Electronic lockbox with key retainer subassembly
11715339 · 2023-08-01
Assignee
Inventors
- Aric T. Hilmas (Louisville, CO, US)
- Gary Franklin Skinner (Broomfield, CO, US)
- Michael W. Aumock (Broomfield, CO, US)
- Joe Bucciaglia (Boulder, CO, US)
Cpc classification
G07C9/215
PHYSICS
E05B47/06
FIXED CONSTRUCTIONS
E05B47/00
FIXED CONSTRUCTIONS
G07C9/00309
PHYSICS
E05B67/22
FIXED CONSTRUCTIONS
International classification
E05B47/00
FIXED CONSTRUCTIONS
Abstract
Disclosed herein are various embodiments of an electronic lockbox for storing keys and key cards. The lockbox may include calendar-based entry rules so that the key codes can differ based on the date and time. The lockbox may be controllable by a mobile device such as a mobile phone, tablet, or other mobile device. The lockbox may include functionality so that key codes for the lockbox can be transmitted via websites such as Airbnb, HomeAway, or other rental websites, so that guests automatically receive their unique lockbox codes when they confirm their reservations. The lockbox may also receive a Bluetooth low energy virtual key which may be transmitted directly from a user's mobile phone to the lockbox, so that no manual code entry through the keypad is required by a user. The lockbox may be capable of accepting multiple passcodes enabled at different times and dates, and for different purposes.
Claims
1. An electronic lockbox for storing an item, comprising: a housing defining an interior, the housing including a front cover and a baseplate; a hinge connecting the front cover with the baseplate; and a key retainer subassembly located within the interior of the housing to store a keycard and one or more keys, the key retainer subassembly including an elongated surface with a first cavity defined in the elongated surface and a plurality of cavities defined in the elongated surface, wherein the first cavity receives an edge of the keycard to store the keycard within the lockbox, and wherein each of said plurality of cavities receives an end of one of said keys to thereby store said one or more keys within the lockbox.
2. The lockbox of claim 1, further comprising: an electronically controllable latch to selectively secure the cover with the baseplate into a locked state or unlocked state.
3. The lockbox of claim 2, wherein the latch is positioned within the cover.
4. The lockbox of claim 2, wherein the baseplate includes a pair of fixed protruding receiving members; and wherein the latch includes two pins that selectively extend outwardly to engage the fixed protruding receiving members, in order to secure the cover to the baseplate.
5. The lockbox of claim 2, further comprising: a microprocessor electronically coupled with the latch; and a Bluetooth interface coupled with the microprocessor to receive codes from one or more external devices to control the lockbox.
6. The lockbox of claim 5, wherein the one or more external devices include a user's mobile device.
7. The lockbox of claim 5, wherein the one or more external device includes a gateway device adapted to be coupled with a home's internet connection.
8. The lockbox of claim 5, wherein the lockbox logs one or more codes received by the lockbox, including the date and time said one or more codes were received.
9. The lockbox of claim 8, wherein the lockbox also receives data specifying a date range and a time range associated with said codes.
10. The lockbox of claim 5, further comprising: an interface bus to couple with a video camera expansion module to capture one or more images of the surrounding environment proximate the lockbox, wherein upon capturing said one or more images, the lockbox transmits the one or more images over a network.
11. An electronic lockbox for storing two or more keys, comprising: a housing defining an interior, the housing including a front cover and a baseplate; a key retainer subassembly located within the interior of the housing to store said two or more keys, the key retainer subassembly including an elongated surface having plurality of cavities, wherein each of said plurality of cavities receives an end of one of said keys to store and organize said two or more keys within the lockbox; a hinge connecting the front cover with the baseplate; an electronically controllable latch to selectively secure the cover with the baseplate into a locked state or unlocked state; a microprocessor electronically coupled with the latch; and a wireless interface coupled with the microprocessor to receive codes from one or more external devices to control the lockbox.
12. The lockbox of claim 11, wherein the latch is positioned within the cover; wherein the baseplate includes at least two fixed protruding receiving members; and wherein the latch includes at least two pins that selectively extend outwardly to engage the fixed protruding receiving members, in order to secure the cover to the baseplate.
13. The lockbox of claim 11, wherein the one or more external devices include a user's mobile device.
14. The lockbox of claim 11, wherein the one or more external devices includes a gateway device adapted to be coupled with a home's internet connection.
15. The lockbox of claim 11, wherein the lockbox logs one or more codes received by the lockbox, including the date and time said one or more codes were received.
16. The lockbox of claim 15, wherein the lockbox also receives data specifying a date range and a time range associated with said codes.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
(27)
(28)
(29)
(30)
DETAILED DESCRIPTION
(31) Disclosed herein are various embodiments of an electronic lockbox for securely storing items such as keys and or key cards or other items, for access by a user such as a tenant, guests, visitor, or other person of a property such as a home, condominium, apartment, office, or other dwelling, building or structure. As will be described herein, an electronic lockbox may be opened using a valid access code typed into a keypad of the lockbox, or via a valid electronic code transmitted from a mobile device such as a mobile smartphone over a wireless link (i.e., Bluetooth, LPWAN, Zigbee, or other conventional wireless link) to the electronic lockbox.
(32) The following detailed description refers to the accompanying drawings that depict various details of examples selected to show how particular embodiments may be implemented. The discussion herein addresses various examples of the inventive subject matter at least partially in reference to these drawings and describes the depicted embodiments in sufficient detail to enable those skilled in the art to practice the embodiments. Many other embodiments may be utilized for practicing the subject matter other than the illustrative examples discussed herein, and many structural and operational changes in addition to the alternatives specifically discussed herein may be made without departing from the scope of the disclosed subject matter.
(33) In this description, references to “one embodiment” or “an embodiment,” or to “one example” or “an example” mean that the feature being referred to is, or may be, included in at least one embodiment or example of the disclosure. Separate references to “an embodiment” or “one embodiment” or to “one example” or “an example” in this description are not intended to necessarily refer to the same embodiment or example; however, neither are such embodiments mutually exclusive, unless so stated or as will be readily apparent to those of ordinary skill in the art having the benefit of this disclosure. Thus, the present disclosure includes a variety of combinations and/or integrations of the embodiments and examples described herein, as well as further embodiments and examples as defined within the scope of all claims based on this disclosure, as well as all legal equivalents of such claims.
(34)
(35) A hinge 58 with hinge pin 60 may be utilized to connect the rotatable front cover 52 to the base plate 54 so that rotatable front cover 52 rotates about hinge 58 when lockbox 50 is opened. Within the interior of housing 51, a key retainer subassembly 62 may be provided to store and organize keys/key cards 48 in fixed locations within the lockbox 50.
(36) In one example, front cover 52 includes a keypad 56 on the exterior surface of front cover 52. Front cover 52 may also include on its interior surface, rechargeable batteries 64 which provides power for lockbox 50. An electromechanical latch 66, such as a two-sided latch, may be provided within the interior of front cover 52. Electromechanical latch 66 may include a latch motor 67 (also shown as 88) which can selectively and controllably open and close electronic latch 66.
(37) Front cover 52 may also include interior walls 68 that extend from the front surface of front cover 52. A circuit board 69 may be attached or positioned in the interior portion of front cover 52, wherein circuit board 69 includes one or more of the electronic components or circuitry described herein.
(38) In one example, base plate 54 may include a set of outer walls 70, and a set of inner rails 72, with slots 74 defined between an inner rail 72 and an outer wall 70. Slots 74 may be configured and sized to receive a portion of interior wall 68 of front cover 52 when front cover 52 of lockbox 50 is in a closed or locked position. Inner rails 72, outer walls 70, and interior walls 68 are provided and work in conjunction to protect the contents of lockbox 50 and help reduce the risk that an unauthorized user would pry open lockbox 50 with a screwdriver or other item.
(39) Base plate 54 may also include one or more holes 76 that may be used so that the base plate 54 and lockbox 50 may be mounted on a surface or wall with screws, bolts or other securement items as desired.
(40) Base plate 54 may also include fixed protruding receiving members 78 (78a, 78b) for receiving the retractable ends 87 of electromechanical latch 66 when latch 66 is in a locked position. Receiving members 78a,b include openings or cavities to receive the ends 87 of latch 66 when locked.
(41) In one example and referring to
(42) An interference plate 89 is also attached to the base plate 54, and the interference plate 89 is adapted to move or tilt between an upward position and downward position. When interference plate 89 is in the upward position, it may be positioned between the interior ends of set pins 87a,b to lock pins 87a,b in position (which sets the lockbox in a locked state; see e.g.,
(43) In one example, interference plate 89 can move or tilt downwardly from a spring-loaded/biased upward default position. After cover 52 is closed and locked relative to base plate 54 (wherein set pins 87a,b engage the locked position relative to the interior surfaces of receiving members 78a,b), interference plate 89 is adapted to engage set pins 87a,b to prevent set pins 87a,b from moving inwardly, which locks set pins 87a,b against the interior surfaces of receiving members 78a,b. Motor 67 (under the control of processor 110) control s the rotary position of cam 91, and cam 91 when rotated can move/tilt interference plate 89 downwardly, which thereby allows pins 87a,b to move inwardly, which thereby allows the lockbox cover 52 to be opened relative to baseplate 54 (see, e.g.,
(44) In
(45) In
(46) In one example, base plate 54 may also include a cavity 80 to receive key retainer subassembly 62. The key retainer subassembly 62 may be provided within lockbox 52 to removably store and organize keys and key cards 48 within the interior of lockbox 50. As shown in
(47) Electronic lockbox 50 may be controlled and interact with data and access codes in a variety of different manners.
(48)
(49) One aspect of embodiments of the present disclosure is that various expansion modules 116 can be connected with the lockbox to provide additional features or functions. Expansion modules 116 may physically attach to the lockbox (for instance, to the back surface of the lockbox) and electronically connect to the lockbox over the system bus 114. In one example, an expansion module that can be connected to the lockbox may include a module for real-time video cameras to take video or images of the surrounding environment outside of the lockbox (such as motion sensing images or other images when the lockbox is moved or the keypad is depressed or when the lockbox is opened or closed); and such images/video can be transmitted by the lockbox over the network to the lockbox owner. Another example of an expansion module can include a power module to provide additional battery/electric power. Another example of an expansion modules may include a mechanical module that provides the lockbox with a lockable/unlockable U-shaped hook to securely latch the lockbox around a door knob if desired (for instance, instead of mounting the lockbox on a wall or surface using screws). Another module may include a sensor to detect the presence or absence of one or more keys, keycards, or other items within the lockbox; and such information can be transmitted by the lockbox over the network to the lockbox owner.
(50)
(51)
(52)
(53)
(54)
(55) At operations 208-216, the lockbox can communicate with a device such as a smart phone over a Bluetooth connection. At operation 208, assuming the smart phone device has a Bluetooth connection but does not have an active cellular network connection, then at operation 210, the smart phone device encrypts a message to access the lockbox. At operation 212, the smart phone device sends an encrypted message to the lockbox, and at operation 214 the lockbox receives the encrypted message, and decrypts the message and reads and processes the data contained within the encrypted message. At operation 216, the lockbox formulates a response message, and encrypts the response message and sends the response message to the smart phone device.
(56) At operations 218-224, the lockbox can communicate with a user through the keypad and other LEDs of the lockbox. At operation 218, a user presses one or more keys of the keypad of the lockbox, which, at operation 220, creates a data event. At operation 222, the lockbox records the data received by the user's keypad depressions, and at operation 224, at a later time, when a device connects to the lockbox, the event data is transmitted to the device so that the event can be reported to the lockbox owner if desired, in one example.
(57)
(58) In one example, data encryption may be provided and applied at multiple layers of the lockbox system. For providing encryption at system boot, a TPM chip (Trusted Platform Module, which stores encryption keys for the system) may be provided on the circuit board to hold the device-side certificates for encryption. The operating system can boot/start by using a secret key embedded in a non-readable section (i.e., protected section of fuseable memory that when blown becomes unreadable to the booted OS) of the main processor. This key can be used to decrypt the transmission of data between the TPM and the main processor. The main processor may use a key from the TPM to verify that the operating system of the main processor was not compromised. Once validation is accomplished, the main processor starts the operating system.
(59) In one example, encrypted communication between the main processor and radio processor (i.e., Bluetooth modules) are accomplished over a low-level chip protocol such as but not limited to an I2C interface. Codes stored in the TPM and protected area of the radio processor are used to encrypt traffic sent over the I2C interface. The encryption allows validation and hides content within messages.
(60) In one example, encryption during software upgrades of the main processor or radio processor may be validated against a certificate stored in the TPM chip for the device. This helps ensure the validity of the software before using in a run-time state.
(61) In one example, device user data may be encrypted within data storage (i.e., at rest in flash memory). The TPM module can hold symmetric keys to encrypt the data for writing or reading. Data transmitted from device storage to the server may reside in an encrypted state to ensure secrecy during transmission. Encrypted at rest means the data may not be easily read from the memory.
(62) In one example, data transmitted between the lockbox device and the server may also be encrypted. Due to the varying routes and secondary devices that may exist between both endpoints, encryption such as but not limited to ECDSA (Elliptic Curve Digital Signature Algorithm encryption) or other conventional or future developed encryption may be utilized to ensure communication between both parties is valid and secure. The TPM chip on the device may be used for secure random number generation and certificate storage to ensure security within the device.
(63) As mentioned above, the electronic lockbox 50 may communicate with the smart phone or other mobile device or standalone computing device, in accordance with various embodiments of the present disclosure. In one example, an application program with various graphical user interfaces (GUIs) may be provided so that owners of the lockbox can control the lockbox and can establish a plurality of valid access codes that may be valid at different dates and times for different authorized users. Moreover, an application program may be provided to the users (for example, tenants, renters, service providers, or others) wherein such application program operates on the user's mobile device or smart phone.
(64) In
(65) In
(66) In
(67) In
(68) In
(69) The subject matter of this application may be practiced in a variety of embodiments as systems, devices, and other articles of manufacture or as methods. Embodiments (including one or more features of the present disclosure, processes or process steps of the present disclosure, or GUI features shown or described herein) may be implemented as hardware, software, computer readable media, or a combination thereof. The embodiments and functionalities described herein may operate via a multitude of computing systems including, without limitation, desktop computer systems, wired and wireless computing systems, mobile computing systems (e.g., mobile telephones, netbooks, tablets or slate type computers, notebook computers, and laptop computers), hand-held devices, multiprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, and mainframe computers.
(70) User interfaces and information of various types may be displayed via on-board computing device displays or via remote display units associated with one or more computing devices. For example, user interfaces and information of various types may be displayed and interacted with. Interaction with the multitude of computing systems with which embodiments of the present disclosure may be practiced include, keystroke entry, touch screen entry, voice or other audio entry, gesture entry where an associated computing device is equipped with detection (e.g., camera) functionality for capturing and interpreting user gestures for controlling the functionality of the computing device, and the like.
(71) Furthermore, embodiments of the present disclosure may be practiced in an electrical circuit comprising discrete electronic elements, packaged or integrated electronic chips containing logic gates, a circuit utilizing a microprocessor, or on a single chip containing electronic elements or microprocessors. For example, embodiments of the present disclosure may be practiced via a system-on-a-chip (SOC) where each or many of the illustrated components may be integrated onto a single integrated circuit. Such an SOC device may include one or more processing units, graphics units, communications units, system virtualization units and various application functionality all of which are integrated (or “burned”) onto the chip substrate as a single integrated circuit. When operating via an SOC, the functionality described herein with respect to the software applications may be operated via application-specific logic integrated with other components of the computing device on the single integrated circuit (chip). Embodiments of the present disclosure may also be practiced using other technologies capable of performing logical operations such as, for example, AND, OR, and NOT, including but not limited to mechanical, optical, fluidic, and quantum technologies. In addition, embodiments of the present disclosure may be practiced within computers or in any other circuits or systems.
(72) The term computer readable media as used herein may include computer storage media. Computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, or program modules. The system memory of processor 110 (or other media such as storage devices of computing devices) are all examples of computer storage media (i.e., memory storage). Computer storage media may include random access memory (RAM), read only memory (ROM), electrically erasable read-only memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other article of manufacture which can be used to store information and which can be accessed by a computing device. Any such computer storage media may be part of a computing device.
(73) While the methods disclosed herein have been described and shown with reference to particular operations performed in a particular order, it will be understood that these operations may be combined, sub-divided, or re-ordered to form equivalent methods without departing from the teachings of the present disclosure. Accordingly, unless specifically indicated herein, the order and grouping of the operations is not a limitation of the present disclosure.
(74) It should be appreciated that in the foregoing description of exemplary embodiments of the disclosure, various features of the disclosure are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that an embodiment requires more features than are expressly recited in each claim. Rather, inventive aspects lie in less than all features of a single foregoing disclosed embodiment, and each embodiment described herein may contain more than one inventive feature.
(75) It will be understood by those skilled in the art that various changes in the form and details may be made from the embodiments shown and described without departing from the spirit and scope of the disclosure.