Electronic security system for monitoring mechanical keys and other items
First Claim
1. An electronic security system, comprising:
- a secured enclosure including a safe or a vending machine;
an electronic detection circuit for detecting authorized and unauthorized access events;
a closure having a storage area for containing an item to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible;
a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detecting an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position;
a second detector configured to detect authorized and unauthorized accessing of the closure and storing in a memory a second record, after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event;
a data storage and communication device comprising an identification number and one of either the first or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of either the first record and the second record, and a signal produced in a first location to initiate transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device or a database in a second location, wherein the transfer includes a value corresponding to a time or date associated with one of either the first record or second record to the database;
a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management;
a database pointer comprising a database path identification; and
a database selected via the database path identification, said database comprising item identification values and access identification codes;
wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of;
selecting the database via the database path identification and communicating at least one of the first record and the second record with the database;
identifying a record stored in the database associated with an unauthorized access event; and
transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event to a device remote to the secured enclosure.
0 Assignments
0 Petitions
Accused Products
Abstract
A security system with a security container and an electronic lock circuit is used to securely store mechanical keys or other valuable items. Items to be protected are placed in a secured location in the security container. A detector of the security system detects whether the items are indeed in the secured location, such as by means of receiving signals from a transponder attached to the items. The security container is locked only if the items are detected to be in the secured location. Audit trail records for the locking and unlocking events of the security container may be transmitted to a device remote to the security container for analysis. A monitoring device with a location identification device, such as a GPS sensor, may be attached to items to be monitored for tracking locations and activities of the items.
137 Citations
47 Claims
-
1. An electronic security system, comprising:
- a secured enclosure including a safe or a vending machine;
an electronic detection circuit for detecting authorized and unauthorized access events;
a closure having a storage area for containing an item to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible;
a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detecting an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position;
a second detector configured to detect authorized and unauthorized accessing of the closure and storing in a memory a second record, after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event;
a data storage and communication device comprising an identification number and one of either the first or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of either the first record and the second record, and a signal produced in a first location to initiate transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device or a database in a second location, wherein the transfer includes a value corresponding to a time or date associated with one of either the first record or second record to the database;
a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management;
a database pointer comprising a database path identification; and
a database selected via the database path identification, said database comprising item identification values and access identification codes;
wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of;
selecting the database via the database path identification and communicating at least one of the first record and the second record with the database;
identifying a record stored in the database associated with an unauthorized access event; and
transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event to a device remote to the secured enclosure. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
- a secured enclosure including a safe or a vending machine;
-
11. An electronic security system, comprising:
- a secured enclosure including a safe or a vending machine;
a lock;
an electronic lock control circuit for controlling operations of the lock and for identifying authorized and unauthorized lock access events;
a closure having a storage area for containing an item or items to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible;
a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detects an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position;
wherein the electronic lock control circuit is configured to actuate the lock to unlock the closure upon receiving an access signal;
a second detector configured to detect authorized and unauthorized accesses of the closure, and storing in a memory, a second record stored after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or unauthorized closure access event;
a data storage and communication device comprising an identification number and one of either the first record or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record and the second record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device or a database in a second location;
a processor located remote to the secured enclosure and employing an operation system for operating a plurality of tasks, wherein at least one task is a software program for record data management;
a database pointer comprising a database path identification; and
a database selected via the database path identification, said database comprising item identification values and access identification codes;
wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of;
selecting the database via the database path identification and communicating at least one of the first record and the second record with the database;
identifying a record stored in the database associated with an unauthorized access event; and
transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to the unauthorized access event to a device remote to the secured enclosure. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
- a secured enclosure including a safe or a vending machine;
-
20. An electronic security system, comprising:
- a secured enclosure including a safe or a vending machine;
an electronic detection system for detecting authorized and unauthorized access events;
a closure having a storage area for containing an item to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible;
a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detecting an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position;
a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory a second record, stored after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event;
a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record or the second record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record and the second record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second record between the data storage and communication device in the first location and a communication device in a second location;
a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management;
a database pointer comprising a database path identification; and
a database selected via the database path identification, said database comprising item identification values and access identification codes;
wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of;
selecting the database via the database path identification and communicating the first record or the second record with the database;
identifying a record stored in the database associated with an unauthorized access event;
transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to an unauthorized access event to a device remote to the secured enclosure; and
initiating communication of an enable signal from the communication device or database in the second location to the data storage and communication device in the first location. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
- a secured enclosure including a safe or a vending machine;
-
29. An electronic security system, comprising:
- a secured enclosure including a safe or a vending machine;
an electronic detection system for detecting authorized and unauthorized access events;
a closure having a storage area for containing an item to be protected, the closure being movable to an open position for accessing the item and a closed position in which the item contained in the closure is not accessible;
a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detects an identification value of the item as the item is being positioned and secured in a select area of the closure, and stores in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position;
a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory a second record, stored after the storing of the first record, the second record comprising an identification code associated with either the authorized or the unauthorized closure access event;
a third detector for detecting one or more conditions involving one of either the closure of the item, and storing in a memory a third record, stored after the storing of the first record, the third record comprising a value or condition associated with one of either the closure of the item;
a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record, the second record or the third record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record, the second record, and the third record, and a signal produced in a first location to initiate the transfer of one of either the first record or the second records between the data storage and communication device in the first location and a communication device in a second location;
a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management;
a database pointer comprising a database path identification; and
a database selected via the database path identification, said database comprising item identification values and access identification codes;
wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of;
selecting the database via the database path identification and communicating at least one of the first record and the second record with the database;
identifying a record stored in the database associated with an unauthorized access event; and
transmitting one of either an email or a text message containing the identification parameter of a lock or a closure or an item that was subject to an unauthorized access event to a device remote to the secured enclosure. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
- a secured enclosure including a safe or a vending machine;
-
38. An electronic security system, comprising:
- a secured enclosure including a safe or a vending machine;
an electronic detection system for detecting authorized and unauthorized access events;
a closure having a storage area for containing an item to be protected and being in a first location, the closure being movable between an open position for accessing the item and a closed position in which the item contained in the closure is not accessible;
a first detector limited in distance and in direction configured to detect an item within substantially less than the storage area of the closure, the first detector detecting an identification value of the item as the item is being positioned and secured in a select area of the closure, and storing in a memory a first record comprising the identification value of the item being protected in the closure while the closure is in the closed position;
a second detector configured to detect the authorized and unauthorized accessing of the closure and storing in a memory, a second record stored after the storing of the first record, the second record comprising an identification code associated with one of either the authorized or the unauthorized closure access event;
a third record stored in the first location and comprising at least one identification number associated with the closure and one of either a customer name or location name;
a data storage and communication device enabled and disabled for data storage operation, comprising an identification number and one of either the first record, the second record or the third record, configured to perform, at least in part, a network communication operation between a plurality of communication devices comprising at least one of the first record, the second record, and the third record, and a signal produced in the first location to initiate the transfer of at least one of the first record and the second record between the data storage and communication device located in the first location and a communication device in a second location;
a processor located remote to the secured enclosure and employing an operating system for operating a plurality of tasks, wherein at least one task is a software program for record data management;
a database pointer comprising a database path identification; and
a database selected via the database path identification, said database comprising item identification values and access identification codes;
wherein the software program includes computer-executable instructions for performing, at least in part, a data transfer operation, said operation comprising the steps of;
selecting the database via the database path identification and communicating at least one of the first record and the second record with the database;
identifying a record stored in the database associated with an unauthorized access event; and
transmitting one of either an email or a text message containing the customer name or location of a closure or an item that was subject to an unauthorized access event to a device remote to the secured enclosure. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47)
- a secured enclosure including a safe or a vending machine;
Specification