Method for Controlling and Recording the Security of an Enclosure
First Claim
1. A method for controlling and recording the security of an enclosure comprising the steps of:
- configuring a controller for a programming mode of operation;
storing an access code into a memory of the controller to form a stored code;
communicating an input code to the controller;
comparing the input code to the stored access code;
storing a first record in a memory, the first record comprising a plurality of unique identification numbers associated with an attempted enclosure access event;
storing a second record in the memory, the second record comprising an identification value of an item being protected in an enclosure having a storage area, wherein the identification value of the item is detected, while the enclosure is in a closed and locked position, by a detector limited in distance and direction by substantially less than the storage area of the enclosure;
communicating a signal from a first communication device in a first location to a second communication device in a second location remote to the item being secured to initiate a transfer of one of either the first record or the second record;
sending a communication between a plurality of communication devices comprising a plurality of unique identification numbers associated with communicating and a value corresponding to a time or date;
operating a plurality of computer tasks, the computer tasks comprising a software program for record and data management;
selecting a database via a database path identification register; and
communicating at least one of either the first record or the second record with the database.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for controlling and recording the security of an enclosure is disclosed. A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device, such as an appliance, power tool, shipping container, and the like. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The communications between the mobile control device and the field device may be secured with encryption. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing. Moreover, an electronic access control device is disclosed comprising two microprocessors.
-
Citations
35 Claims
-
1. A method for controlling and recording the security of an enclosure comprising the steps of:
-
configuring a controller for a programming mode of operation; storing an access code into a memory of the controller to form a stored code; communicating an input code to the controller; comparing the input code to the stored access code; storing a first record in a memory, the first record comprising a plurality of unique identification numbers associated with an attempted enclosure access event; storing a second record in the memory, the second record comprising an identification value of an item being protected in an enclosure having a storage area, wherein the identification value of the item is detected, while the enclosure is in a closed and locked position, by a detector limited in distance and direction by substantially less than the storage area of the enclosure; communicating a signal from a first communication device in a first location to a second communication device in a second location remote to the item being secured to initiate a transfer of one of either the first record or the second record; sending a communication between a plurality of communication devices comprising a plurality of unique identification numbers associated with communicating and a value corresponding to a time or date; operating a plurality of computer tasks, the computer tasks comprising a software program for record and data management; selecting a database via a database path identification register; and communicating at least one of either the first record or the second record with the database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for controlling and recording the security of an enclosure comprising the steps of:
-
configuring a controller for a programming mode of operation; storing an access code into a memory of the controller to form a stored code; communicating an access code to the controller; comparing the communicated access code to the stored access code; storing a first record in a memory, the first record comprising a plurality of unique identification numbers associated with an attempted enclosure access event; storing a second record in the memory, the second record comprising an identification value of an item being protected in the enclosure having a storage area, wherein the identification value of the item is detected, while the enclosure is in a closed and locked position, by a detector limited in distance and direction by substantially less than the storage area of the enclosure; defining a schedule for initiating communication between a device located at a first location to a device in a second location remote to the item being secured; sending a communication per the schedule between a plurality of communication devices, the communication comprising a plurality of unique identification numbers associated with communicating and a value corresponding to a time or date; operating a plurality of computer tasks including a software program for record and data management; selecting a database via a database path identification register; and communicating at least one of either the first record or the second record with the database.
-
-
31. A method for controlling and recording the security of an enclosure comprising the steps of:
-
configuring a controller for a programming mode of operation; storing an access code into a memory of the controller to form a stored code; communicating an access code to the controller; comparing the communicated access code to the stored access code; providing a driver signal to actuate a latch to unlatch an enclosure if the communicated access code is identical to the stored access code; storing a first record in a memory, the first record comprising a plurality of unique identification numbers associated with an attempted enclosure access event; configuring the controller, by a signal communicated by a device remote to the controller, to disable at least one of the steps including communicating an access code to the controller, comparing the communicated access code to the stored access code, or providing a driver signal to actuate a latch to unlatch an enclosure; storing a second record in the memory, the second record comprising an identification value of an item being protected in the enclosure having a storage area, wherein the identification value of the item is detected, while the enclosure is in a closed and locked position, by a detector limited in distance and direction by substantially less than the storage area of the enclosure; communicating a signal from a first communication device in a first location to a second communication device in a second location remote to the item being protected to initiate a transfer of one of either the first record or the second record; sending a communication between a plurality of communication devices, the communication comprising a plurality of unique identification numbers associated with communicating and a value corresponding to a time or date; operating a plurality of computer tasks comprising a software program for record and data management; selecting a database via a database path identification register; and communicating at least one of either the first or second records with the database.
-
-
32. A method for controlling and recording the security of an enclosure comprising the steps of:
-
configuring a controller for a programming mode of operation; storing an access code into a memory of the controller to form a stored code; communicating an access code by a device remote to an enclosure, the remote device capable of being rendered disabled from communicating an access code if a pre-determined limit, or a value corresponding to a time or date associated with the remote device is reached or exceeded; comparing the communicated access code to the stored access code; storing a first record in a memory, the first record comprising a plurality of unique identification numbers associated with an attempted enclosure access event; storing a second record in the memory, the second record comprising an identification value of an item being protected in an enclosure having a storage area, wherein the identification value of the item is detected, while the enclosure is in a closed and locked position, by a detector limited in distance and direction by substantially less than the storage area of the enclosure; communicating a signal from a first communication device in a first location to a second communication device in a second location remote to the item being protected to initiate a transfer of at least one of either the first record or the second record; sending a communication between a plurality of communication devices, the communication comprising a plurality of unique identification numbers associated with communicating and a value corresponding to a time or date; operating a plurality of computer tasks comprising a software program for record and data management; selecting a database via a database path identification register; and communicating at least one of either the first or second records with the database. - View Dependent Claims (33)
-
-
34. A method for controlling and recording the security of an enclosure comprising the steps of:
-
configuring a controller for a programming mode of operation; storing an access code into a memory of the controller to form a stored code; communicating a plurality of non-identical encrypted messages by a device that is remote to an enclosure, said remote device communicating an access code and a unique identification number in at least one of a plurality of encrypted messages; storing a first record in a memory, the first record comprising a plurality of unique identification numbers associated with an attempted enclosure access event; storing a second record in the memory, the second record comprising an identification value of an item being protected in the enclosure having a storage area, wherein the identification value of the item is detected, while the enclosure is in a closed and locked position, by a detector limited in distance and direction by substantially less than the storage area of the enclosure; communicating a signal from a first communication device at a first location to a second communication device in a second location remote to the item being protected to initiate a transfer of the first record or the second record; sending a communication between a plurality of communication devices, the communication comprising a plurality of unique identification numbers associated with communicating and a value corresponding to a time or date; operating a plurality of computer tasks comprising a software program for record and data management; selecting a database via a database path identification register; and communicating at least one of either the first record or the second record with the database.
-
-
35. A method for controlling and recording the security of an enclosure comprising the steps of:
-
configuring a controller for a programming mode of operation; storing an access code into a memory of the controller to form a stored code; communicating an input code to the controller; comparing the input code to the stored access code; storing a first record in a memory, the first record comprising a plurality of unique identification numbers associated with an attempted enclosure access event; storing a second record in the memory, the second record comprising an identification value of an item being protected in an enclosure having a storage area, wherein the identification value of the item is detected, while the enclosure is in a closed and locked position, by a detector limited in distance and direction by substantially less than the storage area of the enclosure; communicating a signal from a first communication device in a first location remote to the device being secured to a second communication device in a second location to initiate a transfer of at least one of either the first record or the second record; sending a communication between a plurality of communication devices, the communication comprising a plurality of unique identification numbers associated with communicating and a value corresponding to a time or date; operating a plurality of computer tasks comprising a software program for record and data management; selecting a database via a database path identification register; and communicating at least one of either the first record or the second record with the database.
-
Specification