure having a storage area for containing an item to be protected, the closure being movable to an op
1. An electronic security system, comprising: a secured enclosure including a safe or a vending machine; an electronic detection circuit for detecting authorized and unauthorized access events; a closure having a storage area for containing an item to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detecting an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position; a second detector configured to detect authorized and unauthorized accessing of the closure and storing in a memory a second record, after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event; a data storage and communication device comprising an identification number and one of either the first or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of either the first record and the second record, and a signal produced in a first location to initiate transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device or a database in a second location, wherein the transfer includes a value corresponding to a time or date associated with one of either the first record or second record to the database; a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification, said database comprising item identification values and access identification codes; wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of: selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event to a device remote to the secured enclosure. 2. The system of claim 1, wherein a value corresponding to a time or date associated with both the first record and the second record is communicated. 3. The system of claim 1, wherein an authorization code or password is compared to a stored code prior to allowing the storage of the database path identification into a database pointer. 4. The system of claim 1, wherein one of either the first record or the second record is limited to data storage into the database selected via the database pointer. 5. The system of claim 1, wherein an authorization code or password is compared to a stored code prior to allowing storage of a closure name into the database. 6. The system of claim 1, wherein the data record storage task and the network communication task operate in an order based on priority. 7. The system of claim 1, wherein the unauthorized access event record identification/sorting task and the network communication task operate in an order based on priority. 8. The system of claim 1, wherein the data record viewing/management task and the network communication task operate in an order based on priority. 9. The system of claim 1, wherein the data transfer operation of the first record is a periodically scheduled task. 10. The system of claim 1, wherein records communicated via the communication device are limited to data storage into the database selected via the database pointer. 11. An electronic security system, comprising: a secured enclosure including a safe or a vending machine; a lock; an electronic lock control circuit for controlling operations of the lock and for identifying authorized and unauthorized lock access events; a closure having a storage area for containing an item or items to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detects an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position; wherein the electronic lock control circuit is configured to actuate the lock to unlock the closure upon receiving an access signal; a second detector configured to detect authorized and unauthorized accesses of the closure, and storing in a memory, a second record stored after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or unauthorized closure access event; a data storage and communication device comprising an identification number and one of either the first record or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record and the second record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device or a database in a second location; a processor located remote to the secured enclosure and employing an operation system for operating a plurality of tasks, wherein at least one task is a software program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification, said database comprising item identification values and access identification codes; wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of: selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event to a device remote to the secured enclosure. 12. The system of claim 11, wherein an authorization code or password is compared to a stored code prior to allowing the storage of the database path identification into a database pointer. 13. The system of claim 11, wherein one of either the first record or the second record is limited to data storage into the database selected via the database pointer. 14. The system of claim 11, wherein an authorization code or password is compared to a stored code prior to allowing storage of a closure name into the database. 15. The system of claim 11, wherein the data record storage task and the network communication task operate in an order based on priority. 16. The system of claim 11, wherein the unauthorized access event record identification/sorting task and the network communication task operate in an order based on priority. 17. The system of claim 11, wherein the data record viewing/management task and the network communication task operate in an order based on priority. 18. The system of claim 11, wherein the data transfer operation of the first record is a periodically scheduled task. 19. The system of claim 11, wherein records communicated via the communication device are limited to data storage into the database selected via the database pointer. 20. An electronic security system, comprising: a secured enclosure including a safe or a vending machine; an electronic detection system for detecting authorized and unauthorized access events; a closure having a storage area for containing an item to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detecting an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position; a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory a second record, stored after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event; a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record and the second record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device in a second location; a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification, said database comprising item identification values and access identification codes; wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of: selecting the database via the database path identification and communicating the first record or the second record with the database; identifying a record stored in the database associated with an unauthorized access event; transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to an unauthorized access event to a device remote to the secured enclosure; and initiating communication of an enable signal from the communication device or database in the second location to the data storage and communication device in the first location. 21. The system of claim 20, wherein an authorization code or password is compared to a stored code prior to allowing the storage of the database path identification into a database pointer. 22. The system of claim 20, wherein one of either the first record or the second record is limited to data storage into the database selected via the database pointer. 23. The system of claim 20, wherein records communicated via the communication device are limited to data storage into the database selected via the database pointer. 24. The system of claim 20, wherein the data record storage task and the network communication task operate in an order based on priority. 25. The system of claim 20, wherein the unauthorized access event record identification/sorting task and the network communication task operate in an order based on priority. 26. The system of claim 20, wherein the data record viewing/management task and the network communication task operate in an order based on priority. 27. The system of claim 20, wherein the data transfer operation of the first record is a periodically scheduled task. 28. The system of claim 20, wherein an authorization code or password is compared to a stored code prior to allowing storage of a closure name into the database. 29. An electronic security system, comprising: a secured enclosure including a safe or a vending machine; an electronic detection system for detecting authorized and unauthorized access events; a closure having a storage area for containing an item to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detects an identification value of the item as the item is being positioned and secured in a select area of the closure, and stores in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position; a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory a second record, stored after the storing of the first record, the second record comprising an identification code associated with either the authorized or the unauthorized closure access event; a third detector for detecting one or more conditions involving one of either the closure of the item, and storing in a memory a third record, stored after the storing of the first record, the third record comprising a value or condition associated with one of either the closure of the item; a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record, the second record or the third record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record, the second record, and the third record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second records between the data storage and communication device in the first location and a communication device in a second location; a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification, said database comprising item identification values and access identification codes; wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of: selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to an unauthorized access event to a device remote to the secured enclosure. 30. The system of claim 29, wherein an authorization code or password is compared to a stored code prior to allowing the storage of the database path identification into a database pointer. 31. The system of claim 29, wherein one of either the first record or the second record is limited to data storage into the database selected via the database pointer. 32. The system of claim 29, wherein an authorization code or password is compared to a stored code prior to allowing storage of a closure name into the database. 33. The system of claim 29, wherein the data record storage task and the network communication task operate in an order based on priority. 34. The system of claim 29, wherein the unauthorized access event record identification/sorting task and the network communication task operate in an order based on priority. 35. The system of claim 29, wherein the data record viewing/management task and the network communication task operate in an order based on priority. 36. The system of claim 29, wherein the data transfer operation of the first record is a periodically scheduled task. 37. The system of claim 29, wherein records communicated via the communication device are limited to data storage into the database selected via the database pointer. 38. An electronic security system, comprising: a secured enclosure including a safe or a vending machine; an electronic detection system for detecting authorized and unauthorized access events; a closure having a storage area for containing an item to be protected and being in a first location, the closure being movable between an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detecting an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position; a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory, a second record stored after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event; a third record stored in the first location and comprising at least one identification number associated with the closure and one of either a customer name or location name; a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record, the second record or the third record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record, the second record, and the third record, and a signal produced in the first location to initiate the transfer of at least one of the first record and the second record between the data storage and communication device located in the first location and a communication device in a second location; a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification, said database comprising item identification values and access identification codes; wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of: selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the customer name or location of a closure or an item that was subject to an unauthorized access event to a device remote to the secured enclosure. 39. The system of claim 38, wherein a value corresponding to a time or date associated with the third record is communicated. 40. The system of claim 38, wherein an authorization code or password is compared to a stored code prior to allowing the storage of the database path identification into a database pointer. 41. The system of claim 38, wherein one of either the first record or the second record is limited to data storage into the database selected via the database pointer. 42. The system of claim 38, wherein an authorization code or password is compared to a stored code prior to allowing storage of a closure name into the database. 43. The system of claim 38, wherein the data record storage task and the network communication task operate in an order based on priority. 44. The system of claim 38, wherein the unauthorized access event record identification/sorting task and the network communication task operate in an order based on priority. 45. The system of claim 38, wherein the data record viewing/management task and the network communication task operate in an order based on priority. 46. The system of claim 38, wherein the data transfer operation of the first record is a periodically scheduled task. 47. The system of claim 38, wherein records communicated via the communication device are limited to data storage into the database selected via the database pointer.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (116)
Michael Mellen ; James E. Disbrow ; William E. Wagner ; James Roesch ; Carl Finney, Access control system for mobile platform using electronic key-embedded location verification data.
Borras Jaime A. (Hialeah FL) Mitchell Timothy A. (Plantation FL) Ramos Ozzie F. (Sunrise FL), Alphanumeric entry system having an electronic lock feature.
Werth Robert L. (2053 W. Romney Dr. Anaheim CA 92801) Brehm Timothy L. (Irvine CA), Code controlled microcontroller readout from coin operated machine.
Reis Robert Steven (Palo Alto CA) Verma Vikram (Palo Alto CA) Mihovilovic Domingo Antonio (Mountain View CA) Bertrand Peter Scott (Palo Alto CA) Stevens Richard Kenneth (Cupertino CA), Communication system for communicating with tags.
Caron LaVerne A. (Kalamazoo MI) Handley Edward F. (Kalamazoo MI) Kuo W. Paul (Kalamazoo MI) Lane E. James (Highland MI), Current limiting solenoid driver.
Henderson Walter G. (Salem OR) Larson Wayne F. (Salem OR) Barrett Philip D. (Salem OR), Data synchronization method for use with portable, microprocessor-based device.
Yoshida Susumu (Wako JPX) Ebihara Munemitsu (Miyazaki JPX) Kurita Tsutomu (Miyazaki JPX) Sueyoshi Masahiko (Miyazaki JPX), Electric power supply control device for vehicle.
Denison William D. (Palos Hills IL) Brownfield Lawrence C. (Downers Grove IL) Silvers Bradley S. (Oswego IL), Electronic access control device utilizing a single microcomputer integrated circuit.
Anderson Charles E. (Mint Hill NC) Miller William C. (Monroe NC), Electronic combination of lock with changeable entry codes, lock-out and programming code.
Warren Edward L. (Spring Lake MI) Miller David E. (West Olive MI) Arter James (North Muskegon MI), Electronic interlock for storage assemblies with communication.
Disbrow James E. (Palm Bay FL) Malinowski Christopher W. (Melbourne FL) Smitt Eric L. (Indian Harbor Beach FL) Mellen Michael R. (Palm Bay FL) Danile Peter S. (Palm Bay FL) Chhatwal K. N. Singh (West, Electronic lock and key system.
Henderson Walter G. (Corvallis OR) Archer ; II John Q. (Salem OR) Daum Gerald R. (Salem OR) Ellson George A. (Salem OR) Gray John E. (Salem OR) Larson Wayne F. (Salem OR) Olds Rockne M. (Salem OR) Sc, Electronic real estate lockbox system.
Danler Richard W. (Corvallis OR) Sherman John W. (Corvallis OR) Babler David (Vancouver WA) Chapin Ron M. (Gervais OR) Kniffin John M. (Portland OR) Reviea Kenneth L. (Salem OR) Schreiner Lynn L. (Co, Electronic security system.
Figh Jack N. (Guttenberg NJ) Cuddihy ; Jr. Robert V. (Basking Ridge NJ) Buchholtz Stanley H. (Manhasset NY) Rushing Tatsuo (Denville NJ), Electronic security system for display cabinets.
Micznik Isaiah B. (30515 W. 14 Mile Rd. ; #43 Farmington Hills MI 48018) Tenenbaum David A. (24351 Jerome Oak Park MI 48237) Tenenbaum Jeffrey (28477 Franklin Rd. Southfield MI 48034), Electronic security system with two-way communication between lock and key.
Ligman James R. (Santa Barbara CA) Kaufman Peter (Santa Barbara CA) Kompanek Harry W. (Santa Barbara CA) Carlson David K. (Belleville MI), Entry system.
Myers Gary L. ; Denison William D. ; Caplinger Paul D. ; Roatis Calin V., Lock assembly for vending machines and method for locking and unlocking same.
O\Connell John (Halesowen GBX) Webster Alan (Birmingham GBX) Jefferies Roy S. (Bridgnorth GBX) Trevor-Jones Hugh (Bridgnorth GBX), Method of operating a security device, security device and data carriers for use in the method.
Kleefeldt Frank (Heiligenhaus DEX) Bartel Peter (Hattingen DEX) Ostermann Willfried (Essen DEX) Welskopf Fred (Bochum DEX), Motor-vehicle central lock system with transponder in key.
Waraksa Thomas J. (Clarkston MI) Fraley Keith D. (Drayton Plains MI) Kiefer Richard E. (Boulder CO) Douglas Daniel G. (Louisville CO) Gilbert Lee H. (Boulder CO), Passive keyless entry system.
O'Toole James E. ; Tuttle John R. ; Tuttle Mark E. ; Lowrey Tyler ; Devereaux Kevin M. ; Pax George E. ; Higgins Brian P. ; Ovard David K. ; Yu Shu-Sun ; Rotzoll Robert R., Radio frequency data communications device.
Bruwer Frederick Johannes,ZAX ; Pretorius Pieter Jacobus,ZAX ; Dippenaar Theodor Johannes,ZAX, Secure token integrated circuit and method of performing a secure authentication function or transaction.
Seibold Peter (Diekholzen DEX) Strauss Karl-Peter (Hildesheim DEX), Security system and method for electronic apparatus, particularly car radios or similar automotive audio equipment.
Mlynarczyk,Mitchell S.; Payson,John B.; Hoekstra,Aron J.; Robinson,Brock E.; Kaczmarz,Kenneth A.; Koch,Michael J., System and method for key control in an electronic locking system.
Rumbolt Robin B. (Knoxville TN) McIntyre William R. (Knoxville TN) Goodson Larry E. (Blaine TN), Universal remote control unit with model identification capability.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.