The present invention generally relates to lock boxes. More particularly, the invention relates to a programmable electronic lockbox system.
Lockboxes are commonly used in the real estate sales industry to provide a means for a large number of salesmen to conveniently gain access to locked buildings. A typical lockbox includes an inner repository that can be used to store a key to a building. The inner repository of the lockbox can be accessed by opening a door attached to the lockbox. A combination lock can be used to limit access to the inner repository. In this manner, individuals having the combination to the combination lock will have access to the key in the inner repository, thereby have access to the locked building.
A number of lockbox designs have been developed. U.S. Pat. No. 5,815,557 issued to Larson discloses a secure entry system that makes use of radio transmissions to communicate with locks, keys, and related components throughout the system. The radio transmissions can be made using a paging system, a cellular telephone system, or any other RF carrier. Some embodiments employ a cellular telephone in lieu of an electronic key. Others integrate a paging receiver within an electronic key to provide a unit with dual functionality. The system is illustrated with reference to exemplary application in the industrial site security, real estate lockbox, and transportation fields. A homeowner key allows the homeowner greater oversight and involvement. The key includes a privacy feature, enabling the homeowner to disable the lockbox for a predetermined period if privacy is desired.
In U.S. patent application Ser. No. 11/665,910 applicant Miller, et al. describes a lock programming device that is for use with a lock system which includes a computer and one door lock that has control. The computer has RAM, a storage device, and a program for generating lock code data files in response to user input. The lock control has memory for storing a lock code date file and is configured to operate the lock when receiving input corresponding to the code file. The programming device includes a base disposable in a user's hand and a flash memory connected with the base for storing at least one data file. A controller connected with the base is coupled with the flash memory and compliable with the computer. The controller communicates with the computer to write a data file in RA< directly to the flash memory and communicates with the lock control to transfer the data file from the flash memory to the lock memory.
U.S. Pat. No. 7,193,503 issued to Fisher, et al. describes an improved electronic lock system that is provided for use with real estate lock boxes. In this system, each user has an identification card with a non-volatile secure memory for exchanging data with the lock box, and for exchanging data with a central computer. The user first inserts the card into a connector at the lock box, or at the central computer. The lock box or central computer must first enable (or unlock) the data in the card memory, and then can read the data stored in that card's memory and record this information in lock box memory. The card must then identify itself, and the user must identify himself/herself to the lock box or central computer. After the identification information is authenticated, the user can enter commands to the lock box; e.g., an access code is manually keyed into the lock box keypad by the user to obtain access to a secure compartment.
While various improvements have been made to these traditional lockboxes over the years, certain disadvantages still remain. For example, it may be desirable for the owner of the lockbox to identify all individuals accessing the lockbox. The owner of the lockbox may also want to identify the date and time that the individual accessed the lockbox. Moreover, it is also desirable to be able to keep track of and obtain this information in an efficient and economical manner that does not include any reoccurring or hidden fees.
Given the deficiencies described above, there exists an unfulfilled need for an improved lockbox system that addresses the various disadvantages inherent to lockboxes found in the prior art.
According to the exemplary embodiments of the present invention, an electronic lockbox system is provided that maintains an access log with the dates and times of entry. Furthermore, the access log can be maintained and retrieved without the need to pay any subscription fees.
Preferably, a keypad is integrated into the lockbox through which a personal identification number (or “PIN”) can be input by a user. Upon recognition of the PIN by the lockbox, the door of the lockbox will open to expose the lockbox's inner repository. Any small item (e.g., a key) can be stored within this inner repository.
According to an embodiment of the present invention, the lockbox includes a microprocessor that controls its operation consistent with stored instructions on a permanent memory device. Memory device can be used to maintain an access log, which includes information regarding the identities of the individuals accessing the lockbox, as well as the dates and time of entry.
According to another embodiment, the memory device also includes programmed instructions that provide restrictions on the use of the lockbox. Such programmed instructions may be used to limit a user's ability to access the inner repository to a finite time period.
According to another embodiment, the inventive lockbox includes a USB socket for accepting a USB mass storage device (e.g., flash drive). In this manner, information can be transmitted to or retrieved from the memory device within the lockbox. A USB mass storage device is used to retrieve the access log from the lockbox. The access log can then be reviewed on the user's computer with a program. USB mass storage device can also be used to transmit updated programmed instructions to the lockbox to affect its functionality.
According to another embodiment, lockbox functions with a particular preprogrammed USB mass storage device, thereby preventing unwanted individuals from reprogramming or obtaining information from the lockbox.
These and other benefits of the present invention will be readily apparent from figures and detailed description of the invention provided herein.
The accompanying drawings, which are incorporated into and constitute a part of this specification, illustrate one or more embodiments, and together with the detailed description, serve to explain the principles and implementation of the invention. In the drawings:
Exemplary Embodiments are described herein in the context of a programmable electronic lockbox system. Those of ordinary skill in the art will realize that the following detailed description is illustrative only and is not intended to be in any way limiting. Other embodiments of the present invention will readily suggest themselves to such skilled persons having the benefit of the disclosure. Reference will now be made in detail to implementations of embodiments of the present invention as illustrated in the accompanying drawings. The same reference indicators will be used throughout the drawings and the following detailed description to refer to the same or like parts.
Referring to
In this embodiment of the invention, attachment bail 110 is U-shaped and extends away from the top surface 116 of body 102. Attachment bail 110 is slidable from a first open position to a second closed position in which lockbox 100 can be secured to a building structure. As with other conventional combination padlocks, combination lock 112 can be used to secure attachment bail 110 to body 102 in the closed position.
Attachment bail 110 can be moved from its closed to its open configuration by entering the correct combination into combination lock 112. The combination for combination lock 112 will have a default value. Alternatively, user can reset the combination for combination lock 112 to any desirable unlocking code. A combination lock cover 114 may be used to cover combination lock 112. Alternatively, lockbox 100 can be used without attachment bail 110 and combination lock 112.
In addition to the attachment bail 110, lockbox 100 has an open and closed configuration. The closed configuration is illustrated in
Referring again to
Once an acceptable PIN has been input by the user, the user can slide lock lever 104 to unlock lockbox 100. Sliding lock lever 104 up (toward top surface 116) will lock the lockbox 100, and sliding lock lever 104 down (away from top surface 116) will unlock lockbox 100.
Referring now to
Moving sliding lever 310 to its open configuration will allow the user to remove cover 308.
Lockbox 100 is illustrated as accepting four AA batteries to power lockbox 100. When the battery power drops below an acceptable level, the lockbox will start beeping. If the batteries completely die, lockbox 100 will not have the power to accept a PIN through keypad 108. Accordingly, lockbox 100 can be equipped with an external power inlet. In this manner, lockbox 100 can be powered by an external battery pack to allow a user to input the correct PIN to open lockbox 100.
When the user plugs the pre-programmed external storage into the USB port 402 of lockbox 100, the microcontroller accessed the data in the external storage (Step 710). In a preferred embodiment, lockbox 100 requires the user to enter pass code to enable the microcontroller to access data. The microcontroller then verifies whether the pass code entered is correct (Step 720). If the microcontroller is unable to find the pre-programmed data from the external storage and a correct pass code in coexistence, the accessing process is aborted. Alternatively, lockbox 100 remains locked when missing the required information. Under another alternative, if either of a correct pass code and pre-programmed data is missing, lockbox 100 is triggered to issue alerting signals such as beeps or red flash.
Upon detecting the pre-programmed data and correct pass code, the microcontroller is activated to retrieve and/or update the data stored therein (Step730). Accordingly, a user can store, retrieve, append and delete data (e.g., date and time information, passwords, PIN information, access logs, etc.) from the lockbox 100′s internal storage (Step 740) using the external storage, e.g., USB mass storage device.
In some embodiments, the external storage is a wireless device that can communicate remotely with the microcontroller. The wireless device may be a cell phone, pager, PDA, RF carrier, Bluetooth device, etc. The lockbox 100 incorporates a transmission module connected to the microcontroller for receiving signals such as Bluetooth or other radio waves. The signals carry pass code or pre-programmed data, upon receiving and verifying which the lockbox 100 is opened.
The pass code and pre-programmed data, as depicted below, can be transferred from a computer system that implements the underlying software, to a portable (flash) drive as well as a wireless device. The microcontroller within lockbox 100 is capable of recording the pass code or pre-programmed data that has been used to access lockbox 100. Because the computer software associates users with the particular pre-programmed data and pass code given to them, the administrator of the present invention can keep track of which users have accessed lockbox 100 and related data such as time and date.
Referring now to
The USB mass storage device used with lockbox 100 may be password protected so that only those individuals who know the password can use the USB device. In another embodiment, lockbox 100 will only work with a single USB device that has been specifically programmed to work with a single, specific lockbox. In yet another embodiment, the USB device used with the lockbox will be custom made to include dual partitions. In this manner, the first partition is not accessible by the user, but can still be used to store, retrieve, append and delete data through the use of the lockbox and its related software. The second partition would function as typical USB device where the user can store any related or unrelated information on the USB device.
Referring now to
Input box 602 fives the user the option of updating the date and time information displayed by Password Manager 600, which can in turn be transferred to lockbox 100. In an embodiment, checking input box 602 causes Password Manager 600 to pull date and time information from the user's computer. In this embodiment, the date and time information is displayed adjacent to the top of Password Manager 600.
As set forth above, a PIN is an identifying number that can be assigned to each individual user of lockbox 100. Input boxes 604, 606, and 612 as well as command buttons 608 and 619 can be used to generate, edit, and delete PINs to be used by lockbox 100. Specifically, input box 604 can be used by the user to create a certain number of PINs. As shown in
In this embodiment, graphical user interface window 620 displays the number of PINs that have been generated, the exacted PINs, and the assigned access durations for the PINs. In and embodiment, a user can edit the PINs and access duration information for each individual PIN directly within window 620. Furthermore, the user can input remarks into window 620 for the individual PINs so the user can easily see who has been assigned to a particular pin number. In the example illustrated in
In certain embodiments of the invention, Password Manager 600 can be used to set custom passwords for lockbox 100. For example, in input box 622, the user can set up a mater password to provide unlimited access to lockbox 100. This password will work even in all PINs have expired. As another example, in input box 624, the user can set up a program password which enables users to upload PINs and date/time information from the USB device to lockbox 100. As yet another example, in input box 626, the user can set up a report password that enables users to download access logs from lockbox 100 to the USB device. Password Manager 600 illustrated in
Still referring to
The processing device 802 for executing programs of instructions can be or include general and special purpose microprocessors that incorporate functions of a central processing unit (CPU) on a single integrated circuit (IC). The CPU controls an operation of reading the information from the data store 806, for example.
The data store 806 or memory 804 both serve as computer data storage for the example architecture 800 to buffer or store data, temporarily and permanently. The computer data storage refers to computer components, devices, and recording media that retain digital data used for computing for some interval of time. The data store device 806 typically includes non-volatile storage device such as magnetic disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The memory 804 include all forms of non-volatile memory, including but not limited to semiconductor storage known as EPROM, EEPROM, flash memory devices, and dynamic random access memory, for example.
Examples for the input device 819 include a video camera, a keyboard, a mouse, a trackball, a stylus, etc.; and examples for output devices 812 can include a display device, an audio device, etc. The display monitors such as cathode ray tube (CRT) or liquid crystal display (LCD) monitor for displaying information to a user.
The graphics device 808 can, for example, include a video card, a graphics accelerator card, a graphics processing unit (GPU) or a display adapter, and is configured to generate and output images to a display device. In one implementation, the graphics device 808 can be realized in a dedicated hardware card connected to the bus system 816. In another implementation, the graphics device 808 can be realized in a chipset of the bus system 816.
The network interface 814 can, for example, include a wired or wireless network device operable to communicate data to and from a network 818. The network 818 may include one or more local area networks (LANs) or a wide area network (WAN), such as the Internet.
In one implementation, the system 800 includes instructions defining an operating system stored in the data store 806 and/or the memory 804. Example operating systems can include the MAC OS.® X series operating system, the WINDOWS.®. based operating system, or other operating systems. Upon execution of the operating system instructions, access to various system objects is enabled. Example system objects include data files, applications, functions, windows, etc. To facilitate an intuitive user experience, the system 800 may include graphical user interface that provides the user access to the various system objects and conveys information about the system 800 to the user in an intuitive manner.
The foregoing description of preferred embodiments of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive of to limit the invention to the precise forms disclosed. Many embodiments were chosen and described in order to best explain the principles of the invention and its practical application, thereby enabling others skilled in the art to understand the invention for various embodiments and with various modification that are suited to the particular use contemplated. It is intended that the scope of the invention by defined by the claims and their equivalents.
This application claims the benefit under 35 U.S.C. §120 of U.S. nonprovisional patent application Ser. No. 12/944,677, entitled “Programmable Electronic Lockbox System” filed on Nov. 11, 2010 the contents of the aforementioned application is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
Parent | 12944677 | Nov 2010 | US |
Child | 14454330 | US |