Container for securing and uniquely identifying objects

ABSTRACT

A container for securing and uniquely identifying objects are provided for use with an asset tracking system of the type having a latching device to physically hold the container in place and to automatically sense the memory device which is part of the container. The container includes a surface for being physically latched in place, a device for securing objects such as keys and includes a circuit board which hosts the memory device. Containers are generally rectangular in shape, but include beveled surface to ensure that they can only be inserted into the asset tracking system in one direction. In one embodiment, the container is equipped with reusable metal lanyards to attach keys to the container.

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] Not applicable

BACKGROUND

[0002] 1. Field of Invention

[0003] This invention relates generally to asset tracking systems and more particularly to uniquely identifiable containers that are capable of being physically secured in a cabinet to protect keys and other objects.

[0004] 2. Description of Prior Art

[0005] Controlling access to items such as keys and access cards is one method of managing a wide range of assets such as vehicles, aircraft, boats, commercial property and vacation homes. By controlling the key or access card, you effectively control the asset. As part of the control process, there is a need to selectively limit access to keys and other objects in a way that physically prevents unauthorized access, provides an audit trail of each access to the key or object, and provides notification to management personnel in the event that unauthorized access attempts are made.

[0006] A wide range of systems exists to control objects such as keys. These systems range from fully manual systems to totally automated systems. The manual systems may include key hooks and a logbook that is used to manually record each key-out and key-in transaction. The limitation of this approach is that the process can be circumvented intentionally, may be inaccurate due to unintentional errors in the recording of key numbers or user's identity, and keys may be difficult to locate if they are not returned to the correct location on the key hook system. Additionally, selectively limiting access to specific keys using a manual key control system must be done via the honor system. Automated systems for controlling objects such as keys range considerably. One such system, as disclosed in U.S. Pat. No. 5,801,628, can physically restrict access to large sets of keys and can track key-out and key-in transactions for individual keys. While this system can track key movement on a key-by-key basis, its limitation is that each key in a large drawer of keys is not individually secured in place. The keys are attached with a rivet to a plastic tag containing a “touch memory device” containing an ID code. The tags are inserted into a slotted panel within a drawer, however they are not secured in place. This leaves the keys prone to removal by unauthorized users, prone to tampering with the key identification tags, and even prone to users making molds of the keys since they are exposed to each user with access to the drawer of keys. Another such system physically secures keys on a ring (the ring hangs in a key cabinet) and limits removal of keys and rings. However, keys remain exposed and prone to tampering including making a mold of a key. Finally, another key system secures keys inside of plastic containers that are identified via a bar code. The plastic containers reside on a carousel inside of the key system and are dispensed using a series of multiple motors and other mechanical devices after access is authorized to the specific set of keys. This system is mechanically complex and prone to failure.

[0007] Microprocessor-controlled or personal computer-controlled systems are used as part of many automated asset control systems. A variety of methods are used to identify users, however, the means are generally similar amongst the different systems. The primary differences between automated asset control systems are the methods by which keys are identified, the extent to which keys are exposed to potential threats, and the method by which keys are secured inside of the asset controlling cabinet.

[0008] Key identification in automated systems is generally accomplished using either a bar code or some type of memory touch device. Bar codes are typically printed on a label and affixed to an object that is attached to a set of keys. The disadvantage of this approach is that bar codes can be removed or can become unreadable due to normal wear because they are on a paper medium. Bar codes can be easily counterfeited or duplicated using devices as simple as a copier machine or a standard personal computer. Finally, bar codes are difficult to scan on a frequent interval when keys are in an enclosed area due to the need to have a bar code reader access the relatively large bar code at a perpendicular angle within a confined space. Memory touch devices are more common than bar codes in automated key systems. Memory touch devices come in a variety of sizes and offer the advantage that they are rugged, not very prone to failure, they are compact, they are commercially available, they can not be reproduced without sophisticated means, and they can be sensed electronically within the tight confines of a key cabinet.

[0009] The environment in which an automated asset control system can be deployed is heavily dependent upon the extent to which the keys are exposed to potential threats. Independent of whether or not a user can physically remove a key, consideration must be given to the extent to which keys are visually or tactilely exposed to unauthorized users. In environments where all of the users are “trusted”, keys may be visible to users that are not allowed to have access to the keys. That is, the keys may be prone to tampering or casting because they are secured in a system in a way that leaves keys exposed on an electronically-controlled key ring or riveted to plastic tags. However, in environments where threats exist, it is much more critical that keys are hidden from view and exposed only to those with permission to access the specific key or object. Keys that are individually stored in a container within a key cabinet are not exposed to the threat.

[0010] A different, yet equally important feature of asset control systems is the method by which assets are secured inside of the cabinet. One shortcoming of only securing an entire cabinet or an entire drawer of keys is that an unauthorized key may be removed by anyone gaining access to an entire cabinet or drawer full of keys. A user with the lowest privilege level could physically remove keys requiring the highest access privilege if the keys are not individually secured in a cabinet. Most automated systems notify administrators of such a security breach. However, at times when administrators can not respond immediately, or the potential liability of the wrong key being accessed is great, allowing the wrong keys to be physically removed from the asset control cabinet is not acceptable. Keys or objects that are individually secured in a cabinet are not prone to accidental removal or removal by those with malicious intent.

SUMMARY

[0011] Briefly described, the present invention is for use in securing and uniquely identifying objects such as keys or access control cards in an access control system. The invention is generally a rectangular container equipped with lanyards for securing keys. The unit contains a unique electronic identification chip and an aperture in the invention to accommodate a latching device that is part of an associated automated access control system. The container has a hinged lid with a locking tab. The tab is depressed to open the lid so as to provide access to the contents of the container.

[0012] The invention is used as part of an access control system. The rectangular container is dispensed from, and inserted into, a slot in an automated access control system. To ensure that the invention is always placed into the access control system in the proper orientation, the rectangular container has a beveled edge that mates with a matching bevel in the access control system. A bevel on the edge of the container runs nearly ninety percent of the length of the container, thus exposing the bevel from only one end of the container. The access control system has a mating bevel that allows the beveled edge of the container to slide into the access control system's slot, however, the non-beveled end of the container cannot be inserted into the system. This configuration limits insertion of the container into the access control system's slot in only one orientation.

[0013] The unique identification of each container is accomplished using a small circuit board that contains the serialized identification chip on one side and a pair of gold contact pads on the reverse side. The circuit board is fixed into a tailored groove in the container, secured with epoxy, and a cover is installed on top of the circuit board to prevent tampering. The gold contact pads face the rear of the container and are arranged in such as way as to mate with sensing devices that are part of the access control system. To reduce the risk of electronic chip damage due to electrostatic discharge, the contacts are inset from the rear surface of the container. This configuration ensures that electrostatic damage due to contact with surfaces in the environment that are prone to electrostatic discharge cannot occur simply by bumping the flat edge of the container against the statically charged object.

[0014] In the rear of each slot of the associated access control system, there is a mechanism to sense the presence of a container. As the container is returned to the access control system by sliding the container into a slot, a latching device catches the back of the container and locks it into place. At the point that the container is locked securely into place by the latching device, two spring-loaded probes from the access control system contact the gold plated circuit board pads located on the rear of the container. An electrical connection within the access control system communicates the unique electronic serial identification number to the system's main processor for identifying the incoming container.

[0015] Three lanyards are mounted to the container in a manner that allows the lanyards and associated keys to remain affixed to the container while hanging either inside of the invention or outside of the invention while the hinged lid is closed. That is, the lanyards pivot in such as way as to allow a single key mounted on a lanyard to be used in an application such as a car while the remaining keys remain mounted within the plastic container while the lid is closed. Any combination of the three lanyards/keys can be positioned inside or outside of the container at any given time. Lanyards have a two hundred and seventy degree freedom of motion so as to allow keys to hang freely from the container and facilitate ease-of-use while still affixed to the plastic container.

[0016] These and other objects and advantages of the invention will be apparent from the following detailed description when read with reference to the drawings.

OBJECTS AND ADVANTAGES

[0017] Accordingly, besides the objects and advantages of the container for securing and uniquely identifying objects in my above patent, several objects and advantages of the present invention are:

[0018] (a) To include an integrated identification device—the identification chip is not affixed to a plastic tag or other protruding device and therefore can not be easily removed from the container as a means of tampering with the device;

[0019] (b) To work with a simple latching mechanism with few moving parts, thereby minimizing the chance of failure;

[0020] (c) To provide a container that hides keys and other objects from view of users that have not been provided access to the specific keys or object—in other words, this unit can be in environments in which un-trusted users will be accessing keys or other objects because viewing of objects can be restricted on an object-by-object basis;

[0021] (d) To provide a container that physically locks keys and other objects in place and prevents unauthorized users from removing the specific keys or object—in other words, this unit can be in environments in which un-trusted users will be accessing keys or other objects because access can be restricted on an object-by-object basis;

[0022] (e) To provide a container that can accommodate keys, but also any other object that fits within the size constraints of the container, particularly objects that are the size of a standard credit card—this facilitates distribution of several items simultaneously such as car keys and a gas credit card;

[0023] (f) To provide a container that can accommodate keys and other objects and be uniquely identified thereby facilitating processing such as billing or access restriction on an object-by-object basis;

[0024] (g) To provide re-usable lanyards for securing keys within the container so as to allow re-use of the container—in other words eliminating recurring costs for the end user are minimized;

[0025] (h) To provide a size and shape that facilitates use of single-use cable ties, in lieu of the re-usable lanyard, to enable users to implement a tamper-proof mechanism for securing keys within the container;

[0026] (i) To provide a container that facilitates the use of the key while it is still physically attached to the uniquely identifiable container so as to eliminate the need to ever remove keys from the container during use.

[0027] (j) To include an integrated, living-hinge such that the container can endure more than 2,500 openings and closing of the hinged panel, thereby reducing the need to replace the containers during normal use.

[0028] Further objects and advantages are to provide a container for securing and uniquely identifying objects which is easy-to-use, is inexpensive to manufacture, which can be made in any color to provide user-specific value, and which protects the serialized identification chip from electrostatic discharge. Still further objects and advantages will become apparent from a consideration of the ensuing description of drawings.

DRAWING FIGURES

[0029] In the drawings, closely related figures have the same number but different alphabetic suffixes.

[0030]FIG. 1-A is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is closed.

[0031]FIG. 1-B is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is open and the plastic cover is shown installed covering the serial identification chip.

[0032]FIG. 1-C is a back, pictoral representation of a container for securing and uniquely identifying objects. In this view, the hinged lid is open and the plastic cover is shown removed from on top of the serial identification chip. The cover is shown as a separate component in this drawing.

[0033]FIG. 2 is a top view of the invention shown without the serial identification chip and without the cover over the identification chip and latch aperture. In this view, the hinged lid is in the open position.

[0034]FIG. 3-A is a top view of the serialized identification chip.

[0035]FIG. 3-B is a side view of the serialized identification chip.

[0036]FIG. 3-C is a pictoral representation of the serialized identification chip.

[0037]FIG. 4-A is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in slightly ajar position.

[0038]FIG. 4-B is a pictoral representation of the latching mechanism for holding the hingeable panel closed on a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in a closed position and the snap tongue is shown inserted in the snap slot.

[0039]FIG. 4-C is a side view cut-away, representation of a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in an open position.

[0040]FIG. 4-D is a side view cut-away pictoral, representation of a container for securing and uniquely identifying objects. In this view, the hingeable panel is shown in a closed position.

[0041]FIG. 5-A is a front, pictoral representation of a container for securing and uniquely identifying objects. In this view, the container is shown in a vertical orientation. The beveled edge used to ensure the container is inserted into the asset control system is shown at the top right.

[0042]FIG. 5-B is a rear, pictoral representation of a container for securing and uniquely identifying objects. In this view, the container is shown in a vertical position.

[0043]FIG. 6-A is a side view of the lanyard used to secure keys and other objects in the container.

[0044]FIG. 6-B is a pictoral, front view of the lanyard used to secure keys and other objects in the container. In this picture, a key is affixed about the lanyard.

[0045]FIG. 6-C is a top view of three lanyards mounted to the container for securing and uniquely identifying objects. Keys are shown affixed about each lanyard.

[0046]FIG. 7-A is a pictoral view of the embodiment of the container with one lanyard mounted to the container and one key attached via the lanyard. In this view, the hingeable panel is in the open position and the key is hanging outside of the container.

[0047]FIG. 7-B is a pictoral view of the embodiment of the container with three lanyards mounted to the container. In this view, the hingeable panel is in the closed position and the lanyards are contained on the inside of the container.

[0048]FIG. 7-C is a pictoral view of the embodiment of the container with three lanyards mounted to the container. In this view, the hingeable panel is in the closed position and one key and its associated lanyard are hanging outside of the container. The remaining two lanyards are contained on the inside of the container.

[0049]FIG. 8-A is a pictoral, front view of the asset control system slot mechanism that receives the container. The container is shown oriented in a vertical position in the manner in which the container is inserted into the asset control system.

[0050]FIG. 8-B is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown partially inserted into the slot mechanism of the asset control system.

[0051]FIG. 8-C is a top, cut-away view of the asset control system slot mechanism that receives the container. The container is shown fully inserted into the slot mechanism of the asset control system.

[0052]FIG. 9-A is a side, cut-away view of the asset control system slot mechanism that receives the container. In this view, the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has not contacted the latch assembly or the access control system's contact pins.

[0053]FIG. 9-B is a side, cut-away view of the asset control system slot mechanism that receives the plastic container. In this view, the container for securing and uniquely identifying objects is inserted partially into the asset control system's slot mechanism and the container has contacted the latch assembly but has not yet contacted the access control system's contact pins.

[0054]FIG. 9-C is a side, cut-away view of the asset control system slot mechanism that receives the container. In this view, the container for securing and uniquely identifying objects is inserted fully into the asset control system's slot mechanism and the container has been latched in place by the action of the latch assembly and the access control system's contact pins have extended to the point normally occupied by the contact pads on the contact board.

REFERENCE NUMERALS IN DRAWINGS

[0055] 01 container body 02 container body right side panel 03 container body left side panel 04 container body rear panel 05 container body front panel 06 hingeable panel 07 hinge 08 container main cavity 09 aperture wall 10 snap indenture 11 snap tongue 12 snap neck 13 snap slot 14 lanyard opening 15 container bevel 16 lanyard hole #1 17 lanyard hole #2 18 lanyard hole #3 19 contact board aperture 20 latch aperture 21 cover plate 22 contact board 23 cover hole #1 24 cover hole #2 25 cover hole #3 26 cover hole #4 27 cover pin #1 28 cover pin #2 29 cover pin #3 30 cover pin #4 31 latching surface 32 latch cavity 33 contact pad #1 34 contact pad #2 35 identification chip 36 leads from identification chip 37 container bottom 38 non-beveled “stop” 39 access control system contact pins 40 lanyard 41 access control slot 42 access control slot spring 43 access control bevel 44 access control latch 45 access control system latch pivot 46 access control circuit board 47 access control pivot spring 48 contact board cavity 49 access control system latch front edge 50 access control system latch back edge 51 access control system latch head

DETAILED DESCRIPTION—FIGS. 1-10—PREFERRED EMBODIMENT

[0056] Referring now in more detail to the drawings, in which like numerals refer to like arts through the several views, FIG. 1-A, FIG. 1-B, and FIG. 1-C illustrate a container that embodies principles of the invention in one preferred form. In this view, the container body comprises a generally rectangular body 01, formed by a right side panel 02, a left side panel 03, a rear panel 04, a bottom panel 37, and a front panel 05 (not visible in picture). A top panel 06 is attached by an integrated hinge 07 and in FIG. 1-A is shown in the closed position on top of the container body 01.

[0057] The rear panel 04 is provided with an elongated lanyard opening 14 and lanyard holes 16, 17, and 18, which facilitate mounting of lanyards 40. A contact board aperture 19 in the rear panel 04 exposes the integrated contact board 22 to the sensing devices included as part of the associated asset control system. A latch aperture 20 in the rear panel receives the latch that is part of the associated asset control system.

[0058] The right panel 02 includes a snap indenture 10. In FIG. 1-A the snap tongue 11 is shown protruding through the snap slot 13 in the hingeable panel 06. In use, the hingeable panel 06 is pressed down onto the snap tongue 11 resulting in the marriage of the snap tongue 11 into the snap slot 13.

[0059] The left panel 03 is provided with a container bevel 15 to enforce insertion of the invention into an associated asset control system in one, and only one, orientation.

[0060]FIG. 1B further illustrates the container in one preferred form. A top, hingeable panel 06 is attached by a hinge 07 and is shown in the open position on top of the container body 01. A cover plate 21 is shown which encloses the latch cavity 32 and the contact board cavity 48, which are exposed to the rear of the container.

[0061]FIG. 1C illustrates the mounting mechanism for the cover plate 21. Here, four pins 27, 28, 29, and 30 are shown protruding upward from the aperture wall 09. The pins are cylindrical in shape. Mating holes 23, 24, 25, and 26 are shown in the cover plate. In use, the cover 21 is snapped in to place by aligning the holes 23, 24, 25, and 26 with pins 27, 28, 29, and 30 respectively. The cover is pressed down over the pins and held in place by a tight press fit.

[0062]FIG. 2 illustrates the contact board cavity 48 and the latch cavity 32. The contact board cavity 48 is a slotted opening between the aperture wall 09 and the rear panel 04. The contact board cavity 49 accepts the contact board 22. When inserted into the contact board cavity, the contact pads 33 and 34 are exposed through the container's contact board aperture 19 to the rear of the container. The electronic serial identification chip 35, shown in FIG. 3-B, is mounted on the front-facing surface of the contact board 22 is accommodated in the rectangular cavity that is part of the larger contact board cavity. In use, the contact board 22 is placed into the contact board cavity 48 and an epoxy is filled around the contact board to secure it in place and prevent tampering.

[0063] The latch cavity 32 receives the access control latch 44 that is part of the associated asset control system. In use, as the container is inserted into the slot of the associated asset control system, the rear panel 04 of the container contacts an angled leading edge 49 of a spring-loaded latch 44. As the container is inserted further into the asset control system, the latch is forced downward until the rear edge of the latch head 50 passes the inside wall of the rear panel 04 of the container 01. At such a point, the spring-loaded latch is forced upward resulting in the rear of the latch head 50 mating with the latching surface of the container's rear panel 31. The container therefore cannot be removed from the asset control system without some action forcing the latch in a downward position. An electronic actuation of the latch 44 in a downward motion is a key component of the associated asset control system. When the asset control system moves the latch head 51 in a downward motion past the point where the top of the latch head 51 meets with the inside surface of the container's rear panel 31, the container is released from the latching action of the latch and the container is forced out of the slot of the asset control system.

[0064] FIGS. 3-A, 3-B, and 3-C illustrate the contact board 22 that is used to uniquely identify each container. One contact board is inserted and affixed in each container. As shown in FIG. 3-A, a contact board 22 consists of two gold-plated pads 33 and 34 on the external facing side. FIG. 3-B shows a side view of the contact board 22, including gold pads 33 and 34 and an electronic identification chip 35 on the internal facing side. The electronic identification chip 35 is soldered to the contact board 22. FIG. 3-C shows a pictoral view of the top of the contact board 22.

[0065]FIG. 4-A illustrates the assembly used to hold the panel 06 of the container in a closed position. As the hinged panel 06 is closed, the inside surface of the hinged panel 06 meets the rounded surface of the snap tongue 11. As the hinged panel is pushed all of the way to the closed position, the semi-flexible snap neck 12 assembly is pushed toward the inside of the container so as to allow the smooth snap tongue 11 to slide inside of the panel 06 until the point that the snap tongue 11 reaches the snap slot 13. Once the snap tongue 11 reaches the snap slot13, the snap tongue 11 moves into the snap slot 13 and the semi-flexible snap neck 12 is returned to a non-flexed state. This action secures the panel 06 in to a closed position as shown in FIG. 4-B. To affect the opening of the panel 06, the snap indenture 10 must be depressed to the point that the snap tongue 11 disengages from the snap slot 13 located on the panel 06. Once disengaged, the upward force from the hinge 07 of the container raises the hingeablepanel 06 to an open position. FIG. 4-C is a side, cut-away view of the snap assembly in an open position. FIG. 4-D is a side, cut-away view of the snap assembly in a closed position.

[0066]FIG. 5-A illustrates a front-view of a container with the hingeable panel 06 closed. The container is oriented in a position resting on its side panel 02. The container bevel 15 is shown at the top right of the container. FIG. 5-B shows a rear view of the container. The contact board 22 is visible mounted in the rear of the container.

[0067] Additional Embodiment—FIGS. 6,7

[0068] In another preferred embodiment, lanyards are affixed to the container to facilitate the attachment of keys to the container.

[0069]FIG. 6-A depicts a side view of the lanyard 40, which is used to physically attach keys to the container 01. FIG. 6-B depicts a front view of the lanyard 40 with a key inserted onto it. FIG. 6-C shows one embodiment of the present invention with three lanyards 40, each containing one key, mounted to the container via the lanyard opening 14 and lanyard hole #1 16, lanyard hole #2 17, and lanyard hole #3 18.

[0070]FIG. 7-A is a pictoral view of a lanyard 40 mounted to a container 01. In FIG. 7-A, the hingeable panel 06 is open and the lanyard and associated key are oriented outside of the container body 01. FIG. 7-B depicts the embodiment with three lanyards 40 mounted to the container body 01. In FIG. 7-B, the hingeable panel 06 is shown in a closed position and the three lanyards 40 are oriented inside of the container body 01. In FIG. 7-C, the hingeable panel 06 is shown in a closed position and one of the lanyards 40 and the associated key are shown oriented outside of the container body 01. Two of the lanyards 40 are shown oriented inside of the container body 01.

[0071] Operation—FIGS. 8-9

[0072]FIG. 8-A is a pictoral depiction of the container body 01 and the container body's 01 relationship to the access control slots 41 which are part of the associated asset control system. FIG. 8-A shows the container oriented in a manner which mates the beveled edge of the container 15 with the beveled edge of the access control slot 43. This is the only orientation in which the container can be inserted into the access control slots 41. FIG. 8-B is a top view of the access control slots 41 and the container body 01. In FIG. 8-B, the container body 01 is inserted partially into the access control slots 41. In FIG. 8-C, the container body 01 is inserted fully into the access control slots 41. In both FIGS. 8-B and 8-C, the access control system contact pins 39 are shown.

[0073]FIG. 9-A, FIG. 9-B, and FIG. 9-C show a side-view of the container body 01 as it is inserted into the associated access control system. In FIG. 9-A, the container body 01 is inserted partially into the asset control slot 41. In FIG. 9-A, the container body 01 has not yet reached either the access control latch 44 or the access control contact pins 39.

[0074] In FIG. 9-B, the container body 01 has been inserted further into the access control slot 41 and the container body 01 has contacted the access control system latch front edge 49 and the access control latch has begun to be pushed in a downward motion and into the latch cavity 32. In FIG. 9-B, the container body 01 has not yet contacted the access control contact pins 39.

[0075] Finally, in FIG. 9-C, the container body 01 has been fully inserted into the access control slot 41. The access control latch 44 of the associated asset control system has been inserted into the latch aperture 20 and the access control system latch back edge 50 has mated with the latching surface 31 of the container. Additionally, FIG. 9-C depicts that the access control contact pins 39 have married up with the contact pads 33 and 34 located at the rear of the container thus allowing the access control system to detect the presence of, and identify of, the container body 01.

[0076] Conclusion, Ramifications, and Scope

[0077] Accordingly, the reader will see the container for securing and uniquely identifying objects is simple to use and has few parts resulting in high reliability. The container secures keys from view and, when used with the associated asset control system, the container secures keys from accidental or unauthorized removal from the asset control system. Each container is built so as to allow the container to be re-used over and over again. The container and its integrated identification chip are not prone to tampering since the chip is affixed to a circuit board, inserted into a tailored slot, and subsequently glued into place with an epoxy. Keys contained within the container can be used while the lid is closed by simply flipping the lanyard and key out of the container prior to closing the lid. Further, the container for securing and uniquely identifying objects has the additional advantages in that

[0078] It can be manufactured in a variety of colors so as to allow end-users to secure objects with different access levels in different colored containers

[0079] It can be manufactured using low-cost plastic molds

[0080] It has a life expectancy of at least 2,500 openings and closings, thereby reducing the need to replace the units frequently

[0081] It can be used to distribute many types of objects to users with varying access privileges when used in conjunction with the associated asset control system.

[0082] Although the description above contains much specificity, these specifications should not be construed as limiting the scope of the invention but merely providing illustrations of some of the presently preferred embodiments of this invention. For example, the container can have other shapes, can be larger in size, and can be equipped with devices to hold other specific items.

[0083] Thus, the scope of the invention should be determined by the appended claims and their legal equivalents, rather than by the examples given. 

I claim:
 1. A container for holding objects in an asset control system, comprising: (a) an opening for accessing the interior of the container (b) a panel covering said opening having a mechanism for retaining said panel in a closed position whereby loose objects can be stored in the container (c) an aperture having clearance for receiving the latching device provided as part of the asset control system (d) a solid surface for mating with said latching device whereby the container can be secured in the asset control system by the latching device of the asset control system (e) conductive pads with an attached identification device mounted within said container in such as way as to be accessible from the exterior of the container for detection and identification by said asset control system whereby said container can be uniquely identified by the asset control system
 2. A container assembly as claimed in 1 and wherein said panel is attached to said container along one edge of the container and the panel is hingeable between a closed position and an open position
 3. A container assembly as claimed in 1 wherein a plurality of holes is formed to receive fastening devices for securing objects to said container
 4. A container assembly as claimed in 3 wherein the fastening device used to secure objects to the container is a metal lanyard whereby objects can be attached to and removed from the said lanyard
 5. A container assembly as claimed in 3 wherein the fastening device used to secure objects to the container is a ratcheting plastic device whereby said ratcheting plastic device is designed for a single use and removal of an object from the ratcheting plastic device renders the ratcheting plastic device unusable. 