US20050168320A1 - Electronic real estate lockbox system - Google Patents
Electronic real estate lockbox system Download PDFInfo
- Publication number
- US20050168320A1 US20050168320A1 US10/989,902 US98990204A US2005168320A1 US 20050168320 A1 US20050168320 A1 US 20050168320A1 US 98990204 A US98990204 A US 98990204A US 2005168320 A1 US2005168320 A1 US 2005168320A1
- Authority
- US
- United States
- Prior art keywords
- key
- lockbox
- data
- board
- battery
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/32—Time-recording locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/21—Individual registration on entry or exit involving the use of a pass having a variable access code
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/215—Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B19/00—Keys; Accessories therefor
- E05B19/0005—Key safes
-
- E—FIXED CONSTRUCTIONS
- E05—LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
- E05B—LOCKS; ACCESSORIES THEREFOR; HANDCUFFS
- E05B47/00—Operating or controlling locks or other fastening devices by electric or magnetic means
- E05B2047/0048—Circuits, feeding, monitoring
- E05B2047/005—Opening, closing of the circuit
- E05B2047/0053—Opening, closing of the circuit by operating the handle
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00761—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by connected means, e.g. mechanical contacts, plugs, connectors
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00857—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
- G07C2009/00865—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed remotely by wireless communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C2209/00—Indexing scheme relating to groups G07C9/00 - G07C9/38
- G07C2209/08—With time considerations, e.g. temporary activation, valid time window or time limitations
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10T—TECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
- Y10T70/00—Locks
- Y10T70/70—Operating mechanism
- Y10T70/7051—Using a powered device [e.g., motor]
- Y10T70/7062—Electrical type [e.g., solenoid]
- Y10T70/7068—Actuated after correct combination recognized [e.g., numerical, alphabetical, or magnet[s] pattern]
Definitions
- the present invention relates to real estate lockboxes and other secure entry systems.
- Lockboxes are used in the real estate industry to contain the keys of houses listed for sale.
- Prior art lockboxes have primarily been mechanical devices which allow access to a secure compartment by use of a conventional key.
- Such lockboxes and keys have had numerous disadvantages. These disadvantages have been overcome by the present invention and a great number of new features have been provided.
- One feature of the present invention is the provision of a code entry keypad on a lockbox key, rather than on the lockbox itself, thereby eliminating an opportunity for lockbox vandalism and preventing unauthorized passersby from communicating with the lockbox.
- Another feature of the invention is an arrangement whereby different keys can be programmed to become inoperative after different periods of time.
- Yet another feature of the invention is the ability of the lockbox to be reprogrammed in the field.
- Still another feature of the invention is the ability of the lockbox to be interrogated by a user to learn the number of times the lockbox has been accessed without returning the lockbox or an interrogating key to a central location.
- Yet another feature of the invention is an arrangement whereby a user can receive temporary authorization to access lockboxes owned by other real estate boards.
- Still another feature of the invention is an arrangement whereby lockbox battery power is conserved and solenoid work is reduced by delaying energization of unlocking solenoids until the lockbox is actually being opened.
- Yet another feature of the invention is the use of several independent lockbox battery monitoring criteria to avoid lockbox battery failure.
- Still another feature of the invention is the provision of two lockbox locking solenoids that are reciprocally mounted so that if one is jarred to an unlocked state, the other is jarred to maintain a locked state.
- Yet another feature of the invention is an arrangement whereby a manufacturer can provide a variety of different keys to its customers without tooling up several different manufacturing lines.
- Still another feature of the invention is an arrangement whereby real estate boards or agencies can limit the operations that individual keys can perform.
- Yet another feature of the invention is an arrangement whereby a user can log into a lockbox's access log without opening the lockbox.
- Still another feature of the invention is an arrangement whereby an agent who has listed a house can require visiting agents to enter an auxiliary access code before being allowed to open the lockbox.
- Yet another feature of the invention is the ability of the lockbox to render certain keys inoperative until they are reprogrammed.
- Still another feature of the invention is the recording of detailed diagnostic data about recent lockbox and key operations in order to facilitate resolution of anomalous lockbox and key behavior.
- Yet another feature of the invention is the ability of the lockbox to recognize the keys of preselected users and to prohibit them from opening the lockbox.
- Still another feature of the invention is the ability of the lockbox and key to cooperate so as to update a list of keys that are to be prevented from executing lockbox functions.
- Yet another feature of the invention is the use of a low power, yet long range electromagnetic communications technique for exchanging signals between lockbox, key and stand components.
- Still another feature of the invention is an arrangement whereby a user can enter the keystrokes needed to operate the lockbox into the key's keypad before the key is engaged with the lockbox, thereby facilitating operation of the lockbox in awkward or poorly lit locations.
- Yet another feature of the invention is an arrangement whereby the access log maintained in the lockbox can be marked so that less than the entire contents of the log can be supplied to a requesting user.
- FIG. 1 shows a lockbox, a key, a stand and a computer used in a lockbox system according to the present invention.
- FIG. 2 is a rear view, partially in section, schematically illustrating portions of a lockbox according to the present invention.
- FIG. 3 is a sectional view taken along line 3 - 3 of FIG. 2 , schematically illustrating some of the locking components in a lockbox according to the present invention.
- FIG. 4 is a top view of a shackle locking bar used in the lockbox of FIGS. 2 and 3 .
- FIG. 5 is a rear elevational view of the shackle locking bar of FIG. 4 .
- FIG. 6 is a right side view of a door stem used in the lockbox of FIGS. 2 and 3 .
- FIG. 7 is a front elevational view of a lockbox shackle used in the lockbox of FIGS. 2 and 3 .
- FIG. 8 is a sectional view of the case of the lockbox of FIGS. 2 and 3 taken along line 8 - 8 of FIG. 2 .
- FIG. 9 is a schematic block diagram of the electronic circuitry used in the lockbox of FIGS. 2 and 3 .
- FIG. 10 is a plan view of a key according to the present invention.
- FIG. 11 is a left side view of the key of FIG. 10 .
- FIG. 12 is a schematic block diagram of the electronic circuitry used in the key shown in FIGS. 10 and 11 .
- FIG. 13 is a diagram illustrating portions of the electronic memories used by the lockbox and key of the present invention.
- FIG. 14 is a top plan view of a remote stand according to the present invention.
- FIG. 15 is a sectional view taken along lines 15 - 15 of FIG. 14 and showing the stand with two different sizes of keys.
- FIG. 16 is a sectional view taken along lines 16 - 16 of FIG. 14 and showing the stand coupled to a lockbox.
- FIG. 17 is a rear elevational view of the stand shown in FIG. 14 .
- FIG. 18 a is a schematic block diagram of the electronic circuitry used a local stand according to the present invention.
- FIG. 18 b is a schematic block diagram of the electronic circuitry used in a remote stand according to the present invention.
- FIG. 19 is a schematic block diagram showing a digital reconstruction modulation system according to the present invention.
- FIG. 20 shows a radio system for updating lockboxes and keys according to the present invention.
- FIG. 21 shows a computer and trunk interface unit used in an enhanced version of the system of FIG. 1 .
- a basic lockbox system 10 includes one or more lockboxes, or keysafes, 12 , electronic keys 14 , stands 16 and computers 18 .
- Lockbox 12 contains the door key to the listed dwelling and is mounted securely on or near the dwelling.
- Electronic key 14 is used by real estate agents to open the lockbox and gain access to the dwelling key contained therein. Key 14 can also be used to read access log data from the lockbox and to load programming instructions into it.
- Stand 16 is used to interface computer 18 with the lockbox and key units.
- Computer 18 is used to store instructions in and to collect data from lockbox 12 and key 14 so as to integrate management of a lockbox system.
- lockbox 12 includes a secure enclosure, or house key compartment 20 designed to contain house keys, business cards, written messages and the like.
- Lockbox 12 is securely attached to the listed house or other fixed object by a shackle 22 or by screws (not shown).
- Shackle 22 in most instances attaches the lockbox to a doorknob, water spigot or porch guard rail.
- a door 24 to the lockbox house key compartment 20 can be opened, thereby allowing access to the house key and to other materials stored inside.
- Lockbox 12 includes a communications coil 26 , a microprocessor (CPU) 28 , a read/write (RAM) memory 30 , a primary battery 32 , a backup battery 34 , a pair of key compartment locking solenoids 36 , a pair of shackle locking solenoids 38 , a key compartment solenoid drive circuit 40 , an associated microswitch 42 and a shackle solenoid drive circuit 43 .
- CPU microprocessor
- RAM read/write
- Communications coil 26 is used to electro-magnetically couple to corresponding coils in key 14 and stand 16 .
- Microprocessor 28 controls operation of lockbox 12 according to programming instructions (“lockbox control software”) permanently stored in an associated read only memory (ROM) 44 .
- RAM memory 30 is used to store various elements and strings of operating data.
- Primary battery 32 provides power to the lockbox circuitry.
- Backup battery 34 is used when the primary battery becomes weak or is removed for replacement.
- Key compartment locking solenoids 36 releasably lock house key compartment door 24 under the control of door solenoid drive circuit 40 and microswitch 42 .
- Shackle locking solenoids 38 releasably lock shackle 22 under the control of shackle solenoid drive circuit 43 .
- lockbox CPU 28 is in fact two discrete microprocessor circuits.
- the lockbox RAM 30 is comprised of a low power, low voltage Toshiba LC3517NC RAM circuit, which is organized as 2048 eight bit bytes.
- Lockbox CPU 28 stores information on certain of the operations that are executed, or attempted to be executed, by a key or the lockbox in a portion of RAM memory 30 termed the “access log.” Each entry in the access log includes the identity of the key, the date and time of the operation (obtained from the calendar-clock portion of CPU 28 ), the function attempted and, if the function was denied, the reason why.
- the lockbox access log can store information on 100 lockbox operations. This log can later be retrieved, in whole or in part, by key 14 or by stand 16 for transfer to computer 18 or for display on a CRT screen or printer.
- Management of the lockbox access log is performed by lockbox CPU 28 in conjunction with a “roll flag” and a “pointer” stored in lockbox RAM 30 .
- the roll flag indicates whether all 100 entries in the access log have been filled and consequently whether the memory is recycling, overwriting old data.
- the pointer indicates the address of the memory location at which the next access log entry will be stored.
- the roll flag is set to “0” and the pointer is set to indicate the address of the first memory location in the access log. Thereafter, each entry in the log causes the pointer to increment to the address of the next memory location in the log.
- the pointer recycles and indicates again the address of the first memory location in the access log.
- the rollover flag is set to “1,” indicating that the access log has become a circular data buffer and that each additional entry will overwrite an earlier entry.
- Lockbox 12 is characterized by “lockbox characterization instructions” loaded into lockbox RAM memory 30 by a computer through a stand.
- Key 14 can also be used to load a set of limited characterization instructions into lockbox RAM memory 30 , as discussed below in the section entitled Functions).
- the lockbox characterization instructions give the lockbox an identity, fix in it certain numerical values and enable it to perform certain functions.
- the identification information loaded with the characterization instructions identifies the listing, the listing agent, the responsible agency and the responsible board.
- the identification information further identifies the lockbox by a unique lockbox serial number.
- Some of the numerical values loaded into the lockbox include a “Shown By Arrangement” (SBA) number, a key lockout list and a collection of lockbox access codes.
- SBA Shown By Arrangement
- Functions enabled by function enable bits in the characterization instructions may include Lockbox Disable On Removal and Privacy Read (both discussed below in the section entitled Programmable Lockbox Options).
- lockbox 12 After its initial characterization by stand 16 , lockbox 12 will not require further maintenance or programming until the lockbox is moved to a new location.
- key 14 is constructed in a trim polycarbonate enclosure 46 sized to fit conveniently in a user's purse or pocket.
- the key includes a keypad 48 and an LCD display 50 .
- Keypad 48 is used to enter commands into the key.
- LCD display 50 is used to display instructions and information to the user.
- LCD display 50 includes a central message portion in which messages from the system can be displayed to the user.
- Display 50 also includes a lower portion comprising a “prompt” field and an upper portion comprising an “annunciator” field.
- the prompt field includes twelve potential prompts which represent twelve functions that a user can request the key to execute. They are OPEN, SHACKLE RELEASE, CHANGE PERSONAL CODE, CONTROLLER, READ FILE MARK, READ NN, READ, CLEAR MEMORY, SIGNATURE, SHOWN BY ARRANGEMENT, FILE MARK, and PROGRAM. These functions are discussed below in the section entitled Functions.
- the annunciator field includes five potential annunciators which indicate the status of various aspects of the key.
- the annunciators in the preferred embodiment are FUNCTION, READ, PROGRAM, KEYSAFE BATTERY and KEY BATTERY.
- the READ annunciator is made visible when the key contains lockbox access log data transferred from a lockbox during a READ operation.
- the PROGRAM annunciator is made visible when the key contains a set of limited characterization instructions that are to be loaded into a lockbox.
- the FUNCTION annunciator is made visible when the user is to select a function to be executed.
- the KEYSAFE BATTERY and the KEY BATTERY annunciators are made visible when the batteries for these respective units need attention.
- Key 14 includes a communications coil 54 , a key microprocessor (CPU) 52 , the keypad or other switch mechanism 48 , the LCD display 50 , a read/write memory (RAM) 56 , a primary battery 58 , a backup battery 60 and a beeper 62 .
- CPU key microprocessor
- RAM read/write memory
- Communications coil 54 is used to electromagnetically couple to the corresponding coils in lockbox 12 and stand 16 .
- Microprocessor 52 controls operation of key 14 according to programming instructions (“key control software”) permanently stored in an associated read only memory (ROM) 64 .
- RAM memory 56 again comprises a Toshiba LC3517NC RAM circuit and is used to store various elements and strings of operating data.
- Primary battery 58 provides power to the key circuitry.
- Backup battery 60 is used when the primary battery becomes weak or is removed for replacement.
- Beeper 62 beeps to call the user's attention to the key in a variety of instances, such as when an error is committed or when the key and lockbox have successfully completed an operation.
- key CPU 52 also comprises two discrete microprocessor circuits.
- the distribution of processing tasks between two processors in this manner reduces power consumption and increases operational efficiency by allocating the time consuming user interface chores to the very low power NEC processor, thereby allowing the logic functions to be more quickly performed using the higher power National processor.
- Key 14 is characterized by “key characterization instructions” loaded into key RAM memory 56 by a computer through a stand. These instructions give the key an identity, fix in it certain numerical values and enable it to perform certain functions.
- the identification information loaded with the characterization instructions identifies the agent, the responsible agency and the responsible board.
- the identification information further identifies the key by a unique serial number.
- Some of the numerical values loaded with the key characterization instructions include a four digit personal code, permission codes for various of the functions and various key access codes with associated expiration dates.
- Functions enabled by function enable bits in the characterization instructions may include OPEN, READ and SHACKLE RELEASE.
- key 14 After its initial characterization by stand 16 , key 14 will not require further programming until any time dependent functions which may have been enabled, such as key expiration date or expiring key access codes (discussed below) need updating.
- This key described above can, if loaded with the proper characterization instructions, execute the entire complement of functions available on the system, here illustrated as twelve. In some applications, however, it is desirable to provide simpler keys which can effect only a limited range of functions. Thus, it may be desirable, for example, to provide keys that can perform just three functions: open a lockbox, drop a shackle and communicate with a computer. Such a simple key could be constructed without an LCD display.
- Limiting the functions that a key can perform can be effected by setting certain enable/disable bits in key RAM memory 56 .
- key RAM memory 56 has an enable/disable data bit corresponding to each of the twelve functions. If the enable/disable data bit corresponding to a function is set to a “1,” the function is enabled. If set to a “0,” the function is disabled.
- the enable/disable data in key RAM memory 56 is desirably set by the manufacturer so as to enable a particular set of functions. This arrangement permits the manufacturer to provide a variety of different keys to users having a variety of different requirements without the need to tool up a separate manufacturing line for each different key. If the manufacturer later wishes to change a key's enable/disable data, it can do so by reprogramming the this data itself or by providing software to the responsible real estate board that will enable the board computer to reprogram this data.
- key RAM memory 56 can have two data bits corresponding to each of the twelve functions. One of these bits is set by the manufacturer to a “0” or a “1” and cannot be altered by the user. The other of these bits can be set to a “0” or a “1” by the authority that exercises supervisory control over the key, usually the local real estate board.
- the only functions that are enabled are those for which corresponding enable/disable data bits have both been set to a “1” by the appropriate authority.
- the local real estate board is empowered to tailor the capabilities of its keys as it sees fit within the range of functions enabled by the manufacturer.
- all time constants in the both the lockbox and key are set by data bits stored in the respective unit' RAM memories (as illustrated by the lockbox and key memory maps of FIG. 13 ). These time constants set, for example, the length of time each of the transient displays are maintained in LCD display 50 and the length of time lockbox key compartment unlocking solenoids 36 are to be kept energized.
- Stand 16 is used in the present invention to transfer information between computer 18 and the lockbox and key components of a lockbox system.
- stand 16 can comprise an enclosure 66 having a protrusion 68 .
- a stand communications coil 70 Within protrusion 68 is a stand communications coil 70 .
- a key or a lockbox is positioned on stand 16 as shown in FIGS. 15 and 16 , respectively. In these positions, the communications coil within the lockbox or key is positioned in proximity with stand communications coil 70 in protrusion 68 , thereby establishing electromagnetic coupling between such coils.
- protrusion 68 can be omitted.
- communications coil 70 can be disposed within enclosure 66 so that it is adjacent the coils in corresponding lockbox or key units when such units are placed on the stand.
- stand 16 is constructed in two forms.
- a first form of the stand termed a local stand 16 a , is designed to communicate with a computer at the same site.
- Local stands are thus intended for use at the board office, where they are tied directly to the board computer, or at agency offices, where they may be tied directly to a smaller computer.
- the second form of stand termed a remote stand 16 b
- the second form of stand is a portable unit designed to communicate with a remote computer over conventional telephone lines.
- Remote stands 16 b are thus typically used at agency offices that are not equipped with their own computers. Their portable nature, however, allows remote stands to be used wherever there is a phone line, such as at a property listed for sale, thereby enabling an agent to retrieve data from the board computer and provide a homeowner immediate information about listing activity.
- both forms of stand 16 include a microprocessor (CPU) 78 , an associated read only memory 80 , a read/write memory (RAM) 82 and a connector 83 for connection to a low voltage D.C. power supply.
- Local stand 16 a further includes a cable connector 72 for connection to the local computer.
- Remote stand 16 b further includes a modem 74 and two modular phone jacks 76 , 77 for interfacing to a telephone line.
- First phone jack 76 is used to connect to the outgoing phone line.
- Second phone jack 77 is used to connect to a conventional telephone (not shown) which provides dialing signals on the outgoing phone line.
- Remote stand 16 b also includes a printer output port 79 for interfacing to a printer. This printer is driven by the remote computer through the stand and permits hard copy display of the data at the agency office or at the remote site at which the stand is used even though a computer is not locally available.
- CPU 78 comprises an Intel 8051 Series microprocessor and RAM 82 comprises a NEC uPD4364 8192 by 8 bit static RAM.
- stand 16 desirably encrypts the lockbox and key data before it is sent to the computer. Conversely, stand 16 decrypts the computer data before it is sent to the lockbox and key.
- This encryption/decryption is effected by microprocessor 78 in conjunction with read only memory 80 and read/write memory 82 .
- ROM memory 80 contains the encryption and decryption algorithms used by stand 16 in communicating with computer 18 .
- RAM memory 82 is used for temporary storage of data used in this process.
- the encryption algorithms employed are such that if the same data is exchanged between stand 16 and computer 18 several times, the several transmissions will bear no resemblance to one another. Decryption by unauthorized eavesdroppers is thus deterred.
- the data exchanged between stand 16 and the lockbox and key components is also similarly encrypted.
- Stand 16 can perform a variety of functions in the present invention.
- stand 16 can provide a complete set of new characterization instructions for lockbox 12 or key 14 , or can simply modify an existing set of instructions. This is done by placing the key or lockbox on stand 16 , as illustrated in FIGS. 15 and 16 , and executing a recharacterization program on computer 18 .
- the recharacterization program executed on computer 18 interrogates the user, using a menu display format on the computer screen, as to which functions are to be enabled, what constants are to be loaded, etc.
- the characterization instructions generated by the recharacterization program are then transferred from the computer through the stand to the key or lockbox, where they are stored in RAM memory.
- a set of limited recharacterization instructions for lockbox 12 can alternatively be loaded from stand 16 into key 14 for later relaying by the key into the lockbox by using the PROGRAM function (discussed below in the section entitled Functions).
- the second function stand 16 can perform is to retrieve data, such as lockbox access log data, from the lockbox or the key and to relay it to computer 18 . This is accomplished by positioning lockbox 12 or key 14 on stand 16 and executing an appropriate program, this time a data retrieval program, on computer 18 .
- Stand 16 can also be used for a variety of other purposes, such as for relaying diagnostic maintenance log data (discussed below in the section entitled Diagnostic Features) from the key or lockbox to the computer and for synchronizing the calendar-clock portion of lockbox CPU 28 with the master calendar-clock maintained by computer 18 .
- diagnostic maintenance log data discussed below in the section entitled Diagnostic Features
- stand 16 allows data transfers to and from the key and lockbox components without the need to take such components back to a central control computer at the real estate board office.
- the local real estate board may encompass several thousand square miles. Consequently, it is highly undesirable to require that lockboxes and keys be taken back to the board office every time an exchange of data is desired.
- the relatively inexpensive stands of the present invention can be distributed throughout the board's territory and can be used to effect all data transfers. Desirably, most of the agency offices within the real estate board would have such a unit and several additional units would be available for portable use within the board's territory.
- the user To operate the lockbox system, the user first energizes, or wakes up, key 14 by pushing an ON/CLEAR button on keypad 48 . Beeper 62 beeps to confirm that the key is energized. The key then displays the word “CODE” in the message portion of LCD display 50 in blinking form. The user then has a fixed time period, such as one minute, within which to enter a four digit personal code. As each digit of the personal code is entered, an asterisk appears in LCD display 50 . The asterisks maintain the privacy of the personal code while indicating the number of digits entered. If no personal code is entered within the one minute time period, key CPU 52 causes the key to become deenergized, or return to sleep, again. If the four digit personal code entered by the user matches the personal code stored in key RAM memory 56 , the user is prompted to select a function.
- a fixed time period such as one minute
- key 14 will not allow the user to select a function. The user can start over and try to enter the correct personal code. If, after four tries, the proper personal code has still not been entered, key CPU 52 causes the key to enter a “personal code timeout” mode in which the key is deactivated for a ten minute period and during which it will not allow any further personal codes to be entered.
- the FUNCTION annunciator in the upper portion of LCD display 50 is made visible, together with the prompts in the lower portion of the display representing the available functions.
- Key CPU 52 causes the prompts corresponding to the functions that are not available, for example those functions which have been disabled, to remain invisible in LCD display 50 ).
- the top left-hand most prompt in the prompt field normally the OPEN prompt, will be blinking. It is the blinking prompt that indicates which function will be executed if the SELECT button is pressed.
- Movement of the blinking feature in the LCD prompt display is controlled by the RIGHT SCROLL and LEFT SCROLL buttons on keypad 48 .
- the RIGHT SCROLL button causes the blinking feature to move one prompt to the right, for example, from OPEN to SHACKLE RELEASE.
- the blinking feature is moved to the left-most prompt in the following line.
- the LEFT SCROLL button moves the blinking feature in the opposite direction in a similar fashion.
- the OPEN prompt that blinks. Consequently, to open the lockbox, which is the most common operation, the SCROLL buttons need not be operated at all. Instead, the SELECT button is simply pressed and the lockbox can be opened.
- CPU 52 causes all of the prompts to be made invisible, except the selected prompt, which is caused to stay on continuously, not blinking.
- key 14 When the personal code has been successfully entered and a function has been selected, key 14 is termed “armed.” In the armed state, the key sends out a signal, termed here a characteristic interrogation pulse train, and seeks to couple with a lockbox. When the key is ultimately coupled with a lockbox, the electromagnetic pulses radiated by the key induce a voltage in the lockbox communications coil. The induction of this voltage in the lockbox signals the lockbox to wake up. The lockbox then responds by transmitting a second signal back to the key, as discussed below in the section entitled Authorization of Lockbox Functions.
- a characteristic interrogation pulse train When the key is ultimately coupled with a lockbox, the electromagnetic pulses radiated by the key induce a voltage in the lockbox communications coil. The induction of this voltage in the lockbox signals the lockbox to wake up. The lockbox then responds by transmitting a second signal back to the key, as discussed below in the section entitled Authorization of Lockbox Functions.
- the four letter message field in the middle of LCD display 50 displays the word “SAFE” (short for keysafe) in blinking form.
- SAFE short for keysafe
- the message display instead of displaying the “SAFE” message in blinking form, displays a “WAIT” message in solid form. This indicates to the user that the key and lockbox are coupled and are communicating.
- WAIT various data is exchanged between the key and the lockbox and each of the microprocessors is making various decisions as to whether to authorize execution of the selected function (as described below in the section entitled Authorization of Lockbox Functions).
- the processors decide, either together, or one informs the other, that the selected operation can be executed.
- the message in key LCD display 50 changes from “WAIT” to “GOOD.”
- the “GOOD” message is displayed whenever any operation is successfully completed.
- the successful execution of the function is also confirmed audibly by beeper 62 .
- the “GOOD” display is maintained for approximately eight seconds.
- the key then displays the KEYSAFE BATTERY annunciator if the lockbox battery is low (discussed below in the section entitled Battery Systems) and then returns to sleep.
- Beeper 62 beeps and an appropriate error code is displayed in the message display. The key then returns to sleep after displaying the error message for a predetermined time period.
- key strokes necessary to request a function need not be entered while the key is coupled to the lockbox.
- key 14 must be held near lockbox 12 in order for the units to communicate.
- this task is sometimes difficult when the lockbox is mounted in a dark or awkward location, such as on a water spigot mounted at ground level.
- the user would need to engage the key with the lockbox in such position and then start pressing buttons on keypad 48 corresponding to the required personal code and the desired -function.
- the key control software allows the key to be armed in advance to request execution of a desired function.
- the key can then be mated momentarily with the lockbox and the handshaking signal exchanges made automatically when the lockbox detects the key's characteristic-interrogation signal.
- the user need not press a single key in the dark or cramped location in which the key and lockbox may be mated in order to operate the lockbox.
- the personal code can be entered and the desired function selected in a convenient, well-lit location, such as in a car.
- the agent then has a fixed period, such as ten minutes, within which to use the armed key to operate the lockbox. After this period, the key disarms itself so as to maintain system security.
- the ability of the key to be armed at a remote location and later coupled with the lockbox to execute a function also provides an important security benefit. That is, it allows the key to be armed away from prying eyes so as to maintain the secrecy of the user's personal code.
- lockbox 12 To open house key compartment 20 in lockbox 12 , the user enters the four digit personal code on key 14 , thereby causing the OPEN prompt in LCD display 50 to blink. The SELECT button is then pressed and an exchange of authorization signals between the lockbox and key is begun once the units are successfully coupled. If the lockbox and key determine that the function is authorized, lockbox CPU 28 allows key compartment door 24 to be opened.
- key compartment door 24 does not pop open when the exchange of signals has been completed successfully. Instead, a press-to-open mechanism is provided on the door. After the appropriate signals have been exchanged, the user presses door 24 inwardly and then releases. The door then pops open to reveal the contents of compartment 20 .
- the lockbox reverts to its powered down, locked state.
- lockbox 12 is provided with a microswitch 42 connected in key compartment solenoid drive circuit 40 so that when door 24 is pressed in, the microswitch is engaged and closed.
- CPU 28 detects the closure of microswitch 42 and causes drive circuit 40 to then apply energy to key compartment solenoids 36 for a brief period.
- the solenoids retract, thereby unlocking door 24 .
- the user then releases the door and it pops open under the influence of a spring.
- the solenoids are thus not energized until the user is actually ready to open the door. (The solenoids are arranged in lockbox 12 so that the inward pushing movement of key compartment door 24 is allowed even when the solenoids are in their locked state).
- lockbox CPU 28 waits approximately 0.25 seconds and then causes drive circuit 40 to deenergize the solenoids. It has been found that in a typical opening, the locking solenoids are energized for less than 0.5 seconds. After deenergizing the solenoids, the lockbox returns to its sleeping state.
- solenoids 36 are deenergized to secure the lockbox and the lockbox returns to sleep.
- key compartment door 24 is provided with two solenoids to enhance lockbox security.
- Each solenoid has a spring loaded plunger. If only a single solenoid were used, the solenoid could be dislodged momentarily from its locking position by a sharp blow to the lockbox. The shock could propel the solenoid plunger momentarily to its retracted state, allowing door 24 to be opened.
- two solenoids are used and are disposed so that their plungers travel in opposite directions. If the lockbox is sharply rapped so as to propel one solenoid plunger to its unlocked position, the other solenoid plunger is propelled to its locked position.
- the shackle 22 or mounting bracket which secures lockbox 12 to a structure is, in the preferred embodiment, released on command from a key.
- the SHACKLE RELEASE function opens lockbox door 24 .
- Actual release of the shackle is then effected by movement of a press-to-release shackle locking stem 162 (which is unlocked by shackle locking solenoids 38 ), which in turn moves a shackle locking bar 148 out of engagement with the shackle.
- the shackle locking system also uses a pair of reciprocally mounted solenoids to lock the shackle so as to enhance lockbox security.
- the CHANGE PERSONAL CODE function When the user desires to change the four digit personal code, the CHANGE PERSONAL CODE function is used. The key is activated by the usual sequence of entering the four digit personal code and then moving the blinking feature in the prompt field until the CHANGE PERSONAL CODE prompt is blinking. When the SELECT button is pressed, the message display displays “NEW.” The user then keys in the new four digit personal code that is to be substituted for the old code. Each time a digit of the new code is entered, an asterisk appears in the message portion of display 50 . After all four digits have been entered, the “NEW” message is displayed again. The user then reenters the new code. By this redundant technique, key CPU 52 double checks the new personal code to insure that the user did not inadvertantly press a wrong key and thus enter a new personal code that was not intended and consequently would not be remembered.
- the message display portion of LCD display 50 indicates “GOOD” to confirm that the operation has been completed satisfactorily.
- a stand is used to exchange data and characterization instructions between the key and the computer.
- One way in which data can be exchanged between these units is simply to lay the sleeping key on the stand and press the ON/CLEAR button.
- the stand then couples electromagnetically to the energized key and allows the key to communicate with the computer.
- the key In order for computer 18 to be allowed to perform its full complement of functions on the key, the key must be activated in the CONTROLLER mode by an authorized user. To do this, the user enters the four digit personal code and moves the blinking feature in the prompt field to CONTROLLER. When the SELECT button is pressed, the key permits the computer to freely read from and write to the key within the limits set by ownership of the key (i.e. a computer cannot reprogram a key if the key belongs to a different board).
- Arming the key in the CONTROLLER mode is the only instance in which the key does not send out its characteristic interrogation pulse train. Instead, the key listens for data or instructions relayed from the stand.
- the FILE MARK function is selected to put a mark in the access log maintained by the lockbox.
- the illustrative access log maintained in RAM memory 30 of lockbox 12 contains data relating to the last 100 lockbox operations. Oftentimes, however, not all 100 past operations are of interest. For example, the supervising real estate board or agency may only be interested in operations over a certain period of time.
- the lockbox access log can be marked with file marks. The log can then be read in its entirety, or just from the last file mark to the end. By this technique, only the data of interest need be reviewed.
- the FILE MARK function is useful when a real estate agency or board is interested in monitoring the access to a home during a specific period, as for example, during a weekend that the house is advertised in the newspaper.
- the listing agent could enter a file mark in the lockbox access log on a Friday evening. (Only the listing agent, or the listing agent's broker or board, is permitted to executed a FILE MARK function on a lockbox). An agent could then return the following Monday morning and recover only those entries in the access log made since the log was marked by using the READ FILE MARK function.
- a file mark can be used to indicate in the access log when the lockbox was moved.
- a file mark is entered in the access log automatically whenever the shackle is released. Data can then be selectively recovered from the access log so that only operations logged at the new location are recovered.
- the entry that is actually recorded in the access log by a FILE MARK function is the same as any other logged function, but the log indicates that it is a FILE MARK function, rather than an OPEN, SHACKLE RELEASE, etc.
- the lockbox also records the other data usually stored in the access log, such as the identity of the user who executed the FILE MARK function, the date and time, etc.
- lockbox CPU 28 When the READ function is selected, lockbox CPU 28 causes all of the entries stored in the lockbox access log to be transmitted to the requesting key by relaying the access log data via the unit' coupled communications coils. The key stores this received information in a portion of its RAM memory 56 dedicated to this purpose.
- the portion of key RAM memory 56 dedicated to storing lockbox access log data can be larger or smaller than the portion of memory in the lockbox dedicated to this task.
- the dedicated key memory is at least as large as the dedicated lockbox memory (i.e. large enough to hold at least 100 access entries). A key can thus read several lockbox access logs, provided the total number of access log entries read does not exceed the key's capacity.
- the key will display a corresponding error message and will not execute the READ function.
- Successful execution of the READ function does not cause the access log data in the lockbox to be erased. Instead, the data persists and is eventually overwritten by the lockbox itself, beginning when the one hundred and first log entry overwrites the first log entry.
- the lockbox is later reinitialized and moved to a new listing, the access log data is dumped to a stand and the roll flag and pointer are reset to their initial states.
- the READ annunciator will be made visible when the key is awakened by the ON/CLEAR button so as to remind the user that one or more reads are stored in the key.
- READ FILE MARK is identical to the basic READ function except that only the lockbox access log entries since the last file mark are read.
- Lockbox CPU 28 maintains a lockbox access count in lockbox RAM memory 30 that indicates the number of OPEN, SBA and SIGNATURE functions that have been executed by the lockbox since it was reinitialized for that particular listing. In the preferred embodiment, this count is stored as a single eight bit byte and thus can count up to 255 accesses. When the READ NN function is selected and executed, lockbox CPU 28 transmits this lockbox access count to the key where it is displayed to the user in the message portion of LCD display 50 .
- This READ NN function allows the user to monitor listing activity at a glance, without downloading data from the key to a stand at a remote location. This function also allows a user to monitor lockbox usage so that the maximum memory capacity of the lockbox access log will not be exceeded and old data overwritten. For example, if the lockbox access log can store 100 entries and the user determines, by using the READ NN function, that there have been 90 accesses to the listing, the user may choose to then dump the contents of the log into the key for later relaying to a computer through a stand. By such operation, the old data in lockbox access log is preserved in the computer and up to 100 new entries can then be logged in the lockbox.
- the CLEAR MEMORY function clears both the portion of key RAM memory 56 dedicated to storing lockbox access log data and the portion of the key RAM memory dedicated to storing lockbox characterization instructions.
- the lockbox access log data normally stays in key RAM memory 56 until the key is coupled to a stand and the data dumped to a computer. If, for some reason, the user does not want to preserve this data he can, instead of dumping it out to the computer, simply select the CLEAR MEMORY function and erase it.
- lockbox characterization instructions stored in key RAM memory 56 can variously stay in the key memory only until loaded into a lockbox or they can stay indefinitely, depending on the nature of the instructions (discussed below in the discussion of the PROGRAM function). If, for some reason, the user does not wish to preserve this data, the CLEAR MEMORY function can be selected to erase it.
- the access log maintained in the lockbox is useful for reasons other than determining, for security purposes, who opened the lockbox. It is also desirable, for management information purposes, to be able to determine the identity of persons who entered the house without opening the lockbox.
- Real estate agents often visit newly listed houses in large tour groups.
- the identity of the one agent in the group that opens the lockbox is of course entered in the access log.
- the identity of the other agents in the group could also be logged in the access log if they were also to open the lockbox.
- the OPEN function draws a considerable amount of power from the battery. Consequently, it is desirable to be able to log the identity of agents without requiring them to open the lockbox.
- the SIGNATURE function performs this task.
- Agents who select the SIGNATURE function can engage their keys with the lockbox and have their identities logged in the access log.
- the lockbox treats this function as an OPEN operation, but omits the final step of energizing the solenoids. Consequently, the power drain is negligible.
- this function the system is better able to maintain detailed information on visitors to a listed property.
- the SIGNATURE mode has applications beyond real estate lockboxes. For example, a night watchman at an industrial complex could-use the SIGNATURE function to log the date and time of his visits to the various locks around the complex without opening any such locks. A record could thus be maintained of the surveillance activity at various sites around the premises.
- SHOWN BY ARRANGEMENT is a function that allows a listing agent to restrict which other agents are allowed access to certain listed properties.
- the Shown By Arrangement feature of the present invention allows the listing agent to program the lockbox to require that a second code, an SBA code, be entered before access to the house key is granted.
- the SBA function is activated by specifying a desired four digit SBA code in the lockbox characterization instructions. If no SBA code is specified, a default value of 0000 is stored.
- an agent tries to access a lockbox for which a non-zero SBA code has been specified, he or she must do so by first selecting the SBA function. When the key is so armed in the SBA mode, the agent is then prompted to select one of two functions from the prompt field: OPEN or CHANGE SBA.
- a “SBA” message is displayed in blinking form in the LCD display, prompting the agent to enter the SBA number. The agent then enters the four digit SBA number and corresponding asterisks appear in the LCD display. After the code is entered, it is transmitted to the lockbox with the request to execute the OPEN function. If the SBA code entered matches the SBA code stored, and if other authorization criteria discussed below are met, the function is executed. If the SBA code entered does not match the SBA code stored, the function is immediately denied.
- the second option after arming the key in the SBA mode is to change the SBA number. (When the key is armed in the SBA mode, a CHANGE prefix is made visible in LCD display 50 next to the SBA prompt to permit selection of the CHANGE SBA function). This option can only be executed by the listing agent, the listing agent's broker or the listing agent's board.
- the lockbox checks that the identity of the key corresponds to one of these entities by comparing key identifying data sent from the key with the lockbox identifying data stored in lockbox RAM 30 .
- the PROGRAM function transmits a set of limited characterization instructions from a key to a lockbox to effect a reprogramming of the lockbox in the field.
- Key CPU 52 will not make visible the PROGRAM prompt nor permit selection of the PROGRAM function unless the CPU has earlier determined that the key contains a set of limited lockbox characterization instructions waiting to be downloaded into a lockbox.
- the lockbox programs that can be loaded into the key from the computer in the exemplary embodiment can be of two types: Specific Update and Blanket Update.
- Specific Update is used when a set of lockbox characterization instructions is destined for one particular lockbox, identified by that lockbox's serial number. Once the program has been downloaded to that lockbox, key CPU 52 automatically erases it from key RAM memory 56 .
- Specific Update is generally used to change a lockbox's Daily Disable times and to set data switches enabling Privacy Read and Privacy Shackle Release (discussed below in the section entitled Programmable Lockbox Options).
- Blanket Update in contrast, is used when a set of lockbox characterization instructions is destined for a group of lockboxes. Downloading the instructions to a lockbox does not erase the instructions from key RAM 56 . Instead, the instructions persist in the key until erased by the CLEAR MEMORY key.
- Blanket Update is generally used to recharacterize lockbox instructions on an agency- or board-wise basis. Blanket Updates generally fall into two classes: those that update the lockout list and those that reprogram the identity of the lockbox's listing agent.
- Both Specific and Blanket Updates are transferred to the lockbox by using the PROGRAM function.
- the difference between the two is an update type data string included with the key programming instructions which indicates whether the update is a Specific Update or a Blanket Update, and, if it is a Blanket Update, whether it updates the lockout list-or the listing agent.
- the programming of the lockbox by the key in the field is limited so that only certain of the lockbox characterization instructions can be reprogrammed by the key.
- only the Lockout List data, the SBA number, the Daily Disable times and the listing agent identity can be reprogrammed in this manner, as is indicated in FIG. 13 .
- the other data such as the house, board and agency identification data and the lockbox access codes, cannot be changed by the key.
- the illustrated lockbox must be returned to a stand for reprogramming directly by a computer.
- the memory map of FIG. 13 illustrates that separate portions of key RAM memory 56 are dedicated to storing lockbox characterization instructions and copies of lockbox access logs. In other embodiments, a single portion of key RAM memory 56 can be shared for these purposes.
- the instructions needed to implement the following key options are provided with the key control software stored in key ROM 64 . These options are then individually enabled or disabled by setting appropriate enable/disable bits stored in key RAM 56 with the key characterization instructions.
- keys 14 can be programmed to “expire” (become disabled) after a predetermined number of days. By this technique, keys that are lost or stolen lose their utility in a relatively short time.
- RAM memory 56 of key 14 is data corresponding to a julian expiration date on which the key is to expire.
- key CPU 52 Before any functions requested by the key are authorized, key CPU 52 first compares this expiration date with data received from the calendar-clock portion of lockbox CPU 28 indicating the current date. If key CPU 52 determines that its expiration date has passed, the requested function is denied. A signal is sent to lockbox 12 informing lockbox CPU 28 of the expired key for logging in the lockbox's diagnostic maintenance log (discussed below in the section entitled Diagnostic Features). A corresponding entry is made in the key's diagnostic maintenance log. The key then displays an error message indicating an expired key in the message portion of key LCD display 50 . After the message has been displayed for a predetermined period of time, the key reverts to its sleeping state.
- Expired keys can be “rejuvenated” by an appropriate authority, usually the supervising real estate board, by simply loading a new expiration date into key RAM 56 via a stand.
- the present expiration feature also offers the supervising board and the individual users considerable operational flexibility.
- the board can set a key to expire on any desired date.
- a key can thus be programmed to expire in a day, a week, a year or never, in increments of one day. (To program the key to never expire, this function is simply not enabled).
- This flexibility also enables the board to set different expiration dates for different keys. For example, it may wish the keys of new agents to require rejuvenation every two weeks, those of established agents to require rejuvenation every two months and those of brokers to require rejuvenation only every two years.
- the expiration dates of the various keys can also readily be staggered so that all the keys in the system will not need to be rejuvenated on the same day.
- the system offers flexibility to users in that a key can be rejuvenated before it expires. A key owner can thus rejuvenate a key at a time when it is convenient, rather than at a time dictated by the lockbox owner.
- Key 14 can selectively be deactivated to disable its further use by setting an appropriate disable bit in key RAM 56 . This is useful when, for example, a board or an agency wishes to store unused keys. After being deactivated, key 14 must be reinitialized with new characterization instructions from the board or other supervising authority before it can be used again.
- lockbox control software stored in lockbox ROM 44 . These options are then individually enabled or disabled by setting corresponding enable/disable bits stored in lockbox RAM 30 with the lockbox characterization instructions.
- CPU 28 of lockbox 12 can run a software routine, stored in lockbox ROM memory 44 , that disables the lockbox from opening during certain hours of the day.
- the daily lockbox disable software routine operates in conjunction with the calendar-clock portion of lockbox CPU 28 and with programmable time data indicating the desired beginning and end times of the daily lockbox disable period. These beginning and end times are loaded into lockbox RAM memory 30 with the lockbox characterization instructions and can be loaded by an appropriately programmed key 14 .
- lockbox CPU 28 is programmed to correct its internal calendar-clock data automatically to account for time changes brought on by daylight savings time so as to maintain the desired daily disable times. Similarly, the calendar-clock portion of lockbox CPU 28 also corrects itself for leap years.
- the lockbox could normally be reinstalled on another house. Before such installation, however, the lockbox should be be reinitialized and loaded with a variety of new characterization instructions identifying the new listing, the listing agent, the listing agency, etc. In certain embodiments, this recharacterization could be accomplished by loading a key 14 with all of the new instructions and loading the lockbox from the key using the PROGRAM function.
- lockbox In systems where data integrity is important, it is desirable that the lockbox be read and programmed directly by the computer without the use of an intermediate key. To insure that this is done, a Lockbox Disable On Removal feature is selectably provided.
- the lockbox becomes disabled when the shackle is released. In this disabled state, the lockbox cannot be operated nor can it be reprogrammed from the key. It must be returned to a stand at a board or agency office for reprogramming. By requiring the lockbox be returned for reprogramming, the access log can be reliably read for archival purposes, thereby insuring the integrity of the board's lockbox database.
- RAM memory 30 of lockbox 12 contains a list of key identification data that, although the keys so identified may otherwise be authorized, are to be locked out.
- the identification data received from the accessing key is compared against this list by lockbox CPU 28 . If the accessing key's identification data corresponds with data found in this list, lockbox 12 will refuse to execute any lockbox functions requested by the key.
- the first type of lockout identifies specific agents that are to be locked out.
- the second type of lockout identifies specific agencies that are to be locked out.
- the third type of lockout identifies a specific agency that is to be allowed access to the house key. Agents from all other agencies are to be locked out. By this third type of lockout, a house can be exclusively listed by a single agency so that only agents from that agency can show the house.
- Each of these lockout functions is implemented by certain enabling data stored in lockbox RAM memory 30 with the lockbox characterization instructions. If any of these functions is implemented, the characterization instructions further include data specifying the identities of the agents or agencies who are to be locked out.
- lockbox CPU 28 can be programmed to disable certain locked-out keys that may attempt to execute a function on the lockbox.
- lockbox CPU 28 responds to each such preidentified key with a special signal that instructs key CPU 52 to alter the key's four digit personal code in key RAM memory 56 by replacing certain digits of this code with hexadecimal digits (A-F) which are not included on the key's keypad 48 .
- A-F hexadecimal digits
- lockout list data stored in each lockbox may need to be updated frequently in order to be effective in locking out undesired keys.
- key 14 has a portion of its RAM memory 56 dedicated to storing a lockout list. Stored with this list is a date indicating the timeliness of the lockout list data. A date is also stored with the lockout list data stored in lockbox 12 indicating its timeliness. Whenever key 14 and lockbox 12 communicate, these dates are compared by key CPU 52 or lockbox CPU 28 .
- the key's lockout list data including the date data
- the key's lockout list data is transferred to lockbox RAM memory 30 where it overwrites the “stale” lockout list data previously stored there.
- the lockbox's lockout list data including the date data
- the lockbox's lockout list data is transferred to key RAM 56 where it overwrites the “stale” lockout list data previously stored there.
- Some listing agents may wish to prevent others from retrieving the lockbox access logs recorded in their lockboxes. These logs may reveal the identities of the agents within the real estate board whose clientele can afford expensive homes. This is useful information that the listing agent may not wish to share with other agents.
- lockboxes of the present invention can be programmed, by an appropriate bit in the lockbox characterization instructions, to allow only the listing agent, or that agent's broker or board, to retrieve the lockbox access log. If this enable bit is set, lockbox CPU 28 compares the identification data received from the key with its own lockbox identification data before allowing an otherwise authorized READ operation to be performed. Access to the lockbox access log can thereby be limited to this authorized class of keys.
- Privacy Shackle Release It is generally desirable to restrict execution of the SHACKLE RELEASE function to the listing agent, or to that agent's broker or board. To restrict execution of the SHACKLE RELEASE function in this manner, a Privacy Shackle Release function is provided. If this function is enabled, lockbox CPU 28 compares the identification data received from the key with its own lockbox identification data before allowing a SHACKLE RELEASE function to be performed.
- Lockbox 12 can selectively be deactivated to disable its further use by setting an appropriate disable bit in lockbox RAM 30 . After being deactivated, lockbox 12 must be reinitialized with new characterization instructions from the board or other supervising authority before it can be used again.
- key CPU 52 determines whether the “master software switch” is off.
- the master software switch is a flag in key RAM memory 56 that indicates whether the key's characterization instructions are corrupted. This switch is turned off every time a process of critical loading characterization instructions from a computer into the key is begun. The switch is not turned back on again until the transfer of instructions is completed without error. If, for example, the key is removed from stand 16 before the transfer is completed, the characterization instructions in key RAM memory 56 will be incomplete. Key CPU 52 recognizes this data corruption by noting that the master software switch is still off and accordingly prevents the key from attempting any operations until the characterization instructions are loaded correctly. (Provision is made for reloading new characterization instructions from a properly authorized computer through a stand even when the master software switch is off).
- key CPU 52 determines whether there is any button on keypad 48 that is stuck in the down position.
- key CPU 52 determines whether the key is in personal code timeout mode.
- Personal code timeout mode is the ten minute period following four unsuccessful entries of the personal code.
- key CPU 52 performs a non-destructive test on key RAM memory 56 to determine if it is malfunctioning.
- the key then examines the status of the key battery. If it needs to be replaced, key CPU 52 makes visible the KEY BATTERY annunciator for the remainder of the key's operations. If the key battery count (discussed below) is equal to zero, CPU 52 causes LCD display 50 to display the message “DEAD” for a predetermined period of time and then go to sleep.
- the key allows the user to proceed and enter the four digit personal code, etc.
- the message display portion of the LCD display 50 can indicate up to 100 errors by displaying messages ER 00 through ER 99 .
- the error codes are very finely detailed so that a user can determine quite accurately the nature of a problem by reference to the two digit code. Selected error conditions displayed in this manner include pushing a wrong button, dead battery, wrong personal code, key in personal code timeout mode, keyboard button stuck, master software switch off, etc.
- the lockboxes and keys of the present invention each have a portion of their RAM memories dedicated to storing detailed diagnostic information.
- detailed information on the last ten events noted by the lockbox or key microprocessor is stored in this “diagnostic maintenance log.” Each diagnostic maintenance log entry identifies the events noted and the key or lockbox unit's response.
- the diagnostic maintenance log entry of an exemplary OPEN operation in the key might be as follows.
- the key is energized by the ON/CLEAR button. If one of the Power-On diagnostics is failed, a corresponding entry is made in the diagnostic maintenance log. Assuming the Power-On Diagnostics are run successfully, the user is allowed to enter the four digit personal code. If the wrong code is entered or if no code is entered within the ten second time period, a corresponding entry is made in the maintenance log. Assuming the personal code is correctly entered, the user is next prompted to select a function. Again, if an error is made by the user in selecting a function or if the function selected is denied by the system, a corresponding entry is made in the maintenance log. This process of logging any error condition continues until the key returns to sleep.
- an interruption in the communications between a lockbox and key is an event that is always recorded as an entry in the diagnostic maintenance log.
- each CPU could be programmed to record data on all events, or only on those events that prevent the requested operation from being executed.
- the lockbox access and diagnostic maintenance logs of the present invention serve two entirely different purposes.
- the lockbox access log serves as a record, for legal or management information purposes, of a narrow range of lockbox operations.
- the lockbox access log only logs OPEN, SBA, SHACKLE RELEASE, SIGNATURE and FILE MARK functions. It logs both successful and unsuccessful OPEN, SBA, SHACKLE RELEASE and SIGNATURE functions, but only logs FILE MARK functions if they are successful. If an unsuccessful function is logged, no diagnostic data indicating the reason for the failure is recorded. With each of these access log entries, however, the lockbox logs a variety of ancillary data, such as the date and time of the operation and the identity of the key requesting the operation.
- the diagnostic maintenance log serves only as a diagnostic tool. It serves in this capacity for all lockbox or key operations, not just those four which are of concern to the lockbox access log. For each operation, it stores detailed diagnostic information. However, no time, date or identification data is logged.
- the corresponding diagnostic maintenance log can be retrieved, either by sending the malfunctioning unit to the board for coupling to the board computer or by coupling the unit to the board computer through a stand 16 . This data can then be evaluated to determine the cause of the malfunction.
- stand 16 In addition to retrieving diagnostic maintenance log data from keysafes and locks for coupling to a computer, stand 16 further serves a diagnostic function by enabling a computer to conduct detailed testing on a malfunctioning lockbox or key unit. A lockbox or key that is malfunctioning can be put on a stand and the central board office computer called. The central computer can then run a collection of diagnostic routines and indicate to the user the cause of the problem. If the board's central computer is not able to diagnose the problem, the vendor or supplier of the equipment can run exhaustive diagnostic routines directly from its office to the unit on the stand at the remote location.
- the determination of whether a key is authorized to operate a lockbox is made by comparing certain strings of data exchanged between the lockbox and key. An operation is only authorized if these data strings correspond to a specified degree. This process is explained in more detail below.
- the exchange of signals between the key and lockbox comprises a multipart handshake.
- key 14 sends a first, interrogation signal to lockbox 12 to cause the lockbox to wake up from its sleeping state.
- Lockbox 12 responds by sending a second signal back to the key.
- This second signal includes lockbox battery condition data and date data (provided by the calendar-clock portion of CPU 28 ).
- key CPU 52 Upon receiving this data, key CPU 52 compares the received date data with the key expiration date stored in key RAM memory 56 , as discussed earlier. If it is determined that the key is not expired, key CPU 52 then sends lockbox CPU 28 data identifying the key by agent, agency and board so that the lockbox can determine whether the requested function can be executed on the basis of an ownership match between the lockbox and key.
- Lockbox 12 has corresponding identification data, identifying its listing agent, agency and board, stored in its RAM memory 30 .
- lockbox CPU 28 compares the key identification data received from the key with its own lockbox identification data to determine whether they correspond to a required degree. The degree of correspondence required between these groups of data before an operation is authorized is specified by “permission codes” stored in the key and sent to the lockbox with the key identification data.
- the permission codes may require only that the lockbox and key identification data indicate that the lockbox and key are assigned to the same real estate board in order for the lockbox to authorize the requested operation.
- the permission codes may specify that even if the lockbox and key are assigned to the same board, agency and agent, the lockbox will still not authorize the requested function.
- the permission codes may specify that the corresponding elements of board and agency identification data match, or; that the corresponding elements of board, agency and agent identification data match, before the lockbox will authorize a requested operation.
- the first permission code specifies the degree of match required between the lockbox and the key identification data before an OPEN, SBA, change SBA or FILE MARK function will be authorized.
- the second permission code specifies the degree of match required between the lockbox and key identification data before the SHACKLE RELEASE function will be authorized.
- the third permission code specifies the degree of match required between the lockbox and key identification data before any of the READ functions will be authorized. (The remaining functions do not depend on permission codes for authorization.
- CHANGE PERSONAL CODE, CLEAR MEMORY and CONTROLLER are functions executed by the key alone, not in cooperation with a lockbox. SIGNATURE does not require any ownership match for execution.
- PROGRAM generally cannot be executed unless there is a match between the owner of the computer that loaded the programming instructions into the key and the owner of the lockbox.
- Each permission code can assume one of four values as follows:
- lockbox CPU 28 finds the requisite match between the lockbox and key identification data, the lockbox authorizes and executes the requested function. If the lockbox CPU does not find the requisite match, the system then examines whether the function might be authorized based on an “access code” match.
- key 14 may authorize the function based on an access code match.
- Both lockbox 14 and key 12 have at least one access code stored in their respective RAM memories. (In one form of the invention, up to fifteen access codes can be stored in each unit).
- the access codes stored in the lockbox are each three bytes long. A two byte field identifies the real estate board. A one byte field is arbitrary.
- the access codes stored in the key also contain a two byte field identifying the board and a one byte arbitrary field.
- the key access codes however, each additionally contain an expiration date field. If the requested function is an OPEN or SBA function and if the function was not authorized by a permission-code specified ownership match, the lockbox transmits its access codes to the key for evaluation by key CPU 52 .
- key CPU 52 After receiving the lockbox access codes, key CPU 52 compares each of the lockbox access codes with each of the key access codes stored in key RAM 56 . If key CPU 52 finds a match, it then compares the expiration date associated with the matching key access code with the date data received earlier from the lockbox to determine whether the key access code involved in the match is nonexpired. If the code is nonexpired, the key sends the lockbox a signal instructing the lockbox to execute the requested OPEN or SBA function.
- the key sends the lockbox a signal instructing the lockbox not to execute the requested OPEN or SBA function.
- the lockbox authorizes the requested function. If the requested function is an OPEN or an SBA and if the permission code-specified match is not found, the key can nonetheless authorize the function if any of the lockbox access codes match any of the nonexpired key access codes.
- the access code system of the present invention provides several capabilities that have been difficult or impossible to implement in prior art lockbox systems.
- One such capability is board segmentation and regionalization.
- the arbitrary byte included in the lockbox and key access codes is used to segment or regionalize the properties listed by a real estate board into a variety of classes. For example, a board may deal in both residential and commercial properties, but not want residential agents to gain access to commercial listings and vice versa.
- the arbitrary byte in the lockbox access codes of the lockboxes installed on commercial properties could be set to “1” and the arbitrary byte in the lockbox access codes of lockboxes installed on residential properties could be set to “2.”
- the keys of commercial agents would then be programmed to have an access code terminating in “1,” while the keys of residential agents would be programmed to have an access code terminating in “2.” With the access codes so set, residential agents would be prevented from gaining access to commercial properties and vice versa.
- the access code system of the present invention also enables real estate boards to cooperate in the sales of properties.
- Board A may wish to allow all agents from neighboring Board B to have access to a lockbox on a particular house within Board A territory in order to expedite its sale. To do this, Board A would add to this lockbox's access code list an additional access code comprised of two bytes identifying Board B, together with the one byte arbitrary field that is in general use by Board B. By so doing, Board A enables all agents from Board B to open the lockbox with their existing Board B keys.
- agent (c) from Board C may wish to show a client houses listed for sale in neighboring Board D.
- agent (c) would call Board D and request that it load an access code into agent (c)'s key that matches the access code (or codes) resident in the Board D lockboxes to which agent (c) seeks access.
- a board can only load a key with key access codes having that board's identifying two byte field).
- the loading of these access codes could be done by Board D's computer over telephone lines into agent (c)'s key via a stand, regardless of the distance between Boards C and D.
- Board D would doubtless also append an expiration date to the codes loaded into agent (c)'s key so that agent (c) could only access the properties in Board D for a limited period, such as a day or two.
- the permission code system also gives the present invention capabilities that were difficult or impossible to implement in prior art lockbox systems.
- the permission code system enables keys to be delegated different capabilities corresponding to the needs and privileges of different users.
- each key is programmed with permission levels for three different classes of functions: OPEN/SBA, SHACKLE RELEASE and READ.
- the permission levels indicate the degree of ownership match required between a key and lockbox before the two units can cooperate to execute a function.
- the different permission codes in a key are assigned independently of one another, so that a key can have one permission code for certain functions and different permission codes for other functions.
- This feature allows boards and agencies to vary the capabilities of their keys simply by reprogramming the permission codes stored with the key characterization instructions.
- Such specialized keys have several applications. For example, an agency may wish to hire a courier to visit various houses listed by the agency to retrieve the lockbox access logs. However, the agency may not want the courier to have access to the key compartments of any of these lockboxes. To limit the courier's capabilities in this manner, the agency puts the key in the stand and sets the permission codes for OPEN/SBA and SHACKLE RELEASE to 4.
- a permission code of 4 prevents the function from being executed, regardless of the degree of ownership match between the lockbox and key.
- the READ permission level is set to 2, which allows the key to read the lockboxes on all the houses listed by the agency. The courier can then go and retrieve data from all these lockboxes and yet be unable to gain access to any of the house keys.
- listing agents can perform significantly more functions at a lockbox than a regular agent. For example, listing agents can change the Shown By Arrangement code and can execute Privacy Reads. These privileges, however, are not granted by reference to permission codes in key RAM 56 . Instead, such restricted functions are authorized only when CPU 28 or CPU 52 has confirmed that the key requesting execution of the function is owned by the listing agent associated with the lockbox (or that agent's broker or board). If no such match is found, the key owner is refused authorization to execute the listing agent functions.
- the permission code system of the present invention has applications in the industrial security market as well as in the real estate lockbox field.
- An industrial site can be tiered in a manner analogous to the agent, agency and board levels used in lockboxes.
- an industrial site could be tiered into employee, building master and site master levels.
- the employees of a company could be assigned permission codes of 3, allowing them to unlock only the doors for which they are the responsible employees.
- Building security guards could be assigned permission codes of 2, allowing them to unlock all doors in the particular buildings for which they are responsible.
- Master security guards could be assigned permission codes of 1, allowing them to unlock all doors on the site.
- the permission code system of the present invention is also used with computers 18 .
- Each computer is assigned a permission code that specifies which lockboxes and keys it can work with. If the computer belongs to an agency, it will be assigned a permission code of 2. A computer with a permission code of 2 can only be used to interface, through a stand, with keys and lockboxes assigned to that same agency. If the computer is owned by the board, it will be assigned a permission code of 1 and can be used to interface with all keys and lockboxes in the real estate board.
- the permission code assigned to a computer also limits the authority it can delegate to a key.
- a computer can delegate different levels of authority to a key by the permission codes that it loads into the key with the characterization instructions.
- a computer can reprogram a key's permission codes to the computer's own permission code or to any more restricted level. For example, a computer owned by an agency can reprogram a key to have permission codes of 2, 3 or 4. Such a computer cannot be used to program a key to have permission code of 1, for this would be delegating authority to the key higher than the computer'own authority.
- a board level computer due to its permission code of 1, can be used to program or read any lockbox or key owned by the board.
- communication between the lockboxes, keys and stands of the present invention is effected by electromagnetically coupled coils.
- exchange of data over coupled coils was effected by modulating the data signal onto an audio frequency or radio frequency carrier.
- Such electromagnetic coupling has previously been poorly suited for use in such battery powered applications because the modulated carrier draws a relatively large amount of power from the battery.
- the present invention employs a new modulation scheme, termed here “digital reconstruction modulation.”
- digital reconstruction modulation a new modulation scheme
- the raw data signal which is switching, for example, between zero volts and two volts, is applied directly across a first, transmitting coil 300 .
- receiving coil 302 is induced an alternating series of positive and negative transient voltage spikes corresponding to the transitions in the data signal.
- the Schmidt trigger circuit toggles states only when the voltage applied to its input is above a first threshold voltage or below a second threshold voltage. These threshold voltages are selected so that the positive transients exceed the first threshold voltage and so that the negative transients drop below the second threshold voltage. The positive transients thus cause the Schmidt trigger to toggle on and the negative transients thus cause the Schmidt trigger to toggle off.
- the output signal provided by the Schmidt trigger is thus identical to the data signal applied to the transmitting communications coil, reconstructed by virtue of the Schmidt trigger's hysterisis properties.
- the data signal recovered by the Schmidt trigger may be the inverse of the data signal applied to the first coil. This detail can be taken care of by starting the exchange of data between system units with a known data string. If the CPU in the receiving unit detects that the known data string is inverted, it can cause the output from the Schmidt trigger to be inverted again, bringing the signal back to its proper condition, for the remainder of the communications. Alternatively, the problem of data inversion can be eliminated entirely by insuring that the communicating components are always coupled in the desired orientation.
- a second advantage is that the data transmission rate is not limited by the frequency of a carrier signal carrying the data. Again, the only limits imposed are by the switching speeds that can be obtained in the coil circuit.
- the maximum speed at which lockbox, key and stand components can communicate with one another varies as a function of temperature, component tolerances and component aging. In a worst case situation, one system component might be able to communicate at only one-third the speed of another component.
- the present invention employs an adaptive communications scheme that optimizes the communicating components.
- communications between units are generally begun by the key sending an interrogation signal to wake up the lockbox. Before the lockbox responds with its response signal identifying the lockbox, reporting on battery state, etc., as discussed earlier, the two units first agree on a data transmission speed.
- each unit sends the other its shortest data element.
- a data 0 is represented by a signal duration of a first period and a data 1 is represented by a signal three times longer.
- the key thus sends to the lockbox a data 0 at the key's top speed.
- Lockbox CPU 28 measures the duration of this signal and stores this value in its RAM memory 30 .
- Lockbox CPU 28 then sends the key a data 0 signal at the lockbox's top speed.
- Key CPU 52 in turn counts the duration of this signal and stores this value in its RAM memory 56 .
- CPUs in both units then compare the duration of the signal received with the duration of the signal they sent in order to determine which unit is operating more slowly.
- the CPU in the faster unit then reduces its data communications speed in order for the length of its data 0 to match that of the slower unit.
- the speed at which each unit transmits is set by a data word in the unit's RAM memory, which word can be altered by the CPU to effect the speed change).
- a comprehensive battery monitoring system is employed in the present invention to prevent the lockbox and key batteries from failing and rendering the associated units inoperative.
- the battery monitoring systems rely on three independent criteria to determine when each battery is nearing the end of its useful life: elapsed time, usage and current drain from the backup battery.
- the lockbox or key CPU detects either of the first two of these three low battery criteria, it loads a battery count number, such as 16, in its memory. (When the CPU detects the third low battery criteria, it immediately loads a battery count of zero in its memory). This battery count number is then decremented each time a lockbox or key operation is performed. The battery count represents the number of additional operations that the lockbox or key will perform before it curtails operation.
- the key informs the user of this condition just before the key returns to sleep.
- the lockbox indicates to the key the status of the lockbox battery. If any of the three low battery criteria have been met, the lockbox relays the lockbox battery count to the key, which in turn displays this number in the message portion of its LCD display 50 and makes visible the KEYSAFE BATTERY annunciator in the top portion of the LCD display. The key then beeps to call the user's attention to the display.
- the number displayed in LCD 50 is the number of additional lockbox operations that the lockbox will allow before it curtails activities to prevent battery failure. The key maintains this LCD display for approximately two minutes before going to sleep.
- the lockbox battery count is not displayed on the key's LCD display.
- the KEYSAFE BATTERY annunciator and the beeper alone are used to warn the user that the lockbox will soon curtail its operations. By not informing the user of the precise number of lockbox operations left, it is hoped that the user will replace the lockbox battery without delay.
- key CPU 52 examines the portion of key RAM memory 56 in which the key battery count is stored. If key CPU 52 finds a count, the count is decremented and the KEY BATTERY annunciator is made visible and remains visible for the duration of the key's operation.
- the first low battery criterion is elapsed time. When a new battery is installed in the lockbox, a date counter is started that increments each day or other set period. The first low battery criterion is met when this count reaches a predetermined value, such as three years. That is, the system presumes that the lockbox battery is nearing the end of its useful life when it is three years old.
- the predetermined time period at which the battery is assumed to be nearing the end of its useful life can be chosen to correspond to the particular circumstances of the lockbox. For example, if the lockbox is used in a cold environment, such as in Alaska, its “shelf life” will be longer than if it is used in southern Florida. Similarly, the predetermined period can be chosen to correspond to the type of battery installed. If alkaline batteries are used, the predetermined period would be set to a longer period than if conventional carbon batteries are used.
- lockbox CPU 28 which monitors the voltage of the primary battery. When this voltage is interrupted and then restored, lockbox CPU 28 assumes that the battery has been replaced and resets the date counter accordingly.
- lockbox CPU 28 is informed of the removal and subsequent replacement of a primary battery by a microswitch positioned in the lockbox battery compartment.
- the second low battery criterion is battery usage.
- a battery capacity number is stored by lockbox CPU 28 in RAM memory 30 . This number represents, very conservatively, the total estimated capacity of the battery. Each time an operation is performed, this number is decremented by a number representative of the energy actually consumed. The second low battery criterion is met when this battery capacity number reaches zero.
- the battery capacity number loaded into RAM memory 30 when the battery is replaced could again be chosen to correspond to the particular circumstances of that lockbox. For example, if the lockbox is used in a cold environment, its battery will be less able to deliver successive large current loads than if it is used in a warm climate.
- the amount by which battery capacity number is decremented is a function of the particular operations performed and their duration.
- the operations can be grouped into three classes: operation of a pair of locking solenoids, operation of the communications coil and operation of the remainder of the circuitry. Each of these operations is considered by lockbox CPU 28 to consume energy at a fixed rate.
- a pair of locking solenoids may be considered to consume energy at a rate of 3 watts, the communications coil at a rate of 5 milliwatts and the remainder of the circuitry at a rate of 1 milliwatt.
- CPU 28 operates a corresponding timer to measure its duration.
- the measured duration of each operation is multiplied by its assumed energy consumption rate to estimate the amount of energy actually withdrawn from the battery. These measures of energy usage are then subtracted from the battery capacity number stored in RAM memory 30 to provide an indication of the battery energy remaining. As noted, the second low battery criterion is met when this battery capacity number is decremented to zero.
- the second low battery criterion is simply the number of operations performed by the lockbox.
- a second counter this one an operations counter, is started.
- This operations counter counts the number of high power operations (i.e., lockbox operations that energize solenoids, such as OPEN and SHACKLE RELEASE) performed by the lockbox.
- the second low battery criterion in this alternative embodiment is met when this operations counter reaches 1000. That is, the system presumes that the lockbox battery is nearing the end of its useful life after 1000 high power operations have been performed.
- the third low battery criterion is current drain from the backup battery.
- lockbox backup battery 34 Normally, no current is drawn-from lockbox backup battery 34 .
- the backup battery only supplies current when primary battery 32 is not able to meet all the lockbox's power requirements.
- lockbox CPU 28 detects that current is being drawn from backup battery 34 , this third low battery criterion is met and the system presumes that the primary battery is at the end of its useful life. In this instance, unlike the preceding two, the battery count number is immediately set to zero so that any energy remaining in the primary battery can be preserved for a SHACKLE RELEASE operation.
- a counter is set to an arbitrary number, such as 16, and is decremented each time an additional lockbox operation takes place. This count begins at a relatively low number, such as 16, rather than at a higher number because if the number is too high, users will likely ignore it for too long.
- lockbox battery count reaches zero (or is set to zero by detection of current drain from the backup battery)
- OPEN and SBA functions are denied to everyone except keys owned by the board itself, as determined with reference to a permission code of 1 in the key.
- the lockbox is of little utility.
- Other operations are similarly prevented, such as FILE MARK, SBA and change SBA.
- the remainder of the functions including SHACKLE RELEASE, can still be performed, thereby allowing the listing agent (or the listing agent's broker or board) to remove the lockbox and replace the batteries.
- the lockbox control software will only allow the listing agent (or the listing agent's broker or board) to execute the OPEN or SBA function.
- the low battery criteria and associated numerical constants discussed above are selected so that even when the battery count reaches zero, the battery still has approximately half of its capacity left. This reserve capacity insures that the high power SHACKLE RELEASE function can still be performed.
- the lockbox battery capacity is prevented from draining much below this point by preventing high power OPEN functions.
- each lockbox and key includes a software timer that counts the time elapsed during which the backup battery is the sole power source for the unit, such as when the primary battery has been removed. When this timer reaches a predetermined count, an appropriate warning message is displayed in the message portion of key LCD display 50 indicating that the appropriate backup battery should be replaced.
- more complex backup battery monitoring schemes such as those used with the primary batteries, can be employed.
- data in lockboxes and keys throughout the real estate board can be updated by radio.
- board-wise changes of data such as changes of lockout lists and access codes, and changes targeted to specific units, such as disabling a particular key, can be implemented simply and quickly.
- the data to be loaded into the memories of the lockboxes is modulated onto a subcarrier transmitted with a conventional FM broadcast.
- the source of the data can be a conventional modem driven from board computer 18 .
- a receiver in each lockbox decodes this data from the modulated subcarrier and reloads its memory according to these instructions.
- the signals broadcast by FM stereo radio stations have a bandwidth of 200 kilohertz, 100 kilohertz on each side of the carrier frequency.
- the FM stereo audio and stereo pilot occupy the spectrum from the carrier frequency out 53 kilohertz each side.
- the portion of the spectrum from 53 to 100 kilohertz on either side of the carrier is vacant and is presently being used for a variety of other subcarrier services, such as transmission of commercial free music, educational materials and stock market reports.
- the data from board computer 18 to be sent to the individual lockboxes is modulated on a subcarrier positioned at 76 kilohertz in the FM baseband signal, approximately midway in this vacant range of frequencies. Referring to FIG.
- the digital data from the board computer 18 is provided to a subcarrier generator 200 connected to an exciter 202 of the FM transmitter 204 .
- the subcarrier generator generates the 76 kilohertz subcarrier signal which is modulated with the data.
- This modulated FM signal is received by a receiver 206 in each lockbox.
- the received FM signal is fed from an antenna 208 (discussed below) to a mixer 210 through an RF preselector/attenuator circuit 212 .
- RF preselector/attenuator circuit 212 provides some attentuation of out of band signals while amplifying the desired signals, thereby minimizing the receiver's noise figure.
- Mixer 210 mixes the desired FM broadcast signal received by antenna 208 with a local oscillator signal from a local oscillator 214 .
- the frequency of local oscillator 214 is selected to produce an up-converted first intermediate frequency (IF) of 384 megahertz.
- the output from first mixer 210 is fed to an IF section 216 .
- IF section 216 includes a first filter 218 which passes the desired 384 megahertz signal and rejects the unwanted mixer products.
- Filter 218 desirably comprises a surface acoustic wave filter.
- the output from filter 218 is fed to a second mixer 220 .
- Second mixer 220 mixes the signal from filter 218 with the signal from a second local oscillator 222 .
- Second local oscillator 222 provides a 394.7 megahertz signal, thereby yielding a down-converted second receiver intermediate frequency of 10.7 megahertz.
- Second filter 224 can be a standard 10.7 megahertz ceramic filter of the type commonly used in FM receivers.
- IF amplifier 226 amplifies the 10.7 megahertz signal from filter 224 to a level suitable for detection by a phased lock loop detector circuit 228 .
- Detector 228 demodulates the IF signal and provides a wideband composite audio signal to an SCA band pass filter 230 .
- SCA band pass filter 230 passes the desired subcarrier channel to an SCA decoder 232 , while attenuating the lower frequency audio components.
- Decoder 232 demodulates the filtered SCA channel and provides the demodulated audio to a modem circuit 234 that converts the modem signals originally encoded on the subcarrier back to digital data form.
- the output from modem 234 is treated just as any other data input to the lockbox, as for example through the communications coil, and is used to effect the reprogramming of the lockbox RAM memory 30 .
- antenna 208 can include lockbox shackle 22 as its principal component.
- shackle 22 is insulated within the case to prevent it from contacting the lockbox's electrical ground and is similarly insulated outside the case, as by an insulating vinyl rain guard enclosing the shackle, to prevent it from contacting the structure to which is is fastened.
- the shackle is a small antenna, it can be resonated by preselector/attenuator circuit 212 so as to operate as a low impedance resonant antenna at the frequency of interest.
- an antenna that does not include the shackle as a principal element.
- Such an antenna may take the form of a planar coil encased in plastic and mounted on an exterior surface of the lockbox. Such an antenna can also be used on or in a radio-updated key.
- antenna 208 can comprise an insulated conductor wound about shackle 22 so as to form a helically loaded loop.
- each lockbox can be programmed to energize its receiver circuitry for this or any other predetermined period every night to listen for updates from the board office. This window period can be a few minutes long or a few hours long.
- Data sent from the central board office can be directed to all the lockboxes, or can include an introductory address data string identifying a particular lockbox to which the data is targeted. In either event, the transmissions from the board office can additionally include a reference time signal so that all lockboxes are synchronized in their operations and so that they will activate their receivers at the same time every days
- a multiuser, multitasking system with large amounts of on-line storage is resident at the board office and serves as board computer 18 .
- a super microcomputer such as the NCR Tower system is a suitable machine.
- a computer system for a large real estate board desirably includes a trunk interface unit 94 and a plurality of telephone lines 96 to allow a plurality of remote stands 16 b (not shown) to interface with the super microcomputer simultaneously.
- Trunk interface unit 94 thus allows super microcomputer 18 to be interrogated over telephone lines (using DTMF tones) and allows data to be exchanged between the super microcomputer and individual lockbox and key components via stands 16 .
- stands 16 function as remote input/output ports for the board computer and the stand' microprocessors function as smart input/output controllers.
- trunk interface unit 94 includes an interface module 99 associated with each telephone line 96 for decrypting incoming data and for encrypting outgoing data.
- Modules 99 also desirably include speech synthesizers so that synthesized speech corresponding to various computer data can be sent back to individual agents over the telephone lines.
- a ninth interface module 99 which does not include a speech synthesizer, is provided in trunk interface unit 94 for interfacing with a local stand 16 a resident at the board office.
- Board computer system 18 also desirably includes at least one phone line 98 and an associated data modem 97 for interfacing to smaller computers 18 resident at individual agency offices.
- a small computer 18 In a typical large system, several smaller computers 18 are distributed throughout the system. Normally, such smaller computers are limited to performing certain preselected functions.
- the software loaded into a small computer 18 at an individual agency typically enables it to update certain lockbox parameters, such as changing the lockout list and changing the daily disable times, but prevents it from changing more sensitive parameters, such as lockbox access codes.
- the software loaded into the small computer 18 at the agency typically enables it to deactivate keys, but prevents it from reinitializing keys after they are deactivated and prevents it from changing key expiration dates and expired key access codes.
- Such restricted functions can only be performed by the central board computer.
- the board computer is used to keep track of all data pertinent to the system. Whenever a key or a lockbox is read or programmed, the corresponding data is entered into a system database. This database includes information on all the features and parameters heretofore mentioned, for every lockbox and key in the system.
- the board computer can search the database for any category of information and can generate corresponding written reports on any such subject. By such reports, the board can better target its activities. For example, the board can search the database to determine which listed properties have not been shown often and then suggest to the member agencies that the advertising of these properties be increased. Similarly, the board can monitor manpower trends and suggest staffing schedules that allocate agents to the offices and at the times that the demand is greatest.
- keys 14 are usually programmed to expire occasionally and must be rejuvenated. This is desirably done by the real estate board, rather than by the individual agencies, so as to maintain centralized control over key usage. Accordingly, as noted, most small computers resident at the various agencies are not able to rejuvenate expired keys. The agents could travel to the board office periodically to have their keys rejuvenated, but in large metropolitan areas this may be burdensome. The present system allows agents to complete all such transactions with the board computer over telephone lines. To rejuvenate an expired key, for example, the agent would place the key on a stand 16 and would call the board computer. The key could then exchange appropriate handshaking signals with the computer and receive from the computer the key characterization instructions needed to rejuvenate the key.
- phone line 98 also permits the board computer to communicate with the vendor. Updated software can be reloaded using this link.
- Other diagnostic routines such as one for analyzing a diagnostic maintenance log stored in a lockbox or a key, can be executed by the vendor on individual components by using this link to couple through the board computer to the individual components at local board or agency offices.
- the board computer includes several security features. For example, all requests for service to the computer must include proper password codes before any transactions are allowed. Certain particularly sensitive transactions may require that a user call the board computer, send appropriate passwords and then hang up. The board computer then calls the user back on a predetermined telephone line. By this and other techniques, security of the system can be maintained even if the security of the password codes is breached.
- lockboxes and keys of the present invention are initially shipped from the vendor, they are not assigned to one particular real estate board. That is, the board identifying data portion of each unit's RAM memory is left unprogrammed. This field is later programmed automatically when the unit is initialized by a computer.
- Both the lockboxes and the keys of the present invention include a bit, termed here the “free agent bit,” in their respective RAM memories that indicates whether the unit has been assigned to a particular board. This bit is initially set to “0” by the manufacturer, indicating that the unit is unassigned.
- an initialization routine run on a computer coupled to the stand.
- One of the first operations performed by this initialization routine is to determine the status of the unit's free agent bit. If it is found to be “0,” the routine automatically stores in the unit's RAM memory a string of data identifying the board to which the computer itself is assigned. The computer then changes the unit's free agent bit from a “0” to a “1,” thereby preventing subsequent changes of the lockbox's or key's board ownership. By this technique, every lockbox and key is assigned automatically to the board to which the programming computer is assigned.
- the initialization routine in computer 18 continues by loading the unit's RAM memory with characterization instructions as specified by the programming entity, usually the real estate board.
- a lockbox or key After a lockbox or key has been initialized, it can then only be reprogrammed by computers assigned to the same board. If it is desired to transfer a lockbox or a key to a different board, the original owner must deactivate the unit and change the unit's free agent bit back to “0.” Thereafter, the unit will again assume the board ownership of the computer that reinitializes it.
- the database in the board's central computer 18 includes data identifying each lockbox and key in the system and its operational status (initialized, deactivated, etc.). This data is used by the computer to prevent keys from being fraudulently duplicated.
- each key includes identification data indicating the key's ownership by agent, agency and board.
- Computer 18 will not load a key with a set of identification data if it determines that a key having that particular set of identification data already exists.
- the system thus prevents an unscrupulous user from reprogramming his or her key so as to fraudulently assume the identity of another agent in the board.
- the only way an unscrupulous agent could perpetrate this fraud would be to first obtain possession of the other agent's key and to deactivate it.
- This function cannot generally be executed without knowledge of the other agent's personal code, which the unscrupulous agent should not know.
- the database's tracking of data on each key in the system serves an important role in deterring fraud.
- lockbox 12 includes shackle 22 , case 100 and a hinged key compartment door 24 .
- Door 24 is retained in the closed position by a cooperating door latch 102 and door stem 104 .
- Door stem 104 is shown in FIG. 6 as including a hook portion 106 , a butt portion 108 and a turned cut portion 110 .
- Stem 104 is spring biased away from the back of case 100 by a spring 112 compressed between case 100 and a shoulder 114 on stem 104 .
- Door stem 104 is retained in the locking position by the plungers 116 , 118 of key compartment locking solenoids 36 ( FIG. 2 ) which engage stem 104 at turned cut portion 110 and limit its forward travel.
- a retaining pin 120 is urged against a pivoted lever 122 .
- Lever 122 pivots about a pivot point 124 connected to the case, thereby causing the opposite end of the lever to exert a force against an actuator button 126 on microswitch 42 .
- microswitch 42 closes, key compartment locking solenoids 36 energize, provided the appropriate authorization signals have been exchanged between the lock and key.
- Key compartment locking solenoids 36 return to their deenergized, locking states 0.25 seconds after microswitch 42 is reopened. Plungers 116 , 118 are then urged against a rear barrel portion 134 of stem 104 if the stem is then in its unlocked position.
- latch 102 engages with a hook portion of stem 104 as these components are pushed inwardly.
- the hook portion of latch 102 has a curved upper surface so that it lowers into its latched position automatically when it meets the case.
- the front entrance to the bore within which these coupled elements travel has a chamfered upper portion 135 to further facilitate lowering hook portion of latch 102 into its locked position.
- door 24 is positioned on the front of lockbox 12 and pivots downwardly to expose the lockbox contents.
- This arrangement facilitates operation of lockboxes mounted in awkward locations, such as on ground level water faucets, especially when compared to prior art systems in which the key container had to be released from the underside of the lockbox.
- the present arrangement in which the key is coupled to the lockbox simply by bringing the key near the slot in the upper front portion of the lockbox provides a substantial improvement in operating flexibility over prior art systems in which the key had to be engaged with the lockbox in a precise position and then manipulated while in that position in order to operate the lockbox.
- a key compartment door 24 on the lockbox of the present invention also provides a variety of security enhancing features not found in prior art lockboxes.
- the shackle release mechanism of the present invention is concealed behind the key compartment door, thereby protecting it from vandalism and providing an additional measure of security to the shackle.
- battery compartment retaining bolt 180 and tamper proof screws holding lockbox circuit board 182 and the lockbox's rear cover in place are also protected from tampering by being positioned behind door 24 .
- FIGS. 2 and 7 show that shackle 22 includes a loop portion 140 and two end portions 142 . Each end portion includes a butt portion 144 and a turned cut portion 146 .
- Shackle 22 is maintained in its locked position by a locking bar 148 , shown in FIGS. 4 and 5 .
- turned cut portions 146 in both ends of shackle 22 are engaged by circular notches 150 in locking bar 148 .
- Locking bar 148 is maintained in engagement with the turned cuts 146 of shackle 22 by the locking bar's own engagement on a shackle stem 162 .
- Locking bar 148 is engaged on a butt portion 160 of the shackle stem by engagement between an elongated cut 164 in a flat portion. 158 of the bar with a groove 166 in the butt portion of the stem.
- Shackle stem 162 is spring biased towards the front of the case by a spring 156 compressed between flat portion 158 of locking bar 148 and the rear of the case.
- stem 162 , and consequently locking bar 148 are prevented from moving forwardly by the engagement of plungers 168 , 170 of shackle locking solenoids 38 with a turned cut portion 172 in the stem.
- shackle locking arrangement prevents any external force, regardless of how it is applied, from imparting a load to shackle locking solenoids 38 .
- locking bar 148 will lift slightly off shackle locking stem 162 and will immediately engage a casting 152 (shown also in Fig. B) in the upper portion of the case.
- Thread 152 fills the upper portion of the case and includes two openings 153 sized just to allow passage of the end portions 142 of the shackle).
- the force pulling shackle 22 from case 100 is thus applied entirely against casting 152 and does not include any component directed against solenoids 38 .
- lockbox CPU 28 first unlocks the key compartment door 24 to allow access to the shackle locking stem 162 normally concealed behind this door.
- Shackle locking solenoids 38 are energized for eight seconds beginning two seconds after door 24 is opened. (as detected by microswitch 42 ).
- plungers 168 , 170 of energized shackle locking solenoids 38 attempt to retract, however, they are prevented from doing so by their frictional engagement with the edge of the turned cut portion 172 in shackle locking stem 162 . This engagement is maintained by spring 156 which pushes the edge of the turned cut portion 172 of the stem against the sides of the solenoid plungers.
- the user In order to release the shackle, the user must press shackle locking stem 162 rearwardly a short distance so as to free plungers 168 , 170 from their frictional engagement with the edge of turned cut portion 172 of the stem.
- stem 162 When stem 162 is pressed rearwardly in this manner, energized solenoids 38 immediately retract their plungers from the stem.
- stem 62 When the plungers retract, stem 62 is allowed to travel forwardly, no longer bound by the plunger' engagement in the turned cut portion 172 of the stem.
- the stem is allowed to spring forwardly, pushed by the force of compressed spring 156 .
- the shackle When it is desired to relock the shackle, the shackle is reinserted in openings 153 in the top of case 100 and pressed downwardly until shoulders 154 on the shackle engage the upper protrusions 174 .
- the shackle stem 162 which is protruding forwardly under the influence of spring 156 , is pressed inwardly by the user, thereby causing circular notches 150 in locking bar 158 to move back into engagement with turned cuts 146 in the shackle.
- Stem 162 can be pressed inwardly simply by closing key compartment door 24 .
- plungers 168 , 170 of shackle locking solenoids 38 spring from their unlocked positions (pressing against the barrel portion 176 of stem 162 ) back into the turned cut portion 172 of the stem. This action relocks the shackle stem in its locked position and correspondingly locks shackle locking bar 148 in its locking relationship with shackle 22 .
- door locking stem 104 and shackle locking stem 162 also serve security functions by rendering the inner workings of the lockbox inaccessible to vandalizing users.
- door 24 Once door 24 is opened, as for example by an authorized user, the two bores in which these stems travel could provide passageways to the inner workings of the lockbox.
- a vandalizing user who is so inclined might attempt to tamper with the internal mechanisms through these passageways. In the present invention, however, such tampering is thwarted by stems 104 and 162 which occlude these passageways 80 as to block all access to the inner workings of the lockbox.
- primary lockbox battery 32 comprises five alkaline AA cells mounted next to one another in a battery pack 178 mounted in the lower rear of the unit and held in place by a bolt 180 .
- An 0 -ring seal is provided around battery pack 178 and around the lockbox rear cover to prevent rain and contaminants from entering the case.
- the backup battery 34 is mounted on a circuit board 182 in the back of the unit, which circuit board also supports the lockbox CPU 28 , RAM 30 and related circuitry.
- Communications coil 26 is mounted in the upper front of the lockbox, adjacent a receiving nest 184 into which the top end of key 14 is inserted. Coupling between communications coil 26 and key 14 through the metal lockbox case 100 is facilitated by a small slot 186 that extends through case 100 for the length of coil 186 . This slot is filled with an insulating resin material that also pots the communications coil in place.
- Cellular urethane gaskets 192 are positioned at the points where door 24 contacts the case so as to prevent rain and contaminants from entering the case. This cellular urethane material resists caking a set, thereby assuring a long life for the door seals.
- An injection molded plastic bumper (not shown) can be provided on the outside of the lockbox so as to protect the fixture to which the lockbox is mounted (i.e. a door) from abrasion.
- shackle 22 can comprise a vinyl clad steel cable terminated with appropriately machined ends, such as ends 142 on shackle 22 , so as to permit connection of the lockbox to trees and the like.
- the cable can again be provided with drip caps to prevent rain from entering the lockbox.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
One or more lock or key units of a secure entry system is equipped with a radio receiver. The receiver permits a memory in the lock or key unit to be updated with new data that is modulated onto a radio frequency signal. By this technique, system-wide changes of programming data, such as changes of lockout lists and access codes, and changes targeted to specific units, such as disabling a particular key, can be implemented simply and quickly.
Description
- This application is a continuation in part of copending U.S. application Ser. No. 831,601, filed Feb. 21, 1986, which in turn is a continuation in part of copending application Ser. No. 814,364, filed Dec. 30, 1985, which in turn is a continuation in part of Ser. No. 788,072, filed Oct. 16, 1985, now abandoned. These applications are incorporated herein by reference.
- The present invention relates to real estate lockboxes and other secure entry systems. Lockboxes are used in the real estate industry to contain the keys of houses listed for sale. Prior art lockboxes have primarily been mechanical devices which allow access to a secure compartment by use of a conventional key. Such lockboxes and keys, however, have had numerous disadvantages. These disadvantages have been overcome by the present invention and a great number of new features have been provided.
- One feature of the present invention is the provision of a code entry keypad on a lockbox key, rather than on the lockbox itself, thereby eliminating an opportunity for lockbox vandalism and preventing unauthorized passersby from communicating with the lockbox.
- Another feature of the invention is an arrangement whereby different keys can be programmed to become inoperative after different periods of time.
- Yet another feature of the invention is the ability of the lockbox to be reprogrammed in the field.
- Still another feature of the invention is the ability of the lockbox to be interrogated by a user to learn the number of times the lockbox has been accessed without returning the lockbox or an interrogating key to a central location.
- Yet another feature of the invention is an arrangement whereby a user can receive temporary authorization to access lockboxes owned by other real estate boards.
- Still another feature of the invention is an arrangement whereby lockbox battery power is conserved and solenoid work is reduced by delaying energization of unlocking solenoids until the lockbox is actually being opened.
- Yet another feature of the invention is the use of several independent lockbox battery monitoring criteria to avoid lockbox battery failure.
- Still another feature of the invention is the provision of two lockbox locking solenoids that are reciprocally mounted so that if one is jarred to an unlocked state, the other is jarred to maintain a locked state.
- Yet another feature of the invention is an arrangement whereby a manufacturer can provide a variety of different keys to its customers without tooling up several different manufacturing lines.
- Still another feature of the invention is an arrangement whereby real estate boards or agencies can limit the operations that individual keys can perform.
- Yet another feature of the invention is an arrangement whereby a user can log into a lockbox's access log without opening the lockbox.
- Still another feature of the invention is an arrangement whereby an agent who has listed a house can require visiting agents to enter an auxiliary access code before being allowed to open the lockbox.
- Yet another feature of the invention is the ability of the lockbox to render certain keys inoperative until they are reprogrammed.
- Still another feature of the invention is the recording of detailed diagnostic data about recent lockbox and key operations in order to facilitate resolution of anomalous lockbox and key behavior.
- Yet another feature of the invention is the ability of the lockbox to recognize the keys of preselected users and to prohibit them from opening the lockbox.
- Still another feature of the invention is the ability of the lockbox and key to cooperate so as to update a list of keys that are to be prevented from executing lockbox functions.
- Yet another feature of the invention is the use of a low power, yet long range electromagnetic communications technique for exchanging signals between lockbox, key and stand components.
- Still another feature of the invention is an arrangement whereby a user can enter the keystrokes needed to operate the lockbox into the key's keypad before the key is engaged with the lockbox, thereby facilitating operation of the lockbox in awkward or poorly lit locations.
- Yet another feature of the invention is an arrangement whereby the access log maintained in the lockbox can be marked so that less than the entire contents of the log can be supplied to a requesting user.
- The foregoing and additional features and advantages of the present invention will be more readily apparent from the following detailed description of a preferred embodiment thereof, which proceeds with reference to the accompanying drawings.
-
FIG. 1 shows a lockbox, a key, a stand and a computer used in a lockbox system according to the present invention. -
FIG. 2 is a rear view, partially in section, schematically illustrating portions of a lockbox according to the present invention. -
FIG. 3 is a sectional view taken along line 3-3 ofFIG. 2 , schematically illustrating some of the locking components in a lockbox according to the present invention. -
FIG. 4 is a top view of a shackle locking bar used in the lockbox ofFIGS. 2 and 3 . -
FIG. 5 is a rear elevational view of the shackle locking bar ofFIG. 4 . -
FIG. 6 is a right side view of a door stem used in the lockbox ofFIGS. 2 and 3 . -
FIG. 7 is a front elevational view of a lockbox shackle used in the lockbox ofFIGS. 2 and 3 . -
FIG. 8 is a sectional view of the case of the lockbox ofFIGS. 2 and 3 taken along line 8-8 ofFIG. 2 . -
FIG. 9 is a schematic block diagram of the electronic circuitry used in the lockbox ofFIGS. 2 and 3 . -
FIG. 10 is a plan view of a key according to the present invention. -
FIG. 11 is a left side view of the key ofFIG. 10 . -
FIG. 12 is a schematic block diagram of the electronic circuitry used in the key shown inFIGS. 10 and 11 . -
FIG. 13 is a diagram illustrating portions of the electronic memories used by the lockbox and key of the present invention. -
FIG. 14 is a top plan view of a remote stand according to the present invention. -
FIG. 15 is a sectional view taken along lines 15-15 ofFIG. 14 and showing the stand with two different sizes of keys. -
FIG. 16 is a sectional view taken along lines 16-16 ofFIG. 14 and showing the stand coupled to a lockbox. -
FIG. 17 is a rear elevational view of the stand shown inFIG. 14 . -
FIG. 18 a is a schematic block diagram of the electronic circuitry used a local stand according to the present invention. -
FIG. 18 b is a schematic block diagram of the electronic circuitry used in a remote stand according to the present invention. -
FIG. 19 is a schematic block diagram showing a digital reconstruction modulation system according to the present invention. -
FIG. 20 shows a radio system for updating lockboxes and keys according to the present invention. -
FIG. 21 shows a computer and trunk interface unit used in an enhanced version of the system ofFIG. 1 . - A
basic lockbox system 10 according to the present invention, shown inFIG. 1 , includes one or more lockboxes, or keysafes, 12,electronic keys 14, stands 16 andcomputers 18.Lockbox 12 contains the door key to the listed dwelling and is mounted securely on or near the dwelling.Electronic key 14 is used by real estate agents to open the lockbox and gain access to the dwelling key contained therein.Key 14 can also be used to read access log data from the lockbox and to load programming instructions into it.Stand 16 is used to interfacecomputer 18 with the lockbox and key units.Computer 18 is used to store instructions in and to collect data fromlockbox 12 andkey 14 so as to integrate management of a lockbox system. - With reference to
FIGS. 2-3 ,lockbox 12 includes a secure enclosure, orhouse key compartment 20 designed to contain house keys, business cards, written messages and the like.Lockbox 12 is securely attached to the listed house or other fixed object by ashackle 22 or by screws (not shown).Shackle 22 in most instances attaches the lockbox to a doorknob, water spigot or porch guard rail. Upon a proper exchange of signals betweenlockbox 12 and key 14, adoor 24 to the lockbox housekey compartment 20 can be opened, thereby allowing access to the house key and to other materials stored inside. - The circuitry of
lockbox 12 is shown in block diagram form inFIG. 9 .Lockbox 12 includes acommunications coil 26, a microprocessor (CPU) 28, a read/write (RAM)memory 30, aprimary battery 32, abackup battery 34, a pair of keycompartment locking solenoids 36, a pair ofshackle locking solenoids 38, a key compartmentsolenoid drive circuit 40, an associatedmicroswitch 42 and a shacklesolenoid drive circuit 43. -
Communications coil 26 is used to electro-magnetically couple to corresponding coils inkey 14 and stand 16.Microprocessor 28 controls operation oflockbox 12 according to programming instructions (“lockbox control software”) permanently stored in an associated read only memory (ROM) 44.RAM memory 30 is used to store various elements and strings of operating data.Primary battery 32 provides power to the lockbox circuitry.Backup battery 34 is used when the primary battery becomes weak or is removed for replacement. Keycompartment locking solenoids 36 releasably lock housekey compartment door 24 under the control of doorsolenoid drive circuit 40 andmicroswitch 42.Shackle locking solenoids 38releasably lock shackle 22 under the control of shacklesolenoid drive circuit 43. - Although illustrated as a single component,
lockbox CPU 28 is in fact two discrete microprocessor circuits. The first, a National Semiconductor 820 Series Control Oriented Processor, is an eight bit processor that performs all control, communications and logic functions with the exception of timing and calendar-clock functions. These functions are performed by a National Semiconductor COP 498 processor which is mask programmed by the manufacturer to perform a variety of time keeping functions. Thelockbox RAM 30 is comprised of a low power, low voltage Toshiba LC3517NC RAM circuit, which is organized as 2048 eight bit bytes. -
Lockbox CPU 28 stores information on certain of the operations that are executed, or attempted to be executed, by a key or the lockbox in a portion ofRAM memory 30 termed the “access log.” Each entry in the access log includes the identity of the key, the date and time of the operation (obtained from the calendar-clock portion of CPU 28), the function attempted and, if the function was denied, the reason why. In the illustrated exemplary embodiment, the lockbox access log can store information on 100 lockbox operations. This log can later be retrieved, in whole or in part, by key 14 or bystand 16 for transfer tocomputer 18 or for display on a CRT screen or printer. - Management of the lockbox access log is performed by
lockbox CPU 28 in conjunction with a “roll flag” and a “pointer” stored inlockbox RAM 30. The roll flag indicates whether all 100 entries in the access log have been filled and consequently whether the memory is recycling, overwriting old data. The pointer indicates the address of the memory location at which the next access log entry will be stored. - When the lockbox is initialized (discussed below in the section entitled Initialization and Deactivation of Lockboxes and Keys by the Computer), the roll flag is set to “0” and the pointer is set to indicate the address of the first memory location in the access log. Thereafter, each entry in the log causes the pointer to increment to the address of the next memory location in the log.
- After 100 entries have been stored in the access log, the pointer recycles and indicates again the address of the first memory location in the access log. At this point, the rollover flag is set to “1,” indicating that the access log has become a circular data buffer and that each additional entry will overwrite an earlier entry.
-
Lockbox 12 is characterized by “lockbox characterization instructions” loaded intolockbox RAM memory 30 by a computer through a stand. (Key 14 can also be used to load a set of limited characterization instructions intolockbox RAM memory 30, as discussed below in the section entitled Functions). The lockbox characterization instructions give the lockbox an identity, fix in it certain numerical values and enable it to perform certain functions. - As shown in the illustrative lockbox memory map in
FIG. 13 , the identification information loaded with the characterization instructions identifies the listing, the listing agent, the responsible agency and the responsible board. The identification information further identifies the lockbox by a unique lockbox serial number. - Some of the numerical values loaded into the lockbox include a “Shown By Arrangement” (SBA) number, a key lockout list and a collection of lockbox access codes.
- Functions enabled by function enable bits in the characterization instructions may include Lockbox Disable On Removal and Privacy Read (both discussed below in the section entitled Programmable Lockbox Options).
- After its initial characterization by
stand 16,lockbox 12 will not require further maintenance or programming until the lockbox is moved to a new location. - Mechanical details of the
lockbox 12 are discussed below in the section entitled Mechanical Construction of Lockbox. - With reference to
FIGS. 10 and 11 , key 14 is constructed in atrim polycarbonate enclosure 46 sized to fit conveniently in a user's purse or pocket. The key includes akeypad 48 and anLCD display 50.Keypad 48 is used to enter commands into the key.LCD display 50 is used to display instructions and information to the user. -
LCD display 50 includes a central message portion in which messages from the system can be displayed to the user.Display 50 also includes a lower portion comprising a “prompt” field and an upper portion comprising an “annunciator” field. The prompt field includes twelve potential prompts which represent twelve functions that a user can request the key to execute. They are OPEN, SHACKLE RELEASE, CHANGE PERSONAL CODE, CONTROLLER, READ FILE MARK, READ NN, READ, CLEAR MEMORY, SIGNATURE, SHOWN BY ARRANGEMENT, FILE MARK, and PROGRAM. These functions are discussed below in the section entitled Functions. - The annunciator field includes five potential annunciators which indicate the status of various aspects of the key. The annunciators in the preferred embodiment are FUNCTION, READ, PROGRAM, KEYSAFE BATTERY and KEY BATTERY.
- The READ annunciator is made visible when the key contains lockbox access log data transferred from a lockbox during a READ operation. The PROGRAM annunciator is made visible when the key contains a set of limited characterization instructions that are to be loaded into a lockbox. The FUNCTION annunciator is made visible when the user is to select a function to be executed. The KEYSAFE BATTERY and the KEY BATTERY annunciators are made visible when the batteries for these respective units need attention.
- The circuitry of
key 14 is shown in block diagram form inFIG. 12 .Key 14 includes acommunications coil 54, a key microprocessor (CPU) 52, the keypad orother switch mechanism 48, theLCD display 50, a read/write memory (RAM) 56, aprimary battery 58, abackup battery 60 and abeeper 62. -
Communications coil 54 is used to electromagnetically couple to the corresponding coils inlockbox 12 and stand 16.Microprocessor 52 controls operation of key 14 according to programming instructions (“key control software”) permanently stored in an associated read only memory (ROM) 64.RAM memory 56 again comprises a Toshiba LC3517NC RAM circuit and is used to store various elements and strings of operating data.Primary battery 58 provides power to the key circuitry.Backup battery 60 is used when the primary battery becomes weak or is removed for replacement.Beeper 62 beeps to call the user's attention to the key in a variety of instances, such as when an error is committed or when the key and lockbox have successfully completed an operation. - Although illustrated as a single component,
key CPU 52 also comprises two discrete microprocessor circuits. The first, a National Semiconductor 820 Series Control Oriented Processer, is an eight bit processor that performs all control, communications and logic functions except reading data fromkeypad 48 and controlling operation ofLCD display 50 andbeeper 62. These functions are performed by a very low power NEC uPD7501 4 bit microcontroller with an on board LCD driver. The distribution of processing tasks between two processors in this manner reduces power consumption and increases operational efficiency by allocating the time consuming user interface chores to the very low power NEC processor, thereby allowing the logic functions to be more quickly performed using the higher power National processor. -
Key 14 is characterized by “key characterization instructions” loaded intokey RAM memory 56 by a computer through a stand. These instructions give the key an identity, fix in it certain numerical values and enable it to perform certain functions. - As shown in the illustrative key memory map in
FIG. 13 , the identification information loaded with the characterization instructions identifies the agent, the responsible agency and the responsible board. The identification information further identifies the key by a unique serial number. - Some of the numerical values loaded with the key characterization instructions include a four digit personal code, permission codes for various of the functions and various key access codes with associated expiration dates.
- Functions enabled by function enable bits in the characterization instructions may include OPEN, READ and SHACKLE RELEASE.
- After its initial characterization by
stand 16, key 14 will not require further programming until any time dependent functions which may have been enabled, such as key expiration date or expiring key access codes (discussed below) need updating. - This key described above can, if loaded with the proper characterization instructions, execute the entire complement of functions available on the system, here illustrated as twelve. In some applications, however, it is desirable to provide simpler keys which can effect only a limited range of functions. Thus, it may be desirable, for example, to provide keys that can perform just three functions: open a lockbox, drop a shackle and communicate with a computer. Such a simple key could be constructed without an LCD display.
- Limiting the functions that a key can perform can be effected by setting certain enable/disable bits in
key RAM memory 56. In the preferred embodiment,key RAM memory 56 has an enable/disable data bit corresponding to each of the twelve functions. If the enable/disable data bit corresponding to a function is set to a “1,” the function is enabled. If set to a “0,” the function is disabled. - The enable/disable data in
key RAM memory 56 is desirably set by the manufacturer so as to enable a particular set of functions. This arrangement permits the manufacturer to provide a variety of different keys to users having a variety of different requirements without the need to tool up a separate manufacturing line for each different key. If the manufacturer later wishes to change a key's enable/disable data, it can do so by reprogramming the this data itself or by providing software to the responsible real estate board that will enable the board computer to reprogram this data. - In an alternative embodiment,
key RAM memory 56 can have two data bits corresponding to each of the twelve functions. One of these bits is set by the manufacturer to a “0” or a “1” and cannot be altered by the user. The other of these bits can be set to a “0” or a “1” by the authority that exercises supervisory control over the key, usually the local real estate board. In this alternative embodiment, the only functions that are enabled are those for which corresponding enable/disable data bits have both been set to a “1” by the appropriate authority. By this alternative system, the local real estate board is empowered to tailor the capabilities of its keys as it sees fit within the range of functions enabled by the manufacturer. - In the preferred embodiment, all time constants in the both the lockbox and key are set by data bits stored in the respective unit' RAM memories (as illustrated by the lockbox and key memory maps of
FIG. 13 ). These time constants set, for example, the length of time each of the transient displays are maintained inLCD display 50 and the length of time lockbox keycompartment unlocking solenoids 36 are to be kept energized. -
Stand 16 is used in the present invention to transfer information betweencomputer 18 and the lockbox and key components of a lockbox system. - With reference to
FIGS. 14-17 , stand 16 can comprise anenclosure 66 having aprotrusion 68. Withinprotrusion 68 is astand communications coil 70. In use, a key or a lockbox is positioned onstand 16 as shown inFIGS. 15 and 16 , respectively. In these positions, the communications coil within the lockbox or key is positioned in proximity withstand communications coil 70 inprotrusion 68, thereby establishing electromagnetic coupling between such coils. - In alternative embodiments,
protrusion 68 can be omitted. In such embodiments,communications coil 70 can be disposed withinenclosure 66 so that it is adjacent the coils in corresponding lockbox or key units when such units are placed on the stand. - As illustrated in
FIGS. 18 a and. 18 b, stand 16 is constructed in two forms. A first form of the stand, termed alocal stand 16 a, is designed to communicate with a computer at the same site. Local stands are thus intended for use at the board office, where they are tied directly to the board computer, or at agency offices, where they may be tied directly to a smaller computer. - The second form of stand, termed a
remote stand 16 b, is a portable unit designed to communicate with a remote computer over conventional telephone lines. Remote stands 16 b are thus typically used at agency offices that are not equipped with their own computers. Their portable nature, however, allows remote stands to be used wherever there is a phone line, such as at a property listed for sale, thereby enabling an agent to retrieve data from the board computer and provide a homeowner immediate information about listing activity. - With reference to
FIGS. 17, 18 a and 18 b , both forms ofstand 16 include a microprocessor (CPU) 78, an associated read onlymemory 80, a read/write memory (RAM) 82 and aconnector 83 for connection to a low voltage D.C. power supply.Local stand 16 a further includes acable connector 72 for connection to the local computer.Remote stand 16 b further includes amodem 74 and two modular phone jacks 76, 77 for interfacing to a telephone line.First phone jack 76 is used to connect to the outgoing phone line.Second phone jack 77 is used to connect to a conventional telephone (not shown) which provides dialing signals on the outgoing phone line.Remote stand 16 b also includes aprinter output port 79 for interfacing to a printer. This printer is driven by the remote computer through the stand and permits hard copy display of the data at the agency office or at the remote site at which the stand is used even though a computer is not locally available. - Desirably,
CPU 78 comprises an Intel 8051 Series microprocessor andRAM 82 comprises a NEC uPD4364 8192 by 8 bit static RAM. - In order to ensure data security, stand 16 desirably encrypts the lockbox and key data before it is sent to the computer. Conversely, stand 16 decrypts the computer data before it is sent to the lockbox and key. This encryption/decryption is effected by
microprocessor 78 in conjunction with read onlymemory 80 and read/write memory 82.ROM memory 80 contains the encryption and decryption algorithms used bystand 16 in communicating withcomputer 18.RAM memory 82 is used for temporary storage of data used in this process. - The encryption algorithms employed are such that if the same data is exchanged between
stand 16 andcomputer 18 several times, the several transmissions will bear no resemblance to one another. Decryption by unauthorized eavesdroppers is thus deterred. - In the preferred embodiment, the data exchanged between
stand 16 and the lockbox and key components is also similarly encrypted. -
Stand 16 can perform a variety of functions in the present invention. First, stand 16 can provide a complete set of new characterization instructions forlockbox 12 or key 14, or can simply modify an existing set of instructions. This is done by placing the key or lockbox onstand 16, as illustrated inFIGS. 15 and 16 , and executing a recharacterization program oncomputer 18. The recharacterization program executed oncomputer 18 interrogates the user, using a menu display format on the computer screen, as to which functions are to be enabled, what constants are to be loaded, etc. The characterization instructions generated by the recharacterization program are then transferred from the computer through the stand to the key or lockbox, where they are stored in RAM memory. - A set of limited recharacterization instructions for
lockbox 12 can alternatively be loaded fromstand 16 intokey 14 for later relaying by the key into the lockbox by using the PROGRAM function (discussed below in the section entitled Functions). - The second function stand 16 can perform is to retrieve data, such as lockbox access log data, from the lockbox or the key and to relay it to
computer 18. This is accomplished by positioninglockbox 12 or key 14 onstand 16 and executing an appropriate program, this time a data retrieval program, oncomputer 18. -
Stand 16 can also be used for a variety of other purposes, such as for relaying diagnostic maintenance log data (discussed below in the section entitled Diagnostic Features) from the key or lockbox to the computer and for synchronizing the calendar-clock portion oflockbox CPU 28 with the master calendar-clock maintained bycomputer 18. - One important feature provided by
stand 16 is that it allows data transfers to and from the key and lockbox components without the need to take such components back to a central control computer at the real estate board office. In large metropolitan areas, such as Houston, the local real estate board may encompass several thousand square miles. Consequently, it is highly undesirable to require that lockboxes and keys be taken back to the board office every time an exchange of data is desired. The relatively inexpensive stands of the present invention can be distributed throughout the board's territory and can be used to effect all data transfers. Desirably, most of the agency offices within the real estate board would have such a unit and several additional units would be available for portable use within the board's territory. - To operate the lockbox system, the user first energizes, or wakes up, key 14 by pushing an ON/CLEAR button on
keypad 48.Beeper 62 beeps to confirm that the key is energized. The key then displays the word “CODE” in the message portion ofLCD display 50 in blinking form. The user then has a fixed time period, such as one minute, within which to enter a four digit personal code. As each digit of the personal code is entered, an asterisk appears inLCD display 50. The asterisks maintain the privacy of the personal code while indicating the number of digits entered. If no personal code is entered within the one minute time period,key CPU 52 causes the key to become deenergized, or return to sleep, again. If the four digit personal code entered by the user matches the personal code stored inkey RAM memory 56, the user is prompted to select a function. - If an improper four digit personal code is entered on
keypad 48, key 14 will not allow the user to select a function. The user can start over and try to enter the correct personal code. If, after four tries, the proper personal code has still not been entered,key CPU 52 causes the key to enter a “personal code timeout” mode in which the key is deactivated for a ten minute period and during which it will not allow any further personal codes to be entered. - After the four digit personal code has been successfully entered, the FUNCTION annunciator in the upper portion of
LCD display 50 is made visible, together with the prompts in the lower portion of the display representing the available functions. (Key CPU 52 causes the prompts corresponding to the functions that are not available, for example those functions which have been disabled, to remain invisible in LCD display 50). The top left-hand most prompt in the prompt field, normally the OPEN prompt, will be blinking. It is the blinking prompt that indicates which function will be executed if the SELECT button is pressed. - Movement of the blinking feature in the LCD prompt display is controlled by the RIGHT SCROLL and LEFT SCROLL buttons on
keypad 48. The RIGHT SCROLL button causes the blinking feature to move one prompt to the right, for example, from OPEN to SHACKLE RELEASE. When the right-most prompt in a display line is blinking and the RIGHT SCROLL button is pressed, the blinking feature is moved to the left-most prompt in the following line. The LEFT SCROLL button moves the blinking feature in the opposite direction in a similar fashion. - After the personal code has been entered successfully, it is the OPEN prompt that blinks. Consequently, to open the lockbox, which is the most common operation, the SCROLL buttons need not be operated at all. Instead, the SELECT button is simply pressed and the lockbox can be opened.
- Once the SELECT button is pressed,
CPU 52 causes all of the prompts to be made invisible, except the selected prompt, which is caused to stay on continuously, not blinking. - When the personal code has been successfully entered and a function has been selected, key 14 is termed “armed.” In the armed state, the key sends out a signal, termed here a characteristic interrogation pulse train, and seeks to couple with a lockbox. When the key is ultimately coupled with a lockbox, the electromagnetic pulses radiated by the key induce a voltage in the lockbox communications coil. The induction of this voltage in the lockbox signals the lockbox to wake up. The lockbox then responds by transmitting a second signal back to the key, as discussed below in the section entitled Authorization of Lockbox Functions.
- When the OPEN feature has been selected, the four letter message field in the middle of
LCD display 50 displays the word “SAFE” (short for keysafe) in blinking form. (A blinking message in the message portion of the display demands an action by the user. A solid display in the message portion indicates that the key is finished with the function). When the “SAFE” message is blinking in the message portion of the display, the user has approximately ten minutes within which to engage a key with the lockbox. - Once the key and lockbox are successfully coupled, the message display, instead of displaying the “SAFE” message in blinking form, displays a “WAIT” message in solid form. This indicates to the user that the key and lockbox are coupled and are communicating. During the “WAIT” state, various data is exchanged between the key and the lockbox and each of the microprocessors is making various decisions as to whether to authorize execution of the selected function (as described below in the section entitled Authorization of Lockbox Functions). Finally, the processors decide, either together, or one informs the other, that the selected operation can be executed.
- After the requisite exchange of data between key and lockbox has successfully been completed and the requested function has been executed, the message in
key LCD display 50 changes from “WAIT” to “GOOD.” The “GOOD” message is displayed whenever any operation is successfully completed. The successful execution of the function is also confirmed audibly bybeeper 62. The “GOOD” display is maintained for approximately eight seconds. The key then displays the KEYSAFE BATTERY annunciator if the lockbox battery is low (discussed below in the section entitled Battery Systems) and then returns to sleep. - If a user arms a key and then fails to complete the selected operation with a lockbox, the key eventually goes into an error condition.
Beeper 62 beeps and an appropriate error code is displayed in the message display. The key then returns to sleep after displaying the error message for a predetermined time period. - One important feature of the invention is that the key strokes necessary to request a function need not be entered while the key is coupled to the lockbox. As indicated, key 14 must be held near
lockbox 12 in order for the units to communicate. Although not usually a problem, this task is sometimes difficult when the lockbox is mounted in a dark or awkward location, such as on a water spigot mounted at ground level. In some embodiments, the user would need to engage the key with the lockbox in such position and then start pressing buttons onkeypad 48 corresponding to the required personal code and the desired -function. - To obviate this potential problem, the key control software allows the key to be armed in advance to request execution of a desired function. The key can then be mated momentarily with the lockbox and the handshaking signal exchanges made automatically when the lockbox detects the key's characteristic-interrogation signal. Thus, the user need not press a single key in the dark or cramped location in which the key and lockbox may be mated in order to operate the lockbox. The personal code can be entered and the desired function selected in a convenient, well-lit location, such as in a car. The agent then has a fixed period, such as ten minutes, within which to use the armed key to operate the lockbox. After this period, the key disarms itself so as to maintain system security.
- In addition to providing a convenience to the user, the ability of the key to be armed at a remote location and later coupled with the lockbox to execute a function also provides an important security benefit. That is, it allows the key to be armed away from prying eyes so as to maintain the secrecy of the user's personal code.
- To open house
key compartment 20 inlockbox 12, the user enters the four digit personal code onkey 14, thereby causing the OPEN prompt inLCD display 50 to blink. The SELECT button is then pressed and an exchange of authorization signals between the lockbox and key is begun once the units are successfully coupled. If the lockbox and key determine that the function is authorized,lockbox CPU 28 allowskey compartment door 24 to be opened. - In the preferred embodiment,
key compartment door 24 does not pop open when the exchange of signals has been completed successfully. Instead, a press-to-open mechanism is provided on the door. After the appropriate signals have been exchanged, the user pressesdoor 24 inwardly and then releases. The door then pops open to reveal the contents ofcompartment 20. - If the user does not open the press-to-open door within a predetermined period of time, such as sixty seconds, the lockbox reverts to its powered down, locked state.
- In order to conserve lockbox battery power, key
compartment unlocking solenoids 36 are not energized until the user presses the press-to-open door. To effect this power savings,lockbox 12 is provided with amicroswitch 42 connected in key compartmentsolenoid drive circuit 40 so that whendoor 24 is pressed in, the microswitch is engaged and closed. Whendoor 24 is pressed in,CPU 28 detects the closure ofmicroswitch 42 and causes drivecircuit 40 to then apply energy tokey compartment solenoids 36 for a brief period. The solenoids retract, thereby unlockingdoor 24. The user then releases the door and it pops open under the influence of a spring. The solenoids are thus not energized until the user is actually ready to open the door. (The solenoids are arranged inlockbox 12 so that the inward pushing movement ofkey compartment door 24 is allowed even when the solenoids are in their locked state). - After
microswitch 42 is reopened by the door popping open,lockbox CPU 28 waits approximately 0.25 seconds and then causes drivecircuit 40 to deenergize the solenoids. It has been found that in a typical opening, the locking solenoids are energized for less than 0.5 seconds. After deenergizing the solenoids, the lockbox returns to its sleeping state. - If
door 24 is pressed in but is not released for more than 1.25 seconds,solenoids 36 are deenergized to secure the lockbox and the lockbox returns to sleep. - In the preferred embodiment,
key compartment door 24 is provided with two solenoids to enhance lockbox security. Each solenoid has a spring loaded plunger. If only a single solenoid were used, the solenoid could be dislodged momentarily from its locking position by a sharp blow to the lockbox. The shock could propel the solenoid plunger momentarily to its retracted state, allowingdoor 24 to be opened. - In the preferred embodiment, two solenoids are used and are disposed so that their plungers travel in opposite directions. If the lockbox is sharply rapped so as to propel one solenoid plunger to its unlocked position, the other solenoid plunger is propelled to its locked position.
- In an alternative system using a single solenoid, a rotary solenoid could be used. However, such an arrangement is less efficient and more expensive than the present system and also requires additional latching components.
- The
shackle 22 or mounting bracket which secureslockbox 12 to a structure is, in the preferred embodiment, released on command from a key. By allowing real estate agents to administer lockboxes, rather than just real estate board employees, administration of large lockbox systems is facilitated. - To release
lockbox shackle 22, the user enters the four digit personal code into the key and moves the blinking feature in the prompt field to SHACKLE RELEASE. The SELECT button is then pressed and a “SAFE” message begins blinking inkey LCD display 50. After the lockbox and key are coupled, these units exchange signals and, if these units decide that a shackle release is authorized, a “GOOD” message appears inLCD display 50 and a shackle release is permitted. - In the preferred embodiment of the invention, the SHACKLE RELEASE function opens
lockbox door 24. Actual release of the shackle is then effected by movement of a press-to-release shackle locking stem 162 (which is unlocked by shackle locking solenoids 38), which in turn moves ashackle locking bar 148 out of engagement with the shackle. Like the key compartment door arrangement, the shackle locking system also uses a pair of reciprocally mounted solenoids to lock the shackle so as to enhance lockbox security. - When the user desires to change the four digit personal code, the CHANGE PERSONAL CODE function is used. The key is activated by the usual sequence of entering the four digit personal code and then moving the blinking feature in the prompt field until the CHANGE PERSONAL CODE prompt is blinking. When the SELECT button is pressed, the message display displays “NEW.” The user then keys in the new four digit personal code that is to be substituted for the old code. Each time a digit of the new code is entered, an asterisk appears in the message portion of
display 50. After all four digits have been entered, the “NEW” message is displayed again. The user then reenters the new code. By this redundant technique,key CPU 52 double checks the new personal code to insure that the user did not inadvertantly press a wrong key and thus enter a new personal code that was not intended and consequently would not be remembered. - After the successful entry of the new four digit personal code twice, the message display portion of
LCD display 50 indicates “GOOD” to confirm that the operation has been completed satisfactorily. - As discussed earlier, a stand is used to exchange data and characterization instructions between the key and the computer. One way in which data can be exchanged between these units is simply to lay the sleeping key on the stand and press the ON/CLEAR button. The stand then couples electromagnetically to the energized key and allows the key to communicate with the computer. However, for security reasons, it is desirable that the computer not be allowed to perform the full range of possible functions on the key when the key is activated in this manner. An unauthorized user of a key could take the key and reprogram it if no further precautions were taken. Accordingly, it is desirable to limit the functions that the key and computer can cooperate to perform when the key is merely energized by the ON/CLEAR button to a narrow group of functions, such as running diagnostic routines and resetting the master software switch (discussed below). Thus the key will not permit new characterization instructions to be loaded.
- In order for
computer 18 to be allowed to perform its full complement of functions on the key, the key must be activated in the CONTROLLER mode by an authorized user. To do this, the user enters the four digit personal code and moves the blinking feature in the prompt field to CONTROLLER. When the SELECT button is pressed, the key permits the computer to freely read from and write to the key within the limits set by ownership of the key (i.e. a computer cannot reprogram a key if the key belongs to a different board). - Arming the key in the CONTROLLER mode is the only instance in which the key does not send out its characteristic interrogation pulse train. Instead, the key listens for data or instructions relayed from the stand.
- Skipping ahead in the key's prompt field somewhat, the FILE MARK function is selected to put a mark in the access log maintained by the lockbox. As noted, the illustrative access log maintained in
RAM memory 30 oflockbox 12 contains data relating to the last 100 lockbox operations. Oftentimes, however, not all 100 past operations are of interest. For example, the supervising real estate board or agency may only be interested in operations over a certain period of time. To facilitate this function, the lockbox access log can be marked with file marks. The log can then be read in its entirety, or just from the last file mark to the end. By this technique, only the data of interest need be reviewed. - The FILE MARK function is useful when a real estate agency or board is interested in monitoring the access to a home during a specific period, as for example, during a weekend that the house is advertised in the newspaper. In such case, the listing agent could enter a file mark in the lockbox access log on a Friday evening. (Only the listing agent, or the listing agent's broker or board, is permitted to executed a FILE MARK function on a lockbox). An agent could then return the following Monday morning and recover only those entries in the access log made since the log was marked by using the READ FILE MARK function.
- If a lockbox is moved from one house to another, a file mark can be used to indicate in the access log when the lockbox was moved. In one form of the invention, a file mark is entered in the access log automatically whenever the shackle is released. Data can then be selectively recovered from the access log so that only operations logged at the new location are recovered.
- The entry that is actually recorded in the access log by a FILE MARK function is the same as any other logged function, but the log indicates that it is a FILE MARK function, rather than an OPEN, SHACKLE RELEASE, etc. The lockbox also records the other data usually stored in the access log, such as the identity of the user who executed the FILE MARK function, the date and time, etc.
- When the READ function is selected,
lockbox CPU 28 causes all of the entries stored in the lockbox access log to be transmitted to the requesting key by relaying the access log data via the unit' coupled communications coils. The key stores this received information in a portion of itsRAM memory 56 dedicated to this purpose. - The portion of
key RAM memory 56 dedicated to storing lockbox access log data can be larger or smaller than the portion of memory in the lockbox dedicated to this task. Typically, the dedicated key memory is at least as large as the dedicated lockbox memory (i.e. large enough to hold at least 100 access entries). A key can thus read several lockbox access logs, provided the total number of access log entries read does not exceed the key's capacity. - If a user attempts to read a lockbox that has more access log entries than the key has memory, the key will display a corresponding error message and will not execute the READ function.
- Successful execution of the READ function does not cause the access log data in the lockbox to be erased. Instead, the data persists and is eventually overwritten by the lockbox itself, beginning when the one hundred and first log entry overwrites the first log entry. When the lockbox is later reinitialized and moved to a new listing, the access log data is dumped to a stand and the roll flag and pointer are reset to their initial states.
- As noted earlier, if any lockbox access log data is stored in the key, the READ annunciator will be made visible when the key is awakened by the ON/CLEAR button so as to remind the user that one or more reads are stored in the key.
- READ FILE MARK is identical to the basic READ function except that only the lockbox access log entries since the last file mark are read.
-
Lockbox CPU 28 maintains a lockbox access count inlockbox RAM memory 30 that indicates the number of OPEN, SBA and SIGNATURE functions that have been executed by the lockbox since it was reinitialized for that particular listing. In the preferred embodiment, this count is stored as a single eight bit byte and thus can count up to 255 accesses. When the READ NN function is selected and executed,lockbox CPU 28 transmits this lockbox access count to the key where it is displayed to the user in the message portion ofLCD display 50. - This READ NN function allows the user to monitor listing activity at a glance, without downloading data from the key to a stand at a remote location. This function also allows a user to monitor lockbox usage so that the maximum memory capacity of the lockbox access log will not be exceeded and old data overwritten. For example, if the lockbox access log can store 100 entries and the user determines, by using the READ NN function, that there have been 90 accesses to the listing, the user may choose to then dump the contents of the log into the key for later relaying to a computer through a stand. By such operation, the old data in lockbox access log is preserved in the computer and up to 100 new entries can then be logged in the lockbox.
- The CLEAR MEMORY function clears both the portion of
key RAM memory 56 dedicated to storing lockbox access log data and the portion of the key RAM memory dedicated to storing lockbox characterization instructions. - The lockbox access log data normally stays in
key RAM memory 56 until the key is coupled to a stand and the data dumped to a computer. If, for some reason, the user does not want to preserve this data he can, instead of dumping it out to the computer, simply select the CLEAR MEMORY function and erase it. - The lockbox characterization instructions stored in
key RAM memory 56 can variously stay in the key memory only until loaded into a lockbox or they can stay indefinitely, depending on the nature of the instructions (discussed below in the discussion of the PROGRAM function). If, for some reason, the user does not wish to preserve this data, the CLEAR MEMORY function can be selected to erase it. - The access log maintained in the lockbox is useful for reasons other than determining, for security purposes, who opened the lockbox. It is also desirable, for management information purposes, to be able to determine the identity of persons who entered the house without opening the lockbox.
- Real estate agents often visit newly listed houses in large tour groups. The identity of the one agent in the group that opens the lockbox is of course entered in the access log. The identity of the other agents in the group could also be logged in the access log if they were also to open the lockbox. However, the OPEN function draws a considerable amount of power from the battery. Consequently, it is desirable to be able to log the identity of agents without requiring them to open the lockbox. The SIGNATURE function performs this task.
- Agents who select the SIGNATURE function can engage their keys with the lockbox and have their identities logged in the access log. The lockbox treats this function as an OPEN operation, but omits the final step of energizing the solenoids. Consequently, the power drain is negligible. By use of this function, the system is better able to maintain detailed information on visitors to a listed property.
- The SIGNATURE mode has applications beyond real estate lockboxes. For example, a night watchman at an industrial complex could-use the SIGNATURE function to log the date and time of his visits to the various locks around the complex without opening any such locks. A record could thus be maintained of the surveillance activity at various sites around the premises.
- SHOWN BY ARRANGEMENT (SBA) is a function that allows a listing agent to restrict which other agents are allowed access to certain listed properties.
- Certain homeowners do not wish every agent in a real estate board to be able to gain access to their homes. They have placed their trust in one listing agent and want only agents authorized by that agent to show the house. However, it is impractical for the listing agent to be present at each such showing. The Shown By Arrangement feature of the present invention allows the listing agent to program the lockbox to require that a second code, an SBA code, be entered before access to the house key is granted.
- The SBA function is activated by specifying a desired four digit SBA code in the lockbox characterization instructions. If no SBA code is specified, a default value of 0000 is stored. When an agent tries to access a lockbox for which a non-zero SBA code has been specified, he or she must do so by first selecting the SBA function. When the key is so armed in the SBA mode, the agent is then prompted to select one of two functions from the prompt field: OPEN or CHANGE SBA.
- If the OPEN function is selected, a “SBA” message is displayed in blinking form in the LCD display, prompting the agent to enter the SBA number. The agent then enters the four digit SBA number and corresponding asterisks appear in the LCD display. After the code is entered, it is transmitted to the lockbox with the request to execute the OPEN function. If the SBA code entered matches the SBA code stored, and if other authorization criteria discussed below are met, the function is executed. If the SBA code entered does not match the SBA code stored, the function is immediately denied.
- The second option after arming the key in the SBA mode is to change the SBA number. (When the key is armed in the SBA mode, a CHANGE prefix is made visible in
LCD display 50 next to the SBA prompt to permit selection of the CHANGE SBA function). This option can only be executed by the listing agent, the listing agent's broker or the listing agent's board. The lockbox checks that the identity of the key corresponds to one of these entities by comparing key identifying data sent from the key with the lockbox identifying data stored inlockbox RAM 30. - When the CHANGE SBA function is selected, a “NEW” message appears in the
key LCD display 50 in blinking form, requesting the user to enter the new SBA number. Again, like changing the four digit personal code, this new SBA number must be entered twice in order for the change to be effected. - The PROGRAM function transmits a set of limited characterization instructions from a key to a lockbox to effect a reprogramming of the lockbox in the field.
Key CPU 52 will not make visible the PROGRAM prompt nor permit selection of the PROGRAM function unless the CPU has earlier determined that the key contains a set of limited lockbox characterization instructions waiting to be downloaded into a lockbox. - The lockbox programs that can be loaded into the key from the computer in the exemplary embodiment can be of two types: Specific Update and Blanket Update. Specific Update is used when a set of lockbox characterization instructions is destined for one particular lockbox, identified by that lockbox's serial number. Once the program has been downloaded to that lockbox,
key CPU 52 automatically erases it fromkey RAM memory 56. Specific Update is generally used to change a lockbox's Daily Disable times and to set data switches enabling Privacy Read and Privacy Shackle Release (discussed below in the section entitled Programmable Lockbox Options). - Blanket Update, in contrast, is used when a set of lockbox characterization instructions is destined for a group of lockboxes. Downloading the instructions to a lockbox does not erase the instructions from
key RAM 56. Instead, the instructions persist in the key until erased by the CLEAR MEMORY key. - Blanket Update is generally used to recharacterize lockbox instructions on an agency- or board-wise basis. Blanket Updates generally fall into two classes: those that update the lockout list and those that reprogram the identity of the lockbox's listing agent.
- Both Specific and Blanket Updates are transferred to the lockbox by using the PROGRAM function. The difference between the two is an update type data string included with the key programming instructions which indicates whether the update is a Specific Update or a Blanket Update, and, if it is a Blanket Update, whether it updates the lockout list-or the listing agent.
- In the preferred embodiment, the programming of the lockbox by the key in the field is limited so that only certain of the lockbox characterization instructions can be reprogrammed by the key. In the exemplary embodiment only the Lockout List data, the SBA number, the Daily Disable times and the listing agent identity can be reprogrammed in this manner, as is indicated in
FIG. 13 . The other data, such as the house, board and agency identification data and the lockbox access codes, cannot be changed by the key. To change this restricted data, the illustrated lockbox must be returned to a stand for reprogramming directly by a computer. - The memory map of
FIG. 13 illustrates that separate portions ofkey RAM memory 56 are dedicated to storing lockbox characterization instructions and copies of lockbox access logs. In other embodiments, a single portion ofkey RAM memory 56 can be shared for these purposes. - The instructions needed to implement the following key options are provided with the key control software stored in
key ROM 64. These options are then individually enabled or disabled by setting appropriate enable/disable bits stored inkey RAM 56 with the key characterization instructions. - To enhance security of the system, some or all of
keys 14 can be programmed to “expire” (become disabled) after a predetermined number of days. By this technique, keys that are lost or stolen lose their utility in a relatively short time. - In
RAM memory 56 ofkey 14 is data corresponding to a julian expiration date on which the key is to expire. Before any functions requested by the key are authorized,key CPU 52 first compares this expiration date with data received from the calendar-clock portion oflockbox CPU 28 indicating the current date. Ifkey CPU 52 determines that its expiration date has passed, the requested function is denied. A signal is sent tolockbox 12 informinglockbox CPU 28 of the expired key for logging in the lockbox's diagnostic maintenance log (discussed below in the section entitled Diagnostic Features). A corresponding entry is made in the key's diagnostic maintenance log. The key then displays an error message indicating an expired key in the message portion ofkey LCD display 50. After the message has been displayed for a predetermined period of time, the key reverts to its sleeping state. - This expiration date feature significantly enhances system security without imposing any significant burden on users of the system. Expired keys can be “rejuvenated” by an appropriate authority, usually the supervising real estate board, by simply loading a new expiration date into
key RAM 56 via a stand. - The present expiration feature also offers the supervising board and the individual users considerable operational flexibility. For example, the board can set a key to expire on any desired date. A key can thus be programmed to expire in a day, a week, a year or never, in increments of one day. (To program the key to never expire, this function is simply not enabled). This flexibility also enables the board to set different expiration dates for different keys. For example, it may wish the keys of new agents to require rejuvenation every two weeks, those of established agents to require rejuvenation every two months and those of brokers to require rejuvenation only every two years. The expiration dates of the various keys can also readily be staggered so that all the keys in the system will not need to be rejuvenated on the same day. The system offers flexibility to users in that a key can be rejuvenated before it expires. A key owner can thus rejuvenate a key at a time when it is convenient, rather than at a time dictated by the lockbox owner.
-
Key 14 can selectively be deactivated to disable its further use by setting an appropriate disable bit inkey RAM 56. This is useful when, for example, a board or an agency wishes to store unused keys. After being deactivated, key 14 must be reinitialized with new characterization instructions from the board or other supervising authority before it can be used again. - The instructions needed to implement the following lockbox options are provided with the lockbox control software stored in
lockbox ROM 44. These options are then individually enabled or disabled by setting corresponding enable/disable bits stored inlockbox RAM 30 with the lockbox characterization instructions. - Oftentimes, homes listed by real estate agents are not vacant. The current owner may still be residing in the house and may not welcome visitors at certain hours. For example, a homeowner may work in the evenings and sleep during the days and consequently wish that his house not be shown between the hours of 7:00 a.m. and 3:00 p.m. To accommodate such homeowners,
CPU 28 oflockbox 12 can run a software routine, stored inlockbox ROM memory 44, that disables the lockbox from opening during certain hours of the day. The daily lockbox disable software routine operates in conjunction with the calendar-clock portion oflockbox CPU 28 and with programmable time data indicating the desired beginning and end times of the daily lockbox disable period. These beginning and end times are loaded intolockbox RAM memory 30 with the lockbox characterization instructions and can be loaded by an appropriately programmedkey 14. - In the preferred embodiment of the present invention,
lockbox CPU 28 is programmed to correct its internal calendar-clock data automatically to account for time changes brought on by daylight savings time so as to maintain the desired daily disable times. Similarly, the calendar-clock portion oflockbox CPU 28 also corrects itself for leap years. - After a real estate agent has released a lock-box shackle, the lockbox could normally be reinstalled on another house. Before such installation, however, the lockbox should be be reinitialized and loaded with a variety of new characterization instructions identifying the new listing, the listing agent, the listing agency, etc. In certain embodiments, this recharacterization could be accomplished by loading a key 14 with all of the new instructions and loading the lockbox from the key using the PROGRAM function.
- In most systems, however, this field reprogramming procedure is undesirable. It does not guarantee that the characterization instructions loaded by
computer 18 intokey 14 are actually transferred into the lockbox. More importantly, it does not guarantee that the access log data stored in the lockbox is recovered and relayed back to the computer for archival purposes. - In systems where data integrity is important, it is desirable that the lockbox be read and programmed directly by the computer without the use of an intermediate key. To insure that this is done, a Lockbox Disable On Removal feature is selectably provided.
- When the Lockbox Disable On Removal feature is enabled by appropriate bits in the lockbox characterization instructions, the lockbox becomes disabled when the shackle is released. In this disabled state, the lockbox cannot be operated nor can it be reprogrammed from the key. It must be returned to a stand at a board or agency office for reprogramming. By requiring the lockbox be returned for reprogramming, the access log can be reliably read for archival purposes, thereby insuring the integrity of the board's lockbox database.
- In certain instances, it may be desirable to lock out certain agents, or agents from certain agencies, and thereby deny them access to a listed property. In the preferred embodiment,
RAM memory 30 oflockbox 12 contains a list of key identification data that, although the keys so identified may otherwise be authorized, are to be locked out. The identification data received from the accessing key is compared against this list bylockbox CPU 28. If the accessing key's identification data corresponds with data found in this list,lockbox 12 will refuse to execute any lockbox functions requested by the key. - In the preferred embodiment, there are three types of lockouts. The first type of lockout identifies specific agents that are to be locked out. The second type of lockout identifies specific agencies that are to be locked out.
- The third type of lockout identifies a specific agency that is to be allowed access to the house key. Agents from all other agencies are to be locked out. By this third type of lockout, a house can be exclusively listed by a single agency so that only agents from that agency can show the house.
- Each of these lockout functions is implemented by certain enabling data stored in
lockbox RAM memory 30 with the lockbox characterization instructions. If any of these functions is implemented, the characterization instructions further include data specifying the identities of the agents or agencies who are to be locked out. - As a further option on the lockout list function,
lockbox CPU 28 can be programmed to disable certain locked-out keys that may attempt to execute a function on the lockbox. In the exemplary embodiment,lockbox CPU 28 responds to each such preidentified key with a special signal that instructskey CPU 52 to alter the key's four digit personal code inkey RAM memory 56 by replacing certain digits of this code with hexadecimal digits (A-F) which are not included on the key'skeypad 48. With the personal code so altered, the user can no longer arm the key for use. The personal code can only be made usable again by reprogramming the key, which operation is usually only performed by the supervising real estate board. - It will be recognized that the lockout list data stored in each lockbox may need to be updated frequently in order to be effective in locking out undesired keys. In one form of the invention, key 14 has a portion of its
RAM memory 56 dedicated to storing a lockout list. Stored with this list is a date indicating the timeliness of the lockout list data. A date is also stored with the lockout list data stored inlockbox 12 indicating its timeliness. Whenever key 14 andlockbox 12 communicate, these dates are compared bykey CPU 52 orlockbox CPU 28. If it is determined that the lockout list data stored inkey 14 is “fresher” than that stored inlockbox 12, the key's lockout list data, including the date data, is transferred tolockbox RAM memory 30 where it overwrites the “stale” lockout list data previously stored there. If it is determined that the lockout list data stored inlockbox list 12 is “fresher” than that stored inkey 14, the lockbox's lockout list data, including the date data, is transferred tokey RAM 56 where it overwrites the “stale” lockout list data previously stored there. By this technique, one unit updates the other so that each has the newer lockout list data. - Some listing agents, especially those who list expensive homes, may wish to prevent others from retrieving the lockbox access logs recorded in their lockboxes. These logs may reveal the identities of the agents within the real estate board whose clientele can afford expensive homes. This is useful information that the listing agent may not wish to share with other agents.
- In order to maintain the privacy of this information, the lockboxes of the present invention can be programmed, by an appropriate bit in the lockbox characterization instructions, to allow only the listing agent, or that agent's broker or board, to retrieve the lockbox access log. If this enable bit is set,
lockbox CPU 28 compares the identification data received from the key with its own lockbox identification data before allowing an otherwise authorized READ operation to be performed. Access to the lockbox access log can thereby be limited to this authorized class of keys. - Privacy Shackle Release It is generally desirable to restrict execution of the SHACKLE RELEASE function to the listing agent, or to that agent's broker or board. To restrict execution of the SHACKLE RELEASE function in this manner, a Privacy Shackle Release function is provided. If this function is enabled,
lockbox CPU 28 compares the identification data received from the key with its own lockbox identification data before allowing a SHACKLE RELEASE function to be performed. -
Lockbox 12 can selectively be deactivated to disable its further use by setting an appropriate disable bit inlockbox RAM 30. After being deactivated,lockbox 12 must be reinitialized with new characterization instructions from the board or other supervising authority before it can be used again. - As soon as key 14 is awakened by pressing the ON/CLEAR button, a set of diagnostic routines is run to confirm proper operation of the key.
- As a first check,
key CPU 52 determines whether the “master software switch” is off. The master software switch is a flag inkey RAM memory 56 that indicates whether the key's characterization instructions are corrupted. This switch is turned off every time a process of critical loading characterization instructions from a computer into the key is begun. The switch is not turned back on again until the transfer of instructions is completed without error. If, for example, the key is removed fromstand 16 before the transfer is completed, the characterization instructions inkey RAM memory 56 will be incomplete.Key CPU 52 recognizes this data corruption by noting that the master software switch is still off and accordingly prevents the key from attempting any operations until the characterization instructions are loaded correctly. (Provision is made for reloading new characterization instructions from a properly authorized computer through a stand even when the master software switch is off). - As a second check,
key CPU 52 determines whether there is any button onkeypad 48 that is stuck in the down position. - As a third check,
key CPU 52 determines whether the key is in personal code timeout mode. Personal code timeout mode is the ten minute period following four unsuccessful entries of the personal code. - As a fourth check,
key CPU 52 performs a non-destructive test onkey RAM memory 56 to determine if it is malfunctioning. - If any of these four error conditions is detected, a corresponding error message is presented in the message of
LCD display 50 for a five second period and the key then returns to sleep. - If none of the error conditions is detected, the key then examines the status of the key battery. If it needs to be replaced,
key CPU 52 makes visible the KEY BATTERY annunciator for the remainder of the key's operations. If the key battery count (discussed below) is equal to zero,CPU 52causes LCD display 50 to display the message “DEAD” for a predetermined period of time and then go to sleep. - If the diagnostic tests are run successfully, the key allows the user to proceed and enter the four digit personal code, etc.
- The message display portion of the
LCD display 50 can indicate up to 100 errors by displaying messages ER00 through ER99. The error codes are very finely detailed so that a user can determine quite accurately the nature of a problem by reference to the two digit code. Selected error conditions displayed in this manner include pushing a wrong button, dead battery, wrong personal code, key in personal code timeout mode, keyboard button stuck, master software switch off, etc. - Occasionally, a vendor or manufacturer may receive reports that a lockbox or key is malfunctioning. To aid in investigation of such reports, the lockboxes and keys of the present invention each have a portion of their RAM memories dedicated to storing detailed diagnostic information. In the preferred embodiment, detailed information on the last ten events noted by the lockbox or key microprocessor is stored in this “diagnostic maintenance log.” Each diagnostic maintenance log entry identifies the events noted and the key or lockbox unit's response.
- The diagnostic maintenance log entry of an exemplary OPEN operation in the key might be as follows. The key is energized by the ON/CLEAR button. If one of the Power-On diagnostics is failed, a corresponding entry is made in the diagnostic maintenance log. Assuming the Power-On Diagnostics are run successfully, the user is allowed to enter the four digit personal code. If the wrong code is entered or if no code is entered within the ten second time period, a corresponding entry is made in the maintenance log. Assuming the personal code is correctly entered, the user is next prompted to select a function. Again, if an error is made by the user in selecting a function or if the function selected is denied by the system, a corresponding entry is made in the maintenance log. This process of logging any error condition continues until the key returns to sleep.
- Although not recited in the foregoing example, it should be noted that an interruption in the communications between a lockbox and key is an event that is always recorded as an entry in the diagnostic maintenance log.
- Depending upon the requirements of a particular application, each CPU could be programmed to record data on all events, or only on those events that prevent the requested operation from being executed.
- It will be noted that the lockbox access and diagnostic maintenance logs of the present invention serve two entirely different purposes. The lockbox access log serves as a record, for legal or management information purposes, of a narrow range of lockbox operations. The lockbox access log only logs OPEN, SBA, SHACKLE RELEASE, SIGNATURE and FILE MARK functions. It logs both successful and unsuccessful OPEN, SBA, SHACKLE RELEASE and SIGNATURE functions, but only logs FILE MARK functions if they are successful. If an unsuccessful function is logged, no diagnostic data indicating the reason for the failure is recorded. With each of these access log entries, however, the lockbox logs a variety of ancillary data, such as the date and time of the operation and the identity of the key requesting the operation.
- The diagnostic maintenance log, in contrast, serves only as a diagnostic tool. It serves in this capacity for all lockbox or key operations, not just those four which are of concern to the lockbox access log. For each operation, it stores detailed diagnostic information. However, no time, date or identification data is logged.
- Upon reports of a malfunctioning lockbox or key, the corresponding diagnostic maintenance log can be retrieved, either by sending the malfunctioning unit to the board for coupling to the board computer or by coupling the unit to the board computer through a
stand 16. This data can then be evaluated to determine the cause of the malfunction. - In addition to retrieving diagnostic maintenance log data from keysafes and locks for coupling to a computer, stand 16 further serves a diagnostic function by enabling a computer to conduct detailed testing on a malfunctioning lockbox or key unit. A lockbox or key that is malfunctioning can be put on a stand and the central board office computer called. The central computer can then run a collection of diagnostic routines and indicate to the user the cause of the problem. If the board's central computer is not able to diagnose the problem, the vendor or supplier of the equipment can run exhaustive diagnostic routines directly from its office to the unit on the stand at the remote location.
- The determination of whether a key is authorized to operate a lockbox is made by comparing certain strings of data exchanged between the lockbox and key. An operation is only authorized if these data strings correspond to a specified degree. This process is explained in more detail below.
- In the preferred embodiment, the exchange of signals between the key and lockbox comprises a multipart handshake. First, key 14 sends a first, interrogation signal to
lockbox 12 to cause the lockbox to wake up from its sleeping state.Lockbox 12 responds by sending a second signal back to the key. This second signal includes lockbox battery condition data and date data (provided by the calendar-clock portion of CPU 28). - Upon receiving this data,
key CPU 52 compares the received date data with the key expiration date stored inkey RAM memory 56, as discussed earlier. If it is determined that the key is not expired,key CPU 52 then sendslockbox CPU 28 data identifying the key by agent, agency and board so that the lockbox can determine whether the requested function can be executed on the basis of an ownership match between the lockbox and key.Lockbox 12 has corresponding identification data, identifying its listing agent, agency and board, stored in itsRAM memory 30. In order forlockbox 12 to authorize execution of the requested function on the basis of an ownership match,lockbox CPU 28 compares the key identification data received from the key with its own lockbox identification data to determine whether they correspond to a required degree. The degree of correspondence required between these groups of data before an operation is authorized is specified by “permission codes” stored in the key and sent to the lockbox with the key identification data. - At one extreme, the permission codes may require only that the lockbox and key identification data indicate that the lockbox and key are assigned to the same real estate board in order for the lockbox to authorize the requested operation. At the other extreme, the permission codes may specify that even if the lockbox and key are assigned to the same board, agency and agent, the lockbox will still not authorize the requested function. In between these extremes, the permission codes may specify that the corresponding elements of board and agency identification data match, or; that the corresponding elements of board, agency and agent identification data match, before the lockbox will authorize a requested operation.
- Three different permission codes are stored in
key RAM memory 56 corresponding to three groups of lockbox operations. The first permission code specifies the degree of match required between the lockbox and the key identification data before an OPEN, SBA, change SBA or FILE MARK function will be authorized. The second permission code specifies the degree of match required between the lockbox and key identification data before the SHACKLE RELEASE function will be authorized. The third permission code specifies the degree of match required between the lockbox and key identification data before any of the READ functions will be authorized. (The remaining functions do not depend on permission codes for authorization. CHANGE PERSONAL CODE, CLEAR MEMORY and CONTROLLER are functions executed by the key alone, not in cooperation with a lockbox. SIGNATURE does not require any ownership match for execution. PROGRAM generally cannot be executed unless there is a match between the owner of the computer that loaded the programming instructions into the key and the owner of the lockbox.) - Each permission code can assume one of four values as follows:
- 4 Disabled
- 3 Requires board, agency and agent match
- 2 Requires board and agency match
- 1 Requires only board match
- If
lockbox CPU 28 finds the requisite match between the lockbox and key identification data, the lockbox authorizes and executes the requested function. If the lockbox CPU does not find the requisite match, the system then examines whether the function might be authorized based on an “access code” match. - If the requested function is OPEN or SBA, key 14 may authorize the function based on an access code match.
- Both
lockbox 14 and key 12 have at least one access code stored in their respective RAM memories. (In one form of the invention, up to fifteen access codes can be stored in each unit). The access codes stored in the lockbox are each three bytes long. A two byte field identifies the real estate board. A one byte field is arbitrary. The access codes stored in the key also contain a two byte field identifying the board and a one byte arbitrary field. The key access codes, however, each additionally contain an expiration date field. If the requested function is an OPEN or SBA function and if the function was not authorized by a permission-code specified ownership match, the lockbox transmits its access codes to the key for evaluation bykey CPU 52. - After receiving the lockbox access codes,
key CPU 52 compares each of the lockbox access codes with each of the key access codes stored inkey RAM 56. Ifkey CPU 52 finds a match, it then compares the expiration date associated with the matching key access code with the date data received earlier from the lockbox to determine whether the key access code involved in the match is nonexpired. If the code is nonexpired, the key sends the lockbox a signal instructing the lockbox to execute the requested OPEN or SBA function. - If none of the key access codes matches any of the lockbox access codes, or if only expired key access codes match lockbox access codes, the key sends the lockbox a signal instructing the lockbox not to execute the requested OPEN or SBA function.
- Summarizing the procedure by which a function is authorized, if the requested function requires a permission code-specified ownership match and such match is found, the lockbox authorizes the requested function. If the requested function is an OPEN or an SBA and if the permission code-specified match is not found, the key can nonetheless authorize the function if any of the lockbox access codes match any of the nonexpired key access codes.
- It should be noted that the particular function authorization process described above was adopted because it minimizes the amount of data transmitted between the lockbox and key units and because it made the most efficient use of the processing and memory capabilities of the respective units. However, the elements of data exchanged and the distribution of the decision making tasks between the two CPUs could readily be altered to meet the requirements of other applications.
- The access code system of the present invention provides several capabilities that have been difficult or impossible to implement in prior art lockbox systems. One such capability is board segmentation and regionalization.
- In a typical system, the arbitrary byte included in the lockbox and key access codes is used to segment or regionalize the properties listed by a real estate board into a variety of classes. For example, a board may deal in both residential and commercial properties, but not want residential agents to gain access to commercial listings and vice versa. In this case, the arbitrary byte in the lockbox access codes of the lockboxes installed on commercial properties could be set to “1” and the arbitrary byte in the lockbox access codes of lockboxes installed on residential properties could be set to “2.” The keys of commercial agents would then be programmed to have an access code terminating in “1,” while the keys of residential agents would be programmed to have an access code terminating in “2.” With the access codes so set, residential agents would be prevented from gaining access to commercial properties and vice versa.
- In addition to enabling real estate boards to segment and regionalize their listings, the access code system of the present invention also enables real estate boards to cooperate in the sales of properties. For example, Board A may wish to allow all agents from neighboring Board B to have access to a lockbox on a particular house within Board A territory in order to expedite its sale. To do this, Board A would add to this lockbox's access code list an additional access code comprised of two bytes identifying Board B, together with the one byte arbitrary field that is in general use by Board B. By so doing, Board A enables all agents from Board B to open the lockbox with their existing Board B keys.
- Similarly, an agent (c) from Board C may wish to show a client houses listed for sale in neighboring Board D. To do this, agent (c) would call Board D and request that it load an access code into agent (c)'s key that matches the access code (or codes) resident in the Board D lockboxes to which agent (c) seeks access. (A board can only load a key with key access codes having that board's identifying two byte field). The loading of these access codes could be done by Board D's computer over telephone lines into agent (c)'s key via a stand, regardless of the distance between Boards C and D. Board D would doubtless also append an expiration date to the codes loaded into agent (c)'s key so that agent (c) could only access the properties in Board D for a limited period, such as a day or two.
- Like the access code system described above, the permission code system also gives the present invention capabilities that were difficult or impossible to implement in prior art lockbox systems. For example, the permission code system enables keys to be delegated different capabilities corresponding to the needs and privileges of different users.
- As noted, each key is programmed with permission levels for three different classes of functions: OPEN/SBA, SHACKLE RELEASE and READ. In operation, the permission levels indicate the degree of ownership match required between a key and lockbox before the two units can cooperate to execute a function.
- The different permission codes in a key are assigned independently of one another, so that a key can have one permission code for certain functions and different permission codes for other functions. This feature allows boards and agencies to vary the capabilities of their keys simply by reprogramming the permission codes stored with the key characterization instructions. Such specialized keys have several applications. For example, an agency may wish to hire a courier to visit various houses listed by the agency to retrieve the lockbox access logs. However, the agency may not want the courier to have access to the key compartments of any of these lockboxes. To limit the courier's capabilities in this manner, the agency puts the key in the stand and sets the permission codes for OPEN/SBA and SHACKLE RELEASE to 4. A permission code of 4 prevents the function from being executed, regardless of the degree of ownership match between the lockbox and key. The READ permission level is set to 2, which allows the key to read the lockboxes on all the houses listed by the agency. The courier can then go and retrieve data from all these lockboxes and yet be unable to gain access to any of the house keys.
- As far as the permission levels are concerned, there is no distinction made between listing agents and nonlisting agents. A permission code of 3 is generally assigned to each. However, listing agents can perform significantly more functions at a lockbox than a regular agent. For example, listing agents can change the Shown By Arrangement code and can execute Privacy Reads. These privileges, however, are not granted by reference to permission codes in
key RAM 56. Instead, such restricted functions are authorized only whenCPU 28 orCPU 52 has confirmed that the key requesting execution of the function is owned by the listing agent associated with the lockbox (or that agent's broker or board). If no such match is found, the key owner is refused authorization to execute the listing agent functions. - The permission code system of the present invention has applications in the industrial security market as well as in the real estate lockbox field. An industrial site can be tiered in a manner analogous to the agent, agency and board levels used in lockboxes. For example, an industrial site could be tiered into employee, building master and site master levels. The employees of a company could be assigned permission codes of 3, allowing them to unlock only the doors for which they are the responsible employees. Building security guards could be assigned permission codes of 2, allowing them to unlock all doors in the particular buildings for which they are responsible. Master security guards could be assigned permission codes of 1, allowing them to unlock all doors on the site.
- The permission code system of the present invention is also used with
computers 18. Each computer is assigned a permission code that specifies which lockboxes and keys it can work with. If the computer belongs to an agency, it will be assigned a permission code of 2. A computer with a permission code of 2 can only be used to interface, through a stand, with keys and lockboxes assigned to that same agency. If the computer is owned by the board, it will be assigned a permission code of 1 and can be used to interface with all keys and lockboxes in the real estate board. - The permission code assigned to a computer also limits the authority it can delegate to a key. A computer can delegate different levels of authority to a key by the permission codes that it loads into the key with the characterization instructions. A computer can reprogram a key's permission codes to the computer's own permission code or to any more restricted level. For example, a computer owned by an agency can reprogram a key to have permission codes of 2, 3 or 4. Such a computer cannot be used to program a key to have permission code of 1, for this would be delegating authority to the key higher than the computer'own authority. A board level computer, due to its permission code of 1, can be used to program or read any lockbox or key owned by the board.
- Digital Reconstruction Modulation As noted, communication between the lockboxes, keys and stands of the present invention is effected by electromagnetically coupled coils. In the prior art, exchange of data over coupled coils was effected by modulating the data signal onto an audio frequency or radio frequency carrier. Such electromagnetic coupling has previously been poorly suited for use in such battery powered applications because the modulated carrier draws a relatively large amount of power from the battery.
- In order to minimize battery drain, the present invention employs a new modulation scheme, termed here “digital reconstruction modulation.” In this system (
Fig. 19 ), the raw data signal which is switching, for example, between zero volts and two volts, is applied directly across a first, transmittingcoil 300. Across a second, receivingcoil 302 is induced an alternating series of positive and negative transient voltage spikes corresponding to the transitions in the data signal. - These transient voltage spikes are applied to a
Schmidt trigger circuit 304. The Schmidt trigger circuit toggles states only when the voltage applied to its input is above a first threshold voltage or below a second threshold voltage. These threshold voltages are selected so that the positive transients exceed the first threshold voltage and so that the negative transients drop below the second threshold voltage. The positive transients thus cause the Schmidt trigger to toggle on and the negative transients thus cause the Schmidt trigger to toggle off. The output signal provided by the Schmidt trigger is thus identical to the data signal applied to the transmitting communications coil, reconstructed by virtue of the Schmidt trigger's hysterisis properties. - Depending on the relative orientation of the two communicating coils, a low to high data signal transition applied across the first coil may cause a positive or a negative voltage transient across the second coil. Thus, the data signal recovered by the Schmidt trigger may be the inverse of the data signal applied to the first coil. This detail can be taken care of by starting the exchange of data between system units with a known data string. If the CPU in the receiving unit detects that the known data string is inverted, it can cause the output from the Schmidt trigger to be inverted again, bringing the signal back to its proper condition, for the remainder of the communications. Alternatively, the problem of data inversion can be eliminated entirely by insuring that the communicating components are always coupled in the desired orientation.
- One advantage of this digital reconstruction modulation is that the effective range over which the coupled coils can communicate is not, as in the prior art, determined by the current drawn by the transmitting coil. Instead, the strength of the received signal is dependent solely on the rise time and fall time of the input data signal and on the coefficient of coupling between the transmitting and receiving coils. The voltage induced in the receiving coil is proportional to the time rate of change of this input signal. Thus, limiting the current in the transmitting coil, for example by a current limiting circuit set to clamp the coil current at one milliampere, does not significantly reduce the communications range. Range is only limited by the switching speed of the component logic.
- A second advantage is that the data transmission rate is not limited by the frequency of a carrier signal carrying the data. Again, the only limits imposed are by the switching speeds that can be obtained in the coil circuit.
- The maximum speed at which lockbox, key and stand components can communicate with one another varies as a function of temperature, component tolerances and component aging. In a worst case situation, one system component might be able to communicate at only one-third the speed of another component. Instead of using a communication speed that is certain to be within the capability of all system components (i.e. the lowest common denominator speed), the present invention employs an adaptive communications scheme that optimizes the communicating components.
- As noted earlier, communications between units are generally begun by the key sending an interrogation signal to wake up the lockbox. Before the lockbox responds with its response signal identifying the lockbox, reporting on battery state, etc., as discussed earlier, the two units first agree on a data transmission speed.
- To set the data transmission speed, each unit sends the other its shortest data element. In the present invention, a data 0 is represented by a signal duration of a first period and a
data 1 is represented by a signal three times longer. To set the data transmission speed, the key thus sends to the lockbox a data 0 at the key's top speed.Lockbox CPU 28 measures the duration of this signal and stores this value in itsRAM memory 30.Lockbox CPU 28 then sends the key a data 0 signal at the lockbox's top speed.Key CPU 52 in turn counts the duration of this signal and stores this value in itsRAM memory 56. CPUs in both units then compare the duration of the signal received with the duration of the signal they sent in order to determine which unit is operating more slowly. The CPU in the faster unit then reduces its data communications speed in order for the length of its data 0 to match that of the slower unit. (The speed at which each unit transmits is set by a data word in the unit's RAM memory, which word can be altered by the CPU to effect the speed change). By this technique, the two units adapt to operate at the highest speed that both units can manage. - After two communicating units agree on a data transmission speed, they then exchange bits of data, such as the data 0 signal, alternately, approximately 20 times, in order to confirm that a reliable communications link has been established. If these twenty exchanges of data 0 signals are completed without interruption, the communications link is considered to be reliable and the exchange of function authorizing data between units is begun.
- A comprehensive battery monitoring system is employed in the present invention to prevent the lockbox and key batteries from failing and rendering the associated units inoperative. The battery monitoring systems rely on three independent criteria to determine when each battery is nearing the end of its useful life: elapsed time, usage and current drain from the backup battery. When the lockbox or key CPU detects either of the first two of these three low battery criteria, it loads a battery count number, such as 16, in its memory. (When the CPU detects the third low battery criteria, it immediately loads a battery count of zero in its memory). This battery count number is then decremented each time a lockbox or key operation is performed. The battery count represents the number of additional operations that the lockbox or key will perform before it curtails operation.
- If the lockbox battery is low, the key informs the user of this condition just before the key returns to sleep. Each time the lockbox and the key communicate, the lockbox indicates to the key the status of the lockbox battery. If any of the three low battery criteria have been met, the lockbox relays the lockbox battery count to the key, which in turn displays this number in the message portion of its
LCD display 50 and makes visible the KEYSAFE BATTERY annunciator in the top portion of the LCD display. The key then beeps to call the user's attention to the display. The number displayed inLCD 50 is the number of additional lockbox operations that the lockbox will allow before it curtails activities to prevent battery failure. The key maintains this LCD display for approximately two minutes before going to sleep. - In alternative embodiments, the lockbox battery count is not displayed on the key's LCD display. Instead, the KEYSAFE BATTERY annunciator and the beeper alone are used to warn the user that the lockbox will soon curtail its operations. By not informing the user of the precise number of lockbox operations left, it is hoped that the user will replace the lockbox battery without delay.
- If the key battery is low, the user is reminded by the KEY BATTERY annunciator. Each time the key is powered on by the ON-CLEAR button,
key CPU 52 examines the portion ofkey RAM memory 56 in which the key battery count is stored. Ifkey CPU 52 finds a count, the count is decremented and the KEY BATTERY annunciator is made visible and remains visible for the duration of the key's operation. - For expository convenience, the following discussion of the three low battery criteria focuses on the lockbox battery monitoring system. The key battery monitoring system is analogous.
- The first low battery criterion is elapsed time. When a new battery is installed in the lockbox, a date counter is started that increments each day or other set period. The first low battery criterion is met when this count reaches a predetermined value, such as three years. That is, the system presumes that the lockbox battery is nearing the end of its useful life when it is three years old.
- The predetermined time period at which the battery is assumed to be nearing the end of its useful life can be chosen to correspond to the particular circumstances of the lockbox. For example, if the lockbox is used in a cold environment, such as in Alaska, its “shelf life” will be longer than if it is used in southern Florida. Similarly, the predetermined period can be chosen to correspond to the type of battery installed. If alkaline batteries are used, the predetermined period would be set to a longer period than if conventional carbon batteries are used.
- Replacement of the primary battery in the unit is detected by
lockbox CPU 28 which monitors the voltage of the primary battery. When this voltage is interrupted and then restored,lockbox CPU 28 assumes that the battery has been replaced and resets the date counter accordingly. In an alternative embodiment,lockbox CPU 28 is informed of the removal and subsequent replacement of a primary battery by a microswitch positioned in the lockbox battery compartment. - The second low battery criterion is battery usage. When a new battery is installed in the lockbox, a battery capacity number is stored by
lockbox CPU 28 inRAM memory 30. This number represents, very conservatively, the total estimated capacity of the battery. Each time an operation is performed, this number is decremented by a number representative of the energy actually consumed. The second low battery criterion is met when this battery capacity number reaches zero. - The battery capacity number loaded into
RAM memory 30 when the battery is replaced could again be chosen to correspond to the particular circumstances of that lockbox. For example, if the lockbox is used in a cold environment, its battery will be less able to deliver successive large current loads than if it is used in a warm climate. - The amount by which battery capacity number is decremented is a function of the particular operations performed and their duration. In an exemplary lockbox system, the operations can be grouped into three classes: operation of a pair of locking solenoids, operation of the communications coil and operation of the remainder of the circuitry. Each of these operations is considered by
lockbox CPU 28 to consume energy at a fixed rate. A pair of locking solenoids may be considered to consume energy at a rate of 3 watts, the communications coil at a rate of 5 milliwatts and the remainder of the circuitry at a rate of 1 milliwatt. Each time any of these operations is performed,CPU 28 operates a corresponding timer to measure its duration. The measured duration of each operation is multiplied by its assumed energy consumption rate to estimate the amount of energy actually withdrawn from the battery. These measures of energy usage are then subtracted from the battery capacity number stored inRAM memory 30 to provide an indication of the battery energy remaining. As noted, the second low battery criterion is met when this battery capacity number is decremented to zero. - In an alternative embodiment, the second low battery criterion is simply the number of operations performed by the lockbox. When a new battery is installed, a second counter, this one an operations counter, is started. This operations counter counts the number of high power operations (i.e., lockbox operations that energize solenoids, such as OPEN and SHACKLE RELEASE) performed by the lockbox. The second low battery criterion in this alternative embodiment is met when this operations counter reaches 1000. That is, the system presumes that the lockbox battery is nearing the end of its useful life after 1000 high power operations have been performed.
- Both of the above two low battery criteria assume that the battery installed is new and functioning properly. However, in the event that a used or faulty battery is installed, a third low battery criterion is considered. The third low battery criterion is current drain from the backup battery.
- Normally, no current is drawn-from
lockbox backup battery 34. The backup battery only supplies current whenprimary battery 32 is not able to meet all the lockbox's power requirements. When lockboxCPU 28 detects that current is being drawn frombackup battery 34, this third low battery criterion is met and the system presumes that the primary battery is at the end of its useful life. In this instance, unlike the preceding two, the battery count number is immediately set to zero so that any energy remaining in the primary battery can be preserved for a SHACKLE RELEASE operation. - As noted, once either of the first two low battery criteria has been detected, a counter is set to an arbitrary number, such as 16, and is decremented each time an additional lockbox operation takes place. This count begins at a relatively low number, such as 16, rather than at a higher number because if the number is too high, users will likely ignore it for too long.
- In alternative systems, the battery count could increase. However, it has been found that users rarely remember what the top number is, but always know what zero means.
- If the lockbox battery count reaches zero (or is set to zero by detection of current drain from the backup battery), OPEN and SBA functions are denied to everyone except keys owned by the board itself, as determined with reference to a permission code of 1 in the key. At this point, the lockbox is of little utility. Other operations are similarly prevented, such as FILE MARK, SBA and change SBA. However, the remainder of the functions, including SHACKLE RELEASE, can still be performed, thereby allowing the listing agent (or the listing agent's broker or board) to remove the lockbox and replace the batteries. In the preferred embodiment, after the lockbox battery count reaches five, the lockbox control software will only allow the listing agent (or the listing agent's broker or board) to execute the OPEN or SBA function.
- The low battery criteria and associated numerical constants discussed above are selected so that even when the battery count reaches zero, the battery still has approximately half of its capacity left. This reserve capacity insures that the high power SHACKLE RELEASE function can still be performed. The lockbox battery capacity is prevented from draining much below this point by preventing high power OPEN functions.
- In one form of the invention, the backup batteries in the lockbox and in the key are also monitored so as to determine when they are nearing the ends of their useful lives. In an exemplary embodiment, each lockbox and key includes a software timer that counts the time elapsed during which the backup battery is the sole power source for the unit, such as when the primary battery has been removed. When this timer reaches a predetermined count, an appropriate warning message is displayed in the message portion of
key LCD display 50 indicating that the appropriate backup battery should be replaced. - In alternative embodiments, more complex backup battery monitoring schemes, such as those used with the primary batteries, can be employed.
- In one form of the invention, data in lockboxes and keys throughout the real estate board can be updated by radio. By this technique, both board-wise changes of data, such as changes of lockout lists and access codes, and changes targeted to specific units, such as disabling a particular key, can be implemented simply and quickly.
- For expository convenience, the following discussion focuses on radio updating of lockboxes. However, an analogous system can similarly be employed for radio updating of keys.
- In systems employing radio updating, the data to be loaded into the memories of the lockboxes is modulated onto a subcarrier transmitted with a conventional FM broadcast. The source of the data can be a conventional modem driven from
board computer 18. A receiver in each lockbox decodes this data from the modulated subcarrier and reloads its memory according to these instructions. - In more detail, the signals broadcast by FM stereo radio stations have a bandwidth of 200 kilohertz, 100 kilohertz on each side of the carrier frequency. The FM stereo audio and stereo pilot occupy the spectrum from the carrier frequency out 53 kilohertz each side. The portion of the spectrum from 53 to 100 kilohertz on either side of the carrier is vacant and is presently being used for a variety of other subcarrier services, such as transmission of commercial free music, educational materials and stock market reports. In the present invention, the data from
board computer 18 to be sent to the individual lockboxes is modulated on a subcarrier positioned at 76 kilohertz in the FM baseband signal, approximately midway in this vacant range of frequencies. Referring toFIG. 20 , the digital data from theboard computer 18 is provided to asubcarrier generator 200 connected to anexciter 202 of theFM transmitter 204. The subcarrier generator generates the 76 kilohertz subcarrier signal which is modulated with the data. - This modulated FM signal is received by a
receiver 206 in each lockbox. The received FM signal is fed from an antenna 208 (discussed below) to amixer 210 through an RF preselector/attenuator circuit 212. RF preselector/attenuator circuit 212 provides some attentuation of out of band signals while amplifying the desired signals, thereby minimizing the receiver's noise figure.Mixer 210 mixes the desired FM broadcast signal received byantenna 208 with a local oscillator signal from alocal oscillator 214. The frequency oflocal oscillator 214 is selected to produce an up-converted first intermediate frequency (IF) of 384 megahertz. - The output from
first mixer 210, including the 384 megahertz IF, is fed to an IFsection 216. IFsection 216 includes afirst filter 218 which passes the desired 384 megahertz signal and rejects the unwanted mixer products.Filter 218 desirably comprises a surface acoustic wave filter. The output fromfilter 218 is fed to asecond mixer 220.Second mixer 220 mixes the signal fromfilter 218 with the signal from a secondlocal oscillator 222. Secondlocal oscillator 222 provides a 394.7 megahertz signal, thereby yielding a down-converted second receiver intermediate frequency of 10.7 megahertz. The output fromsecond mixer 220 is fed to asecond filter 224 which attenuates the undesired mixer products and passes the 10.7 megahertz signal toIF amplifier circuit 226.Second filter 224 can be a standard 10.7 megahertz ceramic filter of the type commonly used in FM receivers. - IF
amplifier 226 amplifies the 10.7 megahertz signal fromfilter 224 to a level suitable for detection by a phased lockloop detector circuit 228.Detector 228 demodulates the IF signal and provides a wideband composite audio signal to an SCAband pass filter 230. SCAband pass filter 230 passes the desired subcarrier channel to anSCA decoder 232, while attenuating the lower frequency audio components.Decoder 232 demodulates the filtered SCA channel and provides the demodulated audio to amodem circuit 234 that converts the modem signals originally encoded on the subcarrier back to digital data form. The output frommodem 234 is treated just as any other data input to the lockbox, as for example through the communications coil, and is used to effect the reprogramming of thelockbox RAM memory 30. - In certain embodiments,
antenna 208 can includelockbox shackle 22 as its principal component. In such cases, shackle 22 is insulated within the case to prevent it from contacting the lockbox's electrical ground and is similarly insulated outside the case, as by an insulating vinyl rain guard enclosing the shackle, to prevent it from contacting the structure to which is is fastened. Although the shackle is a small antenna, it can be resonated by preselector/attenuator circuit 212 so as to operate as a low impedance resonant antenna at the frequency of interest. - In some lockbox mounting positions, such as on a grounded water faucet, the electrical coupling between the shackle antenna and ground may be sufficient, despite any intervening insulation, to reduce the strength of the received signal to a point at which it cannot be decoded reliably. Accordingly, it is often desirable to use an antenna that does not include the shackle as a principal element. Such an antenna may take the form of a planar coil encased in plastic and mounted on an exterior surface of the lockbox. Such an antenna can also be used on or in a radio-updated key.
- In still another form of the invention,
antenna 208 can comprise an insulated conductor wound aboutshackle 22 so as to form a helically loaded loop. - Because the radio updating process involves alterations to the lockbox memory, it is desirable that the updating not be interrupted by requests from keys to operate the lockbox. Consequently, it is desirable that all lockbox updating be done between the hours of midnight and 6:00 a.m., a period during which the lockboxes would not normally be in use. Each lockbox can be programmed to energize its receiver circuitry for this or any other predetermined period every night to listen for updates from the board office. This window period can be a few minutes long or a few hours long. Data sent from the central board office can be directed to all the lockboxes, or can include an introductory address data string identifying a particular lockbox to which the data is targeted. In either event, the transmissions from the board office can additionally include a reference time signal so that all lockboxes are synchronized in their operations and so that they will activate their receivers at the same time every days
- By using such a radio updating approach, maintenance of lockbox and key data is greatly facilitated and system performance is thus enhanced.
- Some large real estate boards have tens of thousands of lockboxes and keys in their systems, so an integrated management system is virtually essential. In one embodiment of the invention, a multiuser, multitasking system with large amounts of on-line storage is resident at the board office and serves as
board computer 18. A super microcomputer such as the NCR Tower system is a suitable machine. - As shown in
FIG. 21 , a computer system for a large real estate board desirably includes atrunk interface unit 94 and a plurality oftelephone lines 96 to allow a plurality of remote stands 16 b (not shown) to interface with the super microcomputer simultaneously. In the preferred embodiment, up to eight telephone lines are used.Trunk interface unit 94 thus allowssuper microcomputer 18 to be interrogated over telephone lines (using DTMF tones) and allows data to be exchanged between the super microcomputer and individual lockbox and key components via stands 16. In such capacity, stands 16 function as remote input/output ports for the board computer and the stand' microprocessors function as smart input/output controllers. - In the preferred embodiment,
trunk interface unit 94 includes aninterface module 99 associated with eachtelephone line 96 for decrypting incoming data and for encrypting outgoing data.Modules 99 also desirably include speech synthesizers so that synthesized speech corresponding to various computer data can be sent back to individual agents over the telephone lines. Aninth interface module 99, which does not include a speech synthesizer, is provided intrunk interface unit 94 for interfacing with alocal stand 16 a resident at the board office. -
Board computer system 18 also desirably includes at least onephone line 98 and an associateddata modem 97 for interfacing tosmaller computers 18 resident at individual agency offices. - In a typical large system, several
smaller computers 18 are distributed throughout the system. Normally, such smaller computers are limited to performing certain preselected functions. For example, the software loaded into asmall computer 18 at an individual agency typically enables it to update certain lockbox parameters, such as changing the lockout list and changing the daily disable times, but prevents it from changing more sensitive parameters, such as lockbox access codes. Similarly, the software loaded into thesmall computer 18 at the agency typically enables it to deactivate keys, but prevents it from reinitializing keys after they are deactivated and prevents it from changing key expiration dates and expired key access codes. Such restricted functions can only be performed by the central board computer. - The board computer is used to keep track of all data pertinent to the system. Whenever a key or a lockbox is read or programmed, the corresponding data is entered into a system database. This database includes information on all the features and parameters heretofore mentioned, for every lockbox and key in the system. The board computer can search the database for any category of information and can generate corresponding written reports on any such subject. By such reports, the board can better target its activities. For example, the board can search the database to determine which listed properties have not been shown often and then suggest to the member agencies that the advertising of these properties be increased. Similarly, the board can monitor manpower trends and suggest staffing schedules that allocate agents to the offices and at the times that the demand is greatest.
- The above described system offers many advantages to real estate boards that span large territories. For example,
keys 14 are usually programmed to expire occasionally and must be rejuvenated. This is desirably done by the real estate board, rather than by the individual agencies, so as to maintain centralized control over key usage. Accordingly, as noted, most small computers resident at the various agencies are not able to rejuvenate expired keys. The agents could travel to the board office periodically to have their keys rejuvenated, but in large metropolitan areas this may be burdensome. The present system allows agents to complete all such transactions with the board computer over telephone lines. To rejuvenate an expired key, for example, the agent would place the key on astand 16 and would call the board computer. The key could then exchange appropriate handshaking signals with the computer and receive from the computer the key characterization instructions needed to rejuvenate the key. - In addition to enabling the board computer to communicate with smaller agency computers,
phone line 98 also permits the board computer to communicate with the vendor. Updated software can be reloaded using this link. Other diagnostic routines, such as one for analyzing a diagnostic maintenance log stored in a lockbox or a key, can be executed by the vendor on individual components by using this link to couple through the board computer to the individual components at local board or agency offices. - The board computer includes several security features. For example, all requests for service to the computer must include proper password codes before any transactions are allowed. Certain particularly sensitive transactions may require that a user call the board computer, send appropriate passwords and then hang up. The board computer then calls the user back on a predetermined telephone line. By this and other techniques, security of the system can be maintained even if the security of the password codes is breached.
- As will be recognized from the above discussion, the addition of a centralized board computer and its associated equipment greatly increases the system's utility and provides large real estate boards with a versatile, comprehensive and integrated lockbox management system.
- When the lockboxes and keys of the present invention are initially shipped from the vendor, they are not assigned to one particular real estate board. That is, the board identifying data portion of each unit's RAM memory is left unprogrammed. This field is later programmed automatically when the unit is initialized by a computer.
- Both the lockboxes and the keys of the present invention include a bit, termed here the “free agent bit,” in their respective RAM memories that indicates whether the unit has been assigned to a particular board. This bit is initially set to “0” by the manufacturer, indicating that the unit is unassigned.
- When the unit is received by the purchaser, it is placed on a stand and initialized by an initialization routine run on a computer coupled to the stand. One of the first operations performed by this initialization routine is to determine the status of the unit's free agent bit. If it is found to be “0,” the routine automatically stores in the unit's RAM memory a string of data identifying the board to which the computer itself is assigned. The computer then changes the unit's free agent bit from a “0” to a “1,” thereby preventing subsequent changes of the lockbox's or key's board ownership. By this technique, every lockbox and key is assigned automatically to the board to which the programming computer is assigned.
- After the lockbox or key is assigned to the initializing board, as described above, the initialization routine in
computer 18 continues by loading the unit's RAM memory with characterization instructions as specified by the programming entity, usually the real estate board. - After a lockbox or key has been initialized, it can then only be reprogrammed by computers assigned to the same board. If it is desired to transfer a lockbox or a key to a different board, the original owner must deactivate the unit and change the unit's free agent bit back to “0.” Thereafter, the unit will again assume the board ownership of the computer that reinitializes it.
- The database in the board's
central computer 18 includes data identifying each lockbox and key in the system and its operational status (initialized, deactivated, etc.). This data is used by the computer to prevent keys from being fraudulently duplicated. - As noted, each key includes identification data indicating the key's ownership by agent, agency and board.
Computer 18 will not load a key with a set of identification data if it determines that a key having that particular set of identification data already exists. The system thus prevents an unscrupulous user from reprogramming his or her key so as to fraudulently assume the identity of another agent in the board. The only way an unscrupulous agent could perpetrate this fraud would be to first obtain possession of the other agent's key and to deactivate it. This function, however, cannot generally be executed without knowledge of the other agent's personal code, which the unscrupulous agent should not know. Thus, it will be recognized that the database's tracking of data on each key in the system serves an important role in deterring fraud. - With reference to
FIG. 3 ,lockbox 12 includesshackle 22,case 100 and a hingedkey compartment door 24.Door 24 is retained in the closed position by a cooperatingdoor latch 102 and door stem 104.Door stem 104 is shown inFIG. 6 as including ahook portion 106, abutt portion 108 and a turnedcut portion 110.Stem 104 is spring biased away from the back ofcase 100 by aspring 112 compressed betweencase 100 and ashoulder 114 onstem 104.Door stem 104 is retained in the locking position by theplungers FIG. 2 ) which engagestem 104 atturned cut portion 110 and limit its forward travel. - When it is desired to open
door 24, the door is pressed inwardly. This causes door stem 104 to move towards the rear of the case. This freedom of movement ofstem 104 is provided by the length of turnedcut portion 110, which allows the stem to move inwardly while still engaged with the extended solenoid plungers. - After door stem 104 has been moved inwardly a distance, a retaining
pin 120 is urged against a pivotedlever 122.Lever 122 pivots about apivot point 124 connected to the case, thereby causing the opposite end of the lever to exert a force against anactuator button 126 onmicroswitch 42. Whenmicroswitch 42 closes, keycompartment locking solenoids 36 energize, provided the appropriate authorization signals have been exchanged between the lock and key. - When key
compartment locking solenoids 36 energize, theirplungers stem 104 is allowed to travel forwardly, no longer bound by the engagement of the plungers in the turned cut portion of the stem. Thus, when the user releases the door, it is allowed to spring open, pushed by the force ofstem spring 112 and acompressed door gasket 192. - Forward travel of door stem 104 when in its unlocked condition is limited by the engagement of retaining
pin 120 with a stoppingportion 126 ofcase 100. However, by the time door stem 104 has moved forwardly this distance,door latch 102 has unhooked fromstem 104 under the influence ofdoor latch spring 128, which liftslatch 102 about apivot point 130.Door 24 is thus free to open aboutdoor hinge 132, thereby allowing access to the house key or other materials stored inkey compartment 20. - Key
compartment locking solenoids 36 return to their deenergized, locking states 0.25 seconds aftermicroswitch 42 is reopened.Plungers rear barrel portion 134 ofstem 104 if the stem is then in its unlocked position. - When
door 24 is closed,latch 102 engages with a hook portion ofstem 104 as these components are pushed inwardly. The hook portion oflatch 102 has a curved upper surface so that it lowers into its latched position automatically when it meets the case. The front entrance to the bore within which these coupled elements travel has a chamferedupper portion 135 to further facilitate lowering hook portion oflatch 102 into its locked position. With the latch and stem so engaged,stem 104 is pushed further inwardly until the spring loadedplungers portion 110 of the stem. At this point, the door is locked. The door is also rendered shock proof in this state by the positioning of the latched components within the constraining bore which prevents these components from becoming disengaged. - Reviewing the key compartment access operation, it will be noted that
door 24 is positioned on the front oflockbox 12 and pivots downwardly to expose the lockbox contents. This arrangement facilitates operation of lockboxes mounted in awkward locations, such as on ground level water faucets, especially when compared to prior art systems in which the key container had to be released from the underside of the lockbox. Similarly, the present arrangement in which the key is coupled to the lockbox simply by bringing the key near the slot in the upper front portion of the lockbox provides a substantial improvement in operating flexibility over prior art systems in which the key had to be engaged with the lockbox in a precise position and then manipulated while in that position in order to operate the lockbox. - The use of a
key compartment door 24 on the lockbox of the present invention also provides a variety of security enhancing features not found in prior art lockboxes. For example, the shackle release mechanism of the present invention is concealed behind the key compartment door, thereby protecting it from vandalism and providing an additional measure of security to the shackle. Similarly, batterycompartment retaining bolt 180 and tamper proof screws holdinglockbox circuit board 182 and the lockbox's rear cover in place are also protected from tampering by being positioned behinddoor 24. - Turning now to release of the shackle,
FIGS. 2 and 7 show that shackle 22 includes aloop portion 140 and twoend portions 142. Each end portion includes abutt portion 144 and a turnedcut portion 146.Shackle 22 is maintained in its locked position by a lockingbar 148, shown inFIGS. 4 and 5 . When in the locked position, turned cutportions 146 in both ends ofshackle 22 are engaged bycircular notches 150 in lockingbar 148. Lockingbar 148 is maintained in engagement with the turnedcuts 146 ofshackle 22 by the locking bar's own engagement on ashackle stem 162. Lockingbar 148 is engaged on abutt portion 160 of the shackle stem by engagement between anelongated cut 164 in a flat portion. 158 of the bar with agroove 166 in the butt portion of the stem. Shackle stem 162 is spring biased towards the front of the case by aspring 156 compressed betweenflat portion 158 of lockingbar 148 and the rear of the case. However,stem 162, and consequently lockingbar 148, are prevented from moving forwardly by the engagement ofplungers shackle locking solenoids 38 with a turned cut portion 172 in the stem. - It will be recognized that the above-described shackle locking arrangement prevents any external force, regardless of how it is applied, from imparting a load to shackle locking
solenoids 38. For example, if it is attempted to pull lockedshackle 22 out ofcase 100, lockingbar 148 will lift slightly offshackle locking stem 162 and will immediately engage a casting 152 (shown also in Fig. B) in the upper portion of the case. (Casting 152 fills the upper portion of the case and includes twoopenings 153 sized just to allow passage of theend portions 142 of the shackle). Theforce pulling shackle 22 fromcase 100 is thus applied entirely against casting 152 and does not include any component directed againstsolenoids 38. - Similarly, if it is attempted to push locked
shackle 22 intocase 100, a pair ofshoulders 154 on the lower portion ofshackle 22 are immediately forced into engagement with a pair of protrusions 174 (FIG. 8 ) formed on the top ofcase 100. (Shoulders 154 andprotrusions 174 are obscured inFIGS. 2 and 3 by aplastic rain guard 175 formed around shackle 22). Theforce pushing shackle 22 intocase 100 is thus applied entirely against thecase 174 and again does not include any component directed againstshackle locking solenoids 38. - Even if the ends of
shackle 22 are twisted, as may occur if a shackle cable (discussed below) is used, lockingsolenoids 38 are still isolated from any load. Any twisting motion of the shackle ends simply causes the turned cutportions 146 of the shackle to turn harmlessly in thecircular notches 150 of lockingbar 148. - If release of the shackle has been authorized,
lockbox CPU 28 first unlocks thekey compartment door 24 to allow access to theshackle locking stem 162 normally concealed behind this door.Shackle locking solenoids 38 are energized for eight seconds beginning two seconds afterdoor 24 is opened. (as detected by microswitch 42). Whenplungers shackle locking solenoids 38 attempt to retract, however, they are prevented from doing so by their frictional engagement with the edge of the turned cut portion 172 inshackle locking stem 162. This engagement is maintained byspring 156 which pushes the edge of the turned cut portion 172 of the stem against the sides of the solenoid plungers. - In order to release the shackle, the user must press
shackle locking stem 162 rearwardly a short distance so as tofree plungers solenoids 38 immediately retract their plungers from the stem. When the plungers retract, stem 62 is allowed to travel forwardly, no longer bound by the plunger' engagement in the turned cut portion 172 of the stem. Thus, when the user releases the stem, the stem is allowed to spring forwardly, pushed by the force ofcompressed spring 156. - When shackle stem 162 moves forwardly under the force of
compressed spring 156, it causes theshackle locking bar 148, linked to the stem atbutt portion 160, to also move forwardly. This forward movement ofshackle locking bar 148 disengages the circular notches in the locking bar from the turned cutportions 146 in the shackle. (Forward travel ofstem 162 and lockingbar 148 is limited by the locking bar's engagement with astop member 159 formed in case 100). In this unlocked state, the shackle can then be freely withdrawn from the lockbox. - If
shackle locking stem 162 is not pushed inwardly within eight seconds, lockingsolenoids 38 are deenergized, thereby relocking the stem, and consequently the shackle, in place. - (It will be noted that the above described press-to-release mechanisms provided on both the key compartment door and on the shackle locking stem serve to remove all loads from the solenoids plungers when these plungers are being retracted to their unlocked states. Consequently, the solenoids employed in the present invention can be relatively small, thereby reducing both power drain and system cost.)
- When it is desired to relock the shackle, the shackle is reinserted in
openings 153 in the top ofcase 100 and pressed downwardly untilshoulders 154 on the shackle engage theupper protrusions 174. Theshackle stem 162, which is protruding forwardly under the influence ofspring 156, is pressed inwardly by the user, thereby causingcircular notches 150 in lockingbar 158 to move back into engagement with turnedcuts 146 in the shackle.Stem 162 can be pressed inwardly simply by closingkey compartment door 24. After the shackle stem has been pressed in a distance,plungers shackle locking solenoids 38 spring from their unlocked positions (pressing against thebarrel portion 176 of stem 162) back into the turned cut portion 172 of the stem. This action relocks the shackle stem in its locked position and correspondingly locksshackle locking bar 148 in its locking relationship withshackle 22. - In addition to the lockbox security features already described,
door locking stem 104 andshackle locking stem 162 also serve security functions by rendering the inner workings of the lockbox inaccessible to vandalizing users. Oncedoor 24 is opened, as for example by an authorized user, the two bores in which these stems travel could provide passageways to the inner workings of the lockbox. A vandalizing user who is so inclined might attempt to tamper with the internal mechanisms through these passageways. In the present invention, however, such tampering is thwarted by stems 104 and 162 which occlude thesepassageways 80 as to block all access to the inner workings of the lockbox. - Reviewing other mechanical components of the lockbox briefly,
primary lockbox battery 32 comprises five alkaline AA cells mounted next to one another in abattery pack 178 mounted in the lower rear of the unit and held in place by abolt 180. An 0-ring seal is provided aroundbattery pack 178 and around the lockbox rear cover to prevent rain and contaminants from entering the case. Thebackup battery 34 is mounted on acircuit board 182 in the back of the unit, which circuit board also supports thelockbox CPU 28,RAM 30 and related circuitry. -
Communications coil 26 is mounted in the upper front of the lockbox, adjacent a receivingnest 184 into which the top end ofkey 14 is inserted. Coupling betweencommunications coil 26 and key 14 through themetal lockbox case 100 is facilitated by asmall slot 186 that extends throughcase 100 for the length ofcoil 186. This slot is filled with an insulating resin material that also pots the communications coil in place. - Inside
key compartment door 24 is astainless steel liner 188 with alip portion 190 that reinforces the door and helps retain the contents near the door as the door is being closed.Cellular urethane gaskets 192 are positioned at the points wheredoor 24 contacts the case so as to prevent rain and contaminants from entering the case. This cellular urethane material resists caking a set, thereby assuring a long life for the door seals. An injection molded plastic bumper (not shown) can be provided on the outside of the lockbox so as to protect the fixture to which the lockbox is mounted (i.e. a door) from abrasion. - In alternative forms of the invention, shackle 22 can comprise a vinyl clad steel cable terminated with appropriately machined ends, such as ends 142 on
shackle 22, so as to permit connection of the lockbox to trees and the like. The cable can again be provided with drip caps to prevent rain from entering the lockbox. - Having illustrated and described the principles of our invention with reference to a preferred embodiment and several variations thereof, it should be apparent to those skilled in the art that the invention can be modified in arrangement and detail without departing from such principles. For example, although the system is described with reference to a lockbox system for containing dwelling keys, it is readily adaptable to other uses, such as in industrial security systems. Similarly, although the preferred embodiment has been described as including all the claimed features, other systems could readily be designed that include only some of these features and that include other features not here discussed. Accordingly, we claim as our invention all such modifications as may come within the spirit and scope of the following claims and equivalents thereof.
Claims (2)
1-2. (canceled)
3. In an electronic key for use with an electronic lock, the key and lock being distinct from one another and movable relative thereto, the key including a microprocessor, a battery coupled to the microprocessor, a memory coupled to the microprocessor, a keypad including at least the digits 0-9, the keypad being coupled to the microprocessor, and a communications port for sending signals to the lock, an improvement comprising:
a receiver for receiving electromagnetic radio frequency signals; and
a decoder coupled to the receiver for providing data corresponding to a received radio frequency signal to the memory to change data stored therein;
wherein characteristics of the key can be programmed remotely; and
wherein the key is programmed to identify radio frequency signals carrying data intended for said key, as opposed to other signals intended for other keys.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/989,902 US20050168320A1 (en) | 1985-10-16 | 2004-11-15 | Electronic real estate lockbox system |
Applications Claiming Priority (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US78807285A | 1985-10-16 | 1985-10-16 | |
US81436485A | 1985-12-30 | 1985-12-30 | |
US06/831,601 US4727368A (en) | 1985-12-30 | 1986-02-21 | Electronic real estate lockbox system |
US07/015,864 US4766746A (en) | 1986-02-21 | 1987-02-17 | Electronic real estate lockbox system |
US19285388A | 1988-05-11 | 1988-05-11 | |
US07/303,711 US4988987A (en) | 1985-12-30 | 1989-01-27 | Keysafe system with timer/calendar features |
US64025591A | 1991-01-11 | 1991-01-11 | |
US07/806,801 US5245652A (en) | 1985-10-16 | 1991-12-05 | Secure entry system with acoustically coupled telephone interface |
US86495892A | 1992-04-07 | 1992-04-07 | |
US08/138,555 US6822553B1 (en) | 1985-10-16 | 1993-10-15 | Secure entry system with radio reprogramming |
US10/989,902 US20050168320A1 (en) | 1985-10-16 | 2004-11-15 | Electronic real estate lockbox system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/138,555 Continuation US6822553B1 (en) | 1985-10-16 | 1993-10-15 | Secure entry system with radio reprogramming |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050168320A1 true US20050168320A1 (en) | 2005-08-04 |
Family
ID=33437322
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/138,555 Active 2026-11-23 US6822553B1 (en) | 1985-10-16 | 1993-10-15 | Secure entry system with radio reprogramming |
US08/483,823 Expired - Lifetime US5602536A (en) | 1985-10-16 | 1995-06-07 | Data synchronization method for use with portable, microprocessor-based device |
US08/486,954 Expired - Fee Related US6842105B1 (en) | 1985-10-16 | 1995-06-07 | Dual mode data logging |
US10/989,902 Abandoned US20050168320A1 (en) | 1985-10-16 | 2004-11-15 | Electronic real estate lockbox system |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US08/138,555 Active 2026-11-23 US6822553B1 (en) | 1985-10-16 | 1993-10-15 | Secure entry system with radio reprogramming |
US08/483,823 Expired - Lifetime US5602536A (en) | 1985-10-16 | 1995-06-07 | Data synchronization method for use with portable, microprocessor-based device |
US08/486,954 Expired - Fee Related US6842105B1 (en) | 1985-10-16 | 1995-06-07 | Dual mode data logging |
Country Status (1)
Country | Link |
---|---|
US (4) | US6822553B1 (en) |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040256461A1 (en) * | 2002-01-24 | 2004-12-23 | Moorhouse John H. | Optical security system |
US20050205657A1 (en) * | 2002-01-24 | 2005-09-22 | Moorhouse John H | Optical security system |
US20070271112A1 (en) * | 2006-05-16 | 2007-11-22 | Lpd, Llc | Dynamic electronic door lock control system |
EP1860617A2 (en) * | 2006-05-23 | 2007-11-28 | Nissan Motor Manufacturing (Uk) Ltd | Security systems |
US20080106369A1 (en) * | 2006-11-06 | 2008-05-08 | Harrow Products Llc | Access control system |
US20090064746A1 (en) * | 2007-09-08 | 2009-03-12 | Nima Bigdely Shamlo | Method, apparatus, and system for an electronic key usage history indicator |
US20090184801A1 (en) * | 2005-03-18 | 2009-07-23 | Olle Bliding | Method for Unlocking a Lock by a Lock Device Enabled for Short-Range Wireless Data Communication in Compliance With a Communication Standard and Associated Device |
US20100223170A1 (en) * | 2009-02-27 | 2010-09-02 | Reuben Bahar | Method and system for real estate marketing |
US20100268379A1 (en) * | 2008-02-28 | 2010-10-21 | Woodard Scott E | Integrated real estate showing scheduling and key dispensing system |
US20110187493A1 (en) * | 2010-01-29 | 2011-08-04 | Assa Abloy Hospitality, Inc. | Method and system for permitting remote check-in and coordinating access control |
US8307677B2 (en) * | 2011-01-06 | 2012-11-13 | Utc Fire & Security Corporation | Key container with security liner |
US20130009770A1 (en) * | 2011-07-06 | 2013-01-10 | Checkpoint Systems, Inc. | Method and apparatus for powering a security device |
US8640513B2 (en) * | 2011-06-22 | 2014-02-04 | The Stanley Works Israel Ltd. | Electronic and manual lock assembly |
US8640514B2 (en) | 2011-06-22 | 2014-02-04 | The Stanley Works Israel Ltd. | Electronic and manual lock assembly |
US8902042B2 (en) | 2006-05-16 | 2014-12-02 | Lpd, L.L.C. | Methods of controlling access to real estate properties |
WO2015026918A1 (en) * | 2013-08-23 | 2015-02-26 | Invue Security Products Inc. | Quick release security device |
WO2015042502A1 (en) * | 2013-09-20 | 2015-03-26 | Sargent & Greenleaf, Inc. | System and method of initializing and controlling locks |
US9135422B2 (en) | 2011-01-06 | 2015-09-15 | Utc Fire & Security Corporation | Trusted vendor access |
EP3009992A1 (en) * | 2014-09-19 | 2016-04-20 | EVVA Sicherheitstechnologie GmbH | Method and device for managing access rights |
US9460480B2 (en) | 2010-04-09 | 2016-10-04 | Showingtime.Com, Inc. | Integrated real estate showing scheduling and key management system |
US9734646B1 (en) | 2016-04-29 | 2017-08-15 | John P. Noell | System, method, and apparatus for accessing real estate property |
US9761071B2 (en) | 2014-04-29 | 2017-09-12 | Showingtime.Com, Inc. | Integrated real estate showing scheduling and key management system |
US20180241439A1 (en) * | 2015-08-20 | 2018-08-23 | Philips Lighting Holding B.V. | Transmitting logical dali signals wirelessly |
US10713740B1 (en) | 2018-12-29 | 2020-07-14 | Showingtime.Com, Inc. | Electronic device for providing access to properties |
US10885596B1 (en) | 2018-06-27 | 2021-01-05 | Showingtime.Com Inc. | System and method for managing showings of real estate listings based on multiple factors |
US11468985B2 (en) | 2020-08-04 | 2022-10-11 | Showingtime.Com, Inc. | System and method for managing property showing appointments based on health parameters |
US11574373B1 (en) | 2020-04-20 | 2023-02-07 | MFTB Holdco, Inc. | Multi-party virtual showing system with configurable independent communication channels and data |
US11580503B1 (en) | 2020-10-23 | 2023-02-14 | MFTB Holdco, Inc. | System and method for managing and automatically rescheduling showings of real estate listings based on multiple factors |
US11600121B2 (en) | 2020-07-21 | 2023-03-07 | Unitedhealth Group Incorporated | Systems and methods for conditional remote unlocking of identified containers |
US20230184007A1 (en) * | 2019-03-27 | 2023-06-15 | Sentrilock, Llc | Electronic lockbox |
USD1012481S1 (en) | 2020-10-29 | 2024-01-30 | Unitedhealth Group Incorporated | Storage container assembly |
US11935196B2 (en) | 2019-11-12 | 2024-03-19 | MFTB Holdco, Inc. | Presenting building information using building models |
US11954650B2 (en) | 2018-06-27 | 2024-04-09 | MFTB Holdco, Inc. | Managing in-person property access using geofences |
US12125590B2 (en) | 2020-08-04 | 2024-10-22 | MFTB Holdco, Inc. | Controlling physical property access using health parameters |
Families Citing this family (143)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5749253A (en) * | 1994-03-30 | 1998-05-12 | Dallas Semiconductor Corporation | Electrical/mechanical access control systems and methods |
US6359547B1 (en) | 1994-11-15 | 2002-03-19 | William D. Denison | Electronic access control device |
US6900720B2 (en) * | 2001-12-27 | 2005-05-31 | Micro Enhanced Technology, Inc. | Vending machines with field-programmable locks |
US7821395B2 (en) * | 2001-12-27 | 2010-10-26 | Micro Enhanced Technology, Inc. | Vending machines with field-programmable locks |
US20050285716A1 (en) * | 2001-12-27 | 2005-12-29 | Triteq Lock And Security, Llc | Electronic key control and management system for vending machines and the like |
US5864757A (en) * | 1995-12-12 | 1999-01-26 | Bellsouth Corporation | Methods and apparatus for locking communications devices |
GB9613726D0 (en) * | 1996-06-28 | 1996-08-28 | Cassiere Uk Limited | Improvements relating to locking systems |
JP3748635B2 (en) * | 1996-09-20 | 2006-02-22 | アルプス電気株式会社 | Communication device |
EP0958444A1 (en) * | 1996-12-03 | 1999-11-24 | E.J. Brooks Company | Programmable lock and security system therefor |
US5835025A (en) * | 1997-05-14 | 1998-11-10 | U.S. Army Corps Of Engineers As Represented By The Secretary Of The Army | Portable battery operated power managed event recorder and interrogator system |
DE19812210C1 (en) * | 1998-03-19 | 1999-05-06 | Siemens Ag | Motor vehicle unauthorised usage prevention device |
US6876293B2 (en) * | 1998-04-03 | 2005-04-05 | Harrow Products, Llc | Multiple access electronic lock system |
AU1084400A (en) * | 1998-10-16 | 2000-05-08 | Remote Mobile Security Access Limited | Remote access and security system |
US6285295B1 (en) * | 1998-12-14 | 2001-09-04 | Martin S. Casden | Passive remote programmer for induction type RFID readers |
US6178403B1 (en) | 1998-12-16 | 2001-01-23 | Sharp Laboratories Of America, Inc. | Distributed voice capture and recognition system |
EP1024239B1 (en) * | 1999-01-28 | 2005-03-23 | International Business Machines Corporation | Electronic access control system and method |
US6472973B1 (en) * | 1999-02-19 | 2002-10-29 | Gale Harold | Information collector and disseminator for a realty lock box |
US6720861B1 (en) * | 1999-03-12 | 2004-04-13 | Best Access Systems | Wireless security control system |
SE517465C2 (en) * | 2000-03-10 | 2002-06-11 | Assa Abloy Ab | Method of authorizing a key or lock device, electromechanical key and lock device and key and lock system |
JP2001188497A (en) * | 1999-12-27 | 2001-07-10 | Fuji Xerox Co Ltd | Display device |
US6474122B2 (en) * | 2000-01-25 | 2002-11-05 | Videx, Inc. | Electronic locking system |
US6615625B2 (en) | 2000-01-25 | 2003-09-09 | Videx, Inc. | Electronic locking system |
US6718806B2 (en) | 2000-01-25 | 2004-04-13 | Videx, Inc. | Electronic locking system with emergency exit feature |
US6766456B1 (en) * | 2000-02-23 | 2004-07-20 | Micron Technology, Inc. | Method and system for authenticating a user of a computer system |
US20040103287A1 (en) * | 2000-09-01 | 2004-05-27 | Newby Robert Matthew | Electronic device with time dependent access codes and apparatus for generating those codes |
IL148834A (en) * | 2000-09-10 | 2007-03-08 | Sandisk Il Ltd | Removable, active, personal storage device, system and method |
FI20002255A (en) * | 2000-10-13 | 2002-04-14 | Nokia Corp | A method for controlling and controlling locks |
DE10056119B4 (en) * | 2000-11-13 | 2005-12-15 | Stobbe, Anatoli, Dipl.-Ing. | Electronically codable lock system |
US7065655B1 (en) * | 2000-11-21 | 2006-06-20 | Lucent Technologies Inc. | Secure enclosure for key exchange |
US6839707B2 (en) | 2001-01-17 | 2005-01-04 | General Electric Company | Web-based system and method for managing legal information |
US20020116624A1 (en) * | 2001-02-16 | 2002-08-22 | International Business Machines Corporation | Embedded cryptographic system |
DE10113072C5 (en) * | 2001-03-15 | 2011-05-26 | Stobbe, Anatoli, Dipl.-Ing. | System for storage and dispensing of objects |
MXPA03010049A (en) * | 2001-05-04 | 2004-12-06 | Cubic Corp | Smart card access control system. |
DE10122367A1 (en) * | 2001-05-09 | 2002-11-14 | Klaus-Dieter Roesler | Method and device for the interactive output or rental of goods from the warehouse of a goods management system |
US20020169738A1 (en) * | 2001-05-10 | 2002-11-14 | Giel Peter Van | Method and system for auditing an enterprise configuration |
US7114178B2 (en) | 2001-05-22 | 2006-09-26 | Ericsson Inc. | Security system |
US7904454B2 (en) * | 2001-07-16 | 2011-03-08 | International Business Machines Corporation | Database access security |
US20030037195A1 (en) * | 2001-08-14 | 2003-02-20 | James Cheng | On-board input/output port |
US7248836B2 (en) * | 2001-09-30 | 2007-07-24 | Schlage Lock Company | RF channel linking method and system |
US7289764B2 (en) | 2001-09-30 | 2007-10-30 | Harrow Products, Llc | Cardholder interface for an access control system |
US7346331B2 (en) * | 2001-09-30 | 2008-03-18 | Harrow Products, Llc | Power management for locking system |
US20030074936A1 (en) * | 2001-09-30 | 2003-04-24 | Fred Conforti | Door wireless access control system including reader, lock, and wireless access control electronics including wireless transceiver |
US7113073B2 (en) * | 2001-09-30 | 2006-09-26 | Harrow Products, Llc | System management interface for radio frequency access control |
US20030098780A1 (en) * | 2001-09-30 | 2003-05-29 | Ronald Taylor | General access control features for a RF access control system |
US20030103472A1 (en) * | 2001-09-30 | 2003-06-05 | Ronald Taylor | RF wireless access control for locking system |
US20030096607A1 (en) * | 2001-09-30 | 2003-05-22 | Ronald Taylor | Maintenance/trouble signals for a RF wireless locking system |
US20110276609A1 (en) | 2001-12-27 | 2011-11-10 | Denison William D | Method for Controlling and Recording the Security of an Enclosure |
US7725897B2 (en) * | 2004-11-24 | 2010-05-25 | Kabushiki Kaisha Toshiba | Systems and methods for performing real-time processing using multiple processors |
US20050184857A1 (en) | 2003-12-11 | 2005-08-25 | Triteq Lock And Security, Llc | Electronic security apparatus and method for monitoring mechanical keys and other items |
US7266842B2 (en) * | 2002-04-18 | 2007-09-04 | International Business Machines Corporation | Control function implementing selective transparent data authentication within an integrated system |
US6715085B2 (en) * | 2002-04-18 | 2004-03-30 | International Business Machines Corporation | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function |
US7089419B2 (en) | 2002-04-18 | 2006-08-08 | International Business Machines Corporation | Control function with multiple security states for facilitating secure operation of an integrated system |
US6851056B2 (en) | 2002-04-18 | 2005-02-01 | International Business Machines Corporation | Control function employing a requesting master id and a data address to qualify data access within an integrated system |
US7123127B2 (en) | 2003-01-31 | 2006-10-17 | General Electric Company | System for managing physical assets |
US20040025039A1 (en) * | 2002-04-30 | 2004-02-05 | Adam Kuenzi | Lock box security system with improved communication |
US7061367B2 (en) * | 2002-04-30 | 2006-06-13 | General Electric Company | Managing access to physical assets |
US7042334B2 (en) * | 2003-01-31 | 2006-05-09 | General Electric Company | Methods for managing access to physical assets |
FR2839833B1 (en) * | 2002-05-15 | 2004-11-19 | Cogelec | ACCESS CONTROL SYSTEM, PORTABLE PROGRAMMING TERMINAL, AND METHOD FOR PROGRAMMING THE ACCESS CONTROL SYSTEM |
US6989732B2 (en) * | 2002-06-14 | 2006-01-24 | Sentrilock, Inc. | Electronic lock system and method for its use with card only mode |
US7009489B2 (en) | 2002-06-14 | 2006-03-07 | Sentrilock, Inc. | Electronic lock system and method for its use |
JP2004159022A (en) * | 2002-11-06 | 2004-06-03 | Nec Saitama Ltd | Mobile phone, dial lock release method used for the same, and program thereof |
TW555927B (en) * | 2002-11-26 | 2003-10-01 | Eden Jung-Yu Chen | Key-lock switch system |
US20040108938A1 (en) * | 2002-12-10 | 2004-06-10 | Entrekin David A. | Portable electronic locking system and method |
US7949541B2 (en) | 2002-12-12 | 2011-05-24 | Performance Analytics, Inc. | Vehicle activity module |
US7340400B2 (en) * | 2002-12-12 | 2008-03-04 | Performance Analytics, Inc. | Vehicle activity module |
US8437740B2 (en) * | 2003-02-21 | 2013-05-07 | Utc Fire & Security Americas Corporation, Inc. | Key control with real time communications to remote locations |
CA2516704C (en) | 2003-02-21 | 2012-07-31 | Ge Interlogix, Inc. | Key control with real time communications to remote locations |
JP2004312175A (en) * | 2003-04-03 | 2004-11-04 | Denso Corp | Mobile transmitter |
US7263632B2 (en) * | 2003-05-07 | 2007-08-28 | Microsoft Corporation | Programmatic computer problem diagnosis and resolution and automated reporting and updating of the same |
US20040227761A1 (en) * | 2003-05-14 | 2004-11-18 | Pixar | Statistical dynamic modeling method and apparatus |
US20040246096A1 (en) * | 2003-06-05 | 2004-12-09 | Queenan Joseph A. | Secure electronic compartment lock and method therfor |
US7966850B2 (en) * | 2003-10-24 | 2011-06-28 | Jason Chapnik | Case with securable closure and method |
US7747286B2 (en) * | 2004-01-20 | 2010-06-29 | Harrow Products Llc | Wireless access control system with energy-saving piezo-electric locking |
US20060059963A1 (en) * | 2004-01-20 | 2006-03-23 | Harrow Products Llc | Wireless access control system including wireless exit kit (''WEXK'') with panic bar |
US7506371B1 (en) | 2004-01-22 | 2009-03-17 | Guardium, Inc. | System and methods for adaptive behavior based access control |
JP4524122B2 (en) * | 2004-02-16 | 2010-08-11 | 株式会社東海理化電機製作所 | Security control system, security control device, management device in security control system, and security control method |
US7400878B2 (en) * | 2004-02-26 | 2008-07-15 | Research In Motion Limited | Computing device with environment aware features |
US7086258B2 (en) | 2004-03-19 | 2006-08-08 | Sentrilock, Inc. | Electronic lock box with single linear actuator operating two different latching mechanisms |
US7420456B2 (en) * | 2004-03-19 | 2008-09-02 | Sentri Lock, Inc. | Electronic lock box with multiple modes and security states |
GB0406376D0 (en) * | 2004-03-22 | 2004-04-21 | Maple Alan J | Lock mechanism |
US7461268B2 (en) * | 2004-07-15 | 2008-12-02 | International Business Machines Corporation | E-fuses for storing security version data |
SE527644C2 (en) * | 2004-09-16 | 2006-05-02 | Steab Stendal El Ab | A locking system and a method of locking |
FR2876136A1 (en) * | 2004-10-05 | 2006-04-07 | Abbouti Abdelmajid El | Security key container for retaining premises key, has detachable connection unit sliding in corresponding housings of body, with inner locking unit driven by code, where body has housing on which radial rod of handle is engaged |
US20060070412A1 (en) * | 2004-10-05 | 2006-04-06 | Wiseman Brian M | Non-register cash drawer with a keypad control |
US20070290790A1 (en) * | 2004-10-20 | 2007-12-20 | Harrow Products Llc | Lock Programming Device |
FR2877468B1 (en) * | 2004-10-29 | 2007-01-26 | Immotec Systemes Soc Par Actio | METHOD AND EQUIPMENT FOR MANAGING ACCESS CONTROL BADGES |
FR2879644B1 (en) * | 2004-12-20 | 2008-10-24 | Locken Distrib Internat Sarl | COMMUNICATING ELECTRONIC KEY FOR SECURE ACCESS TO A MECATRONIC CYLINDER |
US7735145B2 (en) * | 2005-02-18 | 2010-06-08 | Microsoft Corporation | Portable secure media with timed erasure |
US20090160606A1 (en) * | 2005-02-25 | 2009-06-25 | Miller Kevin D | Lock System with User Self-Enrollment Method |
US20080290988A1 (en) * | 2005-06-18 | 2008-11-27 | Crawford C S Lee | Systems and methods for controlling access within a system of networked and non-networked processor-based systems |
US7836306B2 (en) | 2005-06-29 | 2010-11-16 | Microsoft Corporation | Establishing secure mutual trust using an insecure password |
US7970788B2 (en) * | 2005-08-02 | 2011-06-28 | International Business Machines Corporation | Selective local database access restriction |
US20070044523A1 (en) * | 2005-08-26 | 2007-03-01 | Videx, Inc. | Lock |
EP1938157A4 (en) * | 2005-10-20 | 2009-04-01 | Harrow Products Llc | Lock programming device |
US20070090917A1 (en) * | 2005-10-20 | 2007-04-26 | Michael Boyden Parnaby | Vehicle dealership security system |
US7999656B2 (en) * | 2005-10-26 | 2011-08-16 | Sentrilock, Llc | Electronic lock box with key presence sensing |
US7933923B2 (en) * | 2005-11-04 | 2011-04-26 | International Business Machines Corporation | Tracking and reconciling database commands |
US20110254661A1 (en) | 2005-12-23 | 2011-10-20 | Invue Security Products Inc. | Programmable security system and method for protecting merchandise |
US20080174403A1 (en) * | 2006-02-09 | 2008-07-24 | Michael Wolpert | Multiple wireless access points for wireless locksets |
TWI296679B (en) * | 2006-02-20 | 2008-05-11 | Delta Electronics Inc | Disassembly-prevention mechanism |
US7698917B2 (en) * | 2006-03-06 | 2010-04-20 | Handytrac Systems, Llc | Electronic deadbolt lock with a leverage handle |
ITMI20060409A1 (en) * | 2006-03-07 | 2007-09-08 | Nice Spa | TADIORICEVITOR SYSTEM AND RADIOTRECTOR FOR AUTOMATED RADIO-CONTROLLED APEERTURE-CLOSING SYSTEMS |
US8058971B2 (en) | 2006-06-07 | 2011-11-15 | Utc Fire & Security Americas Corporation, Inc. | Access control system |
TWI314604B (en) * | 2006-09-19 | 2009-09-11 | Asustek Comp Inc | Electronic device |
US8141100B2 (en) | 2006-12-20 | 2012-03-20 | International Business Machines Corporation | Identifying attribute propagation for multi-tier processing |
US8495367B2 (en) | 2007-02-22 | 2013-07-23 | International Business Machines Corporation | Nondestructive interception of secure data in transit |
US9670694B2 (en) * | 2007-04-12 | 2017-06-06 | Utc Fire & Security Americas Corporation, Inc. | Restricted range lockbox, access device and methods |
HUE050864T2 (en) * | 2007-09-28 | 2021-01-28 | Iloq Oy | Lock administration system |
EP2071522B1 (en) * | 2007-12-06 | 2019-02-06 | UTC Fire & Security Americas Corporation, Inc. | Lockbox key with callback feature |
JP4302168B2 (en) * | 2007-12-21 | 2009-07-22 | 株式会社東芝 | Information processing apparatus and identification control method |
US8261326B2 (en) | 2008-04-25 | 2012-09-04 | International Business Machines Corporation | Network intrusion blocking security overlay |
US8151608B2 (en) * | 2008-05-28 | 2012-04-10 | Sentrilock, Llc | Electronic lock box with mechanism immobilizer features |
US7694130B1 (en) * | 2008-09-12 | 2010-04-06 | Michael Anthony Martinez | System and method to authenticate a user utilizing a time-varying auxiliary code |
US20110187496A1 (en) * | 2008-10-30 | 2011-08-04 | Denison William D | Electronic Access Control Device and Management System |
US9477947B2 (en) | 2009-08-24 | 2016-10-25 | International Business Machines Corporation | Retrospective changing of previously sent messages |
CA2717445A1 (en) * | 2010-01-14 | 2011-07-14 | Camden Marketing Inc. | Mobile installer transceiver for wireless door controls |
US8912884B2 (en) | 2010-09-16 | 2014-12-16 | Sentrilock, Llc | Electronic key lockout control in lockbox system |
WO2012136623A1 (en) * | 2011-04-04 | 2012-10-11 | Hw Verwaltungs Gmbh | Method for closing and securing containers against an unauthorized opening |
DE102011121655A1 (en) * | 2011-12-19 | 2013-06-20 | Pcs Systemtechnik Gmbh | Electronic terminal and method for its synchronization |
EP2674922A1 (en) * | 2012-06-11 | 2013-12-18 | Alcatel Lucent | Protection at network element location |
US8972762B2 (en) | 2012-07-11 | 2015-03-03 | Blackberry Limited | Computing devices and methods for resetting inactivity timers on computing devices |
US8919024B2 (en) * | 2013-02-06 | 2014-12-30 | Karl F. Milde, Jr. | Secure smartphone-operated gun trigger lock |
US9053629B2 (en) | 2013-03-14 | 2015-06-09 | Sentrilock, Llc | Contextual data delivery to mobile users responsive to access of an electronic lockbox |
US10115256B2 (en) | 2014-04-07 | 2018-10-30 | Videx, Inc. | Remote administration of an electronic key to facilitate use by authorized persons |
US9841743B2 (en) | 2014-04-07 | 2017-12-12 | Videx, Inc. | Apparatus and method for remote administration and recurrent updating of credentials in an access control system |
WO2016073781A1 (en) | 2014-11-05 | 2016-05-12 | Real Agent Guard-IP, LLC | Personal monitoring using a remote timer |
CN105678123B (en) * | 2014-11-18 | 2019-03-08 | 联发科技(新加坡)私人有限公司 | A kind of equipment unlocking method and device |
US9836897B2 (en) | 2015-04-30 | 2017-12-05 | Carrier Corporation | Lockbox access device and method with biometric security data |
US9704315B2 (en) | 2015-06-11 | 2017-07-11 | Sentrilock, Llc | Contextual data delivery to other users at an electronic lockbox |
KR101834337B1 (en) * | 2015-06-15 | 2018-03-05 | 김범수 | Electronic key and electronic locking apparatus of dual-authentication |
US9830760B2 (en) | 2015-10-10 | 2017-11-28 | Sentrilock, Llc | Contextual data delivery to users at a locked property |
US9847020B2 (en) | 2015-10-10 | 2017-12-19 | Videx, Inc. | Visible light communication of an access credential in an access control system |
US10614641B2 (en) | 2015-12-11 | 2020-04-07 | The Sun Lock Company, Ltd. | Electronic combination lock with different levels of access control |
US10679441B2 (en) * | 2015-12-11 | 2020-06-09 | The Sunlock Company, Ltd. | Electronic combination lock with different levels of access control |
WO2017181140A1 (en) | 2016-04-15 | 2017-10-19 | Mobile Tech, Inc. | Gateway-based anti-theft security system and method |
MX2019014363A (en) | 2017-06-02 | 2020-07-27 | Lock Ii L L C | Device and methods for providing a lock for preventing unwanted access to a locked enclosure. |
US11397560B2 (en) | 2017-09-19 | 2022-07-26 | Bae Systems Controls Inc. | System and method for managing multi-core accesses to shared ports |
US10492074B2 (en) | 2018-02-07 | 2019-11-26 | Carrier Corporation | Credential synchronization for a mobile device |
US11538301B2 (en) * | 2018-05-25 | 2022-12-27 | Carrier Corporation | Privileged access and anti-theft protection for premises using lock box |
US10846964B2 (en) | 2018-06-01 | 2020-11-24 | Sentrilock, Llc | Electronic lockbox with interface to other electronic locks |
US11715339B1 (en) * | 2018-09-13 | 2023-08-01 | Armadillo Systems, Llc | Electronic lockbox with key retainer subassembly |
USD900589S1 (en) | 2019-08-07 | 2020-11-03 | Sentrilock, Llc | Electronic lock box |
US11010995B2 (en) | 2019-09-06 | 2021-05-18 | Videx, Inc. | Access control system with dynamic access permission processing |
Citations (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3337992A (en) * | 1965-12-03 | 1967-08-29 | Clyde A Tolson | Remotely controlled closures |
US3465131A (en) * | 1966-05-27 | 1969-09-02 | Robert S Ten Eyck | Metallic coded card with magnetic reed switch reader |
US3801742A (en) * | 1972-08-25 | 1974-04-02 | Schramm P | Remote electronic lock apparatus and methods |
US3857018A (en) * | 1973-12-07 | 1974-12-24 | Business Electronics Inc | Controlled access systems |
US3872435A (en) * | 1973-05-18 | 1975-03-18 | Victor L Cestaro | Opto-electronic security system |
US3878511A (en) * | 1973-12-03 | 1975-04-15 | Mosler Safe Co | Vault protected wtih electronic time and combination lock |
US3906447A (en) * | 1973-01-31 | 1975-09-16 | Paul A Crafton | Security system for lock and key protected secured areas |
US3927263A (en) * | 1973-03-21 | 1975-12-16 | Mi 2 | Programmable frequency-shift-keying acoustic transmitter to transmit repeated bit digital message via telephone lines |
US3941977A (en) * | 1972-09-01 | 1976-03-02 | The Mosler Safe Company | Off-line cash dispenser and banking system |
US3971916A (en) * | 1974-03-25 | 1976-07-27 | Societe Internationale | Methods of data storage and data storage systems |
US3996450A (en) * | 1975-03-31 | 1976-12-07 | Ncr Corporation | Secret number change routine |
US4079605A (en) * | 1976-05-03 | 1978-03-21 | Schlage Lock Company | Optical key reader for door locks |
US4092524A (en) * | 1975-05-13 | 1978-05-30 | Societe Internationale Pour L'innovation | Systems for storing and transferring data |
US4148092A (en) * | 1977-08-04 | 1979-04-03 | Ricky Martin | Electronic combination door lock with dead bolt sensing means |
US4148012A (en) * | 1975-09-26 | 1979-04-03 | Greer Hydraulics, Inc. | Access control system |
US4157534A (en) * | 1976-11-15 | 1979-06-05 | Jacob Schachter | Locking system for hotels |
US4201887A (en) * | 1978-05-11 | 1980-05-06 | Cordura Marketing, Inc. | Data telecommunications terminal |
US4209782A (en) * | 1976-08-05 | 1980-06-24 | Maximilian Wachtler | Method and circuit arrangement for the electronically controlled release of door, safe and function locks using electronically coded keys |
US4218690A (en) * | 1978-02-01 | 1980-08-19 | A-T-O, Inc. | Self-contained programmable terminal for security systems |
US4236068A (en) * | 1979-03-29 | 1980-11-25 | Walton Charles A | Personal identification and signaling system |
US4268721A (en) * | 1977-05-02 | 1981-05-19 | Sri International | Portable telephone communication device for the hearing impaired |
US4275385A (en) * | 1979-08-13 | 1981-06-23 | Bell Telephone Laboratories, Incorporated | Infrared personnel locator system |
US4296404A (en) * | 1979-10-18 | 1981-10-20 | Engineered Systems, Inc. | Remote verification lockout system |
US4325240A (en) * | 1979-09-17 | 1982-04-20 | Denis V. Bosley | Locking mechanism |
US4353064A (en) * | 1981-01-14 | 1982-10-05 | Honeywell Inc. | Battery operated access control card |
US4396914A (en) * | 1980-07-01 | 1983-08-02 | Scovill Inc. | Electronic security device |
US4411144A (en) * | 1976-04-16 | 1983-10-25 | Kadex, Inc. | Electronic lock system |
US4415893A (en) * | 1978-06-27 | 1983-11-15 | All-Lock Electronics, Inc. | Door control system |
US4436958A (en) * | 1982-06-30 | 1984-03-13 | Western Electric Company, Inc. | System using the telephone network to control locks at a number of remote locations |
US4439670A (en) * | 1979-11-30 | 1984-03-27 | Electronique Marcel Dassault | Method and device for the checking of the number of access attempts to an electronic store, notably that of an integrated circuit of an object such as a credit card or a buyer's card |
US4469917A (en) * | 1982-12-14 | 1984-09-04 | Shelley Edwin F | Time synchronized data transmission system |
US4509093A (en) * | 1982-07-09 | 1985-04-02 | Hulsbeck & Furst Gmbh & Co. Kg | Electronic locking device having key and lock parts interacting via electrical pulses |
US4525805A (en) * | 1982-12-20 | 1985-06-25 | Richard Prosan | Secure locking system employing radiant energy and electrical data transmission |
US4531237A (en) * | 1980-05-14 | 1985-07-23 | Bar On Yair | Energy conservation circuit for standby operation |
US4532783A (en) * | 1982-12-27 | 1985-08-06 | Maurice Thomas A | Double lock lock box |
US4558175A (en) * | 1982-08-02 | 1985-12-10 | Leonard J. Genest | Security system and method for securely communicating therein |
US4575719A (en) * | 1983-10-14 | 1986-03-11 | Avicom International, Inc. | Controlled access storage system |
US4594637A (en) * | 1985-02-21 | 1986-06-10 | Sidney Falk | Digital electronic lock system |
US4596985A (en) * | 1982-11-27 | 1986-06-24 | Kiekert Gmbh & Co. Kommanditgesellschaft | Radio-controlled lock method with automatic code change |
US4600829A (en) * | 1984-04-02 | 1986-07-15 | Walton Charles A | Electronic proximity identification and recognition system with isolated two-way coupling |
US4609780A (en) * | 1983-09-29 | 1986-09-02 | Azcorp Technology | Electronic secure entry system, apparatus and method |
US4646080A (en) * | 1984-05-17 | 1987-02-24 | Leonard J. Genest | Method of code changing for electronic lock |
US4655397A (en) * | 1984-01-09 | 1987-04-07 | Naan Mechanical Works | Vortex dripper |
US4656463A (en) * | 1983-04-21 | 1987-04-07 | Intelli-Tech Corporation | LIMIS systems, devices and methods |
US4686529A (en) * | 1984-01-06 | 1987-08-11 | Kiekert Gmbh & Co. Kommanditgesellschaft | Remote-control lock system |
US4713808A (en) * | 1985-11-27 | 1987-12-15 | A T & E Corporation | Watch pager system and communication protocol |
US4721954A (en) * | 1985-12-18 | 1988-01-26 | Marlee Electronics Corporation | Keypad security system |
US4727368A (en) * | 1985-12-30 | 1988-02-23 | Supra Products, Inc. | Electronic real estate lockbox system |
US4727369A (en) * | 1984-06-29 | 1988-02-23 | Sielox Systems, Inc. | Electronic lock and key system |
US4743898A (en) * | 1984-02-07 | 1988-05-10 | Talleres De Escoriaza, S.A. | Programmable electronic lock |
US4755799A (en) * | 1986-02-27 | 1988-07-05 | James Romano | Microcomputer controlled combination lock security system |
US4760393A (en) * | 1985-12-18 | 1988-07-26 | Marlee Electronics Corporation | Security entry system |
US4766746A (en) * | 1986-02-21 | 1988-08-30 | Supra Products, Inc. | Electronic real estate lockbox system |
US4777556A (en) * | 1986-08-22 | 1988-10-11 | Datatrak | Solenoid activation circuitry using high voltage |
US4800255A (en) * | 1986-08-22 | 1989-01-24 | Datatrak, Inc. | Electronic access card with visual display |
US4829296A (en) * | 1986-04-30 | 1989-05-09 | Carey S. Clark | Electronic lock system |
US4831374A (en) * | 1983-03-14 | 1989-05-16 | Barry Masel | Electric lock system |
US4851652A (en) * | 1988-04-20 | 1989-07-25 | Datatrak, Inc. | Electronic lock box, access card, system and method |
US4864115A (en) * | 1986-08-22 | 1989-09-05 | Datatrak, Inc. | Electronic access card having key pads and coils and combination using the same |
US4887078A (en) * | 1988-05-05 | 1989-12-12 | Jim Cho | DTMF-Code controlled lock device |
US4887292A (en) * | 1985-12-30 | 1989-12-12 | Supra Products, Inc. | Electronic lock system with improved data dissemination |
US4896246A (en) * | 1985-12-30 | 1990-01-23 | Supra Products, Inc. | Electronic lock with energy conservation features |
US4914732A (en) * | 1985-10-16 | 1990-04-03 | Supra Products, Inc. | Electronic key with interactive graphic user interface |
US4916443A (en) * | 1985-10-16 | 1990-04-10 | Supra Products, Inc. | Method and apparatus for compiling data relating to operation of an electronic lock system |
US4929880A (en) * | 1985-12-30 | 1990-05-29 | Supra Products, Inc. | Electronic lock system with battery conservation features |
US4931789A (en) * | 1983-11-01 | 1990-06-05 | Universal Photonix, Inc. | Apparatus and method for a universal electronic locking system |
US4947163A (en) * | 1985-10-16 | 1990-08-07 | Supra Products, Inc. | Electronic security system with configurable key |
US4962522A (en) * | 1987-12-04 | 1990-10-09 | Marian Michael B | Electronic controller for sprinkler systems |
US4972182A (en) * | 1987-10-27 | 1990-11-20 | A. A. Computerized Security Doors 1989 Ltd. | Electronic security lock |
US4988987A (en) * | 1985-12-30 | 1991-01-29 | Supra Products, Inc. | Keysafe system with timer/calendar features |
US5046084A (en) * | 1985-12-30 | 1991-09-03 | Supra Products, Inc. | Electronic real estate lockbox system with improved reporting capability |
US5113427A (en) * | 1987-03-31 | 1992-05-12 | Honda Giken Kogyo Kabushiki Kaisha | Radio-signal-responsive vehicle device control system |
US5124696A (en) * | 1989-04-21 | 1992-06-23 | Multacc Corporation | Electronic lock system |
US5237264A (en) * | 1987-07-30 | 1993-08-17 | Lutron Electronics Co., Inc. | Remotely controllable power control system |
US5245652A (en) * | 1985-10-16 | 1993-09-14 | Supra Products, Inc. | Secure entry system with acoustically coupled telephone interface |
Family Cites Families (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3812403A (en) * | 1972-06-29 | 1974-05-21 | K Gartner | Electronic combination lock including sequential signal generator and signal display |
US4066873A (en) | 1976-01-26 | 1978-01-03 | The First National Bank Of Chicago | Identification and access card with associated optical decoding means |
GB1582989A (en) | 1977-11-23 | 1981-01-21 | Motorola Inc | Security systems |
US4277837A (en) | 1977-12-30 | 1981-07-07 | International Business Machines Corporation | Personal portable terminal for financial transactions |
US4958632A (en) | 1978-07-20 | 1990-09-25 | Medtronic, Inc. | Adaptable, digital computer controlled cardiac pacemaker |
DE3009442A1 (en) | 1980-03-12 | 1981-09-17 | Geze Gmbh, 7250 Leonberg | CONTROL CIRCUIT FOR A SWIVEL DOOR LOCKING DEVICE |
FR2498819B1 (en) * | 1981-01-23 | 1985-05-31 | Thomson Csf | SMALL ANTENNA |
JPS57204645A (en) * | 1981-06-10 | 1982-12-15 | Nec Corp | Receiver for individual selective call |
FR2519160A1 (en) | 1981-12-30 | 1983-07-01 | Eldau Sarl | Code recognition system for card operated lock - comprises memory on card accessed through microprocessor when correct procedure is followed by processor at lock |
FR2542792A1 (en) | 1983-03-17 | 1984-09-21 | Centre Nat Rech Scient | Bolt assembly with a lock and key equipped with a calculating element |
SE8301957D0 (en) | 1983-04-08 | 1983-04-08 | Wso Cpu System Ab | Locking system |
GB2144249A (en) * | 1983-07-30 | 1985-02-27 | George Batey | Anti-theft device |
US4543955A (en) | 1983-08-01 | 1985-10-01 | Cordis Corporation | System for controlling body implantable action device |
US4525865A (en) | 1983-10-03 | 1985-06-25 | General Electric Company | Programmable radio |
US4665397A (en) | 1983-11-01 | 1987-05-12 | Universal Photonics, Inc. | Apparatus and method for a universal electronic locking system |
FR2556115B1 (en) | 1983-12-02 | 1987-05-07 | Lewiner Jacques | IMPROVEMENTS ON CODE CONTROL DEVICES |
GB8332995D0 (en) | 1983-12-09 | 1984-01-18 | Hickie C J | Identity device |
US4650981A (en) | 1984-01-26 | 1987-03-17 | Foletta Wayne S | Credit card with active electronics |
US4724528A (en) | 1984-05-08 | 1988-02-09 | Hewlett-Packard Company | Battery charge level monitor in a computer system |
US4677434A (en) * | 1984-10-17 | 1987-06-30 | Lotus Information Network Corp. | Access control system for transmitting data from a central station to a plurality of receiving stations and method therefor |
US4692604A (en) | 1984-10-25 | 1987-09-08 | American Telephone And Telegraph Company, At&T Bell Laboratories | Flexible inductor |
US4614861A (en) | 1984-11-15 | 1986-09-30 | Intellicard International, Inc. | Unitary, self-contained card verification and validation system and method |
US4605844A (en) | 1985-02-11 | 1986-08-12 | At&T Technologies, Inc. | Computerized transaction card with inductive data transfer |
US4740375A (en) * | 1985-02-25 | 1988-04-26 | Technology Unlimited, Inc. | Gelcores |
JPS61160566U (en) | 1985-03-25 | 1986-10-04 | ||
US4698630A (en) | 1985-06-12 | 1987-10-06 | American Locker Group Incorporated | Security system |
US4713661A (en) | 1985-08-16 | 1987-12-15 | Regency Electronics, Inc. | Transportation vehicle location monitor generating unique audible messages |
US4677284A (en) * | 1985-08-22 | 1987-06-30 | Genest Leonard Joseph | Multi-access security system |
US4837822A (en) | 1986-04-08 | 1989-06-06 | Schlage Lock Company | Cryptographic based electronic lock system and method of operation |
US5056141A (en) * | 1986-06-18 | 1991-10-08 | Dyke David W | Method and apparatus for the identification of personnel |
US4779090A (en) * | 1986-08-06 | 1988-10-18 | Micznik Isaiah B | Electronic security system with two-way communication between lock and key |
FR2604808A1 (en) | 1986-10-02 | 1988-04-08 | Bazin Gerard | Self-contained electronic identification device which can be remotely interrogated |
DE3782172T2 (en) | 1987-01-02 | 1993-02-18 | Motorola Inc | SYSTEM FOR OVER RADIO REPROGRAMMING OF COMMUNICATION RECEIVERS. |
US5020135A (en) | 1987-03-27 | 1991-05-28 | Teletec Corporation | Computerized multistandard, field-convertible, multiregional/multiservice, remote controllable, remote programmable mobile two-way radio system with digital serial bus link, built-in programmer and autodiagnostics |
US4845491A (en) * | 1987-05-15 | 1989-07-04 | Newspager Corporation Of America | Pager based information system |
US4870400A (en) | 1988-01-26 | 1989-09-26 | Yale Security Inc. | Electronic door lock key re-sequencing function |
US4951029A (en) | 1988-02-16 | 1990-08-21 | Interactive Technologies, Inc. | Micro-programmable security system |
US4885705A (en) * | 1988-02-25 | 1989-12-05 | Eastman Kodak Company | Expert system shell for building photofinishing diagnostic systems |
US4962449A (en) * | 1988-04-11 | 1990-10-09 | Artie Schlesinger | Computer security system having remote location recognition and remote location lock-out |
US5016273A (en) | 1989-01-09 | 1991-05-14 | At&E Corporation | Dual communication mode video tape recorder |
US5083122A (en) | 1989-02-21 | 1992-01-21 | Osi Security Devices | Programmable individualized security system for door locks |
WO1990013096A1 (en) | 1989-04-14 | 1990-11-01 | At&E Corporation | Credit card with communication capability |
NL8900949A (en) | 1989-04-17 | 1990-11-16 | Nedap Nv | MULTIFUNCTIONAL IDENTIFICATION AND INFORMATION CARD. |
US5014049A (en) * | 1989-04-21 | 1991-05-07 | Multacc Corporation | Electronic lock system |
US5140317A (en) | 1990-05-11 | 1992-08-18 | Medeco Security Locks, Inc. | Electronic security system |
US5204663A (en) | 1990-05-21 | 1993-04-20 | Applied Systems Institute, Inc. | Smart card access control system |
WO1991020026A1 (en) | 1990-06-14 | 1991-12-26 | Medeco Security Locks, Inc. | Distributed database security system |
US5134869A (en) * | 1990-09-10 | 1992-08-04 | Multacc Corporation | Keysafe resetting mechanism |
NO300045B1 (en) | 1990-12-03 | 1997-03-24 | Trioving As | Time controlled electrically controlled locking system |
US5198643A (en) | 1991-02-26 | 1993-03-30 | Computerized Security Systems, Inc. | Adaptable electronic key and lock system |
EP0520249B1 (en) * | 1991-06-27 | 1996-02-28 | CARL ZEISS JENA GmbH | High frequency excited laser for high input power, in particular CO2 slab waveguide laser |
IL99716A (en) | 1991-10-11 | 1996-09-12 | Technolock Engineering | Door locking system |
US5412192A (en) | 1993-07-20 | 1995-05-02 | American Express Company | Radio frequency activated charge card |
US5397884A (en) | 1993-10-12 | 1995-03-14 | Saliga; Thomas V. | Electronic kay storing time-varying code segments generated by a central computer and operating with synchronized off-line locks |
-
1993
- 1993-10-15 US US08/138,555 patent/US6822553B1/en active Active
-
1995
- 1995-06-07 US US08/483,823 patent/US5602536A/en not_active Expired - Lifetime
- 1995-06-07 US US08/486,954 patent/US6842105B1/en not_active Expired - Fee Related
-
2004
- 2004-11-15 US US10/989,902 patent/US20050168320A1/en not_active Abandoned
Patent Citations (75)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3337992A (en) * | 1965-12-03 | 1967-08-29 | Clyde A Tolson | Remotely controlled closures |
US3465131A (en) * | 1966-05-27 | 1969-09-02 | Robert S Ten Eyck | Metallic coded card with magnetic reed switch reader |
US3801742A (en) * | 1972-08-25 | 1974-04-02 | Schramm P | Remote electronic lock apparatus and methods |
US3941977A (en) * | 1972-09-01 | 1976-03-02 | The Mosler Safe Company | Off-line cash dispenser and banking system |
US3906447A (en) * | 1973-01-31 | 1975-09-16 | Paul A Crafton | Security system for lock and key protected secured areas |
US3927263A (en) * | 1973-03-21 | 1975-12-16 | Mi 2 | Programmable frequency-shift-keying acoustic transmitter to transmit repeated bit digital message via telephone lines |
US3872435A (en) * | 1973-05-18 | 1975-03-18 | Victor L Cestaro | Opto-electronic security system |
US3878511A (en) * | 1973-12-03 | 1975-04-15 | Mosler Safe Co | Vault protected wtih electronic time and combination lock |
US3857018A (en) * | 1973-12-07 | 1974-12-24 | Business Electronics Inc | Controlled access systems |
US3971916A (en) * | 1974-03-25 | 1976-07-27 | Societe Internationale | Methods of data storage and data storage systems |
US3996450A (en) * | 1975-03-31 | 1976-12-07 | Ncr Corporation | Secret number change routine |
US4092524A (en) * | 1975-05-13 | 1978-05-30 | Societe Internationale Pour L'innovation | Systems for storing and transferring data |
US4148012A (en) * | 1975-09-26 | 1979-04-03 | Greer Hydraulics, Inc. | Access control system |
US4411144A (en) * | 1976-04-16 | 1983-10-25 | Kadex, Inc. | Electronic lock system |
US4079605A (en) * | 1976-05-03 | 1978-03-21 | Schlage Lock Company | Optical key reader for door locks |
US4209782A (en) * | 1976-08-05 | 1980-06-24 | Maximilian Wachtler | Method and circuit arrangement for the electronically controlled release of door, safe and function locks using electronically coded keys |
US4157534A (en) * | 1976-11-15 | 1979-06-05 | Jacob Schachter | Locking system for hotels |
US4268721A (en) * | 1977-05-02 | 1981-05-19 | Sri International | Portable telephone communication device for the hearing impaired |
US4148092A (en) * | 1977-08-04 | 1979-04-03 | Ricky Martin | Electronic combination door lock with dead bolt sensing means |
US4218690A (en) * | 1978-02-01 | 1980-08-19 | A-T-O, Inc. | Self-contained programmable terminal for security systems |
US4201887A (en) * | 1978-05-11 | 1980-05-06 | Cordura Marketing, Inc. | Data telecommunications terminal |
US4415893A (en) * | 1978-06-27 | 1983-11-15 | All-Lock Electronics, Inc. | Door control system |
US4236068A (en) * | 1979-03-29 | 1980-11-25 | Walton Charles A | Personal identification and signaling system |
US4275385A (en) * | 1979-08-13 | 1981-06-23 | Bell Telephone Laboratories, Incorporated | Infrared personnel locator system |
US4325240A (en) * | 1979-09-17 | 1982-04-20 | Denis V. Bosley | Locking mechanism |
US4296404A (en) * | 1979-10-18 | 1981-10-20 | Engineered Systems, Inc. | Remote verification lockout system |
US4439670A (en) * | 1979-11-30 | 1984-03-27 | Electronique Marcel Dassault | Method and device for the checking of the number of access attempts to an electronic store, notably that of an integrated circuit of an object such as a credit card or a buyer's card |
US4531237A (en) * | 1980-05-14 | 1985-07-23 | Bar On Yair | Energy conservation circuit for standby operation |
US4396914A (en) * | 1980-07-01 | 1983-08-02 | Scovill Inc. | Electronic security device |
US4353064A (en) * | 1981-01-14 | 1982-10-05 | Honeywell Inc. | Battery operated access control card |
US4436958A (en) * | 1982-06-30 | 1984-03-13 | Western Electric Company, Inc. | System using the telephone network to control locks at a number of remote locations |
US4509093A (en) * | 1982-07-09 | 1985-04-02 | Hulsbeck & Furst Gmbh & Co. Kg | Electronic locking device having key and lock parts interacting via electrical pulses |
US4558175A (en) * | 1982-08-02 | 1985-12-10 | Leonard J. Genest | Security system and method for securely communicating therein |
US4596985A (en) * | 1982-11-27 | 1986-06-24 | Kiekert Gmbh & Co. Kommanditgesellschaft | Radio-controlled lock method with automatic code change |
US4469917A (en) * | 1982-12-14 | 1984-09-04 | Shelley Edwin F | Time synchronized data transmission system |
US4525805A (en) * | 1982-12-20 | 1985-06-25 | Richard Prosan | Secure locking system employing radiant energy and electrical data transmission |
US4532783A (en) * | 1982-12-27 | 1985-08-06 | Maurice Thomas A | Double lock lock box |
US4831374A (en) * | 1983-03-14 | 1989-05-16 | Barry Masel | Electric lock system |
US4656463A (en) * | 1983-04-21 | 1987-04-07 | Intelli-Tech Corporation | LIMIS systems, devices and methods |
US4609780A (en) * | 1983-09-29 | 1986-09-02 | Azcorp Technology | Electronic secure entry system, apparatus and method |
US4575719A (en) * | 1983-10-14 | 1986-03-11 | Avicom International, Inc. | Controlled access storage system |
US4931789A (en) * | 1983-11-01 | 1990-06-05 | Universal Photonix, Inc. | Apparatus and method for a universal electronic locking system |
US4686529A (en) * | 1984-01-06 | 1987-08-11 | Kiekert Gmbh & Co. Kommanditgesellschaft | Remote-control lock system |
US4655397A (en) * | 1984-01-09 | 1987-04-07 | Naan Mechanical Works | Vortex dripper |
US4743898A (en) * | 1984-02-07 | 1988-05-10 | Talleres De Escoriaza, S.A. | Programmable electronic lock |
US4600829A (en) * | 1984-04-02 | 1986-07-15 | Walton Charles A | Electronic proximity identification and recognition system with isolated two-way coupling |
US4646080A (en) * | 1984-05-17 | 1987-02-24 | Leonard J. Genest | Method of code changing for electronic lock |
US4727369A (en) * | 1984-06-29 | 1988-02-23 | Sielox Systems, Inc. | Electronic lock and key system |
US4594637A (en) * | 1985-02-21 | 1986-06-10 | Sidney Falk | Digital electronic lock system |
US4947163A (en) * | 1985-10-16 | 1990-08-07 | Supra Products, Inc. | Electronic security system with configurable key |
US4916443A (en) * | 1985-10-16 | 1990-04-10 | Supra Products, Inc. | Method and apparatus for compiling data relating to operation of an electronic lock system |
US4914732A (en) * | 1985-10-16 | 1990-04-03 | Supra Products, Inc. | Electronic key with interactive graphic user interface |
US5245652A (en) * | 1985-10-16 | 1993-09-14 | Supra Products, Inc. | Secure entry system with acoustically coupled telephone interface |
US4713808A (en) * | 1985-11-27 | 1987-12-15 | A T & E Corporation | Watch pager system and communication protocol |
US4721954A (en) * | 1985-12-18 | 1988-01-26 | Marlee Electronics Corporation | Keypad security system |
US4760393A (en) * | 1985-12-18 | 1988-07-26 | Marlee Electronics Corporation | Security entry system |
US4727368A (en) * | 1985-12-30 | 1988-02-23 | Supra Products, Inc. | Electronic real estate lockbox system |
US4988987A (en) * | 1985-12-30 | 1991-01-29 | Supra Products, Inc. | Keysafe system with timer/calendar features |
US5046084A (en) * | 1985-12-30 | 1991-09-03 | Supra Products, Inc. | Electronic real estate lockbox system with improved reporting capability |
US4887292A (en) * | 1985-12-30 | 1989-12-12 | Supra Products, Inc. | Electronic lock system with improved data dissemination |
US4929880A (en) * | 1985-12-30 | 1990-05-29 | Supra Products, Inc. | Electronic lock system with battery conservation features |
US4896246A (en) * | 1985-12-30 | 1990-01-23 | Supra Products, Inc. | Electronic lock with energy conservation features |
US4766746A (en) * | 1986-02-21 | 1988-08-30 | Supra Products, Inc. | Electronic real estate lockbox system |
US4755799A (en) * | 1986-02-27 | 1988-07-05 | James Romano | Microcomputer controlled combination lock security system |
US4829296A (en) * | 1986-04-30 | 1989-05-09 | Carey S. Clark | Electronic lock system |
US4800255A (en) * | 1986-08-22 | 1989-01-24 | Datatrak, Inc. | Electronic access card with visual display |
US4864115A (en) * | 1986-08-22 | 1989-09-05 | Datatrak, Inc. | Electronic access card having key pads and coils and combination using the same |
US4777556A (en) * | 1986-08-22 | 1988-10-11 | Datatrak | Solenoid activation circuitry using high voltage |
US5113427A (en) * | 1987-03-31 | 1992-05-12 | Honda Giken Kogyo Kabushiki Kaisha | Radio-signal-responsive vehicle device control system |
US5237264A (en) * | 1987-07-30 | 1993-08-17 | Lutron Electronics Co., Inc. | Remotely controllable power control system |
US4972182A (en) * | 1987-10-27 | 1990-11-20 | A. A. Computerized Security Doors 1989 Ltd. | Electronic security lock |
US4962522A (en) * | 1987-12-04 | 1990-10-09 | Marian Michael B | Electronic controller for sprinkler systems |
US4851652A (en) * | 1988-04-20 | 1989-07-25 | Datatrak, Inc. | Electronic lock box, access card, system and method |
US4887078A (en) * | 1988-05-05 | 1989-12-12 | Jim Cho | DTMF-Code controlled lock device |
US5124696A (en) * | 1989-04-21 | 1992-06-23 | Multacc Corporation | Electronic lock system |
Cited By (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050205657A1 (en) * | 2002-01-24 | 2005-09-22 | Moorhouse John H | Optical security system |
US7073708B2 (en) * | 2002-01-24 | 2006-07-11 | John H. Moorhouse | Optical security system |
US7108182B2 (en) * | 2002-01-24 | 2006-09-19 | John H. Moorhouse | Optical security system |
US20060237522A1 (en) * | 2002-01-24 | 2006-10-26 | John Moorhouse | Optical security system |
US20040256461A1 (en) * | 2002-01-24 | 2004-12-23 | Moorhouse John H. | Optical security system |
WO2006093713A1 (en) * | 2005-03-01 | 2006-09-08 | Moorhouse John H | Optical security system |
US8593249B2 (en) * | 2005-03-18 | 2013-11-26 | Phoniro Ab | Method for unlocking a lock by a lock device enabled for short-range wireless data communication in compliance with a communication standard and associated device |
US20090184801A1 (en) * | 2005-03-18 | 2009-07-23 | Olle Bliding | Method for Unlocking a Lock by a Lock Device Enabled for Short-Range Wireless Data Communication in Compliance With a Communication Standard and Associated Device |
US20070271112A1 (en) * | 2006-05-16 | 2007-11-22 | Lpd, Llc | Dynamic electronic door lock control system |
US8902042B2 (en) | 2006-05-16 | 2014-12-02 | Lpd, L.L.C. | Methods of controlling access to real estate properties |
EP1860617A2 (en) * | 2006-05-23 | 2007-11-28 | Nissan Motor Manufacturing (Uk) Ltd | Security systems |
US8063734B2 (en) | 2006-11-06 | 2011-11-22 | Harrow Products Llc | Access control system wherein the remote device is automatically updated with a central user list from the central station upon use of the remote device |
US20080106369A1 (en) * | 2006-11-06 | 2008-05-08 | Harrow Products Llc | Access control system |
US8085125B2 (en) * | 2007-09-08 | 2011-12-27 | Nima Bigdely-Shamlo | Method, apparatus, and system for an electronic key usage history indicator |
US20090064746A1 (en) * | 2007-09-08 | 2009-03-12 | Nima Bigdely Shamlo | Method, apparatus, and system for an electronic key usage history indicator |
US20100268379A1 (en) * | 2008-02-28 | 2010-10-21 | Woodard Scott E | Integrated real estate showing scheduling and key dispensing system |
US8754744B2 (en) * | 2008-02-28 | 2014-06-17 | Showingtime.Com, Inc. | Integrated real estate showing scheduling and key dispensing system |
US20100223170A1 (en) * | 2009-02-27 | 2010-09-02 | Reuben Bahar | Method and system for real estate marketing |
US9194157B2 (en) * | 2009-02-27 | 2015-11-24 | Reuben Bahar | Method and system for real estate marketing |
EP2355050A3 (en) * | 2010-01-29 | 2012-09-05 | Assa Abloy Hospitality, Inc. | Method and system for permitting remote check-in and coordinating access control |
US8730004B2 (en) | 2010-01-29 | 2014-05-20 | Assa Abloy Hospitality, Inc. | Method and system for permitting remote check-in and coordinating access control |
US9818244B2 (en) | 2010-01-29 | 2017-11-14 | Assa Abloy Ab | Method and system for permitting remote check-in and coordinating access control |
US20110187493A1 (en) * | 2010-01-29 | 2011-08-04 | Assa Abloy Hospitality, Inc. | Method and system for permitting remote check-in and coordinating access control |
US9460480B2 (en) | 2010-04-09 | 2016-10-04 | Showingtime.Com, Inc. | Integrated real estate showing scheduling and key management system |
US8307677B2 (en) * | 2011-01-06 | 2012-11-13 | Utc Fire & Security Corporation | Key container with security liner |
US9438585B2 (en) | 2011-01-06 | 2016-09-06 | Utc Fire & Security Corporation | Trusted vendor access |
US9135422B2 (en) | 2011-01-06 | 2015-09-15 | Utc Fire & Security Corporation | Trusted vendor access |
US8640513B2 (en) * | 2011-06-22 | 2014-02-04 | The Stanley Works Israel Ltd. | Electronic and manual lock assembly |
US8640514B2 (en) | 2011-06-22 | 2014-02-04 | The Stanley Works Israel Ltd. | Electronic and manual lock assembly |
US20130009770A1 (en) * | 2011-07-06 | 2013-01-10 | Checkpoint Systems, Inc. | Method and apparatus for powering a security device |
US9171439B2 (en) * | 2011-07-06 | 2015-10-27 | Checkpoint Systems, Inc. | Method and apparatus for powering a security device |
WO2015026918A1 (en) * | 2013-08-23 | 2015-02-26 | Invue Security Products Inc. | Quick release security device |
CN105659564A (en) * | 2013-09-20 | 2016-06-08 | 萨金特和格林利夫公司 | System and method of initializing and controlling locks |
WO2015042502A1 (en) * | 2013-09-20 | 2015-03-26 | Sargent & Greenleaf, Inc. | System and method of initializing and controlling locks |
US9761071B2 (en) | 2014-04-29 | 2017-09-12 | Showingtime.Com, Inc. | Integrated real estate showing scheduling and key management system |
AT516288B1 (en) * | 2014-09-19 | 2024-09-15 | Evva Sicherheitstechnologie | Method and device for managing access authorizations |
EP3009992A1 (en) * | 2014-09-19 | 2016-04-20 | EVVA Sicherheitstechnologie GmbH | Method and device for managing access rights |
US20180241439A1 (en) * | 2015-08-20 | 2018-08-23 | Philips Lighting Holding B.V. | Transmitting logical dali signals wirelessly |
US9734646B1 (en) | 2016-04-29 | 2017-08-15 | John P. Noell | System, method, and apparatus for accessing real estate property |
US10026248B2 (en) | 2016-08-29 | 2018-07-17 | ShowingTime.com | Integrated real estate showing scheduling and key management system |
US11676227B2 (en) | 2018-06-27 | 2023-06-13 | MFTB Holdco, Inc. | Managing real estate listing showings based on multiple factors |
US10885596B1 (en) | 2018-06-27 | 2021-01-05 | Showingtime.Com Inc. | System and method for managing showings of real estate listings based on multiple factors |
US11379938B1 (en) | 2018-06-27 | 2022-07-05 | Showingtime.Com, Inc. | System and method for managing real estate listing showings based on multiple factors |
US11954650B2 (en) | 2018-06-27 | 2024-04-09 | MFTB Holdco, Inc. | Managing in-person property access using geofences |
US10713740B1 (en) | 2018-12-29 | 2020-07-14 | Showingtime.Com, Inc. | Electronic device for providing access to properties |
US20230184007A1 (en) * | 2019-03-27 | 2023-06-15 | Sentrilock, Llc | Electronic lockbox |
US11802421B2 (en) * | 2019-03-27 | 2023-10-31 | Sentrilock, Llc | Latching apparatus for an electronic lockbox |
US11935196B2 (en) | 2019-11-12 | 2024-03-19 | MFTB Holdco, Inc. | Presenting building information using building models |
US11574373B1 (en) | 2020-04-20 | 2023-02-07 | MFTB Holdco, Inc. | Multi-party virtual showing system with configurable independent communication channels and data |
US11600121B2 (en) | 2020-07-21 | 2023-03-07 | Unitedhealth Group Incorporated | Systems and methods for conditional remote unlocking of identified containers |
US11468985B2 (en) | 2020-08-04 | 2022-10-11 | Showingtime.Com, Inc. | System and method for managing property showing appointments based on health parameters |
US12125590B2 (en) | 2020-08-04 | 2024-10-22 | MFTB Holdco, Inc. | Controlling physical property access using health parameters |
US11580503B1 (en) | 2020-10-23 | 2023-02-14 | MFTB Holdco, Inc. | System and method for managing and automatically rescheduling showings of real estate listings based on multiple factors |
USD1012481S1 (en) | 2020-10-29 | 2024-01-30 | Unitedhealth Group Incorporated | Storage container assembly |
Also Published As
Publication number | Publication date |
---|---|
US5602536A (en) | 1997-02-11 |
US6842105B1 (en) | 2005-01-11 |
US6822553B1 (en) | 2004-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4766746A (en) | Electronic real estate lockbox system | |
US4947163A (en) | Electronic security system with configurable key | |
US4988987A (en) | Keysafe system with timer/calendar features | |
US4929880A (en) | Electronic lock system with battery conservation features | |
US4887292A (en) | Electronic lock system with improved data dissemination | |
US4914732A (en) | Electronic key with interactive graphic user interface | |
US4916443A (en) | Method and apparatus for compiling data relating to operation of an electronic lock system | |
CA1306531C (en) | Electronic lock system with timer/calendar features | |
US5046084A (en) | Electronic real estate lockbox system with improved reporting capability | |
US5245652A (en) | Secure entry system with acoustically coupled telephone interface | |
US6842105B1 (en) | Dual mode data logging | |
US4896246A (en) | Electronic lock with energy conservation features | |
US10984625B2 (en) | Intelligent key system | |
US6097306A (en) | Programmable lock and security system therefor | |
US8274365B2 (en) | Smart lock system | |
US7880585B1 (en) | Storage locker having a remotely activated lockout feature | |
US5349345A (en) | Electronic lock | |
US4926665A (en) | Remotely programmable key and programming means therefor | |
US20040160305A1 (en) | Electronic access control system | |
US20110156866A1 (en) | Electronic Access Control Device and Management System | |
US20110289123A1 (en) | Method for Controlling and Recording the Security of an Enclosure | |
US20120011366A1 (en) | Method for Controlling and Recording the Security of an Enclosure | |
US20110087370A1 (en) | Electronic Access Control Device and Management System | |
US20110082882A1 (en) | Electronic Access Control Device and Management System | |
US8633799B1 (en) | Lock with remotely activated lockout feature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GENERAL ELECTRIC COMPANY, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HENDERSON, WALTER G.;LARSON, WAYNE F.;BARRETT, PHILIP;REEL/FRAME:016057/0667;SIGNING DATES FROM 20050322 TO 20050324 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |