U.S. patent application number 10/162560 was filed with the patent office on 2003-12-11 for container for securing and uniquely identifying objects.
Invention is credited to Smith, Edwin E., Wilder, Ronald P..
Application Number | 20030226772 10/162560 |
Document ID | / |
Family ID | 29709837 |
Filed Date | 2003-12-11 |
United States Patent
Application |
20030226772 |
Kind Code |
A1 |
Smith, Edwin E. ; et
al. |
December 11, 2003 |
Container for securing and uniquely identifying objects
Abstract
A container for securing and uniquely identifying objects are
provided for use with an asset tracking system of the type having a
latching device to physically hold the container in place and to
automatically sense the memory device which is part of the
container. The container includes a surface for being physically
latched in place, a device for securing objects such as keys and
includes a circuit board which hosts the memory device. Containers
are generally rectangular in shape, but include beveled surface to
ensure that they can only be inserted into the asset tracking
system in one direction. In one embodiment, the container is
equipped with reusable metal lanyards to attach keys to the
container.
Inventors: |
Smith, Edwin E.; (Chantilly,
VA) ; Wilder, Ronald P.; (Campbell, CA) |
Correspondence
Address: |
Edwin E. Smith
4640 Star Flower Dr.
Chantilly
VA
20151
US
|
Family ID: |
29709837 |
Appl. No.: |
10/162560 |
Filed: |
June 6, 2002 |
Current U.S.
Class: |
206/37.1 ;
206/1.5; 206/37.4 |
Current CPC
Class: |
A45C 11/323
20130101 |
Class at
Publication: |
206/37.1 ;
206/37.4; 206/1.5 |
International
Class: |
A45C 011/32 |
Claims
I claim:
1. A container for holding objects in an asset control system,
comprising: (a) an opening for accessing the interior of the
container (b) a panel covering said opening having a mechanism for
retaining said panel in a closed position whereby loose objects can
be stored in the container (c) an aperture having clearance for
receiving the latching device provided as part of the asset control
system (d) a solid surface for mating with said latching device
whereby the container can be secured in the asset control system by
the latching device of the asset control system (e) conductive pads
with an attached identification device mounted within said
container in such as way as to be accessible from the exterior of
the container for detection and identification by said asset
control system whereby said container can be uniquely identified by
the asset control system
2. A container assembly as claimed in 1 and wherein said panel is
attached to said container along one edge of the container and the
panel is hingeable between a closed position and an open
position
3. A container assembly as claimed in 1 wherein a plurality of
holes is formed to receive fastening devices for securing objects
to said container
4. A container assembly as claimed in 3 wherein the fastening
device used to secure objects to the container is a metal lanyard
whereby objects can be attached to and removed from the said
lanyard
5. A container assembly as claimed in 3 wherein the fastening
device used to secure objects to the container is a ratcheting
plastic device whereby said ratcheting plastic device is designed
for a single use and removal of an object from the ratcheting
plastic device renders the ratcheting plastic device unusable.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] Not applicable
BACKGROUND
[0002] 1. Field of Invention
[0003] This invention relates generally to asset tracking systems
and more particularly to uniquely identifiable containers that are
capable of being physically secured in a cabinet to protect keys
and other objects.
[0004] 2. Description of Prior Art
[0005] Controlling access to items such as keys and access cards is
one method of managing a wide range of assets such as vehicles,
aircraft, boats, commercial property and vacation homes. By
controlling the key or access card, you effectively control the
asset. As part of the control process, there is a need to
selectively limit access to keys and other objects in a way that
physically prevents unauthorized access, provides an audit trail of
each access to the key or object, and provides notification to
management personnel in the event that unauthorized access attempts
are made.
[0006] A wide range of systems exists to control objects such as
keys. These systems range from fully manual systems to totally
automated systems. The manual systems may include key hooks and a
logbook that is used to manually record each key-out and key-in
transaction. The limitation of this approach is that the process
can be circumvented intentionally, may be inaccurate due to
unintentional errors in the recording of key numbers or user's
identity, and keys may be difficult to locate if they are not
returned to the correct location on the key hook system.
Additionally, selectively limiting access to specific keys using a
manual key control system must be done via the honor system.
Automated systems for controlling objects such as keys range
considerably. One such system, as disclosed in U.S. Pat. No.
5,801,628, can physically restrict access to large sets of keys and
can track key-out and key-in transactions for individual keys.
While this system can track key movement on a key-by-key basis, its
limitation is that each key in a large drawer of keys is not
individually secured in place. The keys are attached with a rivet
to a plastic tag containing a "touch memory device" containing an
ID code. The tags are inserted into a slotted panel within a
drawer, however they are not secured in place. This leaves the keys
prone to removal by unauthorized users, prone to tampering with the
key identification tags, and even prone to users making molds of
the keys since they are exposed to each user with access to the
drawer of keys. Another such system physically secures keys on a
ring (the ring hangs in a key cabinet) and limits removal of keys
and rings. However, keys remain exposed and prone to tampering
including making a mold of a key. Finally, another key system
secures keys inside of plastic containers that are identified via a
bar code. The plastic containers reside on a carousel inside of the
key system and are dispensed using a series of multiple motors and
other mechanical devices after access is authorized to the specific
set of keys. This system is mechanically complex and prone to
failure.
[0007] Microprocessor-controlled or personal computer-controlled
systems are used as part of many automated asset control systems. A
variety of methods are used to identify users, however, the means
are generally similar amongst the different systems. The primary
differences between automated asset control systems are the methods
by which keys are identified, the extent to which keys are exposed
to potential threats, and the method by which keys are secured
inside of the asset controlling cabinet.
[0008] Key identification in automated systems is generally
accomplished using either a bar code or some type of memory touch
device. Bar codes are typically printed on a label and affixed to
an object that is attached to a set of keys. The disadvantage of
this approach is that bar codes can be removed or can become
unreadable due to normal wear because they are on a paper medium.
Bar codes can be easily counterfeited or duplicated using devices
as simple as a copier machine or a standard personal computer.
Finally, bar codes are difficult to scan on a frequent interval
when keys are in an enclosed area due to the need to have a bar
code reader access the relatively large bar code at a perpendicular
angle within a confined space. Memory touch devices are more common
than bar codes in automated key systems. Memory touch devices come
in a variety of sizes and offer the advantage that they are rugged,
not very prone to failure, they are compact, they are commercially
available, they can not be reproduced without sophisticated means,
and they can be sensed electronically within the tight confines of
a key cabinet.
[0009] The environment in which an automated asset control system
can be deployed is heavily dependent upon the extent to which the
keys are exposed to potential threats. Independent of whether or
not a user can physically remove a key, consideration must be given
to the extent to which keys are visually or tactilely exposed to
unauthorized users. In environments where all of the users are
"trusted", keys may be visible to users that are not allowed to
have access to the keys. That is, the keys may be prone to
tampering or casting because they are secured in a system in a way
that leaves keys exposed on an electronically-controlled key ring
or riveted to plastic tags. However, in environments where threats
exist, it is much more critical that keys are hidden from view and
exposed only to those with permission to access the specific key or
object. Keys that are individually stored in a container within a
key cabinet are not exposed to the threat.
[0010] A different, yet equally important feature of asset control
systems is the method by which assets are secured inside of the
cabinet. One shortcoming of only securing an entire cabinet or an
entire drawer of keys is that an unauthorized key may be removed by
anyone gaining access to an entire cabinet or drawer full of keys.
A user with the lowest privilege level could physically remove keys
requiring the highest access privilege if the keys are not
individually secured in a cabinet. Most automated systems notify
administrators of such a security breach. However, at times when
administrators can not respond immediately, or the potential
liability of the wrong key being accessed is great, allowing the
wrong keys to be physically removed from the asset control cabinet
is not acceptable. Keys or objects that are individually secured in
a cabinet are not prone to accidental removal or removal by those
with malicious intent.
SUMMARY
[0011] Briefly described, the present invention is for use in
securing and uniquely identifying objects such as keys or access
control cards in an access control system. The invention is
generally a rectangular container equipped with lanyards for
securing keys. The unit contains a unique electronic identification
chip and an aperture in the invention to accommodate a latching
device that is part of an associated automated access control
system. The container has a hinged lid with a locking tab. The tab
is depressed to open the lid so as to provide access to the
contents of the container.
[0012] The invention is used as part of an access control system.
The rectangular container is dispensed from, and inserted into, a
slot in an automated access control system. To ensure that the
invention is always placed into the access control system in the
proper orientation, the rectangular container has a beveled edge
that mates with a matching bevel in the access control system. A
bevel on the edge of the container runs nearly ninety percent of
the length of the container, thus exposing the bevel from only one
end of the container. The access control system has a mating bevel
that allows the beveled edge of the container to slide into the
access control system's slot, however, the non-beveled end of the
container cannot be inserted into the system. This configuration
limits insertion of the container into the access control system's
slot in only one orientation.
[0013] The unique identification of each container is accomplished
using a small circuit board that contains the serialized
identification chip on one side and a pair of gold contact pads on
the reverse side. The circuit board is fixed into a tailored groove
in the container, secured with epoxy, and a cover is installed on
top of the circuit board to prevent tampering. The gold contact
pads face the rear of the container and are arranged in such as way
as to mate with sensing devices that are part of the access control
system. To reduce the risk of electronic chip damage due to
electrostatic discharge, the contacts are inset from the rear
surface of the container. This configuration ensures that
electrostatic damage due to contact with surfaces in the
environment that are prone to electrostatic discharge cannot occur
simply by bumping the flat edge of the container against the
statically charged object.
[0014] In the rear of each slot of the associated access control
system, there is a mechanism to sense the presence of a container.
As the container is returned to the access control system by
sliding the container into a slot, a latching device catches the
back of the container and locks it into place. At the point that
the container is locked securely into place by the latching device,
two spring-loaded probes from the access control system contact the
gold plated circuit board pads located on the rear of the
container. An electrical connection within the access control
system communicates the unique electronic serial identification
number to the system's main processor for identifying the incoming
container.
[0015] Three lanyards are mounted to the container in a manner that
allows the lanyards and associated keys to remain affixed to the
container while hanging either inside of the invention or outside
of the invention while the hinged lid is closed. That is, the
lanyards pivot in such as way as to allow a single key mounted on a
lanyard to be used in an application such as a car while the
remaining keys remain mounted within the plastic container while
the lid is closed. Any combination of the three lanyards/keys can
be positioned inside or outside of the container at any given time.
Lanyards have a two hundred and seventy degree freedom of motion so
as to allow keys to hang freely from the container and facilitate
ease-of-use while still affixed to the plastic container.
[0016] These and other objects and advantages of the invention will
be apparent from the following detailed description when read with
reference to the drawings.
OBJECTS AND ADVANTAGES
[0017] Accordingly, besides the objects and advantages of the
container for securing and uniquely identifying objects in my above
patent, several objects and advantages of the present invention
are:
[0018] (a) To include an integrated identification device--the
identification chip is not affixed to a plastic tag or other
protruding device and therefore can not be easily removed from the
container as a means of tampering with the device;
[0019] (b) To work with a simple latching mechanism with few moving
parts, thereby minimizing the chance of failure;
[0020] (c) To provide a container that hides keys and other objects
from view of users that have not been provided access to the
specific keys or object--in other words, this unit can be in
environments in which un-trusted users will be accessing keys or
other objects because viewing of objects can be restricted on an
object-by-object basis;
[0021] (d) To provide a container that physically locks keys and
other objects in place and prevents unauthorized users from
removing the specific keys or object--in other words, this unit can
be in environments in which un-trusted users will be accessing keys
or other objects because access can be restricted on an
object-by-object basis;
[0022] (e) To provide a container that can accommodate keys, but
also any other object that fits within the size constraints of the
container, particularly objects that are the size of a standard
credit card--this facilitates distribution of several items
simultaneously such as car keys and a gas credit card;
[0023] (f) To provide a container that can accommodate keys and
other objects and be uniquely identified thereby facilitating
processing such as billing or access restriction on an
object-by-object basis;
[0024] (g) To provide re-usable lanyards for securing keys within
the container so as to allow re-use of the container--in other
words eliminating recurring costs for the end user are
minimized;
[0025] (h) To provide a size and shape that facilitates use of
single-use cable ties, in lieu of the re-usable lanyard, to enable
users to implement a tamper-proof mechanism for securing keys
within the container;
[0026] (i) To provide a container that facilitates the use of the
key while it is still physically attached to the uniquely
identifiable container so as to eliminate the need to ever remove
keys from the container during use.
[0027] (j) To include an integrated, living-hinge such that the
container can endure more than 2,500 openings and closing of the
hinged panel, thereby reducing the need to replace the containers
during normal use.
[0028] Further objects and advantages are to provide a container
for securing and uniquely identifying objects which is easy-to-use,
is inexpensive to manufacture, which can be made in any color to
provide user-specific value, and which protects the serialized
identification chip from electrostatic discharge. Still further
objects and advantages will become apparent from a consideration of
the ensuing description of drawings.
DRAWING FIGURES
[0029] In the drawings, closely related figures have the same
number but different alphabetic suffixes.
[0030] FIG. 1-A is a back, pictoral representation of a container
for securing and uniquely identifying objects. In this view, the
hinged lid is closed.
[0031] FIG. 1-B is a back, pictoral representation of a container
for securing and uniquely identifying objects. In this view, the
hinged lid is open and the plastic cover is shown installed
covering the serial identification chip.
[0032] FIG. 1-C is a back, pictoral representation of a container
for securing and uniquely identifying objects. In this view, the
hinged lid is open and the plastic cover is shown removed from on
top of the serial identification chip. The cover is shown as a
separate component in this drawing.
[0033] FIG. 2 is a top view of the invention shown without the
serial identification chip and without the cover over the
identification chip and latch aperture. In this view, the hinged
lid is in the open position.
[0034] FIG. 3-A is a top view of the serialized identification
chip.
[0035] FIG. 3-B is a side view of the serialized identification
chip.
[0036] FIG. 3-C is a pictoral representation of the serialized
identification chip.
[0037] FIG. 4-A is a pictoral representation of the latching
mechanism for holding the hingeable panel closed on a container for
securing and uniquely identifying objects. In this view, the
hingeable panel is shown in slightly ajar position.
[0038] FIG. 4-B is a pictoral representation of the latching
mechanism for holding the hingeable panel closed on a container for
securing and uniquely identifying objects. In this view, the
hingeable panel is shown in a closed position and the snap tongue
is shown inserted in the snap slot.
[0039] FIG. 4-C is a side view cut-away, representation of a
container for securing and uniquely identifying objects. In this
view, the hingeable panel is shown in an open position.
[0040] FIG. 4-D is a side view cut-away pictoral, representation of
a container for securing and uniquely identifying objects. In this
view, the hingeable panel is shown in a closed position.
[0041] FIG. 5-A is a front, pictoral representation of a container
for securing and uniquely identifying objects. In this view, the
container is shown in a vertical orientation. The beveled edge used
to ensure the container is inserted into the asset control system
is shown at the top right.
[0042] FIG. 5-B is a rear, pictoral representation of a container
for securing and uniquely identifying objects. In this view, the
container is shown in a vertical position.
[0043] FIG. 6-A is a side view of the lanyard used to secure keys
and other objects in the container.
[0044] FIG. 6-B is a pictoral, front view of the lanyard used to
secure keys and other objects in the container. In this picture, a
key is affixed about the lanyard.
[0045] FIG. 6-C is a top view of three lanyards mounted to the
container for securing and uniquely identifying objects. Keys are
shown affixed about each lanyard.
[0046] FIG. 7-A is a pictoral view of the embodiment of the
container with one lanyard mounted to the container and one key
attached via the lanyard. In this view, the hingeable panel is in
the open position and the key is hanging outside of the
container.
[0047] FIG. 7-B is a pictoral view of the embodiment of the
container with three lanyards mounted to the container. In this
view, the hingeable panel is in the closed position and the
lanyards are contained on the inside of the container.
[0048] FIG. 7-C is a pictoral view of the embodiment of the
container with three lanyards mounted to the container. In this
view, the hingeable panel is in the closed position and one key and
its associated lanyard are hanging outside of the container. The
remaining two lanyards are contained on the inside of the
container.
[0049] FIG. 8-A is a pictoral, front view of the asset control
system slot mechanism that receives the container. The container is
shown oriented in a vertical position in the manner in which the
container is inserted into the asset control system.
[0050] FIG. 8-B is a top, cut-away view of the asset control system
slot mechanism that receives the container. The container is shown
partially inserted into the slot mechanism of the asset control
system.
[0051] FIG. 8-C is a top, cut-away view of the asset control system
slot mechanism that receives the container. The container is shown
fully inserted into the slot mechanism of the asset control
system.
[0052] FIG. 9-A is a side, cut-away view of the asset control
system slot mechanism that receives the container. In this view,
the container for securing and uniquely identifying objects is
inserted partially into the asset control system's slot mechanism
and the container has not contacted the latch assembly or the
access control system's contact pins.
[0053] FIG. 9-B is a side, cut-away view of the asset control
system slot mechanism that receives the plastic container. In this
view, the container for securing and uniquely identifying objects
is inserted partially into the asset control system's slot
mechanism and the container has contacted the latch assembly but
has not yet contacted the access control system's contact pins.
[0054] FIG. 9-C is a side, cut-away view of the asset control
system slot mechanism that receives the container. In this view,
the container for securing and uniquely identifying objects is
inserted fully into the asset control system's slot mechanism and
the container has been latched in place by the action of the latch
assembly and the access control system's contact pins have extended
to the point normally occupied by the contact pads on the contact
board.
REFERENCE NUMERALS IN DRAWINGS
[0055]
1 01 container body 02 container body right side panel 03 container
body left side panel 04 container body rear panel 05 container body
front panel 06 hingeable panel 07 hinge 08 container main cavity 09
aperture wall 10 snap indenture 11 snap tongue 12 snap neck 13 snap
slot 14 lanyard opening 15 container bevel 16 lanyard hole #1 17
lanyard hole #2 18 lanyard hole #3 19 contact board aperture 20
latch aperture 21 cover plate 22 contact board 23 cover hole #1 24
cover hole #2 25 cover hole #3 26 cover hole #4 27 cover pin #1 28
cover pin #2 29 cover pin #3 30 cover pin #4 31 latching surface 32
latch cavity 33 contact pad #1 34 contact pad #2 35 identification
chip 36 leads from identification chip 37 container bottom 38
non-beveled "stop" 39 access control system contact pins 40 lanyard
41 access control slot 42 access control slot spring 43 access
control bevel 44 access control latch 45 access control system
latch pivot 46 access control circuit board 47 access control pivot
spring 48 contact board cavity 49 access control system latch front
edge 50 access control system latch back edge 51 access control
system latch head
DETAILED DESCRIPTION--FIGS. 1-10--PREFERRED EMBODIMENT
[0056] Referring now in more detail to the drawings, in which like
numerals refer to like arts through the several views, FIG. 1-A,
FIG. 1-B, and FIG. 1-C illustrate a container that embodies
principles of the invention in one preferred form. In this view,
the container body comprises a generally rectangular body 01,
formed by a right side panel 02, a left side panel 03, a rear panel
04, a bottom panel 37, and a front panel 05 (not visible in
picture). A top panel 06 is attached by an integrated hinge 07 and
in FIG. 1-A is shown in the closed position on top of the container
body 01.
[0057] The rear panel 04 is provided with an elongated lanyard
opening 14 and lanyard holes 16, 17, and 18, which facilitate
mounting of lanyards 40. A contact board aperture 19 in the rear
panel 04 exposes the integrated contact board 22 to the sensing
devices included as part of the associated asset control system. A
latch aperture 20 in the rear panel receives the latch that is part
of the associated asset control system.
[0058] The right panel 02 includes a snap indenture 10. In FIG. 1-A
the snap tongue 11 is shown protruding through the snap slot 13 in
the hingeable panel 06. In use, the hingeable panel 06 is pressed
down onto the snap tongue 11 resulting in the marriage of the snap
tongue 11 into the snap slot 13.
[0059] The left panel 03 is provided with a container bevel 15 to
enforce insertion of the invention into an associated asset control
system in one, and only one, orientation.
[0060] FIG. 1B further illustrates the container in one preferred
form. A top, hingeable panel 06 is attached by a hinge 07 and is
shown in the open position on top of the container body 01. A cover
plate 21 is shown which encloses the latch cavity 32 and the
contact board cavity 48, which are exposed to the rear of the
container.
[0061] FIG. 1C illustrates the mounting mechanism for the cover
plate 21. Here, four pins 27, 28, 29, and 30 are shown protruding
upward from the aperture wall 09. The pins are cylindrical in
shape. Mating holes 23, 24, 25, and 26 are shown in the cover
plate. In use, the cover 21 is snapped in to place by aligning the
holes 23, 24, 25, and 26 with pins 27, 28, 29, and 30 respectively.
The cover is pressed down over the pins and held in place by a
tight press fit.
[0062] FIG. 2 illustrates the contact board cavity 48 and the latch
cavity 32. The contact board cavity 48 is a slotted opening between
the aperture wall 09 and the rear panel 04. The contact board
cavity 49 accepts the contact board 22. When inserted into the
contact board cavity, the contact pads 33 and 34 are exposed
through the container's contact board aperture 19 to the rear of
the container. The electronic serial identification chip 35, shown
in FIG. 3-B, is mounted on the front-facing surface of the contact
board 22 is accommodated in the rectangular cavity that is part of
the larger contact board cavity. In use, the contact board 22 is
placed into the contact board cavity 48 and an epoxy is filled
around the contact board to secure it in place and prevent
tampering.
[0063] The latch cavity 32 receives the access control latch 44
that is part of the associated asset control system. In use, as the
container is inserted into the slot of the associated asset control
system, the rear panel 04 of the container contacts an angled
leading edge 49 of a spring-loaded latch 44. As the container is
inserted further into the asset control system, the latch is forced
downward until the rear edge of the latch head 50 passes the inside
wall of the rear panel 04 of the container 01. At such a point, the
spring-loaded latch is forced upward resulting in the rear of the
latch head 50 mating with the latching surface of the container's
rear panel 31. The container therefore cannot be removed from the
asset control system without some action forcing the latch in a
downward position. An electronic actuation of the latch 44 in a
downward motion is a key component of the associated asset control
system. When the asset control system moves the latch head 51 in a
downward motion past the point where the top of the latch head 51
meets with the inside surface of the container's rear panel 31, the
container is released from the latching action of the latch and the
container is forced out of the slot of the asset control
system.
[0064] FIGS. 3-A, 3-B, and 3-C illustrate the contact board 22 that
is used to uniquely identify each container. One contact board is
inserted and affixed in each container. As shown in FIG. 3-A, a
contact board 22 consists of two gold-plated pads 33 and 34 on the
external facing side. FIG. 3-B shows a side view of the contact
board 22, including gold pads 33 and 34 and an electronic
identification chip 35 on the internal facing side. The electronic
identification chip 35 is soldered to the contact board 22. FIG.
3-C shows a pictoral view of the top of the contact board 22.
[0065] FIG. 4-A illustrates the assembly used to hold the panel 06
of the container in a closed position. As the hinged panel 06 is
closed, the inside surface of the hinged panel 06 meets the rounded
surface of the snap tongue 11. As the hinged panel is pushed all of
the way to the closed position, the semi-flexible snap neck 12
assembly is pushed toward the inside of the container so as to
allow the smooth snap tongue 11 to slide inside of the panel 06
until the point that the snap tongue 11 reaches the snap slot 13.
Once the snap tongue 11 reaches the snap slot13, the snap tongue 11
moves into the snap slot 13 and the semi-flexible snap neck 12 is
returned to a non-flexed state. This action secures the panel 06 in
to a closed position as shown in FIG. 4-B. To affect the opening of
the panel 06, the snap indenture 10 must be depressed to the point
that the snap tongue 11 disengages from the snap slot 13 located on
the panel 06. Once disengaged, the upward force from the hinge 07
of the container raises the hingeablepanel 06 to an open position.
FIG. 4-C is a side, cut-away view of the snap assembly in an open
position. FIG. 4-D is a side, cut-away view of the snap assembly in
a closed position.
[0066] FIG. 5-A illustrates a front-view of a container with the
hingeable panel 06 closed. The container is oriented in a position
resting on its side panel 02. The container bevel 15 is shown at
the top right of the container. FIG. 5-B shows a rear view of the
container. The contact board 22 is visible mounted in the rear of
the container.
[0067] Additional Embodiment--FIGS. 6,7
[0068] In another preferred embodiment, lanyards are affixed to the
container to facilitate the attachment of keys to the
container.
[0069] FIG. 6-A depicts a side view of the lanyard 40, which is
used to physically attach keys to the container 01. FIG. 6-B
depicts a front view of the lanyard 40 with a key inserted onto it.
FIG. 6-C shows one embodiment of the present invention with three
lanyards 40, each containing one key, mounted to the container via
the lanyard opening 14 and lanyard hole #1 16, lanyard hole #2 17,
and lanyard hole #3 18.
[0070] FIG. 7-A is a pictoral view of a lanyard 40 mounted to a
container 01. In FIG. 7-A, the hingeable panel 06 is open and the
lanyard and associated key are oriented outside of the container
body 01. FIG. 7-B depicts the embodiment with three lanyards 40
mounted to the container body 01. In FIG. 7-B, the hingeable panel
06 is shown in a closed position and the three lanyards 40 are
oriented inside of the container body 01. In FIG. 7-C, the
hingeable panel 06 is shown in a closed position and one of the
lanyards 40 and the associated key are shown oriented outside of
the container body 01. Two of the lanyards 40 are shown oriented
inside of the container body 01.
[0071] Operation--FIGS. 8-9
[0072] FIG. 8-A is a pictoral depiction of the container body 01
and the container body's 01 relationship to the access control
slots 41 which are part of the associated asset control system.
FIG. 8-A shows the container oriented in a manner which mates the
beveled edge of the container 15 with the beveled edge of the
access control slot 43. This is the only orientation in which the
container can be inserted into the access control slots 41. FIG.
8-B is a top view of the access control slots 41 and the container
body 01. In FIG. 8-B, the container body 01 is inserted partially
into the access control slots 41. In FIG. 8-C, the container body
01 is inserted fully into the access control slots 41. In both
FIGS. 8-B and 8-C, the access control system contact pins 39 are
shown.
[0073] FIG. 9-A, FIG. 9-B, and FIG. 9-C show a side-view of the
container body 01 as it is inserted into the associated access
control system. In FIG. 9-A, the container body 01 is inserted
partially into the asset control slot 41. In FIG. 9-A, the
container body 01 has not yet reached either the access control
latch 44 or the access control contact pins 39.
[0074] In FIG. 9-B, the container body 01 has been inserted further
into the access control slot 41 and the container body 01 has
contacted the access control system latch front edge 49 and the
access control latch has begun to be pushed in a downward motion
and into the latch cavity 32. In FIG. 9-B, the container body 01
has not yet contacted the access control contact pins 39.
[0075] Finally, in FIG. 9-C, the container body 01 has been fully
inserted into the access control slot 41. The access control latch
44 of the associated asset control system has been inserted into
the latch aperture 20 and the access control system latch back edge
50 has mated with the latching surface 31 of the container.
Additionally, FIG. 9-C depicts that the access control contact pins
39 have married up with the contact pads 33 and 34 located at the
rear of the container thus allowing the access control system to
detect the presence of, and identify of, the container body 01.
[0076] Conclusion, Ramifications, and Scope
[0077] Accordingly, the reader will see the container for securing
and uniquely identifying objects is simple to use and has few parts
resulting in high reliability. The container secures keys from view
and, when used with the associated asset control system, the
container secures keys from accidental or unauthorized removal from
the asset control system. Each container is built so as to allow
the container to be re-used over and over again. The container and
its integrated identification chip are not prone to tampering since
the chip is affixed to a circuit board, inserted into a tailored
slot, and subsequently glued into place with an epoxy. Keys
contained within the container can be used while the lid is closed
by simply flipping the lanyard and key out of the container prior
to closing the lid. Further, the container for securing and
uniquely identifying objects has the additional advantages in
that
[0078] It can be manufactured in a variety of colors so as to allow
end-users to secure objects with different access levels in
different colored containers
[0079] It can be manufactured using low-cost plastic molds
[0080] It has a life expectancy of at least 2,500 openings and
closings, thereby reducing the need to replace the units
frequently
[0081] It can be used to distribute many types of objects to users
with varying access privileges when used in conjunction with the
associated asset control system.
[0082] Although the description above contains much specificity,
these specifications should not be construed as limiting the scope
of the invention but merely providing illustrations of some of the
presently preferred embodiments of this invention. For example, the
container can have other shapes, can be larger in size, and can be
equipped with devices to hold other specific items.
[0083] Thus, the scope of the invention should be determined by the
appended claims and their legal equivalents, rather than by the
examples given.
* * * * *