Gaming security system and associated methods for selectively granting access
First Claim
1. A keyless management system for automating selective access to a lockable device, said system comprising:
- a command kiosk providing a means to remotely manage multiple lockable devices, wherein said command kiosk comprises;
a touch screen personal computer having a processor executing one or more algorithms operable for identifying a user, authorizing a predetermined level of command control based upon the identity of the user, receiving a command from the user to provide access to the lockable device to the user and a third party, generating and translating the command into a form that may be received by a remote device, where there is at least one remote device;
a radio frequency transceiver;
a biometric scanner for logging the user on to the computer;
a keyless management system software application with a database program, wherein the application provides a listing and a current status of each lockable device controlled by the command kiosk;
a communications channel operable for communicating the translated command to the remote device; and
a security assembly that is the remote device, where the remote device is proximate to the lockable device and provides a means to lock or unlock the lockable device, where said security assembly comprises;
a controller having a unique address, that has one or more algorithms for translating the communicated command and implementing the translated command;
an actuation mechanism actuated by the translated command;
one or more switches for detecting if the status of the actuation mechanism is positively locked or positively unlocked or if the status is in an alert condition or otherwise;
a reporting algorithms for translating the status into a form that may be received by the command kiosk;
a radio frequency transceiver;
a housing for mounting and protecting the security assembly; and
a communications channel operable for communicating the translated status to the command kiosk.
7 Assignments
0 Petitions
Accused Products
Abstract
In various embodiments, the present invention provides a keyless management system for automating selective access to a lockable device and a method for selectively granting access. The system and method include the lockable device coupled to and secured by a security assembly; a processor remotely located from the device executing one or more algorithms operable for identifying a user, authorizing a predetermined level of command control based upon the identity of the user, receiving a command from the user to provide access to the device to at least one of the users and a third party, and translating the command into a form that may be received by the security assembly; a communications channel operable for communicating the translated command to the security assembly; and a controller proximately located to the device executing one or more algorithms operable for actuating the security assembly in response to the translated command, thereby providing access to the device to at least one of the users and a third party.
40 Citations
21 Claims
-
1. A keyless management system for automating selective access to a lockable device, said system comprising:
-
a command kiosk providing a means to remotely manage multiple lockable devices, wherein said command kiosk comprises;
a touch screen personal computer having a processor executing one or more algorithms operable for identifying a user, authorizing a predetermined level of command control based upon the identity of the user, receiving a command from the user to provide access to the lockable device to the user and a third party, generating and translating the command into a form that may be received by a remote device, where there is at least one remote device;
a radio frequency transceiver;
a biometric scanner for logging the user on to the computer;
a keyless management system software application with a database program, wherein the application provides a listing and a current status of each lockable device controlled by the command kiosk;
a communications channel operable for communicating the translated command to the remote device; and
a security assembly that is the remote device, where the remote device is proximate to the lockable device and provides a means to lock or unlock the lockable device, where said security assembly comprises;
a controller having a unique address, that has one or more algorithms for translating the communicated command and implementing the translated command;
an actuation mechanism actuated by the translated command;
one or more switches for detecting if the status of the actuation mechanism is positively locked or positively unlocked or if the status is in an alert condition or otherwise;
a reporting algorithms for translating the status into a form that may be received by the command kiosk;
a radio frequency transceiver;
a housing for mounting and protecting the security assembly; and
a communications channel operable for communicating the translated status to the command kiosk. - View Dependent Claims (2, 3, 4, 5, 6, 9, 10, 11, 12, 13, 14)
-
- 7. The system of claim 7, wherein the application provides the touch screen with color coded icons indicating the status of whether the chip tray is locked, unlocked or in the alert condition.
-
15. A method for selectively granting access, comprising:
-
providing a lockable device coupled to and secured by a security assembly;
providing a command kiosk with a processor remotely located from the lockable device executing one or more algorithms operable for identifying a user, authorizing a predetermined level of command control based upon the identity of the user, receiving a command from the user to provide access to the device to at least one of the user and a third party, and translating the command into a form that may be received by the security assembly;
providing a communications channel operable for communicating the translated command to the security assembly;
providing a controller proximately located to the lockable device executing one or more algorithms operable for actuating the security assembly in response to the translated command, thereby providing access to the lockable device to at least one of the user and a third party;
logging in a user with a biometric scanner and confirming against a database of users, where each user has a biometric password and is assigned a level of access;
selecting a lockable device and confirming against a database of lockable devices having a unique address and a level of access, that the user has as high or a higher level of access than the selected lockable device;
assuming that the user has clearance, selecting at least one third party from a list;
actuating a lock on a selected lockable device, or canceling to exit or start the process over; and
recording all entries for possible later generation of a report. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification