Patents Assigned to Key Systems, Inc.
  • Patent number: 11876462
    Abstract: A method for storing new harvestable energy with excess or unutilized energy includes providing an object configured to be transitioned between at least a depleted energy state and a stored energy state. Obtained excess or unutilized energy which is utilized to transition the object to the stored energy state. At least a portion of this stored energy is harvested for use when the object is released from the stored energy state and transitions towards the depleted energy state.
    Type: Grant
    Filed: August 24, 2022
    Date of Patent: January 16, 2024
    Assignee: KEY SYSTEMS, INC.
    Inventor: George Eckerdt
  • Publication number: 20150206362
    Abstract: An identification insert can enable tracking of an asset by placing identification circuitry with a unique identifier in communication with a security asset management system. The insert can be directly mounted in a housing of an asset. Alternatively, the insert can be mounted in an ID enabler that can be attached to an asset via a cable or the like. The insert can also be part of a lock adapter secured to an asset by a lock, or can be mounted in a housing of a lock compatible with a security feature of an asset, such as a lock slot.
    Type: Application
    Filed: March 30, 2015
    Publication date: July 23, 2015
    Applicant: Key Systems, Inc.
    Inventor: George H. Eckerdt
  • Publication number: 20150164259
    Abstract: A pocket mounted on a support structure can receive a tag carrying a memory button. The pocket is sized and configured to urge the tag toward the support structure and a contact surface of the memory button into electrical communication with a tag contact on the support structure. The pocket can include a slot into which a key flange of the tag can slide. The slot includes an end that acts as a stop for the key flange and ensures adequate alignment of the memory button and the tag contact.
    Type: Application
    Filed: December 12, 2014
    Publication date: June 18, 2015
    Applicant: Key Systems, Inc.
    Inventors: George H. Eckerdt, George Mastrodonato
  • Patent number: 9019076
    Abstract: A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.
    Type: Grant
    Filed: January 7, 2014
    Date of Patent: April 28, 2015
    Assignee: Key Systems, Inc.
    Inventor: George H. Eckerdt
  • Patent number: 8919656
    Abstract: A mounting spring coil is made to grip and releasably hold a cylindrical periphery of a memory button while transmitting an ID effectively. A memory button held in a coil of the mounting spring can support objects such as tags and keys that are identified by the memory button to account for removal and replacement of the objects being secured.
    Type: Grant
    Filed: May 30, 2012
    Date of Patent: December 30, 2014
    Assignee: Key Systems, Inc.
    Inventor: George Eckerdt
  • Publication number: 20140118110
    Abstract: A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.
    Type: Application
    Filed: January 7, 2014
    Publication date: May 1, 2014
    Applicant: Key Systems, Inc.
    Inventor: George H. Eckerdt
  • Patent number: 8704635
    Abstract: A web accessed security box includes a web server that can communicate with a web browser to control access and account for asset events that occur when the box is used. A personal identifier must be satisfied to open a drawer of the box. A latching system uses both an access solenoid for normal opening and closing in response to the personal identifier, and an emergency release solenoid having a separate power supply to open the box when the access solenoid is disabled. Several features make the box secure against weather and tampering.
    Type: Grant
    Filed: May 12, 2009
    Date of Patent: April 22, 2014
    Assignee: Key Systems, Inc.
    Inventors: George H. Eckerdt, George Mastrodonato
  • Patent number: 8690069
    Abstract: Disclosed is a method of providing a compact, tamper-evident means of combining individual keys with unique electronic memory identifiers. The disclosure involves a holder that is manufactured to attach some form of electronic identification, such as a touch memory button, to the head of a key. Once attached, the assembly can be mounted and read electronically to continually account for the identification, presence, access rights, and removal or replacement of the assembly from storage. Application of the key holder would not require alteration of the key in any manner, and thus could occur when the individual keys are either ready for distribution or already distributed and in regular use. The key holder would preferably be tamper-evident and prevent removal of the touch memory button without destruction of the holder, and possibly even the key itself.
    Type: Grant
    Filed: August 20, 2012
    Date of Patent: April 8, 2014
    Assignee: Key Systems, Inc.
    Inventor: George H Eckerdt
  • Publication number: 20140048606
    Abstract: Disclosed is a method of providing a compact, tamper-evident means of combining individual keys with unique electronic memory identifiers. The disclosure involves a holder that is manufactured to attach some form of electronic identification, such as a touch memory button, to the head of a key. Once attached, the assembly can be mounted and read electronically to continually account for the identification, presence, access rights, and removal or replacement of the assembly from storage. Application of the key holder would not require alteration of the key in any manner, and thus could occur when the individual keys are either ready for distribution or already distributed and in regular use. The key holder would preferably be tamper-evident and prevent removal of the touch memory button without destruction of the holder, and possibly even the key itself.
    Type: Application
    Filed: August 20, 2012
    Publication date: February 20, 2014
    Applicant: KEY SYSTEMS, INC.
    Inventor: George H. Eckerdt
  • Patent number: 8624705
    Abstract: A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.
    Type: Grant
    Filed: April 20, 2011
    Date of Patent: January 7, 2014
    Assignee: Key Systems, Inc.
    Inventor: George H Eckerdt
  • Patent number: 8513544
    Abstract: Weight is used to help identify key and ring combinations authorized to certain persons. This is done by associating a weigh scale with each storage box for key and ring combinations, all of which have different total weights. The weights of all the key and ring combinations are registered with a computer, along with authentication and storage information. Then as key and ring combinations are removed from or returned to a storage box, they are weighed on scale 25 so that a computer can compare the scale weight with a registered weight. For any discrepancy, the computer can initiate one of many security actions.
    Type: Grant
    Filed: August 18, 2010
    Date of Patent: August 20, 2013
    Assignee: Key Systems, Inc.
    Inventor: George H Eckerdt
  • Publication number: 20120305655
    Abstract: A mounting spring coil is made to grip and releasably hold a cylindrical periphery of a memory button while transmitting an ID effectively. A memory button held in a coil of the mounting spring can support objects such as tags and keys that are identified by the memory button to account for removal and replacement of the objects being secured.
    Type: Application
    Filed: May 30, 2012
    Publication date: December 6, 2012
    Applicant: KEY SYSTEMS, INC.
    Inventor: George Eckerdt
  • Publication number: 20120268236
    Abstract: A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.
    Type: Application
    Filed: April 20, 2011
    Publication date: October 25, 2012
    Applicant: KEY SYSTEMS, INC.
    Inventor: George H. Eckerdt
  • Publication number: 20120043139
    Abstract: Weight is used to help identify key and ring combinations authorized to certain persons. This is done by associating a weigh scale with each storage box for key and ring combinations, all of which have different total weights. The weights of all the key and ring combinations are registered with a computer, along with authentication and storage information. Then as key and ring combinations are removed from or returned to a storage box, they are weighed on scale 25 so that a computer can compare the scale weight with a registered weight. For any discrepancy, the computer can initiate one of many security actions.
    Type: Application
    Filed: August 18, 2010
    Publication date: February 23, 2012
    Applicant: KEY SYSTEMS, INC.
    Inventor: George H. Eckerdt
  • Publication number: 20100051483
    Abstract: The invention includes an enclosure that can hold an asset in an inaccessible position within the enclosure. A tether connects a security device to the asset and connects the asset to the enclosure. The security device, in a secure position, holds the tether in a position that keeps the asset within the enclosure so that the asset is inaccessible, even while hanging in a security box. The security device is also movable to an authorized position that allows the tether to move relative to the enclosure to make the asset accessible to an authorized user.
    Type: Application
    Filed: November 16, 2009
    Publication date: March 4, 2010
    Applicant: Key Systems, Inc.
    Inventors: George Mastrodonato, George H. Eckerdt
  • Patent number: 7601052
    Abstract: A key destroyer preferably deploys an angle grinder fitted with a grinding chamber, cover, and insertion tube through which a key can be inserted to be destroyed. The key is gripped in a holder that can slide key foremost through the support tube so that the coded portion of the key can pass through a safety wall at the inner end of the support tube and engage a rotating abrasive disk that grinds away the coded portion of the key. The head of the destroyed key can then be retained as evidence that a particular copy of a key no longer exists.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: October 13, 2009
    Assignee: Key Systems, Inc.
    Inventor: George H. Eckerdt
  • Publication number: 20090242678
    Abstract: A key destroyer preferably deploys an angle grinder fitted with a grinding chamber, cover, and insertion tube through which a key can be inserted to be destroyed. The key is gripped in a holder that can slide key foremost through the support tube so that the coded portion of the key can pass through a safety wall at the inner end of the support tube and engage a rotating abrasive disk that grinds away the coded portion of the key. The head of the destroyed key can then be retained as evidence that a particular copy of a key no longer exists.
    Type: Application
    Filed: March 31, 2008
    Publication date: October 1, 2009
    Applicant: KEY SYSTEMS, INC.
    Inventor: George H. Eckerdt
  • Publication number: 20090237207
    Abstract: A web accessed security box includes a web server that can communicate with a web browser to control access and account for asset events that occur when the box is used. A personal identifier must be satisfied to open a drawer of the box. A latching system uses both an access solenoid for normal opening and closing in response to the personal identifier, and an emergency release solenoid having a separate power supply to open the box when the access solenoid is disabled. Several features make the box secure against weather and tampering.
    Type: Application
    Filed: May 12, 2009
    Publication date: September 24, 2009
    Applicant: KEY SYSTEMS, INC.
    Inventors: George Mastrodonato, George H. Eckerdt
  • Publication number: 20090135031
    Abstract: An apparatus and method for detecting a key press using an armored capacitive keypad device. The device consists of two interdigitated electrodes, located behind a protective metal plate, and separated by an insulating gap or material. An electronic driver circuit sends a signal to one of the electrodes and senses the change in signal with the proximity of a finger to the key. The driver is calibrated with the metal plate in place such that the finger can be sensed through the metal plate. The device is tamper resistant and provides some immunity to external electromagnetic interference as well.
    Type: Application
    Filed: November 26, 2007
    Publication date: May 28, 2009
    Applicant: KEY SYSTEMS, INC.
    Inventor: Thomas Lawrence Rockwell
  • Publication number: 20060288101
    Abstract: A multipurpose interface and control system includes a managing and/or monitoring device (an “effectuator”) capable of monitoring parameter(s) and/or controlling function(s) of an apparatus, and a server system coupled to a communication medium, where the server system allows the effectuator (and via it the apparatus it monitors and/or controls) to be accessed remotely via the communication medium. The communication medium allows the effectuator to be accessed from remote locations by other devices capable of accessing the communications medium and thereby accessing the effectuator(s). The communications medium can take numerous forms, such as a direct connection, ethernet connection, internet connection, intranet connection, and/or phone connection. Preferably, the system includes at least one remote device capable of communicating with at least one effectuator via the communications medium (generally a network).
    Type: Application
    Filed: June 1, 2006
    Publication date: December 21, 2006
    Applicant: KEY SYSTEMS, INC.
    Inventors: George Mastrodonato, Robert Anton, Benjamin Morley, Thomas Rockwell, James Arrow, George Eckerdt