Not Applicable
Not Applicable
Not Applicable
Not Applicable
1. Field of the Invention
The field of the invention relates to lockboxes generally, and more particularly to certain new and useful advances in electronically accessing the same, as well as keyboxes, electronic locks and the like, of which the following is a specification, reference being had to the drawings accompanying and forming a part of the same.
2. Description of Related Art
Traditional lockboxes are used to store objects, such as keys, for use by one or more authorized persons. Such lockboxes have mechanical locks or electronic locks. Some electronic lockboxes are equipped with wireless transceivers that allow them to communicate with a wireless handheld device operated by a user using short-range wireless communication protocols. Some electronic lockboxes equipped with wireless transceivers are configured to communicate with one or more remote access control servers using long-range wireless communication protocols.
Short codes are phone numbers shorter than ten (10) digits. When a SMS is sent to a short code, the telecommunications carrier recognizes the SMS as a service request and routes the text in the message to the appropriate service provider, which then provides and/or charges for the requested service.
The present disclosure describes embodiments of a method for accessing a locked object, such as, but not limited to, a lockbox, a keybox and electronic lock, etc. The method uses SMS messages to request, pay for and obtain access rights to the locked object.
One problem addressed by embodiments of the invention is how to charge requestors for access to a locked object. Embodiments of the method described herein provide a way to charge the requestor's regular cellular or wireless telephone bill, and a way to aggregate the charges from multiple keyholders into a single payment from a SMS aggregator. In one embodiment, a requestor is a keyholder, e.g. someone previously authorized, by wireless key device, smartcard or other means, to access a locked object one or more times. A non-limiting example of a keyholder is a real estate agent or broker that has been granted authority to access one or more real-estate lockboxes. Alternatively, a requestor is a non-keyholder, e.g., someone not previously authorized to access a locked object. Non-limiting examples of a non-keyholder are: plumbers, painters, electricians, landscapers, architects, contractors, designers, housesitters and the like.
Another problem is how to allow requestors to interact with, and gain authorized access to, a locked object. Use of SMS short codes solves this problem because it allows non-keyholders to request access to a locked object and to pay for this access.
Other features and advantages of the disclosure will become apparent by reference to the following description taken in connection with the accompanying drawings.
Reference is now made briefly to the accompanying drawings, in which:
Like reference characters designate identical or corresponding components and units throughout the several views, which are not to scale unless otherwise indicated.
As used herein, an element or function recited in the singular and proceeded with the word “a” or “an” should be understood as not excluding plural said elements or functions, unless such exclusion is explicitly recited. Furthermore, references to “one embodiment” of the claimed invention should not be interpreted as excluding the existence of additional embodiments that also incorporate the recited features.
Referring again to
First, the locked object 111 is equipped with an electronic or digital lock 102 (
Second, the wireless communication device 120 is not only configured to communicate with the Approval Authority computer 130 as noted above, but is also configured to wireless communicate with the locked object 111 over a local area network (“LAN”) 190. In other words, the wireless communication device 120 is configured to wirelessly transmit the access code 180 directly to the locked object 111 over the LAN 190, with or without communicating the access code 180 to the user.
Third, and alternatively, the Approval Authority computer 130 is configured to communicate with the locked object 111 over the WAN 170. In other words, the Approval Authority computer 130 is configured to transmit (i) the SMS reply 160 (containing at least one of a denial message, an approval message, an access code, a billing message, a Double-Opt-In message, a combination of the approval message and the access code, or a combination of the access code, the approval message and the billing message) and (ii) the access code 180 by itself to the locked object 111. In turn, the locked object 111 is configured to communicate, e.g., display and/or broadcast via a speaker, the approval message, the denial message, the Double-Opt-In message, a combination of the approval message and the access code, or a combination of the access code, the approval message and the billing message. If the SMS Reply 160 contains the Double-Opt-In message, the requestor's wireless communication device 120 is configured to transmit a SMS Reply 151 that contains a user acceptance or a user refusal back to the Approval Authority computer 130 over the WAN 170.
Fourthly, and alternatively, the locked object 111 is configured to transmit the data 140 over the LAN 190 to the wireless communication device 120. In such an embodiment, the data 140 transmitted by the locked object 111 comprises at least one of: a locked object identifier, a telephone number of a building with which the locked object 111 is associated, a GPS coordinate of the locked object 111, a GPS coordinate of an area proximate the locked object 111, an address of a building or object with which the locked object 111 is associated, and so forth. Each of these types of data may be stored in the computer-readable memory 106 (
In operation, the user inputs data 140 into the locked object 111 using a user interface 103 (
In each of
Additionally, in each of
The first SMS message 150 may further comprise other types of data. For example, the first SMS message 150 may further comprise a telephone number of the requestor's wireless communication device 120. The Approval Authority computer 130 is configured to use the received telephone number to determine whether access should be granted and/or to charge one or more predetermined fees for the access. The Approval Authority computer 130 may be configured to transmit the received telephone number of the requestor's wireless communication device 120 in the billing data 195 to the biller 198, which can then bill the requestor directly.
For example, the Approval Authority computer 130 may further be configured to compare the received telephone number with a computer-readable database, e.g., a list of blocked telephone numbers, for which access should not be granted. This list of blocked telephone numbers may include, but is not limited to, (a) telephone numbers of wireless communication devices reported lost, missing or stolen and (b) telephone numbers of persons for which access should not be granted, e.g., persons listed on watch lists, persons listed as failing background checks, etc. In such an embodiment, the Approval Authority computer 130 is configured to transmit an access code back to the wireless communication device 120, and/or to charge, or initiate charging, one or more predetermined fees to the received telephone number of the requestor's wireless communication device 120, if the received telephone number does not appear on the list of blocked telephone numbers.
The first SMS message 150 may also comprise a predetermined personal identification number “PIN”. In one embodiment, the PIN is an identifier, such as an employee identification number, a license number, etc., that is uniquely associated with an identity of a requestor (e.g., a user of the wireless communication device). Additionally, or alternatively, the PIN is a security password that the requestor provides in the first SMS message, or in a subsequent SMS message, as part of a multi-factor security procedure. For example, in one embodiment, the handheld wireless device, or possession thereof, is the first security factor, and the password is the second security factor.
The PIN may comprise some or all of the data 140 input by the requestor to the wireless communication device 120 or to the locked object 111. In either case, the Approval Authority computer 130 is configured to use the received PIN to determine, or confirm, whether the requested access to the locked object 111 should be granted, and to determine and/or record an identity of the requestor. For example, the Approval Authority computer 130 is configured to compare the received PIN with the computer readable database, which alternatively, or in addition to, the list of locked object identifiers and/or list of blocked telephone numbers, comprises a previously-created list of PINs. This database is stored in a computer-readable memory that is local to or remote from the Approval Authority computer 130. Each PIN in the list of PINs is associated with at least a name of a requestor. Each PIN in the list of PINs may further be associated with a locked object identifier and/or an access code unique thereto. Consequently, when the Approval Authority computer 130 locates a received PIN in the database, the Approval Authority computer 130 will determine which access code to transmit back to the wireless communication device 120 (or to the locked object 111, if the locked object 111 is equipped with a wireless transceiver).
Wireless Communication Device and/or Locked Object
Each block, or combination of blocks, in each of
Referring to
If the Approval Authority computer 130 determines the requested access can be granted, the method 700 further comprises, as represented by block 704, receiving a SMS reply 160 (or access code 180 only). The SMS reply 160 (or access code 180 only) is received and processed by the requestor's wireless communication device 120. Alternatively, the SMS reply 160 (or access code 180 only) is received and processed by a computer processor 105 of the locked object 111.
If the SMS reply 160 (or access code 180 only) is received by the requestor's wireless communication device 120, the method 700 further comprises, as represented by block 706, communicating the SMS Reply 160 (or access code 180 only) to the requestor via the user interface 123 and/or speaker 122. Thereafter, the requestor manually inputs the access code 180 into a user interface 199 or 103, such as a keypad, touch screen, or combination lock, of the locked object 110, 111 to unlock and/or open it. Alternatively, the method 700 further comprises, as represented by block 714, wirelessly sending the access code 180, from the requestor's wireless communication device 120 or from the Approval Authority computer 130, to the locked object 111; and further comprises, as represented by block 712, unlocking and/or opening the locked object 111.
In an alternate embodiment, the method 700 proceeds from block 702 and further comprises, as represented by block 708, receiving a Double-Opt-In Message, which is one example of the SMS Reply 160. Sent from the Approval Authority computer 130, the Double-Opt-In Message is received by the requestor's wireless communication device 120 and communicated to the requestor via the user interface 123 and/or speaker 122. Alternatively the Double-Opt-In message is sent from the Approval Authority computer 130, received by the locked object 111 and communicated to the requestor via the user interface 103. In one aspect, the Double-Opt-In SMS Message comprises a text or audio message, which may comprise words to the effect of “you will be charged $xx. If you agree to this charge, please click, or say, ‘Yes’”.
Thereafter, the method 700 further comprises, as represented by block 710, sending a SMS Reply 151 containing a user acceptance or a user refusal. The SMS Reply 151 containing a user acceptance or a user refusal is generated and transmitted by the requestor's wireless communication device 120, or by the locked object 111, based on data 140 input by the requestor in response to the Double-Opt-In Message.
Approval Authority
Referring to
As represented by block 804, the method 800 further comprises determining whether access to the locked object 110, 111 can be granted. As represented by block 806, this may further comprise, checking the received telephone number against a database of pre-registered “allowed” telephone numbers. Optionally, as represented by block 808, this may further comprise verifying or validating the received PIN against a database of pre-registered PINS. Optionally, as represented by block 810, this may further comprise comparing any combination of (a) the received telephone number, (b) the received PIN and (c) the received locked object identifier with the database to determine whether the requestor is authorized to access the locked object 110, 111, and if so, what access code 180 to transmit back to the requestor's wireless communication device 120 (or to the locked object 111, if the locked object 111 is equipped with a wireless transceiver 107).
As represented by block 812, the method 800 further comprises sending a SMS Reply 160 (or access code 180 only) back to the requestor's wireless communication device 120, or to the locked object 111.
Thereafter, the method 800 may further comprise, as represented by block 822, billing the requestor, or the requestor's telephone number, for the granted access. Thus, the SMS Reply 160 of block 812 comprises at least one of (i) an access code 180 for the locked object 110, 111 and (ii) an indication that charges for the granted access will be billed to the telephone number of the requestor's wireless communication device 120. Depending on the embodiment, the access code 180 is a phrase of predetermined length composed entirely of letters or numbers or composed of any suitable combination of letters and numbers. The access code 180 may also have other forms. For example, in one embodiment, the access code 180 is one of: a hyperlink to download an access program to the wireless communication device 120, a picture to wirelessly send to the locked object 111, and a business card to wirelessly send to the locked object 111, etc.
Returning briefly to block 804, which represents determining whether to grant the requested access to the locked object 110, 111, the method 800 may optionally further comprise, as represented by block 814, transmitting a Double-Opt-in SMS Message back to the requestor's wireless communication device 120, or to the locked object 111, if it is determined that the requested access can be granted. Thereafter, the method 800 may further comprise, as represented by block 818, receiving a SMS Reply 151 that contains a user acceptance or a user refusal in reply to the Double-Opt-In message. If the SMS Reply 151 contains the user acceptance, the method 800 may proceed to blocks 812 and 822, as described above. If the SMS Reply 151 contains the user refusal, the method 800 may proceed to blocks 816 and 820, as described below.
Referring again to block 804, if it is determined that the requested access cannot be granted, the method 800 optionally proceeds to block 816, which represents generating a denial message, which is another example of the SMS Reply 160. Otherwise, the method 800 proceeds directly to block 820, which represents sending the SMS Reply 160 back to the requestor's wireless communication device 120, or to the locked object 111. When the denial message is generated, it is contained in the SMS Reply 160. Thus, the SMS Reply 160 of block 820, comprises an indication that access is denied.
Examples of the locked object 110 and 111 include, but are not limited to: real estate lockboxes, door locks, vaults, vehicle doors, home key vaults, pool gates, remote access sites like self storage facilities, secure community gates, parking garages, etc.
Embodiments of the invention provide one or more technical effects, among which are: a relatively simple way for non-keyholders to request and obtain access to a locked object; and a commercial advantage of being able to charge money for providing the requested access to the locked object.
This written description uses examples to disclose the invention, including the best mode, and also to enable any person skilled in the art to make and use the invention. The patentable scope of the invention is defined by the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal languages of the claims.
Although specific features of the invention are shown in some drawings and not in others, this is for convenience only as each feature may be combined with any or all of the other features in accordance with the invention. The words “including”, “comprising”, “having”, and “with” as used herein are to be interpreted broadly and comprehensively and are not limited to any physical interconnection. Moreover, any embodiments disclosed in the subject application are not to be taken as the only possible embodiments. Other embodiments will occur to those skilled in the art and are within the scope of the following claims.
Number | Name | Date | Kind |
---|---|---|---|
5418844 | Morrisey et al. | May 1995 | A |
5524146 | Morrisey et al. | Jun 1996 | A |
5835583 | Hetz et al. | Nov 1998 | A |
6011976 | Michaels et al. | Jan 2000 | A |
6038305 | McAllister et al. | Mar 2000 | A |
6067347 | Farris et al. | May 2000 | A |
6101242 | McAllister et al. | Aug 2000 | A |
6122357 | Farris et al. | Sep 2000 | A |
6167119 | Bartholomew et al. | Dec 2000 | A |
6185289 | Hetz et al. | Feb 2001 | B1 |
6338088 | Waters et al. | Jan 2002 | B1 |
6404858 | Farris et al. | Jun 2002 | B1 |
6453167 | Michaels et al. | Sep 2002 | B1 |
6472973 | Harold et al. | Oct 2002 | B1 |
6704405 | Farris et al. | Mar 2004 | B1 |
6829332 | Farris et al. | Dec 2004 | B2 |
6856598 | Stanfield | Feb 2005 | B1 |
6920487 | Sofer et al. | Jul 2005 | B2 |
7120455 | Chen et al. | Oct 2006 | B1 |
7181210 | Zabawskyj et al. | Feb 2007 | B2 |
7200390 | Henager et al. | Apr 2007 | B1 |
7231431 | Sofer et al. | Jun 2007 | B2 |
7272216 | Elias et al. | Sep 2007 | B2 |
7272406 | Chava et al. | Sep 2007 | B2 |
7302273 | Chaudhuri | Nov 2007 | B2 |
7310511 | Barnea et al. | Dec 2007 | B2 |
7330725 | Zabawskyj et al. | Feb 2008 | B2 |
7389117 | Lovell, Jr. | Jun 2008 | B2 |
7437146 | Dudley et al. | Oct 2008 | B2 |
7460861 | Zabawskyj et al. | Dec 2008 | B2 |
7460873 | Lovell, Jr. et al. | Dec 2008 | B2 |
7505767 | Zabawskyj et al. | Mar 2009 | B2 |
7548756 | Velthuis et al. | Jun 2009 | B2 |
7606558 | Despain et al. | Oct 2009 | B2 |
8019362 | Sweatman et al. | Sep 2011 | B2 |
20050099262 | Childress et al. | May 2005 | A1 |
20090179735 | Van Rysselberghe | Jul 2009 | A1 |
Entry |
---|
Thomas, Matt; “SMS Marketing: Double Opt-In Explained”; http://istobe.com/blog/2009/01/19/sms-marketing-double-opt-in-explained/; Jan. 19, 2009. |
Number | Date | Country | |
---|---|---|---|
20110109433 A1 | May 2011 | US |