Controlled access to security assets in boxes
A box containing a security asset, such as a key, must be secure. It should not easily yield to forced entry, and it should reliably open only to authorized people. A secure box should also be readily adaptable to many different locations and mounting arrangements. These often include, but are not limited to, walls structured in various ways. Security boxes should also be weather resistant so that they can be mounted in outdoor locations. Finally, security boxes should have emergency opening systems so they can admit access to a security asset during a fire, power failure, or other calamity. As these requirements suggest, security boxes can made in many different sizes and shapes that can be characterized as enclosures, containers, safes, compartments, etc. This application uses “box” as a simple term covering all these possibilities.
Previous suggestions for security asset boxes have failed to meet these requirements. The invention aims to remedy the shortcomings of prior art suggestions and to make available a security asset box that meets all of the above requirements at an affordable price.
The inventive security box is made mechanically strong and resistant to weather and tampering. It includes a personal identifier that can actuate a solenoid to release an openable closure. For emergency access, the box includes an emergency solenoid actuatable by an emergency voltage to release a latching system and allow the box to be opened when its access solenoid is inoperable.
The box preferably includes a web server that can be accessed by a web browser. This allows information to flow into and out of the box, and such information can include changing or adding to the personal identifiers that can open the box, and generating and transmitting information about asset events that occur during normal operation of the box. These features allow information to be gathered remotely and allow remote instructions to be implemented to protect the ongoing security of the box.
The security box 10 as illustrated uses an openable closure such as a drawer, door, or lid that can open from a housing 50 to afford access to a security asset. A drawer 20 such as illustrated is convenient for several reasons as a way of accessing contents of box 10. Closure 20 contains a security asset such as a key (
Access to box 10 is controlled by a personal identifier so that only authorized persons can gain access to box 10. One simple way that this can be done is with number pad 25 that can be conveniently arranged on a front face of closure 20. Biometric devices such as thumb or fingerprint readers, eye image readers, and possibly others, can all be used. The basic idea is to restrict access to box 10 to only the person or people who are authorized.
Box 10 preferably uses an access solenoid 30 arranged in box 10 or in drawer 20 to unlatch closure drawer 20 for opening in response to entry of an authorized personal identifier. Box 10 preferably also has an emergency opening system using an emergency release solenoid 40 that can be arranged in housing 50. A preferred latching system operable with solenoids 30 and 40 uses a sliding latch bar 41 having a hole 42 that can be engaged by emergency release solenoid 40, and having another hole 43 that can be engaged by access solenoid 30.
When access solenoid 30 is actuated, its pin retracts from hole 43 so that drawer 20 can open while access solenoid 30 moves with it to the position of
An emergency disabling access solenoid 30 is often a power failure, so emergency release solenoid 40 has a different power supply, preferably from a source remote from box 10. This can be as simple as a 12-volt battery connectable to contacts wired to emergency release solenoid 40 at a location some distance away from box 10.
Another preferred aspect of the opening of drawer 20 is a push-to-release feature. This involves one or more springs 51 preferably arranged in a rear of housing 50 to bias drawer 20 toward an opening position. When access solenoid 30 is actuated, the pressure of springs 51 pushing forward on drawer 20 frictionally holds pin 44 of access solenoid 30 in place within hole 43 of slide bar 41. Pushing back on the front 26 of drawer 20 overcomes the spring pressure and allows solenoid pin 44 to release which then allows drawer 20 to move forward under the urging of springs 51. Drawer 20 can then be pulled out as far as necessary to reach the security asset that it contains.
Box 10 preferably includes a web server 60, which is conveniently arranged within closure drawer 20. This makes it accessible if repairs or replacement become necessary. Mother board 61 and other electronics are preferably also mounted in drawer 20. Power for the electronic components in drawer 20 is preferably derived from a power over Ethernet (POE) connection which preferably enters housing 50 via a rear opening 52 from which it can be plugged into a top of receptacle 70. A similar plug 71 on wiring tray 75 automatically plugs into receptacle 70 to power drawer components when drawer 20 is moved into a closed position. Wiring tray 75 then detents into housing 50 by means of a projection 73 entering an opening 74 in wiring tray 75. This holds wiring tray 75 in place as drawer 20 moves in and out, while a flexible cable 76 conveys power between receptacle 70 and components in moving drawer 20. (
Housing 50, as shown in
Securing housing 50 within a wall can be done in several ways. One preferred way is to fill a cavity around housing 50 with an adhesive foam material that strongly resists any removal of housing 50. This can be enhanced by fixture blocks 57, one of which is shown in
The front opening 65 of housing 50 is preferably stepped and flared slightly outward to receive front perimeter 61 of drawer 20, as shown in
An alternative box 80, illustrated in
This application is a continuation-in-part of application Ser. No. 11/421,635, filed Jun. 1, 2006 entitled now abandoned “Multipurpose Interface and Control System”, which is a continuation-in-part application of U.S. application Ser. No. 10/644,383, filed Aug. 19, 2003, entitled “Tangible Security Asset Management System and Methods Thereof”, a non-provisional application to provisional application No. 60/686,181, filed Jun. 1, 2005, entitled “Multipurpose Interface and Controller”.
Number | Name | Date | Kind |
---|---|---|---|
3761682 | Barnes et al. | Sep 1973 | A |
4750197 | Denekamp et al. | Jun 1988 | A |
5244020 | Bruno et al. | Sep 1993 | A |
5392025 | Figh et al. | Feb 1995 | A |
5887468 | Hasan | Mar 1999 | A |
6428060 | Metz | Aug 2002 | B1 |
6434985 | Walmsley | Aug 2002 | B1 |
6564121 | Wallace et al. | May 2003 | B1 |
6675067 | Blad | Jan 2004 | B2 |
7323991 | Eckert et al. | Jan 2008 | B1 |
20030034390 | Linton et al. | Feb 2003 | A1 |
20030183136 | Perkins | Oct 2003 | A1 |
20040051626 | Pautler | Mar 2004 | A1 |
20040075533 | Ives et al. | Apr 2004 | A1 |
20040252018 | Shuster | Dec 2004 | A1 |
20050145740 | Rathmann et al. | Jul 2005 | A1 |
20050165612 | Van Rysselberghe | Jul 2005 | A1 |
Number | Date | Country | |
---|---|---|---|
20090237207 A1 | Sep 2009 | US |
Number | Date | Country | |
---|---|---|---|
60686181 | Jun 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11421635 | Jun 2006 | US |
Child | 12464370 | US | |
Parent | 10644383 | Aug 2003 | US |
Child | 11421635 | US |