WO2003005251A9 - Personal item recovery reward system - Google Patents

Personal item recovery reward system

Info

Publication number
WO2003005251A9
WO2003005251A9 PCT/AU2002/000875 AU0200875W WO03005251A9 WO 2003005251 A9 WO2003005251 A9 WO 2003005251A9 AU 0200875 W AU0200875 W AU 0200875W WO 03005251 A9 WO03005251 A9 WO 03005251A9
Authority
WO
WIPO (PCT)
Prior art keywords
key
customer
tag
key tag
agent
Prior art date
Application number
PCT/AU2002/000875
Other languages
French (fr)
Other versions
WO2003005251A1 (en
Original Assignee
Raymond Geoffrey
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Raymond Geoffrey filed Critical Raymond Geoffrey
Publication of WO2003005251A1 publication Critical patent/WO2003005251A1/en
Publication of WO2003005251A9 publication Critical patent/WO2003005251A9/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q99/00Subject matter not provided for in other groups of this subclass

Definitions

  • This invention relates to a key registration system and method.
  • An object of the present invention is to provide a system and method whereby an incentive is provided to a finder of the key in order that it may be returned to its rightful owner.
  • a key registration method in which a lost key can be returned to a customer, the method including the steps of: entering data regarding the identity of a customer into a database, issuing the customer with an encoded key tag; paying a reward to a finder of the key tag when the finder returns the key tag to a participating agent; reading or interpreting the encoded key tag whereby the identity of the customer can be obtained from the database, and then contacting the customer so that the key tag and any keys or other articles coupled thereto can be returned to the customer.
  • a key registration method in which a lost key can be returned to a customer, the method including the steps of entering data regarding the identity of a customer into a database maintained by a central controller; issuing to the customer at a participating agent an encoded key tag; accepting payment of a premium from the customer whereby, when a finder of the key tag returns the key tag to a participating agent, the encoded key tag is read or deciphered by the agent and the agent transmits information from the read or deciphered key tag to the central controller, comparing the transmitted information to entries in the database and, if correct, authorising the agent to pay a reward to the finder, allocating a PIN number, and contacting the customer and advising him or her of the PIN number whereby the customer can then reclaim the key at a nominated participating agent on presenting the PIN number to the nominated participating agent.
  • the encoding on the key tag includes a bar code.
  • the key tag includes words which advise that a reward will be automatically paid on presentation of the key tag to a participating agent.
  • the premium paid by the customer is greater than the reward paid to the finder.
  • the invention also provides a key registration system including a central controller at which a database is maintained, a plurality of participating agents provided with bar code readers, a plurality of key tags which include bar codes and a communications network between the central controller and the participating agents, the arrangement being such that a bar coded key tag can be issued to a customer on payment of a premium whereupon a guaranteed reward can be paid to a finder of the key tag on return of the key tag to a participating agent.
  • Figure 1 is a block diagram of the system of the invention
  • Figure 2 is a schematic illustration of the method of the invention
  • Figure 3 is one view of a key tag of the invention
  • Figure 4 is another view of a key tag of the invention.
  • the key registration system 2 of the invention is diagrammatically illustrated in
  • FIG. 1 It includes a central controller 4 which includes a computerised database facility (not shown).
  • the central controller 4 is connected to a plurality of agents 6 by means of a telecommunications link 8.
  • the telecommunications link 8 may be a direct cable link up, dial-up facility or secure Internet connection.
  • Each of the agencies 6 is associated with a number of customers 10, each of whom have keys 12 which are to be entered into the registration system.
  • the customers 10 register their personal details at one of the agencies 6 and are provided with a key tag 14 which is encoded with discrete data which identifies the particular customer 10. Details of the tag 14 and the identity of a customer 10 are communicated from the agent 6 over the communication link 8 to the central controller 4 where relevant details are entered into the database.
  • any finder of the key and key tag 14, on taking the key and key tag 14 to any one of the agents 6, is paid a reward immediately after verification that the key tag 14 is correctly registered in the system. This acts as an inducement for a finder to return the tag and key to any one of the agents so as to collect the reward.
  • the tag is scanned in order to decode the coded information thereon and this is transmitted via the telecommunications link 8 to the central controller 4.
  • the central controller 4 advises the agent which received the lost key of the location of a preselected agent from which the lost key can be collected by the customer 10.
  • the customer is also notified that the key has been handed in and can be collected at the preselected agent. For security reasons, the customer is given a password, PIN or the like which has also been provided to the preselected agent. When the customer arrives at the preselected agent it is necessary for him or her to quote the password, PIN or the like in order for the keys to be returned. Once the key has been returned, the customer would usually be required to re-register his or her keys in order to obtain a renewal of the key tag 14 or be issued with a new key tag 14.
  • the agents 6 are preferably part of a widely distributed network of existing agents, the location of which can be readily identified. Post offices, because of their wide distribution and public accessibility, would make ideal agents for use in the system. Other alternatives would, however, be suitable such as banks, supermarkets, service stations or the like.
  • Figures 3 and 4 illustrate a typical key tag 14.
  • the key tag 14 would include a plastic or metal body 18, one side of which is moulded or printed with information in a field 20 with information advising a finder that a guaranteed reward would be paid on presentation of the tag to one of the agents 6.
  • the body 18 includes a hole 19 for a key ring 21 to which the keys 12 can be coupled in the usual way.
  • the tag 14 also includes encoding such as a bar code 22 which can be scanned by means of a bar code reader 24 at any one of the agents 6. Once the bar code 22 has been read at one of the agents 6, details are communicated to the central controller 4 and the above mentioned steps are initiated to enable return of the key tag and key to the customer 10.
  • encoding such as a bar code 22 which can be scanned by means of a bar code reader 24 at any one of the agents 6.
  • the first step would be for a prospective customer 10 to enter one of the premises of the agent 6 and fill out a form requesting registration of a key.
  • the customer's form would include contact details such as two telephone numbers and/or e-mail addresses which may be those of the customer (or another person) together with the location of a nominated agent where the keys are to be collected in the event that they are lost.
  • the agent then checks the data and if it appears to be complete, scans the bar code 22 of a tag 14 to be issued to the prospective customer 10.
  • the bar code is transmitted to the central controller via the link and the central controller 4 then checks to see if the tag to be issued has a valid bar code and ensures that the coded information is not already in use.
  • the central controller 4 then issues an identification number (IDN) which is transmitted to the agent 6 and this is marked on or otherwise associated with the form which has been filled out by the customer.
  • IDN identification number
  • the customer pays to the agent a premium which is an amount of say $40 or $50.
  • the agent 6 then transmits or sends the form and identification number (IDN) back to the central controller 4 so that further relevant details can be included in the database associated with the particular IDN.
  • IDN form and identification number
  • any finder need only take the key tag 14 and keys coupled thereto to any one of the participating agents 6 (hereinafter referred to as the "receiving agent").
  • the bar code on the tag is scanned and this information is transmitted to the central controller 4. If the coded information is indicative of a correctly registered key tag. the central controller site 4 initiates a series of steps which culminate in the keys being available for collection to the user.
  • the first step is to advise the receiving agent 6 that the key tag is valid whereupon the predetermined reward amount is immediately paid to the finder.
  • This amount may be any predetermined amount, usually less than the premium, say $20.
  • the central controller also advises the receiving agent of the identity of the nominated agent where the key tag and key are to be forwarded to for collection together with a discrete claim verification number of PIN can be collected.
  • the receiving agent then forwards the key tag and key to the nominated agent, together with the discrete claim verification number or PIN.
  • the central controller contacts the customer using the telephone numbers or e-mail addresses from the data base.
  • the central controller also provides the customer with the same discrete claim verification number or PIN so that the customer can quote the number or PIN in order to collect the key tag and key.
  • the customer would then need to enter into a new registration arrangement or pay a new prepaid fee in order to renew the registration contract.
  • finders of the key have a positive inducement to return the keys to one of the agents 6 because of the promise to immediately be paid a reasonable reward.
  • the agents preferably form part of a wide distribution network such as a post office, bank, service station or retail outlet chain so that finders of the keys can collect the reward without too much trouble. Normally the premium paid by the customer exceeds the value of the reward so that the central controller and agents can cover their operating costs and make a profit from operating the system.

Landscapes

  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A key registration method in which a lost key can be returned to a customer includes the steps of entering data regarding the identity of a customer into a database, issuing the customer with an encoded key tag, paying a reward to a finder of the key tag when the finder returns the key tag to a participating agent, reading or interpreting the encoded key tag whereby the identity of the customer is obtained from the database, and contacting the customer so that the key tag and any keys or other articles coupled thereto is returned to the customer.

Description

PERSONAL ITEM RECOVERY REWARD SYSTEM
This invention relates to a key registration system and method.
It is known to have systems established to facilitate return of lost keys to their rightful owners. One such system, which is sometimes used with hotel room keys, is to have a key tag which includes a message to the effect that if the keys are placed in a post box they will be returned to the hotel. Unfortunately there is not really much incentive for a finder of the keys to carry out the instructions on the key tag.
An object of the present invention is to provide a system and method whereby an incentive is provided to a finder of the key in order that it may be returned to its rightful owner.
According to the present invention there is provided a key registration method in which a lost key can be returned to a customer, the method including the steps of: entering data regarding the identity of a customer into a database, issuing the customer with an encoded key tag; paying a reward to a finder of the key tag when the finder returns the key tag to a participating agent; reading or interpreting the encoded key tag whereby the identity of the customer can be obtained from the database, and then contacting the customer so that the key tag and any keys or other articles coupled thereto can be returned to the customer.
In accordance with another aspect of the invention there is provided a key registration method in which a lost key can be returned to a customer, the method including the steps of entering data regarding the identity of a customer into a database maintained by a central controller; issuing to the customer at a participating agent an encoded key tag; accepting payment of a premium from the customer whereby, when a finder of the key tag returns the key tag to a participating agent, the encoded key tag is read or deciphered by the agent and the agent transmits information from the read or deciphered key tag to the central controller, comparing the transmitted information to entries in the database and, if correct, authorising the agent to pay a reward to the finder, allocating a PIN number, and contacting the customer and advising him or her of the PIN number whereby the customer can then reclaim the key at a nominated participating agent on presenting the PIN number to the nominated participating agent.
Preferably, the encoding on the key tag includes a bar code.
Preferably further, the key tag includes words which advise that a reward will be automatically paid on presentation of the key tag to a participating agent.
Preferably further, the premium paid by the customer is greater than the reward paid to the finder.
The invention also provides a key registration system including a central controller at which a database is maintained, a plurality of participating agents provided with bar code readers, a plurality of key tags which include bar codes and a communications network between the central controller and the participating agents, the arrangement being such that a bar coded key tag can be issued to a customer on payment of a premium whereupon a guaranteed reward can be paid to a finder of the key tag on return of the key tag to a participating agent.
The invention will now be further described with reference to the accompanying drawings, in which: Figure 1 is a block diagram of the system of the invention;
Figure 2 is a schematic illustration of the method of the invention; Figure 3 is one view of a key tag of the invention; and Figure 4 is another view of a key tag of the invention.
The key registration system 2 of the invention is diagrammatically illustrated in
Figure 1. It includes a central controller 4 which includes a computerised database facility (not shown). The central controller 4 is connected to a plurality of agents 6 by means of a telecommunications link 8. The telecommunications link 8 may be a direct cable link up, dial-up facility or secure Internet connection. Each of the agencies 6 is associated with a number of customers 10, each of whom have keys 12 which are to be entered into the registration system. Broadly speaking, the customers 10 register their personal details at one of the agencies 6 and are provided with a key tag 14 which is encoded with discrete data which identifies the particular customer 10. Details of the tag 14 and the identity of a customer 10 are communicated from the agent 6 over the communication link 8 to the central controller 4 where relevant details are entered into the database. If the customer 10 loses his or her key and key tag, any finder of the key and key tag 14, on taking the key and key tag 14 to any one of the agents 6, is paid a reward immediately after verification that the key tag 14 is correctly registered in the system. This acts as an inducement for a finder to return the tag and key to any one of the agents so as to collect the reward. Once a lost key has been returned to one of the agents 6, the tag is scanned in order to decode the coded information thereon and this is transmitted via the telecommunications link 8 to the central controller 4. The central controller 4 then advises the agent which received the lost key of the location of a preselected agent from which the lost key can be collected by the customer 10. The customer is also notified that the key has been handed in and can be collected at the preselected agent. For security reasons, the customer is given a password, PIN or the like which has also been provided to the preselected agent. When the customer arrives at the preselected agent it is necessary for him or her to quote the password, PIN or the like in order for the keys to be returned. Once the key has been returned, the customer would usually be required to re-register his or her keys in order to obtain a renewal of the key tag 14 or be issued with a new key tag 14.
The agents 6 are preferably part of a widely distributed network of existing agents, the location of which can be readily identified. Post offices, because of their wide distribution and public accessibility, would make ideal agents for use in the system. Other alternatives would, however, be suitable such as banks, supermarkets, service stations or the like. Figures 3 and 4 illustrate a typical key tag 14. Typically, the key tag 14 would include a plastic or metal body 18, one side of which is moulded or printed with information in a field 20 with information advising a finder that a guaranteed reward would be paid on presentation of the tag to one of the agents 6. The body 18 includes a hole 19 for a key ring 21 to which the keys 12 can be coupled in the usual way. The tag 14 also includes encoding such as a bar code 22 which can be scanned by means of a bar code reader 24 at any one of the agents 6. Once the bar code 22 has been read at one of the agents 6, details are communicated to the central controller 4 and the above mentioned steps are initiated to enable return of the key tag and key to the customer 10.
It will be appreciated by those skilled in the art that there would be a variety of ways in which details of the system could be implemented. Set out below is a preferred implementation of the system of the invention.
1. The first step would be for a prospective customer 10 to enter one of the premises of the agent 6 and fill out a form requesting registration of a key. The customer's form would include contact details such as two telephone numbers and/or e-mail addresses which may be those of the customer (or another person) together with the location of a nominated agent where the keys are to be collected in the event that they are lost.
2. The agent then checks the data and if it appears to be complete, scans the bar code 22 of a tag 14 to be issued to the prospective customer 10. The bar code is transmitted to the central controller via the link and the central controller 4 then checks to see if the tag to be issued has a valid bar code and ensures that the coded information is not already in use. The central controller 4 then issues an identification number (IDN) which is transmitted to the agent 6 and this is marked on or otherwise associated with the form which has been filled out by the customer.
3. The customer pays to the agent a premium which is an amount of say $40 or $50.
4. The agent 6 then transmits or sends the form and identification number (IDN) back to the central controller 4 so that further relevant details can be included in the database associated with the particular IDN.
5. Once the above steps are carried out, the registration process is completed and the customer is properly registered in the system.
6. If the key is lost, any finder need only take the key tag 14 and keys coupled thereto to any one of the participating agents 6 (hereinafter referred to as the "receiving agent"). At the receiving agent 6, the bar code on the tag is scanned and this information is transmitted to the central controller 4. If the coded information is indicative of a correctly registered key tag. the central controller site 4 initiates a series of steps which culminate in the keys being available for collection to the user.
7. The first step is to advise the receiving agent 6 that the key tag is valid whereupon the predetermined reward amount is immediately paid to the finder. This amount may be any predetermined amount, usually less than the premium, say $20.
8. The central controller also advises the receiving agent of the identity of the nominated agent where the key tag and key are to be forwarded to for collection together with a discrete claim verification number of PIN can be collected.
9. The receiving agent then forwards the key tag and key to the nominated agent, together with the discrete claim verification number or PIN.
10. The central controller contacts the customer using the telephone numbers or e-mail addresses from the data base. The central controller also provides the customer with the same discrete claim verification number or PIN so that the customer can quote the number or PIN in order to collect the key tag and key.
11. When the customer 10 calls at the nominated agent to collect the key tag and key, the customer must quote the correct claim verification password or PIN in order to have the keys returned to him or her.
12. Once the keys have been returned, that would conclude the transaction.
13. The customer would then need to enter into a new registration arrangement or pay a new prepaid fee in order to renew the registration contract.
The arrangement of the invention has a number of advantages. First, finders of the key have a positive inducement to return the keys to one of the agents 6 because of the promise to immediately be paid a reasonable reward. As stated above, the agents preferably form part of a wide distribution network such as a post office, bank, service station or retail outlet chain so that finders of the keys can collect the reward without too much trouble. Normally the premium paid by the customer exceeds the value of the reward so that the central controller and agents can cover their operating costs and make a profit from operating the system.
The invention has been described in relation to key tags to which keys can be attached but it will be appreciated that the principles of the invention are applicable to tags which can be connected to or manufactured in any private property, especially small articles of value.
Many modifications will be apparent to those skilled in the art without departing from the spirit and scope of the invention.

Claims

THE CLAIMS DEFINING THE INVENTION ARE AS FOLLOWS:
1. The invention also provides a key registration system including a central controller at which a database is maintained, a plurality of participating agents provided with bar code readers, a plurality of key tags which include bar codes and a communications network between the central controller and the participating agents, the arrangement being such that a bar coded key tag can be issued to a customer on payment of a premium whereupon a guaranteed reward can be paid to a finder of the key tag on return of the key tag to a participating agent.
PCT/AU2002/000875 2001-07-03 2002-07-03 Personal item recovery reward system WO2003005251A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPR6072A AUPR607201A0 (en) 2001-07-03 2001-07-03 A key registration system and method
AUPR6072 2001-07-03

Publications (2)

Publication Number Publication Date
WO2003005251A1 WO2003005251A1 (en) 2003-01-16
WO2003005251A9 true WO2003005251A9 (en) 2003-04-10

Family

ID=3830036

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2002/000875 WO2003005251A1 (en) 2001-07-03 2002-07-03 Personal item recovery reward system

Country Status (2)

Country Link
AU (1) AUPR607201A0 (en)
WO (1) WO2003005251A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2506844A (en) * 2012-09-03 2014-04-16 Gary Lavis Method for recovering lost keys and identity tag therefor
US20150269832A1 (en) * 2014-03-21 2015-09-24 John Candillier Systems and methods for facilitating the return of lost items to owners
US20150271127A1 (en) * 2014-03-21 2015-09-24 Rudy LelLouche Systems and methods for facilitating the return of lost items to owners
DE112018000705T5 (en) 2017-03-06 2019-11-14 Cummins Filtration Ip, Inc. DETECTION OF REAL FILTERS WITH A FILTER MONITORING SYSTEM

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5180192A (en) * 1990-04-30 1993-01-19 Herbert William S Lost personal accessory item identification and return method and articles
AU6914694A (en) * 1993-05-17 1994-12-12 Steal Guard Corporation System for tracking and coordinating the return of lost or stolen property
DE69533703T8 (en) * 1994-12-02 2006-04-27 Hitachi, Ltd. SYSTEM FOR RE-EFFECTING ELECTRONIC MONEY
US5809481A (en) * 1996-08-08 1998-09-15 David Baron Advertising method and system
JPH1131176A (en) * 1997-05-13 1999-02-02 Manabu Norinao Lost article recovery method

Also Published As

Publication number Publication date
WO2003005251A1 (en) 2003-01-16
AUPR607201A0 (en) 2001-07-26

Similar Documents

Publication Publication Date Title
US10726656B2 (en) Identification verification system
US8887997B2 (en) Method for making secure a transaction with a payment card, and center for authorizing implementation of said method
AU2001252615B2 (en) Method for attaching authentication bar code, authentication method, apparatus for attaching authentication bar code, authentication apparatus and portable terminal
US7093761B2 (en) System and method for distributing stored-value cards
MX2007004899A (en) Transaction system and method.
US20140052607A1 (en) Secure payment system using a mobile phone, and payment method using same
US20080007388A1 (en) Apparatus For Identification, Authorisation And/Or Notification
KR20070029577A (en) Deposit monitor system for game tokens
CN1443344A (en) Utility metering system incorporating transaction authorisation system
AU763262B2 (en) Electronic payment method
US20040024697A1 (en) Method and system for transferring money
CN107148634A (en) Integrate accumulation system, integration accumulation method and its NFC terminal devices
WO2006022580A1 (en) System for handling refund of value-added tax
US20060015395A1 (en) Automated parking system with interactive voice response
WO2003005251A9 (en) Personal item recovery reward system
CN101496029A (en) System and method for performing electronic transactions
KR20020006182A (en) Method of integrally managing and using a plurality of credit cards
AU2006349535A1 (en) A method and system for processing transactions
KR20070027076A (en) Transmission method of bar-code image with buying value to portable phones and system using thereof
EP1610249A1 (en) Method and system for real-time collection of data related to sales to the final consumer of durable and semidurable goods
AU761068B2 (en) Method for increasing the efficiency of trade
AU2002346258A1 (en) Personal item recovery reward system
EP2680206A2 (en) Secure payment system using a mobile phone, and payment method using same
US20040030642A1 (en) Method and arrangement for the transfer of an electronic sum of money from a credit store
JP2011013704A (en) Apparatus and method for automatic creation of product purchase history information

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
COP Corrected version of pamphlet

Free format text: PAGES 1-7, DESCRIPTION, REPLACED BY NEW PAGES 1-6; PAGE 8, CLAIMS, REPLACED BY A NEW PAGE 7; PAGES 1/3-3/3, DRAWINGS, REPLACED BY NEW PAGES 1/3-3/3; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

WWE Wipo information: entry into national phase

Ref document number: 2002346258

Country of ref document: AU

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: COMMUNICATION UNDER RULE 69 EPC (EPO FORM 1205A DATED 12.03.2004)

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP