Patents by Inventor George H. Eckerdt
George H. Eckerdt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160230443Abstract: A container includes a web server that can communicate with a web browser to control access and account for asset events that occur when the box is used. A personal identifier must be satisfied to open a drawer of the box. A latching system uses an access actuator for normal opening and closing in response to the personal identifier. Several features secure the box against weather and tampering.Type: ApplicationFiled: February 10, 2016Publication date: August 11, 2016Inventors: George Mastrodonato, George H. Eckerdt
-
Publication number: 20160010362Abstract: A latch can keep a file cabinet drawer from being unlocked, but can allow unlocking of the drawer, such as if the user is authenticated when the latch is part of a secure asset management system, but can be overridden by a key lock of the file cabinet. A solenoid pin can interfere with translation of a slide to prevent unlocking of the drawer until energized, at which point a user can pull a tab attached to the slide to unlock the drawer. A spring can bias the slide into the file cabinet to automatically re-enable locking.Type: ApplicationFiled: November 6, 2014Publication date: January 14, 2016Inventors: George H. Eckerdt, George Mastrodonato
-
Publication number: 20150370745Abstract: An identifier of an asset is retrieved using a first communication protocol and is converted to a form compatible with a second communication protocol. Translation circuitry can convert the identifier and can transmit the converted identifier to a communication bus that uses the second communication protocol. An identifier from a USB device can be converted to a Dallas Semiconductor/Maxim Integrated 1-Wire protocol format in an example, and an RFID identifier can be converted to 1-Wire protocol format in another example.Type: ApplicationFiled: June 20, 2014Publication date: December 24, 2015Inventors: George H. Eckerdt, Thomas Rockwell, Christopher B. Miller
-
Publication number: 20150356846Abstract: An asset management system can receive and track an asset with preexisting identification circuitry, such as a car fob. In embodiments, the car fob can be received by a receptacle and a sensor, such as an antenna, can be used to receive an identifier from the fob. A lockable bin can be sized to receive the fob and can bring the fob into proximity with the antenna.Type: ApplicationFiled: June 1, 2015Publication date: December 10, 2015Inventors: George H. Eckerdt, George Mastrodonato, Thomas Rockwell
-
Publication number: 20150325069Abstract: An asset management system can receive and track an asset with preexisting identification circuitry, such as a car fob. In embodiments, the car fob can be received by a receptacle and a sensor, such as an antenna, can be used to receive an identifier from the fob. A lockable drawer can be sized to receive the fob and can bring the fob into proximity with the antenna.Type: ApplicationFiled: May 7, 2015Publication date: November 12, 2015Inventors: George H. Eckerdt, George Mastrodonato, Thomas Rockwell
-
Publication number: 20150326576Abstract: A user can acquire a request code, submit the request code with/as a request for an access code, be granted the access code, enter the access code, and be granted access to an asset, room, or other secured item or space with which the security arrangement is used to restrict access. A user interface can include a display and a data entry device to allow the user to acquire and enter the codes. The access code can be encrypted into the request code, or the request code can trigger generation of the access code according to a predefined process.Type: ApplicationFiled: May 11, 2015Publication date: November 12, 2015Inventors: George H. Eckerdt, George Mastrodonato
-
Publication number: 20150206362Abstract: An identification insert can enable tracking of an asset by placing identification circuitry with a unique identifier in communication with a security asset management system. The insert can be directly mounted in a housing of an asset. Alternatively, the insert can be mounted in an ID enabler that can be attached to an asset via a cable or the like. The insert can also be part of a lock adapter secured to an asset by a lock, or can be mounted in a housing of a lock compatible with a security feature of an asset, such as a lock slot.Type: ApplicationFiled: March 30, 2015Publication date: July 23, 2015Applicant: Key Systems, Inc.Inventor: George H. Eckerdt
-
Publication number: 20150164259Abstract: A pocket mounted on a support structure can receive a tag carrying a memory button. The pocket is sized and configured to urge the tag toward the support structure and a contact surface of the memory button into electrical communication with a tag contact on the support structure. The pocket can include a slot into which a key flange of the tag can slide. The slot includes an end that acts as a stop for the key flange and ensures adequate alignment of the memory button and the tag contact.Type: ApplicationFiled: December 12, 2014Publication date: June 18, 2015Applicant: Key Systems, Inc.Inventors: George H. Eckerdt, George Mastrodonato
-
Patent number: 9019076Abstract: A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.Type: GrantFiled: January 7, 2014Date of Patent: April 28, 2015Assignee: Key Systems, Inc.Inventor: George H. Eckerdt
-
Publication number: 20150089633Abstract: A file cabinet drawer includes support rails supporting asset panels each with a plurality of asset positions to support respective assets and associated asset indicators. A controller activates panel, drawer, and asset indicators to locate assigned assets. A recipient can be reauthenticated and assigned a duplicate asset if the assigned asset becomes unavailable. An administrator can be authenticated to conduct assignment of duplicate assets. Where asset(s) include electronic identification tags, the panels can include contacts in electrical communication with support rails in respective drawers coupled to the controller to read an asset identifier from each tag.Type: ApplicationFiled: July 3, 2014Publication date: March 26, 2015Inventors: George H. Eckerdt, Thomas Rockwell
-
Publication number: 20140327516Abstract: An identification insert includes identification circuitry on a support layer and connected to a plug receptacle placing the circuitry in communication with another device when a plug of the device is inserted into the receptacle. A cavity in an asset, such as a firearm, can house the identification insert to enable a security asset management system or other device to monitor the presence or absence of the asset. A housing can carry the insert such that when the housing is inserted in the cavity the plug receptacle is accessible and substantially flush with an external surface of the asset.Type: ApplicationFiled: April 30, 2014Publication date: November 6, 2014Inventor: George H. Eckerdt
-
Publication number: 20140118110Abstract: A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.Type: ApplicationFiled: January 7, 2014Publication date: May 1, 2014Applicant: Key Systems, Inc.Inventor: George H. Eckerdt
-
Patent number: 8704635Abstract: A web accessed security box includes a web server that can communicate with a web browser to control access and account for asset events that occur when the box is used. A personal identifier must be satisfied to open a drawer of the box. A latching system uses both an access solenoid for normal opening and closing in response to the personal identifier, and an emergency release solenoid having a separate power supply to open the box when the access solenoid is disabled. Several features make the box secure against weather and tampering.Type: GrantFiled: May 12, 2009Date of Patent: April 22, 2014Assignee: Key Systems, Inc.Inventors: George H. Eckerdt, George Mastrodonato
-
Patent number: 8690069Abstract: Disclosed is a method of providing a compact, tamper-evident means of combining individual keys with unique electronic memory identifiers. The disclosure involves a holder that is manufactured to attach some form of electronic identification, such as a touch memory button, to the head of a key. Once attached, the assembly can be mounted and read electronically to continually account for the identification, presence, access rights, and removal or replacement of the assembly from storage. Application of the key holder would not require alteration of the key in any manner, and thus could occur when the individual keys are either ready for distribution or already distributed and in regular use. The key holder would preferably be tamper-evident and prevent removal of the touch memory button without destruction of the holder, and possibly even the key itself.Type: GrantFiled: August 20, 2012Date of Patent: April 8, 2014Assignee: Key Systems, Inc.Inventor: George H Eckerdt
-
Publication number: 20140048606Abstract: Disclosed is a method of providing a compact, tamper-evident means of combining individual keys with unique electronic memory identifiers. The disclosure involves a holder that is manufactured to attach some form of electronic identification, such as a touch memory button, to the head of a key. Once attached, the assembly can be mounted and read electronically to continually account for the identification, presence, access rights, and removal or replacement of the assembly from storage. Application of the key holder would not require alteration of the key in any manner, and thus could occur when the individual keys are either ready for distribution or already distributed and in regular use. The key holder would preferably be tamper-evident and prevent removal of the touch memory button without destruction of the holder, and possibly even the key itself.Type: ApplicationFiled: August 20, 2012Publication date: February 20, 2014Applicant: KEY SYSTEMS, INC.Inventor: George H. Eckerdt
-
Patent number: 8624705Abstract: A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.Type: GrantFiled: April 20, 2011Date of Patent: January 7, 2014Assignee: Key Systems, Inc.Inventor: George H Eckerdt
-
Patent number: 8513544Abstract: Weight is used to help identify key and ring combinations authorized to certain persons. This is done by associating a weigh scale with each storage box for key and ring combinations, all of which have different total weights. The weights of all the key and ring combinations are registered with a computer, along with authentication and storage information. Then as key and ring combinations are removed from or returned to a storage box, they are weighed on scale 25 so that a computer can compare the scale weight with a registered weight. For any discrepancy, the computer can initiate one of many security actions.Type: GrantFiled: August 18, 2010Date of Patent: August 20, 2013Assignee: Key Systems, Inc.Inventor: George H Eckerdt
-
Publication number: 20120268236Abstract: A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.Type: ApplicationFiled: April 20, 2011Publication date: October 25, 2012Applicant: KEY SYSTEMS, INC.Inventor: George H. Eckerdt
-
Publication number: 20120043139Abstract: Weight is used to help identify key and ring combinations authorized to certain persons. This is done by associating a weigh scale with each storage box for key and ring combinations, all of which have different total weights. The weights of all the key and ring combinations are registered with a computer, along with authentication and storage information. Then as key and ring combinations are removed from or returned to a storage box, they are weighed on scale 25 so that a computer can compare the scale weight with a registered weight. For any discrepancy, the computer can initiate one of many security actions.Type: ApplicationFiled: August 18, 2010Publication date: February 23, 2012Applicant: KEY SYSTEMS, INC.Inventor: George H. Eckerdt
-
Publication number: 20100051483Abstract: The invention includes an enclosure that can hold an asset in an inaccessible position within the enclosure. A tether connects a security device to the asset and connects the asset to the enclosure. The security device, in a secure position, holds the tether in a position that keeps the asset within the enclosure so that the asset is inaccessible, even while hanging in a security box. The security device is also movable to an authorized position that allows the tether to move relative to the enclosure to make the asset accessible to an authorized user.Type: ApplicationFiled: November 16, 2009Publication date: March 4, 2010Applicant: Key Systems, Inc.Inventors: George Mastrodonato, George H. Eckerdt