`
`(12) United States Patent
`Maloney
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,336,174 B1
`Feb. 26, 2008
`
`(54) OBJECT TRACKING SYSTEM WITH
`AUTOMATED SYSTEM CONTROLAND
`USER DENTIFICATION
`
`O
`O
`75
`(75) Inventor: William C. Maloney, Atlanta, GA (US)
`
`(*) Notice:
`
`(73) Assignee: Key Control Holding, Inc., Houston,
`TX (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 867 days.
`(21) Appl. No.: 10/216,334
`
`(22) Filed:
`
`Aug. 9, 2002
`Related U.S. Application Data
`(60) Provisional application No. 60/333,463, filed on Nov.
`27, 2001, provisional application No. 60/311,182,
`filed on Aug. 9, 2001.
`
`(51) Int. Cl.
`(2006.01)
`G08B I3/14
`(52) U.S. Cl. ............................... 340/572.1; 340/568.1;
`34O7825.49
`(58) Field of Classification Search ............. 340/572.1,
`340/568. 1,568.2, 568.8, 825.49
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`2.971,806 A
`2, 1961 Andreasen .................. 312/223
`3,451,043 A
`6, 1969 Krause ....................... 340,152
`3,648,241 A
`3, 1972 Naito et al. ..
`34017R
`4,209,787 A
`6, 1980 Freeny, Jr. .................. 343, 112
`4,267.942 A
`5/1981 Wick, Jr. et al. ............... 221/2
`4,519,522 A
`5, 1985 McElwee ...........
`... 221 13
`4,549,170 A 10, 1985 Serres et al. ................ 340,568
`4.575,719 A
`3/1986 Bertagna et al. ....... 340/825.35
`4,595,922 A
`6, 1986 Cobb et al. ............ 340,825.49
`
`1/1987 Banks et al. ........... 340,825.31
`4,635,053 A
`1/1987 Mochida et al. .............. 340.63
`4,638,292 A
`4,661.806 A * 4, 1987 Peters et al. ......
`... 340,568.1
`4,673.915 A
`6/1987 Cobb ......................... 340,330
`4,783,655 A * 11/1988 Cobb et al. ............ 340,825.49
`4,812,985. A
`3/1989 Hambrick et al. .......... 364,478
`4,814,592 A
`3/1989 Bradt et al. ................. 235,381
`4,845.492. A
`7/1989 Cobb et al. ............ 340/825.49
`4,853,692 A
`8/1989 Wolk et al. ................. 340,573
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`GB
`
`1364535
`8, 1974
`(Continued)
`OTHER PUBLICATIONS
`Memory-Based Identifier Tag Provides Digital ID- ID Dave
`Bursky—Electronic Design—Jul. 25, 1992 pp. 153 and 156.
`Primary Examiner Benjamin C. Lee
`Assistant Examiner Daniel Previl
`(74) Attorney, Agent, or Firm Jackson Walker L.L.P.:
`Mark A. Tidwell, Esq.
`
`ABSTRACT
`(57)
`An enhanced object tracking system for tracking and con
`trolling access to a plurality of objects such as keys is
`disclosed. The object tracking system implements many
`improvements including automated user identification using
`biometric data extracted from the user with a minimum of
`user interaction, tracking of objects both inside and outside
`their storage units, the locking of objects within slots of their
`storage unit to guard against illicit removal and return of
`keys and to insure random slot rotation, image and visual
`based inventory verification methodologies, and tracking of
`objects during times when they are checked out of the
`system. The result is an intelligent object tracking system
`-
`-
`- -
`-
`with automated control functions and high reliability.
`
`24 Claims, 19 Drawing Sheets
`
`
`
`IPR2022-00602
`Apple EX1043 Page 1
`
`
`
`US 7,336,174 B1
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`9, 1989 de Prins ..................... 364,900
`4.866,661 A
`4.885,571. A 12/1989 Pauley et al.
`4,889,977 A 12/1989 Haydon ...................... 235,375
`4,896,024 A
`1/1990 Morello et al.
`4,918,432 A
`4/1990 Pauley et al.
`4,967,906 A 1 1/1990 Morello et al.
`5,038,023 A
`8/1991 Saliga ........................ 235,385
`5,172,829. A 12/1992 Dellicker, Jr. ...
`... 221 13
`5,319,544. A
`6/1994 Schmerer et al. ........... 364/403
`5,389,916 A
`2f1995 Chen et al. ....
`... 340,650
`5,402,104 A
`3, 1995 LaRosa ...
`340,539
`5.434,775 A
`7, 1995 Sims et al. .
`364,403
`5,525,969 A
`6, 1996 LaDue ..........
`... 340,573
`5,612,683 A
`3/1997 Trempala et al. ...... 340,825.31
`5,619,932 A
`4, 1997 Efland et al. .............. 109.24.1
`5,635,693 A * 6/1997 Benson et al. ........
`340, 10.33
`5,689.238 A 1 1/1997 Cannon, Jr. et al. ........ 340,568
`5,703,785 A 12/1997 Bluemel et al. ....... 364,479.14
`5,777,884 A
`7, 1998 Belka et al. ........... 364/478.13
`5,801,628 A
`9/1998 Maloney .....
`... 340,568
`5,805,074 A * 9/1998 Warren et al. ............. 340,554
`5,836,002 A 1 1/1998 Morstein et al.
`5,905,653 A
`5/1999 Higham et al.
`5,957,372 A
`9, 1999 Dean et al.
`5,961,036 A 10, 1999 Michael et al.
`
`5,963,134 A 10/1999 Bowers et al. ........... 340,572.1
`5,971,593 A 10/1999 McGrady .................... TOOf 233
`6,069,563 A
`5, 2000 Kadner et al.
`6,073,834 A
`6/2000 Michael et al.
`6,075,441 A
`6/2000 Maloney .................. 340,568.1
`6,148,271 A 1 1/2000 Marinelli .................... TO2/141
`6,195,005 B1
`2/2001 Maloney .................. 340,568.1
`6,204.764 B1
`3/2001 Maloney.
`340,568.1
`6,232,876 B1
`5/2001 Maloney .................. 340,568.1
`6,292,795 B1* 9/2001 Peters et al. ................... 707/3
`6,431,438 B1* 8/2002 Pires et al. ................. 235,375
`6,707,381 B1
`3/2004 Maloney
`6,745,366 B1
`6/2004 Roh et al.
`6,788,997 B1
`9, 2004 Frederick
`
`
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`WO95/04324
`WO95/12858
`WOOOf 1628O
`WOOOf 16281
`WOOOf 16282
`WOOOf 16284
`WOOOf 16564
`WO O1 (75811
`
`* cited by examiner
`
`2, 1995
`5, 1995
`3, 2000
`3, 2000
`3, 2000
`3, 2000
`3, 2000
`10, 2001
`
`IPR2022-00602
`Apple EX1043 Page 2
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 1 of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 3
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 2 of 19
`
`US 7,336,174 B1
`
`
`
`
`
`NITALIZE
`
`PROMPT USERTO
`USE BOMETRIC SENSOR
`
`DENTIFY USER FROM
`BIOMETRIC DATA
`
`
`
`
`
`YES
`QUERYDATABASE FOR
`USER RECURED OBJECTS
`
`DETERMINE F THIS IS
`ACHECK OUT OR RETURN
`SITUATION FROM TIME
`OF DAY, STATUS OF OBJECTS,
`AND OTHER FACTORS
`
`
`
`
`
`ACTIVATE APPROPRIATE
`STORAGE UNTS
`
`UNLOCKAPPROPRIATE
`STORAGE UNITS
`
`STORAGENNO
`
`
`
`
`
`
`
`
`
`OBJECT NYES
`RETURN2
`
`
`
`(c) Fig. 3
`
`2
`
`IPR2022-00602
`Apple EX1043 Page 4
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 3 of 19
`
`US 7,336,174 B1
`
`MONITORISCAN OBJECT
`INVENTORY TO DETECT
`REMOVALS AND/OR INSERTONS
`OF OBJECTS
`
`YES
`
`INDICATE DETECTED
`REMOVALS OR
`NSERTIONS
`
`NO
`
`LOG DETECTED
`REMOVALS OR
`INSERTIONS
`
`
`
`NO
`
`ENCLOSURES
`CLOSED?
`
`YES
`
`SCAN OBJECT INVENTORY TO
`DETECT REMOVALS OR INSERTIONS
`
`
`
`PROCESSID CODES FROM OBJECTS TO
`DETERMINE AND LOG WHICH OBJECS WERE
`REMOVED OR INSERTED, WHICH USER DID SO,
`THE DATE/TIME OF REMOVAL/INSERTION, AND
`TO DETERMINE IF ANY OBJECTS HAVE BEEN
`ABSENT TOO LONG OR NEED MANTENCE
`
`(G)
`
`Fig. 4
`
`IPR2022-00602
`Apple EX1043 Page 5
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 4 of 19
`
`US 7,336,174 B1
`
`
`
`ARE ALL
`OBJECTS
`UNIQUET
`
`
`
`DETERMINE LOCATION OF
`AVAILABLE SLOTS FOR
`RECEPT OF OBJECTS
`
`NDCATE LOCATION OF
`AVAILABLE SLOTS FOR
`RECEPT OF OBJECTS
`
`
`
`
`
`FOREACH NON-UNIQUE
`OBJECT, QUERYDATABASE
`FOR ALLAVAILABLE OBJECTS
`
`FOR EACH NON-UNIQUE OBJECT,
`CHOOSE MOST APPROPRIATE
`FROMAVAILABLE OBJECT LIST
`
`FOREACH NON-UNQUE OBJECT,
`ASSGN CHOSEN OBJECASA
`REQUIRED USER OBJECT
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 6
`
`IPR2022-00602
`Apple EX1043 Page 6
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 5 Of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 7
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 6 of 19
`
`US 7,336,174 B1
`
`2
`22
`
`ZZZZZZZZZZZZZZZZZZZZ | |
`
`8 '61-I
`
`69
`
`|
`
`NSIN
`
`ZZZZLØZZZZZZZZZZZZZZZZ]] [[ZZZZZZZZZZZZZZZZZZZTØ
`
`68
`
`99
`
`|×
`
`##7
`
`
`
`````
`27 %
`% N
`
`IPR2022-00602
`Apple EX1043 Page 8
`
`
`
`U.S. Patent
`
`
`
`Feb. 26, 2008
`
`Sheet 7 of 19
`
`US 7,336,174 B1
`
`È,
`
`ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
`
`| ||ZZZZZZZZZZZZZZ
`
`S ZZZZZZZZZZZZZZZ S SSN
`
`IPR2022-00602
`Apple EX1043 Page 9
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 8 of 19
`
`US 7,336,174 B1
`
`
`
`A
`
`IPR2022-00602
`Apple EX1043 Page 10
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 9 Of 19
`
`US 7,336,174 B1
`
`
`
`114
`
`Fig. 12
`
`IPR2022-00602
`Apple EX1043 Page 11
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 10 of 19
`
`US 7,336,174 B1
`
`-- 7
`"unlunulirul III "
`123
`126 127
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1043 Page 12
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 11 of 19
`
`US 7,336,174 B1
`
`/
`
`- - - - - 1
`
`136
`/
`
`/
`fit,
`..
`t
`/ | //
`137 / al l
`4.--- /
`138
`w
`est
`ill
`
`M
`
`|
`
`
`
`
`
`
`f 15
`d
`l
`
`
`
`1.
`
`
`
`
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1043 Page 13
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 12 of 19
`
`US 7,336,174 B1
`
`
`
`
`
`
`
`
`
`as TTT -/ %-7-
`N
`filli?i ()
`w$va
`M
`
`-----
`Z.
`M
`----, 4
`
`22- - OO at
`
`
`
`139
`1.
`
`o:
`
`
`
`
`
`
`
`
`
`h
`
`146
`him. Illii.
`
`?'
`
`
`
`IPR2022-00602
`Apple EX1043 Page 14
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 13 Of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 15
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 14 of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 16
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 15 Of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 17
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 16 of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 18
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 17 Of 19
`
`US 7,336,174 B1
`
`SN 1.
`
`
`
`
`
`sé
`
`
`
`IPR2022-00602
`Apple EX1043 Page 19
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 18 of 19
`
`US 7,336,174 B1
`
`191
`
`
`
`
`
`
`
`193
`Yea
`
`t
`
`PORTALA
`
`PORTALC
`
`197-)
`
`199
`
`199
`
`199
`
`196-)
`
`PORTALB
`
`ZONE 1
`
`Fig. 21
`
`IPR2022-00602
`Apple EX1043 Page 20
`
`
`
`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 19 of 19
`
`US 7,336,174 B1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ZZ "61-J
`
`IPR2022-00602
`Apple EX1043 Page 21
`
`
`
`1.
`OBJECT TRACKING SYSTEM WITH
`AUTOMATED SYSTEM CONTROLAND
`USER DENTIFICATION
`
`REFERENCE TO RELATED APPLICATIONS
`
`5
`
`The benefit of the filing dates of U.S. provisional patent
`applications Ser. Nos. 60/311, 182 filed on Aug. 9, 2001 and
`60/333,463 filed on Nov. 27, 2001 is hereby claimed.
`
`TECHNICAL FIELD
`
`10
`
`This invention relates generally to computer controlled
`object tracking systems, such as key tracking systems, and
`more specifically to object tracking systems with built-in 15
`intelligent automated controls and security functions and
`with automated user identification and verification.
`
`BACKGROUND
`
`2O
`
`Object tracking systems such as, for example, systems for
`controlling access to and tracking keys in an automotive
`dealership, have been available for some time. Among the
`most innovative of Such systems are the object tracking
`systems and methodologies disclosed in various patents and 25
`patent applications of the present inventor. These include
`U.S. Pat. Nos. 5,801,628; 6,075,441, 6,317,044: 6,195,005;
`6,204,764; 6,407,665; 6,232,876; 6,392,543; 6,424,260; and
`6.262,664 as well as pending U.S. patent application Ser.
`No. 10/133,130. The disclosures of all of these patents and 30
`patent applications are hereby incorporated by reference.
`Together they provide much of the detailed background
`material and detailed discussions of various configurations
`of hardware and software that underlie the inventions dis
`closed and claimed in the present disclosure. Accordingly, to 35
`the extent that such details are included in these incorporated
`references, they need not and will not be discussed exten
`sively in the present disclosure.
`While the object tracking system disclosed in the above
`patents and applications have been very Successful, particu- 40
`larly when applied to the tracking of and the control of
`access to keys in an automotive dealership, they also can be
`Somewhat less than completely satisfactory in Some situa
`tions and environments. For example, these systems gener
`ally require a level of active participation by the user when 45
`checking objects in and out. A user, for instance, typically is
`required to identify himself by typing or otherwise entering
`a user name and to verify his identity by, for example,
`entering a secret password, placing a finger on a fingerprint
`scanner, or touching an ID badge or fob to a reader, before 50
`the system will allow access to objects secured therein. In
`Some object tracking scenarios, this level of user Sophisti
`cation and participation is too great, to cumbersome, or
`otherwise undesirable. In addition, it is less secure that it
`might be because a user may divulge his user name and 55
`password to another user or to unauthorized personnel, who
`may then access objects in the system using the falsely
`acquired credentials. A need exists, therefore, for an object
`tracking system that positively identifies each user with a
`minimum of user interaction and that prevents unauthorized 60
`access with stolen or improper credentials.
`Prior object tracking systems also include other areas of
`potential weakness or security lapses. For instance, in Sys
`tems for tracking keys, the key tags to which keys are
`attached generally have not been positively locked in their 65
`individual slots, so that a user can remove any key from the
`system, even keys to which he or she may not have autho
`
`US 7,336,
`174 B1
`
`2
`rized access. In other words, prior systems do not force the
`user to remove only the key that is requested or authorized.
`Prior systems also do not insure that the user returns the
`same key that was initially checked out by that user. Further,
`a significant measure of security is provided in prior systems
`because the keys and their key tags are allowed to be
`returned to any random slot within a bank of drawers, each
`with scores of slots. Since all the keys look similar, it is
`extremely difficult with Such random slot assignment for a
`user to locate and extract a particular key with the intent, for
`instance, of stealing a vehicle, without properly logging into
`the system and thereby creating an audit trail. However, this
`security feature can be defeated by a clever user who
`repeatedly returns the subject key to the same slot within the
`system so that the physical location of the key is known
`without logging into the system and requesting the key. A
`need exists for an improved object tracking system and
`methodology that is configured and programmed to elimi
`nate this and similar possibilities.
`Other and related enhancements to existing object track
`ing systems also are needed. For example, visual inspection,
`either personal inspection or inspection through automated
`imaging techniques, of the condition of inventory in the
`system is desirable for detecting tampering with or removal
`of keys or other objects themselves while leaving their ID
`tags intact. Assignment of and controlled access to particular
`objects by particular users also is desirable in many sce
`narios where a user may be authorized to have access only
`to certain objects and not others or where a user may need
`access to different objects at different times or access only
`during certain times (during his or her shift for example). In
`some cases, objects should not be removed from a desig
`nated area and it is therefore desirable for an object tracking
`system to insure that removal from the area does not occur.
`In related scenarios, it may be desirable to track the move
`ment of objects within a particular building or other larger
`area during the times when the object is checked out of the
`system by a user.
`It is to the provision of an enhanced and improved object
`tracking system that addresses the above and other needs
`and shortcomings of prior art systems that the present
`invention is primarily directed.
`
`SUMMARY OF THE INVENTION
`
`Briefly described, the present invention, in a preferred
`embodiment thereof, comprises an enhanced object tracking
`system for controlling access to and tracking a large number
`of objects such as keys. The system of the invention will, in
`fact, for the sake of clarity and brevity, be described herein
`primarily in terms of a system for tracking a large number
`of keys and particularly keys to vehicles at an automotive
`dealership. Where the tracking of other types of objects is
`appropriate, the system will be discussed in terms of track
`ing such objects. It will be understood by those of skill in the
`art, however, that, regardless of the particular context in
`which the system of this invention is discussed herein, it is
`applicable to the controlled access to and tracking of a wide
`variety of objects to which users need periodic access in the
`course of their duties. Such objects include, for example,
`jewelry, narcotics, test equipment, electronic access cards,
`and other objects that are Subject to being checked out to
`authorized users for limited periods of time.
`The key tracking system of the preferred embodiment
`includes a computer based controller that is coupled to and
`controls the various components of the system as described
`below. A plurality of key tags each is attached or attachable
`
`IPR2022-00602
`Apple EX1043 Page 22
`
`
`
`15
`
`3
`to one or more keys to be tracked. Each key tag is provided
`with at least one radio frequency identification (RFID) chip
`and associated antenna, either attached to the body of the
`key tag or attached, in one embodiment, to a tamper proof
`key ring or tether, which also secures the keys to the key tag.
`In another embodiment, two RFID chips are provided, one
`attached to the body of each key tag and another to the
`tamper proof key tether. Each RFID chip stores a unique
`identification code associated with and identifying its key
`tag and thus the keys attached thereto and is capable of
`transmitting its code via its antenna when appropriately
`polled. The transmitted identification code is receivable by
`an RFID reader coupled to the computer controller and the
`controller is programmed to receive and read identification
`codes from the reader. The incorporated U.S. Pat. No.
`6,204,764 discloses and describes such RFID chips (some
`times referred to as RFID tags) and readers in some detail.
`An enclosure or storage unit in the form of at least one
`cabinet with a lockable drawer is provided for receiving and
`storing key tags and their keys at a central location. Alternate
`types of enclosures Such as, for instance, a wall mounted
`cabinet with hinged door, also may be used. In the preferred
`embodiment, however, the drawer is provided with an
`internal panel having an array of slots, each for receiving
`and storing a key tag and the keys attached thereto when
`they are checked into the system. A locking pin assembly is
`associated with each slot below the panel and each key tag
`is formed with a corresponding hole or groove that aligns
`with the locking pin of a slot when the key tag is fully
`inserted in the slot. Each locking pin is retractable by means
`of a solenoid that is coupled to and controlled by the
`computer controller. The locking pins can be independently
`and selectively retracted and extended by the controller as
`needed either to lock a key tag in place within the corre
`sponding slot or to prevent a key tag from being inserted into
`an inappropriate slot. A presence detector also is associated
`with each slot in one embodiment to detect when a key tag
`is fully inserted in the slot so that the locking pin can be
`engaged.
`An internal global RFID reader and associated antenna is
`disposed in the storage unit and is positioned to receive radio
`frequency transmissions from any RFID chips located
`within the storage unit. The global RFID reader is coupled
`to, communicates with, and is controlled by the computer
`controller of the system for transmitting identification codes
`received by the RFID reader to the computer controller.
`Techniques for polling and receiving transmissions from
`large numbers of RFID chips while avoiding data collisions
`and cross talk are known and generally available from
`manufacturers of RFID chips and readers. In general, the
`global RFID reader may be used by the controller to
`determine which key tags and associated keys are present
`within the storage unit at any time.
`A biometric identification unit is coupled to the computer
`controller for identifying users who request access to the
`system and the keys stored therein. The biometric identifi
`cation unit may include one or more passive identification
`sensors such as, for example, a fingerprint Scanner, a facial
`feature Scanner, a retinal scanner, or other type of reader for
`reading biometric information that is unique to each user.
`The controller receives the information from the biometric
`sensor and is programmed with appropriate pattern recog
`nition algorithms and stored databases to identify positively
`each user requesting access to the system or, alternatively, to
`recognize when an unauthorized user requests access. An
`65
`external digital camera also is provided in one embodiment
`for generating a visual record of each request for access,
`
`40
`
`45
`
`50
`
`55
`
`60
`
`US 7,336,174 B1
`
`5
`
`10
`
`25
`
`30
`
`35
`
`4
`which can be stored for future use or transmitted to security
`personnel in the event of a Suspicious request for access.
`In one preferred embodiment, the system is provided with
`an internal digital camera and light source within the storage
`unit. The camera is coupled to and communicates with the
`controller to transmit images of the inventory (keys and key
`tags) within the storage unit at any time upon command.
`These images can be taken, for instance, immediately after
`a check in or periodically during inactive periods to provide
`visual verification that key tags and their keys have not been
`illicitly tampered with by, for example, the cutting of a key
`or keys from their tag prior to placing the tag in a slot of the
`storage drawer. In this same vein, the storage unit may be
`provided with a clear wall made of glass, Plexiglas, Lexan,
`or other clear material to provide for personal visual inspec
`tion of the inventory within the storage unit by security
`personnel. If a clear wall is provided, security measures in
`the form, for instance, of an embedded array of conducting
`threads also may be provided in the wall to detect an
`attempted break in by a would-be thief who breaks the glass
`or other material of the clear wall.
`A separate external RFID reader is provided in one
`embodiment and this reader is configured for long range
`detection of the radio frequency transmissions of RFID
`chips associated with the key tags. This external reader is
`useful in scenarios where objects checked out of the system
`are to stay in the vicinity of the storage unit. In these
`scenarios, the external RFID reader continuously receives
`identification codes from RFID chips within its range and
`transmits these codes to the computer controller. If a
`checked out object is moved out of the authorized vicinity,
`it will move out of range of the external RFID sensor and its
`signal will be lost. This is an indication to the controller that
`the object has been illicitly moved from the vicinity and
`appropriate alarms can be sounded and security personnel
`alerted.
`The basic system described briefly above provides for a
`number of enhanced security features, all of which will be
`discussed in more detail below. In Summary, these features
`includes the ability to reduce significantly or eliminate
`completely the level of active participation required from a
`user during transactions with the system. Rather than being
`required to enter a user name and PIN number, for instance,
`a user is automatically identified and verified from his or her
`biometric data, such as a fingerprint, facial features, or
`retinal scan. Such means of identification not only reduces
`user interaction, it also is more secure because it eliminates
`fraudulent use of the credentials of another to gain illicit
`access to the system. The locking pin array of the system
`facilitates intelligent controlled access to tracked objects
`through a workload/Scheduling function. This function
`allows a Supervisor, for example, to designate specific
`objects to which each user has access and/or to designate
`times of day (e.g. during each users shift) during which each
`user is authorized to have access. The system insures that
`users have access only to objects they should have access to
`and only at the times when they should have access.
`Other functions facilitated by the system include the
`ability to force random object rotation among slots of the
`storage unit by designating to users specific slots to which
`key tags should be returned upon check in. The key tags are
`forced to be inserted only in those slots by appropriately
`manipulating the locking pins of the slots so that only the
`designated slot is in condition to receive a key tag. Visual
`confirmation of the condition of keys and their key tags
`inside the storage unit is made possible by the internal digital
`camera with wide angle lens and by the clear wall of the unit,
`
`IPR2022-00602
`Apple EX1043 Page 23
`
`
`
`US 7,336,174 B1
`
`5
`which allows for personal visual inspection. Providing two
`RFID chips on each key tag, one on the key tag and one on
`a tamper proof tether (the incorporated U.S. Pat. No. 6,262,
`664 discusses such tamper proof tethers in detail), provides
`further security against the malicious removal of keys from
`their key tags and also provides for tracking checked out
`keys within a specified area to insure that they are not
`removed from the area. The system also may be coupled to
`a Zonal transition detection system, which may include
`triangulation receivers, to track the movement of checked
`out keys or other objects throughout a building, car lot, or
`other larger area.
`The forgoing and additional significant enhancements and
`improvements are provided by the system and methodology
`of the present invention. These and other features, objects,
`and advantages of the invention will be understood more
`fully upon review of the detailed description set forth below,
`when taken in conjunction with the accompanying drawing
`figures, which are briefly described as follows.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a perspective somewhat schematic view of an
`object control and tracking system that embodies principles
`of the invention on one preferred form.
`FIGS. 2 through 6 together comprise a functional flow
`chart illustrative of an object control and tracking method
`ology that embodies principles of the invention.
`FIG. 7 is a perspective partially schematic view of an
`object control and tracking system that embodies principles
`of the invention in an alternate form.
`FIG. 8 is a cross sectional view through the drawer of the
`system shown in FIG. 1 or 7 illustrating insertion of a key
`tag and one embodiment of a locking pin assembly for
`locking the tag in place.
`FIGS. 9 and 10 are cross sectional views through the
`drawer of the system shown in FIG. 1 or 7 illustrating
`insertion of a key tag and another embodiment of a locking
`pin assembly for locking the key tag in place.
`FIG. 11 is a perspective partially schematic view of an
`object control and tracking system that includes a storage
`unit with a clear openable door rather than a slidable drawer.
`FIG. 12 is a perspective view showing an alternate
`embodiment of a storage unit in the form of a wall mount
`able cabinet with hinged clear door.
`FIG. 13 is a perspective view of a portion of the cabinet
`of FIG. 12 illustrating insertion of a key tag into a slot of the
`cabinet and the associated locking pin assembly.
`FIG. 14 is a cross sectional view of a portion of the
`interior of a storage unit illustrating an alternate configura
`tion of a key tag and the associated locking pin assembly.
`FIG. 15. is a cross sectional view of a portion of the
`interior of a storage unit illustrating another alternate con
`figuration of a key tag and the associated locking pin
`assembly.
`FIG. 16 is a perspective view of a portion of the interior
`of a storage unit illustrating one embodiment of a system for
`ensuring proper key tag orientation.
`FIG. 17 is a perspective view of a portion of the interior
`of a storage unit illustrating another embodiment of a system
`for ensuring proper key tag orientation.
`FIG. 18 is a perspective view of a portion of the interior
`of a storage unit illustrating another embodiment of a system
`for ensuring proper key tag orientation.
`FIG. 19 is a perspective view of a portion of the interior
`of a storage unit illustrating yet another embodiment of a
`system for ensuring proper key tag orientation.
`
`6
`FIG. 20 is a perspective view of a portion of the interior
`of a storage unit illustrating still another embodiment of a
`system for ensuring proper key tag orientation.
`FIG. 21 is a top plan view illustrating one embodiment of
`incorporating object tracking from Zone to Zone in a building
`while the object is checked out, according to the invention.
`FIG.22 is a functional flow chart illustrating one embodi
`ment of an object return function implementable with the
`system illustrated in FIG. 7.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`
`Referring now in more detail to the drawing figures,
`wherein like reference numbers indicate, where appropriate,
`like parts throughout the several views, FIG. 1 illustrates an
`object tracking and control system 11 that embodies prin
`ciples of the invention in a preferred form. The system 11
`comprises a storage unit 12 that, in this embodiment, takes
`the form of a cabinet housing an openable drawer 13. The
`drawer 13 has an internal panel 14 formed with an array of
`slots or receptacles 13 sized and shaped to receive trackable
`objects 33, each having at least one unique readable iden
`tification code contained within a contact memory button,
`RFID chip or otherwise. The trackable objects 33 may be
`key tags attached to keys, object enclosures that contain
`objects to be tracked, or otherwise, as described in the
`incorporated patents and patent applications. The storage
`unit contains a sensor or sensors (not visible) for detecting
`the identification codes of trackable objects within the
`drawer at any time.
`A controller 18 in the form of a personal computer 19,
`monitor 21, and keyboard 22 is provided for monitoring and
`controlling the various elements of the system, as described
`in more detail in the incorporated patents and patent appli
`cations. The storage unit and its internal sensor or sensors
`are coupled to the controller 18 by means of an appropriate
`communications link 17. A printer 23 is connected to the
`controller 18 by a communications link 24 for printing
`various status and other reports that may be generated by the
`controller from time to time.
`A biometric identification unit 26 is coupled to the con
`troller by a communications link 26 for positively identify
`ing users during a transaction. The biometric identification
`unit may take the form of a fingerprint reader, a facial feature
`scanner, a retinal scanner, or other type of Scanner, or
`combinations thereof, for Scanning a selected unique bio
`metric feature of users who request access to the system. The
`controller is programmed with appropriate pattern recogni
`tion Software and user feature databases such that, upon
`receiving a scanned biometric feature of a user, the user can
`be positively identified by comparing the scanned feature to
`stored features of authorized system users. It will thus be
`seen that, by implementing the biometric identification unit,
`the level of user interaction with the system is reduced
`significantly or eliminated because the user no longer needs
`to enter information (user name, PIN number verification,
`etc.) into the system manually. The biometric information
`provided by the biometric identification unit 26 is gathered
`without manual user input and used by the controller to
`identify each user positively without the need for a separate
`verification step via, for instance, entry of a PIN number.
`Use of biometric data also eliminates fraud that is possible
`with prior systems because a user cannot provide his user
`name and PIN number to another individual who can use the
`information to gain unauthorized access to the system. To
`provide further security, an external security camera 31.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`IPR2022-00602
`Apple EX1043 Page 24
`
`
`
`US 7,336,174 B1
`
`10
`
`15
`
`25
`
`30
`
`35
`
`7
`which may be a small digital camera, is provided to record
`a digital image of users who request access to the system.
`The security camera 31 is coupled to the controller through
`a communications link 32 and is cont