US20100051483A1 - Asset Shield - Google Patents
Asset Shield Download PDFInfo
- Publication number
- US20100051483A1 US20100051483A1 US12/619,031 US61903109A US2010051483A1 US 20100051483 A1 US20100051483 A1 US 20100051483A1 US 61903109 A US61903109 A US 61903109A US 2010051483 A1 US2010051483 A1 US 2010051483A1
- Authority
- US
- United States
- Prior art keywords
- asset
- enclosure
- security device
- key
- shield
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000000903 blocking effect Effects 0.000 claims description 2
- 238000013475 authorization Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 210000000245 forearm Anatomy 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 239000000344 soap Substances 0.000 description 1
Images
Classifications
-
- A—HUMAN NECESSITIES
- A45—HAND OR TRAVELLING ARTICLES
- A45C—PURSES; LUGGAGE; HAND CARRIED BAGS
- A45C11/00—Receptacles for purposes not provided for in groups A45C1/00-A45C9/00
- A45C11/32—Bags or wallets for holding keys
- A45C11/327—Bags or wallets for holding keys with sliding keys
- A45C11/328—Bags or wallets for holding keys with sliding keys comprising a sliding mechanism
-
- A—HUMAN NECESSITIES
- A45—HAND OR TRAVELLING ARTICLES
- A45C—PURSES; LUGGAGE; HAND CARRIED BAGS
- A45C11/00—Receptacles for purposes not provided for in groups A45C1/00-A45C9/00
- A45C11/18—Ticket-holders or the like
- A45C11/182—Credit card holders
-
- A—HUMAN NECESSITIES
- A45—HAND OR TRAVELLING ARTICLES
- A45C—PURSES; LUGGAGE; HAND CARRIED BAGS
- A45C11/00—Receptacles for purposes not provided for in groups A45C1/00-A45C9/00
- A45C11/32—Bags or wallets for holding keys
- A45C11/324—Bags or wallets for holding keys with pivoting keys
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/80—Parts, attachments, accessories and adjuncts
- Y10T70/8432—For key-operated mechanism
- Y10T70/8676—Key holders
Definitions
- This invention provides increased asset security at a very low cost so that the extra security achieved is readily affordable.
- Prior art control systems for keys have used a control key to control access to an asset key.
- the asset key affords access to something worth securing, and the control key is on the same key ring as the asset key and is locked within a security cabinet accessible only by authorized people.
- Some control systems also limit access to controlled keys to a specific few of the people authorized to enter the security cabinet for any purpose. Persons authorized to remove the control key from the security box then have access to the associated asset key mounted on the same key ring as the control key. This ensures that the asset key and the control key remain connected and that when the control key is returned to the security box the asset key is also returned.
- the key ring is made in a secure form that cannot be opened to remove a key without leaving evidence of tampering.
- This problem of exposed information also applies to other assets such as credit cards, parking or membership cards, vehicle fobs, and other items. It can also be desirable in some cases to assure that information relating to an asset accompanies the asset not only when it is removed from the box but also when the asset is returned to the box.
- a good example of this need is a vehicle key associated with a fob for the same vehicle, a gasoline credit or debit card, and a parking, toll, or membership pass.
- Whoever gets authorization to the vehicle key should also have access to the related information, which should always accompany the vehicle key and the credit card while remaining reasonably secure. Meanwhile, information about such assets deserves protection, even while located in a security box.
- the assets can be keys, cards, passes, and innumerable other things worth protecting.
- the assets are cards, such as credit or debit cards, they are preferably included within a holder that protects the cards and enables the cards to be held in an inaccessible position or moved to a position allowing access to the cards.
- the control devices are often keys that allow access to the asset, but they can also be padlocks, switches, valves, and other devices.
- One function of the security devices is to ensure that only the authorized persons have access to the asset.
- the invention includes an enclosure that can hold the asset and make the asset inaccessible when it is within the enclosure.
- the “asset” for this purpose can include a holder for an asset card.
- the invention also includes a tether that connects the security device to the asset and connects the asset to the enclosure.
- the tether can be a key ring or loop, a pin or other fastener, or a multi-piece device such as interlocking loops or rings.
- the tether connections are arranged to make the asset movable at least part way out of the enclosure to make the asset accessible, but such movement is allowed only when authorized by the security device. Persons having access via the security device can then also have access to the enclosure and can move the asset out of the enclosure far enough to become accessible, but this movement occurs only when permitted by the security device.
- the tether connection to the security device allows the security device to move between a secure or guard position blocking any movement of the asset out of the enclosure and an authorized position allowing movement of the asset out of the enclosure.
- security measures provide obstacles to the accessibility of the asset and reduce chances of misuse or misplacement. They can also ensure that items associated with the asset remain connected to the asset during use. If a security violation occurs, the protective measures offered by this invention reduce the number of suspects who may have violated security rules.
- the security device controlling access to the asset can also produce a log of information on who gained access to the asset and when such access was gained.
- FIGS. 1-7 An application of the invention to an asset in the form of a key and a security device in the form of a control key is illustrated in FIGS. 1-7 as follows:
- FIG. 1 is a partially exploded perspective view of the inventive shield separated from the control and asset keys mounted on a key ring.
- FIG. 2 is a perspective view similar to the view of FIG. 1 , showing the key ring and keys assembled into the shield with an asset key in an operating position.
- FIGS. 3-7 are perspective views similar to FIG. 1 and show steps in the movement of the asset key into the shield while the control key moves out of the shield to an operating position shown in FIG. 7 .
- FIGS. 8-10 A more general application of the invention to an asset in the form of a card and a security device in the form of a key is schematically illustrated in FIGS. 8-10 as follows:
- FIG. 8 is a partially schematic and partially cut-away view of an enclosure denying access to a card within a card holder until authorized by a security device in the form of a control key.
- FIG. 9 is a view similar to the view of FIG. 8 showing the control key moved to an authorized position enabling access to the asset.
- FIG. 10 is a view similar to the views of FIGS. 8 and 9 showing movement of the tether and the security key to a position allowing access to the asset card in the card holder.
- FIGS. 8-10 The invention is best understood by the schematic illustrations of FIGS. 8-10 , which will be described first. Then an application of the invention to an asset in the form of a key, as illustrated in FIGS. 1-7 , will be explained.
- enclosure 30 holds an asset 40 in the form of a card contained within a card holder 31 .
- a security device 50 in the form of a control key, controls access to the contents of enclosure 30 .
- a tether 60 in the form of a ring, connects security key 50 to enclosure 30 and to card holder 31 carrying asset 40 .
- Ring 60 along with objects connected to ring 60 , is movable along the length of slots 70 in enclosure 30 , as shown by movement to the position illustrated in FIG. 10 .
- Enclosure 30 is shaped to contain and block access to asset 40 , which happens to have a card shape.
- Asset 40 can also have many other shapes, which enclosure 30 can be configured to accommodate.
- asset 40 is a card, it is preferably contained within holder 31 , so that “asset” can refer to the combination of holder 31 and card 40 that the holder contains. Otherwise, card 40 could be destroyed if it required a hole to receive ring 60 or some other tether.
- Card holder 31 provides such a hole while retaining card 40 within holder 31 so that when card 40 is contained within holder 31 , the term “asset” can refer to the combination of card 40 and its holder 31 .
- Security device 50 can often be a key, which can be held in a lock within a security box. A person having appropriate authorization can then remove key 50 from a security box (not shown) to give the person access to the asset.
- key 50 is held within a lock in the security box
- asset 40 in card holder 31 is held within enclosure 30 , as shown in FIGS. 8 and 9 , where asset card 40 is inaccessible.
- Enclosure 30 is configured with a wall 32 that blocks any upward movement of enclosure 30 relative to security device 50 when security device 50 is angled to the position shown in FIG. 8 to be inserted into a control lock. This prevents any sliding motion of ring 60 in slots 70 when key 50 is held within a lock in a security box.
- Enclosure 30 is also configured so that when security device 50 is in the locked position illustrated in FIG. 8 .
- the enclosure cannot be manipulated into any position that allows ring 60 to slide along slots 70 . This ensures that asset card 40 and its card holder 31 remain protected within enclosure 30 when key 50 is in the secure position illustrated in FIG. 8 .
- a significant advantage of this is that when security device 50 is held within a security box, persons having access to the box but lacking authorization to remove security device 50 then have no access to asset card 40 and its holder 31 .
- An authorized person is able to remove security device 50 from a lock in a security box. This allows security device 50 to move to the position shown in FIG. 9 which authorizes access to asset card 40 and its card holder 31 . In this position, ring 60 , and key 50 can be moved along the length of slots 70 in enclosure 30 to the position illustrated in FIG. 10 which allows removal of card 40 from card holder 31 as indicated by the arrow in FIG. 10 .
- Ring 60 affords a tether between security device 50 , enclosure 30 , and card holder 31 holding asset 40 .
- Tether 60 can have forms other than a ring.
- tether 60 can be a pin that extends through slots 70 and connects ring 50 , enclosure 30 , and the holder 31 of asset 40 .
- Tether 60 could also be a padlock or some other device that makes the necessary connections and allows appropriate movements.
- Tether 60 can also be something other than a single unit.
- tether 60 can be formed of interlocking loops connected to the security device, the asset, and the enclosure.
- tether 60 as a ring or loop is that it can then retain related information or devices that do not require the same protection as asset 40 .
- a good example of this is an automobile key and fob mounted on tether ring 60 while an asset card for gasoline is mounted on tether ring 60 within enclosure 30 .
- Whoever obtains authorized access via security device 50 then has the car key, a fob for opening the doors of the car, and the gasoline card or parking pass for the car shielded within holder 31 .
- the authorized user then has access to the car, and by moving the tether along slots 70 , also has access to cards associated with the car. Meanwhile, the key and the fob can be available outside enclosure 30 for use by an authorized person.
- Control device 50 besides being a key, could also be a padlock, or a switch or valve that releases a device allowing tether movement along the length of slots 70 .
- One function of control device 50 is to allow removal from a security box only by an authorized person.
- Another function of security device 50 is to ensure that the asset remains within the enclosure until the security device allows removal from a security cabinet. In other words, when the security device is locked up the asset is guarded by the enclosure, and the only way to get access to the asset is to be authorized by the security device, which then allows movement of the tether relative to the enclosure to make the asset accessible.
- the key shield of FIGS. 1-7 includes a control key 1 and an asset key 2 mounted on a key tether ring 3 , which is preferably a tamper-evident ring that does not easily allow removal or replacement of keys.
- keys 1 and 2 and ring 3 are separated from shield body or enclosure 4 .
- Body 4 is preferably made long enough to contain and conceal asset key 2 when control key 1 is in use by being locked in a security cabinet. This concealment is preferably accomplished by giving enclosure 4 a rear wall 10 , a front wall 11 , and edge walls 12 and 13 . Face walls 10 and 11 are parallel with each other and separated by enough room to receive keys 1 and 2 .
- Opposite ends of edge walls 12 and 13 preferably have notches or openings 7 and 8 to be used as explained below.
- Opposite ends 17 and 18 of body 4 are open ended in the vicinity of openings 7 and 8 .
- Front wall 11 of shield 4 has a longitudinal slot 15 aligned with, and parallel with another slot 16 in rear wall 10 .
- Slots 15 and 16 allow key ring 3 to be mounted within the slots to pass through the space between front and rear walls 11 and 10 .
- Keys 1 and 2 are also mounted on ring 3 in the space where ring 3 passes between walls 10 and 11 .
- Slots 15 and 16 allow key ring 3 and its mounted keys 1 and 2 to slide longitudinally of shield 4 for the length of slots 15 and 16 .
- slots 15 and 16 are spaced from edge wall 12 by less than a diameter of key ring 3 .
- the ends of slots 15 and 16 preferably extend to within a key ring diameter of opposite end regions 17 and 18 of front and rear walls 11 and 10 . This gives key ring 3 freedom of movement and freedom of pivotal orientation to keep key ring 3 out of the way of movement of keys 1 and 2 .
- Visibility shields 6 are preferably also mounted on key ring 3 to straddle asset key 1 and possibly also straddle control key 2 . As explained more fully below, asset shield 6 can prevent any viewing of asset key 1 when it is housed within the walls of shield body 4 .
- FIGS. 2-7 show steps in operation beginning with asset key 2 exposed for use at an open end 17 of shield body 4 .
- the steps proceed from FIG. 2 to FIG. 7 where control key 1 is exposed for locking the assembly in a security box and asset key 2 is concealed within shield body 4 between visibility shields 6 .
- the movements involved in the illustrated steps are accomplished by sliding key ring 3 between the ends of slots 15 and 16 .
- asset key 2 can pivot on ring 3 by at least 60 degrees relative to the axis or slot direction of key body 4 .
- This pivoting of asset key 2 is accommodated by a notch or opening 7 at an end 17 of shield 4 .
- Key shields 6 which straddle asset 2 , are free to pivot aside, as shown in FIG. 2 , by a notch 7 in end wall 13 opposite notch 7 in end wall 12 .
- control key 1 While asset key 2 is exposed for use, in the position illustrated in FIG. 2 , control key 1 is preferably arranged within shield body 4 .
- the code on control key 1 may be visible through slots 15 and 16 , but this is not as risky as making the code of asset key 2 visible.
- FIGS. 3-7 illustrate how ring 3 and keys 1 and 2 can move from a position near open end 17 to a position near opposite open end 18 .
- key ring 3 starts moving downward in slots 15 and 16
- asset key and key shields 6 begin moving toward alignment with slots 15 and 16 , as shown in FIGS. 3 and 4 .
- key shields 6 move into similar alignment to conceal asset key 2 within shield body 4 , as shown in FIGS. 5 and 6 .
- control key 1 emerges from shield body 4 and is able to pivot on key ring 3 relative to shield body 4 to the position shown in FIG. 7 .
- This position is made possible by notch openings 8 at open end region 18 of shield body 4 .
- This position also disposes control key 1 to be locked in a security box.
- asset key 2 is housed completely within body 4 where visibility shields 6 conceal the code on asset key 2 .
- control key 1 When keys 1 and 2 and shield body 4 are stored in a secure cabinet, in the position illustrated in FIG. 7 , control key 1 is preferably locked into a position in which it is removable only by an authorized person. While control key 1 is locked in place, shield body 4 hangs from key ring 3 to conceal asset key 2 behind visibility shield 6 , as shown in FIG. 7 .
- control key 1 When control key 1 is removed to allow use of asset key 2 , then key ring 3 and everything attached to key ring 3 can begin moving along slots 15 and 16 to a position near open end 17 of shield body 4 . This brings everything gradually back to the position illustrated in FIG. 2 where asset key 2 is positioned for use.
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention includes an enclosure that can hold an asset in an inaccessible position within the enclosure. A tether connects a security device to the asset and connects the asset to the enclosure. The security device, in a secure position, holds the tether in a position that keeps the asset within the enclosure so that the asset is inaccessible, even while hanging in a security box. The security device is also movable to an authorized position that allows the tether to move relative to the enclosure to make the asset accessible to an authorized user.
Description
- This application claims subject matter that was disclosed in Provisional Application No. 60/063,656, filed 24 Feb. 2005, entitled “Asset Key Shield”, and is a continuation-in-part of U.S. patent application Ser. No. 11/359,320, filed 22 Feb. 2006, entitled “Asset Key Shield”. Applicant hereby claims the benefit under 35 USC §119(e) of the U.S. provisional application, and hereby incorporates the aforementioned applications by reference.
- Security for assets
- Securing assets becomes a sort of arms race between people interested in defeating or evading the security measures and those who want to strengthen the security measures so that they cannot be easily breached. This leads to increasing levels of security that become increasingly expensive. It also ensures that simple and inexpensive key security measures are welcomed whenever they can significantly increase security.
- This invention provides increased asset security at a very low cost so that the extra security achieved is readily affordable.
- Prior art control systems for keys, for example, have used a control key to control access to an asset key. The asset key affords access to something worth securing, and the control key is on the same key ring as the asset key and is locked within a security cabinet accessible only by authorized people. Some control systems also limit access to controlled keys to a specific few of the people authorized to enter the security cabinet for any purpose. Persons authorized to remove the control key from the security box then have access to the associated asset key mounted on the same key ring as the control key. This ensures that the asset key and the control key remain connected and that when the control key is returned to the security box the asset key is also returned. For these purposes, the key ring is made in a secure form that cannot be opened to remove a key without leaving evidence of tampering.
- One problem with this arrangement is that the code on the asset key is vulnerable to copying by anyone gaining access to the security box, even though such access does not extend to a particular asset key. A person having access to the security box for one particular control key and asset key can see the other asset keys hanging openly in the box and can possibly copy unauthorized asset keys by memory or by an impression made using wax, a bar of soap, or even pliable skin on a forearm.
- This problem of exposed information also applies to other assets such as credit cards, parking or membership cards, vehicle fobs, and other items. It can also be desirable in some cases to assure that information relating to an asset accompanies the asset not only when it is removed from the box but also when the asset is returned to the box. A good example of this need is a vehicle key associated with a fob for the same vehicle, a gasoline credit or debit card, and a parking, toll, or membership pass. Whoever gets authorization to the vehicle key should also have access to the related information, which should always accompany the vehicle key and the credit card while remaining reasonably secure. Meanwhile, information about such assets deserves protection, even while located in a security box.
- This invention adds inexpensive additional security to the protection of assets that are accompanied by security devices. The assets can be keys, cards, passes, and innumerable other things worth protecting. When the assets are cards, such as credit or debit cards, they are preferably included within a holder that protects the cards and enables the cards to be held in an inaccessible position or moved to a position allowing access to the cards.
- The control devices are often keys that allow access to the asset, but they can also be padlocks, switches, valves, and other devices. One function of the security devices is to ensure that only the authorized persons have access to the asset.
- The invention includes an enclosure that can hold the asset and make the asset inaccessible when it is within the enclosure. The “asset” for this purpose can include a holder for an asset card.
- The invention also includes a tether that connects the security device to the asset and connects the asset to the enclosure. The tether can be a key ring or loop, a pin or other fastener, or a multi-piece device such as interlocking loops or rings.
- The tether connections are arranged to make the asset movable at least part way out of the enclosure to make the asset accessible, but such movement is allowed only when authorized by the security device. Persons having access via the security device can then also have access to the enclosure and can move the asset out of the enclosure far enough to become accessible, but this movement occurs only when permitted by the security device. The tether connection to the security device allows the security device to move between a secure or guard position blocking any movement of the asset out of the enclosure and an authorized position allowing movement of the asset out of the enclosure.
- These security measures provide obstacles to the accessibility of the asset and reduce chances of misuse or misplacement. They can also ensure that items associated with the asset remain connected to the asset during use. If a security violation occurs, the protective measures offered by this invention reduce the number of suspects who may have violated security rules. For this purpose, the security device controlling access to the asset can also produce a log of information on who gained access to the asset and when such access was gained.
- An application of the invention to an asset in the form of a key and a security device in the form of a control key is illustrated in
FIGS. 1-7 as follows: -
FIG. 1 is a partially exploded perspective view of the inventive shield separated from the control and asset keys mounted on a key ring. -
FIG. 2 is a perspective view similar to the view ofFIG. 1 , showing the key ring and keys assembled into the shield with an asset key in an operating position. -
FIGS. 3-7 are perspective views similar toFIG. 1 and show steps in the movement of the asset key into the shield while the control key moves out of the shield to an operating position shown inFIG. 7 . - A more general application of the invention to an asset in the form of a card and a security device in the form of a key is schematically illustrated in
FIGS. 8-10 as follows: -
FIG. 8 is a partially schematic and partially cut-away view of an enclosure denying access to a card within a card holder until authorized by a security device in the form of a control key. -
FIG. 9 is a view similar to the view ofFIG. 8 showing the control key moved to an authorized position enabling access to the asset. -
FIG. 10 is a view similar to the views ofFIGS. 8 and 9 showing movement of the tether and the security key to a position allowing access to the asset card in the card holder. - The invention is best understood by the schematic illustrations of
FIGS. 8-10 , which will be described first. Then an application of the invention to an asset in the form of a key, as illustrated inFIGS. 1-7 , will be explained. - As shown in
FIG. 8 ,enclosure 30 holds anasset 40 in the form of a card contained within acard holder 31. Asecurity device 50, in the form of a control key, controls access to the contents ofenclosure 30. Atether 60, in the form of a ring, connectssecurity key 50 toenclosure 30 and tocard holder 31 carryingasset 40.Ring 60, along with objects connected toring 60, is movable along the length ofslots 70 inenclosure 30, as shown by movement to the position illustrated inFIG. 10 . -
Enclosure 30 is shaped to contain and block access toasset 40, which happens to have a card shape.Asset 40 can also have many other shapes, whichenclosure 30 can be configured to accommodate. Whenasset 40 is a card, it is preferably contained withinholder 31, so that “asset” can refer to the combination ofholder 31 andcard 40 that the holder contains. Otherwise,card 40 could be destroyed if it required a hole to receivering 60 or some other tether.Card holder 31 provides such a hole while retainingcard 40 withinholder 31 so that whencard 40 is contained withinholder 31, the term “asset” can refer to the combination ofcard 40 and itsholder 31. -
Security device 50 can often be a key, which can be held in a lock within a security box. A person having appropriate authorization can then removekey 50 from a security box (not shown) to give the person access to the asset. Whenkey 50 is held within a lock in the security box,asset 40 incard holder 31 is held withinenclosure 30, as shown inFIGS. 8 and 9 , whereasset card 40 is inaccessible.Enclosure 30 is configured with awall 32 that blocks any upward movement ofenclosure 30 relative tosecurity device 50 whensecurity device 50 is angled to the position shown inFIG. 8 to be inserted into a control lock. This prevents any sliding motion ofring 60 inslots 70 when key 50 is held within a lock in a security box.Enclosure 30 is also configured so that whensecurity device 50 is in the locked position illustrated inFIG. 8 . The enclosure cannot be manipulated into any position that allowsring 60 to slide alongslots 70. This ensures thatasset card 40 and itscard holder 31 remain protected withinenclosure 30 when key 50 is in the secure position illustrated inFIG. 8 . A significant advantage of this is that whensecurity device 50 is held within a security box, persons having access to the box but lacking authorization to removesecurity device 50 then have no access toasset card 40 and itsholder 31. - An authorized person is able to remove
security device 50 from a lock in a security box. This allowssecurity device 50 to move to the position shown inFIG. 9 which authorizes access toasset card 40 and itscard holder 31. In this position,ring 60, and key 50 can be moved along the length ofslots 70 inenclosure 30 to the position illustrated inFIG. 10 which allows removal ofcard 40 fromcard holder 31 as indicated by the arrow inFIG. 10 . -
Ring 60 affords a tether betweensecurity device 50,enclosure 30, andcard holder 31 holdingasset 40.Tether 60 can have forms other than a ring. For example,tether 60 can be a pin that extends throughslots 70 and connectsring 50,enclosure 30, and theholder 31 ofasset 40.Tether 60 could also be a padlock or some other device that makes the necessary connections and allows appropriate movements.Tether 60 can also be something other than a single unit. For example,tether 60 can be formed of interlocking loops connected to the security device, the asset, and the enclosure. - One advantage of forming
tether 60 as a ring or loop is that it can then retain related information or devices that do not require the same protection asasset 40. A good example of this is an automobile key and fob mounted ontether ring 60 while an asset card for gasoline is mounted ontether ring 60 withinenclosure 30. Whoever obtains authorized access viasecurity device 50 then has the car key, a fob for opening the doors of the car, and the gasoline card or parking pass for the car shielded withinholder 31. The authorized user then has access to the car, and by moving the tether alongslots 70, also has access to cards associated with the car. Meanwhile, the key and the fob can be available outsideenclosure 30 for use by an authorized person. -
Control device 50, besides being a key, could also be a padlock, or a switch or valve that releases a device allowing tether movement along the length ofslots 70. One function ofcontrol device 50 is to allow removal from a security box only by an authorized person. Another function ofsecurity device 50 is to ensure that the asset remains within the enclosure until the security device allows removal from a security cabinet. In other words, when the security device is locked up the asset is guarded by the enclosure, and the only way to get access to the asset is to be authorized by the security device, which then allows movement of the tether relative to the enclosure to make the asset accessible. - The security system explained above relative to
FIGS. 8-10 is applied to an asset in the form of anasset key 2, a differently shapedenclosure 4, and a security device in the form of a control key, as explained below. - The key shield of
FIGS. 1-7 includes acontrol key 1 and anasset key 2 mounted on akey tether ring 3, which is preferably a tamper-evident ring that does not easily allow removal or replacement of keys. In the exploded view ofFIG. 1 , 1 and 2 andkeys ring 3 are separated from shield body orenclosure 4.Body 4 is preferably made long enough to contain and concealasset key 2 whencontrol key 1 is in use by being locked in a security cabinet. This concealment is preferably accomplished by giving enclosure 4 arear wall 10, afront wall 11, and 12 and 13. Faceedge walls 10 and 11 are parallel with each other and separated by enough room to receivewalls 1 and 2. Opposite ends ofkeys 12 and 13 preferably have notches oredge walls 7 and 8 to be used as explained below. Opposite ends 17 and 18 ofopenings body 4 are open ended in the vicinity of 7 and 8.openings -
Front wall 11 ofshield 4 has alongitudinal slot 15 aligned with, and parallel with anotherslot 16 inrear wall 10. 15 and 16 allowSlots key ring 3 to be mounted within the slots to pass through the space between front and 11 and 10.rear walls 1 and 2 are also mounted onKeys ring 3 in the space wherering 3 passes between 10 and 11.walls 15 and 16 allowSlots key ring 3 and its 1 and 2 to slide longitudinally ofmounted keys shield 4 for the length of 15 and 16. For this purpose,slots 15 and 16 are spaced fromslots edge wall 12 by less than a diameter ofkey ring 3. The ends of 15 and 16 preferably extend to within a key ring diameter ofslots 17 and 18 of front andopposite end regions 11 and 10. This givesrear walls key ring 3 freedom of movement and freedom of pivotal orientation to keepkey ring 3 out of the way of movement of 1 and 2.keys - Visibility shields 6 are preferably also mounted on
key ring 3 to straddleasset key 1 and possibly also straddlecontrol key 2. As explained more fully below,asset shield 6 can prevent any viewing ofasset key 1 when it is housed within the walls ofshield body 4. - The assembled views of
FIGS. 2-7 show steps in operation beginning withasset key 2 exposed for use at anopen end 17 ofshield body 4. The steps proceed fromFIG. 2 toFIG. 7 wherecontrol key 1 is exposed for locking the assembly in a security box andasset key 2 is concealed withinshield body 4 between visibility shields 6. The movements involved in the illustrated steps are accomplished by slidingkey ring 3 between the ends of 15 and 16. In the position illustrated inslots FIG. 2 ,asset key 2 can pivot onring 3 by at least 60 degrees relative to the axis or slot direction ofkey body 4. This pivoting ofasset key 2 is accommodated by a notch oropening 7 at anend 17 ofshield 4.Key shields 6, which straddleasset 2, are free to pivot aside, as shown inFIG. 2 , by anotch 7 inend wall 13opposite notch 7 inend wall 12. These movements positionasset key 2 for convenient use. - While
asset key 2 is exposed for use, in the position illustrated inFIG. 2 ,control key 1 is preferably arranged withinshield body 4. The code oncontrol key 1 may be visible through 15 and 16, but this is not as risky as making the code ofslots asset key 2 visible. -
FIGS. 3-7 illustrate howring 3 and 1 and 2 can move from a position nearkeys open end 17 to a position near oppositeopen end 18. As such movement begins, andkey ring 3 starts moving downward in 15 and 16, asset key andslots key shields 6 begin moving toward alignment with 15 and 16, as shown inslots FIGS. 3 and 4 . Then asasset key 2 moves into alignment with 15 and 16 withinslots shield body 4, as shown inFIG. 5 ,key shields 6 move into similar alignment to concealasset key 2 withinshield body 4, as shown inFIGS. 5 and 6 . When the movement is complete andkey ring 3 reaches a position nearopen end 18 ofshield body 4, as shown inFIG. 7 , thencontrol key 1 emerges fromshield body 4 and is able to pivot onkey ring 3 relative to shieldbody 4 to the position shown inFIG. 7 . This position is made possible bynotch openings 8 atopen end region 18 ofshield body 4. This position also disposescontrol key 1 to be locked in a security box. Also in the position illustrated inFIG. 7 ,asset key 2 is housed completely withinbody 4 where visibility shields 6 conceal the code onasset key 2. - When
1 and 2 and shieldkeys body 4 are stored in a secure cabinet, in the position illustrated inFIG. 7 ,control key 1 is preferably locked into a position in which it is removable only by an authorized person. Whilecontrol key 1 is locked in place,shield body 4 hangs fromkey ring 3 to concealasset key 2 behindvisibility shield 6, as shown inFIG. 7 . - When
control key 1 is removed to allow use ofasset key 2, thenkey ring 3 and everything attached tokey ring 3 can begin moving along 15 and 16 to a position nearslots open end 17 ofshield body 4. This brings everything gradually back to the position illustrated inFIG. 2 whereasset key 2 is positioned for use.
Claims (18)
1. An asset shield comprising:
an enclosure making the asset inaccessible when the asset is within the enclosure;
a tether connecting a security device to the asset and connecting the asset to the enclosure;
the security device in a secure position holding the tether in a guard position that keeps the asset within the enclosure; and
the security device being movable to an authorized position allowing movement of the tether relative to the enclosure to make the asset accessible.
2. The shield of claim 1 wherein the tether includes a ring passing the through the asset, the security device, and the enclosure.
3. The shield of claim 2 wherein the ring is movable along slots in the enclosure when the security device is in the authorized position.
4. The shield of claim 1 wherein the asset is a key.
5. The shield of claim 1 wherein the asset is a card.
6. The shield of claim 1 wherein the security device is a key that is pivotal between the secure position and the authorized position.
7. An asset shield comprising:
an enclosure that denies access to the asset when the asset is within the enclosure;
a security device having a secure position and an authorized position;
the security device in the secure position blocking movement of the asset out of the enclosure;
the security device in the authorized position allowing movement of the asset out of the enclosure;
a tether connected to the security device to allow the security device to move between the secure and authorized positions; and
the tether being connected to the asset and to the enclosure to allow the asset to move from the enclosure when the security device is in the authorized position and to block movement of the asset out from the enclosure when the security device is in the secure position.
8. The shield of claim 7 wherein the tether includes a ring.
9. The shield of claim 8 wherein the ring is movable along slots in the enclosure when the security device is in the authorized position.
10. The shield of claim 8 wherein the asset is a key.
11. The shield of claim 8 wherein the asset is a card.
12. The shield of claim 8 wherein the security device is a key.
13. An asset shield comprising:
a security device;
an enclosure shaped to make the asset inaccessible when the asset is within the enclosure;
a tether connected to the security device, the asset, and the enclosure;
the tether permitting the security device to move between secure and authorized positions;
when the security device is in the secure position the tether holds the asset within the enclosure so that the asset remains inaccessible; and
when the security device is in the authorized position, the tether is movable relative to the enclosure to allow the asset to move at least partially out of the enclosure to become accessible.
14. The shield of claim 13 wherein the tether includes a ring.
15. The shield of claim 14 wherein the ring is movable along slots in the enclosure.
16. The shield of claim 13 wherein the asset is a key.
17. The shield of claim 13 wherein the asset is a card.
18. The shield of claim 13 wherein the security device is a key.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/619,031 US20100051483A1 (en) | 2006-02-22 | 2009-11-16 | Asset Shield |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/359,320 US20060185410A1 (en) | 2005-02-24 | 2006-02-22 | Asset key shield |
| US12/619,031 US20100051483A1 (en) | 2006-02-22 | 2009-11-16 | Asset Shield |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/359,320 Continuation-In-Part US20060185410A1 (en) | 2005-02-24 | 2006-02-22 | Asset key shield |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20100051483A1 true US20100051483A1 (en) | 2010-03-04 |
Family
ID=41723721
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US12/619,031 Abandoned US20100051483A1 (en) | 2006-02-22 | 2009-11-16 | Asset Shield |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US20100051483A1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140218165A1 (en) * | 2013-02-07 | 2014-08-07 | Daniel Charles Johnson | Method and apparatus for implementing multi-vendor rolling code keyless entry systems |
| US20210401141A1 (en) * | 2020-06-24 | 2021-12-30 | Brandon Ghanma | Flat card for dispensing keys |
| US20230157430A1 (en) * | 2021-11-21 | 2023-05-25 | ohSnap, Inc. | Modular personal storage system and related modular components |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US2610501A (en) * | 1948-03-06 | 1952-09-16 | Louis J Maas | Key holder |
| US2637994A (en) * | 1950-01-28 | 1953-05-12 | Harrison Jr | Key holder |
| US3292400A (en) * | 1964-07-06 | 1966-12-20 | John B Merila | Automobile ignition ket holder |
| US3355917A (en) * | 1965-08-17 | 1967-12-05 | Albert Daniel | Key case |
| US3680338A (en) * | 1971-10-18 | 1972-08-01 | Charles Arthur Lee | Magnetic receptacle for keys and the like |
| US3765200A (en) * | 1971-02-26 | 1973-10-16 | K Vogt | Compartmented key holder |
| US3916659A (en) * | 1974-04-05 | 1975-11-04 | Norbert Leopoldi | Key holder |
| US5440910A (en) * | 1993-06-07 | 1995-08-15 | Florian; David W. | Key adaptor |
| US5842365A (en) * | 1996-10-11 | 1998-12-01 | Bordonaro; Corrado | Compact key retaining system |
| US6672118B1 (en) * | 2002-07-08 | 2004-01-06 | Edward E. Wright | Apparatus and method for retaining keys |
-
2009
- 2009-11-16 US US12/619,031 patent/US20100051483A1/en not_active Abandoned
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US2610501A (en) * | 1948-03-06 | 1952-09-16 | Louis J Maas | Key holder |
| US2637994A (en) * | 1950-01-28 | 1953-05-12 | Harrison Jr | Key holder |
| US3292400A (en) * | 1964-07-06 | 1966-12-20 | John B Merila | Automobile ignition ket holder |
| US3355917A (en) * | 1965-08-17 | 1967-12-05 | Albert Daniel | Key case |
| US3765200A (en) * | 1971-02-26 | 1973-10-16 | K Vogt | Compartmented key holder |
| US3680338A (en) * | 1971-10-18 | 1972-08-01 | Charles Arthur Lee | Magnetic receptacle for keys and the like |
| US3916659A (en) * | 1974-04-05 | 1975-11-04 | Norbert Leopoldi | Key holder |
| US5440910A (en) * | 1993-06-07 | 1995-08-15 | Florian; David W. | Key adaptor |
| US5842365A (en) * | 1996-10-11 | 1998-12-01 | Bordonaro; Corrado | Compact key retaining system |
| US6672118B1 (en) * | 2002-07-08 | 2004-01-06 | Edward E. Wright | Apparatus and method for retaining keys |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140218165A1 (en) * | 2013-02-07 | 2014-08-07 | Daniel Charles Johnson | Method and apparatus for implementing multi-vendor rolling code keyless entry systems |
| US10115255B2 (en) * | 2013-02-07 | 2018-10-30 | Ikeyless, Llc | Method and apparatus for implementing multi-vendor rolling code keyless entry systems |
| US20190122472A1 (en) * | 2013-02-07 | 2019-04-25 | Ikeyless, Llc | Method and apparatus for implementing multi-vendor rolling code keyless entry systems |
| US10553060B2 (en) * | 2013-02-07 | 2020-02-04 | Ikeyless, Llc | Method and apparatus for implementing multi-vendor rolling code keyless entry systems |
| US11120654B2 (en) * | 2013-02-07 | 2021-09-14 | Ikeyless, Llc | Method and apparatus for implementing multi-vendor rolling code keyless entry systems |
| US20210401141A1 (en) * | 2020-06-24 | 2021-12-30 | Brandon Ghanma | Flat card for dispensing keys |
| US20230157430A1 (en) * | 2021-11-21 | 2023-05-25 | ohSnap, Inc. | Modular personal storage system and related modular components |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6755063B2 (en) | Side bar type cylinder lock with variable key code | |
| US20050149741A1 (en) | Autorisations, regulation, characterisation, localisation, locking and theft security system (here also referred to as lock-loop dss) | |
| US7946142B2 (en) | Padlock hasp assembly | |
| US6530248B1 (en) | Lock device | |
| US20050039502A1 (en) | Protection device for portable computers | |
| US5806351A (en) | Lock well for vehicle door | |
| US5787737A (en) | Burglar-preventing apparatus of a central processing unit | |
| US20100051483A1 (en) | Asset Shield | |
| Duff et al. | Benefits, burdens and responsibilities: Some ethical dimensions of situational crime prevention | |
| US6305107B1 (en) | License plate lock | |
| US4570466A (en) | Door locking methods and apparatus | |
| US3635057A (en) | Auxiliary lock assemblage | |
| US20100154487A1 (en) | Double Cylinder Lock | |
| US10563943B2 (en) | Weapon locking apparatus | |
| US5722351A (en) | Apparatus for securing movable things, particularly dogs | |
| McLean | A secure pervasive environment | |
| US7057885B2 (en) | Locking mechanism for a personal computer | |
| Ekblom | A crime-free car? | |
| US8863562B1 (en) | Combination lock and anti-jimmying device | |
| DE19852018C2 (en) | Method for securing an electronically coded key, in particular vehicle key, against unauthorized use, and electronically coded key | |
| EP3907112B1 (en) | Safety box for obd connectors | |
| DE29509741U1 (en) | Data processing system with inductive data transmission interface and user control device | |
| DE102007025143A1 (en) | Electronic authentication and authorization system for locking and unlocking compartments, e.g. boot, in cars comprises biometric sensors inside car which identify driver and send signals to central control unit to unlock compartments | |
| Ram | Technology of Safety Devices for Firearms | |
| DE29904431U1 (en) | Auxiliary device for opening a room |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: KEY SYSTEMS, INC.,NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MASTRODONATO, GEORGE;ECKERDT, GEORGE H;REEL/FRAME:023522/0051 Effective date: 20091116 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |