×

Method for Controlling and Recording the Security of an Enclosure

  • US 20120011366A1
  • Filed: 07/14/2011
  • Published: 01/12/2012
  • Est. Priority Date: 12/27/2001
  • Status: Abandoned Application
First Claim
Patent Images

1. A method for controlling and recording the security of an enclosure comprising the steps of:

  • storing a first record in a memory, the first record comprising an identification value of an item being protected in an enclosure, wherein the identification value of the item is detected while the enclosure is in a closed position by a detector limited in distance and direction by substantially less than the storage area of the enclosure;

    storing a second record in the memory, after the storing of the first record, the second record comprising an identification code associated with one of either an authorized or an unauthorized closure access event as detected by a detector configured to detect the authorized or unauthorized accessing of the closure;

    communicating a signal from a communication device in a first location near the item being secured to a device in a second location remote to the item being secured to initiate the transfer of at least one of either the first record and the second record;

    sending a communication between a plurality of communication devices, the communication comprising unique identification numbers to transfer the at least one record and including a time or date value associated with one of either the first and the second record;

    operating a plurality of computer tasks including a software program for record and data management;

    selecting a database via a database path identification register;

    communicating at least one of either the first record and the second record with the database;

    identifying a record stored in the database associated with an unauthorized access event; and

    transmitting one of either an email or a text message containing an identification parameter of a lock or closure or an item that was subject to the unauthorized access event.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×