WO2004077848A2 - Key control with real time communications to remote locations - Google Patents

Key control with real time communications to remote locations Download PDF

Info

Publication number
WO2004077848A2
WO2004077848A2 PCT/US2004/005098 US2004005098W WO2004077848A2 WO 2004077848 A2 WO2004077848 A2 WO 2004077848A2 US 2004005098 W US2004005098 W US 2004005098W WO 2004077848 A2 WO2004077848 A2 WO 2004077848A2
Authority
WO
WIPO (PCT)
Prior art keywords
mobile telephone
access
access request
lockbox
approval
Prior art date
Application number
PCT/US2004/005098
Other languages
French (fr)
Other versions
WO2004077848A3 (en
Inventor
Jay Despain
James Petrizzi
Casey Fale
Jonathon G. Hays
Original Assignee
Ge Interlogix, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ge Interlogix, Inc. filed Critical Ge Interlogix, Inc.
Priority to CA2516704A priority Critical patent/CA2516704C/en
Publication of WO2004077848A2 publication Critical patent/WO2004077848A2/en
Publication of WO2004077848A3 publication Critical patent/WO2004077848A3/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/0005Key safes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W74/00Wireless channel access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • H04W8/265Network addressing or numbering for mobility support for initial activation of new user

Definitions

  • This application relates to key control systems and methods, particularly those that include a lockbox located near a premise to which controlled access is to be permitted under specified conditions.
  • a lockbox sometimes referred to as a "keybox,” has a locked compartment within which a key to a conventional lock or other physical access device or asset can be stored.
  • the lockbox is positioned near a premise to which controlled access is desired, e.g., a home or other dwelling, a commercial building or site, or virtually any other type of premise, and a conventional key to open a lock securing the premise is stored within the locked compartment.
  • Lockboxes are widely used by real estate agents to facilitate the showing of listed properties. Lockboxes are also used in commercial and industrial settings to facilitate access to secured premises, particularly when the premises are otherwise unattended, such as in the case of accesses that take place after hours or at many geographically dispersed locations.
  • the lockboxes of primary interest here have electronically or electrically actuated locks that are capable of receiving unlocking signals transmitted wirelessly.
  • Such lockboxes may have, e.g., a receiver for an infrared, radio or other type of wireless signal.
  • the unlocking signals are sent by access devices, sometimes referred to as keys.
  • a person recognized as a key control system user can use her access device to transmit a request to access a premise within the system that is secured by a lockbox.
  • the system determines whether the user's access request is to be granted, and, if so, enables the user to unlock the lockbox and access its contents.
  • the lockbox contains a conventional key to the locked premise and the user uses the key to unlock the premise and gain physical access to it.
  • the system typically includes tracking capabilities that may record the user's identity, the time of the access request, the premise to which access is requested, etc.
  • the system may also include capabilities to communicate between a central authority and the user to convey information such as updates, messages, commands, etc.
  • a key control system includes at least one premise subject to authorized access by others based on preferences of an approval party, a lockbox having a locked area capable of securing a key for access to the premise and at least one mobile telephone associated with a user and having a stored access device program capable of communicating an access request to the lockbox.
  • the mobile telephone automatically initiates a communication to a destination predetermined by the approval party to seek approval of the access request and a decision is communicated to the mobile telephone.
  • the approval party can be a listing real estate agent, and the mobile telephone can initiate a communication to the listing agent via a data communication sent over the mobile telephone's wireless carrier network.
  • the destination to which the mobile telephone initiates a communication can include a central authority having a server receptive to communications from the mobile telephone over the mobile telephone's wireless carrier network.
  • the mobile telephone and the lockbox can be configured such that the access request from the mobile telephone to the lockbox is communicated wirelessly.
  • the wireless communication from the mobile telephone to the lockbox can include infrared communication.
  • the access request access is approved, information is communicated to the user via the mobile telephone to complete the approved access.
  • the user can receive an approval code capable of being entered via a keypad on the mobile telephone.
  • instructions indicating approval of the access request sent to mobile telephone can automatically interact with the access device program stored in the mobile telephone.
  • a key control system includes a lockbox having a locked area capable of securing a key for access to a premise, at least one mobile telephone assigned to a user and being programmed with an access device program capable of communicating an access request to the lockbox, and a central authority that administers at least privileges of users to access the lockbox and preferences of an approval party with rights to control access to the premise.
  • the central authority can include one or more computers, including a server, with connections capable of receiving communications from the user via the mobile telephone.
  • the central authority reviews the approval party's preferences associated with the premise.
  • the central authority determines that the approval party's preferences require approval of the access request, the central authority contacts the responsible party and seeks approval. If the central authority determines that the approval party's preferences do not require approval of the access request, the central authority processes the user's access request in accordance with stored user privileges, and the access request is granted if it is authorized.
  • the central authority communicates information to the user via the mobile telephone.
  • the information communicated to the user via the mobile telephone can include, e.g., a code and/or a voice message.
  • the information communicated to the user via the mobile telephone can include instructions that automatically interact with the program stored in the mobile telephone to make the access request effective.
  • the mobile telephone can be authorized to access the lockbox within a predetermined time period. Li other implementations, the mobile telephone can be authorized to access the lockbox exactly one time within the predetenrtined time period. If the access request is granted, the mobile telephone can be authorized to access at least one other different lockbox. If the access request is granted, the user can be granted access to the lockbox for a predetermined number of times. Of course, these different approaches to continued authorization can also be combined.
  • the central authority can send termination instructions to the mobile telephone effective to block access to the lockbox via the mobile telephone. The termination instructions supercede any granted access request.
  • the central authority can also administer communications to and from the user regarding operation of the system.
  • Fig. 1 is a conceptual network diagram showing a first embodiment of a key control system with real time communications features, in which a premise is secured by a lockbox, a user accesses the lockbox with a mobile phone and a central authority administers authorization to access the lock box and communication to a responsible party.
  • Fig. 2 is a conceptual diagram similar to Fig. 1, except showing a second embodiment of a key control system without a central authority.
  • Fig. 3 is a flow chart of a first method showing acts by a user seeking to visit a secured premise.
  • Fig. 4 is another flow chart of a second method showing acts by a user seeking to visit a secured premise.
  • Figs. 5 A to 5N are flow charts showing various aspects of exemplary mobile telephone functions, including screen displays that may be provided to orient the user.
  • a key control system in which at least one premise is secured by a lockbox securing the key to the premise, there is a least one mobile telephone associated with a user seeking to access the lock box and programmed with the capability to make an access request to the lockbox, and, if specified, the user's mobile telephone communicates with an approval party, preferably during the access request to the lock box, to seek approval of the access request. If approval is granted, and assuming the user is otherwise authorized to access the premise, a communication to the mobile telephone or the lockbox allows the access process to continue.
  • the process of seeking approval occurs without burdensome delays and "substantially in real time.”
  • the process of requesting and receiving approval (or denial) can be completed in 30 seconds or less. Substantial benefits are achieved even if the process takes longer (even 60 seconds or 120 seconds), e.g., due to some equipment or communications traffic.
  • lockboxes may be open to all authorized accesses without constraints, such as, e.g., the time of day for the requested access or who is present to accompany the user during the visit to the premise.
  • the only requirement is that the user be authorized, e.g., being recognized as user within the key control system and/or having up-to-date credentials for the type of access being requested. Assuming the user is authorized, the user simply makes the access request with his mobile telephone, which typically requires entry of a PIN or other similar code, and the lockbox is unlocked to allow the user to access the key to the premise.
  • lockboxes there may be circumstances in which a lockbox "open to all authorized accesses" does not provide sufficient control, such as, e.g., over who is making the access, when the access is being made or under what circumstances the access is occurring.
  • access activity such as the identity of the user, the identification of the access device, the time the access or access attempt was made and other such information (duration of access, purpose of access, actions during access, etc.)
  • access activity information is generally only available some time after the access is completed.
  • interested parties may not learn of an access to a particular premise until the system update, which may occur only at daily intervals.
  • CBS Call Before Showing
  • the party requesting access was required to "call” the responsible party (and obtain approval) "before” the premise was "shown” (i.e., before the lockbox was successfully unlocked).
  • This arrangement could be the source of frustrating delays and missed opportunities because the showing agent (or other requesting user) would be required to plan in advance to contact (usually by telephone) the listing agent (or other approval party) before the expected access time, in the hopes of receiving pre-approval. If the approval party could not be reached in time, however, the process of planning for a future access would have to be repeated.
  • Fig. 1 illustrates a first embodiment of a key control system 10.
  • the system 10 includes at least one premise 12 that is secured with a lockbox 14 having a locked area 16 in which a key 18 to the premise 12 is stored.
  • the system 10 also includes a central authority 20 and at least one user, represented by a mobile telephone 22 assigned to the user.
  • the central authority 20 and the mobile telephone 22 can communicate with each other over a wireless service network 24.
  • An approval party 26 can also communicate with the mobile telephone 22 and/or the central authority 20 over the wireless service network 24.
  • the central authority 20 and the approval party 26 are remotely located from each other (there may be circumstances, for instance, in which the approval party is at the premise or is at the central authority).
  • the central authority 20 administers the access privileges of users and the access preferences of approval parties for premises and lockboxes within the system 10.
  • the central authority 20 includes one or more computers or servers with appropriate communications equipment for communications over at least the wireless service network, and possibly other public and/or private networks.
  • the central authority typically includes a database, which typically includes an identification of each user, her status, the mobile telephone assigned to the user, each premise within the system and its status, and each lock box within the system and its status, etc. Through communication links, the central authority 20 may optionally provide other services, including informational updates, programming updates, and references.
  • the mobile telephone 22 is typically a cellular telephone, a satellite telephone or similar portable wireless communications device with at least a voice channel for communicating within or among wireless service networks, such as the wireless service network 24.
  • a device such as a combined personal digital assistant and cellular telephone, although not necessary, could be used.
  • networks that support at least one data channel in addition to the voice channel provide enhanced capabilities.
  • GSM and CDMA are forms of wireless communication technologies. Each provides a different method of carrying data (or voice) from its source phone or computer to its destination phone or computer.
  • GSM Global System for Mobile communication
  • GSM Global System for Mobile communication
  • GSM Global System for Mobile communication
  • GSM uses a variation of TDMA and is the most widely used of all three digital wireless telephone technologies.
  • GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot TDMA (Time Division Multiple Access), which is used in GSM, is a technology which divides each cellular channel into three slots in order to increase the amount of data that can be carried on a particular channel at a particular time.
  • CDMA Code Division Multiple Access
  • TDMA and GSM after the data is digitized, it is spreads out over the entire bandwidth available (unlike GSM and TDMA which place the calls side by side in three streams). Multiple calls are then overlapped on top of each other, and each is assigned a unique sequencing code to "unlock" the information only when and where it should be unlocked.
  • AMPS Advanced Mobile Phone System
  • GPRS General Packet Radio Services
  • GPRS is a packet-based wireless communication service that purports to support data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. Among other features, the higher data rates will allow users to take part in video conferences and interact with multimedia Web sites and similar applications using mobile handheld devices as well as notebook computers.
  • GPRS is based on GSM and will complement existing services such circuit-switched cellular phone connections and SMS (Short Message Service).
  • lxRTT is the abbreviation for single carrier (lx) radio transmission technology, a 3G wireless technology based on the CDMA platform. lxRTT has the capability of providing ISDN-like speeds of up to 144 Kbps. lxRTT is also referred to as CDMA2000.
  • the mobile telephone 22 is programmed to function as an access device.
  • the mobile telephone 22 is programmed with an application that allows it to communicate wirelessly with the lockbox 14.
  • the mobile telephone 22 and the lockbox 14 can have transceivers and associated circuitry to enable infrared (IR) or other form of optical communication when within proximity of each other.
  • IR infrared
  • One suitable infrared communication protocol is the IrDa standard.
  • Various security features such as requiring PIN code entry upon attempts to make access requests and challenge/response schemes, can be implemented if desired.
  • the access device application may be stored on that element. Alternatively, part or all of the application may be stored in the permanent or dedicated memory of the mobile telephone 22.
  • Communication established between the mobile telephone 22 and the lockbox 14 is referred to as communication over a "first" communications link 28.
  • a “second" communications link representing communications to and from the mobile telephone 22 over the wireless service network 24.
  • the second communications link is the link 30 between the mobile telephone 22 and the central authority 20 over the wireless service network 24.
  • the second communications link is the link 32 between the mobile telephone 22 and the approval party 26 over the wireless service network 24.
  • Fig. 1 shows an optional communications link 34 to indicate that at least one other party, referred to here as an "interested party," may have communications capability within the system.
  • the interested party could be a second approval party or a party seeking to monitor some or all of the access activity at the premise.
  • the communications links 30, 32 and 34 can include communications over the Internet and other types of public and private networks.
  • the mobile telephone 22 communicating over the wireless service network 24 via the communication link 30 to the central authority may effect the communication through connection to a web site operated by the central authority.
  • one implementation of a real time access request approval method begins with the user being in proximity of a secured premise within the system 10, such as the premise 12, that she is interested in visiting (step 40).
  • the user locates the lockbox 14 and uses the mobile telephone 22 to establish the first communications link 28 (step 42).
  • the access device application may provide a menu of options displayed on the mobile telephone's display, such as an option indicating "Obtain Key.” By selecting "Obtain Key” and positioning the mobile telephone 22 for communication with the lock box 14, the user makes her access request to the lockbox 14 (step 44).
  • the lockbox 14 responds to the access request by unlocking, thereby allowing the user to obtain the key 18 from the secured area 16 and to visit the premise 12.
  • the second communications link is the link 32 from the mobile telephone 22 to the approval party 26.
  • the approval party 26 may specify that it requires a real time communication to grant approval, or it may be set to provide approval in other ways, such as through an automated message over set times pre-approved for accesses.
  • the second communications link is the link 30 from the mobile telephone 22 to the central authority 20.
  • the approval process may be based on the approval party's preferences for access stored by the central authority 20.
  • the approval party's preferences may require the central authority 20 to establish communication with the approval party 26 at the time of the request for approval of the access request, or the central authority may be able to process the access request according based on preferences granting approval of all requests by certain users or all access requests at certain times of the day.
  • Fig. 4 is another implementation of an access request method allowing substantially real time approval of an access request.
  • the user is in proximity of a secured premise within the system 10, such as the premise 12, that she is interested in visiting.
  • the user locates the lockbox 14 and uses the mobile telephone 22 to establish the first communications link 28.
  • step 56 the mobile telephone automatically establishes a second communications link with the central authority.
  • This second communications link can be established in the case of all access requests, as in the method illustrated in Fig. 4, or only for selected access requests (based on, e.g., the particular user, the particular lockbox, etc.
  • the second communications link can be established via a data service channel for data transmission supported by the mobile telephone and the wireless service network 24.
  • Such transmissions offer certain benefits, such as increased communications speed and standardized content, which facilitates subsequent processing.
  • the central authority 20 processes the access request.
  • the central authority determines if the user's access request is authorized. For example, the central authority may determine whether the user is recognized within the system 10, whether the user has up-to-date credentials for the access being requested, etc. If the user is not authorized, an optional communication to that effect may be communicated for display on the mobile telephone 22 (step 62), and the process is ended.
  • the central authority 20 determines whether the access request requires approval (step 64). If no approval is required, the access request is granted, which may include an optional communication of a message to that effect for display on the mobile telephone 22 (step 66). In step 68, the central authority then communicates an access code or instruction to the mobile telephone.
  • the access code or instruction may be communicated in any suitable manner, including by a live or recorded voice transmission or by a communication resulting in display of the access code on the mobile telephone 22 for manual entry on a keypad on the mobile telephone 22 or the lockbox 14.
  • the communication in step 68 may also occur as a data transmission directly to the mobile telephone 22, or further, through the telephone 22 and to the lockbox 14 via the first communications link, which expedites the access request process and reduces the chance of human error.
  • the central authority 20 attempts to establish communication with the approval party in accordance with the approval party's stored preferences (step 70).
  • the communication may occur in any form, including a telephone call to a predetermined number, a data channel communication delivered to a predetermined number, an e-mail communication, etc.
  • the request for approval of the access request is considered.
  • the approval party's preferences may require real time communication and approval, or certain accesses may be pre-approved.
  • step 74 If approval of the access request is granted (step 74), the process proceeds to steps 66 and 68. It should be noted that the order of determining a user's general authorization (which occurs first in the illustrated methods) and determining whether the requested access requires separate approval (which occurs subsequently in the illustrated methods), can be reversed.
  • step 76 If approval of the access request is not granted (step 76), access is denied (step 78), and the process is ended.
  • An optional communication to that effect may be communicated for display on the mobile telephone 22.
  • the mobile telephone may remain authorized to access the same lockbox or additional lockboxes for a given time period, e.g., eight hours, following authorization.
  • the mobile telephone may remain authorized for a predetermined number of access requests to the same lockbox or multiple lockboxes within the system. Combinations of these variations are also possible.
  • the mobile telephone may be preauthorized, e.g., as a result of the periodic updating procedure in which the mobile telephone or a special authorization.
  • Periodic updating procedures include "synching," i.e., establishing communication between the mobile telephone and another entity and updating data stored in each entity that has changed since the last update.
  • the mobile telephone uploads various information, including the lockbox settings, the mobile telephone authorization information, access activity information, showing feedback information and/or diagnostic information.
  • the central authority can download key authorization information, access information for specific lockboxes, showing feedback information for specific lockboxes, messages, changes in the system's user roster and/or listing information. If the mobile telephone is preauthorized with respect to the access request being made, the implementations described above need only include determining whether approval of the access request is required.
  • the use of the data service channel of the wireless service of the mobile telephone facilitates carrying out updating procedures wirelessly and substantially in real time.
  • updating procedures were restricted to a specified after-hours time and occurred through a wired connection, via a modem at the user's home or office computer.
  • the mobile telephone can be programmed to automatically establish communication for an updating procedure (1) at a predetermined time, (2) when the mobile telephone is powered ON, and/or (3) when the mobile telephone reenters the coverage area of the wireless service network.
  • variations of the above implementations for making an access request can include some or all steps of an updating procedure.
  • This feature might be used in the case of learning that a user has just lost her privileges or the user's mobile telephone is being used by an imposter who also has her other credentials (e.g., the PIN or other code) allowing use of the mobile telephone as an access device.
  • Use of the real time termination instructions feature would be programmed to supercede any previously granted authorization.
  • Figs. 5 A to 5N are flow charts showing various aspects of the mobile telephone access device program functions according to one exemplary embodiment. These figures also include representative mobile telephone screen displays that may be provided to orient the user during use of telephone as an access device.
  • the mobile telephone is referred to as the "Key”
  • the lockbox is referred to as the "Keybox.”
  • Figs. 5A to 5N show the following aspects of a program 100: application start and main menu (Figs. 5 A and 5B); obtain key operation (Fig. 5C); IR communication (Fig. 5D); update code operation (Fig. 5E); release shackle operation (Fig. 5F); low battery warning operation (Fig. 5G); call before showing code operation (Fig. 5H); read lockbox activity operation (Figs. 51 and 5J); diagnostics operation (Fig. 5K); programming operation (Fig. 5L); messages operation (Fig. 5M); and clear lockbox operation (Fig. 5N).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A key control system includes at least one premise (12) , a lockbox (14) capable of securing a key (18) to the premise (12) and at least one mobile telephone (22) associated with a user and having a stored access device program capable of communicating an access request to the lockbox (14). The premise (12) is subject to authorized access by others, such as the user, based on preferences of an approval party (26) established with the system. Dependent upon these preferences, the mobile telephone (22) automatically initiates a communication to a destination predetermined by the approval party (26) to seek approval of the access request, and a decision is communicated to the mobile telephone (22).

Description

KEY CONTROL WITH REAL TIME COMMUNICATIONS TO REMOTE LOCATIONS
Related Application This application claims the benefit of U.S. Provisional Patent Application
No. 60/449,023, filed February 21 , 2003.
Field
This application relates to key control systems and methods, particularly those that include a lockbox located near a premise to which controlled access is to be permitted under specified conditions.
Background
A lockbox, sometimes referred to as a "keybox," has a locked compartment within which a key to a conventional lock or other physical access device or asset can be stored. In typical uses, the lockbox is positioned near a premise to which controlled access is desired, e.g., a home or other dwelling, a commercial building or site, or virtually any other type of premise, and a conventional key to open a lock securing the premise is stored within the locked compartment. Lockboxes are widely used by real estate agents to facilitate the showing of listed properties. Lockboxes are also used in commercial and industrial settings to facilitate access to secured premises, particularly when the premises are otherwise unattended, such as in the case of accesses that take place after hours or at many geographically dispersed locations.
The lockboxes of primary interest here have electronically or electrically actuated locks that are capable of receiving unlocking signals transmitted wirelessly. Such lockboxes may have, e.g., a receiver for an infrared, radio or other type of wireless signal. The unlocking signals are sent by access devices, sometimes referred to as keys.
A person recognized as a key control system user can use her access device to transmit a request to access a premise within the system that is secured by a lockbox. In general terms, the system determines whether the user's access request is to be granted, and, if so, enables the user to unlock the lockbox and access its contents. In a typical scenario, the lockbox contains a conventional key to the locked premise and the user uses the key to unlock the premise and gain physical access to it.
The system typically includes tracking capabilities that may record the user's identity, the time of the access request, the premise to which access is requested, etc. The system may also include capabilities to communicate between a central authority and the user to convey information such as updates, messages, commands, etc.
In conventional key control systems, however, establishing substantially real time wireless communications, such a link with a remotely located party, is not feasible, particularly where two-way communications are desired.
Summary
According to one implementation, a key control system includes at least one premise subject to authorized access by others based on preferences of an approval party, a lockbox having a locked area capable of securing a key for access to the premise and at least one mobile telephone associated with a user and having a stored access device program capable of communicating an access request to the lockbox. Depending upon the preferences established by the approval party, the mobile telephone automatically initiates a communication to a destination predetermined by the approval party to seek approval of the access request and a decision is communicated to the mobile telephone.
The approval party can be a listing real estate agent, and the mobile telephone can initiate a communication to the listing agent via a data communication sent over the mobile telephone's wireless carrier network. The destination to which the mobile telephone initiates a communication can include a central authority having a server receptive to communications from the mobile telephone over the mobile telephone's wireless carrier network.
The mobile telephone and the lockbox can be configured such that the access request from the mobile telephone to the lockbox is communicated wirelessly. The wireless communication from the mobile telephone to the lockbox can include infrared communication.
If the access request access is approved, information is communicated to the user via the mobile telephone to complete the approved access. For example, the user can receive an approval code capable of being entered via a keypad on the mobile telephone. As another example, instructions indicating approval of the access request sent to mobile telephone can automatically interact with the access device program stored in the mobile telephone.
According to another implementation, a key control system includes a lockbox having a locked area capable of securing a key for access to a premise, at least one mobile telephone assigned to a user and being programmed with an access device program capable of communicating an access request to the lockbox, and a central authority that administers at least privileges of users to access the lockbox and preferences of an approval party with rights to control access to the premise. The central authority can include one or more computers, including a server, with connections capable of receiving communications from the user via the mobile telephone. In response to an access request by the user via the mobile telephone to unlock the lockbox, the central authority reviews the approval party's preferences associated with the premise. If the central authority determines that the approval party's preferences require approval of the access request, the central authority contacts the responsible party and seeks approval. If the central authority determines that the approval party's preferences do not require approval of the access request, the central authority processes the user's access request in accordance with stored user privileges, and the access request is granted if it is authorized.
In some implementations, if the access request is granted, the central authority communicates information to the user via the mobile telephone. The information communicated to the user via the mobile telephone can include, e.g., a code and/or a voice message. The information communicated to the user via the mobile telephone can include instructions that automatically interact with the program stored in the mobile telephone to make the access request effective.
If the access request is granted, the mobile telephone can be authorized to access the lockbox within a predetermined time period. Li other implementations, the mobile telephone can be authorized to access the lockbox exactly one time within the predetenrtined time period. If the access request is granted, the mobile telephone can be authorized to access at least one other different lockbox. If the access request is granted, the user can be granted access to the lockbox for a predetermined number of times. Of course, these different approaches to continued authorization can also be combined. The central authority can send termination instructions to the mobile telephone effective to block access to the lockbox via the mobile telephone. The termination instructions supercede any granted access request. The central authority can also administer communications to and from the user regarding operation of the system.
Brief Description of Drawings
Fig. 1 is a conceptual network diagram showing a first embodiment of a key control system with real time communications features, in which a premise is secured by a lockbox, a user accesses the lockbox with a mobile phone and a central authority administers authorization to access the lock box and communication to a responsible party. Fig. 2 is a conceptual diagram similar to Fig. 1, except showing a second embodiment of a key control system without a central authority.
Fig. 3 is a flow chart of a first method showing acts by a user seeking to visit a secured premise. Fig. 4 is another flow chart of a second method showing acts by a user seeking to visit a secured premise.
Figs. 5 A to 5N are flow charts showing various aspects of exemplary mobile telephone functions, including screen displays that may be provided to orient the user.
Detailed Description
Described below are implementations of a key control system in which at least one premise is secured by a lockbox securing the key to the premise, there is a least one mobile telephone associated with a user seeking to access the lock box and programmed with the capability to make an access request to the lockbox, and, if specified, the user's mobile telephone communicates with an approval party, preferably during the access request to the lock box, to seek approval of the access request. If approval is granted, and assuming the user is otherwise authorized to access the premise, a communication to the mobile telephone or the lockbox allows the access process to continue.
The process of seeking approval occurs without burdensome delays and "substantially in real time." In described, implementations, the process of requesting and receiving approval (or denial) can be completed in 30 seconds or less. Substantial benefits are achieved even if the process takes longer (even 60 seconds or 120 seconds), e.g., due to some equipment or communications traffic.
In the real estate context, some lockboxes may be open to all authorized accesses without constraints, such as, e.g., the time of day for the requested access or who is present to accompany the user during the visit to the premise. For such a lockbox subject to open access, the only requirement is that the user be authorized, e.g., being recognized as user within the key control system and/or having up-to-date credentials for the type of access being requested. Assuming the user is authorized, the user simply makes the access request with his mobile telephone, which typically requires entry of a PIN or other similar code, and the lockbox is unlocked to allow the user to access the key to the premise.
For other lockboxes, however, there may be circumstances in which a lockbox "open to all authorized accesses" does not provide sufficient control, such as, e.g., over who is making the access, when the access is being made or under what circumstances the access is occurring. Although conventional systems provide for logging of access activity, such as the identity of the user, the identification of the access device, the time the access or access attempt was made and other such information (duration of access, purpose of access, actions during access, etc.), such access activity information is generally only available some time after the access is completed. In some systems, interested parties may not learn of an access to a particular premise until the system update, which may occur only at daily intervals. Within the real estate context, some conventional key control systems provide a "Call Before Showing" (CBS) feature. If a premise is listed with this designation, it is understood that approval from the listing agent was required, i.e., the party requesting access was required to "call" the responsible party (and obtain approval) "before" the premise was "shown" (i.e., before the lockbox was successfully unlocked). This arrangement could be the source of frustrating delays and missed opportunities because the showing agent (or other requesting user) would be required to plan in advance to contact (usually by telephone) the listing agent (or other approval party) before the expected access time, in the hopes of receiving pre-approval. If the approval party could not be reached in time, however, the process of planning for a future access would have to be repeated. In addition, changes in the CBS status of a premise would not be reflected until the next system update, so a need to change a premise from "open to all authorized accesses" to CBS would not be reflected in the same day. If approval was granted, the requested user would have to accurately note and manually input a CBS code. Fig. 1 illustrates a first embodiment of a key control system 10. The system 10 includes at least one premise 12 that is secured with a lockbox 14 having a locked area 16 in which a key 18 to the premise 12 is stored. As shown, the system 10 also includes a central authority 20 and at least one user, represented by a mobile telephone 22 assigned to the user. The central authority 20 and the mobile telephone 22 can communicate with each other over a wireless service network 24. An approval party 26 can also communicate with the mobile telephone 22 and/or the central authority 20 over the wireless service network 24. Typically, but not necessarily, the premise 12, the central authority 20 and the approval party 26 are remotely located from each other (there may be circumstances, for instance, in which the approval party is at the premise or is at the central authority). The central authority 20 administers the access privileges of users and the access preferences of approval parties for premises and lockboxes within the system 10. The central authority 20 includes one or more computers or servers with appropriate communications equipment for communications over at least the wireless service network, and possibly other public and/or private networks. The central authority typically includes a database, which typically includes an identification of each user, her status, the mobile telephone assigned to the user, each premise within the system and its status, and each lock box within the system and its status, etc. Through communication links, the central authority 20 may optionally provide other services, including informational updates, programming updates, and references. The mobile telephone 22 is typically a cellular telephone, a satellite telephone or similar portable wireless communications device with at least a voice channel for communicating within or among wireless service networks, such as the wireless service network 24. For example, a device such as a combined personal digital assistant and cellular telephone, although not necessary, could be used. Advantageously, networks that support at least one data channel in addition to the voice channel provide enhanced capabilities. Two such cellular networks, as well as their associated cellular telephone handsets and communications protocols, are referred to as GPRS over GSM and lxRTT over CDMA. Of course, other similar networks, whether they exist currently or will be developed in the future, can also be used. GSM and CDMA, as well as TDMA and AMPS, are forms of wireless communication technologies. Each provides a different method of carrying data (or voice) from its source phone or computer to its destination phone or computer. GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used around the world (especially in Europe). GSM uses a variation of TDMA and is the most widely used of all three digital wireless telephone technologies. GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot TDMA (Time Division Multiple Access), which is used in GSM, is a technology which divides each cellular channel into three slots in order to increase the amount of data that can be carried on a particular channel at a particular time. In CDMA (Code Division Multiple Access), unlike TDMA and GSM, after the data is digitized, it is spreads out over the entire bandwidth available (unlike GSM and TDMA which place the calls side by side in three streams). Multiple calls are then overlapped on top of each other, and each is assigned a unique sequencing code to "unlock" the information only when and where it should be unlocked. AMPS (Advanced Mobile Phone System) is the original standard for cellular products.
GPRS (General Packet Radio Services) is a packet-based wireless communication service that purports to support data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. Among other features, the higher data rates will allow users to take part in video conferences and interact with multimedia Web sites and similar applications using mobile handheld devices as well as notebook computers. GPRS is based on GSM and will complement existing services such circuit-switched cellular phone connections and SMS (Short Message Service). lxRTT is the abbreviation for single carrier (lx) radio transmission technology, a 3G wireless technology based on the CDMA platform. lxRTT has the capability of providing ISDN-like speeds of up to 144 Kbps. lxRTT is also referred to as CDMA2000.
The mobile telephone 22 is programmed to function as an access device. In exemplary implementations, the mobile telephone 22 is programmed with an application that allows it to communicate wirelessly with the lockbox 14. For example, the mobile telephone 22 and the lockbox 14 can have transceivers and associated circuitry to enable infrared (IR) or other form of optical communication when within proximity of each other. One suitable infrared communication protocol is the IrDa standard. Various security features, such as requiring PIN code entry upon attempts to make access requests and challenge/response schemes, can be implemented if desired.
If the mobile telephone 22 has a removable memory element, e.g., such as a SIMM card, the access device application may be stored on that element. Alternatively, part or all of the application may be stored in the permanent or dedicated memory of the mobile telephone 22.
Communication established between the mobile telephone 22 and the lockbox 14 is referred to as communication over a "first" communications link 28. There is a "second" communications link representing communications to and from the mobile telephone 22 over the wireless service network 24. In the implementation of Fig. 1, the second communications link is the link 30 between the mobile telephone 22 and the central authority 20 over the wireless service network 24. In the implementation of Fig. 2, the second communications link is the link 32 between the mobile telephone 22 and the approval party 26 over the wireless service network 24.
Fig. 1 shows an optional communications link 34 to indicate that at least one other party, referred to here as an "interested party," may have communications capability within the system. The interested party could be a second approval party or a party seeking to monitor some or all of the access activity at the premise. It should be noted that the communications links 30, 32 and 34 can include communications over the Internet and other types of public and private networks. For example, the mobile telephone 22 communicating over the wireless service network 24 via the communication link 30 to the central authority may effect the communication through connection to a web site operated by the central authority. Also, there is an optional communications link 33 representing communications to and from the lockbox 14 over the wireless service network 24. If the lockbox 14 is provided with appropriate communications circuitry, the lockbox can 14 can perform some of the communications functions typically performed by the mobile phone 22, or may perform additional communications functions, e.g., to enhance security and/or the access activity information available within the system 10.
Referring to the flowchart of Fig. 3, one implementation of a real time access request approval method begins with the user being in proximity of a secured premise within the system 10, such as the premise 12, that she is interested in visiting (step 40). The user locates the lockbox 14 and uses the mobile telephone 22 to establish the first communications link 28 (step 42). According to one implementation, the access device application may provide a menu of options displayed on the mobile telephone's display, such as an option indicating "Obtain Key." By selecting "Obtain Key" and positioning the mobile telephone 22 for communication with the lock box 14, the user makes her access request to the lockbox 14 (step 44).
Assuming that the user is authorized and no additional approval is recognized, the lockbox 14 responds to the access request by unlocking, thereby allowing the user to obtain the key 18 from the secured area 16 and to visit the premise 12.
If the premise 12 is recognized as requiring additional approval before an access (step 46), however, access is not provided until the mobile telephone establishes a second communications link with an approval party (step 48) and approval is granted. In some implementations, the second communications link is the link 32 from the mobile telephone 22 to the approval party 26. The approval party 26 may specify that it requires a real time communication to grant approval, or it may be set to provide approval in other ways, such as through an automated message over set times pre-approved for accesses.
In other implementations, the second communications link is the link 30 from the mobile telephone 22 to the central authority 20. The approval process may be based on the approval party's preferences for access stored by the central authority 20. The approval party's preferences may require the central authority 20 to establish communication with the approval party 26 at the time of the request for approval of the access request, or the central authority may be able to process the access request according based on preferences granting approval of all requests by certain users or all access requests at certain times of the day.
Fig. 4 is another implementation of an access request method allowing substantially real time approval of an access request. In step 50, the user is in proximity of a secured premise within the system 10, such as the premise 12, that she is interested in visiting. In step 52, the user locates the lockbox 14 and uses the mobile telephone 22 to establish the first communications link 28.
In step 56, the mobile telephone automatically establishes a second communications link with the central authority. This second communications link can be established in the case of all access requests, as in the method illustrated in Fig. 4, or only for selected access requests (based on, e.g., the particular user, the particular lockbox, etc.
Advantageously, the second communications link can be established via a data service channel for data transmission supported by the mobile telephone and the wireless service network 24. Such transmissions offer certain benefits, such as increased communications speed and standardized content, which facilitates subsequent processing. In step 58, the central authority 20 processes the access request. In step 60, the central authority determines if the user's access request is authorized. For example, the central authority may determine whether the user is recognized within the system 10, whether the user has up-to-date credentials for the access being requested, etc. If the user is not authorized, an optional communication to that effect may be communicated for display on the mobile telephone 22 (step 62), and the process is ended.
If the user is authorized, the central authority 20 determines whether the access request requires approval (step 64). If no approval is required, the access request is granted, which may include an optional communication of a message to that effect for display on the mobile telephone 22 (step 66). In step 68, the central authority then communicates an access code or instruction to the mobile telephone. The access code or instruction may be communicated in any suitable manner, including by a live or recorded voice transmission or by a communication resulting in display of the access code on the mobile telephone 22 for manual entry on a keypad on the mobile telephone 22 or the lockbox 14. The communication in step 68 may also occur as a data transmission directly to the mobile telephone 22, or further, through the telephone 22 and to the lockbox 14 via the first communications link, which expedites the access request process and reduces the chance of human error.
Assuming approval of the access request is required, the central authority 20 attempts to establish communication with the approval party in accordance with the approval party's stored preferences (step 70). The communication may occur in any form, including a telephone call to a predetermined number, a data channel communication delivered to a predetermined number, an e-mail communication, etc. In step 72, the request for approval of the access request is considered. As in the case of the Fig. 3 methods, the approval party's preferences may require real time communication and approval, or certain accesses may be pre-approved.
If approval of the access request is granted (step 74), the process proceeds to steps 66 and 68. It should be noted that the order of determining a user's general authorization (which occurs first in the illustrated methods) and determining whether the requested access requires separate approval (which occurs subsequently in the illustrated methods), can be reversed.
If approval of the access request is not granted (step 76), access is denied (step 78), and the process is ended. An optional communication to that effect may be communicated for display on the mobile telephone 22.
The above implementations are described as requiring the user to obtain authorization for each access request. Several variations on these implementations are possible. First, the mobile telephone may remain authorized to access the same lockbox or additional lockboxes for a given time period, e.g., eight hours, following authorization.
Alternatively, the mobile telephone may remain authorized for a predetermined number of access requests to the same lockbox or multiple lockboxes within the system. Combinations of these variations are also possible.
In addition, the mobile telephone may be preauthorized, e.g., as a result of the periodic updating procedure in which the mobile telephone or a special authorization.
Periodic updating procedures include "synching," i.e., establishing communication between the mobile telephone and another entity and updating data stored in each entity that has changed since the last update. During updating procedures in the real estate context, the mobile telephone uploads various information, including the lockbox settings, the mobile telephone authorization information, access activity information, showing feedback information and/or diagnostic information. During the same procedures, the central authority can download key authorization information, access information for specific lockboxes, showing feedback information for specific lockboxes, messages, changes in the system's user roster and/or listing information. If the mobile telephone is preauthorized with respect to the access request being made, the implementations described above need only include determining whether approval of the access request is required.
The use of the data service channel of the wireless service of the mobile telephone facilitates carrying out updating procedures wirelessly and substantially in real time. In prior systems, such updating procedures were restricted to a specified after-hours time and occurred through a wired connection, via a modem at the user's home or office computer. Thus, if a user misses a periodic updating procedure, the user may be able to initiate an updating procedure at another convenient time while out in the field and within the coverage area of the wireless service network. Advantageously, the mobile telephone can be programmed to automatically establish communication for an updating procedure (1) at a predetermined time, (2) when the mobile telephone is powered ON, and/or (3) when the mobile telephone reenters the coverage area of the wireless service network. In certain circumstances, variations of the above implementations for making an access request can include some or all steps of an updating procedure.
It is also possible to require the user to enter information, e.g., feedback information about a premise, before allowing the access request to be processed further.
Under certain circumstances, it is desirable to have the capability to establish a communications link with the mobile telephone and send termination instructions effective to prevent the mobile telephone from being used to gain access, either permanently or for a predetermined time period. This feature might be used in the case of learning that a user has just lost her privileges or the user's mobile telephone is being used by an imposter who also has her other credentials (e.g., the PIN or other code) allowing use of the mobile telephone as an access device. Use of the real time termination instructions feature would be programmed to supercede any previously granted authorization.
Although the above implementations refer primarily to infrared communication between the mobile telephone and lockbox, other types of wireless communication, e.g., RFS Bluetooth, cellular, etc., may be used. Although the above implementations refer to a lockbox, the principles apply equally to any other device having an electronic lock.
Figs. 5 A to 5N are flow charts showing various aspects of the mobile telephone access device program functions according to one exemplary embodiment. These figures also include representative mobile telephone screen displays that may be provided to orient the user during use of telephone as an access device. In these figures, the mobile telephone is referred to as the "Key," and the lockbox is referred to as the "Keybox." Figs. 5A to 5N show the following aspects of a program 100: application start and main menu (Figs. 5 A and 5B); obtain key operation (Fig. 5C); IR communication (Fig. 5D); update code operation (Fig. 5E); release shackle operation (Fig. 5F); low battery warning operation (Fig. 5G); call before showing code operation (Fig. 5H); read lockbox activity operation (Figs. 51 and 5J); diagnostics operation (Fig. 5K); programming operation (Fig. 5L); messages operation (Fig. 5M); and clear lockbox operation (Fig. 5N).
The present invention has been shown in the described embodiments for illustrative purposes only. Further, the terms and expressions which have been employed in the foregoing specification are used as terms of description and not of limitation, and there is no intention, in the use of such terms and expressions, of excluding equivalents of the features shown and described or portions thereof, it being recognized that the scope of the invention is defined and limited only by the claims which follow.

Claims

WE CLAM:
1. A key control system, comprising: at least one premise subject to authorized access by others based on preferences of an approval party; a lockbox having a locked area capable of securing a key for access to the premise; at least one mobile telephone associated with a user and having a stored access device program capable of communicating an access request to the lockbox, wherein, dependent upon the preferences established by the approval party, and during an access request from the mobile telephone to the lockbox, the mobile telephone automatically initiates a communication to a destination predetermined by the approval party to seek approval of the access request.
2. The key control system of claim 1, wherein the approval party is a listing real estate agent, and wherein the mobile telephone initiates a communication to the listing agent via a data communication sent over the mobile telephone's wireless carrier network.
3. The key control system of claim 1, wherein the destination to which the mobile telephone initiates a communication includes a central authority having a server receptive to communications from the mobile telephone over the mobile telephone's wireless carrier network.
4. The key control system of claim 1 , wherein the mobile telephone and the lockbox are configured such that the access request from the mobile telephone to the lockbox is communicated wirelessly.
5. The key control system of claim 4, wherein the wireless communication from the mobile telephone to the lockbox includes infrared communication.
6. The key control system of claim 1 , wherein if the access request access is approved, information is communicated to the user via the mobile telephone to complete the approved access.
7. The key control system of claim 6, wherein the user receives an approval code capable of being entered via a keypad on the mobile telephone.
8. The key control system of claim 7, wherein instructions indicating approval of the access request sent to mobile telephone automatically interact with the access device program stored in the mobile telephone.
9. A key control system, comprising: a lockbox having a locked area capable of securing a key for access to a premise; at least one mobile telephone assigned to a user and being programmed with an access device program capable of communicating an access request to the lockbox; and a central authority that administers at least privileges of users to access the lock box and preferences of an approval party responsible for access to the premise, the central authority including at least one computer capable of receiving communications from the user via the mobile telephone, wherein in response to an access request by the user via the mobile telephone to unlock the lockbox, the central authority reviews the approval party's preferences associated with the premise, and wherein if the central authority determines that the approval party's preferences require approval of said access request, the central authority contacts the responsible party and seeks approval, and wherein if the central authority determines that the approval party's preferences do not require approval of said access request, the central authority processes the user's access request in accordance with stored user privileges, and the access request is granted if authorized.
10. The key control system of claim 9, wherein if the central authority grants the access request, the central authority communicates information to the user via the mobile telephone.
11. The key control system of claim 10, wherein the information communicated to the user via the mobile telephone includes a voice message.
12. The key control system of claim 11 , wherein the information communicated to the user via the mobile telephone includes instructions that automatically interact with the program stored in the mobile telephone to make the access request effective.
13. The key control system of claim 9, wherein if the access request is granted, the mobile telephone is authorized to access the lockbox within a predetermined time period.
14. The key control system of claim 13, wherein the mobile telephone is authorized to access the lockbox exactly one time within the predetermined time period.
15. The key control system of claim 9, wherein the lockbox is a first lockbox, further comprising at least a second lockbox, and wherein if the access request for the first lock box is granted, the mobile telephone is additionally authorized to access at least the second lockbox.
16. The key control system of claim 9, wherein if the access request is granted, the user is granted access to the lockbox for a predetermined number of times.
17. The key control system of claim 16, wherein the granted access request expires after a predetermined time period.
18. The key control system of claim 9, wherein if the access request is granted, the user is granted access to the lockbox and any additional separate lockboxes within the system for a predetermined number of times.
19. The key control system of claim 18, wherein the central authority is capable of sending termination instructions to the mobile telephone effective to block access to the lock box via the mobile telephone, the termination instructions superceding any granted access request.
20. The key control system of claim 18, wherein the granted access request expires after a predetermined time period.
21. The key control system of claim 21 , wherein the central authority is capable of sending termination instructions to the mobile telephone effective to block access to the lock box via the mobile telephone, the termination instructions superceding any granted access request.
22. The key control system of claim 9, wherein the central authority also administers communications to and from the user regarding operation of the system.
23. A key control method, comprising: providing at least one lockbox securing a premise subject to authorized access; providing at least one user with a mobile telephone capable of communicating with the lock box to request access to the premise; providing a central authority that administers at least privileges of users to access the lock box and preferences of an approval party controlling the right to access to the premise, the central authority including a server and being capable of receiving communications from the user via the mobile telephone; in response to an access request by the user, the central authority determining whether the premise is subject to approval party preferences requiring approval of the access request; and if approval of the access request is required, the central authority attempting to establish communication in accordance with the approval party preferences restrictions and awaiting approval before processing the user's access request in accordance with the user's privileges.
24. A mobile telephone, comprising: a memory having a stored access device program capable of allowing the telephone to wirelessly communicate an access request to a nearby electronic lock, which, if authorized, unlocks the lock; and an authorization update function that automatically establishes communication between the mobile telephone and a central server at a predetermined time, when the mobile telephone is powered on, or when the mobile telephone reenters a mobile coverage area, the authorization update function receiving a reauthorization communication if authorization for the mobile telephone has been renewed.
25. In a system with at least one premise secured by a lockbox and a mobile telephone actuatable by the user to interface with the lockbox to request access to the premise, a first communications link established between the mobile telephone and the lockbox for requesting access and a second communications link from the mobile telephone to a remote location for requesting approval of the requested access, the second communications link being established substantially in real time with the first communications link.
26. The system of claim 25, wherein a decision on whether or not the access request is approved is communicated to the mobile telephone within about 30 seconds.
27. The system of claim 25, wherein a decision on whether or not the access request is approved is communicated to the mobile telephone within about 60 seconds.
28. The system of claim 25, wherein a decision on whether or not the access request is approved is communicated to the mobile telephone within about 120 seconds.
PCT/US2004/005098 2003-02-21 2004-02-20 Key control with real time communications to remote locations WO2004077848A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA2516704A CA2516704C (en) 2003-02-21 2004-02-20 Key control with real time communications to remote locations

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US44902303P 2003-02-21 2003-02-21
US60/449,023 2003-02-21

Publications (2)

Publication Number Publication Date
WO2004077848A2 true WO2004077848A2 (en) 2004-09-10
WO2004077848A3 WO2004077848A3 (en) 2005-01-20

Family

ID=32927490

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/005098 WO2004077848A2 (en) 2003-02-21 2004-02-20 Key control with real time communications to remote locations

Country Status (3)

Country Link
US (2) US7606558B2 (en)
CA (1) CA2516704C (en)
WO (1) WO2004077848A2 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007062965A1 (en) * 2005-11-30 2007-06-07 Siemens Aktiengesellschaft Method and central device for access controls to secure areas or devices
WO2007129042A1 (en) * 2006-05-03 2007-11-15 Hussain Qusharat Identity verification system and method
WO2008043998A2 (en) * 2006-10-12 2008-04-17 Cedardell Limited A security band and lock assembly for the security band
WO2009007148A1 (en) * 2007-07-10 2009-01-15 International Business Machines Corporation System and method of controlling access to services
WO2013160481A1 (en) * 2012-04-27 2013-10-31 Lock Your World Gmbh & Co. Kg Electronic key, electronic closure system and a method for allowing an access authorisation
ES2537840A1 (en) * 2013-12-11 2015-06-12 Aslenor Consultoría Técnica S.L. Remote opening system for a padlock (Machine-translation by Google Translate, not legally binding)
EP2659661A4 (en) * 2010-12-31 2015-09-30 Schneider Electric Buildings Electronic physical access control with remote authentication
US9230374B1 (en) * 2010-10-28 2016-01-05 Alarm.Com Incorporated Access management and reporting technology
US10347063B1 (en) 2017-03-01 2019-07-09 Alarm.Com Incorporated Authorized smart access to a monitored property
US10403069B2 (en) 2014-12-23 2019-09-03 Garcia Desinor, JR. Real estate wireless lockbox
EP3227817B1 (en) * 2014-12-01 2020-09-09 Samsung Electronics Co., Ltd Method and cloud server for managing a device
US10977583B2 (en) 2016-06-30 2021-04-13 Alarm.Com Incorporated Scheduled temporary rental property access
US11145016B1 (en) 2016-06-30 2021-10-12 Alarm.Com Incorporated Unattended smart property showing
US12008852B2 (en) 2023-03-15 2024-06-11 Alarm.Com Incorporated Access management and reporting technology

Families Citing this family (115)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2823411B1 (en) * 2001-04-05 2003-06-27 Cegetel METHOD FOR MANAGING THE WAKE-UP STATE OF A RADIO COMMUNICATION TERMINAL
US8437740B2 (en) * 2003-02-21 2013-05-07 Utc Fire & Security Americas Corporation, Inc. Key control with real time communications to remote locations
US20050050144A1 (en) * 2003-09-01 2005-03-03 Marat Borin System and method for automated communication between websites and wireless communications devices
SE525104C2 (en) * 2004-02-24 2004-11-30 Tagmaster Ab Identity authentication method for providing access to e.g. computers, uses central computer to compare ID code sent to device via mobile terminal with code received from this device
US20070010282A1 (en) * 2005-06-23 2007-01-11 Dates Eric T Cellular telephone system improvement - known as the "007 WEB"
EP1910134B1 (en) * 2005-07-19 2013-05-15 baimos technologies GmbH Identifying and/or locking system for identifying and/or unblocking a technical system, and method for the operation thereof
US7778627B2 (en) * 2005-08-04 2010-08-17 Alcatel Lucent System, method, and computer readable medium for providing secure access between devices
US8902042B2 (en) * 2006-05-16 2014-12-02 Lpd, L.L.C. Methods of controlling access to real estate properties
US8058971B2 (en) * 2006-06-07 2011-11-15 Utc Fire & Security Americas Corporation, Inc. Access control system
US9710615B1 (en) 2006-06-09 2017-07-18 United Services Automobile Association (Usaa) Systems and methods for secure online repositories
US8451088B2 (en) * 2006-12-18 2013-05-28 Sentrilock, Llc Electronic lock box with transponder based communications
JPWO2008075423A1 (en) * 2006-12-20 2010-04-02 パナソニック株式会社 Electronic key lending method and communication terminal
US9670694B2 (en) * 2007-04-12 2017-06-06 Utc Fire & Security Americas Corporation, Inc. Restricted range lockbox, access device and methods
US20080281609A1 (en) * 2007-05-07 2008-11-13 Marino Anthony G Web-based system and method for collection and management of real estate open house data
ITMI20071301A1 (en) * 2007-06-29 2008-12-30 Business Gates S R L "APPARATUS FOR THE DISTANCE OPENING OF DOORS OR GATES OF A BUILDING"
US8037511B1 (en) * 2007-07-20 2011-10-11 Sprint Communications Company L.P. Utilizing a mobile device to operate an electronic locking mechanism
US10783232B2 (en) 2007-09-27 2020-09-22 Clevx, Llc Management system for self-encrypting managed devices with embedded wireless user authentication
US10778417B2 (en) 2007-09-27 2020-09-15 Clevx, Llc Self-encrypting module with embedded wireless user authentication
US10181055B2 (en) * 2007-09-27 2019-01-15 Clevx, Llc Data security system with encryption
US11190936B2 (en) * 2007-09-27 2021-11-30 Clevx, Llc Wireless authentication system
US8040218B2 (en) * 2007-12-31 2011-10-18 Utc Fire & Security Americas Corporation, Inc. GPS enabled key management system
US20090167526A1 (en) * 2007-12-31 2009-07-02 Todd Graves Lockbox tamper detection
US8754744B2 (en) * 2008-02-28 2014-06-17 Showingtime.Com, Inc. Integrated real estate showing scheduling and key dispensing system
US8138886B1 (en) * 2008-05-21 2012-03-20 Ifay F. Chang Communication enabled active lock system
US20090302997A1 (en) * 2008-06-04 2009-12-10 Alexandre Bronstein Third-party access control
US8120460B1 (en) * 2009-01-05 2012-02-21 Sprint Communications Company L.P. Electronic key provisioning
US8797138B2 (en) * 2009-01-13 2014-08-05 Utc Fire & Security Americas Corporation, Inc. One-time access for electronic locking devices
US9194157B2 (en) * 2009-02-27 2015-11-24 Reuben Bahar Method and system for real estate marketing
CN101551920A (en) * 2009-05-04 2009-10-07 中兴通讯股份有限公司 Entrance guard system and validated user remote unlocking method
US8576048B2 (en) * 2009-11-10 2013-11-05 Ge Security, Inc. Method for accessing a locked object
US9870452B1 (en) * 2010-03-02 2018-01-16 Amazon Technologies, Inc. Assigning new passcodes to electronic devices
US9208466B2 (en) 2010-04-08 2015-12-08 Sentrilock, Llc Electronic lock box system with incentivized feedback
US9460480B2 (en) * 2010-04-09 2016-10-04 Showingtime.Com, Inc. Integrated real estate showing scheduling and key management system
US8593252B2 (en) * 2010-09-16 2013-11-26 Sentrilock, Llc Electronic lock box proximity access control
US20120210399A1 (en) * 2011-02-16 2012-08-16 Waldeck Technology, Llc Location-enabled access control lists for real-world devices
EP2500872A1 (en) * 2011-03-08 2012-09-19 Openways Sas Secured method for controlling the opening of locking devices by means of a communication object such as a mobile phone
US9105009B2 (en) 2011-03-21 2015-08-11 Microsoft Technology Licensing, Llc Email-based automated recovery action in a hosted environment
FR2974590A1 (en) * 2011-04-28 2012-11-02 Sar Technologies Internat Method for authenticating unlocking of storage device of mobile telephone, involves comparing signal signature with signatures stored in memory, and generating instruction for opening locking mechanism of stopper when test is validated
FR2974591B1 (en) * 2011-04-28 2014-05-09 Sar Technologies Internat CLOSURE CAP OF STORAGE AREA, SYSTEM AND METHOD FOR LATCHING, STORAGE BOX.
CN102325309B (en) * 2011-09-16 2013-11-13 国家电网公司 Visualization switching operation management method
US8839257B2 (en) 2011-11-22 2014-09-16 Microsoft Corporation Superseding of recovery actions based on aggregation of requests for automated sequencing and cancellation
CA2864535C (en) * 2012-02-13 2019-08-27 Xceedid Corporation Credential management system
US9460303B2 (en) * 2012-03-06 2016-10-04 Microsoft Technology Licensing, Llc Operating large scale systems and cloud services with zero-standing elevated permissions
US9626859B2 (en) * 2012-04-11 2017-04-18 Digilock Asia Limited Electronic locking systems, methods, and apparatus
US9330514B2 (en) 2012-07-25 2016-05-03 Utc Fire & Security Corporation Systems and methods for locking device management
US20140035723A1 (en) * 2012-08-06 2014-02-06 General Electric Company Mobile application system and method
US9472034B2 (en) * 2012-08-16 2016-10-18 Schlage Lock Company Llc Electronic lock system
US8943187B1 (en) * 2012-08-30 2015-01-27 Microstrategy Incorporated Managing electronic keys
US9479498B2 (en) 2012-09-28 2016-10-25 Intel Corporation Providing limited access to a service device via an intermediary
US9122254B2 (en) 2012-11-08 2015-09-01 The Chamberlain Group, Inc. Barrier operator feature enhancement
US8881249B2 (en) 2012-12-12 2014-11-04 Microsoft Corporation Scalable and automated secret management
US9731125B2 (en) 2013-03-01 2017-08-15 The Regents Of The University Of California Method and system for altering body mass composition using galvanic vestibular stimulation
WO2014137427A1 (en) * 2013-03-08 2014-09-12 Sentrilock, Llc Electronic key lockout control in lockbox system
US9053629B2 (en) 2013-03-14 2015-06-09 Sentrilock, Llc Contextual data delivery to mobile users responsive to access of an electronic lockbox
US9449449B2 (en) * 2013-03-15 2016-09-20 The Chamberlain Group, Inc. Access control operator diagnostic control
US10229548B2 (en) 2013-03-15 2019-03-12 The Chamberlain Group, Inc. Remote guest access to a secured premises
WO2014153452A1 (en) 2013-03-22 2014-09-25 Utc Fire And Security Americas Corporation, Inc. Secure electronic lock
EP2804153B1 (en) * 2013-05-15 2018-11-21 Nxp B.V. Electronic lock, locking system and method of operating an electronic lock
EP2821972B1 (en) 2013-07-05 2020-04-08 Assa Abloy Ab Key device and associated method, computer program and computer program product
ES2577882T5 (en) 2013-07-05 2020-03-12 Assa Abloy Ab Access control communication device, method, software and software product
US9516006B2 (en) * 2013-10-23 2016-12-06 Google Inc. Re-programmable secure cryptographic device
US9923879B1 (en) 2014-01-16 2018-03-20 Microstrategy Incorporated Sharing keys
US9608970B1 (en) 2014-01-16 2017-03-28 Microstrategy Incorporated Sharing keys
CA2940966C (en) * 2014-02-28 2021-03-02 Costar Realty Information, Inc. Systems and methods for tracking, marketing, and/or attributing interest in one or more real estate properties
US10115256B2 (en) 2014-04-07 2018-10-30 Videx, Inc. Remote administration of an electronic key to facilitate use by authorized persons
US9841743B2 (en) 2014-04-07 2017-12-12 Videx, Inc. Apparatus and method for remote administration and recurrent updating of credentials in an access control system
US9761071B2 (en) 2014-04-29 2017-09-12 Showingtime.Com, Inc. Integrated real estate showing scheduling and key management system
CN106662991B (en) 2014-06-02 2019-07-09 施拉奇锁有限责任公司 Electronic certificate management system
US9996999B2 (en) * 2014-07-30 2018-06-12 Master Lock Company Llc Location tracking for locking device
EP3224790A4 (en) * 2014-11-27 2018-08-01 Isol8 Pty Ltd Method and system for isolation management and or access control
BR112017013997B1 (en) 2014-12-29 2022-06-28 Invue Security Products Inc MERCHANDISE SECURITY SYSTEM AND METHOD FOR PROTECTING AN THEFT-SUSCEPTIBLE MERCHANDISE
US9916742B2 (en) 2015-03-17 2018-03-13 Carrier Corporation Automatic notification of a conclusion of real property showing based on user device detection
US9762585B2 (en) 2015-03-19 2017-09-12 Microsoft Technology Licensing, Llc Tenant lockbox
US9836897B2 (en) 2015-04-30 2017-12-05 Carrier Corporation Lockbox access device and method with biometric security data
US9704315B2 (en) 2015-06-11 2017-07-11 Sentrilock, Llc Contextual data delivery to other users at an electronic lockbox
US10931682B2 (en) 2015-06-30 2021-02-23 Microsoft Technology Licensing, Llc Privileged identity management
US9830760B2 (en) 2015-10-10 2017-11-28 Sentrilock, Llc Contextual data delivery to users at a locked property
US9847020B2 (en) 2015-10-10 2017-12-19 Videx, Inc. Visible light communication of an access credential in an access control system
US9719789B2 (en) 2015-11-23 2017-08-01 Here Glboal B.V. Method and apparatus for providing integration of access management with navigation systems
US9990791B2 (en) 2015-12-16 2018-06-05 Matthew Firth Smart lockbox
EP3440854B1 (en) 2016-04-06 2020-09-16 Otis Elevator Company Mobile visitor management
CN109074692A (en) 2016-04-11 2018-12-21 开利公司 When interacting with multiple access control apparatus, capturing behavior user is intended to
US11043054B2 (en) 2016-04-11 2021-06-22 Carrier Corporation Capturing user intent when interacting with multiple access controls
WO2017180381A1 (en) 2016-04-11 2017-10-19 Carrier Corporation Capturing personal user intent when interacting with multiple access controls
CN109074690A (en) 2016-04-11 2018-12-21 开利公司 Communication user is captured when interacting with multiple access control apparatus to be intended to
US9734646B1 (en) 2016-04-29 2017-08-15 John P. Noell System, method, and apparatus for accessing real estate property
CN106408730A (en) * 2016-11-28 2017-02-15 北京拜克洛克科技有限公司 Vehicle lock and vehicle
WO2018095436A1 (en) 2016-11-28 2018-05-31 Dongxia Datong (Beijing) Management And Consulting Co., Ltd. Systems and methods for unlocking a lock
US10255740B2 (en) * 2016-12-28 2019-04-09 Jiangsu Hongbao Hardware Co., Ltd. Systems and methods for unlocking a lock
DE102017000514B3 (en) * 2017-01-20 2018-02-22 Gunnebo Deutschland Gmbh DEVICES, SYSTEMS AND METHOD FOR UNLOCKING A LOCK OF A LOCK SYSTEM
CN111052191B (en) 2017-07-13 2023-05-26 开利公司 Method and lock system for a lock event of a network requesting a lock
US20190139343A1 (en) * 2017-11-06 2019-05-09 Wfe Technology Corp. Electronic lock system, electronic lock device, and method for unlocking electronic lock device
US10891814B2 (en) * 2017-11-07 2021-01-12 Carrier Corporation Mobile credential management system for vehicle key box access control
CA3028753A1 (en) * 2018-01-02 2019-07-02 Laurence Hamid Wireless based methods and systems for federated key management, asset management, and financial transactions
CN110166227B (en) 2018-02-12 2024-03-26 开利公司 Wireless communication with non-networked controllers
US10846964B2 (en) 2018-06-01 2020-11-24 Sentrilock, Llc Electronic lockbox with interface to other electronic locks
US11954650B2 (en) 2018-06-27 2024-04-09 MFTB Holdco, Inc. Managing in-person property access using geofences
US10885596B1 (en) 2018-06-27 2021-01-05 Showingtime.Com Inc. System and method for managing showings of real estate listings based on multiple factors
US11580503B1 (en) 2020-10-23 2023-02-14 MFTB Holdco, Inc. System and method for managing and automatically rescheduling showings of real estate listings based on multiple factors
CN112369058B (en) 2018-11-09 2024-03-15 开利公司 Geographically secure access to a cargo box controller
US10713740B1 (en) 2018-12-29 2020-07-14 Showingtime.Com, Inc. Electronic device for providing access to properties
US11384567B2 (en) * 2019-01-17 2022-07-12 Intellactuate Pty Ltd Smart lock system and process
SG10202000324QA (en) 2019-01-21 2020-08-28 Carrier Corp Dynamic wireless access point configuration
US10685516B1 (en) * 2019-03-22 2020-06-16 Eingot Llc Virtual intercom system
US11900744B2 (en) 2019-03-22 2024-02-13 Eingot Llc Virtual intercom system
US10846958B2 (en) 2019-03-22 2020-11-24 Eingot Llc Virtual intercom system
US11761236B2 (en) 2019-03-27 2023-09-19 Sentrilock, Llc Electronic lockbox
EP3948813A1 (en) 2019-05-07 2022-02-09 Sightpas LLC. Managing access to a restricted site with a barrier and/or barrierless and detecting entry
US11010995B2 (en) 2019-09-06 2021-05-18 Videx, Inc. Access control system with dynamic access permission processing
US11676344B2 (en) 2019-11-12 2023-06-13 MFTB Holdco, Inc. Presenting building information using building models
US11574373B1 (en) 2020-04-20 2023-02-07 MFTB Holdco, Inc. Multi-party virtual showing system with configurable independent communication channels and data
BR102020001975A2 (en) * 2020-01-30 2021-08-10 Jose Marcos Nabhan CERTIFICATION SYSTEM AND DEVICE WITH AUTHENTICATION BETWEEN TERMINALS FOR RELEASE OF ELECTRONIC LOCK IMPLEMENTED BY COMPUTER PROGRAM
US11468985B2 (en) 2020-08-04 2022-10-11 Showingtime.Com, Inc. System and method for managing property showing appointments based on health parameters
US11769360B1 (en) * 2020-08-07 2023-09-26 Interactive Touchscreen Solutions, Inc. Interactive touchless information exchange system
US11373470B1 (en) * 2021-04-12 2022-06-28 Toyota Motor Engineering & Manufacturing North America, Inc. Systems and methods for unlocking a digital lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5654696A (en) * 1985-10-16 1997-08-05 Supra Products, Inc. Method for transferring auxillary data using components of a secure entry system
US6072402A (en) * 1992-01-09 2000-06-06 Slc Technologies, Inc. Secure entry system with radio communications
US6192236B1 (en) * 1997-05-08 2001-02-20 Ericsson Inc. Apparatus and methods for remote control of accessory devices using a radiotelephone as a receiver
US20010019953A1 (en) * 2000-02-01 2001-09-06 Brother Kogyo Kabushiki Kaisha Electric device capabel of being controlled based on data transmitted from cellular phone
US20020025804A1 (en) * 2000-07-24 2002-02-28 Kabushiki Kaisha Fulltime System Door-lock-opening method for home delivery locker

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5046084A (en) * 1985-12-30 1991-09-03 Supra Products, Inc. Electronic real estate lockbox system with improved reporting capability
US6822553B1 (en) * 1985-10-16 2004-11-23 Ge Interlogix, Inc. Secure entry system with radio reprogramming
US5475375A (en) * 1985-10-16 1995-12-12 Supra Products, Inc. Electronic access control systems
US4838052A (en) * 1987-07-23 1989-06-13 Segwill Corp. Lock system
US5612683A (en) * 1994-08-26 1997-03-18 Trempala; Dohn J. Security key holder
US6195005B1 (en) * 1998-09-11 2001-02-27 Key-Trak, Inc. Object carriers for an object control and tracking system
US6727801B1 (en) * 1999-12-03 2004-04-27 Richard Gervasi Lock box device
US6624742B1 (en) * 2000-06-24 2003-09-23 Motorola, Inc. Wireless intelligent real estate sign and electronic lock box
US20030179075A1 (en) * 2002-01-24 2003-09-25 Greenman Herbert A. Property access system
US20040025039A1 (en) * 2002-04-30 2004-02-05 Adam Kuenzi Lock box security system with improved communication
US7061367B2 (en) * 2002-04-30 2006-06-13 General Electric Company Managing access to physical assets
US7009489B2 (en) * 2002-06-14 2006-03-07 Sentrilock, Inc. Electronic lock system and method for its use

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5654696A (en) * 1985-10-16 1997-08-05 Supra Products, Inc. Method for transferring auxillary data using components of a secure entry system
US5815557A (en) * 1992-01-09 1998-09-29 Slc Technologies, Inc. Homeowner key for an electronic real estate lockbox system
US6072402A (en) * 1992-01-09 2000-06-06 Slc Technologies, Inc. Secure entry system with radio communications
US6192236B1 (en) * 1997-05-08 2001-02-20 Ericsson Inc. Apparatus and methods for remote control of accessory devices using a radiotelephone as a receiver
US20010019953A1 (en) * 2000-02-01 2001-09-06 Brother Kogyo Kabushiki Kaisha Electric device capabel of being controlled based on data transmitted from cellular phone
US20020025804A1 (en) * 2000-07-24 2002-02-28 Kabushiki Kaisha Fulltime System Door-lock-opening method for home delivery locker

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8736418B2 (en) 2005-11-30 2014-05-27 Siemens Aktiengesellschaft Method and central device for controlling access to secure areas or devices
WO2007062965A1 (en) * 2005-11-30 2007-06-07 Siemens Aktiengesellschaft Method and central device for access controls to secure areas or devices
WO2007129042A1 (en) * 2006-05-03 2007-11-15 Hussain Qusharat Identity verification system and method
WO2008043998A2 (en) * 2006-10-12 2008-04-17 Cedardell Limited A security band and lock assembly for the security band
WO2008043998A3 (en) * 2006-10-12 2008-09-25 Cedardell Ltd A security band and lock assembly for the security band
WO2009007148A1 (en) * 2007-07-10 2009-01-15 International Business Machines Corporation System and method of controlling access to services
US9934636B1 (en) 2010-10-28 2018-04-03 Alarm.Com Incorporated Access management and reporting technology
US11170594B1 (en) * 2010-10-28 2021-11-09 Alarm.Com Incorporated Access management and reporting technology
US9230374B1 (en) * 2010-10-28 2016-01-05 Alarm.Com Incorporated Access management and reporting technology
US9514584B1 (en) 2010-10-28 2016-12-06 Alarm.Com Incorporated Access management and reporting technology
US10347065B1 (en) * 2010-10-28 2019-07-09 Alarm.Com Incorporated Access management and reporting technology
US11636721B2 (en) 2010-10-28 2023-04-25 Alarm.Com Incorporated Access management and reporting technology
US10629015B1 (en) * 2010-10-28 2020-04-21 Alarm.Com Incorporated Access management and reporting technology
EP2659661A4 (en) * 2010-12-31 2015-09-30 Schneider Electric Buildings Electronic physical access control with remote authentication
US9799154B2 (en) 2012-04-27 2017-10-24 Lock Your World Gmbh & Co. Kg Electronic key, electronic closure system and a method for allowing an access authorization
WO2013160481A1 (en) * 2012-04-27 2013-10-31 Lock Your World Gmbh & Co. Kg Electronic key, electronic closure system and a method for allowing an access authorisation
ES2537840A1 (en) * 2013-12-11 2015-06-12 Aslenor Consultoría Técnica S.L. Remote opening system for a padlock (Machine-translation by Google Translate, not legally binding)
EP3227817B1 (en) * 2014-12-01 2020-09-09 Samsung Electronics Co., Ltd Method and cloud server for managing a device
US10403069B2 (en) 2014-12-23 2019-09-03 Garcia Desinor, JR. Real estate wireless lockbox
US10977583B2 (en) 2016-06-30 2021-04-13 Alarm.Com Incorporated Scheduled temporary rental property access
US11145016B1 (en) 2016-06-30 2021-10-12 Alarm.Com Incorporated Unattended smart property showing
US11861750B2 (en) 2016-06-30 2024-01-02 Alarm.Com Incorporated Unattended smart property showing
US10839631B1 (en) 2017-03-01 2020-11-17 Alarm.Com Incorporated Authorized smart access to a monitored property
US11501590B2 (en) 2017-03-01 2022-11-15 Alarm.Com Incorporated Authorized smart access to a monitored property
US10347063B1 (en) 2017-03-01 2019-07-09 Alarm.Com Incorporated Authorized smart access to a monitored property
US12008852B2 (en) 2023-03-15 2024-06-11 Alarm.Com Incorporated Access management and reporting technology

Also Published As

Publication number Publication date
US20040219903A1 (en) 2004-11-04
US20100011418A1 (en) 2010-01-14
US7606558B2 (en) 2009-10-20
CA2516704C (en) 2012-07-31
WO2004077848A3 (en) 2005-01-20
US8335488B2 (en) 2012-12-18
CA2516704A1 (en) 2004-09-10

Similar Documents

Publication Publication Date Title
CA2516704C (en) Key control with real time communications to remote locations
US8437740B2 (en) Key control with real time communications to remote locations
CN109727358B (en) Vehicle sharing system based on Bluetooth key
US7054648B2 (en) Location privacy proxy server and method in a telecommunication network
US9367978B2 (en) Control device access method and apparatus
US6334056B1 (en) Secure gateway processing for handheld device markup language (HDML)
US8706035B2 (en) Authenticating multiple devices simultaneously over a wireless link using a single subscriber identity module
US9131356B2 (en) System and method for administration and operation of one or more mobile electronic communications devices
CN102594895B (en) Network node, mobility information server, WTRU and method
EP1530169A1 (en) Method for performing a voting by mobile terminals
US20050050214A1 (en) Access control method, communication system, server, and communication terminal
US20030018918A1 (en) Authentication system, authentication agent apparatus, and terminal
US20110119745A1 (en) Network authentication
CN101272630A (en) Wireless communication techniques for controlling access granted by a security device
CN108537927B (en) Lockset terminal and method for controlling lockset terminal through regional management
CN108701384B (en) Method for monitoring access to electronically controllable devices
RU2310233C2 (en) Method and device for controlling access
JP5635381B2 (en) Authentication method, management apparatus, and authentication system
US20070077913A1 (en) Mobile communication terminal, control method thereof, and method for controlling mobile communication service
JP3580788B2 (en) Unlocking method and lock control device
EP2677791B1 (en) Method and device for transferring a test request to an identification module
WO2014009391A1 (en) A method and a system for transferring access point passwords
JP2008517544A (en) Mobile phone camera system
JP2007053454A (en) Authentication device and method
EP1146712A1 (en) Authentication in telecommunication system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2516704

Country of ref document: CA

122 Ep: pct application non-entry in european phase