1. Field of the Invention
The invention pertains to the field of secured asset management techniques. More particularly, the invention pertains to an asset key shield intended, in general, to shield a key from visual inspection and, specifically, to shield keys secured in a key control cabinet or similar device from visual inspection and/or copying.
2. Description of Related Art
One of the difficulties inherent in handling and using keys in secured environments such as prisons is the increasing sophistication and artistry of those that the key/lock is intended to thwart or restrain. There are a limited number of possible key configurations (comprising the operative cross-sectional pattern and key cuts or notches) for a key, and some inmates and other individuals are adept at recognizing and remembering the pattern and cuts on a key they have seen and transferring this knowledge into the making of a duplicate key or otherwise using it to open locks that are intended to limit their personal or physical access. More specifically, there is a need for a key shield that will effectively shield an asset key's configuration from inspection and copying while a control key is secured in, e.g., a key control cabinet or similar device. In modern asset control technology, control keys are locked into a key slot in the cabinet and can only be released when proper codes are used or other similar actions are taken. The control key is attached by a key ring to the actual asset key, which is intended to open a lock, door, or otherwise allow access to a secured space, asset or area. However, as long as the asset key is physically available, an impress can be made using wax, a bar of soap, or some other pliable substance. Likewise, as previously noted, as long as the asset key is visually available (even though secured in a key control cabinet), its configuration can be copied. Thus, there is a need for a system or apparatus that will prevent these things from happening.
The instant invention is characterized by, as is typical for control of secured assets, a control key joined to an asset key by a key ring. However, it adds to this typical configuration an opaque elongate body to which said asset key is connected in such manner that the asset key can be moved to a position within said body where its configuration is concealed and can likewise be moved to a position where it is exposed for insertion into a lock. This is accomplished by joining the control key to said asset key and body by a key ring or other connector that is slidable in a longitudinal slot in the elongate body so that when the control key is exposed at one end of the body for insertion into a lock, the asset key is pulled into a position within the body. Likewise, when the key ring is moved to the other end of the slot, it pulls the control key into the body and exposes the asset key at the other end of the body. However, since the slot itself provides a means for studying the configuration of the asset key, elongate key visibility shields are further provided on either side of the asset key and mounted to the key ring. These are adjacent the asset key when it is positioned within the body and block visual inspection through the slots. They can be moved away from the asset key when it is exposed for insertion into a lock so as to allow insertion into said lock. A further benefit of the invention is that, when carrying the asset key for use, it can be held by the key ring so as to be concealed within the body. It only need be exposed briefly prior to its insertion into a lock.
The elongate body of the invention is shown in exploded position separate from the previously enumerated elements.
As will be noted from review of FIGS. 1 et seq. the current invention has a control key 1 joined to an asset key 2 by a key ring 3. These are connected to an opaque elongate body 4 in such manner that the asset key 2 can be moved to a position within said body 4 where its configuration is concealed and can likewise be moved to a position where it is exposed for insertion into a lock. This is accomplished by joining the control key 1 to said asset key 2 and body 4 by a key ring 3 or other connector that is slidable in a longitudinal key ring slot 5 in the elongate body 4 so that when the control key 1 is exposed at one end of the body 4 for insertion into a lock, the asset key 2 is pulled into a position within the body 4. Likewise, when the key ring 3 is moved to the other end of the key ring slots 5, it pulls the control key 1 into the body 4 and exposes the asset key 2 at the other end of the body 4. However, since key ring slots 5 provides a means for studying the configuration of the asset key 2, elongate key visibility shields 6 are further provided on either side of the asset key 2 and mounted to the key ring 3. These are adjacent the asset key 2 when it is positioned within the body 4 and block visual inspection through the key ring slots 5. They can be moved away from the asset key 2 when it is exposed for insertion into a lock so as to allow insertion into said lock.
Reviewing
However, in viewing the preferred embodiment illustrated and described herein it should be remembered that numerous variations are possible without exceeding the scope of the inventive concept. Accordingly, it is to be understood that the embodiments of the invention herein described are merely illustrative of the application of the principles of the invention. Reference herein to details of the illustrated embodiments is not intended to limit the scope of the claims, which themselves recite those features regarded as essential to the invention.
Number | Date | Country | |
---|---|---|---|
60656063 | Feb 2005 | US |