Method for Controlling and Recording the Security of an Enclosure
First Claim
1. A method for controlling and recording the security of an enclosure comprising the steps of:
- storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure;
storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure;
communicating a signal from a communication device in a first location near the item being secured to a device in a second location remote to the item being secured to initiate the transfer of at least one of either the first record and the second record;
sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer the at least one record and including a time or date value associated with one of either the first and the second record;
operating a plurality of computer tasks including a software program for record and data management;
selecting a database via a database path identification register;
communicating at least one of either the first record and the second record with the database;
identifying a record stored in the database associated with an unauthorized access event; and
transmitting one of either an email or a text message containing an identification parameter of a lock or closure or an item that was subject to the unauthorized access event.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for controlling and recording the security of an enclosure is disclosed. A mobile electronic control device, such as an electronic key, is used to access or otherwise control the operations of a field device, such as an appliance, power tool, shipping container, and the like. In a control event in which the mobile control device interacts with the field device via wired or wireless communications, the control device obtains the current location and the field device ID. The communications between the mobile control device and the field device may be secured with encryption. The location information is used by the mobile control device to determine whether the field device should be accessed or enabled. Alternatively, the location information may be stored separately in a location sensing device, and the control event data recorded by the key and the location information recorded by the location sensing device are later combined when they are downloaded into a management system for auditing. Moreover, an electronic access control device is disclosed comprising two microprocessors.
-
Citations
48 Claims
-
1. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; communicating a signal from a communication device in a first location near the item being secured to a device in a second location remote to the item being secured to initiate the transfer of at least one of either the first record and the second record; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer the at least one record and including a time or date value associated with one of either the first and the second record; operating a plurality of computer tasks including a software program for record and data management; selecting a database via a database path identification register; communicating at least one of either the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing an identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (13, 22, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
2. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer at least one of either the first record and the second record; operating a plurality of computer tasks based on priority, wherein the tasks comprise record and data storage and record communication/transfer; selecting a database via a database path identification register; communicating at least one of either the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (10, 14, 23)
-
-
3. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; storing a third record in the memory, the third record comprising one of an identification name, a customer name, or an owner name associated with the closure; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer at least one of either the first record or the second record, and the third record; operating a plurality of computer tasks including a software program for record and data management; selecting a database via a database path identification register; communicating at least one of either the first record or the second record, and the third record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (15, 24)
-
-
4. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; storing a third record in the memory, stored after the storing of the first record, the third record comprising a value or condition associated with one of either the closure or the item, detected by a detector configured for detecting one or more conditions involving one of either the closure or the item; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer the at least one of either the first record or second record, the third record, and a value corresponding to one of either a time or date associated with the third record; operating a plurality of computer tasks including a software program for record and data management; selecting a database via a database path identification register; communicating at least one of either the first or second records and the third record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing one of either an identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (16, 25)
-
-
5. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer at least one of either the first record and the second record; operating a plurality of computer tasks including a software program for record and data management; comparing an access code or password to a stored code and permitting a database path identification number/code to be inserted into a database pointer if the access code or password is identical to the stored code; selecting a database via a database path identification register; communicating at least one of either the first or second records with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (17, 26)
-
-
6. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer at least one of either the first record and the second record; operating a plurality of computer tasks in an order based on priority, the tasks comprising unauthorized record sorting and record communication/transfer; selecting a database via a database path identification register; communicating at least one of either the first or second records with the database; identifying a record stored in the database associated with an unauthorized access event; transmitting one of either an email or a text message containing the identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (11, 18, 27)
-
-
7. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer at least one of either the first record and the second record; operating a plurality of computer tasks based on priority, the tasks comprising record accessing and record communication/transfer; selecting a database via a database path identification register; communicating at least one of either the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (12, 19, 28)
-
-
8. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; defining a schedule for sending communications between a plurality of communication devices; sending a communication per the schedule between the plurality of communication devices, the communication comprising unique identification numbers to transfer at least one of either the first record and the second record; operating a plurality of computer tasks including a software program for record and data management; selecting a database via a database path identification register; communicating at least one of either the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (20, 29)
-
-
9. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second memory comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer at least one of either the first and the second record; operating a plurality of computer tasks including a software program for record and data management; defining an identification code for each of the plurality of communication devices wherein the transfer of at least one record is received via at least one of the plurality of communication devices and is, communicated with a database; determining each of the records communicated with the database; selecting the database via a database path identification register; communicating at least one of either the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing the identification parameter of a lock or closure or an item that was subject to the unauthorized access event. - View Dependent Claims (21, 30)
-
-
48. A method for controlling and recording the security of an enclosure comprising the steps of:
-
storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure; storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure; communicating a signal from a communication device in a first location remote to the item being secured to a device in a second location near to the item being secured to initiate the transfer of at least one of either the first record and the second record; sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer the at least one record and including a time or date value associated with one of either the first and the second record; operating a plurality of computer tasks including a software program for record and data management; selecting a database via a database path identification register; communicating at least one of either the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and transmitting one of either an email or a text message containing an identification parameter of a lock or closure or an item that was subject to the unauthorized access event.
-
Specification