WO2012047850A2 - Electronic access control system for lock unit - Google Patents

Electronic access control system for lock unit Download PDF

Info

Publication number
WO2012047850A2
WO2012047850A2 PCT/US2011/054712 US2011054712W WO2012047850A2 WO 2012047850 A2 WO2012047850 A2 WO 2012047850A2 US 2011054712 W US2011054712 W US 2011054712W WO 2012047850 A2 WO2012047850 A2 WO 2012047850A2
Authority
WO
WIPO (PCT)
Prior art keywords
access
subset
lock unit
time period
codes
Prior art date
Application number
PCT/US2011/054712
Other languages
French (fr)
Other versions
WO2012047850A3 (en
Inventor
Douglas E. Lacina
Original Assignee
Master Lock Company Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Master Lock Company Llc filed Critical Master Lock Company Llc
Publication of WO2012047850A2 publication Critical patent/WO2012047850A2/en
Publication of WO2012047850A3 publication Critical patent/WO2012047850A3/en

Links

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B19/00Keys; Accessories therefor
    • E05B19/0005Key safes
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B67/00Padlocks; Details thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B17/00Accessories in connection with locks
    • E05B17/002Weather or dirt protection
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B17/00Accessories in connection with locks
    • E05B17/22Means for operating or controlling lock or fastening device accessories, i.e. other than the fastening members, e.g. switches, indicators
    • E05B17/226Displays on locks, e.g. LED or LCD screens

Definitions

  • Lockable enclosures are used in many indoor and outdoor environments to restrict access to various items by providing the enclosure with a lockable door, lid, drawer, or other such barrier.
  • the barrier can include a locking mechanism, such as, for example, a combination lock, padlock, set of pushbuttons, or key operated latch, to limit access to the contents of the enclosure to one or more authorized users.
  • Some applications may require secure storage of one or more smaller items, such as keys, credit cards, or documents, for which restricted access by a limited number of authorized individuals is desirable.
  • a key safe which is affixed to an entry door (e.g., shackled around the doorknob) of a building for secure retention of an authorized key for the entry door.
  • the key safe may employ, for example, a pushbutton or combination dial locking mechanism, such that authorized users informed of the unlocking combination may open the key safe to access the door key for entry into the building.
  • a pushbutton or combination dial locking mechanism such that authorized users informed of the unlocking combination may open the key safe to access the door key for entry into the building.
  • One such application for which key safes are conventionally used is for door entry key management for real estate showings and related transactions, such as property staging, maintenance, and contractor repairs.
  • a first set of access codes is stored on each of a computer and a first lock unit.
  • the first lock unit is associated with the property on the computer.
  • the first set of access codes is associated with the first lock unit on the computer. Communication between the first lock unit and the computer is disconnected.
  • a request for access to the property is received from an authorized user.
  • An access code is provided from the first set of access codes to the authorized user.
  • the provided access code is then identified on the computer as unavailable.
  • An exemplary system for managing electronic access to a property includes a computer storing a first set of access codes and a first lock unit disconnected from the computer and storing the first set of access codes.
  • the first lock unit is configured to unlock in response to user entry of a first access code from the first set of access codes on a lock interface of the first lock unit.
  • the computer is configured to provide the first access code from the first set of access codes in response to an authorized request for access to a first property associated with the first lock unit.
  • An exemplary electronic key safe includes a housing, an access door blocking access to a chamber in the housing when the access door is secured in a closed position, and a keypad including a plurality of buttons for entry of an access code.
  • a processor is disposed within the housing and in communication with the keypad, the processor storing a first subset of access codes and a second subset of access codes different from the first subset of access codes.
  • a clock unit is in communication with the processor. The processor is configured to activate the first subset of access codes during a first time period, to deactivate the first subset of access codes during a second time period subsequent to the first time period, to deactivate the second subset of access codes during the first time period, and to activate the second subset of access codes during the second time period.
  • Figure 1 is a schematic view of an exemplary access control device
  • Figure 2 is a block diagram of an exemplary process for establishing remote management of an exemplary access control device
  • Figure 3 is a block diagram of an exemplary process for processing an access request for an exemplary access control device.
  • Conventional mechanical realtor key safes allow an entry key to be kept at a property, while limiting access to the key to individuals authorized to enter the property (e.g., the owner, listing agents, showing agents, contractors, invited guests, etc.) who have been given an access code (e.g., key entry or dial position sequence). While this arrangement provides a certain level of security, the access code or codes may be forgotten, or intentionally or unintentionally given to unauthorized individuals. Further, where more limited access (a specific period of time or a specific number of accesses) to a user is desired, a manual combination change of the locking mechanism and/or temporary removal of the entry key from the key safe may be necessary. Because of these limitations, use of a mechanical key safe often results in less limited access to the property than what is desired.
  • Conventional stand alone electronic key safes may provide enhanced security by allowing access codes to be more easily changed, and by providing different access codes for different users, such that access to a specific user may be discontinued while maintaining access for other users. Additionally, all access codes may be disabled for predetermined time periods, for example, time periods during which the property owners are present and do not wish to be disturbed.
  • these conventional stand alone electronic key safes typically still require on site access to the key safe to make additions, deletions, schedule changes, or other such programming changes to the access codes. This limitation results in active access codes that are usable by individuals (e.g., showing agents) for periods well beyond a desired access period.
  • an electronic key safe may be linked by a wired or wireless connection to a central computer (e.g., a server or stand alone terminal), or other such device to establish a networked access control system configured to remotely monitor and control access to one or more key safes.
  • the electronic access management system may be used to remotely add, delete, or otherwise update access code information on the key safe unit.
  • access attempt information is provided from the key safe unit to a central computer, where the access attempt information is evaluated and unlocking instructions are provided back to the key safe unit. While these arrangements provide for greater flexibility and enhanced security in remotely modifying access conditions for one or more individuals, the required communication and data management systems may be complex and costly to establish and maintain.
  • the present application contemplates, in one embodiment, a non-networked electronic access control system for managing access to one or more lock units, such as, for example, realtor key safes provided at one or more properties for restricted access to an entry key for the property.
  • a computer is synchronized with a lock unit by storing the same set of access codes on both the computer and the lock unit.
  • An authorized user communicates with the computer (directly or indirectly) to obtain an access code for a lock unit temporarily or permanently disconnected (i.e., not in communication by wired or wireless connection) from the computer, located at or otherwise corresponding to the property for which access is sought.
  • a computer may be provided with a matrix, database, or other such system that stores sets of access codes and other such information about the lock units and the authorized users that may be granted access to one or more of the lock units.
  • the system may be configured to associate a set of access codes (or an algorithm for generating the set of access codes) with the lock unit on which the same set of access codes (or algorithm for generating the set of access codes) has been stored.
  • the system receives a request from an authorized user for access to the lock unit, the system provides the authorized user with an access code from the set of access codes (or access code generating algorithm) associated with the lock unit.
  • the system Upon providing the access code, the system is configured to associate the provided access code with the authorized user to whom the access code had been provided, and to remove the provided access code from a subset of available, unused access codes for the lock unit.
  • This arrangement allows for identification of any authorized user that has accessed the lock unit based on the access code entered on the lock unit. This information may be gathered, for example, by connecting the lock unit with a memory source or directly with the computer (e.g., after the lock unit has been detached from the associated property and returned to a central location at which the computer resides).
  • an electronic access control system may be configured to provide access codes of limited duration, which may be limited, for example, by time from first use (e.g., three hours from initial access),
  • predetermined periods of time e.g., one day, one week, etc.
  • a predetermined number of uses e.g., one-time use
  • a combination of two or more such limitations e.g., one day, one week, etc.
  • the lock unit may be provided with a clock unit to control the status of time- based access codes.
  • a lock unit is provided with a set of access codes that match a corresponding set of access codes stored at a central computer, as described above, the clock unit may be synchronized with a clock unit of the central computer, such that the computer only provides authorized users with access codes that are recognized as active in the lock unit for the present or future time period for which access has been requested.
  • a set of access codes may include multiple access code subsets having differing status conditions to limit the number of active, usable access codes at any given time, and/or to limit the duration over which each access code is active.
  • a central computer and a lock unit may each store a first set of access codes including a plurality of access code subsets
  • a first subset of access codes may be active during a first time period (e.g., day, week, month, etc.)
  • a second subset of access codes may be active during a second time period (e.g., a subsequent day, week, month, etc.)
  • the lock unit may be additionally or alternatively configured to establish a predetermined duration or lifespan (e.g., a time period, a number of uses, or both) for an access code once the access code is first entered into the lock unit (e.g., by a keypads entry).
  • an access control system for a lock unit may provide for auditing of access events involving a lockable enclosure associated with a specific authorization provided to a specific individual, to track the date, time, frequency, and duration of access to the lockable enclosure.
  • the auditing system may additionally be configured to identify unauthorized or unsuccessful attempts to access the lockable enclosure, times in which the lockable enclosure was open (e.g., by a door movement sensor), low battery conditions, or other conditions associated with the lockable enclosure. This and other audit information may be accessible on a display screen on the lock unit, or may be transmitted to a remote computer via a communication link or electronic storage media.
  • One such programmable lock unit involves the use of one or more key safes, lock boxes, or other such lockable enclosures 10 for the real estate market, for secure storage, at a property offered for sale, of one or more entry keys to the property.
  • the lock boxes 10 provide limited access to a real estate agent tasked with showing a property (the "showing agent"), and/or access to other individuals (e.g., contractors, cleaning services) of varying duration and frequency without involving distribution and retrieval of physical keys or mechanically changing authorized combination codes at the lock box.
  • the access control system provides one or more condition based unlocking codes that allow an individual responsible for controlling access to the property (e.g., the "listing agent") to provide varied access to the lock box (and therefore, to the property) to individuals that need to enter the property.
  • an electromechanical locking mechanism (not shown) is in communication with a processor of the lockable enclosure to unlock an access door in response to entry of an active, authorized access code, for access to the stored key or key card, or other such item.
  • a lockable enclosure or lock box 10 includes a housing 18 and an access door 14 secured to the housing in a locked condition to block access to a chamber within the housing (for example, for secure storage of an entry key).
  • a processor (not shown) is configured to store a matrix of access information (e.g., authorized access codes and conditions under which each combination is activated) established for limited access to the enclosure. As discussed above, this data may additionally be stored at a computer (e.g., server, stand alone terminal, or other such device) 20, which may be maintained at a remote location.
  • the computer 20 may be configured to communicate this information (either wirelessly or by a wired connection) to a remote device (e.g., a computer, cell phone, etc.) 50 to grant access rights to an authorized rights (via conveyed access codes) or inform a remote user or administrator of the scheduled accessibility to the lockable enclosure.
  • a remote device e.g., a computer, cell phone, etc.
  • a group of lockable enclosures 10 may be serialized or otherwise identified to be associated with a corresponding matrix of access information stored in the processor of the lockable enclosure 10 and/or at the central device 20.
  • the processor of the lockable enclosure may be configured to undergo a registration process by which a secure connection to the central computer 20 or an Internet based system may be initially established to import the initial matrix of access information.
  • a matrix of access information may be imported from a memory source 30 (e.g., CD, DVD, USB thumb drive, or flash memory card) connected with a data port 17 (e.g., a USB port) on the lockable enclosure.
  • a memory source 30 e.g., CD, DVD, USB thumb drive, or flash memory card
  • This registration system may include documentation and tutorials for set-up, use, and maintenance of the lockable enclosure.
  • a start-up code may be provided with each lockable enclosure to permit access to web-based registration of the lock and/or advanced features of the access control system software.
  • the lockable enclosure 10 may be provided with a control interface 11 (e.g., a screen with a menu-driven interface) in communication (e.g., in circuit communiation) with the processor for accessing and modifying one or more of the access control features described herein.
  • a control interface 11 e.g., a screen with a menu-driven interface
  • an interface screen 11 may display key entries, instructions to the individual associated with the entered authorized code, special information regarding the property (e.g., dog within the house).
  • An owner interface 12 may be provided on the lockable enclosure (e.g., on a surface separate from the combination code buttons) to command the lockable enclosure to perform a variety of functions, such as detaching the lockable enclosure from a mounting structure (e.g., releasing a shackle to remove the lockable enclosure from a doorknob), accessing audit information, setting overriding lockout periods, entering instructions to provide to one or more individuals assigned with access codes, checking battery power levels, synchronizing time between the lock and a central device, or reprogramming authorized codes.
  • a mounting structure e.g., releasing a shackle to remove the lockable enclosure from a doorknob
  • accessing audit information e.g., setting overriding lockout periods
  • entering instructions to provide to one or more individuals assigned with access codes e.g., checking battery power levels, synchronizing time between the lock and a central device, or reprogramming authorized codes.
  • the locking arrangement may be battery powered.
  • the batteries (not shown) may be selected to provide sufficient power over an extended period of normal use (e.g., 5 years of normal operation), and may be arranged to be accessible only when the lockable enclosure has been opened.
  • an external power port such as a battery port or AC adapter port, may be provided on the lockable enclosure to temporarily power the locking arrangement such that the enclosure may be opened for replacement of the depleted battery or batteries.
  • solar cells, micromechanical generators, or other such energy harvesting devices may additionally or alternatively be employed to power the locking arrangement.
  • the lock box may be dimensionally sized to fit on a doorknob (e.g., fastened by a locking shackle 19), within a door frame, and between an entry door and an outer screen door.
  • the enclosure may be waterproof and resistant to extreme temperatures and tampering, and may include a protective cover or door (not shown) for the buttons, ports, and other electronic controls.
  • An access keypad 15 in communication with the processor may include any number of access code buttons (e.g., 5-12 buttons) for entry of an alphanumeric combination code, and a start/reset button 16 may be provided to clear an entered code and/or to "wake up" the circuitry for evaluation of a subsequently entered code, and/or to turn on backlighting for the keypad.
  • the lock processor may be configured to shut down temporarily (e.g., for 5 minutes, or until an administrator key is entered) if a wrong code is entered a predetermined number of times (e.g., 10 incorrect code entries).
  • Any suitable electromechanical locking mechanism may be provided to unlock the enclosure in response to an electrical signal generated upon entry of an authorized access code.
  • One such electromechanical locking mechanism is described in co-pending U.S. Non- provisional Application Serial No. 13/077,182, entitled LOCKABLE ENCLOSURE WITH LOADING CARTRIDGE and filed on March 31, 2011, the entire disclosure of which is incorporated by reference, to the extent that it is not conflicting with the present application.
  • the access control system may be provided with a scheduling system, in which access codes are provided and scheduled when a viewing of the property is scheduled, or when maintenance or repairs to the property are scheduled, with the access code assigned in the system to the agent or individual to which access is being granted.
  • the scheduling system may provide the scheduled confirmation with access code by one of many suitable channels, including, for example, e-mail, text message, or a secure web page.
  • user access codes may be generated, stored and categorized based on a duration of permitted access for which the access code will be recognized as an authorized code to successfully unlock the locking arrangement.
  • a first group of short term (e.g., daily) access codes may provide access (for example, to a showing agent) for a minimal period, such as a single day.
  • These codes may be stored in lists or sets on the processor of the lockable enclosure, in a matrix that identifies the duration for which the code will be recognized as an authorized code.
  • a set of short term access codes includes a first subset of access codes (for example, up to 15 activated codes) operable to unlock the lock during a first time period (e.g., a first day).
  • the lock may automatically deactivate this first subset of access codes and activate a second subset of access codes operable to unlock the lock during a second time period (e.g., a second day), replacing the first subset of access codes in an active matrix with the second subset of access codes.
  • the system may be configured to activate a new short term access code only as it is required (e.g., upon initial use of the preceding access code), such that the expiration of an access code does not necessarily coincide with the activation of a new access code.
  • the short term access codes may be arranged in multiple sets, with only one active access code per set, or in a single set, with multiple active access codes.
  • the access codes may be generated by the lock processor or central device using an algorithm, with the generated codes being stored in the matrix for the authorized duration, and stored more permanently (e.g., for several years or longer) in the lock processor or at the central device for auditing purposes.
  • the access control system may be configured to store, in the matrix or elsewhere, the identities of the individuals to which each of the short term access codes has been assigned, such that subsequent accessing of the lockable enclosure using an access code may identify the corresponding individual as having accessed the enclosure.
  • This storage arrangement also may serve to prevent the system software, or an operator of the system, from providing the same access code to multiple individuals.
  • This identification of individuals associated with specific access codes may provide for tracking of the dates and times of an individual's access of the lockable enclosure, in the event that theft or damage to the property is later discovered, or to keep a general record of access to the property.
  • Other conditions at the lockable enclosure may also be tracked, including, for example, unsuccessful access code entry attempts, and movement of or tampering with the lockable enclosure (e.g., by using sensors provided with the lockable enclosure).
  • a second group of medium term access codes may be provided to grant access for a longer duration than the short term access codes (e.g., one week access) to individuals requiring extended access (e.g., contractors).
  • these codes may be stored in lists or sets on the processor of the lockable enclosure, in a matrix that identifies the duration for which the code will be recognized as an authorized code.
  • a list or set of medium term access codes includes a first subset of access codes (for example, up to 10 activated codes) operable to unlock the lock during a first week.
  • the lock may automatically deactivate this first subset of access codes and activate a second subset of access codes operable to unlock the lock during a second week, replacing the first subset of access codes in an active matrix with the second subset of access codes.
  • the system may be configured to activate a new medium term access code only as it is required (e.g., upon initial use of the preceding access code), such that the expiration of an access code does not necessarily coincide with the activation of a new access code.
  • the medium term access codes may be arranged in multiple sets, with only one active access code per list, or in a single set, with multiple active access codes.
  • the access control system may further provide for access codes authorized for other durations, such as a long term (e.g., one month) access, similar to the short term and medium term access code arrangements described above. Additionally or alternatively, each access code may be independently tagged or identified in the matrix with any desired duration of authorized access, for example, a period as short as an hour or as long as 6 months. Access maybe further limited to time-of-day (e.g., daytime hours of 8 a.m. to 5 p.m.), day of the week (e.g., Monday through Friday only), future time periods (e.g., a property rental period), or frequency of access (e.g., one time use, or a maximum of three accesses).
  • time-of-day e.g., daytime hours of 8 a.m. to 5 p.m.
  • day of the week e.g., Monday through Friday only
  • future time periods e.g., a property rental period
  • frequency of access e.g., one time
  • the processor may store owner or administrator access codes that are not time, duration, or frequency limited to provide more permanent access to certain individuals, such as the lock box owner (e.g., the listing agent) or the property owner. These codes may be resettable by the individual that has been granted permanent access, for example, to change the code to a more easily remembered code. Further, the system may be configured to grant additional control (e.g., code changing ability, lockout/override ability, or access to auditing information) to individuals entering the permanent access codes.
  • additional control e.g., code changing ability, lockout/override ability, or access to auditing information
  • Authorized access codes may be provided in any desirable sequence length. In some embodiments, it may be desirable to use longer or more complex access codes for longer term and permanent access to the enclosure, to provide additional security. In one embodiment, short term access codes include six digits, while longer term access codes include seven digits and permanent access codes include eight digits. A separate code may be provided for release of the shackle to remove the lock box from the property.
  • Figure 2 is a block diagram detailing an exemplary process 200 for
  • a set of access codes maintained on a central computer is stored on the lock unit.
  • the stored set of access codes is associated with the lock unit on the central computer (block 220).
  • the lock unit is associated with a property on the central computer (block 230).
  • the lock unit is disconnected from the computer (block 240), for example, by removing a wired connection or disabling a wireless connection.
  • the lock unit is then affixed to the property (block 250) to provide direct (e.g., as a door lock or locker lock) or indirect (e.g., as a key safe) access to the property.
  • a primary database of lock unit, user, and property information is managed at a central location, for example, by a realtor association or association service provider.
  • the primary database includes lock unit identification and time-based access code information for all of the lock units registered to the association. From the association, groups of lock units may be sub-registered to a division (e.g., realtor office), and individual lock units within each group may be further sub-registered to individuals within the division (e.g., real estate agents).
  • the primary database may be divided into sub-databases corresponding to the lock unit, user, and property information specific to the divisions and sub-divisions (individuals) to facilitate management of the data.
  • One or more primary administrators of the exemplary system may be provided with control and visibility of all information within the database, including information specific to the divisions and subdivisions within the system.
  • access to the specific access codes provided to each authorized user may be limited to that authorized user to maximize security.
  • the primary administrator may also be permitted to activate and deactivate group (division) accounts and individual (subdivision) accounts, to allow neighboring associations access to the database by providing individual registered accounts to individuals within the neighboring associations.
  • Access to the division database information may be provided by a group or division account, as controlled by one or more group administrators.
  • the group may be provided by a group or division account, as controlled by one or more group administrators.
  • administrators may be permitted to activate and deactivate individual (subdivision) accounts within the group, and to re-assign lock units as appropriate.
  • the group administrator may also have the authority to obtain audit information from the locks (e.g., when the locks are retrieved from the field and re-connected with the central computer) and to obtain feedback from the authorized users.
  • authorized users may be prompted (e.g., by phone or email) a predetermined time after access was requested (e.g., two days) for feedback on the property for which access was requested. This may provide valuable information to a listing agent regarding impressions or concerns about the property.
  • the group administrator may review this feedback, pass the feedback along to individual agents, and/or follow up with the authorized user for more information or in cases where no feedback has been provided.
  • the group administrator may also have permission (by the system) to grant access codes to non-registered users (e.g., non-association realtors and contractors).
  • Individual accounts may be established for each registered user of the system, for whom membership information and good standing have been maintained. Each individual may be provided with a user name and password for access to his or her account, updated with any changes to the individual's membership (e.g., deactivation if the individual leaves the association). Deactivation of an individual account may prompt notifications to the individuals and groups for whom the deactivated individual had been granted still-active access to a lock unit, so that these codes may be deactivated at the corresponding lock units.
  • any individual with an active account may be permitted to obtain access codes for any active lock unit within the system, to have inactive lock units assigned to his or her account, to review scheduling information related to a lock unit, and to receive alerts of activity associated with an assigned lock unit and feedback associated with other individuals' access to the lock unit (e.g., showing of the property, contractor work on the property).
  • an individual account to which a lock unit has been assigned may be granted sole control for specific permission related to the key safe, such as providing access codes to non-registered or non-association individuals and contractors.
  • Primary, group, or individual accounts may also have the ability to create delegate accounts to allow designated individuals (e.g., third party scheduler, secretary, on- call group, or office manager) to receive notifications, generate reports, and provide access codes to non-registered users.
  • Information on each delegate account may be stored in the system and associated with any access code granted or any additional actions taken using the account.
  • FIG. 3 is a block diagram detailing an exemplary process 300 for managing non-networked access control to a property.
  • an individual communicates a property access request directly or indirectly to a central computer (e.g., on a secure web page, by e-mail, text message, automated phone entry, or an oral or written request to an administrator operator of the computer).
  • the individual's status is determined, for example, by entry of a user password, scanned key card, biometric scan or other such entry (block 320).
  • an access code stored on both the computer and the lock unit is provided to the individual (block 330), the provided access code is associated with the authorized individual, whose information (name, contact information, etc.) is stored on the computer (block 340), and the provided access code is identified on the computer as no longer available (block 350).
  • the access request may be submitted to the property owner or administrator for approval (block 360). If approval is granted, an access code is provided according to blocks 330, 340, and 350 of the exemplary process. If approval is denied, the denial is communicated to the individual (block 370).
  • these various aspects, concepts and features may be used in many alternative embodiments, either individually or in various combinations and sub-combinations thereof. Unless expressly excluded herein all such combinations and sub-combinations are intended to be within the scope of the present inventions. Still further, while various alternative embodiments as to the various aspects, concepts and features of the inventions—such as alternative materials, structures, configurations, methods, circuits, devices and components, software, hardware, control logic, alternatives as to form, fit and function, and so on—may be described herein, such descriptions are not intended to be a complete or exhaustive list of available alternative embodiments, whether presently known or later developed.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Storage Device Security (AREA)

Abstract

An exemplary system for managing electronic access to a property includes a computer storing a first set of access codes and a first lock unit disconnected from the computer and storing the first set of access codes. The first lock unit is configured to unlock in response to user entry of a first access code from the first set of access codes on a lock interface of the first lock unit. The computer is configured to provide the first access code from the first set of access codes in response to an authorized request for access to a first property associated with the first lock unit.

Description

ELECTRONIC ACCESS CONTROL SYSTEM FOR LOCK UNIT
Cross-reference to Related Application
[0001] This application claims the benefit of U.S. Provisional Patent Application Serial No. 61/389,449, entitled "LOCKABLE ENCLOSURE WITH ELECTRONIC
ACCESS CONTROL" and filed October 4, 2010, the entire contents of which are
incorporated herein by reference, to the extent that they are not conflicting with the present application.
Background
[0002] Lockable enclosures are used in many indoor and outdoor environments to restrict access to various items by providing the enclosure with a lockable door, lid, drawer, or other such barrier. The barrier can include a locking mechanism, such as, for example, a combination lock, padlock, set of pushbuttons, or key operated latch, to limit access to the contents of the enclosure to one or more authorized users. Some applications may require secure storage of one or more smaller items, such as keys, credit cards, or documents, for which restricted access by a limited number of authorized individuals is desirable. One example of such an enclosure is a key safe, which is affixed to an entry door (e.g., shackled around the doorknob) of a building for secure retention of an authorized key for the entry door. The key safe may employ, for example, a pushbutton or combination dial locking mechanism, such that authorized users informed of the unlocking combination may open the key safe to access the door key for entry into the building. One such application for which key safes are conventionally used is for door entry key management for real estate showings and related transactions, such as property staging, maintenance, and contractor repairs.
Summary
[0003] In an exemplary method for providing non-networked access to a property, a first set of access codes is stored on each of a computer and a first lock unit. The first lock unit is associated with the property on the computer. The first set of access codes is associated with the first lock unit on the computer. Communication between the first lock unit and the computer is disconnected. A request for access to the property is received from an authorized user. An access code is provided from the first set of access codes to the authorized user. The provided access code is then identified on the computer as unavailable.
[0004] An exemplary system for managing electronic access to a property includes a computer storing a first set of access codes and a first lock unit disconnected from the computer and storing the first set of access codes. The first lock unit is configured to unlock in response to user entry of a first access code from the first set of access codes on a lock interface of the first lock unit. The computer is configured to provide the first access code from the first set of access codes in response to an authorized request for access to a first property associated with the first lock unit.
[0005] An exemplary electronic key safe includes a housing, an access door blocking access to a chamber in the housing when the access door is secured in a closed position, and a keypad including a plurality of buttons for entry of an access code. A processor is disposed within the housing and in communication with the keypad, the processor storing a first subset of access codes and a second subset of access codes different from the first subset of access codes. A clock unit is in communication with the processor. The processor is configured to activate the first subset of access codes during a first time period, to deactivate the first subset of access codes during a second time period subsequent to the first time period, to deactivate the second subset of access codes during the first time period, and to activate the second subset of access codes during the second time period.
Brief Description of the Drawings
[0006] Further features and advantages of the invention will become apparent from the following detailed description made with reference to the accompanying drawing, wherein:
[0007] Figure 1 is a schematic view of an exemplary access control device;
[0008] Figure 2 is a block diagram of an exemplary process for establishing remote management of an exemplary access control device; and
[0009] Figure 3 is a block diagram of an exemplary process for processing an access request for an exemplary access control device. Detailed Description
[0010] This Detailed Description merely describes embodiments of the invention and is not intended to limit the scope of the claims in any way. Indeed, the invention as claimed is broader than and unlimited by the exemplary embodiments, and the terms used in the claims have their full ordinary meaning.
[0011] Also, while the exemplary embodiments described in the specification and illustrated in the drawings relate to an electronic key safe and associated access control system for entry door keys for real estate properties, it should be understood that many of the inventive features described herein may be applied to other types of lock units and other applications, including, for example, other electronic storage safes and lock boxes and lock units for other lockable access doors, drawers, and other such structures.
[0012] Conventional mechanical realtor key safes (e.g., mechanical pushbutton or combination dial key safes) allow an entry key to be kept at a property, while limiting access to the key to individuals authorized to enter the property (e.g., the owner, listing agents, showing agents, contractors, invited guests, etc.) who have been given an access code (e.g., key entry or dial position sequence). While this arrangement provides a certain level of security, the access code or codes may be forgotten, or intentionally or unintentionally given to unauthorized individuals. Further, where more limited access (a specific period of time or a specific number of accesses) to a user is desired, a manual combination change of the locking mechanism and/or temporary removal of the entry key from the key safe may be necessary. Because of these limitations, use of a mechanical key safe often results in less limited access to the property than what is desired.
[0013] Conventional stand alone electronic key safes may provide enhanced security by allowing access codes to be more easily changed, and by providing different access codes for different users, such that access to a specific user may be discontinued while maintaining access for other users. Additionally, all access codes may be disabled for predetermined time periods, for example, time periods during which the property owners are present and do not wish to be disturbed. However, these conventional stand alone electronic key safes typically still require on site access to the key safe to make additions, deletions, schedule changes, or other such programming changes to the access codes. This limitation results in active access codes that are usable by individuals (e.g., showing agents) for periods well beyond a desired access period.
[0014] In other embodiments, an electronic key safe may be linked by a wired or wireless connection to a central computer (e.g., a server or stand alone terminal), or other such device to establish a networked access control system configured to remotely monitor and control access to one or more key safes. In one embodiment, the electronic access management system may be used to remotely add, delete, or otherwise update access code information on the key safe unit. In another embodiment, access attempt information is provided from the key safe unit to a central computer, where the access attempt information is evaluated and unlocking instructions are provided back to the key safe unit. While these arrangements provide for greater flexibility and enhanced security in remotely modifying access conditions for one or more individuals, the required communication and data management systems may be complex and costly to establish and maintain.
[0015] The present application contemplates, in one embodiment, a non-networked electronic access control system for managing access to one or more lock units, such as, for example, realtor key safes provided at one or more properties for restricted access to an entry key for the property. In one embodiment, a computer is synchronized with a lock unit by storing the same set of access codes on both the computer and the lock unit. An authorized user communicates with the computer (directly or indirectly) to obtain an access code for a lock unit temporarily or permanently disconnected (i.e., not in communication by wired or wireless connection) from the computer, located at or otherwise corresponding to the property for which access is sought.
[0016] According to an aspect of the present application, a computer may be provided with a matrix, database, or other such system that stores sets of access codes and other such information about the lock units and the authorized users that may be granted access to one or more of the lock units. The system may be configured to associate a set of access codes (or an algorithm for generating the set of access codes) with the lock unit on which the same set of access codes (or algorithm for generating the set of access codes) has been stored. When the system receives a request from an authorized user for access to the lock unit, the system provides the authorized user with an access code from the set of access codes (or access code generating algorithm) associated with the lock unit. Upon providing the access code, the system is configured to associate the provided access code with the authorized user to whom the access code had been provided, and to remove the provided access code from a subset of available, unused access codes for the lock unit. This arrangement allows for identification of any authorized user that has accessed the lock unit based on the access code entered on the lock unit. This information may be gathered, for example, by connecting the lock unit with a memory source or directly with the computer (e.g., after the lock unit has been detached from the associated property and returned to a central location at which the computer resides).
[0017] According to another aspect of the present application, an electronic access control system may be configured to provide access codes of limited duration, which may be limited, for example, by time from first use (e.g., three hours from initial access),
predetermined periods of time (e.g., one day, one week, etc.), a predetermined number of uses (e.g., one-time use), or a combination of two or more such limitations. In such an
arrangement, the lock unit may be provided with a clock unit to control the status of time- based access codes. Where a lock unit is provided with a set of access codes that match a corresponding set of access codes stored at a central computer, as described above, the clock unit may be synchronized with a clock unit of the central computer, such that the computer only provides authorized users with access codes that are recognized as active in the lock unit for the present or future time period for which access has been requested. A set of access codes may include multiple access code subsets having differing status conditions to limit the number of active, usable access codes at any given time, and/or to limit the duration over which each access code is active. As one example, a central computer and a lock unit may each store a first set of access codes including a plurality of access code subsets
corresponding to time periods during which the access codes within each subset are active. For example, a first subset of access codes may be active during a first time period (e.g., day, week, month, etc.), a second subset of access codes may be active during a second time period (e.g., a subsequent day, week, month, etc.), and so forth. As another example, the lock unit may be additionally or alternatively configured to establish a predetermined duration or lifespan (e.g., a time period, a number of uses, or both) for an access code once the access code is first entered into the lock unit (e.g., by a keypads entry). These arrangements limit the extent to which an authorized user may intentionally or accidentally convey an active access code to an unauthorized user.
[0018] According to another aspect of the present application, an access control system for a lock unit may provide for auditing of access events involving a lockable enclosure associated with a specific authorization provided to a specific individual, to track the date, time, frequency, and duration of access to the lockable enclosure. The auditing system may additionally be configured to identify unauthorized or unsuccessful attempts to access the lockable enclosure, times in which the lockable enclosure was open (e.g., by a door movement sensor), low battery conditions, or other conditions associated with the lockable enclosure. This and other audit information may be accessible on a display screen on the lock unit, or may be transmitted to a remote computer via a communication link or electronic storage media.
[0019] One such programmable lock unit, as schematically illustrated in Figure 1, involves the use of one or more key safes, lock boxes, or other such lockable enclosures 10 for the real estate market, for secure storage, at a property offered for sale, of one or more entry keys to the property. The lock boxes 10 provide limited access to a real estate agent tasked with showing a property (the "showing agent"), and/or access to other individuals (e.g., contractors, cleaning services) of varying duration and frequency without involving distribution and retrieval of physical keys or mechanically changing authorized combination codes at the lock box. The access control system provides one or more condition based unlocking codes that allow an individual responsible for controlling access to the property (e.g., the "listing agent") to provide varied access to the lock box (and therefore, to the property) to individuals that need to enter the property. In an exemplary embodiment, an electromechanical locking mechanism (not shown) is in communication with a processor of the lockable enclosure to unlock an access door in response to entry of an active, authorized access code, for access to the stored key or key card, or other such item.
[0020] In one embodiment, a lockable enclosure or lock box 10 includes a housing 18 and an access door 14 secured to the housing in a locked condition to block access to a chamber within the housing (for example, for secure storage of an entry key). A processor (not shown) is configured to store a matrix of access information (e.g., authorized access codes and conditions under which each combination is activated) established for limited access to the enclosure. As discussed above, this data may additionally be stored at a computer (e.g., server, stand alone terminal, or other such device) 20, which may be maintained at a remote location. The computer 20 may be configured to communicate this information (either wirelessly or by a wired connection) to a remote device (e.g., a computer, cell phone, etc.) 50 to grant access rights to an authorized rights (via conveyed access codes) or inform a remote user or administrator of the scheduled accessibility to the lockable enclosure. A group of lockable enclosures 10 may be serialized or otherwise identified to be associated with a corresponding matrix of access information stored in the processor of the lockable enclosure 10 and/or at the central device 20. The processor of the lockable enclosure may be configured to undergo a registration process by which a secure connection to the central computer 20 or an Internet based system may be initially established to import the initial matrix of access information. Alternatively, a matrix of access information may be imported from a memory source 30 (e.g., CD, DVD, USB thumb drive, or flash memory card) connected with a data port 17 (e.g., a USB port) on the lockable enclosure. This registration system may include documentation and tutorials for set-up, use, and maintenance of the lockable enclosure. A start-up code may be provided with each lockable enclosure to permit access to web-based registration of the lock and/or advanced features of the access control system software.
[0021] The lockable enclosure 10 may be provided with a control interface 11 (e.g., a screen with a menu-driven interface) in communication (e.g., in circuit communiation) with the processor for accessing and modifying one or more of the access control features described herein. For example, an interface screen 11 may display key entries, instructions to the individual associated with the entered authorized code, special information regarding the property (e.g., dog within the house). An owner interface 12 (including buttons or some other control feature) may be provided on the lockable enclosure (e.g., on a surface separate from the combination code buttons) to command the lockable enclosure to perform a variety of functions, such as detaching the lockable enclosure from a mounting structure (e.g., releasing a shackle to remove the lockable enclosure from a doorknob), accessing audit information, setting overriding lockout periods, entering instructions to provide to one or more individuals assigned with access codes, checking battery power levels, synchronizing time between the lock and a central device, or reprogramming authorized codes.
[0022] For stand-alone usage of the lockable enclosure 10, the locking arrangement may be battery powered. The batteries (not shown) may be selected to provide sufficient power over an extended period of normal use (e.g., 5 years of normal operation), and may be arranged to be accessible only when the lockable enclosure has been opened. To enable access to the lockable enclosure in the event that the battery is depleted, an external power port, such as a battery port or AC adapter port, may be provided on the lockable enclosure to temporarily power the locking arrangement such that the enclosure may be opened for replacement of the depleted battery or batteries. In other embodiments, solar cells, micromechanical generators, or other such energy harvesting devices may additionally or alternatively be employed to power the locking arrangement.
[0023] For a standard real estate lock box application, minimal storage space within the enclosure may be sufficient (for example, space sufficient for storage of up to five keys or key cards). The lock box may be dimensionally sized to fit on a doorknob (e.g., fastened by a locking shackle 19), within a door frame, and between an entry door and an outer screen door. The enclosure may be waterproof and resistant to extreme temperatures and tampering, and may include a protective cover or door (not shown) for the buttons, ports, and other electronic controls. An access keypad 15 in communication with the processor may include any number of access code buttons (e.g., 5-12 buttons) for entry of an alphanumeric combination code, and a start/reset button 16 may be provided to clear an entered code and/or to "wake up" the circuitry for evaluation of a subsequently entered code, and/or to turn on backlighting for the keypad. To impede unauthorized access attempts, the lock processor may be configured to shut down temporarily (e.g., for 5 minutes, or until an administrator key is entered) if a wrong code is entered a predetermined number of times (e.g., 10 incorrect code entries).
[0024] Any suitable electromechanical locking mechanism may be provided to unlock the enclosure in response to an electrical signal generated upon entry of an authorized access code. One such electromechanical locking mechanism is described in co-pending U.S. Non- provisional Application Serial No. 13/077,182, entitled LOCKABLE ENCLOSURE WITH LOADING CARTRIDGE and filed on March 31, 2011, the entire disclosure of which is incorporated by reference, to the extent that it is not conflicting with the present application.
[0025] To facilitate access control management of the lockable enclosures, the access control system may be provided with a scheduling system, in which access codes are provided and scheduled when a viewing of the property is scheduled, or when maintenance or repairs to the property are scheduled, with the access code assigned in the system to the agent or individual to which access is being granted. The scheduling system may provide the scheduled confirmation with access code by one of many suitable channels, including, for example, e-mail, text message, or a secure web page.
[0026] In one embodiment, user access codes may be generated, stored and categorized based on a duration of permitted access for which the access code will be recognized as an authorized code to successfully unlock the locking arrangement. For example, a first group of short term (e.g., daily) access codes may provide access (for example, to a showing agent) for a minimal period, such as a single day. These codes may be stored in lists or sets on the processor of the lockable enclosure, in a matrix that identifies the duration for which the code will be recognized as an authorized code. In one embodiment, a set of short term access codes includes a first subset of access codes (for example, up to 15 activated codes) operable to unlock the lock during a first time period (e.g., a first day). At the end of the first time period, the lock may automatically deactivate this first subset of access codes and activate a second subset of access codes operable to unlock the lock during a second time period (e.g., a second day), replacing the first subset of access codes in an active matrix with the second subset of access codes. Alternatively, the system may be configured to activate a new short term access code only as it is required (e.g., upon initial use of the preceding access code), such that the expiration of an access code does not necessarily coincide with the activation of a new access code. The short term access codes may be arranged in multiple sets, with only one active access code per set, or in a single set, with multiple active access codes. In still other embodiments, the access codes may be generated by the lock processor or central device using an algorithm, with the generated codes being stored in the matrix for the authorized duration, and stored more permanently (e.g., for several years or longer) in the lock processor or at the central device for auditing purposes.
[0027] The access control system may be configured to store, in the matrix or elsewhere, the identities of the individuals to which each of the short term access codes has been assigned, such that subsequent accessing of the lockable enclosure using an access code may identify the corresponding individual as having accessed the enclosure. This storage arrangement also may serve to prevent the system software, or an operator of the system, from providing the same access code to multiple individuals. This identification of individuals associated with specific access codes may provide for tracking of the dates and times of an individual's access of the lockable enclosure, in the event that theft or damage to the property is later discovered, or to keep a general record of access to the property. Other conditions at the lockable enclosure may also be tracked, including, for example, unsuccessful access code entry attempts, and movement of or tampering with the lockable enclosure (e.g., by using sensors provided with the lockable enclosure).
[0028] In one embodiment, a second group of medium term access codes may be provided to grant access for a longer duration than the short term access codes (e.g., one week access) to individuals requiring extended access (e.g., contractors). As with the short term access codes, these codes may be stored in lists or sets on the processor of the lockable enclosure, in a matrix that identifies the duration for which the code will be recognized as an authorized code. In one embodiment, a list or set of medium term access codes includes a first subset of access codes (for example, up to 10 activated codes) operable to unlock the lock during a first week. At the end of the first week, the lock may automatically deactivate this first subset of access codes and activate a second subset of access codes operable to unlock the lock during a second week, replacing the first subset of access codes in an active matrix with the second subset of access codes. Alternatively, the system may be configured to activate a new medium term access code only as it is required (e.g., upon initial use of the preceding access code), such that the expiration of an access code does not necessarily coincide with the activation of a new access code. The medium term access codes may be arranged in multiple sets, with only one active access code per list, or in a single set, with multiple active access codes.
[0029] The access control system may further provide for access codes authorized for other durations, such as a long term (e.g., one month) access, similar to the short term and medium term access code arrangements described above. Additionally or alternatively, each access code may be independently tagged or identified in the matrix with any desired duration of authorized access, for example, a period as short as an hour or as long as 6 months. Access maybe further limited to time-of-day (e.g., daytime hours of 8 a.m. to 5 p.m.), day of the week (e.g., Monday through Friday only), future time periods (e.g., a property rental period), or frequency of access (e.g., one time use, or a maximum of three accesses).
[0030] Still further, the processor may store owner or administrator access codes that are not time, duration, or frequency limited to provide more permanent access to certain individuals, such as the lock box owner (e.g., the listing agent) or the property owner. These codes may be resettable by the individual that has been granted permanent access, for example, to change the code to a more easily remembered code. Further, the system may be configured to grant additional control (e.g., code changing ability, lockout/override ability, or access to auditing information) to individuals entering the permanent access codes.
[0031] Authorized access codes may be provided in any desirable sequence length. In some embodiments, it may be desirable to use longer or more complex access codes for longer term and permanent access to the enclosure, to provide additional security. In one embodiment, short term access codes include six digits, while longer term access codes include seven digits and permanent access codes include eight digits. A separate code may be provided for release of the shackle to remove the lock box from the property.
[0032] Figure 2 is a block diagram detailing an exemplary process 200 for
establishing a non-networked electronic access control system for an electronic lock unit to control access to a property. At block 210, a set of access codes maintained on a central computer is stored on the lock unit. The stored set of access codes is associated with the lock unit on the central computer (block 220). The lock unit is associated with a property on the central computer (block 230). The lock unit is disconnected from the computer (block 240), for example, by removing a wired connection or disabling a wireless connection. The lock unit is then affixed to the property (block 250) to provide direct (e.g., as a door lock or locker lock) or indirect (e.g., as a key safe) access to the property.
[0033] In an exemplary electronic access management system, a primary database of lock unit, user, and property information is managed at a central location, for example, by a realtor association or association service provider. The primary database includes lock unit identification and time-based access code information for all of the lock units registered to the association. From the association, groups of lock units may be sub-registered to a division (e.g., realtor office), and individual lock units within each group may be further sub-registered to individuals within the division (e.g., real estate agents). The primary database may be divided into sub-databases corresponding to the lock unit, user, and property information specific to the divisions and sub-divisions (individuals) to facilitate management of the data.
[0034] One or more primary administrators of the exemplary system may be provided with control and visibility of all information within the database, including information specific to the divisions and subdivisions within the system. In one embodiment, access to the specific access codes provided to each authorized user may be limited to that authorized user to maximize security. The primary administrator may also be permitted to activate and deactivate group (division) accounts and individual (subdivision) accounts, to allow neighboring associations access to the database by providing individual registered accounts to individuals within the neighboring associations.
[0035] Access to the division database information may be provided by a group or division account, as controlled by one or more group administrators. The group
administrators may be permitted to activate and deactivate individual (subdivision) accounts within the group, and to re-assign lock units as appropriate. The group administrator may also have the authority to obtain audit information from the locks (e.g., when the locks are retrieved from the field and re-connected with the central computer) and to obtain feedback from the authorized users. In one exemplary system, authorized users may be prompted (e.g., by phone or email) a predetermined time after access was requested (e.g., two days) for feedback on the property for which access was requested. This may provide valuable information to a listing agent regarding impressions or concerns about the property. The group administrator may review this feedback, pass the feedback along to individual agents, and/or follow up with the authorized user for more information or in cases where no feedback has been provided. The group administrator may also have permission (by the system) to grant access codes to non-registered users (e.g., non-association realtors and contractors).
[0036] Individual accounts may be established for each registered user of the system, for whom membership information and good standing have been maintained. Each individual may be provided with a user name and password for access to his or her account, updated with any changes to the individual's membership (e.g., deactivation if the individual leaves the association). Deactivation of an individual account may prompt notifications to the individuals and groups for whom the deactivated individual had been granted still-active access to a lock unit, so that these codes may be deactivated at the corresponding lock units.
[0037] In an exemplary system, any individual with an active account may be permitted to obtain access codes for any active lock unit within the system, to have inactive lock units assigned to his or her account, to review scheduling information related to a lock unit, and to receive alerts of activity associated with an assigned lock unit and feedback associated with other individuals' access to the lock unit (e.g., showing of the property, contractor work on the property). In some embodiments, an individual account to which a lock unit has been assigned may be granted sole control for specific permission related to the key safe, such as providing access codes to non-registered or non-association individuals and contractors.
[0038] Primary, group, or individual accounts may also have the ability to create delegate accounts to allow designated individuals (e.g., third party scheduler, secretary, on- call group, or office manager) to receive notifications, generate reports, and provide access codes to non-registered users. Information on each delegate account may be stored in the system and associated with any access code granted or any additional actions taken using the account.
[0039] Figure 3 is a block diagram detailing an exemplary process 300 for managing non-networked access control to a property. At block 310, an individual communicates a property access request directly or indirectly to a central computer (e.g., on a secure web page, by e-mail, text message, automated phone entry, or an oral or written request to an administrator operator of the computer). The individual's status is determined, for example, by entry of a user password, scanned key card, biometric scan or other such entry (block 320). If the individual is registered or authorized for access to the property, an access code stored on both the computer and the lock unit is provided to the individual (block 330), the provided access code is associated with the authorized individual, whose information (name, contact information, etc.) is stored on the computer (block 340), and the provided access code is identified on the computer as no longer available (block 350). If the individual is not registered or authorized for access to the property, the access request may be submitted to the property owner or administrator for approval (block 360). If approval is granted, an access code is provided according to blocks 330, 340, and 350 of the exemplary process. If approval is denied, the denial is communicated to the individual (block 370).
[0040] While various inventive aspects, concepts and features of the inventions may be described and illustrated herein as embodied in combination in the exemplary
embodiments, these various aspects, concepts and features may be used in many alternative embodiments, either individually or in various combinations and sub-combinations thereof. Unless expressly excluded herein all such combinations and sub-combinations are intended to be within the scope of the present inventions. Still further, while various alternative embodiments as to the various aspects, concepts and features of the inventions—such as alternative materials, structures, configurations, methods, circuits, devices and components, software, hardware, control logic, alternatives as to form, fit and function, and so on—may be described herein, such descriptions are not intended to be a complete or exhaustive list of available alternative embodiments, whether presently known or later developed. Those skilled in the art may readily adopt one or more of the inventive aspects, concepts or features into additional embodiments and uses within the scope of the present inventions even if such embodiments are not expressly disclosed herein. Additionally, even though some features, concepts or aspects of the inventions may be described herein as being a preferred
arrangement or method, such description is not intended to suggest that such feature is required or necessary unless expressly so stated. Still further, exemplary or representative values and ranges may be included to assist in understanding the present disclosure; however, such values and ranges are not to be construed in a limiting sense and are intended to be critical values or ranges only if so expressly stated. Moreover, while various aspects, features and concepts may be expressly identified herein as being inventive or forming part of an invention, such identification is not intended to be exclusive, but rather there may be inventive aspects, concepts and features that are fully described herein without being expressly identified as such or as part of a specific invention. Descriptions of exemplary methods or processes are not limited to inclusion of all steps as being required in all cases, nor is the order that the steps are presented to be construed as required or necessary unless expressly so stated.

Claims

What is claimed is:
1. A method for providing non-networked access to a property, the method comprising: storing a first set of access codes on each of a computer and a first lock unit;
associating the first lock unit with the property on the computer;
associating the first set of access codes with the first lock unit on the computer;
disconnecting communication between the first lock unit and the computer;
receiving a request for access to the property from an authorized user;
providing an access code from the first set of access codes to the authorized user; and identifying the provided access code on the computer as unavailable.
2. The method of claim 1, wherein the first set of access codes comprises first and second subsets of access codes, wherein when the requested access to the property is for a first time period, the access code is provided from the first subset of access codes to the authorized user, and when the requested access to the property is for a second time period, the access code is provided from the second subset of access codes to the authorized user.
3. The method of claim 2, wherein the central computer includes a clock unit synchronized with a clock unit of the first lock unit, and further wherein the first subset of access codes is activated in the first lock unit during the first time period and deactivated in the first lock unit during the second time period, and the second subset of access codes is deactivated in the first lock unit during the first time period and activated in the first lock unit during the second time period.
4. The method of claim 1 , wherein the second time period has a duration longer than the first time period.
5. The method of claim 1, wherein the second time period is subsequent to the first time period.
6. The method of claim 1 , wherein when the authorized user is not a registered user, the request for access is forwarded to an administrator for authorization.
7. The method of claim 6, further comprising storing information about the authorizing administration and associating the information about the authorizing administration with the provided access code.
8. The method of claim 1, further comprising providing a notification message to an administrator upon providing the access code to the authorized user.
9. The method of claim 1 , further comprising prompting the authorized user for feedback regarding the property.
10. A system for managing electronic access to a property, the system comprising:
a computer storing a first set of access codes; and
a first lock unit disconnected from the computer and storing the first set of access codes, the first lock unit being configured to unlock in response to user entry of a first access code of the first set of access codes on a lock interface of the first lock unit;
wherein the computer is configured to provide the first access code from the first set of access codes in response to an authorized request for access to a first property associated with the first lock unit.
11. The system of claim 10, wherein the computer and the first lock unit each include a clock unit, the clock unit of the computer being synchronized with the clock unit of the first lock unit.
12. The system of claim 10, wherein the first set of access codes includes a first subset of access codes and a second subset of access codes different from the first subset of access codes, wherein the computer is configured to provide the first access code from the first subset of access codes in response to an authorized request for access to the first property during a first time period, and wherein the computer is configured to provide the first access code from the second subset of access codes in response to an authorized request for access to the first property during a second time period different from the first time period.
13. The system of claim 12, wherein the first lock unit is configured to activate the first subset of access codes during the first time period, to deactivate the first subset of access codes during the second time period, to deactivate the second subset of access codes during the first time period, and to activate the second subset of access codes during the second time period.
14. The system of claim 10, wherein the first lock unit is configured to deactivate the first access code after a predetermined period from initial entry of the first access code on the lock interface of the first lock unit.
15. The system of claim 10, wherein the computer is configured to associate user information corresponding with the authorized user with the provided access code.
16. The system of claim 10, wherein the first lock unit is configured to store access attempt information associated with the first access code when the first access code is entered on the lock interface of the first lock unit.
17. An electronic key safe comprising:
a housing;
an access door blocking access to a chamber in the housing when the access door is secured in a closed position;
an keypad including a plurality of buttons for entry of an access code;
a processor disposed within the housing and in communication with the keypad, the processor storing a first subset of access codes and a second subset of access codes different from the first subset of access codes; and
a clock unit in communication with the processor;
wherein the processor is configured to activate the first subset of access codes during a first time period, to deactivate the first subset of access codes during a second time period subsequent to the first time period, to deactivate the second subset of access codes during the first time period, and to activate the second subset of access codes during the second time period.
18. The electronic key safe of claim 17, wherein the processor is configured to deactivate an active access code after a predetermined period from initial entry of the entered active access code on the lock interface.
19. The electronic key safe of claim 17, further comprising an electronic data port in communication with the processor, wherein the processor stores access attempt information for communication to an external device through the electronic data port.
20. The electronic key safe of claim 17, further comprising an interface screen in communication with the processor, wherein the processor stores access attempt information for communication to a user via the interface screen.
PCT/US2011/054712 2010-10-04 2011-10-04 Electronic access control system for lock unit WO2012047850A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US38944910P 2010-10-04 2010-10-04
US61/389,449 2010-10-04

Publications (2)

Publication Number Publication Date
WO2012047850A2 true WO2012047850A2 (en) 2012-04-12
WO2012047850A3 WO2012047850A3 (en) 2014-04-17

Family

ID=45928364

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/054712 WO2012047850A2 (en) 2010-10-04 2011-10-04 Electronic access control system for lock unit

Country Status (1)

Country Link
WO (1) WO2012047850A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016145168A1 (en) * 2015-03-10 2016-09-15 Abb Technology Ag System and method for administering physical security access to components of a process control system
US9679429B2 (en) 2012-12-03 2017-06-13 13876 Yukon Inc. Wireless portable lock system
CN109493484A (en) * 2018-11-13 2019-03-19 天津航鑫科技有限公司 A method of the intelligent door lock suitable for rented house remotely opens the door
FR3081663A1 (en) * 2018-05-23 2019-11-29 Orange METHOD FOR REMOTELY MANAGING THE OPENING OF AN ELECTRONIC LOCK WITH A USER INTERFACE, TERMINAL, LOCK AND COMPUTER PROGRAM
CN113631790A (en) * 2019-03-26 2021-11-09 康纳国际有限公司 Key safe and key access system
IT202100014468A1 (en) * 2021-06-03 2022-12-03 Fin Group S R L Padlock access control device with remote connection
US12014294B2 (en) 2017-09-20 2024-06-18 DaVinci Lock LLC System and method for transmitting unlock codes based on event triggers

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050044906A1 (en) * 2003-07-25 2005-03-03 Spielman Timothy G. Method and system for setting entry codes via a communications network for access to moveable enclosures
US20050099262A1 (en) * 2003-11-07 2005-05-12 Childress Robert N. Electronic wireless locking system
US20100037665A1 (en) * 2003-09-19 2010-02-18 Ace-Kirker Wayne Lionel Security device for lock and method of manufacture thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050044906A1 (en) * 2003-07-25 2005-03-03 Spielman Timothy G. Method and system for setting entry codes via a communications network for access to moveable enclosures
US20100037665A1 (en) * 2003-09-19 2010-02-18 Ace-Kirker Wayne Lionel Security device for lock and method of manufacture thereof
US20050099262A1 (en) * 2003-11-07 2005-05-12 Childress Robert N. Electronic wireless locking system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9679429B2 (en) 2012-12-03 2017-06-13 13876 Yukon Inc. Wireless portable lock system
WO2016145168A1 (en) * 2015-03-10 2016-09-15 Abb Technology Ag System and method for administering physical security access to components of a process control system
US10789392B2 (en) 2015-03-10 2020-09-29 Abb Schweiz Ag System and method for administering physical security access to components of a process control system
US12014294B2 (en) 2017-09-20 2024-06-18 DaVinci Lock LLC System and method for transmitting unlock codes based on event triggers
FR3081663A1 (en) * 2018-05-23 2019-11-29 Orange METHOD FOR REMOTELY MANAGING THE OPENING OF AN ELECTRONIC LOCK WITH A USER INTERFACE, TERMINAL, LOCK AND COMPUTER PROGRAM
CN109493484A (en) * 2018-11-13 2019-03-19 天津航鑫科技有限公司 A method of the intelligent door lock suitable for rented house remotely opens the door
CN113631790A (en) * 2019-03-26 2021-11-09 康纳国际有限公司 Key safe and key access system
IT202100014468A1 (en) * 2021-06-03 2022-12-03 Fin Group S R L Padlock access control device with remote connection

Also Published As

Publication number Publication date
WO2012047850A3 (en) 2014-04-17

Similar Documents

Publication Publication Date Title
US11636721B2 (en) Access management and reporting technology
US10565809B2 (en) Method, system and device for securing and managing access to a lock and providing surveillance
WO2012047850A2 (en) Electronic access control system for lock unit
US7170998B2 (en) Door access control and key management system and the method thereof
US5245652A (en) Secure entry system with acoustically coupled telephone interface
CA1306531C (en) Electronic lock system with timer/calendar features
US8274365B2 (en) Smart lock system
US8970344B2 (en) Method and system for data control in electronic locks
US5349345A (en) Electronic lock
US6842105B1 (en) Dual mode data logging
JP4906212B2 (en) Key and lock device
US20030179075A1 (en) Property access system
JPWO2008130000A1 (en) Key management box
AU2012335624A1 (en) Access code management systems
JP5686269B1 (en) Lock opening and closing device and lock opening and closing system
Baikerikar et al. Smart door locking mechanism
JP2007126889A (en) Lending management device
WO2011156689A1 (en) An electronic locking system with lock mechanism, key handle, and identification element
CA2360120C (en) Door access control and key management system and the method thereof
EP2207146A2 (en) Programmable electronic access control system
US20080282185A1 (en) Customized messages for password/passcode change events
JP6496222B2 (en) Room lock management system
WO2024038021A1 (en) System, comprising a lock unit for a cabinet and at least one portable user terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11831425

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 11831425

Country of ref document: EP

Kind code of ref document: A2