System and method for monitoring an access key from a key box
11384565 · 2022-07-12
Assignee
Inventors
- Adam Kuenzi (Silverton, OR, US)
- Pirammanayagam Nallaperumal (Telangana, IN)
- Neeraja Kanteti (Telangana, IN)
Cpc classification
E05B2047/0096
FIXED CONSTRUCTIONS
E05B47/00
FIXED CONSTRUCTIONS
E05B2047/0095
FIXED CONSTRUCTIONS
International classification
E05B47/00
FIXED CONSTRUCTIONS
Abstract
Disclosed is a system for monitoring a location of a key relative to a keybox, configured to perform: (i) providing access to the key by: communicating over a personal area network with a first mobile-device for the first user as the first user approaches the keybox in an attempt to obtain the key, obtaining first credentials from the first mobile-device, determining whether the first credentials are valid or invalid, when the first credentials are valid: putting the keybox in an unlocked configuration, (ii) tracking a location of the key by: communicating over the personal area network with: the key and/or mobile-device to determine whether the key is being returned to the keybox, wherein upon a determination by the keybox or the mobile-device that the key is not being returned, an alert is provided by the mobile-device to the first user.
Claims
1. A method of determining a location of one of a key and a key box operationally coupled to each other, the method comprising: the key, via a processor, and the key box, via a key box controller, periodically transmitting advertisements over a personal area network, wherein the key box advertisement is indicative of whether the key is in the key box, a mobile-device receiving a request to locate the one of the key and the key box from a user via an app installed on the mobile-device; the mobile-device communicating mobile-device location request data, including a request for the location of the one of the key and the key box, over a wireless network with a central server; the central server: transmitting central server location request data over the wireless network to other mobile-devices operationally associated with the central server; receiving from one of the other mobile-devices, data indicative that the one of the key and the key box is found and a position of the one of the key and the key box; and transmitting, to the mobile-device, positioning data, identifying the location of the one of the key and the key box; the mobile-device receiving from the central server, the positioning data, identifying the location of the one of the key and the key box.
2. The method of claim 1, including: the mobile-device displaying, on its screen, positioning information defining a last known position of the one of the key and the key box.
3. The method of claim 1, wherein the central server location request data includes a request for location information and identifying information of a plurality of the one of the keys and the key boxes respectively found by the other mobile devices, whereby the central server discriminates between received messages to locate the one of the key and the key box.
4. The method of claim 3, including the central server: monitoring for a response for a predetermined period of time; receiving location reply data, including the positioning data, for the one of the key and the key box from one of the other mobile-devices, within the predetermined period of time; and transmitting central server reply data, including the positioning data, to the mobile-device.
5. The method of claim 4, wherein: the central server reply data includes a map link to find the one of the key and the key box; or the mobile device displays a map that includes the location of the one of the key and the key box based on the data returned from the central server.
6. The method of claim 1, wherein the mobile device performs steps comprising: a first step of monitoring over the personal area network for the advertisements, a second step of receiving over the personal area network the periodic advertisements, a third step of determining whether the periodic advertisements are indicative of the key being within the key box or removed from the key box; wherein when the periodic advertisements are indicative of the key being within the key box, the mobile device returns to the first step, and when the periodic advertisements are indicative of the key being removed the key box, the mobile device performs further steps comprising: one of a fourth step and a fifth step, wherein: the fourth step includes monitoring elapsed time against a predetermined time period and the mobile device provides an alert when the elapsed time becomes greater than the predetermined time period; the fifth step includes monitoring a distance from the key or key box against a predetermined distance and the mobile device provides the alert when the distance becomes greater than the predetermined distance; and a sixth step of continuing to monitor for transmitted periodic advertisements over the personal area network from the key or key box and determining whether the periodic advertisements are indicative of the key being within the key box or removed from the key box, wherein when the periodic advertisements are indicative of the key being within the key box, the mobile device discontinues monitoring and to return to the first step.
7. A system for determining a location of a key, comprising a mobile-device in communication with a central server over a wireless network a key and a key box operationally coupled to each other, wherein the key, via a processor, and the key box, via a key box controller, are configured to periodically transmit advertisements over a personal area network, wherein the key box advertisement is indicative of whether the key is in the key box; the mobile device is configured to: receive a request to locate the one of the key and the key box from a user via an app installed on the mobile-device; communicate mobile-device location request data, including a request for the location of the one of the key and the key box, over the wireless network with the central server; and the central server is configured to: transmit central server location request data over the wireless network to other mobile-devices operationally associated with the central server; receive from one of the other mobile-devices, data indicative that the one of the key and the key box is found and a position of the one of the key and the key box; and transmit, to the mobile-device, positioning data, identifying the location of the one of the key and the key box; and the mobile device is further configured to: receive from the central server, positioning data, identifying the location of the one of the key and the key box.
8. The system of claim 7, wherein: the mobile-device is configured to display, on its screen, positioning information defining a last known position of the one of the key and the keybox.
9. The system of claim 7, wherein the central server location request data includes a request for location information and identifying information of a plurality of the one of the key and the key box respectively found by the other mobile devices, whereby the central server discriminates between received messages to locate the one of the key and the key box.
10. The system of claim 9, wherein the central server is configured to: monitor for a response for a predetermined period of time; receive location reply data, including the positioning data, for the one of the key and the key box, from one of the other mobile-devices, within the predetermined period of time; and transmit central server reply data, including the positioning data, to the mobile-device.
11. The system of claim 10, wherein: the central server reply data includes a map link to find the one of the key and the key box; or the mobile device displays a map that includes the location of the one of the key and the key box based on the data returned from the central server.
12. The system of claim 7, wherein the mobile device is configured to perform steps comprising: a first step of monitoring over the personal area network for the advertisements, a second step of receiving over the personal area network the periodic advertisements, a third step of determining whether the periodic advertisements are indicative of the key being within the key box or removed from the key box; wherein when the periodic advertisements are indicative of the key being within the key box, the mobile device is configured to return to the first step, and when the periodic advertisements are indicative of the key being removed the key box, the mobile device is configured to perform further steps comprising: one of a fourth step and a fifth step, wherein: the fourth step includes monitoring elapsed time against a predetermined time period and the mobile device is configured to provide an alert when the elapsed time becomes greater than the predetermined time period; the fifth step includes monitoring a distance from the key or key box against a predetermined distance and the mobile device is configured to provide the alert when the distance becomes greater than the predetermined distance; and a sixth step of continuing to monitor for transmitted periodic advertisements over the personal area network from the key or key box and determining whether the periodic advertisements are indicative of the key being within the key box or removed from the key box, wherein when the periodic advertisements are indicative of the key being within the key box, the mobile device is configured to discontinue monitoring and to return to the first step.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The following descriptions should not be considered limiting in any way. With reference to the accompanying drawings, like elements are numbered alike:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
DETAILED DESCRIPTION
(11) A detailed description of one or more embodiments of the disclosed apparatus and method are presented herein by way of exemplification and not limitation with reference to the Figures.
(12)
(13) The keybox may be a first smart device that may communicate over a personal area network (PAN) 122 with a mobile-device 124, which may be a mobile phone that may be a second smart device and which may be in possession of the agent 100. PAN protocols may include, for example, NFC (near field communication), BlueTooth Low Energy (BLTE) or ZIGBEE. The mobile-device 124 may be equipped with an App 128, available from an App Store, providing program level communications between the keybox 112 and the mobile-device 124. The agent 100 may interact with the App 128 via a screen 130 on the mobile-device 124. In addition, using the APP 128, the mobile-device 124 may communicate over the Internet 132 with a central server 136. Moreover, the mobile-device may use a cellular network 140 for access to the Internet or the mobile-device may access the Internet by, for example, a connection over Wi-Fi 144 (trademark of the Wi-Fi Alliance).
(14) Referring to
(15) Referring to
(16) At step S112 the controller 118 may determine whether the credentials are valid. If the credentials are not valid then at step S116 the controller may not grant access to the key 116 by, for example, not unlocking the keybox 112. If the credentials are valid then at step S120 the controller 118 may record a first audit log entry in an audit log stored on the controller 118, where the first entry may include the credentials or at least an identifier of the agent 100 and may indicate that access to the key 116 is being provided. At step S124 the controller 118 using electromechanical controls may configure the keybox 112 to the unlocked or opened state to provide access to the key container 120 and hence the key 116. At step S126 the controller may secure the keybox in the unlocked state.
(17) Referring to
(18) At step S136 the controller 118 may receive data from the mobile-device 124 indicative of the response from the agent 100. At step S140 the controller 118 may record a second audit log entry indicator of the response of the agent 100. At step S144 the controller may transfer the audit log data to the mobile-device 124, which may transfer the audit data to the central server 136. The audit data may serve as a digital check to ensure that the agent 100 left the key 116 in the keybox. At step S148 the controller may determine whether the response from the agent indicated that the key 116 was being replaced in the box.
(19) If the response was “YES” then at step S152 the controller may enable closing of the keybox by the agent, for example, by releasing the keybox from the unlocked state and allowing the key container 120 to latch into the keybox 112. If the response was “NO” then at step S156 the controller may again communicate with the mobile-device and cause the mobile-device to interactively engage the agent with an alert indicating that the key must be replaced.
(20) On one embodiment, in addition to or instead of asking the agent at step S132 and S136 whether the key is being returned, the keybox 112 may directly detect whether the key 116 is being returned. For example, the key 116 could have a Bluetooth chip 115 on a key ring 117 (
(21) Alternatively, the key 116 could have a radio frequency identification (RFID) chip that may be on the same board as the Bluetooth chip 115 and that may be read by an RFID reader upon insertion of the key 116 into the keybox 112. The RFID reader may be part of the controller 118 within the keybox 112. Yet alternatively the key could have a chemical signature, a visual identifier (barcode, QR code, etc. that is scanned by the box when it is returned). Moreover, the sensor in the keybox could be a mechanical tamper spring, or a magnetic sensor such as a magnetic reed proximity switch. In one embodiment the presence or absence of the key container 120 can be determined by the keybox 112 to determine if the key 116 is present or absent respectively.
(22) In one embodiment the keybox 112 determines at any time from one or more above disclosed features and/or steps that the key 116 has been returned. In such an instance, procedures disclosed herein which may subsequently create an alert may be aborted. This may avoid the controller 118 or mobile-device 124 from creating undue alerts.
(23) Turning to
(24) In one embodiment, the key 116 may be equipped with BTLE communication implements 115 as indicated above. In addition to or as an alternate to the features and steps performed in
(25) In one embodiment illustrated in
(26) When the agent with the mobile-device 124 moves outside the range, the determination is “no” at step S204A. At step S205A, a timer may be triggered on the mobile-device 124 for allowing the agent to return within range. When the timer elapses, or if the agent leaves a geofence range around the keybox 112 or property 104, at step S206A the mobile-device 124 may remind the agent with an alert to return to the keybox 112 and return the key 116. If the keybox 112 advertisement indicates the key 116 has been returned or if the agent returns to the threshold zone at step S208A, then the mobile-device 124 may abort this reminder procedure at step S212A.
(27) It is to be appreciated that in such embodiment the APP 128 on the mobile-device 124 may autonomously monitor a distance from itself to the keybox 112. In addition, then the mobile-device 124 may autonomously alert the agent if the agent has been out of range for too long or if the mobile-device 124 has moved too far away. That is, the mobile-device 124 may not need instructions from the keybox 112 in order to create an alert for the agent.
(28) Referring to
(29) At step S262 the controller may communicate with a second mobile-device for a second agent seeking to obtain the key from the keybox. At step S266 the controller may obtain second credentials from the second agent and at step S270 the controller may determine whether the second credentials are valid. If the determination is “YES” then at step S274 the controller may transfer the audit log to the second mobile-device for transferring to the audit log to the central server. If the determination is “NO” then the controller may wait to communicate with another mobile-device for another agent and cycle back to step S262.
(30) The above disclosed embodiments may prompt the agent with a message such as an alert to determine whether a key is inside a keybox before the keybox is closed as the agent leaves the property. The disclosed embodiments may electronically transmit a message, an auditory, vibratory or other typical alert to the agent via the mobile-device for the agent, indicating whether the key is in the keybox. The disclosed embodiments may ensure that the key is replaced in the keybox. In addition, creation of the audit logs may enable tracking of the location of the key and who last used the key.
(31) In addition to the above,
(32) The request may come from the agent 100 directly engaging the App 128 via the mobile-device 124. The agent 100 may only know the identity of the key 116 by inference: the key 116 is attached to a processor or chip 115 in a tag 117 that has a unique identifier (id) that is associated with a street address, an agent, and a keybox 112, for example. The request can specify the street address, for example, and by inference there can be a determination as to which key 116 is being requested also potentially which keybox 112 it is associated with/inside of, and what property/real estate listing this key 116 is for example.
(33) As shown in block 820, the method includes the mobile-device 124 displaying, on its screen 130, keybox positioning information defining a last known position (e.g., GPS coordinates) of the key 116 or its keybox 112 That is, the last known position may be of the key 116 or the keybox 112 as both the key and the keybox are advertising a Bluetooth signal as indicated above. The key 116 and keybox 112 can be tracked independently of each other, though in association with each other. For example, if it is known that the key 116 is in the keybox 112, and if a location of the keybox 112 is known, then the location of the key 116 may be inferred. Alternatively, the key 116 and keybox 112 can be tracked separately. For example, if the last known location of the key 116 is known as determined by another mobile-device (using that other mobile-device's GPS at the same time that the other mobile-device received the last Bluetooth signal from the chip attached to the key 116), this last known location could be communicated to the mobile device 124 from the other mobile device or from the central server 136 prior to the request in step 810 or even as part of step 820 to display the last known position.
(34) As shown in block 830, the method includes the mobile-device 124 communicating mobile-device key location request data, including a request for a location of the key 116, over a wireless network 140 with the central server 136. Other networks identified herein may be utilize for this communication.
(35) For example, the mobile app is being used by a Real Estate agent. In the app is a list of listings (homes for sale) that the agent is managing. For each listing there is a keybox 112 and a housekey 116. The agent can select the key 116, or the keybox 112, via the mobile app and ask ‘where is it’. The app may have a location already based on the agent's own activity (i.e. the agent was recently near a keybox 112 or key 116). This location can be displayed, e.g. by indicating the key 116 and/or keybox 112 was at an identified location at an identified date/time.
(36) The agent can select an option to ask the server (step 830) to identify who else has seen the key 116. The server can respond with any known location data from others. The agent can see data that identifies the last date/time that others were able to locate the key. The agent can then select to request to find the key at that time, e.g., dynamically. This is a request to the server that is transmitted to all the other agents' mobile-devices to search for the key 116. If the key 116 is found by any one of the respective other mobile-devices, a signal is returned to the server 136 by that other mobile-device, identifying that the specific key 116 is found. The server then sends a message back to the requesting agent's mobile-device 124, e.g., indicating that the key 116 is found at that time by another agent, via the other agent's mobile-device. Otherwise, after waiting a predetermined period of time, the server transmits to the agent's mobile-device 124 that the location of the key 116 is not yet known.
(37) Thus, as shown in block 840, the method includes the central server 136 transmitting central server location request data over a wireless network 140 to the mobile-devices operationally associated with it, e.g., due to having the app uploaded to it. Any of the networks identified herein may be used for this communication. The mobile-devices will scan for Bluetooth advertisements from the key 116. If the mobile-devices find keys, then they respond back to the server with their current location and the specific keys they respectively identified.
(38) As shown in block 850, the method includes the central server 136 monitoring for a response from the mobile devices for a predetermined period of time. That is, the central server 136 is monitoring for responses coming back from the mobile-devices with information about the specific keys they have individually found. In one embodiment, the predetermined period of time is 5 minutes.
(39) As shown in block 860, the method includes the central server 136 receiving key location reply data, including key positioning data, from the mobile-device, within the predetermined period of time. In one embodiment the key positioning data is global positioning data.
(40) As shown in block 870, the method includes the central server 136 transmitting central server reply data, including the key positioning data, to the mobile-device 124. In one embodiment, the central server reply data includes a map link to find the key 116. Alternatively, the mobile-device 124 displays a map that includes the location of the key 116 based on the data returned from the central server 136.
(41) With the above embodiments, an agent is looking for potentially misplaced housekeys used during, e.g., multiple showings of a property, would be able to locate the housekeys by means of the mobile APP 128.
(42) In addition to the above,
(43) The request may come from the agent 100 directly engaging the App 128 via the mobile-device 124. The agent 100 may only know the identity of the keybox 112 by inference: the key 116, normally stored in the keybox 112, is attached to a processor or chip 115 in a tag 117 that has a unique identifier (id) that is associated with a street address, an agent, and the keybox 112, for example. The request can specify the street address, for example, and by inference there can be a determination as to which keybox 112 is being requested also potentially which key 116 it is associated with/carrying, and what property/real estate listing this keybox 112 is for, example.
(44) As shown in block 920, the method includes the mobile-device 124 displaying, on its screen 130, keybox positioning information defining a last known position (e.g., GPS coordinates) of the keybox 112 that houses the key 116, or the key 116. That is, the last known position may be of the key 116 or the keybox 112 as both the key and the keybox are advertising a Bluetooth signal as indicated above. The key 116 and keybox 112 can be tracked independently of each other, though in association with each other. For example, if it is known that the key 116 is in the keybox 112, and if a location of the key 116 is known, then the location of the keybox 112 may be inferred. Alternatively, the key 116 and keybox 112 can be tracked separately. For example, if the last known location of the keybox 112 is known, as determined by another mobile-device (using that other mobile-device's GPS at the same time that the other mobile-device received the last Bluetooth signal from the key 112), this last known location could be communicated to the mobile device 124 from the other mobile device or from the central server 136 prior to the request in step 810 or even as part of step 820 to display the last known position.
(45) As shown in block 930, the method includes the mobile-device 124 communicating mobile-device keybox location request data, including a request for the location of the keybox 112, over a wireless network 140 with the central server 136. Any of the networks identified herein may be utilize for this communication.
(46) For example, the mobile app is being used by a Real Estate agent. In the app is a list of listings (homes for sale) that the agent is managing. For each listing there is a keybox 112 and a housekey 116. The agent can select the key 116, or the keybox 112, via the mobile app and ask ‘where is it’. The app may have a location already based on the agent's own activity (i.e. the agent was recently near a keybox 112 or key 116). This location can be displayed, e.g. by indicating the key 116 and/or keybox 112 was at an identified location at an identified date/time.
(47) The agent can select an option to ask the server (step 930) to identify who else has seen the keybox 112. The server can respond with any known location data from others. The agent can see data that identifies the last date/time that others were able to locate the keybox 112. The agent can then select to request to find the keybox 112 at that time, e.g., dynamically. This is a request to the server that is transmitted to all the other agents' mobile-devices to search for the keybox 112. If the keybox 112 is found by any of the respective other mobile-devices, a signal is returned to the server from that other mobile-device, identifying that the specific keybox 112 is found. The server then sends a message back to the requesting agent's mobile-device, e.g., indicating that the keybox 112 is found at that time by another agent, via the other agent's mobile-device. Otherwise, after waiting a predetermined period of time, the server transmits to the agent's mobile-device that the location of the keybox 112 is not yet known.
(48) Thus, as shown in block 940, the method includes the central server 136 transmitting central server location request data over a wireless network 140 to the mobile-devices associated with it, e.g., due to having the app uploaded to it. The mobile-devices will scan for Bluetooth advertisements from the keybox 112. If the mobile-devices find keyboxes, then they respond back to the server with their current location and the specific keyboxes they respectively identified.
(49) As shown in block 950, the method includes the central server 136 monitoring for a response from the mobile devices for a predetermined period of time. In one embodiment, the predetermined period of time is 5 minutes. That is, the central server 136 is monitoring for responses coming back from the mobile-devices with information about the specific keyboxes they have individually found.
(50) As shown in block 960, the method includes the central server 136 receiving keybox location reply data, including keybox positioning data, from the mobile-devices, within the predetermined period of time. In one embodiment the keybox positioning data is global positioning data.
(51) As shown in block 970, the method includes the central server 136 transmitting central server reply data, including the keybox positioning data, to the mobile-device 124. In one embodiment, the central server reply data includes a map link to find the keybox 112. Alternatively, the mobile-device 124 displays a map that includes the location of the keybox 112 based on the data returned from the central server 136.
(52) With the above embodiments, an agent is looking for potentially misplaced keybox 112 used during, e.g., multiple showings of a property, would be able to locate the keybox 112 by means of the mobile APP 128.
(53) The term “about” is intended to include the degree of error associated with measurement of the particular quantity based upon the equipment available at the time of filing the application. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the present disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, element components, and/or groups thereof.
(54) While the present disclosure has been described with reference to an exemplary embodiment or embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the present disclosure. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present disclosure without departing from the essential scope thereof. Therefore, it is intended that the present disclosure not be limited to the particular embodiment disclosed as the best mode contemplated for carrying out this present disclosure, but that the present disclosure will include all embodiments falling within the scope of the claims.