Security for assets
Securing assets becomes a sort of arms race between people interested in defeating or evading the security measures and those who want to strengthen the security measures so that they cannot be easily breached. This leads to increasing levels of security that become increasingly expensive. It also ensures that simple and inexpensive key security measures are welcomed whenever they can significantly increase security.
This invention provides increased asset security at a very low cost so that the extra security achieved is readily affordable.
Prior art control systems for keys, for example, have used a control key to control access to an asset key. The asset key affords access to something worth securing, and the control key is on the same key ring as the asset key and is locked within a security cabinet accessible only by authorized people. Some control systems also limit access to controlled keys to a specific few of the people authorized to enter the security cabinet for any purpose. Persons authorized to remove the control key from the security box then have access to the associated asset key mounted on the same key ring as the control key. This ensures that the asset key and the control key remain connected and that when the control key is returned to the security box the asset key is also returned. For these purposes, the key ring is made in a secure form that cannot be opened to remove a key without leaving evidence of tampering.
One problem with this arrangement is that the code on the asset key is vulnerable to copying by anyone gaining access to the security box, even though such access does not extend to a particular asset key. A person having access to the security box for one particular control key and asset key can see the other asset keys hanging openly in the box and can possibly copy unauthorized asset keys by memory or by an impression made using wax, a bar of soap, or even pliable skin on a forearm.
This problem of exposed information also applies to other assets such as credit cards, parking or membership cards, vehicle fobs, and other items. It can also be desirable in some cases to assure that information relating to an asset accompanies the asset not only when it is removed from the box but also when the asset is returned to the box. A good example of this need is a vehicle key associated with a fob for the same vehicle, a gasoline credit or debit card, and a parking, toll, or membership pass. Whoever gets authorization to the vehicle key should also have access to the related information, which should always accompany the vehicle key and the credit card while remaining reasonably secure. Meanwhile, information about such assets deserves protection, even while located in a security box.
This invention adds inexpensive additional security to the protection of assets that are accompanied by security devices. The assets can be keys, cards, passes, and innumerable other things worth protecting. When the assets are cards, such as credit or debit cards, they are preferably included within a holder that protects the cards and enables the cards to be held in an inaccessible position or moved to a position allowing access to the cards.
The control devices are often keys that allow access to the asset, but they can also be padlocks, switches, valves, and other devices. One function of the security devices is to ensure that only the authorized persons have access to the asset.
The invention includes an enclosure that can hold the asset and make the asset inaccessible when it is within the enclosure. The “asset” for this purpose can include a holder for an asset card.
The invention also includes a tether that connects the security device to the asset and connects the asset to the enclosure. The tether can be a key ring or loop, a pin or other fastener, or a multi-piece device such as interlocking loops or rings.
The tether connections are arranged to make the asset movable at least part way out of the enclosure to make the asset accessible, but such movement is allowed only when authorized by the security device. Persons having access via the security device can then also have access to the enclosure and can move the asset out of the enclosure far enough to become accessible, but this movement occurs only when permitted by the security device. The tether connection to the security device allows the security device to move between a secure or guard position blocking any movement of the asset out of the enclosure and an authorized position allowing movement of the asset out of the enclosure.
These security measures provide obstacles to the accessibility of the asset and reduce chances of misuse or misplacement. They can also ensure that items associated with the asset remain connected to the asset during use. If a security violation occurs, the protective measures offered by this invention reduce the number of suspects who may have violated security rules. For this purpose, the security device controlling access to the asset can also produce a log of information on who gained access to the asset and when such access was gained.
An application of the invention to an asset in the form of a key and a security device in the form of a control key is illustrated in
A more general application of the invention to an asset in the form of a card and a security device in the form of a key is schematically illustrated in
The invention is best understood by the schematic illustrations of
As shown in
Enclosure 30 is shaped to contain and block access to asset 40, which happens to have a card shape. Asset 40 can also have many other shapes, which enclosure 30 can be configured to accommodate. When asset 40 is a card, it is preferably contained within holder 31, so that “asset” can refer to the combination of holder 31 and card 40 that the holder contains. Otherwise, card 40 could be destroyed if it required a hole to receive ring 60 or some other tether. Card holder 31 provides such a hole while retaining card 40 within holder 31 so that when card 40 is contained within holder 31, the term “asset” can refer to the combination of card 40 and its holder 31.
Security device 50 can often be a key, which can be held in a lock within a security box. A person having appropriate authorization can then remove key 50 from a security box (not shown) to give the person access to the asset. When key 50 is held within a lock in the security box, asset 40 in card holder 31 is held within enclosure 30, as shown in
An authorized person is able to remove security device 50 from a lock in a security box. This allows security device 50 to move to the position shown in
Ring 60 affords a tether between security device 50, enclosure 30, and card holder 31 holding asset 40. Tether 60 can have forms other than a ring. For example, tether 60 can be a pin that extends through slots 70 and connects ring 50, enclosure 30, and the holder 31 of asset 40. Tether 60 could also be a padlock or some other device that makes the necessary connections and allows appropriate movements. Tether 60 can also be something other than a single unit. For example, tether 60 can be formed of interlocking loops connected to the security device, the asset, and the enclosure.
One advantage of forming tether 60 as a ring or loop is that it can then retain related information or devices that do not require the same protection as asset 40. A good example of this is an automobile key and fob mounted on tether ring 60 while an asset card for gasoline is mounted on tether ring 60 within enclosure 30. Whoever obtains authorized access via security device 50 then has the car key, a fob for opening the doors of the car, and the gasoline card or parking pass for the car shielded within holder 31. The authorized user then has access to the car, and by moving the tether along slots 70, also has access to cards associated with the car. Meanwhile, the key and the fob can be available outside enclosure 30 for use by an authorized person.
Control device 50, besides being a key, could also be a padlock, or a switch or valve that releases a device allowing tether movement along the length of slots 70. One function of control device 50 is to allow removal from a security box only by an authorized person. Another function of security device 50 is to ensure that the asset remains within the enclosure until the security device allows removal from a security cabinet. In other words, when the security device is locked up the asset is guarded by the enclosure, and the only way to get access to the asset is to be authorized by the security device, which then allows movement of the tether relative to the enclosure to make the asset accessible.
The security system explained above relative to
The key shield of
Front wall 11 of shield 4 has a longitudinal slot 15 aligned with, and parallel with another slot 16 in rear wall 10. Slots 15 and 16 allow key ring 3 to be mounted within the slots to pass through the space between front and rear walls 11 and 10. Keys 1 and 2 are also mounted on ring 3 in the space where ring 3 passes between walls 10 and 11. Slots 15 and 16 allow key ring 3 and its mounted keys 1 and 2 to slide longitudinally of shield 4 for the length of slots 15 and 16. For this purpose, slots 15 and 16 are spaced from edge wall 12 by less than a diameter of key ring 3. The ends of slots 15 and 16 preferably extend to within a key ring diameter of opposite end regions 17 and 18 of front and rear walls 11 and 10. This gives key ring 3 freedom of movement and freedom of pivotal orientation to keep key ring 3 out of the way of movement of keys 1 and 2.
Visibility shields 6 are preferably also mounted on key ring 3 to straddle asset key 1 and possibly also straddle control key 2. As explained more fully below, asset shield 6 can prevent any viewing of asset key 1 when it is housed within the walls of shield body 4.
The assembled views of
While asset key 2 is exposed for use, in the position illustrated in
When keys 1 and 2 and shield body 4 are stored in a secure cabinet, in the position illustrated in
When control key 1 is removed to allow use of asset key 2, then key ring 3 and everything attached to key ring 3 can begin moving along slots 15 and 16 to a position near open end 17 of shield body 4. This brings everything gradually back to the position illustrated in
This application claims subject matter that was disclosed in Provisional Application No. 60/063,656, filed 24 Feb. 2005, entitled “Asset Key Shield”, and is a continuation-in-part of U.S. patent application Ser. No. 11/359,320, filed 22 Feb. 2006, entitled “Asset Key Shield”. Applicant hereby claims the benefit under 35 USC §119(e) of the U.S. provisional application, and hereby incorporates the aforementioned applications by reference.
Number | Date | Country | |
---|---|---|---|
Parent | 11359320 | Feb 2006 | US |
Child | 12619031 | US |