Tamper detection and prevention for an object control and tracking system
First Claim
1. An enhance key tag assembly for use with a Key Track system comprising a key card, an ID code stored on said key card, means for communicating the ID code to a central controller of a Key Track system, a tether connecting a key to the key card, and means for detecting tampering with the tether as an indication of an attempt to remove the key from its card.
4 Assignments
0 Petitions
Accused Products
Abstract
Tamper detection and prevention for an object control and tracking system and particularly a Key Track system is provided. Where objects being tracked are keys, a key card having a touch memory device, RF id tag, or other circuitry for storing and transmitting an ID to a controller is provided. A tether attaches a key to the card. In one embodiment, the tether is conductive and the transmission of the ID code passes through the tether. If the tether is cut, transmission is interrupted to indicate a tampering condition. In another embodiment, the tether is resistive and circuitry is provided to monitor a voltage drop across the tether. A change in the voltage drop indicates a tampering condition. An object of the invention is to detect an attempt to remove the key (or other object) from its ID card while leaving the card intact.
-
Citations
13 Claims
- 1. An enhance key tag assembly for use with a Key Track system comprising a key card, an ID code stored on said key card, means for communicating the ID code to a central controller of a Key Track system, a tether connecting a key to the key card, and means for detecting tampering with the tether as an indication of an attempt to remove the key from its card.
-
10. A method of detecting tampering with a tether securing an object to an identification tag, said method comprising the steps of:
-
(a) monitoring a preselected characteristic of the tether; and
(b) noting a tampered-with condition if the preselected characteristic of the tether changes. - View Dependent Claims (11, 12)
-
-
13. A protective shroud for inhibiting tampering with a key comprising a shroud body configured to be received over and cover at least portion of the key to protect said portion from being cut.
Specification