Authorization system and method using a weighing scale to control access based on a registered weight of a key and key ring combination
First Claim
Patent Images
1. A key identification system comprising:
- keys to be identified being placed on key rings;
a weight and an identity of each ring and key combination being registered with a controller;
a weigh scale arranged outside of a storage box for ring and key combinations, the weigh scale being adapted to weigh ring and key combinations;
the weigh scale delivering to the controller a signal corresponding to a weight of a ring and key combination;
the controller being adapted to compare a scale weight of a ring and key combination with a registered weight of the same ring and key combination; and
the controller using the weight signal to control access to the storage box.
1 Assignment
0 Petitions
Accused Products
Abstract
Weight is used to help identify key and ring combinations authorized to certain persons. This is done by associating a weigh scale with each storage box for key and ring combinations, all of which have different total weights. The weights of all the key and ring combinations are registered with a computer, along with authentication and storage information. Then as key and ring combinations are removed from or returned to a storage box, they are weighed on scale 25 so that a computer can compare the scale weight with a registered weight. For any discrepancy, the computer can initiate one of many security actions.
-
Citations
16 Claims
-
1. A key identification system comprising:
-
keys to be identified being placed on key rings; a weight and an identity of each ring and key combination being registered with a controller; a weigh scale arranged outside of a storage box for ring and key combinations, the weigh scale being adapted to weigh ring and key combinations; the weigh scale delivering to the controller a signal corresponding to a weight of a ring and key combination; the controller being adapted to compare a scale weight of a ring and key combination with a registered weight of the same ring and key combination; and the controller using the weight signal to control access to the storage box. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of identifying a ring and key combination, the method comprising:
-
using a weigh scale outside of a key storage, box to weigh the ring and key combination so that the weigh scale produces a signal corresponding to the weight of the ring and key combination; comparing the weight signal with a pre-determined weight of the same ring and key combination to authenticate identity of the ring and key combination; and granting access to the key storage box only on presentation to the weigh scale of a ring and key combination having the predetermined weight. - View Dependent Claims (7, 8, 9)
-
-
10. A method of securing a key storage system, the method comprising:
-
forming ring and key combinations differing in total weight; registering the weight and identity of each combination with a computer; providing a weigh scale outside a key and ring storage box; arranging the weigh scale to send to the computer a signal based on the weight of a ring and key combination weighed by the scale; arranging the computer to compare the weight signal with a registered weight as an identifier of the weighed ring and key combination; and using the computer to deny access to the key storage box unless the weight signal matches the registered weight. - View Dependent Claims (11, 12)
-
-
13. A key storage system comprising:
-
a key storage box affording access to keys on key rings stored in the box; a weigh scale arranged outside of the key storage box and adapted to weigh a ring and key combination; the weigh scale being arranged to send to a computer a weight signal corresponding to the weight of the ring and key combination being weighed by the scale; the computer being arranged to compare the weight signal with a predetermined weight of the same ring and key combination to authenticate identity of the ring and key combination for security purposes; and using the computer to grant access to the key storage box only upon presentation to the weigh scale of a key and ring combination having the predetermined weight. - View Dependent Claims (14, 15, 16)
-
Specification