Security System for Containers

ABSTRACT

A storage system for material containers provides a readable ID distinguishing each container, and includes a scale that weighs containers, so that the system can distinguish between containers that are sufficiently loaded to be effective and containers that are insufficiently loaded. The system preferably includes storage for containers held in contact with readers of the container IDs. This allows a controller to keep track of containers checked out for use and returned for storage, and to identify containers that have been discharged.

TECHNICAL FIELD

Security systems to keep track of dispensing and return of containers

BACKGROUND

Containers of some materials are important enough to keep track of. Thematerials can be pepper spray, can be tear gas related, can be known bythe chemical name OC (standing for oleoresin capsicum), and can be soldunder the MACE trademark. Such materials are controlled substances andare used by police, jailers, and the military. They can be sprayed orsquirted at an assailant to stop or limit an injury that might otherwiseoccur.

A convenient container for such materials is a pressurized spray canthat can be deployed quickly. It may also be possible to package suchmaterials in pumpable cans or bottles, and the outflow from containersof such materials can be formed as a squirt or spray.

In many situations, containers of OC materials need to be storedsecurely and checked out and checked back in at shift changes forworkers such as police or jailers. Securing the dispensing and return ofmany containers of OC materials has presented an administrative burdenthat this invention aims to reduce.

SUMMARY

The invention provides a security system that dispenses and accepts thereturn of containers, keeps track of users of the containers, andensures that containers to be reused hold a sufficient amount ofmaterial. Automating the dispensing and return of containers savesconsiderable labor in otherwise keeping track of a large number ofcontainers and their users. Besides automation, the security system aimsat low cost, and high reliability in providing data on authorized users,containers dispensed to authorized users, incidents of container usage,and return of containers to storage.

The inventive system also checks the weight of OC material in containersreturned for storage. This can identify a weight loss discovered in apreviously dispensed container and can require a report from anauthorized user. It also allows the security system to distinguishbetween containers that are loaded with sufficient OC material to beeffective, and containers that are insufficiently loaded to be reused.The readable identification for each container allows records to beautomatically available on who checked out which container, how muchthat container weighed, and who is presenting that container back tostorage and how much it weighs when presented.

DRAWINGS

FIG. 1 is an elevational view of a preferred embodiment of the inventivesystem.

FIG. 2 is an elevational view of a storage portion of the system of FIG.1 with the door removed to show container receptacles.

FIG. 3 is a perspective view of a container provided with a preferredembodiment of an ID.

FIGS. 4A-C are enlarged and exploded views of the ID of FIG. 3comprising a touch memory button and a mounting washer.

FIG. 5 is a conductive coiled spring usable in a reader for the ID ofFIGS. 3 and 4.

FIG. 6 shows a container held in a storage socket where the touch memorybutton engages the reader spring of FIG. 5.

FIG. 7 is a fragmentary view of a preferred embodiment of a pair ofreader springs engaging respectively the button and washer secured to acontainer.

FIG. 8 is a schematic diagram of a container enrollment system informinga controller of the IDs of usable containers.

FIG. 9 is a schematic diagram of preferred steps in security proceduresfor use and storage of containers.

DETAILED DESCRIPTION

For security purposes, each container is given a machine readable ID bywhich each of the containers in a system can be distinguished. The IDcan involve RFID, bar code, optical characters, or preferably a touchmemory button such as a Dallas iButton. Other forms of ID are alsopossible.

In addition to a container ID, the security system preferably includes ascale that weighs containers to keep track of the weight of the contentsof each container. Container weight can lessen by slow leakage, or bysudden discharge of some of the contents. Either occurrence can reduceweight below a minimum and is worth noting. The effective spray orsquirt distance from a container depends mostly on how full thecontainer is.

Keeping track of the weight of material in containers has severaladvantages. A container presented for return to storage with a weightless than it had when checked out can be an event that requires a reporton where, when, and why the container was discharged. The weight of acontainer can also show that the container was not discharged since itwas checked out, and the system can distinguish a reusable weight from anon-reusable weight. For example, a normal weight range can represent asufficient weight of material remaining in a container for it to beeffective in stopping an assailant. Conversely, a weight outside thenormal range can show that a container is not effective for its intendedpurpose and should be withdrawn from circulation. The scale can alsodetect something substituted for a container if it weighs less than anempty container or more than a full container. By performing thesefunctions, weight becomes part of a container ID system involving boththe identity of the container and the weight of its contents by whichthe system can require retirement of containers that are no longereffective, and can accept as reusable containers presented by a knownuser with a sufficient weight to be effective.

The drawings show one preferred embodiment that combines elements of theinventive system in an expedient way. Many other combinations ofelements are possible in other embodiments that may practice theprinciples of the invention.

The embodiment 10 shown in FIG. 1 preferably includes a reusable storage11 and a non-reusable storage 12. Conveniently near these is a scale 15that can weigh a container 25. A controller 30 is also arrangedconveniently near storage chambers 11 and 12. These are normally keptlocked and are unlocked by control system 30 in response to anauthorized user.

Container 25, as shown in FIG. 3, has an ID in the form of a touchmemory button 40 that is preferably mounted in a washer 45 andpermanently secured to container 25. The most convenient place for thisis on the bottom of container 25 opposite dispensing end 26. Washer 45is electrically conductive, and button 40 is preferably permanentlymounted in washer 45, such as by being press fit into hole 41 in washer45. It may also be possible to mount button 40 in a recess in washer 45,and to facilitate bonding or attachment to container 25, washer 45 couldhave a skirt 46 such as shown in FIG. 4C. The combination of washer 45and ID button 40 is preferably secured to the base of a container 25 andpreferably affords a flat bottom to the container 25.

The touch memory button 40 in its preferred mount in washer 45 ismachine readable by means of a pair of electrical contacts 42 thatrespectively engage button 40 and washer 45. Other forms of electricalcontacts are possible.

The places where the IDs of container 25 are read, including scale 15,and storage units 11 and 12, are preferably provided with sockets orcells 13 that contain reader contacts preferably in the form ofconductive coil springs 42. [See FIGS. 2 and 6]. This allows one of thesprings 42 to be centered on an axis of a container 25 lodged in a cell13 to engage button 40, while a companion coil spring 42 is offset fromthe container axis to engage washer 45. The contacts engaging washers 45are preferably in electrical contact with a neutral buss, whichcooperates with the axially concentric contact spring 42 to make the IDsof buttons 40 readable.

Container cells or sockets 13 preferably include frictional elements 14that hold a container against slipping or sliding outward whilepositioned within a cell 13. This helps hold containers 25 in place withwashers 45 and buttons 40 making contact with coiled springs 42 arrangedon a reader board 43.

The functioning of the illustrated system is preferably programmed intocontroller 30 having a user interface 31. This can respond to authorizedusers who can optionally be identified by PIN, card swipe, proximity, orbiometrics. Prompts can appear in display window 32 so that a userfollowing the prompts can deal effectively with a fully automatedsystem.

To prepare containers 25 for use, the ID of each container is preferablycommunicated to controller 30 by a container enrollment station 35, asshown in FIG. 8. This registers with controller 30 the IDs of allcontainers that may be called upon for use, and it allows controller 30to accept as containers 25 only those who have their IDs enrolledbeforehand. This can also produce a supply of containers ready forweighing and use.

Preferred steps in a security administration process for storing andusing containers is schematically illustrated in FIG. 9. Many additionalsteps are possible to meet varying needs. These can include promptsappearing in controller display window 32.

When containers 25 are initially loaded into reusable storage 11, theyhave their touch memory buttons 40 in place, and they are weighed onscale 15, which can determine whether they are fully loaded. Containers25 are then placed in sockets 13 of reusable storage 11 for dispensingto authorized users. Readers 42 arranged on reader boards 43 engage thetouch memory buttons 40 and washers 45 of all the containers 25 that areplaced in storage. This gives controller 30 the identities of whatevernumber of containers 25 are stored.

When an authorized user logs into controller 30, then controller 30unlocks the door of reusable storage 11 and preferably illuminates alight 17 indicating the unlocked door so that the authorized user canoperate the door handle to open the door and remove a container 25 forpossible use. A withdrawn container 25 no longer has a memory button 40contacting a machine reader 42, which enables controller 30 to detectthe withdrawal of a container 25 and to note the ID of the withdrawncontainer. The authorized user then shuts the cabinet door and isequipped with a container 25. If the user withdraws more than onecontainer the controller can set off an alarm or provide a notificationby email, text messaging, or computer display, that something unusualhas happened.

To return a container 25, the authorized user logs into controller 30and presents a container 25 for return to storage by placing container25 on scale 15. Controller 30 then notes the weight of container 25, andscale 15 preferably includes an ID reader so that controller 30 can alsodetermine the id of the container presented for storage.

If the container has lost weight since it was checked out, controller 30can provide a notification that a report is necessary on thecircumstances of a discharge from a container in the possession of anauthorized user. Otherwise, if container 25 has about the same weight aswhen it was checked out, controller 30 can unlock the reusable storage11, which allows the authorized user to replace the container 25 in oneof the sockets 13 in storage 11. Computer 30 then notes from the IDreader in storage 11 whether container 25 has been replaced into storage11. If this has not occurred, controller 30 can sound an alarm or notifyan administrator.

If a container 25 presented for storage has lost enough weight so thatit is no longer effective, then controller 30 unlocks the door tonon-reusable storage 12, which also is preferably provided with storagesockets 13 and ID readers 42. This illuminates light 16 so that theauthorized user can then open the door and place container 25 in storage12, which controller 30 can note. If the user does not place container25 in storage 12, the controller can take appropriate action.

Controller 30 can also be programmed to deal with defective containerspresented for non-reusable storage. A user option to controller 30 canreport a defective container that for some reason does not work properlyso that the defective container can be removed from circulation by beingstored in non-reusable storage 12.

The specific functions of the security system can be variedconsiderably. They can be made more elaborate to include generation ofreports, notification of events by email, web, text message, andcooperative exchange between several dispensing and return stationswithin a single facility.

An ID reader and a weigh scale for containers presented for storage canbe separated, but for convenience, these are preferably combined nearthe storage containers. The system can be greatly enlarged withoutreducing its functions.

If security does not require it, non-reusable storage could become adiscard bin where containers are no longer monitored. Problems that thismight involve are prevented by deploying ID readers in non-reusablestorage, as well as in reusable storage.

Use of other ID codes, such as RFID tags or bar codes, would change theway that the codes are read. Even with use of the preferred button IDsand washers, it is possible to use different electrical contact systemsthat contact the buttons 40 and the washers 45 to achieve ID reading.Buttons can be held in some conductive material other than a washer, forexample, and edges of buttons 40 can provide neutral buss contactpoints. Changes in ID readers can vary security systems while followingthe desired principles and functions.

In addition to the OC materials mentioned in the background section, theinvention can also be applied to containers of any materials worthprotecting by a security system. The way that the controller 30 handlesunlocking and locking of doors and opening of doors can be varied andautomated in different ways.

1. A system controlling access to containers, and storage for thecontainers, the system comprising: each of a plurality of containershaving a readable ID; a scale arranged to weigh containers presented forstorage; a reader arranged to read the IDs of containers presented forstorage; and a controller communicating with the readers and the scaleand granting access to the storage if a container presented for storagehas an ID known to the controller and sufficient weight to be reusable.2. The system of claim 1 wherein the storage includes a non-reusableportion to which the controller grants access for a presented containerhaving a weight insufficient for reuse.
 3. The system of claim 1 whereinthe reader is combined with the scale to determine the ID and the weightof containers presented for storage.
 4. The system of claim 1 whereinthe readable ID is a touch memory button mounted in a conductive washersecured to each container.
 5. The system of claim 4 wherein a reader forthe touch memory button includes a conductive coiled spring contactingthe touch memory button.
 6. The system of claim 5 including secondconductive coiled spring contacting the washer.
 7. The system of claim 1wherein the storage contains sockets to receive containers oriented toengage respective readers.
 8. The system of claim 1 including acontainer enroller communicating with the controller to register IDs ofnew containers.
 9. A container control method comprising: applying areadable ID to each container; providing container storage havingreaders that read the ID of each container stored; providing a reader ofcontainer IDs combined with a weigh scale to determine the weights andthe IDs of containers presented for storage; providing a controllercommunicating with the readers and with the scale and with authorizedusers; arranging the controller to determine the IDs and users ofcontainers removed from storage; and arranging the controller todetermine weights and IDs of containers presented for storage and todistinguish between reusable and non-reusable containers based onpredetermined weight ranges for containers presented for storage. 10.The method of claim 9 including using a touch memory button to supplythe ID for each container, mounting the touch memory button in aconductive washer, and securing the washer and the button to eachcontainer.
 11. The method of claim 10 including contacting the buttonand the washer with respective conductive coil springs to read thebutton ID.
 12. The method of claim 9 including dividing the storage intoreusable and non-reusable portions to which the controller grants accessbased on the weight distinction.
 13. The method of claim 9 including acontainer enroller communicating new container IDs to the controller.14. A container comprising: a touch memory button affording an ID; thetouch memory button is mounted in a conductive washer; and the washerwith the touch memory button is secured to the container so that the IDafforded by the touch memory button is permanently associated with thecontainer.
 15. The container of claim 14 wherein the button is press fitinto a central hole in the washer.
 16. The container of claim 14 whereinan ID of the memory button is readable via a pair of conductive coiledsprings respectively engaging the button and the washer.
 17. Thecontainer of claim 14 wherein the washer with the touch memory buttonprovides a flat bottom to the container.
 18. A container controllingmethod usable in a container storage and dispensing system, the methodcomprising: applying a readable ID to each container; weighing andreading the ID of each container presented for storage; arranging IDreaders within the storage to identify the containers stored; admittingauthorized users access to storage to remove a container from storage;noting the ID of any container removed from storage; admitting toreusable storage any container presented by an authorized user if thecontainer has a known ID and a weight within a predetermined range; andadmitting to non-reusable storage any container presented by anauthorized user if the container has a known ID and a weight outside thepredetermined range.
 19. The method of claim 18 including forming thereadable ID as a touch memory button mounted in a conductive washerapplied to each container.
 20. The method of claim 19 including using apair of conductive coil springs to respectively engage the button andthe washer to read the ID.
 21. The method of claim 18 including noting aloss of weight of a container presented for storage.
 22. The method ofclaim 18 including providing the storage with a plurality of receptacleseach shaped to hold a container in a position engaging a reader.
 23. Themethod of claim 18 including enrolling with a controller the ID of eachnew container to be used before each container is weighed.
 24. A systemcontrolling storage and dispensing of spray containers, the systemcomprising: a touch memory button mounted in a washer secured to eachcontainer to provide an ID for each container; container storage dividedinto reusable storage and non-reusable storage; container storageincluding readers of the IDs of stored containers; an ID reader and aweigh scale to determine a weight and an ID of containers presented forstorage; a controller communicating with the readers, with the weighscale and with authorized users; the controller granting access toreusable storage for a container presented by an authorized user if thecontainer has a known ID and a weight within a predetermined range; andthe controller granting access to non-reusable storage for a containerpresented by an authorized user if the container has a known ID and aweight outside the predetermined range.
 25. The system of claim 24wherein the readers comprise a pair of conductive coiled springsrespectively contacting the touch memory button and the washer.
 26. Thesystem of claim 24 wherein the storage comprises a plurality ofreceptacles each shaped to hold a container in a position engaging oneof the readers.
 27. The system of claim 24 wherein the IDs of newcontainers are communicated to the controller before the weigh step.