AU2002346258A1 - Personal item recovery reward system - Google Patents

Personal item recovery reward system

Info

Publication number
AU2002346258A1
AU2002346258A1 AU2002346258A AU2002346258A AU2002346258A1 AU 2002346258 A1 AU2002346258 A1 AU 2002346258A1 AU 2002346258 A AU2002346258 A AU 2002346258A AU 2002346258 A AU2002346258 A AU 2002346258A AU 2002346258 A1 AU2002346258 A1 AU 2002346258A1
Authority
AU
Australia
Prior art keywords
key
customer
agent
central controller
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2002346258A
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of AU2002346258A1 publication Critical patent/AU2002346258A1/en
Abandoned legal-status Critical Current

Links

Description

A KEY REGISTRATION METHOD AND SYSTEM
This invention relates to a key registration system and method.
It is known to have systems established to facilitate return of lost keys to their rightful owners. One such system, which is sometimes used with hotel room keys, is to have a key tag which includes a message to the effect that if the keys are placed in a post box they will be returned to the hotel. Unfortunately there is not really much incentive for a finder of the keys to carry out the instructions on the key tag.
An object of the present invention is to provide a system and method whereby an incentive is provided to a finder of the key in order that it may be returned to its rightful owner.
According to the present invention there is provided a key registration method in which a lost key can be returned to a customer, the method including the steps of: entering data regarding the identity of a customer into a database, issuing the customer with an encoded key tag; paying a reward to a finder of the key tag when the finder returns the key tag to a participating agent; reading or interpreting the encoded key tag whereby the identity of the customer can be obtained from the database, and then contacting the customer so that the key tag and any keys or other articles coupled thereto can be returned to the customer.
In accordance with another aspect of the invention there is provided a key registration method in which a lost key can be returned to a customer, the method including the steps of entering data regarding the identity of a customer into a database maintained by a central controller; issuing to the customer at a participating agent an encoded key tag; accepting payment of a premium from the customer whereby, when a finder of the key tag returns the key tag to a participating agent, the encoded key tag is read or deciphered by the agent and the agent transmits information from the read or deciphered key tag to the central controller, comparing the transmitted information to entries in the database and, if correct, authorising the agent to pay a reward to the finder, allocating a PIN number, and contacting the customer and advising him or her of the PIN number whereby the customer can then reclaim the key at a nominated participating agent on presenting the PIN number to the nominated participating agent.
Preferably, the encoding on the key tag includes a bar code.
Preferably further, the key tag includes words which advise that a reward will be automatically paid on presentation of the key tag to a participating agent.
Preferably further, the premium paid by the customer is greater than the reward paid to the finder.
The invention also provides a key registration system including a central controller at which a database is maintained, a plurality of participating agents provided with bar code readers, a plurality of key tags which include bar codes and a communications network between the central controller and the participating agents, the arrangement being such that a bar coded key tag can be issued to a customer on payment of a premium whereupon a guaranteed reward can be paid to a finder of the key tag on return of the key tag to a participating agent.
The invention will now be further described with reference to the accompanying drawings, in which: Figure 1 is a block diagram of the system of the invention;
Figure 2 is a schematic illustration of the method of the invention; Figure 3 is one view of a key tag of the invention; and Figure 4 is another view of a key tag of the invention.
The key registration system 2 of the invention is diagrammatically illustrated in
Figure 1. It includes a central controller 4 which includes a computerised database facility (not shown). The central controller 4 is connected to a plurality of agents 6 by means of a telecommunications link 8. The telecommunications linlc 8 may be a direct cable link up, dial-up facility or secure Internet connection. Each of the agencies 6 is associated with a number of customers 10, each of whom have keys 12 which are to be entered into the registration system. Broadly speaking, the customers 10 register their personal details at one of the agencies 6 and are provided with a key tag 14 which is encoded with discrete data which identifies the particular customer 10. Details of the tag 14 and the identity of a customer 10 are communicated from the agent 6 over the communication link 8 to the central controller 4 where relevant details are entered into the database. If the customer 10 loses his or her key and key tag, any finder of the key and key tag 14, on taking the key and key tag 14 to any one of the agents 6, is paid a reward immediately after verification that the key tag 14 is correctly registered in the system. This acts as an inducement for a finder to return the tag and key to any one of the agents so as to collect the reward. Once a lost key has been returned to one of the agents 6, the tag is scanned in order to decode the coded information thereon and this is transmitted via the telecommunications linlc 8 to the central controller 4. The central controller 4 then advises the agent which received the lost key of the location of a preselected agent from which the lost key can be collected by the customer 10. The customer is also notified that the key has been handed in and can be collected at the preselected agent. For security reasons, the customer is given a password, PIN or the like which has also been provided to the preselected agent. When the customer arrives at the preselected agent it is necessary for him or her to quote the password, PIN or the like in order for the keys to be returned. Once the key has been returned, the customer would usually be required to re-register his or her keys in order to obtain a renewal of the key tag 14 or be issued with a new key tag 14.
The agents 6 are preferably part of a widely distributed network of existing agents, the location of which can be readily identified. Post offices, because of their wide distribution and public accessibility, would make ideal agents for use in the system. Other alternatives would, however, be suitable such as banks, supermarkets, service stations or the like. Figures 3 and 4 illustrate a typical key tag 14. Typically, the key tag 14 would include a plastic or metal body 18, one side of which is moulded or printed with information in a field 20 with information advising a finder that a guaranteed reward would be paid on presentation of the tag to one of the agents 6. The body 18 includes a hole 19 for a key ring 21 to which the keys 12 can be coupled in the usual way. The tag 14 also includes encoding such as a bar code 22 which can be scanned by means of a bar code reader 24 at any one of the agents 6. Once the bar code 22 has been read at one of the agents 6, details are communicated to the central controller 4 and the above mentioned steps are initiated to enable return of the key tag and key to the customer 10.
It will be appreciated by those skilled in the art that there would be a variety of ways in which details of the system could be implemented. Set out below is a preferred implementation of the system of the invention.

Claims (13)

1. The first step would be for a prospective customer 10 to enter one of the premises of the agent 6 and fill out a form requesting registration of a key. The customer's form would include contact details such as two telephone numbers and/or e-mail addresses which may be those of the customer (or another person) together with the location of a nominated agent where the keys are to be collected in the event that they are lost.
2. The agent then checks the data and if it appears to be complete, scans the bar code
22 of a tag 14 to be issued to the prospective customer 10. The bar code is transmitted to the central controller via the link and the central controller 4 then checks to see if the tag to be issued has a valid bar code and ensures that the coded information is not already in use. The central controller 4 then issues an identification number (IDN) which is transmitted to the agent 6 and this is marked on or otherwise associated with the form which has been filled out by the customer.
3. The customer pays to the agent a premium which is an amount of say $40 or $50.
4. The agent 6 then transmits or sends the form and identification number (IDN) back to the central controller 4 so that further relevant details can be included in the database associated with the particular IDN.
5. Once the above steps are carried out, the registration process is completed and the customer is properly registered in the system.
6. If the key is lost, any finder need only take the key tag 14 and keys coupled thereto to any one of the participating agents 6 (hereinafter referred to as the "receiving agent"). At the receiving agent 6, the bar code on the tag is scanned and this infonnation is transmitted to the central controller 4. If the coded information is indicative of a correctly registered key tag. the central controller site 4 initiates a series of steps which culminate in the keys being available for collection to the user.
7. The first step is to advise the receiving agent 6 that the key tag is valid whereupon the predetermined reward amount is immediately paid to the fmder. This amount may be any predetermined amount, usually less than the premium, say $20.
8. The central controller also advises the receiving agent of the identity of the nominated agent where the key tag and key are to be forwarded to for collection together with a discrete claim verification number of PIN can be collected.
9. The receiving agent then forwards the key tag and key to the nominated agent, together with the discrete claim verification number or PIN.
10. The central controller contacts the customer using the telephone numbers or e-mail addresses from the data base. The central controller also provides the customer with the same discrete claim verification number or PIN so that the customer can quote the number or PIN in order to collect the key tag and key.
11. When the customer 10 calls at the nominated agent to collect the key tag and key, the customer must quote the correct claim verification password or PIN in order to have the keys returned to him or her.
12. Once the keys have been returned, that would conclude the transaction.
13. The customer would then need to enter into a new registration arrangement or pay a new prepaid fee in order to renew the registration contract.
The arrangement of the invention has a number of advantages. First, finders of the key have a positive inducement to return the keys to one of the agents 6 because of the promise to immediately be paid a reasonable reward. As stated above, the agents preferably form part of a wide distribution network such as a post office, bank, service station or retail outlet chain so that finders of the keys can collect the reward without too much trouble. Normally the premium paid by the customer exceeds the value of the reward so that the central controller and agents can cover their operating costs and make a profit from operating the system.
The invention has been described in relation to key tags to which keys can be attached but it will be appreciated that the principles of the invention are applicable to tags which can be connected to or manufactured in any private property, especially small articles of value.
Many modifications will be apparent to those skilled in the art without departing from the spirit and scope of the invention.
AU2002346258A 2001-07-03 2002-07-03 Personal item recovery reward system Abandoned AU2002346258A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AUPR6072 2001-07-03

Publications (1)

Publication Number Publication Date
AU2002346258A1 true AU2002346258A1 (en) 2003-01-21

Family

ID=

Similar Documents

Publication Publication Date Title
US10726656B2 (en) Identification verification system
US8887997B2 (en) Method for making secure a transaction with a payment card, and center for authorizing implementation of said method
US7093761B2 (en) System and method for distributing stored-value cards
AU2005299252B2 (en) Transaction system and method
AU2001252615B2 (en) Method for attaching authentication bar code, authentication method, apparatus for attaching authentication bar code, authentication apparatus and portable terminal
JP4864871B2 (en) Ordering method for mobile radio network users
US20080007388A1 (en) Apparatus For Identification, Authorisation And/Or Notification
US20140052607A1 (en) Secure payment system using a mobile phone, and payment method using same
JP2005535983A (en) Remote ordering device
CN1535437A (en) Method and system using SMS notification for facilitating delivery of goods
WO2002097568A2 (en) Community concept for payment using rf id transponders
AU2002303848A1 (en) Community concept for payment using RF ID transponders
CN1443344A (en) Utility metering system incorporating transaction authorisation system
AU763262B2 (en) Electronic payment method
US20040024697A1 (en) Method and system for transferring money
CN107148634A (en) Integrate accumulation system, integration accumulation method and its NFC terminal devices
WO2006022580A1 (en) System for handling refund of value-added tax
US20060015395A1 (en) Automated parking system with interactive voice response
WO2003005251A1 (en) Personal item recovery reward system
CN101496029A (en) System and method for performing electronic transactions
KR20020006182A (en) Method of integrally managing and using a plurality of credit cards
AU2006349535A1 (en) A method and system for processing transactions
EP1610249A1 (en) Method and system for real-time collection of data related to sales to the final consumer of durable and semidurable goods
AU2002346258A1 (en) Personal item recovery reward system
AU761068B2 (en) Method for increasing the efficiency of trade