Key Systems, Inc.
|Key Systems, Inc. Patent applications|
|Patent application number||Title||Published|
|20140118110||SECURITY SYSTEM FOR CONTAINERS - A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.||05-01-2014|
|20140048606||KEY COMBINATION WITH ELECTRONIC MEMORY IDENTIFIER - Disclosed is a method of providing a compact, tamper-evident means of combining individual keys with unique electronic memory identifiers. The disclosure involves a holder that is manufactured to attach some form of electronic identification, such as a touch memory button, to the head of a key. Once attached, the assembly can be mounted and read electronically to continually account for the identification, presence, access rights, and removal or replacement of the assembly from storage. Application of the key holder would not require alteration of the key in any manner, and thus could occur when the individual keys are either ready for distribution or already distributed and in regular use. The key holder would preferably be tamper-evident and prevent removal of the touch memory button without destruction of the holder, and possibly even the key itself.||02-20-2014|
|20120305655||Memory Button Mount - A mounting spring coil is made to grip and releasably hold a cylindrical periphery of a memory button while transmitting an ID effectively. A memory button held in a coil of the mounting spring can support objects such as tags and keys that are identified by the memory button to account for removal and replacement of the objects being secured.||12-06-2012|
|20120268236||Security System for Containers - A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.||10-25-2012|
|20120043139||Key Authorization System - Weight is used to help identify key and ring combinations authorized to certain persons. This is done by associating a weigh scale with each storage box for key and ring combinations, all of which have different total weights. The weights of all the key and ring combinations are registered with a computer, along with authentication and storage information. Then as key and ring combinations are removed from or returned to a storage box, they are weighed on scale||02-23-2012|
|20100051483||Asset Shield - The invention includes an enclosure that can hold an asset in an inaccessible position within the enclosure. A tether connects a security device to the asset and connects the asset to the enclosure. The security device, in a secure position, holds the tether in a position that keeps the asset within the enclosure so that the asset is inaccessible, even while hanging in a security box. The security device is also movable to an authorized position that allows the tether to move relative to the enclosure to make the asset accessible to an authorized user.||03-04-2010|
|20090242678||KEY DESTROYER - A key destroyer preferably deploys an angle grinder fitted with a grinding chamber, cover, and insertion tube through which a key can be inserted to be destroyed. The key is gripped in a holder that can slide key foremost through the support tube so that the coded portion of the key can pass through a safety wall at the inner end of the support tube and engage a rotating abrasive disk that grinds away the coded portion of the key. The head of the destroyed key can then be retained as evidence that a particular copy of a key no longer exists.||10-01-2009|
|20090237207||Secure Web Accessed Box - A web accessed security box includes a web server that can communicate with a web browser to control access and account for asset events that occur when the box is used. A personal identifier must be satisfied to open a drawer of the box. A latching system uses both an access solenoid for normal opening and closing in response to the personal identifier, and an emergency release solenoid having a separate power supply to open the box when the access solenoid is disabled. Several features make the box secure against weather and tampering.||09-24-2009|
|20090135031||Armored Capacitive Keypad - An apparatus and method for detecting a key press using an armored capacitive keypad device. The device consists of two interdigitated electrodes, located behind a protective metal plate, and separated by an insulating gap or material. An electronic driver circuit sends a signal to one of the electrodes and senses the change in signal with the proximity of a finger to the key. The driver is calibrated with the metal plate in place such that the finger can be sensed through the metal plate. The device is tamper resistant and provides some immunity to external electromagnetic interference as well.||05-28-2009|
Patent applications by Key Systems, Inc.