Claims
- 1. An electronic lock system comprising:
- an electronic lock;
- an electronic key;
- lock memory means in the lock for storing data relating to prior interactions of the lock with keys;
- key memory means in the key operable without user intervention each time the key interacts with a lock, for obtaining data from the lock relating to at least one prior interaction of the lock with a key;
- a database; and
- means for downloading data from the key memory means to the database.
- 2. The electronic lock system of claim 1 which further comprises means for limiting utility of the key if the data stored therein is not periodically downloaded to the database.
- 3. The electronic lock system of claim 1 in which the key memory means additionally includes means for storing data relating to the current key/lock interaction.
- 4. The electronic lock system of claim 1 in which the key memory means includes means for obtaining data relating to some but not all prior interactions of the lock with a key.
- 5. A method of compiling data relating to operation of an electronic locking system that includes locks and keys, comprising the steps:
- collecting data in the locks relating to system operation;
- transferring without user intervention a portion of a lock's collected data to a key coupled thereto each time a key is coupled to the lock, said portion including data relating to at least one prior operation of the lock with a key; and
- periodically transferring said data from the key to a central database.
- 6. The method of claim 5 which further comprises the step of processing the data compiled in the database to remove duplicate data therefrom.
- 7. The method of claim 5 which further comprises the step of limiting utility of the key if data is not transferred from the key to the database periodically.
- 8. A method of compiling data operation of an electronic locking system having a lock and a plurality of keys in which the lock has a memory for accumulating transactional data, comprising the steps:
- transferring a first dataset comprising transactional data about n preceding lock transactions from a lock to a first key, where n is greater than zero;
- transferring a second dataset comprising transactional data about n preceding lock transactions from said lock to a next, second key coupled thereto, said second data set having data about one transaction not included in the first dataset and said first dataset having data about one transaction not included in the second dataset; and
- transferring said first and second datasets to a database.
- 9. The method of claim 8 which further comprises the step of removing duplicate data from the database.
- 10. In a method of operating an electronic real estate lockbox system that includes an electronic key and an electronic lockbox, the electronic key having a memory, an improvement comprising the steps:
- each time the key is involved in a first lockbox transaction, storing data in the key memory relating to said first transaction without user intervention;
- each time the key is involved in a second lockbox transaction, storing additional data in the key memory relating to said second transaction without user intervention; and
- subsequently downloading the data relating to said first and second lockbox transactions to a computer.
- 11. A method of relaying lock/key transactional data from the memory of at least one electronic lock to a remote database, said lock being operable with electronic keys that have memories for receiving data from the lock memory, the method comprising the steps:
- each time the lock is operated with a key, transferring data related to N prior lock/key transactions from the lock memory to the key memory, where N is greater than 1; and
- transferring said data from the key memory to a database;
- wherein data related to each lock/key interaction can potentially be relayed from the lock to the database by N different keys, thereby increasing reliability and reducing data latency.
RELATED APPLICATION DATA
This application is a continuation-in-part of copending application 192,834, now abandoned, filed May 11, 1988, which in turn is a division of copending application Ser. No. 015,864, filed Feb. 17, 1987, now Pat. No. 4,766,746, which in turn is a continuation-in-part of Ser. No. 831,601, filed Feb. 21, 1986, now Pat. No. 4,727,368, which in turn is a continuation-in-part of Ser. No. 814,364, filed Dec. 30, 1985, now abandoned, which in turn is a continuation-in-part of Ser. No. 788,072, filed Oct. 16, 1985, now abandoned. These applications are incorporated herein by reference.
US Referenced Citations (19)
Foreign Referenced Citations (4)
Number |
Date |
Country |
2478178 |
Mar 1981 |
FRX |
2519160 |
Dec 1981 |
FRX |
1582989 |
Jan 1981 |
GBX |
2171144 |
Jun 1985 |
GBX |
Non-Patent Literature Citations (10)
Entry |
"EAC-1000 Electronic Access Control System Operation Manual," Supra Products, Inc., Feb. 1, 1985. |
Supra Products, Inc. brochure, "Agent Key for the EAC-1000 Key Safe System," 1982. |
Supra Products, Inc. brochure, "A New Dimension In Key Box Systems, By Supra, The EAC-1000 Key Safe System," 1982. |
Supra Products, Inc. brocure "EAC-1000, Documented Electronic Access Control System From Supra," 1982. |
"SECURENTRY," by AZCORP Technology. |
"SECURENTRY System AZCORP Technology," by AZCORP Technology. |
"SECURENTRY System, The Most Advanced Electronic Lockbox System," by AZCORP Technology. |
"PCR with Electronic Market Data Module," Multacc Corporation brochure. |
"EK-100, the Ultimate Property Access Keysafe System," Multacc Corporation brochure. |
"PCR I, One of the Property Access Keysafe Systems," Multacc Corporation brochure. |
Divisions (1)
|
Number |
Date |
Country |
Parent |
15864 |
Feb 1987 |
|
Continuation in Parts (4)
|
Number |
Date |
Country |
Parent |
192834 |
May 1988 |
|
Parent |
831601 |
Feb 1986 |
|
Parent |
814364 |
Dec 1985 |
|
Parent |
788072 |
Oct 1985 |
|