Electronic Security System for Monitoring Mechanical Keys and Other Items
First Claim
1. An electronic security system, comprising:
- a secured enclosure;
an electronic detection circuit for detecting authorized and unauthorized access events relative to the secured enclosure;
a closure having a storage area for containing an item to be protected, the closure being configured to have an open position for accessing the item and a closed position in which the item contained in the closure is not accessible;
a first detector limited in distance and in direction configured to detect an item, the first detector detecting an identification value of the item as the item is being positioned and secured in the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure;
a second detector configured to detect authorized and unauthorized accessing of the closure and storing in a memory a second record, the second record comprising an identification code associated with the authorized or the unauthorized closure access event;
a data storage and communication device comprising an identification number and one of either the first or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of either the first record and the second record, and a signal produced in a first location to initiate transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device or a database in a second location;
a processor located remote to the secured enclosure and employing an operating system executing a plurality of tasks, wherein at least one task is defined by a computer-executable program for record data management;
a database pointer comprising a database path identification; and
a database selected via the database path identification;
wherein the computer-executable program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of;
selecting the database via the database path identification and communicating at least one of the first record and the second record with the database;
identifying a record stored in the database associated with an unauthorized access event; and
creating an alert message record containing at least one of the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event and transmitting or storing the alert message record to a device remote to the secured enclosure.
0 Assignments
0 Petitions
Accused Products
Abstract
A security system with a security container and an electronic lock circuit is used to securely store mechanical keys or other valuable items. Items to be protected are placed in a secured location in the security container. A detector of the security system detects whether the items are indeed in the secured location, such as by means of receiving signals from a transponder attached to the items. The security container is locked only if the items are detected to be in the secured location. Audit trail records for the locking and unlocking events of the security container may be transmitted to a device remote to the security container for analysis. A monitoring device with a location identification device, such as a GPS sensor, may be attached to items to be monitored for tracking locations and activities of the items.
-
Citations
60 Claims
-
1. An electronic security system, comprising:
-
a secured enclosure; an electronic detection circuit for detecting authorized and unauthorized access events relative to the secured enclosure; a closure having a storage area for containing an item to be protected, the closure being configured to have an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item, the first detector detecting an identification value of the item as the item is being positioned and secured in the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure; a second detector configured to detect authorized and unauthorized accessing of the closure and storing in a memory a second record, the second record comprising an identification code associated with the authorized or the unauthorized closure access event; a data storage and communication device comprising an identification number and one of either the first or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of either the first record and the second record, and a signal produced in a first location to initiate transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device or a database in a second location; a processor located remote to the secured enclosure and employing an operating system executing a plurality of tasks, wherein at least one task is defined by a computer-executable program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification; wherein the computer-executable program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of; selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and creating an alert message record containing at least one of the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event and transmitting or storing the alert message record to a device remote to the secured enclosure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
-
11. An electronic security system, comprising:
-
a secured enclosure; a lock configured to selectively prevent or allow access to the secured enclosure; an electronic lock control circuit for controlling operations of the lock and for identifying authorized and unauthorized lock access events; a closure having a storage area for containing an item or items to be protected, the closure being configured to have an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item, the first detector detects an identification value of the item as the item is being positioned and secured in the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure; wherein the electronic lock control circuit is configured to actuate the lock to unlock the closure upon receiving an access signal; a second detector configured to detect authorized and unauthorized accesses of the closure, and storing in a memory a second record, the second record comprising an identification code associated with one of either the authorized or unauthorized closure access event; a data storage and communication device comprising an identification number and one of either the first record or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record and the second record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device or a database in a second location; a processor located remote to the secured enclosure and employing an operation system for executing a plurality of tasks, wherein at least one task is a defined by a computer-executable program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification; wherein the computer-executable program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of; selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and creating an alert message record containing at least one of the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event and transmitting or storing the alert message record to a device remote to the secured enclosure. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An electronic security system, comprising:
-
a secured enclosure; an electronic detection system for detecting authorized and unauthorized access events relative to the secured enclosure; a closure having a storage area for containing an item to be protected, the closure being configured to have an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item, the first detector detecting an identification value of the item as the item is being positioned and secured in the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure; a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory a second record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event; a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record and the second record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device in a second location; a processor located remote to the secured enclosure and employing an operating system configured to execute a plurality of tasks, wherein at least one task is defined by a computer-executable program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification; wherein the computer-executable program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of; selecting the database via the database path identification and communicating the first record and/or the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and creating an alert message record containing at least one of the identification parameter of a lock or a closure or an item that was subject to an unauthorized access event and transmitting or storing the alert message record to a device remote to the secured enclosure. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 48)
-
-
29. An electronic security system, comprising:
-
a secured enclosure such as a safe or a vending machine; an electronic detection system for detecting authorized and unauthorized access events relative to the secured enclosure; a closure having a storage area for containing an item to be protected, the closure being configured to have an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item, the first detector detects an identification value of the item as the item is being positioned and secured in the closure, and stores in a memory a first record comprising the identification value of the item being protected in the closure; a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory a second record, the second record comprising an identification code associated with either the authorized or the unauthorized closure access event; a third detector for detecting one or more conditions involving one of either the closure or the item, and storing in a memory a third record, stored after the storing of the first record, the third record comprising a value or condition associated with one of either the closure or the item; a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record, the second record or the third record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record, the second record, and the third record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second records between the data storage and communication device in the first location and a communication device in a second location; a processor located remote to the secured enclosure and employing an operating system configured to execute a plurality of tasks, wherein at least one task is defined by a computer-executable program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification; wherein the computer-executable program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of; selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and creating an alert message record containing at least one of the identification parameter of a lock or a closure or an item that was subject to an unauthorized access event and transmitting or storing the alert message record to a device remote to the secured enclosure. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. An electronic security system, comprising:
-
a secured enclosure; an electronic detection system for detecting authorized and unauthorized access events relative to the secured enclosure; a closure having a storage area for containing an item to be protected and being in a first location, the closure being configured to have an open position for accessing the item and a closed position in which the item contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect an item, the first detector detecting an identification value of the item as the item is being positioned and secured in the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure; a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory a second record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event; a third record stored in the first location and comprising at least one identification number associated with the closure and one of either a customer name or location name; a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record, the second record or the third record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record, the second record, and the third record, and a signal produced in the first location to initiate the transfer of at least one of the first record and the second record between the data storage and communication device located in the first location and a communication device in a second location; a processor located remote to the secured enclosure and employing an operating system configured to execute a plurality of tasks, wherein at least one task is defined by a computer-executable program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification; wherein the computer-executable program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of; selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and creating an alert message record containing at least one of the customer name or location of a closure or an item that was subject to an unauthorized access event and transmitting or storing the alert message record to a device remote to the secured enclosure. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
49. An electronic security system, comprising:
-
a secured enclosure; an electronic detection circuit for detecting authorized and unauthorized access events relative to the secured enclosure; a closure having a storage area for containing an item or items to be protected, the closure being configured to have an open position for accessing the item or items and a closed position in which the item or items contained in the closure is not accessible; a first detector limited in distance and in direction configured to detect a first item, the first detector detecting the presence or absence of the first item stored in the closure, and storing in a memory a first record comprising the presence or absence of the first item; a second detector configured to detect authorized and unauthorized accessing of the closure and storing in a memory a second record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event; a data storage and communication device comprising an identification number and one of either the first record or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising the first record and the second record, and a signal produced in the first location to initiate the transfer of at least one of the first record and the second record between the data storage and communication device located in the first location and a communication device in a second location; a processor located remote to the secured enclosure and employing an operating system configured to execute a plurality of tasks, wherein at least one task is defined by a computer-executable program for record data management; a database pointer comprising a database path identification; and a database selected via the database path identification; wherein the computer-executable program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of; selecting the database via the database path identification and communicating at least one of the first record and the second record with the database; identifying a record stored in the database associated with an unauthorized access event; and creating an alert message record containing at least one of the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event and transmitting or storing the alert message record at a device remote to the secured enclosure. - View Dependent Claims (50, 51)
-
Specification