throbber
USOO7336174B1
`
`(12) United States Patent
`Maloney
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,336,174 B1
`Feb. 26, 2008
`
`(54) OBJECT TRACKING SYSTEM WITH
`AUTOMATED SYSTEM CONTROLAND
`USER DENTIFICATION
`
`O
`O
`75
`(75) Inventor: William C. Maloney, Atlanta, GA (US)
`
`(*) Notice:
`
`(73) Assignee: Key Control Holding, Inc., Houston,
`TX (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 867 days.
`(21) Appl. No.: 10/216,334
`
`(22) Filed:
`
`Aug. 9, 2002
`Related U.S. Application Data
`(60) Provisional application No. 60/333,463, filed on Nov.
`27, 2001, provisional application No. 60/311,182,
`filed on Aug. 9, 2001.
`
`(51) Int. Cl.
`(2006.01)
`G08B I3/14
`(52) U.S. Cl. ............................... 340/572.1; 340/568.1;
`34O7825.49
`(58) Field of Classification Search ............. 340/572.1,
`340/568. 1,568.2, 568.8, 825.49
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`2.971,806 A
`2, 1961 Andreasen .................. 312/223
`3,451,043 A
`6, 1969 Krause ....................... 340,152
`3,648,241 A
`3, 1972 Naito et al. ..
`34017R
`4,209,787 A
`6, 1980 Freeny, Jr. .................. 343, 112
`4,267.942 A
`5/1981 Wick, Jr. et al. ............... 221/2
`4,519,522 A
`5, 1985 McElwee ...........
`... 221 13
`4,549,170 A 10, 1985 Serres et al. ................ 340,568
`4.575,719 A
`3/1986 Bertagna et al. ....... 340/825.35
`4,595,922 A
`6, 1986 Cobb et al. ............ 340,825.49
`
`1/1987 Banks et al. ........... 340,825.31
`4,635,053 A
`1/1987 Mochida et al. .............. 340.63
`4,638,292 A
`4,661.806 A * 4, 1987 Peters et al. ......
`... 340,568.1
`4,673.915 A
`6/1987 Cobb ......................... 340,330
`4,783,655 A * 11/1988 Cobb et al. ............ 340,825.49
`4,812,985. A
`3/1989 Hambrick et al. .......... 364,478
`4,814,592 A
`3/1989 Bradt et al. ................. 235,381
`4,845.492. A
`7/1989 Cobb et al. ............ 340/825.49
`4,853,692 A
`8/1989 Wolk et al. ................. 340,573
`(Continued)
`FOREIGN PATENT DOCUMENTS
`
`GB
`
`1364535
`8, 1974
`(Continued)
`OTHER PUBLICATIONS
`Memory-Based Identifier Tag Provides Digital ID- ID Dave
`Bursky—Electronic Design—Jul. 25, 1992 pp. 153 and 156.
`Primary Examiner Benjamin C. Lee
`Assistant Examiner Daniel Previl
`(74) Attorney, Agent, or Firm Jackson Walker L.L.P.:
`Mark A. Tidwell, Esq.
`
`ABSTRACT
`(57)
`An enhanced object tracking system for tracking and con
`trolling access to a plurality of objects such as keys is
`disclosed. The object tracking system implements many
`improvements including automated user identification using
`biometric data extracted from the user with a minimum of
`user interaction, tracking of objects both inside and outside
`their storage units, the locking of objects within slots of their
`storage unit to guard against illicit removal and return of
`keys and to insure random slot rotation, image and visual
`based inventory verification methodologies, and tracking of
`objects during times when they are checked out of the
`system. The result is an intelligent object tracking system
`-
`-
`- -
`-
`with automated control functions and high reliability.
`
`24 Claims, 19 Drawing Sheets
`
`
`
`IPR2022-00602
`Apple EX1043 Page 1
`
`

`

`US 7,336,174 B1
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`9, 1989 de Prins ..................... 364,900
`4.866,661 A
`4.885,571. A 12/1989 Pauley et al.
`4,889,977 A 12/1989 Haydon ...................... 235,375
`4,896,024 A
`1/1990 Morello et al.
`4,918,432 A
`4/1990 Pauley et al.
`4,967,906 A 1 1/1990 Morello et al.
`5,038,023 A
`8/1991 Saliga ........................ 235,385
`5,172,829. A 12/1992 Dellicker, Jr. ...
`... 221 13
`5,319,544. A
`6/1994 Schmerer et al. ........... 364/403
`5,389,916 A
`2f1995 Chen et al. ....
`... 340,650
`5,402,104 A
`3, 1995 LaRosa ...
`340,539
`5.434,775 A
`7, 1995 Sims et al. .
`364,403
`5,525,969 A
`6, 1996 LaDue ..........
`... 340,573
`5,612,683 A
`3/1997 Trempala et al. ...... 340,825.31
`5,619,932 A
`4, 1997 Efland et al. .............. 109.24.1
`5,635,693 A * 6/1997 Benson et al. ........
`340, 10.33
`5,689.238 A 1 1/1997 Cannon, Jr. et al. ........ 340,568
`5,703,785 A 12/1997 Bluemel et al. ....... 364,479.14
`5,777,884 A
`7, 1998 Belka et al. ........... 364/478.13
`5,801,628 A
`9/1998 Maloney .....
`... 340,568
`5,805,074 A * 9/1998 Warren et al. ............. 340,554
`5,836,002 A 1 1/1998 Morstein et al.
`5,905,653 A
`5/1999 Higham et al.
`5,957,372 A
`9, 1999 Dean et al.
`5,961,036 A 10, 1999 Michael et al.
`
`5,963,134 A 10/1999 Bowers et al. ........... 340,572.1
`5,971,593 A 10/1999 McGrady .................... TOOf 233
`6,069,563 A
`5, 2000 Kadner et al.
`6,073,834 A
`6/2000 Michael et al.
`6,075,441 A
`6/2000 Maloney .................. 340,568.1
`6,148,271 A 1 1/2000 Marinelli .................... TO2/141
`6,195,005 B1
`2/2001 Maloney .................. 340,568.1
`6,204.764 B1
`3/2001 Maloney.
`340,568.1
`6,232,876 B1
`5/2001 Maloney .................. 340,568.1
`6,292,795 B1* 9/2001 Peters et al. ................... 707/3
`6,431,438 B1* 8/2002 Pires et al. ................. 235,375
`6,707,381 B1
`3/2004 Maloney
`6,745,366 B1
`6/2004 Roh et al.
`6,788,997 B1
`9, 2004 Frederick
`
`
`
`FOREIGN PATENT DOCUMENTS
`
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`WO
`
`WO95/04324
`WO95/12858
`WOOOf 1628O
`WOOOf 16281
`WOOOf 16282
`WOOOf 16284
`WOOOf 16564
`WO O1 (75811
`
`* cited by examiner
`
`2, 1995
`5, 1995
`3, 2000
`3, 2000
`3, 2000
`3, 2000
`3, 2000
`10, 2001
`
`IPR2022-00602
`Apple EX1043 Page 2
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 1 of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 3
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 2 of 19
`
`US 7,336,174 B1
`
`
`
`
`
`NITALIZE
`
`PROMPT USERTO
`USE BOMETRIC SENSOR
`
`DENTIFY USER FROM
`BIOMETRIC DATA
`
`
`
`
`
`YES
`QUERYDATABASE FOR
`USER RECURED OBJECTS
`
`DETERMINE F THIS IS
`ACHECK OUT OR RETURN
`SITUATION FROM TIME
`OF DAY, STATUS OF OBJECTS,
`AND OTHER FACTORS
`
`
`
`
`
`ACTIVATE APPROPRIATE
`STORAGE UNTS
`
`UNLOCKAPPROPRIATE
`STORAGE UNITS
`
`STORAGENNO
`
`
`
`
`
`
`
`
`
`OBJECT NYES
`RETURN2
`
`
`
`(c) Fig. 3
`
`2
`
`IPR2022-00602
`Apple EX1043 Page 4
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 3 of 19
`
`US 7,336,174 B1
`
`MONITORISCAN OBJECT
`INVENTORY TO DETECT
`REMOVALS AND/OR INSERTONS
`OF OBJECTS
`
`YES
`
`INDICATE DETECTED
`REMOVALS OR
`NSERTIONS
`
`NO
`
`LOG DETECTED
`REMOVALS OR
`INSERTIONS
`
`
`
`NO
`
`ENCLOSURES
`CLOSED?
`
`YES
`
`SCAN OBJECT INVENTORY TO
`DETECT REMOVALS OR INSERTIONS
`
`
`
`PROCESSID CODES FROM OBJECTS TO
`DETERMINE AND LOG WHICH OBJECS WERE
`REMOVED OR INSERTED, WHICH USER DID SO,
`THE DATE/TIME OF REMOVAL/INSERTION, AND
`TO DETERMINE IF ANY OBJECTS HAVE BEEN
`ABSENT TOO LONG OR NEED MANTENCE
`
`(G)
`
`Fig. 4
`
`IPR2022-00602
`Apple EX1043 Page 5
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 4 of 19
`
`US 7,336,174 B1
`
`
`
`ARE ALL
`OBJECTS
`UNIQUET
`
`
`
`DETERMINE LOCATION OF
`AVAILABLE SLOTS FOR
`RECEPT OF OBJECTS
`
`NDCATE LOCATION OF
`AVAILABLE SLOTS FOR
`RECEPT OF OBJECTS
`
`
`
`
`
`FOREACH NON-UNIQUE
`OBJECT, QUERYDATABASE
`FOR ALLAVAILABLE OBJECTS
`
`FOR EACH NON-UNIQUE OBJECT,
`CHOOSE MOST APPROPRIATE
`FROMAVAILABLE OBJECT LIST
`
`FOREACH NON-UNQUE OBJECT,
`ASSGN CHOSEN OBJECASA
`REQUIRED USER OBJECT
`
`
`
`
`
`
`
`
`
`
`
`
`
`Fig. 6
`
`IPR2022-00602
`Apple EX1043 Page 6
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 5 Of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 7
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 6 of 19
`
`US 7,336,174 B1
`
`2
`22
`
`ZZZZZZZZZZZZZZZZZZZZ | |
`
`8 '61-I
`
`69
`
`|
`
`NSIN
`
`ZZZZLØZZZZZZZZZZZZZZZZ]] [[ZZZZZZZZZZZZZZZZZZZTØ
`
`68
`
`99
`
`|×
`
`##7
`
`
`
`````
`27 %
`% N
`
`IPR2022-00602
`Apple EX1043 Page 8
`
`

`

`U.S. Patent
`
`
`
`Feb. 26, 2008
`
`Sheet 7 of 19
`
`US 7,336,174 B1
`
`È,
`
`ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
`
`| ||ZZZZZZZZZZZZZZ
`
`S ZZZZZZZZZZZZZZZ S SSN
`
`IPR2022-00602
`Apple EX1043 Page 9
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 8 of 19
`
`US 7,336,174 B1
`
`
`
`A
`
`IPR2022-00602
`Apple EX1043 Page 10
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 9 Of 19
`
`US 7,336,174 B1
`
`
`
`114
`
`Fig. 12
`
`IPR2022-00602
`Apple EX1043 Page 11
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 10 of 19
`
`US 7,336,174 B1
`
`-- 7
`"unlunulirul III "
`123
`126 127
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1043 Page 12
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 11 of 19
`
`US 7,336,174 B1
`
`/
`
`- - - - - 1
`
`136
`/
`
`/
`fit,
`..
`t
`/ | //
`137 / al l
`4.--- /
`138
`w
`est
`ill
`
`M
`
`|
`
`
`
`
`
`
`f 15
`d
`l
`
`
`
`1.
`
`
`
`
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1043 Page 13
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 12 of 19
`
`US 7,336,174 B1
`
`
`
`
`
`
`
`
`
`as TTT -/ %-7-
`N
`filli?i ()
`w$va
`M
`
`-----
`Z.
`M
`----, 4
`
`22- - OO at
`
`
`
`139
`1.
`
`o:
`
`
`
`
`
`
`
`
`
`h
`
`146
`him. Illii.
`
`?'
`
`
`
`IPR2022-00602
`Apple EX1043 Page 14
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 13 Of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 15
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 14 of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 16
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 15 Of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 17
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 16 of 19
`
`US 7,336,174 B1
`
`
`
`IPR2022-00602
`Apple EX1043 Page 18
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 17 Of 19
`
`US 7,336,174 B1
`
`SN 1.
`
`
`
`
`
`sé
`
`
`
`IPR2022-00602
`Apple EX1043 Page 19
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 18 of 19
`
`US 7,336,174 B1
`
`191
`
`
`
`
`
`
`
`193
`Yea
`
`t
`
`PORTALA
`
`PORTALC
`
`197-)
`
`199
`
`199
`
`199
`
`196-)
`
`PORTALB
`
`ZONE 1
`
`Fig. 21
`
`IPR2022-00602
`Apple EX1043 Page 20
`
`

`

`U.S. Patent
`
`Feb. 26, 2008
`
`Sheet 19 of 19
`
`US 7,336,174 B1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ZZ "61-J
`
`IPR2022-00602
`Apple EX1043 Page 21
`
`

`

`1.
`OBJECT TRACKING SYSTEM WITH
`AUTOMATED SYSTEM CONTROLAND
`USER DENTIFICATION
`
`REFERENCE TO RELATED APPLICATIONS
`
`5
`
`The benefit of the filing dates of U.S. provisional patent
`applications Ser. Nos. 60/311, 182 filed on Aug. 9, 2001 and
`60/333,463 filed on Nov. 27, 2001 is hereby claimed.
`
`TECHNICAL FIELD
`
`10
`
`This invention relates generally to computer controlled
`object tracking systems, such as key tracking systems, and
`more specifically to object tracking systems with built-in 15
`intelligent automated controls and security functions and
`with automated user identification and verification.
`
`BACKGROUND
`
`2O
`
`Object tracking systems such as, for example, systems for
`controlling access to and tracking keys in an automotive
`dealership, have been available for some time. Among the
`most innovative of Such systems are the object tracking
`systems and methodologies disclosed in various patents and 25
`patent applications of the present inventor. These include
`U.S. Pat. Nos. 5,801,628; 6,075,441, 6,317,044: 6,195,005;
`6,204,764; 6,407,665; 6,232,876; 6,392,543; 6,424,260; and
`6.262,664 as well as pending U.S. patent application Ser.
`No. 10/133,130. The disclosures of all of these patents and 30
`patent applications are hereby incorporated by reference.
`Together they provide much of the detailed background
`material and detailed discussions of various configurations
`of hardware and software that underlie the inventions dis
`closed and claimed in the present disclosure. Accordingly, to 35
`the extent that such details are included in these incorporated
`references, they need not and will not be discussed exten
`sively in the present disclosure.
`While the object tracking system disclosed in the above
`patents and applications have been very Successful, particu- 40
`larly when applied to the tracking of and the control of
`access to keys in an automotive dealership, they also can be
`Somewhat less than completely satisfactory in Some situa
`tions and environments. For example, these systems gener
`ally require a level of active participation by the user when 45
`checking objects in and out. A user, for instance, typically is
`required to identify himself by typing or otherwise entering
`a user name and to verify his identity by, for example,
`entering a secret password, placing a finger on a fingerprint
`scanner, or touching an ID badge or fob to a reader, before 50
`the system will allow access to objects secured therein. In
`Some object tracking scenarios, this level of user Sophisti
`cation and participation is too great, to cumbersome, or
`otherwise undesirable. In addition, it is less secure that it
`might be because a user may divulge his user name and 55
`password to another user or to unauthorized personnel, who
`may then access objects in the system using the falsely
`acquired credentials. A need exists, therefore, for an object
`tracking system that positively identifies each user with a
`minimum of user interaction and that prevents unauthorized 60
`access with stolen or improper credentials.
`Prior object tracking systems also include other areas of
`potential weakness or security lapses. For instance, in Sys
`tems for tracking keys, the key tags to which keys are
`attached generally have not been positively locked in their 65
`individual slots, so that a user can remove any key from the
`system, even keys to which he or she may not have autho
`
`US 7,336,
`174 B1
`
`2
`rized access. In other words, prior systems do not force the
`user to remove only the key that is requested or authorized.
`Prior systems also do not insure that the user returns the
`same key that was initially checked out by that user. Further,
`a significant measure of security is provided in prior systems
`because the keys and their key tags are allowed to be
`returned to any random slot within a bank of drawers, each
`with scores of slots. Since all the keys look similar, it is
`extremely difficult with Such random slot assignment for a
`user to locate and extract a particular key with the intent, for
`instance, of stealing a vehicle, without properly logging into
`the system and thereby creating an audit trail. However, this
`security feature can be defeated by a clever user who
`repeatedly returns the subject key to the same slot within the
`system so that the physical location of the key is known
`without logging into the system and requesting the key. A
`need exists for an improved object tracking system and
`methodology that is configured and programmed to elimi
`nate this and similar possibilities.
`Other and related enhancements to existing object track
`ing systems also are needed. For example, visual inspection,
`either personal inspection or inspection through automated
`imaging techniques, of the condition of inventory in the
`system is desirable for detecting tampering with or removal
`of keys or other objects themselves while leaving their ID
`tags intact. Assignment of and controlled access to particular
`objects by particular users also is desirable in many sce
`narios where a user may be authorized to have access only
`to certain objects and not others or where a user may need
`access to different objects at different times or access only
`during certain times (during his or her shift for example). In
`some cases, objects should not be removed from a desig
`nated area and it is therefore desirable for an object tracking
`system to insure that removal from the area does not occur.
`In related scenarios, it may be desirable to track the move
`ment of objects within a particular building or other larger
`area during the times when the object is checked out of the
`system by a user.
`It is to the provision of an enhanced and improved object
`tracking system that addresses the above and other needs
`and shortcomings of prior art systems that the present
`invention is primarily directed.
`
`SUMMARY OF THE INVENTION
`
`Briefly described, the present invention, in a preferred
`embodiment thereof, comprises an enhanced object tracking
`system for controlling access to and tracking a large number
`of objects such as keys. The system of the invention will, in
`fact, for the sake of clarity and brevity, be described herein
`primarily in terms of a system for tracking a large number
`of keys and particularly keys to vehicles at an automotive
`dealership. Where the tracking of other types of objects is
`appropriate, the system will be discussed in terms of track
`ing such objects. It will be understood by those of skill in the
`art, however, that, regardless of the particular context in
`which the system of this invention is discussed herein, it is
`applicable to the controlled access to and tracking of a wide
`variety of objects to which users need periodic access in the
`course of their duties. Such objects include, for example,
`jewelry, narcotics, test equipment, electronic access cards,
`and other objects that are Subject to being checked out to
`authorized users for limited periods of time.
`The key tracking system of the preferred embodiment
`includes a computer based controller that is coupled to and
`controls the various components of the system as described
`below. A plurality of key tags each is attached or attachable
`
`IPR2022-00602
`Apple EX1043 Page 22
`
`

`

`15
`
`3
`to one or more keys to be tracked. Each key tag is provided
`with at least one radio frequency identification (RFID) chip
`and associated antenna, either attached to the body of the
`key tag or attached, in one embodiment, to a tamper proof
`key ring or tether, which also secures the keys to the key tag.
`In another embodiment, two RFID chips are provided, one
`attached to the body of each key tag and another to the
`tamper proof key tether. Each RFID chip stores a unique
`identification code associated with and identifying its key
`tag and thus the keys attached thereto and is capable of
`transmitting its code via its antenna when appropriately
`polled. The transmitted identification code is receivable by
`an RFID reader coupled to the computer controller and the
`controller is programmed to receive and read identification
`codes from the reader. The incorporated U.S. Pat. No.
`6,204,764 discloses and describes such RFID chips (some
`times referred to as RFID tags) and readers in some detail.
`An enclosure or storage unit in the form of at least one
`cabinet with a lockable drawer is provided for receiving and
`storing key tags and their keys at a central location. Alternate
`types of enclosures Such as, for instance, a wall mounted
`cabinet with hinged door, also may be used. In the preferred
`embodiment, however, the drawer is provided with an
`internal panel having an array of slots, each for receiving
`and storing a key tag and the keys attached thereto when
`they are checked into the system. A locking pin assembly is
`associated with each slot below the panel and each key tag
`is formed with a corresponding hole or groove that aligns
`with the locking pin of a slot when the key tag is fully
`inserted in the slot. Each locking pin is retractable by means
`of a solenoid that is coupled to and controlled by the
`computer controller. The locking pins can be independently
`and selectively retracted and extended by the controller as
`needed either to lock a key tag in place within the corre
`sponding slot or to prevent a key tag from being inserted into
`an inappropriate slot. A presence detector also is associated
`with each slot in one embodiment to detect when a key tag
`is fully inserted in the slot so that the locking pin can be
`engaged.
`An internal global RFID reader and associated antenna is
`disposed in the storage unit and is positioned to receive radio
`frequency transmissions from any RFID chips located
`within the storage unit. The global RFID reader is coupled
`to, communicates with, and is controlled by the computer
`controller of the system for transmitting identification codes
`received by the RFID reader to the computer controller.
`Techniques for polling and receiving transmissions from
`large numbers of RFID chips while avoiding data collisions
`and cross talk are known and generally available from
`manufacturers of RFID chips and readers. In general, the
`global RFID reader may be used by the controller to
`determine which key tags and associated keys are present
`within the storage unit at any time.
`A biometric identification unit is coupled to the computer
`controller for identifying users who request access to the
`system and the keys stored therein. The biometric identifi
`cation unit may include one or more passive identification
`sensors such as, for example, a fingerprint Scanner, a facial
`feature Scanner, a retinal scanner, or other type of reader for
`reading biometric information that is unique to each user.
`The controller receives the information from the biometric
`sensor and is programmed with appropriate pattern recog
`nition algorithms and stored databases to identify positively
`each user requesting access to the system or, alternatively, to
`recognize when an unauthorized user requests access. An
`65
`external digital camera also is provided in one embodiment
`for generating a visual record of each request for access,
`
`40
`
`45
`
`50
`
`55
`
`60
`
`US 7,336,174 B1
`
`5
`
`10
`
`25
`
`30
`
`35
`
`4
`which can be stored for future use or transmitted to security
`personnel in the event of a Suspicious request for access.
`In one preferred embodiment, the system is provided with
`an internal digital camera and light source within the storage
`unit. The camera is coupled to and communicates with the
`controller to transmit images of the inventory (keys and key
`tags) within the storage unit at any time upon command.
`These images can be taken, for instance, immediately after
`a check in or periodically during inactive periods to provide
`visual verification that key tags and their keys have not been
`illicitly tampered with by, for example, the cutting of a key
`or keys from their tag prior to placing the tag in a slot of the
`storage drawer. In this same vein, the storage unit may be
`provided with a clear wall made of glass, Plexiglas, Lexan,
`or other clear material to provide for personal visual inspec
`tion of the inventory within the storage unit by security
`personnel. If a clear wall is provided, security measures in
`the form, for instance, of an embedded array of conducting
`threads also may be provided in the wall to detect an
`attempted break in by a would-be thief who breaks the glass
`or other material of the clear wall.
`A separate external RFID reader is provided in one
`embodiment and this reader is configured for long range
`detection of the radio frequency transmissions of RFID
`chips associated with the key tags. This external reader is
`useful in scenarios where objects checked out of the system
`are to stay in the vicinity of the storage unit. In these
`scenarios, the external RFID reader continuously receives
`identification codes from RFID chips within its range and
`transmits these codes to the computer controller. If a
`checked out object is moved out of the authorized vicinity,
`it will move out of range of the external RFID sensor and its
`signal will be lost. This is an indication to the controller that
`the object has been illicitly moved from the vicinity and
`appropriate alarms can be sounded and security personnel
`alerted.
`The basic system described briefly above provides for a
`number of enhanced security features, all of which will be
`discussed in more detail below. In Summary, these features
`includes the ability to reduce significantly or eliminate
`completely the level of active participation required from a
`user during transactions with the system. Rather than being
`required to enter a user name and PIN number, for instance,
`a user is automatically identified and verified from his or her
`biometric data, such as a fingerprint, facial features, or
`retinal scan. Such means of identification not only reduces
`user interaction, it also is more secure because it eliminates
`fraudulent use of the credentials of another to gain illicit
`access to the system. The locking pin array of the system
`facilitates intelligent controlled access to tracked objects
`through a workload/Scheduling function. This function
`allows a Supervisor, for example, to designate specific
`objects to which each user has access and/or to designate
`times of day (e.g. during each users shift) during which each
`user is authorized to have access. The system insures that
`users have access only to objects they should have access to
`and only at the times when they should have access.
`Other functions facilitated by the system include the
`ability to force random object rotation among slots of the
`storage unit by designating to users specific slots to which
`key tags should be returned upon check in. The key tags are
`forced to be inserted only in those slots by appropriately
`manipulating the locking pins of the slots so that only the
`designated slot is in condition to receive a key tag. Visual
`confirmation of the condition of keys and their key tags
`inside the storage unit is made possible by the internal digital
`camera with wide angle lens and by the clear wall of the unit,
`
`IPR2022-00602
`Apple EX1043 Page 23
`
`

`

`US 7,336,174 B1
`
`5
`which allows for personal visual inspection. Providing two
`RFID chips on each key tag, one on the key tag and one on
`a tamper proof tether (the incorporated U.S. Pat. No. 6,262,
`664 discusses such tamper proof tethers in detail), provides
`further security against the malicious removal of keys from
`their key tags and also provides for tracking checked out
`keys within a specified area to insure that they are not
`removed from the area. The system also may be coupled to
`a Zonal transition detection system, which may include
`triangulation receivers, to track the movement of checked
`out keys or other objects throughout a building, car lot, or
`other larger area.
`The forgoing and additional significant enhancements and
`improvements are provided by the system and methodology
`of the present invention. These and other features, objects,
`and advantages of the invention will be understood more
`fully upon review of the detailed description set forth below,
`when taken in conjunction with the accompanying drawing
`figures, which are briefly described as follows.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a perspective somewhat schematic view of an
`object control and tracking system that embodies principles
`of the invention on one preferred form.
`FIGS. 2 through 6 together comprise a functional flow
`chart illustrative of an object control and tracking method
`ology that embodies principles of the invention.
`FIG. 7 is a perspective partially schematic view of an
`object control and tracking system that embodies principles
`of the invention in an alternate form.
`FIG. 8 is a cross sectional view through the drawer of the
`system shown in FIG. 1 or 7 illustrating insertion of a key
`tag and one embodiment of a locking pin assembly for
`locking the tag in place.
`FIGS. 9 and 10 are cross sectional views through the
`drawer of the system shown in FIG. 1 or 7 illustrating
`insertion of a key tag and another embodiment of a locking
`pin assembly for locking the key tag in place.
`FIG. 11 is a perspective partially schematic view of an
`object control and tracking system that includes a storage
`unit with a clear openable door rather than a slidable drawer.
`FIG. 12 is a perspective view showing an alternate
`embodiment of a storage unit in the form of a wall mount
`able cabinet with hinged clear door.
`FIG. 13 is a perspective view of a portion of the cabinet
`of FIG. 12 illustrating insertion of a key tag into a slot of the
`cabinet and the associated locking pin assembly.
`FIG. 14 is a cross sectional view of a portion of the
`interior of a storage unit illustrating an alternate configura
`tion of a key tag and the associated locking pin assembly.
`FIG. 15. is a cross sectional view of a portion of the
`interior of a storage unit illustrating another alternate con
`figuration of a key tag and the associated locking pin
`assembly.
`FIG. 16 is a perspective view of a portion of the interior
`of a storage unit illustrating one embodiment of a system for
`ensuring proper key tag orientation.
`FIG. 17 is a perspective view of a portion of the interior
`of a storage unit illustrating another embodiment of a system
`for ensuring proper key tag orientation.
`FIG. 18 is a perspective view of a portion of the interior
`of a storage unit illustrating another embodiment of a system
`for ensuring proper key tag orientation.
`FIG. 19 is a perspective view of a portion of the interior
`of a storage unit illustrating yet another embodiment of a
`system for ensuring proper key tag orientation.
`
`6
`FIG. 20 is a perspective view of a portion of the interior
`of a storage unit illustrating still another embodiment of a
`system for ensuring proper key tag orientation.
`FIG. 21 is a top plan view illustrating one embodiment of
`incorporating object tracking from Zone to Zone in a building
`while the object is checked out, according to the invention.
`FIG.22 is a functional flow chart illustrating one embodi
`ment of an object return function implementable with the
`system illustrated in FIG. 7.
`
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`
`Referring now in more detail to the drawing figures,
`wherein like reference numbers indicate, where appropriate,
`like parts throughout the several views, FIG. 1 illustrates an
`object tracking and control system 11 that embodies prin
`ciples of the invention in a preferred form. The system 11
`comprises a storage unit 12 that, in this embodiment, takes
`the form of a cabinet housing an openable drawer 13. The
`drawer 13 has an internal panel 14 formed with an array of
`slots or receptacles 13 sized and shaped to receive trackable
`objects 33, each having at least one unique readable iden
`tification code contained within a contact memory button,
`RFID chip or otherwise. The trackable objects 33 may be
`key tags attached to keys, object enclosures that contain
`objects to be tracked, or otherwise, as described in the
`incorporated patents and patent applications. The storage
`unit contains a sensor or sensors (not visible) for detecting
`the identification codes of trackable objects within the
`drawer at any time.
`A controller 18 in the form of a personal computer 19,
`monitor 21, and keyboard 22 is provided for monitoring and
`controlling the various elements of the system, as described
`in more detail in the incorporated patents and patent appli
`cations. The storage unit and its internal sensor or sensors
`are coupled to the controller 18 by means of an appropriate
`communications link 17. A printer 23 is connected to the
`controller 18 by a communications link 24 for printing
`various status and other reports that may be generated by the
`controller from time to time.
`A biometric identification unit 26 is coupled to the con
`troller by a communications link 26 for positively identify
`ing users during a transaction. The biometric identification
`unit may take the form of a fingerprint reader, a facial feature
`scanner, a retinal scanner, or other type of Scanner, or
`combinations thereof, for Scanning a selected unique bio
`metric feature of users who request access to the system. The
`controller is programmed with appropriate pattern recogni
`tion Software and user feature databases such that, upon
`receiving a scanned biometric feature of a user, the user can
`be positively identified by comparing the scanned feature to
`stored features of authorized system users. It will thus be
`seen that, by implementing the biometric identification unit,
`the level of user interaction with the system is reduced
`significantly or eliminated because the user no longer needs
`to enter information (user name, PIN number verification,
`etc.) into the system manually. The biometric information
`provided by the biometric identification unit 26 is gathered
`without manual user input and used by the controller to
`identify each user positively without the need for a separate
`verification step via, for instance, entry of a PIN number.
`Use of biometric data also eliminates fraud that is possible
`with prior systems because a user cannot provide his user
`name and PIN number to another individual who can use the
`information to gain unauthorized access to the system. To
`provide further security, an external security camera 31.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`IPR2022-00602
`Apple EX1043 Page 24
`
`

`

`US 7,336,174 B1
`
`10
`
`15
`
`25
`
`30
`
`35
`
`7
`which may be a small digital camera, is provided to record
`a digital image of users who request access to the system.
`The security camera 31 is coupled to the controller through
`a communications link 32 and is cont

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket